Category Archives: Security

Cloud Architecture: Mother of All Lock-ins?

The CEO of Red Hat, Whitehurst, was quoted by Computerworld today regarding proprietary architecture:

Cloud architecture has to be defined in a way that allows applications to move around, or clouds can become the mother of all lock-ins, warned Red Hat’s CEO James Whitehurst.

This begs the question of incentives. At first glance it seems vendors have every reason to make exit cost high for customers. It helps them ensure loyalty to a platform that has recurring revenue.

However, when security is factored, the exit cost has an additional risk that vendors and service managers must take into account.

Take for example the issue Microsoft has convincing users of version six of their web browser (IE6) to upgrade, as I posted recently. Jeremiah Grossman, CTO of White Hat Security sent me a nice summary in response:

MS is suffering the long term effects of successful proprietary technology.

A web browser is free, which alters the model slightly compared with cloud services, but it sill illustrates a situation where vendors have a big incentive for an easy exit path. I will skirt the issue of whether open systems are more secure than closed. Suffice it to say that given the rate of discovery for software flaws every cloud vendor should be a huge advocate for the benefits of an easy upgrade/migration path.

The Network Solutions breach is another example. At the time of compromise the company revealed a vast number of accounts ran applications on a service still supported but “old and no longer in development”. While both the old and new platforms were compromised a single re-architecture and security fix surely could have been less costly. Did the cost of the fix exceed the cost of a migration path?

Thus, the requirement for a well-managed security life-cycle can help foresee and dissipate risks related to lock-in. Computerworld unfortunately does not mention security in the article. Instead they focus on the usual cloud topics such as performance and resource allocation/sharing.

To be able to move a workload from a data center to a cloud or between two clouds, a connecting API (application programming interface) is needed, and there are a plethora of different ones being developed. Fewer would be better, according to Whitehurst. However, the real challenge isn’t the API, but ensuring that the application will run with the same performance when it has been moved. That is what Red Hat is focusing on. Getting an API in place that allows a workload to be moved is only 10% of the work, Whitehurst said.

Performance. Access to resources that scale is an obvious benefit. Performance gains definitely drive cloud projects as well as marketing. A less obvious benefit, apparently, is the ease of migration from insecure to secure platform (including physical to virtual). How many customers today feel locked-in to old and obsolete hardware that keeps them exposed to known security risks?

Migration tools that break hard-ware lock-ins like Microsoft’s disk2vhd, which I profiled earlier, are not only good for the customer but good for the vendors. Microsoft really, really wants you to stop running NT4 — there is a point at which the proprietary/lock-in model actually hurts the vendor. That is why I would say good migration strategy benefits the vendors as well as customers; helps avoid obsolescence and significantly reduces the cost of managing security. This makes Whitehurt’s point about avoiding lock-ins even more poignant.

Pigeon Accused of Spying

My joke about surveillance seagulls is more relevant than I could have ever imagined. An amusing story called “Pak pigeon has police in flutter” has been published in the Hindustan Times

In an era of spy planes and satellites, the Amritsar (rural) police have detained a white pigeon that could have been — the police claim — used as a Pakistani spy.

The pigeon was reportedly spotted in Ramdas, a tiny town close to the Indo-Pak border, with a Pakistani stamp imprinted and a Pakistani phone number written on its feathers.

What happens if you call the number?

US Navy Sea Mammal Training

A curious-looking sea lion approached a boat I was sailing the other day. I had a good laugh with the crew on board about how it must represent the latest Naval surveillance technology…”look out, a seagull-drone also is watching”. It turns out the joke was really on us, according to a report this week by CNET.

At Pier 48 in San Francisco, the city’s police and fire departments, along with its Emergency Operations Center, conducted a drill demonstrating the ability of dolphins and California Sea Lions to help protect coastal areas from maritime attacks.

No word on seagulls but they fit nicely into this picture. Could an octopus could be trained? They would be able to operate without a mechanical clasp like the one required for a sea lion:

I have to wonder how mammals are evaluated for this job. It is not very clear from the story.

Using highly trained dolphins and sea lions selected for their quickness, intelligence, detection capability, and mobility, officials demonstrated the unique ability of these animals to identify and neutralize threats in cooperation with human teammates.

Selected? Obviously they do not enlist. Does this rule out monkeys? What about chimpanzees, pigs or birds? Are dogs the only other animal that has been drafted for US military training? How does the military account for the cost and time of training a dolphin or sea lion? An artificial shark robot seems like a more humane approach, maybe more cost-effective, to this kind of underwater explosive detection and removal operation.

Remember Roboshark2? I have not heard anything since the big splash in 2003.

History at LSE ranked #1

I was just informed that my Alma Mater, the International History department at LSE, has been ranked #1 in the 2011 Complete University Guide.

It was given an overall score of 100 out of 100 possible points. Congrats LSE. Go Beavers!

Oxford was second with a score of 99.8. Hard to understand how Durham ended in third with higher graduate prospects and student satisfaction compared to Oxford, but perhaps research assessment and entry standards have more weight?

LSE was an excellent experience for me, as I studied international security during the Cold War in Asia, Africa and Europe. My thesis was on defense ethics strategy, (dis)information warfare, and long-term global security impact from military occupation of the Horn of Africa:

Anglo-Ethiopian Relations 1940-1943: British military intervention and the return to power of Emperor Haile Selassie

When asked about my transition from a history background to information security, I highlight two key points:

  1. Taxonomy of Authority: At its core, security is about tracking and analyzing events – who did what, where, and when. This mirrors the historical method of studying and interpreting past events. As a historian, I analyzed written accounts to construct coherent narratives. In security, I apply the same analytical skills to computer logs and digital data. Both fields require critical thinking to assess risks based on past vulnerabilities and threats. It’s no coincidence that many security professionals, especially in the military, have a keen interest in history.
  2. Case Study: Ethiopia 1940 and British invasion/occupation offers valuable lessons for modern complex security challenges. This mission aimed to establish stability while respecting Ethiopia’s sovereignty — a delicate balance given Britain’s imperial past and substantially weakened future. The outcomes of this intervention provide insights relevant to recent Western operations in countries like Afghanistan and Iraq. The post-WWII Western policy in the Horn of Africa ultimately failed to ensure regional security. Instead, it precipitated revolution, invited territorial war (with Somalia) and fueled an anti-American military party (the Derg) rise to power. The resulting instability and reduced Western influence continue to create security challenges today, such as piracy and terrorist safe havens. This historical case study demonstrates how understanding past events can inform current security strategies and risk assessments. It illustrates the transferable skills between historical analysis and information security: the ability to analyze complex situations, identify patterns, and draw actionable insights from past events.

In essence, my background in international history at LSE honed my skills in event analysis and reporting — capabilities fundamental to information security and risk management, which form the bedrock of computer security.