Along with death and taxes, two things appear inevitable. The first is that wireless connectivity will not only be built into everything we can imagine, but into everything we can't as well. The second is that those devices will have wholly inadequate security, if they have any security at all. Even with strong defenses, there is the likelihood that governmental agencies will gain covert access to IoT devices anyway.
Donald Trump’s escalating attacks on the press should alarm anyone who believes that a free press is essential to the maintenance of freedom and the avoidance of tyranny. That’s what the authors of the Constitution believed, a document Trump pledged on inauguration day to “preserve, protect, and defend.”
Trump’s accusations of falsehood in journalism are particularly dangerous because they invite those sympathetic to the president’s cause to accept his manufactured version of reality and reject accurately reported events and statements. This is a tactic from a very old playbook, and we don’t need to look very far back in history to see where that strategy can lead.
The drama of President Trump’s ban on immigration played out on multiple levels this past week; legal, as multiple courts weighed in, culminating in one granting an injunction that put the ban temporarily on hold; politically, as protesters clogged city streets at home and abroad; and factually, as the slap-dash way in which the order was implemented became increasingly clear. And then, of course, there were the absurdist moments, as when Trump tweeted about the “so called judge” who stayed the ban, perhaps unaware that the judge’s initial order was only a first step – the same jurist this week will listen to the administration’s lawyers attempt to justify the ban before he rules whether to make the stay permanent.
When standards developed by the private sector become laws, should anyone be able to download a copy for free? At first blush, the answer seems too obvious to debate. But yesterday, a U.S. district court held otherwise, saying that the developer of a standard that has been “incorporated by reference” (IBR) into a law continues to have the right to enforce its copyright. It also confirmed the right to charge a reasonable fee for an IBR standard.
The ruling (subject to appeal) is less surprising when it is reviewed in detail.
Last Friday, America gave notice that it will reject many of the refugees most in need of its protection. At the same time, it turned its back on its founding principles and denied the reality of its own history.
When the Trump administration, by Executive Order, shut the door on travel from seven predominantly Islamic countries – some of them our allies – it also put political expediency before actual danger. At most, it fulfilled a campaign promise that was spurious on its face, because refugee vetting procedures already in place are more than adequate to address security concerns.
With the change in administrations, I’ve decided it’s time to revive a series of essays I began posting in 2007. I’ve duplicated the text of that first blog entry below. Sadly, the concerns and moral imperatives I described then are as relevant and urgent now as they were ten years ago.
My goal in these essays will be to lean neither to the right nor the left, but rather to present and analyze issues in a neutral and proactive fashion. If that's an approach that appeals to you, I hope you'll join in the dialogue using comments field below, or by sharing these posts with your friends.
So a year and a half ago I wrote a book called The Lafayette Campaign, a Tale of Deception and Elections. In it, a totally ridiculous conservative candidate leaps to the top of the polls, and then wins the nomination. Sound familiar?
Sadly, yes. But wait, there’s more.
Yesterday was the big day – fifteen months after tapping out the first few words of my latest satirical, political, cybersecurity thriller, I uploaded the files for Frank Adversego’s third world-saving adventure. This time around, the villains are an ISIS-like terrorist group that’s been even more successful at gaining ground in the Mideast.
Now they threaten to bring the Western world to its knees. Like the first two books, everything in the book is technically accurate and could actually happen. Frankly (no pun intended), this book scares the hell out of me. The reason? There seems to me to be little doubt that some day, perhaps as early as tomorrow, just such an attack will actually be launched.
According to Donald Trump, "the US Presidential Election is rigged!" That's a bit disingenuous coming from The Donald, given that if it's being hacked by anyone, the evidence is that it's being hacked by the Russians. And not for the benefit of Clinton, either. But just how realistic could such a claim be?
Experts agree that trying to pull off such a feat by traditional means (i.e., getting people to vote more than once) is not only not happening, but not even feasible to pull off in sufficient numbers to influence anything but the very closest of elections. But how about if you were to hack the election electronically? How hard would that be?
To the dismay of the Republican leadership but the delight of his core supporters, Donald J. Trump today announced that he had, in fact, sexually assaulted each of the women who has come forward in the last several days. "And not just them, folks," the Republican nominee for president said, "lots more – a huge number more. We’re talking hundreds – maybe thousands. There’s no way I can keep track."