tag:blogger.com,1999:blog-4088979.post5022533901179681700..comments2023-10-16T06:06:25.012-04:00Comments on TaoSecurity Blog: More Information on CNCIRichard Bejtlichhttp://www.blogger.com/profile/13512184196416665417noreply@blogger.comBlogger5125tag:blogger.com,1999:blog-4088979.post-54893016260484260662010-03-18T17:27:38.537-04:002010-03-18T17:27:38.537-04:00More comprehensive report on CNCI can be found her...More comprehensive report on CNCI can be found here:<br />http://www.tdisecurity.com/resources/assets/CNCI%20TDI.pdfAnonhttp://www.tdisecurity.com/resources/assets/CNCI%20TDI.pdfnoreply@blogger.comtag:blogger.com,1999:blog-4088979.post-20132102813662470722009-02-24T02:09:00.000-05:002009-02-24T02:09:00.000-05:00This comment has been removed by a blog administrator.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-4088979.post-40213437482385143062009-02-23T22:34:00.000-05:002009-02-23T22:34:00.000-05:00I'm sure Fairfax county Chamber of Commerce doesn'...I'm sure Fairfax county Chamber of Commerce doesn't mean to leave the entire contents of their upload directory open to the world - hopefully they'll fix that issue.<BR/><BR/>Boeing's stated CNCI vision seems to be on (a bit skewed towards the contracts they support but that's understandable). I can't wait to see more people articulate this vision and how it all interplays moving forward. Certainly The Whitehouse (through OMB), DOD, DHS, NSA, DOJ and others have to find a way to work together in a meaningful manner. TIC and it's associated projects go a long way to setting up a common playing field across government, but that's the easy part of this entire project. The real work is still to come.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-4088979.post-66040946432468343962009-02-23T22:33:00.000-05:002009-02-23T22:33:00.000-05:00Anonymous, there is a difference between monitorin...Anonymous, there is a difference between monitoring your traffic at your ISP and monitoring traffic that interacts with .gov systems. There is already a wiretap act exception that allows system owners (you, me, .gov, etc.) to monitor their own networks in order to protect them.Richard Bejtlichhttps://www.blogger.com/profile/13512184196416665417noreply@blogger.comtag:blogger.com,1999:blog-4088979.post-8341873174125228002009-02-23T21:56:00.000-05:002009-02-23T21:56:00.000-05:00Perhaps my tin foil hat is showing, but after the ...Perhaps my tin foil hat is showing, but after the CNCI system is deployed to monitor for network attacks there will be no need for wiretap warrants.<BR/><BR/>Fundamentally, there is no difference between monitoring network traffic for IDS signatures and political speech. <BR/><BR/>Lastly, if network traffic can be monitored without warrents, why can't databases be monitored, or general use computers without warrants?<BR/><BR/>An unrecognized consequence of this process is the erosion of the 4th amendment.Anonymousnoreply@blogger.com