What do Big Pharma and CCPA have in common?

What do Big Pharma and CCPA have in common?

Posted by on Nov 13, 2018 in Vision

Developing a solution for which there is no problem- then engineering the perfect problem.

But wait. If you think this is headed towards another conspiracy, you don’t understand the problem yet. It is true that consumer privacy protection is a problem. The CCPA is a solution to that problem, but it may not be what it was created for. Besides, that makes a pretty boring conspiracy “Silicon Valley wants to solve the most ubiquitous problem on the planet…” it’s an ABC Afterschool snooze-fest.

As a successful hacker (in that I’ve never been caught…) and former systems security analyst here is the problem:

California’s leading skull-and-crossbones flagship, Silicon Valley, might be engineering the perfect device to gut companies which cannot hopefully comply with the CCPA mandate to provide data tracking – and complete oversight as to how and during which processes Consumer Data is being manipulated.

What sounds reasonable- at least as reasonable as imposing gun control in the United States- sets the stage for the perfect class action lawsuit against an entire industry based on a single bad actor being commonly implemented- and exploited.

It reminds me of the United States Congress suing Microsoft for Monopoly when Microsoft was given exclusive license to develop the portion of the network it claimed to hold monopoly over.

It also reminds me of the Cambridge Analytics scandal, an inquisition also spearheaded by the United States Congress that devalued Facebook stock by $20B (yes, Billion) presumably due to privacy breaches and information tampering that were heinous, wrong, and Orwellian in scope… aaaand had 10,000 times LESS impact than Facebook’s social graphing origins had (c.2005-2008) with Choicepoint, the NSA, and other Pseudo-governmental agencies involved, as the largest breach of public privacy ever staged before or since.

What do these things have in common? In any business there is always an exit strategy.

When Microsoft (c.1998) was chosen to receive mega-millions to develop an infrastructure that coupled the stealing of latent CPU cycles from consumer host machines left on the network- and to provide a logistical upgrade to the up-and-coming broadband network to scale up the potential for the additional Petaflops of compute power enabled by the new network architecture, it only took Congress a few years (officially 2002-2003 based on a 2001 anti-trust lawsuit) to collect their dividends.

Considering the latest scandal in which $20Bn Facebook Stock Dollars literally vaporized overnight, it makes the scale about 100x. Apparently Bitcoin (BTC) has some challengers when it comes to 1000x investments, and the Pirates of Silicon Valley know this only too well.

Motive + Opportunity = ?

The motive is always capital. Large amounts of capital. The lynchpin is created with CCPA. Now it requires the perfect opportunity.

Do not target one business. Launching Class Action against one business pales in comparison, to, for example. launching Class Action against the Banking Industry, or why not the Securities Industry in this case? It will be much more lucrative, and the association between profits tendered by Crypto-currency, particularly in light of the upcoming regulatory finding, make a great target market.

The key is to develop a popular service that will be used almost universally, and to exploit that service by design. Not to build in a backdoor. No, that is too straightforward. In order to cause failure of compliance and to wage Class Action (or better to threaten a legitimate Class Action and Settle…) it will require a significantly engineered solution, particularly to prove intent.

It would optimal to prove intent- such things hold up so much better in court. So the system in particular- the Opportunity- already has acquired a requirements list of sorts.

System Criteria:

  • Ubiquitous (usability = popularity = mass adoption)
  • Exploitable by Design (must contain a non-obvious vulnerability to exploit)
  • Directly linked to Cover-up of Intent (Mis-use of Public Data directly tied to system)


Post a Reply