Tuesday, April 15, 2014
Earlier today, the military commission heard argument from the defense in the 9/11 military commission alleging that the FBI sought to turn a member of the defense team for Ramzi bin al Shibh into a confidential informant. Counsel for all five 9/11 accused asked the military judge to conduct an inquiry into the potential conflict of interest created by this latest in a series of breaches of defense confidentiality.
"The FBI's ill-advised attempt to turn a member of the defense team against its own is disgraceful. We look forward to a full inquiry by Military Judge Pohl," said Lt Col Sterling R. Thomas, USAF, an experienced prosecutor who is now detailed to defend Ammar al Baluchi...
Monday, April 14, 2014
As technology developments continue to make the electric grid "smarter," many believe security–and particularly cyber security–has become an afterthought in many respects. What does this mean to those trying to keep the lights on? What kinds of threats face the grid today? What makes the grid unique from a critical infrastructure perspective? What are the regulatory and policy drivers behind the push to make the grid smarter and more secure? This discussion will attempt to answer these questions and shed light on the current state of smart grid developments and grid cyber security throughout North America...
Sunday, April 13, 2014
Thank you for the invitation and to the preceding speakers for their viewpoints and for the shared experience. With respect to this elephant, each of us is one of those twelve blind men.
We are at the knee of the curve for deployment of a different model of computation. We've had two decades where, in round numbers, laboratories gave us twice the computing for constant dollars every 18 months, twice the disk drive storage capacity for constant dollars every 12 months, and twice the network speed for constant dollars every 9 months. That is two orders of magnitude in computes per decade, three for storage, and four for transmission. In constant dollar terms, we have massively enlarged the stored data available per compute cycle, yet that data is more mobile in the aggregate than when there was less of it. It is thus no wonder that cybercrime is data crime.
It is thus no wonder that the advanced persistent threat is the targeted effort to obtain, change, or deny information by means that are "difficult to discover, difficult to remove, and difficult to attribute."[DG]
Yet, as we all know, laboratory results filter out into commercial off the shelf products at rates controlled by the market power of existing players -- just because it can be done in the laboratory doesn't mean that you can buy it today. So it has been with that triad of computation, storage, and transmission capacities. As Martin Hilbert's studies describe, in 1986 you could fill the world's total storage using the world's total bandwidth in two days. Today, it would take 150 days of the world's total bandwidth to fill the world's total storage, and the measured curve between 1986 and today is all but perfectly exponential.[MH]...