Here’s the newest knockout bracket from today’s WSJ. In related news, traffic around 4 PM EST today should be lighter than normal.
EDIT: 3 PM for those of us in Texas.

WSJ World Cup Bracket 07-01-14
			
			
									
			
			
	Here’s the newest knockout bracket from today’s WSJ. In related news, traffic around 4 PM EST today should be lighter than normal.
EDIT: 3 PM for those of us in Texas.

WSJ World Cup Bracket 07-01-14
If anybody from the NSA reads this, I have a serious question.
Have you all scanned what Snowden stole/liberated (whatever floats your boat) for government backdoor and/or “master password” references? Were there any government backdoor and/or “master password” references stored in the systems he had access to?
OK, in English now… for a long time there have been rumors of backdoor and/or “master passwords” for all computer systems. With a certain password for a certain system, an “authorized” person could get full access.
There really are “master passwords” currently in place for PC BIOS systems, all vehicle-embedded systems, and even on all iPhones. (Seriously. It’s not a secret that “alpine” works for full SSH access on all iPhones.)
To make things even more interesting, since 1984 there have been ways to put backdoor and/or “master passwords” into compilers so not even programmers who make applications on their own would know such a backdoor and/or “master password” was put into the app they just created.
Cool, huh?
You do need a specialized program to access each of these systems, sometimes you also need local access to the device, and most of the Google-able backdoor and/or “master passwords” that show up are for things like maintenance and root-level hijinks, not “watch what people are doing live” kinds of things.
Regardless, I would bet there’s just a few backdoor and/or “master passwords” reserved for the government that are already embedded in some critical systems. I would also bet with the right password combination, a “watch what people are doing live” kind of thing could be set up with no problem.
All theoretically, of course.
Snowden stole/liberated somewhere between “too much” and “oh dear God” levels of data from the NSA. Now all that data was classified information. Communications. Transfers. Notes. Reports. Stuff not meant to see the light of day for some reason or other (justified or not).
I’m thinking things like this were in the pile of data…
That last one? Clearly naming the government backdoor and/or “master password” for a specific system and purpose?
If that gets out, it can be used by ANYONE. Anywhere. Anytime. You can kiss EVERYTHING that backdoor and/or “master password” is embedded in goodbye forever.
Plan on everyone using that backdoor password, and by everyone I mean especially…
As an extra bonus, there’s no resetting a backdoor and/or “master password” on most embedded systems without local “hands on” access. No way to erase it. No way to change it. No way to block it.
I don’t know if Snowden would or would not release something like this if he found it in his data pile, but I guarantee a hostile government with access to this information would use it without question.
Which brings me back around to my question for the NSA.
Has the NSA scanned what Snowden stole/liberated for government backdoor and/or “master password” references? Were there any government backdoor and/or “master password” references stored in the systems Snowden had access to?
Finally, if there are backdoor and/or “master password” references in the pile of data Snowden has, what is the worst case scenario if a hostile entity uses this password to access the system(s) it is embedded in?
It’s going to be a terrible thing to admit to the U.S., but if there is a backdoor and/or “master password” reference of any kind in Snowden’s data pile, we need to do something about it right now.
The alternative would be far, FAR worse.
Any compromised systems for private citizens or commercial businesses would need to be updated as soon as possible.
Any compromised military systems would need to be taken offline IMMEDIATELY and kept out of active service until they have all been secured.
And NSA, going forward, if you’re going to ignore that “unreasonable search and something or other” part of the Constitution and put in backdoor and/or “master passwords” on some systems, please install VERY secure backdoor and/or “master passwords” that require multi-factor authentication that can be changed or be deleted if necessary.
The back door needs to be more secure than the front door.
At the bare minimum, I suggest a DIFFERENT password for different series of devices and/or software with something like a random key fob authentication system for each.
For example…
Make a different password string for each manufacturer’s series and each manufacturer’s model numbers. Tie all of that into a version of a key fob multi-factor authentication generator for final access.
After this update, to access a system’s backdoor, you would not only need the “master password” embedded in the device, you would also need the randomly synced password that would be generated on the key fob to proceed.
Worst case – if a master backdoor password is compromised or stolen by a future Snowden, it would be useless in and of itself without the key fob generator to finish “opening the door” and it would only be valid on a limited set of systems. If both a master backdoor password and its’ correlating key fob system were compromised, you would only risk access to a limited series of systems.
That’s the minimum recommended civil-rights violations per serving. Seriously. No more single word passwords for an entire warehouse of systems or for all software made with compiler X.
I know there’s insanely more complex ways of implementing backdoor access, but depending on the “audience” using the backdoor passwords, the NSA guys need to keep it accessible by the non-tech-savant crowd and reasonably quick as well.
Systems from the 80s, 90s and 2000 era are still out there. Applications built and modified on top of existing systems in this time period are legion. Only the NSA knows if there’s really such a thing as backdoor single-word-passwords and where they might be installed at.
To quote Forrest Gump, “that’s all I got to say about that.”
Now back to silly cat photos, already in progress.
I saw an article in the New York Times titled “Migrants Flow, As Do Rumors, In South Texas” (see the article scan following my rant).
I don’t think anyone has mentioned a massive problem with how this is playing out right now.
Since there is “no specific plan to monitor compliance” for those illegally crossing over the border, what is to stop an Al-Qaeda, ISIS or other terrorist agent with intent to harm the US from crossing into the US completely undetected and dispersing into America once they are released with their free “bus ticket to travel where they have relatives in the country”?
Humanitarian care must be provided for those that need it, and the current immigration policy desperately needs streamlining, but there must also be an accounting for every individual who crosses over during this de-facto open-door immigration policy.
Failure to do so is courting a national security disaster.

Migrants Flow NYT article
EDIT: Corrected ISS to ISIS
Whoever decided to try and sell something named KuKui near Mexico has either (a) never done any market research in their life or (b) has a particularly vicious sense of humor.

KuKui photo
For the rest of the world that has no idea what a KuKui is, it’s a very famous folktale monster told to misbehaving kids around Mexico. “You better behave, or the KuKui will get you!”
The closest thing to a KuKui in the US is the “boogeyman”, but saying “you better behave, or the boogeyman will get you” isn’t even close to the kind of terror mentioning a KuKui can bring.
You know, now that I’m thinking about it, maybe I should have bought a bottle. For research purposes, of course.
So if I understood everything correctly from the article in the 6/12 Wall Street Journal titled “Lawyers Race GM to find black boxes“…
* GM executives ordered their engineers to secretly change a core vehicle component for new vehicles after they discovered its’ critical failure rate, but did not disclose this critical failure rate on existing vehicles to the public or to the NHTSA.
* GM executives are currently ordering their employees and persons in their employ to search and recover evidence (“black boxes”) from multiple mortal accidents, but apparently are not returning this evidence to the accident victims or to the NHTSA.
* GM executives refused to allow the full disclosure of the data content of those “black boxes” involved in mortal accidents to the NHTSA until February of this year.
An organized activity sanctioned by upper management to obscure and withhold evidence? Evidence that could potentially tie the multiple deaths of individuals to the permissive knowledge that upper managers have?
Has GM ever heard of RICO?
The plaque reads…
Brooks County. Formed from Hidalgo, Starr and Zapata counties. Created March 11, 1911. Organized September 2, 1911. Named in honor of JAMES ABIJAH BROOKS, Captain of Texas Rangers, 1882-1906, Member of Texas legislature, County Judge, Brooks County. Since 1911 Falfurrias, the county seat.
Have you ever received in a bundled laptop package a piece of paper that says…
“DO NOT DISCARD – MICROSOFT PRODUCT IDENTIFIER. The manufacturer of your PC has licensed the Microsoft products listed in this document.”
…and a few paragraphs later…
“This card includes the ACTIVATION KEY for your MICROSOFT OFFICE product.”
It seems straightforward enough, right? There’s the serial number at the bottom (strategically covered by my “apparently plays in the dirt for a living” thumb), and a website link at the bottom to go download and register the software.

 
So here’s the happy happy joy joy part – the website listed on every one of these rat-bastard product cards say to go to microsoft.com/office
You go there, you swim in the abyss.
Microsoft.com/office takes you straight down into the “light don’t reach here” depths of Office sales, where you will be offered every iteration of Office 360, Office online, Office a-la-carte, Office with Cheese and dozens of other suites in every combination possible. Links to links to links to links, but nothing to take you to download your software or point you out of the maze.
Here’s what you need to do. If you have one of these activation cards for Office, go straight to Office’s other website…
Once you’re there (and it automatically redirects you to officesetup.getmicrosoftkey.com) just type in the product key on that piece of paper in the “Enter Your Product Key” box and press GET STARTED.
That’s it.
You will then be prompted to download your Office Suite and tie it into one of your email accounts.
Just like that.
Who knew instructions on how to download and install your software should actually have a link so you can, oh I don’t know, ACTUALLY DOWNLOAD AND INSTALL YOUR SOFTWARE?!
Hello. My name is Royce Eddington, and I actually subscribe to print newspapers knowing full well there’s digital formats available for everything I’m reading.
Does this make me an evil forest killer? A heartless eco-monster? A knuckle-dragging throwback to days long gone?
Damn right.
Don’t get me wrong. I get the digital editions too, but I always start with the print edition. Here’s why…
Personal Asset Loans? Well that’s a nice way of putting it. The thing is, this isn’t the only recurring ad with this kind of pitch. Not only is there now a market for the upper class to get “Personal Asset Loans”, but the newspapers now allow these ads because of the state of the economy.