Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Privacy Security

Grad Student's Work Reveals National Infrastructure 662

CodeHog writes "The WP reports about a student working on a PhD and how it relates to national (US) security. Very interesting that he has been able to get all this information. It raises some very challenging questions, should some of this information be classified?"
This discussion has been archived. No new comments can be posted.

Grad Student's Work Reveals National Infrastructure

Comments Filter:
  • by tiled_rainbows ( 686195 ) on Tuesday July 08, 2003 @11:12AM (#6391609) Homepage Journal
    I work for Transport for London (Transport Authority in London, UK, duh), and, after 9/11 my boss asked me to print out a huge map of the city and put a little sticky label over every "potential terrorist target". Buckingham Palace, Houses of Parliament, the big wheel thing, ministry of defence, big office blocks, army barracks, more palaces....
    After three hours I was running out of sticky labels and was very scared.

    But hey, look on the bright side, maybe it'll never happen!!!
  • Dark undertone (Score:5, Interesting)

    by Gortbusters.org ( 637314 ) on Tuesday July 08, 2003 @11:12AM (#6391626) Homepage Journal
    Did anyone else think that this article had a dark undertone of government and corporerations looking to lock down information in the name of security. I mean, some of this information is important and may have benefits to the general public.

    The scariest line is that they wanted to burn his research. Flash backs of 1984 flashed in my mind.
  • Not all evil (Score:5, Interesting)

    by Azghoul ( 25786 ) on Tuesday July 08, 2003 @11:12AM (#6391627) Homepage
    Some people might wonder why in the world you'd need to have maps of electrical grids and fibre lines...

    I'm working on the periphery of the emergency response industry, and suffice it to say, any infrastructure data is vital as hell for responding to major natural disasters like quakes, hurricanes and tornadoes.

    Tossing all this "scary" data into the classified domain will hammer on emergency responders' ability to effectively map this stuff.

    It's vital, and I think the anti-"security through obscurity" comment in the article hits the nail on the head...
  • by Anonymous Coward on Tuesday July 08, 2003 @11:15AM (#6391680)
    A close relative of mine applied for a job at the State Dept. while finishing up his doctoral dissertation on Cuba (back when Cuba was highly volatile). They asked to see a draft and he consented. Having read it, they said he could have the job provided he NEVER, EVER publish the dissertation.

    He said okay and now he's ABD but pretty high up in the CIA/NSA (yeah, they work together now).
  • Publish or Perish (Score:5, Interesting)

    by Foochar ( 129133 ) * <foochar@@@gmail...com> on Tuesday July 08, 2003 @11:16AM (#6391689) Journal
    The other interesting thing this brings up is the student's right to earn a living and do what he enjoys vs. the national security implications of this. Like he says, putting classified down on a resume doesn't get you very far, especially outside the Military/Intelligence arena.

    The other thing is that, yes, he did put all of the together, but according to the article the raw data he used is all available on the internet. Who's to day that Al Qadea hasn't hasn't already done the research to create their own version of his map. In that case this work could very well prove to be a map of what to defend.
  • Tom Clancy's work (Score:5, Interesting)

    by boomerny ( 670029 ) on Tuesday July 08, 2003 @11:17AM (#6391701)
    the same questions have been asked about some of Tom Clancy's work. I remember reading that he was paid a visit by the FBI asking where he got his classified information, only it turned out everything he used was publicly available. My thought is that suppressing information will not prevent terrorism, only when would-be terrorists change the way they think of the free world will it stop. /rant
  • by TopShelf ( 92521 ) on Tuesday July 08, 2003 @11:17AM (#6391702) Homepage Journal
    At least what this has prompted is a panic attack amongst some CIO's out there, who now understand that 1) too much information has long been left in the public domain, and 2) critical infrastructure security has been neglected for far too long.

    Once you can shock the CEO's and CFO's into understanding that a genuine business risk exists out there, action can take place. I think far too many people assumed that the telco/networking companies had this all figured out...
  • Similar website? (Score:3, Interesting)

    by diegoq ( 149586 ) on Tuesday July 08, 2003 @11:17AM (#6391717) Journal

    The article mentions an interesting website:
    Toward the other end of the free speech spectrum are such people as John Young, a New York architect who created a Web site with a friend, featuring aerial pictures of nuclear weapons storage areas, military bases, ports, dams and secret government bunkers, along with driving directions from Mapquest.com. He has been contacted by the FBI, he said, but the site is still up.
    But even with the wonderous google I am unable to find the website that they are talking about.
    Anyone know of it?
  • Internet design (Score:1, Interesting)

    by Anonymous Coward on Tuesday July 08, 2003 @11:17AM (#6391718)
    I thought the whole point was to create a massively redundant network that could bypass any damaged links. Now this student's work says this isn't true?
  • by tigersha ( 151319 ) on Tuesday July 08, 2003 @11:20AM (#6391756) Homepage
    When Tom Clancy published the Hunt for Red October the US Navy wanted to nail him because they thought he stole some confidential info about their submarine ops.

    It turned out that he got all his info from public domain sources. And they could not do much about it. He just knew where to search.
  • Re:How is this.. (Score:3, Interesting)

    by elem ( 411711 ) <ed@NospaM.well.com> on Tuesday July 08, 2003 @11:22AM (#6391786) Homepage

    I don't think you really got the point here.

    This has nothing to do with any operating systems or computers.

    You can easily criple companys and national infrastructure just by knowing the few substations and fibre switchs that need to be brought down. No power, no phone, no net.... oh dear.

  • The Cukoo's Egg.. (Score:5, Interesting)

    by bigattichouse ( 527527 ) on Tuesday July 08, 2003 @11:24AM (#6391807) Homepage
    Cliff S. in "The Cukoos Egg" tails down a spy selling secrets to the russians. Most of the info he steals is *NOT* classified, but by having *ALL* the info, he can piece together something he doesn't know:

    1. New fighter being developed
    2. Contract awarded to company X
    3. Rifle through purchase orders for titanium and other strategic parts.
    4. Get shipping info on said parts
    5. now you know the facility where it will be built.
    6. find airline reservations from company in question
    7. look for engineers and test personell.
    8. find nearest test base from point of arrival.
    9. Fighter X will be built in location A and tested at location B, between arrival date and departure date.


    Needless to say, this is why more things have become classified since the early 80's

  • by DrWho520 ( 655973 ) on Tuesday July 08, 2003 @11:27AM (#6391852) Journal
    True, it is not hard to find the information, but how difficult is it to pull it all together into one package as Gorman has done? Yes, classify it after the guy gets his sheep skin. Its one thing to have information out there to develop a bomb, its quite another thing to post schematics in a periodical.
  • by Azghoul ( 25786 ) on Tuesday July 08, 2003 @11:28AM (#6391862) Homepage
    Well, that's just it: Classifying data is different from making it sensitive and just not handing it out to anyone. Plenty of data is already designated as "sensitive" (see HAZUS at FEMA for example).

    Infrastructure data is often sensitive. First responders can certainly get it. However, if DoD and/or DHS go haywire and classify it, only those with Secret (or better) clearance level can get it.

    And your average "first responder" fireman isn't going to possess a secret clearance...

    As for currentness, you'd be surprised. Much of the interesting infrastructure (major emergency facilities, dams, etc) doesn't change very often.
  • Designed for this? (Score:4, Interesting)

    by Trurl ( 3494 ) on Tuesday July 08, 2003 @11:28AM (#6391870)
    I thought the whole point of the Internet, being a packet-switched network, was that it could survive damage... like from nuclear war.

    So now we're worried that a terrorist with a scissors is gonna bring it down?
  • Hopefully (Score:5, Interesting)

    by stomv ( 80392 ) on Tuesday July 08, 2003 @11:30AM (#6391899) Homepage
    He's able to leverage the data so that he can see gains (I'm thinking an entire career) while the folks that have lots to lose (banks, utilities, transportation, US gov) pay for him to help show their achilies heels and bottlenecks.

    If 25 telcos happen to be sharing the same 'pipe' of fibre, it may not be a terrorist that breaks that connection... regardless of who severs that line, it ain't good for the telcos -- and the telcos should be using his data to reduce risks.

    Insurance companies and actuaries for corporations and governments love this kind of stuff, as do operations research people. Tell me how much it'll cost to reduce risk to this level, or: I have $10,000,000 -- how can I spend it to ensure that the worst case scenario isn't as bad.

    Hopefully the information doesn't become classified; hopefully, it's used over the next few years to sure up the bottlenecks and other weak points, making the infrastructure far more robust in the following years.
  • by Rogerborg ( 306625 ) on Tuesday July 08, 2003 @11:35AM (#6391958) Homepage

    After all, IGNORANCE IS STRENGTH.

    And unfortunately must give up some of our rights to buy security, or the terrorists will have already won. As we know, FREEDOM IS SLAVERY.

    And it goes without saying - although it's been said many, many times recently by our dear Commander In Chief - that WAR IS PEACE.

    We must ignore those who would warn us against this [msn.com], and march into the brave new world of strictly one sided Total Information Awareness with flags waving and proudly chanting the pledge of subservience. As Jeb would no doubt tell us, Big Brother knows best.

  • Re:No Link (Score:5, Interesting)

    by zenofjazz ( 614733 ) <ZenOfJazz AT gmail DOT com> on Tuesday July 08, 2003 @11:49AM (#6392144) Homepage
    The infrastructure is all interconnected... High voltage lines and their rights of way are used for fiber optic cable runs, Oil and gas pipelines and their rights of way are used for fiber optic runs, same for railway rights of way... because they all have the same basic need, to go from point A to point B, without crossing anyone else's properties. Start correllating telco/internet outages with railroad derailings (which tend to dig up the right of way), and you'll see what I mean. I have known for 10 years, the easiest way to cripple "the typical city" (since the fire in chicago, that destroyed the phone Central Office!) -Jazz
  • by sphealey ( 2855 ) on Tuesday July 08, 2003 @11:49AM (#6392147)
    Ideally, information becomes classified when the benefits of the information being publicly available are less than the dangers of that availability. Here at the university where I work, when I need to get a list of students in my department, I can't just call up and request it.
    A few questions:
    • Who makes that determination?
    • Who reviews the decisions of the determining body and enforces penalties if the decisions are not in the best interests of the citizens?

      Given Pournelle's Law of Bureaucracy ("regardless of the reasons for which they are established, the top priorities of bureaucracies are to survive and to grow") who determines what controls are placed on those doing the classifying?

    Not "trolling" - just asking.

    sPh

  • He'll get a job (Score:3, Interesting)

    by tevenson ( 625386 ) <tevenson AT gmail DOT com> on Tuesday July 08, 2003 @11:51AM (#6392171) Homepage
    They make it sound like it will be hard for him to get a job because most of his dissertation won't be published. I think that's probably completely wrong.

    Even though it does suck that he can't release it in its original form; he'll have absolutely no problems finding a job. If that many large financial corporations were concerned about their communication infostructure surely one (if not all of them) are scratching to hire him.

    If all he wants is money and no real academic prestige this is great. Otherwise, it wouldn't be fun to be in his position right now
  • by hankaholic ( 32239 ) on Tuesday July 08, 2003 @12:01PM (#6392299)
    Not "the Internet" as a whole, but if a city's telecommunications access is fed through a handful of isolated fiber lines, then yes, it's quite possible, and that's the point.

    My former employer owned one of the first ISPs in Pittsburgh (Pittsburgh Online/Webstation, since sold to Stargate), and once told an old friend who worked at the FBI an anecdotal story about how easily he could rob a given bank. It involved jamming the police band frequencies (easily done with equipment you could build yourself), and arranging an "accident" which knock out the telephone lines to the police station.

    When the dispatchers' lines were cut, you could walk into the bank and take your time, confident in knowing that even if the bank called 911 (or their security service made the call), the police could not be notified until communications were restored. The person most aware of the coincidence of the two outages (radio and telephone) would be the dispatcher, and they wouldn't be able to coordinate anything until you were long gone.

    I don't know what became of the situation, but I do know that my former employer ended up retelling his tale to some very interested higher-ups in the local FBI branch.
  • Hypocrisy? (Score:2, Interesting)

    by metalmaniac1759 ( 600176 ) on Tuesday July 08, 2003 @12:20PM (#6392486) Homepage Journal
    Most of the posts above say that information should be free and no one should be allowed to withold information.

    And whenever there is a talk about spam or privacy the whole slashdot community cant stop hanging or shooting the "defaulters"....

    Strange?

    Nandz.
  • In Soviet Russia... (Score:5, Interesting)

    by FunkyOldD ( 633953 ) on Tuesday July 08, 2003 @12:22PM (#6392507)

    Sorry, couldn't resist. I grew up in the USSR where everything was classified - so here is a map story for you.

    Map information was classified and map publishers were required to add deliberately inaccurate information to their maps. You would have whole cities that were not on the map or shown a couple of hundred km away from their real location. This was done in the name of national security, so the enemy (US) would not be able to use maps to plan a nuclear strike or sabotage military installations.

    The enemy of course just used satellite imaging to create their own maps and ended up with better maps of Russia than the Russians had. In the 80s folks who needed maps (geologists, archeologists, hikers, ...) would try really hard to get their hands on foreign made maps, because they were so much more accurate.

    Security by obscurity is counterproductive...

  • Re:No Link (Score:2, Interesting)

    by letxa2000 ( 215841 ) on Tuesday July 08, 2003 @12:23PM (#6392513)
    For years I've been interested in the national infrastructure. I currently live in Mexico and about 5 years ago Northern Mexico had a widespread power outage that was attributed to a failed substation here locally. Somehow, with the summer load and some brakes that failed, it took down most of Northern Mexico and, from what I understand, parts of some border states in the U.S. It got me wondering how everything was connected--not just within the U.S. but all of North America.

    That information wasn't readily available when I was interested in that back before 2000 and I assume it's even harder to come by now.

    I suspect that we are a lot more vulnerable than we suspect. And considering a power outage in Northern Mexico affected parts of the U.S. I wonder if someone could successfully attack our infrastructure without even attacking a physical point in the U.S., but in Mexico or Canada.

  • by n1ywb ( 555767 ) on Tuesday July 08, 2003 @12:26PM (#6392551) Homepage Journal
    Security through obscurity is NOT "security" at all, because it's impossible to know what the other guy knows.

    In fact, STO is WORSE than NO security because it leads to a FALSE sense of security.

    This weekend I took a ferry to Long Island and I used my GPS to record my track. As I was doing so it occured to me that my activity could be considered suspicious, and suddenly I got very nervous about using my GPS on the ferry. What the fuck kind of country are we living in now? Why should ANYTHING _I_ do be considered suspicious? I am an upstanding tax paying public serving ham radio operating red blooded patriotic citizen of the USA. If I really WAS planning some kind of attack on the ferry, why would I bother with GPSing it? Why would I bother to pull it out of my pocket in public in the first place? Am I wearing a towel? NO!

    Knowledge is power and if EVERYBODY knew EVERYTHING then the world would be in perfect balance. That was the idea that brought about the Internet as we know it today, a medium for the free exchange of information. Open the fucking floodgates!

    KNOWLEDGE IS POWER!
  • by Mordant ( 138460 ) on Tuesday July 08, 2003 @12:28PM (#6392563)
    Look, I haven't seen his work, but this article and the previous one cited both seem hype-ridden and reek of cluelessness.

    I mean, it's great that here in America someone can actually get a PhD by doing a lot of traceroutes and then using gnuplot of whatever to overlay the data onto scanned images of telco fiber-maps or whatever, but the whole premise of the article - including the moronic comments about how the guy shouldn't be allowed to leave the building with the laptop (maybe I have too much faith in humanity, but I can't imagine anyone making such a stupid comment other than in jest) is much ado about nothing.

    This information has been available for years, and continues to be available; it's just that this guy has nothing better to do than sit around collating it and putting it into MySQL or somesuch. So what? Terrorists aren't interested in blowing up the Internet - they're interested in blowing up -you-.

    So does this mean that I can now justify a PhD by sitting around correlating MapQuest thumbnails with wardriver plots open WiFi APs, or something, and then claim I'm mapping possible 'nodes of anonymous 'terrorist Internet access'? Sign me up!

    Think about it.
  • is that he has it in one convenient package... Kindof a Terrorist to-do list. When you think about it, this is really just turning the tables on the privacy debate.

    Conpanies (i.e. financial institutions) don't mind compiling scads of public information on us until they can tell what brand of hemorrhoid cream you use, but when we do the same thing to them, they scream bloody murder.

    Hmmm.....

    If you locked up all of the infomation he's compiled, you'd shut down the Economy just as effectively as using that same infomation to blow up critical infrastructure points. The real point of his data is that he also allows the good guys to see just whwre the choke points are so that they can design backup plans and structures.

    As Ghandi said (and I'd bet he'd be on the terrorist watch list if he was doing his work today).

    I'd rather let my enemies know exactly what I'm doing and hope that they overreact

    Now, at least, these companies are clear that they need to get their ISPs to use different fiber lines to deliver their data. It's not like they couldn't have known this before. It's just that now they have it at their fingertips.
  • by Hoho19 ( 529839 ) on Tuesday July 08, 2003 @12:34PM (#6392619)
    I work for Sandia National Labs as a student intern. In August student interns are required to present the projects they've been working on during the summer at a symposium. Each project has to be checked because say a student is working on an airplane lets say or some sort of technology to cover the airplane...well if the student mentions in his presentation that this technology could possibly be used to make an invisible skin for airplanes that presentation all the sudden becomes a classified discussion of possible stealth technologies....just because the student mentioned possible uses... OR say a student is working with X gadget. and He is also working with Y gadget. neither of which are classified in themselves. Then lets say that the student wants to make a silde showing all the gadgets he's been working on. He takes a photograph of X and Y in the same slide and BAM! that's a classified picture because when you combine X and Y you get gadget Z which is classified. that's how it works!
  • by AWhistler ( 597388 ) on Tuesday July 08, 2003 @12:36PM (#6392647)
    Julia Roberts' character pieced things together from public information and came up with a theory about something. She didn't know if it was right, but the dissertation made it to the gov't and suddenly she was on a hit list until she was able to get a reporter (Denzel Washington) to publish it.

    It would seem that life is imitating art here.
  • by Major Tom ( 164687 ) on Tuesday July 08, 2003 @12:47PM (#6392754) Homepage
    1) As many people have pointed and will continue to point out, classifying the report won't make any difference because people can re-create the work. And this wouldn't take much effort, because an attacker has no need to map the entire US, they can pick whatever area is convenient for them.

    2) Slowing down internet connections doesn't scare people. Temporarily cutting corporate offices off from the grid doesn't scare anyone (save, perhaps, the CEO). Think how much more terror-bang a terrorist could get for his buck with a 9mm in mall. That would terrify people and significantly damage the economy. Attacking communications infrastructure isn't "terrorism," it's something else. It's guerilla warfare, directed against an economy rather than a person, I suppose. If our "war" descends to this point, we are totally screwed, as it is impossible to defend (or even think of) all the economically "soft" targets.

    3) In the end, the security of all civillians and civillian infrastructure depends on good will. Well, that, and fear of punishment. But the latter doesn't apply to acts of international sabatoge and/or murder. I am sick of all this talk about defending our civillian infrastructure, securing the homeland, etc. It can't happen. Until there is a soldier in body armor with a rifle every few yards down every street in the USA, this goal will not be achieved. That isn't the society any of us want to live in. We haven't put any effort into civillian security up to this point, and I say: Good for us. We didn't need to, because the general good will of human beings was protecting us. Our effort would be better spent restoring *that* state of things, rather than moving toward the soldier-on-every-corner model. For those who would like to call me naive, I ask you: why has there not been an attack on soft infrastructure before? Why has there never been a wave of men with 9mms in malls? These things are undefended. The only reason it hasn't happened is that no one ever wanted to do it.

    Three good reasons why it is a waste of time and effort to classify this fellow's dissertation. I'll let others cover the reasons why classifying it is damaging to security, an open society, and democracy.
  • by irishkev ( 457679 ) on Tuesday July 08, 2003 @12:58PM (#6392879) Homepage
    Back in September of 2002, I wrote an essay entitled, Cyberwar: How Terrorists Could Defeat the U.S., and Why They Won't.

    www.cryptogon.com/docs/cryptogon_cyberwar.pdf

    This brief essay explains how vulnerable information infrastructures are to very simple attacks. I intentionally removed all company names and locations of the critical assets, not because I was afraid my written-in-one-evening essay would be used by terrorists, but because I was afraid the FBI would think I was a terrorist.

    After reading about the pressure that Sean Gorman is under, I am convinced that I would have had a (probably not pleasant) sit down with federal agents if I hadn't sanitized my essay.
  • by Badgerman ( 19207 ) on Tuesday July 08, 2003 @01:01PM (#6392901)
    What we see here is a combination of simple things building up. Information here, information there - but add the tools to combine it all together, and suddenly said information is a lot more meaningful and powerful.

    It's not just the data. It's not just the technology. It's what you get when you combine them, mine the data, and find something that isn't there originally.

    The problem of regulating this, of course, is that the various sources of information are "innocent," and that information itself can be deceptively harmless until you combine it with something else.

    So what do you do? You can't control the information, you can't know what to control, you can't outlaw the process. Welcome to the 21st century, where Data Mining is our new concern.

    As an IT professional, I've had to deal with much lesser concerns of the same nature - what happens when you combine and mine data. A simple-to-create synergy can reveal far more than the data sources it uses, and that synergy has to be treated as a completely different thing when it comes to concerns over access, availability, etc.

  • by dohcvtec ( 461026 ) on Tuesday July 08, 2003 @01:03PM (#6392930)
    do you honestly think that EVERYONE with a PhD is in it for the job market?
    Well, this guy apparently _would_ like to get his degree, at least. As it says in the article, he's worried that if his dissertation gets classified, he may have problems graduating. This way, even if it does get classified, at least he'll be able to eat.
  • by BlightThePower ( 663950 ) on Tuesday July 08, 2003 @01:15PM (#6393030)
    I can only speak from personal experience, and whilst classified work has never fallen into my lap, its not at all unusual for PhD students to work with Confidential (big C) and Confidential in Confidence (i.e., commercially sensitive) data. This sort of work can't go necessarily go directly into your thesis or be published (in the former case for ethical reasons sometimes and in the latter, for obvious IP reasons). But its quite normal to do bits of work on the side and to have "Technical Reports" that aren't publicly accessible in your CV. Depending on the circumstances you can see it as additional professional experience or obesiance to the organisation funding your studentship. Post-PhD this sort of work is called "consultancy" and is really your only shot at making any real money in academia. By no means is an academic's working life summed up in the peer-reviewed publications.


    High paying jobs post-PhD? Depends on the area perhaps. CS/Engineering maybe but taking academia as a whole, doing a PhD nearly always loses you money if you take working life as a whole (one never makes up for the 3+ poorly paid years spent doing it).


    Hype will certainly not help him in the academic job market; possibly it may even work against him knowing what academic snobbery is like. Academic hiring, apart from the usual political or turf issues, is these days on the basis of two strict criteria: success in publishing and success in aquiring funding. If you can't translate it into published pages of text and regular funding cheques, it doesn't really matter how clever/famous/whatever you are. There isn't room for you. Its a terrible way to run things perhaps, but there is a bottom line basically.
  • by CaptKilljoy ( 687808 ) on Tuesday July 08, 2003 @01:17PM (#6393055)
    Nearly every post has had the knee-jerk reaction that security through obscurity is a bad thing and that enough redundancy must be installed to minimize the threat of disrupting infrastructure, and that's incontrovertibly true. However, there is one fly in the ointment...

    Would anyone here be willing to have their usage fees for their net connection go up by %50 to cover the cost of installing and maintaining this additional redundant infrastructure? (Bear in mind that if you say "Stick it to big businesses!", they will indirectly stick it back to you.)

  • The NRA...? (Score:3, Interesting)

    by suwain_2 ( 260792 ) on Tuesday July 08, 2003 @01:17PM (#6393059) Journal
    You know the NRA's "If guns are outlawed, only outlaws will have guns" saying? I'm finding that it applies to more and more things in modern times. Crypto -- do you really think if the US bans crypto, al Queda terrorists are going to stop using it? This -- if he could find this information, don't you think organized terrorists could, too? If not more information? I can understand the concern, but frankly, censoring the information will probably have no effect on keeping terrorists from it. (And do you really think Osama's going to be running around New York clipping fiber lines with a pair of scissors to slow down some random company's Internet connection?)
  • GIS & Terrorism (Score:3, Interesting)

    by Jaysyn ( 203771 ) on Tuesday July 08, 2003 @01:31PM (#6393206) Homepage Journal
    So what are they going to do now, make GIS illegal, what I'm I suposed to do for a job? I'm sure they've gone light on the details but I could make a "super-map" similar to this one in my spare time at work. Any kind of infrastucture information needed for this is readily availible from MapInfo [mapinfo.com] & ESRI [esri.com].

    Jaysyn

  • by Suidae ( 162977 ) on Tuesday July 08, 2003 @01:38PM (#6393270)
    This seems like a simple exercise in paranoia to me.

    I agree. Particularly since it has already been shown that terrorists can choose and utterly destroy a high-profile target.

    If a terrorist wanted to really upset things now, they'd next show that Anytown, USA was also vulnerable. Three days, three teams each with a van, 500 childrens lunchboxes with a timebomb inside the thermos and a road trip past small town schools in east, west and central USA should do it.

    You are not safe at work, you are not safe at school, panic.
  • Re:Dark undertone (Score:3, Interesting)

    by lysium ( 644252 ) on Tuesday July 08, 2003 @03:06PM (#6394238)
    Well, see, the difference is that our Brother is somewhat smaller, and much politer. Orwell was wrong about the oppression part -- it is much easier to give people what you tell them they want rather than take away what they know they should have.

    Oceania was missing one crucial ingredient; the shopping mall!

    ----------

  • Re:Well.. (Score:3, Interesting)

    by Anonymous Coward on Tuesday July 08, 2003 @04:58PM (#6395420)
    One of the issues missed is that this data embarasses a lot of people.

    The reason te CIOs and CEOs where worried about their reputations is that in general physical security has and still is as badly neglected as computer security. Their pants are around their ankles. All Gorman has done is taken a photograph.

    That being said a terrorist only needs a "single" target. Which means information control must be total, since a single leak or oversight would provide a target.

    Take a moment to think about vuranbilities that you know of at your company, town, etc...

    You will realize it is impossible to secure all
    information or access to sites.

    Now you have a choice: Keep everyone (including the customer) in the dark (read -> closed source) except the service provider and trust them to provide security (which interestingly enough their reaction to Gorman's data suggests they haven't).

    Or: have aware customers that are aware and have access to information who can help fix problems and as needed put pressure on their providers to make them accountable for security (read -> open source).

    I prefer the latter. Given that examples exist already where open source (Linux or BSD as examples) are considered more secure than closed source alternatives.

    Full disclosure has always been unpleasant. But problems can only be fixed when identified.
  • by ZPO ( 465615 ) on Tuesday July 08, 2003 @07:29PM (#6396429)
    Its a little known fact that over 50% of the data the CIA gathers is unclassified. In the business it is known as "open source intelligence". What makes the CIA analysis classified is the collection, collation, and sifting of that data. There are many examples where the individual pieces of source data are unclassified, but the fusion of many pieces of data combined with analysis and algorithms is classified.

    All they need to do is write up a quick 2-3 page government contract with a SOW (scope of work) to produce what he's already done. It would be an FFP (firm fixed price). $100-250K/yr would be a bargain. Once the government owns it they classify it and make extracts available to the involved companies to allow them to fix the problems. This would not be something new. An abstract can remain unclassified that he can include in his resume. The best idea would be to get him a job in either NIMA or CIA doing exactly what he's doing now.

    The comment attributed to Richard Clarke -- "burn it" seems very unwise. Mr. Gorman has done an excellent job of intelligence fusion and synthesized a very useful body of information from a large collection of seemingly unrelated data. This is the holy grail of the intelligence community.

After an instrument has been assembled, extra components will be found on the bench.

Working...