2009-12-26

Flight 253 round-up

According to the Coast Guard, the maritime security zone includes a portion of Kailua Bay, beginning at Kapoho Point and extending westward to the shoreline at Namala Place, near the Castles surf spot. The zone also includes the adjacent Kawainui Channel beginning at Kapoho Point to a point 85 yards mauka of the North Kalaheo Avenue Bridge. Yellow buoys will be placed on the water so mariners can see the zone, officials said.
Now might be a good time to take all the money being spent on identification and behavioral detection and shift it to body scanning and bomb-sniffing dogs ...
This is a really interesting video, but there doesn't seem to be any way to get a sense of how big it is ...
Hmmm, it's nice to know that encryption can be done on that scale, but I wonder how long it will take to be compromised on a wide scale. It's seems unlikely that they are using a different key for each box ...

2009-12-12

The real story is that the video is probably going to cost your former employer (and  maybe you) a lot of money because you and your associates allowed your egos to take the reigns from your professionalism. You can be a solid pro for years but if the few-second lapse is caught on video, that will be seconds that you are judged on ...
The solution that I found was on Lifehacker.com and was written by Gina Tripani. She recommended using a password system. You start out with a 6 or 8 or 10 character core that you will remember. Whatever works for you is fine. A combination of letters and numbers is preferred. Even a word followed by numbers that mean something to you is fine. So, say 1234qwer is your 8 character core. (I know it looks random, but look at your keyboard to find where I got that character core) That core will be used everywhere. But what will make it unique, is adding letters at every different Web site. Take the first two vowels in the domain name of the Web site and add them to the beginning of your core and take the first two consonants and add them to the end of your core. For example, I will use Amazon.com, a fairly popular online retailer. With this system, your password for Amazon.com would become aa1234qwermz. I took the first two vowels in Amazon.com, aa, added the core in the middle, 1234qwer, and the first two consonants in Amazon.com, mz, to the end. That left me with aa1234qwermz, a strong password and a very easy system to remember at every Web site. You can change the system to whatever works best for you. If you want to use the first three consonants and the last vowel or last two consonants and first three vowels, that is fine. Just pick a system and a core and you are good to go. There will be some exceptions. Some Web sites require a certain number of characters and that may not conform to your system. Or they may require just numbers, but the vast majority of Web sites will work with this system.
Sounds quite workable ...

It's worth noting that if the program effectively precluded the possibility of getting on a plane with the means to interfere with the flight, there wouldn't be any reason to keep it a secret. Beyond that, Sonny Barger pointed out years ago that three people can keep a secret as long as two of them are dead ...
I guess it depends on what the goals are. I suspect that nein-won-won was intended to show us that they could mess with us, too. If you can call that a political goal I would say that terrorism was an effective tool for achieving it. I think that all the curtailment of liberties and general inconvenience at the point of an implied gun that we put up with is more of a reflection of our collective ignorance and laziness than evidence of the efficacy of terrorism ...
If you're going to ever pay for the mayor's, or any other politician's, security, you should pay for it the entire time that they're in office. The fact that a mayor or governor would need security is certainly troubling, though ...
There's a lot to be said for making it a felony for a TSA agent to take or allow to be taken and type of photo, etc. but even absent that, this is the only really effective method of ensuring that passengers don't have the MEANS of interfering with a flight. All the ID and profiling is foolish and utterly unnecessary if the passengers don't have the means to interfere ...