Smart Phones

E-Books from Your Public Library Now Available on Your Phone

 

With the proliferation of e-readers and e-reader apps for devices like the iPad, iPhone and Google Android smartphones, there are plenty of ways to download books wherever you are. Most of them require you to pay for them.

But what if you could check a book out from the library from wherever you were, straight to your phone? That’s been possible for audio books for a while, thanks to software from OverDrive.

read more

Standard
Cyberdefense and Information Assurance

The Next WikiLeaks – TwitterLeaks?

For those who think the whole WikiLeaks thing is awful, it’s time to suck it up. Because, in all honesty, WikiLeaks is just the beginning.

Tomorrow, I’ve got a column running in InternetEvolution that briefly discusses the problem. But in even briefer form, here it is:

DOD does not have full situational awareness of its networks. And DOD is at least thinking about this stuff–many organizations have even less control over information systems.

Audit trails are only good for closing the barn door after the cow is gone.

There are plenty of ways to exfiltrate data that look like normal system usage.  Hell, people can exfiltrate data using their iPod’s camera now, and worry about text indexing later.

Distributed social networks, URL shorteners, and plenty of places to hide data mean that the next leaker won’t need a WikiLeaks.org web address to get the information disseminated.

There will be more leaks because people will always have a reason to.

And there will always be someone in an adversarial role willing to host the content (thank you, Uruguay).

So, rather than crying over spilt cables, and pursuing investigations of the New York Times, perhaps people who care about security should start thinking about what security really means, and what information should be classified and what shouldn’t.  And be thankful that some Army specialist didn’t have access to a CD-R connected to a JWICS terminal.

Standard