The Gift of Fear

The Gift of Fear : Survival Signals That Protect Us from Violence: Gavin De Becker: 9780316235020: Books
(See online!)

Ever had a "gut feeling". Have you ever felt irrationally afraid of a person or a place? What if you learned that fear is a protective mechanism and that paying attention to it could save your life or the lives of your loved ones?

This book is all about intuition (though they call it fear). He doesn't offer any apologies, no theology, or theories, just the simple fact that intuition, whatever it is, exists. And if you pay attention to it, you can prevent some bad, bad things.

My favorite example from the book (paraphrased):

Say you're waiting for the elevator and when the door opens, there's a single man inside. For no reason that you can identify, you feel suddenly very afraid to get in the elevator. "That's stupid", you say to yourself. "I have no reason to be afraid of this person. I'm just being irrational."

Which makes more sense? To get into a sound-proof metal box with a stranger who makes you feel fear, or to wait for the next elevator and risk offending said stranger?

Learn why fear is valuable to protect your personal safety and that of the ones you love.

Tags: , , ,

Protecting The Gift

Protecting the Gift: Keeping Children and Teenagers Safe (and Parents Sane): de Becker
(See online!)

All parents face the same challenges when it comes to their children's safety: whom to trust, whom to distrust, what to believe, what to doubt, what to fear, and what not to fear. De Becker helps parents find some certainty about parents' highest-stakes questions:

  • How can I know a baby-sitter won't turn out to be someone who harms my child?
  • What should I ask child-care professionals when I interview them?
  • what's the best way to prepare my child for walking to school alone?
  • how can my child be safer at school?
  • How can I spot sexual predators?
  • What should I do if my child is lost in public?
  • How can I teach my child about risk without causing too much fear?
  • what must my teenage daughter know in order to be safe?
  • what must my teenage son know in order to be safe?
  • And finally, in the face of all these questions, how can I reduce the worrying?

What this book actually does is teach you how to listen to your intuition and stop living in denial. DeBecker found that many instances of child abuse by neighbors, babysitters, and dare care providers were preventable if the parents had just paid attention to the little signals.

For example what if the old man nextdoor starts giving your young daughter candy, but only if she'll kiss him on the cheek first. You say to yourself, "he's just lonely, it's harmless". But if you have to rationalize a behavior, that means you see something wrong! It's a real eye-opener and something I would highly recommend for all parents.

Tags: , , , ,

RFID – Radio Frequency IDentification

An RFID tag hidden under a label

An RFID tag is nothing more than a little chip attached to a paper-thin antenna. The chip's basic function is to store and transmit a small amount of information, usually just a unique identifier. What good is that? Well:

Pros

Though there hundreds of visionary and useful things you can do RFID, because they typically lack strong security controls there are serious risks that come with them too!

Cons

Don't underestimate how easy it would be to track and monitor people by the poorly-secured RFID tags they carry
(See online!)

Making RFID Safe

On the plus side again, RFID can help prevent infant abduction or hospital mixups.

RFID, like most technology, isn't something that can (or necessarily should) be stopped. Intstead, we need to harness and direct the technology to reduce the threat. To do this, we need to look at three risk aspects of RFID:

1. Poor authentication

One of the primary issues with RFID and the main thing that makes all the nightmare scenarios possible is that unsecured RFID broadcasts to anyone and everyone. For any implementation of RFID to be acceptable, the chips must be programmed only to speak to proper readers who authenticated themselves first.

For example, say you have a refrigerator that scans the food inside. When you put food inside, the fridge should program the food with a one-time code that makes it impossible for the chips in the packaging to respond to any other reader.

Think no one cares what the contents of your fridge are? Think again.

2. Poor (or no) encryption

Even after a chip authenticates a reader, if it sends the data out in the open, anyone else nearby (or not so nearby) can read it too. All communications between a chip and authenticated reader must be encrypted to prevent eavesdropping by others.

3. Use of Long-term RFID

Implantation is permanent. Passports are good for 10 years. Companies plan to replace UPC barcodes with RFID that will transmit ID codes for the life of the product (from creation to landfill and beyond).

Every RFID implementations will eventually be hacked by someone. All it takes is one person in the world to find a way to break the system and the security is no good anymore (like the millions and millions of pounds wasted with the UK passports). Secure implementations can slow it down or help, but the best defense is NO RFID.

I can't see implants ever making sense and you definitely want to be sure the products you wear and carry around can't be used to wirelessly communicate with the world around them.

Tags: , , ,

Out and About Defense

Let's just get your SSN, a few fingernail cuttings, an elbow-print, a sample of saliva, and fill out this form of all your deepest fears and personal secrets!
(Image is in the Public Domain)

Defending your information doesn't stop when you walk out the front door. How many times when you're at the store, at the doctor's office, or otherwise out and about does someone ask for your private information? Do you provide it? Should you? How can you know?

The defense is simply this: ask. Why do they want to know? What will they do with it? How do they protect it? Ask and depending on the answer, decide what to do. For example:

  • When I went to a new dentist, they asked for my social security number. When I asked, they claimed they needed it for insurance purposes, but a quick call to the insurance company confirmed that wasn't the case and I refused. They were able to put a random number instead and everything worked fine: I got service and they got paid.
  • I was once asked for my SSN at a video-rental store! Obviously they didn't need it for anything, but it made me wonder how many people provided it just because they were asked.
    Most stores will take the Jenny number for discounts and such
    (See online!)
  • Lots of stores have "club cards" or some kind of membership where you theoretically get discounts or they can pull up your purchase history for returns or some such nonsense. Depending on the specifics, I might sign up (leaving everything I can blank — which is usually a lot if not most of it), but sometimes I'll just give them a common phone number that someone else has already set up. Specifically your area code plus one of the following almost always works: 555-1212 (the number to general information) or 867-5309 (the Jenny number).
  • Electronic signatures are everywhere, but are you really comfortable giving companies yet another important piece of data to lose? The system isn't going to check what you put in (even if you draw funny or inappropriate pics instead) so it's up to you what to do in this case. If I were of a privacy mind, I might draw the first letter of my signature for myself (so I could tell later it was me who signed it) and then scribble the rest randomly.
Fun fact: I quite literally stopped the nurses at the birthing ward to ask them why they wanted a SSN on the admission paperwork while my wife was in active labor in the wheelchair behind me. Due to the impending baby, we agreed to handle the paperwork later (spoiler alert: they didn't need it either).

Summary

By being stingy with my data, I have avoided letting people put my information into yet another computer system and be at risk from abuse and hacking. It's not a 100% solution of course, but it costs me little other than some time and confused looks from employees who've never been challenged before. For my effort, my data is harder to find, harder to lose, and harder to exploit.

Exercise

Exercise by Nick Youngson - Alpha Stock Images
(Image used under: Creative Commons 3.0 [SRC])

This section doesn't lend itself well to exercises. Just be careful out there ok?

What you can do is check out the resources page (next in the guide) and make sure to click any remaining orange-colored dots next to the lessons in the guide. This will mark them complete and once all are so-marked, you will receive a course-completion badge in your profile. Congrats for making it through 🙂

Tags: , , , ,

Schneier Explains the Mind of Security Professionals

(Image used under: Creative Commons 4.0 [SRC][Mod])

Maybe now I can stop referring to myself as "paranoid" and just use the term "Security Professional" instead. In a Wired.com essay, Bruce Schneier writes how security professionals just think differently. While engineers try to figure out how to make things work, Security Professionals think about how to break them.

For example:

SmartWater is a liquid with a unique identifier linked to a particular owner. "The idea is for me to paint this stuff on my valuables as proof of ownership," I wrote when I first learned about the idea. "I think a better idea would be for me to paint it on your valuables, and then call the police."

And it's simply thinking in this way that would prevent a lot of bad products (like smart water) from ever being developed in the first place.

Tags: ,

Loading...

If you want to learn more about my professional background, click here to learn more.

Check out one of my guides/tutorials:

warranties Tutorial
|INDEX|next: Extended Warranties
First, always learn what coverage you get for free from the manufacturer.
When offered an extended warranty, make sure you understand the basics.
They want you to buy it, but is it as easy to use as they say?
Know beforehand what circumstances and terms put the purchase of a warranty in your favor
Once you need to use the warranty, make sure you know the steps to take.
Finally, learn why you should even bother with this mess.
Now it's time to make the decision of whether to buy or not.

... or check out any of my other guides and tutorials by clicking here!

Manufacturer Warranties

Products you purchase in the store almost always have warranties already. Depending on how good it is, you could be completely wasting your money buying an extended one when the default one will do.

[Click for full description]

Extended Warranties

What is an extended warranty and how do you know when you see one?

[Click for full description]

Surprise! You're Not Covered

If you're going to spend your money on a warranty, first consider all the factors.

[Click for full description]

Learning the Warranty Odds

Learn what important aspects of a warranty you need to look for to make sure you're getting a good deal.

[Click for full description]

How to Use Your Warranty

Once it's time to use your warranty, make sure you know how to navigate the system.

[Click for full description]

Warranty Successes

Read some examples of how I've personally used warranties in my favor over the years.

[Click for full description]

Warranty Decision

In the end, how do you decide whether to buy the warranty or not?

[Click for full description]