[Asrg] Computer Security Communication Network

Adam Sobieski <adamsobieski@hotmail.com> Sun, 16 December 2012 15:22 UTC

Return-Path: <adamsobieski@hotmail.com>
X-Original-To: asrg@ietfa.amsl.com
Delivered-To: asrg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F19AB21F87C8 for <asrg@ietfa.amsl.com>; Sun, 16 Dec 2012 07:22:37 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.298
X-Spam-Level:
X-Spam-Status: No, score=-1.298 tagged_above=-999 required=5 tests=[AWL=-1.300, BAYES_50=0.001, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id N7wWT6bueGbV for <asrg@ietfa.amsl.com>; Sun, 16 Dec 2012 07:22:36 -0800 (PST)
Received: from snt0-omc4-s24.snt0.hotmail.com (snt0-omc4-s24.snt0.hotmail.com [65.55.90.227]) by ietfa.amsl.com (Postfix) with ESMTP id A0BAC21F878B for <asrg@irtf.org>; Sun, 16 Dec 2012 07:22:36 -0800 (PST)
Received: from SNT002-W116 ([65.55.90.199]) by snt0-omc4-s24.snt0.hotmail.com with Microsoft SMTPSVC(6.0.3790.4675); Sun, 16 Dec 2012 07:22:33 -0800
X-EIP: [9mUSxlcH8eZyKT6lz8m20MdyLE8iBc+2]
X-Originating-Email: [adamsobieski@hotmail.com]
Message-ID: <SNT002-W1162FDBE7C267DEF68DAD46C5330@phx.gbl>
Content-Type: multipart/alternative; boundary="_5f864f3b-e89e-41a2-b97e-8227d319efa1_"
From: Adam Sobieski <adamsobieski@hotmail.com>
To: "asrg@irtf.org" <asrg@irtf.org>
Date: Sun, 16 Dec 2012 15:22:33 +0000
Importance: Normal
MIME-Version: 1.0
X-OriginalArrivalTime: 16 Dec 2012 15:22:33.0737 (UTC) FILETIME=[2BF5F790:01CDDBA1]
Subject: [Asrg] Computer Security Communication Network
X-BeenThere: asrg@irtf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: Anti-Spam Research Group - IRTF <asrg@irtf.org>
List-Id: Anti-Spam Research Group - IRTF <asrg.irtf.org>
List-Unsubscribe: <http://www.irtf.org/mailman/options/asrg>, <mailto:asrg-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/asrg>
List-Post: <mailto:asrg@irtf.org>
List-Help: <mailto:asrg-request@irtf.org?subject=help>
List-Subscribe: <http://www.irtf.org/mailman/listinfo/asrg>, <mailto:asrg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Sun, 16 Dec 2012 15:22:38 -0000

Internet Research Task Force,
Anti-Spam Research Group,
 
The aforementioned distributed, decentralized computer security communication network, a computer system for the dissemination of instantaneous computer security information between computer scientists is an interesting topic.  Such a system can be interoperable with, synchronized with, some concurrent versioning systems of open source projects.  Such a system  can be interoperable with software development updates of certain varieties and the hashes of concurrent versioning system objects can be utilized.  Such a system can, in numerous ways, enhance the security of computers, computer networks, and computer systems by enhancing the well-informedness of each interested computer scientist across the nation.

Such systems can reduce government waste and public expense with regard to some cybersecurity topics across a number of organizations such as the CIA, DHS, DOD, FBI, NSA and USNORTHCOM.  Additionally, some existing computer networks, such as military computer networks, are considered to be more secure than some existing civilian computer networks and, amidst that, the government claims that the public should pay taxes for government personnel or government systems to surveil the civilian networks and to surveil the American people.

Americans have expressed concerns about an American news climate over the past decade or more.  Americans have expressed concerns about a certain fearmongering concurrent to the introduction of, popularity of, or ubiquity of the Internet and the Web.  Americans have expressed concerns about a news climate with regard to cybercrime, cyberwarfare, and cybersecurity topics.  Americans have expressed concerns about a news climate with regard to various amorphous domestic and foreign cyberdangers, for example Chinese hackers.  The matter, overall, calls into question whether any government organizations may have participated, either directly or indirectly, in activities somehow contrary to ensuring the domestic tranquility.

Additionally, the Shirky Principle states that some institutions might try to preserve the problem to which they are the solution.  There could be, then, when faced with bold and new approaches to solving problems, a certain apprehension or reluctance to change, a reluctance to budgetary changes or to the repurposing of personnel.  As a large percentage of Americans work for the government, in the public sector, and as an unknown portion of computer scientists have worked on or work on cybersecurity topics, job creation topics can be discussed concurrently to bold and new approaches to solving problems and to addressing Americans policy concerns.  With too many remnant policy items from a previous administration, with a fiscal cliff approaching, the United States of America needs new solutions, new plans, to repurpose personnel, to create jobs, to stimulate the economy, and to affirm the primacy of Constitutional philosophy and Constitutional law.

Job creation topics include the construction of new scientific laboratories across the United States. When Americans tend to think of science laboratories, they tend to think of physics laboratories. Beyond physics laboratories, however, beyond the productive overlap of the DOE and computer science, there are many other possible types of science laboratories and computer science can advantage each (http://en.wikipedia.org/wiki/Branches_of_science, http://en.wikipedia.org/wiki/Outline_of_science). Many branches of science can be prefixed with the adjective computational, for example, when considering research topics possible at new multidisciplinary FFRDC's. FFRDC's are presently densely located in California and Virginia and it occurs that many more states across the nation could be enhanced by new FFRDC's for multidisciplinary scientific research and development.
 
On the topic of cyberpolicy, two pertinent topics include: (1) there exist computer systems and technologies which are more secure than civilian systems, military computer systems; (2) a new information network can be constructed for the dissemination of computer security information between computer scientists to enhance the instantaneous well-informedness of computer software developers and computer security personnel, personnel across the nation responsible for securing each computer, computer system, and computer network, resulting in a reduction of computer security problems and incidents.

Americans are dissatisfied with the United States' cyberpolicy.  No American wants to be surveilled by law enforcement, military, or by whatever the DHS is.  Would we have future Americans believe that Americans in the early 21st century wanted such cyberpolicies for themselves and for future Americans?  Would we have future Americans believe that we wanted to sacrifice liberty for a sense of security?
 
The Bush administration put forward a false choice between the liberties we cherish and the security we demand.  The construction of a new computer security communication network is both timely and appropriate.

As the United States approaches a fiscal cliff, we can consider that our tax dollars can be better spent than on previous cyberpolicy approaches and other remnant policy items from the previous administration.  As we move forward, for numerous reasons including: stimulating the economy, job creation, and preparedness for excellence in STEM education with digital textbooks, our plans for leaping across the fiscal chasm can and should include a megaproject, the construction of a large number of new scientific laboratories across the United States, an investment in our American future.



Kind regards,

Adam Sobieski