Cyber-Attack Detection is Difficult, Needs Monitoring

computer spy

Despite cyber-prowess and a staggering and secret budget, US intelligence agencies appeared unable to halt a deep and sustained invasion of sensitive federal information.  In May, an attack hit the IT system of the Office of Personnel Management (OPM) and its data stored at the Department of the Interior’s data center. Information for about 4 […]

The Public Needs a Seat at the National Security Table

computer spy

Bulk surveillance of American’s telecommunications services by the National Security Agency (NSA) was, according to some, authorized in the Patriot Act Section 215 and was monitored by the Foreign Intelligence Surveillance Court (FISC).  But, the Second Circuit of the U.S. Court of Appeals ruled that Section 215 of the Patriot Act does not permit NSA […]

EU Protectionism on the Rise

technology-header

For two decades, Google has focused tightly on improving its prowess in Internet search.  It is very good at search, and while it dominates search (worldwide about 88%) it is not the only player.  Microsoft’s Bing (4.5%) also produces excellent results, along with other rivals Yahoo (4.3%) and Baidu (0.6%).  When consumers choose among these […]

State’s 911 Tax Hike a Non-Emergency

Mobile communications and social networking concept

Pennsylvania Consumers love their smartphones and the associated applications that deliver better access to health care, delightful entertainment, informative news and communications with our family and our friends.  Perhaps most revered are the work-related applications that improve productivity and well-being.  The future is bright – the growing sophistication of applications will further tighten consumers’ reliance […]

Welcome Body Cams – Here’s the Rules

iStock_000019887497Medium

In recent police-suspect encounters, the public’s accurate understanding of the events hinges on whether a video recording is available.  While witnesses may be plentiful, they seldom have that rarest of attributes, an excellent and unbiased memory.  Until a credible record of events is available, the public tends to shape a story from their imagination and […]

It’s No Longer Safe to Ignore Cybercrimes

computer spy

The nation-state hackers breaching our government and private information systems are the same enemies we face in the physical world.  They are the same countries that demonstrate no respect for human life, and certainly none for privacy.  Although our laws give the military and law enforcement a monopoly on fighting back against cybercriminals, the weakness […]

ACI Participates in ITERA Conference

internet-header

The Telecommunications and Information Technology Conference,  whose institutional members consist of twenty major U.S. universities, addressed a variety of science, engineering, educational management, network, privacy, security and other network issues at its eleventh annual conference in Washington, DC on March 27th to 28th of this year.  ACI president, Steve Pociask participated on a panel that discussed the […]