[ale] I have fallen in love with Truecrypt

Greg Freemyer greg.freemyer at gmail.com
Fri Feb 11 09:05:24 EST 2011


Jerold,

You're a professional sys admin.

Whether you like it or not, today that means you are part of America's
counter-espionage team.
Yes, you are a spook's spook!

So assume the bad guys crack your network and steal your login /
password.  (Sys admin login/password is a much sought after goodie.)

Next assume they are willing to invest many man months crawling around
your network and getting to know it better than you do.

What corporate assets do you have privileges to that you don't want
them to have?

1) Anything you have related to security config in general.

2) Network / server config docs.

3) Specific intrusion / remediation details. Especially if a peer at
another company gave it to you.

Lots and lots more.

Greg



On 2/11/11, Jerald Sheets <questy at gmail.com> wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> I have to ask...  What are you guys *doing* that you all need encryption to
> this degree?
>
> I have like thirty files and a password store that need encryption, and on
> occasion I have to send encrypted email to a missionary in red China.
> That's it.
>
> I fell like I've fallen in among spies!
>
> #!/jerald
> Linux User #183003
> Ubuntu User #32648
> Public GPG Key:  http://questy.org/js.asc
>
> - -----BEGIN GEEK CODE BLOCK-----
> Version: 3.1
> GIT/MU d-@ s++(++)>+++:> a+ C++++(+++)$>++ UBLAVHSC++(on)$>++++
> P++(+++)$>++++ L++(++++)$>+++ !E---(---)>--- W+(++)$>+++ N(+)$>++ !o !K--
> w(--)>--- O()@> M++(++)$>++ V()>- PS+++()@>-- PE(++)@>+ Y+(+)@>+
> PGP++(++)$>+++ t+(++)@>+++ 5(+)@>+ X+(++)@>+++ R+(+)@>++ tv-(+)$>++
> b+++(++)$>++ DI++++(++)>+++ D++(++)@>++ G++(++)@>++ e++(++)$>++ h(-)$>-
> r+++(+++)@>+++ y+(+++)>++++@
> - ------END GEEK CODE BLOCK------
>
>
>
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.4.11 (Darwin)
>
> iQEcBAEBAgAGBQJNVTmSAAoJEAek0rkZiSvc9ysIAJKZyw2DiEDpI26SDQz2faup
> rfKKf3sQrVfSzt0lM0ct6BEmr+e3n1RdYAZRqnRj6+ccB7J/PsiDTTgyVt5s3Vex
> S46T3YTSjnK926g90Jh8caAErPbhI4FNwKRDC5JztuIHcf/NP4Y4dp+mOrBL7OZ6
> 7D2EMK8HsqkwdlcR/Xc4Sg/z6c0FeuIh23BrHkmPAvh/hGhYYoISaYd2rZF/NeJe
> 0X/VGPTlMOo3TAzlx5inUl9faAnq1f1+VFo0orqpoEjRtomCN2+f2PAF4iq0ffeI
> kin4hSA2Z+B/DbdVAn73ATVwZwYC1FVF8DkrsBD16LQ72k/GpFLnhEcApU9UmbM=
> =0Lcp
> -----END PGP SIGNATURE-----
>
> _______________________________________________
> Ale mailing list
> Ale at ale.org
> http://mail.ale.org/mailman/listinfo/ale
> See JOBS, ANNOUNCE and SCHOOLS lists at
> http://mail.ale.org/mailman/listinfo
>

-- 
Sent from my mobile device

Greg Freemyer
Head of EDD Tape Extraction and Processing team
Litigation Triage Solutions Specialist
http://www.linkedin.com/in/gregfreemyer
CNN/TruTV Aired Forensic Imaging Demo -
   http://insession.blogs.cnn.com/2010/03/23/how-computer-evidence-gets-retrieved/

The Norcross Group
The Intersection of Evidence & Technology
http://www.norcrossgroup.com


More information about the Ale mailing list