Tradecraft in the Long Tail

Fact: Chris Anderson, WIRED editor in chief and author of the Internet-era classic book “The Long Tail,” also runs a couple of Ning social networks focusing on what the intelligence community would call IMINT, or imagery intelligence – specifically DIY Drones, “a site for all things about amateur Unmanned Aerial Vehicles (UAVs): How-to’s, videos, discussion and more,” and PictEarth, “a Social Network used to collect, link and geotag RC, UAV/UAS or Kite derived Earth imagery for use in 3D Globe Programs including Google Earth, Virtual Earth, World Wind and ArcGIS Explorer.”

Analysis:  With these sites, Chris Anderson is promoting what he calls “Crowdsourced Aerial Imagery.”  In the mission statement for DIY Drones, he writes that “Reasons to make your own UAV range from a fun technical challenge, student contests, aerial photography and mapping (what we call “GeoCrawling”), and scientific sensing. We are primarily interested in civilian, not military, UAV uses here.” (Emphasis is in the original.)

Let’s presume that individual DoD or intelligence-agency personnel have an interest in such issues, and maybe even in spending their personal time by keeping current and following the crowd’s interest in such topics, by participating in these new social networks.  One can then assume that others from foreign intelligence might have some interest in tracking those very IC personnel, by observing their activities within social networks (and not just Ning ones).  No spectacular logic needed for that.

The CIA has had some challenges in understanding their field presence within the Long Tail. 

Continue reading

Web Security and New Media in Politics

FACT: The Obama presidential campaign has been lauded for innovative uses of the Web and social media, particularly for fundraising and volunteer recruitment.  But as PC World has just reported, “Two months after their Web site was hacked, the organizers of Barack Obama’s presidential campaign are looking for a network security expert to help lock down their Web site…. Security experts said this is the first time they can remember seeing a Web security job advertised for a political campaign.”

ANALYSIS:  I wrote before about my experience in 1994-95 helping build one of the Internet’s first political campaign websites – I designed the content and wrote much of it, for Mayor Frank Jordan of San Francisco.  (The pages were literally built and posted by mayoral son Thomas Jordan, by the way, who was then a college student at UC-Berkeley; he went on to great things at Pixar.)   At the time, with such a simple site, we didn’t have to worry much about security – or so we thought, and luckily the worst scandal in those early years involved domain-squatting by certain rival campaigns.

As PC World points out, though, “Obama’s Web site, built by Facebook cofounder Chris Hughes, has been the model of Web 2.0 campaigning, using social-networking techniques to raise funds and build a broad base of active, Internet-savvy supporters. But security experts have long warned that powerful Web site features also open new avenues for attack.”

Continue reading

Tempted to “Skimp” on IT Security?

FACT: According to a study presented at last week’s annual RSA Conference on cyber security, by Palo Alto Networks CTO Nir Zuk, “Users are routinely, and fairly easily, circumventing corporate security controls. And that is because traditional firewall technology was not meant to grapple with the diversity of Internet applications of recent years.”

ANALYSIS: Security has been an even hotter topic than usual for the past month, what with new national-level attention to cyber security and, for Microsoft, a culmination of sorts of various strands of effort into our new “End to End Trust” initiative.  My boss, Jim Simon, attended the RSA Conference in San Francisco, with his boss, Craig Mundie, Microsoft’s Chief Research and Strategy Officer.  Craig laid out Microsoft’s “End-to-End Trust” vision, designed to provide users more control over online and enterprise systems.  His keynote was widely covered (even by offbeat security blogs, like RiskBloggers.com) so I don’t need to rehash it.

Nir Zuk’s presentation was interesting – and not just because he’s one of the true pioneers of firewall technology.  He really understands secure enterprise environments, something I’m talking about increasingly with government organizations, who are learning the hard way the need to protect their data, apps, and computing platforms.  

Continue reading

%d bloggers like this: