The Grill: Privacy is a thing of the past, says private investigator
Private eye Steven Rambam explains what he does, how he knows everything about you and why he's not the one you should be worried about.
Computerworld - In his 25 years in business, Steven Rambam has worked on some high-profile cases, including tracking down Nazi war criminals in Canada. He also owns PallTech, an investigative database service with more than 25 billion records on U.S. citizens and businesses.
What do you do as a private investigator?
We are not the traditional Rockford or Magnum, P.I. type of investigator. We'll do very difficult missing persons cases, a lot of sophisticated financial fraud work, a lot of insurance company work, a lot of disappearances.
What's in your PallTech databases?
We have pretty much every American's name, address, date of birth, Social Security number, telephone number, personal relationships, businesses, motor vehicles, driver's licenses, bankruptcies, liens, judgments -- I could go on and on.
Who has access to your data?
This is a database that's restricted to law enforcement, private investigators, security directors of companies and people who have a genuine need.
How do you safeguard it?
The most restrictive rule is my own personal ethics. In 20 years, we haven't had a single lawsuit or complaint.
What has changed in the past few decades?
Two things. The first is computing power. I have in my office storage and databases and artificial intelligence scripts and behind-the-scenes links that are far more powerful and comprehensive than J. Edgar Hoover's wildest dreams.
The other thing is the mind-boggling level of self-contributed data. The average person now willingly puts on the Internet personal information about himself that 20 years ago people would hire an investigator to try and get. It's extraordinary. If you know how to use the Internet, 75% of an investigation can be conducted sitting in your pajamas.
Do you see this as a bad thing?
On the contrary, there are good reasons for most of this to be out there. It's not out there because these are nefarious, evil people trying to be the new Big Brother. It's because this is truly a new engine of capitalism. Where it gets a little creepy is when they aggregate all of this data together and have an extraordinary profile of you.
How can businesses protect their intellectual capital, particularly when it's in electronic form?
You can have five firewalls in a safe room with the most current locks monitored by 24/7 motion-detecting, IP-addressable cameras, and all of that is meaningless if a 16-year-old kid can social-engineer a root password out of you. The downside to all of this publicly available information is that it's now a lot easier to social-engineer somebody.
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts