Posts

Big Data: An Alternate Reason for Hacks Past and Future?

[Fracking sites, location unknown (Simon Fraser University via Flickr)]

[Fracking sites, location unknown (Simon Fraser University via Flickr)]

On Monday, MIT’s Technology Review published an interesting read: Big Data Will Keep the Shale Boom Rolling.

Big Data. Industry players are relying on large sets of data collected across the field to make decisions. They’re not looking at daily price points alone in the market place, or at monthly and quarterly business performance. They’re evaluating comprehensive amounts of data over time, and some in real time as it is collected and distributed.

Which leads to an Aha! moment. The fastest entrant to market with the most complete and reliable data has a competitive advantage. But what if the fastest to market snatches others’ production data, faster than the data’s producer can use it when marketing their product?

One might ask who would hack fossil fuel companies’ data. The most obvious, logical answers are:

— anti-fossil fuel hackers cutting into production;
— retaliatory nation-state agents conducting cyber warfare;
— criminals looking for cash; and
— more benign scrip kiddies defacing property for fun.

But what if the hackers are none of the above? What if the hackers are other competitors (who by coincidence may be state-owned businesses) seeking information about the market ahead?

What would that look like? We’re talking really big money, impacting entire nation-state economies by breach-culled data. The kind of money that can buy governments’ silence and cooperation. Would it look as obvious as Nation A breaking the digital lock on Company B’s oil production? Or would it look far more subtle, far more deniable? Read more

Mapping Treasure: Looking Beyond the Yield of Traditional Insider Trading

Money by Kevin Dooley via Flickr

[graphic: Money by Kevin Dooley, via Flickr]

A former SAC hedge fund manager, who cooperated with law enforcement, avoided a prison sentence this week after the FBI’s investigation into insider trading found criminal activities. It’s a rather typical story in which persons unfairly benefited from information they would not otherwise have access to outside their work as traders. Six persons were ultimately convicted in connection with this case.

A fresh spin on insider trading also made news this week, when the SEC filed a lawsuit against two Capital One fraud investigators who made 1800 percent on their investment over three years, based on their use of a Capital One credit card user database.

The two investigators, Bonan Huang and Nan Huang, grew an investment of $147,300 to $2.8 million based on thousands of searches across a database comprised of credit card customer transactions. Noting the volume of use of credit cards at a particular fast food company, they bought and traded the company’s stock based on this data.

Over time they made similar stock trades based on transactional volume and other publicly available news about three different companies.

Had the database been one for sale by a company rather than their employer’s proprietary database, the Huangs would have been lauded as investment rock stars. But because the method they used “misappropriates confidential information for securities trading purposes, in breach of a duty owed to the source of the information,” the two men are being sued for insider trading.

The Huangs’ trading experience gives pause when one considers the value of metadata, and of the data breach at JP Morgan Chase this past year.

Metadata can offer a volume of transactional activity, though it will not disclose the value of a transaction. Imagine smartphones indicating they are being used at particular devices – point-of-sale devices – at any retailer, from fast food to hard lines. An uptick in overall activity at a specific retailer indicates greater volume of business, the data fresher than that reported in a 10-Q report filed publicly with the SEC. What could an investor do with this kind of data? One could imagine success not much different than the Huangs experienced, provided they also understood other publicly available information about the retailers under observation. Read more

Identity Problem: Blind Journalism, Uninformed Technology, and Cory Booker

This is an op-ed; opinion herein is mine. ~Rayne

A tweet yesterday by technology-futurism pundit and sci-fi writer Bruce Sterling hinted at the problem of technology industry and journalism, with regard to politics:

Tweet_BruceS_CoryBookerNYT_23MAR2013x

The tweet was spawned by a profile in The New York Times of Newark NJ’s mayor, Cory Booker, who has used social media regularly as a community outreach tool. In addition to bestowing the inapt label “A Politician From the Future,” a critical problem in this article is the labeling of Cory Booker as appealing to “the Googly-Facebookish wing of the [Democratic] party.”

Except that Cory Booker is extremely proficient at using microblog platform Twitter, and Twitter has a significantly different demographic profile with regard to race and age. Further, Twitter’s 140-character post limitation has been much easier to use on mobile devices, fitting a mobile business model long before either Google or Facebook.

It’s not clear what Sterling thought about the NYT’s article, though in a reply he expanded and lumped together the “Twittery-Googly-Facebook” crowd, suggesting he’s missed both NYT’s error while not understanding the demographics and politics at play.

Both Sterling and NYT fail to take seriously Booker’s actions themselves; they look at the medium, not the message, which is that Booker’s deeds are like that of an old-school Democrat, the kind we used to have before the corporatist Democratic Leadership Committee co-opted the Democratic Party to serve somewhat more liberal overlords.

Booker’s use of Twitter was carefully noted by TIME back in 2010, after Booker had taken personal, hands-on action to help constituents during a snowstorm. It wasn’t a collection of photo ops for a campaign (as another mayor-candidate demonstrated in another city), but actual response to situations where elbow grease and a shovel were required.

What both NYT missed, besides categorizing Booker as belonging to the “Googly-Facebook” portion of the Democratic Party:

— Booker’s efforts with regard to his one-on-one interactions with constituents do not compare with a considerable portion of the party to which he belongs;

— His actions are highly transparent, his words sync with his deeds right there in the public forum of Twitter;

— The tool he uses for outreach more closely matches his constituents’ demographics, not that of the “Googly-Facebook” crowd.

— Booker uses “big data” to make and justify decisions; “big data” is merely a contemporary expression of polling data used in the near-term past and present.

It’s not clear that Sterling notes these key points, as focused as he was on the social media component and NYT’s representation of Booker as a politician from the future. Read more