Beware, Security Liability does roll down hill

In a working “risk” system, security liability would roll “downhill” to an accountable party. Who wrote the code? Who did the audit? Who certified the system as “secure? In my own work, I mention to my peers how everything has changed in today’s Converged Internet/Global Telecommunications world. Liability and accountability roll downhill. If something happens Read More

US Military “BOTNETs” UnConstitutional?

Are US Military “BOTNETs” Unconstitutional? Every other month we get someone in the US Military ranting about how “we need to go on the offensive,” “we need to build our own BOTNETs,” we need to be better than our enemies.” This expression of anxiety is understandable. It is an expression of frustration, where the people Read More

Reflections on “X.805” Certification?

While walking through E-mail, doing my morning [[SITREP]], and sipping coffee I was surprise to see a request from a peer asking about X.805 Certification info.  What is “X.805 Certification?” For those who have never run into [[X.805]], it is a [[ITU]] security reference model submitted by Lucent from their security practices team. As seen Read More

Understanding “DDOS”

In the operational security community, Distributed Denial of Service (DDOS) is the “gun” used in extortion. Extortion is a human crime – where one group (or individual) preys on another. We mitigate extortion through civic society’s rules (laws) and enforcement (justice system). This dual system of laws and enforcement is further reinforced with education – Read More

Highlights of Mobile World Congress 2009

With about 47,000 attendees to the exhibition and conference in Barcelona, Mobile World Congress was quite a vibrant experienced indeed. What was of particular interest to me, was the Internet revolution on mobile- finally! How bringing the Internet (and its related applications such as social networking) has brought a brave new frontier for the mobile Read More