| |
"To laugh often and much; to win the respect of intelligent people and the affection of children; to earn the appreciation of honest critics and endure the betrayal of false friends; to appreciate beauty; to find the best in others; to leave the world a bit better, whether by a healthy child, a garden patch or a redeemed social condition; to know even one life has breathed easier because you have lived. This is to have succeeded."
- Ralph Waldo Emerson |
|
Wired News: AT&T Whistle-Blower's Evidence |
|
|
Topic: Civil Liberties |
11:14 pm EDT, May 17, 2006 |
Tommorow is the big day for the EFF's AT&T NSA spying case. There is a public hearing in the morning to determine whether or not the Federal Government will be able to assert the State Secret's Privilege to squash the case. Wired has tons of coverage, including information from the EFF's exhibits, which I'm linking here. The normal work force of unionized technicians in the office are forbidden to enter the "secret room," which has a special combination lock on the main door. The telltale sign of an illicit government spy operation is the fact that only people with security clearance from the National Security Agency can enter this room. The above-referenced document includes a diagram (PDF 3) showing the splitting of the light signal, a portion of which is diverted to "SG3 Secure Room," i.e., the so-called "Study Group" spy room. Since the San Francisco "secret room" is numbered 3, the implication is that there are at least several more in other cities (Seattle, San Jose, Los Angeles and San Diego are some of the rumored locations), which likely are spread across the United States.
Now, the description offered here would be valid for a CALEA compliance room. The existance of these things doesn't demonstrate what is being surveilled or why or with what authority. But the technical information is likely of interest to the geeks on this site, including the tool used for collecting data (which is a common CALEA compliance tool). There is also a picture of the room. The State Secrets Option, BTW, is the nuclear option in law. If this case proceeds it will be a watershed event, particularly given that this option was accepted in the rendition case of Maher Arar. Getting tortured by a foreign government is a bit more serious then getting your phone tapped. Of course, consideration of this matter leads one rapidly to worry that that if the intelligence or security establishment commits a crime, and you are the victim of that crime, you have no recourse. This tends to incidate that the realm of intelligence and national security is an autonomous zone, where the only real law is "trust us." Wired News: AT&T Whistle-Blower's Evidence |
|
Next step in pirating: Faking a company |
|
|
Topic: Intellectual Property |
9:03 pm EDT, Apr 30, 2006 |
Reports filtering back to the Tokyo headquarters of the Japanese electronics giant NEC in mid-2004 alerted managers that pirated keyboards and recordable CD and DVD discs bearing the company's brand were on sale in retail outlets in Beijing and Hong Kong. After two years and thousands of hours of investigation in conjunction with law enforcement agencies in China, Taiwan and Japan, the company said it had uncovered something far more ambitious than clandestine workshops turning out inferior copies of NEC products. The pirates were faking the entire company. In the name of NEC, the pirates copied NEC products, and went as far as developing their own range of consumer electronic products - everything from home entertainment centers to MP3 players. They also coordinated manufacturing and distribution, collecting all the proceeds. "On the surface, it looked like a series of intellectual property infringements, but in reality a highly organized group has attempted to hijack the entire brand," he said. "It is not a simple case of a factory knocking off a branded product. Many of them have been given bogus paperwork that they say gives them the right to do it."
Next step in pirating: Faking a company |
|
CNN.com - DHS spokesman arrested in child sex sting - Apr 4, 2006 |
|
|
Topic: Current Events |
12:10 am EDT, Apr 6, 2006 |
Brian J. Doyle, 55, is charged with seven counts of use of a computer to seduce a child and 16 counts of transmission of harmful material to a minor, according to a sheriff's office statement. On March 12, according to a police statement, Doyle contacted a Polk County computer crimes detective posing online as a 14-year-old girl "and initiated a sexually explicit conversation with her ... Doyle knew that the 'girl' was 14 years old, and he told her who he was and that he worked for the U.S. Department of Homeland Security. "Judd said that Doyle, in the first conversation, told the detective his position with DHS and "started immediately into pretty vulgar language. He explained in graphic detail the sexual acts he wanted to perform with this 14-year-old." As the two continued chatting online, police said, Doyle gave her his home and office phone numbers, and the number to his government-issue cell phone. He also had explicit telephone conversations with a detective posing as the girl, authorities said. In addition, he used the Internet to send "hard-core pornographic movie clips" to her, and also used an America Online instant-messaging service to have explicit online conversations with her. Doyle also sent photos of himself that were not sexually explicit, but said he would send nude photos if the "girl" would buy a Web camera and send him nude photos of herself. In one photo, Judd said, Doyle's DHS security tag is clearly visible. "I read the transcripts," Judd said. "I wanted to see if this was just as outrageous as the detectives depicted it ... It shocked all of us who have worked vice, narcotics, organized crime, homicides."
This is sure to be all over the news today... While not directly related to this, I've asked this question around lately: "what the hell is DHS doing?" Answers have varied. No one seems to know exactly. Mostly stuff about establishing little fiefdoms and sharing email servers. My favorite comment so far has been "creating new ways to fuck up." Their press center is simply the "Remarks from Michael Chertoff" page. DHS appears to be a black hole. CNN.com - DHS spokesman arrested in child sex sting - Apr 4, 2006 |
|
MemeStreams/Memetics IRC Channel (again) - #memetics |
|
|
Topic: Miscellaneous |
1:59 am EST, Mar 7, 2006 |
At several points in the past, we have attempted to get people to colonize a MemeStreams IRC channel. Each time, its had about the same result. Five or six people pop in the first day.. The times when people are chatting don't line up, and people stop coming. Then I see a trail of people entering and exiting for 15 minutes at a time for the next several days.. Lets try this again... This time, stay in the damn channel. Idle there. Attract some more people. It takes awhile for any given channel to grab traction. The topic isn't limited to MemeStreams, but should have something to do with media, idea transfer, Internet issues, communication theory, or current events. irc://irc.freenode.net:#memetics Freenode is a great network. Its stable, there are numerous servers, and the channel/nick services work well so there is no need to have bots to administrate the channels. For those that don't use IRC, its a very old chat protocol. There are numerous networks and a plethora of clients you can use to connect to it. Asking which client is the best to use is like asking for a major debate. I prefer XChat myself. The main site has the Windows and Linux clients. There is an OSX specific port as well. MemeStreams/Memetics IRC Channel (again) - #memetics |
|
What's wrong with the economy? |
|
|
Topic: Business |
9:09 pm EST, Feb 9, 2006 |
1) Profits are up, but the wages and the incomes of average Americans are down. 2) More and more people are deeper and deeper in debt. 3) Job creation has not kept up with population growth, and the employment rate has fallen sharply. 4) Poverty is on the rise. 5) Rising health care costs are eroding families' already declining income.
Short and to the point. via the Economic Policy Institute. What's wrong with the economy? |
|
Mark's Sysinternals Blog: Sony, Rootkits and Digital Rights Management Gone Too Far |
|
|
Topic: Computer Security |
3:11 pm EST, Nov 2, 2005 |
The entire experience was frustrating and irritating. Not only had Sony put software on my system that uses techniques commonly used by malware to mask its presence, the software is poorly written and provides no means for uninstall. Worse, most users that stumble across the cloaked files with a RKR scan will cripple their computer if they attempt the obvious step of deleting the cloaked files. While I believe in the media industry’s right to use copy protection mechanisms to prevent illegal copying, I don’t think that we’ve found the right balance of fair use and copy protection, yet. This is a clear case of Sony taking DRM too far.
Sony has gone very far over the line here. I will happily join in the chorus of people screaming lawsuit. Letting this one go would establish the premise that it's acceptable for the media industry to violate your property in order to protect theirs. That approach can only lead to worse problems. Mark's Sysinternals Blog: Sony, Rootkits and Digital Rights Management Gone Too Far |
|
John's War with Melanoma is over |
|
|
Topic: Health and Wellness |
7:01 am EDT, Sep 21, 2005 |
Sad news, Overcode passed away on Saturday, September 17th. More information and a guestbook is on his home page http://overcode.yak.net
Valhalla welcomes its latest hacker. John, may you Rest in Peace. John's War with Melanoma is over |
|
Redmond, Thanks for Nothing... |
|
|
Topic: Computer Security |
12:37 am EDT, Aug 12, 2005 |
I have reason to believe that at least one person already has this exploit, and it isn't just Mike Lynn. :) Anyway, I have about as much faith in this guy's opinion as I do that this chick's boobs are real. Redmond, Thanks for Nothing... |
|
Jennifer Granick | The Shout | Reverse Engineering Lawyer Code |
|
|
Topic: Computer Security |
11:47 am EDT, Aug 7, 2005 |
The next installment of Jennifer's story about representing Mike is up. This post has one key piece of information that explains definitively why Jennifer kicks so much ass. She is a Jersey Girl! I also find it somewhat intriguing that both her cat and dog look very serious. Update: The last installment is up now as well. Wired has picked up the story from Jennifer's blog and is running it. Jennifer Granick | The Shout | Reverse Engineering Lawyer Code |
|
Router Flaw Is a Ticking Bomb | Mike Lynn Has Integrity^3 |
|
|
Topic: Computer Security |
12:39 pm EDT, Aug 3, 2005 |
Wired has done a great interview with Mike. It should clear up a number of the questions people have had with recent events.I would like to specifically point out one part of this interview: WN: So ISS knew the seriousness of the bug. Lynn: Yes, they did. In fact, at one point ... they apparently didn't get it, and they actually wanted to distribute the full working exploit very widely inside the company.... I was told ... "Give this to all the sales engineers and to all the pen testers." WN: Why would they want you to do that? Lynn: Well, because it bruises Cisco, remember? Mind you, this was something that Cisco hadn’t gone public with yet and that's not useful to pen testers because what do they advise their customers to do (to protect themselves if no information about the vulnerability has been released yet)? I told them, "You do realize if you do that, it's going to leak?" And (one of the ISS guys) says, "That's Cisco's problem." And then (another ISS guy) turns to me and says that they need to understand this could be their Witty worm. I was like, Whoa, what meeting did I walk into? (The Witty worm was a particularly aggressive and destructive code released by someone last year that targeted computer systems running a security program made by Internet Security Systems and even more specifically targeted military bases using the software. It infected more than 12,000 servers and computer systems in about an hour. Because of the worm's speed in spreading and its creators' apparent knowledge of who ISS' customers were, some security experts speculated that someone working for or connected to ISS might have been responsible for writing and releasing it.) At that point, I told them all no, and they fought it and I resigned right there on the spot. And this was about a month ago. I thought they were handling this in a non-ethical manner. Because it was just way too fast and loose with who can see this.... I mean, I don't even want people to see it now. (ISS talked him out of the resignation by agreeing to give him control over who could see or have the exploit.)
All I can say is WOW. A big "wow". Caps, bold, and feeling. Anyone who says that Mike is not on the level needs to reference this. This says truly horrible things about ISS. This should cost them some serious reputation capitol. One thing that Mike did a great job of in this interview is getting the idea out that in order to defeat the "bad guys", you must run faster then them. It is the only option. Case in point, via the Wall Street Journal: "The vulnerabilities are out there on the Net in full broadcast mode," said Gilman Louie, a tech-industry veteran who heads In-Q-Tel, a venture-capital firm backed by the Central Intelligence Agency. "The bad guys get to it faster than everybody else. I'd rather have disclosure and let everybody respond."
Disclosure is a great thing, but it must be done properly. I would argue that Mike did it properly. I would argue that he has displayed the best kind of ethics through this entire mess. Given the content of this Wired interview, I would argue that ISS has its head up its ass. Router Flaw Is a Ticking Bomb | Mike Lynn Has Integrity^3 |
|