• Facebook
  • Twitter
  • Plus

Security
Russian Armored Bears

In Philip Pullman’s popular 'His Dark Materials' series, there is a race of largely solitary armored bears who have a society based on the real-life island of Svalbard. They are known as the Panserbjorne, they guard their territories and consider honorable fighting as sacrosanct. They also have opposable thumbs, giving them the ability to manipulate complex objects as do humans, and they consider their armor, what can be considered their clothing, to be their souls.

Tor and the Bitcoin: An Exploration into Law Enforcement Surveillance Capability Online

In an age of security, surveillance, and Snowden, even civilians with nothing to hide may presuppose that they are under some form of surveillance from the government. The public assumption is simple, saying something as innocuous as “bombardier” might be a trigger word that could result in a wiretap without a warrant. While this may very well be the perception in the United States, thousands of criminal networks are still operating regardless of the increased reach of government surveillance. Drug dealers, human trafficking syndicates, prostitutes, and child pornographers are all able to sell, market, and distribute their services and wares openly online and through alternative forms of communication and mechanisms for transactions.

Cyber Quantifiable Restrictions: The Requirements to Generate Agreed Restrictions on the Use of Cyber Capabilities

As the complicated mess of the Ukraine crisis continues to unravel, global commentators have been eagerly suggesting that the escalatory nature of the conflict could lead to a “cyber war.” Although this may be an inflation of the reality, it calls to mind the human costs of such a scenario. Jarno Limnéll, Director of Cyber Security at McAfee, identifies that likely targets “could include ATM networks, e-commerce systems, energy grids, transit and road signals, air traffic control, and certainly military command lines.” In truth, Limnéll is right, but his flag of concern only touches the edge of the enormous hurt that could be felt by us all. The cyber assassin’s tool kit is simple enough to understand, but we should be weary of its ability, capability, flexibility and agility. It is this lethal cocktail of adjectives within the context of limiting damage that must be treated with agreed restrictions for the interest of human life and dignity.

Partnering for Cyber Resilience: Towards the Quantification of Cyber Threats

As technology increases in a 21st century marketplace, the ability to share products, ideas, and services increases. But so to do the threats and risk involved with utilizing a digital medium. Identifying and managing these cyber risks therefore, becomes imperative in ensuring the security of global business. With such an interconnected, 24/7 world, security cannot override the existing platforms of enterprise. Cyber security must be organic to the growth of business and international trade.

When the Internet Breeds Hate

“I’m looking you up, and when I find you, I’m going to rape you and remove your head. You are going to die and I am the one who is going to kill you. I promise you this.”

This message was sent in a series of tweets to journalist Amanda Hess, but the truth is women online receive messages similar to this every day. In nearly all cases, women are sent these messages simply for stating an opinion online that someone disagreed with.

States Who Cry Wolf

On 8 November last year, Iran’s supreme leader sent a Tweet. It read as follows: This barbaric, wolflike & infanticidal regime of #Israel which spares no crime has no cure but to be annihilated. 7/23/14 #HandsOffAlAqsa.

DARPA: A Glimpse Into the Future

The Defense Advanced Research Projects Agency (DARPA) has offered a glimpse into its Z-Man Program, which is currently testing a material that allows humans to scale walls with the aid of climbing paddles. The project was inspired by the biological properties of geckos, whose toes allow the animal to hang by a single toe from nearly any surface. In the future, U.S. warfighters will be able to scale any wall while carrying a full combat load.

Cybersecurity, the Internet of Things, and the Role of Government

With each advancing year, more novel information technology is brought online, simultaneously advancing societal capabilities and dependence on new and legacy systems in areas as diverse as healthcare, finance, entertainment, defense, and critical infrastructure. Despite unceasing news of cyber attacks and various exploits that appear to strike into the nervous system of modern society, many information technology companies continue their long pattern of outsourcing risk, since—it is thought—building technology with security first in mind may make it harder to bring to market or less profitable.

The War On Information: A Look at Efforts to Thwart Freedom of the Press

Getting the story out can be a dangerous enterprise. Journalists throughout the world go about their profession in a climate of repression and coercion, often risking their lives in the effort to inform, to get out a compelling video, the narrative, the testimony, the tweet. In some parts of the world, governments and radical groups make it their highest priority to prevent the spread of information and deny citizens the basic right to know.

What G20 Governments Should Know About Big Data

Big Data, the analysis of huge datasets using sophisticated algorithms, holds huge promise. One of the most-cited examples, Google Flu Trends predicts flu outbreaks based on the search terms from users in a given region. However, the quality of data used has been criticized as a key weaknesses of Big Data. The idea behind Big Data usage currently is that the datasets are so massive that the quality of the data does not matter. That assumption is now being challenged.

Page 1 of 11

[DIPLOMATIC COURIER]

Copyright 2006-2015 The Diplomatic Courier™. All rights reserved.
This material may not be published, broadcast, rewritten or redistributed without permission.

1660 L Street, NW | Washington, DC, 20036 | Privacy Policy | info@diplomaticourier.org
All contents ©2006 - 2015 diplomaticourier.com (Diplomatic Courier™). All rights reserved.