Category: security | 保衛 | 정보 보안 | 情報セキュリティー

According to Wikipedia security can be defined:

Security is protection from, or resilience against, potential harm (or other unwanted coercive change) caused by others, by restraining the freedom of others to act. Beneficiaries (technically referents) of security may be of persons and social groups, objects and institutions, ecosystems or any other entity or phenomenon vulnerable to unwanted change. Security mostly refers to protection from hostile forces, but it has a wide range of other senses: for example, as the absence of harm (e.g. freedom from want); as the presence of an essential good (e.g. food security); as resilience against potential damage or harm (e.g. secure foundations); as secrecy (e.g. a secure telephone line); as containment (e.g. a secure room or cell); and as a state of mind (e.g. emotional security).

Back when I started writing this blog, hacking was something that was done against ‘the man’, usually as a political statement. Now breaches are part of organised crime’s day to day operations. The Chinese government so thoroughly hacked Nortel that all its intellectual property was stolen along with commercial secrets like bids and client lists. The result was the firm went bankrupt. Russian ransomware shuts down hospitals across Ireland. North Korean government sanctioned hackers robbed 50 million dollars from the central bank of Bangladesh and laundered it in association with Chinese organised crime.

Now it has spilled into the real world with Chinese covert actions, Russian contractors in the developing world and hybrid warfare being waged across central Europe and the middle east.

  • Seabasing

    In a tale of fact imitating fiction the US Navy is looking at ways to support the military in future conflicts by creating bases which allow ships to act as a combined space, which they call sea basing (or seabasing). The reason for this is in battles with the likes of China they may not have the luxury of a nearby land base like they have had in the Middle East, so they need to provide a flexible platform that will perform a similar function including floating docks and logistics.

    Being out at sea and operating in this way helps put the force out of range of enemy weapons as well, or what the US Marines describe as exploit the sea’s maneuver space.

    This includes ramps and sensors that would allow service men and equipment to exchanged from ship-to-ship with as much ease as moving around a base on land. Presumably this would have some sort of affect in terms of increasing the data network connections between ships to help them function better and more cohesively.
    140211-D-NI589-094
    The idea of seabasing echoes the carrier and lashed together boats of Neal Stephenson’s Snow Crash. Snow Crash is a classic work of cyberpunk fiction written in 1994. In the book refugees play a key part in the plot. The refugees have attached themselves to a privatised aircraft carrier owned by a media company that is heading to the US. More design related content here.

    More information
    The future of sea basing | Armed Forces Journal
    Sea Basing: concepts, issues and recommendations by Sam J. Tangredi (PDF)
    Pacific seabasing exercise will highlight new ships | Marine Corps Times
    Globalsecurity.org – Seabasing
    Figuring Out the Future of War in the Pacific — Or, What the Hell is Seabasing? | Vice News
    What is Seabasing | United States Marine Corps
    Seabasing Annual Report | United States Marine Corps

  • Hacknet + more things

    Hacknet

    Some Australian developers have made an immersive game about hacking that will be distributed on Steam when released. It’s called Hacknet and here’s the trailer.

    Key outtakes:

    • Misdirection: Matthews would allow surveillance teams to tail him, so that other colleagues would be tail free
    • Playing into stereotype and using them as a judo move; Warsaw Pact men tended to believe a woman’s place was in the home and didn’t think of Matthews’ wife as a potential operator
    • Interesting points on the problems that intelligence agencies have in understanding the motivations of ‘non state actors’ such as religiously motivated terrorists
    • During the cold war, Russians who spied for the US generally didn’t get to spend any money they made, as they would only survive 18 months on average
    • China’s approach is much more long-term ‘picking up grains of sand on the beach’
    • The most dangerous threats in his opinion: Iranian nuclear programme for the set of unknowns that it creates, China as a short, medium and long term threat, Russia as an ongoing but less serious threat than China and ‘non state actors’

    Matthews also took a New York Times journalist on the street to explain what surveillance infrastructure looked like now

    “You never try to elude or escape from surveillance,” he explained. “You want to lull them into thinking that you’re not operational on this particular day. You want to calm the beast.”

    Shadowing Jason Matthews, an Ex-Spy Whose Cover Identity Is Author | New York Times

    More posts on related areas here.

  • Hypeddit + more news

    Hypeddit

    Welcome To Hypeddit – brilliant selection of free tracks. Hypeddit from a content perspective is rather like an old school DJ pool, but online. I wonder how long Hypeddit can last in the face of the music labels copyright enforcement industrial complex

    Business

    Communities Dominate Brands: Matchmaker Matchmaker Make Me a Match – What if Microsoft sold Nokia back to Nokia – much as I would like to see a Jobsian style brand resurrection the market dynamics have moved on and Nokia has bigger issues to deal with. More wireless related posts here.

    Gadget

    It’s almost impossible to make money selling Android phones | Boy Genius Report – which shows the hard place where Microsoft, Nokia and BlackBerry have been. More wireless related posts here.

    Daring Fireball: Apple’s Share of Phone Handset Industry Profits Climbs to 92 Percent – John Gruber on Apple’s ‘profit monopoly’ in the smartphone sector

    Media

    The truth about blogging on Medium | TheNextWeb – why are we having to even have this discussion, Medium is the new Blogger or Typepad

    Online

    Hillary Clinton Takes Aim at Uber, Wall Street In First Economic Speech – it was inevitable the sharing economy was going to get political

    Security

    Privacy talk at DEF CON canceled under questionable circumstances | CSO Online – the information that’s out there points to a national security letter being served on the developers

    The Use of Encrypted, Coded and Secret Communications is an “Ancient Liberty” Protected by the United States Constitution – which puts the law at odds with the U.S. intelligence industrial complex

    Software

    What’s Weixin? A Short Guide to China’s Super App – What’s on Weibo – 100 million users in 400 days. What’s interesting is the way Weixin has managed to cram so much functionality in one app and not compromising on ease of use. This is in sharp contrast to the rise of app constellations