There’s a new game in town
Mini ‘how-to’ Bluetooth/Wifi combo for Raspberry PI
Stick’em with the pointy end
Virtual and not so Virtual Space
Be Still my Bleeding Heart …
The Never-ending Privacy Battle
The Many Sides of Bitcoin
Cyber Jihadists
Hacker Gangs
The New Old War
The Sacred Executioner
Scripting Aphrodites
There’s a new game in town My first foray into role playing games (RPGs) wasn’t actually an RPG at all. Rather, it was a computer based word puzzle, “The Colossal Cave” aka “Adventure.” I stumbled upon this game during a computer job back in the late 1970s. The game was written in Basic and ran on a PDP-11. I spent hours […]
Mini ‘how-to’ Bluetooth/Wifi combo for Raspberry PI I recently purchased the Cirago USB Bluetooth/Wifi combo to use with my raspberry pi. All things considered, I am quite pleased. Being reasonably versed in google-fu, helped, of course. Since I want the freedom to do some mobile tinkering, I need to access the pi sans a lan. That, and my latest wild hair project […]
Stick’em with the pointy end Since I have been spending a great deal of my time playing in the field of 3D design and printing, I have only recently stumbled upon, and had time to read, “Privacy for Me and Not for Thee,” penned by Catherine A. Fitzpatrick, a human rights activist whom I first encountered in the virtual world […]
Virtual and not so Virtual Space Not long ago, someone asked if I liked 3D printing better than virtual worlds. The short answer is, equally but differently.
Be Still my Bleeding Heart … “Secure web servers are the equivalent of heavy armored cars. The problem is, they are being used to transfer rolls of coins and checks written in crayon by people on park benches to merchants doing business in cardboard boxes from beneath highway bridges. Further, the roads are subject to random detours, anyone with a screwdriver […]
The Never-ending Privacy Battle This brings me back to the Hundredpercent American. To some extent he is a pet of mine. I have always rather liked him, because he has some promising qualities. For instance, he has enormous hospitality. I used to feel personally complimented by the amazing warm-hearted hospitality showered on me by Americans. […] When I realized […]
The Many Sides of Bitcoin Pariah, darling, or somewhere in between. Bitcoin has continued to linger in the daily media spotlight since the shuttering of darknet’s black-market drug bazaar, Silk Road, and the subsequent announcement of the arrest of its alleged owner, Ross William Ulbricht (aka DPR), on October 2, 2013. Media mavens have long cast bitcoin as a sort […]
Cyber Jihadists “We’re facing a very great threat of loosely-coupled, organizational networks that increasingly rely on IT infrastructure to coordinate their movements and recruit young disenfranchised, apathetic guys as suicidal pawns in a sophisticated, dispersed movement. (…)” (AHM, Usenet, September 21, 2001)
Hacker Gangs Meet Jim Script Kiddie (skiddie). He is the guy (usually in his early to mid teens) who comes into a hacker forum, asking inane questions like, “how can I be a hacker?” He also tends to over-indulge in “hacker speak” making him look pretty much like a moron to seasoned (and not so) computer netizens.
The New Old War In 1956, FBI Director, J. Edgar Hoover initiated a program, code-named COINTELPRO (counter intelligence program) ushering in what would become the mainstay for how intelligence communities dealt with domesitic affairs. The sole directive of this program was “to expose, disrupt, misdirect, discredit, or otherwise neutralize” the activities of various dissidents and their leaders.
The Sacred Executioner In his book, “The Sacred Executioner,” Hyam Maccoby notes: “A figure in mythology that has received little attention is that of the Sacred Executioner. […] By taking the blame for the slaying, he is performing a great service to society, for not only does he perform the deed, but he takes upon himself the blame […]
Scripting Aphrodites On Wednesday, April 13, 2006, 10-year-old Jamie Rose Bolin was reported missing by her father. Investigators thought she may have been abducted by someone she met online. Oklahoma law enforcement suspected her abductor might be heading just across the border to Texas and requested Texas issue an Amber alert.
image There’s a new game in town
image Mini ‘how-to’ Bluetooth/Wifi combo for Raspberry PI
image Stick’em with the pointy end
image Virtual and not so Virtual Space
image Be Still my Bleeding Heart …
image The Never-ending Privacy Battle
image The Many Sides of Bitcoin
image Cyber Jihadists
image Hacker Gangs
image The New Old War
image The Sacred Executioner
image Scripting Aphrodites

The Never-ending Privacy Battle

This brings me back to the Hundredpercent American. To some extent he is a pet of mine. I have always rather liked him, because he has some promising qualities. For instance, he has enormous hospitality. I used to feel personally complimented by the amazing warm-hearted hospitality showered on me by Americans.

[…]

When I realized it, I began to say to myself, “This is not a recognition of my own particular merits. Nor is it quite a mania. There is something bigger behind it. An enormous social instinct must be seeking satisfaction through it.”

Then I considered your rage for publicity. An American has no sense of privacy. He does not know what it means. There is no such thing in the country.

George Bernard Shaw
The future of political science in America
Metropolitan Opera House, NYC
11 April 1933

In 1999, I attended the 4th Annual HTCIA Conference, whose international participants read like alphabet soup. Janet Reno was a keynote speaker. Her speech was primarily a diatribe against allowing the export of stronger encryption. Amazingly, over a decade later, US encryption regulations still only allows the export of products that support minimal encryption (i.e., 40 or 56-bit).

The 1999 conference took place in the fall in San Diego and the buzz among conference attendees was the FBI’s newly minted internet wiretapping program, code-named, , an offshoot of their previous 7-year-old program, Omnivore. The source code of the latter was obtained and released into the wilds shortly thereafter. A link to its location, posted to a hacker listsrv.

I had an opportunity to briefly review the code. At the time, I had just finished designing and implementing a cyber profiling tool suite which grew out of the need to help identify and locate people engaged in aggressive . As such, I was well aware of the challenges cyber profiling posed.

In reviewing the Omnivore code, I had little belief that its successor, , would accomplish the then stated goal. After all, Omnivore was rudimentary, something a high school sophomore might write in a coding assignment.  The premise was to trigger on a predefined list of keywords, storing flagged correspondence in a database for later examination. Otherwise put, the program was nothing more than a glorified .

It did not take someone well-versed in cyber profiling to recognize the uselessness of this implementation. People were soon adding the “obvious” keywords to their sigfiles: an electronic thumbing of noses to the US Government’s attempt to spy on netizens.

Interestingly, or perhaps, not so, I was one of a handful of civilians in attendance at the 1999 conference.  Meal seating arrangements landed me with various TLA government personnel, and our conversation strayed to the much whispered about . I thought it humorous that these men actually believed their program would help them to identify potential terrorist cells. Even with a program that could fill in a number of blanks, it still required a human to do intense and time-consuming real life investigation.

After explaining the intricacies of cyber profiling 101, a then Senior Special Agent handed me his card, asking me to contact him regarding the possible purchase of my tool suite. My response was likely inappropriate. I asked if the  actually followed up on all uttered threats against the president. Very solemnly, he responded, “Of course.” I was quite naturally thinking of off-the-cuff wise cracks, so the first thing that came to mind, “Wow, you must be really busy.” He was unsurprisingly unimpressed. I lost a potential sale. I was not and am not even remotely heartbroken.

In the midst of the public firestorm over the mass wiretapping efforts, Electronic Privacy Information Center (EPIC), a grass-roots self-appointed privacy watch-dog group, filed and received Carnivore documents under the FOIA. Carnivore was later renamed to DCS-1000, and eventually replaced with off-the-shelf software.

By 2009, the media was hyping , touting using real names as opposed to previously oft-used . The gullible public fell for what was basically a ploy by the social network companies to convince prospective users to sign up under their legal names. Thereby providing advertisers much sought after user data.

Data became the new gold, and data brokers, such as Spokeo, were the new gold miners, scraping data from the public facing profiles, where users shared their daily lives with complete strangers. These companies partnered with background investigation agencies, such as Intelius, creating a powerful tool for intruding upon people’s not-so-private lives.

In the meantime, government agencies jumped at the chance for doing their own form of data mining. One such example came in the form of a Persona Management RFP issued by the USAF. The primary gist was to create a means to generate fake, yet believable, Facebook personas that could be used to connect to, and monitor targeted individuals. Something of this nature would have little chance of succeeding, except collecting connections seemed to be the of the day. That is, the more connections, er, friends, a person could garner, the more they could tout how popular they were. As such, people accepted “friend invites” with wild abandon. True social butterflies, I suppose.

Then, there’s geolocation and the concept of checking-in. Whether it involves a wifi enabled device broadcasting its position to area routers as a user goes about their daily business, checking in at specific locations, including location data in pictures and posts, tracking web movement, or monitoring people’s movements in stores via the bluetooth enabled . As with social network data brokers, geolocation data brokers, such as simpleGeo have collected vast amounts of location data. Data to be added to the ever-growing data store on netizens.

Now, as then, perplexingly, the general public appears to be surprised that government agencies are still playing surveillance spy games. With a primary difference, people are handing them most of their information on a silver platter, via checking in, in conjunction with their daily, and sometimes hourly updates on . Add to this the increased sophistication of cyber profiling. For example, view something on Amazon, and see an ad for that item in a New York Times article. And lest we forget, location aware searching.

This isn’t to say government intrusion is okay, rather, to highlight the ways in which various internet companies are making it easy for them to do so. Otherwise put, to effectively fight the privacy battle, requires demanding changes to online privacy laws, and the ways in which companies are allowed to track users, as well as changing sharing habits. While at the same time repealing that allowed wide-spread government snooping in the first place.