It still amazes me how many simple and “obvious” solutions present themselves immediately after a data breach takes place.
UK: Patient personal details will now be encrypted after laptop theft say hospital bosses
By Dissent, March 2, 2011
A follow-up to a breach reported on this blog in December 2010:
The theft of a hospital laptop containing the details of more than 1500 patients could have been an inside job trust bosses have been told.
The computer, stolen from Calderdale Royal Hospital, contained 1,569 patient records including names, dates of birth and addresses when it was noticed missing on November 22 last year.
Now a report by Calderdale and Huddersfield NHS Foundation Trust board members has concluded the computer, which was in the neurophysiology department, would probably have been filched during working hours.
Read more in the Huddersfield Daily.
We don't (yet) offer a course on the Business of CyberCrime. Perhaps we should?
A Look Inside the Bustling Cybercrime Marketplace
"Cybercrime's underground activity, much like a Middle Eastern bazaar, is a loud and boisterous market. Buying, selling, haggling and cheating all take place in these marketplaces. Each marketplace houses other specialized-markets of illegitimate goods. There's the credit cards market, the bot rental market, another one for viruses, and one more for the credentials – to name a few. The column discusses how cybercriminals communicate, how these markets operate and how hacker transactions are being performed."
Remember , radiation levels drop at the square of the distance. If current scanners work at one meter, one that works at ten meters will require 100 times more power...
DHS seeks systems for covert body scans, documents show
March 2, 2011 by Dissent
Jaikumar Vijayan reports:
Documents obtained Tuesday by the Electronic Privacy Information Center suggest that the U.S. Department of Homeland Security has signed contracts for the development of mobile and static systems that can be used scan pedestrians and people at rail and bus stations and special event venues — apparently at times without their knowledge.
The documents indicate that DHS moved to develop the technology as part of an effort to bolster the ability of law enforcement personnel to quickly detect concealed bombs and other explosives on individuals.
Read more on Computerworld.
Related: Documents obtained by EPIC under FOIA.
‘Nude’ Airport Scanners: Are They Safe?
The EPIC lawsuit argues that the machines are invasive, ineffective and unsafe. “I view this as an uncontrolled radiological experiment,” said John Verdi, an EPIC attorney on the case.
For Sedat, the alleged safety issue is the important one. Of concern to him and other health critics are the backscatter X-ray body scanners produced by Rapiscan Systems, which the TSA began rolling out last year.
… The Johns Hopkins University Applied Physics Laboratory, which analyzed the Rapiscan 1000 at the company’s Los Angeles office, published the leading and most often-cited study (.pdf) in October. The 49-page report, released in a redacted form, concludes that the machines leak virtually no radiation to TSA staff and nearby passengers, and expose the traveler being scanned to only a fraction of the maximum exposure level deemed medically safe.
… Sedat counters that the mechanical beam’s intensity level has not been published, making it impossible to evaluate the safety claims. “I want a real hard number in terms of photons per some unit of area,” he said. “The one physical quantity that is crucial for determining what dose a person is getting, that data is missing.”
Moreover, standard medical X-ray machines disperse radiation throughout the body, whereas the airport scanners penetrate to about skin level. That means there is a high concentration of radiation on a single organ — the skin — which was not accounted for in the Johns Hopkins report, Sedat said.
Future demand levels are significantly higher than today's. Will providers “build out” their networks, or try to “limit” bandwidth?
High-Bandwidth Users Are Just Early Adopters
"Cisco has released a whitepaper on mobile data usage which has some interesting data in it. The top 1% of users consume 20% of the bandwidth, but that share is down from 30% previously. 'Regular' users are catching up as they watch more video. High-bandwidth users of today will be relatively average users by 2015, so network operators should look to those users for insight in designing their future networks."
Fun stuff I could do to my Computer Security students...
7 Hilarious Practical Joke Ideas To Play On Your Friend’s Computer [Windows]
Dictators have lost “the power of deception?”
Wadah Khanfar: A historic moment in the Arab world
As a democratic revolution led by tech-empowered young people sweeps the Arab world, Wadah Khanfar, the head of Al Jazeera, shares a profoundly optimistic view of what's happening in Egypt, Tunisia, Libya and beyond -- at this powerful moment when people realized they could step out of their houses and ask for change.