Archive for August, 2010

Who guards the (Bay) Guardian?

Thursday, August 12th, 2010

Answer: the First District Court of Appeal.

We have previously noted the ongoing legal battle between the SF Bay Guardian and the SF Weekly (owned by Village Voice Media) over alleged predatory price-cutting by the latter. A jury awarded the Bay Guardian $21 million, but the Weekly appealed the decision.

That decision has now been upheld by the appellate court.

There is a claim in the linked article that the two parties have “reached a settlement”. Apparently, this settlement came after the SFBG was told they could seize and sell the Weekly‘s delivery trucks.

Obit watch.

Thursday, August 12th, 2010

Everyone and his brother is on this already, but I have to get my kicks in: “Cathy“. (Chicago Tribune.)

The best commentary I’ve seen so far is from Josh and his gang over at the Comics Curmudgeon website.

With “Cathy” gone, that takes care of one of the comics on my top ten hit list. Now if we could only do something about “The Amazing (Glacial) Spider-Man”, “Gasoline Alley”, “Funky Winkerbean”, and “Crankshaft”, I’d be a very happy man.

Edited to add: Lawrence was on my case because I didn’t mention “Dinette Set” in the above list. I pointed out that I didn’t intend for that to be a complete list. Then I went and clicked on the Chron link for today’s “Dinette Set”, just to make sure the damn thing was still being published.

Wow. This isn’t even just “not funny”.  This doesn’t even approach “what’s the deal with airline food?” levels. There’s not even an attempt at humor here; this is just someone who can’t draw or write, recounting an event without giving us any clue as to why we should find this interesting or amusing.

Reddit’s “anti-joke” thread is funnier than this. Heck, your average NYT editorial is funnier than this.

The Thais that bind.

Thursday, August 12th, 2010

Rob Balon wonders in his latest blog entry, “why so many Austinites seem to be either indifferent toward or uncomfortable with Thai food“. As Dr. Balon frequently does, he suggests that Austinites are so used to barbecue and TexMex that “something relatively unfamiliar has a hard time breaking through”.

Dr.  Balon’s essay is curious for a few reasons. First of all, he’s talking about Thai food, yet completely omits the longest lived (as far as I know) and single most successful group of Thai restaurants in Austin. We could argue about the merits of Thai Kitchen versus Madam Mam’s all day long, but just simply ignoring the metaphorical 800-pound elephant in the room is…curious, to say the least.

Dr. Balon does mention Madam Mam’s, but I find his comments kind of dismissive. He doesn’t even note that there are actually three locations; the third one is near the Alamo Drafthouse in the Village, and to my untrained eye appears to be doing well.

“And yet just a few miles south on W 6th st. fine restaurants like Lemongrass and Thai Tara have languished and ultimately closed.” I would have to go back to the archives and do some research, but my recollection is that the closing of Lemongrass was a lot more complicated than that. As for Thai Tara, it stayed open much longer than I would have expected; I’d suggest that it closed almost entirely due to a bad location, and especially due to parking issues downtown.

Dr. Balon mentions relatively new places such as Chon Som and Titaya, but I see even more Thai places that he doesn’t mention popping up on street corners all over town. (For example, Pad Thai on Guadalupe, and Thai Cuisine at Parmer and I-35.) Thai Village seems to be doing much better than the shopping center it’s in. Bangkok Cuisine has stayed in business for many years (how, I don’t exactly know). Compared to the Thai situation in, say, 2007, we’re living in a golden age.

Could some of these places (like Satay) use more customers? Dr. Balon seems to know more about this than I do. But let’s say that they could use more customers; is that because they serve Thai food, or is that because of the economy in general? If we compared Thai places to TexMex places, or barbecue joints, would we see a similar trend towards a smaller customer base?

Dr. Balon may have a point, but I don’t think he’s mustered the evidence to back it up.

Art, damn it, art! watch (#14 in a series).

Wednesday, August 11th, 2010

I’m putting this under the “Art, damn it, art!” watch because I haven’t made up my mind about this one.

Would you pay someone to sharpen your pencil for you? (This is not a metaphor for something else: when I say “sharpen your pencil”, I mean a regular #2 pencil, with graphite and an eraser.)

Would you pay someone $15 to sharpen your pencil for you?

Would you pay someone $15 to sharpen your pencil for you, using a “specially selected” implement that “suits your pencil best”?

Would you pay David “Get Your War On” Rees $15 to sharpen your pencil for you?

My first thought was: this is moronic.

But considering it some more, “artisanal pencil sharpening” could be a subtle and brilliant parody of the whole “artisanal” movement. Artisanal food, artisanal axes; why not “artisanal pencil sharpening”?

DEFCON 18 updates.

Tuesday, August 10th, 2010

I’m actively going back and adding links to my original DEFCON 18 posts as they become available and/or I find them.

However, I know some people use RSS to read WCD, and don’t automatically get updated posts in their feed.  So I’m also going to try posting lists of updates I’ve added, at least for the DEFCON 18 stuff.

DEFCON 18 day 1:

DEFCON 18 day 2:

If you’re aware of links I’ve missed so far (and by the way, thanks Gremlin), or if there’s a talk you saw that I haven’t covered, please feel free to leave comments.

Firing watch.

Tuesday, August 10th, 2010

The Seattle Mariners (43-70) fired Don Wakamatsu, their manager, yesterday. As the Seattle paper notes, this took place right before the Mariners’ celebration of Japanese heritage day, and Wakamatu’s firing was just the latest in a long string of odd incidents this year.

Missed this on Sunday, but the Pirates fired their pitching coach and bench coach.

And the city of Maywood (remember Maywood?) is considering firing the city of Bell, due to the ongoing salary scandal in Bell.

Not exactly a firing, but I’m going to throw this in anyway: LA County Sheriff Lee Baca is refusing to release records involving the death of Ruben Salazar. Salazar was a television journalist covering an anti-Vietnam war rally in East LA on August 29, 1970; he was killed when a sheriff’s deputy fired a tear-gas grenade into a bar and hit Salazar in the head.

The LAT doesn’t mention this aspect of Salazar’s life, but I will. I’ve been interested in Salazar ever since I read The Great Shark Hunt and discovered Salazar was a close friend of Thompson’s. Actually, more than just a close friend; the “300-pound Samoan attorney” in Fear and Loathing in Las Vegas was Salazar (who, according to Thompson, was somewhat upset that Thompson chose to conceal his identity).

Edited to add: Whoops, I was mistaken. I had Salazar confused with Oscar Zeta Acosta. That’s what I get for relying on my memory while I was at work, and not waiting until I got home to check my sources. HST did write about Salazar in The Great Shark Hunt, though.

Friday loser update.

Friday, August 6th, 2010

It has been a while since I’ve done one of these, what with travel and all, but I did warn you I was laying off the Astros updates….

Anyway, Houston’s actually passed the Cubs to move into 4th place in the division. At .439, that works out to 71.118 projected wins.

Baltimore’s at 35-73, for a .324 winning percentage, and 52.488 projected wins.

Pittsburgh’s at 38-70, for a .352 winning percentage, and 57.024 projected wins.

I hate to say this.

Thursday, August 5th, 2010

But I believe President Obama has done something right.

Back during the Vietnam war, there was a four-star general in the Air Force named John D. Lavelle. In 1972, he was accused of ordering unauthorized bombing missions in North Vietnam, and of trying to cover up those missions. General Lavelle denied the charges, and claimed the missions were authorized; however, he was demoted and forced to resign anyway.

Lavelle died in 1979, but insisted in interviews that the missions were authorized, and that he was acting on the orders of the Joint Chiefs of Staff.

Yesterday, President Obama asked the Senate to restore General Lavelle’s missing star, which would effectively (in my humble opinion, and in the opinion of the WP) restore General Lavelle’s honor.

The president’s decision is based on evidence uncovered by Aloysius Casey, a retired general, and his son, Patrick, who were researching a biography of another Air Force general. In the process of their research, they found documents showing that, yes, the Joint Chiefs of Staff knew of and authorized the missions.

Even more damning, they found audio recordings showing that President Nixon also ordered and knew of the missions, and actually dithered about whether or not to throw General Lavelle under the bus.

“I just don’t want him to be made a goat, goddamnit,” Nixon told his national security adviser, Henry Kissinger, on June 14, 1972, a few days after it was disclosed that Lavelle had been demoted for the allegedly unauthorized attacks. “You, you destroy a man’s career. . . . Can we do anything now to stop this damn thing?”

On June 26, Nixon’s conscience intervened in another conversation with Kissinger. “Frankly, Henry, I don’t feel right about our pushing him into this thing and then, and then giving him a bad rap,” the president said. “I don’t want to hurt an innocent man.

One Ryan, one Rangers.

Thursday, August 5th, 2010

We have previously covered the strange events surrounding the sale of the Texas Rangers. Now, things appear to be at an end: Nolan Ryan’s group won the auction, beating out a group that included Mark Cuban (owner of the Dallas Mavericks).

Given how contentious the auction seems to have been (one of the lawyers for Ryan’s side apparently cursed out the lawyer for the court-appointed restructuring officer; remember, as part of this sale, the Rangers filed for Chapter 11), I would not be shocked to see additional legal action attempting to block the sale.

I like to call this one…

Wednesday, August 4th, 2010

“Beauty and the Beast”.

(Photo credit: Mike the Musicologist.)

After action report: Las Vegas, NV.

Wednesday, August 4th, 2010

I covered a lot of stuff in my previous travel report, so this will mostly just be updates.

  • Project e worked spectacularly well at DEFCON. This is the first chance I’ve had to really push the battery life, and I was able to get an good 12+ hours out of the battery without running it totally dry. (This was with the machine set to “powersave” and putting it into “standby” or “hibernate” when I was in the dealer’s room, or driving around with Mike the Musicologist and Andrew. Continuous usage with the wireless would have been more like 6+ hours, I think, which is still pretty impressive.)
  • My one regret is that I forgot my Alfa external WiFi adapter. I would have enjoyed playing with that at the convention.
  • The 5.11 bailout bag also worked out well for lugging around Project e and various other equipment. Again, I was able to carry a pretty good load, including the laptop, charger, books, a couple of bottles of water,  the small camera, and miscellaneous other necessities.
  • MtM has the Nikon with him and has been taking a lot of photos. As you saw below, I did use the Nikon to take some Gehry photos. When I have more time, I’m going to put up an expanded and annotated Flickr photo set; I did some side-by-side experiments with aperture priority vs. automatic exposure.
  • Food in Las Vegas was, without exception, pretty darn good. The worst meal I had (at the Four Kegs) was still better than average (and I didn’t order the stromboli, which is the house specialty). We also had a very good (if loud) tapas meal at Firefly* on Paradise, the usual wonderful meal at Lotus of Siam, the previously mentioned dinner at Shabu-Shabu Paradise, and a Moroccan meal at Marrakech. (I had not previously had Moroccan food, so I can’t comment on how authentic it was. I certainly enjoyed my meal, and the belly dancer didn’t hurt.)

    Vegas does have something of a shortage of good breakfast places outside of the casinos (and even inside of the casinos, if you’re not looking for a buffet). We had several good breakfasts at Blueberry Hill on Flamingo and one excellent breakfast at The Egg and I on Sahara. I know that MtM and Andrew went to a good Italian place in New York, New York while I was at the convention, and I’ll let them comment on that.
  • Between Tucson and Las Vegas, the refurbished Kindle I ordered arrived, and it went on this trip. I’m sure I’ll have more to say about the Kindle later on, but my first impression is “Meh”. I did manage to read John Clark’s Ignition! in PDF format and a Project Gutenberg MOBI format copy of Heart of Darkness without too much trouble, but my experiences with other PDF files and eBooks have been inconsistent.
  • On the other hand, I finished, and highly recommend, Ubuntu for Non-Geeks 4th Edition and am almost finished with Cisco Routers for the Desperate 2nd Edition (also recommended). No Starch Press rocks. And the coupon code “DEFCON18” will get you a 30% discount. And they’re running a half-price sale on all e-books.
  • My Southwest experience this time was much more pleasant. No misplaced bags, and no flight delays. One thing that was particularly unusual was going through the security line in Las Vegas; I had, literally, no wait. Just walked straight up to the TSA agent and got in line for the metal detector. It took longer to take my shoes off and the laptop out than it did to get through the rest of security.

My thanks to, in no particular order, the DEFCON 18 staff and presenters, No Starch Press, UNIX Surplus, SEREPick, Lotus of Siam, Shabu-Shabu Paradise, Sarah at the iBar in the Rio, and the unknown belly dancer at Marrakech.

Special thanks to my high-speed, low-drag travel companions in the primary, Mike the Musicologist and Andrew “Porous concrete? What were they thinking?” Wimsatt.

Speaking of the bad guys…

Wednesday, August 4th, 2010

pdb has a link up to a report produced by the Border Security Operations Center on a massive drug cartel shootout in Nuevo Laredo. This was a running gun battle between opposing groups (with, according to BSOC, some involvement by Mexican armed forces) over a two to three hour period.

The BSOC presentation includes photos, and some of those photos are graphic. Viewer discretion is advised. Skip to page 21 for the summary, if you don’t want to deal with the photos.

Edited to add: Jay G. has a post up at his site in which he points out a remarkable similarity between the right-hand photo in the second row on page 20, and this photo of a Suburban supposedly holed by F-16 fire when it wandered onto the wrong part of a military base. There’s some speculation in the comments about whether someone inserted an unrelated photo just to make things look better, or whether this is part of an evil master plan to play up the “drug gangs armed with American assault rifles” canard and get more funding. I’m leaving this post up, but Jay G.’s post makes me a lot more skeptical.

DEFCON 18 notes: Day 3.

Wednesday, August 4th, 2010

“The Search for Perfect Handcuffs… and the Perfect Handcuff Key“: It seems that Sunday morning at DEFCON has become the default time for the lock picking and other physical security panels. Sometimes this bugs me a little; I can only sit through so many panels on compromising high security locks with common household objects before my eyes glaze over and I leave for the dealers room. It isn’t that these panels aren’t interesting, but three in a row…

Anyway, I say all that to say that this presentation from TOOOL was one of the better Sunday morning lock bypass presentations I’ve seen at DEFCON. Deviant Ollam and his crew gave a comprehensive overview of handcuffs, how they work, and how they can be defeated. Some key points:

  • A group of Dutch hackers managed to defeat the high security Dutch handcuffs by taking a photo of the key (hanging off someone’s belt) and using a 3D printer to duplicate it. The key can be found here.
  • You can shim many handcuffs with paper, believe it or not. Paper money (especially European paper money, which in many cases is more like plastic or Tyvek than paper) works especially well for this, as currency is generally designed to be tear resistant.
  • Handcuffs are generally a pretty simple mechanism. If they aren’t double-locked, it’s really easy to “shim” them (force a flat piece of metal, or something like that, down between the pivoting ratchet arm and the cuff itself), or pick the lock with something like a paper clip. (You know what really works well for a cuff pick? The sort of U-shaped metal arm that comes on those steel binder clips you can buy at Office Depot.)
  • If the cuffs are double-locked, it makes shimming and picking attacks harder. One way to defeat double-locking is the “whack attack”; slam the cuffs against a hard surface, and inertia will pop the double-lock locking bar back into the unlocked position.
  • It doesn’t take a lot of strength to break handcuffs. Breaking them is just a matter of binding the chains up. Once you’ve done that, it’s just leverage and simple physics to break the chain.
  • You can also rough up the chain with a small easily concealed diamond saw blade to make it easier to break. The folks at SEREPick sell such a thing; you can hide it in the seams of your clothes, in a belt, in the top of a shoe…
  • There’s a lot of design variation in handcuffs, which can cause problems, especially if you’re trying to find a universal handcuff key. Keyway sizes, size and number of pawls…lots of things can cause problems.
  • The TOOOL folks have collected a bunch of cuffs, so they got as many as possible together, took very precise measurements of the keys, and came up with a single “universal” handcuff key that opened all the cuffs they were able to try. No, they don’t sell it, but diagrams and measurements for the key were part of the presentation. The easiest thing to do, according to the presenters, is to start with a Smith and Wesson handcuff key, as that’s closest to the final dimensions of the universal key. After that, all you need is some minor cutting and filing which can be done with a Dremel tool.

(I suspect there are some people who are going to ask “Why would you want to break out of handcuffs? And don’t you feel bad about sharing this information with criminals?” In the first place, the criminals have already learned all these tricks at one of our many institutes of higher education. In the second place, the bad guys are starting to use things like handcuffs and zip ties to restrain their victims; you might as well learn how to defend yourself.)

“Electronic Weaponry or How to Rule the World While Shopping at Radio Shack“: I’ll cut some slack for this guy being a first time presenter, but this was a “Meh” panel for me. It was heavy on the theory of things like RF jamming and EMP attacks, but short on practice. Most of the theory I already knew, so there wasn’t a whole lot there for me. At the end, he did demonstrate a “sound cannon”, which was interesting. It did not, however, even approach the “annoying” level for me, much less the “weapon” one, though the presenter was running it without amplification.

“Breaking Bluetooth By Being Bored”: Dunning (who also built Vera-NG, a Bluetooth and WiFi sniping rifle) presented a series of tools for banging on Bluetooth. These tools included:

  • SpoofTooph, a utility for cloning and spoofing Bluetooth devices. SpoofTooph can also be run in a logging mode, where it will collect data on devices it encounters.
  • The Bluetooth Profiling Project, which uses programs like SpoofTooph to collect Bluetooth device profiles for analysis. (For example, which device addresses correspond to which manufacturer?)
  • vCardBlaster, a utility for running a denial of service attack against a Bluetooth device by flooding it with vCards.
  • Blueper, which sends a stream of files over Bluetooth. You can send files to multiple devices in range, or target a single device and flood it with files. This is interesting because many devices cache received files before asking the user to accept them; if you push a continuous stream of files to one of those devices, you can fill up internal storage and possibly crash the device.
  • pwntooth, a suite of automated Bluetooth testing tools.

As a side note, after some banging around (mostly to resolve dependencies) I managed to compile and install SpoofTooph on Project e. So far, I’ve only tested it in my lab environment, but it seems to work as designed. This is one of the reasons I love going to DEFCON, as there’s nothing like that moment when you say “Holy f—ing s–t, that f—ing f—er actually f—ing works! S–t!”

There was no final attendance figure announced at the closing ceremonies. According to Joe Grand’s badge documentation, there were 7,000 electronic badges made, and those went fast. I would not be shocked if there were 15,000 people at DEFCON this year, and from what I saw in the closing ceremonies, a lot of those folks were attending for the first time.

The big piece of news from the closing ceremonies is that, after four years at the Riveria, DEFCON is moving to the Rio next year. My hope is that the move will make it easier to get into the more popular panels (DEFCON apparently will be using the Penn & Teller Theater at the Rio), and provide more room to move around. (And maybe even more room for vendors.)

Coming up later on: the final after action report and thank-yous.

Running on empty.

Tuesday, August 3rd, 2010

I’m home and safe, but still running a little behind. I hope to have the DEFCON 18 Day 3 notes up tonight, along with an after-action report on Las Vegas.

While I was on the road, there were reports that Angela Spaccia, the assistant city manager of Bell and the interim city manager of Maywood, had resigned from the Maywood position. Apparently, that’s not exactly the case; the Maywood City Council didn’t accept Spaccia’s resignation at their meeting Monday night. However, they did accept the resignation of Maywood City Attorney Edward Lee. Curiously enough, Lee is also the city attorney of Bell, and states he needs to resign his Maywood position to focus on the issues in Bell.

Obit watch: Mitch Miller.

Morrie Yohai, inventor of Cheez Doodles.

DEFCON 18 notes: Day 2.

Sunday, August 1st, 2010

Saturday was kind of a rough day at DEFCON 18. But then, Saturday is always a rough day at DEFCON.

I don’t feel it’d be fair to review or summarize the “Extreme-range RFID Tracking” panel; I came in about 20 minutes late. (We lingered a bit over a very good breakfast at Blueberry Hill.) What I was able to gather is that Padget’s set a new record for long distance RFID reading, and that upping the radio power works for increasing RFID reading range up to a point. (Edited to add 8/10/2010: added link to Black Hat 2010 version of paper. Here’s a link to Paget’s blog entry about the session.)

I was not able to get into “Jackpotting Automated Teller Machines Redux” due to extreme overcrowding. (Edited to add 8/9/2010: The Black Hat website has what purports to be MP4 video of Jack’s version of the presentation at Black Hat 2010. I have not sat down and watched it yet.)

I did attend the “This is not the droid you’re looking for…” panel, mostly because I was camping out for the next talk. This panel turned out to be more interesting than I expected; the presenters demonstrated a proof-of-concept rootkit for Android phones that allows you to do all sorts of fun stuff; grab contact information, grab SMS messages, grab location information (all three of these are stored in SQLite databases on the Android), and even make phone calls from the phone. The presenters haven’t weaponized the attack yet, but claim it should be easy to do so.

Practical Cellphone Spying“: Another nifty panel. Padget discussed the concepts behind IMSI catching, and gave a live demo of cellphone interception on the AT&T network. The key takeaway here for me was that the same technology used by law enforcement to intercept calls is now coming down to the point where it will be wrapped in a turnkey package and sold to people with more questionable motivations. (Edited to add 8/10/2010: added link to Paget’s blog entry which includes slides.)

How to Hack Millions of Routers“: I went to this because Lawrence put in a special request. The short version is that a large number of commercially available routers (such as those used by Verizon FIOS) are vulnerable to a clever attack using DNS rebinding and load balancing. Heffner has also released a tool that automates this attack. (This is another Black Hat talk that got a lot of attention in the press; the link above includes a copy of Heffner’s white paper which details the attack vector.)

(Edited to add 8/9/2010: I’ve added a link to Heffner’s Black Hat version of this talk, which as far as I can tell, is pretty similar to the DEFCON 18 version.)

I didn’t attend either “Hacking with Hardware: Introducing the Universal RF Usb Keboard Emulation Device – URFUKED” or “Programmable HID USB Keystroke Dongle: Using the Teensy as a Pen Testing Device“. (Edited to add 8/10/2010: added a link to the Teensy project from the Irongeek website. The bottom of that page has a link to the DEFCON presentation. I’ve also added a link to HackerWarrior.com for the USB Keyboard Emulation Device; that directory appears to contain a copy of the presentation, plus code.)

Instead, I left a little early, had a very nice sake fueled dinner at Shabu-Shabu Paradise in Henderson (a restaurant I enthusiastically endorse), sidecars at the iBar in the Rio (sadly, we did not get to play with the Microsoft Surface), and Penn & Teller.

The three of us saw Penn and Teller back in 2006, and we wondered how much the show had changed since then. Mike the Musicologist estimated that about 50% of the show was new; I think the percentage is a little higher than that, but my memory may be faulty. I was not unhappy that they ended the show with the .357 magnums; the bullet-catching illusion fascinates me, and I’m still trying to figure out how Penn and Teller do it. (Jim Steinmeyer’s The Glorious Deception: The Double Life of William Robinson, aka Chung Ling Soo is a very good history of the bullet-catching illusion, and yet another book I strongly recommend to anyone with even a casual interest in the history of magic.)

The other thing we all noticed is that Penn and Teller’s show has become a bit more explicitly political; in addition to the .357 magnum closer, which has always included 2nd Amendment references (and big kudos to P&T for reciting the Four Rules), the show also included references to flag burning, the Chinese Bill of Rights (“What Chinese Bill of Rights?” Exactly.) and the stupidity of the TSA. Penn and Teller even sell the Security Edition of the Bill of Rights in their gift shop for a lousy $5. (Quote: “We want McCarran Airport to be flooded with these.”) Not that any of us were bothered by the politics; I think all three of us lay claim to at least some form of Libertarianism. And if you’re the kind of person who would take offense at Penn and Teller’s politics, I won’t tell you “don’t go”; I’ll tell you “go, and have your world view challenged”.

(I’d also like to give Penn and Teller kudos for keeping gift shop prices low. Both Andrew and I picked up DVDs of the Teller-directed “Macbeth” for only $10. Teller, if you’re reading this, thanks for signing my copy. And for everything else you do, too.)

Computers. You know, for kids.

Sunday, August 1st, 2010

We would also like to draw your attention to the Statesman‘s profile of Ken Starks and the HeliOS project.

The HeliOS people take in donated computers, refurbish them, put LINUX on them, and then get them into the hands of poor kids whose families can’t afford to buy computers.

Frequently, these families also can’t afford Internet access, which is the next big problem that the HeliOS people are trying to solve; so far, they haven’t had much luck with that.

Art, damn it, art! watch (#13 in a series).

Sunday, August 1st, 2010

We take a brief break from DEFCON 18 coverage to bring you the following link, by way of Popehat.

Brandon Bird, the man responsible for “Law and Order: Artistic Intent” (previously mentioned in this space), put together another “Law and Order” themed exhibit in Los Angeles: “These Are Their Stories“. Each of the various pieces in this exhibition, as Bird describes it, “is an artist’s interpretation of a one-line episode summary from the DirecTV program guide”.

We have not had time to go through the entire series of works, but we are particularly taken with “Goren Takes on a Chess Master“, and are tempted to order a print. “Detectives Look for a Racist” also makes us grin.

DEFCON 18 notes: Day 1.

Sunday, August 1st, 2010

I’m running a little behind, between running around with Andrew and Mike the Musicologist, and some technical issues (DEFCON 18 has a secure wireless network, but it hasn’t been stable), but I’ll post updates when I can. I’ll also add links to the presentations as they go live, or as I find them. If you have questions, I’m willing to try to answer them, but I’d suggest you email the presenter first. If you are a presenter who wants to respond to my comments, I welcome that.

“Build a Lie Detector/Beat a Lie Detector”: This was the first presentation I attended; it was a pretty awful one. The presenters started 15 minutes late and opened with a crappy rap performance (differing tastes in music, fine, but when you’re running 15 minutes behind schedule, the rap should be the first thing to go). Once they actually got going, they spent too much time on a general history of justice systems and of the polygraph. When they did finally get to the technical aspects of their presentation, it amounted to “Oh, yeah, we built this lie detector based on this paper these other guys posted” (with, to be fair, some minor modifications). I walked out of this presentation before the end, which is something I rarely do at DEFCON.

Build your own UAV 2.0 – Wireless Mayhem from the Heavens!“: On the other hand, Renderman and his partner did an excellent job with this one And not just because they played “Thunderstruck” before the presentation started (playing music is okay, even if I don’t like your choice of music (and I like “Thunderstruck”), as long as you start on time), or because they started on time, or because they actually had video of their UAV launching rockets. (Edited to add 8/10/2010: added link to DEFCON 18 slides and video on Gremlin’s website.)

Key takeaways for me from this one:

  • You have two choices for stabilization systems. Thermopile based systems work in the infrared range and are very cheap, but have problems in certain weather conditions. Inertial based systems are more expensive, but offer all-weather capability, and are rapidly coming down in price.
  • Arduino based control systems dominate at the moment, but there’s some interest in developing systems based on the Beagle Board.
  • There’s off the shelf Zigbee based hardware that can easily be used for telemetry, and offers a 10-12 mile range.
  • You can get cheap and decent video out of board cameras, but transmitting video is a harder problem; for good range, you need to work on frequencies that require an amateur license.
  • GPS systems with a 10 Hz refresh rate are down to $80 or so. Most of the GPS systems I’ve dealt with have a 1 Hz refresh rate, which isn’t good enough for UAV use; it was news to me that faster systems are that cheap now.
  • Foam airframes are cheap and easy to repair.
  • Practical UAV applications, other than launching rockets; warflying with kismet, communications relay (imagine a UAV that could hover on station and serve as a repeater in areas of poor radio coverage), search and rescue (imagine a UAV that could survey a wide area looking for signs of a lost hiker, or recon an area where a search and rescue beacon was picked up), and post-disaster recon. I hadn’t thought much about that last one, but now that Renderman’s brought it up, I find that exciting. The theory here is: you send your UAV into areas that your disaster relief staff haven’t physically visited, and it returns good quality imaging of exactly what the damage is and how accessible the area is (have the roads collapsed? Are they under water?). From that, you can develop priorities (damage in this area doesn’t look too bad, we can hold off for a day; these people look like they need immediate help) and plans to get needed resources into the area.

“Exploiting Digital Cameras”: Another solid presentation. Basically, Isacson and Ortega did some clever banging on the firmware of the Canon Powershot series of cameras, found that these cameras have an embedded interpreter, documented that interpreter, and developed some simple exploits using it. The exploits are somewhat limited; you can’t launch malware on an attached computer, for example, but you can do things like turn on the microphone, display arbitrary images on the camera, and modify EXIF data.

“DCFluX in: Moon-bouncer”: A decent presentation on the theory and practice of radio communication using moon-bouncing, satellites, and other methods. I’m going to gloss over the details of his talk and refer you to the presentation when it goes up, as there was a great deal of technical information in it related to historical and amateur radio usage; I’m not sure the majority of my readers are that interested in ham radio, and those who are would be better served getting their information from the source.

Black Ops Of Fundamental Defense: Web Edition“: So here’s a high-level summary of Kaminsky’s talk. Now that the DNS root certificates are digitally signed, we have the ability to use DNSSEC and the Domain Keys Infrastructure (DKI) to do all kinds of cool stuff, including end-to-end email authentication (so you can be sure that the email you got from Bank of America is actually from Bank of America, and not from some random Nigerian), and to do these things in a scalable way.

Kaminsky’s new company, Recursion Ventures, is building (and plans to release shortly) a set of tools that will allow for the easy deployment of DNSSEC. Kaminsky also gave a brief overview of how DNSSEC works, and touched on a few interesting points related to his research. (For example, not only is it possible to run DNS over HTTP, but Kamisky’s figures show performance over HTTP is actually better than normal DNS.)

(Edited to add 2: The link above goes to a page on Recursion Ventures web site where you can view the slides from Kamisky’s version of this talk at Black Hat 2010. I did not see the Black Hat version of this talk; I do not believe the DEFCON 18 version was significantly different. It may have been shorter, and there is some Black Hat specific material in those slides. Also, I’m aware the actual title (“Black Ops of Fundamental Defense: Introducing the Domain Key Infrastructure”) differs from the title in the DEFCON 18 schedule; I chose to stick with the DEFCON title to make cross-referencing easier.)

Edited to add: I’m sorry if anyone is disappointed, but I did not go to the “Weaponizing Lady GaGa, Psychosonic Attacks” panel.