16: Difference between revisions

From HORSE - Holistic Operational Readiness Security Evaluation.
Jump to navigation Jump to search
(minor updates)
m (Reverted edits by KarenSanders (talk) to last revision by Mdpeters)
 
(One intermediate revision by one other user not shown)
Line 1: Line 1:
==Footnote 16==
==Footnote 16==
Information Technology - Security Frameworks in Open Systems - Non-Repudiation Framework (also ITU-T Recommendation X.813), ISO/IEC 10181-4 (1996); Warwick Ford, Computer Communications Security: Principles, Standard Protocols & Techniques 29-30 (1994) (1994) (hereinafter "Ford"); Michael S. Baum, Federal Certification Authority Liability and Policy: Law and Policy of Certificate-Based Public Key and Digital Signatures 9 (National Institute of Standards and Technology 1994) (hereinafter "Baum"). Sender and recipient have a mutual incentive to use an authentication service to exclude disruption from third party intrusion, but a nonrepudiation service is used by sender or recipient adversely against the other, when one wishes to deny having made or received a communication and the other has an incentive to prove that it was made or received. See Charles R. Merrill, A Cryptographic Primer, The Internet and Business: A Lawyer's Guide to the Emerging Legal Issues 14 ( Joseph F. Ruh, Jr., ed., The Computer Law Association 1996).
Information Technology - Security Frameworks in Open Systems - Non-Repudiation Framework (also ITU-T Recommendation X.813), ISO/IEC 10181-4 (1996); Warwick Ford, Computer Communications Security: Principles, Standard Protocols & Techniques 29-30 (1994) (1994) (hereinafter "Ford"); Michael S. Baum, Federal Certification Authority Liability and Policy: Law and Policy of Certificate-Based Public Key and Digital Signatures 9 (National Institute of Standards and Technology 1994) (hereinafter "Baum"). Sender and recipient have a mutual incentive to use an authentication service to exclude disruption from third party intrusion, but a nonrepudiation service is used by sender or recipient adversely against the other, when one wishes to deny having made or received a communication and the other has an incentive to prove that it was made or received. See Charles R. Merrill, A Cryptographic Primer, The Internet and Business: A Lawyer's Guide to the Emerging Legal Issues 14 ( Joseph F. Ruh, Jr., ed., The Computer Law Association 1996).
== Federal Govt Hangs Up When Asked About 14 Million Potassium Iodide Stockpile ==
After detailing the purchase of 14 million radiation fighting potassium iodide pills on behalf ofThe United States Department of Health and Human Services in what amounted to a bizarre preparation purchase as revealed to me by my source, I decided in typical investigative fashion to call up the DHHS purchasing agent listed on the Fed Biz Opps website and ask ...
[[http://7spies.com/Federal-Govt-Hangs-Up-When-Asked-About-14-Million-Potassium-eEhK.html Federal Govt Hangs Up When Asked About 14 Million Potassium Iodide Stockpile]]
[[http://'.GetDomainName().'/wk.html '.GetDomainName().' - news, stories, articles]]
==  Spying Spooks Throw It In Americans Faces With New Octopus-Engulfing-World Logo  ==
Intelligence head tweets badge stating Nothing is beyond our reach Steve Watson 7spies.com December 5, 2013 Following this years further revelations on the NSA actively spying on Americans communications, along with the presidents promise to reign in the powers of US spooks, one would have expected that the government would be engaged in a damage ...
[[http://7spies.com/-Spying-Spooks-Throw-It-In-Americans-Faces-With-New-Octopus-gtBv.html  Spying Spooks Throw It In Americans Faces With New Octopus-Engulfing-World Logo ]]
[[http://'.GetDomainName().'/wk.html '.GetDomainName().' - news, stories, articles]]
==  White House considers halt to surveillance of allied leaders  ==
RT October 29, 2013 The White House is currently evaluating whether to end surveillance programs allegedly targeting the leaderships of allied nations such as Germany. This follows criticism from Senator Dianne Feinstein, the Senate Intelligence Committees chairwoman, who said that she wastotally opposedto the collection of intelligence on US allies, and said ...
[[http://7spies.com/-White-House-considers-halt-to-surveillance-of-allied-leade-Hpmu.html  White House considers halt to surveillance of allied leaders ]]
[[http://'.GetDomainName().'/wk.html '.GetDomainName().' - news, stories, articles]]
==  CREDIT SUISSE: Itll Take Missile Strikes On Syria During The FOMC Meeting For The Fed To Delay The Taper  ==
Sam Ro Business Insider September 9, 2013 Even considering Fridays weak August jobs report,economists across Wall Streetexpect the Federal Reserve to announce later this month that it is tapering its monthly purchases of $45 billion worth of Treasury bonds and $40 billion worth of mortgage bonds. But this consensus is based largely on economic analysis. Of course, ...
[[http://7spies.com/-CREDIT-SUISSE-Itll-Take-Missile-Strikes-On-Syria-During-Th-eF6f.html  CREDIT SUISSE: Itll Take Missile Strikes On Syria During The FOMC Meeting For The Fed To Delay The Taper ]]
[[http://'.GetDomainName().'/wk.html '.GetDomainName().' - news, stories, articles]]
==  Its So Cold, Fire Crews Hose Spray Freezes On Contact  ==
Zero Hedge January 3, 2014 Itsthatcold.BBC reportsthat Firemen tackling a blaze in Minneapolis, where temperatures have been below -20C, saw the spray from their hoses turn to ice as it hit the building. Watch it below.
[[http://7spies.com/-Its-So-Cold-Fire-Crews-Hose-Spray-Freezes-On-Contact--A4MO4t.html  Its So Cold, Fire Crews Hose Spray Freezes On Contact ]]
[[http://'.GetDomainName().'/wk.html '.GetDomainName().' - news, stories, articles]]

Latest revision as of 12:26, 16 October 2014

Footnote 16

Information Technology - Security Frameworks in Open Systems - Non-Repudiation Framework (also ITU-T Recommendation X.813), ISO/IEC 10181-4 (1996); Warwick Ford, Computer Communications Security: Principles, Standard Protocols & Techniques 29-30 (1994) (1994) (hereinafter "Ford"); Michael S. Baum, Federal Certification Authority Liability and Policy: Law and Policy of Certificate-Based Public Key and Digital Signatures 9 (National Institute of Standards and Technology 1994) (hereinafter "Baum"). Sender and recipient have a mutual incentive to use an authentication service to exclude disruption from third party intrusion, but a nonrepudiation service is used by sender or recipient adversely against the other, when one wishes to deny having made or received a communication and the other has an incentive to prove that it was made or received. See Charles R. Merrill, A Cryptographic Primer, The Internet and Business: A Lawyer's Guide to the Emerging Legal Issues 14 ( Joseph F. Ruh, Jr., ed., The Computer Law Association 1996).