Dan Andrews Knoxville Focus

Cyber Warfare Ticker Symbol

Saturday, September 27, 2014

South Doyle High School and what it means to me...

So earlier in the week my editor said to me "You can cover any game you want in Knox County Friday night, look over the list and get back to me." I immediately responded... "I'm going to South Doyle." The crowd is amazing and if I am going to be out on a Friday night, I want to be where the energy is. With the exception of the Farragut Admirals student section, I will be honest. I can't think of any school that is really blowing me away. Look, if you think I am wrong, prove me wrong, tell me to come to your school. Show me your passion for the game, the school name, and build your legacy like the vaunted South Doyle student section  is doing!
   Things got so crazy, so amazing, so awesome, that Commissioner Mike Brown got a picture with the student section and he was so pumped! Bragging and beaming showing the pride, and just so proud to be part of something so amazing!

Look, I live out in Concord, Tn. On the Knox/Loudon County. I am from New York, and for years I heard of the "legendary high school football fan base." However, I hardly ever saw it. I love the game of football. I love the game of sport. But most of all, as a photographer that covers everything from the White House to local barber shop ribbon cuttings, I love passion!!!! I love seeing people passionate, determined, I love taking pictures of energetic situations...That is what makes a good photo and to be honest that is what keeps me in business.

So, I conclude in my personal letter saying this. Why did I go to South Doyle? Well, I would rather travel almost an hour to cover a team/student section/ and community  that resonates with passion, pride, and energy, throughout the game...then attend a game 10-20-30 minutes away where the student section shows up...but the passion, integrity, and pride does not!

Post by The Knoxville Focus

Friday, September 26, 2014

Knoxville has a Seismograph reader somewhere in a Knox County Library


In the "you can't make this stuff up" category, it has come to the attention of the this investigative reporter that for some interesting reason, somewhere in a Knox County Tennessee Library, there is an earthquake reading machine!


I have reached out to  the Knox County Mayor's communication director Michael Grider, and he is looking into the matter.

On a side note, maybe Bigfoot does exist...and he is being kept in the room with the earthquake equipment...


Can journalists modify http://www.wheresgeorge.com/ to be an awesome encryption tool?

OK, I'm going to ask an interesting question...Can journalists use the website http://www.wheresgeorge.com/ to communicate via encryption? Think about it. A journalist can create an algorithm of their choice. Share the algorithm with with their source...then months down the road use their algorithm to write in code! Example both parties agree the algorithm will be set at the 5-8th dollar bill entered in on that day.  It seams kind of simple. Thoughts?

PS this is just an idea...it has not been tested...your on your own...I am not an expert!


Thursday, September 25, 2014

Sneaky tricks by the government to snoop on us?

OK, two thoughts. First, if any federal government knew of the Shell Shock Bash Bug and didn't do anything then they should be fired and jailed. Many researchers are calling this worse then the Heart Bleed bug!


So anyway, I think I might have virtually reversed engineered another interesting trick that spy agencies and hackers can play on the public using a "Faraday cage" device.

Check this out. So many brands love to advertise how well they protect against signal strength...but what if hackers, government officials, foreign espionage companies put m malware on your phone that when the phone completely disconnects, it goes into silent record mode?

Now let's all think about this a second. If someone places their cellphone in a Faraday cage, then they might have something to hide or keep secret. So when the phone gets disconnected from all forms of communication, it still remains on. So how east would it be to put malware on a phone that turns on recorder when all forms of signal strength rapidly hit zero? So the computer saves the conversation and when the product comes out of the Faraday cage... it simply rapid uploads the taped conversation to whoever.

So I am thinking the main work around for this is to almost make a soundproof box or test the recorder in the device you have. Place device in refrigerator...or get a Vysk....

I am not an expert so don't take this information as fact. Only as an idea open for discussion.

Wednesday, September 24, 2014

How to recover text messages

OK, so a lot of talk this week about when you delete a text, is it deleted? As many people know I have friends in the fashion industry and this question keeps on coming up. So let's see what we can find on the internet.

Great websites for Android with good technical advise.



For apple...

Again I am not an expert. Try at your own risk!

Tuesday, September 23, 2014

N.S.A. = Not Sticking Around

Well we have seen this coming for a while. With great minds like Gary Miliefsky over at http://www.snoopwall.com/ and Will Ackerly over at one of my favorite products https://www.virtru.com/ I see how true this article is from the Washington Post.


What we have going on right now is sort of what happened at www.nasa.gov. Many of the best and the brightest went over to SpaceX  and many of the best and brightest are still at NASA.  It is in my opinion what we will see with NSA and DHS. We will see certain companies get stronger and then.

So how does this effect journalists? NSA members can't speak to the media...CEO's of technology companies  can.


Monday, September 22, 2014

Fake cell towers and a possible work around...

So the fake cellphone towers have really gotten to me. I mean  so called secure phones really aren't as secure as one would hope. So I might have found an interesting work around to the problem. Use an Apple touch Ipod. Then get a service like Silent Circle, that allows an encrypted calling plan over voice over internet protocol. Then for added safety, get a Silent Pocket to ensure that you don't have remote start up...and then use clean wifi signals to make encrypted calls over the net. That way you avoid the base cell tower all together.  Also upgrade to the latest version of Apple.

Please note, I am not an expert on security. This is just a thought. Please use caution when implementing security protocol and go under the assumption nothing is safe.
Any thoughts?

Yesterday's encryption, just might have gotten you killed

OK, when I started this project, I thought it would be simple. Find a couple "White Hats" (the good guys) update the outdated information for internet security on the SPJ toolbox...and find a new project. Easy right? Heck no! First off, the technology game is changing everyday.  Second off, organizations that are supposedly protecting journalists might be harming them. Finally, we get told by certain "encryption privacy companies "no back doors for the government to get your information..." and then we read how rogue cell towers that are fake and pretty easy to make can scoop all your data.  To top it all off, we  as journalists are suppose to believe that Eric Snowden, who is literally on executive boards to protect journalists....is protecting journalists. Huh? Snowden said to use the Tor Project.  http://www.usatoday.com/story/tech/2014/03/10/tor-snowden-sxsw/6263157/  So how did that go? Not good... http://www.idigitaltimes.com/best-alternatives-tor-12-programs-use-nsa-hackers-compromised-tor-project-376976 But wait it gets better. Remember Snowden on TrueCrypt? http://www.wired.com/2014/05/truecrypt/

So who do you trust if your a journalist? You start out at "Journalist Zero." That is the point where a journalist trusts zero people including me.  I am not an expert in the field of encryption. I do not give advice. I look for advice from the smartest people and hope to make a difference. Plus experts in the field have been way off.  However, the good news is more and more people are crowd researching and making encryption and encryption ideas stronger. We are currently in Darwin's theory of survival of the fittest. Weak encryption is getting destroyed on the daily.
Plus weak security features are being challenged daily.

So here is what I am doing. I am searching for the best information ro give journalists on a daily basis. I am trying to sift through the hype and the real. What works and what doesn't.

I am trying to think outside the box.

I am trying to save lives. The lives of journalists and their sources.

Slowly but very carefully I have created a network of the most brilliant minds on the planet involving security. I have developed a list of  "White Hats."  I will do everything I can to protect our sources and our journalists.