Rob Cheng's Blog
Traveling with a Guitar on Delta Airlines


After a grueling eight-hour layover in Atlanta, my guitar and I finally boarded the last plane of the night. After scanning my ticket, Delta Lady #1 ran down the jetway to give me a ticket to place on my guitar.

I told her that my plan was to place the guitar in the closet in the front of the plane. I have traveled with my guitars on dozens of segments on multiple airlines and aircraft without incident. There has always been space in the small closet in the front of the plane or in the overhead bins. In retrospect, I regret not accepting the ticket.

I entered the plane and asked about placing the guitar in the closet, and Delta Lady #2 said that the closet might be full and was reserved for first class. My only option was to place the guitar in the overhead bins. I did not argue and continued to my seat.

Near my seat, there was an empty overhead bin, and I lifted my guitar. Delta Lady #3 said it would not fit, and guitars were not allowed in the overhead bins. Unfortunately, she approached to block me from placing the guitar. I reacted poorly, and continued stowing the guitar. I quickly learned that Delta Lady #3 was correct and Delta Lady #2 was incorrect, the guitar did not fit in the overhead bin.

The situation was escalating which made me uncomfortable. Delta Lady #3 provoked with “How would you feel if someone told you how to do your job?” and “I can get you thrown off the plane.” I ignored the taunts. Another passenger swore at me, and I kept quiet. I started back up the aisle with the guitar, and Delta Lady #2 was approaching, so I gave her the guitar, and sat down at my assigned seat.

A few minutes passed, and Delta Man #1 approached and gave me the ticket for the guitar. Later Delta Man #1 approached me, and gave me an OK sign. A few more minutes passed, and Delta Man #1 returned and told me that I had to leave the airplane.

In the jetway, Delta Man #1 explained that Delta Lady #3 would explain what happened, and that I needed to apologize. She recited her version of events and stated that I failed to obey her instructions. I did not tell her that her instructions differed from Delta Lady #2. I complied and apologized. She did not feel that the apology was adequate and had me thrown off the plane.

Leave a Reply

Your email address will not be published.


Secure the Homeland

In March 2022, the Biden administration announced that cyber attacks from Russia were imminent. Although this is untrue, it shines a light on how unprepared the federal government and the rest of the country are for a nation state attack.

A nation state attack is exponentially more serious than ransomware. Unlike ransomware, a nation attack does not attempt to extort a fee to restore operations. It simply destroys without regard to consequence.

More importantly, a nation attack accelerates the frequency and sophistication of the attacks. For over a decade, the United States, Russia, China, North Korea and Iran have been stockpiling vulnerabilities in the event of a cyber war. This is the reason why a cyber attack is NOT imminent, because Russia knows that America likely has a larger stockpile with more severe consequences.

When the Americans shut down 3 Iranian nuclear reactors and Russia shut down the Ukrainian electric grid, each of these attacks were accomplished through one vulnerability. The WannaCry virus infected 250K computers in one day through one vulnerability.

Any nation state, and most certainly Russia, has dozens if not hundreds of these vulnerabilities. Rather than one vulnerability, a nation state attack would deploy numerous vulnerabilities simultaneously entering unobstructed into every server and endpoint and any other device that contained critical information in the nation.

The first line of defense is patch management but this is wholly ineffective because patch management works with known vulnerabilities and these vulnerabilities are unknown by design.

The next line of defense is the antivirus which has not functioned against modern threats for almost a decade yet consumers and businesses and even the federal government blindly throw money at this obsolete vestige from a prior era of computing. So the attack continues.

The last line of defense is EDR / XDR / Zero Trust, which attempts to detect and respond to the full frontal onslaught nation state attack. Unlike ransomware, a nation attack would overwhelm the SOC (Security Operations Center) and it would quickly fall down.

This exposes the largest flaw in the nation’s defense. EDR / XDR / Zero Trust / SOC cannot scale to meet a spike in attacks. For a SOC to double in size, would take months, and a nation state can increase its attack level in seconds.

As stated earlier, this is not going to happen due to a respect for America’s vulnerability stockpile, however our defense frameworks should consider the possibility of a nation state attack. Unfortunately, none of the popular frameworks including NIST, MITRE and even Jack Voltaic comprehend the possibility of a nation state attack.

The first nation to contemplate in its national defensive cyber strategy the impact of a nation attack will win the cyber war. The first nation to effectively create cyber defenses that negate a flood of vulnerabilities attacks from a nation state will rise to the top of the world order, because it is no longer exposed to a cyber counter strike.

There is a solution and that is application whitelisting, AKA allow listing or software asset management. As NIST has been recommending for the last 7 years, application whitelisting should reside between the patch management and the antivirus layers. In this way, during a nation state cyber attack, the application whitelisting will strictly allow authorized applications to run. During this scenario, the volume on the network is substantial and network performance may deteriorate but it will not fall down. Some new good programs may not run properly until the attacks abate, but the goal is resilience, to withstand the attack.

This resilience gives patch management time to identify the vulnerability and remediate the vulnerability so the attacks abate. The nation state will likely deploy more of its stock of vulnerabilities which should also prove futile. At this point, the nation is deploying vulnerabilities faster than it can replenish, until the stockpile falls to zero. Then America wins.

Secure the Homeland.

Leave a Reply

Your email address will not be published.


The Ten Biggest Lies in Cybersecurity

Biggest Lies in Cybersecurity

1
Prevention is futile
About 10 years ago, long before the ransomware pandemic began, the powers that be decided that cyber prevention was futile, and cyber security should exclusively focus on reaction. Development and improvements to legacy preventative solutions were halted in favor of reactive architectures such as next generation antivirus, Enhanced Detect and Respond (EDR), Extended Detect and Respond (XDR), and Endpoint Protection Platform (EPP). A more prudent and effective strategy is a hybrid between prevention and reaction, however abandoning prevention, maximized revenue for the cybersecurity industry.
2
Multifactor authentication is the answer
Although MFA is prevention, MFA is expensive with recurring maintenance costs. Not all ransomware enters through an authentication breach. Lately, the ransomware makers are offering insiders of a bounty of $100,000, to release ransomware onto a network. MFA is good but insufficient in itself to thwart ransomware.
3
Backing up data stops ransomware
When ransomware was in its infancy, good backups enabled quick restoration of operations and no ransomware payments. Today’s ransomware exfiltrates data, disables backup services, and encrypts the original data set and the backup too. Airgapping backups is useless, since the ransomware waits until the backup is not airgapped, and encrypts at that time. Restoring from backup is good for disaster recovery except for ransomware.
4
Reacting quickly is the key to stopping ransomware
While it is possible to monitor, detect and respond to malicious human activity, ransomware traverses a network at 100 to 1000 times the speed of humans. Ransomware infects a network in seconds or perhaps a few minutes. People cannot respond fast enough.
5
Ransomware is here to stay
Repeating this lie is job security for the sycophants of the cybersecurity industry. Ransomware is a business with revenues (ransom payments) and expenses. Proactively preventing the ransomware from entering the network simultaneously drives down revenue and increases the costs of the ransomware business model. Ransomware is a metastasizing cancer, but there is still time to suffocate its lifeblood, money.
6
The problem is Russia
Ransomware is the monetization of security holes. The purveyors of ransomware only need a fast internet connection, obfuscation tools, and a country outside of American law enforcement. Even if ransomware’s origin were Russia, ransomware could be made almost anywhere whose citizens are looking to make a quick million and get away with it.
7
The higher the budget, the better the cybersecurity
This one is up there with “lather, rinse, repeat” and “drinking alcohol daily improves life expectancy”, although you got to love the moxie. Cybersecurity giant, Accenture, was hit with a garden variety ransomware that stole terabytes of proprietary data, and a $40M ransom. Accenture had almost unlimited budget for cyber. The Accenture infection is analogous to the neighborhood fire department, fire trucks, and firemen burning to the ground.
8
Layered security is the right approach
This lie is the cybersecurity industry saying that they have no idea whether this widget works, and neither do you, so you might was well give it a try. This Frankenstein approach to cybersecurity makes it impossible to understand what works and what is useless. Paying for useless security maximizes revenue for the cybersecurity industry.
9
There are no silver bullets
Application whitelisting is the silver bullet. NIST advises organizations to use modern whitelisting programs, also known as application control programs, to stop cyber threats. The Australian Signals Directorate’s Essential Eight Maturity Model has four levels (0-3) and levels 1, 2, and 3 require application whitelisting.
10
Cybersecurity is complicated
The cybersecurity industry’s ineffective, reactive, throw spaghetti at the wall, prevention be damned architecture is complicated and intellectually out of reach for businesses, lawmakers, and laypeople. There are many prevention paradigms in our society and none are complicated. Health care, fire prevention, tooth paste, home security and so on. Making cybersecurity unduly obtuse and complicated is part of the industry’s sales playbook but it doesn’t have to be this way.
?
What you can do
Stop repeating the lies. Use common sense. Keep an eye on Australia. When buying cyber products, ask your well dressed, attractive, articulate sales person whether any of their customers have been infected with ransomware lately.

Leave a Reply

Your email address will not be published.


Xcaret Adventure

Our last adventure for our Cancún vacation was to a wonderful place called Xcaret which is one of the coolest tourist destinations in the area. The highlight is a man made salt water that runs through the park. Each person puts on a life vest, and swims throughout the river. There are numerous spots to take selfies built into the trip. There are numerous restaurants, and we saw two shows. The first one was a Mayan dance show and the second they call the Spectacle. Dinner was included, and it was as spectacular as the name suggests. The show lasted about an hour and a half and reviewed the history of Mexico through song and dance. The park includes an aquarium and a small zoo, plus places to swim and a boat ride. If you are going to do one thing while in Cancún, it should be Xcaret.

They have a technology, where each person gets a wrist band, and it takes a Xelfie in hundreds of different places. These photos are an assortment of our Xelfies.

1920 x 1280
2738 x 2689
6000 x 4000
3331 x 3708
2960 x 3620
4000 x 4287
2943 x 3016
4000 x 4836
3171 x 3683
2996 x 3694
2766 x 3495
3028 x 3993
6000 x 4000
4000 x 6000
3432 x 3770
2290 x 2914
6000 x 4000
3003 x 2948
4000 x 6000
4000 x 4625
2259 x 2704

Leave a Reply

Your email address will not be published.


Mayan Cenote

We went on an excursion to Chichén Itzá and then our group visited a Mayan Cenote which was the highlight of the trip. Cenote is the Mayan word for a sink hole or underground cave. The height of Mayan accomplishment is the monuments built in Chichén Itzá which took hundreds of years to construct. It was fascinating to see how the Mayan people live today in the Yucutan. We had a typical Mayan meal primarily consisting of chicken and tortillas. Later, a Mayan priest blessed our trip into the cenote. We rapelled down 60 feet into the cave into the super cold and refreshing water. The Mayan people took these photos and then sell them to tourists as a new form of income. It was great.

1841 x 1996
946 x 1357
2000 x 2992
2000 x 2992
1922 x 1999
1581 x 2000
2000 x 1960
1565 x 1656
2156 x 1730

Leave a Reply

Your email address will not be published.