Politics

Because Man is a Gregarious Animal
 Monday, December 23, 2002

Wilson to Thurmond to Lott

BoingBoing pointed to Patrick Nielsen Hayden pointing to Real Live Preacher. Interesting. But what intrigued me was the item immediately below that on Woodrow Wilson.

Of the Wilsonian programme, I've long agreed with self-determination, which I've seen as directly derivative of both our failed attempts at secession and West Virginia's success at same. Unlike others, I do not think the reasons for the South's attempt to secede contaminate secession itself: If the people can form a government, they can destroy it. So I was somewhat surprised to learn from Lies My Teacher Told Me that what I knew of Wilson was incomplete. Apparently his ideal of self-determination applied only to Caucasians.

4:12:51 PM # Google It!
categories: Law, Learning, Politics

SuperNOC

Thanks to Joe Jenett for pointing to the draft recommendations. Recommendations 4-39 and 4-40 are the ones under discussion.
LEVEL 4: NATIONAL PRIORITIES CYBERSPACE ANALYSIS AND WARNING

R4-39 ISPs, hardware and software vendors, IT security-related companies, computer emergency response teams, and the ISACs, together, should consider establishing a Cyberspace Network Operations Center (Cyberspace NOC), physical or virtual, to share information and ensure coordination to support the health and reliability of Internet operations in the United States. Although it would not be a government entity and would be managed by a private board, the Federal government should explore the ways in which it could cooperate with the Cyberspace NOC.

R4-40 The Federal government should complete the installation of the Cyber Warning Information Network (CWIN) to key government and nongovernment cybersecurity-related network operation centers, to disseminate analysis and warning information and perform crisis coordination.

We have some of that already: Co-operative Association for Internet Data Analysis North American Network Operators Group Distributed Intrusion Detection System Internet Storm Center

What's needed instead:

  1. standardized points of contact: security@provider, abuse@provider
  2. patch management and system recovery tools
  3. responsiveness

The Internet is, if you recall, designed to weather disruption. CAIDA discusses the lack of effect of the recent foray against the root nameservers.

8:09:06 AM # Google It!
categories: Politics, Security