Category Archives: Security

The Compliance of Bagels

A New York Times review of Bagel articles brings to light a rich history of compliance.

The definition of a bagel is an obvious start.

A bagel is a round bread, with a hole in the middle, made of simple ingredients: high-gluten flour, salt, water, yeast and malt. Its dough is boiled, then baked, and the result should be a rich caramel color; it should not be pale and blond. A bagel should weigh four ounces or less and should make a slight cracking sound when you bite into it. A bagel should be eaten warm and, ideally, should be no more than four or five hours old when consumed. All else is not a bagel.

I dare you to find a specimen that meets even a few of these seven rules of bagel-ness. A true bagel is few and far between. I further dare you to put on a QBA (Qualified Bagel Assessor) hat and ask a bakery….

But wait, there is more. The first reference to a bagel, by Jews living in Poland, also came from compliance.

It is found…in regulations issued in Yiddish in 1610 by the Jewish Council of Krakow outlining how much Jewish households were permitted to spend in celebrating the circumcision of a baby boy — “to avoid making gentile neighbors envious, and also to make sure poorer Jews weren’t living above their means.”

Thou shalt not covet thy neighbor’s bagels.

And last, but not least, fast forward to the American bagel. It was tightly regulated by a union of New York bakers.

The rise of the bagel in New York is inextricably tied to that of a trade union, specifically Bagel Bakers Local 338, a federation of nearly 300 bagel craftsmen formed in Manhattan in the early 1900s.

Local 338 was by all accounts a tough and unswerving union, set up according to strict rules that limited new membership to the sons of current members.

Something tells me that a rule of hereditary bagel-making is not related to the quality of the bagel. Even if it was, it obviously did not work; today’s bagels do not comply with that or any of the above regulations.

Fun at BayThreat!

I will be giving presentation on cloud log management at BayThreat this weekend. Anton has posted a nice summary page on his blog where he also modestly claims his presentation will be “hilarious”.

What:

There’s a new information security conference in the South Bay at The Hacker Dojo, December 10th & 11th. Perfect for those of us with exhausted travel budgets. We’re an active community with tons of the smartest folks in the biz. It just makes sense that we would get a regional con of our own!

The theme for BayThreat is as simple as black & white: “Building & Breaking Security.” Two tracks, each tackling opposite sides of the security fence. As Security Professionals, it is up to us to take that dichotomy and mold it into the shades of gray we use to protect our environment.

Shades of the Gray Area

We’ve invited speakers from all over the Bay Area and beyond to a two day conference at the Hacker Dojo in Mountain View, CA. The Dojo is a familiar place for the security community, as it hosts the #DC650 meetings every month.

We’re excited to host speakers with security expertise from both sides of the fence. Early-acceptance speakers include Anton Chuvakin, Neel Mehta, Ryan Smith, Gal Shpantzer, Jim McLeod, Allen Gittelson, and Dan Kaminsky. The Call For Abstracts is now closed.

When: December 10-11, 2010

Where: Hacker Dojo, 140A South Whisman Rd, Mountain View, CA 94041 (map)

How much: nominal fee of (!) $45

Schedule: TBA here

NFC embedded in Google’s Nexus S

Google is the first, it seems, to embed a chip for NFC in a cell phone for the American market. The Official Google Blog says NFC comes with the Nexus S.

It also features…NFC (near field communication) hardware that lets you read information from NFC tags. NFC is a fast, versatile short-range wireless technology that can be embedded in all kinds of everyday objects like movie posters, stickers and t-shirts.

Actually, it will also come in handy as a payment system to replace or improve on payment cards, as I have mentioned before.

FBI Barbie Doll Warning

Barbie is now a surveillance tool. “Video Girl” has a video camera embedded.

I am a real working video camera

The FBI Memo About Newest Barbie Doll, which you might have seen coming, appears to be directed only at the risk of abuse of children by adults.

An internal cyber crime alert from the Sacramento office obtained by CBS13 warns:

“Law enforcement is encouraged to be aware of unconventional avenues for the possible production and possession of child pornography, such as Barbie Video Girl.”

The memo goes to warn that the toy’s technology can capture 30 minutes of video that can be played back on the tiny LCD screen, or downloaded and shared.

The Barbie also could be used by a child to expose adult behavior or secrets. The FBI is unlikely to warn about this “unconventional avenue” of exposure by a $50 spy camera in a doll, but I am sure it also crossed their minds.

The camera has a USB interface and runs on two AAA batteries. Enterprising children may find it easy to modify and use with other decoys or toys. That is why I also suspect this doll could give many children an early sense that they are being watched and recorded; anything anywhere now might be a spy camera. It could lead to adaptive behavior (anti-Barbie Doll measures?) and end up making a new generation far more aware than their parents of surveillance risks.