Friday, March 20, 2015

The Greatest Generations – A Tribute to My Dad and My Children

 

Two generations stand out in my mind. The first is that of my Dad, which has been termed the “Greatest Generation.” The other is that of my son and daughter. While this may be natural for a Dad, I am in a unique position to note some similarities.

OrphanBoyBook_BackCover_Page_001

I had a life-long, incredible relationship with my Dad. The following is a quote from my book, The Orphan Boy, A Love Affair with Mining.

“One September afternoon I sat on the dump of a small mine in Colorado with a unique man, my dad, Herbert T. Young. Even at 12,000 feet, the sun was bright and warm, and the sky was so very blue. Below, the aspen leaves were just starting to turn gold, and there was a hint of fall in the air.

We had talked on the way up the rocky, steep road about the mines and the history of the area, as we often did. I never got tired of the many stories Dad told about his experiences and information he gathered in researching the mining district.

Arriving at the Orphan Boy mine, we sat down and had a cup of coffee from Dad’s ever present thermos. Even though I had previously heard many of his stories about this mine that started his love affair with mining, they seemed much more real as I sat with him in that remote and peaceful basin.

My eyes were drawn to the rugged splendor of the high peaks; Brittle Silver Mountain, Grizzly Peak, Revenue Mountain... Along the horizon were Gray’s and Torrey’s, two of Colorado’s fourteeners. The air was so clean I felt like I could almost reach out and touch the peaks across the Warden Gulch basin. Morgan Peak, behind me, and Santa Fe Peak to the south looked so close it seemed like I could hike to them in just a few minutes.

Everywhere I looked were evidences of the mining and prospecting that went on in a different time. I noticed the reddish brown and yellow gossans that streaked the mountain slopes in several places. All the while, this remote valley was very quiet, almost as if our thoughts themselves interrupted the solitude. This scene stirred something in my soul that words cannot begin to explain.

I thought of Dad and the many experiences he related to me. I noticed he was also scanning the mountains, deep in thought. He turned and smiled at me, with his brown eyes shining. I knew we were thinking, feeling and experiencing the same closeness to God in that moment.

The feeling of kinship I experienced while sitting on that mine dump were similar to the feelings I had during the times Dad and I worked underground together. Working underground brings a special sense of closeness where everyone looks after one another. Even with 30 years difference in our ages, we were kindred souls.

I worked with Dad during the summers and after college graduation until his death and had the fortune to experience firsthand why his generation was named the ‘greatest generation’.

He was typical of the World War II generation whose lives were interrupted by that war. When they came back home, they changed both America and the world in a special way.”

As I get older, I watch my generation at the height of their power and prestige. I can’t help but compare them to that of my Dad.

A recent blog on ZeroHedge entitled “25 statist propaganda phrases and how to rebut them” [source - http://www.zerohedge.com/news/2015-03-14/25-statist-propaganda-phrases-and-how-rebut-them ] reveals much about my generation. The original source of the blog is as follows - http://reece.liberty.me/2015/03/09/25-statist-propaganda-phrases-and-how-to-rebut-them/ . The phrases listed are generally applicable in regard to today’s society. However, three seem to be especially relevant in demonstrating the difference between my generation (the Baby Boomer generation) and that of my Dad.

The first on my list is the concept of the “free world.’ This has been sold to my generation as a consequence of fighting the Russians and the “iron curtain all through the “cold war.” We needed “rulers” to protect us from the Russian “bear.” We were incapable of making our own decisions, despite advocating “freedom for all” in our youth.

5. “The leader of the free world”

“The free world” does not exist; each individual person exists. Again, we are speaking of rulers rather than all types of leaders. Free people do not have rulers; they rule themselves.

However, as my Dad’s generation knew, “free people do not have rulers, they rule themselves”. Dad’s generation understood the idea of ruling themselves. They kept themselves far less ruled than my generation has. President Eisenhower was correct when he warned of the “military-industrial” complex, for which a requirement is a ruling class..

Dad was a decorated war hero in World War II. However, he had very little choice when he entered the service in 1942. The compulsory draft was instituted late in 1940.

“Congress passed the Selective Training and Service Act (September 16, 1940), creating the country's first peacetime military conscription program. Conscription in America is commonly referred to as the draft. The initial act authorized the conscription of men, but placed a limit of 0.9 million on the number to be trained. The period of service was set at 12 months.” – Source: http://histclo.com/essay/war/ww2/cou/us/aod/draft/aod-draft.html

Dad was caught by this legislation and before his conscription term was up, the attack on Pearl Harbor occurred and war was declared. His and millions of other Americans had their lives interrupted and changed. He had a job lined up at a tin mine in Chile and was preparing to embark on a career in mining.

The next phrase in the statists list of 25 (number 8) is applicable to Dad’s generation as well as mine. It applies to World War II and all “wars” afterward.

8. “Our military”

If the military is “ours,” then “we” should be able to exercise exclusive control over it. But “we” neither command the military nor have the freedom to destroy it. Thus it is not “ours”; it is a tool of the ruling classes used to make it very difficult for citizens to violently overthrow the government, provide a last line of defense for the state in the form of martial law should the citizens succeed in violently overthrowing the government, and present a deterrent to other rulers elsewhere in the world who might seek to take over the state and capture the tax base for themselves.

Despite his valiant and decorated service, Dad always maintained that he had nothing against the Japanese people that he fought against. In his opinion, World War II was “Roosevelt’s war.”

When they returned from the War, Dad’s generation started where they left off. Many were able to go to college, which was a “government financed” program. Prior to the war, “higher education” was expensive. Dad got his degree prior to the war, primarily because of his sports prowess.

Anyway, after the war generation received access to college and higher education, they “got to work” and built a country like none the world has seen. They were both innovative and industrious, and realized education was a tool to be used to benefit themselves and others. They wanted to create a better world for all people.

In contrast to Dad’s generation, my generation started its youth with unprecedented wealth. We became very politically and socially active. “Drugs, Sex and Rock and Roll” was the governing phrase. We wanted “freedom.”

Our activism stemmed in large part from the Vietnam War, which like World War II and the Korean War, reflects phrase #8 of the statist list above. Because of the “draft,” many young men ended up fighting an “enemy” which they neither knew nor had any animosity against. Certainly, the country of Vietnam was not a military threat against the United States or its “national security” in any way.

While some actions may require a government, those actions first require the voluntary consent of the majority of the people in a “free” society. Dad and my Granddad’s generation were aware of this and held their “rulers” far more accountable than rulers are today. In addition, the rulers themselves, being of that generation, took their responsibility and trust much more seriously than they do today.

19 “Government is necessary”

This is a positive claim which carries a burden of proof. By itself, this is a claim asserted without logic or evidence and may therefore be dismissed without logic or evidence.

However, after the war in Vietnam winded down, my generation settled in to a life of comfort and excess, and it shows. Technology was advancing rapidly and we were taking advantage of it.

The political activism and desire to “change the world” embraced by my generation in their youth morphed into almost complete chaos politically because we did not have the will to follow through or the character to effect the changes. My generation lost their will and desire to do the things necessary to create the change we professed to believe in because of the lure of excess. Instead of taking responsibility and ruling, we allowed ourselves to be ruled.

As a result, absolute greed has essentially taken over most of our global societies and political structures. We continue to follow and embrace that same pattern. If you doubt it, just look at our political parties (those with an “R” or “D” behind their names). Those people don’t represent me, and if you really analyze it, they don’t represent 99% of Americans, either morally, financially or ethically. Sadly, they represent the highest level of a society in a life of extreme power, comfort and excess.

So what about the generation to come; that of my son William and my daughter Laura? They seem to be very practical and much more grounded than my own generation. I see in them many of the traits of my Dad’s generation.

While it is true, many of them are interested in using the current technology and seem to be immersed in it. That is to be expected because they have grown up with it and it comes very natural to them.

For example, I watched my son and daughter-in-law research the real estate market while buying a home recently. The following MSN quote describes their approach to the complexities of this business.

“Younger buyers want to know what to expect and when. “I see them wanting to understand what’s going on at any time in the process more than any other generation,” says Paul Reid, a Redfin agent in Southern California’s Inland Empire region.” - http://www.msn.com/en-us/money/moneyinyour20s/10-ways-millennials-are-changing-homebuying/ss-AA9yDra#image=4

“Millennials expect to be partners in the home search, and they want quick answers to questions. “They want information, and they want valid information, and they want it right now,” Reid says. “They’re the generation of Google at your fingertips.””

“Many millennial homebuyers get recommendations on agents from their parents, but they also do some research online before they ever call an agent. They want to see testimonials on an agent’s website, as well as read online reviews.”

They make use of the technology developed by my generation. But they also have a natural curiosity about the world around them which my generation, in general, didn’t seem to have.

They tend to value real education, not necessarily that which is taught at today’s universities. Many are more interested in vocational training than “higher education,” (which today comes at an extreme cost).

They also seem to be naturally curious about the world around them, and as noted above don’t take many of the “statist propaganda phrases” as truth, like my generation has. In fact, my generation seems to have fostered, if not invented, many of those phrases as they sank into excess. They do not take the utterances of someone with an “R” or “D” behind their name as truth just because their parents belong to the “R” or “D” party.

After watching my children, their spouses and some of their friends, I am positive about the future. In many ways, they remind me of Dad and his generation. I am hopeful that they will follow in the footsteps of their grandparents and reinvent the phrase “greatest generation.”

Sincerely,

H. Court Young
Author, publisher, speaker and geologist
Promoting awareness through the written word
Research, freelance writing & self publishing services
Facebook: HCourtYoung
Phone: 303-726-8320
Email: tmcco@msn.com
Twitter: http://twitter.com/hcourtyoung

Wednesday, March 11, 2015

Microsoft’s Cortana Going Big Time

 

I am one of the 2.8 million “Windows Insiders” testing and using Microsoft’s new Windows 10 operating system on my three laptops. Two of them are Microsoft’s Surface tablet/laptop machines and one is an older Lenovo. The following quote is from the web site WinBeta.org.

“The Windows Insider project has proven to be something of an unmitigated success story for Microsoft. As announced during the Mobile World Congress (MWC) there are now over 2.8 million Windows Insiders across the world, and from this number over 900,000 pieces of feedback have been received. “

One of the major new features of this operating system is “Cortana”. This feature is also on the Lumia Denim version of Windows Phone operating system.

Just like the article “Considering Cortana” by Scott Bekker in the March 2015 issue of Channel Watch magazine, I think Cortana is going to revolutionize the technology world. She is going to be big.

Scott notes in his article:

“The spunky personal digital assistant from Microsoft, Cortana, is about to hit the big time. … The global desktop platform takes Cortana beyond me-too status into groundbreaking UI [universal intelligence] territory.”

Wikipedia defines Cortana as:

Microsoft Cortana is an intelligent personal assistant developed by Microsoft for Windows Phone 8.1,[2] Microsoft Band,[3][4] and Windows 10.[5]

It is named after Cortana, an artificial intelligence character in Microsoft's Halo video game series, with Jen Taylor, the character's voice actress, returning to voice the personal assistant's US-specific version.[6]

Microsoft describes Cortana as:

“Cortana is your personal assistant on your Windows Phone [and PC, Tablet]. She's there to help make things easier for you and keep you up to date on the things that matter to you.

Whether it’s to keep you looped in with your world or help you manage your everyday life, Cortana is there for you.”

“Check out these topics for more info about Cortana and the ways she can help.”

See the following links: http://www.windowsphone.com/en-US/how-to/wp8/cortana/meet-cortana

In addition Microsoft blog notes the following about Cortana in the new Windows 10 operating system for the desktop and tablet computers.

“Cortana started in April of 2012 as part of early thinking about what the future of search should be on mobile phones. We saw an emerging set of trends around the personalization of your experience due to the sheer amount of things your phone knows about you – your location, the people you communicate with most, your favorite apps/services, etc. We thought this was a bigger idea than just mobile, and this capability should be available across all of our devices – from mouse and keyboard, to touch – and that it should utilize what we knew about patterns and anticipate and meet those needs. We didn’t want to build one digital assistant for everybody, we wanted to build one digital assistant for you. Cortana learns you, knows you, and respects you.” http://blogs.windows.com/bloggingwindows/2015/02/10/how-cortana-comes-to-life-in-windows-10/

There are several other competitors in the market place. The largest in SIRI by Apple Computer. However, given the base of Windows machines installed and used by businesses worldwide, I think that Cortana will be far more prevalent than competitors on tablets/desktops when Windows 10 is released to the general public. It will probably be on Windows Server 10, Azure Server and other enterprise level systems as well.

Some ways Cortana on the Windows phone can be used are noted by Scott in his article.

“In the car with Bluetooth, Cortana is incredibly useful. I regularly task the phone through Cortana to simultaneously run GPS directions and play music and Cortana handles incoming phone calls and texts with hands-free aplomb.

The ability to create appointments is handy for work, and Cortana does a good job with things like noticing airline confirmation e-mails and tracking flights in the background.”

clip_image002I am finding Cortana on my Windows 10 operating system to be an easier way to search than opening the Internet Explorer browser and using Bing.com. The results are the same but the interface is simpler.

This change is especially true if you use the voice activated “Hey Cortana” feature. It takes a bit of getting used to but once used it is hard not to have it (for example when I use a non-Windows 10 machine).

When using this new technology, I think back to the incredible things which were accomplished using much less computing power. One example was the moon landings in the late 1960’s. Another was the Journey and landing on the asteroid EROS. EROS Adventure, Journey to an Asteroid is an EPub which includes over three hundred photos that show just how incredible that accomplishment was. Imagine how much more could have been accomplished using technology such as Cortana, had it been available on these missions.

The rapid increase in the development of software and hardware technology is truly mind boggling. Now we have the new Microsoft Surface Hub and Microsoft Hololens. These and other technologies, such as Cortana, will revolutionize our world. I look at this rapid advance in technology from different perspectives in my EPub entitled World Collapse or New Eden, 101 Expert Predictions about Your World and Where They are Today.

However, we do need to have a discussion about jobs, employment and education going forward into this new world. If technology continues to advance as quickly as it is today, we desperately need to redefine what our educational systems, employment systems and global society is going to look like. It seems that many of our top corporate and political leaders resist the call for such a discussion. It is, however, very clear, that educational and employment systems designed for the 18th, 19th and 20th centuries will not work in the 21st century, with such advanced technology.

It is extremely apparent to me that Cortana and software technology like “her” are going to continue to fascinate and amaze us. As both hardware and software continues to evolve in such fields as medicine, communications, computers, transportation and robotics, we need to change the way we think about how we interact with technology and what our role in a global society will be. We have a very bright future ahead from a technology standpoint, and as Bill Gates talks about in his November 1995 book, we need to look at and discuss the road ahead.

As millions of computers and tablets convert to Windows 10, which includes Cortana, I have no doubt that most users will have my experience with the software. It is very useful and will become a large part of our life. I agree with Scott, Cortana is going to be big.

Sincerely,

H. Court Young
Author, publisher, speaker and geologist
Promoting awareness through the written word
Research, freelance writing & self publishing services
Facebook: HCourtYoung
Phone: 303-726-8320
Email: tmcco@msn.com
Twitter: http://twitter.com/hcourtyoung

Friday, March 6, 2015

American Exceptionalism, Reflections of the Past or Today’s Reality?

 

As we enter what would have been Dad's 98th year, and I continue to write about our lives together, I wonder about the concept of American Exceptionalism. This term is “bantered about” by all of those with an ‘R’ or ‘D’ behind their name, especially in election years.

In this age of exceptional greed, is it still possible to have an exceptional culture? What does that really mean or look like?

First, we must define the term. Wikipedia notes the following:

“American exceptionalism is the theory that the United States is qualitatively different from other nations.[2] In this view, U.S. exceptionalism stems from its emergence from the American Revolution, thereby becoming what political scientist Seymour Martin Lipset called "the first new nation"[3] and developing a uniquely American ideology, "Americanism", based on liberty, egalitarianism, individualism, republicanism, democracy and laissez-faire. This ideology itself is often referred to as "American exceptionalism."[4]

“Although the term does not necessarily imply superiority, many neoconservative and other American conservative writers have promoted its use in that sense.[4][5] To them, the U.S. is like the biblical "City upon a Hill"—a phrase evoked by British colonists to North America as early as 1630—and exempt from historical forces that have affected other countries.[6]

I believe most in America today would, if not explicitly, then implicitly use the “neoconservative” approach of superiority of the American culture and race. However, to Dad’s generation it meant something far different. While they may have expressed it in “neoconservative” terms, that is not what it meant to them.

In my book entitled, The Orphan Boy, A Love Affair with Mining, I note the following about a man who demonstrated true American Exceptionalism:

“One September afternoon I sat on the dump of a small mine in Colorado with a unique man, my dad, Herbert T. Young. Even at 12,000 feet, the sun was bright and warm, and the sky was so very blue. Below, the aspen leaves were just starting to turn gold, and there was a hint of fall in the air.

We had talked on the way up the rocky, steep road about the mines and the history of the area, as we often did. I never got tired of the many stories Dad told about his experiences and information he gathered in researching the mining district.

Arriving at the Orphan Boy mine, we sat down and had a cup of coffee from Dad’s ever present thermos. Even though I had previously heard many of his stories about this mine that started his love affair with mining, they seemed much more real as I sat with him in that remote and peaceful basin.

My eyes were drawn to the rugged splendor of the high peaks; Brittle Silver Mountain, Grizzly Peak, Revenue Mountain... Along the horizon were Gray’s and Torrey’s, two of Colorado’s fourteeners. The air was so clean I felt like I could almost reach out and touch the peaks across the Warden Gulch basin. Morgan Peak, behind me, and Santa Fe Peak to the south looked so close it seemed like I could hike to them in just a few minutes.

Everywhere I looked were evidences of the mining and prospecting that went on in a different time. I noticed the reddish brown and yellow gossans that streaked the mountain slopes in several places. All the while, this remote valley was very quiet, almost as if our thoughts themselves interrupted the solitude. This scene stirred something in my soul that words cannot begin to explain.

I thought of Dad and the many experiences he related to me. I noticed he was also scanning the mountains, deep in thought. He turned and smiled at me, with his brown eyes shining. I knew we were thinking, feeling and experiencing the same closeness to God in that moment.”

The feeling of kinship I experienced while sitting on that mine dump were similar to the feelings I had during the times Dad and I worked underground together. Working underground brings a special sense of closeness where everyone looks after one another. Even with 30 years difference in our ages, we were kindred souls.

A good example honoring others as you would yourself is as follows. This is a passage in my upcoming book, Light at the End of the Tunnel, about my Dad and our relationship:

“When mining at the Orphan Boy Mine, a story told in my book entitled Orphan Boy, A Love Affair with Mining, Dad offered his partners a ‘buy-sell’ agreement. He fully intended to buy them out and continue mining the Orphan Boy Mine.

Had Dad not offered his partners a ‘buy-sell’ agreement, not realizing they had the funds to buy him out, which he honored and was subsequently was bought out, things might have been different. This [Defense Minerals Exploration Administration (DMEA)] grant would have given the money to do the exploration at the Orphan Boy which Dad planned and always wanted to do and probably would have found the mineral that Dad always thought was there.”

Unknown to Dad, during the summer of 1952, his elderly partner, Fred Brooks, stated to the DMEA office staff that because the DMEA grant had been approved, his nephew had bought out Mr. Young’s interest and was attempting to buy out Mr. Schoonover (the third partner in the Orphan Boy Mine).

This grant was awarded before Dad was aware of it, and it was these funds that was used to pay back Mr. Brook’s nephew. Dad could have fought the buy-sell agreement, which could have been financially beneficial. This would have been the “neocon” approach. But Dad had given his word and made an agreement (which he signed), which he honored regardless of cost to him.

There are many other instances of this sacrificial type behavior throughout Dad’s life. He truly believed in “doing unto others as you would like them to do to you.” He loved people and it showed. He got a lot of joy in helping others and gave much of himself. He got a lot out of life and friendships.

I worked with Dad during the summers and after college graduation until his death and had the fortune to experience firsthand why his generation was named the “greatest generation.” He was typical of the World War II generation whose lives were interrupted by that war. When they came back home, they changed both America and the world in a special way.

Two other people in my life show this quality of “American Exceptionalism,” my son, William and my daughter Laura. They both are very talented, but deeper than that, they have the same gentile, quiet spirit that my Dad had. They both care about others and give much, but they get much from life as well.

As I note in Light at the End of the Tunnel:

“Years later, eating lunch as I sit on the dump [of the Orphan Boy mine] with my son, William, and my daughter, Laura, the memory that comes back most often is a sunny afternoon with Dad. I think of Dad and the many experiences he related to me. As I watch and listen to my children, I see in them the same fascination with life my Dad had. They look from one high peak to another with shining eyes and a sense of wonder that I saw so many years before in my Dad. These are gifts passed from one generation to another.”

I have met some of that generation (the 30 something’s) through William and Laura. I like what I see. They seem to be very practical and much more like the generation of their grandparents than my generation is.

My generation, from whom the current crop of “leaders,” corporate and political, come from, in general, doesn’t reflect the exceptionalism they are so fond of talking about. Our society is clearly a reflection of their views and qualities. In my opinion, very few show the same measure of exceptionalism of their parents.

It is for this reason I am writing about Dad, and our relationship. I want to touch the lives of others through writing which is why I attempt to “promote awareness through the written word.” It is also why I wrote my EPub, “The Art of Writing an EBook, How to Enrich Yourself and Others”.

All people have stories to tell. You have no idea the number of people who tell me that writing is “too hard” or “I don’t know where to start.” My EPub entitled “The Art of Writing an EBook, How to Enrich Yourself and Others,” can help with the “I don’t know where to start” challenge. I encourage you, my reader, to take a look at this EPub. If you have any desire to put your story into print, it is a resource which will help with many common writing challenges.

I had a mentor, best friend and Dad who demonstrated true “American Exceptionalism.” I see the same qualities in those of the generation of my children.

So, it seems that American Exceptionalism is alive and well in today’s world. It is not what those with an ‘R’ or ‘D’ behind their name term it or understand it to be. It is especially not what the “neocons,” corporate leaders or mainstream media (MSM) tell you it is. It is also not just an “American” trait, but is universal among people who truly love and value others as themselves.

American Exceptionalism is the quality of self-sacrifice and love of the other person that was demonstrated so well by my Dad’s generation and that is budding in the generation of their grandchildren. It is both a reflection of the past and a reality in today’s younger generation.

Sincerely,

H. Court Young
Author, publisher, speaker and geologist
Promoting awareness through the written word
Research, freelance writing & self-publishing services
Facebook: HCourtYoung
Phone: 303-726-8320

Email: tmcco@msn.com

Twitter: http://twitter.com/hcourtyoung

As a tribute to my Dad’s 98th year, I am offering a promotional discount of about 17% off on the EPub version of my book The Orphan Boy, A Love Affair with Mining. Visit Amazon.com by clicking of the link and check for this discount.

Monday, March 2, 2015

Lenovo, Cyberattacks and the Global Economy

The recent news about Lenovo Computer adding "Superfish" software (aka Adware) to its computers last fall (2014) inspired me to think about our global economy and computer infrastructure. How threatened is our way of life by these events and the increasing complexity of our world?

Lenovo installed Superfish which directed specific ads to be displayed on the affected computer based on the user's choices in web page viewing. Programs like Super Fish are called "ad-ware", short for advertising software, more affectionately termed "bloat ware" or "crapware."

Advertising software, or advertising supported software, is defined, by Wikipedia, as "any software package which automatically renders advertisements in order to generate revenue for its author." Newer adware is designed to analyze which internet sites the user visits and presents advertising "pertinent to the types of goods or services featured there", according to Wikipedia.

Below is a non-inclusive list of applications that bundle toolbars or unwanted add-ons with their installer (source Wikipedia).
  • •Absolute Uninstaller - Ask toolbar
  • •Ad-Aware - Google Chrome
  • •Adobe Flash Player - Google toolbar
  • •AnVir Task Manager Free - Dealio toolbar
  • •Any Video Converter – Google Chrome
  • •AOL Instant Messenger - AOL toolbar
  • •avast! Free Antivirus - OpenCandy
  • •AVG Free - Yahoo toolbar
  • •AVG LinkScanner - Yahoo toolbar
  • •BitComet - Google toolbar
  • •BitTorrent - Ask toolbar
  • •BS.Player - BS.ControlBar
  • •Burn4free - 1Click DVD Copy Pro
  • •BurnAware Free - ASK toolbar
  • •CCleaner - Yahoo toolbar
  • •CDBurnerXP - OpenCandy
  • •ClamWin - Ask toolbar
  • •COMODO Internet Security - ASK toolbar
  • •Core Temp - Search Enhancement
  • •CPU-Z - ASK toolbar
  • •CrystalDiskInfo - OpenCandy
  • •CrystalDiskMark - OpenCandy
  • •CSmenu - Ask toolbar
  • •CutePDF Writer - ASK toolbar
  • •DarkWave Studio - OpenCandy
  • •Defraggler - Google toolbar
  • •Devpad - Babylon toolbar
  • •Dexpot - OpenCandy
  • •Driver Sweeper - Open Candy
  • •ExtractNow - Registry Reviver
  • •FlashGet - Google toolbar
  • •FLVPlayer4Free - Video Download toolbar
  • •Fotosizer - Dealio toolbar
  • •Foxit Reader - Ask toolbar
  • •Free Process Freezer - FLV Direct Player
  • •FreeCommander - eBay shortcuts
  • •Freemake Audio Converter, Video Converter, Video Downloader - Facemoods toolbar
  • •Glary Utilities - Ask toolbar
  • •Gom Player - ASK toolbar
  • •HWMonitor - ASK toolbar
  • •ICQ - ICQ toolbar
  • •IE7Pro - Grab Pro toolbar
  • •Image Tuner - ASK toolbar
  • •ImgBurn - ASK toolbar
  • •Immunet - Ask toolbar
  • •IObit SmartDefrag - IObit toolbar
  • •IObit Advanced SystemCare - Yahoo toolbar
  • •IrfanView - Google toolbar
  • •ISO Workshop - ASK toolbar
  • •IZArc - Registry Booster
  • •MediaCoder - Nitro PDF Reader
  • •MediaInfo - OpenCandy
  • •Miro - Ask toolbar
  • •Moo0 Software - Autocomplete Pro
  • •µTorrent - µTorrent toolbar
  • •Nero Free - ASK toolbar
  • •Orbit Downloader - Grab Pro
  • •PC Tools Spyware Doctor - Google Toolbar
  • •PC Tools Firewall Plus - Google Toolbar and Threatfire
  • •PC Tools ThreatFire - Google Toolbar
  • •PC Wizard - ASK toolbar
  • •PDFCreator - Yahoo toolbar
  • •PDF-XChange Viewer - ASK toolbar
  • •Photobie - OpenCandy
  • •PhotoFiltre - ASK toolbar
  • •PicPick - Bing toolbar
  • •Quick StartUp - ASK toolbar
  • •Quicksys RegDefrag - ASK toolbar
  • •RapidTyping - Bing toolbar
  • •RarZilla Free Unrar - ASK toolbar
  • •Recuva - Yahoo toolbar
  • •Registry Repair - ASK toolbar
  • •Satellite Antenna Alignment - Relevant Knowledge
  • •SIW - Crawler toolbar
  • •Skype - Google toolbar
  • •Spider Player - Bing toolbar
  • •Spyware Terminator - Web Security Guard
  • •SUMo - Facemoods, Autocomplete Pro
  • •SUPER - OpenCandy
  • •Sweet Home 3D - Open Candy
  • •Trillian - Ask toolbar
  • •Tweak Me! - Nitro PDF Reader
  • •Unlocker - Bing toolbar
  • •USB Guardian - BestSecurityTips toolbar
  • •µTorrent - Bing toolbar
  • •Vista Codec Package - Bing toolbar
  • •WebShot - OpenCandy
  • •Win7codecs - Bing toolbar
  • •Winamp - Winamp toolbar
  • •Windows 7 Codec Pack - Dealio toolbar
  • •Windows Essentials Codec Pack - Babylon toolbar
  • •WinSCP - OpenCandy
  • •XP Smoker - Bing toolbar
So what is the problem with this and why did Lenovo allow this to happen? After all, it potentially violates the "Defense in Depth" strategy for protecting computer systems (shown in the above diagram – courtesy of Microsoft).

The problem with it is twofold. To examine the first problem we need to look at the five stages of a cyberattack. According to an article entitled "Understanding What Happens in A Cyberattack," Processor magazine, February 6, 2015:
"Although no attacker sits down and thinks "now I'm in phase one," says Daniel Kennedy, research director at 4551 Research, there are general phases or steps of attack that explain how a cybercriminal penetrates a system. The first step includes "reconnaissance, learning about the target system, [and identifying] potential targets for social engineering." In step two, attackers scan, determine, or probe the system for vulnerabilities. Step three involves gaining access via one or more of those vulnerabilities. Step four is about maintaining access, which can involve "closing the initial vulnerability used and installing a backdoor, or pivoting off of an initially gained access to further gain access to more sensitive downstream systems." Step five focuses on destroying evidence of the intrusion and covering tracks."
Mr. Kennedy notes that "some common methods of attack include exploiting weakness via web applications, administrative systems, brute forcing credentials, phishing for access credentials, malware, RAM scrapers, key loggers and root kits." Threats may be internally or externally instigated. While internal threats are typically the most effective and the most difficult to detect, external threats are becoming increasingly sophisticated.

According to James Bickley, director of disputes and investigations, Navigant Consulting (Processor magazine, February 6, 2015), "a cybercriminal "might leave multiple pieces of malware in an enterprise once access is obtained and have some of it remain dormant to fool the enterprise into believing the network is secure."
"Attackers may also leave behind a 'toolkit,' Bickley says, 'to actually write malware inside the enterprise.' This is particularly difficult to locate he adds, because it didn't exist to be detected prior to breaching the system."
So what does this have to do with the recent Lenovo Superfish incident? There are two problems with this incident.

The first problem is that Superfish creates a "potential security hole." This program reaches outside the network conveying information about the user to the web. While this might or might not be directly exploitable by a cybercriminal, the hole is still there.

The second problem is more insidious. It turns out that the Root Certificates for the Superfish program were written by a firm named Komodia.
"Barak Weichselbaum founded Komodia, Inc. in 2000, following his military service as a programmer in the IDF's Intelligence Core. A custom solution provider to customers worldwide, Komodia first released its open source TCP/IP library in 2001. Through numerous projects in the past ten years, the company has found a niche in multiple areas of programming with one common theme: scarce documentation and a lack of experts. Today the company is focused on marketing its flagship product:"
Some interesting facts about Komodia include:
"Komodia's Redirector allows you to change TCP/IP network sessions with a few simple clicks. The platform intercepts traffic on the local machine based on rules that you define, and it includes many built in functions that you can use without writing a single line of code (if you need a solution that only sniffs the network traffic without modifying it, visit Komodia' s Interceptor web page)."
These root certificates are defined as:
"In cryptography and computer security, a root certificate is an unsigned public key certificate, or a self-signed certificate, and is part of a public key infrastructure scheme. The most common commercial variety is based on the ISO X.509 standard. Normally an X.509 certificate includes a digital signature from a certificate authority (CA) which vouches for correctness of the data contained in a certificate."
"Root certificates are implicitly trusted. They are included with many software applications. The best known is Web browsers; they are used for SSL / TLS secure connections. However this implies that you trust your browser's publisher to include correct root certificates, and in turn the certificate authorities it trusts, and anyone to whom the CA may have issued a certificate-issuing-certificate, to faithfully authenticate the users of all their certificates. This (transitive) trust in a root certificate is merely assumed in the usual case, there being no way in practice to better ground it, but is integral to the X.509 certificate chain model." – [source: http://en.wikipedia.org/wiki/Certificate_authority]
The following information presented on ArsTechnica website presents a good idea of the depth of the problem (From: http://arstechnica.com/security/2015/02/ssl-busting-code-that-threatened-lenovo-users-found-in-a-dozen-more-apps/).

SSL-busting code that threatened Lenovo users found in a dozen more apps
"What all these applications have in common is that they make people less secure."
A browser's root certificate helps encode communications back and forth with a secure web site, such as a bank or email service, so that messages can't be read by anyone else. The problem was that the replacement certificate from Superfish could be easily cracked by hackers, who could then pose as the secure web site and steal a user's passwords or other sensitive data.
A security researcher who goes by the Twitter handle @TheWack0lian said an additional piece of software known as SecureTeen also installed Komodia-enabled certificates. Over the weekend, the researcher also published findings documenting rootkit technology in Komodia code that allows it to remain hidden from key operating system functions.
Web searches for many of these titles uncover forum posts in which computer users complain that some of these applications are hard to remove once they're installed. Richard noted that he was unable to find documentation from any of the publishers explaining what effect Komodia software had on end-user PCs such as its ability to sniff passwords and other sensitive data from encrypted Web sessions.
The vulnerability was considered so serious that the Homeland Security Department's Computer Emergency Readiness Team issued an alert, as well, with additional advice for detecting and removing Superfish. Microsoft (MSFT) also got into the act and added Superfish removal to its Windows Defender antivirus app.
Over the weekend, researchers at Facebook (FB) reviewed data from the millions of browsers that contact the company's web site and found similarly weakened root certificates installed by other apps, not just Superfish. The culprits were a mixed bag of games, adware and other apps of unknown purpose. Eventually, antivirus programs should be updated to eliminate these weakened root certificates and restore browsers' proper certificates.
When the world's number one computer manufacturer and distributor sells computers with built-in security holes, this potentially bypasses step one and potentially step two of the cyberattack process. Cybercriminals can immediately work on gaining access to via identified vulnerabilities.

Of the 315 million computers sold worldwide in 2014 (Source: wikopedia.com), Lenovo sold about 18%. This would amount to about 50 million for the year and an estimated 10 million during this period (Q4). While not all of the Lenovo line of computers included this potentially harmful software, enough did to create a stir among the security and computer blogs that I follow.
"Consolidated sales for Lenovo's laptop PC business worldwide in the fourth fiscal quarter increased 16 percent year-over-year to US$4.8 billion, accounting for 51 percent of the Company's overall sales. During the same period, Lenovo's worldwide laptop PC shipments increased 12.9 percent, against the backdrop of an overall industry decrease of 5.8 percent." Source: http://news.lenovo.com/article_display.cfm?article_id=1795
I have three Lenovo laptop computers, all of which are used in our network. They work very well and none of them have presented any problem. I must say that I am dismayed at this action by a company that makes such a fine product.

Now that you understand some of the problems with "adware", the number of computers impacted as well as having an idea about the methodology of cyberattacks, we can explore the implications on our global society. As noted before, one of the basic principles of computer and network security is defense-in-depth. One of the immediate global implications is the potential security hole threatens not just the computer with the adware, but possibly any computer connected to it.

There is clearly a fight for global growth and increasing sales revenue in an exceedingly competitive technology market. All of the major computer manufacturers, such as Dell, Apple and Lenovo, are locked into a struggle to increase market share. Profits per computer sold are falling significantly due to extreme competition between chip and other component manufacturers.

It is for that reason, companies like Lenovo might, and apparently did, consider installing such software. They reportedly increased their revenue by a few dollars per machine, paid by the software developer, for the installation. Needless to say, the software developer was able to get its software in front of a large number of computer users (even if it was undetectable), for which advertisers probably paid large fees. While, as noted earlier, this "adware" or "bloat ware" is common in the industry, users don't particularly like it. It tends to slow computers down and is commonly accepted as the price to pay for "inexpensive computers."

This case, however, pointed out the extreme vulnerability with this model. If it had only been the adware, Lenovo might have had a few disgruntled customers. However, because of Komadia's involvement, the problem became far more sinister. As noted earlier, Komadia's use of easily hackable passwords for their certificates for the Superfish adware opened up a large security hole in the system. It also demonstrated the vulnerability of using external code, over which you may have no control or even knowledge of the depth of the potential problem. What Lenovo thought would be an innocuous piece of software, for which it could increase its bottom line, clearly backfired.

It seems that the needs of the top executives, board of directors and shareholders trumped the needs of the customers. This seems to be occurring more and more in a world dominated by "mega" corporations such as Lenovo, Verizon, ATT and Apple. It seems that there has been a change in the way business is conducted. Business ethics have been corrupted by corporate and political greed on a massive scale.

My EPub "World Collapse or New Eden" presents a look at some of the changes in business ethics from 2008 to today. There was a time when the majority of businesses could balance these aspects of commerce in a reasonable manner. Certainly, some large corporations are better than others on the scale of ethics. However, in my opinion, the majority of them are in lock step with our political system and are sliding seriously toward the negative end of the spectrum. This does not bode well for the global economy.

Technology presents great hope for a bright future. New advances in technology will advance medicine, communications, resource development, food production and the exploration of space to name a few. My EPub EROS, Journey to an Asteroid
shows the promise of technology and what can be accomplished with technology.


However, these advances in technology have to be coupled with wisdom, vision and ethics [i.e. morality]. I remember the small town shopkeepers of my Dad's and granddads generation. While they wanted to make a "profit" and a "good living", they were also part of a community. These "mom and pop" stores valued the "sale" but they valued their customers and the relationship they had with them even more. Their business was less of a revenue generation model and more of a service model. Unless we get back to the service approach to business and business ethics, the promise of technology will be available and affordable only to those who have the resources [i.e. the "top 1%"].

Sincerely,

H. Court Young
Author, publisher, speaker and geologist
Promoting awareness through the written word
Research, freelance writing & self-publishing services
Facebook: HCourtYoung
Phone: 303-726-8320

Email: tmcco@msn.com

Twitter: http://twitter.com/hcourtyoung