Category Archives: Security

Legislation pending on minimum auto sound

Autoweek has reported on a hilarious piece of legislation in the US. Remember defensive driving? No need with this kind of thinking. Turn up the sound and those pesky bipeds had better move it or else…fair warning, right?

Legislation setting a minimum sound level for vehicles sold in the United States by as early as 2010 is expected to be introduced on Wednesday in the U.S. House of Representatives.

The bill would require the U.S. Secretary of Transportation to lead a study to determine if a minimum sound level is needed to protect pedestrians, specifically the blind. And if such a level is necessary, the bill would set it.

U.S. Reps. Edolphus Towns, D-N.Y., and Cliff Stearns, R-Fla., are sponsors of the Pedestrian Safety Enhancement Act of 2008. The proposed legislation stemmed from concern that blind pedestrians may be put in danger because of quiet-running hybrid and electric vehicles.

Every day I wonder to myself who could have let noise pollution get so far out of control. Then I read a story like this and realize that pollution is a problem with more support than opposition in current economic models. No wonder that Beijing is having a hard time reaching promised compliance goals for the Olympics. Just think, cyclists and runners required to emit noises for the safety of the other competitors.

Seriously, though, the government should be working to reduce pollution, not reward it or create some kind of wacky “security” model that makes it seem beneficial. Imagine a street so quiet that you could actually hear the tires quietly rolling…with maximums enforced the minimums become a non-issue.

US Flights Grounded for Compliance

The AP has some nicely worded statements about compliance and risks in the airline industry:

FAA spokeswoman Lynn Tierney said the agency is simply doing its job.

“We are aware and sympathetic … 100,000 people being stranded is extraordinary,” Tierney said. “But the role is clear, it’s a regulator’s role and you have to enforce the regulations. We understand the disruption this causes, but (the airlines) had 18 months to complete the work.”

Tierney is referring to the safety order issued on the Boeing Co. MD-80 aircraft that have been grounded by American, Midwest and other airlines in recent days. The FAA issued an airworthiness directive on those planes after reports of shorted wires, evidence of worn-down power cables, and fuel system reviews conducted by the manufacturer. It was effective Sept. 5, 2006, and the airlines had 18 months to comply.

“The FAA is doing what it’s chartered to do: enforce safety regulations,” said David Castelveter, a spokesman for the Air Transport Association, which represents the nation’s largest airlines. “It is yet to be seen if they are going too far.”

It is interesting to watch this unfold and compare with discussions in IT departments about the time to comply with patching and upgrade directives.

The Smell of Risk

The BBC highlights a study that shows humans can actually sense danger with smell, assuming prior experience/exposure:

The 12 volunteers were exposed to two “grassy” odours, and none of them could accurately tell the difference between them.

After they were shocked while smelling one of them, they developed the ability to discriminate between the two.

Do they mean marijuana? Was this really a study to get people with addictions to steer clear? Imagine the impact to the cocaine market if convicted addicts were conditioned so the smell would turn them away.

Ethical questions abound, but it also makes me think about the discussions I often have with risk managers. They do not smell danger while the technical security engineers do, and thus a discussion erupts about who is right and what is real. In the end, the primary issue I see with the study above is that it shows pre-conditioning response as opposed to the ability to actually smell danger itself.

Daisy Dukes breaks encryption

Based on the recent research that showed passwords were stored in memory and could be accessed through a cold-boot attack, a new tool has been announced at CanSecWest. The Register reports:

DaisyDukes is a memory sniffer that resides on a USB device. A researcher can plug it into an unattended machine that is turned on but has been locked and reboot the machine off a compact operating system contained on the drive. Depending on the user’s needs, it can be configured to capture the entire contents of a computer’s memory, or sniff out only certain types of data – say a password to access the company network or unlock a user’s private encryption key

Wish I had a memory sniffer for real life. That would be a real time saver.