Sunday, December 28, 2014

Reservations: Sony's Interview Draws Top Dollar

<<---------- Scroll down for news. ---------->>

I have many thoughts on this one, and one of them is that Sony execs realized that the movie needed help, and considering the huge investment they had, they decided to sacrifice a finger for the good of the hand............ hence look at the headline....

So far as gov't operatives supporting the notion it was DPRK hackers, there are those in gov't who support corporations and I' sure that this could be arranged by some means.

Here is what I wrote about this earlier today on Facebook. This links to a story here: Click Here


For the serious researcher:
ToganX.Info

Copyright©2014/Allan B. Colombo
www.alcolombo.us / al_colombo@hotmail.com
(Permission is given to republish blog posts providing
my contact information and copyright notice are included.)

Subscribe

Be sure not to miss each and every blog comment by subscribing to my email service. Every time I publish a comment or an update, you will be the first to know. To sign up, enter your email address in the email subscription box on the top right of this page. Thank you!

Where and how to follow Al Colombo via TpromoCom:

To contact Al Colombo, click here.

Thursday, December 25, 2014

Rubinstein Offers Look at a potentially Dangerous Video Technology

<<---------- Scroll down for news. ---------->>

Michael Rubinstein, in his TED video See invisible motion, hear silent sounds, presents an extremely interesting and possibly dangerous video technology that allows the user to glean silent, invisible information about people, their health, their mood, and what they say to one another in private.

Uncle Sam will want a piece of this, and when he gets it, none of us will see mention of this innovative technology again as it will be buried with so many other Classified utilities like it. So be sure to take a gander at this TED video before it is no longer available.

Other Similar Disappearing Technologies

Another similar technology that has gone underground is that of weather control. During the 1950s and 1960s weather control was the talk of science. Then, quite suddenly, public discussion ceased. Rumors have abounded since the late 1990s that this capability is now a reality through a device commonly referred to as HARRP, also referred to as Highly Active Auroral Research Program.

For additional information on HAARP, refer to the HAARP information page on GKO.


For the serious researcher:
ToganX.Info

Copyright©2014/Allan B. Colombo
www.alcolombo.us / al_colombo@hotmail.com
(Permission is given to republish blog posts providing
my contact information and copyright notice are included.)

Subscribe

Be sure not to miss each and every blog comment by subscribing to my email service. Every time I publish a comment or an update, you will be the first to know. To sign up, enter your email address in the email subscription box on the top right of this page. Thank you!

Where and how to follow Al Colombo via TpromoCom:

To contact Al Colombo, click here.

Saturday, December 20, 2014

The Interview: North Korea Hackers or Sony?

<<---------- Scroll down for news. ---------->>

So now we know a lot more about the Sony hack than we did a week before. Just as we thought, North Korea, aka: Democratic People's Republic of Korea (DPRK), was allegedly found to be behind the enormous hack against Sony, its executive conclave, and the corporation's general employee population.

"The FBI releases the findings of its four-week investigation into one of the most destructive cyberattacks of a company on US soil," says Seth Rosenblatt (@sethr) with c/net. "It's definitive. North Korea was behind the cyberattack on Sony Pictures, the Federal Bureau of Investigation said Friday." click here

A new message claimed that if Sony kept the movie out of public view, they would stop exposing Sony data.

"Top executives at Sony received a message from hackers saying it was a 'very wise' decision to cancel the release of 'The Interview' and ensuring the security of their data 'unless you make additional trouble.'" (click here)

And now, another message, allegedly from the DPRK hackers, allows Sony to release it!

"SAN FRANCISCO (USA TODAY) -- The people who hacked Sony have posted a message telling the studio it has "suffered enough" and can release The Interview." (click here)

I've been providing updates on the Sony hack for weeks through Twitter, LinkedIn, Facebook, and Google+. All along I was pretty sure that the DPRK had something major to do with this, but only because of the plot of the new movie, The Interview. At the same time, on the other end of this, I began to consider the possibility that it just might not be the DPRK that's behind this diabolical act after all. But if not them, then who? Could it be Sony itself?

Let's be honest with ourselves here. No matter how you slice and dice it, Sony's going to make millions in profits over cost from this movie. I don't care how they finally release it--and release it they certain will--but everyone is going to want to see it simply to see what all the fuss was about! Be honest here, don't you feel curious at all? I'll bet you're already thinking about getting a copy.

I've bantered the pros and cons of this thought, and if it wasn't for the fact that the plot of the movie hinges on the assassination of the N. Korean leader, I might actually believe it. I'm still on the fence about this and will be until concrete evidence pops up. So far, the FBI is telling us that the hack "resembles" previous hacks conducted by DPRK hackers and they base that allegedly on the methods used. But could other expert, learned hackers simulate that previous DPRK hacks?

Of course!

So, far as Sony removing their new movie from the box office, if it was the DPRK behind it, then this action is a big mistake. But I find it difficult to see the DPRK hackers recanting their previous threats, if it really is the DPRK behind it. This is probably the biggest red flag I see flying high above this issue. What about you? What is your personal opinion? Send it along to me using one of my alternate websites: http://wmml.info/tssb/?page_id=351.

In the end analysis, the Internet is such a blessing because of all the information and interaction that we see thereon on a daily basis. But at the same time, it's such a curse. --Al Colombo


For the serious researcher:
ToganX.Info

Copyright©2014/Allan B. Colombo
www.alcolombo.us / al_colombo@hotmail.com
(Permission is given to republish blog posts providing
my contact information and copyright notice are included.)

Subscribe

Be sure not to miss each and every blog comment by subscribing to my email service. Every time I publish a comment or an update, you will be the first to know. To sign up, enter your email address in the email subscription box on the top right of this page. Thank you!

Where and how to follow Al Colombo via TpromoCom:

To contact Al Colombo, click here. -30-

Sunday, December 7, 2014

Criminal Hackers Threaten Sony and its Employees

<<---------- Scroll down for news. ---------->>

When I read this news item, I felt a great degree of anger. My good friends in Anonymous, you need to go after the criminal hackers who are responsible for threatening Sony's employees...

Here is the info I posted to Twitter, LinkedIn, my Safety/Security Page on Facebook, and on Google+:

Hackers send mass email threatening Sony employees and their families: Variety is reporting that Sony Pictures employees have received a mass threat, purporting to be from the same digital attackers that took down the company systems last week. Sony says it has alerted law enforcement to the threat. A separate warning went out advising employees to turn off mobile devices, although it is unclear whether the threat was accompanied by a new attack. http://ow.ly/Ft5mB #TpromoCom #hackers

To follow my rants via TpromoCom, please use the following links:


For the serious researcher:
ToganX.Info

Copyright©2014/Allan B. Colombo
www.alcolombo.us / al_colombo@hotmail.com
(Permission is given to republish blog posts providing
my contact information and copyright notice are included.)

Subscribe

Be sure not to miss each and every blog comment by subscribing to my email service. Every time I publish a comment or an update, you will be the first to know. To sign up, enter your email address in the email subscription box on the top right of this page. Thank you! To contact Al Colombo, click here.

Tuesday, December 2, 2014

Hackers: It Only Gets Worse! Use Some Common Sense Here!

<<---------- Scroll down for news. ---------->>

As many of you know, I'm interested in the issue of hacking. Just as interested in the reason why governments and corporations who should know better continue to place their critical, centrally controlled infrastructure on a connection that is considered unsecured. As I've said time after time, it's not a matter of IF someone will hack into it, but WHEN they will successfully punch a hole in your firewalls.

The following news stories accent exactly what I've been saying for years now: No matter what you do, no matter how good you are, no matter how big and rich you are, no matter how powerful you are, when you really stop and think about it, there's someone bigger, better, faster, and more powerful than you are!

I could continue listing news article after article to illustrate my point, but it's not necessary. You know the Internet provides criminals immediate access to the very door of critical data vaults belonging to governments as well as private sector concerns. I ask you, does this make any sense whatsoever?

Al Colombo


For the serious researcher:
ToganX.Info

Copyright©2014/Allan B. Colombo
www.alcolombo.us / al_colombo@hotmail.com
(Permission is given to republish blog posts providing
my contact information and copyright notice are included.)

Subscribe

Be sure not to miss each and every blog comment by subscribing to my email service. Every time I publish a comment or an update, you will be the first to know. To sign up, enter your email address in the email subscription box on the top right of this page. Thank you! To contact Al Colombo, click here.

Friday, November 7, 2014

Big Data Might Tell on You!

<<---------- Scroll down for news. ---------->>

Air/wireless television and radio are losing ground and in their place are a host of services that come with strings attached. If you pay a subscription fee, like Hulu on cable or HBO on satellite, then there are strings attached to your viewing preferences that ultimately lead to someone or something.

Of course, agents of Uncle Sam have better things to do than to sit around and monitor what you watch. But in this world of Big Data--where government and corporations seek to intercept, gather, collect, save, and analyze any and every type of available data, whether it resides on metallic, fiber, or radio waves--it's all there long after you turned that set off and gone to bed.

The other day, Linda, my wife, asked me to look into an air/wireless antenna for local channels as we've gone exclusively to Internet-based programming. Despite the fact that I, personally, was trained by Channel Master, not to mention two electronic trade schools and a techie father, I had to give some serious thought as to 1) where I might find such an animal these days, and 2) how/where we'd attach such an antenna to our house as we live on a lake in an association that may very well forbid outside antennas.

Is it all that important that no one know the television and radio stations you tune into? At first glance it would appear the answer is "No, not really." But in a nation such as this that is increasingly losing it's footing on Christian values and traditional American culture, no one can say for certain who or what the political climate will one day be. If all the authorities have to do to ascertain if you're a Christian is go back and review your viewing/listening preferences on cable/satellite television/radio.... well, I'm sure you see where I'm going with this.

So, what's the answer to the progressively hostile, police-state mentality we now see unfolding before us? Isn't that the underlying reason why we would even worry about our viewing/listening data? The problem isn't the data, and it's not even the fact that someone might collect all that data. The problem is what government will do with that data when the wrong people are in power--like the current administration.

Let me give you a little example by way of recent revelations about the NSA spying on Americans. All the while the press is telling the American people that it's the NSA, here we find out that the NSA has an accomplice--the President of the United States.

The Obama administration quietly got a court to undo U.S. surveillance limits on the use of intercepted phone calls and emails, The Washington Post reported.

The 2011 reversal of a 2008 restriction let the National Security Agency search deliberately for Americans’ communications in its massive databases, the Post said, citing newly declassified documents and interviews with government officials. (read it)

So when you turn on pornography, or you turn on a Christian station on an Internet TV/Radio station, remember that someone someday may decide to use it against you, and it will be right there in Big Data indefinitely just waiting for them. Do you have to change that dial? Nope, but you at least deserve to know what the possibilities are. However, for those who might like to change their viewing habits, like how they get their TV/radio programming, you might want to look for an air antenna. Try looking at http://www.antennaweb.org/

Happy watching.


For the serious researcher:
ToganX.Info

Copyright©2014/Allan B. Colombo
www.alcolombo.us / al_colombo@hotmail.com
(Permission is given to republish blog posts providing
my contact information and copyright notice are included.)

Subscribe

Be sure not to miss each and every blog comment by subscribing to my email service. Every time I publish a comment or an update, you will be the first to know. To sign up, enter your email address in the email subscription box on the top right of this page. Thank you! To contact Al Colombo, click here.

Friday, October 10, 2014

New Financial Order: Is There a Banker's Conspiracy?

<<---------- ----------="" down="" for="" news.="" scroll="">>

How many fingers am I holding up? To some, my index finger extended would cause a response of, "One!" But to others, they'd see my hand and all five fingers on it and they'd say, "Five!"

Kinda reminds me of the partial glass of water--is it half full or half empty?

The issue of "Conspiracies" is a touchy one simply because there is no middle ground. You can't have half a conspiracy, not even a quarter conspiracy, only one conspiracy or none! No in between is possible when it comes to individuals conspiring in any manner for anything under the sun, be it one child conspiring to pressure his parents to buy him a new bike or two grown men conspiring together to rob a bank. It's either a conspiracy or it's not.

Last evening I posted a scan of the cover of an on-line book called The Banker's Conspiracy Which Started the World Crisis.

I then posted a short comment with a link to one of my blog posts (click on the above picture to read it). In that blog post lies a link to this book in PDF format as well as an audio rendering on YouTube.

So, is there a banker's conspiracy or is there not? It cannot be half true/half false. Since the beginning of time to now, are there simply individuals in society who are simply paranoid and never happy with anything around them, enough so to dream up conspiracies like this one and then spend a good portion of their lives writing books and working to inform the public about it?

Let's first take a look at the definition of "Conspiracy":

noun, plural conspiracies.
1. the act of conspiring.
2. an evil, unlawful, treacherous, or surreptitious plan formulated in secret by two or more persons; plot.
3. a combination of persons for a secret, unlawful, or evil purpose: He joined the conspiracy to overthrow the government.
4. Law. an agreement by two or more persons to commit a crime, fraud, or other wrongful act.
5. any concurrence in action; combination in bringing about a given result.
(Source: Dictionary.com

Notice if you will that no where in any of these definitions does it state that Conspiracies are non-truths. No where in any of these definitions does it tell us that people who believe in the truth of a conspiracy are simply paranoid, insane, stupid, or nuts.

So, with this in mind, is it paranoia to consider the possibility that a large number of career bankers on the International level might scheme or conspire to capture control of all nation states along with their governmental and private banking apparatus? Is it paranoia to consider the possibility that International banking, in and of itself, IS a form of business and that those who own these businesses are no more above capturing the market for their own pleasure and profit than other big businesses are?

I encourage you to read the document cited in this blog post. I encourage you to consider the possibility that there are powerful people involved in capturing total control of our government for their own pleasure and profit. I suggest you consider the possibility that those same bankers are not above placing their own Manchurian Candidate into the position of President and that they might not think twice about stacking the deck against the American people with the aim of instituting a one-world currency within what former President George Bush Jr. called a New Financial Order before he left the White House. Of course, the bankers would also see to it that the present President is their man as well, and it's likely he is as Bush and Obama worked together on the bailout and other issues related to banking in the United States and abroad.

Probably the biggest problem we have is that common people do NOT want to consider any of this--not as true or untrue, but rather they simply do not want to think about any of this at all! After all, it's a painful thought that might make them feel compelled and obligated to do something about it, no matter how small that effort might be. And so the bad men continue to have their way because a frightened public refuses to consider the evidence that's already under their noses.

I encourage you to read this document or listen to the audio rendering. The links are there for your use. In addition, you need to watch the following videos. If you don't think there is a New World Order, think again, and these bankers are smack, dab right there in the middle of this effort.


For the serious researcher:
ToganX.Info

Copyright©2014/Allan B. Colombo
www.alcolombo.us / al_colombo@hotmail.com
(Permission is given to republish blog posts providing
my contact information and copyright notice are included.)

Subscribe

Be sure not to miss each and every blog comment by subscribing to my email service. Every time I publish a comment or an update, you will be the first to know. To sign up, enter your email address in the email subscription box on the top right of this page. Thank you! To contact Al Colombo, click here.

Saturday, August 23, 2014

Hacking cannot be stopped. You want to know why?

<<---------- Scroll down for news. ---------->>

For many years now, I and many others in the security market as well as law enforcement have been sharing our thoughts on the issue of government placing critical infrastructure on the Internet.

Recently, on our GKO Technology Group on Facebook I featured 15 related posts for group members to ponder. I'll follow up with a few words of wisdom of my own.

Here the titles and links to these stories:

Hackers, Bots, Bluehost, and Me (Read it Now!)
US Companies Can't Protect Citizens? Chinese Hackers Steal 4.5 Million Patients Info... (Read it Now!)
Thousands of Havering residents targeted bhy Internet hackers (Read it Now!)
Marathon-style hacker competition draws 600 teams worldwide (Read it Now!)
2 Phone Hackers Out of Jail Already (Read it Now!)
Hackers hit the garden with new award-winning app that tells you what grows best in your backyard (Read it Now!)
Hackers could use smartphone gyroscopes to eavesdrop on private conversations (Read it Now!)
Hackers' bazaar raises threats to security (Read it Now!)
Protecting their (and your) data -- keeping hackers at bay (Read it Now!)
Chinese hackers targeted MH 370 investigation and appear to have stolen classified documents (Read it Now!)
Pro-Palestinian Hackers Deface Delaware State Treasury Site (Read it Now!)
Hackers Successfully Attacked U.S. Nuclear Agency Three Times in Three Years (Read it Now!)
Hospital hack 'exploited Heartbleed' (Read it Now!)

For those of you who many not know this, but there was a day before the Internet where gov't and private firms used leased telephone lines to send data back and forth between offices and the like. You had to gain access to the physical phone line or the Bell company office before you could gain access to that data.

So now, here we have a GLOBALLY CONNECTED database that ANYONE from ANYWHERE across the Earth can try their luck at penetration. ANYONE FROM ANYWHERE!!!

"At the end of 2010, the volume of stored data worldwide totaled 1.2 million petabytes (1 petabyte equals 1 million gigabytes), according to the 2010 IDC Digital Universe Study, conducted by technology researcher IDC. That's a 50 percent rise from the year before" (Source: Storage Cheat Sheet, CDW Small Business Solutions, August 2014).

Do you not get it yet? The stories above are about hackers and their efforts, successes, and the failure of governments and private sector concerns to successfully stop them. As I said yesterday, no matter how good you think you are, there's always someone better out there and they're going to kick your butt!!! If not today, perhaps tomorrow.

Putting critical infrastructure on the Internet is not only dumb, but it's plain stupid. It's like putting a sign on your back that says, "I dare you to kick me." Someone's going to do it. You can count on it!


For the serious researcher:
ToganX.Info

Copyright©2014/Allan B. Colombo
www.alcolombo.us / al_colombo@hotmail.com
(Permission is given to republish blog posts providing
my contact information and copyright notice are included.)

Subscribe

Be sure not to miss each and every blog comment by subscribing to my email service. Every time I publish a comment or an update, you will be the first to know. To sign up, enter your email address in the email subscription box on the top right of this page. Thank you! To contact Al Colombo, click here.

Saturday, August 16, 2014

Twitter: No Social Network Should Tolerate Cyber Bullying

<<---------- Scroll down for news. ---------->>

I know there are those who believe people should be able to tweet whatever their little evil hearts desire. But, there is a point we can reach where meanness cannot be tolerated in social networking environments. It is the responsibility of Twitter to stop cyber bullying where it comes to their own domain. They failed to do so. Lessons learned, I suppose.

Twitter reviewing policies after Robin Williams' daughter harassed

(CNN) -- Twitter is looking to revamp its user-protection policies after Zelda Williams, the daughter of comedian Robin Williams, was run off of the social site by abuse in the wake of her father's apparent suicide.

"We will not tolerate abuse of this nature on Twitter," Del Harvey, Twitter's vice president of trust and safety, said in a statement. "We have suspended a number of accounts related to this issue for violating our rules and we are in the process of evaluating how we can further improve our policies to better handle tragic situations like this one. http://ow.ly/AlAKt


For the serious researcher:
ToganX.Info

Copyright©2014/Allan B. Colombo
www.alcolombo.us / al_colombo@hotmail.com
(Permission is given to republish blog posts providing
my contact information and copyright notice are included.)

Subscribe

Be sure not to miss each and every blog comment by subscribing to my email service. Every time I publish a comment or an update, you will be the first to know. To sign up, enter your email address in the email subscription box on the top right of this page. Thank you! To contact Al Colombo, click here.

Thursday, July 17, 2014

Changing the Thrust of my Blog

<<---------- Scroll down for news. ---------->>

I will be changing the thrust of my blog in the coming days. I believe that my personal political stance has hurt me more than helped, from a professional standpoint, and so it's time to look at making changes.

If I decide to move away from political commentaries and such, I will be sure to provide you with a link to click on that carries similar thoughts and similar links.

In the mean time, I want to thank all of you who follow this blog and write in regularly.

Al Colombo


For personal security information and products,
visit www.OhioHootOwl.com.

Copyright©2014/Allan B. Colombo
www.alcolombo.us / al_colombo@hotmail.com
(Permission is given to republish blog posts providing
my contact information and copyright notice are included.)

Subscribe

Be sure not to miss each and every blog comment by subscribing to my email service. Every time I publish a comment or an update, you will be the first to know. To sign up, enter your email address in the email subscription box on the top right of this page. Thank you! To contact Al Colombo, click here.

Monday, June 30, 2014

Contraceptives: The High Court Gets It Right!

<<---------- Scroll down for news. ---------->>

As you probably already have heard, the High Court ruled that closely-held corporations with limited numbers of stockholders do not have to pay for their employee's contraceptives.

My thoughts on this is the High Court got it right this time when they ruled in favor of Hobby Lobby.

"The Supreme Court put freedom of religion above reproductive freedom Monday in the most closely watched case of its term, ruling that companies cannot be forced to offer insurance coverage for certain birth control methods they equate with abortion," says Richard Wolf, USA TODAY (read more).

The question is, why should a small business of any kind have to violate the unified religious views of its owners by paying for contraceptives? My thought is that if employees don't like this, they have the right to go work elsewhere.

Hillary Clinton Disagrees
“I disagree with the reasoning as well as the conclusion,” Clinton said Monday, speaking at the Aspen Ideas Festival carried live on Facebook. “It’s the first time that our court has said that a closely held corporation has the rights of a person when it comes to religious freedom,” says Hillary Rodam Clinton. “I find it deeply disturbing we are going in that direction” read more).

Of course, once again, Hillary has it wrong. Aren't you so glad we do not live in a dictatorship (yet)?


For personal security information and products,
visit www.OhioHootOwl.com.

Copyright©2014/Allan B. Colombo
www.alcolombo.us / al_colombo@hotmail.com
(Permission is given to republish blog posts providing
my contact information and copyright notice are included.)

Subscribe

Be sure not to miss each and every blog comment by subscribing to my email service. Every time I publish a comment or an update, you will be the first to know. To sign up, enter your email address in the email subscription box on the top right of this page. Thank you! To contact Al Colombo, click here.

Sunday, June 29, 2014

Report Outlines Extent to Which NSA is Spying on Society

<<---------- Scroll down for news. ---------->>

Spying has never been a pretty business. Those who do it for a living eventually accept it as a necessary evil. I suppose we should also--that is if we're really concerned about terrorism on this nation's soil.

With all of that said, however, it's obvious that there must be constraints in place that seek to prevent those who actively monitor society from misusing and abusing this technological power; and might I add that this tremendous power resides with the smallest of the small among those who work in the intelligence business.

Recently a report was released by the National Security Agency (NSA) that outlines its own spying activities.

The U.S. government on Friday for the first time released data on the scope of some of its most sensitive foreign intelligence-gathering efforts, saying that it had targeted nearly 90,000 foreign persons or organizations for surveillance through U.S. companies last year.

The release of the “transparency report,” issued by the Office of the Director of National Intelligence, follows an order a year ago from President Obama to declassify and make public as much information as possible about certain sensitive surveillance programs.

Warrantless Wirepapping

One of the issues that sticks out when reading the Washington Post story is that of "warrantless" surveillance on the part of not only NSA but other intelligence-gathering entities across the board.

It was in 1952 when NSA was established. As part of the military establishment, NSA's mission then, as it still is today, is to affect surveillance against foreign targets to assure the integrity, security, and safety of these United States of America.

Limitations on how this is accomplished have been imposed on NSA over the years since its inception. This includes:

  • The Omnibus Crime Control and Safe Streets Act, passed in 1968 by the Congress.
  • Executive Order 12036, effected by President Carter in 1978 that acts to prevent "electronic surveillance directed against a United States person abroad or designed to intercept a communication sent from, or intended for receipt within, the United States except as permitted by the procedures established pursuant to section 2-201".
  • The Foreign Intelligence Surveillance Act (FISA), also passed in 1978.
  • In 2001, the passage of the Communications Assistance for Law Enforcement Act (CALEA), which established clear standards for how telecommunications providers are to provide wiretapping information to government (The Implications of the Digital Telephony Act of 1994).
  • Also in 2001, John Yoo, former George W. Bush administration official, essentially gives the president authority to approve anti-terrorism tactics, including warrantless wiretapping.
  • A year later, in 2002, President Bush authorized NSA to conduct warrantless wiretaps on both foreign concerns and U.S. citizens in country through a secret executive order.
  • About a year later President Bush disclosed the existence of his secret wiretapping program to the Congress and later in the year the New York Times publishes a story that informed the public of its existence.
  • Etc...

In Conclusion

One of the reasons why all of this wiretapping is necessary is the openness of this nation. We let any Tom, Dick, or Mary enter through air travel and for the past two decades we're trying to affect "reasonable immigration laws" that essentially seek to negate common sense by allowing, again, every Tom, Dick, and Mary to cross the U.S./Mexican border w/o any meaningful rules and regulations.

Until this nation get serious about buttoning up our border and limiting air travel entry to only those who really need it, I won't believe for one moment that any of this makes sense. How can you seriously tell the general public with a straight face that all that can be done is being done by way of anti-terrorist tactics when you allow the Southern border to remain open?

The bottom line here is this: the Federal Gov't must enforce its own border laws before it can be taken seriously.


For personal security information and products,
visit www.OhioHootOwl.com.

Copyright©2014/Allan B. Colombo
www.alcolombo.us / al_colombo@hotmail.com
(Permission is given to republish blog posts providing
my contact information and copyright notice are included.)

Subscribe

Be sure not to miss each and every blog comment by subscribing to my email service. Every time I publish a comment or an update, you will be the first to know. To sign up, enter your email address in the email subscription box on the top right of this page. Thank you! To contact Al Colombo, click here.

Friday, June 6, 2014

The "Open Data" Movement Takes Off

<<---------- Scroll down for news. ---------->>

Although the "open data" movement may be new to most of us, it began in 2009.

"At least 39 states and 46 cities and counties have created open-data sites since the federal government, Utah, California and the cities of San Francisco and Washington, D.C., began opening data in 2009, according to the federal site, Data.gov" (Source: http://www.govtech.com/data/Open-Data-Is-Open-for-Business.html).

What does open data do for cities, the federal gov, and commercial concerns?

"Open-data advocates, such as President Barack Obama’s former information chief Vivek Kundra, estimate a multibillion-dollar industry can be spawned by taking raw government data files on sectors such as weather, population, energy, housing, commerce or transportation and turn them into products for the public to consume or other industries to pay for.

"They can be as simple as mobile phone apps identifying every stop sign you will encounter on a trip to a different town, or as intricate as taking weather and crops data and turning it into insurance policies farmers can buy" (Source: http://www.govtech.com/data/Open-Data-Is-Open-for-Business.html).

Let's all ponder the potential here. The question in my mind is "how much data of a personal nature is included in these data depositories being published online for enterprising people and others to utilize for whatever end they so desire?"

Want to do some research or some simple reading on open data? Try this link: http://en.wikipedia.org/wiki/Open_Data.


For personal security information and products,
visit www.OhioHootOwl.com.

Copyright©2014/Allan B. Colombo
www.alcolombo.us / al_colombo@hotmail.com
(Permission is given to republish blog posts providing
my contact information and copyright notice are included.)

Subscribe

Be sure not to miss each and every blog comment by subscribing to my email service. Every time I publish a comment or an update, you will be the first to know. To sign up, enter your email address in the email subscription box on the top right of this page. Thank you! To contact Al Colombo, click here.

Monday, June 2, 2014

Maybe Having a Smart Home Isn't all That Smart

<<---------- Scroll down for news. ---------->>

"Network World - A year ago, people were mostly talking about the potential of the Internet of Things (IoT) — what companies and government entities might do in the future to take advantage of this widespread network of connected objects" (The Internet of Things gets real, Network World, http://bit.ly/1n6ntuC).

The fact is, people were talking about the Internet of Things (IoT) long before a year ago. In the mid- to late-1990s, for example, I was writing about this form of connectivity between machine and service provider/owner in the magazine I worked for as an associate editor (Security Distributing & Marketing).

Internet-Connected Appliances

One of the applications to which IoT lends itself well is that of maintenance updates to a variety of companies with regards to the equipment they sell. Examples include the following:
  • Refrigerators
  • Heating Plants
  • Air Conditioning Units
  • Washing Machines
  • Cloths Dryers
  • Conventional and Microwave Ovens
  • Chillers
  • Electrical Systems
  • Smart Electric Meters
..to name only a few.

A good example of what could take place when your conventional oven develops a problem is that an update of the situation is sent to either the manufacturer or the maintenance company of record over one of the in-house broadband connections. The update would provide important ID information that enables the company to generate a call ticket. You would then be notified of the problem and given an opportunity to have a repairman come to your home or business to fix it.

Back in the 90's, there was talk of including some type of infrared scanning system that would be capable of inventorying all of the foods you keep in your refrigerator. When you are running low, a notice would be sent to you in email, providing you with a shopping list of needs for your use. Or, at the same time, this list could be periodically generated and sent to the grocery store of choice for delivery to the home.

The Danger of Connected Appliances

In the 90's, when we thought of Internet-connected appliances, we thought in terms of Category 5E or Category 5e cabling. Today, all of these devices will connect to the Internet through the WiFi system in our homes and businesses.

Well, other than being irradiated by more radio waves banging around the house, we will come to the stage where your refrigerator can be hacked. We know our computers can be hacked. Recent news stories have revealed that chain stores, banks and the government can be hacked. Cellphones can be hacked, which by the way we pointed out to our readers several years ago. So now we approach the time when your Internet-connected house can be hacked. It seems silly, of course, but the reality is, if your freezer or furnace can be reached through the Internet, it may be that the device you use to control them can be hacked. Which means, as we extend this thought into total paranoia, your passwords could be as vulnerable to a meltdown as your freezer. Will hackers soon be eyeing your fridge?

As most of you know, one of the ploys used by hackers is to get you to respond to an email by clicking on a link or simply replying to an offer. The ensuing information, especially where you reply, carries valuable information that tells the hackers exactly where you are in terms of the World Wide Web. It provides the exact IP address so they can work to enter your home via the network.

Although service providers are not apt to give out your IP to those they do not know, as well to those who have no business having it, this kind of information can fall into the wrong hands by a variety of ways. Any one of these signals can draw the attention of hackers, and even though you may not think this could be destructive, think again.

Hacking Your Appliances

With all the data flowing in and out of your home between the various appliances and those responsible for their on-line care, it's even more likely that hackers can find their way to your home. Once they enter the network through your heat pump, it's possible to penetrate other devices on your network, including your computer.

For example, a hacker who gains access to your furnace could reprogram it. They might change the set points--which is the temperature it comes on and goes off. They might even alter the safety controls that safeguard your home from fire.

Hackers could also enter your refrigerator, perhaps turning it off, adjusting the temperature so it freezes all the food, or they might cause some other combination of undesirable events to take place. At the very least, they would have a complete list of everything you have in it.

Would you allow a stranger off the street to open your front door, walk in, and open your refrigerator door? I didn't think so.


For personal security information and products,
visit www.OhioHootOwl.com.

Copyright©2014/Allan B. Colombo
www.alcolombo.us / al_colombo@hotmail.com
(Permission is given to republish blog posts providing
my contact information and copyright notice are included.)

Subscribe

Be sure not to miss each and every blog comment by subscribing to my email service. Every time I publish a comment or an update, you will be the first to know. To sign up, enter your email address in the email subscription box on the top right of this page. Thank you! To contact Al Colombo, click here.

Saturday, March 22, 2014

US to Pull Out of ICANN

Recent news reports concerning ICANN has
caused concerns among Internet-free activists.

According to Wall Street Journal technology reporter Gauthem Nagesh, the Obama administration’s move to divorce the United States from ICAN oversight is, in part, related to the damning revelations resulting from the Edward Snowden NSA disclosures.

“The U.S. position and that of its allies is that the Internet should be free and open and the government shouldn't interfere with it. That position has been undermined by the wrath of disclosures regarding surveillance from former NSA contractor Edward Snowden. And China and Russia, who have always pushed for a more hands-on, top-down approach to the Internet that some people would label as censorship. Well, that approach has gained traction because while the U.S. has been loudly decrying this, they've also been doing a lot of stuff that people don't feel corresponds with the idea of Internet freedom,” says Nagesh (http://n.pr/1gJ3Y4N).

In an editorial penned 28 DEC 2003 (http://bit.ly/1mmEoe0), I voiced concern at that time regarding the issue of Internet freedom. The recent move by the Obama administration to divorce the US from their current oversight role should give us all concern, especially now.

Why is it so important for the Internet to remain truly free? Because there are governments, organizations, and Elitists who want to regulate it in a variety of ways for a variety of purposes, none of which are good. Although at some point in our nation’s history I would argue that the withdrawal of our government oversight is bad for a free and independent Internet, I’m not so sure that this applies today. This is because there are those in our own government who would have more regulation and government control.

Some of the ways that more control can harm us includes:

  • Censorship of the press
  • Intelligence gathering programs on individuals and organizations
  • Elimination of domain name use by individuals and organizations who dare to speak out against certain individuals in government and elsewhere in society
  • Harassment by government hacks
  • and others

One of the fears that this writer has, with regards to the withdrawal of U.S. oversight, is that socialistic and communistic nations, such as Russia and China, will eventually wrangle control of ICANN. There are many news accounts over the past few years regarding China’s effort to censor what the Chinese people read on the Internet.

One of the foremost examples involves Google Search. “Every big American Internet company is angling for the same thing, more or less: global domination. But the one country where they have the most potential for growth also has some of the most entrenched competition and thorniest human rights issues. The battle for China’s 618 million Internet users is fraught with moral and logistical problems that have sent Twitter, Facebook and Google all packing in recent years. Now LinkedIn is making an aggressive play to enter the People’s Republic, but questions remain about just what kind of sacrifices the company will have to make to please the country’s government,” says Victor Luckerson (@VLuck, http://ti.me/Q0NVdy).

There is no crystal ball that will allow us to peer into the future-a future without the U.S. in a watchdog position in ICANN. But if the United Nations can be held up as an example of what can and will happen once this divorce is final, then we already know the answer to our concerns. -30-

About the Author:
Allan B. Colombo is a trade journalist and technical writer in the life-safety and physical security markets. His work in this venue over the past 28 years is well known across the globe. Colombo also is the publisher and administrator of www.GiantKilles.Org from 1995 through 2005. For more information, go to www.AlColombo.net. To contact him, call 330-956-9003 or email him at abc@alcolombo.us.


For personal security information and products,
visit www.OhioHootOwl.com.

Copyright©2014/Allan B. Colombo
www.alcolombo.us / al_colombo@hotmail.com
(Permission is given to republish blog posts providing
my contact information and copyright notice are included.)

Subscribe

Be sure not to miss each and every blog comment by subscribing to my email service. Every time I publish a comment or an update, you will be the first to know. To sign up, enter your email address in the email subscription box on the top right of this page. Thank you! To contact Al Colombo, click here.

Saturday, January 11, 2014

Safety & Security on Facebook

<<---------- Scroll down for news. ---------->>

For those who are interested in everything safety and security, Nick Markowitz and I have teamed up on Facebook to bring you the Safety & Security Page (click here).

Nick and I have worked together for many years starting with ideas, drawings, and equipment when I went to Security Distributing & Marketing as a trade journalist. Our relationship has grown as well as our commitment to helping our fellow-man to stay safe and secure.

Mission statement: Safety & Security Page offers interesting news and helpful information on how to secure your home or business without spending a million dollars doing it.

Come and take a look. If you are a Facebook user, please LIKE our new page. If you are incline, please post your own news and ideas on ways to stay safe and secure in this ever increasingly dangerous world we live in (click here).


For personal security information and products,
visit www.OhioHootOwl.com.

Copyright©2013/Allan B. Colombo
www.alcolombo.us / al_colombo@hotmail.com
(Permission is given to republish blog posts providing
my contact information and copyright notice are included.)

Subscribe

Be sure not to miss each and every blog comment by subscribing to my email service. Every time I publish a comment or an update, you will be the first to know. To sign up, enter your email address in the email subscription box on the top right of this page. Thank you! To contact Al Colombo, click here.

Friday, January 10, 2014

Privacy Vs. Networking

<<---------- Scroll down for news. ---------->>

Is it possible to network while maintaining your personal privacy? Those of us who seek to make a difference in people's lives by communicating ideas know that there is a definite choice to be made.

I have friends of the old school who are not on Facebook or any other social networking solution because they wish to maintain their personal privacy.

One in particular will go to great lengths in emailing news items to a limited audience of email recipients. We've discussed at great length the trade-offs related to reaching the highest number of readers vs. a simple, limited emailing list.

The question is, can you network and still remain private in your personal life?

I'd like to hear your thoughts? Please email them to me at blogger@tpromo.com.


For personal security information and products,
visit www.OhioHootOwl.com.

Copyright©2013/Allan B. Colombo
www.alcolombo.us / al_colombo@hotmail.com
(Permission is given to republish blog posts providing
my contact information and copyright notice are included.)

Subscribe

Be sure not to miss each and every blog comment by subscribing to my email service. Every time I publish a comment or an update, you will be the first to know. To sign up, enter your email address in the email subscription box on the top right of this page. Thank you! To contact Al Colombo, click here.