Infosecurity.US

Information Security & Occasional Forays Into Adjacent Realms

  • Web Log

Sun Shooting →

October 21, 2015 by Marc Handelman in Navigation, All is Information, Mathematics

Andrea Peterson, writing at The Washington Post, reports on the increased education and utility of celestial navigation (as opposed to Computational and GPS navigation). Fascinating.

Steering a ship by the stars fell out of favor with the rise of radio wave and GPS navigation. In fact, the U.S. Naval Academy stopped teaching the skill nearly 20 years ago. But now this ancient navigation is making a comeback at the Annapolis school, thanks to cybersecurity fears, according to the Capital Gazette.

"We went away from celestial navigation because computers are great," Lt. Cmdr. Ryan Rogers, the deputy chairman of the academy's Department of Seamanship and Navigation, told the Gazette. "The problem is, there's no backup." - via Andrea Peterson reporting at The Washington Post

October 21, 2015 /Marc Handelman
Navigation, All is Information, Mathematics
Antarctica from Kalle Ljung.

"This movie was shot during our 20 days trip to Antarctica in December 2014 to January 2015. We started from Ushuaia in Argentina and went to Port Williams in Chile, rounded Cape Horn and crossed the Drake Passage towards the Melchior Islands in Antarctica. We spent 16 days in the Antarctic and got to experience the most amazing scenery and wildlife before we returned back to Ushuaia. Filmed with GoPro HERO3+ Black Edition and DJI Phantom 2, edited with Final Cut Pro X. Music from Music Bed with rights." via Kalle Ljung

Kalle Ljung's Astounding Antarctica

May 03, 2015 by Marc Handelman in All is Information, Natural Philosophy, Natural Science, Navigation, Science, Antarctica

Occasionally, a motion picture makes itself known hereabouts, with absolutely extraordinary visage of a land previously unsullied. This is such a picture. Enjoy!

May 03, 2015 /Marc Handelman
All is Information, Natural Philosophy, Natural Science, Navigation, Science, Antarctica

FAA Systems Found Vulnerable to Attack, GAO Reports

March 10, 2015 by Marc Handelman in All is Information, Common Sense, Compute Infrastructure, Electronics in Warfare, Government, Governance, Information Security, Navigation, Network Security, Persistent Threats, National Security, Transportation Security

News, via The Washington Post's Ashley Halsey III of significant information security issues at the Federal Aviation Agency. In this case, the Government Accountability Office has published a new report entitled "FAA Needs to Address Weaknesses in Air Traffic Control Systems", detailing significant shortcomings in the agency's capability to fend off electronic attacks.

The GAO report facts speak volumes: The FAA has failed to fully implement the planned, 'agency-wide' information security program. The failure to implement and deploy is a tell-tale of questionable competency within the Agency's information security management, whose duty and primary task is protecting the National Airspace System (aka NAS), of which, should be the core competency of the FAA.

Time for a change at the FAA? Probably, however, the issue of foot-dragging is deeply systemic at the Agency, witness the multi-year effort to implement the FAA's Next Generation Air Transportation System (aka NextGen). Any change will most likely be accomplished over decades, rather than single digit years... After all, thirteen years post-FISMA and the Agency has not yet implemented and deployed the mandated FISMA requirements, is, in a word - astonishing.

Now, focusing on the issues, we turn to the GAO discovered chllanges the FAA faces (of which, a statement from the GAO appears below, and is a direct excerpt from the published report. Read it, my fellow citizens, and weep.

"While the Federal Aviation Administration (FAA) has taken steps to protect its air traffic control systems from cyber-based and other threats, significant security control weaknesses remain, threatening the agency's ability to ensure the safe and uninterrupted operation of the national airspace system (NAS). These include weaknesses in controls intended to prevent, limit, and detect unauthorized access to computer resources, such as controls for protecting system boundaries, identifying and authenticating users, authorizing users to access systems, encrypting sensitive data, and auditing and monitoring activity on FAA's systems. Additionally, shortcomings in boundary protection controls between less-secure systems and the operational NAS environment increase the risk from these weaknesses.

FAA also did not fully implement its agency-wide information security program. As required by the Federal Information Security Management Act of 2002, federal agencies should implement a security program that provides a framework for implementing controls at the agency. However, FAA's implementation of its security program was incomplete. For example, it did not always sufficiently test security controls to determine that they were operating as intended; resolve identified security weaknesses in a timely fashion; or complete or adequately test plans for restoring system operations in the event of a disruption or disaster. Additionally, the group responsible for incident detection and response for NAS systems did not have sufficient access to security logs or network sensors on the operational network, limiting FAA's ability to detect and respond to security incidents affecting its mission-critical systems.

The weaknesses in FAA's security controls and implementation of its security program existed, in part, because FAA had not fully established an integrated, organization-wide approach to managing information security risk that is aligned with its mission. National Institute of Standards and Technology guidance calls for agencies to establish and implement a security governance structure, an executive-level risk management function, and a risk management strategy in order to manage risk to their systems and information. FAA has established a Cyber Security Steering Committee to provide an agency-wide risk management function. However, it has not fully established the governance structure and practices to ensure that its information security decisions are aligned with its mission. For example, it has not (1) clearly established roles and responsibilities for information security for the NAS or (2) updated its information security strategic plan to reflect significant changes in the NAS environment, such as increased reliance on computer networks.

Until FAA effectively implements security controls, establishes stronger agency-wide information security risk management processes, fully implements its NAS information security program, and ensures that remedial actions are addressed in a timely manner, the weaknesses GAO identified are likely to continue, placing the safe and uninterrupted operation of the nation's air traffic control system at increased and unnecessary risk." via the United States Government Accountablity Office Report "FAA Needs to Address Weaknesses in Air Traffic Control Systems"

March 10, 2015 /Marc Handelman
All is Information, Common Sense, Compute Infrastructure, Electronics in Warfare, Government, Governance, Information Security, Navigation, Network Security, Persistent Threats, National Security, Transportation Security

Where Time Comes From

November 17, 2014 by Marc Handelman in US Navy, Physical Sciences, Networks, Natural Science, Mathematics, All is Information, Time Computation, Navigation
November 17, 2014 /Marc Handelman
US Navy, Physical Sciences, Networks, Natural Science, Mathematics, All is Information, Time Computation, Navigation