How conflicted with the report that Google and other major investors are pouring money into Bitcoin. Dwolla was one of the key mechanisms for getting money into and out of Bitcoin. My guess is that …
Privacy in the Age of Big Data
Social media, Web 2.0, the Internet of Things, mobile computing, and the expansion of sensors is allowing more information to be gathered than ever before which, coupled with Big Data analytics, …
Russia announces new $50 billion space program
Are we facing a new space race? "Russia is celebrating its Day of Cosmonautics in grand fashion today. President Vladimir Putin has announced a new multi-year plan to develop the country's …
Continue Reading about Russia announces new $50 billion space program
Quantified self devices create unique data signatures for each user
This fascinating story on GigaOm discusses the implications of big data and personal privacy. What was uniquely interesting was this quote from CIA Chief Technology Officer Gus Hunt in describing how …
Continue Reading about Quantified self devices create unique data signatures for each user
Hacking the Human Brain: The Next Domain of Warfare
Influencing OODA Loops is nothing new. Having a direct interface outside the senses is… "It’s been fashionable in military circles to talk about cyberspace as a ‘fifth domain’ for warfare, along …
Continue Reading about Hacking the Human Brain: The Next Domain of Warfare
The Current State of Augmented Reality
Augmented reality is a composite, real time view of the world overlaid with computer information or graphics. Augmented reality has been getting a lot of attention since the announcement of Google …
Continue Reading about The Current State of Augmented Reality
China internet cafe worker Cao Haibo jailed
It will be interesting to see what happens when someone gets jailed for subversion of state power while operating from their Internet connection provided by a Western company for their Chinese …
Continue Reading about China internet cafe worker Cao Haibo jailed
State Sponsored Cyber Threats – The Long View
With the increasing chatter regarding the targeting of critical infrastructure by sophisticated attackers, I thought it would be valuable to look at this issue not in the context of the current …
Continue Reading about State Sponsored Cyber Threats – The Long View
Malware Analysis: The Danger of Connecting the Dots
The findings and conclusions of malware "analysis" are not in fact analysis; they are, however, a collection of data points linked together by assumptions whose validity and credibility have not been …
Continue Reading about Malware Analysis: The Danger of Connecting the Dots
The Russian and Chinese Drone Programs
Unmanned aerial vehicles have become the signature of American offensive military operations. While far from perfect, drones are now critical to achieving US goals in an effective and efficient …
Continue Reading about The Russian and Chinese Drone Programs