We all must look at the technical issue behind metadata! What is metadata? The Webster Free dictionary states the following:
(computing) information that is held as a description of stored data
A word coined by Jack E. Myers to represent current and future lines of products implementing the concepts of his MetaModel, and also to designate his company, The Metadata Company that would develop and market those products. A data and publication search performed when Myers coined the term, early in the summer of 1969, did not discover any use either of the word “metadata” or “meta data.” Myers used the term in a 1973 product brochure and it is an Incontestable registered U.S. Trademark. (1997-04-06).
With this piece of information above you can now assume that Mr. Meyers created a monster! Data in of itself is a monster, misused it is an uncontrollable mess. In the medical world information is valuable in lots of little pieces. Those pieces are scattered all over the records of where patients get care. Now we have this “web” of data mining terrorists among the millions of computers hooked to the very same internet every single patient in the US receives care. They present that insurance card, a piece of ID, and address, birth dates, where the attendant endless enters that data into the data fields for every single patient. So x-ray records go to that department, then you have to have blood tests so that department or a 3rd Party entity will get that information, they may not even be in the same state as the patient! After a year of going to a doctor a patient can rack up 10-20 places their information has had to be shared to bill CMS, or a large insurance company.
The picture in this article sites the latest Informatics type breach, this was the personal attack that is described therein this article. My ability to be bias is somehow now going to have a slant that most readers will find informative or arrogant.
Enter the medical device mailing services that send medical supplies to patients monthly. That data is repeated over and over again so that a pattern arises, that is where metadata is hacked! Reviewed by who knows who? We ALL have metadata! It is there when you wake up and it is expanded by the time you go to bed. There is no way to stop metadata collection on medical patients, it is however the reason the HITECH Act was created, to electronically store and access medical data. In 2009 breaches were all but unheard of! But as this writer has in the past alerted my readers of this basic terrorist act, today, I write from that personal perspective where close family member’s information has been compromised! Not one but ALL of my family member’s data including my own, has now been in the hands of someone who wants or could destroy mine and my loved ones financial lives with the stroke of a key!
Outraged that corporations (3rd party or business partners share that responsibility) that store information at rest without securities has stretched my ability of understanding the steps to secure information that resides on several servers in several states? The HITECH Act was developed to deal with the millions of submitted forms to perform a persons electronic verses paper healthcare life where the resources to produce the paper records was taking forests of trees that possibly could wrap around earth dozens of times. Sadly many medical files were inaccurate, laborious to maintain from staff people’s perspectives; where test results and entire records got lost that cost human life.
Here we are again risking personal lives. This is because some people that learned how to code ( these are not the caliber of IT professional I am, trust me;) where they use that ability to gain unauthorized access to vast amounts of stored data at facilities entrusted with securing that data, these people do this with the use of knowledge either self taught, or University taught, where we have to stop the hacker!
Even though a computer scientist isn’t a rocket scientist, it is a scientist nevertheless! When I describe to people what I know how to do it is easier to tell them what I don’t know how to do to a computer, with a computer, or to someone else’s computer from my computer! Which isn’t much I can’t do, just because I know how doesn’t mean I SHOULD! In reality anyone that learned from a University and has a degree in computer sciences actually signed with the University that moral clause that you would have had to abide by while a student about cheating and selling papers etc, that also extends to after you are employed with that knowledge you gained, if you use it to exploit your Corporations records, you should be fired. The Fed’s are working hard using the laws on the books regarding hacking to stop the white collar crimes.
Corporations need to prosecute and no longer offer deals! I used to see that image of a pimple faced teenager wearing his batman outfit hacking his neighbor’s internet interface to gain access to the daughter’s webcam on her laptop, this is no longer what I see in my minds eye of a hacker! Here is my new image: rooms filled with able-bodies coding (near-expert) scripts to gain access to databases that store that metadata we started this article with. It sits there harmless for days, years even before someone hits that space where there is no GATEKEEPER. No way to keep them out. They build algorithms to beat the algorithms that are protecting that data, if it was protected at all. They hash the data so the originator can’t use the data or access it until they are done; leaving in the wake a disrupted database that has holes in the storage logs, where the tracks of the hacker are found.
Time stamping is now old hat to computer users-even novice’s know that they have a picture that has an auto date generated the minute the picture is snapped. Besides the time, possibly the GPS of the device that was used, the originator’s account name, some other computer related information for sorting purposes used by the user. Data Terrorist use these attributes from your medical files take your daily habits in the medical world to ensure you are a avid patient.
Once your medical ID has been compromised the Data Terrorist then sells, or has means to access databases and begin making money off that person’s insurance to buy medical devices, hack the pharmacy that real patient frequents reordering and re-directing shipments of medical grade elements onto the black market! Since completing my degree and focusing on Medical Data Security for my final Capstone (dissertation at some Universities) to highlight medical data security and how it is becoming increasingly obvious that someone has the upper hand, the week I produced my project to the instructor the first members of my family were compromised by Anthem’s breach, where my assignment began in January and I had so much data the length of the document had to be subjective, so I chose current events. The blaring breach on Anthem gave me lots of data to include in my observations as a person that has been a data breach victim, where monetarily problems haven’t come to light or many never it is the entire issue about safety. They have demographic information, where every American knows about being on mailing lists! This is far more invasive.
Again, back to algorithms and the mathematics of data science, so if you have read this entire article and may be thinking, ‘well how many people we talking about here?’ I direct you first and foremost to this link https://www.anthemfacts.com/ this site discusses the data coverage available to those that have been compromised. In this case it was many levels of data that was resting that had been accessed. The large news outlets reported 80 million Anthem participant’s had some type of data breach. That is just one report of one breach, with the knowledge it happens everyday I would like to invite you to a website dedicated to reporting such breaches that may or may not hit the nightly news.
This link http://www.privacyrights.org/data-breach will instill your skills to keep your medical data safe! Large facilities like the VA came under fire for so many complaints by veterans that received substandard care and wait an eternity for the services they ask for not services they DON’T ask for. This is another page altogether where escalating medical testing for Veterans that may or may not have a hidden disease that would be ruled out if the doctors order this or that test, just as in the CMS scams charging senior citizens for services never rendered. Even if the services were rendered in most cases the Vet had no clue why the test was ordered and by whom? As was the case for my family member, they kept sending them a kit for a test they did not order or schedule! You add the 10’s of thousands of places that posted by law, the breach and what was compromised at the website at the top of this paragraph, the 80 million just from Anthem, and suspected attacks across waters that most American’s will never see or care to watch news reports.
Where we must now draw the line on hacking, misrepresentation of a scientific/or medical professional that compromises the trust of patients, which in turn is the Corporation in which pays that internal person that causes the breach, to be uninformed, unethical or under-qualified in the position in which they were hired, must have outcome results as well and monetary, seeing the punishments of people that insist on taking what isn’t theirs to take.
We are investigating now if in fact that kit ordered 3 times was part of that scam or another part of something bigger where my family members total bill is something they can’t pay. This would be the story for nearly every veteran! As you scroll down this webpage and investigate already this year’s reports of breaches, you will begin to understand how this pattern can evolve into a mass pool of places to get information if data terrorist were in search for it, they will find it.
Please stay informed! Subscribe to my Articles with the button on this page!