via the inimitable Cyrus Farivar, writing at Ars Technica, details the recent criticsim of Federal Bureau of Investigation's behavior in inmproper device search (in this case a mobilephone) and a apparently non-standardized practice of signal interception via a Singray devices. Certainly today's MustRead, especially in the event you may be interested in search, seizure and signal interception law you have hit the mother loade!
'The crux of the issue is that, in April 2016, an FBI agent sought and obtained two warrants from an Alameda County Superior Court judge: one to search Artis' phone and another to deploy a stingray to locate Hopkins.' - via Cyrus Farivar, writing at Ars Technica
via Ronald F. Guilmette (writing on the NANOG Mailinmg List), in which, his evident disgust (shared I'm sure by the majority of network engineers reading the NANOG List), at BGP route hijacks executed allegedly by BitCanal - a Portuguese firm, at this point, held in the lowest regards. Read more on the Oracle+Dyn blog post well crafted by Doug Madory, or Ronald F. Guilmette's email on the NANOG List (a short snippet also follows).
"Sometimes I see stuff that just makes me shake my head in disbelief. Here is a good example:https://bgp.he.net/AS3266#_prefixes I mean seriously, WTF? As should be blatantly self-evident to pretty much everyone who has ever looked at any of the Internet's innumeriable prior incidents of very deliberately engineered IP space hijackings, all of the routes currently being announced by AS3266 (Bitcanal, Portugal) except for the ones in 213/8 are bloody obvious hijacks. (And to their credit, even Spamhaus has a couple of the U.S. legacy /16 blocks explicitly listed as such.)" - Ronald F. Guilmette at NANOG Mailing List Archive
In a tour de force instructional blog post at Black Hills Infosec, Carrie Roberts displays remarkable acumen in the effort to distill user names via Portswigger's Burp Suite, with LinkedIn as input. In the event that you are at all interested in garnering grist for your pentest mill (so to speak), examine - if you will - Carries' commanding work, you'll be glad you did.
"Making the legal case for breakups will be hard, though, because the internet giants don’t fit the stereotype of rapacious monopolists (emphasis added) that raise prices and squeeze investment. They manipulate markets in a different and seemingly more benevolent way. They’ve become so dominant by developing products and services that many of us want to use. And they gain their immense power through collecting data about our online activity." - via Martin Giles writing at the MIT Technology Review
via Dave Lewis, well-known Information Security professional, founder of the security site Liquidmatrix Security Digest and co-host of the Liquidmatrix podcast and a contributing writer at the DUO Decipher blog, tells a fascinating story of a lashup of his Lunch an Autonomous Automobile and the Law of Unintended Consequences. Rather than spill the beans - travel, if you will - via our beloved Interwebs, to the Decipher blog, and luxuriate in the Tale Told by Mr. Lewis! Certainly Today's Security Must Read!