Yosemite Offline Due to Power Failure

Waves of heavy rains have been hitting the Sierra Mountains for weeks and recently caused a land slide in an area called Ferguson Slide (didn’t see that coming) on the Merced River near Yosemite National Park. The slide knocked down power lines, which gave authorities a reason to turn away visitors for most of this week. News10 from Sacramento has this report.

Interesting to see that the disaster plan for a National Park, of all places, is so frail that it is just an electrical pole (on a slide) away from shutdown. I can see why they might want to turn away 10,000 people a day who are there to consume energy rather than expend it, but what about the more independent and capable outdoor enthusiasts?

Seems to me a golden opportunity lost for the park to engage visitors who would really appreciate it without power and be willing to pitch in to keep it open. Some of those visitors might also help build a more resilient infrastructure including clean and local energy.

The LA Times points out an extremely high cost of line repairs.

“Mother Nature has flexed her strength with this series of storms,” said Nicole Liebelt, a spokeswoman for Pacific Gas and Electric Co. Crew members had to be brought in by helicopter to the remote area to work on the problem, she added. Company officials said they hope to have power restored by late Friday.

That has to have run past hundreds of thousands, added to the lost revenue from visitors turned away…what if it the same investment was put towards business continuity so the park was designed to operate without power for a week or even a month?

Unique Codes of Sperm Whales

Our linguistic analysis of email proposes a coding system that could be implemented to detect attacks and fraud such as the 419 or AFF. A related approach is discussed in Wired, but in terms of the sounds made by sperm whales. Pattern analysis is being used to explore whether each whale has a different voice, or even a unique identifier.

“In terms of information transfer, the timing of the clicks is much less susceptible” to interference, said Rendell. “There is no doubt in my mind that the animals can tell the difference between the timing of individuals.” Moreover, 5R tends to be made at the beginning of each coda string as if, like old-time telegraph operators clicking out a call sign, they were identifying themselves. Said Rendell, “It may function to let the animals know which individual is vocalizing.”

Rendell stressed that much more research is needed to be sure of 5R’s function. “We could have just observed a freak occurrence,” he said. Future research will involve more recordings. “This is just the first glimpse of what might be going on.”

Maybe they also eventually will find whale fraud. At least it is a big step up from whale-feces research.

Russian Billboard Hacked with Porn

The accused was sentenced to 5 years of hard labor already for possession of 13 grams of marijuana, but getting caught for hacking a billboard in Moscow has only added to his time. He said he was a bored tradesman who was just trying to have some fun with computers.

All together, Blinnikov, 41, is going to spend six years behind bars, as he is currently serving another sentence for selling drugs in his home town.

He was already under investigation for selling marijuana when he decided to share a video from his personal collection with the world by downloading it on an unprotected computer he had gained access to through the Internet.

His defense seems to have some major holes (pun not intended). He argued that he did not know his explicit video would be widely distributed, but at the same time he claims to have had control enough to engineer a very specific time for it to be displayed.

Igor Blinnikov, pictured above, uploaded a 15-minute long pornographic video on the server of an advertising company one night last year and claims he did it “just for fun” and didn’t expected it to be broadcasted on billboards on the capital’s Garden Ring.

“I made it at night deliberately, at midday, so children wouldn’t see it. You should never corrupt children!” he told LifeNews.

Interesting defense. He will save the children by posting pornographic videos on billboards only at certain times of night.

Russian hacks seem to be in the news lately for defacement using sexual imagery. It reminds me of the artists who were charged recently by Russian federal agencies with anti-discrimination laws.

The Federal Security Service (FSB), in a darkly sarcastic twist of logic, assigned themselves status as a group and then claimed they were being discriminated against by protest art. The FSB, who have replaced the KGB, were faced with a 65 metre tall phallic image called “Dick captured by KGB” on the Liteyny Bridge, which spans the Neva in St. Petersburg. When it was raised it faced FSB Headquarters.

Rootkit Lessons from Early Polymorphism

I just dug up an old paper (01/08/2005) but still a good one called “Shadow Walker: Raising The Bar For Windows Rootkit Detection”. It suggests malware provide a randomly faked view of memory to a system/scanner without revealing any of its own code.

…imagine a rootkit that makes no effort to change its superficial
appearance, yet is capable of fundamentally altering a detectors view of an
arbitrary region of memory. When the detector attempts to read any region
of memory modified by the rootkit, it sees a ‘normal’, unaltered view of
memory. Only the rootkit sees the true, altered view of memory. Such a
rootkit is clearly capable of compromising all of the primary detection
methodologies to varying degrees.

The authors’ propose a better way for malware to hide than polymorphism is to lie; binary code change camouflage to evade scanners was said to be more difficult than just generating fake replies. Now it seems so commonplace as to be obvious to manipulate memory, and even incorporated into regular development, but back then it was Phrackworthy.