Kyu H. Chay

To the family of Kyu H. Chay,

I am sorry for your loss, but I thank you for your sacrifice. Kyu H. Chay is more that just an American hero, he represents the best of what we are capable of. He was a father, a husband and a protector of soldiers. I hope Jason and Kelly know how special their father is.

NSA Security Blackberry

Sectera

The IPhone may look pretty, but the Sectera will kick its ass in a combat zone. If you took the IPhone to Afghanistan there is a good chance that the powdery, flower like sand would eat it its sexy smooth face and spit out a pitted, shiny, $400 dollar paper weight/Frisbee. If your going to combat and have a gritty, dirty critical mission, you’ll need something like the Sectera to keep up with you.

A look at the Sectera.

The Sectera is ruggedized in accordance with MIL-STD-810F. This means that it can be dropped, put in water, survive some level of vibration, humidity, temperature and dust.

More on the Sectera

The Sectéra® Edge™ smartphone converges secure wireless voice and data by combining the functionality of a wireless phone and PDA — all in one easy-to-use handheld device. Developed for the National Security Agency’s Secure Mobile Environment Portable Electronic Device (SME PED) program, the Sectéra Edge is certified to protect wireless voice communications classified Top Secret and below as well as access e-mail and websites classified Secret and below. The Sectéra Edge is the only SME PED that switches between an integrated classified and unclassified PDA with a single key press.

Features

* Versatile
o Secure and non-secure wireless phone, e-mail and web browsing
o Withstands rigors of both tactical and everyday environments
o Global roaming over GSM, CDMA or Wi-Fi* wireless networks
o Software upgradeable to VoIP
o Exchange secure e-mail with government personnel, including S/MIME BlackBerry® users
o IPv6 software upgradeable
* Easy-to-Use
o Familiar Microsoft® Windows® Platform
o Wireless desktop synchronization
o Separation of Classified and Unclassified applications
o One-touch switching between classified and unclassified PDA functions
* Advanced Security Features
o Secure wireless access to the SIPRNET and NIPRNET
o DoD PKI enabled Common Access Card (CAC) support
o Supports DoD 8100.2 requirements
o Type 1 encrypted storage of classified data
o Can be used inside closed areas with “SCIF-Friendly” feature

I want to go to the Black Hat

Trip to BlackHat 2008

I’m hope my corporate master will let me go to the Blackhat and Defcon training/convention this year. I doubt it since “Massa” Corporate isn’t in the business of giving out anything that the gubment hasn’t paid for. Then again… they did offer to pay my way through a Masters degree program provided I stay with them for the entire time. Over all, they are not a bad lot… I’ve dealt with much worse that is for certain.

If I go to BlackHat 2008, I’ll probably attend Security Horizons, NSA Information Assurance Management course.

untraceable movie

untraceable movie

I just saw a movie called Untraceable. It is cyberterrorism meets Seven. Although it is very violent, it falls short of the pure “torture porn” genre (i.e. Hostel, Saw). They didn’t sensationalize the FBI computer crime team. They made the characters real people with real problems.

The best part of the movie is that it addresses hard societal questions that we are still struggling with. The killer’s greatest weapon was the Internet itself. He used the anonymity and distributed non-centralized power of the net to broadcast killings on the Internet. Once he captured a victim, he would put them in a contraption that would torture them to death based on how many people came to the site. The FBI is at a loss, because their equipment (while it can easily bait & hunt small time phishers, criminal hackers and adults soliciting sex from kids online) it is useless against this serial killers level of software, Internet, and electronics sophistication. They eventually call upon the NSA, who tell them that they are not allowed to use their resources for domestic issues. With the Patriot Act and NUMEROUS presidential NSA acts, I don’t believe this is entirely true. But the movie seems to suggest that it is.

Although, I disagree with the message of giving more power to the FBI & NSA to catch bad guys (as it would require the loss of more civil liberties of law abiding citizens), I definitely recommend this movie.


Movie fact:

The site used by the killer (www.killwithme.com) actually exists. It’s owned by the movie studio and it’s used to promote the movie. In it, users are taken to a replica of the FBI computer used by the character Jennifer Marsh. Her desktop gets hacked by the killer who provides the visitor with four test he/she must complete to deactivate his site.

UK planning to monitor and record every phone call, web page, and email sent by citizens

The Home Office will create a database to store the details of every phone call made, every email sent and every web page visited by British citizens in the previous year under plans currently under discussion, it has emerged.

The Government wants to create the system to fight terrorism and crime. The police and security services believe it will make it easier to access important data as communications become more complex.

Telecoms firms and internet service providers (ISPs) have already been approached by the Home Office, which would be given customer records if the plans were realized.

Only a matter of time before the same happens in the U.S. It might already be underway by the NSA. Who knows.

more at Telegraph.co.uk