Saturday, June 13, 2009

2 Candidates - 1 Controls the Firewall

Recent elections were held between 2 very opposing candidates - one party hardliner, one reformer. The reform candidate was leading the polls, had a huge following among the cyber crowd, those too afraid to publicly speak out for change, but kept their guise among the masses of the net - they knew their day was going to come. Day of the election, cyberspace is inexplicably unaccessible, voting tallies are out before votes are counted, the state-run news agencies declare the hardliner the victor by an ungodly margin. The network is off, the truth is buried. Revolution is in the air.

We have a cyber-czar.

Thursday, May 7, 2009

They are Beginning to Organize.

From CNet : "Q&A: FBI agent looks back on time posing as a cybercriminal" [http://news.cnet.com/8301-1009_3-10234872-83.html?part=rss&subj=news&tag=2547-1_3-0-5] CyberCriminals -> CyberCops. We need a way to safeguard our data. Bike couriers are popular in metropolitan areas because they're quick, reliable, they guard their package, and make sure it gets delivered to the right person. We need datacouriers.


More to come...

Wednesday, May 6, 2009

Reality Mimics Fiction

From foxnews.com:
"FBI Probes Hacker's $10 Million Ransom Demand for Stolen Virginia Medical Records" (http://www.foxnews.com/story/0,2933,519187,00.html)

If it's valuable, it's worth stealing - if it's worth stealing, it's worth protecting. Someone failed at their job.

More to come...

In other news...

While I'm trying to figure out what's wrong with my graphing algorithm, I read on our company site that we won the government grant on researching neurons - how they fire, how the brain interprets them, and if they can be simulated.

Just saw on the news that datajacking is up 20% from last year - in the days of an economic downturn, seems data is a highly sought after commodity.

More to come...

Graph Theory Application

Using graph theory, I can predict what route a datapacket will take to get from point A to point B. If I can build the model accurately enough, I should be able to plant "listening posts" among the route to monitor what changes to the packet are occurring and where. I should also be able to estimate when a packet should arrive at what juncture - if something arrives later than my estimate, I should be able to trace back and find out why.

More to come...

Situation

Well, came into work this morning, turns out we have a situation. Apparently, somewhere through our network, there's a leak - which means one of our routers has been compromised. Writing a traversal program to trace route our datapackets and see where the leak is.

More to come...

Tuesday, May 5, 2009

Welcome to my mind...

My name's Ubik Tyn - or Ubik10, (my parents were big Philip K. Dick fans) - I work as a developer for a biotechnology company in the midwest. Nothing too exciting, really - I'm a cryptographer, developing alogorithms to secure our data from being jacked by our competitors. It's kinda like a cat and mouse game, we develop algorithms to encrypt our stuff, they develop algorithms to break it and encrypt theirs; in return we develop stronger codes to break theirs, and encrypt ours...

endless cycle...

But, it makes things interesting and there's definite job security, afterall, I hold the keys.

More to come...