Searching Creative Commons

Via Joi Ito

Late last night, Yahoo! launched a Creative Commons search engine , permitting you to search the web, filtering results on the basis of Creative Commons licenses. So, as I feel like I've said 10,000 times when explaining CC on the road, "Show me pictures of the Empire State Building that I can use for noncommercial use," and this is the first of about 13,000 on the list.


Blackout, viruses concern congress

Cory Reiss, The Ledger online
09/09/2003
 
WASHINGTON -- When modern life halted for millions in the Northeast last month, people throughout the country asked if a blackout could strike them.

Members of Congress have a more frightening question: Could someone cause such havoc on purpose?

The blackout combined with unrelated but crippling computer viruses and worms has lawmakers connecting the dot-coms. They say the blackout provided a vivid example of the chaos that cyber-terrorism could inflict.
Read more


Who needs radio?

For the past two weeks, I've been listening exclusively to podcasts on my iPod during my commute.  The software automatically downloads the content and places it within my iTunes library.  I sync my iPod and them I am ready to go.  The content is fantastic and I can tune into whatever podcast I am interested in.

Check it out at Podshow.com  or Podcast alley


Hacking a Terror Network


It was my pleasure to be the technical editor on this book by Russ Rogers. Click here to check it out on Amazon.com.


It’s cultural-sensitivity training, with weapons.

Evan Wright, author of the excellent book "Generation Kill" participated in the TRC Mirror Image training program and wrote a feature article on it for the New York Magazine. 

Developed in 2002 by the Virginia-based consulting group Terrorism Research Center (TRC), the Mirror Image program is the first of its kind in the war on terror. It’s also one of the few counterterrorism courses designed for street cops, soldiers, and federal agents alike. “In this conflict, there’s a blurring of front lines,” explains Walter Purdy, a former Marine and vice-president of TRC. “Beat cops in American cities and U.S. soldiers in Fallujah could easily be up against people who share the same ideology, habits, culture, and tactics. Our goal is to immerse our students in the mind-set of that enemy.Full Story


Exploration with a capital E

I've been a fan of Wired magazine since its inception and boast of having the first issue in my collection.  While Wired quality suffered for a few years, they are fully back on their game.  This month contains and exceptional section by Jame Cameron on exploration.  I'd encourage anyone who can get their hands on a copy to read pages 190-191.  The whole section is fantastic, but that introductory essay is spot on.

<blockquote>Exploration is not a luxury. It defines us as a civilization. It
directly or indirectly benefits every member of society. It yields an
inspirational dividend whose impact on our self-image, confidence, and
economic and geopolitical stature is immeasurable.</blockquote>

Update:  <a href=http://www.wired.com/wired/archive/12.12/cameron.html>It is now available online</a>


Terrorism Early Warning Group Works to Keep L.A.'s Guard Up

Great article about a great friend...

"In a cramped office inside Los Angeles County's emergency operations center, John P. Sullivan sits buried in the latest intelligence on terrorists around the world.

Should any ever attack Los Angeles, this soft-spoken sheriff's sergeant will be indispensable to the response.
Read more


Looks like a done deal

In this age of instant gratification, it is strange to go to bed not knowing who the President will be. What I look forward to is hearing about how the electronic voting machines worked out. I've seen a few horror stories already regarding system crashes, but that is to be expected. I a waiting for all the "evil hacker" stories.


How bizarre...

You can Google colleagues, you can Google blind dates and you can Google kidnap victims:

Google 'saved' Australian hostage - - An Australian journalist kidnapped in Iraq was freed after his captors checked the popular internet search engine Google to confirm his identity. John Martinkus was seized in Baghdad on Saturday, the first Australian held hostage in Iraq since the US-led invasion. But his captors agreed to release him after they were convinced he was not working for the CIA or a US contractor. He was reported to be making his way home to Australia on Tuesday.


Disaster waiting to happen

Coming from the guy who wrote the Cyberthreat Assessment for the National Airspace System, it would not surprise me if this story is true.

A major breakdown in Southern California's air traffic control system last week was partly due to a "design anomaly" in the way Microsoft Windows servers were integrated into the system, according to a report in the Los Angeles Times. The radio system shutdown, which lasted more than three hours, left 800 planes in the air without contact to air traffic control, and led to at least five cases where planes came too close to one another, according to comments by the Federal Aviation Administration reported in the LA Times and The New York Times. Air traffic controllers were reduced to using personal mobile phones to pass on warnings to controllers at other facilities, and watched close calls without being able to alert pilots, according to the LA Times report. The failure was ultimately down to a combination of human error and a design glitch in the Windows servers brought in over the past three years to replace the radio system's original Unix servers, according to the FAA. The servers are timed to shut down after 49.7 days of use in order to prevent a data overload, a union official told the LA Times.

My Linux box in the basement has been up for several hundred days.