Category Archives: Energy

Vuoi Vuoi Me (Henrik Schwarz Remix)

A Sámi song by Mari Boine, remixed by Henrik Schwarz.

From the album “It Ain’t Necessarily Evil – Mari Boine Remixed Vol II”

And below is my remix of the translation from a language once banned:

Sami languages, and Sami song-chants, called yoiks, were illegal in Norway from 1773 until 1958…in Russia, Sami children were taken away when aged 1-2 and returned when aged 15-17 with no knowledge of their language and traditional communities.

language and song were considered such a risk that they were banned for centuries.

The Sami chant, the yoik, traditionally had a dual function. On the one hand, it was, and still remains, the distinctive musical expression of the Sami. The yoik is used “to remember people”, to characterize individuals, animals and landscapes. It can be described as a melodic-rhythmic lecture, in which rhythm is paramount and less emphasis is put on the verbal description of the lyrics. The yoiker’s task is to use music and images to create an emotion or atmosphere that then evokes the person, animal or place yoiked. In the pre-Christian religion, the yoik formed an important part of religious ceremonies. In such ceremonies, the shaman added a rhythmic accompaniment to the yoik by beating his drum. This dual function is the reason why some people even today see the yoik as sinful and therefore incompatible with Christian religious life.

As early as the 17th century the yoik was banned by law. Anyone breaking the law was to be punished severely. The reason the yoik was banned and condemned at this time was that the period saw the beginning of Christian missions among the Sami, and the yoik was seen exclusively as an expression of pre-Christian religion.

Finnmark protests 1981Mari Boine explains in the video below how and why she started to recognizes and reclaim her own heritage and sing the yoik.

She mentions the protests and violence in the news at the beginning of the 1980s, as seen in the photo to the right, had a strong effect on her sense of identity; the controversial construction of a hydroelectric power plant on the Alta river in Finnmark, Northern Norway created feelings of anger and rage for her as a Sámi.

Vuoi mu gollelottas
Vuoi mu beaiveidjalottas
giehka ja goaskin
Vuoi mu spalfu
Vuoi mu spalfu
miellevuol besiinis
Vuoi mu idjaloddi
ravddahis geahcastagainis
Vuoivuoi mu
Vuoivuoi mu

Vuoivuoi daid iluid
Vuoivuoi daid iluid
skeaikkigavnnasmeriidisguin
Vuoi daid morrasiid
Vuoi daid morrasiid
salteganjalmearaidisguin
Vuoivuoi daid buollasiid
Vuoivuoi daid buollasiid
vuoi gesiid mearehis bahkaid
Vuoivuoi mu
Vuoivuoi mu

   Vuoi my little yellow bird
Vuoi my summer night bird
cuckoo and eagle
Vuoi my swallow
Vuoi my swallow
with nest under riverbanks
Vuoi night owl
with limitless vision
Vuoivuoi me
Vuoivuoi me

Vuoivuoi joy
Vuoivuoi joy
with hearty laughter
Vuoi sorrow
Vuoi sorrow
with oceans of salty tears
Vuoivuoi winter frost and cold
Vuoivuoi winter frost and cold
vuoi summer with burning hot days
Vuoivuoi me
Vuoivuoi me

Networking Food

One of the primary reasons Rudolf Diesel invented his engine in 1893 was to help ensure farmers were not dependent on an external/industrial source of energy, but rather could generate it on their own.

Unfortunately, the agriculture industry has gone the opposite direction from his (and the American populist platform of the People’s Party) and become entirely dependent on petroleum.

A new film made by Postgraduate students in London’s School of Oriental and African Studies (SOAS), where I did undergraduate work, looks at current food issues facing the UK.

Will a localized, resilient and redundant peer-to-peer energy and food model be able to displace the highly centralized, fragile and foreign-based client-server system advocated by petroleum companies?

Something tells me that the following statement on risk has more impact to policy than all combined comments by consumers feeling the pinch from rising petroleum costs.

“The Navy has always led the nation in transforming the way we use energy, not because it is popular, but because it makes us better war fighters,” stated [U.S. Navy Secretary Ray] Mabus.

SCADA exploits released: Siemens SIMATIC

Every time I hear people tell me how it would take a nation state budget with an army of trained cyber warriors to design and infiltrate systems I wonder where they get their data from. Billy Rios has been kind enough to argue against this not only in theory but by demonstrating just how easy it was for him to find vulnerabilities in the Siemens SIMATIC system. Now he has released exploit details.

Nothing sophisticated here:

If a user changes their password to a new password that includes a special character, the password may automatically be reset to “100”. Yes, you read that correctly… if a user has any special characters in their password, it may be reset to “100”. You can read about these awesome design decisions (and many others) in the Siemens user manuals.

And again:

For those non-techies reading this… what can someone do with this non-existent bug? They can use this to gain remote access to a SIMATIC HMI which runs various control systems and critical infrastructure around the world… aka they can take over a control system without knowing the username or password. No need to worry though, as there are “no open issues regarding authentication bypass bugs at Siemens.”

In his presentations he has pointed out that evaluation of the exploits is easy from the comfort of one’s own bedroom. In his latest post he also points to some (perhaps illegal) remote test options.

I’ve found MANY of these services listening on the Internet… in fact you can find a couple here: http://www.shodanhq.com/search?q=simatic+HMI
https://www.google.com/?#q=%22SIMATIC+HMI+Miniweb+on%22

A major tenet of my argument at the Dr. Stuxlove presentation was that we can do ourselves a serious disservice in risk management by overestimating the sophistication and talent of our adversaries. If the level of knowledge required to exploit a system is low then vendors will be under far more pressure to patch and fix.

Another interesting way of looking at this is to review the natural schism of resources in the security industry; there’s natural tension between remediation and investigation. Those monitoring for attacks may emphasize a presence of highly sophisticated adversaries because there is a direct link to their funding. If you put them into a complete risk equation and point out that vulnerabilities are easily fixed they will tell you that you just don’t understand how smart the people are that you are up against. Don’t be tempted to give them more money right away. That is the point at which you should ask them “define sophisticated”, which really means explain the details of vulnerabilities and the cost of remediation.

True security is to live a vulnerable lifestyle. When someone says driving a car safely is so sophisticated that you should spend millions on detection and investigation funds, you might be in a position to respond that wearing a seatbelt, installing airbags, brakes and suspension will work just fine for your risk management program. That is to say there is a balance of investment and overestimating the sophistication of threats may lead to less risk reduction than spending on innovation around the reduction of vulnerabilities.

Of course manufacturers first have to acknowledge that their emperor is naked — vulnerabilities are real.

For all the other vendors out there, please use this as a lesson on how NOT to treat security researchers who have been freely providing you security advice and have been quietly sitting for half a year on remote authentication bypasses for your products.

Since Siemens has “no open issues regarding authentication bypass bugs”, I guess it’s OK to talk about the issues we reported in May. Either that or Siemens just blatantly lied to the press about the existence of security issues that could be used to damage critical infrastructure…. but Siemens wouldn’t lie… so I guess there is no authentication bypass.

Siemens has faced embarrassing exposure of public security issues in the past, public disclosure of easy exploits, and has released advisories so it will be interesting to watch how this episode plays out.

Billy Rios is thus doing a great service by pointing our attention to something Americans should already be very familiar with. A Siemens SIMATIC is Unsafe at any speed: there are Designed-In Dangers in critical infrastructure systems.

People’s Gas Breach not Infinite

According to the latest reports from the Chicago-area, a contractor who breached an energy company was unable to steal infinity.

It’s still bad news for the “finite” number of records he did access.

Peoples Gas and sister utility North Shore Gas have notified an undisclosed number of customers of the possible theft and potential use of personal information about them by a contract worker.

[…]

They said, though, that the number is “finite and very small.” The companies said they had no information to indicate that the number of customers affected by the possible identity theft would grow.

The contracted employee has been fired and is “subject to criminal investigation and prosecution,” the companies said.

Never mind the X-men. A cartoon comes to mind with an evil character who has the amazing ability to steal an infinite amount of data. Oh no! It’s…it’s…SAN Man! Egress man?