* Posts by Crazy Operations Guy

2513 publicly visible posts • joined 29 Jun 2009

All of Blighty's attack submarines are out of action – report

Crazy Operations Guy

"The submarines, maybe; the Tridents, maybe not..."

Well, I've always held that you could just fill the missiles with concrete and get the same effect. The point of nuclear weapons isn't possessing working weapons, but rather getting the enemy to think that you have working weapons. A country could easily become quite powerful by just making it appear that they are building massive numbers of nuclear missiles while only building one a decade, testing it, and then keep claiming that you have many more.

Of course, I've also held that you really only need one nuclear weapon so long as you produce evidence to each potential adversary that its pointed right at their leaders' home.

Zut alors! Uber wrecked my marriage, fumes French businessman

Crazy Operations Guy

Re: Valuations

I'd go with a different example than Apple/Samsung, seeing as how those companies' values are based off of actual product sold and income unlike companies like Facebook, Twitter, and all the other companies that have yet to make a single penny in profit.

But then your example isn't about the valuation of the companies themselves, but rather the perceived value of a specific assets. The case was that Apple lost a billion dollars in sales because consumers instead purchased a Samsung device for the sole reason it too had corners similar to those covered by their design patent.

Of course, though, you argument doesn't really track in that it is very unlikely people are suing the companies for such large amounts solely because of what they have been valued. I have personally been sued for a $2 million despite living in a modest home without any reason for them to believe I have that kind of money (I really don't). They lost the case (They were suing because their kid jumped over my fence and landed on a slippery concrete pad causing them to slip and receive massive amounts of brain damage). There are many other lawsuits like that where the defendant is being sued for an insane amount of money despite no evidence being present of the defendant possess anything close to that level of assets.

Dublin court to decide EU's future relationship with Trump's America

Crazy Operations Guy

Re: Somebody else's problem?

"Of course that would make it impossible for us to trade with the EU, but who wants that anyway?"

Don't you see, that's their plan: If the US / UK are made to be crappy enough, no one would want to go there and would thus no more immigrants / refugees. You know, like how a little kid would drop their candy into the mud so they wouldn't have to share it.

Crazy Operations Guy

Re: Given the rush to up-end anything Obama-enacted...

Trump also said that he was going to dismantle everything that Obama did under his presidency, so I can understand the Irish being a bit reticent about believing EU data is safe in the states...

Australia wants to jail infosec researchers for pointing out dodgy data

Crazy Operations Guy

Re: Fine idea - apply to all other research that doesn't meet the politicians' favor

To be fair, there is some data that the public should be aware of. Like if a town next to a military base suffers from a higher rate of certain respiratory issues, or if the demographics of people voting in an election doesn't match up with the actual demographics (EG, an entire segment of the population's votes weren't counted).

Anonymization is hard, which is why need more researches finding potential holes in the process.

Crazy Operations Guy

Then they might just decide to cut all the link going in and out of the country. Its in my experience that governments, in response to a horse escaping the barn, will tend to just burn the entire farm to the ground and salt the ashes. That or waste billions of dollars on an impenetrable gate that no one wants or needs.

Guilty! Four blokes conned banks in £160m fibre broadband scam

Crazy Operations Guy

Re: @Doc Ock

That has got to be the ugliest URL I have ever seen...

Why does it cost 20 times as much to protect Mark Zuckerberg as Tim Cook?

Crazy Operations Guy

Re: Putin?

That would be Muammar Gaddafi, he had at least $200 Billion squirreled away in banks accounts until he got his comeuppance.

Putin being worth that much is quite likely just some lie he perpetuates to try and seem rich, just like Donald "I used to have $10 Billion dollars but managed to lose most of it" Trump.

Of course that doesn't compare to Augustus Caesar who was worth the eye-watering sum of $4.6 Trillion dollars (In 2015 money)...

Crazy Operations Guy

If you go to the Burger Master in Bellevue, WA, you can see Bill chowing down for lunch, sometimes with Melinda, and usually with some of the other original MSFT folk, but sometimes alone. Most of the time, he'll let you just sit right down with him to talk, and he'll share his fries with you. The original Microsoft offices are right across what used to be a street (Now SR-520). Pretty easy to forget that that guy has enough money to buy The Netherlands outright...

Although it helps that his kids are old enough to look after themselves and if someone were to kill him, all the money would go right into his foundation. Doesn't really need security, because there aren't very many people that would want to harm a 61-year-old retiree / philanthropist.

Parents have no idea when kidz txt m8s 'KMS' or '99'

Crazy Operations Guy

Re: missing something

There are only two types of people that give out parental advice:

Those who have never had children and those who've lost touch with reality years ago. Either way, the advice is, at best, useless.

Microsoft's DRM can expose Windows-on-Tor users' IP address

Crazy Operations Guy

Re: Is it just me

"Ultimately that is my main reason for choosing Linux - it is MY computer"

Well, unless you use Ubuntu in which its now Amazon's computer. Since the whole 'Unity' search bullshit, I've pitched Canonical into the same bin as Red Hat. Specifically, the bin marked 'bastardized versions of Linux that I will never install on my equipment'.

A non-Standards Soviet approved measure of weight? Sod off, BBC!

Crazy Operations Guy

You should see the aviation industry, fuel is measured in so many different units depending on the situation. Tank capacity is measured in cubic meters, consumption rate is measured in kilograms, remaining fuel is measured in hours, with it all being billed in litres...

Chrome 56 quietly added Bluetooth snitch API

Crazy Operations Guy

"The bluetooth chrome features do not work on mobile devices."

Well, this API doesn't, but I'm pretty damn sure the mobile version of Chrome already has these capabilities, what with it being integrated so deeply into the OS it knows what the Kernel dev had for breakfast...

We see you, ransomware flingers, testing out your baddest stuff on... Germany?

Crazy Operations Guy

Real numbers, please

I hate it when press releases and news articles only contain percentages without any baseline numbers. Saying something increased by 667% means nothing to me unless I know what the number were to begin with.

You could say that 50% of a town's population died. It could be one of those back-water towns in Montana with a population of two and one of them fell of their tractor, or you could be talking about New York and 10 million people died in a horrific apocalyptic disaster. One of those things I would just ignore as something that just happens, the other I'd be working day and night to keep it from happening again.

You're taking the p... Linux encryption app Cryptkeeper has universal password: 'p'

Crazy Operations Guy

Re: Does this mean

"would soon know something was amiss if that resulted in opening the encrypted file"

That is why I intentionally type in the wrong password on any password prompt. If the system accepts it, then something has gone wrong and I shouldn't be entering my password anyway.

Crazy Operations Guy

Re: my 2 cents

I've always wondered why no one has built a system with a small chunk of RAM that is battery backed specifically to hold sensitive encryption data. The battery-backing would be there not to preserve the memory in case of power loss, but rather the exact opposite: overwrite the memory piece several times after power has been cut. Wouldn't need any modification to the system other than sticking a battery on a RAM module (Since DDR modules have controllers on board) and some flags in its ID string so the OS knows that it is a secure module that can be used as such. Memory modules' controllers already have an I2C bus connection that the OS has access to, so the OS could even mark specific regions of the module as containing secure data so the module can prioritize those.

I have seen far too many OSes and applications that don't bother to over-write sections of memory that held encryption keys so they stay in there after a reboot. While debugging boot code (I've been working on the coreboot/libreboot project) I keep seeing keys in my memory dumps surrounded by bits of plain text making it obvious what that random data is (I even compared the memory dump to the .key files and its an exact match).

I've even seen attacks that intentionally cause the OS to core-dump / bluescreen just so the attacker can read from previously-protected sections of memory (funny enough, some OSes will actually intentionally dump when some tries to access those protected bits of memory but will just write all memory out when it does coredump).

Corn-based diet turns French hamsters into baby eating cannibals

Crazy Operations Guy

@cd

"I wish there was a way to reach out to them and present alternatives"

Its not a lack of alternatives, its a complete lack of funds to buy anything else. They know damn well that the food they are eating is terrible for them, but there are no alternatives. The US and Canada have fucked over the native populations' economies by forcing them to live on barren land long distances away from any population centers so that they no longer have either the option of growing their own food or making enough money to acquire food. Although even for those that are near population centers, their school funding and medical funding are so terrible that there is no way to compete with European-Americans (Funny how America is now screaming "Them immigrants are ruining the country, let's deport them all!" when the Natives have been saying that for 500 years now...)

Ransomware avalanche at Alpine hotel puts room keycards on ice

Crazy Operations Guy

Re: Take your pick

"So that should be secure for about a week until the local crims re-learn the art of old-style lock picking."

Or the lost art of stealing or buying a master key from one of the staff. Even if there is no master key, they could still just use a simple bump key to get in... And if that fails, there is also the possibility of just renting a room, copying the key, then using it to break into room a few days later.

Physical keys are also highly susceptible to the birthday attack in that there is a very limit number of combinations that can be used and its quite likely that two or more rooms in even a modest sized hotel would share the same key pattern.

Magnetic key cards were created specifically to prevent such basic attacks. That and not having to pay a locksmith to re-key a room if someone leaves with the key.

Australia to review effectiveness of ISPs' copyright-defending website blocks

Crazy Operations Guy

Why bother with Google's DNS?

I just configure a script* on my systems to grab "https://www.internic.net/domain/root.zone" once a week, dumps it into unbound's zone directory, then reloads the zone. Essentially making them a local root server.

Yeah, it adds a little extra load to the DNS servers for the various domains since my machines aren't taking advantage of the big DNS server's caches, but that also means I'm not susceptible to someone poisoning those caches. I'm also free from advertisers re-writing NXDOMAINs to instead point to their crap.

[*] by script, I mean a crontab entry for "curl https://www.internic.net/domain/root.zone > /var/nsd/zones/master/root.zone && pkill -HUP nsd"

Trump decides Breitbart chair Bannon knows more about natsec than actual professionals

Crazy Operations Guy

"'if he lasts that long'"

I suppose its really dependent on what will get him first. I think we should start a betting pool on what will happen to Lord Baby-hands in the next 4 years:

-- Resigns in the midst of one his tantrums

-- Impeached after one too many Constitutional violations.

-- Dies in attack by another nation

-- Assassinated

-- Dies in an accident (like choking on a pretzel or falling down a flight of stairs...)

-- Medical condition (He is 71, always angry, and eats a lot of red meat; not exactly the healthiest person)

Ransomware killed 70% of Washington DC CCTV ahead of inauguration

Crazy Operations Guy

From what I've heard no one actually looks at the cameras anyway, so maybe they've already been infected and no one has noticed.

Crazy Operations Guy

Re: "Criminals infected..."??

Probably just some bot found the device browsing Shodan or via a port-scan and installed itself.

I've been evaluating NVRs to replace the aging camera a client of mine has been using (All analog, records to Video Cassette...). A lot of them have completely open ports for remote viewing over https, but run old versions of OpenSSL / Apache, many of which are vulnerable to the Bash Bug and use hard-coded passwords, so an infection could be done easily by an automated system.

I would imagine that the remote-access ports would be exposed to the internet so that the NSA / SS ? CIA could connect to them remotely, or possibly just some upper-level muckity-mucks wanting access wile they are away.

Crazy Operations Guy

You might be thinking of the Capitol Police, DC PD is a separate entity that belongs to the -City- of Washington and reports to the mayor / City Council. The Capitol Police, however only really report to the Feds in that they ask for money and their cases are seen by the Special District Federal Circuit Court. They were created to operate mostly autonomously so that no one could abuse their power to get away with criminal activity (The Capitol Police don't have jurisdiction in the Congressional Chambers, the Supreme Court Chambers, or the Executive Offices, so there isn't much that can be done about any of those crimes...)

Windows code-signing tweaks sure to irritate software developers

Crazy Operations Guy

Re: Just need better certificate management

Work on the crap software, but Lenovo signs both their software and their device drivers with the same certificate...

Crazy Operations Guy

Just need better certificate management

I wish there was a way to select which instances of signing I want to trust. Like I wish there were a way to trust the signing on Lenovo's hardware drivers, but distrust the code signing on their shit software (like with the whole 'superfish' fiasco).

Although I would also like some kind of screening for what code gets signed. I've had several pieces of software on my network that got through because they were signed even though the software was total crap and filled with security holes. If I tried to delete the CA that issued their code-signing cert, then I'd be invalidating plenty of software that I do want on my network.

Penguins force-fed root: Cruel security flaw found in systemd v228

Crazy Operations Guy

Re: @Gerhard

"For 90% of systems it is a total overkill. SystemV would do just fine but where you have multiple dependencies then I've found SystemD a better bet."

I've had the opposite experience. On a proper SysV system, it will start daemons in the order they are listed in rc.conf.local. Clustering was never a problem for me since I've always used properly coded applications where their start-up script would check for a file lock and would start it up in a passive/stand-by mode if the file was locked.

Of course, it helped that I made the afternoon-worth of effort to learn basic Perl / shell scripting that the tiny startup scripts were easy for me to follow, unlike the spaghetti that is systemd.exe

Irish townsfolk besieged by confused smut channel callers

Crazy Operations Guy

I always loved it when people would dial me by accident but then ask me "Are you sure?" after I stated my name... Happened to me several times.

The most entertaining time was when I had a work-issued satellite phone. Part of the plan included a 'local' number that people could call me on without dialing an international number. They kept calling back trying to reach someone I had never heard of, then accuse me of stealing the phone of the person they were trying to reach. All the while I kept telling them that they are making the most expensive phone call they'll ever make ($20 to connect, $5/minute afterwards with a 1 minute minimum). They stopped calling the beginning of the following month, probably because they realized I wasn't lying, and by my calculations, now had to pay about $750 to their phone company.

This was many years ago, so Sat-phone calls were even more of rip-off than they are now.

DDoSing has evolved in the vacuum left by IoT's total absence of security

Crazy Operations Guy

That is what botnet operators already do. They secure their victim so that they are the only that can use it. For a while, I saw some infected systems come into my shop with anti-virus running and configured, but with the malware added to the whitelist. There was one case where I saw someone had re-packaged ClamAV so that it would ignore their malware and actually had a their own virus definitions included that would kill off detection tools, other AVs, and a host of other pieces of malware that were unknown by AV companies at the time. The Malware's payload was embedded into ClamAV's executable as to provide a reason why the program needed internet access, kernel-level permissions, and would regularly thrash the filesystem.

It had nothing to do with ClamAV itself, it was just an ideal thing to target since it cross-platform, Open Source and was fairly lightweight (all of which are reasons why I use it on my own network)

Crazy Operations Guy

Especially if the fines could be used to pay for a UL-style security certification group. Maybe have multiple levels ranging from "Definitely going to be part of a botnet the second you plug it in" to "More security than even a TEMPEST data-center would need" with many levels in between.

Or maybe just require manufacturers to include some kind of rating based on the device's security based off a weighted-average of CVE ratings.

UL rates devices for how long something will last in a fire, so why not some kind of rating for how long a device would last while being attacked in the wild?

Biz claims it's reverse-engineered encrypted drone commands

Crazy Operations Guy

My city's airport has been experimenting with birds-of-prey to keep drones out of the way of aircraft. They already use such birds to keep other birds off the airport grounds, so its just a matter of training them to hunt drones as well. A Phantom Drone is no match for a bird that can pick up and eat a grey wolf...

Microsoft's Linux love-in continues with SUSE support in SQL Server

Crazy Operations Guy

Distro-specific software compatibility?

So is SQL Server only compatible with SUSE? In which, someone seems to be misunderstanding how Linux is supposed to work...

With the way everything is going, I wouldn't be surprised to if a new operating system comes out in a couple years to throw off the bullshit that Linux is becoming, just like Linux rebelling against the various Unixes from the days of yore (And how Unix itself was to rebel against Multics / TOPS / etc.).

The cracks are already starting to show with the massive division that systemd has caused and some distros now balking and refusing to install on systems with less than 20 GB of disk, a multi-core chip, and 2 GB RAM. It wasn't too long that I was running a Linux distro on a Pentium-2 laptop with 256 MB of RAM and a 10 gig disk with plenty of resources to spare even when running a full Desktop Environment and a full office suite. What the hell happened to software in the last decade?

Cisco's WebEx Chrome plugin will execute evil code, install malware via secret 'magic URL'

Crazy Operations Guy

Re: An Adobe Wannbe?

Probably the very same coders.

The facts:

Adobe's been laying off programmers, mostly the terrible ones.

Cisco has been desperate to hire programmers with experience in coding multi-media applications.

Cisco and Adobe's offices are within shouting distance.

So, I would assume that the programmers that got laid off from Adobe would be going to Cisco. Fairly easy transition, what with staying in the same niche and the commute is not altered that much. So the same morons that botched Flash probably now have their greasy mitts all over Cisco's code.

It's official: Ejit – sorry – Ajit Pai is new FCC boss (he's the one who hates network neutrality)

Crazy Operations Guy

Comcast employee appoints anti-net-neutrality FCC commisioner

That was hardly surprising.

Yes, Trump is an employee of Comcast, he is still under contract for his role in 'The Apprentice' a show that is wholly owned by NBC/Comcast. His contract was never cancelled, just amended in the same way other actor's get their contracts amended when they get thrown in prison/rehab where their jobs are waiting for them when they are free again.

Annoyingly precocious teen who ruined Trek is now an asteroid

Crazy Operations Guy

"Congratulations Wil! @wilw @WilliamShatner"

Ummm, did I miss something? Why are they including The Shat, shouldn't that Patrick Stewart?

It's 2017 and 200,000 services still have unpatched Heartbleeds

Crazy Operations Guy

Interesting fact: Office has had the Ribbon for 10 years now. The menu system has only existed for 16 years before that (Office 1.0 was released November 1990, the Ribbon was implemented January 2007). So to get '25 years' of experience with the Menu system, you would've had to been using Office 2003 up until 2012, assuming you were using Office 1.0 the day of release.

Also of note: The Ribbon hasn't changed since 2007 when it was introduced. A final note: the keyboard shortcuts for functions haven't changed from their initial bindings, so shortcut from Office 95 still work in Office 2016.

Operator of DDoS protection service named as Mirai author

Crazy Operations Guy

"That sure is a nice web site ya got there..."

"...be a shame is something where to happen to it."

Seems that the mafia is alive and well in New Jersey and adapting to 21st century technologies.

US Marines seek more than a few good men (3,000 men and women, actually) for cyber-war

Crazy Operations Guy

"Time for a central unit I think"

Seconded.

I've always thought that the various military 'cyber commands' should be spun off into their own division. While they are at it, scrap the NSA, send their offensive teams to the newly created military branch, the intelligence units to the CIA, and then spin off a new governmental agency responsible for defensive-only type stuff.

That way any offensive activities fall under the rules of combat, the intelligence stuff is where the rest of the foreign intelligence stuff is (I'm not a big fan of the CIA, but I'd rather one organization being shady rather than several).

I figure that a proper defensive organization would also take a few pieces from other organizations and would act as the InfoSec department for the entire government, and even would do work for state/county/city level governments as well. Essentially NIST, but with consultants. Maybe even, with proper oversight, tap into the NSA's network taps at the US borders and implement multi-layer firewalls to block malware, spam, botnet, and attack traffic from coming into the US. Maybe also set up a certification process, similar to UL, for evaluating the security of internet-connected devices before going to market.

Playpen child sex abuse archive admin gets 20 years in the Big House

Crazy Operations Guy

Could've rescued the children sooner...

Would've been possible to rescue those children earlier if the FBI hadn't spent decades arresting people for viewing image and nothing, closing down the sites, then patting themselves on the back and doing fuck-all afterwards.

Their previous methods only served to push the child molester community deeper and deeper into the shadows to the point where they are using technologies originally used for deep-cover intelligence agents spying on the Soviets at the height of the Cold War.

The majority of Child Rapists started out viewing normal pornography and slowly found themselves getting into younger and younger subjects. They then felt very embarrassed about it and ashamed, but rather than seeking treatment (because they'd be arrested even going to people that are otherwise bound by multiple levels of secrecy and confidentiality) they turn to the forums of the sites in which they got those images. So rather than getting a response of "Yeah, its good that you came in, we will find a way to get rid of those urges and help you understand how you are hurting others" they now get "That is perfectly normal thing, you can now be yourself, you are in a safe community and that little girl in those pictures was enjoying it and wanted it. She even got a toy afterwards!".

Now that's a Blue Screen of Death: Windows 10 told me to jump off a cliff

Crazy Operations Guy
Joke

Re: Lovely pic

Now, now, no need to go over the edge here...

Crazy Operations Guy

"I think you have to be extremely deranged"

No, you just have to have read the news lately.

Seeing what is happening around the world within the halls of power kind of make me want to throw myself off a cliff, although that wouldn't be such a bad cliff to do it.

Trump's cyber-guru Giuliani runs ancient 'easily hackable website'

Crazy Operations Guy

Putting on my tinfoil hat

I'm going to assume that this company doesn't actually do anything but is rather a front to accept bribes and kickbacks he is owed after abusing his power as Mayor to benefit his buddies.

No one rational would hire a security company that apparently lacks the ability to host its own web servers and email (Yes, security is hard, but isn't that -why- you would hire these guys?) unless you have some other compelling reason to chose them. To me, a security company's website should have perfect security, I should be able to throw MetaSploit and its ilk at their public resources and have it come back squeaky clean.

-The website is probably hosted with that particular provider because they had a pre-made hosting+email image and was never updated, which would be why it still runs Dovecot for email despite email being hosted elsewhere

-They are probably using Mark Monitor since it anonymizes exactly who owns the domain, it may very well be some off-shore outfit running in a tax haven that is owned/operated by non-existent people and/or some lawyers.

Donald Trump will take cybersecurity advice from, um, Rudy Giuliani

Crazy Operations Guy

I doubt his company actually does anything

Given Rudy's reputation, I wouldn't be surprised at all if it turned out that his security firm doesn't actually do anything but is rather just a front for accepting bribes and kick-backs from deals he made as Mayor.

I also would be quite open to believing that the only reason Rudy was hired was that Rudy gave Trump some building permits or selected his hotels as for city-sponsored activities and is now looking to collect on the kick-backs he is owed...

Crazy Operations Guy

Wow, that is some amateur-hour stuff right there. Looks like they probably hired some guy's kid to set it up because "they know computers" who then proceeded to the grab some pre-built Linux distro with an email server and Joomla pre-installed and configured through some piece-of-crap 'Wizard'.

Given that absolutely nothing is blocked, I have the feeling that the firewall was disabled and the only reason why ports are showing as 'closed' is that there is nothing actually running on those ports.

I doubt that the machine is actually being used as a Honey Pot since several high-number ports that are very rarely attacked are open while some well-known and frequently attacked ports aren't.

The top doc, the FBI, the Geek Squad informant – and the child porn pic that technically wasn't

Crazy Operations Guy

Re: @Crazy... But that's the thing...

"You would have to show that you got that information without any reference to his computer."

Yeah, that's kinda my point. The implication I was trying to make was that the site's access logs would have been retrieved during a raid on that site and his IP address was among thousands of others and the defendant's address could have been on there, but the police hadn't got to it yet.

Crazy Operations Guy

Re: @AC ... everyone picks and chooses the amendments they believe in

"Earlier means that the motion failed."

No, it just means it was submitted earlier, the original motion could still be under consideration. It is very common for both parties to submit many motions while other haven't been decided upon. A motion only means that the submitter has a specific issue with something and could submit multiple motions on the same issue so long as the motion is not dependent on any currently being considered and is not simply the same argument, restated. In this case, one motion addresses the constitutionality of obtaining the evidence itself while this motion addresses whether the image was enough justification to issue a warrant. This motion would be relevant whether or not the search itself was Constitutional in the first place and could thus be submitted before the constitutionality question has been answered.

Motions can take a substantial amount of time to be decided upon as the other party must be given an opportunity to present their own evidence against the motion, especially when the filer of the motion submits uncommon cases of precedent, in which case both the second party and the judge must take the time to study those precedents before refuting evidence can be presented or a decision can be made by the judge.

Crazy Operations Guy

Re: OC Weekly...

"The guy brought the laptop to them for repair."

But that does not give them the right to search the whole computer. The technician is only allowed to perform reasonable actions in pursuit of completing their obligation under their employment contract and the terms of the contract signed between the accused and Best Buy. So unless the specified work was to recover deleted files or recover files from a damaged hard drive, the technician had no cause to go searching for files in 'unallocated' space and thus violate the terms of the original contract.

This breach of contract would be perfectly reasonable grounds for a civil lawsuit against Best Buy.

Crazy Operations Guy

Re: @Sonny Jim "To be clear, our agents unintentionally find child pornography"

"Or he could have claimed that it wasn't his image if it was the only one.

However it wasn't."

Yes, but at the time of the police petitioning for a warrant, they had nothing more than a suspicion that there was more than just that image

The image could have been from the browser cache and automatically deleted, possibly even something posted in a comments sections at the bottom of a news article and he never scrolled beyond the bottom of said article and wouldn't even have an idea that an image was even there, let alone one depicting a naked minor.

Hell, if that stood, the police could confiscate my systems after last week when some unsolicited email was sent to me containing an illegal image (the image email was a phishing attempt to extort money from me claiming that it was the FBI and they found that image on my computer and I could pay a fine or be arrested, standard scam stuff). This would result in a massive amount of damage to my reputation as well as a loss of my livelihood until the police return my stuff after the trial (assuming I don't end up being wrongfully convicted, at which point my stuff is then sold at auction and I'd only receive the proceeds from the auction if it is later shown that I was indeed wrongfully convicted).

Crazy Operations Guy

Re: @Sampler ... Chain of custody

"Post that... then you have a chain of custody issue."

No, its the prosecution's burden to demonstrate that the technician reported the image in good faith, it is not the defense's burden to demonstrate that that something like that happened. The defense's argument is that the prosecution did not perform its due diligence in ensuring that the evidence was obtained in good faith.

The ideal that the accused is innocent until proven guilty, specifically that the accused must be proven guilty beyond a reasonable doubt are the basis for placing the burden on the Prosecution.

Crazy Operations Guy

Re: I'm not sure you can make the its not porn argument

"Plus a private person (the computer tech in this case) is not bound by the warrant requirements that a law enforcement agent is."

While a private person is not held to the same the requirements of a law enforcement office, it is still the -prosecutor's- burden to prove that evidence used in obtaining a search warrant is valid and can be upheld in court as required by the 4th Amendment. The defense is merely arguing that the prosecution did not do their due diligence in demonstrating that the accused has indeed committed the crime of possessing child pornography. Given that the "image was pulled from unallocated space on Rettenmaier's hard drive" does not in anyway show that the defendant intended to -possess- illicit material (even if was legally considered illicit material in, and of, itself). In fact, the fact that it was deleted demonstrates that the accused did not intend to possess.

Of course, it could also be argued that since the image was deleted (By virtue of being in unallocated space of the hard drive) that, depending on the repair requested, the technician had no cause to even incidentally discover the image and was rather attempting to recover all images on the system to be used for purposes beyond the work contract signed between the accused and Best Buy.

A garbage can submit evidence to the police and is usable so long as the evidence was discovered during reasonable performance of their work. In you example, yes the garbage man could turn in a bloody piece of clothing to the police to be used for a warrant, but it would only be admissible if it, say, fell out of a garbage bag, or was clearly visible in the garbage can. If the piece of clothing was in a sealed bag and no evidence of a crime was visible without opening the trash bag, the piece of clothing would become inadmissible and unusable for gaining a warrant. Even then, the evidence is still useful to the police if they only use it as an indicator where the crime may have taken place and could then canvas the neighborhood and if the neighbors report suspicious behavior by the suspect or something like the sound of a woman screaming coming from the suspect's home, then the police can obtain a search warrant that would be upheld in a court of law.

Peace-sign selfie fools menaced by fingerprint-harvesting tech

Crazy Operations Guy

If I can't change it, I don't use it

I've never trusted using bio-metrics for anything security related, especially not for my phone. My main complaint is that a phone can't really be trusted all that much and someone could easily steal the image of it and then re-use it on something else that uses fingerprints for authentication.

There is also the issue that if you lose your fingerprints, there really isn't a 'reset' option. I had an external drive that used fingerprints to authorize decryption. Worked fine until one day I stupidly grabbed a hot pan as it was falling off the stove and burnt my fingers to the point of blistering. Took a couple weeks before the drive would recognize me again...

Its really the same issue as password re-use, except in this case, you only have, at most, 10 different ones you can use over your entire life. Although the number of possibilities is much lower since most people's finger prints are mirrored on the other hand and there isn't much difference between the prints on each finger on any given hand.