From the “It’s About Time Department”: Fastmac.com has announced their custom-designed TruePower UCS Power Outlet with Built-in USB Ports. At just $10 a pop, you can pick up a couple of these bad boys and put one next to the couch, one by your nightstand, etc. Oh, add the cost of shipping, plus permitting fees and electrician’s fees, but if you decide to go renegade and trim those costs with it a simple do-it-yourself weekend project, I’ll take NO responsibility for the consequences.
These outlets are scheduled to begin shipping in early 2010, after final UL approval. That’s just in time for USB 3.0 to begin coming out later in the year, but hey, what technology isn’t obsolete the moment you drive it off the lot?
One added bonus is that the USB ports only draw power when a device is physically connected to it, unlike the typical “vampire” chargers that continually suck electricity when we leave them plugged in – but we never do that, do we? [Ahem, excuse me a moment while I crawl under my desk and unplug the 3 unused chargers that I just noticed... Ok, I’m back.]
Speaking of desks, another useful device is the Belkin In-Desk USB Hub, a 4-port USB 2.0 hub that’s designed to fit into a 3-inch-round opening on your desk and connect to your computer with the included USB cable. It retails for around $40.
And if your desk doesn’t have a 3-inch hole, it’s easy to add with a hole-saw drill attachment, but I’ll let somebody else blog about that. What’s that? My desk? Yup, the hole’s there – I remember seeing it a couple years ago before all the paper got piled on top of it....
Update December 10, 2009:
Disclaimer: The author received absolutely no compensation whatsoever for mentioning these products.
Monday, December 7, 2009
Thursday, November 19, 2009
Report: Countries arming for cyber warfare
A new report issued by McAfee, Inc., entitled “Virtually Here: The Age of Cyber Warfare” reveals that the global cyberarms race has moved from fiction to reality. The report found that politically motivated cyberattacks have increased, and five countries – the United States, Russia, France, Israel and China – are now armed with cyberweapons.
“
The report reveals how the private sector will get caught in the crossfire. Government disclosure is a major issue, as cyber initiatives and information are often classified by the government, hindering cybercrime defense in the public and private sector. Experts call for a clear definition and an open debate on cyberwarfare. Without an open discussion among the government, private sector and the public, future cyberattacks targeting critical infrastructure could be devastating.
This year’s report identifies the following challenges:
However, experts are putting dots together and seeing patterns that indicate that there is increasing intelligence gathering and building of sophisticated cyberattack capabilities.
“
There have been earlier attacks that smack of cyberwarfare too. Estonian government and commercial sites suffered debilitating denial-of-service attacks in 2007, and last year sites in Georgia were attacked during the South Ossetia war, orchestrated by civilian attackers. Recently, in August of 2009, Twitter, Facebook and other sites suffered denial-of-service attacks that appeared to be aimed at a single university professor in Georgia who had been blogging about the Georgian war. Those attacks, timed closely with the one-year anniversary of the conflict, affected hundreds of millions of users.
“
The complete McAfee Virtual Criminology Report 2009 is available for download at http://resources.mcafee.com/content/NACriminologyReport2009NF
“
McAfee began to warn of the global cyberarms race more than two years ago, but now we’re seeing increasing evidence that it’s become real,” said Dave DeWalt, McAfee President and CEO. “
Now several nations around the world are actively engaged in cyberwar-like preparations and attacks. Today, the weapons are not nuclear, but virtual, and everyone must adapt to these threats.”
The report includes insights from dozens of the world’s leading experts in international relations, including Dr. Jamie Saunders, counselor at the British Embassy in Washington D.C. and security experts with experience at the U.S. National Security Agency and the Australian Attorney-General’s Department. Former White House advisor Paul Kurtz compiled the report on McAfee’s behalf.... the efforts of nation-states to build increasingly sophisticated cyberattack capabilities, and in some cases demonstrate a willingness to use them, suggest that aCyber Cold Warmay have already begun.McAfee, Inc. —Virtually Here: The Age of Cyber Warfare
The report reveals how the private sector will get caught in the crossfire. Government disclosure is a major issue, as cyber initiatives and information are often classified by the government, hindering cybercrime defense in the public and private sector. Experts call for a clear definition and an open debate on cyberwarfare. Without an open discussion among the government, private sector and the public, future cyberattacks targeting critical infrastructure could be devastating.
This year’s report identifies the following challenges:
- Cyberwarfare is a Reality – Over the past year, the increase in politically motivated cyberattacks has raised alarm and caution, with targets including the White House, Department of Homeland Security, U.S. Secret Service and Department of Defense in the U.S. alone. Nation-states are actively developing cyberwarfare capabilities and involved in the cyberarms race, targeting government networks and critical infrastructures. The result of a cyberattack of this nature can result in physical damage and death – it’s not just a war between computers; cyberwarfare can cause real devastation.
- Cyberweapons Are Targeting Critical Infrastructure – Attackers are not only building their cyberdefenses, but cyberoffenses, targeting infrastructure such as power grids, transportation, telecommunication, finance and water supplies, because damage can be done quickly and with little effort. In most developed countries, critical infrastructure is connected to the Internet and lacks proper security functions, leaving these installations vulnerable to attacks. Without the appropriate protection combined with the current lack of preparedness, an attack on these infrastructures would be detrimental and will cause more destruction than any previous attacks.
- Cyberwar is Undefined – Cyberwarfare entangles so many different actors in so many different ways that the rules of engagement are not clearly defined. Additionally, there is debate on how much responsibility should be placed on organizations to protect and educate the public on preventing cyberattacks. Without a proper definition in place, it is nearly impossible to determine when a political response or threat of military action is warranted.
- Private Sector is the Most at Risk – Critical infrastructure is privately-owned in many developed countries, making it a huge target for cyberwarfare. The private sector relies heavily on the government to prevent cyberattacks. If virtual shooting starts, governments, corporations and private citizens may get caught in the crossfire. Without insight into the government’s cyberdefense strategy, the private sector is not able to be proactive and take the proper precautions. Experts call for a public discussion on cyberwarfare, bringing it out of the shadows.
Nations have been reluctant to use those capabilities because of the likelihood that [a big cyberattack] could do harm to their own country. The world is so interconnected these days”, says Dmitri Alperovitch, Vice President of Threat Research at McAfee.
However, experts are putting dots together and seeing patterns that indicate that there is increasing intelligence gathering and building of sophisticated cyberattack capabilities.
“
While we have not yet seen a ‘” the report says.hot’ cyberwar between major powers, the efforts of nation-states to build increasingly sophisticated cyberattack capabilities, and in some cases demonstrate a willingness to use them, suggest that a ‘Cyber Cold War’ may have already begun,
For instance, Alperovitch speculates that the July 4 denial-of-service attacks on Web sites in the U.S. and South Korea could have been a test by North Korea to see if flooding South Korean networks and the transcontinental communications between the U.S. and South Korea would disrupt the ability of the U.S. military in South Korea to communicate with military leaders in Washington, D.C., and the Pacific Command in Hawaii. “Over the next 20 to 30 years, cyberattacks will increasingly become a component of war.William Crowell, fmr. Deputy Director, U.S. National Security Agency
The ability of the North Koreans to disable cybercommunications between the U.S. and South Korea would give them a huge strategic advantage [if they were to attack South Korea]”, Alperovitch said.
There have been earlier attacks that smack of cyberwarfare too. Estonian government and commercial sites suffered debilitating denial-of-service attacks in 2007, and last year sites in Georgia were attacked during the South Ossetia war, orchestrated by civilian attackers. Recently, in August of 2009, Twitter, Facebook and other sites suffered denial-of-service attacks that appeared to be aimed at a single university professor in Georgia who had been blogging about the Georgian war. Those attacks, timed closely with the one-year anniversary of the conflict, affected hundreds of millions of users.
“
Over the next 20 to 30 years, cyberattacks will increasingly become a component of war,” says William Crowell, a former Deputy Director of the U.S. National Security Agency. “
What I can’t foresee is whether networks will be so pervasive and unprotected that cyber war operations will stand alone.”
The complete McAfee Virtual Criminology Report 2009 is available for download at http://resources.mcafee.com/content/NACriminologyReport2009NF
Labels:
cybercrime,
data security,
denial-of-service,
Facebook,
future tech,
malware,
McAfee,
security breach,
Twitter
Wednesday, November 11, 2009
The “Lady in the Dunes”: A Cold Case Reopened
Here’s a great example of an appropriate use of leading-edge technology with significant relevance to Provincetown and outer Cape Cod.
On July 26, 1974 the body of an unidentified white female was found in the dunes approximately one mile east of Race Point Beach. Her head was nearly severed, and both her hands were amputated and have never been recovered. Police at the time estimated that she had been dead anywhere from five days to three weeks, and the cause of death was determined to be from blunt force injuries to the head. They said that she was between 25 and 40 years old, with long red hair. She weighed about 145 pounds, was a little over 5 feet 6 inches tall, and had thousands of dollar’s worth of dental work done, but still they could not identify her.
As reported in the Cape Cod Times last week, the unsolved murder, dubbed the “Lady in the Dunes” case, has stumped investigators since the discovery was first made 35 years ago. Since then, local and state police investigators — and even a 2006 episode of Court TV’s “Haunting Evidence” — have tried to identify the woman. But, even with the help of clay head sculpting, DNA testing, age-regression renderings, computerized photographs, artists sketches and psychic profiles, investigators are no closer to figuring out the woman’s identity. According to an article in the Provincetown Banner, it is Provincetown’s only unsolved murder case, and the state’s oldest cold case.
“‘The Lady in the Dunes’, that’s always figured into one of the top unsolved mysteries in the country,” said Gerald Nance, the Center’s forensic services unit supervisor. “She was one [case] that caught on. We’re pretty confident we’ll be able to help.”
The Center has been successful in locating 96 percent of the missing children reported to it. For older cases in which Nance’s forensics unit is involved, the success ratio is lower; however, some 400 cases have been resolved over the last 10 years. Many of the tools used to solve these kind of difficult cases are new, including imaging computer technology that rebuilds faces from skeletal remains.
The likeness of the Lady in the Dunes depicted above was created in 2006 using a traditional approach to facial reconstruction. That approach, as illustrated to the right, relies on placing spacing offsets on the skull, and then adding clay and sculpting it directly onto the skull. The process is time-consuming, to say the least. Making even a minor change requires a major effort, perhaps starting from scratch. With today’s computer-based techniques, the computer model can be updated down the road, as new information becomes available. If the age, ethnicity or even gender are changed, a new likeness can be generated nearly instantaneously after making a few simple changes in the database.
Let’s hope this new model sheds some new light and finally brings this 35-year-old case closer to closure.
On July 26, 1974 the body of an unidentified white female was found in the dunes approximately one mile east of Race Point Beach. Her head was nearly severed, and both her hands were amputated and have never been recovered. Police at the time estimated that she had been dead anywhere from five days to three weeks, and the cause of death was determined to be from blunt force injuries to the head. They said that she was between 25 and 40 years old, with long red hair. She weighed about 145 pounds, was a little over 5 feet 6 inches tall, and had thousands of dollar’s worth of dental work done, but still they could not identify her.
As reported in the Cape Cod Times last week, the unsolved murder, dubbed the “Lady in the Dunes” case, has stumped investigators since the discovery was first made 35 years ago. Since then, local and state police investigators — and even a 2006 episode of Court TV’s “Haunting Evidence” — have tried to identify the woman. But, even with the help of clay head sculpting, DNA testing, age-regression renderings, computerized photographs, artists sketches and psychic profiles, investigators are no closer to figuring out the woman’s identity. According to an article in the Provincetown Banner, it is Provincetown’s only unsolved murder case, and the state’s oldest cold case.
Provincetown Police Chief Jeff Jaran hopes a new computerized likeness of the victim will help identify her. He and Provincetown Detective Monica Himes met last week in Washington D.C. with Dr. David Hunt, a renowned forensic anthropologist with the Smithsonian’s National Museum of Natural History, and with representatives from the National Center for Missing and Exploited Children.
The Museum has a special three-dimensional CAT scan machine where the skull will be rotated and mapped by a computer. Scientists will then attempt to assess the victim’s ethnicity, which will help them reconstruct her face and create a new, hopefully more accurate computer rendition of what the young woman looked like at the time of her death.
“‘The Lady in the Dunes’, that’s always figured into one of the top unsolved mysteries in the country,” said Gerald Nance, the Center’s forensic services unit supervisor. “She was one [case] that caught on. We’re pretty confident we’ll be able to help.”
The Center has been successful in locating 96 percent of the missing children reported to it. For older cases in which Nance’s forensics unit is involved, the success ratio is lower; however, some 400 cases have been resolved over the last 10 years. Many of the tools used to solve these kind of difficult cases are new, including imaging computer technology that rebuilds faces from skeletal remains.
The likeness of the Lady in the Dunes depicted above was created in 2006 using a traditional approach to facial reconstruction. That approach, as illustrated to the right, relies on placing spacing offsets on the skull, and then adding clay and sculpting it directly onto the skull. The process is time-consuming, to say the least. Making even a minor change requires a major effort, perhaps starting from scratch. With today’s computer-based techniques, the computer model can be updated down the road, as new information becomes available. If the age, ethnicity or even gender are changed, a new likeness can be generated nearly instantaneously after making a few simple changes in the database.
Let’s hope this new model sheds some new light and finally brings this 35-year-old case closer to closure.
Labels:
Cape Cod,
forensics,
leading edge,
Provincetown
Subscribe to:
Posts (Atom)