Archive for Smart Grid

April 11, 2011 – Episode 208

Posted in Breach, Court Cases, criminal forensics, darkweb, ediscovery, eMail Security, Legislation, Show Notes, The CyberJungle, Vulnerabilities with tags , , on April 10, 2011 by Habeas Hard Drive

Episode 208 of  The CyberJungle is about 30 minutes long.  You can hear it by clicking on the flash player below. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show. The interviews start at about the 16:50 mark.

To listen to Episode 208 via the flash player:


Brian Fox, the creator of BASH (BASH makes a lot of Linux tasks easier), is working on a brand-new project to simplify browser security called Coccoon.  According to the company, with the Cocoon Plugin you get: “No tracking. No viruses. No spam. And your browsing history truly private.”

Our Take on The Week’s News

State of IT Security: Ponemon Institute Study of Utilities and Energy Companies. Global energy and utilities organizations face a number of emerging security challenges that are unique to their industry. Ponemon Research surveyed 291 IT and IT security practitioners within the energy and utilities market, and found that most don’t take IT security seriously. Download this research paper to learn more.

Calls for revisions to an auto accident privacy law. Originally intended to protect citizens, but is it being used to block government transparency?

Disable Geolocation in popular web browsers and social tools with this handy guide by Fred de Vries. And, check out Comodo Dragon, a version of Google Chrome with tracking disabled. Comodo Dragon browser also highlights revoked SSL certs, and by default routes traffic to more secure DNS. Only for Windows users right now.

Tales from the Dark Web

Epsilon Marketing Breach: What did Epsilon know about a pending attack and when did they know it?


Anatomy of a Tweet.  Very handy forensic guide, called “map-of-a-tweet” by

January 11, 2011 – Episode 195

Posted in Conference Coverage, Exclusive News, The CyberJungle, Vulnerabilities with tags , , , on January 11, 2011 by Habeas Hard Drive

Episode 195 of  The Cyberjungle  is 43 minutes long. You can hear it by clicking on the flash player below. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 195 via the flash player:

Our Take on CES2011

The CyberJungle goes to the 2011 Consumer Electronic Show in Las Vegas: Our security perspective on the world’s largest consumer electronic show.

Interview #1 – The CyberJungle gets a private briefing on the BlackBerry Playbook: We talked security and policy on the new tablet. We were briefed by two RIM executives…Jeff Gadway, Global Brand Manager, and Shelly Sofer, Director of Public Relations.

Interview #2 – The CyberJungle talks with Chris Deutschen of Direct Energy: Topics include servicing the home area network, and smart grid security. Yes, the  industry takes security very seriously, according to Deutschen

Get more from CES2011 on our Conference Notes page. And follow (or just read) Ira on Twitter for comments and nuggets of interest.

Episode 118 and 119 – March 14, 2010

Posted in Breach, Conference Coverage, Court Cases, criminal forensics, darkweb, ediscovery, Exclusive, Legislation, Show Notes, The CyberJungle, Vulnerabilities, web server security with tags , , on March 13, 2010 by Habeas Hard Drive

Episode 118 is the ‘su root’ episode,  our unedited interview with Joe Weiss, author of the forthcoming book, “Protecting Industrial Control Systems from Electronic Threats.” Joe says there’s a  lack of trained personnel to manage system controls in the Smart Grid, and indeed in the entire insdustrial infrastructure.  The results of this understanding gap could be catastrophic. The full-length interview is 24 minutes.

Episode 119 is the weekly podcast of The CyberJungle. Listen by clicking below. This week’s show is 69 minutes long.

Here are the shownotes:

Met Matt Carpenter at RSA. He works as a consultant for InGuardians and specializes in penetration testing for electrical utilities. Pen testing is a complex process of thinking like an attacker, and then simulating what an attacker would do. Matt was a panelist in a number of smart grid sessions, and he brought up some alarming scenarios that highlight the possible hazards of the electrical smart. The interview is about 21 minutes into the show.

This week’s news:

TSA agent injects terrorist watchlist server with destructive code after being given termination notice. He’s been indicted by a federal grand jury on two violations of the Computer Fraud and Abuse act. And he’s out on bail. (We question the wisdom of letting an employee know in advance that he’ll be fired, and then giving him two weeks’ access to systems affecting national security.)

EFF files PUC guidelines for smart meter privacy, as California rolls out the program. Read the comments as they were filed. (Read the 49-page legal document, PDF)

Father and Son Plead Guilty to Selling Counterfeit Software Worth $1 Million.  Why this matters: Malware hidden in the software, you gave permission for the malware to be installed! If the sales are traced back to you, you have to delete the software, and buy it again. You can’t keep car!

How Microsoft’s URL reputation system works: [from]

Episodes 116 and 117 – March 7, 2010

Posted in Breach, Conference Coverage, criminal forensics, darkweb, ediscovery, Exclusive, Podcast, The CyberJungle, Vulnerabilities with tags , , , , , on March 6, 2010 by Habeas Hard Drive

The CyberJungle episode 117 is a special RSA Security Conference coverage. It includes an interview with Juan Santana, the CEO of Panda Security on the take down of the Mariposa Botnet. This botnet impacted people in just about every county in the world, and stole in part, bank credentials. Ira mentioned Christopher Brown’s forensics book, Computer Evidence: Collection & Preservation.

In “Tales from the Dark Web” we explore how cybercrime gangs recruit and use money mules to move cash after they’ve stolen it out of bank accounts.  Bank of America Senior Vice President David Shroyer.

We attended a Cloud Security Alliance Security Summit at RSA, where we discovered  the

The CyberJungle full episode 117 can be downloaded from the listening options page, or streamed here:

Plus, as our “su root” edition this week, we have posted an interview on the incident response related to the Mariposa Botnet with Pedro Bustamante from Panda Security. We caught up with him at the RSA Security Conference.

We spoke with Gerry Brown and Christopher Brown on forensics and evidence collection for electric smart grid attacks. The su root interview is always longer and more technically sophisticated than the podcast versions, which have been edited for radio.

This su root episode (#116) of The CyberJungle can be downloaded from the listening options page, or streamed here:

Obama: $3.4B Toward ‘Smart’ Power Grid – What About Smart Security and Privacy for The Grid?

Posted in criminal forensics, ediscovery, Legislation, Vulnerabilities, web server security with tags , , , on October 27, 2009 by Habeas Hard Drive

President Obama is annoucing $3.4b in stimulus monies for the “Smart” Power Grid today (see story here).

But, here is part of the story that is not getting much, if any, coverage: What are the security and privacy issues in deploying the Smart Grid and Smart Meters?

While I am not an expert on energy, I am knowledgable on the data security and privacy issues on this topic. This is an issue that could literally impact every citizen and business in the US, and impact the very foundation of the economy.

There are advanced technologies that could truly help secure the delivery of power. There are rules that can be put into place to help protect privacy. But, these items do not appear to be on the agenda today, and get little attention in day-to-day coverage.

Early deployments of the Smart Grid and Smart Meters have not made security and privacy a priority, much beyond lip service.

There will be some very negative outcomes for this program if  security and privacy are not truly “baked in” at the beginning of this next wave of deployments.

Written By: Ira Victor, GIAC G17799 GCFA GPCI GSEC   ISACA CGEIT

Data Security Podcast Episode 64 – Aug 4 2009

Posted in Breach, Conference Coverage, darkweb, eMail Security, Exclusive, Podcast, Vulnerabilities, web server security with tags , , , , , , , , , , , on August 4, 2009 by Habeas Hard Drive

30 minutes every week on data security, privacy, and the law….(plus or minus five)

On this week’s program:

SPECIAL DEFCON17 Coverage From Las Vegas

* Is YOUR tax return sitting out there on the Internet? Maybe not yours, but Larry Pesce tells us about the tax returns — and the other stuff he found without much effort.

* Breaching the new “personal WiFi” hot spots, is it child’s play? We’ll find out…. On a special Tales From The Dark Web segment … with David Maynor from Errata Security.

* Our take on the DefCon news.

–>NEW! Stream This Week’s Show with our Built-In Flash Player:

This week’s show is 34 minutes.

–> Stream, subscribe or download Episode 64 – Listen or subscribe to the feed to automatically get the latest episode sent to you to your Google, Yahoo, iTunes, or other popular sites.

–>Tune into the show directly on iTunes, you can also subscribe to the program on iTunes.

–> A simple way to listen to the show from with stricter firewalls: Listen from Odeo. This site works better if you are behind a more restrictive enterprise firewall.

Please visit our sponsors, and be sure to let them know you heard about them on The Data Security Podcast:

  • Vipre Anti-Virus, the complete Antimalware solution by Sunbelt Software. If you TRY the enterprise version, you get the home version for FREE! Go to: .
  • GamaSec Web App Scans: Spots cyber-hazards on your web site, and has advanced zero-day protection. GET YOUR FREE BASIC WEB APP SCAN, plus a special offer just for listeners to The Data Security Podcast. Go here to sign up, and add the offer code: Podcast.
  • SonicWall;  Get the super fast UTM firewall that’s rated Five Stars (the Best rating) by Secure Computing MagazineData Clone Labs is the premier SonicWall Medallion Partner for all your security needs.
  • DeviceLock; Software that controls, manages and helps encrypt USB drives and other removable media. Get a free trial on their site, and be sure to let them know you heard about them on The Data Security Podcast.

Show Notes for Episode 64 of the Data Security Podcast

* Conversation: Ira talks with Larry Pesce, of PaulDotCom, about the downright scary information he easily found while sifting through a file sharing network.

* Tales From The Dark Web:  Ira talks with David Maynor of Errata Security about the security threats associated with personal WiFi devices.  The photo below is of David:

David Mayner with personal WiFi devices

David Maynor holding the Clear personal WiFi device (left) and the Verizon/MiFi personal Wifi device (right)

* From the News:  SSL Certificates Trust attack;  Mike Sussman from

*From the News: Cross Site Request Forgery attacks; Mike Bailey’s from

*From the News:  Justin Samuel from the Firefox plug-in team.

*From the News: Tony Flick from on the electric smart grid security threats.

* Wrap: RFID protection products

Michael Aiello, CEO of DIFRWear RFID Protection

Michael Aiello, CEO of DIFRWear RFID Protection

* Wrap:, locks, lock penetration testing supplies, and how to bump open a lock:

BumpMyLock Booth at DefCon17

BumpMyLock Booth at DefCon17


In the Lockpicking Village, Selestius tries to pick her way out of a set of handcuffs. Although the photo is blurry, there is a very slim, long, lockpick in Selestius’ right hand:

Lockpicking handcuffs

Lockpicking handcuffs

Hacking Session Floor Space

Some sessions got so crowded, there was no where to sit.  Sometimes the side isle standing room would fill up.  Due to fire rules, sitting on the floor of the center isle was a hazard.  Faced with not getting to see a hot session, Thomas from LA thought of an original floor hack: He bought a small, $10 folding camping chair. He pulled it next to a hotel chair,  and got a  seat in the center isle of every crowded session! Thomas tells the Data Security Podcast that the “Goons” (DefCon staff) appreciated his innovative approach to crowded sessions.

Hacking Floor Space