Berto Jongman: The Chilling State of Cyber Affairs

The Chilling State of Cyber Affairs With all the attention pointed towards PRISM, another interesting publication was virtually overlooked. Earlier last month, a taskforce belonging to the US DoD’s Defense Science Board (DSB) released a final report titled “Resilient Military Systems and the Advanced Cyber Threat” [PDF], that reports on the findings of an 18-month …

Owl: Is US Military Waging Cyber-War for Monsanto Against GMO Activists? Or Are All “Activists” Now Considered “Terrorists?”

US Military’s Not So Secret War on anti-GMO Activists and Scientists Exposed?  Or a Simple Misunderstanding? “A highly concerning new investigative report from the largest daily newspaper in Germany alleges that Monsanto, the US Military and the US government have colluded to track and disrupt both anti-GMO activists and independent scientists who study the adverse …

Berto Jongman: 20 Years Late, Council on Foreign Relations Has a Stab at Thinking About Cyber + Cyber Meta-RECAP

Defending an Open, Global, Secure, and Resilient Internet Overview This CFR-sponsored Independent Task Force warns that “escalating attacks on countries, companies, and individuals, as well as pervasive criminal activity, threaten the security and safety of the Internet.” The number of “state-backed operations continues to rise, and future attacks will become more sophisticated and disruptive,” argues …

99% Android Devices Totally Open — How Long Before Open Source Security and Code Level Integrity Are Appreciated?

Mobile security startup Bluebox Security has unearthed a vulnerability in Android’s security model which it says means that the nearly 900 million Android phones released in the past four years could be exploited, or some 99% of Android devices. The vulnerability has apparently been around since Android v1.6 (Donut), and was disclosed by the firm to …

Berto Jongman: Security for the Internet of Things — Cars Can Be Hijacked and Used to Murder People — This Matters

Rethinking Security for the Internet of Things by Chris Clearfield Harvard Business Review, June 26, 2013 Cyber attacks, once primarily directed against networks to steal confidential information and wreak virtual havoc, have begun to expand and are now directly affecting the physical world. For example, the recent hacking of the Associated Press’s Twitter account by …