Friday, February 27, 2015
China's Neighbors Arm Up
Now Vietnam has beefed up its air force and navy by adding Russian frigates (6) submarines (6) and aircraft. The subs are particularly interesting since Vietnam didn't have them before and China has challenged them in areas of dispute where large surface navies would put Vietnam at a disadvantage. The submarines will keep China looking over its shoulder.
It's interesting too that these arms come from Russia. The Chinese are probably wondering how the $2 Billion came to be spent there, even though they know the Russians need the money. Russia arming China's neighbors might indicate they are not the good friends they seem to be at those press conferences.
Dennis F. Poindexter books at Amazon
Tuesday, February 24, 2015
Terrorist Sentencing
Can 85% of an Agency be Essential?
Monday, February 23, 2015
Political Terrorism
Over the years I have seen hundreds of reports about the potential attacks on U.S. agencies or centers made by people who were less than credible. Some of them had giggling kids in the background, making it easy to rule them out. Some of them were incredible in their structure, i.e. a nuclear bomb will be dropped on the Washington D.C. mall at 12 pm today. When this comes in every day from the same phone number, it is easy enough to pass it onto local police. I had one myself, sitting on a watch desk listening to a woman who was sure aliens had attacked cattle in her back yard and hung their carcasses in a tree. She mentioned that they had attacked her last week with a electrical charge that penetrated her brain. I thought there might be something to that one.
For those who might take this as a credible threat, you might read How big of a threat is Al-Shabaab to the United States? at CNN [http://edition.cnn.com/2015/02/22/opinion/bergen-al-shabaab-threat/index.html ] and watch the HBO special Terror at the Mall about the Al-Shahaab attack on a Nairobi mall. They rarely attack outside Somalia, and then only in their African neighbors where they have not always been very successful. The FBI doesn't seem to think it is very credible. The Department of Homeland Security doesn't think it is either. Yet the Director of Homeland said on TV yesterday that we "should be careful" before going to the mall. Self-serving as it is, this is political terror.
It is political terror, occasioned by the budget of Homeland coming up at a time when the House and Senate are about to debate funding for his agency. Homeland can find a threat any day that fits the description of an attack against somebody or something to make people think they should be careful. It is the credibility of the threat and the timing that make this particular one bureaucratic terrorism.
Friday, February 20, 2015
When Hackers Don't Go Quietly
In today's Wall Street Journal is an interesting article about the difficulty of getting hackers out, once they are in. [ Three Months Later, State Department Hasn’t Rooted Out Hackers ] Danny Yadron reports that after three months, the hackers still haven't been removed from the State Department's unclassified e-mail systems. Three months is a long time, and whatever excuses there may be for not getting this done, none will satisfy anyone who has ever had an incident like it. Only senior managers who are working against a solution could allow this kind of thing to go on that long.
Since the suspicion that the attack is coming from Russia, we don't need to wonder what the attackers would be interesting in. The Russians did the same thing in the Ukraine and several Eastern European countries, trying to find out who they could rely on and who they needed to isolate. This is out and out intelligence collection. The only difference is it is in a U.S. owned system that is supposed to be protected. Who is doing security of the State Department's computer systems? What is the damage assessment showing? Why can't the agency get this corrected? Why isn't Congress holding hearings on this right now? It might be nice to hear some of those senior people try to explain how they could allow this to go on for such a long time and not have the fortitude to do what it takes to correct the problem.
How did Peace Work for You?
Sunday, February 15, 2015
Cybersecurity Executive Order
Thursday, February 12, 2015
Industry Cybersecurity Plea to President Obama
Peace in Ukraine
Tuesday, February 10, 2015
Coordinating Cyber Security
Monday, February 9, 2015
Why is Healthcare on the Internet?
Saturday, February 7, 2015
Let me get reelected first
Friday, February 6, 2015
Stopping a Tank with MREs
China Hacking Again
Thursday, February 5, 2015
Women's Rights
Wednesday, February 4, 2015
A Doctor's Right to Privacy?
Stealing from Brokerage Houses
Banks and brokerages have wire transfer verification procedures and they get lax about following them when "they are sure" that e-mail came from you. Anyone who has ever had a Viagra ad from one of his best friends knows better than to trust e-mail that comes from the ether of cyberspace. Banks are relearning why they have those verfication procedures for amounts over a certain number. Training programs have to be effective and tested to make sure every broker understands why they have them and use them. It is amazing how easy it is to steal e-mails in bulk. But, even more amazing is the willingness of a few people, who should know better, accepting them as proof the are legitimate requests. It also does well to remind everyone that those brokerage accounts that just sit there for months at a time without being used, should be checked every week to be sure the money is still there.