I got distracted by email. The Friday Summary was going to be about columnar databases. I think. Maybe it’s the flu I have had all week, or my memory is going, or just perhaps the subject was not all that interesting to begin with. But the email that distracted me was kind of funny and kinda sad. A former friend and co-worker contacted me for the first time is something like 10 years. Out of the blue.
The gist of the email was he was being harassed by someone with threatening emails. After a while he started to worry and wondered if the mystery harasser was serious. So he contacted the police and forwarded the information to the FBI. No response. Met with the police and they have no interest in further investigation unless there is something more substantive. You know, like a chalk outline.
In frustration he reached out to me to see if he could discover the sender. Now I am not exactly a forensics expert, but I can read email headers and run reverse DNS lookups and whois
. And in about three minutes I walked this person through the email header and showed the originating accounts, domains, and servers. Easy. Now I must assume that if you know about email header information and don’t want to be traced, with a little effort you could easily cover your tracks. Temp Gmail or Yahoo accounts? Use cloud or hijacked servers, or even the public library computer can hide your tracks? No? How about using your freakin’ Blackberry with your real email account, but just changing the user name? Yeah, that’s the ticket! I am occasionally happy that there are stupid people on the planet.
Oh, and since you asked for it (and you know who you are), here’s the Monkey Dance: (-shuffle-shuffle-spin-shuffle-backflip). The video is too embarrassing to post. Yeah, you can make us dance for a .99 cent Kindle subscription. You ought to see what we do for an $8k retainer!
On to the Summary:
Webcasts, Podcasts, Outside Writing, and Conferences
- Someone seems to think we’re one of the top 5 security influencers. Rich thinks Rothman must have paid them.
- Rich’s presentation at the Cloud Security Congress mentioned in this SearchSecurity article.
- Adrian’s comments on a database security survey.
Favorite Securosis Posts
- Mike Rothman: Datum Entanglement. Rich’s big thoughts on where information-centric security needs to go. At least the start of those big thoughts…
- Rich: Rethinking Security.
- Adrian Lane: Datum Entanglement. Geek out! Le Geek, C’est Chic.
Other Securosis Posts
- Incite 11/17/2010: Hitting for Average.
- What You Need to Know about DLP for PCI 2.0.
- React Faster and Better: Mop up, Analyze, and QA.
Favorite Outside Posts
- Mike Rothman: 2011: The Death of Security As We Know IT or Operationalizing Security. From Amrit: “Security must be operationalized, it must become part of the lifecycle of everything IT.” Yeah, man.
- Rich: Brian Krebs on the foolishness of counting vulnerabilities.
- Adrian Lane: Amrit’s Operationalizing Security. Because, in its current position, security can only say “No”.
- Gunnar Peterson: Challenge of Sandboxing by Scott Stender.
Project Quant Posts
- NSO Quant: Index of Posts.
- NSO Quant: Health Metrics – Device Health.
- NSO Quant: Manage Metrics – Monitor Issues/Tune IDS/IPS.
- NSO Quant: Manage Metrics – Deploy and Audit/Validate.
Research Reports and Presentations
- The Securosis 2010 Data Security Survey.
- Monitoring up the Stack: Adding Value to SIEM.
- Network Security Operations Quant Metrics Model.
- Network Security Operations Quant Report.
Top News and Posts
- Adobe Releases Reader X with Sandbox.
- FreeBSD Sendmail Problem; update: The Problem Is with Gmail.
- Lawmakers take away TSA’s fringe benefits.
- Drive-by Downloads Still Running Wild
Blog Comment of the Week
Remember, for every comment selected, Securosis makes a $25 donation to Hackers for Charity. This week’s best comment goes to Ian Krieger, in response to Datum Entanglement.
Whilst it is a really stupidly-complex [sic] introduction it gets you in the right frame of mind, that is the complexities in securing data (yes I’m talking the plural here) when you have the ability to copy, or extract, it.
Looking forward to the next pieces and see where your presentation goes.
Comments