The Shadowserver Foundation has been added to our righteous sites section of this site. From their website: The Shadowserver Foundation is an all volunteer watchdog group of security professionals that gather, track, and report on malware, botnet activity, and electronic fraud. It is the mission of the Shadowserver Foundation to improve the security of the Internet by raising awareness of the presence of compromised servers, malicious attackers, and the spread of malware.
The Shadowserver Foundation is responsible for:
Capturing and receiving malicious software, or information related to compromised devices
Disassembling, sandboxing, and analyzing viruses and trojans
30 Leading Experts from HAF/A2, OPNAV/N2/N6F2(ISR), Army G2/DCS-I, OUSD-I, USJFCOM, USAF 480th ISR Wing, AFWC, AFMC, NGA, USNORTHCOM, USAF 950th ELSG, Army EW Div., USAF Space AE, GAO, Northrop Grumman, Lockheed Martin, Boeing, Raytheon, General Dynamics, Microsoft, SAIC, Mercury, Booz Allen Hamilton examine:
* Government ISR Strategy, Plans, Roadmaps, Needs & Initiatives
* Developing/Deploying Integrated ISR (DCGS-based) Networks
* Platform and Payload Needs, Challenges and Capabilities
* Next-Generation Intelligence Collection, Analysis & Dissemination
* Developing the ISR Enterprise
About The Conference:
Dealing with the New Realities, Opportunities and Challenges in Global ISR. Continuing gaps in intelligence information sharing capabilities post 9/11, emerging requirements for new “ISR surges” in Afghan and Iraqi operations, ISR challenges associated with new counter-insurgency and counter-terrorism operations, increased roles for ISR assets across a broad range of new and evolving missions (space defense, maritime domain awareness, global surveillance/global strike, etc.) – these and many other critical issues are driving the ongoing reassessment of our current ISR forces.
Interview where she responds to the following questions/issues:
+ Social media and extreme views
+ How our ideas about privacy have to change
+ How failure to share information leads to more failure
+ Why previous attempts to share intelligence have failed
+ The way government adopts technology is broken
+ Can we crowdsource intelligence gathering?
We have eradicated the Malware that snuck in with a comment. It was a two-step process.
1) Delete all comments and then Close Comments.
2) Find the infected file that reactivated itself each time an unsecured computer visited Phi Beta Iota–evidently the robots are resident everywhere.
We should have reacted to Google's warning signals sooner. We could not replicate the issue here and that is why we were slow. In the process of eradicating the malware, Google's interactive help was both essential and easily available.
This was NOT, as some of you have suggested, an attack by the US Government unit that resides at Google. We are satisfied that this was a completely random attack by robot software that found a hole Word Press had not plugged, and nature took its course.
We continue to believe that both Google and the National Security Agency (NSA) should spend more time helping create hardware and software impervious to attack, and if they will not do it, we certainly hope Microsoft will wake up and smell the roses–the first totally reliable cloud-handheld environment is a win-win for all.
Training and qualifying practitioners, researchers and students in anti-corruption is increasingly requested, utterly needed, but still in its infancy. For many years now we developed a training program that fills this gap, joining the world of theory with the world of practice. An analysis of political, economic and organizational incentives allows participants to obtain a profound understanding of the forces that are at play.
Survey techniques and statistical analysis confront theory with data. Interactive tools such as games, poster presentations and case studies involve participants and make them acquainted with today's challenges. Prof. Johann Graf Lambsdorff and his team have spearheaded models for reform related to such issues as contract penalties, compliance systems, debarment, procurement, leniency and corporate liability. Participants are introduced into this body of research.
This international event continues to be offered on a pro bono basis. It is directed towards anti-corruption policymakers and practitioners, as well as towards graduate and post-graduate students and faculty in the social sciences.