(Greek: κρυπτεία / krupteía, from κρυπτός / kruptós, “hidden, secret things”)

Archive for April 2009

“A census taker once tried to test me, I ate his liver with fava beans and a nice chianti”

leave a comment »

Census Taker Eyed As Possible Source of Flu’s Spread

By Mark Memmott

British news media, such as The Independent, are already making the connection to Typhoid Mary.

The story:

Maria Adela Gutierrez, a 39-year-old census taker in Oaxaca, Mexico, died of the H1NI/swine flu on April 13. As The Independent says, her job put Gutierrez in contact “with at least 300 unsuspecting members of the public when the disease was at its most virulent.”

But did Gutierrez spread the disease?

The Los Angeles Times reports that “Martin Vazquez Villanueva, the regional health secretary in Oaxaca, denied local news reports that said she had infected 20 people, as well as her husband and children.”

But according to The Independent, after Gutierrez became ill “state health authorities began to track down every person she’d had recent contact with and conduct check-ups.

“That discreet search … turned up more than 300 people, including many members of the public whom she’d interviewed as she knocked on doors in late March and early April. Local sources told Veratect, the US disease-tracking company which sounded the alarm, that between 33 and 61 of those interviewees ‘exhibited symptoms’ of a flu-like illness, though none have died.”

Evidently “Swine Flu” Mary potentially infected 300 people in her door to door campaign. And they say that taking the census is a civic duty! All this Swine flu jive really has me amused. I am just waiting on the whole “sudden zombie attacks” to start permeating the airwaves.

Look, unless this is a hemorrhagic fever or evolves into one with these symptoms:

  • Sore throat
  • Fever
  • Dry, hacking cough
  • Weakness
  • Severe headache
  • Joint and muscle aches
  • Diarrhea
  • Dehydration
  • Stomach pain
  • Vomiting.
A rash, hiccups, red eyes, and internal and external bleeding may be seen in some patients. On dark skin, the rash is often not recognized until it begins to peel.
I am going to lump this more into the “SARS” category and break out the toilet paper, chicken soup, and ginger ale.

Written by Krypt3ia

2009/04/29 at 19:54


leave a comment »

9/12/01 I arrived in Manhattan to work at the trade center site. The smell of charred buildings, bodies, and chemistry was thick. Overhead the shrieks of F16’s and F18’s made me nearly hit the deck every 40 minutes or so. I am glad I was not in Manhattan today.

What the fuck were they thinking?

Written by Krypt3ia

2009/04/28 at 00:41

State Of Play: A Review

leave a comment »

A senator who is investigating an uber corporation that provides “privatized” security to the Gulf War is implicated of having an affair with his young, and recently murdered research associate. The senators friend is a reporter for a “Washington Post” like paper who he turns to to help him through it all and the reporter finds that there is much more to the story.

This is the premise of “State Of Play” and I have to tell you, Russel Crowe does a great job at being a slightly overweight Irish American truthseeker reporter. He in fact makes the film I think with his understated acting and subtle internalizing that are more like moments he had in L.A. Confidential.

As for Ben Asslick, well, that’s all I have to say huh?

All in all, a good film that reminded me of the weeks I spent at the Grey Lady in NYC doing an assessment back a few years ago. The whole premise of “Privatized Security” and the wholesale takeover of the INTEL/Security is kinda scary and really, one can make those allusions fairly easily to a certain other reality based company called “Blackwater”

Do see it… Even if Ben Asslick is in it… Geez now I feel like “Movie Poop Shoot”

Written by Krypt3ia

2009/04/25 at 02:03

Posted in Movie Reviews, Movies

Speaking of DHS and Bad Cyber Security…

leave a comment »

OK: Personal Data Of 1M On Stolen DHS Laptop

April 23, 2009 by admin
Filed under: Government Sector, Theft, U.S.

Well, here’s a laptop theft that will probably cost more than $50,000….. KOCO reports that a laptop stolen from an employee’s vehicle on April 3 contained personal information of up to 1 million people. According to the Oklahoma Department of Human Services, the computer had names, Social Security numbers and birthdates of people who receive state assistance. NewsOK has a bit more on the incident.

Update 1: OKDHS has a notice on its web site about the incident that says “The personal information included names, Social Security numbers, dates of birth and home addresses of clients who receive Medicaid; Child Care assistance; Temporary Assistance to Needy Families (TANF); Aid to the Aged, Blind and Disabled; and Supplemental Nutrition Assistance (SNAP or Food Stamps). The data did not contain driver’s license numbers, credit card or banking information. The potential breach did not affect Child Welfare services.”

So, here’s my thing…

1) Why in the holy hell did DHS did have 1 Million users data for MEDICAID on a DHS asset?

2) What you say? No ENCRYPTION? WTF!

3) Just when will we learn?

Written by Krypt3ia

2009/04/24 at 18:05

Hmmm DHS, I really think they are not in the game anymore…

leave a comment »

DHS Recruiting Ethical Hackers

DHS Seal

News, yesterday, of significant recruiting efforts being brought to bear by the United States Department of Homeland Security. This time, they are on the prowl of ethical hackers to join the Department’s ranks. More information, including a snippet of the original article appears after the jump.

From The Register’s John Leyden: “DHS hunts for white-hat hackers

“The Department of Homeland Security is looking to recruit white-hat hackers to help defend the US’s critical internet infrastructure…” “An ad by General Dynamics Information Technology on behalf of of the DHS seeks applicants who can “think like the bad guy”, understand hacking tools and tactics, analyse net traffic and identify vulnerabilities in federal systems. In a budget request, Defense Secretary Robert Gates requested funds to increase the number of experts it trained each year from 80 to 250 by 2011…”

Gee, last I checked DHS Sucked ass at Cybersec AND the Obama Administration was considering moving all of the issues to a new “autonomous” cyber security agency to be named later.

I wouldn’t take a job at DHS anyway… So far they have not been so swift and I am sure will continue to be mired in “stupid”

Speaking Of “Fire Sale”

leave a comment »

A Cyber-Attack on an American City

Bruce Perens

Just after midnight on Thursday, April 9, unidentified attackers climbed down four manholes serving the Northern California city of Morgan Hill and cut eight fiber cables in what appears to have been an organized attack on the electronic infrastructure of an American city. Its implications, though startling, have gone almost un-reported.

That attack demonstrated a severe fault in American infrastructure: its centralization. The city of Morgan Hill and parts of three counties lost 911 service, cellular mobile telephone communications, land-line telephone, DSL internet and private networks, central station fire and burglar alarms, ATMs, credit card terminals, and monitoring of critical utilities. In addition, resources that should not have failed, like the local hospital’s internal computer network, proved to be dependent on external resources, leaving the hospital with a “paper system” for the day.

In technical terms, the area was partitioned from the surrounding internet. What was the attackers goal? Nothing has been revealed. Robbery? With wires cut, silent alarms were useless. Manipulation of the stock market? Companies, brokerages, and investors in the very wealthy community were cut off. Mayhem, murder, terrorism? But nothing like that seems to have happened. Some theorize unhappy communications workers, given the apparent knowledge of the community’s infrastructure necessary for this attack. Or did the attackers simply want to teach us a lesson?

The rest HERE

Just last night I was thinking about this as I sat watching Die Hard. Anyway, yeah this is not getting much press and certainly may in fact be kept quiet a bit by design… Maybe we (when I say we, I mean the media really) just don’t care? Don’t understand? I mean, think about it.. With China hacking JSF, Air Force, etc and this incident doesn’t it kinda say “Gee, we really aren’t that secure are we?”

Personally I think that this particular incident was a decoy for a bigger criminal undertaking. I doubt it was a test run on a thought experiment. So, we will see what shakes out when the details (if ever) come to light on this little cable cutting foray.

Keep your wits about you…

Fire Sale: Everything MUST GO!

leave a comment »

Ya know lately with all this Chinese activity I just can’t stop that “Fire Sale” vibe from creeping into my head…

Oh, and of course watching the unrated version of “Die Hard: Live Free Or Die Hard” kinda helps…

Of course this movie was unrealistic on the wholesale disruption of the US as a whole. However, sometimes in this business you just can’t help but feel like Thomas Gabriel when you tell clients they are insecure and they should fix things.

Especially when you get that look from them of;

“Shit, why would we do that? It would be too much work!”

Of course lately with the whole “Chinese in our grid all up in our shit” and “Losing JSF data” might get the .mil and the .gov types all worked up huh? We’ll see I guess. Of course when all the shit goes down, my house will be the one with the lights still on and the anti zombie defenses in place.


Written by Krypt3ia

2009/04/23 at 01:33

Zerstorung durch Fortschritte der Technologie: Break The Code

leave a comment »


The producers and writers of Fringe have decided to invite viewers to interact with their program by challenging us to solve a secret code. Near most commercial breaks, they have been displaying a series of images that contain clues to this puzzle.

Producer Pinkner explains here:

This repository contains all the glyph-code data that has aired on the show to date. I’m writing up this puzzle for an Ars post that should go live just before the show returns in April. My write-up is about this puzzle as well as a number of other interactive elements hidde in the show.

So here’s your chance to gain fleeting Internet notoriety by solving the code and revealing a clue central to the show’s mythology. All the data and notes are set up so you can get started right away.


CryptHelper: Some notes on English language frequencies.

DecryptNotes: Treating the images as an English language cypher.

Digraphs: Common English letter pairs Distribution:

Frequency count of unique image/yellow dot pairs FileList:

The image files in the Glyphs folder NumberedLetters:

The base letter set numbered i order NumberedList: The images numbered in order PicList:

The list of pictures, with orientation and dot information ReflectNormed:

The list of pictures normalized for reflection SearchingForSpaces: Attempts to find word divider

Fascinating… Well, I can see that I will be busy for a while…

Written by Krypt3ia

2009/04/22 at 01:53

Posted in Crypto, Fringe

“Zerstorung durch Fortschritte der Technologie”

leave a comment »

Did uncle Ted read read the ZFT?

Did uncle Ted read read the ZFT?

Or perhaps was Uncle Ted a co-writer?

I still want a copy of this “manifesto” C’mon Google!

Written by Krypt3ia

2009/04/22 at 01:44

Posted in Fringe

JSF Data: All are data belong to us!

leave a comment »

Hackers break into Pentagon’s fighter jet project

Hackers allegedly downloaded terabytes of data before they were discovered
By Sumner Lemon , IDG News Service , 04/21/2009

Hackers broke into U.S. Department of Defense computers and downloaded terabytes of data containing design information about the Joint Strike Fighter, a $300 billion stealth fighter currently under development, according to The Wall Street Journal.

The stolen files all relate to the design of the Joint Strike Fighter and its electronic systems, The Wall Street Journal reported, saying they could be used to help defend against the jet.

However, the most sensitive files were not compromised since they are stored on computers that are not connected to the Internet, the report said.

The reported attack raised more questions than it answered.

For example, the report did not say how attackers managed to download terabytes of data before being discovered. A single terabyte can take up to several weeks to download over a relatively fast data connection, such as a DSL or cable modem.

The report also suggested China could be behind the stolen data, noting that investigators believe the attack originated in China. However, it said the exact identities of the people behind the attack had not been established.

DOH! So, are we so sure that those “other” systems weren’t connected to the intranet at the very least? C’mon, you know you wanna admit that they were! Ugh, oddly enough I had a conversation with someone in the rings who complained that things were not being done right… Gee…

Of course do you have any idea how long it would have taken to exfiltrate a terabyte of data? A couple weeks at least! So, who was at the switch here? I mean, no one had an IDS or any other monitoring tool network wise to see massive amounts of data being pumped out of their network?

I think that GD and SECDEF Gates need to really step up the hiring process for “Hackers” to protect our networks….