Robert Steele: Secrecy, Self-Restraint, & Democracy Done in By Elites and “Experts”

The times they are a’ changing.  I was asked to comment on  the recently published Reference: Protecting Sensitive “Open” Information and do so gladly.  The author of that work means well, and there is absolutely nothing wrong with the substance of what he expouses.  It is simply not reasonable nor feasible in context. I know …

TDL-4 Rules–Industrial Era Governments Helpless

New Botnet, Now 4.5 Million Machines Strong, is ‘Practically Indestructible’ Today in cyber threats: more than four million Windows PCs have been commandeered by a botnet that cybersecurity experts are calling nearly “indestructible.” Known as TDL-4 (it’s the fourth iteration of the malicious program), this particular little nuisance hides in places security software rarely checks …

Rules for Governing Cyber-Conflict

First Joint Russian-U.S. report on Cyber Conflict The EastWest Institute released the first joint Russian-American report aimed at defining the “rules of the road” for cyber conflict.  Prepared by a team of Russian and U.S. experts convened by EWI, Working Towards Rules for Governing Cyber Conflict: Rendering the Geneva and Hague Conventions in Cyberspace explores …

Journal: Analysis of STUXNET, Iran, and US Vulnerability

David Albright, Paul Brannan, and Christina Walrond 22 December 2010, Preliminary Assessment Did Stuxnet Take Out 1,000 Centrifuges at the Natanz Enrichment Plant? 10 pages Institute for Science and International Security (ISIS) Phi Beta Iota: US Supervisory Control and Data Acquisition (SCADA) computer systems are still on the Internet and still very vulnerable to internal …