Not shocking for those of us in the industry, but cybercrime (aside from trying to arrange underage sex and child pornography cases) get very little attention. There’s a report that was done by a few places, the report article is here with the Full PDF available for your perusal. Interesting to think about laws put on the books, but the lack of resources made available to prosecute new laws. Perhaps something like PayGo when it comes to these types of investigations. The assymetrical battle rages on. The internet brought you more than low-cost communications with family and friends, the cost is lower for the bad guys as well.
Archive for the ‘internet’ Category
cybercrime not prosecuted
Thursday, August 14th, 2008Comcast to be punished
Friday, July 25th, 2008So, the long wait is coming to a close. It is expected that next Friday there will be a ruling from the FCC that comcasts actions with regard to blocking file sharing software is outside of the scope of regular network managment tasks. This will be interesting as we may see an increase in the peer to peer traffic on networks as the DPI p2p mitigation devices get removed from a variety of networks. It may also mean the death of a few vendors or at least consolidation in the industry. Article link can be found here.
Apple TV Hatred
Saturday, July 5th, 2008So, our Apple TV started having some problems, would be laggy when playing video across the network (we have the “Smart” sync enabled). So I decided to do a Factory Restore since I did not hear the sound of the drive clicking or anything else that would indiciate a hardware failure.
After that, it restored with the 1.1 software, not the 2.0.2 software. So we needed to do a ~20 minute download to get that back in sync, following some major hatred with the device off-and-on over the next 24 hours trying to get the TV shows to sync again. Turns out amongst the other problems, the Apple TV thought it was in Canada as well as I needed to reauthorize the iMac it syncs with with ITMS. It didn’t count against our block of authorized comptuers (we have several, including two macbooks – the 14″ dual usb type, two intel iMacs and one MacBook Pro).
I’m utterly frustrated that the factory restore did not do the 2.0.2 software and the upgrade did not propogate a new factory install/reset ala TiVo. Lets see what happens and if the device wishes to actually die in the next few weeks. It would make me very sad since we stopped paying for satellite service a few months ago to save on costs, and instead shifted that expenditure to ITMS money.
State of the internet
Sunday, June 1st, 2008Akamai has posted their State of the Internet report. Some of you may find this a worthwhile read.
Two network security articles worth reading
Friday, May 30th, 2008I have come across two articles that have been well worth reading in the past 12 hours. The first is a general article on the possible security implications of international travel and your personal electronic devices. The second is related to two blackouts that may be related to network intrusion activity. Both are well worth the read.
The internet is dangerous (this time it’s plug-ins)
Wednesday, May 28th, 2008I’m reminded the past two days why I always run my web browsers with plugins disabled by default. With the recent events of people getting malware into ad networks, and the revelation of at least one (if not two) flash vulnerabilities being exploited in the past 48 hours, the safety of my i-hate-flash policy is once again revealed. If you’re unaware, you should be disabling plugins except when you need them from your ‘trusted’ sources, or if you use a firefox derivative browser, check out flashblock.
NSA to take over Federal network intrusion work
Saturday, January 26th, 2008The Washington Post is reporting today (on page A3 sadly) on HSPD-23. This is apparently classified (so leaked by someone) and reflects the role that the intelligence community will play in watching the overall federal threat. While it’s good to have smart people working on these things (the Intelligence community has some of the brightest people working on analysis), there’s a lot of industry or trade secrets that are held in the private sector that are as important or more important to protect. We’ll see if there is room for partnership with the private sector or if all the work done will be classified.
Your IP address is personal
Monday, January 21st, 2008Your Computer Is Broadcasting an IP Address could become something of the past, or at least as private as the rest of your personal information in EU. This could have some fairly significant implications both technically and policy-wise for service providers. Since your IP address is likely unique except in a few rare cases (public wireless, hotels, conventions or maybe your office). If you have a cable modem, you’re likely to keep the same IP address for a long time. Some DSL providers you keep the same IP, others you can easily get a new one by rebooting the device. It should become interesting as time goes on and these personally identifying bits continue to proliferate. With IPv6, it may become easier to identify the user, or that it’s the same user, but we’re not there yet.
FCC Checking-up on Comcast
Thursday, January 17th, 2008The FCC has started a comment period and investigation into the interference with network traffic that Comcast is doing on their network. The Associated Press did an excellent piece of reporting last fall (2007) on the impacts this would have, and others reported of the impact it has on their corporate Lotus-Notes systems. If you’ve been impacted by this it would be wise to file a complaint or comments. At the same time, there have been leaked memos from Time Warner Cable indicating they will be testing bandwidth caps on users later this year. They claim that 5% of their subscriber base contributes to 50% of their overall network traffic. If you follow commodity bandwidth pricing, the 25/25 FIOS service offerings for around $100/mo are certainly a lossy item unless their internal costs are under $4/Mb.
More cybersecurity woes ahead?
Thursday, January 17th, 2008I was pointed to an article at the Wall Street Journal where the head of the ODNI wants to intercept all the internet traffic that traverses the United States. This would likely be done with a similar system as ECHELON or whatever the real system is should this be something fictional. It could represent a treasure of information or the biggest privacy challenge for the industry.