Get Used To It: Mousy Hair, Chapped Lips, And Boredom En RouteGet Used To It: Mousy Hair, Chapped Lips, And Boredom En Route
Looks like I got back from Black Hat just in time. Less than a week after my JetBlue flight touched down at JFK, <a href="http://www.informationweek.com/blog/main/archives/2006/08/last_weeks_foil.html">all hell broke loose at the airports</a>, forcing passengers to dump such cherished items as hair gel, ChapStick, and even books. Books? Living in New York, one doesn't need much of a reminder that we live in a dangerous world. This summer must have set some sort of record for <a href="http://www.
August 18, 2006
Looks like I got back from Black Hat just in time. Less than a week after my JetBlue flight touched down at JFK, all hell broke loose at the airports, forcing passengers to dump such cherished items as hair gel, ChapStick, and even books. Books? Living in New York, one doesn't need much of a reminder that we live in a dangerous world. This summer must have set some sort of record for subway cars breaking down and stranding riders in un-air-conditioned hell. And those subway cars usually don't smell too good to begin with. Can technology rescue us from danger in these uncertain times?Business travelers, myself included, are notorious for being big babies when it's time to shut off laptops, cell phones, and BlackBerrys as the airplane pushes back from the gate. There's nothing sadder than watching a grown man in cuff links loudly race through a business call as the stewardess makes the rounds to ensure all electronic devices have been turned off and properly stowed. Make no mistake about it: Until that fuselage door opens at your destination, she's the boss.
Since the Aug. 10 arrest of a group of alleged terrorists plotting to set off bombs on several flights between the U.K. and North America, airline security has gotten stricter than anytime since 9/11. Business travelers now face the prospect of having to check all their gadgets along with their luggage, leaving them without the attention they so richly crave from the time they check in to the time they scoop their bags off the airport carousel.
In Monday's issue, InformationWeek examines the state of travel for business travelers, smart new ways videoconferencing can be used instead of travel, and some experimental technologies that promise to help disaster-relief workers operate more efficiently in ways that will apply to industry as well. Want proof? Cisco Systems, Google, Microsoft, and other tech heavyweights all are showcasing technology at next week's Strong Angel III disaster-response event. If there's a way to ultimately sell their technology to businesses, these companies will find it.
Strong Angel III is also notable because the event will simulate a simultaneous natural disaster coinciding with a coordinated takedown of the cyberinfrastructure. The Internet, through its decentralized nature, has proven itself resilient against attacks in the past, but if someone were to find a way to defeat the Web's failover capabilities, we'd all be in serious trouble. A July report from the Government Accountability Office indicates that roles and responsibilities remain undefined at the national level in the event of an Internet disruption, and that laws and regulations governing disaster response and emergency communications have never been used for Internet recovery. We'd be sailing in uncharted waters.
The GAO acknowledges that the Homeland Security Department has some high-level plans for Internet infrastructure protection and incident response, but the components of these plans that address the Internet infrastructure are incomplete. Homeland Security has started a variety of initiatives to improve the nation's ability to recover from Internet disruptions, including working groups to facilitate coordination, as well as exercises in which government and private industry practice responding to cyberevents. But there's little that's concrete to show for these efforts. It's also unclear how Homeland Security's different infrastructure protection initiatives fit together, which means the government isn't ready to coordinate with the private sector in the event of a major Internet disruption. Private industry, including telecommunications companies, cable companies, and Internet service providers, owns and operates the majority of the Internet's infrastructure.
Our survival depends on our resilience. The world we live in changed drastically on 9/11, and it's not going to change back. This means we must develop new ways of using technology to defend ourselves, respond to disasters, and remain a productive society even when law enforcement deems it necessary to tighten down security for our own protection.
About the Author(s)
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023