via Anna Gorman writing at The Atlantic (along with Kaiser Health News) are sounding the klaxxon horns in warning of an astonishing fact in the United States: The influx of infectious diseases in the homeless populations of several states. This my friends, is a true and deadly emergency.
And then, there's this...
via Joseph De Avila, writing at The Wall Street Journal, details the particular needs of the New York City Police Department (NYPD), (very well known as New York City's Finest, which, of course, they are). In the context of this particular case, they are on to something quite important, indeed.
"Congress passed a law in 2018 authorizing federal law-enforcement officials to disable a drone, including shooting it down. But it would take additional federal legislation to give local law-enforcement agencies like the NYPD the same right." - via Joseph De Avila, writing at The Wall Street Journal
via Doug Cameron, reporting for The Wall Street Journal, comes a well-crafted artificial intelligence screed(paywall) that just might have a truly positive impact. Targeting wildfires in Califormia, the DoD will swing it's massive research and development apparatus targeting the devastation left by these fires. Now, if the Department can just develop software looking for incompetent utility companies that are the cause of fires like the 'Campfire'(paywall) wildfire (the deadliest fire in the State of Californias' history)...
via Greg Otto, Editor-in-Chief at CyberScoop, comes news of what many security researchers, analysts, engineers, developers and architects have feared (and in some cases obviously have known) for a considerable time: Hardcoded User IDs and Passwords in code running a range of building access controls exists to the detriment of all. Here's the Tenable post and a Medium post providing explanatory content on this troubling find... (Tenable security researchers are the discoverers of the incredible security incompetence of the manufacturer under scrutiny [I'll wager many other manufacturers are guilty of this practice, as well]).
"Researchers at the University of Washington have developed a cellphone app, called Second Chance, that uses sonar to monitor someone’s breathing rate and sense when an opioid overdose has occurred." - via Sarah McQuate, writing at the University of Washington's UW News
Certainly perfect, morally affirmative, and best use case for night vision known: The capture, detainment, trial and subsequent incarceration of truly evil homo sapiens preying on the Earth's beloved Elephants.
The Journal of Physical Security (JPS) has just released it's latest edition (August 11(1). JPS (ISSN 2157-8443) is hosted over at Right Brain Sekurity, LLC, and the editor is Roger G. Johnston, Ph.D., CPP. If you are into Security in any form, this Journal should draw your immediate interest. Free for the asking (just download it), I cannot stress how important the information contained therein can be to Information, Cyber and Physical Security Professionals.
A deeply (no pun intended) problematic physical security & connectivity planning scenario - specifically the lifespan of in-situ buried internetwork cabling (on, or near land) coupled with a paucity of outcome planning (in the Anthropocene Epoch...) is detailed by highly respected researcher - Paul Barford, Ph.D., a UW-Madison Professor of Computer Science resident at the University of Wisconsin-Madison. Along with Carol Barford, Director of the University of Wisconsin-Madison UW-Madison Center for Sustainability and the Global Environment and Ramakrishnan Durairajan, Assistant Professor, CIS at the University of Oregon) have produced a study detailing failure risks (essentially a call to action, as the buried cable timeline has shriveled from a one hundred year life-span to somewhere less-than-fifty years) of buried internetworked cabling. Superb work. And, here's Rebecca Hersher's reporting for NPR on both the study, and the issues. Enjoy.
'"Most of the damage that's going to be done in the next 100 years will be done sooner than later," says Barford, an authority on the "physical internet" -- the buried fiber optic cables, data centers, traffic exchanges and termination points that are the nerve centers, arteries and hubs of the vast global information network. "That surprised us. The expectation was that we'd have 50 years to plan for it. We don't have 50 years."1 - Paul Barford, Ph.D. in an press-release published at EurekaAlert! (a service of AAAS).
via Dave Lewis, well-known Information Security professional, founder of the security site Liquidmatrix Security Digest and co-host of the Liquidmatrix podcast and a contributing writer at the DUO Decipher blog, tells a fascinating story of a lashup of his Lunch an Autonomous Automobile and the Law of Unintended Consequences. Rather than spill the beans - travel, if you will - via our beloved Interwebs, to the Decipher blog, and luxuriate in the Tale Told by Mr. Lewis! Certainly Today's Security Must Read!