Category Archives: Miscellaneous

USA TODAY: France bans work e-mail after 6 p.m.

From USA TODAY

France bans work e-mail after 6 p.m.

France already has a 35-hour work week, and a new rule is designed to make sure that it doesn’t start shading toward 40 hours because of work-related e-mail. The Guardian reports that the rule forbids workers from checking their phones or computers for work stuff after 6 p.m., and it forbids employers from pressuring them to do so. The move apparently doesn’t affect all workers in France, but it does cover about 1 million workers in the tech industry — including French employees of Google and Facebook. At Fox Business, a U.S. labor expert finds it hard to believe the IT industry can manage such a draconian shut-off time. “There’s always something going wrong off the clock — when a computer goes down, it doesn’t go down between 8 a.m. and 5 p.m.”

http://usat.ly/PXQZXC

Get USA TODAY on your mobile device:
http://www.usatoday.com/mobile-apps

I wonder how early you can start.

Leadership in the High North – Arctic Symposium – May 20-21, 2014 – Tickets Available

Station_Map

 

Eleven nations established 14 principal research stations across the Polar Regions. 12 were in the Arctic, along with at least 13 auxilary stations. Over 700 men incurred the dangers of Arctic service to establish and relieve these stations between 1881 and 1884.

http://www.arctic.noaa.gov/aro/ipy-1/Frontpage.htm

Arctic_circle.svg

 

http://en.wikipedia.org/wiki/File:Arctic_circle.svg

Leadership in the High North

Arctic Symposium

May 20-21, 2014
Bangor Maine

Current Status

A very interesting symposium will be taking place in Bangor, May 20-21. The number of seats available is very limited. I have managed to obtain some tickets for the Bangor Foreign Policy Forum. If you are interested in attending, please contact me right away.

The purpose of this unclassified symposium is “to explore the challenges and emerging opportunities arising from the significant increases in Arctic activity due to the diminishment of sea ice and the emergence of the new Arctic environment.”

Why is this Topic Important?

Read these current articles, in light of current international tension with Russia over the Crimea:

http://barentsobserver.com/en/security/2013/12/putin-orders-new-airports-strengthens-arctic-control-11-12

Putin orders new airports, strengthens Arctic control. “We are returning to the Arctic and must possess all instruments of power for the protection of our national security interests”, Putin told his top military brass this week.

http://www.cnn.com/2014/03/14/opinion/slayton-rosen-russia-u-s-arctic/index.html?hpt=hp_bn7

“While much of the world is focused on the Russian incursion into the Crimean Peninsula of Ukraine, another long-term move may allow the former Soviet navy to dominate U.S. interests to the north: the Arctic”

 

Tentative Speakers and Attendees List

Distinguished Maine Professor Paul A. Mayewski, Director of the University of Maine’s Climate Change Institute.

GEN Charles Jacoby, Commander US Northern Command and North American Aerospace Defense Command.

MGen Coates, the Deputy Commander (Continental), Canadian Joint Operations Command, National Defense and Canadian Armed Forces.

Mr. Philippe Hebert, Director of Policy Development (Arctic File), Canadian Government.

MG Thomas H. Katkus, Alaska’s Adjutant General. MG Katkus will participate in the final panel discussion entitled “The Way Ahead” on Wednesday afternoon.

Mr. John Henshaw, Executive Director of the Maine Port Authority.

Tentatively, ADM (retired, USN) James Stavridis, the Dean of the Fletcher School of Law and Diplomacy, Tufts University has agreed to present to the symposium.

Five State Adjutant Generals have confirmed their attendance: Maine, Vermont, Alaska, Massachusetts, and Rhode Island.

There will be a panel discussion to explore what we as a region are already doing with regards to the Arctic.

The U.S. Army Mountain Warfare School will present their High North experiences and will display some cold weather operations equipment.

There are confirmed guests from the University of Maine, the United States Coast Guard, the New York Air National Guard, the Vermont Army National Guard, the U.S. Army Mountain Warfare School, the Massachusetts’s National Guard, the Rhode Island National Guard, Senator King’s office, NORTHCOM, National Guard Bureau, Canadian Defense Forces, the Canadian Government, the Maine Port Authority, and the Maine National Guard.

Seats are going fast.

A Cautionary Tale about Blogging with WordPress

Recently I received a copyright infringement notice from a large vendor of images including a request for a hefty settlement. Included was a reproduction of the offending page from my blog with a grainy reproduction of the image in question. I was puzzled by this, since I had no interest in the image and did not remember ever copying it. I was even more puzzled when I went through the media collection on my website and could not find the image.

I then went through my blog entries and found the offending page. When I look at the entry in WordPress no image tag appears, but when I look at the entry in a browser I see a thumbnail of the image on the target website. Now there are many issues that come up here including the issue of Fair Use. The only way I could remove the image from the web page was to remove the hyperlink from the page. I could display the URL for the target page, but as long as I did not put a hyperlink for the user to click, the image did not appear.

The reason that I did not spot the image, was that I use a WordPress app to share articles that I think are of interest. The entry produced by the app is pure text and hyperlinks and does not show any images. It is only when WordPress posts the entry that the images become visible when the entry is viewed through a browser. It is not clear to me how one can charge copyright infringement when the website you are pointing to puts the image into the view that people have of your website but not on the website itself.

I looked at the originating website and saw that the image was not just placed there using an image tag. Instead, the image is inserted through a reference to mobify.com which apparently rescales the image so it would be appropriate for screens of different sizes. My conjecture is that somehow mobify.com and WordPress conspire to make images appear when people view your website through a browser even though the image is not located on your website.

Not every website has this problem, but unfortunately some of my favorites like IEEE Spectrum do. At this point, I recommend that you review any postings that you might have made with WordPress and see whether images are appearing that you did not explicitly copy. If they are there and you want to remove them, I suggest leaving the URL but removing the hyperlink. This is less handy for your readers, but could avoid some hassles. I will keep people posted as I learn more. I do not know if other blogging software suffers from the same problem. If you have information about this effect, I would be interested in hearing from you.

ATTACKING ICS SYSTEMS ‘LIKE HACKING IN THE 1980S’

“Here’s how nuts the world of ICS security is: Jonathan Pollet, a security consultant who specializes in ICS systems, was at a Texas amusement park recently and the ride he was waiting for was malfunctioning. The operator told him the ride used a Siemens PLC as part of the control system, so he went home, got his laptop, returned and was able to debug the software, find the problem and fix it and get the ride going again.

And here’s how nuts the state of building automation security is: Terry McCorkle, an ICS and automation security researcher, was doing an assessment of a building’s security and was able to access its automation system over the Internet. He accessed the HVAC system and from there was able to pivot to the lighting and surveillance system. He then found the access control and energy management system and was eventually able to unlock the doors, turn off the IP cameras, open the parking garage door modify the access-control database.”

For more follow the link below.

https://threatpost.com/attacking-ics-systems-like-hacking-in-the-1980s/104200

 

Slick, sick nation-state espionage malware The Mask: Mother of future cyber weapons? | Computerworld Blogs

http://blogs.computerworld.com/cyberwarfare/23526/slick-sick-nation-state-espionage-malware-mask-mother-future-cyber-weapons?source=CTWNLE_nlt_security_2014-02-13’>Slick, sick nation-state espionage malware The Mask: Mother of future cyber weapons? | Computerworld Blogs