Thanks to the professional, virtuous work of security researchers Chris
Valasek and Charlie Miller and some fantastic reporting on this research by
Andy Greenberg of Wired Magazine, we have long known that theoretical hacks
against cars are no longer theoretical. They are real. Many connected cars
can be hacked and they can be hacked from long distance. And the threats
include threats to safety.
The publicity brought to these issues was incredibly important and helpful.
Zero action would have occurred without it.
Now, almost a year after the research was initially published, the FBI,
Department of Transportation and National Highway Traffic Safety
Administration have issued a joint alert. This alert provides more
background, discusses some of what the government does, and provides some
tips to the driving public.
The full public service announcement is here: Motor... (more)
Want to Learn About the Coming Internet of Things? Read About the Victorian
In the late 1990's Tom Standage released the first edition of a book that
would sweep across the tech community because of its incredible analogies to
the rise of the Internet hitting the world at that time. The "Victorian
Internet", first released in 1998, was updated and re-released again in 2013.
It provided a well-written history and meaningful assessment of the rise of
the Telegraph, and made very interesting observations about how the
remarkable impact of the Telegraph could help us all th... (more)
What If This Is the Most Important Thing the Government Can Do to Enhance Our
In December 1998 when transitioning into a job doing intelligence support to
DoD computer network defense, one of my mentors reminded me of a Reagan-era
publication that helped the public better understand the Soviet threat
called "Soviet Military Power." This document was based on the
intelligence. It provided the best possible understanding of Soviet military
hardware and operational concepts but was produced at an unclassified level
so it could be broadly disseminated. My mentor was ... (more)
#AppleVsFBI – #FBIVsApple – The Basics, Explained, with Links to Original
This post provides an update on the ongoing battle between Apple and the
U.S. government regarding Syed Rizwan Farook's iPhone, recovered by police
after the horrific massacre in San Bernadino on December 2, 2015.
It is just days before the March 22, 2016, hearing in this long-running,
highly publicized dispute between the FBI and Apple, with the FBI’s demands
of Apple being variously termed “jailbreak,” put a backdoor into, brute
force access, compromise security of, or any number of other descr... (more)
This post is the second in a series based on a discussion with Marc
Andreessen. The first was on: AI, Robotics, Jobs and Accelerating The Future
Gourley: Can you provide more context on what kind of education and training?
Andreessen: It is fair to say I am biased on that subject but my view is that
the quantitative skills will be in greater demand: Math, Economics, Science,
Engineering, and Computer Science. The requirements for these are rising at
much higher rates so their premium is rising. All of us should seek to
self-educate on these when we can and this is what we should en... (more)