Archive for the ‘Planes’ Category

Burning airlines give you so much more.

Friday, February 17th, 2012

Another topic of conversation at dinner last night: planes. Specifically, airlines.

Morning roundup for February 7, 2012.

Tuesday, February 7th, 2012

Bunch of stuff from the NYT this morning. Sorry, but that’s how things roll sometimes.

First up: I didn’t know there were plans for an Eisenhower memorial. I like Ike, and the artist’s conception doesn’t strike me as being too awful. However, I’m skeptical of the need for yet another memorial in DC. The big news here is that Eisenhower’s family is now raising “concerns” about the design.

“He was chief of staff of the Army; he was a two-term president of the United States,” said Susan Eisenhower, a granddaughter. “It’s in those roles that America has gratitude for him, not as being a young boy with a great future in front of him.”

Extra bonus points: the memorial designer is WCD’s (and Lawrence’s) favorite architect.

Next up: C.J. Chivers has an neat piece about the Navy’s training program for underwater and overwater egress from downed aircraft.

The pilot — feet near the surface, head near the bottom, sightless — was to disconnect himself from the buckled straps, wiggle free, open the window and pull himself through and out, a series of movements intended to simulate what he might need to do in an aircraft that had struck the sea at night.

And this is why they do it:

Lieutenant Farley followed the only instructions he knew. “I did exactly what the training had taught me,” he said. “I grabbed a reference point, drew my breath right before the water went over my head and unbuckled.”
As he slipped free from his seat, he could see nothing. He pulled himself toward where he thought he might escape, but lost his way. He does not remember finding the exit, but he must have. Just before his lungs gave out he was on the surface, the last man out.
Everyone survived: two pilots up front, three crew members and the two passengers.

Lecture mode on:

“I hate it with a passion,” he said. “But if you are in a bad situation and have trained for it, then you revert to your training and what you know. It is why I am alive.”

And finally:

A New York City police officer whom prosecutors called the leader of a group of officers who accepted thousands of dollars in cash in return for illegally transporting firearms into the state pleaded guilty on Monday in Federal District Court in Manhattan.

I commend to the attention of Mayor Bloomberg and “Mumbles” Menino Matthew 7:5. Better yet, I commend to both gentlemen  and the other members of the criminal organization Mayors Against Illegal Guns the simple strategy of shutting the f–k up.

Edited to add: Oh, drat. I forgot that I wanted to make note of Alberto Contador being stripped of his 2010 Tour de France win. Congrats to Andy Schleck.

Very interesting indeed, Mr. Bond.

Sunday, January 22nd, 2012

One might go so far as to say “Damn Interesting”.

Many of my friends and some bloggers seem to be regular followers of this site:

January 13, 1982.

Friday, January 13th, 2012

It was a Wednesday, not a Friday.

Anyway, before the day was out, I did want to mention the WP package on the 30th anniversary of the crash of Air Florida Flight 90.

What wine goes with an extra-long cheese coney and tots?

Tuesday, September 27th, 2011

Chain restaurants like Sonic (in one location) and Burger King (at least in their Whopper Bars) have started offering beer and wine. Unfortunately, this has turned into a great pain for little benefit:

“Candidly, they’re not utilizing those products very much at this point,” he said. “It doesn’t look like it’s a big deal to consumers — it’s clear they come to us to have an extra-long cheese coney or an all-beef hot dog.”

(Our first thought is a big mouth-filling Cabernet. Other suggestions welcome in comments.)

The LAT asks the same musical question the FAA is asking: how do you keep planes from going into the crowd at Reno?

And the FBI apparently paid a deputy in the LA County Jail $1,500 to smuggle a cellphone in to an informant. You’re telling me a government agency would do something illegal? Why, the next thing I know, you’ll be telling me that government agents used form letters from BATFE to buy guns with taxpayer money, and then provided those guns directly to the drug cartels!

(Edited to add: Fox News. Hattip: Snowflakes in Hell.)

TMQ watch: August 16, 2011.

Wednesday, August 17th, 2011

Tuesday! Tuesday! Tuesday! Nitro-burning Tuesday Morning Quarterback after the jump!

(more…)

DEFCON 19 notes: day 3.

Tuesday, August 9th, 2011

“Earth vs. The Giant Spider”: This was described as a collection of weird, bizarre, freaky, and unusual hacks compiled by the presenters during penetration tests. I figured this would probably be a high energy, lots of fun, lots of laughs panel. I ended up kind of disappointed. Maybe high energy is too much to expect at 10 AM on DEFCON Sunday, but the presenters seemed curiously subdued. (This may have had something to do with non-functional equipment that resulted in them having to drop the live penetration test portion of the presentation.)

As for the hacks…well, okay, owning an entire country’s credit card processing (bypassing the firewall by sending packets from source port 0) is kind of cool. Getting cheap food from a restaurant chain by hacking a Javascript that communicates with a 3rd party server, and doesn’t validate data being sent from the restaurant’s website to the server? Meh. The story about cloning the support mailbox on an old ROLM PBX (default field service user ID/password) which ended up with the penetration testers doing Checkpoint support for one of the corporate users? Mildly funny. The other hacks (doing a HTTPS man in the middle attack with a self-signed certificate, and using information gathered that way to hijack a session to an external VPN by cloning cookies; high-def IP cameras with undocumented default accounts located right over keyboards, Oracle session hijacking), well, maybe you just have to have been there.

As for the “Caucasian-American love hack” (in which they were able to guess an admin’s password from his profile on an Asian-American dating site), I felt more pity for the poor admin, who was probably just looking for love (and not even in all the wrong places) rather than admiration for the penetration testers. Sorry, guys: I know your intentions were good, but this didn’t click with me. It may just have been a personal thing: YMMV.

“Seven Ways to Hang Yourself with Google Android”: An excellent presentation by Yekaterina Tsipenyuk O’Neil (Fortify) and Erika Chin (UC-Berkeley) about the major mistakes programmers making developing Android applications. Specifically:

  1. “Intent spoofing”. Basically, “intents” are a type of message Android uses for inter-application communications, intra-application communications, and system event messages. Android intents can be either “explicit”, where the intent is directed to a specific destination or “implicit”, where the destination isn’t specified and Android decides where the intent should be delivered. The issue is that many developers just use implicit intents, which makes it possible for someone to write a malicious application that creates intents requesting some sort of change in state, and send those intents to other applications that use implicit intents.
  2. SQL query string injection. Yes, you can build a malicious app that queries Android’s SQLite database and (possibly) returns data the app otherwise wouldn’t be able to see.
  3. “Unauthorized intent receipt”. Very similar to #1, except instead of requesting a change in state, the malicious app harvests information from public intents intended for other non-malicious applications.
  4. “Persistent messages: sticky broadcasts”. Android has the capability to send broadcast intents to applications (more specifically, to components of applications that are set up to receive broadcast intents). There are some issues with this. The first issue is that any application registered to receive broadcast intents will get all broadcast intents; there’s no way to restrict broadcast intents to specific receivers. It is also possible to create “sticky” intents, which hang around after they are delivered, and are even rebroadcast to new receivers that are enabled in the future. And with the proper permissions, a malicious application can also remove “sticky” intents, possibly before they are received by the intended recipients.
  5. Insecure storage. Files on the SD card can be read by the entire world. Files created by an application (which might contain things like, oh, I don’t know, passwords?) persist even after the application is deleted, and can be accessed by other, possibly malicious, applications.
  6. Insecure communications. Basically, developers need to get into the habit of acting like their mobile applications are web applications, and use similar best practices; don’t send passwords in cleartext, for example.
  7. Overprivileged applications. Developers have a tendency to request more permissions than their app really needs. For example, an application that just displays images doesn’t need the “camera” permission; only an application that actually uses the camera to collect images needs that permission. One of the interesting facts that came out of this portion of the presentation was how Android’s developer documentation handles explaining permissions and what they represent. Quoting the presenters: “Android 2.2 documents permission requirements for only 78 out of 1207 API calls. 6 out of 78 are incorrect. 1 of the documented permissions does not exist.”

(Edited to add 8/10/2011: I’ve added a link to the final version of this presentation.)

“Build your own Synthetic Aperture Radar”: So this wasn’t as dangerous as I expected (the radar is low-power) and it wasn’t quite as awesome as I expected. But this was a decent presentation on radar technology, starting with an overview of basics and proceeding onwards to discussion of a homebrew radar system.

One minor problem with this presentation was that the presenter (Michael Scarito) had converted his system to use a custom-built data acquisition board (previous versions used a sound card and MATLAB) and didn’t have build documentation for that board prepared yet. However, much of Mr. Scarito’s work is based on other work done at MIT. The slides for the talk are not currently online, as far as I know, but here’s a link to a MIT Open Courseware presentation that gives exact, step-by-step detail, parts lists, and other resources for a very similar project (cited by Mr. Scarito in his presentation).

Wireless Aerial Surveillance Platform”: UAVs are fun. UAVs that have onboard computing power to crack WEP encryption are more fun. UAVs that add the ability to spoof cellular base stations are even more fun. UAVs that have the ability to communicate with a remote server and offload heavier computational tasks (like attacking WPA) are perhaps the most fun of all. Note: the link above doesn’t go to slides, but to the build blog maintained by the two presenters (Mike Tassey and Rich Perkins). The build blog provides a lot more detail than the presentation, and includes resource links. Very well done, gentlemen.

“SCADA & PLCs in Correctional Facilities: The Nightmare Before Christmas”: Borepatch posted a few days ago about a presentation at Black Hat on SCADA vulnerabilities. You could consider this the other shoe dropping.

Summary: many prisons and jails depend on programmable logic controllers (PLCs) to do things like unlock and unlock cell doors. Usually, these PLCs are all controlled from a central control center, so all you have to do, once you find a PLC vulnerability to exploit, is to get your exploit code into the central control center.

“But they aren’t connected to the Internet, right?” Sometimes they are: the systems need to get updates, or send information to other systems, or communicate with other people (food service vendors, for example). Sometimes the systems aren’t connected to the Internet, but other systems they connect to are. (The presenters cited one example where someone was able to upload arbitrary files to the wireless system on a patrol car, and from their to a central jail control system.) Someone could carry an exploit in on a USB drive.

“But the people who run these systems don’t go out to arbitrary sites, right?” The presenters cited examples, from their personal experience, of correctional institution employees watching videos on the Internet, checking GMail accounts, etc. Friend the right correctional institution employee on Facebook…

“But they couldn’t do anything bad, right? I mean, if they open the cell door, the control panel shows it, and won’t the guards catch them?” As for the guards catching them, I remember a story from Pete Earley’s book The Hot House: Life Inside Leavenworth Prison about an inmate who got hold of some clothes and a clipboard: he walked completely out of Leavenworth posing as a prison inspector. As for the control panel showing it, the presenters demonstrated an exploit that allowed a PLC controlled switch (think a door latch) to be open, while the PLC control software thought the switch was closed. (Video of this exploit is supposed to be on YouTube, but I can’t find it right now.) And opening jail doors isn’t the only thing you could do; you could also disrupt prison operations by trying to open all the doors at once. This would cause a massive power surge, and possibly destroy the system. (Generally, the doors open in a “phased” fashion, so you’re not trying to draw that much power at one time.) Or you could force the doors locked. Imagine the Mexican Mafia subverting a prison PLC system so they can force all the door locks for cells belonging to Aryan Brotherhood members closed at once. A squirt of rubbing alcohol or some other volatile liquid into each cell, toss in a match…

(“Christ, what an imagination I’ve got.” Spot the reference, win a cheese.)

(Edited to add 8/10/2011: I’ve added a link to a white paper by the presenters that pretty well summarizes their presentation and findings.)

That concludes my DEFCON 19 roundup. As more of the presentations get online, I’ll be adding links to them, and there will probably be one or two update posts. If you attended a panel I missed at DEFCON 19, and think it is worth linking to, please feel free to mention it in the comments. Responses from presenters are also welcome, especially if I mis-represented or misunderstood a point.

Random notes: May 19, 2011.

Thursday, May 19th, 2011

Things have been kind of slow the past couple of days. Please accept this random collection of crap in lieu of actual content.

Today’s update from our “the street finds its own uses for things” file: “Mexican organized crime groups are using ultralight aircraft to drop marijuana bundles in agricultural fields and desert scrub across the U.S. border.

Speaking of Neuromancer, there’s more talk about it finally becoming a film, with Vincenzo Natali (“Splice”) directing. I’ll believe it when I see it.

Back at the ranch, the City of Austin

…must retest more than 2,000 firefighter applicants amid concerns that some of them could have obtained confidential questions that they were asked in oral interviews.

I’m a little surprised that they had over 2,000 applicants in this most recent batch. I’m also wondering exactly what those questions were…

I also wanted to touch briefly on our fun city council elections. Yes, we had city council elections last weekend. Three seats (out of a total of six) were up this year. Two of those seats were retained by the incumbents (Chris Riley in place 1, and Laura Morrison in place 4) by pretty large percentages (66 and 73 percent of the votes, respectively.)

Place 3 is held by Randi Shade, who is finishing up her first term on the city council. Shade was initially a favorite to win re-election, but there was a controversy over some emails she sent, one thing led to another…and Shade got her butt kicked, badly, finishing second in a four-way race. Shade just barely managed to get into a runoff with the first-place candiate, Kathie Tovo; Tovo pulled in 46 percent of the vote, and it seems unlikely that the supporters of the other two candidates (former city council member Max Nofziger and Kris Bailey) are going to throw their votes to Shade.

(Tovo was also endorsed by the local alternative weekly; the way I read their endorsement, though, it was a close decision between Tovo and Shade. I’ve been unable to find endorsements from the last election on the alt-weekly’s crummy web site, so I don’t know if they endorsed Shade last time around.)

Tovo’s supporters are already calling on Shade to concede and spare everyone the cost of a runoff. Shade’s response? She’s filed an ethics complaint against Tovo. I’m looking forward to watching this one play out. Note to self: vote early.

This just in: remember the SWAT officer who flipped his cop car and was charged with drunk driving? Yeah, he’s out, pending the decision of the arbitrator. Our buddy Art also suspended six other cops who were supposedly at the party with him. Unclear from the current Statesman article is what the grounds for suspension were, or how long the suspensions were for.

Edited to add 5/20: Here’s a better Statesman article with more details on who was suspended for how long and why.

We could fly a helicopter, nothing left to talk about.

Friday, May 6th, 2011

The NYT, the WP, Wired, and Aviation Leak are all over the stealth helicopter beat. (Note: that WP link is a video, and will play a commercial before the video starts.)

I don’t have much to say about this at the moment, but I did think it’d be useful to provide a roundup of the coverage. If anyone has any additional reliable links (not bar speculation from people who claim to be former members of SEAL Team 6) please feel free to drop them in comments.

Edited to add: Here’s something else interesting from the WP: a summary of Spec Ops: Case Studies in Special Operations Warfare: Theory and Practice, or, as the Posties put it “The book the SEALs read”. We were previously unaware of Admiral McRaven’s book, but plan to order a copy today.

“It’s not a balloonl It’s an airship!”

Wednesday, May 4th, 2011

Slow news day. But I did find this LAT article interesting: Goodyear has commissioned three new blimps.

The replacements will be longer (246 feet versus 192 feet), will fly faster (73 mph versus 54 mph) and have more gondola seats (13 versus seven, including pilot).

I wasn’t aware you could get 54 mph out of a blimp, much less 73 mph. (According to Wikipedia, that’s close to the cruising speed of a Piper Cub.)

I’m sure it comes as no great shock to anyone except me that ZLT Zeppelin Luftschifftechnik has a web site. At least, I think that’s their web site.

Check out the link to Zeppelin Hangar FN. Their online menus even have prices!

(Probably unnecessary subject line hattip.)

Lasers, eight o’clock, day 1!

Wednesday, January 19th, 2011

Last year, Los Angeles International Airport recorded the highest number of incidents in the country involving laser beams that were pointed at aircraft, a potentially dangerous activity that can distract or temporarily blind pilots, the Federal Aviation Administration announced Wednesday.

(Sorry.)

Random notes: December 16, 2010.

Thursday, December 16th, 2010

I was tempted to make some play on Bob Feller’s name in the headline, but I figure everyone’s going to be doing that. So here’s your NYT obit link, sans pun.

As I was in the process of composing this post, I found out about the death of Blake Edwards. I expect fuller obits in tomorrow’s papers.

Speaking of the NYT, there’s quite a bit of interesting stuff in today’s paper. Here’s a quick set of links:

Today is the 50th anniversary of the “Park Slope” plane crash: a United Airlines DC-8 and a Lockheed Constellation collided and fell to the ground in the Park Slope area of Brooklyn, killing 134 people. The “City Room” blog has been doing retrospectives on this story for most of the week: the best place to start is probably here, with the “How It Happened” post, and then browse the list of related posts below. It would be nice if the NYT bloggers could tag all the posts on the subject for easy linking…

(Edited to add: for some reason, the tags were not showing up for me earlier in Firefox 3.6, but they are now: this link will show all the posts tagged “Park Slope Plane Crash”.)

There’s also a retrospective on the murder of Ken Rex McElroy in Skidmore, Missouri “nearly” 30 years ago. The hook here is that the county prosecutor, who was just starting the job at the time of the murder, is now leaving office, and there still haven’t been any prosecutions.

There’s also a pretty shallow article on the rise of home science labs. I say “shallow” because the article is basically “Oh, look at all this cool stuff computerization has made affordable” and doesn’t cover any of the issues around home labs and amateur science experimentation; the CPSIA and science kits for kids, laws in some states (like Texas) restricting the purchase of “chemical glassware”, BATFE and the war on high-power rocketry,  or the CPSC’s attempt to shut down sales of chemicals for home experimentation, among other issues.

How bad is the California Institute of Technology basketball team?

The last time Caltech (2-5) won two games in a season was in 2001-2. The last time it won three was in 1996-97. The last time Caltech had a winning season was 1954.

In local news, I would have liked to be a fly on the wall for this conversation at the Hays County sheriff’s office: “So let me get this straight: you lost the interview with the victim.

Jack Shafer on the nutmeg scare. I think many of the commenters are missing a key point: shouldn’t we be happy that kids these days are still reading the classics?