Senator Nunn received no messages from me, but I wrote CIA email division 12/22/08 (near X-mas) in hopes of having the relevant report reviewed by others for timely proactive efforts: ________________________ All following subject to -SIC- ______________________________Last night I was up till the less than wee hours trying to make heads or tails of The CSIS commission on Cybersecurity. Link http://media.csis.org/isf.pdf for a copy.
UPDATED 03-21-09 near 2100hrs Central (standard or daylight? figure it OUT!) How many of you guys think I deliberately used the wrong link back when I published this? I certify I can PROVE I haven't changed the text of the very LINK! I have a copy of the report. I certify in disbelief that the report at the link enumerated above is NOT the one in question. I certify with trepidation that Wikileaks declined in encrypted conversation to make the report unrescindable electronically. Relevant .jgp to come.
Just like the Chinese constitution, my eyes glazed over at some of it. The salient information I got was that Sam Nunn and John Hamre are likely the ones who have the 'internet patriot act,' in a drawer ready to go. This is a conspiracy theory of mediocre acceptance, but I may have made the purchase. Below are observations I made at 0230 hrs; page 2. (document is indexed by page number.) 1st page is indexed by words regulate cyberspace paragraph (unpopular with me) AVOID; - prescriptive mandates - unnecessary costs - stifling innovation - over-reliance on market forces (low price?) Acquisitions Policy to improve security RECOMMEND; - by ONLY secure products and services (mandate?) - develop standards in partnership with industry (over reliance on market forces?) Authenticate digital identities paragraph mandate (ok by me but impractical) strong authentication (RSA) for ACCESS to critical infrastructure. (my suggestion - control USE, not access) certifying sender ID is hard. certifying source is (hashing) easy. To factor RSA I need four PCs. One to look thru 10 exponent 30 or so. One to hit mid-range for selectively chosen keys. One looking higher, one looking lower (sic - rule is check only up to square root.) Does this affect signing? I never really mastered digital sigs. Capabilities: educate to research train to competence R&D will build capabilities for cyberspace - I'd say arena, they said domain. Bush 43 Administration introduced Comprehensive National Cybersecurity Initiative. (CNCI) CSIS commission 'shared info' with CNCI and saw relevant changes. If there is substance ask for a list of them.
Wednesday, March 11, 2009
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment