FBI says it may have found a way to unlock shooter’s iPhone

The FBI says it may have discovered a way to break into the iPhone used by one of the San Bernardino mass shooters, and an important court hearing in the case that was scheduled for Tuesday has been postponed. "On Sunday, March 20, 2016, an outside party demonstrated to the FBI a possible method for unlocking Farook’s iPhone," lawyers for the government said in a court filing Monday afternoon, referring to the shooter Syed Farook. "Testing is required to determine whether it is a viable method that will not compromise data on Farook’s iPhone. If the method is viable, it should eliminate the need for the assistance from Apple set forth in the All Writs Act Order in this case," the government lawyers wrote.To read this article in full or to leave a comment, please click here

Tor Project says it can quickly catch spying code

The Tor Project is fortifying its software so that it can quickly detect if its network is tampered with for surveillance purposes, a top developer for the volunteer project wrote on Monday.There are worries that Tor could either be technically subverted or subject to court orders, which could force the project to turn over critical information that would undermine its security, similar to the standoff between Apple and the U.S. Department of Justice.Tor developers are now designing the system in such a way that many people can verify if code has been changed and "eliminate single points of failure," wrote Mike Perry, lead developer of the Tor Browser, on Monday.To read this article in full or to leave a comment, please click here

Cisco reorganizes engineering in a big way; veteran Ahuja out

Cisco, which kicked off 2016 with news that the leader of its engineering troops would soon be leaving the company, has now undertaken a major reorganization of that same group and disclosed another high-profile departure.The company announced internally that the moves, designed to better align engineering with Cisco business priorities under new-ish CEO Chuck Robbins, include the exit of 18-year veteran and Service Provider leader Kelly Ahuja. Cisco did not say where Ahuja might be headed, but did say he will be replaced by Yvette Kanouff, who will lead an expanded Service Provider organization. Kanouff joined Cisco in 2014 from Cablevision and has been Cisco's SVP and GM, Cloud Solutions.To read this article in full or to leave a comment, please click here

Cisco reorganizes engineering in a big way; veteran Ahuja out

Cisco, which kicked off 2016 with news that the leader of its engineering troops would soon be leaving the company, has now undertaken a major reorganization of that same group and disclosed another high-profile departure.The company announced internally that the moves, designed to better align engineering with Cisco business priorities under new-ish CEO Chuck Robbins, include the exit of 18-year veteran and Service Provider leader Kelly Ahuja. Cisco did not say where Ahuja might be headed, but did say he will be replaced by Yvette Kanouff, who will lead an expanded Service Provider organization. Kanouff joined Cisco in 2014 from Cablevision and has been Cisco's SVP and GM, Cloud Solutions.To read this article in full or to leave a comment, please click here

Label Switched Multicast — Configuration

In the previous post (Label Switched Multicast - An Introduction) in this series on Label Switched Multicast (LSM) I introduced the concepts behind LSM and draft-rosen, the two most poplar methods for transporting multicast traffic through MPLS Layer 3 VPNs.

In this article I will talk through the configuration of LSM on the PE and P routers and get to the point where two CEs are successfully passing multicast traffic via the MPLS network. All of the configuration examples will be relevant to Cisco IOS.

As was the case in the introduction article in the series, it's best if you already have a good understanding of multicast and MPLS before reading this article.

At the end of this article you'll be able to start configuring your own LSM environment using the configuration samples here as a template.

To the CLI!

Using Docker Machine with AWS

As part of a broader effort (see the post on my 2016 projects) to leverage public cloud resources more than I have in the past, some Docker Engine-related testing I’ve been conducting recently has been done using AWS EC2 instances instead of VMs in my home lab. Along the way, I’ve found Docker Machine to be quite a handy tool, and in this post I’ll share how to use Docker Machine with AWS.

By and large, using Docker Machine with AWS is pretty straightforward. You can get an idea of what information Docker Machine needs by running docker-machine create -d amazonec2 --help. (You can also view the documentation for the AWS driver specifically.) The key pieces of information you need are:

  • --amazonec2-access-key: This is your AWS access key. Docker Machine can read it from the $AWS_ACCESS_KEY_ID environment variable, or—if you have the AWS CLI installed—Docker Machine can read it from there.
  • --amazonec2-secret-key: This is your AWS secret key. As with the AWS access key, Docker Machine can read this from an environment variable ($AWS_SECRET_ACCESS_KEY) or from the AWS CLI credentials file (by default, found in ~/.aws/credentials).
  • --amazonec2-region: The AWS driver defaults to Continue reading

Hyper-connected cars can drive you to paranoia

This sounds like an ugly thing for a ham radio operator and director of a community radio station to say but: Clip your car’s antenna. Or stuff a wad of chewing gum into your car’s USB port, and perhaps its ODB2 port. Enough is enough.As Andy Greenberg of WIRED wrote of a US DOT Public Service Announcement, “it is important that consumers and manufacturers maintain awareness of potential cyber security threats” to their now hyper-connected cars.There are likely two antennas, one for radio and one that connects your car to a third-party monitoring system. On-Star, if you have it, is tracking your every move. Do they give information to the NSA? Consider that the NSA probably already gets such cell-phone transmitted information anyway. GM cards have it, and many other cars have their own in-vehicle two-way monitoring systems.To read this article in full or to leave a comment, please click here

Apple vs. FBI: How iOS 8 changed everything

Apple and the FBI meet in court on Tuesday for the first hearing in the showdown over iPhone encryption, but this fight has been brewing since Apple introduced iOS 8 in June 2014.A new Bloomberg report reveals that the FBI and Apple both expected the White House to take their side before the fight went public.It all started with iOS 8 According to Bloomberg’s sources, Apple’s top lawyer, Bruce Sewell, met with officials in President Barack Obama’s administration shortly after the Worldwide Developers Conference in 2014 to discuss iOS 8’s security and privacy changes.To read this article in full or to leave a comment, please click here

Wi-Fi Range Extender from TP-LINK Currently 43% Off – Deal Alert

Many of us probably need a wi-fi extender, but have yet to pull the trigger. The deal currently on the table from TP-LINK may give you the nudge you needed. Their wi-fi range extender lists for $169.99, but at the moment you can purchase this for 43% below list price ($96.96 - See item on Amazon).  TP-LINK's device promises to expand your coverage up to 10,000 square feet and has the capacity to handle, simultaneously, gaming and 4K HD streaming with dual band and AC1750 performance. They've designed it to plug directly into any outlet, and it's "smart signal indicator" will help you discover the best placement for maximum coverage. To read this article in full or to leave a comment, please click here

5 things to remember during Tuesday’s hearing pitting Apple against the FBI

Apple and the U.S. Department of Justice will argue in court Tuesday about whether a judge should require the tech giant help the FBI unlock an iPhone used by the San Bernardino, California, mass shooter.The hearing, before Magistrate Judge Sher Pym of U.S. District Court for the Central District of California, is the end result of weeks of court filings, media coverage, and often contentious debate. The case has pitted advocates of encryption and other security measures on electronic devices against law enforcement agencies trying to fight crime and terrorism.Here are five things to remember about the hearing, scheduled to begin at 1 p.m. PDT in California.To read this article in full or to leave a comment, please click here

Tim Cook: Apple won’t shrink in fight for data privacy

Apple won't shrink from its responsibility to safeguard the privacy of its users, CEO Tim Cook said Monday, a day before Apple lawyers are due to face off with the Department of Justice in a California courtroom.Cook's comments confirm the company's continued defiance against a request from the FBI to develop software that will allow it to make multiple guesses of an iPhone passcode without triggering the phone's self-destruct feature."I've been humbled and deeply grateful for the outpouring of support that we've received from Americans across the country from all walks of life," said Cook at an event in Cupertino held to announce new products. "We believe strongly that we have a responsibility to help you protect your data and your privacy."To read this article in full or to leave a comment, please click here

Google, Microsoft, Yahoo and others publish new email security standard

Engineers from some of the world's largest email service providers have banded together to improve the security of email traffic traversing the Internet.Devised by engineers from Google, Microsoft, Yahoo, Comcast, LinkedIn and 1&1 Mail & Media Development & Technology, the SMTP Strict Transport Security is a new mechanism that allows email providers to define policies and rules for establishing encrypted email communications.The new mechanism is defined in a draft that was published late last week for consideration as an Internet Engineering Task Force (IETF) standard.To read this article in full or to leave a comment, please click here

Leaked Clinton email shows Google wanted to help overthrow Syrian President

Last week WikiLeaks launched the Hillary Clinton email archive; it’s described as “a searchable archive for 30,322 emails & email attachments sent to and from Hillary Clinton's private email server while she was Secretary of State. The 50,547 pages of documents span from 30 June 2010 to 12 August 2014. 7,570 of the documents were sent by Hillary Clinton.”The Washington Examiner honed in on an email from 2012 that was forwarded to Clinton after her deputy chief of staff noted that it was a “pretty good idea.” It is supposedly proof that Google wanted to help insurgents overthrow Syrian President Bashar Assad. It seems like the State Department, Google and Al Jazeera were all in cahoots.To read this article in full or to leave a comment, please click here

The Design Mindset (2)

In a comment from last week’s post on the design mindset, which focuses on asking what through observation, Alan asked why I don’t focus on business drivers, or intent, first. This is a great question. Let me give you three answers before we actually move on to asking why?

Why can yuor barin raed tihs? Because your mind has a natural ability to recognize patterns and “unscramble” them. In reality, what you’re doing is seeing something that looks similar to what you’ve seen before, inferring that’s what is meant now, and putting the two together in a way you can understand. It’s pattern recognition at it’s finest—you’re already a master at this, even if you think you’re not. This is an important skill for assessing the world and reacting in (near) real time; if we didn’t have this skill, we wouldn’t be able to tolerate the information inflow we actually receive on a daily basis.network-design-mindset-01

The danger is, of course, that you’re going to see a pattern you think you recognize and skip to the next thing to look at without realizing that you’ve mismatched the pattern. These pattern mismatches can be dangerous in the real world—like the time I Continue reading