Archive for the "Cybersecurity" Category

Sort by:

George Washington University creates Center for Cyber and Homeland Security

From the web:
January 12, 2015
The George Washington University establishes new GW Center for Cyber and Homeland Security

We can see the future battle order

Russian Imperial Fleet under attack at Port Arthur (February 1904)
It sounds like a stupid film.  Good riddance.
But someone — almost certainly North Koreans, probably with paid help — successfully attacked and digitally destroyed a leadin…

Hope, fear, and prospect theory

Photograph by Jennifer Whitney  for the New York Times Chris Bellavita hopes the QHSR  will advance homeland security.  I fear too few will engage the QHSR to produce a sufficient effect. (Chris, btw bases his hope on evidence from the first QHSR while I deploy mostly worry and cynicism.) Parents in Honduras, El Salvador, Guatemala, […]

Privacy is theft

News item: The Custom and Border Protection (CBP) official at Hartsfield–Jackson airport scanned Martin Bryant’s fingerprints. “What’s that little device you’ve got clipped on?” he asked. Bryant was entering the United States from the UK.  He was wearing a Narrative Clip.  The Clip is “a tiny camera that takes a photo of what’s in front of […]

Private-Public Cybersecurity Framework

Wednesday the White House “launched” the long-under-way Framework for Improving Critical Infrastructure Cybersecurity (41-page PDF).   A snow day has given me the chance to read it. You need to turn to someone else for a technically competent reading-between-the-lines.  I have no particular competence in cyber hermeneutics. Information Week reports, “Experts believe NIST’s voluntary Cybersecurity […]

The mitigation message

Cobb County elementary school children sleeping Tuesday night in the gym Last Tuesday my train pulled into Union Station, Washington DC, shortly before noon.  The station and surrounding city were unusually quiet.  The Federal Office of Personnel Management had given most of its employees liberal leave to stay home.   Most area schools followed this […]

The President’s remarks on signals intelligence

This is a cut-and-paste from the White House website of the President’s remarks given at the Department of Justice earlier today. The topic. as headlined by the White House, is “signals intelligence”. I have highlighted a few phrases in bold, toward the end of a long day and longer week. No particular insight is promised […]

American Blackout: National Geographic imagines a national power outage caused by a cyber attack

A National Geographic re-broadcast: American Blackout imagines the story of a national power failure in the United States caused by a cyberattack ? told in real time, over 10 days, by those who kept filming on cameras and phones. You’ll learn what it means to be absolutely powerless. Gritty, visceral and totally immersive, see what […]

Catastrophe: Should’a, Would’a, Could’a

“I should prefer Mozart. Mostly I listen to 70s hits.” “I should eat a hot breakfast, but usually have a powerbar instead.” “I should work-out three or four times a week, maybe I walk around the block twice.” Should has become moralistic.  It is typically used as a kind of anti-verb, ascribing — often anticipating […]

@Belden @Tofino tested by @DigitalBond: It works!

Recently, several ICS end users in the Middle East and Asia have been exposed to attacks directly on the control systems through firewalls that have been misconfigured, or not configured correctly, for Modbus and OPC data. These attacks have caused wee…