Archive for June, 2007

Non-Combat Injuries

According to a Marine Corps document produced earlier this month, the men and women on the front lines of the Global War on Terror just might be their own worst enemies.
Read the rest of this entry »

Published in: Geekiness, General | on June 30th, 2007 | No Comments »

Room for Improvement at DHS

June 30th, 2007 is the self-imposed deadline at the Department of Homeland Security for a broad range of changes designed to improve their performance in handling FOIA requests. As tomorrow is a Saturday, that makes today the de-facto deadline for all DHS components to get their ducks in a line.
Read the rest of this entry »

Published in: Geekiness, General, Security | on June 29th, 2007 | No Comments »

Computer Forensics and Forensic Analysis

It’s almost certainly nothing groundbreaking, but the instructor of a course on computer forensics and forensic data analysis at the Navy Postgraduate School has thoughtfully put many of his class resources online, accessible by the world. A collection of presentation notes in PDF form is here; a large list of resources on the subject is right here.
Read the rest of this entry »

Published in: Geekiness, General | on June 29th, 2007 | No Comments »

What The CIA Is (Trying To) Hide

As described here previously, the “family jewels” documents released by the Central Intelligence Agency are full – full – of redactions. On very nearly every page, at least a little information has been withheld by the Agency for reasons, well, unknowable to we mere mortals. Even if their logic escapes you and I, we can still infer at least a little bit of what they’re withholding.
Read the rest of this entry »

Published in: Geekiness, General, Security | on June 28th, 2007 | 1 Comment »

The Exemption Game

Nearly every page of the CIA’s “Family Jewels” released yesterday contains at least one redaction. As I wrote yesterday, some of these redactions are highly suspicious; others merely highly questionable. A few seem irrational, illogical, and apparently completely arbitrary.
Read the rest of this entry »

Published in: General, Security | on June 27th, 2007 | No Comments »