- UAV Offers of Assistance in Colorado Rebuffed by FEMA — we were told by FEMA that anyone flying drones would be arrested. […] Civil Air Patrol and private aircraft were authorized to fly over the small town tucked into the base of Rockies. Unfortunately due to the high terrain around Lyons and large turn radius of manned aircraft they were flying well out of a useful visual range and didn’t employ cameras or live video feed to support the recovery effort. Meanwhile we were grounded on the Lyons high school football field with two Falcons that could have mapped the entire town in less than 30 minutes with another few hours to process the data providing a near real time map of the entire town.
- Texas Bans Some Private Use of Drones (DIY Drones) — growing move for govt to regulate drones.
- IETF PRISM-Proof Plans (Parity News) — Baker starts off by listing out the attack degree including he likes of information / content disclosure, meta-data analysis, traffic analysis, denial of service attacks and protocol exploits. The author than describes the different capabilities of an attacker and the ways in which an attack can be carried out – passive observation, active modification, cryptanalysis, cover channel analysis, lawful interception, Subversion or Coercion of Intermediaries among others.
- Data Mining and Analysis: Fundamental Concepts and Algorithms (PDF) — 650 pages on cluster, sequence mining, SVNs, and more. (via author’s page)
"Prism" entries
Four short links: 16 September 2013
Drones Dismissed, Drones Denied, Passing PRISM, and Data Analysis and Mining
Four short links: 3 July 2013
Mobile Numbers, SSL Best Practices, Free and Open No More, and PRISM Budget
- Mobile Email Numbers (Luke Wroblewski) — 79% use their smartphone for reading email, a higher percentage than those who used it for making calls and in Feb ’12, mobile email overtook webmail client use.
- ProperSSL — a series of best practices for establishing SSL connections between clients and servers.
- How We Are Losing the War for the Free and Open Internet (Sue Gardner) — The internet is evolving into a private-sector space that is primarily accountable to corporate shareholders rather than citizens. It’s constantly trying to sell you stuff. It does whatever it wants with your personal information. And as it begins to be regulated or to regulate itself, it often happens in a clumsy and harmful way, hurting the internet’s ability to function for the benefit of the public.
- The Amazingly Low Cost of PRISM — breaks down costs to store and analyse the data gathered from major Internet companies. Total hardware cost per year for 3.75 EB of data storage: €168M
Radar podcast: the Internet of Things, PRISM, and defense technology that goes civilian
A strange ad from a defense contractor leads us to talk about technology transfer, and Edward Snowden chooses an unnecessarily inflammatory refuge.
On this week’s podcast, Jim Stogdill, Roger Magoulas and I talk about things that have been on our minds lately: the NSA’s surveillance programs, what defense contractors will do with their technology as defense budgets dry up, and a Californian who isn’t doing what you think he’s doing with hydroponics.
Because we’re friendly Web stewards, we provide links to the more obscure things that we talk about in our podcasts. Here they are.
- As the Vietnam War wound down, Boeing dabbled in both futuristic and not-so-futuristic public transit systems.
- In his farewell address, Dwight Eisenhower anticipated the rise of a military-industrial complex–a permanent, infrastructural presence for military contractors. In his “Chance for Peace” address, also very moving, Eisenhower enumerated the costs of military preparedness: “Every gun that is made, every warship launched, every rocket fired signifies, in the final sense, a theft from those who hunger and are not fed, those who are cold and are not clothed. This world in arms is not spending money alone. It is spending the sweat of its laborers, the genius of its scientists, the hopes of its children.”
- The Guardian interviewed Edward Snowden on video in Hong Kong, where he has fled to avoid prosecution for leaking the NSA PowerPoint deck that has caused a firestorm.
- A programmer has linked Arduinos with hydroponics to optimize growth patterns.
- For an overview of how software and industry might come together, take a look at my research report on the industrial internet, including a bit of background on Sight Machine, which makes quality control software for factories. (Full disclosure: O’Reilly’s sister firm, O’Reilly Alpha Tech Ventures, has become an investor in Sight Machine since I wrote the report.)
If you enjoyed this podcast, be sure to subscribe on iTunes, on SoundCloud, or directly through our podcast RSS feed.
.powerpress_links {display:none;} .powerpress_player {display:none;}