Monthly Archives: March 2005

TSA Lied About Protecting Passenger Data

Via Bruce Schneier’s blog:


According to the AP:

bq.. The Transportation Security Administration misled the public about its role in obtaining personal information about 12 million airline passengers to test a new computerized system that screens for terrorists, according to a government investigation.

The report, released Friday by Homeland Security Department Acting Inspector General Richard Skinner, said the agency misinformed individuals, the press and Congress in 2003 and 2004. It stopped short of saying TSA lied.

p. I’ll say it: the TSA lied.

Here’s the report. It’s worth reading. And when you read it, keep in mind that it’s written by the DHS’s own Inspector General. I presume a more independent investigator would be even more severe. Not that the report isn’t severe, mind you.

Another AP article has more details:

bq.. The report cites several occasions where TSA officials made inaccurate statements about passenger data:

* In September 2003, the agency’s Freedom of Information Act staff received hundreds of requests from Jet Blue passengers asking if the TSA had their records. After a cursory search, the FOIA staff posted a notice on the TSA Web site that it had no JetBlue passenger data. Though the FOIA staff found JetBlue passenger records in TSA’s possession in May, the notice stayed on the Web site for more than a year.

* In November 2003, TSA chief James Loy incorrectly told the Governmental Affairs Committee that certain kinds of passenger data were not being used to test passenger prescreening.

* In September 2003, a technology magazine reporter asked a TSA spokesman whether real data were used to test the passenger prescreening system. The spokesman said only fake data were used; the responses “were not accurate,” the report said.

p.


Read the rest of the article.

Posted in Politics, Stupidity | Leave a comment

Bad Geek Joke for Thursday March 24, 2005

Why do computer geeks celebrate Halloween on Christmas?

Because Oct 31 is equal to Dec 25.

Posted in Uncategorized | Leave a comment

Note to Self: Don't Move South

From CNN:

*IMAX theaters reject film over evolution*

CHARLESTON, South Carolina (AP) — IMAX theaters in several Southern cities have decided not to show a film on volcanoes out of concern that its references to evolution might offend those with fundamental religious beliefs.

“We’ve got to pick a film that’s going to sell in our area. If it’s not going to sell, we’re not going to take it,” said Lisa Buzzelli, director of an IMAX theater in Charleston that is not showing the movie. “Many people here believe in creationism, not evolution.”

The film, “Volcanoes of the Deep Sea,” makes a connection between human DNA and microbes inside undersea volcanoes.

Buzzelli doesn’t rule out showing the movie in the future.

IMAX theaters in Texas, Georgia and the Carolinas have declined to show the film, said Pietro Serapiglia, who handles distribution for Stephen Low, the film’s Montreal-based director and producer.

“I find it’s only in the South,” Serapiglia said.

Critics worry screening out films that mention evolution will discourage the production of others in the future.

“It’s going to restrain the creative approach by directors who refer to evolution,” said Joe DeAmicis, vice president for marketing at the California Science Center in Los Angeles and a former director of an IMAX theater. “References to evolution will be dropped.”

Posted in Stupidity | Leave a comment

Bad Geek Joke for Monday March 21, 2005

#!/bin/sh
#The Unix Guru's View of Sex
unzip;
strip;
touch;
grep;
finger;
mount;
fsck;
more;
yes;
umount;
sleep;
Posted in Geek | Leave a comment

DVD Jon creates DRM-free iTunes interface "PyMusique"

Via BoingBoing:

DVD Jon has created a program which bypasses the DRM stage of the downloading process when purchasing songs from iTunes. One still pays for the tracks, and FairPlay is not included.

Link to download page, and Link to Jon Johansen’s blog.

Here’s a snip from The Register‘s story:

PyMusique [is] a Python-based utility that offers a “fair interface to the iTunes Music Store”, co-written with Travis Watkins and Cody Brocious. The app provides the usual ITMS features – access to song previews and the ability to set up a payment account and to use it to buy songs – but there are two crucial differences.

First, PyMusique allows you to re-download songs you’ve purchased. So if your hard drive goes up the Suwannee and you haven’t backed it up for a while, you can re-acquire your ITMS-sourced song library. Second, none of the tracks you download will be encumbered with DRM.

Of course, it’s of very questionable legality. Quite apart from potentially bypassing Apple’s FairPlay copy protection system – a no-no according to Europe’s European Union Copyright Directive (EUCD) – running the software infringes the terms and conditions ITMS user agree to abide by when they set up an account.

Posted in Interesting | Leave a comment

How to Snatch a Domain Name

Interesting article in which Mike Davidson describes how to snatch up a domain name that has expired.

Posted in Tech | Leave a comment

DDJ on the Flaws in .NET

Via Slashdot:

bq.. Richard Grimes of Dr. Dobbs Journal wrote an article entitled Mr. Grimes’ Farewell, in which he discusses what he feels are inherent flaws in .NET, and how he is abandoning his .NET column. Grimes argues that .NET is merely thin wrappers to Win32 calls (Avalon uses message functions that date back to 16-bit Windows), that Microsoft has abandoned confidence in both .NET and sales of Longhorn, and that the framework itself is too large and poorly implemented, most of it ported from past APIs like WFC and VB.

Posted in Tech | Leave a comment

Countermeasures for Identity Theft from Frank W. Abagnale

Via GeekWisdom.com:

An article by Frank W. Abagnale, the lecturer and consultant, entitled 14 tips to avoid identity theft details some good advice for protecting your identity.

Abagnale’s tips:

# Guard your Social Security number. It is the key to your credit report and banking accounts and is the prime target of criminals.
# Monitor your credit report. It contains your SSN, present and prior employers, a listing of all account numbers, including those that have been closed, and your overall credit score. After applying for a loan, credit card, rental or anything else that requires a credit report, request that your SSN on the application be truncated or completely obliterated and your original credit report be shredded before your eyes or returned to you once a decision has been made. A lender or rental manager needs to retain only your name and credit score to justify a decision.
# Shred all old bank and credit statements and “junk mail” credit card offers before trashing them. Use a crosscut shredder. Crosscut shredders cost more than regular shredders but are superior.
# Remove your name from the marketing lists of the three credit reporting bureaus to reduce the number of pre-approved credit offers you receive.
# Add your name to the name-deletion lists of the Direct Marketing Association’s Mail Preference Service and Telephone Preference Service used by banks and other marketers.
# Do not carry extra credit cards or other important identity documents except when needed.
# Place the contents of your wallet on a photocopy machine. Copy both sides of your license and credit cards so you have all the account numbers, expiration dates and phone numbers if your wallet or purse is stolen.
# Do not mail bill payments and checks from home. They can be stolen from your mailbox and washed clean in chemicals. Take them to the post office.
# Do not print your Social Security number on your checks.
# Order your Social Security Earnings and Benefits statement once a year to check for fraud.
# Examine the charges on your credit card statements before paying them.
# Cancel unused credit card accounts.
# Never give your credit card number or personal information over the phone unless you have initiated the call and trust that business.
# Subscribe to a credit report monitoring service that will notify you whenever someone applies for credit in your name.

Posted in Interesting | Leave a comment

Today's Fortune

Here’s today’s fortune via my Linux box:

bq.. The notes blatted skyward as they rose over the Canada geese, feathered rumps mooning the day, webbed appendages frantically pedaling unseen bicycles in their search for sustenance, driven by cruel Nature’s maxim, ‘Ya wanna eat, ya gotta work,’ and at last I knew Pittsburgh.
— Winning sentence, 1987 Bulwer-Lytton bad fiction contest.

Posted in Amusements | Leave a comment