Reporting vs. Publicity
31-Jan-04
Courtesy of :
” Remember, journalism is what somebody doesn't want you to print. Everything else is publicity. “
-Jim Hall, Beginning Reporting
Live forever or die trying
Courtesy of :
” Remember, journalism is what somebody doesn't want you to print. Everything else is publicity. “
-Jim Hall, Beginning Reporting
[From my lavalife profile]
My parents like to grill. Breakfast sausages. Pork chops. Hamburgers. Steaks.
Hearty meats, fit for the hearty Mormon couple they are.
In fact, they have a grill built into their counter. Underneath the grill, a mason jar collects fat drippings.
When I went home for Christmas, I wanted to help out in the kitchen, and I noticed the grease jar was full. It seemed a waste to throw out such a rich source of calories.
So I mixed it with dog food, and gave the mixture to my parent's Great Dane “Weezer”.
She loved it.
Have you ever seen a pool of vomit four feet in diameter?
I have.
Feeding a Great Dane with a delicate stomach half a quart of beef fat was not my greatest decision ever.
So what does this have to do with dating? Well, you see, dating is risky. And costly. I'm a guy, so my numbers may be off here, but I'm guessing you might spend $40.00 for a haircut, $100.00 for a new outfit.
And for what?
Maybe a date that makes you feel like “Weezie” after eating that beef fat.
I'm happy to report that none of my dates has vomited. But aside from not inducing nausea, what else can I offer?
First of all, I'm a junkie. Every day I shoot up with the good stuff: NPR, Instapundit, Livejournal, Slashdot, Flutterby, Marginal Revolution. If you're an infojunkie too, I'd be happy to share my rig with you.
Second, I once made a meatloaf that was compared to pate. From a recipe off of a saltine cracker box. Unfortunately, I've lost the recipe. But I'm sure, given time, I could reproduce it.
Third, I have a very juvenile sense of humor. Bodily functions are funny. If you like booger jokes, I'm the man for you.
So if any of this intrigues you send me a note–I'd love to meet you. I promise not to feed you beef fat.
Courtesy of :
7:55p
Spring 2004 Booksale
The Wake County Public Libraries' annual fall booksale has been rescheduled for the Spring. Over 300,000 books will be available at this popular annual event.
Location:
Raleigh Office Supply Company
712 Tucker Street
Raleigh, NC 27603
(near St. Mary's College)
Hours:
Thursday, March 25 6:00 p.m. – 9:00 p.m.
Friday, March 26 6:00 p.m. – 9:00 p.m.
Saturday, March 27 8:00 a.m. – 9:00 p.m.
Sunday, March 28 10:00 a.m. – 6:00 p.m.
Prices:
Thursday and Friday evenings – hardbacks $4.00 paperbacks $1.00
Saturday – hardbacks $2.00 paperbacks $.50
Sunday – boxes $5.00 bags $2.00
Sigh. Sometimes I wax nostalgic for the fiscal conservatism of the Clinton presidency..
“President Bush will seek a big increase in the budget of the National Endowment for the Arts…Administration officials, including White House budget experts, said that the president would propose an increase of $15 million to $20 million for the coming fiscal year, which begins Oct. 1. That would be the largest increase in two decades and far more than the most recent increases approved by Congress, about $500,000 for 2003 and $5 million for this year….”
Audiobooks.org
I haven't tried any of these yet, but Audio Books For Free has, well, free audiobooks.
Bruce Horn, one of the co-founders of Marketocracy (the company I work for), was interviewed by Adam Engst, editor of TidBITS.
The Mac at 20: An Interview with Bruce Horn
——————————————-
by Adam C. Engst
Twenty years of Macintosh. At this year's Macworld Expo, Steve
Jobs played a version of the famous “1984″ ad that launched the
Mac, and Alan Oppenheimer, who was responsible in large part for
AppleTalk, gave a fabulous talk about the history of networking on
the Mac. What I found most interesting was that although twenty
years have passed, many of the original people from those days are
not only still around, they're still producing great work. The
history of the Macintosh is not only still being written, some
of the same people are still doing the writing.
Let me introduce you to another member of the original Macintosh
team, Bruce Horn, who was responsible for a number of the key
aspects of the Mac and who has continued to write innovative code.
At Apple, Bruce was responsible for the design and implementation
of the Finder (oh, that!), the type/creator metadata mechanism for
files and applications, and the Resource Manager (which handled
reading and writing of the resource fork in files; a note in
Apple's technical documentation at one point exclaimed, “The
Resource Manager is not a database!”). The Dialog Manager and the
multi-type aspect of the clipboard also appeared thanks to Bruce's
ingenuity.
So, to commemorate this 20th anniversary of the Macintosh, I
wanted to talk with Bruce about not just what he did at Apple, but
also what he's up to now, since in many ways, his current work is
both a return to his roots and a glimpse at what might be possible
with the Macintosh in the future.
* Adam: Bruce, many of the aspects of the original Mac that you
worked on revolve around accessing structured data. The Finder was
a front end to the filesystem; the Resource Manager, despite that
note in the documentation, was a bit like a flat-file database;
and type/creator codes were metadata that were just screaming to
be used by a database. To what extent was all that planned, or did
you just come to these solutions as you were working?
Bruce: Several different goals drove me to these solutions. Having
had most of my programming experience in Xerox's Smalltalk
environment, where you could change anything you wanted at runtime
(changes made while the program was running), I was looking for
a dynamic way to handle objects in the system so data such as
localizable strings, menus, images, etc. could be modified by
non-programmers without recompiling the source code. At the same
time, I was realizing that the kind of data that I needed to
manage with the Finder – icons for applications and documents,
and bindings to those icons – needed the same sort of mechanism,
and I wanted a unified solution. So the Finder's Desktop Database
was the driver for much of what the Resource Manager ended up
providing.
The file metadata also was driven by Finder needs. Early on I
realized that to provide a double-click-to-open mechanism for
documents, I'd need a simple way to link a document to a default
application that would open it. Similarly, since multiple
applications could open multiple file types, I couldn't just have
a single mapping from a type to an application that would handle
all files of that type. Thus the separation of the type code
(the actual format of the file) and the creator code (the default
application, which could be easily changed). Independent type and
creator codes stored in the filesystem also enabled us to avoid
polluting the filename with type information, which I felt was
a significant advantage of our approach over others.
The Desktop Database was a cache of the bindings between types and
creators and the icons representing them, stored as resources.
Since application bundles – groups of resources tied together
describing document type and icon information – were stored in
application resource forks, installing an application simply
involved copying the appropriate resources from the application
into the Desktop. The redundant information – type and creator
information in the directory, and bundle information in
application resource forks – made it possible to rebuild the
database at any time without losing anything. It turns out
that this was important in the early days.
Resources were, of course, heavily used in factoring out non-
program data (like menus and text strings) that could be localized
to different languages. With ResEdit, this allowed language
experts to quickly create versions of an application without
needing access to the source code.
Once I was able to convince Andy Hertzfeld of the utility of the
Resource Manager, he rewrote most of the Toolbox to take advantage
of it, which saved significant space in the ROM and gave us the
ability to easily localize applications in a general way.
* Adam: So Mac OS X's reliance on Unix-style filename extensions
for mapping documents to applications is something of a step
backward, then?
Bruce: Yes and no. The original rationalization behind this
was that Mac OS X needed to be compatible with Windows filename
conventions, and to do so we'd need to force filename extensions
to be provided. Because there are so many places that a file might
leave the sanctity of the Mac OS and go out into the cruel world
where extensions are required, it was deemed impossible to
translate names from the Mac convention (with types and creators)
to the outside world's convention. As far as compatibility is
concerned, this did the trick.
But over time it has become apparent that it is difficult to do
this right, and the original mechanism of having redundant type
information, and allowing the user to name the files whatever she
wants, was more flexible and less prone to error. It turns out
that Mac OS X still needed a creator mechanism by which individual
documents could be opened by specific applications, so this
information is stored in the resource fork of the file (of all
places, since Apple is discouraging use of the resource fork),
rather than simply in a creator code.
So the filename extension approach has worked, but with a little
less elegance than the original.
* Adam: Why didn't you go all out and create a system-level
database to handle all this data in the original Mac? Was it
a horsepower issue, or were the software problems too tricky
at the time?
Bruce: It would have been nice. I had some ideas in mind, but when
it came down to fitting it in the 64K ROM, the Resource Manager
was all we could fit. It was a real effort on everyone's part to
make code as small as possible. The Resource Manager was 3K, and
the Finder 46K – amazing considering the size of applications
these days!
* Adam: When did you leave Apple, and what caused your departure?
Bruce: I left Apple in the spring of 1984, after doing a “final”
version of the Finder. I guess I was just looking for something
new to do: having spent several years working intensively on the
Mac, I was ready for a break. Being on the Mac team, working with
absolutely tremendous people, was one of the most significant
things I've done, and it still gives me wonderful feelings when
I think about those times.
* Adam: Can you give us a quick rundown of where you worked after
Apple? Were there any common threads among the various projects?
Bruce: After Apple I went to Adobe and worked a bit on a variety
of small projects, including a LaserWriter spooler. When I was
there I met a couple of Carnegie Mellon grad students, and, to
make a long story short, they convinced me that I should go to CMU
for graduate school (Chuck Geschke, one of the founders of Adobe,
was also a CMU Ph.D.) Grad school was a great experience. I spent
some time at the University of Oslo, Norway as a research
assistant, did some consulting at Apple now and then, and had
a chance to work with some intriguing startups while I was a
student. My Ph.D. thesis described the design of a constraint-
based object-oriented programming language called Siri, which
I'd love to re-implement someday.
After graduating I went back to Apple as a consultant in the
Advanced Technology Group and worked on a project called LiveDoc
with Tom Bonura and Jim Miller, among others. LiveDoc was an
experiment in automatically structuring documents so that various
recognizers could determine that, for example, 555-1212 was a
phone number and 124 Main Street was an address, and provide
contextual actions on those items. It was a lot of fun, and I
wish I had LiveDoc today in Mac OS X. Simson Garfinkel's SBook
provides some of these features as a PIM application.
But none of these projects really addressed the problem I wanted
to solve, which was: how can I design an information browser that
works with all types of data, from email messages to images to
music files to documents, and provide a unified mechanism for
organizing, searching, and viewing this information?
I began the iFile project in 1997 to do this, and worked on it for
a couple of years before putting it on the back burner to start my
other company, Marketocracy, where I've been since the middle of
1999.
Marketocracy is a mutual fund company that I co-founded with my
business partner Ken Kam. Our team built a Macintosh-based Web
site running WebObjects and a FrontBase database to allow over
50,000 people worldwide to buy and sell stocks in real time (but
with fake money) to create a model stock portfolio. We provide a
wide variety of tools to help our users to become better portfolio
managers, and by watching their performance over time and ranking
them, we can find the best people in the world to run our funds.
Our Masters 100 Fund, based on the top 100 in our community, has
been running for over two years now and has surprised even us with
its impressive performance and low risk. It has returned over 39
percent since inception when the market has been essentially flat,
and with a beta of 0.47 – half as risky as the market!
* Adam: What are you working on now?
Bruce: Recently I've picked up where I left off in 1999 with iFile
(just a codename for now). iFile is a unified desktop information
browser, like the Finder, but with significant architectural
improvements. It is based on an object-oriented database of my own
design that provides a general way for linking together and
organizing objects of all types. The basic unit of organization is
called a “collection,” which is distinct from a folder in that an
object may exist in many collections but in only a single folder.
Collections are like iPhoto albums or iTunes playlists, but they
can contain anything: text files, images, email messages, music
files, contacts, notes, appointments, and so on. While this sounds
a bit like BFS (BeOS Filing System) and the BeOS Tracker combined,
it is much more general and can be used on any filesystem with the
appropriate drivers.
The obvious first application for the iFile technology was
in photo organization, an area in which iPhoto does quite well
already. However, iFile provides more capability in organization
by image metadata (it currently keeps track of 46 different
pieces of metadata for each image), and it should scale much
more smoothly for large collections than iPhoto. But iFile is
not simply a photo manager: it is a general purpose information
browser that can be used in a variety of ways, and can easily
integrate different information sources, such as PIM, email, and
music, among other data types. I think the version of iFile that
I will release publicly will provide much more capability in
those domains.
* Adam: Is it fair to describe iFile as the Finder you'd write
today?
Bruce: Possibly. I think it is much more ambitious than I had
originally intended. If I can eventually get it scaled down to
a level where new users can understand it quickly, it might be
a nice alternative to the Finder.
* Adam: Have you shown it to people at Apple? What did they think?
Bruce: Back in 1999 I showed it first to the Finder group, then
to Avie Tevanian, and finally to Steve Jobs. I think that Apple
was strongly focused on solving the problems of getting Mac OS X
out the door as soon as possible, and looking at an alternative
Finder was low on their priority list. I believe they were
intrigued but had already committed to a different direction,
and couldn't turn the ship in time to take advantage of the
iFile technology. Given the history of Mac OS X, I think they
made the right decision.
* Adam: Let's look at iFile more deeply. There are two aspects to
any filing system, getting data in and displaying that data to
the user. How would someone get data into iFile?
Bruce: The current version of iFile requires the user to specify
the folders that the user would like iFile to track; this is done
by dragging the folders into the iFile workspace window. Once this
is done, iFile tracks any changes to the contents of the folders
and automatically updates the database as required. For example,
the user can drag in the Pictures folder and be able to browse all
the images, create collections, etc., without actually copying any
files or moving any data. iFile respects your directory structures
and never modifies anything directly, in contrast to iPhoto, which
copies images into its own directory hierarchy.
The release version of iFile will not require the user to request
that certain folders be scanned. Instead, iFile will initially
provide a view on the user's home directory, and will scan the
files and folders in the background automatically.
* Adam: Good! The less work users must do, the better. In fact,
one of the main problems with any filing system is that few people
put enough effort into categorizing and managing their data to be
able to find things later reliably. Can iFile automatically
categorize files based on metadata and content?
Bruce: Yes, it can. Collections are a way to automatically
categorize files by their properties. Because iFile maintains
file metadata in the object database, it can search and sort
through the metadata very quickly to return the appropriate
files. Collections are also “live”: specifically, if files
appear on the disk that match a collection's specification,
they will be automatically added to that collection, regardless
of whether the collection is currently being viewed. One can
imagine all sorts of interesting AppleScript scripts that could
be triggered based on these events.
Collections also collect files based on their content. Rather than
searching for individual words as Google does, collections search
for key phrases: a word or a sentence. Files that contain any of
the key phrases specified in the collection are automatically
gathered into that collection.
So, what collections do is provide a new way to slice-and-dice the
information you already have in a different way, without requiring
you to import your data or commit to a completely new
organization.
* Adam: What do you think about adding a capability along the
lines of a Bayesian classifier that would evaluate the contents
of a file statistically, much the way some spam filters or the
email classifying program POPfile work? That could reduce the
user's effort even further.
Bruce: That is a great idea and has been discussed for quite some
time. In fact, Apple had worked on a project that was based on
this idea. Piles were automatic groupings of files based on their
content:
One of the challenges here is to determine an appropriate
similarity function: how do you decide what the collections should
be a priori, to avoid the problems of hundreds of collections,
each with one file, or a small number of collections with
thousands of files? That will take some work.
* Adam: What does iFile do on the display side? Can users create
their own “smart folders” (a bit like smart playlists in iTunes)
that automatically show files that match a specific query?
Bruce: Absolutely. A collection is essentially a smart folder,
with a query specification. For example, it is easy to create
a collection that groups together all the images taken by a
particular model camera by specifying “ is '2500' and
is 'Nikon'”, since that data is available in the EXIF
metadata for the image. Similarly, metadata such as ID3 tags for
music; image data such as resolution, width, and height; file data
such as filenames, creation and modification dates, and sizes; and
so on are all stored in the database for object retrieval and
organization.
So collections actually have three mechanisms for grouping:
manually via drag-and-drop; automatically via metadata query
specification; and automatically via key phrase match.
* Adam: iFile's architecture sounds tremendously appealing, but
I suspect the devil is in the details, and thus in the interface.
Does iFile stick with the current file/folder metaphor (despite
the terminology shift to collections), or does it offer a
rethinking of how we interact with our data?
Bruce: You are right that the devil is in the details. I'm
currently working on how to present all this information in an
appropriately intuitive fashion, and I think I'm getting closer,
but there is still clearly work to do.
iFile begins with the traditional, icon-based file and container
organization (containers being either folders or collections),
but goes further with a variety of different views and layouts.
Many of the layouts provide preview views of the contents of
the files, and in the case of text files, iFile automatically
creates hyperlinks to related collections from within the text.
It's difficult to explain, but once you use iFile you'll find
that some of the views do in fact provide you ways to view your
data from different perspectives.
The more you provide iFile with information regarding how you want
to see your data, via defining collections, the more it can help
you by cross-indexing and showing relationships where they were
not clear before.
* Adam: Are some of the things you're attempting in iFile beyond
what many users can understand? Lots of people just want to be
told what to do, and something with iFile's flexibility might
be lost on them unless it was able to watch their actions and
automatically build collections.
Bruce: I agree that iFile can be somewhat intimidating to new
users: there are a lot of different things that iFile can do,
and there needs to be more immediate gratification when using it.
Creating collections automatically is a good approach, and by
creating useful collections based on not only images but documents
and email, I think that the power of the technology will become
more apparent. I'm planning on implementing some of this in the
next few months, so stay tuned! For anyone interested in this
technology who would like to be contacted when there is a public
version available, sign up at the site below, and I'll keep you
up to date. I'd be happy to go into detail about the release
version in a future issue of TidBITS.
* Adam: Bruce, thanks for taking the time to chat with me, and
we're all looking forward to seeing what you come up with iFile.
Who knows, perhaps now that Apple has stabilized Mac OS X, they'll
be interested in looking at what you've done again.
http://www.securityfocus.com/cgi-bin/sfonline/columnists-item.pl?id=215
[If its good enough for the FBI Computer Crime Squad, its good enough
for you! http://www.amazon.com/exec/obidos/ASIN/B0000U9H40/c4iorg -WK]
By Scott Granneman
Jan 21 2004
Well, it finally happened. Right before Christmas, I had a little
visit from the FBI. That's right: an agent from the Federal Bureau of
Investigation came to see me. He had some things he wanted to talk
about. He stayed a couple of hours, and then went on his way.
Hopefully he got what he wanted. I know I did.
Let me explain. I teach technology classes at Washington University in
St. Louis, a fact that I mentioned in a column from 22 October 2003
titled, “Joe Average User Is In Trouble”. In that column, I talked
about the fact that most ordinary computer users have no idea about
what security means. They don't practice secure computing because they
don't understand what that means. After that column came out, I
received a lot of email. One of those emails was from Dave Thomas,
former chief of computer intrusion investigations at FBI headquarters,
and current Assistant Special Agent in Charge of the St. Louis
Division of the FBI.
Dave had this to say: “I have spent a considerable amount in the
computer underground and have seen many ways in which clever
individuals trick unsuspecting users. I don't think most people have a
clue just how bad things are.” He then offered to come speak to my
students about his experiences.
I did what I think most people would do: I emailed Dave back
immediately and we set up a date for his visit to my class.
It's not every day that I have an FBI agent who's also a computer
security expert come speak to my class, so I invited other students
and friends to come hear him speak. On the night of Dave's talk, we
had a nice cross-section of students, friends, and associates in the
desks of my room, several of them “computer people,” most not.
Dave arrived and set his laptop up, an IBM ThinkPad A31. He didn't
connect to the Internet – too dangerous, and against regulations, if I
recall – but instead ran his presentation software using movies and
videos where others would have actually gone online to demonstrate
their points. While he was getting everything ready, I took a look at
the first FBI agent I could remember meeting in person.
Dave is from Tennessee, and you can tell. He's got a southern twang to
his voice that disarms his listeners. He talks slowly, slightly
drawling his vowels, and it sort of takes you in, making you think
he's not really paying attention, and then you realize that he knows
exactly what he's doing, and that he's miles ahead of you. He wears a
tie, but his suit is ready to wear and just a bit wrinkled. His dark
hair is longer than you'd think, hanging below his collar, further
accentuating the country-boy image, but remember, this country boy
knows his stuff. All in all, he gives off the air of someone who's
busy as heck, too busy to worry about appearances, and someone who's
seen a lot of things in his time.
A-cracking we will go
Dave focused most of his talk on the threats that ordinary computer
users face: what those threats are, who's behind them, and why they
exist. He spent quite a bit of time talking about the intersection of
Trojans and viruses. He started by showing us how easy it is to create
a virus, using one of several virus creation wizards that can be
easily found on the Net (of course, real men and women write their
own).
More and more, however, the viruses circulating on the Internet are
quite purposeful in design. The goal is to install a Trojan on the
unsuspecting user's machine that will then allow the bad guy to
control the machine from afar, turning it into a Zombie machine under
the control of another. All too often, this tactic is successful.
Hundreds of thousands if not millions of machines are “owned” by
someone other that the user sitting in front of the keyboard and
monitor.
These Trojans are often the ones that security pros have been watching
for years: SubSeven, Back Orifice, and NetBus. A lot of the time,
script kiddies are the ones behind these Trojans, and they do the
usual stuff once they have control of a user's PC: grab passwords, use
groups of machines to organized DDOS attacks (often against other
script kiddies), and jump from machine to machine to machine in order
to hide their tracks.
What surprised me, however, were how often Trojans are used to mess
with the heads of the poor unsuspecting suckers who own the zombie
machines. A favorite trick is to surreptitiously turn on the Webcam of
an owned computer in order to watch the dupe at work, or watch what
he's typing on screen. This part isn't surprising. But Dave had
countless screenshots, captured from impounded machines or acquired
online from hacker hangouts, where the script kiddie, after watching
for a while, just can't help himself any longer, and starts to insult
or mock or screw with the duped owner.
In one, a hacker sent a WinPopup message to a fellow: “Hey, put your
shirt back on! And why are you using a computer when there's a girl on
your bed!” Sure enough, the camera had captured a guy using his
computer, sans shirt, and in the background you could clearly see a
young woman stretched out on a bed.
In another, a man was working a crossword puzzle online when the
hacker helpfully suggested a word for 14 Down (I think it was
“careless”), again using WinPopup. In a third, a screenshot captured
the utterly shocked expression on a man's face – mouth agape, eyes
open wide in amazement – when his computer began insulting him using,
you guessed it, WinPopup.
This is bad enough and it's also cruelly funny, but the scary part
came in when Dave started talking about the other group behind the
explosion of viruses and Trojans: Eastern European hackers, backed by
organized crime, such as the Russian mafia. In other words, the
professionals.
These people are after one thing: money. The easiest way to illegally
acquire money now is through the use of online tools like Trojans, or
through phishing: set up a fake Web site for PayPal or eBay or Amazon,
and then convince the naíve to enter their usernames, passwords, and
credit card information. Viruses and spam also intersect in this nasty
spiderweb. Viruses help spread Trojans, and Trojans are used to turn
unsuspecting users' computers into spam factories, or hosts for
phishing expeditions, and thus furthering the spread of all the
elements in this process: viruses, Trojans, spam, and phishing. It's a
vicious cycle, and unfortunately, it appears to be getting worse. The
FBI is working as hard as it can, but the nations of Eastern Europe
are somewhat powerless to solve the problem at this time.
One way to trace just how bad the situation has gotten: track the
price for a million credit card numbers. Just a few years ago, Dave
saw prices of $100 or more for a million stolen credit card numbers.
Now? Pennies. Stealing credit cards is so easy, and so rampant, that
prices have dropped precipitously, in a grotesque parody of capitalist
supply and demand.
Along with this comes intrusions into banks and other financial
institutions. Dave wouldn't name names, but he said several
organizations that we would all know have been infiltrated
electronically by Eastern Europeans, who then grab customer data. A
few days later, the unsuspecting president of the bank gets an email
demanding $50,000, or else the media will be told of the break-in. Of
course, the break-in is news to the bank. As proof of their exploit, a
spreadsheet is attached to the email, with a few hundred rows of
client data: bank account numbers, home addreses, balances.
Unfortunately, many banks decide to keep it all a secret from their
customers, so they reluctantly decide to go ahead and pay the
extortion. $50,000 goes to the criminals, and the bank breathes a sigh
of relief.
Three days later, ten emails arrive, from ten different criminal
organizations, each demanding $25,000. Ooops. Far from buying
protection, the bank revealed itself as a easy mark, amenable to
blackmail. And it will only get worse. Time to call in the FBI, as it
should have done from the beginning.
American companies have tried to respond to the massive fraud being
perpetrated online. One common preventive, adopted by most companies
that sell products online, has been to refuse shipments outside of
North America, or allow international shipping, except for Eastern
Europe. Criminals have figured out a way around this, however. They
hire folks to act as middlemen for them. Basically, these people get
paid to sit at home, sign for packages from Dell, Amazon, and other
companies, and then turn around and reship the packages to Russia,
Belorussia, and Ukraine. You know those signs you see on telephone
poles that read “Make money! Work at home!”? A lot of that “work” is
actually laundering products for the Russian mob. Of course, anyone
caught acting as a middleman denies knowledge of their employer: “I
had no idea why I was shipping 25 Dell computers a day to Minsk! I
just assumed they liked computers!”
Proof once again that social engineering, coupled with greed, is the
easiest way to subvert any security.
Some surprises
Dave had some surprises up his sleeve as well. You'll remember that I
said he was using a ThinkPad (running Windows!). I asked him about
that, and he told us that many of the computer security folks back at
FBI HQ use Macs running OS X, since those machines can do just about
anything: run software for Mac, Unix, or Windows, using either a GUI
or the command line. And they're secure out of the box. In the field,
however, they don't have as much money to spend, so they have to
stretch their dollars by buying WinTel-based hardware. Are you
listening, Apple? The FBI wants to buy your stuff. Talk to them!
Dave also had a great quotation for us: “If you're a bad guy and you
want to frustrate law enforcement, use a Mac.” Basically, police and
government agencies know what to do with seized Windows machines. They
can recover whatever information they want, with tools that they've
used countless times. The same holds true, but to a lesser degree, for
Unix-based machines. But Macs evidently stymie most law enforcement
personnel. They just don't know how to recover data on them. So what
do they do? By and large, law enforcement personnel in American end up
sending impounded Macs needing data recovery to the acknowledged North
American Mac experts: the Royal Canadian Mounted Police. Evidently the
Mounties have built up a knowledge and technique for Mac forensics
that is second to none.
(I hope I'm not helping increase the number of sales Apple has to drug
trafficers.)
The biggest surprise was how approachable and helpful Dave was to
everyone in the room. According to Dave, the FBI has really made
reaching out to the local communities it's in more of a priority.
Since the September 11th attacks, the FBI has shifted its number one
focus to preventing terrorism, but the number two priority remains
preventing and capturing crimes based around technology. In order to
best achieve both goals, the FBI has been working hard to reach out to
American citizens, and Dave's talk to my class was part of that
effort.
I'm a civil libertarian at heart, and that brings with it an innate
mistrust of governmental authority – power corrupts, after all. But
I'm glad people like Dave Thomas are in the FBI. He's a good man, and
he has a good understanding not just of technology, but also of the
complexities of the moral and ethical issues surrounding technology in
our society today. He did a great job enlightening my students, and he
really made the FBI sound like a pretty cool environment for people
interested in pursuing security as a career. My advice: call your
local FBI and see if they won't come visit your class, or Users Group,
or club. I guarantee you'll learn something.
Scott Granneman is a senior consultant for Bryan Consulting Inc. in
St. Louis. He specializes in Internet Services and developing Web
applications for corporate, educational, and institutional clients.
I lost my cell phone on the plane over the Christmas holidays. So I decided to buy a Treo 600, primarily because I wanted to listen to books-on-tape (purchased from Audible.com), without having to buy and carry yet another device in my pocket.
Unfortunately, although Audible.com content plays on Mac OS X, and plays on Treo 600, you can't currently transfer them from Mac OS X to Treo 600. Damn DRM! Anybody know of a good way to rip Audible.com content to unencumbered MP3? Or a good source of non-DRM audiobooks?
…my ex-girlfriend Robin accused me of being a lesbian.
– I like Indigo Girls, Melissa Etheridge.
– I wanted to buy a Honda Rebel motorcycle.
– My “type” are tomboys. I like women with small breasts, short hair, muscles, traditionally “masculine” clothes such as jeans, workboots, leather jackets. (“Maggie”, the character played by Janine Turner on Norther Exposure is close to my physical ideal).
– A high percentage of women I've attempted to flirt with turned out to be lesbians.