Monday, March 31, 2014

Cybersecurity, Cyberwar

Book Discussion Cybersecurity Cyberwar | Video | C-SPAN.org: "P.W. Singer talked about his book, Cybersecurity and Cyberwar: What Everyone Needs to Know, in which he discusses the topics of internet security and cyberwarfare. Mr. Singer co-authored the book with Allan Friedman. He spoke at the Stevens Institute of Technology in Hoboken, New Jersey" (video at link above)

more news below (web link on mobile below)



Monday, March 24, 2014

The CIA, Secret Arabists, Shaping of the Modern Middle East

Book Discussion Americas Great Game | Video | C-SPAN.org: "Hugh Wilford talked about his book, America’s Great Game: The CIA’s Secret Arabists and the Shaping of the Modern Middle East, in which he recounts the CIA’s early forays in the Middle East in the 1940s and 1950s. The operations were led by Theodore Roosevelt’s grandson, Kermit “Kim” Roosevelt, head of the region’s covert actions, who was assisted by his cousin Archie Roosevelt, chief of the Beirut Station. In his book, the author reports that these men’s actions, in conjunction with covert operations specialist Miles Copeland, would invariably lay the groundwork for foreign policy relations between the U.S. and the Middle East. Hugh Wilford spoke at Politics and Prose bookstore in Washington, D.C." (video at link above)

 more news below (web link on mobile below)



Monday, March 17, 2014

Sochi tech, Security

Disregard the fabrications of NBC --

Forget its hotels, Sochi’s tech has been up for the Olympic challenge | Ars Technica: “ . . . It is important that attendees understand communications while at the Games should not be considered private,” warned United States Computer Emergency Readiness Team, part of the Department of Homeland Security. Still, one should be careful about overestimating the Russian system’s capabilities. The recent sensationalized NBC story was swiftly debunked as far-fetched, and worrisome smartphone reboots,reported by a mobile security startup, could’ve been caused by hundreds of different reasons....."

more news below (web link on mobile below)



Monday, March 10, 2014

NSA asleep at the switch, Snowden Used Low-Cost Tool

NSA, intelligence? Or just an oxymoron?

Officials say Mr. Snowden used “web crawler” software. Moreover, Mr. Snowden succeeded nearly three years after the WikiLeaks disclosures, in which military and State Department files, of far less sensitivity, were taken using similar techniques. (source infra)

Snowden Used Low-Cost Tool to Best N.S.A. - NYTimes.com: " . . . the N.S.A.’s mission includes protecting the nation’s most sensitive military and intelligence computer systems from cyberattacks, especially the sophisticated attacks that emanate from Russia and China. Mr. Snowden’s “insider attack,” by contrast, was hardly sophisticated and should have been easily detected, investigators found...."

more news below (web link on mobile below)



Monday, March 3, 2014

Strengthening National Cybersecurity (video link)

Strengthening National Cybersecurity | Video | C-SPAN.org: "White House Cybersecurity Coordinator Michael Daniel spoke about the development and implementation of a national cybersecurity framework, specifically the strengthening of critical infrastructure cybersecurity, initiated by a 2013 executive order. Government and industry officials also participated in the discussion. USTelecom hosted the event. " (video at link above)

more news below (web link on mobile below)



Cybersecurity - Google News

Malware - Google News

National Security - Google News

"Security Threats" - Google News

Maritime security - Google News

The State of Security

TSA - Google News

Homeland Security - Google News