<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-33391765</atom:id><lastBuildDate>Mon, 07 Oct 2024 05:24:08 +0000</lastBuildDate><category>Information Security</category><category>FISMA</category><category>corporate america</category><category>idiocracy</category><category>sycological warfare</category><category>Apple</category><category>Architecture</category><category>CSIRC</category><category>Confession</category><category>Cyber</category><category>Cyber Law</category><category>Energy</category><category>Ethics</category><category>FOX news</category><category>Government Contractor</category><category>Ipod</category><category>Law</category><category>NOC</category><category>OS X</category><category>Oil</category><category>SAIC</category><category>SOC</category><category>Standards</category><category>Three Laws</category><category>Transparent</category><category>WONK</category><category>Warming</category><category>agenda</category><category>anti-virus</category><category>bush</category><category>control</category><category>death</category><category>explosives</category><category>hacking</category><category>iPhone</category><category>least privilage</category><category>malware</category><category>privacy</category><category>segragation</category><category>seperation</category><category>stupid people</category><category>terrorism</category><category>underdog.</category><category>war</category><title>The Dark @rts</title><description>Demystifying Information Security for the Masses</description><link>http://thedarkarts1297.blogspot.com/</link><managingEditor>noreply@blogger.com (Unknown)</managingEditor><generator>Blogger</generator><openSearch:totalResults>48</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-33391765.post-8444945795226466103</guid><pubDate>Fri, 07 Oct 2011 20:53:00 +0000</pubDate><atom:updated>2011-10-07T13:53:18.539-07:00</atom:updated><title>Attonment</title><description>For me this is the time of the year that I go into reflection mode. This is the time of year that Jews ask tough question about how they are doing in there relationship to g-d.  But there is a lesson for all here in regards to information security.  We are constantly evolving and changing so a process of continuous monitoring isn&#39;t much different to the process of identifying faults in ones self and atoning.  &lt;br /&gt;
&lt;br /&gt;
Most organizations are reasonable good at identify cyber incidents but few if any atone for there mistakes to keep them from happening again.  Atonement rally is a process of not allowing past transgressions to happen again.  &lt;br /&gt;
&lt;br /&gt;
With that said what can you do as a user to make the next 12 months better for your company or organization?  To not repeat the information security sins of the past and keep the barbarians at the gate. &lt;br /&gt;
&lt;br /&gt;
</description><link>http://thedarkarts1297.blogspot.com/2011/10/attonment.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-33391765.post-1326276326362713265</guid><pubDate>Thu, 06 Oct 2011 03:26:00 +0000</pubDate><atom:updated>2011-10-05T20:26:13.755-07:00</atom:updated><title>Thank you Steve...</title><description> Matt Galligan wrote: “R.I.P. Steve Jobs. You touched an ugly world of technology and made it beautiful.”. This is one of the most true quotes I&#39;ve seen today about Steve Jobs.  Before Steve all computers were these ugly boxes you did work at. Then the iMac came and the entire industry began a 20 year shift to what we have today.  Steve Jobs made computing a personal experience and believed in the power that people can have when they have freedom to access information anywhere at any time.  I think he leaves the world a better place and hope the team at Apple is up to the challenge of honoring his legacy by pushing computing beyond our wildest imaginations.  </description><link>http://thedarkarts1297.blogspot.com/2011/10/thank-you-steve.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-33391765.post-728602809347241599</guid><pubDate>Sat, 01 Oct 2011 05:23:00 +0000</pubDate><atom:updated>2011-09-30T22:23:05.149-07:00</atom:updated><title>Happy New Year!</title><description>Well it&#39;s a new year and time for resolutions.  What cyber security resolutions will you make?  Better trained employees, more automation,  or just getting security program up and running?  </description><link>http://thedarkarts1297.blogspot.com/2011/09/happy-new-year.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-33391765.post-5970917146620664101</guid><pubDate>Sat, 08 Aug 2009 04:13:00 +0000</pubDate><atom:updated>2009-08-07T21:21:52.803-07:00</atom:updated><title>Life on the Dark Side</title><description>&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi2CNRBGMFJTbKoYpdFUnl8aPzh6GZIRytuwC8L7retRdotnKF9oysxqFb-prAMF6QEs5_-tgrEK1WbGqdH0gEKU5ieGRxOjtWoRy1kq0A-5vPSkQARS148t9dnL8fgJxsvwVhp/s1600-h/darth-vader1.jpg&quot; style=&quot;text-decoration: none;&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 251px; height: 320px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi2CNRBGMFJTbKoYpdFUnl8aPzh6GZIRytuwC8L7retRdotnKF9oysxqFb-prAMF6QEs5_-tgrEK1WbGqdH0gEKU5ieGRxOjtWoRy1kq0A-5vPSkQARS148t9dnL8fgJxsvwVhp/s320/darth-vader1.jpg&quot; border=&quot;0&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5367441414817093330&quot; /&gt;&lt;/a&gt;&lt;div&gt;As some of you may know back in March I took a position working as a Federal Civil Service employee.  In the past I have railed against what I&#39;ve called the dark side.  Now I find myself being the dark side.  One of the most profound things I&#39;ve learned is that one should never criticize anything that one has not experienced.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Being a federal contractor and being a Government Full Time Employee (GFTE) are two completely different experiences.  So life on the dark side of the force is pretty awesome.  But then again maybe I&#39;m just drunk with power?!?!?!  &lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;</description><link>http://thedarkarts1297.blogspot.com/2009/08/life-on-dark-side.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi2CNRBGMFJTbKoYpdFUnl8aPzh6GZIRytuwC8L7retRdotnKF9oysxqFb-prAMF6QEs5_-tgrEK1WbGqdH0gEKU5ieGRxOjtWoRy1kq0A-5vPSkQARS148t9dnL8fgJxsvwVhp/s72-c/darth-vader1.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-33391765.post-4308874231475816939</guid><pubDate>Wed, 31 Dec 2008 07:36:00 +0000</pubDate><atom:updated>2008-12-30T23:37:28.431-08:00</atom:updated><title>Animatrix meet Iran. Iran meet Animatrix</title><description>Holy Sh#t this is good stuff! All too often we submit to being sheep and believing what ever the media or authority figures tell us to believe without question. It&#39;s easy to demonize people you&#39;ve never met or talked too. All I ask is get both sides of a issue before forming an opinion.&lt;br /&gt;&lt;br /&gt;&lt;object width=&quot;400&quot; height=&quot;225&quot;&gt;&lt;param name=&quot;allowfullscreen&quot; value=&quot;true&quot; /&gt;&lt;param name=&quot;allowscriptaccess&quot; value=&quot;always&quot; /&gt;&lt;param name=&quot;movie&quot; value=&quot;http://vimeo.com/moogaloop.swf?clip_id=2232226&amp;amp;server=vimeo.com&amp;amp;show_title=1&amp;amp;show_byline=1&amp;amp;show_portrait=0&amp;amp;color=&amp;amp;fullscreen=1&quot; /&gt;&lt;embed src=&quot;http://vimeo.com/moogaloop.swf?clip_id=2232226&amp;amp;server=vimeo.com&amp;amp;show_title=1&amp;amp;show_byline=1&amp;amp;show_portrait=0&amp;amp;color=&amp;amp;fullscreen=1&quot; type=&quot;application/x-shockwave-flash&quot; allowfullscreen=&quot;true&quot; allowscriptaccess=&quot;always&quot; width=&quot;400&quot; height=&quot;225&quot;&gt;&lt;/embed&gt;&lt;/object&gt;&lt;br /&gt;&lt;a href=&quot;http://vimeo.com/2232226&quot;&gt;Iran: A nation of bloggers&lt;/a&gt; from &lt;a href=&quot;http://vimeo.com/user580903&quot;&gt;Mr.Aaron&lt;/a&gt; on &lt;a href=&quot;http://vimeo.com&quot;&gt;Vimeo&lt;/a&gt;.</description><link>http://thedarkarts1297.blogspot.com/2008/12/animatrix-meet-iran-iran-meet-animatrix.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-33391765.post-6832095431368845274</guid><pubDate>Wed, 10 Dec 2008 07:56:00 +0000</pubDate><atom:updated>2008-12-09T23:57:55.867-08:00</atom:updated><title>Tis the Season to get Jacked!</title><description>It’s the season to be jolly and grateful but also, sadly, the time to get ripped off (if you’re not careful).&lt;br /&gt;&lt;br /&gt;US CERT reported the following on Monday: &lt;br /&gt;&lt;br /&gt;Malware Spreading via Social Networking Sites&lt;br /&gt;added December 8, 2008 at 02:48 pm&lt;br /&gt;&lt;br /&gt;US-CERT is aware of public reports of malware spreading via popular social networking sites. The reports indicate that this malware is spreading through spam email messages appearing to come from Myspace.com, Facebook.com, and Classmates.com. The email contains a message indicating that there is a YouTube video available and instructs the user to follow the link to view the video. If users click on this link, they will be prompted to update Adobe Flash Player. This update is not a legitimate Adobe Flash Player update--it is malicious code.&lt;br /&gt;&lt;br /&gt;US-CERT encourages users and administrators to do the following to help mitigate the risks:&lt;br /&gt;&lt;br /&gt;    * Install antivirus software and keep the virus signatures up to date.&lt;br /&gt;    * Do not follow unsolicited links.&lt;br /&gt;    * Use caution when downloading and installing applications.&lt;br /&gt;    * Obtain software applications and updates directly from the vendor&#39;s website.&lt;br /&gt;    * Configure your web browser as described in the Securing Your Web Browser document.&lt;br /&gt;    * Refer to the Recognizing and Avoiding Email Scams (pdf) document for more information on avoiding email scams.&lt;br /&gt;    * Refer to the Avoiding Social Engineering and Phishing Attacks document for more information on social engineering         attacks.&lt;br /&gt;&lt;br /&gt;The majority of the time the goal of the attacker is to get your credit card number or personal identifiable information.  With more and more folks finding at the end of the day a pink slip waiting cyber crime (as with all forms of crime) is on the rise so in the immortal words of Hill Street Blues “Let’s be careful out there”.  If you plan to do most of your holiday shopping online this season I recommend using PayPals’ security key so your credit card information isn’t sent over the net.  (https://www.paypal.com/securitykey)&lt;br /&gt;&lt;br /&gt;Most, if not all, users have Adobe flash installed on their desktops and/or laptops so I thought I’d pass this along to the community as a friendly reminder to always “trust but verify.”</description><link>http://thedarkarts1297.blogspot.com/2008/12/tis-season-to-get-jacked.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-33391765.post-2406265938483468589</guid><pubDate>Sun, 23 Nov 2008 21:01:00 +0000</pubDate><atom:updated>2008-11-23T13:03:58.889-08:00</atom:updated><title>Oh what the he77...</title><description>I feel like I posted this before but what the heck... Nobody reads this anyways!! Ha Ha Ha! &lt;br /&gt;&lt;br /&gt;In WWII carpet bombing laid waist to most of Europe leaving little to nothing behind.  In contrast today a FAC can sight an insurgent truck with GPS positioning binoculars to call in an orbiting B-52 to prosecute the target.  The correlation between the history of modern warfare and the development and maturization of malicious code could be viewed as striking.&lt;br /&gt;&lt;br /&gt;A concern seen expressed on INFOSEC blogs is that threats to a theoretical or “typical” enterprise could operate with impunity due to the security controls in place not having the ability to adapt and respond to new and emerging threats.  I think the Federal IT space is at a point now that from a modern warfare perspective could be equated to the time before the GiG came into being an integral part of the warfighters toolset.  I see great possibilities to transform federal information security through cost effective risk management.</description><link>http://thedarkarts1297.blogspot.com/2008/11/oh-what-he77.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-33391765.post-3614430996680876436</guid><pubDate>Sun, 23 Nov 2008 19:32:00 +0000</pubDate><atom:updated>2008-11-23T11:33:44.026-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Information Security</category><title>Bad Blogger</title><description>Okay I&#39;m just going to admit it and stop being in denial: I&#39;m a bad blogger!  There I feel better now.  With that said I offer the following jem.  &lt;br /&gt;&lt;br /&gt;How Security Became an Issue&lt;br /&gt;&lt;br /&gt;It is interesting to pick up various computer books and see that there is usually a history section that sets the stage for where society is today pertaining to computing and data processing. Unlike histories that tell of times long past, the history of computing typically begins in the 1960s. A lot has happened in a short period of time, and computer security is just starting to reach its time in the limelight.&lt;br /&gt;&lt;br /&gt;Roughly twenty-five years ago, the only computers were mainframes. They were few and far between and used for specialized tasks, usually running large batch jobs, one at a time, and carrying out complex computations. If users were connected to the mainframes, it was through “dumb” terminals that had limited functionality and were totally dependent on the mainframe for their operations and processing environment. This was a closed environment with little threat of security breaches or vulnerabilities being exploited. This does not mean that things were perfect, that security vulnerabilities did not exist, and that people were in a computing utopia. Instead, it meant there were a handful of people working in a “glass house” who knew how to operate the computer. They decided who could access the mainframe and when. This provided a much more secure environment, because of its simplicity, than what we see in today’s distributed and interconnected world.&lt;br /&gt;&lt;br /&gt;In the days of mainframes, web sites describing the steps of how to break into a specific application or operating system did not exist. The network stacks and protocols being used were understood by very few people relative to the vast number of people that understand stacks and protocols today. Point-and-click utilities that can overwhelm buffers or interrogate ports did not exist. This was a truly closed environment that only a select few understood.&lt;br /&gt;&lt;br /&gt;If networks were connected, it was done in a crude fashion for specific tasks, and corporations did not totally depend on data processing as they do today. The operating systems of that time had problems, software bugs, and vulnerabilities, but not many people were interested in taking advantage of them. Computer operators were at the command line and if they encountered a software problem, they usually just went in and manually changed the programming code. All this was not that long ago, considering where we are today.&lt;br /&gt;&lt;br /&gt;As companies became more dependent on the computing power of mainframes, the functionality of the systems grew and various applications were developed. It was clear that giving employees only small time slices of access to the mainframes was not as productive as it could be. Processing and computing power was brought closer to the employees, enabling them to run small jobs on their desktop computers while the big jobs still took place within the “glass house.” This trend continued and individual computers became more independent and autonomous, only needing to access the mainframe for specific functionality.&lt;br /&gt;&lt;br /&gt;As individual personal computers became more efficient, they continually took on more tasks and responsibilities. It was shown that several users accessing a mainframe was inefficient and that some major components needed to be more readily available so that users could perform their tasks in an efficient and effective way. This thinking led to the birth of the client/server model. Although many individual personal computers had the processing power to compute their own calculations and perform their own logic operations, it did not make sense that each computer held information that was needed by all other computers. Thus, programs and data were centralized on servers, with individual computers accessing them when necessary and accessing the mainframes less frequently.</description><link>http://thedarkarts1297.blogspot.com/2008/11/bad-blogger.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-33391765.post-1875015521093483245</guid><pubDate>Mon, 28 Jul 2008 19:33:00 +0000</pubDate><atom:updated>2008-07-28T12:35:50.657-07:00</atom:updated><title>A long summer away..</title><description>I seem to be drawn away from blogging in the summer as there is always something outside that calls me away. Well to be a seasonal blogger or just blog I think the important thing is just to keep posting.  Maybe someone out there finds what I have to say insightful and useful.  But then again I&#39;ve said that I&#39;m doing this for me.  If other folks enjoy my blog all the better!</description><link>http://thedarkarts1297.blogspot.com/2008/07/long-summer-away.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-33391765.post-8046855948352086640</guid><pubDate>Mon, 28 Jul 2008 19:31:00 +0000</pubDate><atom:updated>2008-07-28T12:32:36.429-07:00</atom:updated><title>A Time for hericy...</title><description>Ah but with out heretics we&#39;d still think that the sun revolved around the earth! We must challenge the status quos in order to provide a space where true freedom can prosper.  Some wise person (wink wink) once told me there are three kinds of GS employee; 1) The kind that cares and works hard to get the job done, 2) The Power Mongers, and 3) the burn outs.  &lt;br /&gt;&lt;br /&gt;I&#39;d have to say that 70% of the GS&#39;rs fall into the burn out category, with 20% falling into the getting the job done (not necessarily correctly mind you), and the last 10% being the power hungry premedanas.&lt;br /&gt;&lt;br /&gt;I’d like to see those percentages shift to 10% burn outs and 70% getting the job done and the remaining 20% focused on service improvement.  In other words the 20% would be the management who care about getting better service to American tax payer.  But there in lies the core of the problem, that another very wise man (wink wink) shared with me, the Federal Government is the largest non-profit business on the face of the planet.  It is only answerable to Congress (another branch of itself) and as we have seen from the esteemed Senator from Alaska the internet is a series of tubes!  &lt;br /&gt;&lt;br /&gt;With the watchers being blinded by ignorance to the power at there finger tips I think it becomes easier to understand and accept that the culture of security goes beyond those who work, those who are burned out, and those who just want power.  The culture of security is paradigm to the culture of seat belts.  &lt;br /&gt;&lt;br /&gt;Once upon a time the presence of seat belts in the car was optional.  It wasn’t until a guy named Nader (another heretic) spoke out for automotive safety standards that things started to change.  I think the most important word of that statement is “started” as it took 30 plus years of education and enforcement to see the survival rates that we see on the highways today.  People I know put seat belts on and don’t even think twice about it.&lt;br /&gt;&lt;br /&gt;We’ve just begun this effort to change the culture of information security in the federal government.  It’s going to take a long time, a lot of effort, money, and enforcement (giving people tickets for not clicking the seatbelt as it were) and maybe even fighting the good fight for a generation.  The X Gen folks (me), and those that came after me, have a different perception of the meaning of data and what is possible with the data processing systems we have today.  &lt;br /&gt;&lt;br /&gt;I have only seen one X Gen’r in senior position within the federal IT space and the rest are baby boomers who, I believe, have it burned into there punch card heads that, and they will deny this, we live in a world were data is like concrete.  You pick it up, move it, store it and build things with it.  I look at data like water.  It can harden to blocks of ice data.  Melt to flow in any direction or evaporate into a gas state (it’s there but you can’t see it).  I don’t even think the baby boomer managers out there are even aware of this at a conscious level.  Remember it’s burned into there punch card brains.  &lt;br /&gt;&lt;br /&gt;Regardless if they are aware of it or not they are not looking at data systems like vessels for water management.  They look at blocks of concrete which ultimately impacts the entire conversation about data security and how we interact within our digital lives.  After all why should we care about rouge access onto a network if data is a concrete block that I can tie down (password protect) in a NTFS file share?  But if you look at it from a fluid dynamics perspective everything changes and the insanity of classified or privacy information on a public network share becomes clearer.  Fluids are constantly in motion or in a process of transition from one state to another due to the influence of the environment around them.  The same holds true for data if your mind it open to the concept.</description><link>http://thedarkarts1297.blogspot.com/2008/07/time-for-hericy.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-33391765.post-8708921137906967646</guid><pubDate>Wed, 02 Apr 2008 05:56:00 +0000</pubDate><atom:updated>2008-04-01T22:58:09.866-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">FISMA</category><category domain="http://www.blogger.com/atom/ns#">idiocracy</category><category domain="http://www.blogger.com/atom/ns#">Information Security</category><category domain="http://www.blogger.com/atom/ns#">stupid people</category><title>Money,  It&#39;s a Gas...</title><description>I can say that for the most part INFOSEC continues to be an &quot;after thought&quot; as a reaction to OMG we just lost 40,000 PII records and now we have to go before a congressional committee explaining why we lost Senator &quot;X&quot; PII.&lt;br /&gt;&lt;br /&gt;The key problem isn&#39;t the lack of laws, technology, or even smart IT Security folks to make it work.  The problem is that the stupid people out number the smart people on a grossly, and frightening, scale.  &lt;br /&gt;&lt;br /&gt;To compound that problem the people who control the money are not the smart people but the stupid people in the accounting offices.   Most of whom are, you guessed it, accountants who do not understand the fuzzy logic of IT Security.&lt;br /&gt;&lt;br /&gt;My mother is a CPA, and god bless her I love her very much, but if even so much as a cent is out of place she goes nuts finding it and find it she does.  That is her job and what she understands.  &lt;br /&gt;&lt;br /&gt;When I try and help her with IT issues the same binary thought process kicks in.  She will complain that &quot;my computer is slow&quot; and the response is to buy a new one because binary logic says that if the computer is slow it is because the computer is old and should be replaced.   &lt;br /&gt;&lt;br /&gt;To an IT Security person we would look at the system from a holistic perspective and not from the single variable.  The main reason her laptop, which was only 1 year old, was slow is that she loaded it with junk programs and the operating system did what it always did and filled up with Cr@p.  So over time the system kept tracking down a death spiral until it started blue screening.  &lt;br /&gt;&lt;br /&gt;In that there lies the other problem we face to get budget needed to meet the objectives outlined by the stupid people.  The level of complexity of information security issues can&#39;t be solved by buying a new shinny widget (laptop).  The business must be understood and the impact to the business must be made clear if the IT assets supporting the business are negatively affected in any way.  &lt;br /&gt;&lt;br /&gt;Yet the stupid people, who control the money,  don&#39;t understand that this level of detail isn&#39;t a nice thing to have it should be a required thing.  But seriously look at who is really running your show (business) and ask yourself &quot;would they know how to get to grep?&quot; or &quot;do they understand what happens when they ask to run a network scan at 2 pm on  Thursday before payroll gets sent out the next day?&quot;  or, and my personal favorite &quot;I need an exception to Proxy rules for one person.... to which I say why? and the response is &quot;because&quot; and I say this will mod the Proxy for the entire agency... and the response is &quot;So?&quot; &lt;br /&gt;&lt;br /&gt;Just remember who we are all dealing with.  I&#39;m not saying these people are bad or even malcious in their intentent.  It&#39;s just that dumb and dumber are running the show and those of us who have a clue are out in the cold wondering how we got locked out of the warm cabin again.  &lt;br /&gt;&lt;br /&gt;Proving to the dumb and dumbers that money spent on IT Security is worth while will never be an easy chore because we will always be a cost center.  &lt;br /&gt;What do CFOs love to do most and most often?  Seek and Destroy cost centers!  It is there mission in life and forget trying to explain that not upgrading an network intrusion sensor will leave them vulnerable because the requirement states they have to have NIDs in place.  &lt;br /&gt;&lt;br /&gt;It falls back to the CPA that says I have NIDS so I am good to go.  When in reality the NIDS in place are worthless beacuse the are end of life and can&#39;t upgrade to cover the lattest IDS signatures.  &lt;br /&gt;&lt;br /&gt;But the CPA that lives in every CFO and manager says I&#39;m covered so why worry?</description><link>http://thedarkarts1297.blogspot.com/2008/04/money-its-gas.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-33391765.post-6279720249298814119</guid><pubDate>Fri, 07 Mar 2008 06:14:00 +0000</pubDate><atom:updated>2008-03-07T06:29:45.713-08:00</atom:updated><title>Is IPv4 Dead?</title><description>I&#39;ve heard many speak of the &quot;end of days&quot; for IPv4 and calling for IPv6.  Many who make such calls want technology to move forward because they are well meaning and good engineers that know IPv6 is a better platform from many different perspectives.  One thing though that we engineers tend to forget is who we work for.  Engineers solve problems &quot;the others&quot; create for us because of something they need or want to do.  I have not seen too many engineers in charge of marketing departments or CEO&#39;s.&lt;br /&gt;&lt;br /&gt;Thus choices about network topology and protocols are constained by the needs of &quot;the others&quot; who we look down upon as slightly more functional than a village idiot.  However we need to remember two things; 1) those to whom we serve need us as much as we need them, and 2) business will always drive us and as much as we want to migrate to better standards the users (stupid folks) don&#39;t care how the packet gets there as long as it does.&lt;br /&gt;&lt;br /&gt;NATs solved the immediate problems of IP address space limitations but still left the transport wide open from a vulnerability perspective.  So is IPv4 an undead zombi corps that just hasn&#39;t walked into the path of the tractor trailer speeding down the highway?  Do we as security folk need to start getting ready now and head back to school again?&lt;br /&gt;&lt;br /&gt;&lt;object width=&quot;425&quot; height=&quot;355&quot;&gt;&lt;param name=&quot;movie&quot; value=&quot;http://www.youtube.com/v/_y36fG2Oba0&quot;&gt;&lt;/param&gt;&lt;param name=&quot;wmode&quot; value=&quot;transparent&quot;&gt;&lt;/param&gt;&lt;embed src=&quot;http://www.youtube.com/v/_y36fG2Oba0&quot; type=&quot;application/x-shockwave-flash&quot; wmode=&quot;transparent&quot; width=&quot;425&quot; height=&quot;355&quot;&gt;&lt;/embed&gt;&lt;/object&gt;</description><link>http://thedarkarts1297.blogspot.com/2008/03/is-ipv4-dead.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-33391765.post-2408007927069486014</guid><pubDate>Sat, 26 Jan 2008 04:17:00 +0000</pubDate><atom:updated>2008-01-25T20:20:54.060-08:00</atom:updated><title>Just for fun!</title><description>As with many folks I do have interests outside of my chosen profession.  This is the first movie I have ever made using my Canon Powershot A95 and Apple iMovie 08. I shot this on Monday of this week.  Enjoy! &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;object width=&quot;425&quot; height=&quot;355&quot;&gt;&lt;param name=&quot;movie&quot; value=&quot;http://www.youtube.com/v/5lCQgKWbafE&amp;rel=1&quot;&gt;&lt;/param&gt;&lt;param name=&quot;wmode&quot; value=&quot;transparent&quot;&gt;&lt;/param&gt;&lt;embed src=&quot;http://www.youtube.com/v/5lCQgKWbafE&amp;rel=1&quot; type=&quot;application/x-shockwave-flash&quot; wmode=&quot;transparent&quot; width=&quot;425&quot; height=&quot;355&quot;&gt;&lt;/embed&gt;&lt;/object&gt;</description><link>http://thedarkarts1297.blogspot.com/2008/01/just-for-fun.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-33391765.post-7497024210964479899</guid><pubDate>Fri, 25 Jan 2008 08:57:00 +0000</pubDate><atom:updated>2008-01-25T00:57:49.980-08:00</atom:updated><title>Digital Certs and Smart Cards the Future of Info Security</title><description>Bill Gates: Digital Certs and Smart Cards the Future of Info Security&lt;br /&gt;&lt;br /&gt;Your browser may not support display of this image.&lt;br /&gt;&lt;br /&gt;Speaking in the opening keynote address of the RSA Conference 2007 in San Francisco, Microsoft Chairman Bill Gates said that security needs to migrate from the computer infrastructure to the end user, in order to cope with the changing environment of portable devices inside corporate networks.&lt;br /&gt;&lt;br /&gt;“Security is the fundamental challenge that will determine whether we can successfully create a new generation of connected experiences that enable people to have anywhere access to communications, content and information,” he said.&lt;br /&gt;&lt;br /&gt;“This challenge is going to get a lot tougher,” he said. “The threat landscape has evolved in dramatic ways. When we first began working on Vista most attacks were done for notoriety. Today it is a lot more serious and nefarious than it was five years ago,” he added.&lt;br /&gt;&lt;br /&gt;In his last keynote speech at RSA the Microsoft chairman criticized conventional passwords. “Passwords are not only weak, but passwords have the huge problem that if you get more and more of them, the worse it is,” he said. “Smart cards and certificates in general is the way to go. Enterprises should start to migrate from passwords to smart cards. We are laying the groundwork so that we can have certificate-based roots of trust.”&lt;br /&gt;&lt;br /&gt;– Fiona Raisbeck, SC Magazine, at RSA Conference in San Francisco February 6, 2007.</description><link>http://thedarkarts1297.blogspot.com/2008/01/digital-certs-and-smart-cards-future-of.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-33391765.post-5771103493331116420</guid><pubDate>Mon, 21 Jan 2008 05:15:00 +0000</pubDate><atom:updated>2008-01-20T21:20:07.963-08:00</atom:updated><title>My Wonk Died</title><description>I was going back through some old posts and saw my writing about my inner wonk. I just wanted to share that I believe the Wonk in me is dead. I&#39;ve evolved beyond that point and with my thoughts focused on &quot;transparency&quot; I think I have hope for a better tomorrow.  Now to drag that better tomorrow into today!</description><link>http://thedarkarts1297.blogspot.com/2008/01/my-wonk-died.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-33391765.post-5393602807561149986</guid><pubDate>Mon, 21 Jan 2008 03:38:00 +0000</pubDate><atom:updated>2008-01-20T20:54:56.429-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Architecture</category><category domain="http://www.blogger.com/atom/ns#">FISMA</category><category domain="http://www.blogger.com/atom/ns#">Information Security</category><category domain="http://www.blogger.com/atom/ns#">Transparent</category><title>Transparency Arrived Today</title><description>I see the disconnection between the user and what is really going on under the hood in the same way we see people on the freeway disconnected from the chaos just a few inches away.  I think the way to break the &quot;hamster wheel of pain&quot; is to stop treating risk as a model that all things form into.  Rather we need to factor risk as a &quot;driver&quot; in a machine we&#39;ll call the Automated Processing Environment (APE).   &lt;br /&gt;&lt;br /&gt;The APE is essentially stupid slow and constantly vulnerable to attack from smaller, faster, and more agile life forms.  The ape isn&#39;t simply a collection of hardware, software and security controls.  It is physical, human, and logical.  I believe that we have to move on from the SDLC, CIA, and all models that have been crafted before this time because the complexity of attacks that we see in our environments simply can not be captured with current thinking in a way that helps us move forward.  &lt;br /&gt;&lt;br /&gt;If we shift the paradigm and factor in that, at the most basic level, we have human, physical, and logical assets all interacting with one another in a constant state of flux it becomes next to impossible to authentically predict, or better yet, assess the risk posture of the APE.  The piece meal approach to providing a “cure” to the information security challenges simply will not make muster any more.  We must address all components at once. Why? If all pieces of the APE triad (Human, Physical, or Logical) are not addressed at the same time, and with the same vigor, than the triad will collapse, and once again become vulnerable from the segment that was not equally bolstered.  I&#39;ve talked about transformation before in previous posts but I think that trying to improve one section at a time will never work because we will always be chasing the &quot;tail of the dragon&quot;.  &lt;br /&gt;&lt;br /&gt;The same is true for mitigating risk to data.  All too often I have seen huge efforts to implement technical solutions that do yield &quot;a result&quot; but that result is never fully understood.  Manufacturers love to show dashboards showing all the security data that has been collected but in the end the dashboard serves no tangible purpose to understanding what is going on in the APE.   &lt;br /&gt;&lt;br /&gt;To break the cycle we must change the way business is done.  We must become more closed and bring more sensitive data closer to home.  This could be done by &quot;purging&quot;  all sensitive data from systems that are in the wild and bring the data literally inside the walls of the Data Center.  We need to move to a use of both the client/server and the more feudal approach of thin client architecture that pulls data processing into centrally managed activities in order to strike a risk based cost balanced approach.  An  awareness of who, what, where, and when sensitive data is being processed will help reduce the threat of loss of the data into the wild.  Just like a diamond on display in a museum is protected but shared through the exhibition.  &lt;br /&gt;&lt;br /&gt;But by far the greatest weakness in the APE triad is the human factor. Behaviors must be modified and addressed immediately upon discovery.  When I worked the flight line I saw folks sent home immediately after any kind of accident.  One case sticks out in my mind at SFO where the tug driver ran a container into the side of an aircraft. He immediately was sent for a drug test and ordered to take a week without pay. Hence I would say the level of intensity and focus during a turn around was extreme.  The danger was present and the risks real. That fear does not exist in the mind of the average user but should in those APE users that roam in a hostile world. &lt;br /&gt;&lt;br /&gt;To be truly transparent means not only to report the control failures but to have visibility into any area of the enterprise allowing issues to be fully and freely expressed before they manifest themselves into security events.</description><link>http://thedarkarts1297.blogspot.com/2008/01/transparency-arrived-today.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-33391765.post-4636000767077251548</guid><pubDate>Sat, 12 Jan 2008 18:31:00 +0000</pubDate><atom:updated>2008-01-12T10:35:03.187-08:00</atom:updated><title>Did you know you can do something about...</title><description>Did you know that you can help reduce the national debt? You sure can by sending the government money directly to pay down the debt.  Unlike taxes which are controlled by politicians and rarely go towards paying the national debt you can make a difference.  &lt;br /&gt;&lt;br /&gt;How do you make a contribution to reduce the debt?&lt;br /&gt;&lt;br /&gt;Make your check payable to the Bureau of the Public Debt, and in the memo section, notate that it is a Gift to reduce the Debt Held by the Public. Mail your check to:&lt;br /&gt;&lt;br /&gt;Attn Dept G&lt;br /&gt;Bureau Of the Public Debt&lt;br /&gt;P. O. Box 2188&lt;br /&gt;Parkersburg, WV 26106-2188 &lt;br /&gt;&lt;br /&gt;Or you can fire your elected official and hire (vote) for someone who will be responsible to the people that put&#39;em in office!</description><link>http://thedarkarts1297.blogspot.com/2008/01/did-you-know-you-can-do-something-about.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-33391765.post-3973846350098787196</guid><pubDate>Wed, 19 Dec 2007 05:53:00 +0000</pubDate><atom:updated>2007-12-18T22:19:42.637-08:00</atom:updated><title>Stay home and don&#39;t give...</title><description>I&#39;ve been wondering why I haven&#39;t been as dedicated a blogger as I should be and I have come to the conclusion that the entire premise for my blogging was flawed from the get go.  I was blogging not for myself but for some imagined audience out there.  &lt;br /&gt;&lt;br /&gt;Well that audience hasn&#39;t materialized but more importantly I don&#39;t care anymore. I&#39;m blogging now for myself just for the knowledge that my thoughts have been in some way added to the zeitgeist of the Internet.  I am still committed as ever to helping people secure information.  &lt;br /&gt;&lt;br /&gt;Through my writing and experiences this year I have come to the conclusion that information is more important than the systems that process it.  This is not to say that those systems are irrelevant as the symbiosis that is in play can not be ignored.  &lt;br /&gt;&lt;br /&gt;It is critical that we refocus on the information (data) in our lives.  Where that information rests, when it is in motion, and what controls are in place to manage that information.  I can put my dog in front of a door with my laptop running without a password and a open file with all my passwords on the screen.  &lt;br /&gt;&lt;br /&gt;But just as if a tree fell on a Mime the question comes down to &quot;Does anyone care?&quot;.  &lt;br /&gt;I see every day, and sadly too often from people who should know better, that we just don&#39;t see shades of gray, we are those shades.  &lt;br /&gt;&lt;br /&gt;I&#39;ve said before how human beings want simple easy answers because we are all essentially 8 years old and want to feel protected.  The truth I have accepted is that we will never be 8 years old again and we will always be vulnerable. There will never be simple answers to questions of the control of information.  So please stop being FRACKING fixated on the shinny box and look at the contents (data) in the box for FRAKS SAKE!!! Then look at the boxes around your shinny box and ask yourself if your shinny box fits inside any of the other shinny boxes and go from there! &lt;br /&gt;&lt;br /&gt;So as we close out 2007 I would like to fire off a few parting shots.&lt;br /&gt;&lt;br /&gt;The first is a request... &lt;br /&gt;&lt;br /&gt;Please don&#39;t do your holiday shopping at work. I can&#39;t believe that you have the balls let alone the time to sit there and pretend to work when you are on Amazon, Barnes &amp; Noble, or Victoria Secret when you should be getting what ever it is your being paid to do done!  &lt;br /&gt;&lt;br /&gt;For that matter don&#39;t shop! Drag your lazy family (or your own @ss) down to a local reputable charity and give your time.  Forget money, though I am sure that the Red Cross, Salvation Army, or other worthy charity would happily take your money, as time is often more important than any amount of money you can give.  &lt;br /&gt;&lt;br /&gt;I&#39;ll go on record as saying I hate what Christmas is today in North America. (Remember Christmas is not observed the same way in different parts of the world so I am not opposed to Christmas just the way it is observed.)&lt;br /&gt;&lt;br /&gt;So stay home spending time with your family and don&#39;t give to your family but to your fellow human who doesn&#39;t have a warm place to stay.</description><link>http://thedarkarts1297.blogspot.com/2007/12/stay-home-and-dont-give.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-33391765.post-2450366161807017012</guid><pubDate>Fri, 02 Nov 2007 19:19:00 +0000</pubDate><atom:updated>2007-11-02T12:32:00.413-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">death</category><category domain="http://www.blogger.com/atom/ns#">explosives</category><category domain="http://www.blogger.com/atom/ns#">sycological warfare</category><category domain="http://www.blogger.com/atom/ns#">terrorism</category><category domain="http://www.blogger.com/atom/ns#">war</category><title>Train Wreck</title><description>Allrighty then; I have officially crossed over into a place that is outside of normal space. I don&#39;t know what this space is but when you watch a train wreck and laugh your @ss off it kinda tells ya somethings not right.&lt;br /&gt;&lt;br /&gt;I was surfing youtube.com, where you can see just about anything, and caught this flick of a dude firing off a small mortar in a semi-confined space. Check it out but be warned it&#39;s messy. &lt;br /&gt;&lt;br /&gt;&lt;object width=&quot;425&quot; height=&quot;373&quot;&gt;&lt;param name=&quot;movie&quot; value=&quot;http://www.youtube.com/v/v0EbxrRaC60&amp;color1=0x2b405b&amp;color2=0x6b8ab6&amp;border=1&quot;&gt;&lt;/param&gt;&lt;param name=&quot;wmode&quot; value=&quot;transparent&quot;&gt;&lt;/param&gt;&lt;embed src=&quot;http://www.youtube.com/v/v0EbxrRaC60&amp;color1=0x2b405b&amp;color2=0x6b8ab6&amp;border=1&quot; type=&quot;application/x-shockwave-flash&quot; wmode=&quot;transparent&quot; width=&quot;425&quot; height=&quot;373&quot;&gt;&lt;/embed&gt;&lt;/object&gt; &lt;br /&gt;&lt;br /&gt;I know it&#39;s wrong to laugh but the stupidity of it just laid me on the floor. Maybe I&#39;d feel different if I had been combat? Maybe I&#39;d feel different if I knew the story of how that dude got to the point of being there loading those mortars?  I&#39;m sure he was someones son once upon a time. But in the end I still laughed because while these guys (this guy and the ones off camera) are all busy praising g@d they all get nailed by a bad mortar round. If that isn&#39;t stupid irony I don&#39;t know what is.</description><link>http://thedarkarts1297.blogspot.com/2007/11/train-wreck.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-33391765.post-6023443680775315708</guid><pubDate>Fri, 02 Nov 2007 16:15:00 +0000</pubDate><atom:updated>2008-01-20T21:07:09.062-08:00</atom:updated><title>The Downfall of a SuperPower</title><description>Beyond the obvious; the possible demise of the United States as a super power has deeper implications for information security and your own personal security.  I&#39;m trying to be alarmist without being over the top.  The United States still spends more than any country in the world on the military and still has a multi-trillion dollar GNP. But do those two factors define a super power today?   &lt;br /&gt;&lt;br /&gt;I say that we must examine the underpinnings of our society and thus our way of life. Information Technology (IT) is a tool wielded by people who grow (or don&#39;t) out of the culture that is promoted at the most basic levels of society; the playground and school yard. It is these places (institutions) that the foundation for how we conduct ourselves in our adult lives is laid.  &lt;br /&gt;&lt;br /&gt;We all talk a lot lately about risk management and you may have heard about the shift away from risk aversion to more centric risk acceptance.  Yet the next generation of leaders (our kids) is being taught to not take risks in the simplest of ways; the playground. &lt;br /&gt;&lt;a href=&quot;http://video.msn.com/video.aspx?mkt=en-US&amp;brand=msnbc&amp;vid=08821516-b60d-43c0-895e-2ab47f809dbb&quot; target=&quot;_new&quot; title=&quot;Government taking fun out of playgrounds?&quot;&gt;&lt;img src=&quot;http://msnbcmedia.msn.com/j//msnbc/Components/Video/071101/x_30_nn_harsanyiextra_071101.vmodv4.jpg&quot; border=0 alt=&quot;Government taking fun out of playgrounds?&quot; width=112 height=84&gt;&lt;br /&gt;Government taking fun out of playgrounds?&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;While city councils cower in fear of the next lawsuit, and parents &quot;protect&quot; children  with cocoons of padded foam insulation believing they are doing everything they can to safeguard their children with things like body armor.&lt;br /&gt;&lt;br /&gt;&lt;object width=&quot;425&quot; height=&quot;366&quot;&gt;&lt;param name=&quot;movie&quot; value=&quot;http://www.youtube.com/v/QG8-iHU4Bg8&amp;rel=1&amp;border=0&quot;&gt;&lt;/param&gt;&lt;param name=&quot;wmode&quot; value=&quot;transparent&quot;&gt;&lt;/param&gt;&lt;embed src=&quot;http://www.youtube.com/v/QG8-iHU4Bg8&amp;rel=1&amp;border=0&quot; type=&quot;application/x-shockwave-flash&quot; wmode=&quot;transparent&quot; width=&quot;425&quot; height=&quot;366&quot;&gt;&lt;/embed&gt;&lt;/object&gt;&lt;br /&gt;&lt;br /&gt;Is it just possible that we are exposing, and expressing, our own fears through our children?  We the adults in the United States could be so shell shocked and afraid of our own emotional scars, or the threat of being scared, that we are robbing the next generation of not only what it means to be a child (exploration) but teaching them that in order to be safe they have to give up the choice to accept risk.  &lt;br /&gt;&lt;br /&gt;Accepting risk is the most basic element of information security.  We have the challenge today of educating the last generation, current generation, and future generation that risk is with us at all times and to say to a child here is a back pack that will protect you from a gun is to say &quot;&lt;a href=&quot;http://en.wikipedia.org/wiki/Duck_and_cover&quot;&gt;duck and cover&lt;/a&gt; little one&quot; and you&#39;ll be alright.  Life isn&#39;t safe and neither is operating an information system.  We should not retreat into a foam covered play land believing that we are all safer for it.  Friedrich Nietzsche wrote &quot;That which does not kill us makes us stronger&quot; and knowing the risks and the freedom to take them are what made this country great. &lt;br /&gt;&lt;br /&gt;There can be serious repercussions in such a state that claws its way into our lives and &quot;nannies&quot; us. The Asian nation of Singapore is known as the world&#39;s leading nanny state. Lee Kuan Yew, the celebrated former prime minister of that nation, wrote in his memoirs: &quot;We would have been a grosser, ruder, cruder society had we not made these efforts to persuade people to change their ways,&quot; and later, &quot;If this is a &#39;nanny state,&#39; I am proud to have fostered one.&quot;&lt;br /&gt;&lt;br /&gt;Yew may have been proud — and certainly he was successful, as Singapore is one of the most prosperous nations in the world — but at what price? In 1999, The Economist dubbed Singapore the &quot;world execution capital.&quot; For years, media coverage in the nation was stifled, opposition political leaders jailed, and endless draconian nanny rules imposed on the population, from penalties for infractions like spitting or chewing gum to detention without a trial for nonviolent acts against the government. &quot;Freedom of the press must be subordinated to the overriding needs of Singapore,&quot; Yew told the International Press Institutes assembly in 1971.   &lt;br /&gt;&lt;br /&gt;My definition of what makes the United States &quot;super&quot; and what keeps us most secure is our freedom to fall, get scars, and learn from how we fell and see the scar as a constant reminder of our pain.  If you go to Washington DC the city is literately filled with monuments to the scars of our national past.  It is, if you&#39;re mind is open, a gallery of national pain and suffering.  From the Viet-Nam wall, to the FDR memorial (very cool at night) which embodies the suffering of the American People during the great depression. &lt;br /&gt;&lt;br /&gt;So stand up, take your beatings, and lets be the America that we know we can all be; Proud, not Afraid, and Strong on all fronts. Take risks and know that failure will happen but it is not the failure that is the issue it is what we do once that failure has occurred that is a true measure of greatness.</description><link>http://thedarkarts1297.blogspot.com/2007/11/downfall-of-superpower.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-33391765.post-280516712748862864</guid><pubDate>Thu, 25 Oct 2007 18:21:00 +0000</pubDate><atom:updated>2007-10-25T11:30:28.138-07:00</atom:updated><title>My Hamster Wheel of Pain</title><description>This was from a post I did on another blog at (http://feeds.feedburner.com/~r/Riskanalysis/~3/173775219/):  &lt;br /&gt;&lt;br /&gt;The lesson I have taken from history is that in the beginning security was real and tangible. Systems were in essence static and well defined boundaries with known inputs and outputs. If you wanted to use a mainframe in the 1970&#39;s you pretty much had to be hard wired into the system to access it. (Rare cases of dial-in which we all remember Capt Jack and the War-Dialers; which focused on long distance calling)&lt;br /&gt;&lt;br /&gt;We are all stuck with management that grew up in that 1970&#39;s Era and who still thinks in those terms that information processing systems can still be defined, managed, and controlled.  Let&#39;s face facts folks; most of us are subordinate in our organizations and rightfully so.  We, the security practitioner, serve the greater good of our respective organizations.  So we will always be in some form of conflict to whom we serve because of blissful ignorance, incompetence, and funding.  &lt;br /&gt;&lt;br /&gt;But let&#39;s look at the core driver in all this mess.  That being change.   Without change security is possible because all the known variables can be accounted for and performance can be tracked and reported with real confidence.   Over the past 30 years the rate of change has increased at an exponentially faster rate.   The time that a information processing system used to input and output data  and the amount of data compared to what is possible today are night and day.  Another way to put it would be the transformation of war from static Napoleonic warfare with fixed positions, static lines, and Aristocratic rules of engagement to what we see on the streets of Bagdad (Urban Gorilla Warfare).&lt;br /&gt;&lt;br /&gt;So it is impossible, unless we all collectively agree to step back in time,  to say that anything is secure.   We are not g@ds who can see all things all the time.  We are but men (and women folk) who only know what we know and are faced with the daily challenge of managing change.   Those changes are forced by people who do not understand themselves, the changes they make, or the very technology they control.   What makes this dangerous for us all living in an open and free society (USA) is that we are all connected now in some way and that the culture of indifference to one another and to just being responsible means that most of the management I have been exposed to doesn&#39;t want to be enlightened.  They want to punch the clock, make the next bonus, and go home to an empty and meaningless life.  &lt;br /&gt;&lt;br /&gt;I write this with the conviction that if those in power, not us, truly understood even the concept of change/risk management we would not be having this discussion because folks would be taking systems offline faster than a car goes around the Indianapolis 500 track. &lt;br /&gt;Fore these are the folks who ask &quot;What do you mean I can&#39;t send company/government data to my Yahoo/Google/Hotmail account?&quot; with the rational that &quot;It&#39;s my email account and I have a good password so it&#39;s &quot;secure&quot; from other people getting to it&quot; while exposing the organization to loss of confidentiality because the financial expense reports for 3000 employees just got broadcast over the internet (Which BTW breached privacy as bank account information could be included in expense reports for reimbursement.)&lt;br /&gt;&lt;br /&gt;I used to believe in technology and had faith that people were essentially &quot;good&quot; but have come to a place where I see time and time again that people aren&#39;t &quot;good&quot; (which is not to say they are evil) but that most of the population is blindingly ignorant of even the most basic things and that compounding that blindness is the culture of indifference which dooms us all to a never ending cycle of pain (Hamster wheel of Pain).  I also don&#39;t believe in technology as the &quot;silver bullet&quot; because who drives technology; Management Marketing type folks who sell, over promise, and under deliver.   Always pushing developers and engineers to deliver half baked products because the &quot;vision&quot; is never in line with the reality.   No one can honestly say that a single product out of the box can effectively manage the core issue without significant overhead and investment in tuning the product to environment. &lt;br /&gt;&lt;br /&gt;Bottom line:  There is no silver solution anywhere, just lead shot, and we are using slings when what we really need is semi-automatics.  To truly solve the problem of &quot;security&quot; within the information processing world is to say that change stops now;  which is impossible.  To truly solve the problem of security we don&#39;t need to continue to escalate the &quot;logical arms race&quot; with better and better technology because that cycle feeds itself with attack v counter-attack; we need to transform the expectations of the people we serve.  &lt;br /&gt;&lt;br /&gt;By making the world understand that if you want to continue the culture of instant everything while paying next to nothing, from a dollars and sense perspective, that you choose to give up something far more valuable than mere money; you give up your ability of choice.  So unless we slow down, accept less convenience, and choose to understand our world a bit more we are all exposed, vulnerable, and essentially naked to anyone who seeks to do us harm.  Hence those of us who ride out (in our office chairs) keeping watch will be forever shackled to the hamster wheel of pain.&lt;br /&gt;&lt;br /&gt;V/r PZ</description><link>http://thedarkarts1297.blogspot.com/2007/10/my-hamster-wheel-of-pain.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-33391765.post-8146131845222779773</guid><pubDate>Thu, 25 Oct 2007 06:41:00 +0000</pubDate><atom:updated>2007-10-24T23:42:55.980-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Cyber</category><category domain="http://www.blogger.com/atom/ns#">Cyber Law</category><category domain="http://www.blogger.com/atom/ns#">Ethics</category><category domain="http://www.blogger.com/atom/ns#">Information Security</category><category domain="http://www.blogger.com/atom/ns#">Law</category><category domain="http://www.blogger.com/atom/ns#">Three Laws</category><title>Three Laws Strong - Rules to Live by</title><description>Rules that all Information Security practitioners should follow.   &lt;br /&gt;&lt;br /&gt;1. An Cyber Security Professional (CSP), or anyone one assigned information security responsibilities, may not injure a human being or, through inaction, allow a human being to come to harm.&lt;br /&gt;&lt;br /&gt;2. A CSP must obey orders given by customer, client, or senior manager except where such orders would conflict with the First Law.&lt;br /&gt;&lt;br /&gt;3. A CSP must protect its own existence as long as such protection does not conflict with the First or Second Law.&lt;br /&gt;&lt;br /&gt;If it&#39;s good enough for AI then it&#39;s good enough for me; eh?</description><link>http://thedarkarts1297.blogspot.com/2007/10/three-laws-strong-rules-to-live-by.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-33391765.post-7765939603389501041</guid><pubDate>Thu, 25 Oct 2007 04:52:00 +0000</pubDate><atom:updated>2007-10-24T23:32:46.858-07:00</atom:updated><title>Private Patriots or Just Plain Mercs?</title><description>While the topic of contracting out the US Army and Marines to former Army personnel and the &quot;others&quot; who join private &quot;security&quot; firms seems to be well established what I find new and interesting is the extent to which these private security firms are being used today by the US Federal Government.  &lt;br /&gt;&lt;br /&gt;It was the role of the US Marines to provide protection for the State Department but with all but a few good men spoken for patrolling the streets of Bagdad the void had to be filled some how.  In Viet Nam that void was filled with a Draft.  The simple fact then as is now is the reality of an all volunteer force is we are limited in what we can do from a tactical and strategic perspective because we do not have the man power to support every goal.  &lt;br /&gt;&lt;br /&gt;If you have an all volunteer, or all recruited, force then it does not become possible to say that we can maintain two fronts (or three, four, five, etc).  Military history shows time and time again that no matter how powerful the army without the logistical support being in place to sustain and protect the rear areas of the theater the battle may be won but the war will be lost. &lt;br /&gt;&lt;br /&gt;What we have really lost here is sight of what is really going on and I find it distasteful at the least; that being politicians using US Taxpayer money to buy themselves out of a political nightmare.  That nightmare simply said is the avoidance of a Draft through the use of private armies. &lt;br /&gt;&lt;br /&gt;This brings into the fold a new challenge for DoD and other sensitive systems that support warfighting.  While it is well known that contractors provide IT support. (Including myself) There has always been a separation of duties. The clear oversight and practice of least privileged I believe has ensured operational security and mission success.&lt;br /&gt;&lt;br /&gt;Outsourcing our core military capabilities is wrong, demoralizing to the warfighter (who is often on food stamps), and dangerous to national security. Limited use of physical security contractors here in the United States is fine but putting Mercenaries on the ground in a hot LZ is a different story all together. &lt;br /&gt;&lt;br /&gt;If we can&#39;t secure the peace we haven&#39;t won the war. The worst part is that why should any 18 year old choose to go into the Army and earn $18000 a year when they can go to a private firm and make $30k to start (Much more if you have experience).&lt;br /&gt;&lt;br /&gt;It all comes back to &quot;Trust but Verify&quot; because physical and cyber security are the same thing and depend on one another without the ability to separate either one. So the next time you think about outsourcing think about the additional risk you are accepting before you pop the champaign and celebrate how much you think you just saved.  BTW - The latest estimates on the cost of operations in Iraq and Afghanistan are over 2 trillion dollars by 2010. Back in 2002 the total cost was projected at only 500 billion and most of that was going to be paid for by a eager democratic Iraqi government from the oil reserves. Moral of the story there is that nothing, and I mean nothing (Security Tools, Firewalls, Vendors Promises) is what it appears. &lt;br /&gt;&lt;br /&gt;Sounds hypocritical coming out of my mouth since I am technically a &quot;vendor&quot; but I do apply the same standard to myself as anyone else.  In that I apply the three fundamental laws of AI.&lt;br /&gt;&lt;br /&gt;1. A robot may not injure a human being or, through inaction, allow a human being to come to harm.&lt;br /&gt;2. A robot must obey orders given to it by human beings except where such orders would conflict with the First Law.&lt;br /&gt;3. A robot must protect its own existence as long as such protection does not conflict with the First or Second Law.&lt;br /&gt;&lt;br /&gt;Vendors in principal follow the same logic. As a business you would not do anything that would harm the business. However we are here to provide service to the customer and as such much obey. But we should not obey orders that would break the first law. &lt;br /&gt;&lt;br /&gt;Oh hell this is good for another post.</description><link>http://thedarkarts1297.blogspot.com/2007/10/private-patriots-or-just-plain-mercs.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-33391765.post-6268734597739643092</guid><pubDate>Wed, 24 Oct 2007 16:55:00 +0000</pubDate><atom:updated>2007-10-24T09:56:41.898-07:00</atom:updated><title>The new Iron Curtain...</title><description>Wars have been started for less; eh?  Could the breakdown of political and other institutional support for interconnected systems mean a regression back to the stand-a-lone systems if governments do not enforce some moniquire of civility and common sense with regards to companies and individuals that operate within their borders?  &lt;br /&gt;&lt;br /&gt;Shadowy Russian Firm Seen as Conduit for Cybercrime&lt;br /&gt;&lt;br /&gt;http://www.washingtonpost.com/wp-dyn/content/article/2007/10/12/AR2007101202461.html&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;http://blog.washingtonpost.com/securityfix/2007/10/mapping_the_russian_business_n.html&lt;br /&gt;&lt;br /&gt;By Brian Krebs&lt;br /&gt;washingtonpost.com Staff Writer&lt;br /&gt;Saturday, October 13, 2007; A15&lt;br /&gt;&lt;br /&gt;An Internet business based in St. Petersburg has become a world hub for&lt;br /&gt;Web sites devoted to child pornography, spamming and identity theft,&lt;br /&gt;according to computer security experts. They say Russian authorities&lt;br /&gt;have provided little help in efforts to shut down the company.&lt;br /&gt;&lt;br /&gt;The Russian Business Network sells Web site hosting to people engaged in&lt;br /&gt;criminal activity, the security experts say.&lt;br /&gt;&lt;br /&gt;Groups operating through the company&#39;s computers are thought to be&lt;br /&gt;responsible for about half of last year&#39;s incidents of &quot;phishing&quot; --&lt;br /&gt;ID-theft scams in which cybercrooks use e-mail to lure people into&lt;br /&gt;entering personal and financial data at fake commerce and banking&lt;br /&gt;sites......</description><link>http://thedarkarts1297.blogspot.com/2007/10/new-iron-curtain.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-33391765.post-3617427774264968155</guid><pubDate>Mon, 15 Oct 2007 06:35:00 +0000</pubDate><atom:updated>2007-10-14T23:37:15.421-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Apple</category><category domain="http://www.blogger.com/atom/ns#">hacking</category><category domain="http://www.blogger.com/atom/ns#">iPhone</category><category domain="http://www.blogger.com/atom/ns#">Ipod</category><category domain="http://www.blogger.com/atom/ns#">OS X</category><category domain="http://www.blogger.com/atom/ns#">underdog.</category><title>Apple&#39;s time to take the spot light... may not be so bright.</title><description>I was browsing the net for intel on the Iphone, I want one, and it struck me that there is a hidden issue here for Apple and one that I hope to g@d that they have considered; security.  &lt;br /&gt;Information security has been touted amongst the Apple set as one of the corner stones of the product lines.  After all “get a Mac” means not having to deal with the viruses and problems PC’s have to deal with every single day. Right?   We all know that OS X is based on a flavor of BSD-UNIX and that the Iphone has been reported to be based of OS X.  I’m confidant that the folks at Apple changed the core kernel and locked it down enough to withstand the casual attack.  Here’s the rub though.  Apple for as long as I can remember, or since Microsoft stole the GUI from them, has been in a “niche” of the IT world. &lt;br /&gt;&lt;br /&gt;Creative folks love Apple and won’t use PCs.  People with more money than they know what to do with and want something in there home office or living room that looks drop dead gorgeous get Apples.  Until this point in time I would say it is safe to call Apple the Porsche of the IT world.   Sure the Ipod enjoys a market share of the portable music world but now we are getting into something entirely different with the introduction of the Iphone.  Until now our Ipods were essentially stand alone systems with the overarching security controls of our PCs and Macs offering some protections.  (I say this in all optimism that folks that use PCs actually do some form of security even though I know this not to be true, and am in all forms, in a complete state of denial, as to the pure insanity and ignorance that is the general computing population, with regards to the absurd idea that computing without a firewall and antivirus program is “ok”.)  &lt;br /&gt;Now that I have that off my shoulders.  Back to the issue at hand.  Until today Apple has not had the market footprint that PCs and their peripherals have enjoyed (including smart phones).   If Apple is as successful as predicted with regards to the Iphone, and they most likely will be, what are the consequences of an Apple OS having the same profile and therefore the same market footprint as its windows nemesis?  &lt;br /&gt;I put forth that Apple is now fair game for Malware, viruses, and any other threat agent out there that can take advantage of the Mac OS running on the Iphone.  Imagine millions of Iphones infected and performing “drunk dialing” of fee based porn sites or phone spoofing.  Any time you tie a possible revenue stream to a device that is interconnected with the cloud you invite the current generation of organized crime based crackers to get cranked up and figure out how to milk this cow for every dollar possible.&lt;br /&gt;And boy there could be millions made from exploitation of Iphone.  Consider this theoretical model.  &lt;br /&gt;1)      Hack a week server at a data hosting or web hosting company and setup a pay porn, or any other fee based site, with PayPal as the money channel to an offshore account.  &lt;br /&gt;2)      Buy three Iphones.  One for destructive testing, One for regression testing, and one for final testing.  (Cost $1600 bucks)  &lt;br /&gt;3)      Either you are the mind bending cracker or you find one and get to work on finding the exploit.  Lets say for this deal your going all out and don’t want to get caught.  You go to a local computer shop, pay cash, and buy three decent laptops with enough horsepower to get the job done.  (Cost about $2000 avg.)  &lt;br /&gt;4)      Load them up with your favorite flavor of BSD-UNIX and some VM ware that you cracked. &lt;br /&gt;5)      Destroy one Iphone to figure out how the thing is built and where the “guts” of the box are. &lt;br /&gt;6)      Extract the OS, date files, etc and start regression testing.  Figure our how they interoperate with the data network.  (What ports and protocols are used.)  &lt;br /&gt;7)      Find the exploits (Everyone has them and if any one tells me that Apple has closed all the holes in a “just works” environment I have some land to sell you.)  &lt;br /&gt;8)      This is where the real fun begins.  Let’s say it takes you four months to crack the box and devise a way to get all the Iphones in the world to go to your website. Or better yet dial your international 900 number in a country with no extradition treaty.  (Better yet a country that just doesn’t have the resources to find you or track you down.)  Cost of living in a third world country per month 300 bucks if you don’t want to attract attention to yourself.  I hear Africa is dirt cheap and they have bandwidth.  &lt;br /&gt;9)      Finally you have you ingenious crack and your ready to unleash it on the world.  Buy one round trip ticket to Asia, you know there going to eat this Iphone alive, and deploy your malware.   So if you deploy 1 year after the release of the Iphone and there are an optimistic 2 million Iphones sold, all interconnected to the cloud, going to your site, or dialing your numbers,  at an conservatively imaginary .25 cents (US) an hour and you are able to run for 24 hours before Apple figures out the game is afoot and closes you down how much do you think you could make?  &lt;br /&gt;(2 Million Iphones) X (.25 cents an hour) X (24 hours) =  $12,000,000 ! &lt;br /&gt; Not bad for an investment of a few months time and just under $5000.00 (US).  What’s your price?  We all have one and 12 million is a lot of reasons to bring everyone that has been working on the Microsoft world to come over the fence and play.  One of the reasons Apple has been, well secure is that their hasn’t been the critical mass of targets needed to justify the risk, time, and cost.  Iphone has the potential to shift the paradigm and offer a target rich environment that could yield the kind of monetary incentives we are seeing as the principle motivating trend in the cracker community.  &lt;br /&gt;I hope apple is ready for the spotlight because if Iphone and Macs share the same platform any security flaw that is exposed on Iphone could be applied to the Mac and the population that depends on it.  &lt;br /&gt;Finally I shudder to think what will happen when these devices make it into the US Government space.  I am not aware of any single policy that deals with a device that has this level of connectivity in a single unit.  Governments around the world are going to have to meet this new level of integration head on if they are to understand and mitigate the risks that this devices posses to their information data processing environments. &lt;br /&gt;Sleep well knowing that somewhere out there are folks who have already dreamed this up and can&#39;t wait to get there hands on the Iphone not because it is shinny and cool but because they see a ton of money waiting to be taken.</description><link>http://thedarkarts1297.blogspot.com/2007/10/apples-time-to-take-spot-light-may-not.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item></channel></rss>