Al Capone’s Original Thompson Machine Gun

Just when I thought my trip to Chicago would be average, some of the sergeants at the Chicago Police Training Academy, whom I’m training in iPhone forensic investigative methods, took me to the firing range in the basement and brought out an old dusty case. What came out of that case was an amazing piece Read More

Handguns in Canada!

How freaking awesome is this: After I finished a forensics workshop in liberal Canada, where civilians aren’t allowed to own or even possess handguns, the most awesome regional cops let me come in and shoot at their police range. We tore through about 200+ rounds wearing bullet proof vests (which are required while shooting) and Read More

Microsoft Sync Could Lead to Certain Death

Yesterday I test drove a 2010 Lincoln Navigator equipped with the MS Sync feature advertised to make driving safer and easier by accepting voice commands. First of all – yes, I loathed the Navigator. The quality was about that of the cheap Rolex watches sold on eBay. Among all of the other things I hated about the Navigator’s poor design, its MS Sync feature made me want to get out a flathead screwdriver and forcibly remove the Navigation system, along with the “Powered by Sync” logo stuck on the dashboard. If you are among those few who love pain and actually like Microsoft Windows, Sync may be for you. For the rest of us who are merely forced to tolerate the craptastic wonderland of a Microsoft-based corporate cesspool, I promise you that once you push the Sync button, you’ll find new meaning to the phrase, “Microsoft crashing”, as you struggle to use sync without dying a horrible, fiery death.

In the audio below, it took me a total of three minutes and thoughts of suicide to assign a simple destination using MS Sync. I was forced to take my eyes off the road several times to read numerous lists of possible voice matches for city, street name, and more. Every time you hear, “Please say a line number” in the recording, I’m actually reading through a list instead of watching where I’m driving. After answering nearly a dozen questions, I had to end up touching buttons on the console, and later the navigation system screen to finally set the destination and accept an “agreement” to drive safely and obey all traffic laws. So MS Sync is sort of a voice-button-screen hybrid input, which I’m pretty sure entirely defeats its purpose.

Read More

Do What Defines You

“Don’t ask yourself what the world needs. Ask yourself what makes you come alive and then go do that. Because what the world needs is people who have come alive.” – Howard Thurman

A friend of mine was going on about really knowing people; “people… are not defined by what they do”, he said. The point he was making was not to judge people by the cover of what they do in life. But the deeper point that he may not have realized, was the tragedy in the truth of that statement. How tragic it is that we aren’t defined by what we do. It seems to me that, given the finite amount of time we have to live and become, that we spend more of our lives thinking about what we want to do than actually doing it.

Read More

Bypassing iPhone 3G[s] Encryption

Bypassing Passcode and Backup Encryption:     http://www.youtube.com/watch?v=5wS3AMbXRLs Forensic Recovery of Raw Disk:     http://www.youtube.com/watch?v=kHdNoKIZUCw What Data Can You Steal From an iPhone in 2 Minutes?     http://www.youtube.com/watch?v=34f47m-lYSg These YouTube videos demonsrate just how easy it is to bypass the passcode and backup encryption in an iPhone 3G[s] within only a couple of minutes’ time. A second video shows Read More

Full Disclosure and Why Vendors Hate it

I recently did a talk at O’Reilly’s Ignite Boston party about the exciting iPhone forensics community emerging in law enforcement circles. With all of the excitement came shame, however; not for me, but for everyone in the audience who had bought an iPhone and put something otherwise embarrassing or private on it. Very few people, it seemed, were fully aware of just how much personal data the iPhone retains, in spite of the fact that Apple has known about it for quite some time. In spite of the impressive quantities of beer that get drunk at Tommy Doyle’s, I was surprised to find that many people were sober enough to turn their epiphany about privacy into a discussion about full disclosure. This has been a hot topic in the iPhone development community lately, and I have spent much time pleading with the different camps to return to embracing the practice of full disclosure.

Read More

MIT Spam Conference 2008 Concludes

The MIT Spam Conference concluded today with some great talks by various researchers in the field. I was particular sorry that I arrived late to miss Kathy Liszka’s talk on “Neural Networks for Image Spam”, as the tail end of it appeared very good. One thing I did notice that was quite refreshing about this Read More

Tales From the Apple Store

Last night marked a unique event in history. The Apple Store in Cambridge MA allowed me to come in through the front door and deliver a keynote to some 200+ people as they hosted the Mobile Monday Boston conference. In spite of the sheer chaos of fitting so many people into such a small store, and the generally poor acoustics of a mall, what the conference lacked in elegance was quickly made up for in quality of content.

Read More

The Ethics of Hacking

It looks like I missed the 1960s, but I’ve read that there were plenty of free drugs and free sex to go around. One thing that apparently wasn’t free, though, was telephone equipment. And behind all of the groovy things to do back then, the one thing nerds seemed to be more into than panty raids was having fun with the telephone networks. The digital telephone network was brand new, and so consumer ignorance was at an all-time high. This made for easy profiting – AT&T had made a killing by charging their customers not only for telephone service, but to pay usage and equipment rental fees for telephones, answering machines, and anything else you wanted to plug into your phone jack.

Read More

File Vault’s Dirty Little Secrets

File Vault is the encryption mechanism used to protect user accounts on Apple’s Mac OS X file system. While disabled by default, many people rely on file vault to protect their personal data. Many criminals, no doubt, also use file vault to encrypt content that would otherwise be incriminating. The security offered by an encrypted volume comes at a price – Apple’s closed source approach has left a significant amount of ambiguity about how the system actually works, and many erroneous assumptions have left holes for data to be recoverable. Among these misconceptions are the idea that raw data inside a vault cannot be accessed, and the erroneous belief that mechanisms such as Apple’s free space wipe will remove deleted data. This brief how-to shows you how to obtain a raw disk image from a file vault, and illustrates that deleted data can be recovered. It also shows that mechanisms like Disk Utility’s “Erase Free Space” option doesn’t affect the deleted contents inside a vault.

Read More

The Fallacy of the Prosperity Sermon

Countless sermons have been preached instructing people to give, and God will let you have the car you want, the house you want, and the life you want. Amusingly, my web logs indicate that this essay is found frequently by pastors Googling for prosperity sermons to preach on Sunday. It seems strange, though, that a people who profess to follow Christ are so anxious to convince the church that God wants them to be rich, when the Bible teaches no such thing – God has promised us no such prosperity, but only trials, tribulation, and possibly martyrdom. James teaches us that there’s something profoundly wrong with a miser, treating the notion of being rich as a sign of poor character in their lack of generosity. So are pastors just in error, wanting to see their congregation blessed in this consumer driven American culture, or are they preaching up promises of breakthroughs and finances because they know they’ll reap some of the benefits? In either case, Christians shouldn’t be so naive, given the role models we have in Jesus and the apostles.

Read More

Restoring the Beauty of the Didache

I’ve spent many late evenings over the past month translating and researching an intriguing early Christian manuscript called the Didache. Greek for teaching, this first century Greek manuscript reveals the life and heart of the early Church. It has been the center of much academic interest and controversy since its rediscovery in 1883. Prior to this, it was once thought lost to history, although many early church fathers including Athanasius, Rufinus, and John of Damascas cited the book as inspired scripture. It was also accepted into the Apostolic Constitutions Canon 85 and the 81-book Ethiopic Canon. Many early church fathers including Barnabas, Irenaeus, Clement of Alexandria, and Origen either quote or reference the Didache.

Read More

Embracing Senility

A friend of mine proceeded half way home with lunch in hand after being delayed four minutes by an old, senile man who insisted upon checking his sandwich order. Shortly thereafter, she realized that her own turkey sandwich lacked an all-important ingredient – namely the turkey. They say that it’s counterproductive to turn back once you pass the halfway-home marker, and so she did what any other ordinary American would do –

Read More

1 6 7 8