cheap smoke alarms radon gas detectors hydrogen leak detector
Monday, April 30, 2012
Maggie Gyllenhaal & Peter Sarsgaard Welcome Their Second Daughter!
Great news! Maggie Gyllenhaal and Peter Sarsgaard are the proud new parents of a baby girl named Gloria Ray!
OK! NEWS: PETER SARSGAARD ON PREGNANT WIFE MAGGIE GYLLENHAAL: "EVERYDAY THERE'S CRAZY CRAVINGS!"
natural gas detector for home room temperature alarm honeywell carbon monoxide
Senior Traffic Court judge quietly leaves post
gas alarm detector kidde wireless smoke detector methane detectors
Stagecoach 2012: Eli Young Band welcomes the dreamers
The Eli Young Band just got the music off to a pragmatically idealistic start for the sixth Stagecoach Country Music Festival in Indio.
refrigerant gas leak detector portable gas campfire smoke alarm for hearing impaired
Counterterror adviser: Obama's security not compromised by Secret Service Colombia conduct
The top White House counterterrorism adviser said Sunday that the Secret Service investigation into the prostitution scandal has so far shown President Obama's security "was not compromised" by agents' alleged misconduct ahead of Obama's arrival in Colombia.
chlorine gas detectors hydrogen gas detectors electronic radon monitor
Sunday, April 29, 2012
Jet Stream Damages Country?s Highest Astronomical Observatory
remote home temperature monitoring chlorine gas detector gas leakage detector
Can Helmets Cut Tornado Deaths? CDC Isn't So Sure
hydrogen sulfide detector moisture detectors cost of radon mitigation system
Saturday, April 28, 2012
Video: Wired?s Interview with SpaceX?s Elon Musk
Creating an effective crime-scene forensics report
room temperature alarm honeywell carbon monoxide best dual sensor smoke alarm
Kate Middleton & Prince William Celebrate Their First Anniversary! Check Out Their Year in Photos!
Happy Anniversary, Kate & Wills! The Duke and Duchess of Cambridge are celebrating a year of marriage on April 29, and we couldn't help but put together a special gallery of all their amazing moments from the past year.
OK! GALLERY: KATE MIDDLETON & PRINCE WILLIAM PAY THEIR RESPECTS AT GOLDSMITHS HALL
co2 leak detector he leak detector buy carbon monoxide alarm
Working: More recent research shows labs are convivial places
Published 09:17 p.m., Wednesday, April 25, 2012
best dual sensor smoke alarm smoke co detectors 4 gas monitors
?Kid? Yamamoto saves injured man?s life at Tokyo subway
Norifumi "Kid" Yamamoto, who has fought for the UFC, K-1, Shooto and Dream, was in a Tokyo subway when he spotted an injured man on the tracks.�Yahoo! Japan is reporting his actions saved the man's life.
Yamamoto jumped onto the tracks when he saw the injured man, who was bleeding heavily from his forehead. He tried to lift him off, but couldn't do it on his own. Yamamoto convinced bystanders to help him. Together, they moved him off the tracks to safety before the next train came along. The injured man is now in stable condition at an area hospital.
After an impressive career in Japan, Yamamoto lost three straight fights in the UFC. His last bout was a submission loss to Vaughan Lee at UFC 144 in February.
--
Follow Cagewriter on Facebook and Twitter.
Other popular content on the Yahoo! network:
? Tim Brown: Albert Pujols, Angels are a big-budget flop so far
? Report: Colts tell Andrew Luck they'll take him No. 1
? Dan Wetzel: Pat Summitt stepping down as Tennessee head coach, but impact remains
? omg!: Leading ladies show skin in magazine's steamy annual portfolio
smoke alarm for hearing impaired carbon monoxide detector for sale nitrogen gas detector
Friday, April 27, 2012
Pro golfer Lexi Thompson posts YouTube video asking military guys to take her to prom
Remember when Mila Kunis accepted an invitation to the Marine ball by Sgt. Scott Moore last year?
home natural gas detector confined space monitors kidde wireless smoke alarms
Simulation shows Discovery's final flight -- into D.C. (video)
smoke co detectors 4 gas monitors hearing impaired smoke alarm
Tibetan quake victims fight China government land grab
wireless temperature monitoring system h2s monitor methane gas detector
The CISPA Amendments We Really Need
The goal of CISPA, the Cyber Intelligence Sharing and Protection Act ? the latest cybersecurity legislation pending in the House of Representatives ? seemed so simple in the beginning: From time to time, security companies need to provide information about possible threats to government authorities so they can take action. When you write that idea down on a napkin, it makes sense. When you base legislation on what you wrote on the napkin, it becomes the next target of the Internet rights lobby.
The problem is that we live in an era when almost any system that can be exploited will be. The Internet is one example. The law is another.
You can?t disagree with what the napkin version of CISPA implies: Government alone cannot provide information security. When it?s put that way, everyone could get behind it. There are plenty of political ideas that, when presented as cleansed, bleached and distilled bullet points, immediately garner broad public support. The challenge lies with implementing these bullet points in a system that can?t be exploited. If SOPA taught us anything, it?s that anyone can exploit a system.
First, Shut Down Everything
The problem with CISPA?s original draft is that it would establish policies in a way that invites exploits. Any network admin will tell you that the best network access policies are implemented as restrictions with exceptions. You turn off all access, and then you create a whitelist of specific identities or functions that may bypass that roadblock. And then you establish a comprehensive audit trail around that bypass.
Yesterday evening in The Atlantic, Alexander Furnas made the point that CISPA is bad policy, at least insofar as it was originally crafted. He?s right in ways he didn?t get around to enumerating. While the basic principles of its author, House Intelligence Committee Chairman Mike Rogers, R-Mich., may be laudable, CISPA wasn?t built for the Information Age. Specifically, it sets up a channel for security agencies and security companies to talk about stuff that may (a very interesting word in this context) apply to cybersecurity.
This sharing of cybersecurity-related information between private and public agencies may entail the disclosure of personally identifiable data, or information that can be combined with such data to reveal other hidden characteristics (using what software vendors refer to as analytics).
Yes, there needs to be a way to accept that this sort of issue will crop up when information is being shared, and to excuse it so that every security issue doesn?t end up being resolved (or not) in a courtroom.
No, No, No ?Notwithstanding?
But it is no longer good policy to simply legislate that certain information that may fall within a certain context may be shared; that anything that violates privacy may be excused; and that, worst of all, any law that says such violations may not happen may be overlooked.
That?s the danger of the clause that, even after Rogers' first set of amendments last week (PDF here), remains in play - the one that begins, ?Notwithstanding any other provision of law.? But many of the advocacy groups that seized on this clause did so in such melodramatic and apocalyptic terms as to invite reasonable people to defend it.
Yet there really is a problem with a policy that says, ?Ignore everything else and treat this as paramount.? That?s not the type of exception that good information systems policy requires ? the kind that creates a limited way around a blanket restriction. Instead, it is a weakening of links in the legal chain, and any weak link is likely to be exploited.
One fear is that such an exploit will come from rights holders who argue that compromising the security of a network in order to commit copyright violation is a threat to the nation?s economy and thus, by extension, to national security.
When you distill an idea to its basic bullet points, it?s harder to disagree with it. That?s why TV political ads are 30 seconds long instead of 30 minutes.
In reality, though, the theft of intellectual property is a legal matter, and should not be treated as a ?cyber threat.? So the second set of Rogers bill amendments is quite welcome. They help define terms and refine the context of the discussion.
For example, the revised Definitions Amendment (PDF here) redefines ?cyber threat information? using phrases such as: ?information directly pertaining to? a threat to the integrity, confidentiality, or availability of a system or network of a government or private entity, or any information stored on, processed on, or transiting such a system or network.? Granularity is good.
A CISPA Whitelist
Now for the next step: a new set of recommended CISPA amendments. Rephrase the new policy the way a good admin would: as a prohibition against the distribution, without court order or lawful mandate, between private entities and government security services, of any information that may be used to identify or characterize a U.S. citizen. Start with a blank slate.
From there, use the classifications in the latest Definitions Amendment as exceptions. Stipulate that these are the circumstances in which exceptions must be made to protect vital national security interests.
Then, establish an audit trail. State that all transactions must be registered, and the log of those registries may be obtained by public request, pending the approval of a judge.
The danger is that this ideal may be boiled down to its bullet points to garner opposition:
- Government must not be open.
- The free flow of information is dead.
- People don?t have the right to know what?s being shared about them without a judge?s approval.
With the master?s touch of a political activist, almost any beneficial idea may be spun to sound fascist.
My 30-second rebuttal: We do need something like CISPA, but the privacy of American citizens and the national security of the United States are too important to be left to intentionally vague regulations and legislation. That?s the wrong kind of openness. With each set of CISPA amendments, however, a viable solution is coming closer.
Scott M. Fulton, III is the author of this document and is solely responsible for his content. He will appear live on NTN24 (DIRECTV 418) Friday, April 27, at 12:30 EST/9:30 PST to talk CISPA with Monica Fonseca.
Stock images by Shutterstock.
formaldehyde gas detector smoke detectors for the hearing impaired remote alarm monitoring