Thursday, 13 August 2015

Pressed by social inequalities and saved by Technology; or is it?

Written by Nkululeko Goqo
19 September 2013


A short original case related study (phantom story-line) created for Information Technology Auditing deliberations.


Damn!!! Yelled Sbongiseni Mbambo, as he heard the sirens shrieks from afar after he was tipped that the ‘now’ disbanded scorpions were on his trail, gasping, pacing up and down is his dilapidated condominium. He swung himself across the room, like a pendulum, grabbing his latest MacBook Pro that boasts a Retina display built entirely around flash architecture, dumping it in boiling water to save his skin.

Earlier that day, Zakhele Madida had written a song with Unleash Records, aimed at addressing the issues surrounding social exclusion and social inequalities. He had hoped that folks would heed his call and put a screeching end to their technological crimes, a sound that would echo so loud catching all of them in a slipstream and would be plucked to better living.

Zakhele understood that social inequality is linked to racial inequality, gender inequality, and wealth inequality. It refers to the processes in society that have the effect of limiting or harming a group’s social class, social statuses, that even extend to prohibiting access to basic needs, like education and others.

“We are tired of our brothers becoming embroiled in crimes, becoming the hood-rats that have mastered the sewerage pipes of Westville Prison. Inequalities have created crime monsters, a world that indicates the survival of the fittest, every man for himself”, proclaimed an unnamed poet from Durban, South Africa.


Sbongiseni’s love for old portable Frequency Modulation radios taught him a lot about microchips, semiconductors, broadly electronics. He later puts his itchy hands on computers and telephony systems. He was adorned by Kevin Mitnick, the “America’s most wanted computer outlaw”. Mr. Mbambo was fascinated by Kevin’s exploits as a cyber-desperado and fugitive forming one of the most exhaustive FBI manhunts in history and spawned dozens of books, articles and computer security case studies.

A hard knock banged on the door repeatedly as Sbongiseni froze with bated breath. He drifted off into oblivion, only to wake up in a cold cell. What has actually transpired before the activities leading to Sbongiseni’s arrest; was the release of a broadcast citing the following:  

Cyber criminals targeted SA Post Office and stolen more than 42 million user details financial institution Postbank. The theft occurred between 1 and 3 January, and was allegedly committed by a syndicate with knowledge of the post office's information technology (IT) system, confirmed by Department of state security spokesman Brian Dube.

The National Intelligence Agency (NIA) has launched a high-level probe after this data breach. According to NIA spokesman "When a government institution is compromised, the NIA will be involved and will offer its assistance" Postbank currently holds over 4-billion in deposits, and processes millions of rands in social grants throughout the year. The bank told that none of its customers were affected by the hacking, but declined to comment further.

Over the next three days, automated teller machines (ATMs) in Gauteng, Free State and KwaZulu-Natal were used to withdraw cash from the accounts. The incident comes three years after Postbank spent over $15-million to upgrade its fraud-detection service. But that investment seems zero valuation. An unnamed security expert told that "The Postbank network and security systems are shocking and desperate need of an overhaul. This was always going to be a real possibility".


Sbongiseni and his clique better known as the McGezas have been hard at work experimenting with different technologies and techniques including war-dialing. War-dialing is a technique of using a modem to automatically scan a list of telephone numbers, usually dialing every number in a local area code to search for computers, bulletin board systems and fax machines. 

Hackers use the resulting lists for various purposes, hobbyists for exploration, and crackers - malicious hackers who specialize in computer security: for guessing user accounts (by capturing voicemail greetings); or locating modems that might provide an entry-point into computer or other electronic systems. It may also be used by security personnel: for example, to detect unauthorized devices, such as modems or faxes, on a company's telephone network.

It has also emerged that one member of the McGezas clique, Zukiswa Manciya, works for the Posbank and it is alleged that she is privy to very confidential information, system intricacies, operations and the entire organization’s workflow. The following confusing (as the link was not vividly seen) articles that had nothing to do with what Zukiswa is deployed at her post for were seized from her posh upmarket apartment in Sandton. It appeared to be a research that reads as follows:


Exhibit 1.1
Technological convergence is the tendency for different technological systems to evolve toward performing similar tasks. Convergence can refer to previously separate technologies such as voice (and telephony features), data (and productivity applications), and video that now share resources and interact with each other synergistically. Telecommunications convergence, network convergence or simply convergence are broad terms used to describe emerging telecommunications technologies, and network architecture used to migrate multiple communications services into a single network. Specifically this involves the converging of previously distinct media such as telephony and data communications into common interfaces on single devices.

The rise of digital communication in the late 20th century has made it possible for media organizations (or individuals) to deliver text, audio, and video material over the same wired, wireless, or fiber-optic connections. At the same time, it inspired some media organizations to explore multimedia delivery of information. This digital convergence of news media, in particular, was called "Mediamorphosis" by researcher Roger Fidler, in his 1997 book by that name. Today, we are surrounded by a multi-level convergent media world where all modes of communication and information are continually reforming to adapt to the enduring demands of technologies, "changing the way we create, consume, learn and interact with each other".

Convergence in this instance is defined as the interlinking of computing and other information technologies, media content, and communication networks that has arisen as the result of the evolution and popularization of the Internet as well as the activities, products and services that have emerged in the digital media space. Many experts view this as simply being the tip of the iceberg, as all facets of institutional activity and social life such as business, government, art, journalism, health, and education are increasingly being carried out in these digital media spaces across a growing network of information and communication technology devices. Also included in this topic is the basis of computer networks, wherein many different operating systems are able to communicate via different protocols. This could be a prelude to artificial intelligence networks on the Internet eventually leading to a powerful super-intelligence via a technological singularity.


Exhibit 1.2

Privacy and Electronic Shopping – Securing Company Information

The question of privacy is as old as mankind, but with the increasing operation of computers and computer networks it has become an urgent issue. As electronic commerce evolves, information about a person’s shopping behavior becomes more and more valuable and, at the same time, easier to acquire. Large databases facilitate access to information and it is becoming easier to trace activities in electronic media. Formerly, it was feasible to track the activities of one or two people (accessing paper files usually meant phoning and traveling a lot), but it would have been impossible to track thousands of people on a routine basis.
The possibility of automation--of mighty electronic “robots” which comb the Internet for consumer habits or credit card information--really makes privacy an issue. One possibility of protecting ourselves against loss of privacy is not to participate in the Electronic World. This approach corresponds to closing the door behind ourselves. But what if there are big opportunities--special bargains, exiting new products--on the Web which we do not want to miss? What is the information that we believe is too private to be handed over to a merchant?

When it comes to a business transaction it is usually not possible for the customer to stay anonymous. Some personal information must be revealed. In the case of a physical product that would eventually require to be couriered, for example.

There are so many lose ends that still need to be tied-up and fresh reports are hitting our screens day by day as we wait to see what will happen next. The community is divided between two plots; are the McGezas guilty or are they saved by technology?

Written by Nkululeko Goqo
19 September 2013
REFERENCES:
1.        POSBANK R42 Million news
2.        Kevin Mitnick Articles
3.        Computer Related articles





No comments: