Certainly perfect, morally affirmative, and best use case for night vision known: The capture, detainment, trial and subsequent incarceration of truly evil homo sapiens preying on the Earth's beloved Elephants.
The Journal of Physical Security (JPS) has just released it's latest edition (August 11(1). JPS (ISSN 2157-8443) is hosted over at Right Brain Sekurity, LLC, and the editor is Roger G. Johnston, Ph.D., CPP. If you are into Security in any form, this Journal should draw your immediate interest. Free for the asking (just download it), I cannot stress how important the information contained therein can be to Information, Cyber and Physical Security Professionals.
A deeply (no pun intended) problematic physical security & connectivity planning scenario - specifically the lifespan of in-situ buried internetwork cabling (on, or near land) coupled with a paucity of outcome planning (in the Anthropocene Epoch...) is detailed by highly respected researcher - Paul Barford, Ph.D., a UW-Madison Professor of Computer Science resident at the University of Wisconsin-Madison. Along with Carol Barford, Director of the University of Wisconsin-Madison UW-Madison Center for Sustainability and the Global Environment and Ramakrishnan Durairajan, Assistant Professor, CIS at the University of Oregon) have produced a study detailing failure risks (essentially a call to action, as the buried cable timeline has shriveled from a one hundred year life-span to somewhere less-than-fifty years) of buried internetworked cabling. Superb work. And, here's Rebecca Hersher's reporting for NPR on both the study, and the issues. Enjoy.
'"Most of the damage that's going to be done in the next 100 years will be done sooner than later," says Barford, an authority on the "physical internet" -- the buried fiber optic cables, data centers, traffic exchanges and termination points that are the nerve centers, arteries and hubs of the vast global information network. "That surprised us. The expectation was that we'd have 50 years to plan for it. We don't have 50 years."1 - Paul Barford, Ph.D. in an press-release published at EurekaAlert! (a service of AAAS).
via Dave Lewis, well-known Information Security professional, founder of the security site Liquidmatrix Security Digest and co-host of the Liquidmatrix podcast and a contributing writer at the DUO Decipher blog, tells a fascinating story of a lashup of his Lunch an Autonomous Automobile and the Law of Unintended Consequences. Rather than spill the beans - travel, if you will - via our beloved Interwebs, to the Decipher blog, and luxuriate in the Tale Told by Mr. Lewis! Certainly Today's Security Must Read!
via Electrek, and originally published by The Hill - written by Miranda Green, comes this astonishing news of thrid-world-sounding-bu-not-likely (in reality, a so-called Cold War era legislative package permitting nationalization under the guise of national security) energy producing and utility provider company nationalization efforts as contemplated by the current Administration.
Interesting exposé of the current state of truth (or prevarication) within weather prediction applications available to the masses on their phones, in their vehicles, offices, and at home.
In this case, the messenger - anecdotally - is not particularly important, as the science can speak for itself. Emperically, we have found similarities (but not exactitude) in the data discussed.
Catalin Cimpanu writing at Bleepiing Computer tells the tale of the infamous single car problem within so-called smart intersections. The true nature of the flaws in the system may surprise you... Today's Must Read.
"In the US, the Department of Transportation (DOT) has started implementing a V2I system called Intelligent Traffic Signal System (I-SIG), already found on the streets of New York, Tampa (Florida), Cheyenne (Wyoming), Temple (Arizona), and Palo Alto (California). But the Michigan research team says the I-SIG system in its current default configuration is vulnerable to basic data spoofing attacks." - via Catalin Cimpanu writing at Bleepiing Computer