Hidden but important truths from the presidential debate

Summary: The last debate was mostly chaff, like the campaign mostly entertaining demonstrations of the obvious. But there were moments revealing deep truths about our government and us. They were, of course, ignored. Here is the story of one such moment, a statement by Hillary Clinton that is rich with useful insights -- if we … Continue reading Hidden but important truths from the presidential debate

Advertisements

Remember the world-shaking effects of the March 2014 OPM hack!

Summary: On the second anniversary of the OPM hack let's compare the terrifying predictions with the results seen so far. Perhaps from this we will learn skepticism, and avoid national pants-wetting in response to the next clickbait terror barrage. A confident America might deter our foes more than the weak hysterics we've display today in … Continue reading Remember the world-shaking effects of the March 2014 OPM hack!

Fight the hysteria about the hack of OPM’s files. It’s probably not a big threat.

Summary:  We're told the OPM hack will have horrific consequences for America. Just as we have been told so many times since WWII, almost always falsely. I expect this too will prove to be a wet firecracker. Here are the reasons why, obvious things few journalists have told you. {1st of 2 posts today.} Contents … Continue reading Fight the hysteria about the hack of OPM’s files. It’s probably not a big threat.

Seeing behind the headlines about China’s attack, stealing the governments’ jewels

Summary:  China attacked! Playing a script from countless action-adventure movies, our political leaders and columnists gear up for bold headlines by screaming for war while they know nothing. It's America. But the info highway gives us information to see beyond the headlines and sort fact from fancy. Here's the latest news about the massive theft … Continue reading Seeing behind the headlines about China’s attack, stealing the governments’ jewels

How would Sun Tzu defend computer systems? Poorly. A new era needs new thinking.

Summary:  The theft of the Federal government's personnel data has brought information security back to the front pages. Along with the usual cries of "off with their heads" for the guilty and promises of Total Information Security in the future, as the signal to noise ratio in the media drops towards zero. To help restore … Continue reading How would Sun Tzu defend computer systems? Poorly. A new era needs new thinking.

About the theft of the Federal government’s personnel records: sorting fact from fiction

Summary: We're into the phase of the OPM records breach scandal where the US public policy crisis process predictably breaks down into finger pointing and aggressive guessing. Here is a brief on what little we know, and pointers on what we certainly don't know.  {2nd of 2 posts today.} Contents How was it done? What … Continue reading About the theft of the Federal government’s personnel records: sorting fact from fiction

What they mean when the government says “We do not have ‘direct’ access to your info”

Summary: Even the best journalists and national security experts have difficulty with technical stories like the recent NSA revelations. Today Marcus Ranum (bio) cuts through the government's lies, explaining the truth behind the NSA's tapping vital telephone and email communication systems. . When politicians and spokespeople choose their words with exquisite care, then it's time … Continue reading What they mean when the government says “We do not have ‘direct’ access to your info”