Winslow Wheeler: Purge the Generals to Fix the Army + Flag Corruption and Ineptitude RECAP

There is a devastating review of the quality of Army leadership at the new issue of Armed Forces Journal.  At Armed Forces Journal, it is an article by Army Lt. Col. Daniel Davis (“Purge the Generals”), and it merits the attention of anyone following military affairs, I believe.  If you think Army leadership is an island of …

Stephen E. Arnold: Open Source to Help Secure Cloud Storage

Open Source to Help Secure Cloud Storage Posted: 02 Aug 2013 04:44 PM PDT As technology advances quickly, so do security concerns. It stands to reason that new technologies open up new vulnerabilities. But open source is working to combat those challenges in an agile and cost-effective way. Read the latest on the topic in …

Owl: Putin Switches to Typewriters — Are All Computers Compromised?

Is Going Back to Typewriters the Answer? “In Russia, President Putin’s office just stopped using PC’s and switched to typewriters.  What do they know that we don’t? Perhaps it’s Intel NSA inside.” The NSA has been incredibly thorough in nailing down every possible way to tap into communications. Yet the one company’s name that hasn’t …

Marcus Aurelius: IBM Tries Something New – The Gist Mill

Worth a look. The Gist Mill – Strategic Social Media Analysis The ability to rapidly ingest, identify, monitor and exploit relationships, trends and collective thought evolving out of Internet-based social networks will be the most critical analytic capability requirement of the next decade.  The fact that these networks exist in plain sight, are vastly dense, …

99% Android Devices Totally Open — How Long Before Open Source Security and Code Level Integrity Are Appreciated?

Mobile security startup Bluebox Security has unearthed a vulnerability in Android’s security model which it says means that the nearly 900 million Android phones released in the past four years could be exploited, or some 99% of Android devices. The vulnerability has apparently been around since Android v1.6 (Donut), and was disclosed by the firm to …

Berto Jongman: Humans, Data, & Spies — What Manner, What Value, Integrity?

Data, meet spies: The unfinished state of Web crypto Many large Web companies have failed to adopt a decades-old encryption technology to safeguard confidential user communications. Google is a rare exception, and Facebook is about to follow suit. Declan McCullagh June 26, 2013 Revelations about the National Security Agency’s surveillance abilities have highlighted shortcomings in …

Berto Jongman: Security for the Internet of Things — Cars Can Be Hijacked and Used to Murder People — This Matters

Rethinking Security for the Internet of Things by Chris Clearfield Harvard Business Review, June 26, 2013 Cyber attacks, once primarily directed against networks to steal confidential information and wreak virtual havoc, have begun to expand and are now directly affecting the physical world. For example, the recent hacking of the Associated Press’s Twitter account by …