Friday, July 24, 2009
Prankster Gets Verizon's CEO Private Address, Visits Him to Discuss Privacy
John Hargrave tracked down Verizon CEO's private address and cellphone number. Then he went to his home—megaphone in hand—to ask him to stop Verizon's lousy privacy policies.
One In Two Security Pros Unhappy In Their Jobs
You'd think most professionals in a hot industry like IT security would feel content and challenged technically and creatively in their jobs -- but not so much. According to the results of a new survey that will go public next week at Defcon in Las Vegas, half of security pros aren't satisfied with their current jobs, and 57 percent say their jobs are neither challenging nor fully tapping their skills.
Full story.
Thursday, July 23, 2009
Australian engulfed in flames after being Tasered
A man whose relatives say had been sniffing gasoline burst into flames after a police officer Tasered him as he ran at officials carrying a container of fuel, police said Tuesday.
The man, identified by his family as 36-year-old Ronald Mitchell, was in critical condition at a Perth hospital in Western Australia state following Monday’s incident in Warburton, an aboriginal community 950 miles (1,540 kilometers) northeast of Perth.
Western Australia police said they were responding to a complaint at a house when Mitchell ran outside carrying a cigarette lighter and a large plastic bottle containing what they believe was fuel. When he refused to stop running toward them, one officer Tasered him, police said in a statement.
The man was immediately engulfed in flames. The officer threw him to the ground and smothered the blaze with his hands, the statement said. Mitchell was charged with assault to prevent arrest and possession of a sniffing substance.
More here.
Wednesday, July 22, 2009
Tuesday, July 21, 2009
Wireshark 1.2.1 released
Official releases are available right now from the download page.
Tuesday, July 14, 2009
Is SecCon doomed?
Critics have said assigning different categories to different colors is too vague an approach to deliver enough information to be useful. And Democrats said the Bush administration used it for political manipulation.
Homeland Security Secretary Janet Napolitano appointed a task force Tuesday to determine in 60 days how effective the current system is.
More here.
Sunday, July 05, 2009
Caffeine may stop Mad Cow

More here.
Monday, June 22, 2009
The Security Onion LiveCD
http://distro.ibiblio.org/pub/
The Security Onion LiveCD is a bootable CD that contains software used for installing, configuring, and testing Intrusion Detection Systems.
What software does it contain?
The Security Onion LiveCD is based on Xubuntu 9.04 and contains Snort 2.8.4.1, Snort 3.0.0b3 (Beta), sguil, idswakeup, nmap, metasploit, scapy, hping, fragroute, fragrouter, netcat, paketto, tcpreplay, and many other security tools.
Friday, June 19, 2009
More City Fun - City asks applicants for Internet passwords
Read more here.
Public Safety - City's dress code requires underwear!

If you want to work for the city of Brooksville, be sure that you use deodorant, that your clothes fit properly and that you cover up your wounds and tattoos. And, for goodness sake, wear underwear.
The Brooksville City Council approved a dress and appearance policy by a count of 4-1 this month, with only Mayor Joe Bernardini casting the dissenting vote. He questioned how the code would be interpreted and enforced.
This could be a job opportunity - undercover Underwear Inspectors!
Full story here.
Wednesday, June 17, 2009
Wireshark 1.2 Released
Universal wireless keyboard sniffer: Keykeriki

Kind of a cool thing... "This opensource hardware and software project enables every person to verify the security level of their own keyboard transmissions, and/or demonstrate the sniffing attacks (for educational purpose only)."
Friday, June 05, 2009
Securing your assets.
The magic bra detects changes in body temperature brought on by sexual arousement and squeezes boobs together to create a bigger cleavage.
Then when things cool off again the bra's built-in memory relaxes the fabric and the wearer's bust returns to normal, say its Slovenian inventors.
“Designer Suzana Gorisek said: "As a woman's body changes, so the size of the bra changes. That's the advantage of this bra."
More here.
Thursday, June 04, 2009
ATM malware used in Russia lets attackers control machines.
"Trustwave investigators said malware used in several ATM breaches in Eastern Europe allows attackers to take over the machines and dump cash from them.
The compromised ATMs ran Microsoft's Windows XP, but Trustwave can't disclose the ATM software the malware targets, Percoco said."
Monday, June 01, 2009
(IN)SECURE magazine

Couple highlights -
* Using Wireshark to capture and analyze wireless traffic
* Q&A: Ron Gula on Nessus and Tenable Network Security
* Lots more, nice issue...
Using the DATALOSSdb info, Voltage releases data breach map
http://www.voltage.com/solutions/data-breach/
You can embed the map on a web page if you are so inclined...
Thursday, May 28, 2009
WNLA and Weaknet Labs Fundraiser
Kids at work

During demonstrations at two prisons on April 23, children aged between five and 17 held hands in a circle and one was shocked with a stun gun, passing the shock around the circle. At another prison, children were shocked individually.
None was seriously hurt or taken to hospital, the state’s Department of Corrections said.
Monday, May 25, 2009
Memorial Day 2009
Saturday, May 23, 2009
How not to secure your future...
BEIJING – Chen Fuchao, a man heavily in debt, had been contemplating suicide on a bridge in southern China for hours when a passer-by came up, shook his hand — and pushed him off the ledge.
Chen fell 26 feet (8 meters) onto a partially inflated emergency air cushion laid out by authorities and survived, suffering spine and elbow injuries, the official Xinhua News Agency said Saturday.
The passer-by, 66-year-old Lai Jiansheng, had been fed up with what he called Chen's "selfish activity," Xinhua said. Traffic around the Haizhu bridge in the city of Guangzhou had been backed up for five hours and police had cordoned off the area.
"I pushed him off because jumpers like Chen are very selfish. Their action violates a lot of public interest," Lai was quoted as saying by Xinhua. "They do not really dare to kill themselves. Instead, they just want to raise the relevant government authorities' attention to their appeals."
Wednesday, May 20, 2009
Tuesday, May 19, 2009
Wednesday, March 26, 2008
Tuesday, October 16, 2007
10 reasons websites get hacked
Wait there is more! NSA is on your computer!
Sooner or later, a country that spies on its neighbors will turn on its own people, violating their privacy, stealing their liberties.
President Bush’s grab for unchecked eavesdropping powers is the culmination of what the National Security Agency(NSA) has spent forty years doing unto others.
And if you’re upset by the idea of NSA tapping your phone, be advised NSA likely can also read your Windows software to access your computer.
European investigative reporter Duncan Campbell claimed NSA had arranged with Microsoft to insert special “keys” in Windows software starting with versions from 95-OSR2 onwards.
And the intelligence arm of the French Defense Ministry also asserted NSA helped to install secret programs in Microsoft software. According to France's Strategic Affairs Delegation report, “it would seem that the creation of Microsoft was largely supported, not least financially, by NSA, and that IBM was made to accept the (Microsoft) MS-DOS operating system by the same administration.” That report was published in 1999.
The French reported a “strong suspicion of a lack of security fed by insistent rumours about the existence of spy programmes on Microsoft, and by the presence of NSA personnel in Bill Gates’ development teams.” It noted the Pentagon was Microsoft’s biggest global client.
And heck, who wouldn't belive the French?
More here.
Because George said NO!

According to documents released by lawmakers on Monday, major U.S. telephone carriers refused to answer questions from the Democratic-led Congress about their possible participation in President George W. Bush's warrantless domestic spying program...
More...
Saturday, October 13, 2007
Pre-9/11 wiretap bid is alleged
A former Qwest Communications International executive, appealing a conviction for insider trading, has alleged that the government withdrew a $200-million contract after Qwest refused to participate in an unidentified National Security Agency program that the company's top lawyer said was illegal.
Nacchio's account, which places the NSA proposal at a meeting on Feb. 27, 2001, suggests that the Bush administration was seeking to enlist telecommunications firms in programs without court oversight before the terrorist attacks. The Sept. 11 attacks have been cited by the government as the main impetus for its warrantless surveillance efforts.
More here.
Same church different pew...
http://www.wired.com/science/discoveries/news/2006/04/70619
Monday, October 01, 2007
Thursday, September 27, 2007
18th episode of The Silver Bullet Security Podcast

Sunday, September 23, 2007
Saturday, September 22, 2007
Wednesday, September 19, 2007
Today (9/19) is International Talk Like A Pirate Day

Put a parrot on your shoulder, strap on a peg leg, hit the rum and start bellowing "Shiver me Timbers" -- Wednesday is International Talk Like A Pirate Day.
"Pirates of the Caribbean" star Johnny Depp is not the only over-the-top buccaneer allowed to have fun.
September 19 is your once-a-year chance to don an eye patch, sport a ridiculously large hat and keep on saying "Arrrrr.
It all started back in the 1990s as a cult joke between two American friends -- John "Ol Chumbucket" Baur and Mark "Capn Slappy" Summers -- but really took off when syndicated columnist Dave Barry got to hear about their surreal festival.
Monday, September 17, 2007
Crime does pay!
The report said cyber crime had become increasingly professional and was now a multi-billion dollar industry.
The underground economy has its own auction sites and marketplaces that sell valuable data such as credit card numbers and bank accounts.
They also sell toolkits for novice cyber criminals who lack technical know-how to craft their own attacks.
BBC story.
Hackers hit US stockbroker TD Ameritrade
Stock broking firm TD Ameritrade has revealed a breach to one of its databases resulting in the theft of user data.
The company confirmed that, while online account numbers and passwords were not compromised, customer names, email addresses and phone numbers had all been stolen.
The database also contains Social Security numbers, although TD Ameritrade claimed that there is no evidence to suggest that the numbers were among the stolen data.
A spokesperson for the company told vnunet.com that the compromised database stored information on all of the company's 6.3 million customer accounts. It is not yet known how many customers were directly affected.
Story here.
Thursday, September 06, 2007
Osama bin Laden, drove a Canadian-flagged motorcade through two security checkpoints in Sydney
Members of an Australian comedy TV show, one dressed as Osama bin Laden, drove a Canadian-flagged motorcade through two security checkpoints in Sydney Thursday before being stopped near a hotel where U.S. President George W. Bush is staying.
The stunt-embarrassed Sydney police had imposed the tightest security measures in the city's history. The Australian city is hosting a summit of leaders from Pacific Rim countries, including Bush and Canadian Prime Minister Stephen Harper, who arrived Thursday.
Police arrested 11 cast and crew from the TV program, The Chaser's War on Everything, and impounded three vehicles, the Australian Broadcasting Corp., which airs the show, said on its website.
Full story here.Monday, September 03, 2007
The First Amendment, Satellite Imagery and National Security

Recently a photograph appeared on the Internet of the propeller on an Ohio-class ballistic missile submarine at Trident Submarine Base in Bangor. A key to the submarine's ability to deploy and remain undetected, propeller designs have been kept under wraps for years, literally. When out of the water, the propellers typically are draped with tarps.
The propeller image appeared on Microsoft's mapping tool, Virtual Earth. It was discovered accidentally by Dan Twohig, a deck officer with the Washington state ferry service who was using the program to examine real estate on the west side of Puget Sound.
More here.
ShmooCon '08
17th episode of The Silver Bullet Security Podcast
Thursday, August 30, 2007
How the FBI Wiretap Net Operates
The surveillance system, called DCSNet, for Digital Collection System Network, connects FBI wiretapping rooms to switches controlled by traditional land-line operators, internet-telephony providers and cellular companies. It is far more intricately woven into the nation's telecom infrastructure than observers suspected.
Wired story here.
EFF has the document here.
The Burning Man Project 07
(Black Rock City - August 28, 2007) The Man at the center of Black Rock City will be rebuilt after an overnight fire which damaged the effigy at the center of the Burning Man event. Rebuilding is expected to take about two days.
Black Rock City officials say there was structural damage to the figure of the Man, but relatively little damage to the art and exhibits at the base of the Man. No injuries were reported.
An arson investigation is underway, and one arrest was made shortly after the fire was set. No charges have been announced, and the name of the suspect is being withheld. There has been no discussion of motive in the episode.
Burning Man
Tuesday, August 28, 2007
Monday, August 20, 2007
Take the back roads when taking the back road...
"E-ZPass is an E-ZPass to go directly to divorce court, because it's an easy way to show you took the off-ramp to adultery," said Jacalyn Barnett, a New York divorce lawyer who has used E-ZPass records a few times.
More here.
Friday, August 17, 2007
Friday Fun - The Vomit-Inducing Flashlight

But a California company may be developing the real winner, an LED-based flashlight that shoots out incredibly bright pulses of light, and can potentially induce vomiting. The Department of Homeland Security is funding the study, and Penn State will begin testing it this fall at the Institute of Nonlethal Defense Technology.
Story from Popular Science Blog.
Tuesday, August 14, 2007
Footprinting/research tool
Sunday, August 12, 2007
William Gibson

More story here.
New book here.
Saturday, August 11, 2007
ATM Theft
Police have located the truck used in the crime, as well as the emptied ATM.
Wednesday, August 08, 2007
US Border Security
Bush interviewed as a Illegal Jumps the Border - video powered by Metacafe
Well, it is funny anyway...
Tuesday, August 07, 2007
A "Visit" to Diebold Elections Systems, Inc.
Monday, August 06, 2007
DEFCON 15 - 12year old Bumping Medeco's Biaxial
Wifi in the Wall

WEJ-11G-O Wall Box Wireless Access Point/Bridge
$129.95
The Karo Technology WEJ-11g Series are uniquely designed to fit into a standard wall box and bring the benefits of both wired and wireless connection. The WEJ-11g are full-featured Access Points that support IEEE 802.11b and 802.11g. The WEJ-11g can be installed and configured easily into any new wireless network or integrated within an existing wired network resulting in a more flexible and cost-effective wireless deployment. And, a network administrator can centrally manage the WEJ-11g Series via a Web browser or an SNMP MIB browser.
Features
- High speed 54 Mbps wireless and/or 100 Mbps wired data rate
- RF transmit power settings (5 levels)
- Auto-channel selection setting
- Security: WEP, WPA-PSK, 802.1x, EAP, TKIP, AES
- MAC address filtering
- Wireless client isolation
- AP load balancing
- Association control
- Hardware watchdog timer
- Extensive management tools via browser-based configuration utility
Sunday, August 05, 2007
Fudge Packer Arrested

Officers met with Greenbelt resident Catherine Anne Delgado, 35, and determined that her assault claim was unfounded. During the course of their conversation in the lobby, the officers noticed that Delgado, wearing slacks and a sleeveless white blouse, had large slabs of fudge bulging out of her pockets.
“Smudges of fudge showed up very well on her hands and white blouse,” Officer Hal Dalton said. “You don’t see something like that every day.”
More here.
Saturday, August 04, 2007
DEFCON 15 - Aug 3-5

A LOT OF MAKEUP can make you prettier, but it won't make you smarter. Michelle Madigan, Associate Producer for Dateline NBC found this out the hard way at Defcon.
According to sources at the show, she was there to do a piece called Hackers for Hire, with the goal of showing the criminal hacker underground and possibly outing an undercover fed. As Michelle was said to have said, "People in Kansas would be very interested in what is going on at Defcon". She was busted hours before she walked in the door, the first slide before the keynote was this, and the speaker asked to notify a goon (security) if she was spotted.
Full story here.
Tuesday, July 31, 2007
Secure your Future - Caffeine and Exercise Can Prevent Skin Cancer

According to the National Cancer Institute, sunlight-induced skin cancer is the most prevalent cancer in the United States with more than 1 million new cases each year. A research team at Rutgers, The State University of New Jersey, showed that a combination of exercise and some caffeine protected against the destructive effects of the sun’s ultraviolet-B (UVB) radiation, known to induce skin cancer. The caffeine and exercise seemingly conspire in killing off precancerous cells whose DNA has been damaged by UVB-rays.
Sunday, July 29, 2007
Google Fun - Phone # to map...
Friday, July 27, 2007
Friday Fun - Filled 1,000 gallon pool stolen

Someone stole 1,000 gallons of water from Daisy Valdivia's backyard. And they didn't spill a drop.
Valdivia woke Wednesday morning to find that her family's inflatable pool, hip high and 10 feet in diameter and filled with water, was stolen from her backyard in the middle of the night. There is no evidence that the water was poured out, pumped out, evaporated or drunk.
Or drunk?Full story here.
Tuesday, July 24, 2007
One Laptop Per Child machines for sale this Xmas?
The non-profit group that designs low-cost computers for poor children hopes to start selling multimedia laptops to consumers by Christmas, a foundation executive reported on Monday.
The One Laptop Per Child Foundation's rugged XO laptop could initially sell for just $350, or twice its production cost, although the group is also considering a $525 price tag, said OLPC chief technology officer Mary Lou Jepsen.
Exploiting the iPhone
Details here.
Sunday, July 22, 2007
The Silver Bullet Security Podcast - Show 016
Web Trend Map 2007 Version 2.0

Details and more here.
Saturday, July 21, 2007
Adult Film industry fights piracy
Incorporated in June 2007, Global Anti-Piracy Agency (GAPA) is an independent, non-profit trade organization with the singular mission of working on behalf of the adult entertainment industry to fight piracy of intellectual property.
Thursday, July 19, 2007
Security History for Sale on eBay - Enigma Machine

Bid here.
Wikipedia entry.
Monday, July 16, 2007
The Athens Affair
Story here.
Saturday, July 14, 2007
Deal of the Day - Dragon Fire 500,000 Volt Stun Gun
Surplus Computers has the Dragon Fire 500,000 Volt Stun Gun (500-K) for $33 with free shipping. It takes two 9V batteries (not included).
Buy here.
Friday, July 13, 2007
Friday Fun - Fake Officer Stops Real One

Robert Lane, 25, was arrested Tuesday on charges of criminal impersonation and aggravated unlicensed operation of a motor vehicle, Suffolk County police said.
More here.
Thursday, July 12, 2007
Feds use key logger to thwart PGP, Hushmail
cnet story here.
"I've Got Nothing to Hide" and Other Misunderstandings of Privacy
Tuesday, July 10, 2007
F-Secure On Cyber Crime
Monday, July 09, 2007
Financial Institutions - the right to conduct a forensic analysis?
"However, under New Zealand's new banking code of practice, which came into effect on Sunday, financial institutions will reserve the right to conduct a forensic analysis of fraud victims' computers. If the system lacks operating system updates and security software, they may deny reimbursement claims."
More here.
Bank branch bandit wears tree disguise
CNN video here.
Saturday, July 07, 2007
Nothing like another 12 or 16 nuclear ballistic missiles added to the planet.

The new class of nuclear sub, called the Jin-class, had been rumoured to exist for some time, but the image recently uploaded to Google Earth is the first public glimpse of the vessel.
More here.
Friday, July 06, 2007
Friday "Fun" - WabiSabiLabi
Now a Swiss security firm called WabiSabiLabi has opened a web marketplace for zero-day security vulnerabilities.
According to Herman Zampariolo, CEO of WSLabi, We decided to set up this portal for selling security research because although there are many researchers out there who discover vulnerabilities very few of them are able or willing to report it to the right people due to the fear of being exploited. Recently it was reported that although researchers had analyzed a little more than 7,000 publicly disclosed vulnerabilities last year, the number of new vulnerabilities found in code could be as high as 139,362 per year. Our intention is that the marketplace facility on WSLabi will enable security researchers to get a fair price for their findings and ensure that they will no longer be forced to give them away for free or sell them to cyber-criminals.
Researchers can submit their findings to the exchange once they have registered. WSLabi will then verify the research by analyzing and replicating it at their independent testing laboratories. They will eventually then package the findings with a Proof of Concept; this can then be sold to the marketplace via three methods from the marketplace platform:
- Starting an auction, predefined starting price
- Selling to as many buyers as possible at a fixed price
- Selling it exclusively to one buyer
Wednesday, July 04, 2007
July 4th
Reported U.S. Deaths Pending DoD Confirmation: 3
Total: 3586
Full list.
Sunday, July 01, 2007
Friday, June 29, 2007
Courthouse security camera reveals strange apparition
Full story here.
Tuesday, June 26, 2007
So... Is there such thing as a good virus?

Sophos is reporting a worm which spreads by copying itself onto removable drives such as USB flash drives, in an attempt to spread information about AIDS and HIV.
The W32/LiarVB-A worm hunts for removable drives such as floppy disks and USB memory sticks (as well as spreading via network shares), and then creates a hidden file called autorun.inf to ensure a copy of the worm is run the next time it is connected to a Windows PC. Once it has infected a system it drops an HTML file containing a message about AIDS and HIV to the user's drive.
Monday, June 25, 2007
11 Key - Lock Bumping Set
5 Pin Kwikset KW1, 6 Pin Kwikset KW10, 5 Pin Schlage SC1, 6 Pin Schlage SC4, 5 Pin Arrow AR1, 6 Pin Arrow AR4, 5 Pin Yale Y1, 5 Pin Dexter DE6, 5 Pin Weiser WR5, 4 Pin Master M1, 5 Pin Master M10
Minimal disclosure certificates: the case of SSO
Sunday, June 24, 2007
The Hacker Crackdown, Podcast, Part 001

Bruce Sterling's classic work highlights the 1990 assault on hackers, when law-enforcement officials successfully arrested scores of suspected illicit hackers and other computer-based law-breakers. These raids became symbolic of the debate between fighting serious computer crime and protecting civil liberties. However, The Hacker Crackdown is about far more than a series of police sting operations. It's a lively tour of three cyberspace subcultures--the hacker underworld, the realm of the cybercops, and the idealistic culture of the cybercivil libertarians.
Saturday, June 23, 2007
Inside The Mind Of A Suicide Bomber

Suicide bombers are not mentally ill or unhinged, but acting rationally in pursuit of the 'benefits' they perceive from being part of a strict and close-knit religious enterprise, according to a University of Nottingham academic.
Research by Dr David Stevens, of the School of Politics and International Relations, suggests that the widely-held view of suicide bombers as brain-washed religious fanatics, vulnerable through youth and poverty, is not an accurate one.
Full story.
Friday, June 22, 2007
Man bursts into flames after being shot by a taser gun
Story here.
Wednesday, June 20, 2007
“Hacking the Homeland: Investigating Cybersecurity Vulnerabilities at the Department of Homeland Security”

Harsh words from the Committee's chair Bennie Thompson -
How can the Department of Homeland Security be a real advocate for sound cybersecurity practices without following some of its own advice? How can we expect improvements in private infrastructure cyberdefense when DHS bureaucrats aren’t fixing their own configurations? How can we ask others to invest in upgraded security technologies when the Chief Information Officer grows the Department’s IT security budget at a snail’s pace? How can we ask the private sector to better train employees and implement more consistent access controls when DHS allows employees to send classified emails over unclassified networks and contractors to attach unapproved laptops to the network?
The Silver Bullet Security Podcast
An Easier Way Of Finding WiFi?
The WeFi client replaces the Windows connection manager and finds and connects to free WiFi hotspots. The location of free hotspots is displayed on a map that also shows the location of other WeFi users. The maps are regularly updated as users discover and connect to WiFi. This is delivered without changing or modifying access points, delivering a complementary service to other WiFi sharing initiatives such as fon.
Tuesday, June 19, 2007
Computer Security Contract Awarded
The Office of Management and Budget, U.S. Department of Defense and U.S. General Services Administration awarded 12 contracts today for blanket purchase agreements (BPA) to protect sensitive, unclassified data residing on government laptops, other mobile computing devices and removable storage media devices. The BPA’s could result in contract values exceeding $79 million.More here.
Awardees are MTM Technologies Inc.; Rocky Mountain Ram LLC; Carahsoft Technology Corp.; Spectrum Systems Inc.; SafeNet Inc.; Hi Tech Services Inc.; immixGroup Inc.; Autonomic Resources LLC; GTSI Corp.; GovBuys Inc.; Intelligent Decisions Inc. and Merlin International.
Products are Mobile Armor LLC’s “Data Armor”; Safeboot NV’s “Safeboot Device Encryption”; Information Security Corp.’s “Secret Agent”; SafeNet Inc.’s “SafeNet ProtectDrive”; Encryption Solutions Inc.’s “Skylock At-Rest”; Pointsec Mobile Technologies’ “Pointsec”; SPYRUS Inc.’s “Talisman/DS Data Security Suite”; WinMagic Inc.’s “SecureDoc”; CREDANT Technologies Inc.’s “CREDANTMobile Guardian” and GuardianEdge Technologies’ “GuardianEdge.”
Monday, June 18, 2007
Ohio man under house arrest since 2003
Jesse Tuttle, 27, was charged in 2003 with hacking into the county's computer system and storing child pornography on his home computer. Tuttle said the charges stem from computer work he was doing as an FBI informant.
Here is the fun part...
More here.In the last four years, Tuttle has become engaged, had a daughter with his fiance and gained 50 pounds. Hours of playing video games and watching television each day in his home near this Cincinnati suburb isn't particularly healthy, he said.
"I never really got into video games before," he said. "What else do you have to do?"
Saturday, June 16, 2007
Thursday, June 14, 2007
Tuesday, June 12, 2007
Flash Back - Cliff Stoll
His 1995 follow-up book Silicon snake oil: Second thoughts on the information highway was a much more skeptical look at technology and one that was critically reviewed by many. However, I found many of his views to be very poignant and as worthwhile noting today as they were a decade ago...
"When I'm online, I'm alone in a room, tapping on a keyboard, staring at a cathode-ray tube. I'm ignoring anyone else in the room. The nature of being online is that I can't be with someone else. Rather than bringing me closer to others, the time that I spend online isolates me from the most important people in my life, my family, my friends, my neighborhood, my community."He currently sells Klein bottles on the Web, is a "mostly" stay-at-home dad and teaches eighth graders about physics at Tehiyah Day School, in El Cerrito, California.
"A box of crayons and a big sheet of paper provides a more expressive medium for kids than computerized paint programs."
"Why is it drug addicts and computer afficionados are both called users?"
- Clifford Stoll, Silicon Snake Oil, 1995
Drive-by Video Peeping

In the incident that occurred a couple of months ago, a video image of a woman providing a urine sample at a washroom in a methadone clinic in Sudbury, Ont. was accidentally intercepted by a backup camera in a vehicle that was driving by the clinic.
TrueCrypt - Free Open-Source Disk Encryption Software
How to secure your USB thumbdrive - A TrueCrypt tutorial
Saturday, June 09, 2007
PowerPoint Reveals Key to Classified National Intel Budget
Full story on Dr. Hillhouse's blog.
Secure Earth - Alien 'visitor' shot at Area 51

The OSI agent walked up to the gate to check on the guard. As the OSI agent got closer to the front door of the gate, the OSI agent noticed the interior of the gate was blood splattered. The OSI agent noticed only small pieces of human body parts were left of a human being.
The OSI agent returned to the jeep and contacted the Central Security Control (main/primary security office for the complex) and reported the findings. The Director of Security contacted his office by way of a radio phone, mounted inside the jeep. The OSI agent, armed with only an automatic pistol, walked around the area searching for a perpetrator.
The OSI agent located the "Visitor," lying down near an underground water culvert. The OSI agent challenged the Visitor, ordering the Visitor to give up. The Visitor walked away, followed by the OSI agent. At some point, the OSI agent fired his weapon at the Visitor, as a warning. The Visitor, turned and pointed something at the OSI.
The OSI agent fired directly at the Visitor, hitting the Visitor directly in the chest with two rounds from the 45 caliber automatic pistol. The Visitor fell to the ground. It took about 18 minutes for additional security forces to arrive. The Visitor was placed inside a containment chamber and transported back to the S-2 facility. The Visitor recovered from the wounds."
More
Friday, June 08, 2007
Friday Fun - Stolen keys delay start of military mission

Poland's 1,200 troops assigned to NATO forces in Afghanistan will not achieve full combat readiness for up to several weeks due to stolen vehicle keys, the defense ministry said Thursday.Full story here."We had been told a 10 percent theft rate was likely in convoys brought in from Pakistan, but we had not expected the spare car keys to go missing," defense ministry spokesman Jaroslaw Rybak told news channel TVN24.
"We shall have to send away for spares, so it may take from several days to several weeks for our contingent to become combat ready."
Thursday, June 07, 2007
Teacher Gets New Trial on Classroom Porn
Julie Amero, left, leaves the New London, Conn., courthouse with her husband, Wes Volle, Wednesday, June 6, 2007. A judge granted a new trial Wednesday for Julie Amero, a former Norwich substitute teacher convicted of allowing students to view pornography on a classroom computer. Amero, 40, of Windham, who had no previous criminal record, faced up to 40 years in prison after she was convicted in January of exposing students to pornography on her classroom computer.
Full story.
Tuesday, June 05, 2007
Sunday, June 03, 2007
Credit Union Don'ts
Each member's account number and SSN.
Text from Letter of apology:
Important Security Message to Members
During the last week, we mailed our election ballots to members. Unfortunately, an error occurred during the distribution of this ballot, and personal information was inadvertently included above your address on the envelope. This information was not printed in a format that would be immediately recognizable, and we have no indication your personal information has been accessed or misused in any way.
We apologize for this distribution error, and deeply regret any inconvenience or concern it may cause you. Your privacy and security are our top priority, and we have taken precautionary measures to help ensure your protection.
New protocols are in place to thoroughly validate your identity before any account transaction can be made. New member authentication procedures will further ensure you are the only person who can open new accounts, apply for a loan or do business with our credit union.
We will provide, at no cost to you, a one-year membership in a credit monitoring service. Equifax will monitor your credit daily and immediately alert you if there is any unusual activity. You will soon receive a separate letter about Equifax explaining exactly how you can enroll and how the program works. If you have any questions, please call us at 626/441-1999 or 323/682-1999.
Additional operational and security enhancements will ensure this situation cannot happen again. We are committed to protecting your personal information, and will closely monitor your account for the next year. We are also happy to change your member number, upon your request.
We will take whatever steps are necessary to protect you and your confidential information, and your accounts remain safe and sound with your credit union. Please don’t hesitate to call us at 626/441-1999 or 323/682-1999 or visit your local branch if you have any questions or concerns about this issue.
In addition to the steps we are taking to protect you and your accounts, here are other security precautions you can take:
* Carefully review your accounts when you receive your statement for at least the next 12 – 24 months. You can also review your accounts online at www.priorityonecu.org. This is a good financial management practice, and an important part of keeping your financial information accurate and secure.
* Place a Security Alert on your credit bureau file. Security alerts provide added protection because they recommend creditors contact you before opening new accounts. To place a Security Alert or to obtain a copy of your credit report, please contact:
o Experian: 1-888-397-3742 www.experian.com,
o Equifax: 1-800-525-6285 www.equifax.com
o Transunion: 1-800-680-7289 www.transunion.com
* Contact the following resources for additional information and guidance relating to privacy and identity theft:
o Federal Trade Commission (FTC): 1-877-IDTHEFT www.consumer.govidtheft
o Social Security Administration’s Fraud Hotline: 1-800-269-0271
* Call us right away if you have any questions or concerns, or suspect any unusual activity, at 626/441-1999 or 323/682-1999.
We appreciate your continued support of Priority One Credit Union, and want you to know that “you are our first priority.”
Charles R. Wiggington, Sr. CEO/President
Friday, June 01, 2007
Michigan Man Fined for Using Coffee Shop's Wi-Fi Network
A Michigan man has been fined $400 and given 40 hours of community service for accessing an open wireless Internet connection outside a coffee shop.Full story.
Under a little known state law against computer hackers, Sam Peterson II, of Cedar Springs, Mich., faced a felony charge after cops found him on March 27 sitting in front of the Re-Union Street Café in Sparta, Mich., surfing the Web from his brand-new laptop."It wasn't anything we were looking for, and it wasn't anything that we frankly particularly wanted to get involved in, but it basically fell in our lap and it was a little hard to just look the other way when somebody handed it to us," said Lynn Hopkins, assistant prosecuting attorney for Kent County.
Under the statute, individuals who log on to a Wi-Fi network with the owner's permission, or who see a pop-up screen that says it's a public network, can assume they're authorized to use the network, Hopkins said.
If they don't, they could be subject to prosecution.
Peterson was given two choices: He could try to fight the felony charge and face a sentence of up to 5 years in jail or a $10,000 fine; or he could enroll in the diversion program, which would require paying a $400 fine, doing 40 hours of community service and staying on probation for six months.
Last week, Peterson chose to pay the fine instead as part of a jail-diversion program.

Per Yoggie the Pico has:
Complete protection against
- Viruses
- Worms
- Identity theft
- Data theft
- Phishing
- Spyware
- Spam
- IP Spoofing
- Denial of Service attacks
All-in-one Security
- Anti Virus
- Anti Spam
- Anti Phishing
- Intrusion Detection
- Intrusion Prevention
- Firewall (Stateful Inspection)
- Web Filtering
- Parental Content Control
- Adaptive Security Policy™
- Multi-Layer Security Agent™
- Layer-8 Security Engine