Psychology of Intelligence Analysis

Richards J Heuer, Jr.:
Psychology of Intelligence Analysis
«We tend to perceive what we expect to perceive.»

konspire2b compared to other systems

konspire2b is
a sender-oriented push P2P content distribution system.
Blogs will need to do something like this to scale distribution of RSS files; polling for RSS updates is not sustainable.
The authors recently posted
comparisons to Gnutella, Freenet, and BitTorrent (received-oriented pull content distributioin systems).

[via Slashdot | A Blog With Unlimited Bandwidth (Beta 1.2)]

Phil Wainewright on the IT industry

Phil Wainewright:

  • Tale of Two ITs:

    The problem here is that there are two separate information technologies today, just as in the early years of the last century there were two forms of transportation. In making that assertion, I am of course alluding to another HBR article, Marketing Myopia, by Theodore Levitt, which first appeared in July 1960. Levitt’s article made the seminal observation that the railroad companies declined “because they assumed themselves to be in the railroad business rather than in the transportation business.”

    Today, the IT industry is led, and has its agenda set, by companies who believe themselves to be in the enterprise-scale software business. What they don’t yet realize (or perhaps are helpless to do anything about — see Disruptive Technologies: Catching the Wave, by Bower and Christensen, HBR January 1995) is that actually they’re in the distributed process automation business. If they and their customers don’t adjust rapidly to their new market environment, their destiny will be to end up as a minor footnote in a future article in HBR about the astonishing decline of the one-time giants of our present-day IT industry.

  • The end of software:

    Consolidation means contraction. When five leading firms propose mergers in the same week, the prognosis for the enterprise software industry looks dire. Especially when in the same week, the most vocal exponent of their nemesis took a bold new step into their universe.

CoVirt and ReVirt

CoVirt Project Home Page (University of Michigan):

The CoVirt project is investigating how to use virtual machines to provide security in an operating-system-independent manner. Virtual-machine security services can work even if an attacker gains complete control over the guest operating system….

Another potential challenge of using virtual machines is that running all applications above the virtual machine hurts performance due to virtualization overhead…
We modified a host OS (Linux) to enable it to better support a virtual-machine monitor. The resulting virtual-machine monitor and modified guest OS (based on UMLinux) runs even kernel-intensive applications at about 14-35% overhead…

We have designed and implemented a replay service for virtual machines called ReVirt. ReVirt logs enough information to replay a long-term execution of a virtual machine instruction-by-instruction. This enables it to provide arbitrarily detailed observations about what transpired on the system, even in the presence of non-deterministic attacks and executions…
We designed and implemented a system called BackTracker that will help system administrators understand (and thereby recover from) an intrusion. BackTracker automatically identifies potential sequences of steps that occurred in an intrusion. Starting with a single detection point (e.g. a suspicious file), BackTracker identifies files and processes that could have affected that detection point and displays chains of events in a dependency graph.

Thomas Edison, Intellectual Property, and Recording Industries

Distributed Delivery of [Messenger] Spam

Shooting the messenger (dumping SMTP)

Lee Maguire: webslog – 2003-05-22

[via
Justin Mason:
‘Shooting The Messenger’
]

Draft Security Vulnerability Reporting and Response Process

Organization for Internet Safety: Draft Security Vulnerability Reporting and Response Process
«
The draft Security Vulnerability Reporting and Responding Process is available for public comment until 7 July, 2003.
»

Sobig.C virus exploits spam-friendly open proxies

ComputerWeekly: Sobig: spam, virus or both?

XML Is Not Object Oriented