Archive for the ‘Radio’ Category

DEFCON 21 update: August 5, 2013.

Monday, August 5th, 2013

Yeah, I know, I’ve been quiet. Much of Friday’s blogging time was eaten by Bluehost instability, and Saturday and Sunday were busy.

But I do have some updates and links.

I’m going to cut things off here for right now. I’m still trying to find links to some of the other presentations I mentioned (in particular, I’d love a link of some sort to Anch’s “Pentesters Toolkit” if anyone has one) and will post updates as they come in. Depending on what I dig up, there may be a second post tomorrow. In the meantime, this should keep you busy.

DEFCON 21: -1 day notes.

Wednesday, July 31st, 2013

Just because I’m not going to DEFCON 21 doesn’t mean I can’t try to cover it. From 1,500 miles away. Sort of half-assedly.

DEFCON hasn’t even started yet, but Black Hat is going on, and some stuff is coming out. The biggest story so far has been Barnaby Jack’s death. I haven’t mentioned it previously because I’ve felt like it was well covered elsewhere (even FARK).

Another “big” (well, I think it is) story that I haven’t seen very much coverage of is the phone cracking bot. Justin Engler (@justinengler on Twitter) and Paul Vines, according to the synopsis of their talk and the linked article, built a robot for under $200 that can brute force PINs. Like the one on your phone.

Robotic Reconfigurable Button Basher (R2B2) is a ~$200 robot designed to manually brute force PINs or other passwords via manual entry. R2B2 can operate on touch screens or physical buttons. R2B2 can also handle more esoteric lockscreen types such as pattern tracing.

This is one I’ll be keeping an eye on.

Borepatch is in Vegas this year, attending both Black Hat and DEFCON. He’s got a couple of posts up: a liveblog of the NSA director’s presentation at Black Hat, and another post about the links between black hats and political candidates.

So the DEFCON schedule is up. If I was going, what would get me excited? (I’ve included the Twitter handles of the speakers from the DEFCON 21 schedule information; I figure this gives a central source for looking up someone’s feed and getting copies of their presentation.)

From Thursday’s talks: I’d probably go to “Hacker Law School“, as I’m a frustrated wanna-be lawyer anyway. Why not?

Anch’s (@boneheadsanon) “Pentesters Toolkit” talk makes my heart skip a beat:

You’ve been hired to perform a penetration test, you have one week to prepare. What goes in the bag? What is worth lugging through airport security and what do you leave home. I’ll go through my assessment bag and show you what I think is important and not, talk about tools and livecd’s, what comes in handy and what I’ve cut out of my normal pen-test rig.

Push some more of my buttons, please.

The Aaron Bayles (@AlxRogan) “Oil and Gas Infosec 101” talk kind of intrigues me, but it would depend on my mood at the time as to whether I went to that one, or skipped out for a break.

Likewise with the Beaker and Flipper talk on robot building: yeah, robot building is something I’m interested in doing, but I might just be in a mood to visit the Atomic Testing Museum instead, and read your slides later. Nothing personal: I’m sure it will be a great talk.

I’m intrigued by the ZeroChaos (@pentoo_linux) panel on the Pentoo LINUX distribution for penetration testing. I’m not sure how that differs from, say, BackTrack, but I’d probably show up just so I could find out.

The “Wireless Penetration Testing 101 & Wireless Contesting” talk by DaKahuna and Rick Mellendick (@rmellendick) hits yet another of my hot buttons. I can’t tell from the description how much of this is going to be describing contests in the Hacker Village, and how much will be practical advice, but I’d show up anyway.

That takes us into Friday. Just from a preliminary look at the schedule, it looks like the big thing this year is hacking femtocells. Doug DePerry (@dugdep) and Tom Ritter (@TomRitterVG) are doing a talk on “I Can Hear You Now: Traffic Interception and Remote Mobile Phone Cloning with a Compromised CDMA Femtocell”:

During this talk, we will demonstrate how we’ve used a femtocell for traffic interception of voice/SMS/data, active network attacks and explain how we were able to clone a mobile device without physical access.

The Charlie Miller (@0xcharlie) and Chris Valasek (@nudehaberdasher) talk, “Adventures in Automotive Networks and Control Units“, sounds interesting as well. I’m just slightly more interested in femtocells than automotive hacking, so apologies to Mr. Miller and Mr. Valasek: if the two weren’t in conflict, I’d hit your talk for sure.

And if you haven’t been to a software defined radio talk, Balint Seeber’s (@spenchdotnet) sounds promising.

The Secret Life of SIM Cards” by Karl Koscher (@supersat) and Eric Butler (@codebutler) intrigues me the most out of the 11:00 talks. And I’m kind of interested in the Ryan W. Smith (@ryanwsmith13) and Tim Strazzere “DragonLady: An Investigation of SMS Fraud Operations in Russia” presentation because, well…

This presentation will show key findings and methods of this investigation into top Android malware distributors operating in Russia and the surrounding region. The investigation includes the discovery of 10’s of thousands of bot-controlled twitter accounts spreading links to this type of SMS fraud malware, tracing distribution through thousands of domains and custom websites, and the identification of multiple “affiliate web traffic monetization” websites based in Russia which provide custom Android SMS fraud malware packaging for their “affiliates”. During this investigation we have mapped out an entire ecosystem of actors, each providing their own tool or trade to help this underground community thrive.

There’s not much that intrigues me after Benjamin Caudill’s (@RhinoSecurity) presentation on “Offensive Forensics: CSI for the Bad Guy“. If I was at DEFCON, this is the time where I’d probably be browsing the dealer’s room, though I might go to the Amir Etemadieh (@Zenofex)/Mike Baker (@gtvhacker)/CJ Heres (@cj_000)/Hans Nielsen (@n0nst1ck) Google TV panel: these are the same folks who did the Google TV talk at DEFCON 20.

I feel kind of conflicted at 4:00. The Daniel Selifonov talk, “A Password is Not Enough: Why Disk Encryption is Broken and How We Might Fix It” sounds interesting. But I’m also intrigued by the “Decapping Chips the Easy Hard Way” with Adam Laurie and Zac Franken. Decapping chips is something I’ve been fascinated by, and it looks like Adam and Zac have found methods that don’t involve things like fuming nitric acid (and thus, are suitable for an apartment).

This is also the time when we, once again, present the “Hippie, please!” award to Richard Thieme for “The Government and UFOs: A Historical Analysis“.

I’m slightly intrigued by Nicolas Oberli’s (@Baldanos) talk about the ccTalk protocol, “Please Insert Inject More Coins”:

The ccTalk protocol is widely used in the vending machine sector as well as casino gaming industry, but is actually not that much known, and very little information exists about it except the official documentation. This protocol is used to transfer money-related information between various devices and the machine mainboard like the value of the inserted bill or how many coins need to be given as change to the customer.

Saturday morning, we have the second femtocell talk, “Do-It-Yourself Cellular IDS”, by Sherri Davidoff (@sherridavidoff), Scott Fretheim, David Harrison, and Randi Price:

For less than $500, you can build your own cellular intrusion detection system to detect malicious activity through your own local femtocell. Our team will show how we leveraged root access on a femtocell, reverse engineered the activation process, and turned it into a proof-of-concept cellular network intrusion monitoring system.

Opposite that, and worth noting, are the annual Tobias/Bluzmanis lock talk, and the David Lawrence et al talk on using 3D printers to defeat the Schlage Primus.

More than likely, I’d hit the Daniel Crowley et al (@dan_crowley) talk, “Home Invasion 2.0 – Attacking Network-Controlled Consumer Devices“, and the Philip Polstra (@ppolstra) presentation “We are Legion: Pentesting with an Army of Low-power Low-cost Devices“. I’m particularly intrigued by the Polstra talk, as one of my areas of interest is how small can we make devices that can still do useful hacking? What’s the smallest feasible wardriving system, for example?

I do want to give Jaime Sanchez (@segofensiva) a shout-out for his talk on “Building an Android IDS on Network Level“. This is worth watching.

I’d have to go to the Phorkus (@PeakSec)/Evilrob “Doing Bad Things to ‘Good’ Security Appliances” talk:

The problem with security appliances is verifying that they are as good as the marketing has lead you to believe. You need to spend lots of money to buy a unit, or figure out how to obtain it another way; we chose eBay. We now have a hardened, encrypted, AES 256 tape storage unit and a mission, break it every way possible!

Because, tape! But the Wesley McGrew “Pwn The Pwn Plug: Analyzing and Counter-Attacking Attacker-Implanted Devices” talk also interests me.

The PIN cracking device talk is on Saturday, opposite Amber Baldet’s (@AmberBaldet) talk on “Suicide Risk Assessment and Intervention Tactics“. I’m glad DEFCON accepted her talk, and I am looking forward to seeing the presentation online.

Also noteworthy, I think: James Snodgrass and Josh Hoover (@wishbone1138) on “BYO-Disaster and Why Corporate Wireless Security Still Sucks“.

Todd Manning (@tmanning) and Zach Lanier (@quine) are doing a presentation on “GoPro or GTFO: A Tale of Reversing an Embedded System“. I don’t have a GoPro (yet) or much of a use for one (yet) but I think they are interesting devices, so I’ll be watching for slides from this talk. Same for the conflicting Melissa Elliott talk, “Noise Floor: Exploring the World of Unintentional Radio Emissions“.

This takes us to Sunday. There’s not a whole lot that really turns me on early, though I admit to some interest in the Jaime Filson/Rob Fuller talk on harvesting github to build word lists:

After downloading approximately 500,000 repositories, storing 6TB on multiple usb drives; this will be a story of one computer, bandwidth, basic python and how a small idea quickly got out of hand.

I like the idea behind John Ortiz’s “Fast Forensics Using Simple Statistics and Cool Tools“, and he teaches at the University of Texas – San Antonio, so I’d probably go to that.

Now is when things start heating up from my perspective. Joseph Paul Cohen is giving a talk on his new tool, “Blucat: Netcat For Bluetooth“:

TCP/IP has tools such as nmap and netcat to explore devices and create socket connections. Bluetooth has sockets but doesn’t have the same tools. Blucat fills this need for the Bluetooth realm.

Holy crap, this sounds awesome. All I ask for is code that compiles.

(Unfortunately, this is up against the Eric Robi (@ericrobi)/Michael Perklin talk on “Forensic Fails“, which sounds like fun. But Bluetooth hacking is a big area of interest for me; sorry, guys.)

Speaking of Bluetooth hacking, Ryan Holeman (@hackgnar) is doing a talk on “The Bluetooth Device Database”. Which is exactly what it sounds like:

During this presentation I will go over the current community driven, distributed, real time, client/server architecture of the project. I will show off some of analytics that can be leveraged from the projects data sets. Finally, I will be releasing various open source open source bluetooth scanning clients (Linux, iOS, OSX).

Dude lives in Austin, too! Holy crap^2!

And that takes us through to the closing ceremonies and the end of DEFCON 21. I will try to link to presentations as they go up, significant news stories, other people’s blogs, and anything else I think you guys might be interested in. If you have specific requests or tips, please either let me know in comments or by email to stainles at mac dot com, stainles at gmail dot com, or stainles at sportsfirings dot com.

Random notes: July 5, 2013.

Friday, July 5th, 2013

Everton Wagstaffe and Reginald Connor are serving time for the kidnapping and murder of Jennifer Negron. Ms. Negron was 16 years old when she was murdered.

Both Mr. Wagstaffe and Mr. Connor have maintained their innocence and, after years of fighting, were able to arrange DNA testing of every piece of physical evidence that could be found; none of it implicated them, and the DNA in hair found on the victim’s body came from at least one other person.

The main witness against the two men was a crack addicted prostitute who was “forcibly detained by the authorities in a hotel until she testified”.

In the case of Mr. Wagstaffe and Mr. Connor, no records were kept of police interviews with other important witnesses; there was no physical evidence to support the informant’s claims; one witness, a police detective’s daughter, who could provide a seemingly credible alibi for Mr. Wagstaffe, was never interviewed by police, prosecutors or defense lawyers; the owner of a car supposedly used in the kidnapping said she told detectives that she had it with her at church through the night of Ms. Negron’s death. There is no record of any interview of her, either, even though the car was cited as important evidence.

Is this our old friend Louis Scarcella? Is the Brooklyn DA reinvestigating this case?

No. And no.

The investigation into the death of Ms. Negron was led by a detective from a different squad, Michael Race of the 75th Precinct. His work with another informant led to the conviction of at least three innocent people.
Of 750 murder investigations that he ran, Mr. Race has said, only one was “done the correct way, A to Z.”

One. Out of 750. And three wrongful convictions.

Aye aye mateys, oh, come on the Pirate Radio
Land of the free and home of the brave
FCC crawl in your grave!

(Explained.)

Directors of Meade Instruments Corp., which has helped foster the consumer market with its easy-to-use telescopes and binoculars since 1972, may be tipping their hand by Monday on whether to recommend selling the company, plow ahead alone or possibly seek bankruptcy protection.

This sucks. I’ve wanted a good telescope for much of my life, even though I find it hard to use one with glasses and I really am not able to stay up late in order to do observational astronomy. Still, I’m sad to see the market shrinking, even though the technology gets better and better.

Verizon has a great idea for Fire Island. As you might have guessed, the island got the crap beat out of it by Sandy, and the phone system was devastated.

Verizon, the only phone company in town, wants most of the island and its 500 homes to go all-wireless, ending for good its century-old copper wire phone network. That means phone lines buried underground or strung between poles and then stretched into homes will go out of service and be replaced by an experimental wireless service that sends calls between cell towers and home receivers.

Sounds great, right?

Without phone lines, consumers don’t have the option of DSL Internet. Gone are faxes. Heart monitors that connect over phone lines to hospitals don’t work over wireless, either. And small businesses can’t process credit cards or operate cash machines without buying entirely new payment systems, as Verizon notes in its New York public filing.

Not mentioned in the article: Plain Old Telephone Service (POTS) over copper works when the power is out. Will Verizon’s wireless system? The cell towers may have battery backup or generators, but do the home receivers?

Scanners live in vain!

Monday, May 27th, 2013

A comment by friend of the blog Jake over at Curses, Foiled Again led me to check out the Broadcastify web site. I think this had been bubbling somewhere below the surface of my conscious mind anyway, but Jake provided the kick I needed.

Broadcastify basically collects radio feeds from scanners and organizes them by location. So you can browse the site, find your local area, and (assuming Broadcastify has a feed) click the bunny to listen to your local police or fire department traffic. There are several player options, including web-based players as well as iTunes, Real Audio, Windows Media, and Winamp.

Not every locality is there; there are some large gaps in coverage for Texas, to take one example. There are feeds for Williamson, Hays, and Bastrop counties; however, there’s no feed for the Williamson County Sheriff’s Department or Round Rock PD. On the other hand, this is free, and you get what you pay for.

For reference purposes, here’s the Travis County feeds page, which includes Austin/Travis County Fire and EMS and Austin Police and Travis County Public Safety.

Back a long time ago, I was an avid shortwave and scanner listener; I still have the equipment, but my scanner isn’t capable of following the newer trunked radio systems. I’ve flirted from time to time with the idea of purchasing a newer scanner, but now I don’t have to.

Thanks, Jake!

Ring ring ring, open phone.

Monday, April 29th, 2013

Great and good friend of sportsfirings.com and valued commenter lelnet left a long comment on last night’s cellphone post. Because his comment represents a lot of work and thought (and I believe in rewarding hard work) and because I’m afraid it will get lost in the shuffle, I’m promoting it to a blog post (with his permission).

You can already buy, off the shelf at Fry’s, a “phone” that does essentially what you’re talking about, using available wi-fi networks to connect with Skype and make calls through that, without any involvement of the cell providers. (Yes, I know…Skype is a proprietary protocol and would be unacceptable to Stallman. The firmware is also closed. But since it’s provably _possible_, one could do it with open standards if one saw a market.)

The problem is that it doesn’t scale well. Getting a reliable wi-fi signal is pretty easy…in the sorts of places one is likely to have access to a _wired_ phone whenever one wants one. Building a wi-fi network that covers the places one actually needs mobile connectivity from is a massively harder problem, due to the range limitations of unlicensed spectrum.

It _might_ be possible to do it using amateur frequencies, _if_ you could get regulatory approval to open those up to use by the general public. Which, of course, would involve fighting off both the whole telco industry and at least 80% of the amateur radio community. Considering that the latter group is where you’d be trying to recruit most of your network engineers from, it seems like it’d be a bad idea to begin your plan by irrevocably pissing them off, even if you magically assume that you’ll be able to out-muscle the telcos in Washington.

The last mile is a hard problem on several different dimensions, some of them physical and some of them political. But there is something you _could_ do…

Build an Android (or, if you like, Replicant) phone, pre-configured to send all its traffic through an encrypted VPN to an anonymizing end-point. Purchase connectivity for it on an existing cell carrier’s prepaid plan. Disable the cellular voice service, and have it send and receive calls exclusively through VoIP connectivity to an Asterisk or FreeSwitch server, either run by the same entity that does your anonymizer, or run yourself on a cheap colo server stuck in a rack in some country you doubt is ever going to care enough to spy on you.

Your cell provider can easily determine that Charles Udall Farley (or whatever name you gave them when you signed up…it’s prepaid, so it’s not like the name you give has to pass a credit check) pushes a lot of data around, but they’d have no way of inspecting the content. They’d have a record of Mr. Farley’s movements around their network, but no way to associate that with you, or even with the phone number you make and receive calls on. An Open Source OS on the phone addresses the “remote bugging” fears. It doesn’t depend on you personally running any software that RMS would find objectionable. And since you can make and receive calls from anywhere that you’re able to get a data signal off a cell tower, it’s still useful if your car breaks down by the side of the road, instead of just in your home and office, like a wi-fi-only device would be.

(I came up with this plan for a team of spies in a novel my wife is writing. But although to my knowledge no such phone exists today, there’s absolutely no barrier to someone building one tomorrow. And both the technologies and the services required to support the back-end of it are already available for purchase in the real world right now, at prices comparable to or better than what people who already had cell phones in the mid-90s were paying for service then.)

The only thing I’d add to this is that I, personally, have no interest in pissing off the amateur radio operators out there; both because it is not good strategy, as lelnet notes, and because I happen to be one myself. (KF5BFL, in case anyone was wondering, but don’t look for me; I don’t have any transmitting equipment at the moment.)

We’ve got computers, we’re tapping phone lines, I know that ain’t allowed…

Sunday, April 28th, 2013

Two things collided in my head last week. After I picked up the wreckage, I thought there might be a worthy blog post in the aftermath.

(Picking up the wreckage took a while, because the week was so busy. At least nobody took part of a locomotive through the eye. Anyway, I apologize if this is old news.)

Thing one: Andrew Huang’s post on the $12 Gongkai phone (by way of LWN). It doesn’t come as any great shock to me that cellphone hardware has become cheap: at last year’s DEFCON, the Ninja Networks party invitations were fully functional cellphones. (I do not know what the Ninja Networks cost per phone was: as I recall, the Ninjas stated they got substantial financial and technical support from Qualcomm. However, the fact that the phones were cheap enough to pass out as party invites is significant in and of itself, in my ever so humble opinion.)

Thing two: Dr. Richard Stallman and his position on cell phones. I don’t want to reopen the whole debate on whether Stallman is a hypocrite for not having a cell phone but being willing to use other people’s phones. Rather, I want to ask a not-so-simple simple question: is it possible to build a phone that overcomes Stallman’s objections?

…most of them are computers with nonfree software installed. Even if they don’t allow the user to replace the software, someone else can replace it remotely. Since the software can be changed, we cannot regard it as equivalent to a circuit. A machine that allows installation of software is a computer, and computers should run free software.

Well, it looks like we can put together a cellphone computer for about $12. Maybe less. I don’t see any reason to think that someone   (more likely, a small group of someones) could put together a reference hardware spec for an open cellphone, complete with schematics, PCB layouts, and a parts list. I know I don’t have the skills or equipment to do SMD soldering, and I wouldn’t ask, say, my mother to build a phone from a kit either. But it is just as easy for me to visualize a scenario where some organization (say, the FSF) contracts with a manufacturer to build phones from the reference design, with an organizational seal of approval. They could sell the phones outright, or offer them as a premium for donations: I think I’d give at least $50 to FSF for a phone like the one Huang describes. Add WiFi, GPS, a color screen and a camera and I’d go up to $100, possibly more depending on my mood, the phase of the moon, and other factors.

But we need an operating system for our cellphone computer, right? Right. Android is open source. Note well, however, that there is a difference between “free software” and “open source software”, and that these are not equivalent concepts. But it seems pretty easy to imagine (as long as were are imagining) a fork of Android that is truly “free” by the FSF definition. As a matter of fact, we don’t even have to imagine; while I was researching this post, I stumbled across Replicant, which is exactly that.

…tracking and surveillance devices. They all enable the phone system to record where the user goes, and many (perhaps all) can be remotely converted into listening devices.

I’ll deal with the second objection first. With a truly open source and free OS, I think you can pretty much eliminate the capacity for remote bugging. As to the first objection, I don’t see a way around that. It seems pretty clear that the phone system has to know where your phone is for you to make calls and get calls. But: if the system only stores that information for the minimum necessary length of time, and discards it after the call is completed, is that good enough for Stallman?

(Even if you’re not actively engaged in a call, I think the network still has to know what cell you’re in. But could the network only store your current cell, and not the history of cells you’ve been through?)

(From this point forward, I’m going to refer to this idea as the “open” network. Calling it the “free” network carries with it the connotation that people aren’t paying for it. I’ll come back to that.)

Okay. So we expect AT&T and Sprint and Verizon and T-Mobile and the Grace L. Ferguson Cell Phone and Storm Door Company not to store this information. Right. I’ll wait for you to finish laughing.

Done? Okay. So we not only need consumer hardware, we need an entire “open” cell phone network. Is that something that could be reasonably built? Well, we need radio spectrum. It is unlikely that the carriers will give up spectrum for an “open” network. So what do we do? Could we use amateur radio frequencies, like the 2390-2450 MHz band? Is it even possible that local amateur radio groups could set up and maintain cells in their local areas? (I don’t imagine the equipment to set up a cell is cheap, but I also don’t imagine it is beyond the reach of a group of talented amateur radio operators with a GNU software radio. And if the equipment becomes widespread, the prices should go down. I hope.)

Could you even do away completely with the cell network, and just run all the communications over IP? You’d need to be associated with an access point, but aren’t most folks near one at home or at work most of the day? Would it be possible for amateur radio operators to set up networks of access points along major urban corridors? WiFi hardware is even more of a commodity item than cell hardware, and there are protocols for linking access points together or doing mesh networks.

Someone has to pay for this, right? Right. We don’t want movements and activity tracked, but I don’t see any philosophical problem with a simple lookup based on each phone’s unique identifier. All you need is one bit to indicate the customer is paid up and entitled to use the network. As for the actual cost and billing, it seems to me that can be handled by systems outside the network. If you’re giving unlimited everything for one flat fee, you don’t need to track anything except paid or unpaid. If you want to start getting into per voice minute or per KB data charges, it seems to me that you can still track usage (minutes, KB, or texts) without tracking activity and bill based on usage. The money from service fees could, in turn, be routed to the cell providers. I’m sure we could come up with a fair way of doing this; for example, X cents per call routed through an individual cell. Busier cells get more money, which they can invest in upgrading service; more remote cells probably have lower demand, and don’t need the same capacity.

(One big problem if you’re using amateur radio frequencies: FCC regulations prohibit “communications in which the operator has a pecuniary interest, including communications on behalf of an employer“. There’s a strong tradition, in addition to the FCC regulations, against using the amateur radio bands for business purposes. One could argue that this kind of network wouldn’t be a business, though; rather, it would be a maintained as a public service, and the money that comes in would go back out to local amateur organizations to cover their cost of maintaining cells. I sort of see this in the same way as I do the repeaters maintained by some amateur radio clubs for the use of their members.)

So I said this was a not-so-simple simple question. Basically, what I don’t know about cell phones and cell technology could fill books. (Indeed, it has filled books, which are located in places called “bookstores” and “libraries”. But I digress.) I think I’ve outlined a possible path to an “open” network, but I acknowledge the limits of what I know. I would welcome criticism from people who know more than I do: those who work in the industry, computer security experts, and heck, even cyberpunk writers.

I mention cyberpunk writers for a reason. Maybe I am over-romanticizing this a bit, but I have this mental image of guys in the Sprawl with “open” cellphones spread out on blankets in the street, and gangs like the Panther Moderns using those phones. A guy can dream, can’t he?

(Subject line hattip: the greatest rock song ever, by the greatest band ever. Like you needed it anyway.)

Edited to add: I knew there was something I was forgetting. How reliable would this network be? After all, AT&T spends hundreds of millions of dollars a year on their network, where what I’m talking about here is something that is, at best, a fringe network primarily used by people highly concerned with privacy, and possibly maintained by amateurs on a spare time basis. On the other hand, AT&T spends hundreds of millions of dollars a year on their network. Enough said.

My inclination is to say that you could probably build something that’s “good enough”. You might not be able to get to the same level of service as, say, Verizon, but you could probably get to a level of service where people are willing to make the tradeoff between guaranteed privacy and a small amount of inconvenience. I think this is one place where my plan is weak.

Edited to add 2: 1500 words? I haven’t written like this since I was in college. In other words, last year.

I heartily endorse this event or product. (#8 in a series)

Tuesday, April 23rd, 2013

Silvercar.

This endorsement may be of limited utility to most of you, since Silvercar currently only operates in DFW and Austin. But I am hopeful that they will expand to other cities.

What are they? Silvercar is a car rental firm, but they’re different from your normal car rental company.

First of all, they only rent one type of car: silver Audi A4s. That’s not so bad, for reasons I’ll get into in a bit.

Second of all, their prices are reasonable: right now, they’re charging $75/day on weekdays and $50/day on weekends. That’s actually about what you’d pay for anything from Enterprise at the airport. (I just checked the Enterprise site: cheapest is $66.99 for a full-size car, going up to $127.56 for a “luxury” car.) That is with unlimited milage.

Thirdly, the experience is nowhere near as annoying as your average car rental agency is:

  • They pick you up at the airport. You pick your car. You scan the QR code with the Silvercar app on your phone. You drive away with your rental. If you want, they’ll give you a briefing on how to use the navigation and audio systems. If you need help, they have some very pleasant people available to walk you through the process.
  • Unlimited mileage.
  • Fuel is charged based on what you actually use (at prevailing market rate) plus $5 if you don’t return the car with a full tank.
  • They don’t get pushy about the “collision damage waver”. As a matter of fact, I don’t think they have such a thing.
  • Those nice people they have on duty kept asking if we’d like a bottle of water or something while we picked up and dropped off the car. When’s the last time Hertz asked you if you wanted a bottle of water?

And the Audi A4s they rent are fun cars. Yes, they have Bluetooth. They also have WiFi. Seriously. You can use your rental car as a WiFi hotspot while driving. Most of this stuff is your basic Audi features, as far as I know, including the navigation and audio. But it is still really nice to have these features in a rental car, especially at this price.

I should note that I didn’t actually rent the car: Mike the Musicologist came up for a visit and handled the interaction with Silvercar. But I was along for the pickup and dropoff, and from what I saw it was the most friction-free car rental experience ever.

We drove the Audi down to New Braunfels Sunday night to have barbecue at the Cooper’s there (which I liked very much). Then we drove back through the city and stopped at the Buc-ees (yes, the one that won the “America’s Best Restroom” contest – and, yes, it is a darn nice men’s room). Monday, MtM and I drove down to Boerne and had lunch at a wonderful German restaurant called Little Gretel. I want to go back. Actually, what I want to do is take a long weekend, book a motel room in Boerne, and stay for a day or two, eating at Little Gretel, feeding the ducks in the creek across the street, and exploring the surrounding area.

We drove back to Austin by way of Fredericksburg (stopping briefly at the shop for the Nimitz Museum/Museum of the Pacific War) and the Audi never missed a beat. It felt like it was on rails even when I pushed it close to 100 MPH, and we got around 26 MPG for the entire Monday trip.

The one small issue I’d bring up with Silvercar, if they asked me, is that they only provide an iPod connector for the Audi MMI system. It’d be nice to have at least the Audi USB connectors as well. (I was unable to find a USB port in the car: the MMI system does have two SD card slots, though, as well as a SIM card slot.)

So, anyway, if you need a good rental car in Austin (or DFW), give Silvercar a try. And thanks to Mike for organizing this adventure.

When I take over and declare martial law…

Friday, April 19th, 2013

…the radio stations will be all theremin, all the time. Except when I want to provide the people with important updates on the progress of our flying monkeys.

We’re the only ones competent enough to have radios.

Monday, February 25th, 2013

Ever since police officers started carrying radios, there have been radio related problems. One problem is “keying the microphone”: basically, pushing the talk button on the microphone and blocking other people from using the channel, or stepping on other people’s transmissions.

Sometimes this is an accident; you shift a little in the seat of your squad car and accidentally hit the button. Sometimes, though, especially in the New York Police Department, it isn’t an accident:

At least six officers have been punished since 2012 for such conduct. The department’s chief spokesman, Paul J. Browne, described one case in Brooklyn in which two officers “who keyed over their sergeant” in the last year were each docked 30 vacation days and put on disciplinary probation. “That got their attention and others’ too.”

Officers have also been known to “whistle or quack like a duck to show their disdain for whoever preceded them on the airwaves.”

The NYPD’s radios are assigned to individual officers, and transmissions can be associated with a specific radio, but this hasn’t deterred the conduct. To be fair, some of it could, possibly, maybe be user interface issues:

“I showed them my memo book,” Mr. Padilla said. “I was in traffic court. Maybe it happened while I was turning the radio off. Sometimes you press the key while turning it off.”

Mr. Padilla works in the 33rd Precinct, under Inspector Joseph Dowling.

The inspector has a reputation of being a hands-on boss who is a frequent presence on the radio, often directing resources from the streets himself.
“He comes on the radio and people start clicking,” Mr. Padilla said.

But other than open disrespect for commanding officers, does this matter? Yes, it does:

Sometimes it happens during car chases, when officers have been known to try to drown out any supervisor who might call off the pursuit after concluding it is too dangerous. A number of microphones were keyed on an April night in 2008, for instance, as police officers chased a gunman in a stolen Consolidated Edison van near Yankee Stadium, one police officer recalled.

More obit watch.

Tuesday, December 18th, 2012

Frank Pastore, former major-league pitcher for the Cincinnati Reds and the Minnesota Twins, later turned talk-show host in LA.

“You guys know I ride a motorcycle, right? At any moment, especially with the idiot people who cross the diamond lane into my lane, without any blinkers – not that I’m angry about it – at any minute, I could be spread all over the 210. But that’s not me, that’s my body parts. And that key distinction undergirds the entire Judeo-Christian worldview,” he said.

Mr. Pastore died as a result of injuries sustained on November 19th, when his motorcycle was struck by another car that swerved into him as he was riding in the car pool lane on the freeway.

Some stuff.

Saturday, August 25th, 2012

More specifically, a random assortment of things that turned up in my Post Office box today, or that I found while I was out and about. Not that I’m bragging, but I think some folks might be entertained, amused, or interested in some of these items.

The first issue of “Infowars: The Magazine” (as Gregg Easterbrook might say, “Published on Earth: The Planet”).

I’ve got big balls. (Also acceptable: “Ah, but the strawberries. That’s where I had them.“) (Previously.)

The only political party that can actually change things this year. (Get yours here.)

Finally:


My USB TV receiver from Germany is here! (Previously.) More when and as I get a chance to dink with it.

Toys, toys, toys.

Monday, August 13th, 2012

Did you know that the promo code SUCKITGROUPON will get you 45% off your Buckyballs order from getbuckyballs.com?

I didn’t, either, until I saw it on Overlawyered. I already got my first set of Buckyballs, but I just ordered some more: this time, I got some BuckyBigs, so I can pretend to be Captain Queeg while I’m sitting at my desk.

(Note that I have no financial relationship with the BuckyBalls people; I just want the CPSC to die in a fire.)

In other news, the Germans have shipped my USB TV receiver.