In this episode of Machiavelli in the Ivory Tower, hosts Sarah and Hanna speak with Dr. Siegfried Hecker, former director of Los Alamos National Laboratory and current Distinguished Professor of Practice at the James Martin Center for Nonproliferation Studies (CNS). Their conversation centers on Dr. Hecker’s forthcoming book, Hinge Points: An Inside Look at North Korea’s Nuclear Program (Stanford, CA: Stanford University Press, 2023). Dr. Hecker offers insights into the DPRK’s dual-track strategy of diplomacy and nuclear development and highlights missed opportunities when Washington might have been able to channel Pyongyang toward the elimination of nuclear weapons and did not. He shares insights gleaned from his many visits to North Korea and reflects on both the future of US policy toward the DPRK and the importance of facilitating engagement between scientists and diplomats.
Topics discussed include:
The DPRK’s dual-track strategy of diplomacy and nuclear development
Hinge points: missed opportunities in US policy towards the DPRK
Reflecting on the most consequential hinge points
Reasons for US policy failures
In-person engagement with proliferation-averse actors
Why a singular focus on DPRK denuclearization has been problematic
What next for US policy on the DPRK?
What scientific and policy communities can learn from each other
Gates Foundation announces “world’s strongest policy on Open Access“. ‘from January 2015, researchers it funds must make open their resulting papers and underlying data-sets immediately upon publication — and must make that research available for commercial re-use. “We believe that published research resulting from our funding should be promptly and broadly disseminated,” the foundation states.’
Librarians as publishers. As an example – one of our own: Portulano (while the library may not be “a publisher” of this journal, certain library staff members provided instrumental support in making it accessible)
All About Those Books. The Mount Desert Island High School version of Meghan Trainor’s “All About The Bass.” (MDIHS has just 571 students!)
FSU Shooting Highlights the Need for Library Security. Library Journal article – “Early in the morning of November 20 a lone gunman opened fire in Florida State University’s (FSU) Strozier Library.” The library staff will be receiving training this month for how to handle such situations.
Yesterday, LinkedIn’s official blog confirmed that a portion of their password database has been hacked and account passwords have been stolen. LinkedIn will be disabling the affected accounts and will email account holders further instructions for resetting the password. Visit the link above for more information about this process.
This seems like a good time to remind the community about Middlebury College’s Password Policy, which also contains a set of password standards. One of these standards states: i) Users must NEVER use the same password for Middlebury College accounts as for non-Middlebury College access.
That’s why we promote Middfiles for “cloud” storage needs. Do not hesitate to contact me if you have any questions around Dropbox, cloud storage or security. If you have questions specific to Middfiles, please visit our documentation page.
On Tuesday May 31st we’re going to change the categories on this blog, so if by any chance you’re using a feed of a specific category, that’s going to break. We suggest subscribing to the whole blog for maximum enjoyment! If you’re not a LIS staff member & would like to filter out the more staff related posts, you can subscribe to the new “Middlebury Community Interest” category after May 31st. The other categories will be “LIS Staff Interest”, and “Post for MiddPoints” which will cause the post to be added to the MiddPoints blog too. All the old categories except “The Essentials” will be converted to tags for easy searching.
The LIS Web team developed this new scheme, following recommendations that came out of the open meeting about the future of the LIS Blog (including a call for simplified categories). The AD Team reviewed and approved these changes. We welcome your comments.
Viruses on Macs? You don’t say!
The Helpdesk is occasionally confronted with this question: Do Macs get viruses? The short answer is yes, they do. Actually, there are quite a few viruses, worms and trojans that target Macs (see the iAntivirus Threat Database). That’s why we offer antivirus software for Macs: http://go.middlebury.edu/sav. Note that Symantec has been included on faculty/staff computers for several years. It’s also offered to all students (though we might not do a good job advertising that).
Recently, a new malicious software has been targeting Macs (SANS, Symantec, Cornell). The software is (deceptively) named MACDefender. Strictly speaking, MACDefender is not a virus, it is a trojan but for most people there is purely a semantic difference. It should be noted, however, that a computer trojan, much like its historical counterpart, relies on deception and requires our “help” to infiltrate a computer. Computer viruses and worms on the other side don’t depend, as much, on us humans.
The Payment Card Industry Data Security Standard (PCI DSS v2.0) is a standard that has been accepted by all major credit card companies and most credit providers. It is a standard that we must abide by if we are to accept credit cards as a form of payment. PCI DSS is broken into 12 requirements; each focusing on a different domain of security.
While PCI DSS is not an actual law, it is a standard enforced by the credit card industry, and the banks have stated and upheld the policy that they will no longer accept business from non-PCI compliant merchants. The government has used the PCI DSS as a yardstick by which they have measured such regulations as Gram-Leach-Bliley, Sarbanes-Oxley, and most recently the drafting of the Data Accountability and Trust Act.
We employ a device called a Barracuda here at Middlebury which helps us prevent SPAM from flooding our email system. Just shy of a year ago this system was updated to enable it to filter on cardholder information. By default this feature was turned on. We have left this enabled and have begun reporting on these blocked messages and alerting the senders of outbound messages. The Barracuda is intended to serve both as a SPAM filter and a compliance tool.