Event: 1-2 June London Cyber-Security Summit

Program as of March 2011 Phi Beta Iota: Those organizing, and those named as confirmed and invited, are the “creme de la creme” of the old regimes.   There isnt’ a hacker, autonomous internet, cloud, anonymous/transparency, open anything participant in the whole lot.  And the youth–by invitation only, as if the organizers have any legitimacy among …

Journal: Army Industrial-Era Network Security + Cyber-Security RECAP (Links to Past Posts)

Army Times article, second below, reports what the beginning of what I expect will be a major decline in functionality of Army computer systems.  While some sort of institutional response to the alleged Wikileaks traitor, Specialist Bradley Manning, is appropriate, I don’t think this is it.  This is a simplistic approach, the sort of thing …

Journal: Cyber-Security Etc. & Multinational Engagement

As attacks increase, U.S. struggles to recruit computer security experts Hackers break Amazon’s Kindle DRM–The great ebook ‘unswindle’ Peace, Justice and the Lord’s Resistance Army Weapons-carrying plane headed for Sri Lanka Phi Beta Iota: It has finally come to pass.  Cyber-security–like the Black Plague before it–and of course the ten high-level threats to humanity so …