Protect yourself.

War Cyberspace, Cybersecurity, Cyber Warfare Protect yourself. Protect yourself.  McAfee 2017 Total Protection - 5 Devices [Online Code] $24.99$79.99  (245)  Webroot Internet Security Complete + Antivirus 2017 |… $36.00  (1060)  Norton Security Deluxe 5 Device PC/Mac $39.99$79.99  (2900)  SOFTWARE to block RANSOMWARE -- VEEDogTM… $29.95$69.95  (11) All Search Amazon  Go Ads by Amazon   How do we stop Russia’s and China’s cyber-meddling in our affairs?  Should this be considered an act of war? > Big Questions Do you have nothing to hide?  Are you sure? Should the NSA be broken up? big ideas  Are we moving towards a surveillance state? in general: anti-surveillance: Electronic Frontier Foundation | russian cyber espionage: Fancy Bear | you’ve been hacked: Peace | ransomware: KeRanger | conferences & training: blackhat | critical infrastructure: carmaggedon | cyber armies | education & awareness: esetfoundation, Natonal Cyber Security Hall of Fame | news & analysis: Schneier on Security | Amnesia Carey | Cybersecurity and Cyberwar Singer | Cyber War Clarke | Intelligence Gathering and the Unowned Internet Berkman | The Director Ignatius

China’s Social Credit System

World Since 1920 / East Asia in the 20th century China since 1912 When America China sneezes, the whole world gets a cold. Long term, is it a good idea to take China’s money? Will China’s model for growth which extracts a heavy sacrifice and toll from its people, be sustainable? Development of republic 1912-20: old order disintegrated Interwar years 1920-37: growth of Chinese Communist Party (CCP) War against Japan 1937-45: 2nd Sino-Japanese War after 1st 1894–95 Kuomintang: anti-communism, Chinese nationalism, reunification Chinese Communist ideologies: dynamic to safeguard the party's rule Emergence of the People’s Republic of China economic reform: 60-point plan Internet  social credit: Sesame Credit > Gamification | e-Commerce: alibaba | internet sovereignty | messaging: tencent | search: Baidu orphans: Half the Sky social radar: dissent 2015 population: two-child policy | economy: market meltdown | October: Conflict in South China Sea in general: communist propaganda hip-hop…what!?: rap-aganda | food safety | buy anything: lightinthebox | consumer marketing: prcdirect      books/movies: propaganda: Propaganda Bernays | #1 movie: Monster Hunt | fragile: Red Capitalism Walter | history: In Search of History White | investing: The Chinese are coming, and they’d like to buy your house Francis

China’s social credit system (BBC)

 

Cybersecurity


Ponemon Research Institute

Development of Technology Trustworthiness How do you measure/validate trust in the cybersecurity of the enterprise? > Cybersecurity How can big-city police (e.g. Baltimore) and neighborhoods-at-risk rebuild trust in each other? How do you know if someone is trying to win, or lose? Parameters of trust Trust is built over a marriage, a career, a lifetime, but can be lost in a second. sp Confidence Reliability Integrity: trustworthiness over time Privacy Resiliency: Antifragile: Things That Gain from Disorder Taleb Skepticism and Conspiracy Theory Terms of Service: monitoring: docracy | ratings: crowd ratings Truth (correctness) photos: A bullet can kill a man, but a lying camera can kill a nation. lying: There is no defense against lying. sp | white lies vs black lies Technologies of trust big data: cyber-physical systems: terraechos certifications: kikscore drug testing federations: InCommon passwords: keepersecurity products & services relationship mining: intersecting people sp | Relationship Science scoring trust: TrustCloud Fields of Application human-machine relationships marketing: celebrity DBI DBI= 0.6*(Awareness) + 0.4*((Appeal+ Breakthrough+Trend-Setter +Influence + Trust + Endorsement + Aspiration)/7) Societal Risk Management (SRM): graduate program Software: Top 25 Most Dangerous Software Errors in general: advertising: evidon, doubleverify | medical devices: Open Medical Device Research Library omdrl.org | electronic voting: Do electronic voting machines improve the voting process? | Failed States Index: fundforpeace | financial institutions: credit cards, financialtrustindex | internet |sports: Lance Armstrong, research | wellness: Dr. Oz, Food Babe untrustworthy: corporations: Volkswagen | government: NSA | nonprofits: FIFA, Red Cross | politicians: Chris Christie, Hillary Clinton articles, books: ubiquitous: Trust is the glue that holds us together sp | Dare: Accepting the Challenge of Trusting Leadership Weiss | Extreme Trust: Honesty as a Competitive Advantage Peppers | Just How Fragile Are America’s Bridges? Sofge | Likeonomics Bhargava | The Fix: Soccer and Organized Crime Hill Crime

How do you validate trust in the cybersecurity of the enterprise?