Infosecurity.US

Information Security & Occasional Forays Into Adjacent Realms

  • Web Log

Feet of Clay

August 22, 2014 by Marc Handelman in All is Information, Governmental Corruption, Government, Governance, Information Security, Racketeering, Identity Theft

Municipalities just as private corporations, engage in seemingly mad, long dashes for revenue; to what end? In this case, speeding and red light traffic infraction generated income is the goal, whilst minimizing law enforcement hands on in the process. Unfortunately, the corporate entity that facilitates that revenue stream with traffic recording devices and cameras apparently possess clear-cut, if you will, evidence of proverbial feet of clay...

 

August 22, 2014 /Marc Handelman
All is Information, Governmental Corruption, Government, Governance, Information Security, Racketeering, Identity Theft
Share

NIST, IAPP Privacy Workshop Slated →

August 19, 2014 by Marc Handelman in All is Information, Demise of Privacy, Freedom, Government, Information Sciences, Right to Privacy, US Constitution

Maybe, just maybe, there is scientific hope for the Right to Privacy. At once, ruminating upon the Declaration of Universal Human Rights*** and the United State's 4th Amendment to the Constitution** , hope doth, truly spring eternal...

The National Institute of Standards and Technology has announced the second co-sponsored Privacy Engineering Workshop, slated for the 15th and 16th of September, 2014 in San Jose, California. Co-sponsored with the International Association of Privacy Professionals, the Workshops mandate is a focus on engineering objectives (in draft) and the necessitated Risk Model (that model was a key output of the first Privacy Workshop).

Constitution of the United States, Amendment IV**
The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.
 
Universal Declaration of Human Rights, Article 12***
No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honour and reputation. Everyone has the right to the protection of the law against such interference or attacks.

 


 

August 19, 2014 /Marc Handelman
All is Information, Demise of Privacy, Freedom, Government, Information Sciences, Right to Privacy, US Constitution
Share

Art credit: Bio Engineering

MonsterMind

August 14, 2014 by Marc Handelman in National Security, All is Information, Cryptography, Intelligence, Computer Science, Government, Information Sciences, Information Security, Data Security

via the inimitable Kim Zetter, Senior Staff Writer at Wired, comes this staggeringly well crafted piece on the United States National Security Agency / Central Security Service's work to create a tool known as MonsterMind. The natural progeny of encompassing surveillance, is the capability to detect and mitigate malware in the wild. 
 

August 14, 2014 /Marc Handelman
National Security, All is Information, Cryptography, Intelligence, Computer Science, Government, Information Sciences, Information Security, Data Security
Share

United States Independence Day 2014

July 04, 2014 by Marc Handelman in All is Information, Government, National Holidays, National Security, Physical Security, Freedom

via the Library of Congress, United States of America

July 04, 2014 /Marc Handelman
All is Information, Government, National Holidays, National Security, Physical Security, Freedom
Share

BitCoin Security, Kaput

June 23, 2014 by Marc Handelman in Application Security, Cryptography, Data Security, Database Security, Government, Information Security, Mathematics

Fascinating screed, via ArsTechnica, by the inimitable Dan Goodin. In which, the well-lettered Mr. Goodin details the discovery of the paucity of BitCoin security. Surprised? Read more at Ars.

June 23, 2014 /Marc Handelman
Application Security, Cryptography, Data Security, Database Security, Government, Information Security, Mathematics
Share

Streeter, Bad Old Days...

June 17, 2014 by Marc Handelman in Government, Governmental Corruption, National Security, Sarcasm, Cagle Post

via the superb editorial cartoonery of Mark Streeter, at Cagle Post

June 17, 2014 /Marc Handelman
Government, Governmental Corruption, National Security, Sarcasm, Cagle Post
Share

Narcissim, On Display

June 17, 2014 by Marc Handelman in Cryptography, Data Security, Espionage, Government, Information Security, Infosec Policy, Intelligence, Physical Security, US Armed Forces

Well wrought opinion piece eyeballing the narcissism of one Edward Joseph "Ed" Snowden. Today's' Must Read.

June 17, 2014 /Marc Handelman
Cryptography, Data Security, Espionage, Government, Information Security, Infosec Policy, Intelligence, Physical Security, US Armed Forces
Share

Twitters CIA

June 11, 2014 by Marc Handelman in Government, Information Security, Intelligence, National Security, Espionage

via John Little's estimable Blogs of War, comes an apt dissection of Twitter Inc. (NYSE: TWTR) latest governmental agency member:The United States Central Intelligence Agency.

June 11, 2014 /Marc Handelman
Government, Information Security, Intelligence, National Security, Espionage
Share

Ricks, No Uniformed CS University?

June 10, 2014 by Marc Handelman in Government, US Armed Forces, Mathematics, Science, National Security, Education

Thomas Ricks' erudite take on the astonishing lack of Computer Science universities for the uniformed services here in the United States [and, interestingly, his advice on how to remediate the paucity of computer science educational opportunities for the uniformed services]. After all, there is a DoD Medical College, War Colleges, Officers Schools, Academies and the like, yet no focused computer science institutions...

June 10, 2014 /Marc Handelman
Government, US Armed Forces, Mathematics, Science, National Security, Education
Share

Cyber Security, Theory of Power

May 29, 2014 by Marc Handelman in Computation, Data Security, Government, Information Sciences, Information Security, National Security, Security, US Air Force, Web Security

In today's MustRead, we focus or attention on a fundamentally well-wrought thought piece targeting the notion of leverage and power, encapsulated within the cyber-security realm.

If you read anything today, read Billy Pope's tremendous screed and think on it, just a tad...

 

 

 

May 29, 2014 /Marc Handelman
Computation, Data Security, Government, Information Sciences, Information Security, National Security, Security, US Air Force, Web Security
Share

Engleharts' Eric

May 20, 2014 by Marc Handelman in Veterans, Government, Governmental Corruption

via Bob Englehart over at Cagle Post.

May 20, 2014 /Marc Handelman
Veterans, Government, Governmental Corruption
Share
  • Newer
  • Older
­
­