• Home
  • About

A Runner's Story

A Runner's Story

Tag Archives: google

Jayashree – Epilogue

07 Sunday Mar 2010

Posted by Ed Mahoney in Other Stories, Storytelling

≈ 2 Comments

Tags

google, xml

Jayashree was seated across the table from the customer representatives.  Raj was standing, delivering a PowerPoint on the scalability of Alibi Software’s backend content management infrastructure.  The customer referenced the competing system sold by Balamohan’s partners, stating how their portal seemed to provide more features.  Raj was now five minutes deep into a tangential discussion on data-centric vs application-centric content management programming.

“I’ve looked closely at their portal and agree it is very slick.  You can drag and drop just about everything.  And I think that tuning translates into the sense of being able to generate content, but think about it really.  It’s about the same level of control MySpace gives you in dressing up your web page.  It feels like there are so many knobs to adjust and it can be fun for awhile.  But how much data can you really retrieve?  And their output formats are limited to popular applications like PDF and CSV.  We give you web services APIs.  The APIs might be a bit complex for a novice user but with a limited understanding of URIs you can query terabytes of data and feed the results into your company’s own knowledge systems.  Admittedly we require about 30 days to develop new feeds for you.  But those feeds are rock solid stored procedures with sub-second response times.  The other guys give you maybe two pages of XML.  That doesn’t meet enterprise needs.  That’s little more than a toy for consumers.”  Raj paused to let that sink in.

Jayashree noted the reactions from the audience.  They laughed at Raj’s remarks and seemed to understand the difference between enterprise and consumer oriented products.  This was going to be another win.  The last year had been a whirlwind of success.  The investors were in negotiations to sell Alibi to Google and she was poised to retire if that materialized since her C-level position paid out 5 multiples of her salary in the event the company was sold.  That was Shankar’s idea.  Not that she would retire.  Jayashree was 27 years old and totally into programming.  She knew she was clever and driven but considered herself to have fairly junior skills.  She was a geek girl and planned to go back to school to get her PhD in software engineering after the Google deal closed.

The End

40.137598 -105.107652

Share this:

  • Facebook
  • Twitter
  • Pinterest
  • LinkedIn
  • Reddit
  • More
  • Tumblr
  • Email
  • Print

Like this:

Like Loading...

Cyber War – Insider Threat

18 Monday Jan 2010

Posted by Ed Mahoney in cyber war

≈ 2 Comments

Tags

china, google, jailbreak, magic jack

Jane was dressing with her back to Tyler, first her panties and then her bra.  She attached the snap in front of herself and then twisted it around to the back and lifted the straps over her shoulders.  As she put on her uniform blouse, she turned towards Tyler and buttoned it top down.  She stepped into her uniform skirt and said, “Tyler, I have to talk to you on a personal subject.”

“As opposed to?”  Tyler remained in bed because he had a full 24 hours off – even though it was her bed in her apartment.

“Oh, well, last night was personal too.  And very nice, thank you.  But this is actually work related, only I need it to remain personal – between us.”  Jane was hesitant in her speech and Tyler thought she might completely drop the subject, but she persisted after a moment.  “I think the black ice against us the other day might have come from inside.  Or at least it had some inside help.”

“Well, it doesn’t hurt to think that while you research it.  I’m not sure of the current percentages, but I believe most cyber crime occurs with inside help.  And if not, it can appear that way because of the first inside hop.  This would be pretty serious Jane.  We’re not talking about employee revenge about not getting a raise.  Everyone I know is completely dedicated to their work, and the cause.”  Tyler found this less likely the more he talked.  “Jesus Jane, that drone pilot is brain dead!  And the entire Ethical Hack Unit had their homes either bombed or targeted for bombs!”

“I don’t suspect the Ethical Hack team.  I think it’s someone on SecIntel.  And that’s why I can’t talk to anyone about this.” Jane had her uniform jacket on now and stepped into her heels.  “I have to go, but can we talk later?  I need someone to search some things for me in case I’m being monitored.”

“Wow, you’ve already put some thought into this.  Yeah, sure.  We can use secure chat.  I pulled a jailbreak on a pair of Magic Jacks to create a secure tunnel across our secure chat app in the war room.  So secure chat from your mobile to mine via the Mobile Jacks.  That way you can avoid any keylogger on your desktop.  I’ll give you one of them at the start of your 2nd shift when I get in.  But before you go, can you tell me why you think it’s an insider?”

“Well, suddenly we have five vulnerabilities?  Us?  There doesn’t seem to be anything before that.  No corresponding logs tracing the ingress vector.  It doesn’t add up.”  Jane grabbed her keys, turned and left.

40.137598 -105.107652

Share this:

  • Facebook
  • Twitter
  • Pinterest
  • LinkedIn
  • Reddit
  • More
  • Tumblr
  • Email
  • Print

Like this:

Like Loading...

Cyber War – Ethical Hacking

17 Sunday Jan 2010

Posted by Ed Mahoney in cyber war

≈ Leave a comment

Tags

black ice, china, ethical hack, google, quarantine

Tyler was in his essence as he walked his Unit and Console Sergeant through his hack.  “The SecIntel from this new dashboard is much richer than we expected.  It includes the results of the Chinese vulnerability scans.  So we know the vulnerable IPs that North Korea will exploit.  We simply exploit them first and set our trap.  The beauty here is these targets won’t ever have their data exfiltrated because the first step of our hack – the code I’ve already developed – is to redirect the hacks to our virtual environment where we can control everything.  I’m calling this Project Quarantine.  Sergeant, please sign me up for a medal.”

The Console Sergeant didn’t have much patience for over-confident software developers.  “This is good work soldier, but let’s be clear.  There will not be any medals because Cyber Command not a legitimate member of the Armed Forces.  Remember in high school or college, where you have sanctioned sports teams like basketball and football?  And then you have some new sport trying to gain awareness, and they call it a club?  Well that’s us, we’re a club.  Our funding comes entirely from Google – a freakin corporation!  We ethically hack their foreign government adversaries to keep them out of the courtroom.  Which leads me to my point.  Google isn’t paying us to quarantine.  They want these hackers dead!  So Project Quarantine is a nice start but you better think of it more as a killing field.  Now get to work on some black ice!”

40.137598 -105.107652

Share this:

  • Facebook
  • Twitter
  • Pinterest
  • LinkedIn
  • Reddit
  • More
  • Tumblr
  • Email
  • Print

Like this:

Like Loading...

Cyber War – SecIntel

16 Saturday Jan 2010

Posted by Ed Mahoney in cyber war

≈ Leave a comment

Tags

china, GMT, google, honeypot, secintel, UTC

Four days earlier, Tyler found it difficult to distinguish late evening from early morning in the darkness.  Now that he was sleeping on a cot in a makeshift bunk in the data center, he was completely divorced from the notion of days and nights.  Most of his interactions with measured time were in the realm of UTC or Coordinated Universal Time, oftentimes referred to by laymen as the less accurate Greenwich Mean Time (GMT).  Tyler was -5 GMT, or  minus 5 UTC, so when he looked at a data event from a sensor located somewhere in the world and that event’s time was tagged with 7:00 UTC – Tyler understood that to be 2:00 GMT in his local time zone – or 2am EST.  Tyler was sleeping 4 hour stretches in 20 hour intervals; the same as the 5 other cyber warriors of his unit though everyone was staggered by 4 hours making it possible to share a single cot.  Tyler left the cot a few minutes before the next sleeper arrived, used the restroom, and rejoined the others in the war room.  The time was Sunday, 1:00 UTC, locally Saturday 20:00 UTC, or 8pm EST.

SecIntel was briefing his unit on some new dashboards.  Jane was speaking.  Her masculine voice seriously negated the effect of her curves under that uniform.  “On this dashboard, you typically monitor the volume of high severity sensor events from suspect North Korean ISPs.  I understand ya’ll like to cull the command and control channels for source IPs to target.  We’ll we’ve tuned out some of the noise by correlating it with traffic from our honeypots in Taiwan.  The Chinese cyber warriors are known to obfuscate their source IPs by routing their attacks through multiple hops in Taiwan.  This is why we’ve established honeypots there.  We’re not any closer to tracking their sources but we have recognized a 6 hour window between increased reconnaissance traffic through these honeypots and a corresponding increased level of high severity attacks from North Korea.  By analyzing the recon activity we can guestimate the exploits.  This takes us an hour.  That gives you approximately 5 hours to set traps ahead of the attacks.  Instead of merely using this dashboard to cull a pool of IPs to begin tracking, you can now use it to set traps based on the exploit’s anticipated signature without needing to know the source IP ahead of time.  What do ya’ll think about that?”

Tyler felt like a bank robber seeing the vault door left open.  “Man, ya’ll are good.”

40.137598 -105.107652

Share this:

  • Facebook
  • Twitter
  • Pinterest
  • LinkedIn
  • Reddit
  • More
  • Tumblr
  • Email
  • Print

Like this:

Like Loading...

Cyber War – Forensics

15 Friday Jan 2010

Posted by Ed Mahoney in cyber war

≈ 2 Comments

Tags

apt, aurora, cyber war, forensics, google

Tyler was back working in the war room.  The shift started with an operations review from the Console Sergeant while the unit went through the turnover checklist.

“This is what we know team.”  The Console Sergeant would randomly look different unit members directly in the eye as he talked.  He might turn to you once out of eight staff, or twice out of three – completely random.  But the duration of his stare was almost always exactly two minutes without ever looking at his watch.  “The attack wiped the hard drives to various degrees before our defenses pulled the power.  So Forensics focused on our virtual war room since backups were less than 24 hours old.  They discovered 5 vulnerabilities.  Technically two vulnerabilities, one on 2 machines and another on 3 other machines.  These were both Adobe vulnerabilities and there’s no excuse for that!  We’ll deal with that later.  Working on the assumption the attack emanated from one or both of these vulnerabilities, Forensics discovered the exploit.  The command and control function leveraged the DoD messaging system which has apparently been compromised for several months.  Now, I’m not saying we’re responsible for those systems but going forward I want more focus on defensive measures.  Forensics was able to track the exploit into our personnel system working from the assumption that in order to find your home addresses, they must have compromised that platform.  The compromise is confirmed but Forensics isn’t yet sure of the extent of exfiltration.  This is everything I know to date, any questions?”  The Console Sergeant took a sip of his coffee and looked over everyone’s heads.  That was his MO for when he didn’t want questions but Tyler was too tired to notice.

“Sir, what about the black ice that took down the Drone Pilot?”

The Console Sergeant looked into his coffee cup before setting it down and turned his gaze to Tyler.  “We don’t really know it was black ice that killed the Drone Pilot.  He might have suffered an aneurysm coincidentally during the attack.  I don’t believe that of course, but we don’t have evidence yet of the black ice; it was apparently a highly sophisticated Aurora APT.  Clearly, given the attackers were wiping our drives, we can assume they accomplished their objectives.  I assure you Forensics  continues to work around the clock on this.”

Tyler didn’t have any other questions.

40.137598 -105.107652

Share this:

  • Facebook
  • Twitter
  • Pinterest
  • LinkedIn
  • Reddit
  • More
  • Tumblr
  • Email
  • Print

Like this:

Like Loading...

Cyber War – NATO

14 Thursday Jan 2010

Posted by Ed Mahoney in cyber war

≈ Leave a comment

Tags

Cyber Command, cyber war, google, nato

Tyler was falling in and out of sleep at the keyboard.  He was tracking 17 targets and had laid traps for 5 of them, but the usual adrenalin wasn’t there.  Eight hours earlier his house was bombed by his enemies.  He was spared from having to witness the head and limbs being separated from the UPS driver’s torso because first the flash blinded his video feed and then the blast blew apart the camera.  But the drama had left him drained.

After the blast he crawled out the egress window of his basement office and called his Console Sergeant.  The Console Sergeant immediately contacted the rest of the unit working from home and they successfully diffused additional bomb attempts.  So Tyler was now working at the home office of Cyberman First Class, Carl Weaver.  Carl’s unit called him I/O because the guy could hook stuff up.   Remember the movie Independence Day when David (played by Jeff Goldblum)  jacked his Apple laptop into the console port of an alien space ship – apparently with a universal serial bus cable?  Well in the real world, I/O was the guy who could probably actually do that.

I/O called over to Tyler to wake him, “Dude, you watching your dashboards?”

“Hmm, yeah, yeah.  I’m tired man.”

“Go lie down in my guest room, I got your dash.”  I/O paused but knew Tyler wasn’t moving and wasn’t likely to reply either so he struck up a line of conversation to see if he could stimulate him.  “You hear about the drone pilot?”

“No man, I just saw them carry a stretcher into their war room.  What happened?”

“Well they follow the same protocol as us but one of them was beta testing some new VR gear.  He’s brain dead.”

“What!  Are you fucking shitting me?  Holy shit!”  Tyler was alert again.

“I shit you not.  And here’s the deal.  Those drone pilots are Air Force man.  That theoretically  pulls NATO into this.  The  articles of NATO don’t cover cyber war – not that the President has ever acknowledged this as a war – but attacking the Air Force constitutes an attack on a recognized NATO member.  Up ’till now, NATO considered this a U.S. / China trade war.  The shit has hit the fan.”

40.137598 -105.107652

Share this:

  • Facebook
  • Twitter
  • Pinterest
  • LinkedIn
  • Reddit
  • More
  • Tumblr
  • Email
  • Print

Like this:

Like Loading...

Cyber War – Home Theater

13 Wednesday Jan 2010

Posted by Ed Mahoney in cyber war

≈ 3 Comments

Tags

Cyber Command, cyber war, google

Tyler sat in his game chair booting up his home theater.  The console sergeant ordered the unit to work from home after some oriental black ice took out the war room.  No one on his team was injured but he saw them carry a stretcher into the Drone Pilots’ war room on his way out the door.  Good thing his transfer to the Ethical Hack team full time came through – SecIntel was going to take some shit for this.

The Chinese sourced most of their attacks out to North Korean cyber mercenaries, and those guys weren’t known to have black ice capable of causing physical injury.  Tyler’s team only had two confirmed kills and they’d been at this for awhile.  Their black ice manipulated the target’s monitor and other I/O devices to stimulate a heart attack.  It required the target be physically susceptible and that was a very small population, but it helped spread fear.  All’s fair in cyber warfare.

Protocol would have placed Tyler on a jet to their disaster recovery site, but a funny thing about the Internet.  DARPA created the Net as a measure of robustness for critical computing systems.  The idea that internetworking would add redundancy.  This irony is not lost on hackers.  Tyler’s DR site went down with the same attack that took out his war room.  In retrospect, it’s better to maintain a DR site offline.  But the U.S. Cyber Command is resilient, or at a minimum his unit subscribes well to the consumerization of I/T.  Tyler’s unit was able to work from home.  Home Theater didn’t refer to Tyler’s personal audio/video equipment, but to his home war room.

The system was now fully up and Tyler scanned his situational dashboards.  He heard the brakes of a truck pull up outside his house.  He didn’t have a window view of his front porch but had a video cam out there and brought that up on one of his dashboards.  UPS.  Tyler couldn’t recall any outstanding shipments and googled the UPS tracking site.  Meanwhile the UPS driver placed the package at Tyler’s door and clicked on his wireless PDA to indicate the delivery.  Before he could turn halfway to walk back to his truck, the package exploded, setting fire to Tyler’s house.  The driver became the 2nd official U.S. casualty of cyber war.

40.137598 -105.107652

Share this:

  • Facebook
  • Twitter
  • Pinterest
  • LinkedIn
  • Reddit
  • More
  • Tumblr
  • Email
  • Print

Like this:

Like Loading...

Cyber War

12 Tuesday Jan 2010

Posted by Ed Mahoney in cyber war

≈ Leave a comment

Tags

black ice, Cyber Command, cyber war, google

Tyler was emotionally exhausted as he completed the shift turnover checklist with his replacement and badged out of the cyber war room.  He shuffled down the hallway, past the drone pilots’ war room and through the data center mantrap.  The parking lot was dark as he beeped his remote to find his car and he honestly couldn’t tell if it was morning or night.  For the last month he’d been pulling double shifts every other day (actually it makes more sense to refer to the time periods as every other 24 hours) and he had to stare at the military time display on his watch for several moments before his brain registered AM vs PM.  It was PM, so he figured he could quaff a few drinks at the Pwn Shop Lounge  on his way home.  His start of week AM shifts were followed by PM shifts, but his 2nd PM shifts were followed by a free 12 hours.  And the 2nd half of the week was the inverse.  He couldn’t keep track of it any longer.

Once inside the Pwn Shop Lounge, Tyler immediately saw some of the SecIntel soldiers and joined them at their table.  He ordered a cheeseburger and fries and poured himself a beer from the pitcher using an apparently extra glass.  “Cheers comrades.”  Tyler didn’t muster much excitement with the salute, it was more out of formality.  He didn’t work on this crew’s shift, but he did work SecIntel every other night – the last being 12 hours earlier.

“Cheers Tyler.”  This from Jane, the lone female cyber soldier in the crew.  She wasn’t exactly unattractive.  It was her voice, it had zero feminine qualities.  But from the neck down, visually while she wasn’t speaking, she wore the blue skirt and white blouse uniform like a porn star.  And Tyler was sitting next to her.  “So how’s the ethical hack shift soldier?  You fry some Choogles yet?”

Tyler thought “Choogles” was such a stupid term.  It hadn’t really caught on (it refered to Chinese cyber warriors in the context of them trying to replicate the secintel of Google) but Jane was young and into the hacker speech style.  “Not sure Jane.  Google doesn’t confirm our kills for 7 days.  Our black ice generally executes within 24 hours but it takes the Chinese a week to process the death record electronically.  How you doin?”

Tyler’s burger arrived before Jane could reply and she waited while he responded to the server.  “I’m good Tyler.  Wednesdays are my Fridays.  I’m ready to unwind.  You got 12 hours?”

Tyler liked the sound of that.  Hard to believe it wasn’t even a year since Google exited the Chinese market for search engines – which escalated into a full-blown cyber war – and he’d been laid only 3 times since.  War is hell.  “Let me finish this burger.  You want some of my fries?”

40.137598 -105.107652

Share this:

  • Facebook
  • Twitter
  • Pinterest
  • LinkedIn
  • Reddit
  • More
  • Tumblr
  • Email
  • Print

Like this:

Like Loading...

Search this blog

Categories

Buy Full Spectrum Cyberwar at Amazon

Buy Cyber War I at Amazon

Buy on Amazon India for ₹99

Buy on Amazon U.K. for £2.27

English Edition on Amazon Germany

Buy on Amazon Brazil for R$11.29

Archives

Blog Stats

  • 134,401 hits

Girlfriend Cult

Recent Comments

georgeschools on Last Run of the Year
Anonymous on Last Run of the Year
asustainablesunrise on Christmas, for me…
asustainablesunrise on Craft Shopping for Christ…
georgeschools on Craft Shopping for Christ…

Recent Posts

  • A Runner’s Day January 7, 2023
  • Last Run of the Year December 31, 2022
  • Christmas, for me… December 26, 2022
  • Craft Shopping for Christmas December 10, 2022
  • A Slow, Late Fall Run November 25, 2022
  • November Runs November 20, 2022
  • Tech Debt November 19, 2022
  • The Runner’s Field of Battle November 13, 2022
  • Stealin’ from God October 24, 2022
  • A New Start October 23, 2022
  • Baby Margot Birthday October 9, 2022
  • The City of Flowers September 24, 2022
  • Dog Park by the Sea September 19, 2022
  • The Lane of Pain September 17, 2022
  • Run Rabbit Run August 28, 2022
  • Wild Horses August 21, 2022
  • The Day Running Died August 17, 2022
  • Boulder Marathon Training – Week One August 7, 2022
  • Mount Sanitas July 30, 2022
  • The Trail and Me July 23, 2022
  • Mount Zirkel Wilderness July 13, 2022
  • Full Team Hike July 4, 2022
  • Village to Village July 3, 2022
  • Beaver Creek July 2, 2022
  • Summer is Here June 12, 2022
  • Birthdays May 22, 2022
  • Fall River Road March 25, 2022
  • A Tale of Two Gerasimov’s March 11, 2022
  • The Hero February 26, 2022
  • Full Spectrum Cyberwar February 24, 2022
  • Run Nan, Run February 20, 2022
  • Running Sunrise to Sunset February 13, 2022
  • Cyberpunk Runner February 5, 2022
  • A Winter’s Run January 15, 2022
  • Turkmenistan January 2, 2022
  • Counting Families at Christmas December 26, 2021
  • Austin Boardwalk December 23, 2021
  • Like Christmas for the First Time December 19, 2021
  • Restoration November 27, 2021
  • India Kinks November 15, 2021
  • Run a Little, Write a Little November 6, 2021
  • Horizons October 30, 2021
  • The Vitality Kick and other Abnormal Obsessive Behaviors October 19, 2021
  • The Ten Week Plan October 11, 2021
  • Pearl Street Marathon October 10, 2021
  • Confidence Builder October 2, 2021
  • Margot Faye September 25, 2021
  • Due Day September 12, 2021
  • Beats per Minute September 6, 2021
  • Reality and Running September 5, 2021

Colorado=Security

Blogroll

  • Alohawk's Blog
  • Barbie's Blog
  • Boggy Creek Lumpster
  • George Schools Blog
  • I, Cringely
  • Prostate Chronicles
  • Shut Up + Run
  • Sustainable Sunrise
  • The Rogue Botanist

Web Sites

  • Amazon Author Page
  • Austin Marathon
  • Bolder Boulder
  • Brit's YouTube Songs
  • Colorado Marathon
  • Colorado Runner Magazine
  • Colorado Trail
  • Girlfriend Cult
  • Lobo Media Ltd
  • My YouTube Site
  • Race Pace Calculator
  • Shoes & Brews
  • Trail Runner Magazine
  • Zaremba Graphic & Web Solutions

Goodreads

Top Posts & Pages

  • Sucker Punch
  • Foot Fetish
  • 2011 Roadmap
  • Big Girl Pants
  • Wolf Mountain Trail

Top Clicks

  • edmahoney.files.wordpress…
  • edmahoney.files.wordpress…
  • runsignup.com/Race/UT/Kan…

RSS Feed

  • RSS - Posts
  • RSS - Comments

Blog at WordPress.com.

  • Follow Following
    • A Runner's Story
    • Join 245 other followers
    • Already have a WordPress.com account? Log in now.
    • A Runner's Story
    • Customize
    • Follow Following
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar
 

Loading Comments...
 

    %d bloggers like this: