<?xml version="1.0" encoding="UTF-8" standalone="no"?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0">
    <channel>
        <title>Information Security Strategy</title>
        <description></description>
        <link>http://www.leune.org</link>
        <atom:link href="http://www.leune.org/feed.xml" rel="self" type="application/rss+xml"/>
        
            <item>
                <title>Squalo Antenna for 6m Amateur Radio Band</title>
                        
                
                    <description>&lt;p&gt;As somebody who has been a licensed amateur radio operator since some time in
the mid-1990’s, the 6m band has always been interesting to me. Since I never
had the equipment to venture out on it, it has mostly been one of those mystery
bands that I heard people talk about, but never was able to participate in.&lt;/p&gt;

</description>
                
                <pubDate>Fri, 17 Jun 2022 00:00:00 -0400</pubDate>
                <link>http://www.leune.org/2022/06/17/6m-Squalo-Antenna.html</link>
                <guid isPermaLink="true">http://www.leune.org/2022/06/17/6m-Squalo-Antenna.html</guid>
            </item>
        
            <item>
                <title>SANS Holiday Hack Challenge 2018, Question 5</title>
                        
                
                    <description>&lt;p&gt;One of the highlights of the end of the calendar year is the &lt;a href="https://www.holidayhackchallenge.com/"&gt;SANS Holiday
Hack Challenge&lt;/a&gt;. This year, I took
the time to work through the challenges. It was fun!&lt;/p&gt;

</description>
                
                <pubDate>Mon, 21 Jan 2019 00:00:00 -0500</pubDate>
                <link>http://www.leune.org/2019/01/21/SANS-Holiday-Hack-Challenge-5.html</link>
                <guid isPermaLink="true">http://www.leune.org/2019/01/21/SANS-Holiday-Hack-Challenge-5.html</guid>
            </item>
        
            <item>
                <title>SANS Holiday Hack Challenge 2018, Question 4</title>
                        
                
                    <description>&lt;p&gt;One of the highlights of the end of the calendar year is the &lt;a href="https://www.holidayhackchallenge.com/"&gt;SANS Holiday
Hack Challenge&lt;/a&gt;. This year, I took
the time to work through the challenges. It was fun!&lt;/p&gt;

</description>
                
                <pubDate>Sat, 19 Jan 2019 00:00:00 -0500</pubDate>
                <link>http://www.leune.org/2019/01/19/SANS-Holiday-Hack-Challenge-4.html</link>
                <guid isPermaLink="true">http://www.leune.org/2019/01/19/SANS-Holiday-Hack-Challenge-4.html</guid>
            </item>
        
            <item>
                <title>SANS Holiday Hack Challenge 2018, Question 3</title>
                        
                
                    <description>&lt;p&gt;One of the highlights of the end of the calendar year is the &lt;a href="https://www.holidayhackchallenge.com/"&gt;SANS Holiday
Hack Challenge&lt;/a&gt;. This year, I took
the time to work through the challenges. It was fun!&lt;/p&gt;

</description>
                
                <pubDate>Wed, 16 Jan 2019 00:00:00 -0500</pubDate>
                <link>http://www.leune.org/2019/01/16/SANS-Holiday-Hack-Challenge-3.html</link>
                <guid isPermaLink="true">http://www.leune.org/2019/01/16/SANS-Holiday-Hack-Challenge-3.html</guid>
            </item>
        
            <item>
                <title>SANS Holiday Hack Challenge 2018, Question 2</title>
                        
                
                    <description>&lt;p&gt;One of the highlights of the end of the calendar year is the &lt;a href="https://www.holidayhackchallenge.com/"&gt;SANS Holiday
Hack Challenge&lt;/a&gt;. This year, I took
the time to work through the challenges. It was fun!&lt;/p&gt;

</description>
                
                <pubDate>Tue, 15 Jan 2019 00:00:00 -0500</pubDate>
                <link>http://www.leune.org/2019/01/15/SANS-Holiday-Hack-Challege-2.html</link>
                <guid isPermaLink="true">http://www.leune.org/2019/01/15/SANS-Holiday-Hack-Challege-2.html</guid>
            </item>
        
            <item>
                <title>Patch Deployment</title>
                        
                
                    <description>&lt;p&gt;Any CISO strives after two things to mitigate cyberrisk to acceptable
levels: visibility and control. One of the most important controls that
should be implemented well and operated effectively is making sure that an
effective patch management infrastructure is in place. In lieu of that, a
patch deployment mechanism will work too.&lt;/p&gt;

</description>
                
                <pubDate>Fri, 20 Jul 2018 00:00:00 -0400</pubDate>
                <link>http://www.leune.org/2018/07/20/Patching.html</link>
                <guid isPermaLink="true">http://www.leune.org/2018/07/20/Patching.html</guid>
            </item>
        
            <item>
                <title>New Research Blog</title>
                        
                
                    <description>&lt;p&gt;In order to not dilute the nature of the posts here, I have just started a
new &lt;a href="http://research.leune.org"&gt;Research Blog&lt;/a&gt;, which will focus on my
ongoing academic research.&lt;/p&gt;

</description>
                
                <pubDate>Fri, 21 Jul 2017 00:00:00 -0400</pubDate>
                <link>http://www.leune.org/2017/07/21/New-Research-Blog.html</link>
                <guid isPermaLink="true">http://www.leune.org/2017/07/21/New-Research-Blog.html</guid>
            </item>
        
            <item>
                <title>RSS Feed Hickup</title>
                        
                
                    <description>&lt;p&gt;My RSS feed seems to have experienced a hickup and listed some old articles
as new. Apoligies for the inconvenience and/or confusion!&lt;/p&gt;
</description>
                
                <pubDate>Wed, 05 Jul 2017 00:00:00 -0400</pubDate>
                <link>http://www.leune.org/2017/07/05/Feed-Hickup.html</link>
                <guid isPermaLink="true">http://www.leune.org/2017/07/05/Feed-Hickup.html</guid>
            </item>
        
            <item>
                <title>Apple's Dilemma</title>
                        
                
                    <description>By now, most people know that &lt;a href="http://www.apple.com/customer-letter/" target="_blank"&gt;Apple is refusing to comply with a court order&lt;/a&gt; to decrypt the contents of a cell phone. The Justice Department &lt;a href="http://www.nytimes.com/2016/02/20/business/justice-department-calls-apples-refusal-to-unlock-iphone-a-marketing-strategy.html?_r=0" target="_blank"&gt;isn't too happy with that&lt;/a&gt;, and calls it a marketing strategy.&lt;br /&gt;&lt;br /&gt;They are right.&lt;br /&gt;&lt;br /&gt;However, to call it &lt;i&gt;just&lt;/i&gt; a marketing strategy would be incredibly short-sighted. Before I can address that, let's look at what's are the heart of all this. Over the last couple of days, I spent more time explaining what cryptography is, and what purpose it serves, than I spend time explaining what the order is really about.&lt;br /&gt;&lt;br /&gt;So, here it goes: &lt;i&gt;cryptography is a technique to allow people to communicate securely in the presence of an opponent&lt;/i&gt;. There are a few key components:&lt;br /&gt;&lt;br /&gt;1. Cryptography is about communications. In other words, cryptography protects messages. In today's world, most of those messages live on mobile devices, such as smartphones.&lt;br /&gt;&lt;br /&gt;2. Cryptography is about security. In most cases, that idea of security is used synonymously with confidentiality. Cryptography can do more than that, but the other cryptographic services are not really in scope in this case.&lt;br /&gt;&lt;br /&gt;3. Cryptography assumes an adversarial environment. Without an 'us-and-them', there is no need for cryptography.&lt;br /&gt;&lt;br /&gt;Apple, Google, Facebook, WhatsApp are all in the business of messaging. Furthermore, they believe that the senders and recipients of messages expect a level of privacy concerning their exchanges. As a matter of fact, they see &lt;i&gt;privacy&lt;/i&gt; as a key competitive advantage, and they believe that without privacy their services will fall out of demand.&lt;br /&gt;&lt;br /&gt;Privacy requires message confidentiality. Confidentiality of messages requires cryptography.&lt;br /&gt;&lt;br /&gt;In other words, removing, or purposefully weakening cryptography, puts these companies at a &lt;i&gt;global&lt;/i&gt; competitive disadvantage.&lt;br /&gt;&lt;br /&gt;Note the word 'global'. Apple doesn't just sell their goods in the U.S. While flawed, the U.S. system of checks and balances actually works pretty well; especially when compared with other countries. Consumers in repressive regimes don't just look for cryptography as a nice-to-have feature, it is something that can save their lives, or even the lives of their families, friends and neighbors.&lt;br /&gt;&lt;br /&gt;Second, the court order requires Apple to invent and build a product that currently does not exist. It is similar to telling a builder to first build a house that isn't there yet, but leave out any doors and windows, so that a warrant can be executed when he is done. Apple is not the FBI's private on-demand software development shop. Asking a company, via court order, to invent, build and hand over something that does not yet exist is a scary idea.&lt;br /&gt;&lt;br /&gt;Third, all iPhones are pretty much the same. Once the software has been developed to unlock the phone's secrets, it can be used to open all iPhones. Anywhere in the world. Always.&lt;br /&gt;&lt;br /&gt;While the FBI stipulates that this court order only applies to one specific physical device, the damage to Apple's brand is done as soon as words comes out that the vulnerable version of their software exists. As much as companies try to keep things secret, they aren't very good at it. The mere existence of such software will cause it to eventually leak. When that happens, anyone (national states, criminals, or just about anyone else), will be able to use it.&lt;br /&gt;&lt;br /&gt;Two real questions remain:&lt;br /&gt;&lt;br /&gt;1. Is this court order indeed based on legal grounds? I am not a lawyer, and I cannot answer that question.&lt;br /&gt;&lt;br /&gt;2. Is our deep fear of terrorism an acceptable reason to compel one of the countries strongest companies to weaken its own brand, invent and develop products that do not exist, and provide governments world-wide (not just in the U.S.) with unlimited access to any cell phone, at any time?&lt;br /&gt;&lt;br /&gt;If so, the terrorists have achieved their goal: we have allowed fear to influence every aspect of our daily lives. The fact that Apple unlocks one more phone really doesn't matter then.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Update&lt;/b&gt;: Fixed a whole lot of typos.&lt;br /&gt;&lt;br /&gt;</description>
                
                <pubDate>Sat, 20 Feb 2016 09:18:00 -0500</pubDate>
                <link>http://www.leune.org/2016/02/20/by-now-most-people-know-that-apple-is.html</link>
                <guid isPermaLink="true">http://www.leune.org/2016/02/20/by-now-most-people-know-that-apple-is.html</guid>
            </item>
        
            <item>
                <title>Changing jobs</title>
                        
                
                    <description>&lt;div class="gmail_default" style="background-color: white; font-family: georgia, serif; font-size: 12.8px;"&gt;&lt;b&gt;New job&lt;/b&gt;&lt;/div&gt;&lt;div class="gmail_default" style="background-color: white; font-family: georgia, serif; font-size: 12.8px;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="gmail_default" style="background-color: white; font-family: georgia, serif; font-size: 12.8px;"&gt;Effective January 1st, I'll complete my transition to the Dark Side by vacating my position as Information Security Officer. Afterwards, I will join Adelphi University's full-time faculty. My primary focus will be on computer science in general, with an emphasis on cybersecurity.&lt;/div&gt;&lt;div class="gmail_default" style="background-color: white; font-family: georgia, serif; font-size: 12.8px;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="gmail_default" style="background-color: white; font-family: georgia, serif; font-size: 12.8px;"&gt;In my new position, I'm going to be rekindling my research interests, and hopefully do something that is interesting and valuable to the community as a whole. With a change of responsibility comes a new focus, and hopefully, more materials to write about here.&lt;/div&gt;&lt;div class="gmail_default" style="background-color: white; font-family: georgia, serif; font-size: 12.8px;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="gmail_default" style="background-color: white; font-family: georgia, serif; font-size: 12.8px;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="gmail_default" style="background-color: white; font-family: georgia, serif; font-size: 12.8px;"&gt;&lt;b&gt;Want to replace me?&lt;/b&gt;&lt;/div&gt;&lt;div class="gmail_default" style="background-color: white; font-family: georgia, serif; font-size: 12.8px;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="gmail_default" style="background-color: white; font-family: georgia, serif; font-size: 12.8px;"&gt;If you are interested in becoming my successor as &lt;a href="http://www.adelphi.edu/" target="_blank"&gt;Adelphi University&lt;/a&gt;'s &lt;a href="http://it.adelphi.edu/security/" target="_blank"&gt;Information Security Officer&lt;/a&gt;, please take a look at the job posting and apply. I'll be more than happy to answer any questions you may have.&lt;/div&gt;&lt;div class="gmail_default" style="background-color: white; font-family: georgia, serif; font-size: 12.8px;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="gmail_default" style="background-color: white; font-family: georgia, serif; font-size: 12.8px;"&gt;The job posting &amp;nbsp;can be found at at&amp;nbsp;&lt;a href="http://chj.tbe.taleo.net/chj03/ats/careers/requisition.jsp;jsessionid=D0B6F2F9EEB9879DCBAA1A1807AC3B17?org=ADELPHI&amp;amp;cws=1&amp;amp;rid=1574" style="color: #1155cc;" target="_blank"&gt;http://chj.tbe.taleo.net/&lt;wbr&gt;&lt;/wbr&gt;chj03/ats/careers/requisition.&lt;wbr&gt;&lt;/wbr&gt;jsp;jsessionid=&lt;wbr&gt;&lt;/wbr&gt;D0B6F2F9EEB9879DCBAA1A1807AC3B&lt;wbr&gt;&lt;/wbr&gt;17?org=ADELPHI&amp;amp;cws=1&amp;amp;rid=1574&lt;/a&gt;.&lt;/div&gt;&lt;div class="gmail_default" style="background-color: white; font-family: georgia, serif; font-size: 12.8px;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="gmail_default" style="background-color: white; font-family: georgia, serif; font-size: 12.8px;"&gt;Adelphi is a great place to work; salaries aren't bad (not great either ;), the campus has a close proximity to NYC, there are decent benefits, its campus is&amp;nbsp;&lt;span style="font-size: 12.8px;"&gt;beautiful&lt;/span&gt;&lt;span style="font-size: 12.8px;"&gt;, &amp;nbsp;and you'll be in a fairly informal and non-hostile work atmosphere. Even better, you'll work in a professional well-run department and you will have&amp;nbsp;&lt;/span&gt;&lt;span style="font-size: 12.8px;"&gt;&lt;i&gt;FULL OWNERSHIP&lt;/i&gt;&lt;b&gt; &lt;/b&gt;of the Infosec function.&lt;/span&gt;&lt;/div&gt;&lt;div class="gmail_default" style="background-color: white; font-family: georgia, serif; font-size: 12.8px;"&gt;&lt;span style="font-size: 12.8px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class="gmail_default" style="background-color: white; font-family: georgia, serif; font-size: 12.8px;"&gt;&lt;b&gt;Note to bad guys&lt;/b&gt;&lt;/div&gt;&lt;div class="gmail_default" style="background-color: white; font-family: georgia, serif; font-size: 12.8px;"&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class="gmail_default" style="background-color: white; font-family: georgia, serif; font-size: 12.8px;"&gt;Until my replacement has been appointed, I will not fully vacate my position. Logs are still going to be monitored, the phone will still be answered, email will be watched. Basically, nothing changes.&lt;/div&gt;</description>
                
                <pubDate>Fri, 11 Dec 2015 19:19:00 -0500</pubDate>
                <link>http://www.leune.org/2015/12/11/changing-jobs.html</link>
                <guid isPermaLink="true">http://www.leune.org/2015/12/11/changing-jobs.html</guid>
            </item>
        
    </channel>
</rss>