What is JacketFlap

  • JacketFlap connects you to the work of more than 200,000 authors, illustrators, publishers and other creators of books for Children and Young Adults. The site is updated daily with information about every book, author, illustrator, and publisher in the children's / young adult book industry. Members include published authors and illustrators, librarians, agents, editors, publicists, booksellers, publishers and fans.
    Join now (it's free).

Sort Blog Posts

Sort Posts by:

  • in
    from   

Suggest a Blog

Enter a Blog's Feed URL below and click Submit:

Most Commented Posts

In the past 7 days

Recent Posts

(tagged with 'Security')

Recent Comments

Recently Viewed

JacketFlap Sponsors

Spread the word about books.
Put this Widget on your blog!
  • Powered by JacketFlap.com

Are you a book Publisher?
Learn about Widgets now!

Advertise on JacketFlap

MyJacketFlap Blogs

  • Login or Register for free to create your own customized page of blog posts from your favorite blogs. You can also add blogs by clicking the "Add to MyJacketFlap" links next to the blog name in each post.

Blog Posts by Tag

In the past 7 days

Blog Posts by Date

Click days in this calendar to see posts by day or month
new posts in all blogs
Viewing: Blog Posts Tagged with: Security, Most Recent at Top [Help]
Results 1 - 25 of 25
1. Olympic swimmers meet Latin America’s vast gray area of private security

During the closing week of the Rio games, the biggest story was not about the pool, the mat, or the track but rather about the after-game party . . . and the after-party mess. As of Friday morning, the next-to-last day of the games, the home page of the New York Times was carrying headlines for five separate articles concerning the event. Clearly, the events that unfolded when the swimmers arrived at the gas station as well as the interviews given by American medalist Ryan Lochte, fit some powerful stereotypes about Brazilian (in)security and American hedonism and hubris.

The post Olympic swimmers meet Latin America’s vast gray area of private security appeared first on OUPblog.

0 Comments on Olympic swimmers meet Latin America’s vast gray area of private security as of 8/27/2016 7:01:00 AM
Add a Comment
2. The questionable logic of international economic sanctions

Whatever the international crisis – whether inter-state war (Russia-Ukraine), civil strife (Syria), nuclear proliferation (North Korea), gross violations of human rights (Israel), or violent non-state actors on the rampage (ISIS, al-Qaeda) – governments, pundits and NGOs always seem to formulate the same response: impose economic sanctions. In the mid-20th century, only five countries were targeted by sanctions; by 2000, 50 were. Once obscure and rarely used, sanctions are now central to international economic and security policy.

The post The questionable logic of international economic sanctions appeared first on OUPblog.

0 Comments on The questionable logic of international economic sanctions as of 3/20/2016 8:05:00 AM
Add a Comment
3. What is information, and should it be free?

When we pay our bills using a plastic card, we are simply authorizing alterations to the information stored in some computers. This is one aspect of the symbiotic relationship that now exists between money and information. The modern financial world is byzantine in its complexity, and mathematics is involved in many ways, not all of them transparently clear. Fortunately there are some bright spots, such as the fact that it is now possible to measure information.

The post What is information, and should it be free? appeared first on OUPblog.

0 Comments on What is information, and should it be free? as of 2/21/2016 3:13:00 AM
Add a Comment
4. SDCC ’15: Talk Back Panel – Continuous Hall H and ADA Line Issues

John Rogers - Comic-Con President

John Rogers – Comic-Con President

By Nick Eskey

San Diego Comic-Con has come and gone. As in every year, to officially close convention, we are gathered before John Rogers, Comic-Con International President, for the ever so important “Talk Back” panel. It is here that attendees can voice their concerns, suggestions, or applause this year’s convention, so that John can hear them personally.

Comic-Con’s president introduced himself, and thanked staff, security, volunteers, exhibitors, and others before opening up the microphone to the waiting crowd. And as usual, the crowd extended nearly to the back of the room.

Some of the concerns brought up dealt with the constant concern for lines. Lines for merchandising and booths have become a recent issue. One attendee brought up the issues he was having with the “Funko” booth. “The line was so disorganized, and constantly closed throughout the day. There was even one day where they stopped selling all together as of 4pm.” I have had my personal experience with Funko. To get even a chance to stand in line to buy, you either have to be the first one in the hall, or lucky to be passing by when they open up. Over the weekend, they started passing out line tickets. As people first entered the exhibit hall, they would have to get a ticket, get to the line, and then wait in line to eventually buy. This added step seemed to compound issues, as the ticket passers didn’t announce they were passing tickets, and only mentioned something if you got within arms distance. Those that raced by to get to the booth received the news there that they needed a ticket.

Another cause for concern was how exhibitors were still getting into lines by switching out for a regular attendee pass. “I was upset when I saw an exhibitor in the autograph line that I couldn’t even get into,” said one woman. “This has been an ongoing issue for a while on how exhibitors are ‘magically’ producing regular passes,” responded Rogerss. “Unfortunately there’s nothing we can do about it.”

To address the crowds on the sales floor, one man proposed the use of directional lines on the floor. “As you might have noticed, we are such things when large signings are taking place,” said John. The man wished the lines though to happen throughout the convention. Many a person in the room grumbled at this. “I’m pretty sure no one would like anymore rules to complicate things,” added John Rogers.

Reiterated by many was the lack of communication from the different security companies employed by Comic-Con. “One guard had my attendant sit far away from me in Hall H. And other guards were giving me issues over where my attendant was… I need my attendant in eyesight at all times. I don’t know why that guard would have me sit away from him.” Another attendee said that one guard was handing out passes, where there were others just standing around. When he asked why there weren’t helping, they said “oh that’s not our department.”

Now, for the most reoccurring issue: those with disabilities and the services available to them. Many of the attendees with these concerns had actually positive things to say about this year’s services. But the lines for Hall H were still major issue. “On Friday, the general line went in forty-five minutes before the ADA line… I felt like we were forgotten,” said one woman with disabilities. “When we finally got in, many of the red seats marked off for disabled were already taken.”

Another Hall H issue was that the ADA lines were uncovered. “There are many of us that can’t stand in the sun as part of our disability,” said one woman. The same issue was brought up over and over again.

New this year was the addition of wristbands for the ADA line, to help gauge the number of available spot. For the most part, it was met with positive feelings. A few issues did arise though when it came with the actual issuing of said wristbands. “Security would come out and say that there might not be enough bands. Then maybe an hour later they would come out and say there’s six. Another hour later and they’d have four more. Is it that hard to just count the spot and let us know?”

John Rogers responded, “We haven’t come up with a better system to figure out how many spaces we have left till wristbands have been passed out… It’s actually difficult to keep a working number and go off of that.” The woman then asked about making three lines then, or doing a straw pull for wristbands. “We’ll think of that,” said John.

There’s also the issue of those with disabilities and the use of elevators. “The wait for the elevator was extremely long,” said an attendee. “By the time I got to the autograph area, they had caped the line.” For this year’s convention, they’ve had those with ambulatory disabilities use the elevators as opposed to the escalators. “It was a decision we made to be fair to everyone,” replied John. “We were seeing those with ambulatory issues being rushed around by other attendees for the escalators.”

One woman suggested that Comic-Con should have those claiming they have disabilities to show proof, so as to not be accessible to services if they are not. This elicited a quick response from the president. “By California state law, the only ones that can ask for proof of disability is the police.” The woman couldn’t believe that, but many from the crowd agreed with John. “That’s how Disney got in trouble recently at their park,” he added.

The biggest upset was when one woman said, “I was told by Disabled Services that this was the last year my attendant could get a complementary pass. And if they couldn’t get one through the lottery, ‘then they would be out of luck.’ I need my attendant. If he can’t come, I can’t come either. And I’ve been coming for twenty years. I don’t mind if he needs to buy one now, but then please put into place a system that he is guaranteed purchase.”

This seemed to catch John Rogers off guard. “Attendant badges are always complementary, so I don’t know why they would say that to you,” he said. Half a dozen in the line confirmed that they also were told the same thing. John looked at the line and said “We will fix that.”

This panel went on for an hour and a half; one of the longest Talk Backs to happen, with most of the issues dealing with Disabled services. Though it seems the guard issue has lessened this year as compared to others in the past, the concerns with ADA have not. If anything, they seem to be growing. When it comes to something like Comic-Con, it’s important that the whole experience is accessible to all fans that wish to partake. As the convention will remain in San Diego for at least a little while longer, let’s see if they can better address these issues.

14 Comments on SDCC ’15: Talk Back Panel – Continuous Hall H and ADA Line Issues, last added: 7/15/2015
Display Comments Add a Comment
5. Writing Insecurities

I`m-in-your-computerWe all have writing insecurities, but this is one is an easy fix: Make sure you’re protecting your work and your computer from theft, damage, and failure.

Recently a friend of mine was writing at a coffee shop, and she stepped away from her bag briefly — but this was just long enough for a sneaky thief to grab it and disappear. She lost her wallet, keys, and her laptop, but the worst thing she lost – the most irreplaceable thing – was her work in progress. Her latest changes hadn’t been backed up, and she was on deadline. A writer’s worst nightmare!

Now imagine going to a writing workshop for six weeks and losing your laptop – the thing you need for writing. This happened to four students at the Clarion West Writers Workshop in 2008, when thieves broke into the house and made off with several laptops.

Happily, in both of these cases, the amazing online community raised money to replace the stolen computers in a weekend. As writers, we know how important computers are to our work, and in many cases to our livelihood. And as readers, we want our favorite writers to keep producing stories.

security_wallpaperEven if you write by hand in a notebook or use a typewriter (really?), chances are that at some point you need a computer. Computers are tools for drafting, editing, revising, e-mailing agents and editors, playing Portal, posting on Twitter, and more. So why do so many people fail to secure them? Some just don’t think about it, or figure they’ll never have to worry about it, but laptop security also seems like it might be annoying to set up or expensive. It doesn’t have to be.

Here are some very basic things you can do to make your laptops a little more secure, and especially avoid losing your work.

  1. Back up your work! Everyone knows this is important but too many still don’t bother. Make sure you have copies of your work, preferably in multiple places. If you write a lot away from home, bring a USB thumb drive or an SD card and make a backup every time you finish a writing session. You could also sync your work to a cloud storage account like Dropbox, if you can get online. Scrivener and Dropbox work pretty well together to share your projects with multiple computers and save backup files. Even if you lose your laptop, at least you won’t lose the latest draft of your novel.
  2. Make it easy for people to contact you if they find your device. I left my tablet on a train once, but I had saved my contact info on the home screen, and the right person found it and called me. You can (and should) do this with your smart phone too. It’s trickier with a laptop; I usually just tape my business card to the bottom of it. I’ve also set up a guest account so if anyone logs in to it, they’ll see custom Windows wallpaper with my contact information (above).
  3. securityWhile you’re at it, make sure it’s password-protected. Your devices should have passwords on them to prevent (or make it harder) for unauthorized people to access your files – and erase them and claim your computer as their own. In addition to the boot password, PCs and Macs allow you to add a BIOS password so other users can’t easily get around your regular password or wipe the system. If you want to go all out, you could also encrypt your hard drive…
  4. Make your laptop harder to steal. For some laptops, you can still buy those security cables to attach them to a table or something (or you could just not leave your laptop lying around unattended.) There’s also a product called the STOP Security Plate – a nigh-impossible-to-remove, highly visible plate stuck onto your laptop that announces it as stolen. This makes it difficult to resell and serves as a way to register your laptop so it can be identified easily. In theory, a thief that sees this — or a bunch of stickers that make your computer look unique — won’t bother to take your laptop in the first place. (Full disclosure: I haven’t gotten mine yet, because I don’t want to stick it to my pretty new laptop.)
  5. Install tracking software. You’ve heard the stories about people tracking down the thief who took their laptop using GPS coordinates and the webcam. It really happens! But the confrontation is probably best left to police. Still, you can help them find your laptop with tracking software hidden on your computer. Macs have Undercover, but you can also install LoJack or Prey (which includes a free version) to track and remotely lock or wipe PCs or Macs. If you do this, you may also want to set up an unlocked guest account to entice the thief to log in so the laptop can connect to a Wi-Fi network.

lockedThese are just some of the precautions you can take. Of course none of them are foolproof, but some security is better than none, and at least you have a better chance of recovering your laptop and not losing any work.

Does all this seem paranoid or do you think it’s a good idea? What other security measures do you take to protect your laptop and work? Comment below!

Add a Comment
6. Is privacy dead?

In the 1960s British comedy radio show, Beyond Our Ken, an old codger would, in answer to various questions wheel out his catchphrase—in a weary, tremulous groan—‘Thirty Five Years!’ I was reminded of this today when I realized that it is exactly 35 years ago that my first book on privacy was published. And how the world has changed since then!

The post Is privacy dead? appeared first on OUPblog.

0 Comments on Is privacy dead? as of 3/20/2015 4:25:00 AM
Add a Comment
7. The ethics of a mercenary

In July 2014, the Ukrainian President, Petro Poroshenko, claimed that Ukraine wasn’t fighting a civil war in the east of the country but rather was “defending its territory from foreign mercenaries.” Conversely, rumours abounded earlier in the year that Academi, the firm formerly known as Blackwater, were operating in support of the Ukrainian government (which Academi strongly denied). What is interesting is not simply whether these claims are true, but also their rhetorical force. Being a mercenary and using mercenaries is seen as one of the worst moral failings in a conflict.

Regardless of the accuracy of the claims and counterclaims about their use in Ukraine, the increased use of mercenaries or ‘private military and security companies’ is one of the most significant transformations of military force in recent times. In short, states now rely heavily on private military and security companies to wage wars. In the First Gulf War, there was a ratio of roughly one contractor to every 100 soldiers; by 2008 in the Second Gulf War, that ratio had risen to roughly one to one. In Afghanistan, the ratio was even higher, peaking at 1.6 US-employed contractors per soldier. The total number of Department of Defense contractors (including logistical contractors) reached approximately 163,000 in Iraq in September 2008 and approximately 117,000 in Afghanistan in March 2012. A lot of the media attention surrounding the use of private military and security companies has been on the use of armed foreign contractors in conflict zones, such as Blackwater in Iraq. But the vast majority of the industry provides much more mundane logistical services, such as cleaning and providing food for regular soldiers.

Does this help to remove the pejorative mercenary tag? The private military and security industry has certainly made a concerted effort to attempt to rid itself of the tag, given its rhetorical force. Industry proponents claim private military and security companies are different to mercenaries because of their increased range of services, their alleged professionalism, their close links to employing states, and their corporate image. None of these alleged differences, however, provides a clear—i.e. an analytically necessary—distinction between mercenaries, and private military and security companies. After all, mercenaries could offer more services, could be professional, could have close links to states, and could have a flashy corporate image. Despite the proclamations of industry proponents, private military and security companies might still then be mercenaries.

Security
Security Watch by The U.S Army. CC-BY-2.0 via Flickr.

But what, if anything, is morally wrong with being a mercenary or a private contractor? Could one be an ethical mercenary? In short, yes. To see this, suppose that you go to fight for a state that is trying to defend itself against attack from a genocidal rebel group, which is intent on killing thousands of innocent civilians. You get paid handsomely for this, but this is not the reason why you agree to fight—you just want to save lives. If fighting as a private contractor will, in fact, save lives, and any use of force will only be against those who are liable, is it morally permissible to be a contractor? I think so, given the import of saving lives. As such, mercenaries/private contractors might behave ethically sometimes.

Does this mean that we are incorrect to view mercenaries/private contractors as morally tainted? This would be too quick. We need to keep in mind that, although the occasional mercenary/private contractor might be fully ethical, it seems unlikely that they will be in general. There are at least two reasons to be sceptical of this. First, although there may be exceptions, it seems that financial considerations will often play a greater role in the decision for mercenaries/private contractors to take up arms than for regular soldiers. And, if we think that individuals should be motivated by concern for others rather than self-interest (manifest through the concern for financial gain), we should worry about the increased propensity for mercenary motives. Second, although it may be morally acceptable to be a mercenary/private contractor when considered in isolation, there is a broader worry about upholding and contributing to the general practice of mercenarism and the private military and security industry. One should be wary about contributing to a general practice that is morally problematic, such as mercenarism.

To elaborate, the central ethical problems surrounding private military force do not concern the employees, but rather the employers of these firms. The worries include the following:

  1. that governments can employ private military and security companies to circumvent many of the constitutional and parliamentary—and ultimately democratic—constraints on the decision to send troops into action;
  2. that it is questionable whether these firms are likely to be effective in the theatre, because, for instance, contractors and the firms can more easily choose not to undertake certain operations; and
  3. that there is an abrogation of a state’s responsibility of care for those fighting on its behalf (private contractors generally don’t receive the same level of support after conflict as regular soldiers since political leaders are often less concerned about the deaths of private contractors).

There are also some more general worries about the effects on market for private force on the international system. It makes it harder to maintain the current formal constraints (e.g. current international laws) on the frequency and awfulness of warfare that are designed for the statist use of force. And a market for force can be expected to increase international instability by enabling more wars and unilateralism, as well as by increasing the ability of state and nonstate actors to use military force.

These are the major problems of mercanarism and the increased use of private military force. To that extent, I think that behind the rhetorical force of the claims about mercenaries in Ukraine, there are good reasons to be worried about their use, if not in Ukraine (where the facts are still to be ascertained), but more generally elsewhere. Despite the increased use of private military and security companies and the claims that they differ to mercenaries, we should be wary of the use of private military and security companies as well.

The post The ethics of a mercenary appeared first on OUPblog.

0 Comments on The ethics of a mercenary as of 11/2/2014 4:35:00 AM
Add a Comment
8. Donor behaviour and the future of humanitarian action

By Anne Hammerstad


After a short lull in the late 2000s, global refugee numbers have risen dramatically. In 2013, a daily average of 32,200 people (up from 14,200 in 2011) fled conflict and persecution to seek protection elsewhere, within or outside the borders of their own country. On the current trajectory, 2014 will be even worse. In Syria, targeting of civilians and large-scale destruction have led to 2.5 million (and counting) refugees fleeing the country since 2011. The vast majority shelter in neighbouring Lebanon (856,500), Jordan (641,900), and Turkey (609,300). As I write, hundreds of thousands are fleeing the advancing forces of the Islamic State in Iraq and al-Sham (ISIS) in neighbouring Iraq. And civil wars and ethnic violence have resurged in many parts of Central Africa and the African Horn.

What future for humanitarian action in this dire scenario? This question was raised on the fifth of May by the UN Secretary-General, Ban-Ki Moon, when he launched a programme of global consultations, which will culminate in the first ever World Humanitarian Summit in Istanbul in 2016, poised to “set a new agenda for global humanitarian action”. The UN has raised four sets of challenges, to deliver humanitarian aid more efficiently, effectively, innovatively, and robustly.

The launch of these consultations is timely, but it avoids an important challenge to the future of humanitarian action: the policies of donor governments.

United Nations Geneva

At first glance, this may seem like a strange assertion. After all, although needs continue to surpass the ability to provide, donor funding for humanitarian operations has skyrocketed. From less than US$1 billion in 1989, the global humanitarian budget stood at US$22 billion in 2013. Most of these funds come from a small number of Western donor states. But coupled with this rise in funds comes a donor agenda that risks, even if unintentionally, undermining the humanitarian ideal. This challenge is far from the only one posed to humanitarian action — much worse for the security of humanitarian workers are the terrorist groups that target them, leading to the killing of an estimated 152 aid workers in 2013. But because humanitarian action depends on a moral consensus over its meaning and worth, the current trajectory of donor policies is worrisome.

The humanitarian ideal is based on international solidarity: that outsiders can and should provide aid and protection in a principled, non-partisan, needs-based manner to civilian casualties of war and political violence. This ideal of politically disinterested solidarity with fellow human beings caught up in war and violence, regardless of who or where they are, has always been at some remove from the reality of humanitarian operations, but a consensus has nevertheless existed that it is an ideal worth aspiring to. Recently, though, donor governments have been increasingly open and unapologetic about using humanitarian aid to further their own political or security objectives.

One such objective is to keep immigration down. Since most man-made humanitarian crises have displacement as a core component, one objective of Western donor support of humanitarian aid to refugees is to contain population movement. The vast majority of refugees — people who have fled for their lives across international borders — remain within their near region, in camps or regional cities. Only a small proportion attempt the long journey to Europe, Australia, or North America in hope of jobs and a better future. Western humanitarian donors would prefer that even fewer asylum seekers make it to their own shores, while refugee host states in the Global South would like burden-sharing and solidarity to mean more than monetary charity from the well-off to the poorer.

Containment strategies seem to be working. While refugee numbers are increasing overall, including in industrialized states, the proportion of refugees hosted by developing states has grown over the past ten years from 70 percent to 86 percent. In Lebanon, there are 178 Syrian refugees for every thousand Lebanese inhabitants (in Jordan, the number is 88 per thousand). But efforts by the UN High Commissioner for Refugees (UNHCR) to resettle particularly vulnerable Syrian refugees have had lukewarm responses. This donor attitude of charity from afar coupled with hostility to asylum seekers and unwanted migrants in general, undermines the moral underpinnings of humanitarianism. After all, the Good Samaritan, often put forward as the embodiment of the humanitarian spirit, did not leave a few coins with the battered traveller he found by the wayside. He took him home and nursed him.

Another trend undermining the humanitarian ideal is the increased, and increasingly unapologetic, strategic use of aid to further donors’ own foreign and security policy objectives. There is a clear increase in the past couple of decades in the earmarking of funds and channelling of resources, not necessarily to the neediest of humanitarian victims, but to those deemed more relevant to donor interests. The ‘hearts and minds’ campaigns in Afghanistan and Iraq in the 2000s are the starkest representatives of this trend. As US-led intervention forces aimed to win over local populations by disbursing aid, the overall share of US overseas aid channelled through the US Department of Defense rose from 5.6 percent in 2002 to 21.7 percent in 2005.

These donor trends of openly pursuing domestic, foreign, and security policy goals through humanitarian aid are detrimental to the long-term future of humanitarian action, since they undermine the consensus and the ethical values underpinning the humanitarian ideal. While other challenges also loom, the strategies (and strategizing) of donors should have been included as a core topic of the Global Consultations.

Dr Anne Hammerstad, University of Kent, is author of The Rise and Decline of a Global Security Actor: UNHCR, Refugee Protection and Security. She writes and tweets on refugees, humanitarianism, conflict, and security. You can follow her on Twitter at @annehammerstad.

To learn more about refugees, conflict, and how countries are responding, read the Introduction to The Rise and Decline of a Global Security Actor: UNHCR, Refugee Protection and Security, available via Oxford Scholarship Online. Oxford Scholarship Online (OSO) is a vast and rapidly-expanding research library. Launched in 2003 with four subject modules, Oxford Scholarship Online is now available in 20 subject areas and has grown to be one of the leading academic research resources in the world. Oxford Scholarship Online offers full-text access to academic monographs from key disciplines in the humanities, social sciences, science, medicine, and law, providing quick and easy access to award-winning Oxford University Press scholarship.

Subscribe to the OUPblog via email or RSS.
Subscribe to only law articles on the OUPblog via email or RSS.
Subscribe to only politics articles on the OUPblog via email or RSS.

Image: United Nations Flags by Tom Page. CC-BY-SA-2.0 via Wikimedia Commons.

The post Donor behaviour and the future of humanitarian action appeared first on OUPblog.

0 Comments on Donor behaviour and the future of humanitarian action as of 7/13/2014 9:19:00 AM
Add a Comment
9. Wishing Chairs and Flying Bedrooms - Heather Dyer

 © John Atkinson Grimshaw
 
I suspect there’s a reason why fairies are found at the bottom of the garden: the bottom of the garden represents the limits of a child’s freedom. It is the furthest they can go from home without entering the big wide world – and it’s in this space between security and freedom that magic occurs.

Children have so little freedom. Freedom beckons, but is also frightening. Perhaps this is why I loved reading so much when I was a child. From the safety of an armchair in the front room or beneath the covers of my bed, I could escape safely.

When I was seven I loved books in which magical items transported children directly from the security of home into another world - stories like Enid Blyton’s The Wishing Chair, in which an old chair intermittently grew wings and carried the children off on fantastical adventures. There was also Nesbit’s Phoenix and the Carpet, in which an old rug turns out to be a magic carpet - and let’s not forget  that wonderful flying bed in Bedknobs and Broomsticks - or The Lion the Witch and the Wardrobe, in which an old wardrobe provides the portal to freedom.

Part of the excitement lay in the fact that the children never quite knew when their adventure might take place. Nesbitt’s children always had to wait until their parents were out – and Blyton’s children had to keep going down to the playroom to see if the chair had grown wings. The appeal also lay in the fact that there was always the risk of mishap - along with the assumption that the children would return home safely.

When my friend’s daughter Elinor told me about a dream in which her bedroom flew, I was delighted. What a wonderful symbol her unconscious had conjured up to grant her both security and freedom! She could go wherever she wanted without leaving the safety of her bedroom – and what’s more, she would have everything she needed with her: a raincoat, a book to read, a sunhat or a swimsuit …


So, inspired by Elinor’s dream, I wrote The Flying Bedroom, a series of short adventures in which Elinor’s bedroom takes her to faraway places including a tropical island (from which her bedroom nearly floats away), the theatre (where Elinor reluctantly takes centre stage), and even to the moon (where Elinor helps a man called Niall fix his rocket). I’m hoping that The Flying Bedroom will satisfy children’s longing for both security and freedom – the tension that never really goes away, no matter how old we are.

http://www.fireflypress.co.uk/node/44

 The Flying Bedroom is released on May 15th by Firefly Press
 

You can find more information about Heather Dyer and her books at www.heatherdyer.co.uk

0 Comments on Wishing Chairs and Flying Bedrooms - Heather Dyer as of 6/3/2014 2:57:00 AM
Add a Comment
10. Tips for buying a Antivirus

 A good antivirus should detect, disinfect and remove viruses quickly, have constantly updated and be simple and easy to install and use.

Using external files in your computer and the Internet makes us really need to buy a quality antivirus and keep it updated to protect us from all kinds of viruses. A good antivirus should detect, disinfect and remove viruses quickly, have constantly updated and be simple and easy to install and use.

Kaspersky is one of the best existing antivirus because it has lots of tools to block viruses, and other malware including worms, trojans, spyware, keyloggers, etc.. and is updated daily. This antivirus scans the disc to detect malicious programs, such that stores the scanned files and check later.

 

Another is the quality antivirus NOD32, quickly inspecting great and all files on the disks. It has the ability to analyze heuristically, so that while analyzes can detect new viruses and malware that until then had not in their database. This antivirus consumes very little. It has a very good online service, useful to turn to him when an error occurs with NOD32. Benefits are equal Panda 2014, BitDefender, McAfee and Norton 2014 2014.

The free antivirus for which renewal registration required, as the website of the brand ID of the computer detects, besides offering benefits paying, have the same efficacy as payment brands such as Avast or Antivir, but include AVG antivirus very good. It has many tools that can be programmed to follow a routine analysis. It can be used in not very powerful computers, requiring low system resources to do their job. Also updated, quickly scans computer disks and has heuristic detection.

For companies that have internal networks or intranets, it is preferable to install antivirus corporate version available because they generally allow both installation and configuration remotely.
Enhanced by Zemanta

0 Comments on Tips for buying a Antivirus as of 5/26/2014 11:12:00 AM
Add a Comment
11. 30 Days: Undeaditorial

Dear Editor:

With great interest, I read your special issue about biometric computer authentication (March, 2014). My firm has been looking for a viable biometrics solution for quite some time and several of the products you reviewed look promising.

However, we have one question that remains unanswered by any of the articles in this otherwise excellent issue: Do any of these products work for the undead?

You see, we take being an equal opportunity employer quite seriously. Hiring the undead keeps us in compliance with the Americans with Disabilities Act and contributes to a diverse work environment. We also recognize that there are certain advantages to hiring people who have risen from the grave. For one thing, they seldom object to working the night shift. In fact, they prefer it. As long as the shift ends before sunrise, you can count on zombies to remain alert and productive way into the wee hours of the morning. They also tend not to require expensive health benefits or group life insurance.

But for these prized workers, traditional passwords don't do any good because people tend to forget them when their brains rot and leak out of their ears. Unfortunately, biometric authentication often brings its own set of problems.

It's hard to log in to the network with a fingerprint reader when your fingerprints have decayed and your finger tends to remain in the reader after you pull your hand away. Likewise, iris recognition devices are problematic when the eyes keep falling out of the head and dangle well below the beam from the reader. Face recognition? Forget it. As the face deteriorates, new patches of mold or the continual changing of the shape of a rotting face with its sagging skin and ever-more-deviating septum renders such systems useless.

Some of our employees have suggested that it might be useful to have a device that allows the employee to pull the bowels from his belly and run them through a scanner. This might help solve the problem, but it raises an obvious security issue: What's to stop somebody from pulling the guts out of a coworker and using them to gain access to a restricted system? DNA-based devices have similar security problems. We even tried odor-based biometrics, but quickly learned that this type of device overloads and fails when the workplace houses more than a small number of rotting corpses.

As you can see, current biometrics don't work for an organization like ours. In this economy, more and more people seem to be dying every day, and as they venture forth from their coffins to seek suitable employment, biometric authentication seems like the way to go.

If the research you did for your special issue provided insight into how to use biometrics for this under-appreciated segment of the workforce, we would love to hear about it.

Thank you,

Rip Morguenstern,
VP of Security
Liquid Putrefaction, Inc.

0 Comments on 30 Days: Undeaditorial as of 4/4/2014 10:39:00 AM
Add a Comment
12. Diversity in Security. Or, is it Insecurity?

OK, which of these scares you more. A or B?

A.

Just like I do every time I stay at a hotel, I left my key in my hotel room last week. I went to the desk to ask them to help me get back in. The desk clerk asked me my name and gave me another key. That was it, no other verification required.

Typically, when I forget me key, I’m asked to describe what the inside of the room looks like, numbers on my credit card and always to show and ID.

B.

My UPS person refuses to just leave packages at my door, although I meet the requirements UPS has in place for them to do so. I contacted the company online and was told that I could register for their free service called My Choice. Using My Choice, I could make arrangements for packages to be left without me signing, schedule deliveries, get delivery notices via email or text and a few other services.

Sounds good, don’t you think?

So, I began registering by giving them my name, phone number, email and postal addies and creating a password. Then, it got interesting.

In order to verify who I was, I was given multiple choice questions in which I had to verify the street my daughter lives on and a city where I used to live. I entered the correct answers, was told I was wrong (!) and had to then verify a street on which I used to live and the address of property I own. Remember, the only information I had given them was my name, phone number and email and postal addies.

Again I ask, which concerns you more?


Filed under: Me Being Me Tagged: security

3 Comments on Diversity in Security. Or, is it Insecurity?, last added: 4/22/2013
Display Comments Add a Comment
13. Security For You and Your Writing ( In an Insecure World)

I'm not the kind of person who generally worries about security or fraud. I always think, That will never happen to me. I listen to authors who are afraid their work will be stolen when they send it in and wonder how I can get that kind of confidence. They are basically saying, "My work is so good, people will want to steal it and claim it as their own." WOW! That's a statement. I know this kind of stuff does happen, but as I said--not to me. 


But then. . . the other morning, I got up at 5:00 a.m. to write; and instead of writing, I spent my time dealing with an iTunes mess. Someone used my iTunes account to purchase $80 worth of video game crud. My iTunes was connected to my PayPal, and there weren't enough funds in my PayPal, so my back-up method was used to charge these items. I was LIVID. I was SICK. And I was basically watching it happen right in front of my eyes because the person just happened to be hacked into my account, while I was also on the computer. He/she had changed my address to theirs and my security question and my password. LUCKILY, everything worked out--I was reimbursed almost immediately, and now NO payment method is connected to my iTunes. (By the way, I suggest if you have an iTunes account, that you do this immediately--have nothing or an iTunes card with a low balance connected to your account--lots of people are a victim of this iTunes/PayPal fraud right now.)



Then I read an interview with a screenwriter (that will be published in the next issue of WOW!). In the article, she discusses how to protect your screenplay or play with the U.S. Copyright Office before you are submitting it. I never really thought that was important until what happened to me the other morning. Once you've had anything stolen--money, words, Facebook password, ideas--you become skeptical--and maybe that is a good thing for me.  I have changed my passwords to all my accounts and made them more secure with capital letters and numbers. I have checked my privacy settings on Facebook, Twitter, and my e-mail accounts. I will make a note to be careful of the  kind of information I post on my blog. I will consider registering manuscripts with the copyright office, depending on what it is and where I am sending it. 

Basically, I plan to be more secure in my writing life and personal life--and especially my social networking life. When I teach the social networking class for WOW! (starting September 14) , I always bring up ways to protect your privacy with social media, and I plan to do even more of this now. 



How do you make sure your writing and personal lives are secure in an insecure world? Any tips to share? 


Post by Margo L. Dill <

6 Comments on Security For You and Your Writing ( In an Insecure World), last added: 8/19/2011
Display Comments Add a Comment
14. would you recognize a hardware keylogger in your library?

Brian points to this article about USB keyloggers that were found attached to computers at public libraries. If I saw one of these on a library computer, I might not even be sure what it was, or that it wasn’t part of the keyboard. Know your hardware, what to expect and what not to expect and check out the backs of your computers from time to time.

3 Comments on would you recognize a hardware keylogger in your library?, last added: 2/18/2011
Display Comments Add a Comment
15. Five to Rule Them All: An Excerpt

Sarah Noonan, Intern

Yesterday David L. Bosco blogged for us about Obama’s speech in front of the UN General Assembly. Below is an excerpt from his new book, Five To Rule Them All: The UN Security 9780195328769Council and the Making of The Modern World, which tells the inside story of this remarkable diplomatic creation, illuminating the role of the Security Council in the postwar world, and making a compelling case for its enduring importance. In the excerpt below we are introduced to the Security Council.

The Security Council is like no other body in history. Its five permanent members-China, France, Russia, the United Kingdom, and the United States-account for nearly 30 percent of the world’s population and more than 40 percent of global economic output. In military affairs, their dominance is even more overwhelming. They control more than 26,000 nuclear warheads, 99% of all those in existence. They have a combined 5.5 million men and women in arms. When the Council is united, its members can wage war, impose blockades, unseat governments, and levy sanctions, all in the name of the international community. There are almost no limits to the body’s authority.
The council usually meets in the UN headquarters complex on New York’s East River, but it has greater power and authority than the rest of the sprawling organization. The council is a creature of great-power politics, not international bureaucracy. It is built on the assumption that five of the strongest nations have the right and duty to safeguard the globe. Most of the UN structure insists that member states are equal; the council, by contrast, grants the most powerful countries special rights and responsibilities.

The idea that the great powers should chaperone the world is not new. Coalitions of powerful nations-including the Congress of Vienna and the Holy Alliance in the eighteenth and nineteenth centuries-have tried before. The Geneva-based League of Nations, inaugurated in 1920, was the world’s answer to the horror of the First World War. It constituted the first fully developed world political organization, and it had a council of major powers charged with preserving the peace. The league and its council died prematurely when they failed to prevent an even more devastating war, but the idea of a world organization endured.

During its almost seven decades of operation, the UN Security Council has launched a broad range of diplomatic, legal, and even military initiatives to provide order. Since the late-1980s, its activities have increased dramatically. The council has blessed armed interventions in places like Bosnia, Somalia, Haiti, and Kuwait. It has imposed sanctions on the regimes in Serbia, Libya, and Sudan; launched war crimes courts to try sitting heads of state; and targeted terrorist finances. During the Cold War, the United States usually felt comfortable exercising its military power without the council’s permission. No longer. Even the George W. Bush administration-with its deep skepticism of the United Nations-worked to get the council’s approval for its policies. For many, the 2003 U.S.-led invasion of Iraq demonstrated the perils of operating without the council’s blessing, and the body has emerged from the imbroglio active and relevant. In 2007, the council authorized peacekeeping missions that involved more than 100,000 troops from dozens of nations. From nuclear proliferation to the global war against terrorism to genocide in Africa, the council is often the cockpit for global politics.

Yet even the council’s vigorous post-Cold War activity has fallen well short of effective global governance. Atrocities and crimes against humanity still plague many parts of the globe. Entire countries have collapsed, and in so doing they have exported refugees, drugs, and radicalism. Since the 1980s, Pakistan, India, and North Korea have tested nuclear weapons while the council watched. These shortcomings have led to frequent and angry charges that it is feckless, impotent, and unprincipled. More than a few commentators have charged that the United Nations and its council are an impediment rather than an aid to world order.

The council’s new activism has stirred hopes that it will assure world order, stop atrocities, and counter global threats like terrorism and weapons proliferation. Yet it exists in a world of realpolitik. Its members are, above all, powerful states with their own diverging interests. Time and again, the council’s performance has dashed hopes that its members would somehow rise above their narrow interests and work together to establish a more peaceful and just world.

0 Comments on Five to Rule Them All: An Excerpt as of 1/1/1900
Add a Comment
16. Third and final installment on How to Survive a Network Attack

It's been a crazy week here at OCLC. Lots of good stuff in the works. I have been joking that the whole company will exhale a collective sigh of relief when all the planned spring and summer upgrades/enhancements/releases finally go through.

I spent an extended holiday weekend last weekend in my hometown of Alva, Oklahoma visiting as many family members as possible. Where else do you find a baby calf, a rabbit, a dog, 2 kittens and an indeterminate amount of chickens in the same backyard? I love it!

I was recently reminded that I hadn't give you the final installment in the IAG occasional series on "How to Survive a Network Attack" for small and medium-sized libraries. If you have IT people who specialize in security, rock on. If not, maybe these tips will help. This is the third chunk.
Find the previous two chunks are here:

Reduce the likelihood of an attack.
Have visibility into the problem.



Determine what you’re up against.

In the middle of a problem, it can be easy to jump to conclusions that will lead you astray.

* Is there really an attack going on, or is there another cause, such as a misconfiguration, equipment failure or power outage?
* Is your network the target of an attack, or is it the source?
* Is your network the target of an attack directed specifically at your organization, or are you caught up in a larger issue?
* Is the apparent intent of the attack to cause a service interruption, or are interruptions the side effect of a different type of attack?

Be able to block.
* Choke points in your network: Identify in advance the most efficient places in your network to perform filtering. A good place to look is Access Control Lists on the router that connects your network to the Internet.
* Quality of Service (QoS) controls: Even better than being able to block is to be able to control the amount of resources devoted to different types of traffic. With QoS controls configured in your network, you may be able to throttle the bad traffic while ensuring that there are enough resources devoted to critical services.
* Maintain a relationship with your Internet Service Provider: By the time traffic reaches your network it may be too late, and it may be more than it can handle.

Above all, don’t panic.

###

My take is that there are people who make their living providing security for online services. And lucky for libraries, there are data streams that are much more prone to attacks, too. I know we all love our MARC XML (sent through RESTful queries, no doubt) but banks and health care providers deal with data that is every bit as sensitive (I would argue much more so) than library data.

So if we take some pro-active steps, we will probably survive a network attack just fine and even live to tell the tale.

0 Comments on Third and final installment on How to Survive a Network Attack as of 4/17/2009 8:11:00 PM
Add a Comment
17. How long do you forgive bad tech? What do you do next?

I’m aware that accessing someone’s conference planner is not the same level of hackery as stealing their credit cards or breaking into their email account. However, I would just like to say that having an event planner where the password is not only the same for every user (until it’s changed) but also printed right there on the web page, turns the whole idea of having a password or any sort of security into a big joke. How do we teach librarians what good technology looks like if this is how we make them interact with us? For the record, using just the ALA Staff list, I was able to log in to someone else’s event planner in under a minute. The vendors get their password in an email, not much better.

I went to this page from Nicole’s post (I’m not going to the conference) just to see if it was really true that the page claims it is “best viewed in IE” which is yet another “tech don’t” in the world of 2008 browsers so much so that it calls into question all the rest of the site.

I don’t belong to ALA anymore. I did my time, paid my dues, donated a lot of service time to the organization and tried to be gentle and patient as they steered a big organization through the minefield of technological change. The Event Planner has been an outsourced, broken and insecure tool since they started using it. I’d like to see ALA do better, but my optimism that this will happen is flagging.

10 Comments on How long do you forgive bad tech? What do you do next?, last added: 1/12/2009
Display Comments Add a Comment
18. Congressional Testimony: Homeland Security Subcommitee on Intelligence, Information Sharing and Terrorism Risk Assessment

Amos N. Guiora is a Professor of Law at the S. J. Quinney College of Law, University of Utah, where he teaches criminal law, global perspectives on counterterrorism, religion and terrorism, and national security law. He served for nineteen years in the Israel Defense Forces.  Recently he testified before the House of Representatives Homeland Security Subcommitee about the importance of sharing information in preventing terrorism.  You can watch the video here and download the transcript here.

On May 15, 2008 I testified before the House Of Representatives Homeland Security Subcommittee on Intelligence, Information Sharing and Terrorism Risk Assessment. The Subcommittee, chaired by Congresswoman Jane Harman (D-Cal) was particularly interested in the subject of resilience—that is whether government and business alike are prepared for a terrorist attack on two different levels: preparing for an attack and ensuring continuity in the aftermath of the attack.

The two issues—before and after—are the essence of counter-terrorism preparation. For them to be truly implementable, government must engage in information sharing on all three levels (state, local and federal) and also with the business community. While the idea of information sharing with the business community raises important –and legitimate—questions within the law enforcement community, it is an absolute requirement.

During the course of my testimony, the Members of the Subcommittee were particularly interested in the difference between the American and Israeli cultures—in particular how Israelis respond to terrorism and understand that attacks are, in a sense, inevitable and how that understanding enables society to more quickly “rebound” in the aftermath of an attack. Furthermore, Members inquired as to the nature of the information sharing relationships and whether this did not raise important legal and constitutional issues.

To ensure a resilient homeland in a post-9/11 society, the United States must have a homeland security strategy that (1) understands the threat, (2) effectively counters the threat while preserving American values, (3) establishes a system of accountability, and (4) creates public-private and federal-state partnerships facilitating intelligence sharing and the continuity of society in the aftermath of an attack.

It is necessary to work with clear definitions of the terms and concepts that frame this strategy for resiliency. As I have previously articulated, “one of the greatest hindrances to a cogent discussion of terrorism and counterterrorism has been that the terms lack clear, universal definitions.” For this reason, I provide clear, concrete definitions of terrorism, counterterrorism, homeland security, effectiveness, accountability, and resiliency—the key terms in articulating the strategy for a resilient homeland. In addition to these definitions, I include two critical matrices for: Determining Effectiveness and Implementing Accountability.

The central focus of this testimony examines the dire consequences of the break-down in communications following both 9/11 and Hurricane Katrina, which suggests that in order to realize resiliency in the future, it is paramount that there is clear cooperation and coordination between the public sector and the private sector. Effective resiliency will ultimately be tied to establishing public-private partnerships.

In establishing these partnerships, they must be based upon three critical components: (1) clearly defined roles and responsibilities; (2) articulating a coordinated prevention-response plan; and (3) repeated training and/or simulation exercises using the prevention-response plan against realistic disaster/terror scenarios. By strategically strengthening security, sharing intelligence, and creating plans for post-attack procedures (such as evacuation plans, transportation plans, establishing places of refuge, and having basic supplies available to aid first-responders) private partners become the key to a secure and resilient homeland.

The importance of information before, during and after a disaster or attack is vital to resilience. Information sharing is, perhaps, the single most important aspect of successful resilience. Information sharing requires government agencies (federal, state and local) to share information both amongst themselves and with the private sector. Furthermore, it requires that the private sector—subject to existing legal and constitutional limits—share information with the public sector. Successful information sharing requires cooperation and coordination both internally (within sectors) and cross sectors (between public-private entities).

The lessons of 9/11 and Katrina speak for themselves. Resilience in the aftermath of either disaster or attack requires federal, state and local government agencies to understand that information sharing is vital to the nation’s homeland security. That information sharing process must include the private sector. Otherwise, the mistakes of yesterday will inevitably re-occur.

ShareThis

0 Comments on Congressional Testimony: Homeland Security Subcommitee on Intelligence, Information Sharing and Terrorism Risk Assessment as of 1/1/1990
Add a Comment
19. Reimer Digital Library to be open to public again real soon now

The Reimer Digital Library, an online archive to publicly accessible US Army publications has been password protected since February 6th as a security measure. In response to a Federation of American Scientists FOIA request and a pointed coverage by the Washington Post

, the Army wil be restoring access to the library “within two weeks

0 Comments on Reimer Digital Library to be open to public again real soon now as of 1/1/1900
Add a Comment
20. Patagonia, Argentina

bens-place.jpg

Patagonia, Argentina

Coordinates: 45 0 S 69 0 W

Approximate area: 300,000 sq. mi. (770,000 sq. km)

Perhaps best characterized as a sparsely populated, expansive arid region situated almost literally at the ends of the Earth, Patagonia once teemed with an impressive range of flora and fauna. Of course to fully appreciate the abundance of life that once called this piece of South America home, it helps to have a degree in paleontology. (more…)

0 Comments on Patagonia, Argentina as of 1/1/1990
Add a Comment
21. Our late summer visitor

I noticed this morning while feeding the chickens that all eight roosters were outside in the pen. This is unusual because the four at the top of the pecking order generally stroll around the pen, lording and swanning around, while the four at the bottom of the pecking order quake and cower on the roosts in their little coop. But they were all outdoors this morning. I neared the door, to fill the

0 Comments on Our late summer visitor as of 8/27/2007 5:26:00 PM
Add a Comment
22. Rescued from the sump pit

One of the kids' jobs in the spring and summer is to keep an eye on the sump pit in the garage, to fish out anything or anyone that's not supposed to be in there. This morning Laura discovered a tiger salamander (Ambystoma tigrinum var. melanostictum), which is quite common in these parts of the province; we're at the northern edge of their range. Tiger salamanders are part of the

0 Comments on Rescued from the sump pit as of 8/9/2007 1:44:00 PM
Add a Comment
23. For the birds

Late last spring, the kids asked if we could have "bird school" all summer. So, in addition to our various field guides, we pulled all of the bird books off the shelves and grouped them together in the living room on the coffee table. Indoors and out, the kids read the various books themselves, to each other, and asked for readalouds of others. I kept meaning to put all of the titles in a post,

0 Comments on For the birds as of 6/17/2007 8:18:00 PM
Add a Comment
24. A better late than never reminder for the (Late) Late Spring Edition of Dawn's Field Days

Dawn at By Sun and Candlelight has this season's installment, in words and plentiful pictures, of the latest Field Day, just in time for late Spring. Rainbows, skinks, flowers, birds and bird books -- something for everyone, especially on an early Spring morning or a quiet, rainy day. Thank you, Dawn, for the wonderful idea and for continuing, season after season.

0 Comments on A better late than never reminder for the (Late) Late Spring Edition of Dawn's Field Days as of 6/17/2007 6:24:00 PM
Add a Comment
25. Found in the garden this morning

Happily and busily planting, transplanting, and moving things around in the flower garden early today, I came across this which on closer inspection proved to be a robin's egg. But why the female robin chose to lay it out in the open, with no nest in sight and far from any trees or shrubs, is a mystery. The grass at left was provided by me, and after taking

0 Comments on Found in the garden this morning as of 1/1/1970
Add a Comment