Tag Archives: Central Intelligence Agency

DigiNotar Breach Notes

By | September 6, 2011

Some folk have asked me for more details about the DigiNotar breach after my brief appearance on Al Jazeera this morning. So here are the notes I prepared for the segment. Links at the bottom. Background web security certificates are digital IDs issued by companies entrusted with making sure they are given to the right company or organisation.… Read More »

Using Data to Find Bin Laden

By | May 4, 2011

Where they thought he was and where he was. Great piece — Geographers Had Predicted Osama’s Possible Whereabouts – ScienceInsider (thanks Daily Kos- Geographers predict Osama’s location) which tells the story of Thomas Gillespie, a UCLA geographer who, along with colleague John Agnew and a class of undergraduates, authored a 2009 paper predicting the terrorist’s whereabouts, were none… Read More »

Data, WikiLeaks and War

By | December 8, 2010

I’m not going to get into the rights and wrongs of the WikiLeaks thing. Nor am I going to look at the bigger implications for the balance of power between governed and governing, and between the U.S. and its allies and foes. Others have written much better than I can on these topics. I want to look at… Read More »

Plaxo Moves Into Macland

By | March 14, 2006

Plaxo, the software and service that lets you update your contact details with others — and lets them update theirs with you — automatically, is now available for Mac. A press release issued today (thanks, Joseph) says the move “represents a major step toward the company’s vision to offer the first truly universal personal contact management service, accessible… Read More »

Did A Computer Virus Bring Down The Soviet Union?

By | February 28, 2004

Did software, deliberately programmed by the CIA to fail, hasten the end of the Soviet Union? The Washington Post reports (registration required) that “President Ronald Reagan approved a CIA plan to sabotage the economy of the Soviet Union through covert transfers of technology that contained hidden malfunctions, including software that later triggered a huge explosion in a Siberian… Read More »