Category Archives: Security

TechWomen and Security

A professor of gender studies at the LSE recently came to San Francisco and presented to a small group. She spoke of interesting global trends and studies being done by the school. None of them addressed the shift I have noticed in technology access by women and how it relates to security or risk.

I asked her if anyone was studying the security effect of China Mobile’s huge infusion of technology (as I wrote about before) to women in Pakistan, for example, or what the effect of social networks and innovative payment systems has had on women-run businesses in Africa. Does the American “hacker” stereotype get radically redrawn as the diversity of online users shifts?

Her blank stare was all I need to know the answer. We then discussed how flyingpenguin could fund graduate students to do some research under our direction and hopefully document and parse some of the fascinating new data for threat analysis.

In the meantime, I continue to watch announcements from various governments about facilitating technology access specifically for women in new and very large markets. Will there be an explicit security effort? Here is an example from the US:

The U.S. Department of State’s Bureau of Educational and Cultural Affairs announced today that TechWomen – an international exchange that uses technology as a means to empower women and girls worldwide – will expand to sub-Saharan Africa beginning in 2013. TechWomen will bring women working in the technology sector from Cameroon, Kenya, Nigeria, Rwanda, Sierra Leone, South Africa, and Zimbabwe to the United States for a four to six week mentoring program with their American counterparts in the United States. The U.S. Department of State is currently accepting proposals to administer TechWomen in 2013. Please visit www.grants.gov for more information.

If you are interested in working with flyingpenguin on a grant proposal, or related analysis of gender and security, please contact me.

How Bicycles Liberated Women

A dramatic look at the history of bicycles can be found in an excerpt from Victorian Cycles, Wheels of Change. It is particularly interesting to see the emphasis on safety (versus horses).

…this controversial machine forged roads into society that revolutionized politics, fashion, and social policy as well as paved the way for the mechanized world of motion to come. Victorian Cycles, Wheels of Change is a fascinating documentary about the bicycles coming of age and its tremendous impact on society.

I suspect the growth in numbers of women who rode bicycles had more to do with the cost of horses and the inability of women to operate and own them without assistance than the need to protect women from harm. In other words, if women were able to independently earn wages to afford the lifestyle of a horse-owner then they would have been less likely to need or want to try to adapt to the new and unknown risks of bicycles.

The simple economics of transportation make horses a no-go option to any low-income group. And that is not to mention the many other drawbacks of horses; it was said in the 1800s that New York could be smelled from a hundred miles away. No one ever complained about the urban odour of bicycles.

Ok, so maybe some men really didn’t want to allow their women to ride horses for fear of injury. That perspective just seems slightly off to me, however, given the other high-risk tasks that women were “allowed” at the time.

Working conditions for women, as well as for children, were awful and exposed them to life-threatening dangers (as depicted in Charles Kingsley’s The Water Babies, Elizabeth Gaskell’s North and South; Life of Charlotte Bronte, Benjamin Disraeli’s Sybil, etc.) . Many lived tortured lives and suffered greatly during industrialisation.

Teen Blocks Sim-Hack: Wins Award

The idea of a contest to see who can best defend against attacks sounds like a great one. Yet a recent competition, instead of ending just with the celebration of new-found talent, seems also to come with a subtle marketing spin.

Exercises included advising a start-up on cyber security during a role-playing exercise and fending off a 50-minute-long simulated cyber attack. The simulated attack involved port scans, followed by attacks on a vulnerable webserver, defacement, mail spam, a DDoS and an attempt to extract data. The teams were challenged to try to stop these attacks in real time by changing IDS, firewall and router configurations.

Oh really? They changed IDS, firewall and router configs? Was this a random/unpredictable attack and could defenders choose their own tools? It sounds like it was scripted. Let me guess, this was sponsored by a company that just also happens to sell IDS, firewalls and routers…

…the Hack Idol exercise pitted six five-strong teams against each other in a series of challenges hosted by HP Labs in Bristol on Saturday

Hosted by HP? Shock and surprise. Let me guess next they are going to say how easy it is for anyone to do the same…

[A 19-year-old computer science student], whose only practical experience involved setting up and playing around with a home network, demonstrated innate ability by tackling realistic challenges that simulated the business and practical side of managing enterprise security.

Congrats go to the winner. And then…Bada-bing! It sounds like you just need to send some money to the sponsor for their amazing tools, then do some playing around in the home, and you too will see your attackers start falling down like dominoes.

Hmm, where have I heard this before…