Category Archives: Uncategorized

Posner — Why the market needs supervision

Here’s a book that will relegate Judge Posner to be adjudged as  a sure fire liberal:

In “Catastrophe: Risk and Response” (2004), he took up the problem of low-probability, high-impact events. The financial meltdown certainly qualifies. In this compact and bracingly lucid volume, he offers a simple, but not simplistic, primer: “a concise, constructive, jargon- and ­acronym-free, nontechnical, unsen­sational, light-on-anecdote, analytical examination of the major facets of the biggest U.S. economic disaster in my lifetime and that of most people living today.”

Leave a comment

Filed under Uncategorized

An admonition to those who created/sold financial derivatives

Actually, this admonition applies to all who say they can deliver a future full of wealth:

See, I am against those who prophesy lying dreams, says the Lord, and who tell them, and who lead my people astray by their lies and their recklessness, when I did not send them or appoint them;  so they do not profit this people at all, says the Lord.

Jer. 23:32

Leave a comment

Filed under Uncategorized

Stem Cell Policy – battles begin anew

President Obama is announcing his much anticipated change in stem cell policy.

The president’s action, which will carry out a campaign pledge, involves a long-controversial intersection of science and personal moral beliefs.  NYT

Monday’s announcement will not mean an immediate change in policy as the NIH will take several months to create the new regulations.  However, that does not mean that opponents will wait.

Georgia will be first to react as the state senate will take a bill (SB 169) pronounced “dead” for this session on March 5 to make it illegal to destroy any human embryo (no matter how created – with sperm and egg or via somatic nuclear cell transfer).

Leave a comment

Filed under stem cell, Uncategorized

Community Reaction to Adobe Security threat

SecurityFix describes the Adobe vs cybersec community discourse concerning a flaw that was discovered last year.  The organizations noted in this report represent a volunteer group (shadowserver), a proprietary intrusion prevention company (Sourcefire).  No government organizations mentioned regarding an event that touches many users across all organizational sectors.

There is a blog (VRT) that reports on findings from the Sourcefire research team.

1 Comment

Filed under cybersec organizations, cybersecurity, Uncategorized

Darwinian View to Cybersecurity

Interesting….

Take A Darwinian Approach To A Dangerous World: Ecologist Preaches ‘Natural’ Security For Homeland Defense

ScienceDaily (2009-02-23) — Global society is undergoing rapid political and socioeconomic changes, to which our security measures must adapt. Fortunately, we’re surrounded by millions of examples of security measures from nature that do just that.

Leave a comment

Filed under Uncategorized

CyberSecurity Updates

Univ Florida – breach – 97,000 id’s

Norton unveils product to help parents manage children’s access to the web.  Has the market done what Government could not?

Citing a Rochester Institute of Technology study that found a huge gap between the percentage of parents versus children who report no online supervision, Symantec says that Online Family is intended to bridge that gap by “fostering communication” between parents and their kids. According to the RIT study, only 7 percent of parents think their children have no online supervision, while 66 percent of kids think they go unsupervised.

Perhaps this tool will alleviate this columnist’s fears (tip to Parry Aftab ) regarding making wireless available throught the house:

It’s not a matter of trust. It’s about trying to be a responsible online parent by keeping cyber-dangers away from vulnerable kids.

However, no matter how weak the signal, Mayhem Manor will have to keep logs for two years of all who access the internet should these proposals become law— primarily for law enforcement to help protect children from predators, the authors say:

“While the Internet has generated many positive changes in the way we communicate and do business, its limitless nature offers anonymity that has opened the door to criminals looking to harm innocent children,” U.S. Sen. John Cornyn, a Texas Republican, said at a press conference on Thursday. “Keeping our children safe requires cooperation on the local, state, federal, and family level.”

However, it seems that the Recording Industry, Motion Picture Industry, and publishers are salivating over this prospect to provide them names, instead of John Does, to occupy the banners of their lawsuits:

So would individuals and companies bringing civil lawsuits, including the Recording Industry Association of America and other large copyright holders, many of which have lobbied for similar data retention laws in other countries.

When filing lawsuits over suspected online piracy, lawyers for the RIAA and other plaintiffs typically have an Internet Protocol address they hope to link with someone’s identity. But if the network operator doesn’t retain the logs, the lawsuit can be derailed.

Leave a comment

Filed under cybersecurity, policy tools, public failure, Uncategorized

Responses to Cyber Leap Year

CAIDA —

Leave a comment

Filed under Uncategorized

FAA Security Problems in Cyberspace

Despite efforts to secure the federal territory in cyber space, the FAA finds its admin server hacked — and employee records were compromised:

While the FAA was hit this time, it certainly is not alone. Uncle Sam’s main jobs database, USAJobs, which is run by Monster.com, was hacked last month.

The security of government computers has been deemed a “high-risk” area, by the Government Accountability Office. “Most agencies continue to experience significant deficiencies that jeopardize the confidentiality, integrity, and availability of their systems and information,” the GAO said last month. “For example, agencies did not consistently implement effective controls to prevent, limit, and detect unauthorized access or manage the configuration of network devices to prevent unauthorized access and ensure system integrity.”

Leave a comment

Filed under federal cyber security, Policy, Uncategorized

Remember when?

Oil refiners claimed that because regulations had prevented them from building needed refineries, they could not produce the gasoline necessary to keep up with demand (and thereby mollify the price increases)?

Well, now look at what the refiners are doing:

So now they are storing oil or selling it to traders, or retooling their refineries to produce less gasoline and more products with better profit margins, like heating oil, diesel or jet fuel.

NYT Where is Oil Going Now?

Doing so allows the manufacturer to manipulate supply, thus managing prices to a level which the producer’s desire to produce is appropriate.

How does the current policy structure, which has  a goal to produce energy at prices that support economic growth,  react?

Leave a comment

Filed under Uncategorized

Books to read

Adam Frank, The Constant Fire: Beyond the Science vs. Religion Debate – examines division of science and religion — background for public values/discourse and science policy

John Kenneth Gailbraith, The Great Crash of 1929 — a classic on the causes… appropriate for today’s debates on economic/finance policy

Leave a comment

Filed under Uncategorized