{"id":540,"date":"2012-03-19T04:44:23","date_gmt":"2012-03-19T11:44:23","guid":{"rendered":"http:\/\/thelawlers.com\/Blognosticator\/?p=540"},"modified":"2012-03-19T04:45:27","modified_gmt":"2012-03-19T11:45:27","slug":"andrew-jackson-was-here-taga-2012","status":"publish","type":"post","link":"https:\/\/thelawlers.com\/Blognosticator\/?p=540","title":{"rendered":"Steve Simske keynote \u2013 TAGA 2012"},"content":{"rendered":"<p><a href=\"https:\/\/thelawlers.com\/Blognosticator\/wp-content\/uploads\/2011\/07\/Blognosticator-Head.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-5\" title=\"Blognosticator Head\" src=\"https:\/\/thelawlers.com\/Blognosticator\/wp-content\/uploads\/2011\/07\/Blognosticator-Head.png\" alt=\"\" width=\"252\" height=\"115\" \/><\/a><\/p>\n<p>The first afternoon sessions of the 2012 TAGA Conference were excellent. Among them was an excellent presentation by Steve Simske, an HP Labs Fellow, who addressed the audience on the topic of security printing, counterfeit prevention, and the effects on the economy of global counterfeiting.<\/p>\n<p><a href=\"https:\/\/thelawlers.com\/Blognosticator\/wp-content\/uploads\/2012\/03\/Hyatt-Regency-Jacksonville-05.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-541\" title=\"Hyatt Regency Jacksonville 05\" src=\"https:\/\/thelawlers.com\/Blognosticator\/wp-content\/uploads\/2012\/03\/Hyatt-Regency-Jacksonville-05.jpg\" alt=\"\" width=\"684\" height=\"448\" srcset=\"https:\/\/thelawlers.com\/Blognosticator\/wp-content\/uploads\/2012\/03\/Hyatt-Regency-Jacksonville-05.jpg 684w, https:\/\/thelawlers.com\/Blognosticator\/wp-content\/uploads\/2012\/03\/Hyatt-Regency-Jacksonville-05-300x196.jpg 300w\" sizes=\"auto, (max-width: 684px) 100vw, 684px\" \/><\/a><\/p>\n<p>His talk was only partly about the counterfeiting of currency, itself a problem. He spoke about counterfeit products including tennis shoes, handbags, designer dresses, and toner. Apparently Hewlett-Packard suffers from loss of sales to a large number of counterfeit toner cartridges made by companies other than HP. Simske\u2019s work for HP has included markings and on-package security techniques that help HP and law enforcement agencies worldwide to be able to identify authentic merchandise from the pirated variety.<\/p>\n<p>What made Mr. Simske\u2019s presentation so enjoyable was his commentary on economic facts \u2013 about two trillion dollars worth of counterfeit products are sold annually into the world economy \u2013 and a dollop of HP marketing information that was informative and very obviously prepared by marketers. Simske made reference himself to the way that marketers prepare copy and company information.<\/p>\n<p><a href=\"https:\/\/thelawlers.com\/Blognosticator\/wp-content\/uploads\/2012\/03\/Steve-Simske-HP-24.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-542\" title=\"Steve Simske, HP 24\" src=\"https:\/\/thelawlers.com\/Blognosticator\/wp-content\/uploads\/2012\/03\/Steve-Simske-HP-24.jpg\" alt=\"\" width=\"288\" height=\"371\" srcset=\"https:\/\/thelawlers.com\/Blognosticator\/wp-content\/uploads\/2012\/03\/Steve-Simske-HP-24.jpg 288w, https:\/\/thelawlers.com\/Blognosticator\/wp-content\/uploads\/2012\/03\/Steve-Simske-HP-24-232x300.jpg 232w\" sizes=\"auto, (max-width: 288px) 100vw, 288px\" \/><\/a><\/p>\n<p><em><span style=\"color: #0000ff;\">Steve Simske of Hewlett-Packard, speaking about security printing, product counterfeiting, and data security during his Sunday\u2019s TAGA conference keynote address.<\/span><\/em><\/p>\n<p>Mr. Simske\u2019s presentation included a sobering amount of information about the information that companies and agencies gather about us, and also about the private information that we readily give up about ourselves by choosing to use services like store loyalty cards, our responses to online offers, and services like Facebook.<\/p>\n<p>He pointed out that the level of security needed to hack into most accounts is limited to knowledge that can be gleaned in a few minutes by anyone with a rudimentary knowledge of the Internet.<\/p>\n<p>For example, he pointed out that many web sites offer to send you your \u201clost password\u201d if you simply provide your mother\u2019s maiden name. He mentioned that almost anyone can find that information, then set-up an \u201canonymized\u201d e-mail address with which to receive the password, and then they will have access to your account.<\/p>\n<p>Though I don\u2019t know how to do the last step in that process, I certainly know how to find your mother\u2019s maiden name \u2013 if you have ever used Geni, or Ancestry.com, I can look that information up in a matter of minutes.<\/p>\n<p>We all give up personal information in exchange for \u201cfree\u201d services. I have a <em>Facebook<\/em> account, for example (I haven\u2019t touched it in months). In order to use <em>Facebook,<\/em> I clicked on a button that said \u201cAgree\u201d and then I moved into my new Facebook space. I published my photo (a delightful image of me wearing a top hat with a pigeon on top). I posted my age, my high school information, my college information, and then immediately began getting ads from <em>classmates.com<\/em> inviting me to get in touch with old chums from the late \u201960s. Did I expose myself to hackers who are looking for information about my family so that they can access my PayPal account? Absolutely! (there is no money in my PayPal account).<\/p>\n<p>Mr. Simske\u2019s presentation was enlightening, a little frightening, and in general it posed a challenge for all of us not to expose ourselves, our companies, our families, or our associates to fraud and fraudulent products. We might enjoy a little tiny bit of privacy in our lives, but judging from our public behavior, it appears not.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The first afternoon sessions of the 2012 TAGA Conference were excellent. Among them was an excellent presentation by Steve Simske, an HP Labs Fellow, who addressed the audience on the topic of security printing, counterfeit prevention, and the effects on &hellip; <a href=\"https:\/\/thelawlers.com\/Blognosticator\/?p=540\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21,9,11],"tags":[],"class_list":["post-540","post","type-post","status-publish","format-standard","hentry","category-mistakes-you-can-avoid","category-new-technology","category-people"],"_links":{"self":[{"href":"https:\/\/thelawlers.com\/Blognosticator\/index.php?rest_route=\/wp\/v2\/posts\/540","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thelawlers.com\/Blognosticator\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thelawlers.com\/Blognosticator\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thelawlers.com\/Blognosticator\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thelawlers.com\/Blognosticator\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=540"}],"version-history":[{"count":2,"href":"https:\/\/thelawlers.com\/Blognosticator\/index.php?rest_route=\/wp\/v2\/posts\/540\/revisions"}],"predecessor-version":[{"id":544,"href":"https:\/\/thelawlers.com\/Blognosticator\/index.php?rest_route=\/wp\/v2\/posts\/540\/revisions\/544"}],"wp:attachment":[{"href":"https:\/\/thelawlers.com\/Blognosticator\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=540"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thelawlers.com\/Blognosticator\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=540"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thelawlers.com\/Blognosticator\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=540"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}