Home » Posts tagged "Risk"

Should Blackberry Phones be illegal in the US also and is the phone a national security risk?

Question by Blue: Should Blackberry Phones be illegal in the US also and is the phone a national security risk?
In United Arab Emirates and Saudi Arabia they are banned. Black Berry messaging is encrypted. Its a national security risk they say. So will they be illegal in the US also soon or is our government smarter? Should all forms of encryption be illegal including https websites for credit cards? Is it really that big of a risk? Do you think our Government will try to ban encryption also?

Best answer:

Answer by Possum
No.

What do you think? Answer below!

Could legalizing gay marriage cause a moderate risk to national security? In which countries?

Question by Scyllis: Could legalizing gay marriage cause a moderate risk to national security? In which countries?
Afghanistan is obviously the most obvious one, where the civil govt is unstable and only has tenous contro, with a lot of its support built on popularity– any other examples where such an act would estrange the gov’t from a segment of the population so much as to jeopardize a country’s national security interests?

Best answer:

Answer by vinny_says_relax
Theres no such thing as gay marriage.

Marriage is a man and a woman…If they allow gays to marry because they ‘love’ each other then you also have to allow brothers and sisters who love each other, someone who loves their dog can marry it, marry their mother as well, pervert it all they want.

Give your answer to this question below!

What national security policies did JFK do to reduce the risk of nuclear war?

Question by D D: What national security policies did JFK do to reduce the risk of nuclear war?
What national security policies did JFK do to reduce the risk of nuclear war?

Best answer:

Answer by youthpastor1955
All these jokes about Marilyn Monroe are coming to mind, but I better be a good boy.

Know better? Leave your own answer in the comments!

Does shutting down Big 3 put our national security at risk?

Question by Visions_Of_Johanna: Does shutting down Big 3 put our national security at risk?
It’s easy to say “let ’em fail”, but what will happen to our national security (especially since we are still at war) if we lose our manufacturing capabilities? The auto companies played a crucial role during WWII. If we just let them shut down now, this would have serious consequenses for our national defense. I personally don’t think the Big 3 should get any bailout money unless bad management gets the heave-ho and new management and the UAW renegotiate their unsustainable compensation packages. The times, they are a-changin’.

Best answer:

Answer by DA2009
Obviously you don’t know the process……if we let them fail, they won’t just up and leave..

more than likely the debt holders continue operations and keep the company going (with major changes in management of course)

Know better? Leave your own answer in the comments!

America?s New National Security Risk P2p Networks

Washington, DC & Hollywood, Calif. — “We found more than 200 classified government documents in a few hours search over Peer-2-Peer networks,” said Retired General Wesley K. Clark


at a recent Government Reform Committee hearing (7-24-07). Describing it as the new national security risk Clark said, “We found everything from Pentagon network server secrets to other sensitive information on P-2P networks hackers dream about.”


Clark, now the chairman and CEO, of Wesley K. Clark & Associates, and a board member of Tiversa, Inc., which conducts 350 million searches per day, compared to Google’s 150 million daily searches.


“If everyone knew the scope of the risk of P2P networks, America would be outraged and demand solutions” Clark suggested regulation and mandatory defensive active monitoring programs, especially for sensitive government documents. “If you wait for the lawsuit, you have waited too long.” Clark noted that many of our national information security leaks were fresh, complete and often were distributed on home computers over P2P networks.


Chairman Henry Waxman (D) investigating the P2P networks invited LimeWire and StreamCast to testify along with other interested experts on illegal filesharing before the U.S. Houses of Representatives Committee on Oversight and Government Reform. Last March, United States Patent and Trademark Office released a study revealing that inadvertent file-sharing continued to threaten individual privacy and national security.


“This is the new threat to Homeland Security,” CEO Robert Boback, told the hearing. “We found thousands of corporate cases from banking statements, server passwords, financial data, public company data, human resources, medical records and fortune 500 company minutes on compliance.”


“One of the defining characteristics of contaminated networks is that users rarely ever know that they are sharing the files on their computer with other users on the network,” said SafeMedia Corporation Chairman Safwat Fahmy in his written testimony on how SafeMedia’s technology was developed to address illegal sharing of copyrighted materials on contaminated P2P networks. “Our technology eliminates all the identity theft and security risks of contaminated P2P networks that affect consumers, students, businesses and our national security.”


Fahmy also stated in his written testimony to the Committee that, “P2P networks, in order to work and survive, requires that all users share files. If users are unable to share files to be downloaded, then the network would be pointless and cease to exist. So, the developers of the P2P software create a directory on the user’s computer called “shared” to be uploaded on demand to any user on the entire network most often without the user knowledge, at the time of installation.”


Other startling testimony surfaced from Professor M. Eric Johnson, director, Center for Digital Strategies, Tuck School of Business, Dartmouth College. To illustrate the threat of P2P file sharing, his researchers ran a set of “honey-pot” experiments. They posted the text of an email message containing an active VISA (debit) number and an AT&T phone card in a music directory in a contaminated P2P network that was shared via Limewire.


“It appears that two takers of the card were able to obtain funds as the activity was split into two groups,” Johnson told the hearing. And it happened, “because one taker used Paypal, which is more US-centric, while the other used Nochex, which is UK-centric. Within another week, the calling card was also depleted. Examining the call records of the card, all of the calls were made from outside of the US to two US area codes – 347 (Bronx, NY) and 253 (Tacoma, WA), illustrating the P2P threat both within and outside of the US. Even more interesting, long after we stopped sharing the file, we observed the file continuing to move to new clients as some of the original takers leaked the file to others.”


In a second study, researchers examined bank-related documents and found circulating sensitive data as bank statements, credit reporting agency records, user ID and password lists and tax returns were inadvertently “shared” with millions of people. There was also evidence of sensitive government information being distributed through P2P networks over a two-month period.


“At SafeMedia, we have developed business solutions combining P2P Disaggregator technology (P2PD) and a Digital Internet Distribution Solution (DIDS) that prevents contaminated P2P networks from indiscriminately being accessed by users’ computers,” explained Fahmy. “Our solutions utilize advanced technologies such as: Adaptive Fingerprinting and DNA markers; Adaptive network patterns; Intelligent libraries; Remote update and Self-healing to effectively drop all contaminated P2P traffic with No Invasion of User Privacy. P2PD is fully effective at forensically discriminating between contaminated and non-contaminated P2P traffic with no false positives whether encrypted or not: P2PD operates at network speed with little or no latency.”


Fahmy added “The purpose of P2PD technology is not to shut down P2P networks or inhibit P2P technology. “We allow traffic from non contaminated P2P to pass to its destination we only drop traffic to and from contaminated P2P networks.


“Many users now are enjoying the protection of their identity and safety of their network from contaminated P2P network by using SafeMedia’s products which are available now for immediate implementation in DSL/Cable modems or as a standalone network appliance named” Clouseau” said Fahmy.


[Editors note: For media interviews contact George McQuade, MAYO Communications, 818-340-5300. For more information about SafeMedia Corporation product line visit www.SafeMedia.com or call 561-989-1934. To hear today’s testimony from the U.S. House Of Representatives Committee on Oversight and Government Reform, on the” Inadvertent Filesharing Over Peer-To-Peer Networks Hearing,” please visit: http://oversight.house.gov/story.asp?ID=1430 ]

George S. Mc Quade III is a national award-winning journalist and media expert, often quoted in business, mainstream and high tech media circles. He is the West Coast Bureau Chief for O’Dwyer Publications in New York, which is the only daily behind the scenes publication on media. McQuade founded MAYO Communications & MAYO PR, an international award-winning entertainment publicity and public relations firm based in Los Angeles with offices in New York and San Diego, CA. MAYO Communications is a 100 percent woman-owned and Spanish-owned PR firm with three

company websites: www.MayoCommunications.com; www.MayoPR.com; www.LAentertainmentPublicity.com.