Showing posts with label Destruction. Show all posts
Showing posts with label Destruction. Show all posts

November 23, 2014

Data 4 Ransom

The future of cybercrime will soon become the almost routine taking of your personal and corporate data as hostage. 

Once the hacker has control of it, with or without exfiltration, they will attach malware to it--like a ticking time bomb.


A simple threat will follow:


"I have your data. Either you pay for your data back unharmed OR your data will become vaporware! You have one hour to decide. If you call the authorities, you data is history."


So how valuable is your data to you?  


- Your personal information--financial, medical, legal, sentimental things, etc.


- Your corporate information--proprietary trade secrets, customer lists, employee data, more.


How long would it take you to reconstitute if it's destroyed?  How about if instead it's sold and used for identity theft or to copy your "secret sauce" (i.e. competitive advantage) or maybe even to surpass you in the marketplace? 


Data is not just inert...it is alive!


Data is not just valuable...often it's invaluable!


Exposed in our networks or the cloud, data is at risk of theft, distortion, or even ultimate destruction. 


When the time comes, how much will you pay to save your data?


(Source Comic: Andy Blumenthal)

Share/Save/Bookmark

September 15, 2014

Just About Says It All



Story of human civilization in 2 minutes by Joe Bush

History majors can probably add some, but overall completely awesome!

Maybe this is a glimpse of what it's like to have a G-d's eye view of the world--where time and space are inconsequential. 

Looking at this, are we almost at the end or are we just on the verge of a new beginning?  ;-)
Share/Save/Bookmark

April 6, 2014

Not Bias, Just Plain Old Hatred

I read a book review in the Wall Street Journal on Profiles in Denial by William Storr about David Irving the notorious Holocaust denier. 

He is a "'revisionist' of all things World War II," but apparently is particularly keen on Holocaust denial, as someone who according to Wikipedia is an "anti-semite, and racist who...promotes neo-Nazism."


The Holocaust denial goes deep for Irving and even upon visiting Majdanek concentration camp, he tells his group "This is a mock-up of a gas chamber. Those cylinders are carbon dioxide not carbon monoxide...There are handles on the inside of these doors," so the prisoners could let themselves out. 


Actually, the door was locked with huge bolts right on the outside and was sealed airtight, but to Irving it's as if these didn't exist. 


The book discusses how cognitive biases such as confirmation biases help people "find confirming evidence for our beliefs, ignoring or rationalizing away all discriminating evidence."


But I think this is really beyond the point with someone like Irving, who according to The Guardian is a discredited British historian and Nazi apologist" and was actually jailed for a "three-year prison sentence in Vienna for denying the Holocaust and the gas chambers of Auschwitz."


The State Prosecutor said of Irving "He's not a historian, he's a falsifier of history...this is about abuse of freedom of speech."


Judge Peter Liebtreau called Irving "a racist, an anti-semite, and a liar."


So this is no simple bias or mind game for Irving, but apparently a convenient way for him to pursue his hatreds under the guise that everything was and is really okay. 


So rather than "Never forget," is is far more beneficial for those that would wish it to happen again that they lull people to believe that it never even was to begin with. 


Interesting that another famous Holocaust denier is no less than Iranian President Mahmoud Ahmadinejad, who claimed the Holocaust, in which six million Jews were murdered, was a "myth" (Washington Post). 


By the way, Ahmadinejad also said "9/11 was an inside job."


People like Irving and Ahmadinejad are not about confirmation bias, but rather about distortion of truth to further their own evil destructive aims.


In the case of Ahmadinejad, it's that he wishes to see Israel be "wiped off the map" (New York Times).


And in the case of Irving, he has said, "there will...probably be another holocaust in the next thirty years...oh, and if the Jews are lucky, there will be a David Irving or Adolf Hitler [may their names be obliterated] to protect them" (The Independent).


Oh, G-d forbid! 


(Source Photo: Andy Blumenthal)

Share/Save/Bookmark

November 22, 2013

Noah's Ark - Must See!


Okay folks, this is great. 

I want to see movie's like this for the all Bible's stories. 

Applying the technology and special effects makes this just awesome.

More, more, more...love it. 
Share/Save/Bookmark

April 12, 2013

Tiptoeing Or Delivering A Knockout Punch

Russia (and many others countries) develop some really kick-a*s weapons--especially, when they are so simple, yet so devastatingly effective. 

Like this TOS-1A heavy flamethrower system--it is a multi-rocket launcher mounted on a T-72 main battle tank chassis. 

The TOS-1A carries 30 (newer version 24) 220-mm incendiary or thermobaric unguided rockets that it can shoot up to 3 km (newer version 6 km), and it destroys everything within 300 square meters using high-pressure and temperature.

What is cool is that the technology seems boiled down to the basics--shoot and eliminate. And when multiple TOS-1As roll unto the battlefield--they unleash what looks like a ruthless barrage of destructive fire. 

Of course, precision targeting weapons have the added benefit of mitigating civilian casualties--but from the looks of things, that is not what this weapon is all about.

The question is do you go half way or finish the job--do you hit below the belt or keep it a clean fight?

In war, if you leave the enemy intact or with fighting capabilities, then you may just have to fight them another day. 

While the rules of war protect people from the cruelties of all out hostilities, we need to make sure that in the end, it keeps them safe over the long-term, and does not just prolong the inevitable cat-fight.

Good, kind, and just people often don't feel comfortable delivering a knockout punch, but sometimes (not all the time) that is just what is needed to restore the peace.  ;-)


Share/Save/Bookmark

April 1, 2012

A Word Indeed


The information in your smartphone and managed by your telecommunications carrier is available and accessible to others with today's tools and following the right processes. 

Bloomberg BusinessWeek (29 March 2012) reports on a new tool for law enforcement that captures your data from smartphones. 

It is called the Cellebrite or Universal Forensic Extraction Device (UFED).

As the video describes it works with almost every mobile device out there--over 1,800 of them. 

And when attached to a smartphone, it can extract everything from your call log, emails, texts, contact list, web history, as well as photos and videos. 

The forensic tool can even retrieve deleted files from your phone. 

Your smartphone is a digital treasure trove of personal information and the privacy protection afforded to it is still under debate. 

The article cites varying court opinions on "whether it's fair game to examine the contents of a mobile phone without a warrant," since it is in the suspect's immediate possession. 

According to law enforcement sources quoted in the article, "we use it now on a daily basis."

Aside from the contents on the phone itself, Bloomberg BusinessWeek (29 September 2012) earlier reported that telecommunications companies are also storing your personal data for various lengths of time.

For example, detail call records and text contacts are retained for up to 7 years and phone location information indefinitely, depending on the carrier.

This data is available too under the processes specified in the Electronic Communications Privacy Act. 

While the technology is constantly getting better for us to electronically manage our information and communicate with each other, the reach and life cycle of digital information can certainly be far and long.

As we should all by now know, working remotely, digitally, in cyberspace, and encrypting, deleting, or even attempting to destroy data files does not ensure their ultimate privacy. 

In that respect, both digital and non-digital information are the same in one very important facet and that is as we all learned early in life that "a word once said cannot be taken back."

Share/Save/Bookmark