Archives: April, 2013

Doug Bedell — April 29, 2013, 8:41 am

Smithsonian No Ancient in Vehicle Management

You don’t often hear of a museum managing its fleet of motor vehicles impressively to save gasoline and dollars. How many museums even have fleets? Well, Nextgov.com advises, the Smithsonian Institution does – 1,500 vehicles to go with facilities in more than 80 countries. And in 2006 it decided to manage them aggressively via a […]

Doug Bedell — April 26, 2013, 8:57 am

School Security Focused on Entry Points

After the Sandy Hook school tragedy, the Campus Safety magazine website notes that, though fail-safe school security isn’t likely possible, schools can indeed be made more secure by focusing on attainable measures that will keep them looking like schools, not prisons.  Better staff training and attentiveness to lessons learned top the list of actionable measures. […]

Doug Bedell — April 23, 2013, 4:04 pm

Passwords Matter; Use Them as Though That’s True. It Is.

Okay, passwords are a pain, granted. But here, from the prize-winning Naked Security blog, is an astounding bit of information on passwords: “55 percent of net users use the same password for most, if not all, websites…” At the same time, we’re seeing headlines of cybersecurity games being played at the expense of the U.S. […]

Doug Bedell — April 22, 2013, 7:51 am

Following the Bombings, via The Globe

For following the aftermath of the Boston bombings, and gaining insights into why and how they occurred, we’d recommend The Boston Globe’s website. The Globe’s an aggressive, respected paper in the hometown of the Boston Marathon and doubtless will be following the bombing saga closely – what led the Tsarnaev brothers to do what they […]

Doug Bedell — April 19, 2013, 9:37 am

Readiness: Boston Hasn’t Needed Military Assistance

Here’s an interesting observation, almost a meditation, by Wired’s Danger Room on the fact that the military hasn’t been a presence, hasn’t needed to be called in, to the Boston massacre scene. “The lack of a U.S. military presence in Boston isn’t by any means an indication of failure,” Wired says. “It means that civilian […]

Doug Bedell — April 17, 2013, 9:26 am

Terror or Terrorism? There’s a Difference

While the investigation of the horrific bombings at Monday’s Boston Marathon continues, it’s important to be clear about the terminology being used to describe the attacks. As of this writing, no one has claimed responsibility for the bombings. They were clearly terror, but they may not have been terrorism. What’s the difference? Wired magazine’s Danger […]

Doug Bedell — April 15, 2013, 12:08 pm

Facial IDs Coming to iPhones

Police, soldiers and likely, we’d imagine, security officers will soon be able to track physical features – eyes, facial features, voice and fingerprints – on iPhones, starting with the iPhone 4 and 4s. Wired.com reports that a California company, AOptix, is rolling out “a new hardware and app package that transforms an iPhone into a […]

Doug Bedell — April 12, 2013, 12:11 pm

The Internet: Vast, Helpful…and Haunted

Get acquainted with Homeland Security’s U.S.Computer Emergency Readiness Team (U.S. Cert) and pick up some basic computer security readiness tips as well. It’s helpful, indeed, (1) to “view the Internet as a novel, not a personal diary,” (2) Be careful what you put out there and (3) Realize that you can’t necessarily take it back. […]

Doug Bedell — April 10, 2013, 9:13 am

A Fireman Makes a Video

Homeland Security Watch (April 9) led us to a video made in the context of a class assignment by Colorado Fireman Jeff Cole. It’s called “No Do Overs,” and is the result of Jeff being asked to reflect on “My place in the homeland security project, and the place of the homeland security project in […]

Doug Bedell — April 8, 2013, 10:58 am

Promoting Cyber Security

The Heritage Foundation seems to be doing as much as anyone toward bringing about orderly procedures for maintaining the security and functionality of cyberspace. It has now issued a lobbying paper on the subject: “A Congressional Guide: Seven Steps to U.S. Security, Prosperity, and Freedom In Cyberspace.” Heritage divides cyber threats into three fairly obvious […]