George C. Dimitriou

Technology and Strategy Consulting

Archive for the ‘Security’

Cybersecurity in the USA.

March 13, 2009 By: George Category: Security No Comments →

“Cybersecurity has been called “one of the most urgent national security problems facing the new administration.” Cyber and telecommunications activities are sometimes conflated to indicate the same meaning or capability. One might distinguish the term cyber from that of telecommunications with the former being the data or applications residing on the latter which is the electronic medium in which the activity occurs. Electronic information systems, also termed “information infrastructures,” now support a wide range of security and economic assets in the public and private sectors.”


See “Comprehensive National Cybersecurity Initiative: Legal Authorities and Policy Considerations,” (pdf)

Report Predicts Upcoming Cybercrime Trends for 2009.

December 10, 2008 By: George Category: Digital World, Security No Comments →

Finjan Inc. in its Web Security Trends Report Q4 2008, shows how cybercriminals are using PDF and Flash files – that are normally considered to be safe – as a vehicle for distributing their malicious code and for infecting end-user PCs.

In its latest trends report, Finjan’s Malicious Code Research Center (MCRC) provides an overview of cybercrime trends in 2008 and presents its predictions for 2009.

  • Cybercrime will keep on rising with an increasing number of unemployed IT professionals joining in
  • Cybercriminals will benefit from the Obama Administration’s plan to bring Broadband Internet access to every American
  • Cybercriminals will continue to leverage the most advanced techniques and services that Web 2.0 can offer, with a focus on Trojan technologies

Securing Cyberspace for the 44th Presidency.

December 10, 2008 By: George Category: Security No Comments →

The CSIS Commission on Cyber security for the 44th Presidency has released its final report, “Securing Cyberspace for the 44th Presidency.”

The report, which offers guidance to the Obama administration, is a strong indictment of government and private industry efforts to secure cyberspace to date and calls for new laws and regulations governing cyberspace.

“We believe that cyberspace cannot be secured without regulation,” the report said. The proposed regulations included new standards for critical infrastructure providers like the finance and energy industries, as well as new federal product acquisition rules to force more secure products.

The CSIS Commission recommends the creation of a White House cyber-security czar reporting to the president and the consolidation of the powers that have largely been held by the Homeland Security Department under the Bush administration. The report argues that cyber-security is one of the most significant national security threats and that it can no longer be relegated to information technology offices and chief information officers.

Cryptographers Compete to Define a New Standard.

November 21, 2008 By: George Category: Computing, Digital World, Security No Comments →

Cryptographers from around the world have laid their best work on the line in a contest to find a new algorithm that will become a critical part of future communications across the Internet. The winning code will become a building block of a wide variety of Internet protocols, including those used to safeguard communications between banks and their customers.

The National Institute of Standards and Technology (NIST) organized the competition and plans to release a short list (NIST has already received 64 entries for the competition and is looking for ways to narrow down the list) of the best entries by the end of this month, beginning a four-year process of analysis to find the overall winner.

NIST has opened the public competition to develop a new cryptographic hash algorithm, which converts a variable length message into a short “message digest” that can be used for digital signatures, message authentication and other applications.  The competition is NIST’s response to recent advances in the cryptanalysis of hash functions.

Army Intelligence on the Twitter Threat.

October 28, 2008 By: George Category: Digital World, Security No Comments →

From the FAS Project on Government Secrecy:

Could terrorists use Twitter, the instant messaging and micro-blogging service? Presumably so, just as they could use credit cards and can openers.
The potential use of Twitter and other communications technologies by terrorists is considered in a new draft Army intelligence paper, based on a review of jihadist web sites and other public sources.

The Army paper on “al Qaida-Like Mobile Discussions & Potential Creative Uses” was dissected by Noah Shachtman in“Spy Fears: Twitter Terrorists, Cell Phone Jihadists,”.  A copy of the paper itself, which is more like a student exercise than a finished intelligence assessment, is available here (large pdf, for official use only).


World Première in Vienna:Quantum Cryptography Secures Communication in a Commercial Network

October 08, 2008 By: George Category: Computing, Security No Comments →

For the first time the transmission of data secured by quantum cryptography is demonstrated within a commercial telecommunications network. 41 partners from 12 European countries have worked on realizing this quantum cryptographic network since April 2004. The overall objective is the integration of quantum cryptography into modern business applications. The work has been carried out within the Integrated EU-Project SECOQC (Development of a Global Network for Secure Communication Based on Quantum Cryptography), led by the Austrian Research Centers.



Read more here

Georgia CyberWarfare.

August 11, 2008 By: George Category: Digital World, Security No Comments →

As Russian bombs rained down on towns in separatist towns of the former Soviet republic of Georgia, hackers mounted a digital assault on the nation’s top Web properties this week, knocking government Web sites offline and defacing others.

According to reports from security experts who have been monitoring the ongoing cyber attacks, the Web site for the office of Georgia Foreign Affairs ( was hacked, and its homepage was replaced with images depicting Georgia’s president as a Nazi. That site is currently offline.

Other Georgian Web properties, such as the Caucasus Network Tbilisi — key Georgian commercial Internet servers — remain under sustained attack from thousands of compromised PCs aimed at flooding the sites with so much junk Web traffic that they can no longer accommodate legitimate visitors.

Security Blogger Jart Armin has been tracking the attacks by conducting Internet traces and lookups at key Georgian Web properties.