Category Archives: Security

Orcas Hunt in Predictable Stealth Mode

Researchers say that Orcas can co-ordinate attacks without using normal communication channels.

“They go into stealth mode – completely silent,” said Dr Deecke [from the University of St Andrews in Scotland]. “This raises the question: how are they communicating?”

It seems that orcas can carry out complex, co-ordinated mammal-hunting trips without “talking to each other” at all.

[…]

Dr Deecke thinks that the orcas might “rehearse” their hunting routines, to learn the position of each group member.

“They tend to be very predictable,” he said. “I often know exactly where they are going to surface.”

Very predictable stealth mode? Funny. I assume he is trying to make a point with the contradiction in what he is describing.

Orca
Haha, missed again

Winning the Oil Endgame

Amory Lovins from 2005

Unexpectedly, whalers ran out of customers before they ran out of whales…the remnant whale populations were saved by technological innovators and profit maximizing capitalists.

He proposes two steps, both of which cost less than buying the petroleum they offset

  1. Retool transportation to be two or three-times more efficient (save more than 60% by 2025)
  2. Move to biofuel

We’ve done this before…1977-1985 when we last paid attention…oil imports from the Persian Gulf fell 87% and would have been gone if we had kept that up one more year.

NATO Article 5 and Cyber Attack

The US wants to cut its budget, but NATO is putting pressure on them to keep their commitments under Article 5.

Article 5 of the NATO treaty requires the Alliance to come to the aid of member-states if their territory comes under attack.

[…]

For the new NATO members, American troops continue to act as a hedge against what they see as Moscow’s unpredictable foreign policy.

“The nations that have been most concerned about the credibility of Article 5 are the Central Europeans,” Brzezinksi [former US Deputy Assistant Secretary of Defense for Europe and NATO Policy] said. “People remember that Estonia had a cyber attack that originated in Russia, and which most believe was organized by the Russian government.”

NERC Issues Risk Methodology Warning

The Bulk Power System of the United States must comply with NERC standards CIP-002 through CIP-009.

The standards are setup so that CIP-002 has a significant influence over the need for standards CIP-003 through CIP-009. It requires a regulated entity to use a risk-based assessment methodology (RBAM) to identify critical assets. In other words, a RBAM is meant to set how much of an environment is within scope of review.

This is not a unique approach. If you are familiar with PCI this is like saying a regulated entity has to determine the systems that process, transmit or store cardholder data to set the scope.

Unfortunately NERC, in their December 2010 Sufficiency Review, says entities are failing to properly identify and document their critical assets.

As a result of audits conducted over the past couple of years through the CIP compliance monitoring program, NERC has found instances where entity methodologies are not sufficiently comprehensive to produce a complete and accurate list of critical assets. This suggests greater clarity is needed in either NERC standards or industry guidelines to provide a more accurate identification of entity critical assets. While in many cases, functional entities had similar methodologies, substantial differences were evident even amongst entities within the same registered function. In certain cases, this has led to audit findings of non-compliance.