Disclaimer: The opinions of the columnists are their own and not necessarily those of their employer.

Category Archives: Physical Security

It’s About Time … Tamper-Proofing Aircraft Systems

– It took a while after the disappearance of flight MH370 and a series of harebrained conspiracy theories … a month in fact … before the necessity to tamper-proof avionics became a topic for discussion. For example, Andy Pasztor and Jon Ostrower wrote a piece in The Wall Street Journal…

A World Apart – Security of Safety Systems

– I was invited to present a paper on “Bridging the Safety-Security Software Gap” at the Fifth International Conference on Safety and Security Engineering, known as SAFE 2013, held in Rome, Italy in mid-September 2013. The audience comprised mainly researchers specializing in safety-critical…

Oil Rigs’ Software Attacked by Malware

– In the February 23, 2013 Houston Chronicle, there is an article “Malware on oil rig computers raises security fears” by Zain Shauk, which describes how malware has infiltrated safety-critical software managing the activities and control systems of oil rigs. Shauk’s article is available at…

Google—Not Being Evil, Not Doing Harm

– In a couple of columns in December 2008, I questioned whether or not Google was being true to its maxim of not being evil. At that time, I confused their motto of “Don’t be evil” with the physicians’ Hippocratic Oath of “Do no harm.” But I also argued that infringement of privacy could…

Tampering and Security

– I have maintained all along that we don’t even know about most of the cyber attacks and quite a few physical attacks that have occurred wither because we haven’t detected them or because the criminals are expert enough to cover their tracks. I recently received a package sealed with tape that…