So when can someone be TOO connected? There are those that would argue U.S. House Representative Pete Hoekstra is too connected. According to a recent article in Security Magazine, Rep. Hoekstra sent tweets during his recent trip to Iraq. Some of the tweets include: “Just landed in Baghdad. I believe it may be first time I’ve had bb service in Iraq. 11th trip here.” and “Moved into green zone by helicopter Iraqi flag now over palace.Headed to new US embassy Appears calmer less chaotic than previous here.”
I’m a huge fan of the Always Connected User Experience. I’m also a huge fan of social networking and it’s inevitable that we are all living more connected lives than ever before. In fact, my children struggle to remember when they were not connected early in the childhood years. My grandson will never know a time when he, his family, friends, and all those around him were connected especially over ever-present mobile technologies. This also creates what is undoubtedly the BIGGEST threat potential to our security, identities, and privacy.
One of the many great things about President Obama’s administration and his philosophy is that of the first Connected White House. The U.S. government and its many agencies will for the first time collide with the connected lifestyle enabled by social networks and mobile technologies. It will also need to figure out fast how to balance the new Life, Connected a growing population of its members and the need for secrecy and national security, as well as the security of others we are protecting around the world.
Will this drive the need for capabilities in monitoring, detection, policy enforcements, and possibly surveillance of these always-connected mobile devices? Growth of the mobile phone market is estimated at 8% for 2009, according to Gartner. This is based on a slowdown of the market in 2009, but still a growing demand for mobile devices and services. In 2008, 1.28 billion mobile handsets were sold just in that year. So this will mean almost 1.4 billion more mobile handsets will be sold this year alone!
As was the case with Barack Obama’s “blackberry”, new and innovative measures will need to be taken in areas where government, defense, and intelligence security are mandated. The optimal solution does not exist today, so the private sector and high tech industries must work hard and fast to solve the vulnerabilities that exist and are growing, but may not be fully apparent to the evildoers and malicious intentions. My company, AirPatrol Corp., is one of these companies that is trying to offer up the balance of a connected environment with the ability to Detect/Locate/Enforce where security and intrusion policies mandate.
What do you think should be done and who is responsible for making sure it happens?