Tuesday, October 2, 2018

Do No Harm

- Based on the Painting “Nighthawks” by Edward Hopper


            I gingerly hold the warm cup in my hands and gaze into its darkness for answers.  Tonight, like every night, I only receive the reflection of an aging, nearly broke, and washed up doctor staring back at me.  Doctor, “HA! What a joke.” I think to myself.  I haven’t been a doctor since, wow, how long has it been?   Well if I’ve learned anything over the years, it’s don't use gold to buy silver, and not to trust people, even when you are trying to help them.  I sip my coffee with an audible ‘slurp’ and allow its warmth to coat my throat before the bitterness hits my taste buds.  The sign behind the counter reads “World’s Greatest Cup of Coffee”.  I silently disagree.
            Tonight, was a good night, I visit people who can’t afford a “real” doctor.  I saw: 3 common colds, 1 full-fledged bout of influenza, 1 dislocated shoulder, 1 pregnancy diagnosis and put in 4 sutures – at the same house.  It could have been 8, it should have been 8, but I only had enough thread for 4.  Poor Donald, the fight broke out when he accused his wife Shirley of having an affair with the mail man.  Another thing I’ve learned over the years, never accuse a woman of having an affair, while she is holding the dinner skillet in her hand. 
            Turns out Shirley is 3 months pregnant, which explains her lack of interest in poor Donald and her apparent moodiness.  It’s still hard to work with pregnant women and I will most likely delivery her baby in about 6 months.  I do what I can to help people who otherwise would get no medical treatment at all.  Counting the payments from tonight, I have $5.15 to my name.  Well, $5.10 after I pay for the “World’s Greatest Cup of Coffee”.  Sam suddenly appears from behind the counter as if by magic and asks me if I want a refill.  He begins pouring before I have a chance to answer.
            “What do you make about them taking all those ‘Japs’ to them inter-mitten camps?” Sam asks me. 
            I assume he is referring to the internment camps for Japanese people living in America.  Supposedly all the Japanese are spies, hell bent on destroying our way of life.  Or at least that is what our Government wants us to think.  Add to the fire, a few loud mouth politicians and this has turned into the battle cry many people have rallied behind, including our national news outlets. 
            I don’t want to start a debate with Sam over the issue of Japanese living in America.  One more thing I’ve learned; don’t argue with someone who has no place to be.  I have heard Sam talking to other patrons about the war and I feel he may have some misconceptions about the Japanese people.  In particular, the ones who left Japan many years ago and are now living in America.  “It’s tough to say who our enemy is these days,” I answer calmly, “but I would suppose most of the women and children they put in the camps don’t pose much of a threat to us.”  
            “Back when I was fight’n the Germans in the Great War,” Sam starts up, “we KNEW who we was fight’n and so did they.  Hey, Doc, I ever tell you about that night in Belleau Wood,” he pronounces it Baloo Wood, “When that KRAUT come wondering over to our lines drunk… as… a… skunk…”  The last four words he draws out in such a way, each word lasts longer than the one before it and with increasing emphasis, so by the end, the word Skunk starts with such a terrible hissing noise, I must cover my coffee with my hand.  Suffice it to say, it is music to my ears when suddenly the bell above the door rings happily announcing the arrival of another connoisseur of the “World’s Greatest Cup of Coffee”.  In fact, I have heard the story of the German Soldier who wandered into their camp those many years ago.  I have heard the story so many times, the facts have started to change a bit to the point, I am not sure Sam was ever really part of the battle Belleau Wood.
            I digress, Sam is a pretty good guy, so I try not to judge him too harshly.  Plus, he may suspect, and rightfully so, that I am not technically a doctor, but he keeps quite about it.  Sam has inquired once or twice about why I don’t get a job in a proper hospital, or open my own practice like Dr. Morgan did over on 97th  Place.  Usually my answers are vague and unmoving at best.  So, I keep my thoughts to myself, and embrace the sound of the bell welcoming our new guest.  Calm in the knowledge that Sam’s attention will be pulled away from a drawn out conversations with me about the First World War or the Second.
            I glance over my shoulder and notice it is not one, but actually two new patrons arriving.  It’s Frank “Hawk” Desoto and a girl I’ve never seen before.  I had always thought Maria, or Maria Elizabeth her family name, was Hawk’s girlfriend.  I see them in the neighborhood and she is sometimes there when I go into Desoto’s Grocery store down the block.  So this new girl is quite the enigma to me. 
            I get the impression Mr. Desoto expects Hawk to take over the store in a few years, however, I can tell by Hawk’s demeanor he has no intention of doing so.  Hawk has dreams of being someplace far away from Desoto’s Grocery and Sundries. 
            “Hi Ya, Hawk!” Sam exclaims in his jovial way.
            “Hi Sam.  This is my, friend, Ruth Goldman”, he says motioning to the girl by his side.   He glances at me when he says friend, with a look in his eyes saying, ‘don’t go telling people what you saw here tonight.’  I return his inaudible comment with a short nod as he and Ruth enter.
            Ruth is younger than Hawk, maybe late 20’s, possibly early 30’s, it is hard to tell with girls today.  She is skinny with red hair.  I use the term “red hair” rather loosely.  I can tell there is a good chance the color on her head does not come naturally and can only be found by an extended trip to the beauty parlor.  Ruth Goldman, Goldman is often an alias for Goldberg or Goldstein I think to myself.  Usually changed officially over time or by the courts, but sometimes people just change the spoken version.  Not to mention, she just looks Jewish, and really, who has ever heard of a red headed Jewish girl?  I don’t have a problem with any of this, but I do have a problem with her perfume.  It proclaims her arrival the way a herald announces the queen.  You know she is coming before you ever see her.  I have to stifle the tickle in my nose and blink a few tears from my eyes as they pass by behind me.
            I silently wonder if Mr. and Mrs. Desoto would ever be open to this little “bambolina” in their family.  I suspect not, which explains why Hawk only brings her to the neighborhood at this hour.  Hawk is with Maria because his family approves.  Maria Elizabeth is the type of girl you bring home to mom.  He is with Ruth because he approves.  Ruth is indeed prettier than Maria Elizabeth.  Maria is just a bit homely and more round in the middle than Ruth.  I, for one, appreciate the beauty of a woman with a fuller figure.  I seem to be becoming the minority in this, as I notice, thinner and thinner girls in the pages of magazine and in the shop windows.  Take Ruth for instance, Ruth’s hips look way too narrow for easy child birth.   Thinking about her child birthing hips makes me remember that fateful night.  I sometimes wonder if my patient was doomed from the start.  Maybe she just came from bad stock, she was skinny.  Maybe, she was never meant to have any children of her own, and I never should have tried to perform an operation I had only read about in college. 
            These days I see plenty of things visiting my patients at all hours of the night.  “So don’t worry Mr. ‘Hawk’ Desoto,” I think to myself, “I won’t say anything about seeing you with Ruth tonight.”  Not to mention, I would hate to see what a woman like Maria would do Hawk after being jilted like this, or worse what her father might do.  The whispers in the neighborhood say her father is good friends with Tony, who everyone knows has connections with Abe Reles of the infamous, Murder Inc.  Now with Abe gone Murder Inc. seems to be on the decline, but still I wonder who old Tony might be connected with now.  I stitched up poor Donald tonight, I don’t plan to be stitching up Hawk tomorrow, or worse.  I say the words “Primum Non Nocere,” to myself.   That’s Latin for, ‘First Do No Harm’, an oath I swore, and broke, within the first month of practicing medicine, but have tried hard to keep ever since.  Most nights I succeed, but sometimes I find myself wondering. 
            Sam’s voice snaps me back from my thoughts, “What are you two kids up to this late at night?”  Sam asks, as he sets two cups in front of our new cohorts and begins to pour the coffee without even asking if they want any. 
            “We just saw the movie Citizen Kane, the one everyone has been talking about.”  Hawk replies, while lighting a cigarette.
            “I just don’t get the ending.” Ruth interjects.  “What is Rosebud?  What does it even mean, Rose … BUUUUUUUUUD?”  She draws out the syllable bud, like the dying breath of Orson Wells, but much longer than is necessary.  “It ruined the whole movie for me.” She finishes.
            She sure is pretty, I think to myself, I hope it’s enough for Hawk.  My mind wanders again, please try to keep her out of sight long enough, so I don’t have to fix you up anytime soon.  I push my nickel across the counter as I stand and begin walking towards the door.  Looking at Sam, I point at the World’s Greatest Cup of Coffee sign and say “Keep up the good work, Sam.”
            “See ya tomorrow night Doc!” Sam calls after me. 
            I tip my hat, as I hear the jubilant jingle of the bells declaring my departure.  Pushing open the door I am greeted by a cool breeze covering me like a dark embrace.  Letting go of the door and stepping out I hear the bells behind me softly fade.  Then silence, but only for a moment.  When the moment is gone the echoes from a night many years ago take its place and the screams of a young girl dying during child birth become my only companion. 
            So, I begin my nightly journey into the abyss. 

Monday, February 5, 2018

Wind Cave Trail

Place: Usery Mountain Regional Park - Part of the Maricopa County Park System

Date: 2/3/18

Time: aprox 9:30 AM

Temperature: mild Mid 60s at the start.

Distance: aprox 3.5 miles from parking lot.

Elevation Gain: 808 Ft

Rating: Black Diamond 



 The Wind Cave trail is listed at 1.5 miles out (up) and back, although our Map My Ride / Hike listed it at closer to 3.5 miles round trip (and we were lucky and parked right near the bathrooms at the trail head.)

The hike starts out very mellow and easy with a very gentle upward climb.  You quickly enter through a zig-zag gate into the  Tonto National Forest where the majority of the hike takes place.

The scenery is very rocky with a lot of larger boulders of granite and some quartz, I believe - but I am not a geologist, so don't hold me to it.  But suffice it to say, they are pleasant to look at with deep reds and brown in color.

The hike is somewhat deceiving, because you never actually "Summit" the mountain that is ahead of you the whole time.  You get very close, but the Wind Cave is actually a cut out along the side of the shear cliffs all the way to the right hand side (South) if you are looking at the mountain, which by the way, is named Pass Mountain.   But don't let that keep you from going, it is still a great view and a fun hike.

Once you get going and start to make your way up the mountain is where the switch backs start, approximately half way into the hike.  These are not bad and make the ascent bareable, however on this particular Saturday it was somewhat crowded and being that we are not fast walkers or runners, we would tend to pull out and allow others to pass or let the hikers coming down go through, due to the fact the trail from this point on is usually narrow and two abreast is not usually possible.

There were two or possibly three spots where using your hands to scramble over a boulder or two is needed but no technical climbing is required.  Again, don't let this scare you off.  I am approx 275 lbs and my wife is 5' 2'' with bad knees.  Plus we got passed on the way up by a group who was being led by a gentleman who did not appear to be the poster child for healthy living and I overheard them discussing plans for his upcoming 70th birthday!

This brings me to quick side note: I did begin to feel a bit uneasy and light headed about 1/2 way up.  I had thankfully brought plenty of water and some snacks.  Taking a few breaks to eat some of the trail mix that I brought and drinking plenty of water, and I was able to continue on and felt fine after that.  So, like any hike, make sure you have plenty to eat and drink.  I most likely had been dehydrated from the night before.  I had some coffee and a very light breakfast, but I'm sure that was gone by the time we reached the base of the mountain.  

Billy goat path
After the switch backs the trail begins to hug the side of the cliffs and head due south along what I can just discribe as a small billy goat path.  This path is steep and has some drop offs, but I never felt unsafe or as though I was going to have an issue going across.  If you look at the picture to the left you can see what I mean.  There are other hikers farther up as well to give you some perspective.  Also not that the tree that is kind of dangling over the edge is part of the path and gives you some ample branches to hold on to as you pass on by.


This billy goat path basically takes you along the cliffs and slightly upward still to the final stopping place, Wind Cave.  As I mentioned, this is more just a cut out made by the wind I would imagine and not an actual cave.  We sat down and had a nice break at the top and ate some more of our snacks as well as replenished some of the water we had lost on the way up.  This entire trip took about 2.5 hours.  Below are a few more pictures from the hike and some of the wonderful views.

At the top!
Looking UP from the Wind Cave


Looking back along the path from top

You can see people sitting in the Wind Cave

'nough said

View from the top looking out







Update: 4/18/2018

I have recently learned, that the "Wind Cave" is not the END of the trail.  If you continue onward you can actually summit the mountain above the Wind Cave.  See the picture I posted of the wind cave looking up.   I believe you will basically end up there. 












Thursday, May 25, 2017

Part II: Defense Against the Dark Arts - or - How to Outrun My Slowest Friend

As you may recall this is Part Deux of my series.

You can find Part I The Hacker: Know Your Enemy, Know Yourself - here.

As you will recall from Part I, there are 4 Types of Hackers that we discussed:
1.  Just For Fun
2.  To Steal Something
3.  The Hacktivist
4.  The Disgruntled Employee

So, how can you defend yourself against these hackers?


... you only have to outrun your slowest friend.
The first two types are easier than the last two.  I like to use a "Bear in the Woods" analogy, for the first two.  No, not "If a bear poops in the woods when nobody is around, does it still make a sound?"  (yes I am aware that is not correct). 
I mean, that if you and your friends are being chased by a bear in the woods, you don't have to outrun the bear, you ONLY have to outrun your SLOWEST friend!  

If you apply this idea to security, it can go a long way.  What I mean is, you don't have to make your data so secure that nobody can get in, you just need to make it more secure than, well... your slowest friend.  In security term the only way to really secure a computer system completely is to disconnect if from any network and don't allow any users to touch it.  The most secure computer is one that is turned off.  We know this is not possible, so we have to be able to use our systems but also protect them

Any system can be broken into given the proper amount of time and computer power.  But most people don't have an unlimited supply of either one of those, so if at first you don't succeed?  Try to break into an easier system.  If a hacker just wants to try to grab some quick credit card data from your network, he or she will most likely try a few things to get in.  When their initial efforts come up empty, the hacker will often give up try to see if it is easier somewhere else.  Because unfortunately, there are more systems out there that are less secure.  You just outran your slowest friend. 

What about the Hacktivist and Disgruntled Employee?

There is no good way to protect your self against these types of attacks.    First, you don't know when, why or how you will be attacked by either of these two groups.  Also, a hacktivist or a disgruntled employee will usually not give up because it gets hard, although it certainly helps deter them.  Most will continue, until they are satisfied they have inflected some kind of damage.   So it is not so much about stopping this type of attack, but more about how to recover from an attack and that is not the focus of this blog.  --  Sorry!

Also, if you are being targeted by a type 2 hacker to steal some information specific to you, like the Target Data Breach, then they will try harder to get in.  Know Yourself!  What do you have that is worth stealing?

 How do I outrun my slowest friend? 

(or how to make my computer / network less attractive to hackers)

Here is a quick list of a few things you can do today to help protect yourself.

If you cannot do these things yourself, ask a friendly IT person for some help.  We usually respond well to bribes of alcohol, caffeine and sweets, not always in that order.  Seriously, many "tech savvy" computer types can do these things, but if you still have problems contact a professional. 

1. Changer your wireless router default passwords and network name.  (all default passwords should be changed - routers, printers, thermostats, etc.) 
  •   Don't use the default name and password that came with your AT&T / Comcast / Etc wireless router. 
  •   If you have any other connected devices, thermostat, refrigerator, etc.  Change the password.
2. Stop Broadcasting your  WiFi network name.  - You might have to get your IT person for this.
WiFi Password: L@rryM03&Curly
  •  You can still connect to your WiFi without telling the world it is there. 
  •  If a hacker doesn't see "Dewey, Cheatem and Howe Attorneys at Law WiFi" screaming at him when he drives past looking for open networks he may not take the time to investigate more.
  •  If you need to offer free WiFi to customers or guest, than make sure it is secure, and not part of your actual network that you do business on.  (IT person)  
    • I will do a separate blog just about Wireless Security
3.  Shut down your WiFi at night when you leave.
  •   Same principal as above. 
 4.  Make sure you have a Firewall in place.
  •   This one may take an IT person to help.. remember, the bribes mentioned above?
5.  Never click on a link in an email... ever....
  •   Not even the one that promises to be a funny kitten video... just don't do it!
6.  Institute a password policy
  •   Make it mandatory to change passwords often and try not to reuse your own passwords for multiple sites.  
  •   Check www.haveibeenpawned.com to see if your information is contained in any of the data leaks they have.  
  •   Try to make your passwords harder to crack by using  https://password.kaspersky.com/  
  •   I try to make my password take more than 7 days to crack with a standard computer, but for more sensetive information I try for the Century Mark or higher.
  •   * Password Tip *  Take a sentence that only makes sense to you.  "My kids are fun and we like to play catch in the yard on Saturdays."  NOW, take the first letter from each word - MkRf&wl2pcityoS!    You maybe able to see a few things I did there.  Replacing are = R, and = &, to = 2.  Just created a password that takes 4094 centuries with an average computer to crack.  
7.  Keep your computers up to date with patches and software updates.
  •   The recent WannaCry Ransomware outbreak is a good example of this.   
8.  Anti-Virus is important and a must have.
  •   Like most anything, the software is only as good as it's updates.
  •   If you have not updated your Anti-Virus in a while, it might not be protecting you very well.

In closing, please be prepared.  Start to think about security even if you are a one man shop, or a small business.  Most people say, "Why would someone want to steal my information?"   This is what the hacker wants you to think so you will let your guard down, or worse, never put a guard up.

I hope you have a better understanding of what is out there without being scared of your own shadow, but worried enough to take some action.

Next time we can discuss the ever popular... Ransomware!

References - Part I and Part II
Chaikivsky, A. (2016, October 24). How to Keep Your Devices From Joining a Zombie Botnet Army - Consumer Reports. Retrieved from http://www.consumerreports.org/privacy/how-to-keep-your-devices-from-joining-a-zombie-botnet-army/
Munoz, M. (2015, September 21). Cyber Security Case Study: Target Data Breach. Retrieved from http://www.cei.com/about-cei/media-room/blog/cyber-security-targets-2013-data-breach
Sunzi, & Giles, L. (2017). The art of war.

The Hacker: Know Your Enemy, Know Yourself

I wrote this as one long blog post, but felt, it might be too much, so I decided to break it into two smaller more manageable chunks.

Welcome to Part I -  The Hacker: Know your Enemy, Know Yourself   
Part II: Defense Against the Dark Arts - or - How to Outrun my Slowest Friend will be posted after this.

I have been working in the IT Industry for almost 20 years, and now I am studying Cyber Security and Information Assurance (CSIA).  I have learned a lot, most of which would bore many of you to the point of tears; suffice it to say, it has been an eye opening view into the world of cyber crime and the underworld of the World Wide Web. 

So I had an idea to create this blog post for my "non-techy" friends, who might have their own business, or manage a small to medium sized business.  Without trying to scare you too much I just want to say, "You are more vulnerable than you think, and most often you don't have very much, if any security in place."  You know this ... I know this ... And guess what?  Hackers know this.  I am not trying to sell you something, or tell you to rush out and hire security consultant, although if you want to hire me... you know where to reach me!  This is about learning what is going on in the world and finding a few simple, practical and lets say it, CHEAP, ways to better secure your information.

It was Sun Tzu that said, “If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know neither the enemy nor yourself, you will succumb in every battle.”  Well, we know ourselves, now let's learn a little bit about the enemy, the Hacker.

80s and 90s Hollywood Hackers

Today's Hollywood Hackers
Not the hacker that Hollywood has been portraying for many years, but the real deal.

So what is a hacker?

HACKER:

a person who uses computers to gain unauthorized access to data.
 
Sure, but we really need to look at the idea of WHO a hacker is and WHY they are doing what they are doing.

A hacker is someone who is trying to get into your computer or network without your knowledge.  The computer could be your laptop on a network at Starbucks or your desktop PC in your office, or today it could even be your DVR (Chaikivsky, 2016, para 3).  It doesn't matter what the device is, just he /she is not you and not authorized to use your computer or network.  

 

 

So, why are the hackers doing it?!?


1.) To See if They Can!  

Yep, no other reason.  It is a puzzle and they are trying to see if they can solve it.  Once they are in, they may tell you, so you can better secure your system.  Or they might not, most likely not, but they will leave most everything else alone and not bother anything.

2.) To Steal Something

Believe it or not, your have something worth stealing, even if it is just YOU.  Identity theft is a huge market on the Dark Web.  (we will get to the Dark Web some other day).  A hacker may want to steal Credit Card transactions, sensitive customer information, SSN and birth dates, or any number of other things that could be sold.  Personal Information = $$$

Another area that sometimes goes unrecognized is if you have a large client, a hacker might target you in order to steal information or gain access to the larger client.  This is exactly what happened in 2013 when millions of records were stolen from Target containing customer's data  "Access to the system came from network credentials that were stolen from an HVAC provider based in Sharpsburg, Penn" (Munoz, 2015, para 3).

3.)For a Cause

We usually call this person a Hacktivist.  They hack because they feel they are doing the world a service by doing so.  This makes them very dangerous because they believe their cause is just, and therefore don't feel the same level or remorse for doing something wrong, in fact, if you ask any of them, they would surely tell you that they "Did nothing wrong."  Often times you will hear the idea that "All information should be free."  Meaning that certain people or groups of people should not be allowed to hold secret information from others.  Like Top Secret FBI data, or information about on going NSA investigations.  The thought is that the ruling class should not be the only ones allowed to view information.  It should be "freed".  A.K.A. Hacked / Stolen and shared on WikiLeaks.

4.) For Retribution

This is cam be a disgruntled former employee, or soon to be former employee.  Like the Hacktivist this person is dangerous because, they are trying to cause as much harm as possible in retribution to something that was done or perceived done to them by a high level manager or a company in general.

- check out Part II to find out how to protect yourself. 

References
Chaikivsky, A. (2016, October 24). How to Keep Your Devices From Joining a Zombie Botnet Army - Consumer Reports. Retrieved from http://www.consumerreports.org/privacy/how-to-keep-your-devices-from-joining-a-zombie-botnet-army/
Munoz, M. (2015, September 21). Cyber Security Case Study: Target Data Breach. Retrieved from http://www.cei.com/about-cei/media-room/blog/cyber-security-targets-2013-data-breach
Sunzi, & Giles, L. (2017). The art of war.