Nov 30 2010

Archive of our tweets for November 2010

[Continued from October 2010 tweets] No Gravatar

Vmyths archives its Twitter feed for historical clarity. If it went out via our “vmyths” account, you’ll find it here — along with any needed explanations, clarifications, corrections, and apologies. Co-founder Rob Rosenberger submitted all the tweets this month.

  • 1 November 2010
    1. RT @seanlawson RT @dangerroom: Packing Explosives In Printer Cartridges Fits Qaeda M.O. – does that make it a cyberattack? #cyberwar
    2. If airport security worked like antivirus security…terrorists would rule the skies
    3. Why did #Stuxnet hype flop? Fearmongers failed to encourage global ownership of the problem, e.g. “update your AV, hurry!”
    4. @pmoriarty Believe me (sigh) I know. –>#Stuxnet hype far from over if you deal w/ govt’ types
  • 2 November 2010
    1. Compare: Canadian teen hacker charged now vs. 10yrs ago
    2. A renewed plea for sanity re: #Stuxnet worm
  • 3 November 2010
    1. This graphic shows “cyber” groupthink vs. reality
    2. Why doesn’t U.S. ban air travel due to hacker threat? DO SOMETHING! thx @CodaCoder
    3. “Hundreds” feared dead in horrific #Myanmar #cyber attack (uh, computers, not people)
  • 4 November 2010
    1. #Cyber crime plummets 72.3%, spam drops 46.1%, as #USCYBERCOM reaches “full operational capability.” #spoof
    2. Will ICANN give .BU to Bulgaria now that Burma is “severed” from the Internet?
  • 6 November 2010
    1. There can be no true cyber-war until USAF issues “cyber AIBs” like they do aircraft AIBs
  • 7 November 2010
    1. Hype: watch for #Stuxnet allegories in NYC nuclear power plant explosion
  • 8 November 2010
    1. RT attritionorg RT @Ligatt: @marcwrogers u should no about failing. U have done it a lot! <– Evans drinking and tweeting from the work account again
    2. 1998: Pentagon hails childish “Solar Sunrise” as “wake-up call”; hits snooze button #Stuxnet
    3. @sansforensics Firesheep “a wolf in sheep’s clothing”? Wrong metaphor. Nice try, though.
    4. #FOIA reveals #USAF “accident[ally]” nuked email for 3wks in July when fumble-fingers deleted THE “Exchange” container!
    5. RT @silviabauer 250,000 female Basijis to receive military training “to prepare them for battle in the cyber war” #iranelection
  • 9 November 2010
    1. @CyrusShares Dude, if THAT qualifies as a “#cyber war,” I want to be an emBEDded cyber war correspondent!
    2. Responding to someone who figures those 250,000 Iranian women will inundate America with X-rated webcams.

    3. @LIGATT identifies “MyDoom” as the computer worm involved in pianist oil tycoon’s $6M ripoff #spoof
    4. Say “pianist oil tycoon, $6M extortion, computer virus” and reporters will beat a path to your door
    5. Pentagon insists we must build up for cyber-war. Is it a huge $$$ scam? #spoof
  • 11 November 2010
    1. RT @joshcorman RT @attritionorg: McAfee delivers F.U.D. <- It’s just a huge facade – literally
    2. “Gartner’s John Pescatore, clueless as ever” says @taosecurity. From 9yrs ago:
    3. @marylande agrees HYPE surrounds “$6M pianist oil heir virus”
  • 12 November 2010
    1. Watch a cartoon of my “conversation” with USAF’s top general re: “cyber wingmen”
  • 13 November 2010
    1. July 2010 #FOIA doc reveals #USAF nuked its own email system
  • 14 November 2010
    1. Re: “cyber-attacks, there seems to be a lot of sweeping statements and not a lot of clear thinking”
    2. Blame virus epidemics on anything EXCEPT the AV software that failed to do its job
  • 17 November 2010
    1. RT @rsingel Uh-oh. Somebody told Joe Lieberman about Stuxnet. Press office blasts about need to “DEFEAT ‘GAME CHANGING’ CYBER WORM.”
  • 18 November 2010
    1. Poor #Israel. #Symantec & Trend Micro offer analyses & free software to defend #Iran #nuclear fuel/weapon production.
  • 19 November 2010
    1. RT @peterkruse U.S. antivirus industry is Iran’s new “BFF”, (you have to love that approach!)
    2. HOW did #Symantec acquire a TS/SCI full-op #SCADA lab capable of analyzing the #Stuxnet #nuclear payload?
    3. When did #Symantec virus expert Eric Chien become a renowned “Q-cleared” #nuclear #SCADA expert?
    4. If #Symantec has a full-op #SCADA lab, it suggests they lied (not erred) in their #Stuxnet code acquisition timeline.
  • 21 November 2010
    1. Can’t get enough @vmyths? Check out the RSS feed & the (monthly-ish) newsletter at
    2. Former IAEA bigwig admits #UFO invasion “could be” why Iran can’t refine nuclear fuel #Stuxnet
  • 22 November 2010
    1. RT @gcluley Christmas Tree app virus hoax spreads on Facebook
  • 25 November 2010
    1. U.S. Air Force “combat coders” ready to fight North Korea #spoof
  • 26 November 2010
    1. Another sane commentary on #Stuxnet
    2. RT @phil_V3 Experts slam Stuxnet black market hype
    3. Media hails #Stuxnet as a “super weapon” … yet everyone wants to download it like a cool iPhone app. Which is it?
    4. “Should I download the #Stuxnet code, Rob?” Only IF you started building a personal virus library before 1992.
    5. RT @CodaCoder @vmyths OMG! Prepare yourselves! This could be the big one! (via @skynews #fail)
  • 27 November 2010
    1. RT @xDECAFB4D @vmyths both. I can haz super weapon on android?
    2. CARO learned the hard way: “Direction, NOT intention, led you to this destination”
  • 28 November 2010
    1. #LIGATT demonstrates horrible cut&paste skills #copyright
    2. Remember THIS when #WikiLeaks reveals Operation Aurora cables #China #hacking
    3. RT @seanlawson I agree. In the ongoing #cyberwar debate, “evidence” should always be in quotes. Silly critics, “evidence” is for kids!
    4. RT @J4vv4d You know how in movies cops are better at solving crimes after they’ve been suspended… well lets suspend a bunch of info security peeps!
    5. Expect #cablegate to renew Op #Aurora hype & attach it to #Stuxnet. This “meta-hype” ignites quickly, then turns to embers.
  • 29 November 2010
    1. @weldpond Just what we need: a tech solution (epoxy) to a human problem (intent) #kneejerk
      In response to a tweet that the Pentagon will stop future Wikileaks debacles “by disabling ‘write’ access to USB drives.” Short of encrypting the hard drive, deterrence must include a way to stop CDs & DVDs if you booted the system offline with a LiveCD.
    2. #Irony: a THIRD cyber-terror expert has been killed by physical terrorism
    3. Remember 1st cyber-terrorist killed by physical terrorism? #irony
    4. Remember 2nd cyber-terrorist killed by physical terrorism? #irony
    5. @ChetWisniewski Stop confusing “cyberwar” with “espionage”
    6. The “1st” and “2nd” tweets should read “cyber-terror experts.” I sincerely apologize. Twitter appeals to our haste & I got snared.
  • 30 November 2010
    1. #WhatIf #Stuxnet crew kills #Symantec guru Eric Chien, too, on his next trip abroad?

[Continued in December 2010 tweets]