Category Archives: Food

Spy Planes Veer into Iran, South Dakota

Compare and contrast.

First, Jon Stewart makes fun of CIA loss of control over their stealth surveillance UAV in a segment called “I’m no expert but that sounds like bullsh#t”:

 

Second, the LA Times reports that surveillance UAVs (military-grade Predator B) are flying over America with “high tech cameras and sensors” for domestic police operations

As the unmanned aircraft circled 2 miles overhead the next morning, sophisticated sensors under the nose helped pinpoint the three suspects and showed they were unarmed. Police rushed in and made the first known arrests of U.S. citizens with help from a Predator, the spy drone that has helped revolutionize modern warfare.

To be fair the Predator B was not exactly “veering” into South Dakota. It is one of two unmanned aircraft based at the National Air Security Operations Center (NASOC) UAS Operations Center in Grand Forks, North Dakota. There also are Predator Bs stationed in Arizona, New York and Texas, all funded under U.S. Customs and Border Protection (e.g. domestic surveillance in Texas).

…a 2008 report by the Congressional Research Service, the nonpartisan analytical arm of Congress, found UAVs have an accident rate 100 percent higher than manned aircraft.

In recent months, the Federal Aviation Administration has been cautious in approving their use on the Texas border, drawing rebukes from Republican and Democratic lawmakers who have kept up a chorus of public pressure calling for the deployment.

“Safety is our big concern,” said Laura Brown with the FAA, the federal agency that oversees flight plans for UAVs amid high-traffic air routes like those in South Texas. “There have been a number of situations where operators have lost a radio signal.”

And then third, of course, we can’t look at stories about overhead surveillance risks and privacy without mentioning the Streisand effect.

It is named after American entertainer Barbra Streisand, whose attempt in 2003 to suppress photographs of her residence inadvertently generated further publicity.

Maybe it’s just me but I have a feeling a some people are scanning Google maps of North Dakota right now to see if they can figure out details behind the six missing cattle story. I mean those cattle might not have disappeared if the ranchers had started out by deploying some of their own high-tech identity tags and surveillance instead of waiting for the Posse Comitatus to show up, as I have written about before.

Children’s Cereals Fail Nutrition Test

The SugarEnvironmental Working Group reviewed nearly 100 cereals and found many that are more than 50% sugar by weight (more than cakes and cookies) but are still marketed as children’s food.

A one-cup serving of [Kellog’s] Honey Smacks packs more sugar than a Hostess Twinkie…

Most children’s cereals fail to meet the federal government’s proposed voluntary guidelines for foods nutritious enough to be marketed to children. Sugar is the top problem, but many also contain too much sodium or fat or not enough whole grain.

Full report (PDF)

Apparently not much has changed since 2008 when Consumer Reports reported basically the same thing; Kellog’s Honey Smacks had more sugar than donuts.

Are you one of those adults who keep a box of Frosted Flakes or Froot Loops hidden in the cupboard? Such sugary cereals are heavily marketed to children, to the tune of about $229 million advertising dollars per year. But an estimated 58 percent of “children’s” cereals are consumed by the over-18 crowd.

[…]

The bad news is that 23 of the top 27 cereals marketed to children rated only Good or Fair for nutrition. There is at least as much sugar in a serving of Kellogg’s Honey Smacks and 10 other rated cereals as there is in a glazed doughnut from Dunkin’ Donuts.

US Security Experts Bemoan “Colander” Model

Note that some of the most effective armor technology on land and sea uses a porous model.

First, take for example a visionary in World War I realized it’s better to be flexible in order to make breaches quickly disappear (render them ineffective) rather than to try only to prevent them (allow cracks to form in a solid and be exploited). That idea led to self-sealing fuel tanks for aircraft and vehicles.

The US military is still funding research to find ways to use a flexible yet porous membrane to prevent leakage for water tanks as well as fuel. Here is a typical modern breach response study application:

…enable vehicle operation in hostile environments and minimize loss of fuel due to a direct/indirect hit…

Second, another interesting example is a membrane developed on submarines in World War II that can subdue enumeration (e.g. sonar) by an attacker. An anechoic tile is porous enough to allow signals in yet prevent them from a “bounce” back out. Porous sound canceling material also can be found in recording studios.

Anechoic Tile

Third, polytetrafluoroethylene (often known for its use in Gore-Tex) is another great example since it is used to make fabric waterproof yet breathable — porous yet impermeable.

Gore-Tex Schema

I said earlier to take note of the porous model because Wired has offered the following chilling quote in a story called Darpa Begs Hackers: Secure Our Networks, End ‘Season of Darkness’ about the state of American cyber security.

U.S. networks are “as porous as a colander,” Richard Clarke, the former White House counterterrorism chief turned cybersecurity Cassandra, told a packed ballroom.

He says that like being porous is a bad thing. I would rather hear response time is inadequate or that the US needs to develop better tools for the job to distinguish friend from foe (e.g. grapes from water)

Colander in action

Begging hackers to develop a perimeter with no holes, or to imply that a security barrier should never be porous, will trend things worse not better. It would be more effective to spend resources (beg hackers) to help on threat recognition, redirection and response.

A solid perimeter will never be truly solid as history shows time and time againand again.

US Commodore Perry's Ships Breach the Japanese Perimeter in 1853

To retain and protect assets while dispensing/releasing threats, which is exactly what a colander is designed to do (and why a chef uses one), is not an inherently bad model. As the military examples show above there is a long history of developing highly technical colanders that provide an efficient security solution to handle even the highest risk environments.

RSA China 2011: Cooking Security into the Cloud

I will be presenting the following Session next week at RSA China 2011:

Title: Cooking Security into the Cloud
Scheduled Time: Wednesday November 2, 15:50 – 16:40
Room: Conference Hall B+C

Breaches of confidentiality, loss of data integrity, and downtime are no stranger to virtual environments. Based on a new book with a companion CD of tools and scripts, attendees will see new ways to mix and measure security ingredients in order to achieve requirements and compliance even in large multi-tenant, multi-layer security situations.

Hope to see you there.

RSA China 2011