The Grill: Privacy is a thing of the past, says private investigator
Private eye Steven Rambam explains what he does, how he knows everything about you and why he's not the one you should be worried about.
Computerworld - In his 25 years in business, Steven Rambam has worked on some high-profile cases, including tracking down Nazi war criminals in Canada. He also owns PallTech, an investigative database service with more than 25 billion records on U.S. citizens and businesses.
What do you do as a private investigator?
We are not the traditional Rockford or Magnum, P.I. type of investigator. We'll do very difficult missing persons cases, a lot of sophisticated financial fraud work, a lot of insurance company work, a lot of disappearances.
What's in your PallTech databases?
We have pretty much every American's name, address, date of birth, Social Security number, telephone number, personal relationships, businesses, motor vehicles, driver's licenses, bankruptcies, liens, judgments -- I could go on and on.
Who has access to your data?
This is a database that's restricted to law enforcement, private investigators, security directors of companies and people who have a genuine need.
How do you safeguard it?
The most restrictive rule is my own personal ethics. In 20 years, we haven't had a single lawsuit or complaint.
What has changed in the past few decades?
Two things. The first is computing power. I have in my office storage and databases and artificial intelligence scripts and behind-the-scenes links that are far more powerful and comprehensive than J. Edgar Hoover's wildest dreams.
The other thing is the mind-boggling level of self-contributed data. The average person now willingly puts on the Internet personal information about himself that 20 years ago people would hire an investigator to try and get. It's extraordinary. If you know how to use the Internet, 75% of an investigation can be conducted sitting in your pajamas.
Do you see this as a bad thing?
On the contrary, there are good reasons for most of this to be out there. It's not out there because these are nefarious, evil people trying to be the new Big Brother. It's because this is truly a new engine of capitalism. Where it gets a little creepy is when they aggregate all of this data together and have an extraordinary profile of you.
How can businesses protect their intellectual capital, particularly when it's in electronic form?
You can have five firewalls in a safe room with the most current locks monitored by 24/7 motion-detecting, IP-addressable cameras, and all of that is meaningless if a 16-year-old kid can social-engineer a root password out of you. The downside to all of this publicly available information is that it's now a lot easier to social-engineer somebody.
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts