Tuesday, December 28, 2010

Net Neutrality

Again, it's been in the news for a while and talking heads just DON'T GET IT. Which is no surprise, they aren't paid to get it. They're paid to push Snapple. So I wrote my congressman, to make it pretty clear what the issue is, as I'm sure they aren't fully aware. To be clear, this isn't a slight on politicians, but ask a lawyer you know what they know about net neutrality and you'll get a good idea how most congresspeople see the issue.
--

Congressman,

I know something as misunderstood as Net Neutrality is getting a lot of talk time with the pundits du jour, but I feel obligated to voice my concern. I understand the largest concerns being voiced are those of the largest "people" Google on one side and ATT on the other. The thing to be aware of here is that Google seems to be on the side of the people in this. They hold more fiber than any other entity in the United States.

The people of the US are already subject to traffic shaping and prioritization by their providers. This has been a well known fact by those of us in the industry who have to manage these devices. Netflix, Hulu, Amazon's digital download services (and soon Google TV) are threatening current content providers business models. This is to be accepted, as the Internet is still evolving the way we do business. The problem is the content providers also own the cables that run into our home. To use a bad analogy, the tubes are being squeezed into two different sections: the one the providers offer and the one they don't. If they aren't able to monetize the traffic they are putting it at a lower priority to your home.

The difficulty here is, some prioritization is good. For instance if you buy your phone service through this provider, you want the phone calls to come through even if your family is watching a TV show. But since there is no regulation in this area, there's no difference to the end users if the provider does the same thing to their Movie Service (TM) over Netflix or Hulu. This is clearly an abuse over the local monopolies we the American people have allowed the providers to hold.

As a congressman from the Tech State, I would hope you have heard from many people in this regard and work with your peers to present a rational (and easily understood) front to this threat to our digital democracy.
--

I'd urge many to do the same, as the more people advertising this the better. We, the American People, need to make sure our representatives understand our concern. We don't have a lobby that does it for us.


Monday, August 2, 2010

So you think your information has been compromised?

Here’s a quick cheat sheet on how to protect what you can.

  1. Pull out your emergency visa gift card.
    ( 50 dollars minimum Must not expire after 2017 or it won’t work on Experian, you can buy this at most retailers for $55!! Though the form submission post allowed for the value to be set to 2019 and my Target Gift Card validated. )

  2. On a hard line call your credit card companies and put a freeze on your accounts.

  3. On a hard line call your bank and report your cards lost.

  4. Get on Equifax’s website, enable a freeze.
    (https://www.freeze.equifax.com/ as of 08.02.2010)
    It costs an average of $10.

  5. Get on Transunion’s site and enable a freeze. (https://annualcreditreport.transunion.com/fa/securityFreeze/landing)
    It costs an average of $10.

  6. Get on Experian’s site and enable a freeze.
    (https://www.experian.com/freeze)
    It costs an average of $10.

  7. Call your office and deactivate any badge codes or accounts you think may be compromised with the information in your wallet.

  8. The next day: Don’t forget, your license was in your wallet/purse too get it reissued and get a temporary or the added irony of getting pulled over and cited could be added to your list of inconveniences.



Your personal information is now protected against the larger credit companies and most large purchases. What this means is, you will now be protected from transactions that require a credit history look-up, since any attempt to view that data will fail. With the only downside being if you are filing for a loan you will need to release the credit freeze at the additional cost. The other bit to note is any accounts that have been opened before you lost control of your information will also be at risk, so make sure you contact those agencies (your phone company, utility companies, credit unions, insurers and make sure to set up security pins separate from any other data that your future identity attackers (it’s not a thief if they affect you forever) will use.

And yeah, I spent a week and a half at security conventions plus training in Vegas, and lost my wallet the day I got home. Loki loves to give me irony in large doses apparently.

Saturday, July 31, 2010

Cyber is the New Domain, but please don't turn off the lights

So this was triggered by reading the crappy article over at the inquirer, I sent them the full text of this before I posted it and even gave them 3 days to fix the article. So here's the real deal and I hope I didn't fuck anything up.

This little blurp is a watered down misinterpretation of the keynote. What Hayden actually said was nothing of the sort. His words were profound and direct. Very much with a purpose, and though he is no doubt used to being misrepresented in the news I cannot believe that this site would do such a terrible job of follow-up.

Let me reiterate his speech, and perhaps your author will learn to be more direct and less sensational.
--
I attended Black Hat as part of furthering my training as an IT Professional and with the added benefit of sitting in on some excellent, and not so excellent, briefings.

One highlight of the two day briefings was the second Day's keynote presented by Former Director of the CIA, General Hayden. Hayden began by explaining his former positions and his involvement in the US Government's CyberCom. His explanation, and breakdown of the roles the US, and truly all nations, are facing is thus:

The existing domains (as the military establishment terms land, sea, air, and space) are deeply understood by those involved. The newest domain, cyber, is almost as much a new dimension as it is a domain. Any action that effects the cyber domain, cannot (by virtue of it's multi-domain nature) go without making 'something in another domain go pop.'

The Cyber domain has requirements similar to the other four, it must be defended against infiltration and hardened against malicious attackers. It is also fair game for internationally accepted espionage practices, data gathering if you will. And finally, it is a domain to be considered when attacking one's enemies in time of war.

This is not to say that there should be no boundaries, he seemed to be fully of the belief that there are areas of the cyber domain that should be off limits to disruptive activities. For instance, when speaking of the power infrastructure he described the troubles governments have in attacking an enemy. If there is an armed conflict and a nation wishes to bring the power infrastructure down utilizing the cyber domain they had to have been within those systems BEFORE the fighting occurs.

This creates an interesting dilemma when looking at it on the world stage. Because of the nature of the beast, attackers must penetrate and reside on these systems perpetually. And when thinking of many nations all in different levels of "possible" armed conflict in the "future" that would mean these systems in many nations would be a battleground for multiple nations agents attempting to maintain control.

General Hayden made the correlation with chemical weapons being banned with the Geneva Protocol. This particular tenant was truly the only piece he mentioned as being 'off-limits' and truly only in the concept of preemptive system residence. Much to the dismay of some of the security professionals I spoke with later that day.

We will be in for an interesting future, seeing that now the US military establishment has taken full notice of the added dimension the Cyber domain has created for us all. It's only a matter of time before most other nations begin doing the same, Russia, China and the other G8 nations are notable examples of this. One thing is for certain, more are sure to follow.
--
I couldn't see him arguing against the use of the cyber domain to orchestrate attacks during armed conflict, as this is a large part of the CyberCom's stated mission:

"USCYBERCOM plans, coordinates, integrates, synchronizes and conducts activities to: direct the operations and defense of specified Department of Defense information networks and; prepare to, and when directed, conduct full spectrum military cyberspace operations in order to enable actions in all domains, ensure US/Allied freedom of action in cyberspace and deny the same to our adversaries."

I will be publishing this tomorrow, so if you'd like to correct this article before then I will make no reference to it.