Buried Internetworking Infrastructure: Risky Business

Image Credit: TeleGeography
A deeply (no pun intended) problematic physical security & connectivity planning scenario – specifically the lifespan of in-situ buried internetwork cabling (on, or near land) coupled with a paucity of outcome planning … Continue reading Buried Internetworking Infrastructure: Risky Business

The End of Humanity, AI Style: Or How I Learned to Admire RAND

Edward Geist, Andrew J. Lohn, writing at the RAND Corporation, have crafted a fascinating report targeting the potential for Artifical Intelligence to increase the already signifcant possibily of thermonuclear warfare (otherwise known as into-the-fyin… Continue reading The End of Humanity, AI Style: Or How I Learned to Admire RAND

Sonic Weapon, The Deployment

Superbly crafted piece – by Emily Waltz, writing at the IEEE’s Spectrum Magazine – on the alleged sonic weapon deployed and implemented in Cuba, targeting lawful United States of America Department of State diplomats (and other countries career diplo… Continue reading Sonic Weapon, The Deployment

CMU/SEI, Tracy Cassidy’s ‘Technical Detection of Intended Violence: Workplace Violence as an Insider Threat’

Image via The CMU CERT Blog
Superbly researched deep dive within the Insider Threat realm, this time by Tracy Cassidy (Insider Threat Researcher at the CERT National Insider Threat Center. A Good and Necessary Read.
Permalink
The post CMU/SEI, Tracy C… Continue reading CMU/SEI, Tracy Cassidy’s ‘Technical Detection of Intended Violence: Workplace Violence as an Insider Threat’