jump to navigation

“Do as I say..not as I do”- UN Sends Restricted Computer Equipment to Iran and North Korea July 5, 2012

Posted by Chris Mark in News.
Tags: , , , , ,
add a comment

In yet another shocking revelation of questionable actions within the United Nations, Foxnews reports that the US State Department is now investigating the shipment of sensitive computer and other equipment to Iran and North Korea by way of an obscure UN department.  The United Nations has prohibitions against sending such sensitive equipment to both countries as the countries are trying to develop nuclear weapons.  According to the report, the World Intellectual Property Organization (WIPO), of which the US is a member, sent computers and other technology to both countries.  The US State department was unaware of the shipment and, according to a top US official,  it now appears that “”official at the U.N. agency, the Geneva-based World Intellectual Property Organization, or WIPO, “has not yet been fully open” to the inquiries…””

“Al Qeada’s Arab Spring”- Guest Post by Charlie Jacobs June 19, 2012

Posted by Chris Mark in Uncategorized.
Tags: , , , , , , ,
add a comment

Inspire (Fifth Edition)This is a guest post by Charlie Jacobs.  Charlie is completing his Master’s Dissertation and he had commented on a previous post. He has some interesting information and insight so I have invited him to publish a post. He has a brand new blog you can read here.  Enjoy!

In the Fifth Edition of its English-language online magazine released in March 2011 al-Qaeda in the Arabian Peninsula decided to discuss the Arab Spring. The main areas of discussion were the events of the Arab Spring, the Western view of ‘al-Qaeda’s Arab Spring’ and where the revolutions should head next.

The Tsumani of Change

“The friends of America and Israel are being mopped out one after the other.” Al-Qaeda’s view of the Arab Spring is viewed through the trans national prism of defeating the influence of its enemies within the Islamic world. The fall of Mubarak was historic for the region but was also “a day that exposed America’s two-faced policy on democracy.” (more…)

“The Rise of CyberEspionage” – Chris Mark Published in Homeland Security Network June 18, 2012

Posted by Chris Mark in cyberespionage, cybersecurity.
Tags: , , , , , , , , , , ,
add a comment

An article I wrote on the Rise of Cyber Espionage was picked up by the Homeland Security Network.  I must admit that the article title is not what was submitted but the article is one I wrote.  If you are interested, spin on over to the Homeland Security Network and read the article.  Any feedback would be appreciated..here is an excerpt:

“On April 15, 2011, the US Congressional Subcommittee on Oversight and Investigations conducted a hearing on Chinese cyber-espionage. The hearing revealed the US government’s awareness of Chinese cyberattacks. In describing the situation in her opening remarks, sub-committee chairperson Dana Rohrbacher astutely stated:

“[The]United States is under attack.”12 “The Communist Chinese Government has defined us as the enemy. It is buying, building and stealing whatever it takes to contain and destroy us. Again, the Chinese Government has defined us as the enemy.”

Of Payments, Privacy and Social Networks June 13, 2012

Posted by Heather Mark in Industry News, InfoSec & Privacy.
Tags: , , , , , ,
add a comment

By now, many of you have probably heard about the smartphone app creatively and aptly named “Girls Around Me.” For those that have not heard, it is essentially an application that aggregates the “check in” location data of women using Facebook, foursquare, and other social, location based services.  It then displays for the user the locations and names of “girls around” him (or her, I don’t think the app discriminates).  The app promises to “turn your town into a dating paradise.”  For privacy professionals, the app sparks an interesting debate.  Is privacy infringed if the person in question volunteers the information.  On one side of the argument are those that would say “no – if the user has volunteered information then privacy is not compromised by the application.”  The converse of that argument, however, is one that centers on a definition of privacy that hinges on the appropriate use of information.  If the user did not volunteer the information in an effort to join this “dating paradise” then privacy is certainly infringed.  Certainly, one can see that the application in the wrong hands has the potential for misuse.  But, what if we use the information for good, rather than evil? (more…)

“One Adam Twelve, One Adam Twelve…”: Security Theater & Doggies Doo June 11, 2012

Posted by Chris Mark in security theater.
Tags: , , , , ,
add a comment

Chris’ Dog BO

Today on Yahoo News Canada is a story in which it is claimed that Jerusalem such a problem with dog poop that they are enacting a program in which they will match offending doggy doo against a master DNA database.   According to a statement from the Jerusalem municipality: “The municipality pilot project calls for establishment of a database of dog DNA to allow us to reduce the soiling of pavements, parks and public spaces,”  In short, the city plans on DNA profiling 70-80% of the 11,000 dogs that live in Jerusalem and then, if there is a “pile” of DNA on the sidewalk, someone will pick it up, send to a lab, test it, and then the owner of the offending pooch will be fined $193.  This plan is so ridiculous that it does not merit much discussion but…for the sake of this blog let me use an example from a previous post. (more…)