An article was released two days ago in the New York Times regarding the loss of a computer hard drive containing a terabyte of confidential computerized data. The hard drive contained vital information attaining to former President Clinton and former Vice President Gore. The hard drive was said to also contain personal information about one of the three Gore daughters as well as numerous other people who visited or worked at the White House. Some of the compromised data included social security numbers and home addresses and who knows what else is on the hard drive. A terabyte is a lot of memory and there could be millions of pieces of confidential information that can possibly destroy lives if in the wrong hands. Security procedures used by the Secret Service at the White House during Clinton's term was also stored on that hard drive and now puts the entire White House security system at risk.
Federal authorities are looking into the apparent breach at a National Archives record center and an extensive investigation is already underway to find the vital hardware. Investigators do not yet know as to whether or not the drive was stolen or simply misplaced, but immediate efforts are being made to recover the hard drive as soon as possible, as many people are left vulnerable until the hard drive is secured. But even then, if someone actually did steal the hard drive and say investigators found it, who is to say that the perp did not make a copy or download all the information onto their computer or separate hard drive. There are so many possibilities that a computer hacker could do with a hard drive containing such valuable and confidential information as this one. The FBI is looking into the matter as well in case it is a criminal act then they will have to get involved because it is federal property. Something tells me that the hard drive was stolen because I don't just see how a piece of equipment that expensive and important gets misplaced. If it was stolen then security measures better be looked at closely and improvement must be made immediately because that is just unacceptable, especially for a government agency. Their access control system and CCTV systems should be thourohgly examined and inspected to make sure they are working properly and if not they must be fixed immediatlely.
Thursday, May 21, 2009
Driving While Texting
Instead of driving and talking on cellphones, the new thing is driving while texting and it is very dangerous. Research has shown how frequent people drive and text and the statistics are very believable as I constantly find myself texting and driving. Studies have shown that despite the research proven to show that texting while driving is not only dangerous, but deadly, it is more rampant then ever and people continue to do it like its no big deal. Its actually alot easier to pick up the phone and call someone while driving, but it is too obvious for police officers to see an individual talking on the phone. You can hide texting by simply using the phone on your lap, but that possess a problem because then your not looking at the road.
A study was conducted by Vlingo, a company that makes software that translates spoken messages into text or e-mail on mobile phones. The company survey over 4800 applicants online and 26 percent of the 4800 were guilty of D.W.T (Driving While Texting) and out of that 26 percent, 60 percent are between the ages of 16 to 19, 49 percent of the people from 20 to 29 and 13 percent over 50 years old. This does not come as a surprise to me as I would expect younger teenagers to be texting their friends, girlfriend and boyfriends, all the time and now a days every teenager has a cellphone. Tennessee was the state with the highest percentage of drivers that text and coming in right after it is New Jersey. I am very surprised that New York is not atop that list because the population is so dense and there are a lot of younger people in the cities, but at the same time many people who live in the city do not own cars. So maybe for New York they should do a study on texting and biking.
A study was conducted by Vlingo, a company that makes software that translates spoken messages into text or e-mail on mobile phones. The company survey over 4800 applicants online and 26 percent of the 4800 were guilty of D.W.T (Driving While Texting) and out of that 26 percent, 60 percent are between the ages of 16 to 19, 49 percent of the people from 20 to 29 and 13 percent over 50 years old. This does not come as a surprise to me as I would expect younger teenagers to be texting their friends, girlfriend and boyfriends, all the time and now a days every teenager has a cellphone. Tennessee was the state with the highest percentage of drivers that text and coming in right after it is New Jersey. I am very surprised that New York is not atop that list because the population is so dense and there are a lot of younger people in the cities, but at the same time many people who live in the city do not own cars. So maybe for New York they should do a study on texting and biking.
Wednesday, May 20, 2009
Facebook Attacks
Facebook has become one of, if not, the most popular social networking site's on the Internet. Facebook has become so unique and popular because it only requires a regular email account to sign up, it used to be only for college students, but it has expanded to include anyone with a valid email address. Now people can search for people that they grew up with, lost touch over the years with, or just someone that they met at the bar last night. Facebook allows individuals to post private and public information about themselves including: the individuals name, address, place of business, schools attended, hobbies, interests, and basically any information that the individual wants to disclose about themselves. People can post photos and videos as well, so their is a lot of information available at just the click of the mouse.
Facebook has recently become a target of malicious hacks to obtain user login names and passwords. Studies have shown that about one third of web users use the same password for all websites or most websites that require a password. Honestly, I found this to be very true because I do the same exact thing. I have about five or six websites that I use that require a password to access them and I usually have the same password or maybe one different one, including my email password. Hackers are posting links on random individuals facebook pages linking them to phishing sites requiring the user to retype their login name and password so that the hack can obtain their information. Although Facebook credentials are not much, hackers can use these logins and passwords to attempt to access people's emails, ebay and paypal accounts, Amazon and gmail accounts, or anything that requires a login and password. This is where the issue become a huge problem and could be detrimental. This has become an increasingly dangerous issue, especially to those users serving in areas of combat and as well as business users who are on Facebook at work. Hackers can use this information to hack into work emails and gain confidential information. This is why many corporations and businesses advise employees and even make it company policy to block certain websites. Computer security advisers recommend that users use a different password for each account and usually non-dictionary words mixed with numbers as well to decrease potential hacks. Users should also change their password once a month, many companies already have policies such as this one in effect to prevent network security breaches. Facebook users need to constantly be aware of the possible threats they may face and the damage that could be done with a simple login name and password.
Facebook has recently become a target of malicious hacks to obtain user login names and passwords. Studies have shown that about one third of web users use the same password for all websites or most websites that require a password. Honestly, I found this to be very true because I do the same exact thing. I have about five or six websites that I use that require a password to access them and I usually have the same password or maybe one different one, including my email password. Hackers are posting links on random individuals facebook pages linking them to phishing sites requiring the user to retype their login name and password so that the hack can obtain their information. Although Facebook credentials are not much, hackers can use these logins and passwords to attempt to access people's emails, ebay and paypal accounts, Amazon and gmail accounts, or anything that requires a login and password. This is where the issue become a huge problem and could be detrimental. This has become an increasingly dangerous issue, especially to those users serving in areas of combat and as well as business users who are on Facebook at work. Hackers can use this information to hack into work emails and gain confidential information. This is why many corporations and businesses advise employees and even make it company policy to block certain websites. Computer security advisers recommend that users use a different password for each account and usually non-dictionary words mixed with numbers as well to decrease potential hacks. Users should also change their password once a month, many companies already have policies such as this one in effect to prevent network security breaches. Facebook users need to constantly be aware of the possible threats they may face and the damage that could be done with a simple login name and password.
Tuesday, May 19, 2009
West Point Cyberwar Games
I found a very interesting article in the New York Times published on May 10, 2009, regarding Cyberwar testing at West Point. The article is very intriguing because it talks about actual scenarios and hacker tests given to computer science and information technology majors at West Point. For the students final exam they had to withstand a staged hack by the National Security Agency (NSA) based in Maryland. A team of cadets spent four days working around the clock to establish computer network and keep it running while the NSA implemented methods that might be used by enemy hackers during a cyber attack. The NSA also planted viruses on the equipment too, possibly the same way enemy hackers would. Teams were formed from the Navy, AirForce, Coast Guard, and Merchant Marines to compete against one another for the senior classes final exam, to see who could withstand and handle the staged attack by the NSA.
Apparently their is really no sole organization or American Military unit dedicated to analyzing the risk of cyberattacks and conducting tests and drills as West Point has. I am sure the government has some organizations working together on fighting cybercrime, but there should be an organizaion established to focus only on cyberattacks as one successful hack could cripple Internet communications and even expose confidential/top secret information to the world. This could pose as a huge military problem and give America's enemies an advantage. The NSA is responsible for bringing for these computer security analysts/hackers. The hackers have an official name; the 57th Information Aggressor Squadron, and they are stationed at Nellis Air Force Base. They are the closest thing to an organization dedicated solely to cyberwar and cyberattack prevention/research. The Defense Department also has cyberwar schools where they train and cadets on cyberwarfare, but only 80 students graduate per year. The Pentagon believes that this number is insufficient and more highly trained and qualified individuals are needed. The Pentagon hopes that young students will become interested in these cyberwar games, such as the ones conducted at West Point, and strive to become a part of the fight against cyberattacks within the United States. This article sparked my attention because I am looking at pursuing a similar degree at the University of New Haven at the graduate program of National Security with concentration in Information Protection. New Haven works directly with the FBI, as they have been known to select many New Haven graduates from this program to be security analysts and perform other computer security related jobs for the FBI. So the idea of eventually being able to participate in cyber games such as the ones at West Point has really intrigued me and is a fascinating thought. Cyberwarfare has become an increasing problem around the world and will only get worse as new technologies develop, so it is absolutely necessary to have qualified and properly trained personnel working around the clock to prevent these cyberattacks from occurring. The government needs all the help it can get and I hope one day I will be lucky enough to be chosen by one of these Federal Agencies, to lead the war against cyberattacks and more importantly, cyberterrorism.
Apparently their is really no sole organization or American Military unit dedicated to analyzing the risk of cyberattacks and conducting tests and drills as West Point has. I am sure the government has some organizations working together on fighting cybercrime, but there should be an organizaion established to focus only on cyberattacks as one successful hack could cripple Internet communications and even expose confidential/top secret information to the world. This could pose as a huge military problem and give America's enemies an advantage. The NSA is responsible for bringing for these computer security analysts/hackers. The hackers have an official name; the 57th Information Aggressor Squadron, and they are stationed at Nellis Air Force Base. They are the closest thing to an organization dedicated solely to cyberwar and cyberattack prevention/research. The Defense Department also has cyberwar schools where they train and cadets on cyberwarfare, but only 80 students graduate per year. The Pentagon believes that this number is insufficient and more highly trained and qualified individuals are needed. The Pentagon hopes that young students will become interested in these cyberwar games, such as the ones conducted at West Point, and strive to become a part of the fight against cyberattacks within the United States. This article sparked my attention because I am looking at pursuing a similar degree at the University of New Haven at the graduate program of National Security with concentration in Information Protection. New Haven works directly with the FBI, as they have been known to select many New Haven graduates from this program to be security analysts and perform other computer security related jobs for the FBI. So the idea of eventually being able to participate in cyber games such as the ones at West Point has really intrigued me and is a fascinating thought. Cyberwarfare has become an increasing problem around the world and will only get worse as new technologies develop, so it is absolutely necessary to have qualified and properly trained personnel working around the clock to prevent these cyberattacks from occurring. The government needs all the help it can get and I hope one day I will be lucky enough to be chosen by one of these Federal Agencies, to lead the war against cyberattacks and more importantly, cyberterrorism.
MyLaptopGps
This is a very interesting article that I found in a Boston, Ma, journal dealing with new computer security technologies such as MyLaptopGps. MyLaptopGPS is produced by Tri 8, Inc, and has been around for over 25 years supplying businesses and corporations with world class data systems. Dan Yost is the CTO (Chief Technology Officer) of the laptop computer security firm MyLaptopGps and encourages all businesses and individuals to use this to help minimize laptop theft. Yost appeared on many news media stations over the past month to discuss the growing problem of government laptop theft within Oklahoma. Apparently two very important laptops, containing over 125 million unique data records on Oklahoma citizens went missing because of lax security measures. The first laptop was stolen from an employees car within the Oklahoma Department of Human Services. The laptop was said to have highly sensitive information about approximately one million Oklahoman citizens and the second laptop was stolen from the Oklahoma Housing Finance Agency, revealing private data about over 200 thousand Oklahoman citizens.
Laptops are stolen every 12 seconds around the world and will continue to be a growing problem unless something is done to safeguard against this issue. A possible and very plausible solution is MyLaptopGps, which is the single most effective deterrent in laptop theft. MyLaptopGps is laptop tracking technology in the form of Internet based GPS. It is inexpensive, easy to install, and money well spent in the long run to insure the protection of critical information. MyLaptopGPS has been proven to be successful and an excellent technique/tool for protection against theft as the product is endorsed by many, including IDTheftSecurity.com. CEO, Robert Siciliano is a member of the Bank Fraud & IT Security Report's editorial board and of the consumer advisory board for McAfee. He is a leader of personal safety and security seminars around the world and has appeared on television (CNN, CBS, MSNBC, FOX News, "The Today Show", etc) numerous times for his expert opinion and thoughts on personal security and identity theft. He has encouraged businesses and anyone looking for theft protection to use MyLaptopGPS as it has proven to be effective, inexpensive, and a must have for all organizations looking to keep confidential information, confidential.
Laptops are stolen every 12 seconds around the world and will continue to be a growing problem unless something is done to safeguard against this issue. A possible and very plausible solution is MyLaptopGps, which is the single most effective deterrent in laptop theft. MyLaptopGps is laptop tracking technology in the form of Internet based GPS. It is inexpensive, easy to install, and money well spent in the long run to insure the protection of critical information. MyLaptopGPS has been proven to be successful and an excellent technique/tool for protection against theft as the product is endorsed by many, including IDTheftSecurity.com. CEO, Robert Siciliano is a member of the Bank Fraud & IT Security Report's editorial board and of the consumer advisory board for McAfee. He is a leader of personal safety and security seminars around the world and has appeared on television (CNN, CBS, MSNBC, FOX News, "The Today Show", etc) numerous times for his expert opinion and thoughts on personal security and identity theft. He has encouraged businesses and anyone looking for theft protection to use MyLaptopGPS as it has proven to be effective, inexpensive, and a must have for all organizations looking to keep confidential information, confidential.
Ancient Steganography
Steganography is the art and science of hiding messages in such a way that no one apart from the sender and intended receiver can realize that a hidden message even exists. It is basically a process of hiding a secret message in another message. There are basically two different types of steganography: physical steganography and digital steganography, which has only been around for about thirty years with the invention of personal computer technology. Digital steganography is still relatively known and constant research is being conducted to further the development of this wonderful tool. Digital steganography involves hiding messages within the images, sound files, text documents, emails, and etc. You can also embed pictures in video material and other pictures, such as jpegs. You can also use encryption and steganography together to make a message ever harder to decipher. One can conceal the information within encrypted data, but the only problem is that this will draw attention to the document/file because you can see the data in its encryption form so you know that there is a meaning and a message to be deciphered.
I find Ancient steganography to be the most fascinating because the idea and concept can be dated back to Ancient Greece. Although there was no actual term “steganography”, the concept was the same. Steganography first appeared in Herodotus’, The Histories, the story of the war between the Persian Empire and the Greek City-States. He wanted to instigate a revolt against the Persians so he shaved the head of his best messenger and wrote/tattooed a message on his scalp. Once the hair fully grew in he sent the messenger on his way and when the messenger arrived to his destination he shaved his head and pointed it directly towards the receiver to read the message. It sounds so simple and easy, but in fact it is a brilliant idea and almost virtually impossible to figure out because no one would think to look there or even think of the idea in the first place. Other types of physical steganography included hidden messages on tablets covered with wax, hidden messages wrote in invisible ink on messenger’s bodies and special papers, and microdot images. These are all actual techniques used in past history; ranging from Ancient Greece to World War I and II. Microdots are actually very fascinating tools because they are images and texts compressed to the size of a period on a piece of paper, which can be seen with heavy duty magnifying glasses and telescopes. Physical steganography is a brilliant technique that has been around for a lot longer than people think and probably could be dated back further than historians could track. It’s amazing how simple a concept could be, but at the same time how much of an advantage it can have over ones enemies. These methods were extremely popular in both WWI and WWII and may have even helped win battles. It amazes me to see that this techniques are still be used today because they date back so far in our history, but new technologies and advancement have begun make physical steganography a technique of the past, with digital steganography becoming a powerful and common tool. I think that the future will only bring greater advancements in steganography and make it almost undetectable and undecipherable.
I find Ancient steganography to be the most fascinating because the idea and concept can be dated back to Ancient Greece. Although there was no actual term “steganography”, the concept was the same. Steganography first appeared in Herodotus’, The Histories, the story of the war between the Persian Empire and the Greek City-States. He wanted to instigate a revolt against the Persians so he shaved the head of his best messenger and wrote/tattooed a message on his scalp. Once the hair fully grew in he sent the messenger on his way and when the messenger arrived to his destination he shaved his head and pointed it directly towards the receiver to read the message. It sounds so simple and easy, but in fact it is a brilliant idea and almost virtually impossible to figure out because no one would think to look there or even think of the idea in the first place. Other types of physical steganography included hidden messages on tablets covered with wax, hidden messages wrote in invisible ink on messenger’s bodies and special papers, and microdot images. These are all actual techniques used in past history; ranging from Ancient Greece to World War I and II. Microdots are actually very fascinating tools because they are images and texts compressed to the size of a period on a piece of paper, which can be seen with heavy duty magnifying glasses and telescopes. Physical steganography is a brilliant technique that has been around for a lot longer than people think and probably could be dated back further than historians could track. It’s amazing how simple a concept could be, but at the same time how much of an advantage it can have over ones enemies. These methods were extremely popular in both WWI and WWII and may have even helped win battles. It amazes me to see that this techniques are still be used today because they date back so far in our history, but new technologies and advancement have begun make physical steganography a technique of the past, with digital steganography becoming a powerful and common tool. I think that the future will only bring greater advancements in steganography and make it almost undetectable and undecipherable.
Tuesday, May 12, 2009
Print Books Are Target of Pirates on the Web
This is an interesting article that I found in the New York Times, published May 11, 2009. The article dives into the issue of copyright novels/books being released on the Internet without the authors permission, which is illegal. Like illegally downloaded music, ebooks are becoming more and more common as it is easier to access them from home and doesn't cost a cent. It is actually very easy to obtain these digitally pirated copies because websites such as Scribd and Wattpad make them readily available to anyone with access to a computer and the Internet. Internet users can also just go to google and type in books that they are interested in and will mostly likely find a digital copy somewhere on the Internet, whether it be part of the novel or the entire thing, users are still obtaining these ebooks without the authors permission. The author has put alot of hard work and effort into writing his or her novel and going through the trouble and expenses to publish it as well. This is becoming a concerning issue for many writers and publishers because they are losing out on money and essentially people are stealing there work, making it accessible to the cyber world for free. People are also gaining access to ebooks through file-sharing services like Rapidshare and MediaFire. Similar to programs such as Limewire and Napster for downloading music and movies. Many record companies and artists are losing a tremendous amount of money on these programs because it's easier to just download the music and its free. This is an ongoing issue that has developed into a problem over the past seven years or so and now illegally downloaded ebooks are becoming a concern. Many prominent publishing companies, such as John Wiley & Sons, known for their "Dummies" series, are hiring employees dedicated solely to searching the Internet for these unauthorized copies of books. They reported over 5,000 unauthorized titles in which they asked these websites to remove these digital versions of Wiley's books. Electronic reading devices such as the Kindle from Amazon and the Reader from Sony make it easier for hackers copy files. The unauthorized copies are uploaded as PDF's which can easily be emailed to one of these devices. New technologies and advancements are always going to pose problems within digital piracy. You can find almost anything you want on the Internet these days as it has become a vital part of people's lives, to the point where a majority of the world would freak out and go into a state of chaos if it ceased today. It is nearly impossible to remove all illegally downloaded music, ebooks, or any other digital files off the Internet because so many people are doing it and because there is so much out there. If I want any new cd I just go to Limwire and download it than transfer it to my Ipod, its that simple and it probably will become even easier as time goes on. Now that more and more books are becoming available digitally, the same problem will begin to develop and I don't see a solution in the near future.
Subscribe to:
Posts (Atom)