Difference between revisions of "Bill Blunden"
(Created page with "{{person |WP= |image= |constitutes= }} ==Career== Bill has worked with ERP middleware, developed code for network security appliances, and taken various detours through academ...") |
(unstub) |
||
Line 1: | Line 1: | ||
{{person | {{person | ||
− | |WP= | + | |WP=https://en.wikipedia.org/wiki/Bill_Blunden_(author) |
− | |image= | + | |image=Bill Blunden.png |
− | |constitutes= | + | |constitutes=computer security analyst |
+ | |nationality=US | ||
+ | |birth_date=December 3, 1969 | ||
+ | |description=US computer security analyst. | ||
}} | }} | ||
+ | '''Bill Blunden''' is a US computer security analyst. | ||
+ | |||
==Career== | ==Career== | ||
− | + | Blunden has worked with ERP middleware, developed code for network security appliances, and taken various detours through academia. His current areas of research touch on anti-forensics and institutional analysis.<ref>https://www.coasttocoastam.com/show/2014-04-21-show/</ref> | |
==Publications== | ==Publications== | ||
− | Blunden has written a number of IT books including ''[[Cube Farm]]'', ''[[Software Exorcism]]'', ''[[Offshoring IT]]'' and ''[[The Rootkit Arsenal]]. In the domain of the social sciences, | + | Blunden has written a number of IT books including ''[[Cube Farm]]'', ''[[Software Exorcism]]'', ''[[Offshoring IT]]'' and ''[[The Rootkit Arsenal]]. In the domain of the social sciences, he has co-authored articles related to [[9/11]] that have appeared in academic publications such as Peace and Conflict:Journal of Peace Psychology and Aggressive Behavior. |
+ | |||
+ | {{QB|In light of all this covert and overt subversion, asking if a product is secure is posing the wrong question. The appropriate question is this: Which faction of clandestine agencies have access? Early on, [[Silicon Valley]] grasped that [[Edward Snowden|the Snowden affair]] was a [[public relations]] matter: a narrative that they could [[hijack]] to sell new tech. Never mind that the stuff they’re selling tends to spy on us. It goes without saying that assurances will be offered: promises that the new and improved tech is more secure," and that they’ve turned over a new leaf. They’ve learned their lesson. They’re all about privacy now — just make sure to read the fine print.<ref>https://truthout.org/articles/whistleblowers-arrest-shows-even-secure-platforms-are-vulnerable/</ref>}} | ||
+ | |||
+ | |||
+ | [https://truthout.org/authors/bill-blunden/ Articles at Truthout] | ||
{{SMWDocs}} | {{SMWDocs}} | ||
==References== | ==References== | ||
{{reflist}} | {{reflist}} | ||
− |
Latest revision as of 13:44, 24 June 2023
Bill Blunden (computer security analyst) | |
---|---|
Born | December 3, 1969 |
Nationality | US |
Founder of | Below Gotham Labs |
US computer security analyst. |
Bill Blunden is a US computer security analyst.
Career
Blunden has worked with ERP middleware, developed code for network security appliances, and taken various detours through academia. His current areas of research touch on anti-forensics and institutional analysis.[1]
Publications
Blunden has written a number of IT books including Cube Farm, Software Exorcism, Offshoring IT and The Rootkit Arsenal. In the domain of the social sciences, he has co-authored articles related to 9/11 that have appeared in academic publications such as Peace and Conflict:Journal of Peace Psychology and Aggressive Behavior.
In light of all this covert and overt subversion, asking if a product is secure is posing the wrong question. The appropriate question is this: Which faction of clandestine agencies have access? Early on, Silicon Valley grasped that the Snowden affair was a public relations matter: a narrative that they could hijack to sell new tech. Never mind that the stuff they’re selling tends to spy on us. It goes without saying that assurances will be offered: promises that the new and improved tech is more secure," and that they’ve turned over a new leaf. They’ve learned their lesson. They’re all about privacy now — just make sure to read the fine print.[2]
A Document by Bill Blunden
Title | Document type | Publication date | Subject(s) |
---|---|---|---|
File:Manufactured consent and cyberwar.pdf | Conference Proceedings | June 2010 | "Cyberwarfare" |