Cyber-Security Politics, Business, Ethics…

02 China, 03 Economy, 07 Other Atrocities, 10 Security, Advanced Cyber/IO, Commerce, Commercial Intelligence, Computer/online security, Corruption, Cyberscams, malware, spam, Government, InfoOps (IO), Mobile, Politics of Science & Science of Politics, Technologies
DefDog Recommends....

Is it just me, or does it appear that we're okay with selling our cyber-soul to China (and Russia), as long as we can also blow tens of billions on US firms pretending to do cyber-security?

Report: Despite status as U.S. security threat, China's Huawei partnering with Symantec

East-Asia-Intel.com, April 27, 2011

The Chinese telecom giant Huawei Technologies, which has been linked to the Chinese military, is working with the U.S. software security giant Symantec, which is engaged in securing hundreds of thousands of U.S. computer systems against outside intrusions, according to a report last week in the Diplomat newsletter.

The report said “China and Russia are leveraging U.S. multinational corporations' economic requirements to accomplish strategic goals that could quite plausibly include covert technology transfer of intellectual property, access to source code for use in malware creation and backdoor access to critical infrastructure.”

Huawei was blocked from buying the U.S. telecom 3Leaf last year by the Committee on Foreign Investment in the United States (CFIUS) and also was blocked in 2008 from buying 3Com over security concerns. The U.S. National Security Agency also stepped in to dissuade AT&T from buying Huawei telephone equipment.

Despite those actions, Huawei formed a joint venture with Symantec in 2007 called Huawei Symantec Technologies Co. Ltd. (HS), the report said. Huawei is the majority partner with 51 percent ownership, with the entity being headquartered in Chengdu, China.

The report said a 2008 report identified HS as developing “China's first laboratory of attack and defense for networks and applications.”

The result is that Symantec is assisting China's cyber development of computer warfare capability.

The report was produced by cyber security expert Jeffrey Carr, author of Inside Cyber Warfare: Mapping the Cyber Underworld (O'Reilly, 2009).

Phi Beta Iota: The US Government compounds its lack of a strategic analytic model and the requisite integrity to actually pay attention to whatever findings might emerge, with an abysmal inattention to the most basic aspects of counter-intelligence, not just within government, but across the private sector, which does not actually take counter-intelligence seriously either.  Creating a Smart and Safe Nation is not difficult–it requires only a uniform commitment to intelligence and integrity across all boundaries.

After the Earthquakes….Volcanos

03 Environmental Degradation
DefDog Recommends....

More Natural Disasters, Mother Earth has finally had enough……

300 flee as Ecuador volcano hurls out huge rocks

‘The smallest blocks are that size of an automobile while the biggest reach the size of a truck'

Associated Press, 29 April 2011

QUITO, Ecuador — Ecuador's Tungurahua volcano hurled truck-sized pyroclastic boulders more than a mile Friday in a powerful eruption that prompted at least 300 people to flee their homes, authorities said.

Schools were closed for a third straight day as ash showered down on a dozen towns in the sparsely populated area surrounding the 16,480-foot (5,023-meter) volcano.

Thundering explosions could be heard miles from Tungurahua, which is on the Andes cordillera 84 miles (135 kilometers) southeast of Ecuador's capital, Quito.

Click on Image to Enlarge

A state Geophysics Institute scientist monitoring the volcano from a nearby observation post said by phone that incandescent boulders were landing up to 1.2 miles (2 kilometers) beneath crater level.

Read full article….

Phi Beta Iota: Meanwhile, in the USA an astonishing number of levees are at risk of breaking, interest is mounting on how earthquakes might change the landmass and flood large areas, and there still is no government actually doing holistic strategic analytics.

See Also:

Worth a Look: Book Reviews on Climate Change

Worth a Look: Book Reviews on Environmental Degradation (Other than Emissions)

USAF–From Gorgon Stare to Micro-Drone Puff

Corruption, Military
DefDog Recommends....

[Teeny Tiny Mega-Expensive] Drones Spray, Track the Unwilling in Air Force Plan

By Adam Rawnsley

WIRED, April 28, 2011  |

    Here’s how the U.S. Air Force wants to hunt the next generation of its enemies: A tiny drone sneaks up to a suspect, paints him with an unnoticed powder or goo that allows American forces to follow him everywhere he goes — until they train a missile on him.

    On Tuesday, the Air Force issued a call for help making a miniature drone that could covertly drop a mysterious and unspecified tracking “dust” onto people, allowing them to be tracked from a distance. The proposal says its useful for all kinds of random things, from identifying friendly forces and civilians to tracking wildlife. But the motive behind a covert drone tagger likely has less to do with sneaking up on spotted owls and more to do with painting a target on the backs of tomorrow’s terrorists.

    Rest of article….

    See Also:

    Journal: Gorgon Stare (All Eyes, No Brain)

    Reference: Gorgon Stare–USAF Goes Nuts (Again)

    MondoNet: Global Democratized Network

    Autonomous Internet
    Venessa Miemis

    Below from a team at Rutgers University focused on the same objectives as Next Net, but more structured.

    Story about them:

    Beyond the Internet: MondoNet, a global wireless mesh network

    By Stuart Corner
    iwire, Friday, 29 April 2011 16:07

    A team from Rutgers University is trying tocreate the next generation version of the Internet, dubbed MondoNet, based on a global mesh of wireless access points that would be resistant to surveillance and state censorship and control.

    10 Social Specifications for a Democratized Network

    1. Decentralized
    2. Universally Accessible
    3. Censor-Proof
    4. Surveillance-Proof
    5. Secure
    6. Scalable
    7. Permanent
    8. Fast (Enough)
    9. Independent
    10. Evolvable

    their vision is pretty much the same idea that's been discussed here… local community solutions first, then becoming regionally interconnected, then go global. then they point out a lot of projects that are being worked on… i think members from many of those groups are here……. and then they cover some of the legal and regulatory questions that have also been posed here….

    i'll reach out to them and see if they want to team up with anyone here already working on this stuff.

    here's their draft pdf

    Search: kucinich coalition reform

    Searches

    The results that came up are comprehensive and repeated below. The first was surprising but makes sense when read as an architectural solution  Huckabee-Kucinich or Ron Paul-Dennis Kucinich will probably never happen, but either would get us back on track.

    Review: Simple Government
    ON INTELLIGENCE: Open Letter to the President
    Reference: Steele at Huffington Post Updated
    Virtual President Announces Coalition Cabinet
    Review: The Book on Bush–How George W. (Mis)leads America

    See Also:

    Dennis Kucinich, Vice President for the Commonwealth–and Some Details
    Journal: Dennis Kucinich Introduces Monetary Reform
    Journal: Dean Breaks with Obama, Third Party Rumbles
    Michael Bloomberg, Vice President for Education, Intelligence, & Research — Creating a Smart Nation

    Reform Specifics:

    Seven Promises to America–Who Will Do This?
    Reference: Electoral Reform–1 Page 9 Points 2.2
    Graphic: Smart Nation Through Four Reforms
    Graphic: Four National Reforms
    “Four Reforms: Electoral, Intelligence, Governance, National Security”

    Event: 11-12 May Chicago, HR-XML Technical

    Uncategorized

    HR-XML Spring Technical Meeting
    When: May 11 – 12, 2011
    Where: Chicago, Illinois

    Register Today!

    Gain valuable insights into schema development and hear lessons learned from industry leaders.  You’ll pick up industry trends from a panel of industry analysts, and build a strong understanding of how the HR-XML standards relate to cloud computing.  Then an HR professional will take you through an HR-XML implementation case study.

    At the meeting’s breakout sessions, you’ll make the most of your time with other HR technology and business professionals, building and modifying schemas that matter the most to the success of your products. Then hear how the standards can shape your business’s future.

    For more information, visit the Technical Meeting event page or contact Nick Hawes at nickh@hr-xml.org.