Showing posts with label security. Show all posts
Showing posts with label security. Show all posts

Wednesday, June 10, 2020

Prep Phone For Protests And Anti-Racism Resources

Alaska is now surging on a second COVID-19 wave.  We hit 190 active cases today (19 more from yesterday- State says 20).  Our previous high was April 22 with 188 active cases.  The isolation measures got us down to 33, but now we're rising and likely to keep on going up.  See the Alaska COVID-19 tab above for more details.

Meanwhile here are a couple of useful links:

How Do I Prepare My Phone for a Protest?

Here are the basic recommendations:

  1. Subdue Your Signals (and Download Signal)
  2. Lockdown Location Tracking
  3. Harden Your Hardware
  4. Use a Passcode, Not a Fingerprint
  5. Neutralize Notifications
  6. Think Before You Share
  7. Physicalize Your Phonebook

If these don't make a lot of sense to you, then that's all the more reason to go to the article to find out what it all means.  Our phones do lots of things for us in ways few people understand.  Not knowing means you don't have to worry, but knowing means you can take some basic steps to protect yourself.

These ideas apply to travel to police state countries where the authorities may just take your phone.




Anti Racism Resources
"This document is intended to serve as a resource to white people and parents to deepen our anti-racism work. If you haven’t engaged in anti-racism work in the past, start now. Feel free to circulate this document on social media and with your friends, family, and colleagues."

Here are the categories:

  1. Resources for white parents to raise anti-racist children:
  2. Articles to read:
  3. Podcasts to subscribe to:
  4. Books to read:
  5. Films and TV series to watch:
  6. Organizations to follow on social media:
  7. More anti-racism resources to check out:



Tuesday, March 21, 2017

Homeland Security Supporting Book Industry By Banning Electronic Devices On Planes

The title, of course, is the glass half full interpretation.

Al Jazeera, among others, reports:
"The United States is barring passengers on flights originating in eight Muslim-majority countries from carrying any electronic device bigger than a mobile phone, the Department of Homeland Security said.  . .
Laptops, e-readers, cameras, tablets, printers, electronic games and portable DVD players are affected by the ban - which applies to direct flights to the US - but they may still be stowed in the hold in checked baggage."

But I'd also expect luggage is going to take much longer to be ready to be picked up on arrival in the US as the Department of Homeland Security (DHS) can now look at people's computers without having to take them directly from the owners.  I'm sure Homeland Security has ways to open and copy the contents of people's devices without knowing the passwords.

So people will need to find ways to detect if their computers have been played with while they are separated from them, just to know whether their data has been diddled while their devices were out of their grasp. Here's a four year old post talking about how 'pros' protect their laptops. (Not very well it seems.)

Will this spawn a new industry that provided secure lockboxes to put computers in that would make it a little harder for agents to open them?

This Guardian article questions the logic of the rules.  If they can be used as explosive devices, then they would still be dangerous in cargo areas.  If it's about hacking, well, the article points out that cell phones are computers.  It offers another possibility
"US airlines have been lobbying the Trump administration to intervene in the Persian Gulf, where they have contended for years that the investments in three rapidly expanding airlines in the area – Etihad Airways, Qatar, and Emirates – constitute unfair government subsidies with which Delta, American and United cannot compete. All three Middle Eastern airlines are among the carriers affected by the electronics ban."
I guess when you are as unpredictable as our president, people will believe he would meddle with anything in any way he pleases.

I'm sticking with the idea that DHS (or some other security agency) wants access to what's on people's computers.   Is anyone going to keep track of how long it takes for luggage to get through before and after this policy goes into effect?

Will the cloud enable people to take essentially empty computers through customs and other governmental checkpoints?  But then who's protecting the cloud?

When do we declare privacy officially extinct?

And here's a Washington Post article asking similar questions.

Sunday, March 12, 2017

Extreme Vetting For Immigrants. Apparently None For Trump Appointees

Trump issued an executive order for extreme vetting. But at the same time, it appears that Trump cabinet and staff appointments get minimum vetting - think of Manafort and Flynn as the most obvious examples.

But there is a significant difference between these two types of vetting.

Immigrant and refugee vetting

This link takes you to a detailed State Department chart of the admissions process for refugees.

Immigrants and refugees already go through an extremely vigorous vetting process that takes 12-18 months.  CNN reports that no 'major fatal terrorist attacks' have been carried out by refugees since the Refugee Act was passed in 1980.  It then lists terrorist attacks by Muslims in the US and looks at their status.  The Atlantic, using the same study as CNN, reports:
"But after sifting through databases, media reports, court documents, and other sources, Alex Nowrasteh, an immigration expert at the libertarian Cato Institute, has arrived at a striking finding: Nationals of the seven countries singled out by Trump have killed zero people in terrorist attacks on U.S. soil between 1975 and 2015.
Zero."
The Pew Research Center reports
"About 3 million refugees have been resettled in the U.S. since Congress passed the Refugee Act of 1980, which created the Federal Refugee Resettlement Program and the current national standard for the screening and admission of refugees into the country."
[Note:  in that same time period 1,526,864 people died in auto crashes in the US.  Numbers are based on a Wikipedia list through 2015 and the National Safety Council Report for 2016.  While these numbers are not rounded off and look very precise, one source suggested the 2016 number was an estimate.  I include this note to put the refugee threat in perspective.  If Trump were really concerned about saving American lives, he might be far more effective by focusing on traffic safety.]

The key points I want to make about delays in accepting refugees are that:
  1. The US already does an excellent job
  2. While trying to identify the one or two possible needles in the pool of refugees, many, many lives have been badly disrupted, to find, what seems to be a mythical bad apple.  I'm not denying that there are terrorists who would try to get into the US.  I'm just saying that the process we already have is working.  If it can be improved, Trump's edicts are unlikely to prevent any terrorists from entering the country.
  3. This is all just political rhetoric, whether Trump knows the actual statistics or not, to pander to his base and raise fear of refugees.  All of which increases the likelihood that immigrant lives will be made harder. 

Vetting Cabinet Appointments and Trump Staff

The number of positions a new administration has to fill may seem like a lot, it's a small number compared to the refugees.  And vetting them affects only people who have agreed to be considered for a position.  Extreme vetting of cabinet appointees and White House staff, doesn't disrupt the lives of tens of thousands of others, the way Trump's actions on immigrants does.

The news we've had about Trump's appointee backgrounds and conflicts is very troubling and when Trump talks about vetting of refugees and immigrants, I cannot help but think about Trump's vetting process for his own team.

It appears that the Trump team did little or no serious vetting of the people he's chosen.  What sort of background check was there for Bannon or Flynn?  And if there were any serious checks, it seems the Trump folks just disregarded any of the red flags.  Flynn, for instance, was an agent for the Turkish government and got paid half a million dollars.

In Flynn's case, Pence and Trump are saying, now, they had no idea Flynn was working for the Turkish government.  The Chicago Tribune writes:
"Among those told of Flynn's lobbying work during the transition was Don McGahn, a campaign lawyer who has gone on to become White House counsel, according to a person with direct knowledge of the conversations between Flynn's representatives and the transition team.
A White House official said McGahn and others were not aware of the details of Flynn's work. It's not clear why the Trump advisers did not seek additional information once Flynn's lawyers raised the potential filing.
According to the person with knowledge of the discussions, Flynn's representatives had a second conversation with Trump lawyers after the inauguration and made clear the national security adviser would indeed be registering with the Justice Department. The White House official said the counsel's office had no recollection of that second discussion."
It's hard to figure out when they knew what.  Rachel Maddow goes back and forth with clips of Pence and Trump denying knowledge and then shows they had to know, because others say they told them. You can watch Rachel Maddow go through the evidence,


As I write these posts, I'm fully aware that for many logic, numbers, and reason play only a small part of their decision making processes.  But the way I think and my skills, such that they are, fall in this area, so it's where I have to focus.

And there are many who are confused by the conflicting claims, so I hope these are useful to them.  Either so they can make better decisions and/or have better data when discussing these issues with people who decide without any data at all.

It's my experience that when you counter someone's argument well, there's a good chance they will not acknowledge that to your face.  But the accumulation of evidence of time, does matter.

Friday, September 16, 2016

Snowden - The Movie

I've avoided posts about Edward Snowden.  Yes, I've mentioned him now and then, but I've held off from writing about him in much detail.  My dissertation was on privacy.  I've studied whistle-blowing.  Daniel Ellsberg is one of my heroes.  I knew I was primed to be supportive of Snowden and wanted to hold off.  (And whether I say something about him or not isn't going to matter in the bigger scheme of things anyway.)

I wanted to know more.  Well, I really wanted to drop by and talk to him for a couple of days and see if he was the guy I wanted him to be or not.

I've watched some of his tapes and I've pretty much settled, for the time being, on the Snowden the whistleblower side.  He's the good guy who believed in the ideals of his country and was willing to risk his freedom, even his life, to keep his country honest.  That's the narrative that fits most comfortably with what I've seen and heard about Snowden.


So we went to the 12:50 pm showing of Oliver Stone's Snowden today.  I did read a New York Times review when I was checking last night about when the movie played here.  After seeing the movie I'd concur with the reviewer.

This may be the movie that Oliver Stone has been practicing for.  It's restrained and straightforward.  It goes back and forth between the 'right now' and flashbacks.  The 'right now' starts with his arrival in Hong Kong.  The film is totally consistent with my sense of who Snowden is and why he did what he did.

The surprises for me were:

  • how conservative he was politically and personally
  • how he voiced concerns to others he worked with and for while he was an employee or contractor with the various security agencies
  • that he suffered from epileptic seizures

So, until others can present a more convincing narrative - along with supportive evidence - I'm more than willing to call on Obama and others to find a way to let Snowden come back to the US honorably.  Don't make this like the Cuba sanctions that go on forever or our marijuana phobia because we can't admit we're wrong.

There are more thoughts, but I need to do other things and this movie is worth seeing.  It's well made and is entertaining.  At the very least, it should further open the discussion how we keep spy agencies accountable.  And how we treat those who call them on it.

Joseph Gordon-Levitt is great in the starring role. And I liked how the real Snowden's image replaces the actor's at the very end.


Saturday, September 10, 2016

Articles of Interest - ISIS Recruits, Genes, Bias, Map Artist

There's way too much information for anyone to keep up with.  Here are some ideas worth considering.


Danes choose love over punishment to fight terrorists with some apparent success.
". . . France shut down mosques it suspected of harboring radicals. The U.K. declared citizens who had gone to help ISIS enemies of the state. . . But the Danish police officers took a different approach: They made it clear to citizens of Denmark who had traveled to Syria that they were welcome to come home, and when they did, they would receive help with going back to school, finding an apartment, meeting with a psychiatrist or a mentor, or whatever they needed to fully integrate back into society."


When a Person Is Neither XX nor XY: A Q&A with Geneticist Eric Vilain

People argue that the use of computers, human bias can be eliminated, but this piece shows that human bias can still be reflected in the programs they write.

"That has important applications. Any bias contained in word embeddings like those from Word2vec is automatically passed on in any application that exploits it. One example is the work using embeddings to improve Web search results. If the phrase “computer programmer” is more closely associated with men than women, then a search for the term “computer programmer CVs” might rank men more highly than women. “Word embeddings not only reflect stereotypes but can also amplify them,” say Bolukbasi and co."


Secrets are not a secret anymore if more than one person knows...
“A real secret is something which only one person knows.” ― Idries Shah, Reflections

There are no secrets that time does not reveal. Jean Racine If you reveal your secrets to the wind, you should not blame the wind for revealing them to the trees. Khalil Gibran
An argument against having backdoor keys to break into phones.



Rubric Memo  -  A spoof on academic memos and the use of rubrics.
"We refer to this rubric as Project 3.5.1, which you will recognize as a series of numbers. By entering data about your courses into this rubric, you help us to improve education for all our students, to whom we have also assigned numbers. We have also assigned you a number based on an Enigma-encrypted combination of the street address of your childhood home and your ATM PIN code, which we hacked (please see attachment 7)."


Map Maker Artist Perfectionist 
"These days, almost all the data cartographers use is provided by the government and is freely available in the public domain. Anybody can download databases of highways, airports, and cities, and then slap a crude map together with the aid of a plotter. What separates a great map from a terrible one is choosing which data to use and how best to present it."

Thursday, September 01, 2016

Check That Suspicious Link

I had a bizarre comment on my latest post.  It was a url.  It was enough to get me to call my email provider and ask some questions that got me to the security folks.  We think it was harmless, but I changed passwords.  But it did lead to him pointing out a website that checks suspicious url's for malware, viruses, etc.

I thought that was a cool thing to know, so here it is:  https://virustotal.com.

Yeah, you have to think about checking that link I just gave you, don't you.  But you have to go there to check it.  Such dilemmas.  But I've got you covered.  I already did it and here's what it said:



I am working on Part 2 of The Uncanny Valley and Paris Museums post, but it's by warm and sunny in Anchorage and it's complicated, so this is a break.  In fact I may leave it for a couple of days before I get it up.

Thursday, August 22, 2013

The Dark Side of the Internet: Anonymity After All?

 KCRW had an interesting discussion of Internet security.  In light of NSA's spying, they discussed the small minority of web surfers who use anonymous surfing software like Tor which is triple encrypted.  One of the panel members suggested NSA only reads email of ordinary folks because the people with something to hide, use Tor.  Tor was created by the US government to help out journalists and dissidents in countries that persecute dissenters.  But it seems it is also what makes black market websites possible too.

Here's their description:

Are 'Dark Networks' a Threat or a Haven Online? (1:08PM)

Revelations about the government’s electronic surveillance have raised alarms about privacy. Today's Wall Street Journal reports that the National Security Agency’s capacity is even broader than has reported before—enabling it to reach " roughly 75% of all US Internet traffic."Is there any way to use the Internet secretly? Yes, there is. It's the Darknet, available through software that allows anonymous browsing—and, increasingly—provides opportunities for organized crime. On Silk Road, for example, customers can find LSD, cocaine and heroin as if they were shopping on Amazon — anonymously. Why hasn't the government cracked down? Are there legitimate reasons for Internet users to conceal their identities?
Guests:
You can listen to it here:

The Dark Side of the Internet: Anonymity After All? - To the Point on KCRW