Category Archives: Food

Children’s Cereals Fail Nutrition Test

The SugarEnvironmental Working Group reviewed nearly 100 cereals and found many that are more than 50% sugar by weight (more than cakes and cookies) but are still marketed as children’s food.

A one-cup serving of [Kellog’s] Honey Smacks packs more sugar than a Hostess Twinkie…

Most children’s cereals fail to meet the federal government’s proposed voluntary guidelines for foods nutritious enough to be marketed to children. Sugar is the top problem, but many also contain too much sodium or fat or not enough whole grain.

Full report (PDF)

Apparently not much has changed since 2008 when Consumer Reports reported basically the same thing; Kellog’s Honey Smacks had more sugar than donuts.

Are you one of those adults who keep a box of Frosted Flakes or Froot Loops hidden in the cupboard? Such sugary cereals are heavily marketed to children, to the tune of about $229 million advertising dollars per year. But an estimated 58 percent of “children’s” cereals are consumed by the over-18 crowd.

[…]

The bad news is that 23 of the top 27 cereals marketed to children rated only Good or Fair for nutrition. There is at least as much sugar in a serving of Kellogg’s Honey Smacks and 10 other rated cereals as there is in a glazed doughnut from Dunkin’ Donuts.

US Security Experts Bemoan “Colander” Model

Note that some of the most effective armor technology on land and sea uses a porous model.

First, take for example a visionary in World War I realized it’s better to be flexible in order to make breaches quickly disappear (render them ineffective) rather than to try only to prevent them (allow cracks to form in a solid and be exploited). That idea led to self-sealing fuel tanks for aircraft and vehicles.

The US military is still funding research to find ways to use a flexible yet porous membrane to prevent leakage for water tanks as well as fuel. Here is a typical modern breach response study application:

…enable vehicle operation in hostile environments and minimize loss of fuel due to a direct/indirect hit…

Second, another interesting example is a membrane developed on submarines in World War II that can subdue enumeration (e.g. sonar) by an attacker. An anechoic tile is porous enough to allow signals in yet prevent them from a “bounce” back out. Porous sound canceling material also can be found in recording studios.

Anechoic Tile

Third, polytetrafluoroethylene (often known for its use in Gore-Tex) is another great example since it is used to make fabric waterproof yet breathable — porous yet impermeable.

Gore-Tex Schema

I said earlier to take note of the porous model because Wired has offered the following chilling quote in a story called Darpa Begs Hackers: Secure Our Networks, End ‘Season of Darkness’ about the state of American cyber security.

U.S. networks are “as porous as a colander,” Richard Clarke, the former White House counterterrorism chief turned cybersecurity Cassandra, told a packed ballroom.

He says that like being porous is a bad thing. I would rather hear response time is inadequate or that the US needs to develop better tools for the job to distinguish friend from foe (e.g. grapes from water)

Colander in action

Begging hackers to develop a perimeter with no holes, or to imply that a security barrier should never be porous, will trend things worse not better. It would be more effective to spend resources (beg hackers) to help on threat recognition, redirection and response.

A solid perimeter will never be truly solid as history shows time and time againand again.

US Commodore Perry's Ships Breach the Japanese Perimeter in 1853

To retain and protect assets while dispensing/releasing threats, which is exactly what a colander is designed to do (and why a chef uses one), is not an inherently bad model. As the military examples show above there is a long history of developing highly technical colanders that provide an efficient security solution to handle even the highest risk environments.

RSA China 2011: Cooking Security into the Cloud

I will be presenting the following Session next week at RSA China 2011:

Title: Cooking Security into the Cloud
Scheduled Time: Wednesday November 2, 15:50 – 16:40
Room: Conference Hall B+C

Breaches of confidentiality, loss of data integrity, and downtime are no stranger to virtual environments. Based on a new book with a companion CD of tools and scripts, attendees will see new ways to mix and measure security ingredients in order to achieve requirements and compliance even in large multi-tenant, multi-layer security situations.

Hope to see you there.

RSA China 2011

USCG seizes squid boat after failed identity test

News from the waters near Alaska. A large fishing boat about 3,000 miles from the coast of Alaska was asked to identify itself was unable to do so. It was seized by the US Coast Guard but not brought to shore because of a rat infestation.

The vessel Bangun Perkasa didn’t have a valid flag state registration, and Coast Guard spokeswoman Lt. Sara Francis said it was seized Sept. 7 as a stateless vessel for allegedly violating U.S. laws.

[…]

…crewmen were trying to dump the net when the Coast Guard boarded the ship about 2,600 miles southwest of Kodiak. The Coast Guard retrieved the net, and then found 30 tons of squid and 30 shark carcasses on board, she said.

Officials did not find proper documentation on board, however.

“No license or permits, and no records of their catch,” Francis said.

The Coast Guard also discovered rats on board.

30 tons of illegal squid! That’s just what they kept on board. Illegal giant drift nets kill huge numbers of fragile marine life so who knows what the true toll was. Whales and turtles are devastated by these boats.

Dumping 10 miles of net like a piece of garbage overboard also is an incredibly malicious maneuver. All that aside I find the most interesting part of this story in the failure to provide a valid certificate and then the failed authentication process.

The ship’s crew initially claimed Indonesia as their flag state.

“When we contacted Indonesia, they said, ‘Nope, not ours,'” Francis said. “They became flagless at that point, and that’s when we seized them.”

Although, in terms of analysis, I also find this part amusing

“Given the catch they had, I would assume they were a squid boat.”

Not a rat boat?