There is year-round recreational squid fishing from the Strait of Juan de Fuca to south Puget Sound. A nighttime sport that requires simple, inexpensive fishing tackle, squid fishing-or jigging-typically takes place on the many piers and docks throughout the Puget Sound region As usual, you can also use this squid post to talk about the … Read More “Friday Squid Blogging: Recreational Squid Fishing in Washington State” »
Month: December 2014
On 12/18 I’ll be part of a Co3 webinar where we examine incident-response trends of 2014 and look ahead to 2015. I tend not to do these, but this is an exception. Please sign up if you’re interested. Powered by WPeMatico
Remember last winter when President Obama called for an end to the NSA’s telephone metadata collection program? He didn’t actually call for an end to it; he just wanted it moved from an NSA database to some commercial database. (I still think this is a bad idea, and that having the companies store it is … Read More “Who Might Control Your Telephone Metadata” »
I don’t have a lot to say about the Sony hack, which seems to still be ongoing. I want to highlight a few points, though. At this point, the attacks seem to be a few hackers and not the North Korean government. (My guess is that it’s not an insider, either.) That we live in … Read More “Comments on the Sony Hack” »
This article is reporting that the demand for Chief Information Security Officers far exceeds supply: Sony and every other company that realizes the need for a strong, senior-level security officer are scrambling to find talent, said Kris Lovejoy, general manager of IBM’s security service and former IBM chief security officer. CISOs are “almost impossible to … Read More “Not Enough CISOs to Go Around” »
Interesting article: “How terrorism fears are transforming America’s public space.” I am reminded of my essay from four years ago: “Close the Washington Monument.” Powered by WPeMatico
The Intercept has published an article — based on the Snowden documents — about AURORAGOLD, an NSA surveillance operation against cell phone network operators and standards bodies worldwide. This is not a typical NSA surveillance operation where agents identify the bad guys and spy on them. This is an operation where the NSA spies on … Read More “NSA Hacking of Cell Phone Networks” »
Government surplus. Only $8,000 on eBay. Note that this device has been analyzed before. Powered by WPeMatico
Last week, we learned about a striking piece of malware called Regin that has been infecting computer networks worldwide since 2008. It’s more sophisticated than any known criminal malware, and everyone believes a government is behind it. No country has taken credit for Regin, but there’s substantial evidence that it was built and operated by … Read More “Corporate Abuse of Our Data” »
There has been an increase in squid poaching by North Korea out of Japanese territorial waters. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Powered by WPeMatico