Rodney Joffe and Georgia Tech DATA MINING in 2016 and 2017?
Report ADMITS 2016 is first year "reporting"!
Is Durham's work flushing this out
https://twitter.com/BabeWictor/status/1492068907175354379
Rodney Joffe and Georgia Tech DATA MINING in 2016 and 2017?
Report ADMITS 2016 is first year "reporting"!
Is Durham's work flushing this out
https://twitter.com/BabeWictor/status/1492068907175354379
>This story was ahead of the curve.
sure was
2522
Q !!mG7VJxZNCI 12/01/2018 00:31:55 ID: 3e4749
Archive Bread/Post Links: 4096003 / 4096718
Direct Link: 4096718
https://twitter.com/StormIsUponUs/status/1067076628050669568
Re: GHWB USSS code name re: Timber wolf
The grey wolf (Canis lupus; also known as timber wolf) shares a common ancestry with the domestic dog.
State funeral next week.
Coincidence?
Q
>New General Flynn:
pb below yesterday
#19743
>>15613043, >>15613072, >>15613148, >>15613150, >>15613050, >>15613114, >>15613191, >>15613268, >>15613495 CLINTONS SPIED, LET'S SEE WHAT HAPPENS
not necessarily related to data mining but something that popped up while digging.
ICANN Affirmation of Commitments Security, Stability & Resiliency Review Team Application for the position of Volunteer Review Team member Motivation Letter for Rodney Joffe To: Dr. Rod Beckstrom & Ms. Heather Dryden Applicant Information Rodney Joffe, Sr. Vice President, Neustar, Inc & Chief Technology Officer, IISG, Neustar, Inc. 46000 Center Oak Plaza, Sterling, VA 20166 Phone: 202-533-2900 email: rodney.joffe@neustar.bizI am hereby volunteering and applying for the position of Review Team Member for the 2010 ICANN Affirmation of Commitments – Security, Stability and Resiliency Team (SSR RT). I seek the endorsement of the ccNSO, and secondarily the gNSO, for my application, and am attaching the required information for those constituencies. As an active participant in the operation of the Internet, through both my employment as Senior Vice President and Senior Technologist of Neustar, Inc., and my community and industry activities as a security professional, I have a deep concern for the safety of the Internet as a whole. I have dedicated the last 20 years of my life to ensuring its survival. I have been involved in the operation of the Internet as founder of both a major Internet Service Provider (Genuity), and the largest managed DNS Provider, UltraDNS. In my role at Neustar, I oversee the security strategy and technical direction of the Internet groups within Neustar. Neustar operates the registry for .biz, .us, and .tel, and provides global DNS services for over 20 TLDs, and tens of millions of domain names. The DNS platform at Neustar is based on an architecture that I designed and created over 12 years ago, and the core technique I created and implemented to support resiliency and stability at that time, the use of Anycast in the DNS, has now been acknowledged and adopted as the best practice by most of the DNS world. In 12 years, this platform has not been the subject of a single security advisory. I have been involved in the ICANN world since its earliest days, and have remained actively engaged since then, serving 3 terms on the NomComm, as well as serving for a period on the RSTEP. I am also now entering my 7th year as a member of the SSAC. I also serve personally on a number of working groups and committees, including chairing the Conficker Working Group, have testified on cybersecurity before Congress, and contributing to specialized Threat Focus Cells. In every case, my overriding concern has been on maintaining the integrity of the Internet above all commercial concerns. I believe that the survival of the Internet is critical to every nation in the world, and as such I have no hesitation in offering my time and effort in supporting the SSR-RT. I am willing to commit to the 8 month 10 hour per week (or more) requirement, and have the full support of my employer. I consider the opportunity to serve as both a duty, as well an honor, and should I be appointed, I pledge my best efforts and full attention. Respectfully submitted Rodney Joffe
> https://www.venable.com/files/Event/28d8209c-53bf-4684-9873-1bd3c37c1360/Preview/EventAttachment/5dd94c18-f109-455c-a879-f8d0bfb2c2bf/How_the_Cybersecurity_Executive_Order_Impacts_You.pdf
oh look.
A report by a group co-chaired by Rodney Joffe that discussedsource address spoofingattacks
> https://transition.fcc.gov/bureaus/pshs/advisory/csric3/CSRIC_III_WG4_Report_March_%202013.pdf
>Rodney Joffe that discussedsource address spoofingattacks
For the safety of the internet, of course
3Objective, Scope, and Methodology3.1ObjectiveThis Working Groupwas convened to examine and make recommendations to the Council regarding best practices to secure the Domain Name System (DNS) and routing system of the Internet during the period leading up to what some anticipate might be widespreadimplementation of protocol updates such as the Domain Name System Security Extensions (DNSSEC) and Secure Border Gateway Protocol (BGPsec) extensions (though the latter outcome is not entirely uncontroversial).DNS is the directory system that associates a domain name with an IP (Internet Protocol) address. In order to achieve this translation, the DNS infrastructure makes hierarchical inquiries to servers that contain this global directory. As DNS inquiries are made, their IP packets rely on routing protocols to reach their correct destination. BGP is the protocol utilized to identify the best available paths for packets to take between points on the Internet at any given moment. This foundational system was built upon a distributed unauthenticated trust model that has been mostly sufficient for over two decades but has some room for improvement. These foundational systems are vulnerable to compromise through operator procedural mistakes as well as through malicious attacks that can suspend a domain name or IP address's availability, or compromise their information and integrity. While there are formal initiatives under way within the IETF (which has been chartered to develop Internet technical standards and protocols) that will improve this situation significantly, global adoption and implementation will take some time.