Saturday, June 2, 2018

CryptPad


CryptPad is a real-time collaborative editor, with servers located in Paris France and Iasi Romania.

A CryptPad is a document that you can edit in your browser, generally with other people's changes visible nearly instantly. Create a CryptPad and share its URL with others. Users can collaborate on the document, with changes being visible to each other instantly. 

A CryptPad can be created with a set time at which it will be automatically removed from the server. Expiring pads can be configured to last anywhere from one hour to one hundred months. The pad and all of its history will become permanently unavailable even if it is being edited at the time that it expires. If you are an anonymous user (i.e. haven't signed up with CryptPad) pads will expire after 3 months of inactivity.

CryptPad has many additional features that I find useful for document collaboration. Basic features are available for free, with premium features available for a small fee.


Kent, WA Woman Kidnapped, Raped, Locked Naked in a Room and Sold for Sex



On February 9, 2018 I posted the news that a woman in Marblemount, WA had been kidnapped, raped, and tortured. On June 1, 2018 we saw a very similar case in Kent, WA where a man kidnapped a woman, raped her, and held her naked, locked in a room for two days; until she was able to escape when he attempted to pimp her out to have sex with other men.

According to the Komo 4 News report (June 1, 2018) the woman remained trapped in a room where the man repeatedly assaulted and raped her, and forced her to snort methamphetamine. He also tried to force the woman to earn money for him through prostitution and invited seven to eight men over to "look at her." On May 19, 2018 when a customer agreed to pay the man to have sex with the woman, he took the woman out the apartment in his SUV. She was able to escape by jumping from the vehicle and running to a nearby home where she hid under a table until police arrived.   

Prosecutors charged the man last week with first-degree rape and promoting prostitution.
--

As can we seen from the above incidents, this type of horrific kidnapping and assault on women is perhaps more common than you might think. Having a personal security plan is essential to protecting yourself from violent attack.

Letting a trustworthy person know where you are going, when you are expected to return, and having that person check up on you if you are not heard from at the expected time is a simple and common sense precaution. If you don't want to tell someone every time that you go some place, consider setting up an automatic message to alert people if you go missing.

Defense items, such as personal alarms and pepper spray can help ward off an attacker; although according to U.S. Bureau of Justice Statistics data, having a firearm and being able to use it in a defensive situation is the most effective means of avoiding injury (more so even than offering no resistance) and thwarting completion of violent crime, such as robbery or assault. In general, resisting violent crime is far more likely to help than to hurt, and this is especially true if your attacker attempts to take you hostage.

While no one expects to be attacked, the fact is that these violent attacks do happen and it is important to be prepared should you be targeted as the next victim. 


Hackers Find 65 Bugs in the Pentagon’s Travel Management System


According to Nextgov (May 30, 2018) hackers found 65 bugs in the Pentagon’s Travel Management System, 28 of which were deemed highly severe or critical. Defense employees use DTS to authorize, reserve and receive reimbursements for work-related travel. The system processes more than 25,000 transactions every day.

Although the Nextgov article does not say whether these bugs resulted in a breach of DOD employees' personal information, it should be assumed that "highly severe or critical" vulnerabilities in any system containing PII puts that information at risk.


Friday, June 1, 2018

Reducing Your Information Footprint


While spring cleaning your home and, if you’re like me, the top of your desk, consider also cleaning up your information footprint. Your information footprint is how much information about you is recorded and available in both digital and paper formats. Cleaning up your footprint can mean examining social media, online accounts, and even paper records containing sensitive information. While we may use a few key digital devices and services on a regular basis, they often contain more information about us than is necessary. It’s also likely that devices and services we don’t use anymore may still contain information. You might have that pile of paper you’ve been meaning to shred for a while, making this an opportune time to spring clean your information footprint. By spending a little bit of time and effort, you can better secure your information to safeguard against various forms of identity theft.

Disks, Hard Drives, and USB drives, Oh My!
Over the years, it’s easy to accumulate a mass of CD’s, DVD’s, hard drives, and USB drives that are no longer needed or with data that is no longer needed stored on them. If you have hard drives or USB drives with old data but want to continue to use them, consider following US-CERT’s guidance on how to securely clean the data off of these items before properly recycling them. Many shredders, including those rated for home use, can shred CDs and DVDs. If your shredder can’t handle them, check your local community for shredding days as many towns, schools, and office supply businesses will sponsor shredding events.

Clean Up Your Paper Trail
Many of us have a large quantity of paper documents that may contain sensitive information about ourselves, financial accounts, government identification information, tax returns, and more. Take some time to go through these documents this spring and check whether it is something you truly need to hold onto. If the answer is no, be sure to securely dispose of it by shredding it and recycling the shredded pieces. Simply ripping up sensitive documents is not enough to guarantee your information is unreadable.

Not sure how long you should hold on to those old documents? The Federal Trade Commission (FTC) has a handy website - "A Pack Rat’s Guide to Shredding" with information on how long you should hold on to those documents!

Closing Old Online Accounts
It is common for people to use many different shopping sites, social media outlets, online storage, clubs, and other online outlets that require you to enter, store, and sometimes share information from or about you. If you are no longer using any of these accounts, consider removing information that may be sensitive and consider closing them out if you do not plan to use them again. Sometimes, it is easiest to check out as a guest when shopping online at a place that you rarely, if ever, patronize. Checking out as a guest should minimize the data retained about you.

Old Social Media Accounts
Remember MySpace? LiveJournal? Do you still have that old email account or an account on an old dating website? As we move from Myspace to Facebook to Twitter, Instagram, and the other latest and greatest social media platforms, our old accounts and information are left behind, filled with personal details. Consider closing out social media accounts that you no longer use, as it will reduce your digital footprint. Keep in mind that all social media platforms have different policies when deleting old accounts and content. Be sure to read the policy. And, don’t forget to remove the app from your smartphone, too!

Oversharing on Social Media That You Do Use
If you frequently use a social media or online account but it contains lots of personal details or information that you now think should be safeguarded more closely, consider removing it from your profile or deleting the posted content. Think about if the information you continue to share could be used against you or combined with other information to be used against you. Enough pieces of personal information combined together can be very useful to cybercriminals.

Being aware of any information that you share that could be used to respond to "Challenge" questions, which are frequently used to reset passwords. What does that mean? How could information be combined to be used against you? Think about your online bank account. If you forget your password what types of questions do they ask? Probably something about the color of your car, your mother’s maiden name, your birthday, or pets’ names. Did you post a picture of your new car? Friend your mother or her brother on social media? Answer a meme about your birth month and day? Share adorable pictures of Fluffy? If you did, you’ve helped someone find out the answers to your bank’s security questions!

This is the case for many of the pieces of information you may share online and many online accounts that use challenge questions to reset passwords. Information commonly used for challenge questions include the above examples and other details, such as your favorite sports team, vacation spot, fruit, ice cream, type of reading material, youngest sibling, elementary school name, and so on. As you clean up your data think about what information could be used to answer your security questions and try to remove that data from your social media accounts.

In closing, these short tips can make a world of difference in lowering your information’s exposure to others. By questioning if you need to share or provide certain information online as you move forward, you can save yourself from many of the unnecessary overexposures we discuss here. Additionally, by taking a look at both your digital and paper trails to do these activities on a routine basis, you can be sure to keep overexposure in check.  (CI Security)



EFF and ACLU Call for Amazon to Stop Powering Government Surveillance


The EFF has joined the ACLU and a coalition of civil liberties organizations demanding that Amazon stop powering a government surveillance infrastructure. Last week, they signed a letter to Amazon condemning the company for developing a new face recognition product that enables real-time government surveillance through police body cameras and the smart cameras blanketing many cities.

The system, called "Rekognition",is already being used by agencies in Florida and Oregon. This system affords the government vast and dangerous surveillance powers, and it poses a threat to the privacy and freedom of communities across the country.


How Many Federal Criminal Laws Are There Currently on the Books?


When federal laws were first codified in 1927, they fit into a single volume.

In 1982 the Justice Department tried to determine the total number of criminal laws. In a project that lasted two years, the Department compiled a list of approximately 3,000 criminal offenses. This effort, headed by Ronald Gainer, a Justice Department official, is considered the most exhaustive attempt to count the number of federal criminal laws. This effort came as part of a long and ultimately failed campaign to persuade Congress to revise the criminal code, which by the 1980s was scattered among 50 titles and 23,000 pages of federal law.

In 1998, the American Bar Association performed a computer search of the federal codes looking for the words "fine" and "imprison," as well as variations. The ABA study concluded the number of crimes was by then likely higher than 3,000, but didn't give a specific estimate.

In 2003, there were around 4,000 offences that carried criminal penalties. By 2013, that number had grown by 21 percent to 4,850.

None of these studies broached the separate - and equally complex - question of crimes that stem from federal regulations, such as, for example, the rules written by a federal agency to enforce a given act of Congress. These rules can carry the force of federal criminal law. Estimates of the number of regulations range from 10,000 to 300,000 !!!  None of the legal groups who have studied the code have a firm number.

"There is no one in the United States over the age of 18 who cannot be indicted for some federal crime," said John Baker, a retired Louisiana State University law professor who has also tried counting the number of new federal crimes created in recent years. "That is not an exaggeration."



Thursday, May 31, 2018

The Cyber Threat and Its Implications for Our Privacy


“The time has come — indeed, if it has not already passed — to think seriously about some fundamental questions with respect to our reliance on cyber technologies: How much connected technology do we really want in our daily lives? Do we want the adoption of new connected technologies to be driven purely by innovation and market forces, or should we impose some regulatory constraints?” asked NSA General Counsel Glenn Gerstell in a Wednesday presentation at Georgetown University. “Although we continue to forge ahead in the development of new connected technologies, it is clear that the legal framework underpinning those technologies has not kept pace. Despite our reliance on the internet and connected technologies, we simply haven’t confronted, as a U.S. society, what it means to have privacy in a digital age.”

Mr. Gerstell's speech is available here.