Archive for the "Cybersecurity" Category

Sort by:

Privacy is theft

News item: The Custom and Border Protection (CBP) official at Hartsfield–Jackson airport scanned Martin Bryant’s fingerprints. “What’s that little device you’ve got clipped on?” he asked. Bryant was entering the United States from the UK.  He was wearing a Narrative Clip.  The Clip is “a tiny camera that takes a photo of what’s in front of [...]

Private-Public Cybersecurity Framework

Wednesday the White House “launched” the long-under-way Framework for Improving Critical Infrastructure Cybersecurity (41-page PDF).   A snow day has given me the chance to read it. You need to turn to someone else for a technically competent reading-between-the-lines.  I have no particular competence in cyber hermeneutics. Information Week reports, “Experts believe NIST’s voluntary Cybersecurity [...]

The mitigation message

Cobb County elementary school children sleeping Tuesday night in the gym Last Tuesday my train pulled into Union Station, Washington DC, shortly before noon.  The station and surrounding city were unusually quiet.  The Federal Office of Personnel Management had given most of its employees liberal leave to stay home.   Most area schools followed this [...]

The President’s remarks on signals intelligence

This is a cut-and-paste from the White House website of the President’s remarks given at the Department of Justice earlier today. The topic. as headlined by the White House, is “signals intelligence”. I have highlighted a few phrases in bold, toward the end of a long day and longer week. No particular insight is promised [...]

American Blackout: National Geographic imagines a national power outage caused by a cyber attack

A National Geographic re-broadcast: American Blackout imagines the story of a national power failure in the United States caused by a cyberattack ? told in real time, over 10 days, by those who kept filming on cameras and phones. You’ll learn what it means to be absolutely powerless. Gritty, visceral and totally immersive, see what [...]

Catastrophe: Should’a, Would’a, Could’a

“I should prefer Mozart. Mostly I listen to 70s hits.” “I should eat a hot breakfast, but usually have a powerbar instead.” “I should work-out three or four times a week, maybe I walk around the block twice.” Should has become moralistic.  It is typically used as a kind of anti-verb, ascribing — often anticipating [...]

@Belden @Tofino tested by @DigitalBond: It works!

Recently, several ICS end users in the Middle East and Asia have been exposed to attacks directly on the control systems through firewalls that have been misconfigured, or not configured correctly, for Modbus and OPC data. These attacks have caused wee…

@Belden @Tofino tested by @DigitalBond: It works!

Recently, several ICS end users in the Middle East and Asia have been exposed to attacks directly on the control systems through firewalls that have been misconfigured, or not configured correctly, for Modbus and OPC data. These attacks have caused wee…

Back to the Future?

A friend and I were discussing some new security features in a well known brand of Programmable Logic Controller (PLC). The features are almost exactly what most IT security experts have been demanding for years. Unfortunately, they are also very complex, arcane, and difficult for a typical engineer to want to mess with. If it […]

The MIT Report on the Electric Grid: Control Systems Were Not Adequately Addressed

MIT issued the report, "The Future of the Electric Grid – An Interdisciplinary MIT Study." Chapter 9 is "Data Communications, Cybersecurity, and Information Privacy." According to the report, the U.S. should implement standards to…