Difference between revisions of "Bill Blunden"

From Wikispooks
Jump to navigation Jump to search
(Created page with "{{person |WP= |image= |constitutes= }} ==Career== Bill has worked with ERP middleware, developed code for network security appliances, and taken various detours through academ...")
 
(unstub)
 
Line 1: Line 1:
 
{{person
 
{{person
|WP=
+
|WP=https://en.wikipedia.org/wiki/Bill_Blunden_(author)
|image=
+
|image=Bill Blunden.png
|constitutes=
+
|constitutes=computer security analyst
 +
|nationality=US
 +
|birth_date=December 3, 1969
 +
|description=US computer security analyst.
 
}}
 
}}
 +
'''Bill Blunden''' is a US computer security analyst.
 +
 
==Career==
 
==Career==
Bill has worked with ERP middleware, developed code for network security appliances, and taken various detours through academia. His current areas of research touch on anti-forensics and institutional analysis.
+
Blunden has worked with ERP middleware, developed code for network security appliances, and taken various detours through academia. His current areas of research touch on anti-forensics and institutional analysis.<ref>https://www.coasttocoastam.com/show/2014-04-21-show/</ref>
  
 
==Publications==
 
==Publications==
Blunden has written a number of IT books including ''[[Cube Farm]]'', ''[[Software Exorcism]]'', ''[[Offshoring IT]]'' and ''[[The Rootkit Arsenal]]. In the domain of the social sciences, Bill has co-authored articles related to [[9/11]] that have appeared in academic publications such as Peace and Conflict:Journal of Peace Psychology and Aggressive Behavior.  
+
Blunden has written a number of IT books including ''[[Cube Farm]]'', ''[[Software Exorcism]]'', ''[[Offshoring IT]]'' and ''[[The Rootkit Arsenal]]. In the domain of the social sciences, he has co-authored articles related to [[9/11]] that have appeared in academic publications such as Peace and Conflict:Journal of Peace Psychology and Aggressive Behavior.  
 +
 
 +
{{QB|In light of all this covert and overt subversion, asking if a product is secure is posing the wrong question. The appropriate question is this: Which faction of clandestine agencies have access? Early on, [[Silicon Valley]] grasped that [[Edward Snowden|the Snowden affair]] was a [[public relations]] matter: a narrative that they could [[hijack]] to sell new tech. Never mind that the stuff they’re selling tends to spy on us. It goes without saying that assurances will be offered: promises that the new and improved tech is more  secure," and that they’ve turned over a new leaf. They’ve learned their lesson. They’re all about privacy now — just make sure to read the fine print.<ref>https://truthout.org/articles/whistleblowers-arrest-shows-even-secure-platforms-are-vulnerable/</ref>}}
 +
 
 +
 
 +
[https://truthout.org/authors/bill-blunden/ Articles at Truthout]
 
{{SMWDocs}}
 
{{SMWDocs}}
 
==References==
 
==References==
 
{{reflist}}
 
{{reflist}}
{{Stub}}
 

Latest revision as of 13:44, 24 June 2023

Person.png Bill Blunden  Rdf-entity.pngRdf-icon.png
(computer security analyst)
Bill Blunden.png
BornDecember 3, 1969
NationalityUS
Founder ofBelow Gotham Labs
US computer security analyst.

Bill Blunden is a US computer security analyst.

Career

Blunden has worked with ERP middleware, developed code for network security appliances, and taken various detours through academia. His current areas of research touch on anti-forensics and institutional analysis.[1]

Publications

Blunden has written a number of IT books including Cube Farm, Software Exorcism, Offshoring IT and The Rootkit Arsenal. In the domain of the social sciences, he has co-authored articles related to 9/11 that have appeared in academic publications such as Peace and Conflict:Journal of Peace Psychology and Aggressive Behavior.


In light of all this covert and overt subversion, asking if a product is secure is posing the wrong question. The appropriate question is this: Which faction of clandestine agencies have access? Early on, Silicon Valley grasped that the Snowden affair was a public relations matter: a narrative that they could hijack to sell new tech. Never mind that the stuff they’re selling tends to spy on us. It goes without saying that assurances will be offered: promises that the new and improved tech is more secure," and that they’ve turned over a new leaf. They’ve learned their lesson. They’re all about privacy now — just make sure to read the fine print.[2]


Articles at Truthout

 

A Document by Bill Blunden

TitleDocument typePublication dateSubject(s)
File:Manufactured consent and cyberwar.pdfConference ProceedingsJune 2010"Cyberwarfare"
Many thanks to our Patrons who cover ~2/3 of our hosting bill. Please join them if you can.


References