jump to navigation

Anarchists, Communists, Extremists, and….Pirates?; “Democracy and the Devil you Know” May 16, 2012

Posted by Chris Mark in Laws and Leglslation, Politics.
Tags: , , , , , , ,
add a comment

As an American I am always fascinated when speaking with my fellow countrymen (and women) who are fixated on the idea that democracy is the only and best form of government for all people.  While those who believe in the democratic process certainly believe that free will, and giving a voice to people is a central theme to any form of government, there is always a tradeoff.  As a recent example, the Arab Spring brought about numerous changes in governments throughout the Middle East.  In Egypt, Hosni Mubarak was removed from power and Egypt began planning for “free and fair” elections.  While Mubarak was the ‘elected’ president for 29 years, the elections were questionable as the constitution did not allow for anyone to run against Mubarak.   Mubarak, while considered a corrupt and dictatorial leader by many, remained close with the United States who provided roughly $1.3 billion annually in aid to Egypt.  With Mubarak’s removal and a more ‘transparent, and open’ election, what has resulted?  In December 2011 the militant Muslim Brotherhood (who many consider a terrorist group) won a majority of the votes in the first election since Mubarak stepped down.  While many of my own friends applauded when Mubarak stepped down, they are now critical of the election of the Muslim Brotherhood.

In another, more humerous example on MSNBC.com, Germany’s upstart Pirate Party (you read that right) sent a strong message to the existing regime when it won 8% of the votes in a local election in the most populated state in Germany. (more…)

“Semper Fi?” – Marines Convicted of Selling Weapons to Gangs & China May 15, 2012

Posted by Chris Mark in News, terrorism, weapons and tactics.
Tags: , , , , , , , , ,
1 comment so far

As a former Marine, this is a difficult story for me to write. It does however highlight the importance of the concept of “trust but verify” within security.  As reported in the Jacksonville Daily News, a 2 year investigation by the Naval Criminal Investigation Service (NCIS) has uncovered an operation where 49 Marines and 21 civilians stole and then sold almost $2 million worth of weapons and equipment.  Many of the Marines were stationed at Camp Lejeune, NC and much of the gear was sold on eBay, Craigslist or in face to face meetings.    One of the Marines was a member of the elite Marines Special Operations Command and served with the 3rd Special Operations Battalion.  As stated in the article: “Sgt. Daniel Adam Reich, a former member of 3rd Marine Special Operations Battalion, was convicted of selling and attempting to sell military property and conspiracy. He was sentenced to 40 months in prison and a dishonorable discharge, MarSOC spokesman Maj. Jeff Landis said.” The investigation has since extended into the Air Force and Army. 

The point of this blog post is to show that even our military folks who take an oath of honor and are subject to very stiff penalties for violation of that oath are vulnerable to the same temptations as everyone.  It is not enough to blindly trust people to do the right thing.  While 99% may be honest and have integrity, there is always a small percentage that will give in to temptation.  This is why it is so critical to “trust but verify” in security.

“Wowee wow wow!”; The Costs Of CyberSecurity; Part II May 15, 2012

Posted by Chris Mark in cybersecurity, Industry News, InfoSec & Privacy.
Tags: , , , , , , ,
add a comment

In reading the Ponemon/Boomberg report on the costs of cybersecurity, I was shocked to see that companies would need to increase spending 700% to achieve 95% protection.  In reading closer, I was even more shocked to see that financial services companies would need to increase spending over 1,270% to achieve 95% protection. Of the 48 financial services firms surveyed the average annual security investment was $22.9 million.  To achieve the 95% goal, security investment would need to increase to $292.4 million per year.  You can see the results in an interactive chart here.

As stated in my previous post: “CyberSecurity Cold War; Spend Ourselves Into Oblivion”, it is obvious that companies cannot increase security investment 11 fold or even 7 fold.  There must be a better answer.

By the way..the “Wowee wow wow” is from Christopher Walken’ character The Continental 😉

“RSA Doesn’t Dine Alone” – China Suspected In Pipeline Attack May 13, 2012

Posted by Chris Mark in cybersecurity, InfoSec & Privacy, terrorism.
Tags: , , , , , , , , ,
add a comment

For background on this story, please read the previous post, as well as an earlier post titled: “Cyberattack underway against US Pipelines”. While the timing of this story is fortuitous for this author, the event is frightening.  According to the Christian Science Monitor “Those analyzing the cyberspies who are trying to infiltrate natural-gas pipeline companies have found similarities with an attack on a cybersecurity firm a year ago. At least one US government official has blamed China for that earlier attack.”  The referenced security firm is RSA.   Again quoting CSM: “Investigators hot on the trail of cyberspies trying to infiltrate the computer networks of US natural-gas pipeline companies say that the same spies were very likely involved in a major cyberespionage attack a year ago on RSA Inc., a cybersecurity company. And the RSA attack, testified the chief of the National Security Agency (NSA) before Congress recently, is tied to one nation: China.”

Anyone who doubt that the US is under attack by  China should read about the attacks against Dupont, RSA, Lockheed Martin, and more.

“Communist Chinese Cyber-Attacks, CyberEspionage and Theft of American Technology” May 13, 2012

Posted by Chris Mark in cybersecurity, Data Breach.
Tags: , , , , , , , , ,
1 comment so far

Since it is Mother’s day, I will not ramble on with inane commentary 😉  Instead, here is a link to the report of the same name as the blog title (too lazy to retype)…from the 112 Congress’ Congressional Hearing before the Subcommittee on Oversight and Investigations of the Committee of Foreign Affairs; House of Representatives.   It is very interesting and provides some valuable insight into IP theft.  Don’t forget to thank Mom today!