Tuesday, November 19, 2013

The 12 Rules of How Not to Manage an Organization

I replaced my university's name by 'Inept University' to protect the innocent and hide the guilty, and not create further trouble for me.

[INEPT UNIVERSITY] leaders strain to transform [INEPT UNIVERSITY] into the Eminent Management University in Malaysia and possibly the world. I have no idea where the administrators dreamed up this mission statement. Do not get me wrong, universities and colleges are extremely bureaucratic and poorly managed institutions. However, [INEPT UNIVERSITY] is the worst of the worst. Sometimes, I dream I am superman, and I fly around and help people, but I do not go around and tell anyone. Otherwise, people would think I was crazy. After reading this blog about this university, this idea of [INEPT UNIVERSITY] becoming the Eminent Management University is completely insane, but this leads to our first rule. Bureaucratic institutions with severe management problems can craft clever slogans and mission statements and conduct slick public relations campaigns.

Rule 1: Bureaucratic organizations become very good at crafting clever, intelligent mission statements and fabricating excellent public relation images.

I copied this mission statement directly from the [INEPT UNIVERSITY] website. The mission statement is a little wordy but common in the education industry. University informs everyone how great the university is.

"To be a consistently pre-eminent centre of academic excellence in teaching and learning, research, consultancy, and publication in the field of management, and, at the same time, to bring forth highly competent human capital that is commited to serving in the development of the nation and all humanity."

Analyzing this mission statement, parts are completely false. "..excellence in teaching..." Really? Who thought this up? I became shocked and enraged after a student told me most professors do not return exams, homework, and quizzes. In most classes, students do not know how well they are doing or which grade they are earning until after the class ends. I do not think I could do well in these courses because I would not know how long to study, how the professor grades exams and homework.

Problems at [INEPT UNIVERSITY] go beyond teaching. Old computers and equipment that are older than the students sitting in the classrooms fill every classroom. I had trouble with the computer and equipment weekly. Viruses infect at least half the computers while the computers break down frequently. For one class, the electronic lock had failed, and the students and I were locked out of the classroom. I switched classrooms. However, the bureaucrats still found ways to create problems. First year students must scan in their ID on the time clock to record their class attendance. Administrators marked all my students absent that day even after I informed them what had happened with the door.

My university's troubles exceed the false visions and mission statements. [INEPT UNIVERSITY] has evolved into a bureaucratic nightmare, adding layers upon layers of management. I taught in the College of Business, and these managers separate me from the Vice Chancellor:

  1. Vice Chancellor - president of the whole university
  2. Assistant Vice Chancellor - have no idea what this person does
  3. Dean of the College of Business - supervises the economics, finance, and banking departments
  4. Deputy Dean of the College of Business - have no idea what this person does
  5. Department Head - supervises the economics department

Remember that old saying - too many cooks spoil the stew. With [INEPT UNIVERSITY] being overly bureaucratic, the managers insulate themselves in their offices, processing volumes of documents. They never once popped into my office to see what I was doing. I even tried to pop in and ask questions, but most the time, the managers lock their doors and isolate themselves, which becomes Rule 2. They send commands through their staff. Since some professors lack motivation, the staff always demands and snaps commands at the professors. They never politely ask or request for things. You must do it NOW even if I am in the middle of teaching a class! Drop everything you are doing! Come to the committee room now! The dean must see you now! If I were dean, I would not hide in my office. I would be knocking on people's door, finding out what people are doing, and what they are working on.

Rule 2: Leaders who isolate themselves from the workers provide poor leadership. They do not inspire, encourage, or develop healthy relationships with their employees.

Many universities want to transform themselves into a research university because they are prestigious as professors conduct breakthrough research. Furthermore, accreditation hinges on a university conducting research because professors bring that knowledge into the classroom, teaching students the most up to date methods. Unfortunately, many universities focus on research and neglect teaching.

I will let you know a little secret. Many university researchers write research papers that contribute little to their fields, playing a numbers game with the university. If we eliminated 80% of the published research, humanity would never miss it. If we eliminated another 10% of research, humanity would lose some knowledge, but we would survive. In every field, a handful of researchers discover the breakthroughs while the remaining researchers play catch up and regurgitate and recycle the research with new angles.

[INEPT UNIVERSITY] leaders want to transform [INEPT UNIVERSITY] into a research university, but they do not know how to achieve their goals. They created the KPI that outlines the duties and responsibilities of every university employee including the managers. Malaysian government uses the KPI to boost workers' productivity. (Remember the movie - Office Space? KPI is the new TPS Report - a mindless, useless report that all managers want in the movie with the correct cover page). Every few months, the administrators incessantly change the employees' goals and duties, which becomes Rule 3. As an employee, how can I complete a goal if I know my goals will change in several months? I could organize and perform research on a subject that satisfies my current KPI. When the administration alters my KPI, then my efforts and work could become wasted if the project satisfies the old KPI and not the new KPI. After my third KPI, I ignored the KPI and revived the old rule. I will teach my classes and publish research papers that I want.

Rule 3: Managers constantly changing the goals, duties, and mission of their employees do not know what they are doing. If a manager knows which goals his or her employees must accomplish, subsequently, the managers would outline their duties and then monitor their progress. Indecision reflects poor leadership and incompetence.

Bureaucrats can divert activities away from its core mission, which leads to Rule 4. A university has two goals: educate students and conduct research. For example, [INEPT UNIVERSITY] wants to enroll more foreign students. [INEPT UNIVERSITY] advertises and sends professors to foreign countries to meet with potential students. Some students become interested and contact the university. Bam! Then the students meet the [INEPT UNIVERSITY] bureaucrats. [INEPT UNIVERSITY] bureaucrats never return phone calls or answer emails and ignore the students. Frustrated students give up and move on to another university. Consequently, [INEPT UNIVERSITY], on one side, tries to recruit students while, on the other side, the bureaucrats are chasing the students away.

Rule 4: Bureaucrats can divert activities away from its core business and in extreme cases can undermine their primary mission.

[INEPT UNIVERSITY] has almost no transparency. I do not think the leaders designed the organization this way, but [INEPT UNIVERSITY] bureaucrats will not divulge any information. Employees wait for commands from upper management, and they avoid trouble by not divulging information that managers will change later. Upper management changes their decisions like the Malaysian weather. Skies are clear and cloudless one minute, and a minute later, thunderstorms are dumping rain from the skies. When I first arrived to the university, no one explained the rules and procedures. I relied on an expatriate professor who has been teaching at [INEPT UNIVERSITY] for a while. For example, no one would say definitively when my contract ends. Normally, the end date is explicit in the contract, but [INEPT UNIVERSITY] starts the contract the first day the professor arrives and not the date within the contract. I could never get a straight answer from the administration, but they keep paying me, so I still stick around.

Rule 5: Nontransparent organizations become susceptible to arbitrary rules and decisions, and in severe cases, fraud, and corruption permeates the organization.

I never seen anything that could be defined as fraud or corrupt, but I have never seen any financial statements from the university and I do not want to see them. However, the rules are arbitrary. For instance, the department will pay professors a bonus for publishing a research paper. Nevertheless, this is not entirely true because at the end of every rule should state "at the discretion of the dean." I learned the administration will pay the local professors the bonus but withhold the bonus from foreign faculty because the foreigners earn greater salaries.

As bureaucracies expand and become more complex, they create complicated budgets that cause bureaucrats to waste and squander resources and money, which becomes Rule 6. For example, the university needs to replace the ancient computers and equipment in the classrooms, but bureaucrats have not allocated money for new computers in the budget. However, the dean for the College of Business demanded every professor to attend training during Spring break in the Cameron-Highlands at the Heritage Hotel. At first, I was happy because the university paid the workers to see another part of Malaysia. However, the organizers turned the workshop into a nightmare as the bureaucrats wasted time and money. They needed to spend all the funds in this one account or the College of Business would lose the money.

Bureaucrats locked us in the hotel for two days, participating in the most boring workshops, stretching half-hour presentation into hours. I became furious on my first night there as the dean kept us until 10 PM. One hundred and fifty people with PhDs and Master degrees filled the conference room. Dean's brilliant team building exercise was to have every team construct a newspaper tent that could support a bottle of water. WTF?

I shook my head in disgust because the university paid a substantial amount of money to transport, feed, and house 150 faculty and staff at a hotel. Yet, I enter my classroom every day to teach, using those damn, ancient desktop computers running XP. Dean could have locked us up in a conference room on campus and made us pay for our own lunches and dinners. Then he could use the money to replace all the old computers and equipment.

Rule 6: Bureaucratic institutions create complicated budgets that cause administers and bureaucrats to waste and squander money on the wrong activities.

Bureaucratic organizations can erect walls and divisions between managers and workers. Managers develop an us versus them mentality. Consequently, managers groom and promote new leaders based on loyalty and not on merit, which becomes Rule 7. In my case, the department paired me with a young professional who was the rising star in the department. We had to coordinate and teach the identical course for multiple sections of this class. It was horrible. She changed things at the last minute and would not inform me such as altering the syllabus and exams. Half way into the semester, she hands me the new textbook where I had been teaching from the older edition book. My personal favorite - she waited two hours before the exam before emailing and asking me to help proctor the mid-term exam. Enough is enough! I told her I refused to work with her anymore half way into the semester. Unfortunately, I sealed my fate and doomed my career at the Eminent Management University.

Rule 7: Bureaucratic organizations promote employees to management based on loyalty and not on merit.

Managers and leaders isolate themselves in their offices processing documents and reports. They demand we professors write research papers, apply for grants, and consult for industry. Professors always write glowing reports how we applied for an international grant and give the details, or we recently submitted a research paper. Then the managers pass the reports up the management chain. I would never accept a grant, always sabotaging my efforts. If an international agency had given a grant for research, then the university requires me to transfer the funding to the administration so the bureaucrats can control the money. My colleagues complained many times about their struggles for reimbursement from the administration while reimbursement stretches into months. Accordingly, our leaders have trouble managing and monitoring us, which becomes Rule 8. At one point, I snuck away from the university for two weeks to travel in Indonesia, and no one noticed.

Rule 8: Bureaucratic organizations have trouble coordinating, managing, motivating, and monitoring workers.

As you guessed, workers and professors lack motivation at my university. They arrive to campus and teach their courses. Then they flee the campus silently, avoiding the leaders' offices, just in case the leaders happen to be looking out their office windows. In the academe, I hear the magic number many times - 10 percent. At many universities, 10% of the workers do all the work and carry the 90% who sit in the break rooms, gossiping about the TV shows and the people around them.

Managers have resorted to intimidating the professors to boost the professors' productivity - i.e. that research defined in the KPI. Dean emailed the entire foreign faculty and requested we meet in the committee boardroom. Dean sat at the head of the table while we professors sat on one side of the table lined up like ducks at a shooting range. Then the College of Business department heads, advisors, and coordinators came in solemnly and sat along the wall at their special table like inquisition judges. Dean outlined our research plans, changed our KPI again, and demanded we professors start producing research while the inquisition judges glared down at us. Ironically, most foreign professors had published research while the dean and inquisition judges have produced nothing except for one.

Rule 9: Leaders and managers threatening and intimidating their employees reflect severe management problems in an organization. Consequently, the organization is doomed as employees begin fleeing.

I work for a university where the leaders and managers refuse to communicate to me except when they demand a document. Managers have isolated themselves from us, and I feel no connection or dedication to my employer. I stopped going to my office, and I work at home. I try to teach my classes well, but my morale and work ethic has suffered in the other areas at my job, which becomes Rule 10. I have not committed sabotage or done anything to my employer, but I am far from a good employee. I have a journal article being reviewed. If the journal accepts my article, I will not inform the dean or anyone at the university. I know their KPIs depend on faculty publishing research, so I will not help boost their KPIs. Of course, my managers hold me in such contempt; they probably would not even consider the publication if I had informed them.

Rule 10: Employees' morale and work ethic suffers if the managers and leaders mistreat them. Employees may sabotage projects and deliberately reduce their productivity in revenge, striking back at their bosses.

Sometimes, the [INEPT UNIVERSITY] bureaucrats do crazy things, which become Rule 11. Then couple this with the Asian mentality where a subordinate can never challenge a manager's decision. For example, bureaucrats at [INEPT UNIVERSITY] continually change document formatting. Professors must adhere to the exact format for writing the final exam questions. Last year, professors had to write the exam questions using Arial font and paragraphs were not justified. This year, the supreme committee of upper management in their infinite wisdom had decided, professors must use Times Roman font with justified paragraphs. Then a committee of PhDs breaks out their rulers, analyzing and examining every professor's final exam for question content and formatting. Of course, a bureaucrat cannot create a template and email the template to the professors. Bureaucrats continually create work for the professors. Their pettiness truly dazzles my mind. For another instance, the bureaucrats had rejected my syllabi for my classes. Last year's syllabi had the university's logo while this year, the committee wants the professors to remove the logo. (I am not making this up).

Rule 11: Sometimes, extremely bureaucratic institutions do crazy things without any thought, reason, or logic.

Last Rule, Rule 12, kills organizations, causing them to stagnate and go into decline. Leaders and bureaucrats fostering a terrible, hostile work environment force its employees to transfer and work for rival employers. Even at my university, some workers and bureaucrats work hard and try to do their jobs well. I become disappointed and frustrated when I pop into an office where competent, hardworking people work and learned they quit their jobs and started working for another organization. A new employee takes over and must learn how to do their job and duties. Consequently, a high turnover rate hurts the bad employer in three ways. First, employer can lose institutional memory when fleeing employees take their knowledge and experience with them. Second, competing employers will hire and poach the best employees from rival companies while poorly managed organizations become filled with bad employees over time. Finally, the fleeing employers may work harder for their new employers, subconsciously getting back at their previous bosses.

Rule 12: Severely mismanaged organizations experience high turnover rates with its personnel. Unfortunately, the organization can lose its best employees as competing organizations hire them. Over time, the mismanaged organization becomes stuck with poorly motivated, low-skilled workers.

Many bureaucrats and leaders poorly manage their institutions and would break half these rules continually. However, my special university in Malaysia violates all these rules daily. What is hysterical is the Vice Chancellor gave a good speech about companies and countries that grew fast but went into decline. He said we must adapt and change with our environment and remain competitive. However, the president needs to examine his own institution especially his management team. Bureaucrats and leaders can write glowing reports and documents and blame others for an institution's failures. Many failing companies and stagnating countries institute overbearing bureaucracies that hindered growth and stifled change.

Problems at [INEPT UNIVERSITY] will continually worsen. Bureaucracies grow over time, and the [INEPT UNIVERSITY] bureaucracy already interferes with its mission - conduct research and educate students. Bureaucrats will create new paperwork, procedures, and processes that halt all progress and chase the good employees from the university. Bureaucrats are pesky flies multiplying on the piles of cow dung spread across the college campuses. We professors are doomed.

Wednesday, November 13, 2013

Is North Korea being Aggressive?

Political leaders, news reporters, and analysts claim North Korea is being aggressive towards the outside world. However, the U.S. military performs joint military exercises with South Korea. South Korea conducts military exercises near North Korea’s border while the U.S. military flies airplanes near the border. Then the United Nations with the approval of the United States imposed further sanctions on North Korea. When North Korea fired artillery onto Yeonpyeong Island, a disputed territory between South and North Korea, was North Korea being aggressive or sending a message to South Korea and the United States to back off?

The United Nations imposed sanctions on North Korea because North Korea is developing nuclear weapons and missile technology. In North Korea’s defense, a country with nuclear weapons has never been invaded by another country. Unfortunately, nuclear weapons depend on early 20th century technology. They are simple devices that depend on refined uranium 235 or plutonium 239. That is the only complexity of developing nuclear weapons, purifying and refining uranium or plutonium into weapons grade. On the other hand, North Korea could be using nuclear weapons and missile technology as a bargaining chip with the United States. For instance, North Korea could suspend its nuclear program if the United States opens diplomatic relations with North Korea and sends more aid. Unfortunately, both sides refuse to talk to each other.

Many Americans advocate invading North Korea. They believe the war would be quick and decisive. This could be a terrible idea. People had forgotten history. The Korean War (1950-53) ended in an armistice. Both the South and North Korean militaries put their weapons down and stopped fighting on July 27, 1953, and they never signed a peace treaty. Thus, the war ended in a tie with no winner. As the United States sends more ships and troops to the Korean Peninsula while South Korea performs military exercises near the border, North Korea had canceled the armistice in March 2013 as tension between the two sides continues escalating.

Many Americans had forgotten the United States military helped South Korea during the Korean War, and that war ended in a tie. Unfortunately, we have fared no better with our recent military excursions. U.S. military has occupied Afghanistan for over 12 years with no end in sight. U.S. military had killed the top leaders of al-Qaeda, but the U.S. military still controls a land locked country filled with sheepherders, mountains, and rocks. Under these conditions, the U.S. government still has trouble controlling Afghanistan even after the Soviet Union had worn down Afghanistan during the 1990s. Furthermore, the U.S. military has invaded Iraq and occupied the country for 12 years with no end in sight. U.S. military has invaded Iraq twice because the U.S. military had invaded Iraq in 1991 after Iraq invaded Kuwait.

A new war between North and South Korea becomes likely as tensions intensify. Let us say the U.S. military does invade North Korea. Everyone assumes North Korean missiles cannot reach U.S. soil. They only develop technology to fire mid-range missiles that could reach the U.S. military base in Guam. Experts claim North Korea does not have the technology to fire missiles that would reach the continental United States. Does anyone want to gamble on this? Besides, if North Korea does not have the technology to fire long-range missiles, military can mount missiles onto ships and sail them closer to their targets. Moreover, the U.S, military would have problems fighting a war with North Korea because the military would pull troops away from Iraq and Afghanistan. Thus, U.S. military spreads the troops and resources over three battle fronts. Opposition and rebels can rise up and successfully attack U.S. soldiers and bases. Napoleon and Hitler had opened two fronts, and both dictators lost the war.

Why must the U.S. government intervene in North and South Korea’s conflict? Where does the U.S. Constitution state the U.S. government must be the world’s police officer? Subsequently, if the U.S. government triggers a war, it must finance the war and its finances are not healthy as the U.S. government debt clock has ticked beyond $17.1 trillion. U.S. economy remains weak with sluggish, nonexistent job growth. U.S. government should worry about the weak economic recovery within our borders because a weak economy causes weak growth in tax collections. Unfortunately, a weak economy coupled with a high debt converts the debt clock into a ticking time bomb.

United States government is isolating North Korea. If the U.S. government wants to change North Korea, then get the North Korean government to open their economy to free trade. Free trade moves new products, services, and ideas across a country’s borders. After the people taste free choice, consumer products, and new ideas and technology, they will demand their government to open up more. We see this happening in China. Communists still control the government in China, but every day, they open and liberalize their economy more until one day, the government will grant freedom to its people. Forcing open North Korea’s economy would change the system more than the United States and South Korea triggering a war with North Korea. Missiles and bombs would not destroy cities, and no soldiers would die.

Friday, October 25, 2013

Thoughts about the 2010 Affordable Care Act

President Obama and Congress passed the Affordable Care Act to help 48 million Americans gain health insurance. With a population of 300 million Americans, roughly 16% of the U.S. population has no health insurance. Unfortunately, I find this law troubling because, in the old days, people had a choice to buy insurance or not. Insurance was voluntary. People bought insurance because they were preparing for emergencies or unexpected losses. Regrettably, the U.S. government has ignored simple economics, which I explain in this blog.

U.S. government creates a problem by forcing people to buy insurance. Out of that 48 million Americans, how many young people do not want health insurance? Young people believe they are invincible, and few would buy insurance. Usually people who buy insurance expect to use it. Some of 48 million include low wage earners, or the insurance companies had denied medical insurance to people with preexisting medical conditions.

Insurance companies reject applicants with health problems because the companies expect to pay out more in insurance claims as the applicants seek more medical treatment, boosting the insurance companies’ costs. Consequently, the new federal law may help low wage earners and people with preexisting conditions acquire medical insurance. However, the young people will help subsidize the health insurance because most are healthy and rarely seek medical treatment.

Another side effect of the law is insurance companies gain market power. With a population of roughly 300 million Americans, the United States has 38 insurance companies. I listed the companies in Table 1 at the end of this blog. U.S. government has conferred monopoly power to the insurance companies because the government guarantees these companies 300 million consumers. On average, each company would insure 7.9 million people. Consequently, the companies can hike insurance premiums and offer lower quality insurance because consumers cannot choose whether they want health insurance or not. They must choose one of the 38 companies in the United States. Then Aenta, one of the largest insurance companies, announced it plans to exit the health insurance market.

Using a perverse example, we can show how this health care law can limit market power. Let’s say the U.S. government forces all drivers to buy road flares that must be stored in the car’s trunk. That way, a driver with car trouble can pull over and place flares on the road, so another driver does not crash into the car. What would happen if the United States has three companies that made road flares? U.S. government has granted them market power, so they can increase the price and earn massive profits. Subsequently, the companies could funnel some profits to the politicians as campaign contributions, showing their appreciation of the new law.

New health care law shows the problem of pathetic news quality. Since the 1990s, I held a low opinion of the U.S. news and newspapers because reporters never cover news stories in detail as the reporters always skim the important facts. I became angry when the reporters ignore essential facts of the new health care law. Most reporters wrote the U.S. government would fine any person $95 in 2014 for not having medical insurance. That is not completely accurate. Fine is $95 per adult or 1% of a person’s income, whichever is greater. Thus, an adult earning $20,000 per year would pay a $200 penalty for not having health insurance and not $95. Then the penalty rises to $325 per adult or 2% of income in 2015, and $695 or 2.5% of income in 2016 and after.

I listed the penalties in Table 2 for individuals, children, and families. Furthermore, experts claim the IRS has no enforcement powers to collect the tax. When a bureaucrat has a will, he or she will find a way. IRS will devise a method to collect the penalty. Most likely, the IRS would rearrange a taxpayer’s payment. IRS would apply a taxpayer’s money to the penalty first and then demand more money to apply for the actual taxes. Of course, everyone assumes the taxpayers will continue submitting forms to the IRS. People in many countries, such as Italy, Greece, Spain, and Portugal, evade and elude taxes as tax dodging has become a favorite pastime for some of their citizens.

U.S. government created another problem because it had promised the people that they could keep their current medical insurance and current family physicians. Unfortunately, the U.S. government did not anticipate how businesses and people would respond to the law.
1.     Some insurance companies offered health insurance that does not comply with the new law. Consequently, insurance companies had canceled these plans instead of complying with the law, leaving between 7 and 12 million people and families without health insurance.
2.     U.S. government taxes people and families with generous health insurance plans. A tax penalizes an activity or behavior, and government penalizes people with generous health care plans. Hence, insurance companies, people, and families have an incentive to reduce their plan’s benefits to reduce their tax burden.
3.     U.S. government has left some doctors out of the health insurance network. Thus, some families who saw their family doctor for years can no longer see them. This raises a good question – if the government leaves some doctors and hospitals out of the health care plan, will the hospitals close, and the doctors retire? This would reduce the supply of medical services that raises prices for medical services.
4.     Employers do not pay for health insurance if they work their employees fewer than 30 hours per week. Some people have lost hours as their employers switch them from full time to part time. Unfortunately, the people with reduced hours may have to purchase health insurance out of their own pocket if their salary exceeds $10,000 for a person or $20,000 for a family.

As the name suggests, the Affordable Care Act should reduce medical costs. Can you name a government program where government had reduced costs or prices? Every industry and market a government interferes with cause greater market prices. Putting this fact to the side, everyone overlooks one important fact. If the supply of medical services remains the same while people demand more health care because they have medical insurance, the market price always rises. As more consumers compete for the same supply, the consumers bid up the prices. Then I read articles here and there. For instance, the IRS will hire 6,700 agents to enforce the insurance penalty. Then federal and state governments must hire bureaucrats to work in the new medical insurance exchanges. Through my readings, I never read a story where hospitals and clinics plan to hire more doctors and nurses. If the U.S. government wants to reduce the price of medical care, it must expand the supply for medical services. If the market supply grows faster than market demand, subsequently, the market price always falls. As hospitals and medical clinics expand their services, they would lower their prices to attract more consumers to their facilities. On the other hand, I have read several hospitals will close.

The Affordable Care Act does not fix the flaw with the medical industry because the health insurance companies isolate the payments between patients and hospitals. Our current health care system provides no incentives for patients, hospitals, and clinics to reduce costs. Patients pay a fixed price to visit a doctor, usually $20 copay. Patient could request the doctor to perform 20 tests, and the doctor would comply even if he or she thinks some of the tests are unnecessary. Doctor bills the insurance company for the tests and not the patient, thus sticking the third party with the bill.

Healthcare system would change if the patient had to pay a percentage of each test. For example, if the patient must pay 10% of every test cost, the patient would start asking more questions about the tests and would question whether the doctor should perform 20 tests or not. Patient’s bill becomes tied to the number of tests the doctor performs. Furthermore, the doctor may limit the number of test especially if the doctor knows the patient has little income to pay for them.

The Affordable Health Care law creates another problem - intrusiveness. People who cannot afford health insurance or do not qualify for Medicaid or Medicare can buy health insurance through exchanges. Unfortunately, applicants must fill out a government form spanning across 21 pages. Most questions cover financial information and contain little health information. Supposedly, as a person enrolls into an insurance plan, the exchange shares information with other federal agencies such as the FBI, IRS, NSA, et cetera. Our political leaders think similarly to the Soviet planners. Soviet citizens applying for a government program or need a government document had to supply numerous documents to the bureaucrats. I call it the bureaucratic shuffle because a trip to one bureaucracy would lead to multiple trips to other bureaucracies as citizens gathered various documents.

Patients lose their privacy as the state and federal government collect information about them. I tried to research which agencies the health insurance exchange shares information with, but this information had disappeared from the internet. Remember George Orwell’s novel - 1984. Government controlled information and the main character, Winston Smith, worked for the Ministry of Truth. As the government changed and updated information, Winston had to correct every book, newspaper, and piece of information with the new information. I apologize for digressing, but I became surprised this information had disappeared from the internet so quickly. I know I read about the exchanges sharing information with the federal government agencies because people had trouble enrolling into insurance plans. Computer system experienced bugs as it shared information with these government agencies, preventing applicants from enrolling into a plan. Of course, thousands have browsed the exchange website to check rates, but the U.S. government has not revealed how many people it has enrolled. Analysts estimated the U.S. government had enrolled a half million people in mid-November 2013, far below its projections.

Government leaders forget economics is about choices. I liked how Kazakhstan had set up its medical industry. Kazakhs have a choice. They can go to a state hospital or to a private medical clinic. Government supports state hospitals that charge very low prices while private medical clinics charge a market price for its services. Of course, patients receive a lower quality of care in the state hospitals than the private ones. I remember well my trip to a state hospital in Almaty, Kazakhstan. I walked through run down, dirty corridors. State hospital looked more like a factory than a hospital. A nurse yelled at me in Russian. Subsequently, I went to the private medical clinic around the corner from my apartment. Clinic was clean and new with friendly staff. I also received my medical services quickly. That was the thing. Kazakhstan grants its residents the choice which medical services they want. United States could copy this plan. U.S. government could dissolve Medicare and Medicaid and give the funding to the county governments to support state-funded hospitals. Then the government exits the health care business and allows private hospitals and medical clinics to provide services to paying customers. Then Americans can choose which health care system they want.

After examining the Affordable Care Act, I am shocked the President and Congress would offer such a terrible plan. At least the Congressmen did not exempt themselves from the healthcare law. I believe the law requires our Congressmen to enroll in health insurance similarly to everyone else, but the U.S. federal government pays up to 75% of the insurance premiums. In the old days, government passed a program to help people. Instead, the government had passed a program that will cause problems, but it does create two benefits. First, insurance companies cannot deny insurance to people with preexisting conditions. Second, the insurance premiums could be reasonable in the beginning. For example, I looked up the cheapest plan for my state, which was $200 per month. That was not bad, but this was an estimate and not a quote. However, the health insurance costs will continue rising from the following problems.


  • Health companies may hike premiums because they gain more market power. Government guarantees them consumers, and consumers can only choose insurance from 38 companies.
  • Health insurance companies must cover patients with pre-existing conditions. These patients may require more medical care, and the insurance company would pay these medical costs.
  • People may increase their demand for medical services because they have insurance. Consumers bid up prices for medical services (unless the supply also increases).
  • U.S. government has left some doctors and hospitals out of the health insurance plan. Consequently, government will reduce the supply of health care and drive up its prices.
  • Health care plan expands state and federal government bureaucracies, and the government gains and collects more information about its citizens. Furthermore, bureaucracies grow continually, and hospitals, medical clinics, and insurance companies would pay greater compliance costs as bureaucrats expand the rules and regulations.

Table 1. List of the Health Insurance Companies
Companies Companies Companies
AETNA AFLAC American Family Insurance
American Medical Security American National Insurance Company  Anthem Insurance
Assurant, Inc. Asuris Northwest Health BlueCross BlueShield Association
Celtic Insurance Company CIGNA College Health IPA
Connecticare Inc. Continental General Insurance Company Golden Rule Insurance Company
Group Health Cooperative Group Health Inc. Harvard Pilgrim Health Care
Health Markets HUMANA Insurance Services of America
Intermountain Healthcare Kaiser Permanente LifeWise Health Plan of Arizona
LifeWise Health Plan of Oregon LifeWise Health Plan of Washington Medica Minnesota
Medical Mutual Oregon Health Insurance Oxford Health Plans, Inc.
Principal Financial Group, Inc. Shelter Insurance Unicare Health Insurance
UnitedHealth Group Inc. Vista Health Plan Walter Jarvis Insurance Services
WellPoint WPS Health Insurance

Table 2. Penalties for not carrying health insurance

2014 2015 2016 and beyond
Adult $95 or 1% of your income $325 or 2% of your income $695 or 2.5% of your income
For every child $47.50 $162.50 $347.50
Family max. of $285 or 1% of family income max. of $975 or 2% of family income $2,085 or 2.5% of family income

Friday, October 4, 2013

The Underground Internet

I have always surfed the Internet since it took off in the early 1990s. I remember the days when the Internet comprised of text messages with no color pictures and graphics. I am even knowledgeable in computers and can write a little code in several languages, build basic websites, and other little stuff. However, I never even guessed a whole, hidden world existed in the Internet that most users would never see. They call it the deep Internet, or a better term is the underground or hidden Internet.

Before describing the hidden Internet, I define the standard Internet. For example, a user types the URL into the web address, such as www.hotmail.com. Many things happen that a user never knows. His or her computer looks the IP address for the URL in the DNS database. IP address identifies the web server’s location within the Internet. It is a unique address similar to a mailbox where people send and receive letters. DNS database lists the world’s websites like an address book, including the user’s Internet provider. IP address comprises of four digits ranging from 0 to 255, and a period separates the digits. Subsequently, the user’s computer connects to Hotmail’s servers. User connects to the Internet with an IP address via his or her Internet provider. However, the user’s computer and Hotmail’s servers exchange IP addresses. As the user’s computer and Hotmail servers exchange information back and forth through routers. Routers read the destination and source IP addresses, so they can send the information to the right places. Consequently, a mailman knows where to deliver the mail. Every letter he delivers has a send and return address. As you probably guessed, law enforcement officers can trace IP addresses and track down users who use the Internet for illegal purposes. Once they know the IP address, they know where the server exists in the real world.

An organization, Tor, developed a unique browser that does not use IP addresses. Thus, users’ computers and websites do not use IP addresses as they exchange information. Then the computers can encrypt all data, so no one intercepting a communication can decrypt it or at least not easily. Consequently, a user can remain anonymous as he browses the Internet. Tor becomes the critical software for accessing the hidden Internet.

A user can download Tor for Windows, Apple, Linux, and Android operating systems. The hyperlink is https://www.torproject.org/index.html.en. Designers use a modified version of Firefox that serves as a browser. Then users can use the browser to surf the Internet like a standard browser such as Internet Explorer, Chrome, Firefox, and Opera. If users take precautions, then they can remain anonymous.

I surfed the Internet and checked my IP address. One minute, my IP address placed me in the Netherlands. Then later, I was in Los Angeles, California. Subsequently, my IP address switched to Germany, and so on. I did find this annoying. When I visited Yahoo, the Welcome Screen was in Dutch. After I had returned, it was in English and then German because Yahoo and some websites personalize webpages depending on the user’s country. They use the IP address to determine the user’s location and country.

I found the technology cool, although the Internet speed crept at a slow pace. I could be wrong in my interpretation, but the metaphor of the mailman still works here. How does a mailman know which house to deliver the mail if he has a letter with no send or return address? Communications bounce from router to router in cyberspace until it arrives at the correct router. As a router receives information, it only knows the previous router that sent the communication and the next router where it sends the communication. After a communication passes through several routers, the sender has no link to the receiver. Do you see the secrecy? How can a policeman or agent track down someone if he or she does not know who sent it, or who receives it?

This technology is legal, and users have legitimate reasons to use it. Some believe the U.S. Naval Research Laboratory sponsors this technology to allow the U.S. government to send communications secretly. Spies, military, law enforcement officers, and delegates can send communications secretly without terrorists and enemies intercepting messages. However, the Tor developers use this technology to defend against government surveillance. We know the NSA is eavesdropping on everyone’s communication. Journalists, activists, dissidents, and whistleblowers can use this technology to send secret information to others and have some protection from an autocratic government.

This technology is not foolproof. Government agents can use malware, hacks, and other techniques to reveal a user’s identity. For example, the FBI exploited a security hole in Firefox that copied malware onto a user’s computer. Malware read the user’s IP address and MAC address and relayed that information to the FBI headquarters in Virginia. IP address reveals the user’s location while the MAC address identifies the unique serial number of a computer’s network card. IP address leads the enforcement officers to a person’s location while the MAC identifies the user’s computer.

As you probably guessed, users can use this technology for illegal purposes. FBI arrested Ross William Ulbricht, the founder of Silk Road. He also uses the alias the Dread Pirate Roberts. Ross created a hidden website called Silk Road, where users and vendors bought and sold a variety of drugs. Ross Ulbricht earned commissions from the sales as buyers and vendors generated 60,000 hits per day. FBI claims he earned between $30 and $45 million in revenue annually, and the Department of Justice seized $3.6 million in Bitcoin – virtual money. Feds claimed Ross hired a hitman through the hidden Internet to murder both a blackmailer and witness. The URL for the Silk Road is:

http://silkroadvb5piz3r.onion/

If you type the URL into your browser, nothing will show. Your browser looks the URL up in the DNS database, searching for that IP address. However, this website does not exist in the DNS database, and your browser cannot connect to it. You would need to download the Tor browser and type the URL into that browser. Then the browser would connect to the Silk Road. Did you notice the word onion in the URL? Onion refers to the onion network, the hidden world of the Internet. When I typed the URL for Silk Road, I saw the message below:


I surfed this underworld to see what I could discover. I found a search engine, called Torch that indexes the hidden sites. When I clicked on the links, less than half the websites would display. I do not know if some vendors temporarily shut down their websites because the FBI seized Silk Road, or this technology is young and unreliable. For the real Internet, the DNS database organizes the Internet world, where the onion network is decentralized. Nevertheless, I became shocked at what several websites were selling. I could buy guns from Europe, marijuana from the Netherlands, buy counterfeit euros and U.S. dollars, order phony driver’s licenses and passports, or hire a hacker to create hell for my enemy. Then I saw another website where I could hire a hitman if the hacker could not create enough hell for my enemy. I listed the snapshots of these websites at the bottom of this blog. I could give you the website addresses, but they mean nothing in the real Internet world. Did you notice the currency? All vendors accept Bitcoin, but they send the products through regular mail or package delivery company.

Bitcoin constitutes virtual money or cryptocurrency. No central bank or government issues Bitcoins, and 11.75 million Bitcoins were circulating in the world in October 2013. Bitcoins’ supply continuously grows until 2140, stopping at 21 million Bitcoins. Cryptography plays a key role in Bitcoins. Every Bitcoin has a unique, encrypted number. A person opens an account or wallet and can buy Bitcoins from online vendors. A person can store his Bitcoins on his computer or cellphone or use an online wallet. Of course, a person does not show his identity. Then he or she can settle transactions by sending the other party his account information. As a buyer completes a transaction, software encrypts that person’s private key into the transaction along with the Bitcoin number. Ensuring people do not spend the same Bitcoin for multiple transactions a miner clears the transaction. Miner is not the proper terminology. It functions more as a bank or clearinghouse. A miner decrypts the transaction and records it in a ledger. Then it re-issues the Bitcoin to the seller.

Think of a Bitcoin where you send a check to the seller, and he deposits the check into his account. Once the bank receives the check, they change numbers in their ledger by deducting the check amount from the buyer’s account and adding it to the seller’s account. A miner can earn transaction fees and receives newly created Bitcoins by clearing transactions.

This sounds complicated, but do you remember the old days? Rich people could take a suitcase of cash to a Swiss bank and open an account. They get a numbered account that contains no personal information. Then they can use the account to settle transactions secretly. For example, a rich person pays a Congressman a bribe. Rich person contacts the Swiss bank and asks the bank to transfer the bribe amount from his bank account into the Congressman’s bank account. Rich person gives the banker a code (or private key for Bitcoin) to approve the transfer. Transaction remains secret because no one has revealed his or her identities. Consequently, Bitcoin brought the secrecy of banking to the regular people.

I did not think Bitcoins would succeed because the system has several flaws. First, people who deposit their savings into banks have deposit insurance. If their bank fails, FDIC guarantees the depositors will not lose their money up to $250,000. However, no government agency insures Bitcoin or protects people from losses. Second, hackers broke into online wallets and stole the Bitcoins. Since all transactions are electronic, they erased history. Third, the price of Bitcoin fluctuates greatly between $80 and $220. Refer to the chart below: For people to use and accept money, money must retain its value. Some people view Bitcoins as an investment, hoping to buy at a low price and sell for a high price. Finally, a limited number of sellers accept Bitcoins as payment. This was true until I had discovered the hidden world of the Internet, where Bitcoin has become the means of payments.


I became puzzled when the U.S. Department of Homeland Security shut down Mt Gox, the largest Bitcoin operator in the United States in May 2013. U.S. law requires all money exchangers to register with the Financial Crimes Enforcement Network. Feds even seized its bank accounts. I thought the U.S. government was petty because Mt Gox converted government-backed securities into Bitcoins and Mt Gox did not participate in illegal activities.

I thought Bitcoins had no future until I discovered how criminals can use two methods for Bitcoins. First, criminals can launder money using Bitcoins. For example, they buy Bitcoins in the United States utilizing money from illegal proceeds and spend or convert the Bitcoins in any country circumventing government controls on transferring money abroad. Russian government has banned Bitcoins for this reason. Second, criminals use Bitcoins on the hidden Internet. Feds believe that if they can shut down the money, they would kill the black markets operating in the hidden Internet. Feds have one severe problem. A person can use Bitcoins anywhere in the world. It sounds as if the U.S. government has started another war that it cannot win. (I find this amusing, but the sellers send the products through the mail or package delivery companies. I guess the U.S. government does not have enough agents to check all that mail).

I found this technology incredible as it opened a new world before my eyes. I became amazed after I had read the instructions to setup a hidden website. I could convert my laptop into a website server and use my Internet connection to allow users to connect to my website. (It appears most vendors pay a company to host their websites). Then I could submit my URL to Torch search engine so users could find me unless I did not want to be found. Instead, I could pass my URL by word of mouth if I were doing no good. Of course, I am not doing anything illegal, and I have no need for any of these products or services. So I have no real need for this technology unless the U.S. government starts banning books and restricting free speech of professors. Then I could use this technology.

Samples of websites I found after surfing the hidden Internet within fifteen minutes. I do not condone or recommend using these products and services.





Sunday, August 18, 2013

Is Edward Snowden a Traitor?

I became furious listening to John McCain, Arizona Senator and President Obama. They called Edward Snowden a traitor who needs to return to the United States to face justice. During the same speech, they stated the National Security Agency needs more transparency. Isn’t that what Edward Snowden did? He forced the NSA to become transparent by revealing the NSA surveillance programs. Despite our leaders, some claim Edward is a hero or a whistleblower because he revealed the United States and British governments are spying on their citizens.

U.S. government encourages whistle blowers to expose a company’s wrongdoing and crimes. Whistleblowers can sue the companies in courts and win a portion of federal money the company used improperly. President Abraham Lincoln encouraged whistle blowing during the Civil War to crack down on companies violating military contracts. Nevertheless, I thought lying to Congress constituted a crime, perjury, and Edward Snowden revealed the NSA lied to Congress about its activities. Consequently, a whistleblower can rat out a company that violates rules and regulations, but a person becomes a traitor if the person reveals a government’s illegal activities.

A government imposes two sets of laws. First, government imposes its laws, rules, and regulations on society that everyone must follow. Then government fines, penalizes, or imprisons any violators. Second, government follows its own rules, exempting itself from the rules that it forces upon everyone else. Government does not write these rules down, so the leaders can change their laws and rules at will. Unfortunately, a broke government will take shortcuts.

Edward Snowden did not profit or made money from revealing the NSA’s secrets. He was a computer specialist who worked for the NSA and CIA. He became concerned over the U.S. and British governments spying on their citizens. He thought President Obama would shift course, and end President Bush’s wars and reestablish civil rights. Instead, President Obama has expanded the military programs. United States military continues fighting in Afghanistan and Iraq since 2001 even though it killed Osama bin Laden and the top leaders of al-Qaeda. Subsequently, President Obama wants to intervene in Syria, Iran, and North Korea. U.S. military has stationed troops in the Philippines in 2013 to thwart China’s claim to the South China Sea. China claimed several rocks in the sea belong to China, granting the Chinese navy the right to patrol these rocks and protect its territory. Of course, these rocks stretch from the coast of Japan, along the Philippines’ coastline, and ends at Borneo. If China maintains control of these rocks, then China controls the whole South China Sea. U.S. government wants to thwart China. Being an economist, where in the hell does the United States government find money to finance these military operations across the world. We do not have the money!

Snowden’s father plans to challenge the criminal charges from the U.S. government. I wish him luck, but his dad is wasting his time. The U.S. government would hire a team of prosecutors and experts and spend millions of dollars to win the case at all costs. Even if Snowden’s father convinces a federal judge to dismiss the charges, Edward Snowden would experience the wrath of the U.S. federal government. The U.S. government does not play fairly. IRS would scrutinize his previous tax returns, searching for the tiniest mistakes. The State Department would study his passport application, ensuring Edward Snowden dotted every i and crossed every t. When the federal government wants to incarcerate someone, it will find a reason to do so. For example, the U.S. government accused George Norris of importing endangered orchids into the United States, but he never violated the law. Since the U.S. government would not apologize and spent millions investigating the case, the government agents scrutinized Norris’s import documents until the agents found enough paperwork mistakes to imprison him. Consequently, Edward Snowden has little chance of winning his fight against the U.S. federal government. U.S. federal government does not play fair.

Russia has granted Edward Snowden asylum to live in Russia for a year. U.S. political leaders are furious at Russia, and President Obama said the United States will “recalibrate” its relationship with Russia. Of course, President Obama would not launch the drones at Russia because Russia can fight back. The president saves the drones for countries that cannot fight back like Yemen and Pakistan. Since President Obama cannot punish Russia with the military, he will use international trade as a weapon. Now, two bullies can fight it out on the world’s schoolyard.

Why are people shocked the U.S. government spies on everyone? Many people suspected the U.S. government is spying on its citizens. Edward Snowden just provided the proof. As long as I can remember, the U.S. government was encroaching on liberties. After September 11, 2001, the encroachment accelerated while the federal, state, and county governments threw out the Bill of Rights. After the terroristic attacks on the United States in 2001, the Arizona State Police called anyone a terrorist who recited the Bill of Rights to law enforcement officers. The Bill of Rights, a fundamental document to the U.S. Constitution, restricts a government’s power. Thus, a terrorist recites the law to the police. I thought a terrorist creates chaos and disorder in a society by exploding bombs and murdering innocent people. I knew the federal, state, and local governments stopped enforcing the Bill of Rights long ago.

After September 11, 2001, President Bush and Congress passed laws that broadened the federal government’s powers. For example, the U.S. President can label any person a terrorist. Then the U.S. prosecutors can seize a person’s property and try him or her in a tribunal court with no jury trial, violating the Bill of Rights. Everyone thought President Obama would differ from his predecessors. Then he passed a law making it a felony for people to protest near Secret Service agents, even though President Obama had protested at Harvard University as a young man. That adage that parents tell their children– do as I say and not as I do. Unfortunately, leaders become more concerned about maintaining control than doing the right thing.

The U.S. government rules the world like an empire. Unfortunately, this story has happened already. The ancient Roman Empire dominated the world 2,000 years ago. The Roman Empire experienced four eerily similar trends to the United States. First, the emperors kept usurping power away from the local governments. The Roman government’s bureaucracies continued growing in size and scope. Third, the emperor financed a large army and navy. As a Roman colony or province broke away, the emperor sent its army to squash the rebellion. Finally, the emperors kept raising taxes over time to finance the expensive military and bureaucracies. Eventually, the emperor lost control as the Western Roman Empire collapsed around 500 AD. Many people were happy to see it go.

Is Edward Snowden a traitor or hero? He destroyed his life to leak the NSA’s surveillance program, and the U.S. government will hunt him down for the rest of his life. Only a hero risks his life for doing the right thing.

Tuesday, August 13, 2013

Something is Wrong with Microsoft

Microsoft has evolved into a monopoly that dominates software for the PC laptops and desktops. It derives its monopoly power from three sources: Operating system, office suite, and a technology standard. An operating system allows the user to use and manipulate the computer using icons and graphics. Microsoft’s estimated market share for operating systems comprised 93% of desktops and laptops in July 2013, dominated by Windows 7 and Windows XP. Computer users can install a free operating system, Linux, but Linux consistently has a 1% market share or less and remains the realm of computer specialists and geeks. Then Microsoft dominates the Office Software market. People use office software to create documents, spreadsheets, presentations, and design layouts. Microsoft’s office software dominated 92% of the market in 2013 even though Apache offers Open Office for free. Finally, Microsoft sets the technology standard. As people create and share their work with others, which computer files do they send? Most people have no trouble using Microsoft’s formats for Word, PowerPoint, and Excel. Would you risk sending your resume to an employer using an Open Office format?

Microsoft has developed into a monopoly. A monopoly does not have any competitors although Microsoft has competitors that offer free software while Microsoft charges hundreds of dollars for its operating system and office software. Monopolies can earn long-run profits. Forbes listed Microsoft’s founder, Bill Gates, as the world’s richest person until the 2008 Financial Crisis. Now, he consistently ranks second. Monopolies become plagued with several problems. First, a monopoly becomes bureaucratic and stops listening to its consumers. Second, monopolies adapt new technology slowly, and they treat their customers poorly. I have heard Microsoft does have good customer service in the United States.

Microsoft grew rapidly, and users loved Windows XP. Then Microsoft introduced Vista in 2006. Operating system hogged resources, was slow with long boot and shut down times. Moreover, Vista would not work on computers with certain hardware while some software crashed frequently; even Microsoft’s Office XP had glitches. I remember my Word or Excel program would crash several times in a row before it would work. Some functions never worked correctly such as the search function. Microsoft stuck many people with this crappy operating system. After I had bought a new laptop with Vista, I tried to return to Windows XP, but I was missing several critical drivers. Computer manufacturers never go backwards in designing drivers.

Microsoft realized its mistake and released Windows 7. However, most people may not realize Windows 7 is a fixed Vista. Vista turned into a catastrophe; Microsoft had to rename its operating system, moving away from the Vista name. Windows 7 used Aero introducing a sharp, refined look to the operating system with translucent windows and bars. Microsoft introduced the gadgets, the eye candy, to the right of the screen. (I noticed several features of Windows 7 resembled Apple’s OS). Finally, the operating system worked properly. Microsoft fixed its mistake. It would be nice if Microsoft let people stuck with Vista to update to Windows 7 for free.

A monopoly becomes out of touch with its customers. Microsoft forgot its mistakes and unleashed Windows 8 upon the world. Operating system moves backwards! Microsoft removed the start menu from the operating system. Users do not think about the start menu until Microsoft has eliminated it. Without a start menu, the desktop feels alien and useless because everything revolves around the start menu. I became lost, trying to navigate around the operating system. Then Windows 8 turned off Aero, so Windows 8 loses its sharp, refined features, such as transparency and gadgets.

Microsoft has forgotten its customers, or who uses their software. Users must toggle to a separate screen to access their programs. This screen resembles an ugly version of Android. Why copy Android? Microsoft wants to enter the tablet market, and Android has evolved into the premier operating system for tablets and smartphones. These devices use simple processors, where people can view pictures, read e-books and documents, watch videos, and play simple games. On the other hand, a person needs a full-fledged operating system to play games with heavy graphics, write and create documents, process image, etc. Simple processors cannot handle the complex tasks that a desktop or laptop provides.

Microsoft became out of touch with its consumers. First, Microsoft should never restrict consumers’ choices. As a user turns on the laptop or desktop for the first time, let the user choose if they want the traditional desktop with the start menu or the new Android-like menu screen. Windows 8 is better suited for tablets than desktops, even though Microsoft forces tablet software onto customers who use desktops and laptops. Second, Microsoft partially caved into the consumers. It released Windows 8.1 that places a start button on the lower left corner of the desktop that leads to the ugly Android-like screen. Microsoft refuses to return the traditional start menu. Third, Microsoft should improve the operating system if it wants people to use it. Fourth, Microsoft should never impose something new on users without testing its products on test groups. Microsoft has launched two duds upon the world: Vista and Windows 8.

People are leery of Microsoft as they avoid Microsoft products whenever they can. Perhaps Microsoft burned too many consumers with Vista and Windows 8. Managers at Microsoft see the declining PC sales while sales for tablets and smartphones show strong growth. Microsoft released the Surface tablet to compete with the Android tablets and Apple Ipads, but consumers are not buying Microsoft’s tablets. Then Microsoft released Windows Phone 8 for smartphones that three manufacturers use. Nokia offers a whole line of Lumia smartphones. Huawei sells one model while Samsung offers two models. Nevertheless, Microsoft’s sales remain weak. Investors have caught on, and Microsoft’s stock plunged 10% during one trading day in July 2013.

Microsoft embodies a monopoly that became out of touch with its markets and its consumers. Company has failed to introduce new products, and it pushes an operating system that people do not want. In my case, Vista forced me to look at the competitors. Since 2009, I always install a version of Linux on my system next to Windows. I tried Windows 8, but I will return to Windows 7 and wait for Windows 9.

Monday, July 8, 2013

Internet Accounts Hacked in Bangkok

This blog serves as a warning to any computer users, who use a public internet connection at coffee shops, restaurants, hotels, and libraries. Hackers can use clever methods to gain access to internet accounts. When I visited Bangkok, someone hacked into most of my accounts, except Skype and my bank accounts. The hacker gained access to my accounts for Hotmail, Yahoo, Facebook, Netflix, Amazon, Orbitz, Kohls, etc.

Hacking into internet accounts is extremely difficult, especially if users use strong passwords, such as "Conway@579#." The password is a mixture of numbers, upper and lower case letters, and symbols. Hackers are not likely to deduce the password correctly because it has too many variations. Thus, they steal passwords by relying on phishing and keyloggers. Phishing is a hacker tricks a user by directing the user to a fake webpage that looks genuine. The user enters his personal information, thinking he/she is at the correct website and sends the information to the hacker. The fake website then logs into the correct website , so the user suspects nothing is wrong. A keylogger is a hacker tricks the user into installing a program that records keystrokes from the keyboard. Then the program sends the keystrokes to the hacker. Of course, a relative, spouse, or friend could install a keylogger on the user's computer, joking around, stealing information, or creating mischief.

While in Bangkok, I inadvertently discovered another method hackers can use to gain control over internet accounts. Someone hacked into the hotel's computer network. The first day in the hotel, I checked my Hotmail, Facebook, Yahoo, and my private email accounts using the hotel's wi-fi and my personal laptop. When I returned later in the afternoon, someone changed the passwords to Hotmail, Facebook, and Yahoo. My private email accounts were fine because these accounts require an administrator password, and I never logged on as administrator. Thus, the hacker could not change this password, or at least, I thought he could not.

I recovered all my accounts immediately, using the hotel's wi-fi. Later towards evening, I checked some of my accounts again, and the hacker changed my passwords again. Consequently, I thought someone hacked into the wi-fi network, circumventing the signal's security. Usually people use WPA or WPA2 to encrypt their internet communications as their computers send information through the air. However, encryption fails if someone has hacked into the network.

I made a severe mistake. I should have left the hotel and gone to a computer club to recover my accounts. Instead, I used the public computers in the hotel's lounge that connected to the internet through a line connection. Thus, I recovered my accounts with no problems. I thought I was safe because I did not transmit anything through the air via wi-fi. Nevertheless, the hacker had access to the hotel's network including the computer I used in the lounge.

The next morning, I logged onto several email accounts, using the hotel's public computer, checking my emails. Everything was fine. Then an hour later, I started losing all my internet accounts, including my important account for managing my website. Although I never logged onto my personal website using my administrator password, the hacker found information in my Yahoo email account. The hacker changed the password to my personal website by doing a password reset – the user requests a new password by sending a confirmation email to Yahoo (that he controls, of course). Similarly, the hacker changed all my accounts for Kohl's, Orbitz, Netflix, Amazon, etc. by using the password reset.

I approached the hotel staff and complained to them. I explained someone has hacked into the hotel computer network, and he had changed my passwords. They thought I was crazy. Then I showed them my laptop, and I logged onto Facebook, where it showed someone changed my password by using my laptop or by accessing through the hotel's network. The staff refused to believe me as if I were wasting the staff's time with incredible stories.

After walking around, seeing the sights, I went to a computer club and created a new email account, using Hushmail. First, I recovered my Hotmail account and sent the reset link to Hushmail. Hotmail allows users to recover their email accounts by answering personal questions and sending a confirmation to a new email account. Some questions were subject lines of emails, folder names, and email contacts. Second, I reclaimed Facebook and Yahoo because I already linked those accounts to Hotmail. After recovering Yahoo, I reset all my passwords to my other accounts including the important account for managing my website.

What did the hacker gained by doing this? He did not delete anything or did not attempt to steal money from my bank accounts, but I did cancel my old debit cards and applied for new ones before I left the United State. I never updated the debit card information on most of the internet accounts. Luckily, I did not log onto my bank's website; otherwise, the hacker would have information to these accounts. Consequently, I am careful about checking internet accounts. I use the ATM for account balance inquiries and check one email account using a public wi-fi.

Unfortunately, I was an email hoarder and retained all my vital emails. The hacker read my emails and knew which websites to visit to reset and change my passwords. I still have a potential problem. If the hacker can remember enough account details, then he can recover accounts. After two weeks, all my internet accounts were fine, but I deleted emails that contained too much information to other internet accounts. I also used a different password for every internet account.

After some research, I deduced the method the hacker used. He used a program that identified my computer on the hotel network, and then he rerouted all communications between my computer and the network through his computer. I did notice the internet slowed down as he rerouted communications. Then the hacker saw all the websites I visited. He accessed the websites as if he were me, and he circumvented the encryption. Encryption only works when we send information onto the internet, sending pieces of information over time that travels through thousands of different channels randomly. An eavesdropper only would capture a nugget of encrypted information while the hacker has access to all information. Then he has access to your account and change the password. I was shocked by this method's ease because the programs are available freely in Linux, the choice for computer hackers. Thus, all you users out there, beware!