Enabling Eureka via Citeability

The story of Archimedes resonates with everyone, because we all regularly feel that rush of excitement that he famously felt when discovering the principle of water displacement: “Eureka!” he shouted, “I have found it!”

Whether it’s car keys or the perfect birthday present for a loved one, we know that feeling. But how often do you feel like shouting “Eureka” when you’re surfing the web looking for a particular piece of government information?

Continue reading

Cyber Deterrence Symposium webcast

As I type this, I’m sitting in a seventh-floor conference area at George Washington University’s Elliott School of International Affairs, listening to the keynote speaker for the second of five panels today in the “Cyber Deterrence Symposium,” a joint production of INSA (the Intelligence and National Security Alliance), and the Homeland Security Policy Institute.

If you’re reading this on the day of the symposium (Monday November 2, 2009), you can tune in to the live webcast of the speakers and panels. It is a stellar line-up, see the roster below.

Continue reading

The Cyber Trough of Disillusionment

I’ll call the moment: the cyber security field is now past its giddy buzzword peak.

Gartner is well known for preparing “hype cycle” analysis of technology sectors, as in their recent publication of the 2009 “Hype Cycle for Social Software.” That report got a lot of attention on Twitter and in blogs, naturally; social medians are nothing if not self-reflective regarding their community. I thought an interesting take was by an IBM developer, who compared the 2008 version against the new one, measuring the changes in predicted “time to maturity” for individual technologies, and thereby coming up with something like a measure of acceleration. By that measure, individual blogging and social search made the most rapid gains.

But I notice something missing on the full list of 79 Gartner hype cycle reports: there’s not one about “cyber security.”

Continue reading

Web Security and New Media in Politics

FACT: The Obama presidential campaign has been lauded for innovative uses of the Web and social media, particularly for fundraising and volunteer recruitment.  But as PC World has just reported, “Two months after their Web site was hacked, the organizers of Barack Obama’s presidential campaign are looking for a network security expert to help lock down their Web site…. Security experts said this is the first time they can remember seeing a Web security job advertised for a political campaign.”

ANALYSIS:  I wrote before about my experience in 1994-95 helping build one of the Internet’s first political campaign websites – I designed the content and wrote much of it, for Mayor Frank Jordan of San Francisco.  (The pages were literally built and posted by mayoral son Thomas Jordan, by the way, who was then a college student at UC-Berkeley; he went on to great things at Pixar.)   At the time, with such a simple site, we didn’t have to worry much about security – or so we thought, and luckily the worst scandal in those early years involved domain-squatting by certain rival campaigns.

As PC World points out, though, “Obama’s Web site, built by Facebook cofounder Chris Hughes, has been the model of Web 2.0 campaigning, using social-networking techniques to raise funds and build a broad base of active, Internet-savvy supporters. But security experts have long warned that powerful Web site features also open new avenues for attack.”

Continue reading

Air Wars: the Air Force Takes Heat for its PR

FACT: A heated online debate is erupting about a particular photo posted online, and the brouhaha around it focuses on whether or not classified details are contained therein, thus revealing them. 

ANALYSIS: Given that others are even now writing extensively about this photo and its controversy I thought I would add a couple of thoughts.  Don’t bother blaming me for linking to the photo, by the way; given the attention and reposting/rehosting it has already received, the glare of publicity can only serve to prod better security practices. 

I expect to see parody versions on Flickr soon, with “Area 51” touches.

And so to my related thoughts: recently, an active-duty USAF officer and regular reader emailed me about one of my posts concerning Rod Beckstrom and the new National Cyber Security Center, which he had not previously heard of.  He wrote that in discussing it with a colleague, the response was “I thought the Air Force Cyber Command already had the mission to coordinate all cyber security efforts.”

Continue reading

%d bloggers like this: