Xbox Live Gold – Your time is past!

Xbox 360

I have an Xbox 360. I even like most of the games. I don’t play a lot and I almost never these days play with other folks online.

I enjoyed playing online when a bunch of guys I worked with would play pretty much every night. I don’t really like playing an online game with a bunch of people I don’t know.

Since Microsoft kinda screwed me with their damn “buy our credits” then converted those credits back to cash, then wouldn’t let me spend the cash that I had on account the way I wanted to spend that cash. I gave it some serious thought and decided I didn’t need to have an Xbox Live Gold thingy.

Xbox One

So bye bye!

Then I was looking at something else about the game consoles, and noticed something very interesting. PlayStation apparently doesn’t charge it’s users to have an account that provides those users the ability to spend money on sony products, services, and games.

Humm isn’t that interesting…

I have a number of xbox games. Many do not have PS4 equivalents but many more seem to be available on the PlayStation. Even the Xbox One until recently couldn’t… (more like wouldn’t) play the older Xbox 360 games. So if you wanted to upgrade your console there was no compelling reason to stick with Microsoft.

Xbox Live Gold

You know, I’ve got a BluRay player that’s dying I wonder if it makes sense to just replace that unit with a PlayStation 4.

When I cancelled the auto renewal of the Xbox Live Gold account @ a cost of $69 per year, Microsoft’s web site asked me why. I clicked the little button next to an answer like Not getting value based on the amount of play. I wonder if they’re listening or are they still thinking their outdated paradigm will give them more revenue?

I’ve notice that some of my friends are using Xbox One. I’ve noticed a more significant absence of my friends from the Microsoft gaming platform in its entirety.

I know most of those guys have PS4s too.

PlayStation4

I think they’re simply playing games on a system that’s at least equal if not superior to the Xbox 360 and Xbox One, where the cost of the games is the same and the long term cost is lower. If you’re like me and only play once a week or so you’d be better off with a free system, or a pay as you go kind of subscription. A lot of the guys are in the same situation.

It’s time for Microsoft to revisit the whole situation and remember that the gamers aren’t just cash cows.

Well I think I’m going to have “The Vapors”

Screen Shot 2015 06 18 at 4 10 21 PM

So sometimes I get all snarky, and sometimes the people I love respond in interesting ways.

I saw this headline from The Daily News  ‘White people are terrorists!’ Heckler yells at CNN during live broadcast in Charleston, calls Don Lemon an ‘Uncle Tom’

I grabbed the link and sent it off to a friend prefaced with

Well then, I guess we’re done with any attempt at living together!

Wow…

Barbarians 1987

What I got back was this…

Here’s the truth of it,

It’s a divided country… culturally, sexually, politically, in all ways. We are no more than the animals from which we descended. We’ve painted a thin veneer of “civilization” on top of the denial we have practiced for generations. As our country and culture ages, that veneer is being chipped away.

Now its nature’s way of saying, “Who the fuck do you people think you are?… Do you think you’re special?… Go fuck yourselves!”

If there is a god, it’s, “You’re here to amuse me, that’s it… go fuck yourselves!”.

So you wish you could run away to another country?… Riiiiight!… Won’t make no nevermind where you go.

Earth

There’s a storm approaching. There may be nothing left in the aftermath but 8 billion bloated meat puppets. We will have earned it.

Something is trying to tell the world, “You’re no more than children. And children often need to be reminded of the order of things.”

The view from 45,000 ft. is that of a world of primitive barbarians engaged in perpetual tribal warfare.

We need to adopt the same view from the ground… behave accordingly… and stop acting so fucking shocked and surprised.

Here’s your next blog entry.

And there you have it.

Easiest blog I’ve ever posted.


Then in a related story… There’s this

Woman calls for Race War at Scene of Church Shooting

Apparently this is the same woman that called Don Lemon an “Uncle Tom”.  Who says African Americans can’t be racists?

All I can say is this has either got to STOP… or BRING IT!  All the simmering hatred is like a festering pustule on the ass of the world, we either need to just pop it or heal it.

It doesn’t matter which direction we take, we can’t go on like this.

han oo fr clln n i hep oo ma me isih oosihebbb!

boredwomanonphone

han oo fr  clln n i hep oo ma me isih oosihebbb!

That’s what I heard when I called ADT this morning.

No, it wasn’t a bad connection. This was the speech pattern of the person that answered the phone.

It took me exactly 1 millisecond to hang up the phone. If I’d attempted to carry on a conversation with the young lady, I would not have been able to remain kind.

As it was in that millisecond, a sentence had formed in my head that went something like:

a ho

Young lady would you please remove that cock from your mouth while we’re on the phone? I know you’re a Ho but you shouldn’t be working both jobs at the same time.

I figured I’d better disconnect lest I have a replay of the Verizon conversation wherein I was labeled racist.

Since I’ve embraced my inner racism I’m not filtering racist comments too well. 

I have a tough time talking to someone who purposely works at making themselves hard to understand. It’s one thing to make accommodation for someone who’s fresh off the boat.

It’s quite another thing to be forced to make accommodation for a person whose family has been in this country for 200 years.

oldphone

I used to feel guilty about it.

NOW I feel like “I’m paying for your goods or services, the least you can do is put someone on the phone that speaks in a manner that is comprehensible.”

In this particular situation, I was going to be dealing with financial issues and I was in no mood to have that kind of conversation with someone that was at best poorly educated & at worst was an idiot.

YES! Boys & Girls, people judge you by the way you express yourselves.  OMG! It’s profiling!!!!!!

Yeah, SO WHAT? Get the fuck over it!

SkankyHo

After talking with my bank in Clear English, I called back and got a lovely lady who also spoke clear concise English. Our conversation cleared up the problem in 3 minutes and neither of us was annoyed by the encounter.

You know, the way it used to be… the way it’s supposed to be.

Old School, services paid for – services rendered.

In other words, the same transaction model a prostitute uses.

Here’s the difference between a Ho and Prostitute.

Classy

A Ho will suck your dick for $25, and you might even get off.

A Prostitute will suck your dick for $25 and she’ll act like she’s choking on it and it’s the biggest best thing she’s had in her mouth ever. That’s a pro, she’s looking to be remembered, wants you to feel like a stud, and wants repeat business with reliable clients. 

We need a lot more prostitutes in call centers!

OH Yeah, But CNN isn’t biased in any way…

Fredricka Whitfield

I’ve been catching the buzz about this “Journalist” all weekend.

By now you’re heard about the Dallas standoff. Some idiot apparently rolled up to the PoPo’s (Police) headquarters and started shooting.

That was bad enough but then you have this moronic bitch on CNN named Fredricka Whitfield calling the shooter courageous… Yeah you read that right THE SHOOTER!

“It was very courageous and brave, if not crazy as well, to open fire on the police headquarters, and now you have this scene, this standoff. So you believe these are the hallmarks of more than one person’s involvement?”

She’s apologized and no I’m not bothering to go searching for the full text of her apology because it doesn’t freaking matter.

prisonoutside

John Nolte at Breitbart wrote a scathing article yesterday that I think is right on point.  In the article he calls out CNN on their campaign of dishonesty and “race-mongering” Going back to St. Travon of the Hoodie.

I find myself asking WHAT THE LIVING FUCK?

First of all when did we declare war on the police? Second of all when did the police declare war on anyone else?

If after a proper LEGAL investigation you find have bad cops, fire them! It’s that simple. In our current environment we’ve got cops that are literally afraid to enforce the law.

You know, the LAW that a disproportionate number of African Americans seem to think they CAN break with no repercussions.

It’s real simple If I have to obey a law… SO DO YOU!

blackprisoners

If there is a disproportionate number of black people in jail then rather than saying that’s not fair… how about lets ask a simple question “Did this person break the law?” If the answer is YES then they’re right where they should be.

And by the way, as a supposedly “white privileged male” I’d expect no different treatment were I to break the law. Hell where I grew up they publish the pictures of the most wanted in the newspaper weekly.  Oddly, the most wanted is a pretty even mix of skin colors, even though it’s redneck central.

The Adult males in my life used to say, “Chain gangs take all comers, if you can walk, carry a shovel, or a trash bag they don’t give a shit what color you are.”

Perhaps that’s why I’ve been confused for quite some time by the claims that black folks are unfairly targeted.

Here are some examples that have confused me.

A car flys up behind me when I’m doing 80 and worrying about being pulled over. The car sits on my bumper for four heartbeats, before I can get out of this guy’s way he passes me on the right without signaling the lane change and accelerates away at 100. Two miles down the road he’s pulled over by the police. Sorry! That’s NOT TARGETING or profiling, that’s what happens when you do something so obvious that the police have no choice but to take action. You better hope you don’t have any outstanding warrants!

We watch the security video of a black man waving a gun in a convenience store, the gun goes off and the clerk is shot. Well Let’s see, Robbery, Compounded with a weapon, Bodily harm, and Murder charges if the clerk dies. Ummm as a “privileged white man” if it was me on the video, I know there is NO way I’m walking away from that.

The 18 to 20 year old black kid stepping in front of a line of people at a Taco Bell who then gets belligerent because someone IN the line says, “Hey, the back of the line is over there.”  That situation is bad enough, but when the kid throws a punch at the person calling him on his cutting in line, and that person happens to be an off duty cop… Well guess what? The Black kid is  going to jail for assault.

RachaelDolezal

Oh and by the way… I’m the lily white fucker that was laughing my ass off at you kid. Really? You didn’t notice that the fanny pack the guy you threw a punch at, looked like it weighed a lot? You didn’t notice the opening in the side of the fanny pack or that the guy was resting his hand on the edge of the pack when you stormed up to him?  Sweet thing, you deserve to be the bitch of someone with a 10 inch long beercan of a dick.

The next time you’re on a highway especially in Southern California, watch the cars that are speeding, weaving, and running up behind an 18 wheel truck only to slam on their brakes. Take note and I’ll bet ya you’ll see a disproportional number of black faces.

The point is, the disproportional number of black folks in prison are there because they caught the attention of the police. And that’s not unfair, it’s because actions have consequences.

The consequences of Fredricka Whitfield’s statement should be that she is fired! But she won’t be, because she is the most privileged of all folks in our society. She’s a black female public figure…

I guess that’s why Rachael Dolezal played the race card the way she did.

Thrilling! Thank you OPM!

OPMI kept hearing about the data breach at the OPM. I thought to myself, “no big deal,” because I’ve never been a government employee. But then one of the articles I read spoke about a particular form. The form number seemed familiar.

Out of curiosity I checked my encrypted drive.

AHHHH SHIT!!!!

Yep, that’s a form I filled out while I was working for a government contractor.

DAMN! Checking some of the other forms and sure enough! There’s a TON of information that I provided to my employer. I’m sure that that information got sent at some point to the OPM, and is now in the hands of the Chinese.

I’m sitting here looking at my encrypted volume that contains this information thinking a couple of things.

CybersecurityFirst, I’m wondering why I take the security of this information so seriously? Why is it that I’ve spent the money to secure my data and theirs (some of the information contained in the forms I filled out for them also contains information that relates directly to THEIR projects) and am mindful of what data I have “live” on my system and what data I keep in cold storage? Cold storage in my life is something (like a drive) that is archival, MUST be turned on or attached directly to my computer and is encrypted.

Second, If I can secure my data with COTS (Commercial Off The Shelf) software why can’t our government?

Third, Why is the United States Government data vulnerable in the first place? We KNOW the safest computers are computers which are not connected to a network. Granted, that’s impractical because the government must share data.

Hearings

BUT  it is possible to isolate critical subsystems. One way to do that, don’t allow employees to transport any data offsite. No USB memory sticks or other media, and laptops are available only to those employees who absolutely need mobility. Employees using those laptops have VPN access to the corporate systems and for the most part those laptops when connected to the corporate VPN are Terminals in the old school meaning of terminals. ie dumb as a rock.

The point I’m making here is that the need for computer & network security isn’t new.  So why the hell hasn’t our government kept up with the needs for security?

Having seen the way government contracts work, I have a guess.

redtape

Imagine a situation where a bunch of cooks get in the soup and specify all manner of equipment down to the smallest detail. Once finished,  the specification goes from committee to committee and after a year or two the spec is approved, money is appropriated and the funds become available.

Our happy IT guys call a government approved vendor of equipment, and are told that equipment isn’t available anymore. Or worse yet, the equipment or software can be purchased but now it’s a custom build and will be 50% more expensive than the original product and by the way have significantly fewer capabilities than current off the shelf products costing significantly less than the originally specified equipment or software originally sold for.

Old terminal

So in the one case the specification process starts over again. In the other case the “approved equipment” is less capable,  yet more expensive, than the machine a hacker in China purchased on the internet yesterday.

Rather than the committees addressing the fundamental problem in terms of appropriations and approvals they’re content to keep failing. Meanwhile the security of government systems continues to fall further and further behind.

This isn’t a partisan issue. Regardless of what the administration might say. This is an epic systemic failure on the part of an entity that has access to all of our private data. A.K.A The United States Government.

UNIVAC

How do you solve this problem?

The simplest way is to allow the IT people, The REAL IT people, not the morons that built the healthcare.gov site, say “we need a router and after figuring out which is the best unit for the money… They BUY IT!

That should go for a single router or a RACK of routers.

Does Dianne Freakin Feinstein have a clue about the difference between a CISCO and a Barracuda? NO!

So why are people like Feinstein reviewing and voting on these appropriations bills or worse yet wasting time and money having hearings about shit they’ll never understand, when they should be letting the professionals do the job? You can tell pretty darn fast if an IT dept. is pissing money away and a quarterly budget review (again by IT pros who know what’s needed and what it costs) would keep the expenditures in check and at the same time maintain security.

I’ve got another dose of BAD news for you dear reader…

JihadiHacker

The longer our leaders put off fixing the government IT infrastructure, the more expensive it’s going to be.

Think about putting off having your brakes fixed on your car.

Brake pads cost $45 a wheel, Brake ROTORS cost $1000 a wheel. Most of us average folks learn the hard lesson, it’s always better to spend the $180 rather than spending the $1180. We all learn it once!

We never make that mistake again unless we’re wealthy, elitist,  over-educated, dumbasses.

Unfortunately, most of our politicians are the latter kind of people not the former.


Update 2015 06 19

As more comes out about this breach, I think it’s clear that the government IT people are not up to the challenge.

Here is a line to an ars Technica article titled Encryption “would not have helped at OPM says DHS official”

Below is the article minus the video.


Encryption “would not have helped” at OPM, says DHS official

archuleta-opm-640x359

Office of Personnel Management Director Katherine Archuleta would be happy to discuss the particulars of the OPM brief with Congress—in a classified briefing.

CSPAN

During testimony today in a grueling two-hour hearing before the House Oversight and Government Reform Committee, Office of Personnel Management (OPM) Director Katherine Archuleta claimed that she had recognized huge problems with the agency’s computer security when she assumed her post 18 months ago. But when pressed on why systems had not been protected with encryption prior to the recent discovery of an intrusion that gave attackers access to sensitive data on millions of government employees and government contractors, she said, “It is not feasible to implement on networks that are too old.” She added that the agency is now working to encrypt data within its networks.

But even if the systems had been encrypted, it likely wouldn’t have mattered. Department of Homeland Security Assistant Secretary for Cybersecurity Dr. Andy Ozment testified that encryption would “not have helped in this case” because the attackers had gained valid user credentials to the systems that they attacked—likely through social engineering. And because of the lack of multifactor authentication on these systems, the attackers would have been able to use those credentials at will to access systems from within and potentially even from outside the network.

House Oversight Chairman Jason Chaffetz (R-Utah) told Archuleta and OPM Chief Information Officer Donna Seymour, “You failed utterly and totally.” He referred to OPM’s own inspector general reports and hammered Seymour in particular for the 11 major systems out of 47 that had not been properly certified as secure—which were not contractor systems but systems operated by OPM’s own IT department. “They were in your office, which is a horrible example to be setting,” Chaffetz told Seymour. In total, 65 percent of OPM’s data was stored on those uncertified systems.

Chaffetz pointed out in his opening statement that for the past eight years, according to OPM’s own Inspector General reports, “OPM’s data security posture was akin to leaving all your doors and windows unlocked and hoping nobody would walk in and take the information.”

When Chaffetz asked Archuleta directly about the number of people who had been affected by the breach of OPM’s systems and whether it included contractor information as well as that of federal employees, Archuleta replied repeatedly, “I would be glad to discuss that in a classified setting.” That was Archuleta’s response to nearly all of the committee members’ questions over the course of the hearing this morning.

At least we found it

Archuleta told the committee that the breach was found only because she had been pushing forward with an aggressive plan to update OPM’s security, centralizing the oversight of IT security under the chief information officer and implementing “numerous tools and capabilities.” She claimed that it was during the process of updating tools that the breach was discovered. “But for the fact that OPM implemented new, more stringent security tools in its environment, we would have never known that malicious activity had previously existed on the network and would not have been able to share that information for the protection of the rest of the federal government,” she read from her prepared statement.

Dr. Ozment reiterated that when the malware activity behind the breach was discovered, “we loaded that information into Einstein (DHS’ government-wide intrusion detection system) immediately. We also put it into Einstein 3 (the intrusion prevention system currently being rolled out) so that agencies protected by it would be protected from it going forward.”

But nearly every question of substance about the breach—which systems were affected, how many individuals’ data was exposed, what type of data was accessed, and the potential security implications of that data—was deferred by Archuleta on the grounds that the information was classified. What wasn’t classified was OPM’s horrible track record on security, which dates back at least to the George W. Bush administration—if not further.

A history of neglect

During his opening statement, Chaffetz read verbatim from a 2009 OPM inspector general report that noted, “The continuing weakness in OPM information security program results directly from inadequate governance. Most if not all of the [information security] exceptions we noted this year result from a lack of leadership, policy, and guidance.” Similar statements were read from 2010 and 2012 reports, each more dire than the last. The OPM Office of the Inspector General only began upgrading its assessment of the agency’s security posture in its fiscal year 2014 report—filed just before news of a breach at a second OPM background investigation contractor surfaced.

Rep. Will Hurd (R-Texas), a freshman member of Congress, told the OPM executives and the other witnesses—DHS’ Ozment, Interior Department CIO Sylvia Burns, the new US CIO Tony Scott, and OPM Assistant Inspector General Michael Esser— that “the execution on security has been horrific. Good intentions are not good enough.” He asked Seymour pointedly about the legacy systems that had not been adequately protected or upgraded. Seymour replied that some of them were over 20 years old and written in COBOL, and they could not easily be upgraded or replaced. These systems would be difficult to update to include encryption or multi-factor authentication because of their aging code base, and they would require a full rewrite.

seymour-opm-640x359

Enlarge / OPM CIO Donna Seymour said that systems couldn’t simply have encryption added because some of them were over 20 years old and written in COBOL.

Personnel systems have often been treated with less sensitivity about security by government agencies. Even health systems have had issues, such as the Department of Veterans’ Affairs national telehealth program, which was breached in December of 2014. And there have been two previous breaches of OPM background investigation data through contractors—first the now-defunct USIS in August of last year, and then KeyPoint Government Solutions less than four months later. Those breaches included data about both government employees and contractors working for the government.

But some of the security issues at OPM fall on Congress’ shoulders—the breaches of contractors in particular. Until recently, federal agents carried out background investigations for OPM. Then Congress cut the budget for investigations, and they were outsourced to USIS, which, as one person familiar with OPM’s investigation process told Ars, was essentially a company made up of “some OPM people who quit the agency and started up USIS on a shoestring.” When USIS was breached and most of its data (if not all of it) was stolen, the company lost its government contracts and was replaced by KeyPoint—”a bunch of people on an even thinner shoestring. Now if you get investigated, it’s by a person with a personal Gmail account because the company that does the investigation literally has no IT infrastructure. And this Gmail account is not one of those where a company contracts with Google for business services. It is a personal Gmail account.”

Some of the contractors that have helped OPM with managing internal data have had security issues of their own—including potentially giving foreign governments direct access to data long before the recent reported breaches. A consultant who did some work with a company contracted by OPM to manage personnel records for a number of agencies told Ars that he found the Unix systems administrator for the project “was in Argentina and his co-worker was physically located in the [People’s Republic of China]. Both had direct access to every row of data in every database: they were root. Another team that worked with these databases had at its head two team members with PRC passports. I know that because I challenged them personally and revoked their privileges. From my perspective, OPM compromised this information more than three years ago and my take on the current breach is ‘so what’s new?'”

Given the scope and duration of the data breaches, it may be impossible for the US government to get a handle on the exact extent of the damage done just by the latest attack on OPM’s systems. If anything is clear, it is that the aging infrastructure of many civilian agencies in Washington magnify the problems the government faces in securing its networks, and OPM’s data breach may just be the biggest one that the government knows about to date.


<END>