Feeling Safe in Scary Times | Aidan Kehoe | TEDxFairfieldUniversity
The speaker argues that the current era, defined by rapid digitization and massive data creation, presents tremendous opportunities and risks, necessitating that individuals use their power—represented by their digital footprint—to hold companies accountable. He draws parallels between early tech predictions and today's cybersecurity challenges, emphasizing that protecting information's confidentiality, integrity, and availability is key to a resilient future. The core message is that everyone, like his son Liam, can change the world by caring deeply about protecting valuable information. ## Speakers & Context - Speaker: Unnamed individual; originally from Ireland. - Occasion: Participating in a TED talk, addressing an audience in the green room. - Contextual contrast: Describes life and technology *before* TED talks. - Personal background: Born in **1981**; identifies as a millennial; notes his Irish background. ## Theses & Positions - The core human impulse is the desire to *make a difference in the world*. - Achieving societal impact requires addressing foundational elements like safety, which the speaker links to the protection of information. - Modern challenges, such as data proliferation, necessitate a focus on the **confidentiality, integrity, and availability** of information and systems. - The future of democracy and societal health rests within the private sector, a shift from historically government-controlled spheres. - The emerging generation (Millennial generation and Gen Z) is unique in its willingness to hold companies accountable for their actions. ## Concepts & Definitions - **Millennial Generation:** People born around the early 1980s. - **Cybersecurity:** Described metaphorically as *"riding a tiger"*—a volatile, high-risk profession. - **Digital Footprint:** Every piece of data an individual leaves behind while using technology. - **Sub-prime of data:** A future condition where individuals might be paid for allowing advertisers to harvest their information. - **CIA Triad (Confidentiality, Integrity, Availability):** The three pillars used to evaluate the security of information and systems. ## Mechanisms & Processes - **Career Progression (Dishes to Bartender):** Started cleaning dishes in a restaurant, promoted to cleaning glasses, then barback, and ultimately bartender. - **Entrepreneurial Strategy (Hudson Yards):** Worked on the Hudson Yards project, utilizing Steve Ross's advice: *"if you bet small and you win you've lost."* - **Predictive Forecasting:** Method used when writing articles at age 12 to predict future technological trends. - **Cyberattack Vectors:** Attacks generally aim to compromise either **identity**, the **machine**, or the **information**, or disrupt access via **denial of service**. ## Timeline & Sequence - **1981:** Speaker's birth year. - **Pre-TED Talks:** Time period before the speaker's emergence in public speaking circles. - **1992:** Year speaker put the first stake in the ground and made initial predictions. - **Historical Comparison:** The evolution of technology from the IBM PC partnership (IBM/Microsoft) era to the present. ## Named Entities - **Ronald Reagan:** President in office when the speaker was born. - **President Clinton:** Politician elected during the speaker's formative years. - **Arnold Schwarzenegger:** Former Governor of California; pursuing acting career, linked to *Terminator 2*. - **Florida:** Location visited by the speaker when he was 23 years old. - **Liam:** Speaker's son, diagnosed with autism. ## Numbers & Data - Year of birth: **1981**. - Speaker's age when writing articles: **12 years old**. - Estimated population size in Ireland (at that time): **roughly four million**. - Estimated population size in the U.S. (at that time): **over 300 million**. - Financial prediction: Recommended Philips PC costing **1500 pounds** at the time. - Job openings in security: **three million** today. - Technology measurement: More data created in the last **three years** than in the history of mankind. ## Examples & Cases - **Early Tech Predictions:** Predicted a Philips PC purchase and predicted that plastic covering the computer would suffice for protection. - **Success Story Source:** Worked with billionaires at Jupiter Florida, where the common answer to success was *"I worked really hard."* - **Relationship Insight:** Found that among successful people, only **10%** managed to keep their relationships intact while working hard. - **Cybersecurity Visualization:** Description of a daily routine visualizing the field as *"riding a tiger."* - **Industry Problem:** The challenge of communication in IT/security, where laypeople mistake terms like "cookie," "worm," and "phishing" for tangible objects. - **Case Study of Vulnerability:** The speaker's son Liam's autism diagnosis serves as a direct example of information that must be protected. ## Tools, Tech & Products - **Philips PC:** Specific computer model recommended in the 1990s. - **Google:** Used as an example of a search engine leading to complex, non-e-commerce sites (Amazon example). - **Alexa and Siri:** Examples of voice technology integrated into the home. - **Apple device:** Example of a connected device featuring earbuds. - **IOT (Internet of Things):** Concept of the connected world. ## References Cited - **Andrew Maslow:** Referenced in relation to safety being a requirement for thriving. - **Marc Benioff:** CEO of Salesforce; quoted regarding Facebook being the "new cigarettes." ## Trade-offs & Alternatives - **Technology Ownership:** The tension between the inherent openness of the internet (difficult to close) and the need for regulation/protection. - **Information Value:** The trade-off between individual privacy and the economic model of data harvesting. ## Counterarguments & Caveats - The speaker acknowledges being wrong about many of his early predictions. - The field is constantly changing, necessitating the building of a *"new Internet"* design approach. ## Conclusions & Recommendations - People must recognize and utilize their **digital footprint** as a source of power. - The primary action recommended is to **care** about the world and one's data, mirroring deep care for loved ones. - The ultimate goal is to encourage accountable behavior in corporations and institutions. ## Implications & Consequences - The digital footprint is a permanent record that impacts individual and social welfare. - The current data ecosystem requires a fundamental rethinking of internet design structure. - Protecting sensitive data (like health/autism records) against breaches in confidentiality, integrity, or availability is a critical social necessity. ## Verbatim Moments - *"if something bad goes wrong you have an Irish person here to get you set"* - *"I was so far wrong about having a computer for a lifetime now people have him for a day or two"* - *"your maximum amount of time you should spend is roughly half an hour"* - *"if you bet small and you win you've lost"* - *"Amazon you have to go through nine pages before you find out that it's a forest not an e-commerce company"* - *"it's like riding a tiger"* - *"more data that's been created in the last three years than in the history of mankind"* - *"you can basically say that they're either trying to attack your identity execute on your machine or your information or send in a denial of service"* - *"every digital footprint you leave it matters"* - *"Facebook is the new cigarettes"* - *"there is no 911 there's no place to call there is no emergency services"* - *"I want you to think about how you can change the world by caring about it more every day"*