Arms reversion (flipping); your call

Would anyone have the official name for a tactics switch leading to a collapse of an arms’ race ..?
I was triggered by this recent post about some gang(s) using low-tech but somewhat-sophisticated pencil-and-paper crypto in stead of the highest tech burner phones etc. (or did they also use those). To which many commented that probably, the code should be (very) easily crackable even if all of the many safeguards were upheld.
(But also, dropping a physical USB stick at a (physical) watering hole (or desk, or handout point, or street corner pavement) also circumvents a great many fab network entry safeguards of the firewall kind, in particular when APT technology, stamina and dedication, and tailoring is involved.)

But then, what if the codes were good enough; time-based security still can work, and the adversaries (gov’t) weren’t overly capable in this, apparently. And one can also think back of what happened to the stealth fighter-bombers that suddenly showed to be vulnerable to detection by not the highest-tech radars but the decades old low-freq stuff e.g. the ‘Soviets’ had stored one day behind the Ural.
Sort of an arms’ race that has gone to such did-did not length that in the buildup, a sudden flip to old technique and old tactics / operations may undercut the sophistication of the other in an off-guard way. Maybe not allowable per arm wrestling rules, but arms’ races are a different ball game everywhere; no honour involved, weaseling allowed and winner takes all for the time being.

How would that be called..? Flipping? Reversion ..? I’m really interested. About your thoughts, too. E.g., how can one use this to improve security (‘pentesting’ yourself against such flips / reversions), on the Internet and elsewhere. Hope to hear!
I’ll leave you with:
DSCN6729[A fordable river, at Cordoba]

Wired / Tired / Expired, October 2014 edition

DSCN6765[Ah, what a pleasant fortress! Córdoba]

Yes here’s the October edition of my Wired / Tired / Expired jargon watch overviews, a mixed bag again:

WIRED TIRED EXPIRED
Stealthy introductions Gartner Hype Cycles Apple Product (Launch) Events
Let the products speak for themselves, let them grow organically around the globe, don’t try in vein (sic) to go viral or so. Be happy with moderate growth as it will be sustainable so much, much longer. Don’t believe this hype … Will have a separate post on this in the near future. Nothing new; all hyped and epiphany only for the fast-shrinking few simpleton acolytes left…
Smart analysis integrated into regular audits Process Analysis Big Data
Like, let the process analysis take its place in the Understanding the Business part of any audit. No craze, just helpful in all sorts of directions (including early-on advisory work). For it’s own sake, no more. Not accepted, not acceptable anymore. Meh. If less than a yottabyte, not it. Tools in place, again the other 99.9999% of work to be done is human; which is not available in sufficiently intelligent, sufficiently large numbers. Hence, fails beyond the tiniest of anecdotal finds.
InfoSec groundswell / tsunami Hyping APTs, megaleaks RO(S)I, ISO, et al.
No more top-down, just bottom-up, by guerilla even if needed, but with a desperate need to improve by all (not granted) means and authorizations necessary. Doing, not waiting (not) to be allowed. Oh my! The Sky Is Falling! No more. APTs are still around, yes, vastly more than ever before; megaleaks of the data breach kind and of the Snowden kind, ditto. But nobody listens anymore so why dwell on these? Ah, the passé methods of yesteryears… Didn’t work. Didn’t fit with InfoSec, do still fit with corporate policy but who cares; if there’s no match, nothing will result. If you still try to match, also nothing (serious in InfoSec terms) will result.
3rd Platform Software Defined BYOD/CYOD
Where the first was Mainframes, the second one Client/Server. Now // Just a way to cement the bricks of your architecture. Well, there’s so much work in here if one’d want to do this right but few! the effort, I don’t want to think of this too much. Done deal. BYOD; CYOD’s not going to fly (discussed earlier, somewhere on this site; use the search, Luke!).
Ello Snapchat Whatsapp
Well, qua hype. Otherwise, very very maybe still Nice ‘n quick, but has it gained enough traction ..? Even your old, 30+ relatives use it now. If (dinosaur) Then (expired).
Ideate Empathy UX
Being creative and coming up with new ideas, needed its separate buzzword. Well, maybe. Will age quickly I guess. Yes all companies still need it, but none have a clue. Here I was wondering what all these flimsy design-types had to do with Unix. Turns out, it’s user experience – above good design, but stumbling till you accidentally hit something good, isn’t It. Has never been. But is; expired.
Don’t care about illegal downloads Chase the most petty, pityful of “illegal” downloaders only Push a U2 album
Just because your business model doesn’t depend on levying silly huge distribution costs. You know, trying to wring millions out of the poor that otherwise would not buy scrap from you, while you know the damages are 99.999% into the lawyer’s pockets only. Ah, the FAIL …! This deserves a (cultural) backlash flogging by the billions (yes) that weren’t interested…
Locally produced, biodynamic even but without the zeal Super foods Don’t Care
Yes one can eat/drink healthily but don’t need the fanatism. Just somewhat less, quite a bit healthier produced (full supply chain including externalities), and varied. Quod non; as proven over and over again. After so many, many failed attempts, don’t numbly try again; you’ll fail for sure. Eating all the preservatives and sweeteners, too much of it all, just isn’t ‘permissible’ anymore.
Decently colourful Normcore bland Grey all the way
Yes even in Fall/Autumn, there’s many colours (not colors) that fit the season and are cheerful and bright. It already looks formless, has the colours to match: Why? Duh, that was last year’s one big great miss without purpose.

OK, any suggestions for next month’s edition ..?

Postdictions 2014-III

A progress report on the Predictions 2014 I made in several posts here, at the end of Q3.
I gathered some evidence, but probably you have much more of that re the items below. Do please raise your hand / comment with links; I’ll attribute my sources ;-]

First, of course, a picture:

[Iron fist, not often seen (by tourists anyway), Pistoia]
So, there they are, with the items collected from several posts and already updated once and twice before in this:

Trust Well, there’s this, and this on the financial penalties of trusting your assurance provider…
Identity See previous re the value of certificates. Otherwise, not much news this quarter.
Things The hackability of all sorts of home appliances has already become some sort of Mehhh… And apparently, there’s a spin-off in the IoBT …?
And there’s progress in the auxiliary channels/architectures… as here and here.
Social Not much. Some Ello bits, though. And more in the AI arena, as this shows.
Mobile Has gone to the Expired phase.
Analytics Wow, this one’s moving into the Through of Disillusionment quickly! Now get it to jump out at the other hand, as quickly.
Cloud Mehhh, indeed. May be in the Through of Disillusionment, or has gone into been there, done the grit work, no-one’s interested anymore.
Demise of ERP, the Turns out it’s very hard to fill vacancies in this arena, isn’t it? Due to the boredom to death surrounding them.
InfoSec on the steep rise Even if we haven’t seen enough on this!

On APTs: Only the most interesting hack attacks get into the news these days. Turns out they’re all this kind.
On certification vulnerabilities: In hiding. Still there. Ssssht, will hit. Suddenly.
On crypto-failures, in the implementations: Not much; passé.
On quantum computing: – still not too much –
On methodological renewal; as it was: Some progress here and there, but no ✓ yet.
Deflation of TLD See second link of Trust; Fourth line didn’t work, even.
Subtotal Already, with the previous follow-ups, clearly over 80% as we speak, when discounting for some fall-back here and there.

The faint of heart wouldn’t necessarily want to speak the bold characters out loud.
See you at the end of the year ..!

Regulation Renegation Abomi nation

So, after privacy-enhancing regulations finally got some traction here and there – mentally, hardly in implementation yet – we’re getting the full bucketloads of bovine-produced fertilizer regarding adapted protection through ‘Data Use Regulation’.
Which already throws back actual regulation in intent and in the letter of it. But has many more nefarious consequences… As is in this article; couldn’t word it better.

We should be vigilant …

For now, I’ll leave you with this:
DSCN7182[A spectacle, Jerez]

IoTSec from IAM at entry to the end node

Now that you all are so busy implementing Internet of Things pilots everywhere, I mean at home like with this and this, but B2B everywhere as well (…!?) or are you doing it there not too, we may need to consider Security.
Yeah, Hans Teffer did a great piece on that (see here, in Dutch) and I blogged about that before [and many more links/posts…]. And, there’s quite some other issues with IoT. But the point here is – we haven’t thought of security before implementation.
And at the very few implementation’lets of IoT we see so far, security seems absent. Of course, you’d first want to make it work in the first place. But you’re doing it not right at the start, and you know that decisions made now (implicitly) will remain in the architecture for decades to come, in particular when today’s (almost) stand-alone implem’s become linked up into one giant uncontrolled, uncontrollable mesh.

Now, first, an intermission:
DSCN0113
[At dawn]

So, ‘we’ all have been complaining about the security risks of IoT here and there and everywhere, in particular re the current risks of all sorts of industrial control being hooked up to the ‘net without anyone knowing or caring about proper sec.
And still then, we haven’t progressed beyond this Boy Crying Wolf position. Instead of moving to provide solutions. To begin with architecture ideas, the kind that we will need in order to branch out of the simpleton pilots.

On a walk, it struck me that one major part of any solution would be with Identification, Authentication (A1), and Authorisation (A2) – in particular at each and every end node in the network, the kinds you would want to reach to transit back to the Real, Physical world of Things and which are supposed to move ever closer to some form of smart dust… Whereas now, we often have the I and A1 usually at the front door, and the A2 somewhere in the/a network usually ‘near’ the end point (which also usually, is a relatively compute-enabled ‘large’ thing like a server with data).
Clearly, with the IoT we’ll need something else. All end points may float around somewhere out there, uncontrolled, un-tied-down in the giant global mesh network architecture. We will be systemically unable to tie any A2 server to an end point or vice versa (smart dust, spread out, remember), and the IA1-part will also be much, much less definable than it is today. But then, we’ll need much finer-grained access control at the end point, and much more flex at the (IA1) entry point or we leave it all free for all and only at the end point, the destination, check IA1 (again). For this IA1A2 at the end point, we need to consider:

  • The end point(s) will very probably have very limited computing capacity; even with Moore et al., this will still lag required resource in a big way – because any type of ‘attack(er)’ will have vastly more computing power available. Hence, things will need to be really really simple at this point. We may need to consider global IoT mesh network segmentation or other pervasive and comprehensively secure forms of IA1 at entry points (how to guarantee complete coverage) or throughout the mesh (how to prevent complete coverage without even the slightest possibilities of evasion).
  • Identities… ?? Where, how to manage the I’s and maintain the I+A1’s privacy, and transparency to the A2-owners ..?
  • How to arrange A2 at all those end points, including the ability to maintain those ..? The dust (or some coarser-grained proxy, whatever) is out there, and can’t easily be uploaded all with the latest A2 tables we’d want – or that is done by some broadcast flash approach which is all too vulnerable for cracked use.

But still, we need something of that kind. And transparency built in to that, too… To ensure No Backdoors and accountability in general, as these cute little hidden holes would be exploitable by all the bad guys (official, and not). By the way, #ditchcyber.

I’m aware there’s more problems than solutions in the above. But you should be aware of the risks of letting them remain unsolved. Your suggestions, please!

And, just so you know:

Cycle comments and questions

A certain commercial advisory club still releases its hype cycle. Which is good news; to have some authority with some authority (your mileage may vary) providing us with some comprehension and comprehensiveness [OK I’ll stop now] about the What’s Buzzworthy.
Still, being … in the field / Dutch / obnoxious, pick any; I’d like to comment…:
(Here’s the August version from … somewhere; ™ and © or what is it, acknowledged)
7330eb56-2177-11e4-89b4-12313d239d6c-large

  • Virtual Personal Assistants – 5 to 10 years out (of the plateau of productivity) ..? That’s optimistic ..!
  • Brain-computer interface: If one would consider this to be about ‘intelligence’ connection, then maybe. But there’s also connections like hearing, et al., where a 5 to 10 year span may be on the ‘long’ side.
  • Human augmentation: See the previous. Or aren’t definitions sufficiently orthogonal?
  • Affective computing: Hm, optimists.
  • Neurobusiness: Same.
  • IoT: Yes, at a hype peak. Maybe (much) sooner, to be at the plateau.
  • Cryptocurrencies: Hoping for a swifter spread and adoption…
  • Big Data may be further down the slope already. Or is that from where I / we are ..?
  • Gamification, augmented reality: Hopefully and quite possibly, already reality somewhat earlier.
  • The rest of the bunch … will they not come sooner ..? Of shift shape (‘pivot’) to be unrecognizable from their today’s hype labels soon?
     
  • And a final one: Would anyone have a similar overview of … one year, five and ten years back? Just to see what happen in the meantime; to establish a ballpark reliability figure. Would be fun, too.

I’ll leave you with this’all. Your comments are welcome(d). If you like to dream.

Diversified Reporting Assurance

Yes, let’s call it DRA. The new wave of “accountants’ statements” in the wings.
[Warning: for those not interested in accountancy, the rest will be boring. Or, let me restate that: very boring. Or even deadly boring.]
Continue reading “Diversified Reporting Assurance”

Pops off the Top

To get you in the mood, and involved, please check out the longlist of songs eligible for my [emphasis by author] Top 2000 Of All Times (link to clean Excel here).
Yes,

  • I’ll have to prune a bit, there’s more than 2000 now;
  • They’re sorted alphabetically on Artist so far, yes, yes. But my next thing to do is to recursively bin the lot into shrinking bin sizes, you know, like a good algorithmically sound sorter would;
  • If there might be songs you miss on the list, please comment with your suggestions. Which are totally non-binding as the list is mine (make your own, feel free to copy the Excel and adapt / deteriorate) so don’t be put off if your wacky addition(s) don’t make it to the final list;
  • Most importantly, if there’s things (songs) on the list you’d deem ridiculous, you may be right. But They’re my choice…

And the usual pic:
??????????[Way back from the 60s, would still be Good if built today like this]
To get you in the mood, check out this random sample…

Titles Artist
Donna 10CC
Dreadlock Holiday 10CC
I’m Not In Love 10CC
The Things We Do For Love 10CC
The Wall Street Shuffle 10CC
Me So Horny 2 Live Crew
I’m On Fire 5000 Volts
Aquarius / Let The Sunshine In 5th Dimension
Chiquitita ABBA
Dancing Queen ABBA
Eagle ABBA
Gimme Gimme Gimme ABBA
Knowing Me Knowing You ABBA
Mamma Mia ABBA
Money, Money, Money ABBA
S.O.S. ABBA
Summer Night City ABBA
Super Trouper ABBA
Take A Chance On Me ABBA
The Winner Takes It All ABBA
Voulez-Vous ABBA
Waterloo ABBA
All Of My Heart ABC
Back in Black AC/DC
Hells Bells AC/DC
Highway To Hell AC/DC
Let There be Rock AC/DC
Shoot to Thrill AC/DC
Thunderstruck AC/DC
Who Made Who AC/DC
Whole Lotta Rosie AC/DC
How Long ACE
Killer Adamski ft. Seal
Amazing Aerosmith
Crazy Aerosmith
Dream On Aerosmith
Dude Looks Like a Lady Aerosmith
Good Vibrations Beach Boys
I Can Hear Music Beach Boys
Sloop John B Beach Boys
Tears in the morning Beach Boys
Wouldn’t It Be Nice Beach Boys
Brass Monkey Beastie Boys
Hey Ladies Beastie Boys
Intergalactic Beastie Boys
No Sleep Till Brooklyn Beastie Boys
You Got To Fight For Your Right to Party Beastie Boys
Hey Jude Beatles
While My Guitar Gently Weeps Beatles
Loser Beck
Don’t Forget To Remember Bee Gees
How Can You Mend A Broken Heart Bee Gees
How Deep Is Your Love Bee Gees
I Started A Joke Bee Gees
Jive Talkin’ Bee Gees
Play That Funky Music Wild Cherry
Lion In The Morning Sun Will And The People
Het Dorp Wim Sonneveld
Live And Let Die Wings
CREAM Wu Tang Clan
Gravel Pit Wu Tang Clan
Protect Ya Neck Wu Tang Clan
Making Plans For Nigel XTC
Close To The Edge Yes
I’ve Seen All The Good People Yes
Owner Of A Lonely Heart Yes
Roundabout Yes
Yours Is No Disgrace Yes
7 Seconds Youssou N’Dour & Neneh Cherry
If I Can’t Have You Yvonne Elliman
In The Year 2525 Zager & Evans
Hair Zen
Gimme All Your Lovin’ ZZ Top
La Grange ZZ Top
Legs ZZ Top
Sharp Dressed Man ZZ Top

Sorry wasn’t able to find any good Zzz and the Zzzzzs songs… Now get going and come forward with your extension suggestions …!

Maverisk / Étoiles du Nord