Doug Bedell — July 1, 2015, 9:41 am

Grace as an Anti-Terrorism Strategy

images
In the context of the Charleston, S.C., killings, Philip J. Palin writes on Homeland Security Watch about grace as an anti-terrorism strategy. That is, as it’s been manifest in the forgiveness statements of the family members of the nine who were murdered.

“Since June 17,” Palin writes, “which was also the first night of Ramadan, have we encountered the most effective anti-terrorism strategy? (Something different than counter-terrorism.)…How many future terrorist actions have been prevented by the courageous integrity of the survivors?”

Doug Bedell — June 29, 2015, 8:50 am

Cars Were Stopped, but Not the Intruders Themselves

5239558_G
Barriers or other devices in a roadway can halt a car or truck, but the peril from intruders may not be over even so. Here’s an instance from a military post in Georgia where that happened after “tiger teeth” in the road disabled two vehicles, but shots were apparently fired anyway.

Be continually alert!

Doug Bedell — June 26, 2015, 10:30 am

Site Security Awards Posted

062315.911bd3b0-1880-4d28-a67f-53d2c23c879c_3
Government Security News has posted the winners and finalists in its 2012 Airport, Seaport and Border Security Awards. It’s an interesting rundown, but details won’t be available except in the “2015 Digital Yearbook of Airport, Seaport, Border Security Awards Winners that GSN will produce in the next 30 days.”

Doug Bedell — June 24, 2015, 11:21 am

Stresses for Organizations Improving Cyber Security

images
Security data breaches are being detected more quickly, but, notes Security Magazine, “The better all industries get at discovering data breaches, the faster they place themselves in the cross-hairs of the media. It is a definite Catch-22 for any organization to admit they’ve been breached, knowing they’ll become a victim of the media meat grinder.”

Ah, today’s digital world!

Doug Bedell — June 22, 2015, 12:18 pm

Anti-Terrorism Preparedness Requires Continual Vigilance

EP-305079997
Being effectively prepared for an incident of terrorism is largely a matter of focus: recognizing that such a moment could occur and being prepared, as far as possible, to ward it off. Unfortunately, the American Thinker blog has a good negative example of this: “A classic Friday-afternoon document dump…incriminating the Bill Clinton administration in crippling anti-terror efforts.”

The Clinton Administration, it’s charged, “had bankrupted the intelligence community and refused to let the CIA emphasize anti-terrorism over other major priorities in the late 1990s, leaving the agency stretched too thin in the days ahead of the 2001 terrorist attacks, former (CIA) Director George J. Tenet said in a 2005 document declassified Friday (June 12).”

(Photo – PRO Barrier’s Dr. Tom Potter recently in the Central Penn Business Journal)

Doug Bedell — June 19, 2015, 10:16 am

In the Internet Age, Don’t Presume Anything Is Secure

imgres
Bruce Schneier makes a great point: “One of the biggest conceptual problems we have is that something is believed secure until demonstrated otherwise. We need to reverse that: everything should be believed insecure until demonstrated otherwise.”

Schneier is commenting in the context of whether or not drug pumps at hospitals can be hacked. In these Internet-based times, don’t bet they can’t be.

Doug Bedell — June 17, 2015, 9:35 am

St. Louis Cardinals Investigated for Hacking the Houston Astros

images-2
Oh dear, say it isn’t so. But it is. The FBI and Justice Department are investigating the St. Louis Cardinals for allegedly hacking into the computer network of the Houston Astros “to steal closely guarded information about player personnel.” That’s the word from Homeland Security Watch, which quotes a New York Times story.

“Investigators,” says the Times, “have uncovered evidence that Cardinals officials broke into a network of the Houston Astros that housed special databases the team had built, according to law enforcement officials. Internal discussions about trades, proprietary statistics and scouting reports were compromised, the officials said.”

Doug Bedell — June 15, 2015, 10:26 am

Federal Employees Unnerved at Likely Theft of Their Records

imgres
Federal employees are understandably upset that their personnel data is likely in the hands of hackers in a massive security breach at the U.S. Office of Personnel Management (OPM).

“The OPM itself,” says Information Week’s Dark Reading blog, “has not disclosed what systems were affected and said it believes the intrusion occurred in December 2014. The agency has also been somewhat vague on the specifics of how the breach was discovered, merely noting that it became aware of the intrusion when implementing new security measures.”

Doug Bedell — June 12, 2015, 11:16 am

Computer Security Breaches Not Spotted Promptly

imgres
Something to ponder about our growing digital dependence. Here’s a Security magazine post advising that, while the situation is improving, it still takes weeks to months before businesses identify security threats that have penetrated their digital networks. Become familiar with Pricewaterhouse Coopers 2015 Global State of Information Security Survey. The world keeps moving along.

Doug Bedell — June 10, 2015, 9:49 am

Cyber Security Takes Sustained Attention

images
What’s involved in a cybersecurity assessment? Here, from Information Week’s Dark Reading blog, is one view of what it takes to insure that your information systems are secure from attack. It’s a tall order, but well worth paying attention to, or calling in a computer security specialist to assist.