This is my dumping ground for quotes and other stuff relating to the wonderful world of digital & communications.
Today, Google is arguably one of the most influential nonstate actors in international affairs… It tracks the global arms trade, spends millions creating crisis-alert tools to inform the public about looming natural disasters, monitors the spread of the flu, and acts as a global censor to protect American interests abroad. Google has even intervened into land disputes, one of the most fraught and universal security issues facing states today, siding with an indigenous group in the Brazilian Amazon to help the tribe document and post evidence about intrusions on its land through Google Earth.
In a new form of digital statecraft, Google’s executive chairman Eric Schmidt has traveled to North Korea against State Department wishes.
Niels Provos is a Google software engineer who spends his weekends forging Viking weaponry
Regina Dugan, the head of the Defense Advanced Research Projects Agency, delivered another clear signal about the direction U.S. defense technology is heading. “In the coming years we will focus an increasing portion of our cyber research on the investigation of offensive capabilities to address military-specific needs,” she said, announcing that the agency expected to expand cyber-security research from 8 percent of its budget to 12 percent.
32 of 57 vulnerabilities identified in this month’s massive update (by Microsoft) were reported by researchers at (Google)
“We could see virtual kidnappings – ransoming your ID for real money,” Schmidt said. “Rather than keeping captives in the jungle, groups like Farc [in Colombia] may prefer a virtual hostage. That’s how important our online ID is.”
Schmidt’s forecast is an extension of some existing trends. Some hackers have already used “ransomware” which takes over a user’s computer and encrypts its hard drive, locking them out – unless they make a payment to the hackers. And others have had their private lives revealed online after having their email accounts hacked.
In the two days following Mat’s Wired article, a quarter-million people signed up for two step authentication
In a given week, SMBs in Asia that use the cloud spend on average 57% less time managing security than SMBs that don’t use the cloud
Over the last three years, SMBs in Asia that use the cloud are 3x more likely to have decreased what they spend on managing security as a percentage of overall budget for information technology, compared to SMBs that do not use the cloud
When asked to choose from a drop down list of specific cloud benefits:
54% of SMBs said their business was more secure as a result of moving to the cloud
48% said they worried less about the threat of cyber-attack
47% said it was easier to integrate systems
IBM is running in partnership with police departments across the nation, crunching massive amounts of public information to try to predict where and when crimes will occur. The project, known as CRUSH — Criminal Reduction Utilizing Statistical History — has proven very effective in pilot programs in several American cities, including Memphis, Tennessee, where it been credited with reducing serious crimes by 30 percent and violent crimes by 15 percent
Corman believes that the spread of “hacktivism,” which first made mainstream headlines when Anonymous attacked the Church of Scientology in 2008, demonstrates that “those who can best wield this new magic are not nations. They’re not politicians. The youngest citizens of the Net don’t even recognize allegiance to a country or to a political party. Their allegiance is to a hive. In some ways this is very exciting. In other ways this is terrifying.” The terrifying part, for Corman, is that the Web gives individuals immense power without instilling the “compassion, humility, wisdom, or restraint to wield that power responsibly.