Counterfeit and Security

One of those batteries is fake. Can you tell which?

Over the past few weeks more and more attention has been drawn to fake computer hardware that was sold to varying interests around the world. While fakes aren’t new (AMD, Intel, and a variety of other hardware companies have processes in place to avoid repeats of past counterfeiting), what seems to be new is the kind of hardware being ‘faked’.

Networking Hardware

The FBI investigated claims that the government had purchased counterfeit Cisco hardware that may have potentially held, well, God knows what. As is noted by Assistant Attorney General Alice S. Fisher;

Counterfeit network hardware entering the marketplace raises significant public safety concerns and must be stopped . . . It is critically important that network administrators in the private sector and government perform due diligence in order to prevent counterfeit hardware from being installed on their networks.

While it’s of concern that government data may be being directed/inspected by unknown groups, I don’t really want to talk about that. Instead, what I think this shows is that when deploying new networking tools that it is essential that some kind of authentication process occurs – rather than just purchase from trusted vendors and call it a day, those purchases must be tested. Moreover, while the FBI was able to conduct an operation that resulted in convictions and fines, it raises the specter that other groups with less capital to invest in internal investigations may similarly be threatened, and their data and customers as well.

It Just Works (Sometimes)!

Time Capsule is incredibly helpful – it’s saved me from several moderately catastrophic data loses. What is less than terrific, however, is the instructions for connecting an external hard disk drive (HDD) to it. To save myself the hassles of figuring out how to set it up again in the future, and for those who are searching for the solution, I’ve thrown this together.

Problem:

Many drives are shipped partitioned to FAT. That’s great…for PCs. Heck, my Macbook could read it too, but doing so crashed my Time Capsule. I figured that it was probably FAT, and so just opened up the Disk Utility to erase the drive and partition it to HFS+ (Journal). Then I found out that this element of OS X has been broken for a long, long time.

Crap.

Continue reading

Common-law = Snooplaw

Rather than talk about the FBI’s desire to patrol the Internet backbone, have your laptop searched without warrant or any particular reason when facing US Customs officers, or Microsoft’s Computer Online Forensic Evidence Extractor (COFEE), I want to quickly talk about the Australian government’s desire to give law enforcement and corporate IT the power to monitor and inspect any and all electronic employee communications. What is most concerning is that it continues an Australian trend to insert American attitudes into common-law.

Terrorism Down Under

I don’t want to come off seeming as though I think terrorism is a small or unimportant issue. It’s not – terrorism is a very real issue, and it has incredible financial and human costs. That said, whenever someone mentions either children or terrorism as a justification for a new piece of legislation that would dramatically extend the surveillance powers of public and private actors, I immediately want to know just how invasive those new powers might be. Whereas Australian law presently only allows security companies and those dealing with the government to survey communications without permission, after a four year fight to revise the Telecommunications Interceptions Act the government may be successful in extending those surveillance powers. If the amendments are passed, all corporate IT groups will be able to survey employees’ digital communciations. The government’s reason for extending the surveillance powers is that, by monitoring workers’ emails, it will be possible to stop/deploy coercion towards those who would;

attack to disable computer networks that sustained the financial system, stock exchange, electricity grid and transport system “[and would consequently] reap far greater economic damage than would be the case of a physical [terrorist] attack”. (Source)

Continue reading

Boost Up Your Net With ISP Injections

I’ve written about Deep Packet Inspection (DPI) technologies before, and their various potential privacy issues. Generally, I’ve talked about how the possibility of having your ISP persistently monitor your online actions could stifle the substantive abilities exercising of autonomy, liberty, and freedom of conscious. I won’t revisit those issues here, though I’d recommend checking out my earlier post on DPI. What follows examines how ISPs are injecting information into the webpages that you visit, which prevents you from viewing webpages as they were designed.

Web Tripwires

When you visit a webpage, your computer downloads a little bit of code and renders it on your screen – the web is an environment where visual stimulation necessitates copying data. Recently, researchers from the University of Washington and the International Computer Science Institute have discovered that about 1.3% of the time what is displayed on your computer’s screen has been altered. This having been said,

Continue reading

Social Networking: The Consumption?

A little while ago, the New York Times ran a piece where they discussed the ‘Sticky-factor’ of Facebook. Effectively the article boiled down to the fact that it’s a nightmare to exit the Facebook ecosystem – actually removing your data from their ecosystem borders on being a Sisyphysian task. The most poignant part of the article reads:

It’s like the Hotel California,” said Nipon Das, 34, a director at a biotechnology consulting firm in Manhattan, who tried unsuccessfully to delete his account this fall. “You can check out any time you like, but you can never leave.

The Obligations of Social Networking

Imagine this: you adopt some service or another and it doesn’t require you to exchange the popular unit measurement for access to that service (i.e. you don’t shell out cash for access). That said, you do provide an alternate form of capital – one that tends to elude a clear monetary value – your personal information. You give information concerning your religious orientation, your gender, relationship status, etc. Now, you’re not required to put all of that information into a public space, but what you do provide should be accurate to improve the service for both yourself and – this is the catchy part – the other people who are using the service. The system is more valuable both to others, and to yourself, by providing as much accurate information as possible.

Continue reading

The Digital Workshop and Analogue Drill Presses

One of the memorable things about my Grandfather was his workshop. There were tools absolutely everywhere (perfectly organized – he just had a lot of them!). As someone who’s never really enjoyed using power tools, his workshop was a pure expression of bored terror for me – they didn’t hold any appeal, but i was always worried that I’d come out with one arm less than when I walked in. I don’t know if it was something someone told me (“Power tools can hurt/maim/kill you – don’t touch your Grandfather’s!”) or the commercial in the 80s where a robot had its various limbs cut off with the rejoinder at the end “I can replace my limbs. You can’t.”

Maybe it’s just a genetic deficiency of some sort.

The Mediation of Digital Content

Regardless of any genetic aberrations, I’ve always been drawn to reading/writing/producing literary content. I’ve developed incredibly crude websites (this one included) that are functional without being ‘cool’. My digital creations and content spaces have never paralleled the plaque that was created for my Nanny and her cat, Puss, for example. There is something that has (and seems to continue to) alway impressed me about physical creation; its very tangibility and physical being-in-the-world, where it becomes clearly ready-at-hand is impressive. That’s not to say that a digital creation can’t operate on the same metaphysical levels – I’d argue until I was blue in the face that there were clear ontological similarities – but it doesn’t strike as direct, perhaps because accessing digital creations seems somehow further removed/mediated by technologies. This mediation, in turn, prevents the subject from fully comprehending what they are creating if they are using ‘short-hand’ (i.e. programs that automate a significant element of the more challenging aspects of content generation, such as the code that this blog sits upon) and enslaves them to their technology.

Technology as a Defining Element of Metabolism

I’m certain that at least one of my colleagues would suggest that that last comment surrounding the enslavement to technology would demonstrate an ontological-illness/blockage that has to be overcome prior to realizing the full ethical and ontological significance of technology itself. To suggest that technology, as a facet of our metabolic processes, can enslave us is as absurd as claiming that my hand, foot, or eye can enslave me. While true that any of these limbs is capable of momentarily diverting my attention as it comes into contact with the world, that diversion should likely be considered a regulatory biological process. Technology, once understood as an element of our metabolic existence, thrusts us before our traditionally understood selves, both in material and metaphysical senses. This said, understanding technology as an element of ourselves, just as our epidermis is an element of what composes us, involves claiming that technology (and as a result ourselves) are drawn forward before ourselves, only to be recognized for what we are and have been. We create and cannot comprehend its implications until it operates in the world – our comprehension of metabolism is predicated on our recognition of what has become, and less upon what will become. Our metabolism structures our very Being-in-the-world, and we can only understand it after being thrown into it; it is impossible to perfectly comprehend how we will be pitched.

Metabolism’s Digitization

So what does this mean for my digital creations? To return to my Grandfather’s creations, in the process of creating a facet of himself was necessarily injected into the project and then released into the environment. Retaining core facets of his project, just as a fragment of hair holds a person’s DNA, his technological creations blended with others’ metabolic projects. In doing so, a commons was created, one where technology served to bind those who necessarily participate(d) in the narrative of the self-that-has-been-projected. In other words, a facet of my Grandfather was in the sign he created for my Nanny, and that her usage and integration of that metabolic process into her own inextricably bound the two through a common expression of metabolism.

In my case, a digital creation functions in a similar manner, though seemingly with a significant difference. In the creation of the flash banner at the top of this post, a series of technological artifacts we taken, molded, and reshaped – I absorbed material from my environment and, through a metabolic process, those materials were fundamentally transformed. This transformation, however, was and remains predicated on the technological constructs of others – much as a tree’s limb requires the soil, water, sun, and other common environmental stimuli, my construct is predicated on the social, technological, and biological environment(s) that I exist in. Moreover, the extension of social and technological from biological, while significant insofar as it provides an analytic differentiation of terms and metabolic zones, is just that: it functions dominantly as an analytic differentiation. With an understanding of technology as a metabolic, and thus biological, process, we cannot differentiate the social, environmental, technological, biological, etc in a fashion that we would understand according to common parlance.

Is Digital Ontologically Similar to Analogy Metabolic Processes?

I did note that there was a difference between my creation of a flash banner and of my Grandfather’s plaque, though I’m uncertain precisely how to understand it. My creation is digital – it is a perfect logical sequencing of 1s and 0s, a creation that is analytically perfect. My Grandfather’s creation, however, is an analogue process that is riddled with the intricacies and uncertainties of life itself. Of course one could return by claiming that my process is as biologically ‘imperfect’ as my Grandfather’s process by the very fact that I am here, as a biological being, working within a metabolic structure to generate this life-embued artifact. I would have to question how strongly that ontological similarity can be carried, however – I don’t want to commit myself to either an affirmation or rejection of the metabolic similarity at an ontological level, but I do have my doubts that the digital and analogue creation retain an identical ontological form.

Whereas normally I’d like to end with a clear ‘aha!’ moment, where I reveal a clear solution/logical avenue that is compelling, I’m still left without a clear stance. Are my digital tools as ubiquitous as my Grandfather’s drill presses and saws? Is there genuinely an ontological difference between the cold math of 1s and 0s and the impact of a hammer slamming upon a nail if we understand technology as a core facet of our metabolic structures?