Friday Squid Blogging: US Naval Ship Attacked by Squid in 1978

Interesting story:

USS Stein was underway when her anti-submarine sonar gear suddenly stopped working. On returning to port and putting the ship in a drydock, engineers observed many deep scratches in the sonar dome’s rubber “NOFOUL” coating. In some areas, the coating was described as being shredded, with rips up to four feet long. Large claws were left embedded at the bottom of most of the scratches.

As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered.

Posted on May 23, 2025 at 5:02 PM33 Comments

Comments

Clive Robinson May 23, 2025 8:53 PM

@ Bruce,

This is not the first time Navy vessels have been attacked by large marine creatures.

Although they sound like “mysterious tales” wooden vessels in particular have been attacked by whales, orca, squid and similar.

The attacks have been put down to “feeding” in that “jetsam” of waste etc attracts a hierarch of creatures and “feeding frenzies” can arise. Commercial fishing vessels like trawlers get to see such things occasionally.

But “submarines” have been known to run into not just fishing nets, but “biologics” as well and some have given whales a nasty surprise such as during the Falklands War (apparently three were torpedoed).

The fact is many submarines when submerged move at very slow speeds as part of the measures to avoid detection by enemy vessels and this means that “biologics” can surround them, the crew would be aware of them in general but not specifically what has been hit.

We know that aircraft have “flown into mountains” and the results have mostly been catastrophic. But it is known that a submarine has hit a “seamount” and survived. It happened Jan 8th 2005 to the USS San Francisco,

https://www.popularmechanics.com/military/navy-ships/a24158/uss-san-francisco-mountain-incident/

So if a sub of this type was to hit a whale it’s reasonably certain it would survive, the whale or other large marine creature not so much.

AlexT May 24, 2025 3:44 AM

Wasn’t there a Russian (or Soviet) sub almost lost after a full speed collision with a whale ?

Clive Robinson May 24, 2025 4:55 AM

@ AlexT,

With regards,

“Wasn’t there a Russian (or Soviet) sub almost lost after a full speed collision with a whale ?”

So the “Cold War” story goes…

But it was never officially confirmed so as was oh so common of those times “It never happened”…

Remember it was a different time with the Kola Peninsula incident becoming confirmed because of a summit between Clinton and Yeltsin. And a couple of decades earlier in Nov 74 there was “the kiss at Holy Loch”,

https://history.scot/us-and-soviet-submarines-crash-in-scottish-waters/

That only got confirmed because “diplomatic cables got leaked”.

A lot of this went on in the “cold war” and later with the “Atlantic Gateway” in the North sea with Norway being the geographic center of much that went on stretching up to Iceland and the North Pole and round into the Barents Sea.

The official history of GCHQ mentions the intelligence war with UK vessels carrying out “intelligence gathering” of many forms. It was probably more dangerous than has ever been acknowledge with the lives of hundred if not thousands of mariners lost and officially unacknowledged.

But even Russia eventually confirms some stories,

https://www.themoscowtimes.com/2019/07/03/the-deadliest-submarine-accidents-in-soviet-and-russian-history-a66263

ResearcherZero May 24, 2025 4:56 AM

Whales need to get rid of barnacles and submarines look like a good scratching post. Boats are too noisy and often traveling at higher speeds or parked in inappropriate places. Not to mention that boats and submarines rarely adhere to normal seafaring behavior that has been established over the last 500 million years, apart from sinking and decomposition.

UNC5221 are penetrating U.S. government agencies using Ivanti flaw.

‘https://blog.eclecticiq.com/china-nexus-threat-actor-actively-exploiting-ivanti-endpoint-manager-mobile-cve-2025-4428-vulnerability

The Linux malware Auto-Color hooks functions in libc to hide activity.
https://unit42.paloaltonetworks.com/new-linux-backdoor-auto-color/

Another Chinese group UAT-6382 is targeting U.S. local government bodies using a zero day.
https://blog.talosintelligence.com/uat-6382-exploits-cityworks-vulnerability/

Clive Robinson May 24, 2025 11:31 AM

@ Bruce,

In the UK there has just been a couple of cases of legal representatives “up for sanction” for using AI to prepare briefs.

The defence given by one would kind of sound preposterous to someone who does not understand what has happened on the technology side of the curtain.

That is they said they were unaware they were using AI, as they had been using Google Search, as they did not at the time have access to the formal on-line legal databases.

As Corry Doctrow has pointed out Google is the king of “enshitification” with their search engine now barely worth the sack the crap gets shifted in.

Further as is now becoming obvious to the more astute investors there has been billions if not trillions sunk into AI and in some areas of enquiry the “Soft Bullshit / Hallucination” is creeping ever closer to 50% of the output.

With one major AI investment having just imploded into bankruptcy despite their excuses some will see it as the windvain moving adversely and the barometer changing from fair weather to foul and the whole AI journey now sailing into very stormy waters.

So it’s recognised that the AI donkey is going to get not just overloaded but whipped into the ground, as some try to recover lost investment and try to keep the boat afloat.

But you are going to think “Only in the UK” some very senior judges who have obviously not had sufficient oversight are now suggesting AI would be a good way to reduce the court system backlog… Which with those hallucinations on their way to approaching 50% does not at all bode well for the citizens, the judiciary, or the legislating politicians. As for society in general what do people think will happen when society can nolonger trust the legal process?

Anyway you can see more,

https://m.youtube.com/watch?v=WPDCDf262PQ

not important May 24, 2025 7:08 PM

Can Donald Trump build the ‘Golden Dome’ over the US?
https://www.bbc.com/news/articles/cyvmj6mem70o

=Even a single, relatively small nuclear detonation hundreds of miles above the heads of Americans would create an electromagnetic pulse – or EMP – that would have apocalyptic
results. Planes would fall out of the sky across the country. Everything from handheld
electronics and medical devices to water systems would be rendered completely useless.

Among the threats publicly identified by US defence officials are hypersonic weapons able to move faster than the speed of sound and fractional orbital bombardment systems – also called Fobs – that could deliver warheads from space.

Golden Dome will build on existing systems that are largely aimed at traditional ICBMs. A new system would – add multiple layers that could also detect and defend against cruise
missiles and other threats, including by intercepting them before they launch or at the various stages of their flight. =

AlexT May 24, 2025 11:43 PM

But it was never officially confirmed so as was oh so common of those times “It never happened”…

Supposedly some remains of the whale are on display in the Severomorsk mess hall… Never visited:)

ResearcherZero May 25, 2025 12:43 AM

@not important

A better funded weather service that had the capability to consistently monitor wind speeds surrounding the entire U.S. border at all altitudes would be required to have any hope of intercepting long-range missiles and intercept prior to the engagement of counter measures.

As that is not happening, one assumes that it is vanity project made up of follies dotted about to look like a functioning missile system. The same effect could be achieved by commissioning artists to produce installations made from flood waste and detritus. It is unlikely that a trillion U.S. dollars would be approved if it was declared an art project.

A certain level of creativity is required to distract from the state of services that are taken for granted and the impact on the economy when it begins to contract. Regular PR announcements about the jobs created by Golden Dome – pushed to news outlets – will replace any stories about job losses and unaffordable price hikes. People will eat less, shop less, and find cheaper ways of entertaining themselves. Perhaps AI generated missile test videos.

Someone is building a honeypot by exploiting thousands of internet facing devices.

‘https://blog.sekoia.io/vicioustrap-infiltrate-control-lure-turning-edge-devices-into-honeypots-en-masse/

ResearcherZero May 25, 2025 12:47 AM

Big fat database containing government credentials and other sensitive information.

‘https://www.websiteplanet.com/news/infostealer-breach-report/

A Chinese affiliated actor is spraying M365 accounts using info-stealer logs.
https://securityaffairs.com/174595/cyber-crime/large-botnet-targets-m365-password-spraying-attacks.html

bypasses modern login protections and evades MFA enforcement

‘https://securityscorecard.com/wp-content/uploads/2025/02/MassiveBotnet-Report_022125_03.pdf

Clive Robinson May 25, 2025 1:14 AM

@ AlexT,

The interesting thing about that “never officially confirmed” thus “never happened” is it’s “poisoned the Internet”…

We know surface ships and whales do collide from time to time and usually the whale comes of worst. The reason we know is the vessel damage gets put in reports for the likes of insurance claims.

So it would be quite likely that submarines and whales would collide very occasionally as the number of subs at sea in the world is a tiny fraction of the number of ships.

So I think it likely as there were submarines quite active in both WWI and WWII that over a century in time there has been one or more collisions between whales and subs.

BUT as there are no large submarines at sea that are not “military” the “never confirm or deny” attitude in “official sources” involving military activities gives people the opportunity to say things that misrepresent…

If you run a search with Google or Bing you will find web sites that use these “official lack of comment” replies as a way to say,

“There never has been a collision between a whale and a submarine.”

or equivalent. Such that quite a few people would believe it…

Now both you and I know that all things being equal that it is “probable” a collision has happened BUT been kept “secret” to avoid embarrassment[1] or as some would put it “Incoming from tree huggers at six o’clock!”.

Many humans can take such statements,

“With a grain of salt the size of Lot’s Wife”.

But as Mark Twain was alleged to have said “A lie will have run halfway around the globe before the truth has got it’s boots laced” (or similar)…

So some will read it as “never can happen” or similar and won’t question it.

But further consider current AI LLM and ML systems[2] that ingest uncurated articles from the Internet… Because they appear authoritative, then resultant AI-slop aping it, will be put back on the Internet to be slurped up again…

So driving a “tail spin of doom”.

[1] I assume you’ve seen the cartoons of a tortoise and a military helmet with a caption indicating that the tortoise was a myopic male trying to satisfy a primary urge? Well imagine that sort of cartoon but sort of in reverse. That is of a whale with a sub behind with a title like “Wham bang sorry ma’m” or similar appearing in a daily newspaper it would be “a political nightmare” of “Navy Chiefs”…

[2] I really should start calling current AI LLM and ML Systems,

“The great echo chamber of our times.”

And see how long before it becomes an “AI Fact” 😉

ResearcherZero May 25, 2025 1:37 AM

Probably a good time to review security and credentials…

Nation state actor targeting app credentials in cloud services.

‘https://www.cisa.gov/news-events/alerts/2025/05/22/advisory-update-cyber-threat-activity-targeting-commvaults-saas-cloud-application-metallic

07 Sep 2023

How Storm-0558 compromised a Microsoft engineer’s account and stole an MSA key…
https://www.techtarget.com/searchsecurity/news/366551281/How-Storm-0558-hackers-stole-an-MSA-key-from-Microsoft

Storm-0558 obtained a list of all the State Department’s email accounts.

Microsoft admitted a litany of security failures allowed Storm-0558 to steal 60,000 emails from 10 state department accounts which mostly covered East Asia and Pacific diplomacy.

‘https://homeland.house.gov/wp-content/uploads/2024/06/2024-06-13-HRG-Testimony-Smith.pdf

Other Storm-0558 targets included two dozen organizations including European entities and private companies, with at least another 15 email accounts exposed during their campaign.

The targeted spying campaign also affected the UK and other unnamed foreign governments.
https://www.microsoft.com/en-us/security/blog/2023/07/14/analysis-of-storm-0558-techniques-for-unauthorized-email-access/

additional information – (the 2016 MSA key was intended to be retired in March 2021)

‘https://www.cisa.gov/sites/default/files/2025-03/CSRBReviewOfTheSummer2023MEOIntrusion508.pdf

ResearcherZero May 25, 2025 2:41 AM

This is what American’s can look forward to as states are forced to take up the responsibilities of federal government.

Farmers and rural residents make up the volunteers for emergency services and fire fighting/management in regional communities. State fire and emergency services will now be funded by an extra levy charged alongside rates. The new tax will be double its predecessor. It’s a kick in the guts for people who voluntarily protect communities!

‘https://www.abc.net.au/news/2025-05-20/emergency-services-levy-protest-victoria-state-budget/105309740

“some farmers were facing bill increases of $40,000”

https://www.abc.net.au/news/2025-04-03/victorian-farmers-angry-at-government-changes-fire-services-levy/105126550

Winter May 25, 2025 6:28 AM

ResearcherZero

The new tax will be double its predecessor. It’s a kick in the guts for people who voluntarily protect communities!

Lower taxes generally means more payments individually.

ResearcherZero May 25, 2025 6:26 PM

A mislead belief of invulnerability for an extraordinary price.

The Nuclear Trident was tweaked over many decades to reduce the risk of escalation due to spillover. Golden Dome threatens to heighten an arms race and raises the risk of escalation in the event of mistake.

‘https://theconversation.com/trumps-proposed-golden-dome-missile-defence-system-an-expert-explains-the-technical-challenges-involved-257473

A shield creates an impression of strike capability with impunity.
https://www.warquants.com/p/gone-mad-how-golden-dome-threatens

Reverse-cowboy SDI spending miscalculation …70x the spending of an adversary with every warhead still having a 50-50 chance of reaching the U.S. mainland.
https://aerospaceamerica.aiaa.org/features/golden-dome-smart-strategy-or-risky-business/

Winter May 25, 2025 7:09 PM

@ResearcherZero

The U.S. economy is not growing fast enough to meet debt obligations.

The US debt is denominated in US $. If they cannot be refinanced, the dollar “press” will run to inflate the debt away (currency devaluation), or the US will simply default (Argentina style).

It seems the Most Stable Genius has drawn up an even more brilliant plan, the mar-a-lago accord.
‘https://www.nordea.com/en/news/mar-a-lago-accord-explained-a-new-era-for-the-dollar

It means the dollar will weaken, reducing the debt, while at the same time

the US could force countries to accept a weaker dollar and lower interest rates on their US Treasury investments in order to still be protected by the US security umbrella.

In summary, the US would lower or even stop paying interest on treasuries and at the same time make them perpetual. Effectively, this would be forcing “partners” to pay tribute (Roman Empire style).

lurker May 25, 2025 7:42 PM

@Winter
re Mar-el-Lago accord

“Connected to this problem is also the US role of global police, leaving it with a large military cost burden …”

Use of the word police implies enforcement of the Rule of Law. In global disputes in recent decades the US role has been to ship arms to one side, or to stand aside and ignore the dispute. Hardly the role of police …

Clive Robinson May 25, 2025 9:33 PM

@ ResearcherZero,

Another group you can add to the list of Government aligned hacking organisations,

https://techcrunch.com/2025/05/23/mysterious-hacking-group-careto-was-run-by-the-spanish-government-sources-say/

They appear to be better at keeping a low profile than some entities.

The question thus arising as to the “four axis of evil” nations of China, Iran, Russia, North Korea that the uninformed in Washington appear to think are “the only ones”.

Where as as I’ve observed in the past…

“I would expect any nation capable technology wise to have their own groups. Those that don’t but have the money such as Middle East nations to buy it in from the likes of Italian, Israeli, US, or similar companies either directly or through the likes of Bulgaria.”

Such is the way the world tends to work…

Clive Robinson May 25, 2025 9:48 PM

@ Bruce, ALL,

Is the AI bubble deflating?

In the news the other day was the case of an AI company in the UK going “belly up”

Before that and still currently is news that US AI companies are pulling back/out of Data Center deals.

And now we have news about things not going well in China,

https://www.tomshardware.com/tech-industry/artificial-intelligence/chinas-ai-data-center-boom-goes-bust-rush-leaves-billions-of-dollars-in-idle-infrastructure

All “newish tech” tends to go through two “bubble cycles” –where investors get fleeced– before it settles in. We’ve seen this since Canals and Steam engines in England going back a couple of centuries. Similar with electronic based communications and even computers.

Clive Robinson May 25, 2025 10:03 PM

Kreb’s gets hit with massive DDoS again!

This is perhaps not an enviable reputation to get, but some people sure like to use “Distributed Denial of Service”(DDoS) attacks on the “bigger is better” principle against Brian Krebs

https://krebsonsecurity.com/2025/05/krebsonsecurity-hit-with-near-record-6-3-tbps-ddos/

The question is of course is,

“Was this just a test, and if so what comes next?”

As the old saw indicates,

“Only time will tell.”

But it appears to be “vulnerable IoT devices” behind it yet again…

We really need to start thinking how to stop these IoT plagues. One good way might be to destroy their business models.

lurker May 26, 2025 8:21 PM

Could somebody please explain what is wrong with Huawei’s Ascend chips (aka 910[B|C|D])? That is apart from the possibility that they may be more expensive, and less powerful than nVidia’s. I’ve read a BIS “Guidance” document[1] which is chock full of references to other official documents, and qualifies its substantive verbs, like, “may have been” and “probably were”. It seems the US not only has an export embargo on nVidia and similar chips which could be used in AI (or for “military” purposes), but also an embargo on the export of machines or materials which could be used in the manufacture of such chips, and the Peoples Republic of China is specifically named as being suspected of making such chips with embargoed machines or materials.

So sleight of hand makes anybody else, anywhere in the world, who uses such chips[2], to be in violation of the embargo. Yet it is reported[3] that Huawei and SMIC have patented a Self-Aligned Quadruple Patterning lithography using Deep UltraViolet, which is significantly different from the process used by TSMC, and so jealously guarded by the US.

[1] https://www.bis.gov/media/documents/general-prohibition-10-guidance-may-13-2025.pdf

[2] Thus far it seems to be all all inuendo and suspicion; nobody has been arrested; no smoking gun has been brandished; and the BIS “guidance” is a restriction on the use of chips that merely look as if they might have been made in violation of the embargo.

[3] ‘https://www.tomshardware.com/tech-industry/huawei-patent-reveals-3nm-class-process-technology-plans-china-continues-to-move-forward-despite-us-sanctions

ResearcherZero May 27, 2025 1:24 AM

@Clive Robinson, ALL

Former intelligence officers are branching out into all lines of government contracting.

Military will oversee food for biometrics. Soldiers will directly run aid distribution.
‘https://www.biometricupdate.com/202505/israel-seeks-funding-for-plan-to-require-facial-recognition-in-exchange-for-food-in-gaza

The members of the reserves served in the office of the Coordinator of Government Activities in the Territories (COGAT) under the command of Brig. Gen. Roman Gofman, who later became the military secretary to Prime Minister Benjamin Netanyahu.
https://www.nytimes.com/2025/05/24/world/middleeast/israel-gaza-aid-plan.html

Safe Reach Solutions is headed by former CIA officer Philip F. Reilly, with fund raising ran by former marine Jake Wood. The founders of the project are all very well connected. Individuals behind the plan include Liran Tancman, a former IDF unit 8200 signals officer and tech investor who joined COGAT; Yotam HaCohen, a strategic consultant with COGAT; and Michael Eisenberg, an Israeli-American venture capitalist.
https://www.washingtonpost.com/world/2025/05/24/gaza-humanitarian-foundation-ghf-aid/

Liran Tancman is one of the founders of Israeli cyber command and the CEO and co-founder of Rezilion, which provides an automated software supply chain security platform.
https://www.darkreading.com/author/liran-tancman

Clive Robinson May 27, 2025 9:47 AM

@ ResearcherZero, ALL,

With regards,

“Former intelligence officers are branching out into all lines of government contracting.”

I often ask myself the “Chicken or Egg” question of,

“Which came first?”

“The technology advance or the graft”

That now appear to be skipping hand in hand down the “halls of power” throwing bouquets to the chosen that abound there[1].

The written history says it was science in WWI and the resulting technology in WWII. In the intervening period the technology was too fragile and too expensive to be used in a general population. However WWII changed this making what was available rugged and importantly mass produced so the real cost dropped significantly and opened up to consumer production.

With this came other technology that under “military need” quickly became not just smaller but considerably more efficient and a lot lot less fragile, so making finished units a lot lot less heavy. The result in the 1960’s was the boom in consumer electronics that kind of started with “the portable/pocket radio” and even electromechanics got the same treatment as the consumers got the “Sony Walkman”.

A few more steps on the technology lader swap the positions of the military and the consumer. No longer was it the consumer fetting the cast of scraps from the military table, it was the military scurrying under the consumer buffet table looking for “droppings”.

But the written history does not really cover what happened with regards the graft[1] the consumer tax dollars were funding. Sure we occasional got to hear of the $600 hammer or toilet seat but that has migrated outwards to “Managed Facility” via the nutbar idea of “Public Private Partnerships” where light bulbs can cost more than $1500. This is in part enabled by the “rent seeking economy” we are foolishly moving into it is as such mostly legalised grift not graft at the moment but that appears to be changing[1].

But that’s not about the technology or how it’s being now developed.

In the past half century technology has advanced to fill existent ordinary consumer needs. But that changed with the notion of “electronic slaves” pandering to the whims of those that could afford them was pushed into peoples minds. After all why go to the effort of writing a shopping list and going out to purchase the items and lug them home… Just get your voice assistant on your smart device to do it for you.

The fact you will be over charged and given nearly out of date products that would have been thrown out as waste in a supermarket etc is just “the grift of the system”. But what about the fact of the bribery to sell you things you don’t want?

Yes the technology makes the selection, do you get the “own brand” product that is not only half the price of the high priced name brands, they are also not now so watered down they are dire (yup looking at you Heinz). So you pay twice the price and the “make your delivery up” get a double kick back from you and the named brand.

This push to consumer rent seeking needs technology to support it…

That same technology is now ending up being repurposed into military and law enforcement as well as other surveillance activities at well over premium pricing. And with it large chunks of tax revenue…

It’s the future, you are either a face sucking parasite, or you are a face in the crowd… That will get parasitized just like a caterpillar that gets infested by digger wasps, or any number of “bot flies”. Your survival depends to some extent on if you’ve been picked up and held captive or are still free to roam and seek help if of course it’s available.

[1] The difference between grift and graft may be lost on many people, but a grift is generally a form of con or pull the wool activity against an innocent victim. Graft however is where both sides know fully well what is being done is at best unlawful if not downright illegal, at it’s simplest it’s bribery at worst it’s as bad as treason,

‘https://medium.com/fourth-wave/whats-the-difference-between-grift-and-graft-90d3f3ecfbe9

not important May 27, 2025 4:56 PM

https://cyberguy.com/bits-and-bytes/trump-signs-law-combat-deepfakes/

=“Take It Down” Act—a landmark law that empowers Americans to fight back against the growing threat of non-consensual explicit images, including AI-generated deepfakes.

The new law makes it a federal crime to knowingly publish or threaten to publish intimate images without the subject’s consent, whether those images are real or computer-generated.=

Q: Actress filmed nude in a movie or for magazine, movie/magazine went officially public. Person copied the frame of this nude image and publish it.

It is obvious violation of studio/publisher copyright. Should the law stated above applied as well?

ResearcherZero May 27, 2025 10:39 PM

Many ex-service personnel are not well suited to areas outside of security. Putting them in charge of decisions regarding humanitarian work, news delivery and other civilian areas, badly compromises any involvement. Enormous pressure to tow the administration line and embed government operations within such services – distorts the roles, aims and delivery.

The information environment becomes completely distorted, harming aid and news operations, while destroying the trust and relationships between those delivering services and the people who need assistance. News outlets which will fairly cover the stories of people experiencing hardship are gone, they are replaced by propaganda outlets of foreign governments looking to gain influence or run psychological operations in the zone.

The picture of what is actually taking place on the ground then becomes confused, distorted or entirely ignored. This is especially harmful to local populations and also harms honest attempts by international operations to broker peace, humanitarian operations or diplomacy.

ResearcherZero May 27, 2025 10:47 PM

A distorted and confused information environment can lead to catastrophic decision-making.

The reckless attitude and actions of the Oval Office have opened up a large vulnerability. More than 100 officials have been placed on leave from the National Security Council…

‘https://www.cnn.com/2025/05/23/politics/national-security-council-administrative-leave-trump

The Trump administration plans to cut thousands of intelligence and national security jobs.
https://www.nbcnews.com/politics/national-security/trump-administration-cut-thousands-employees-spy-agencies-rcna204648

The NSC leadership appears to be a PR, investment and lobbyist team run by fools.
https://instituteforglobalaffairs.org/2025/05/mapping-the-trump-47-administration-nsc-key-figures-and-leaders/

Clive Robinson May 28, 2025 7:32 AM

@ lurker, ALL,

With regards,

“BBC brushed lightly over the topic…”

They also “cherry picked” certain traits that not all ExMil have.

The most important thing a foot soldier or similar front line / combat person can have is “Situational Awareness” and few people have it naturally, including armed forces personnel. But as long as someone in your brick/squad/team has it they can “carry the rest” as they “pick it up”, that is you can learn it. Which might suggest it’s from “nurture not nature”. This tends to correlate with early interaction with certain types of supposedly adult activities (hunting /seeking quarry etc).

Our host @Bruce used to talk of “thinking hinky” well situational awareness is some part of this. But in the more general case it’s a two stage process,

1, Recognising expected patterns
2, Spotting exceptions to patterns

So you can spot your prey or see where you are the prey, that is being stalked, walking into a trap etc.

The usual way to “spot a trap” is to “recognize the bait” or “see the funnel”. Thus the very sage advice of,

“Take the path least traveled, and don’t stop to pick things up along the way.”

But also you have to look for “tells” subtle colour differences are one. Soil is dry on top and often damp underneath, and the colour difference is obvious due to the water content changing it. So knowing this you can spot “recently disturbed ground”. Leaves and other vegetation usually has two different colours darker on the top lighter on the bottom sometimes it’s due to texture smooth if not furry feal on one side waxy on the other this changes how light reflects and importantly shows up air movement in ways that reveal disturbance or cutting at quite a distance. Also disturbed soil to hide things causes changes in plant colouring and later size. Which is why long buried archeological sites can be spotted by aerial survey, and also mineral deposits by false colour photography and plant sample analysis to confirm.

But the reason we spot those archeological sites is also why our eyes pick out concealed objects. It’s said “Nature abhors a vacuum” which is one “tell” but almost as much “Nature abhors straight lines” which is a second “tell”.

Which brings us on to “shape” You’ve probably heard the old saw of,

“Beauty is in the eye of the beholder.”

Well this is actually the “find fit mate” effect in a more generalized form. Basically at a base level we look for near symmetry and sufficient curves. And this carries forward into how we see art. But we also like “contrast” and thus at the limits we have the likes of “brutalist architecture” where one rule –symmetry– is kept and the other rule –curves– is inverted or negated. It is a strong differentiator between naturally grown and manmade and lifeless.

Those are the basic rules of visual ques of patterns, in the military they used to call them the S7’s and it’s taught in basic training but not really practiced sufficiently.

But it’s not just Art it carries forward into we also thing of beauty in a more abstract form such as in music and words of song and poetry and the arcs of stories but also science thus engineering and even yes software (it’s been discussed before on this blog).

If you have the ability “to see a system in your mind” be it verbally, visually or mathematically then you can see beauty and ugly/brutally in their design. Just spotting ugly is oft the fastest way to “find a fault”

There was a line from a character in a Bones episode where she keeps going on about “patterns, it’s all about patterns” with regards Chess moves, well as a friend once said about things in general,

“It ain’t just that Bro, it’s about life the universe everything we see, sense, and do.”

The more you can see highly abstract patterns the better fit you are to abstraction based work.

So the answer is,

“No, not all ex-mil are suitable for cyber security work, but some are exceptional, probably from when they were sung to and rocked as babies.”

As a man once wrote and another sang

“The Rhythm Of Life is a powerful beat,
Puts a tingle in your fingers and a tingle in your feet,
Rhythm in your bedroom,
Rhythm in the street,
Yes, The Rhythm Of Life is a powerful beat”

Clive Robinson May 28, 2025 7:55 AM

@ not important, ALL,

With regards,

“The new law makes it a federal crime to knowingly publish or threaten to publish intimate images without the subject’s consent, whether those images are real or computer-generated.”

This is “bad” in many ways but consider,

1, What is an “intimate image”?
2, What is a “subject’s consent”?

They fall under the old nonsense answer of,

“I can’t put it in words, BUT ‘you’ll know it when you see it’.”

But consider it’s not just there is no “meaning” in the definitions there is also no measure for “intent” or “compliance”.

It’s the sort of nonsense legislation that is “open scope” thus “free licence” for prosecutors to fill up the courts with what are in effect “nuisance cases” and gain unlawful convictions” to further their own objectives.

Oh and the awkward side of things,

To be “evidence” the image will have to be “produced in court” and “included in the record”. Both of which are usually public…

So it will make a mockery of “due process” and thus the judiciary, and inturn the legislators…

not important May 28, 2025 3:28 PM

@Clive regarding https://www.schneier.com/blog/archives/2025/05/friday-squid-blogging-us-naval-ship-attacked-by-squid-in-1978.html/#comment-445575

I agree with Your points absolutely.

This part in particular:
=It’s the sort of nonsense legislation that is “open scope” thus “free license” for prosecutors to fill up the courts with what are in effect “nuisance cases” and gain unlawful convictions” to further their own objectives.=

I could only add ‘milking cow’ for lawyers as well.

ResearcherZero May 29, 2025 2:32 AM

@Clive Robinson, @ALL

80% of cyber incidents are financially motivated, with more than quarter related to espionage. Spying also exploits many of the same traits. People just do not expect it.

‘I’m boring and harmless. Why would it happen to me?’

Lack of situational awareness is why financial fraud and cyber crime has such a large field
to hunt in. The tactics used exploit typical human interactions and patterns of behaviour to walk people into a trap by abusing their trust. Lack of technical knowledge in the given areas makes it much easier, as verifying a fraudulent identity remotely can be difficult.

Zero trust often goes against human nature. Software platforms often do not make the process of checking details easy, or far too simple to forge and abuse the trust placed in them. Even the poor old humans working in various professions do not expect the systems they work with to be used against them and bad faith actors to abuse system processes.

Congress is attempting to limit the ability of judges to use contempt laws.

‘https://rollcall.com/2025/05/05/gop-aims-at-contempt-of-court-in-house-reconciliation-text/

Hundreds and hundreds of court orders would be rendered unenforceable.
https://www.justsecurity.org/113529/terrible-idea-contempt-court/

ResearcherZero May 29, 2025 2:47 AM

Verifying a fraudulent identity locally is not something people typically do either. Even within professional environments and institutions, checking that qualifications actually exist and there is a record of the individuals qualification process is often overlooked.

A good printer and appropriate layout will create the impression of a university degree.
Mounted in a frame and hung on the wall of an office, with a plaque on the door erected by a tradesman, and the room’s occupant becomes exactly what the eye of the beholder perceives. Even the people working in the building won’t bother to ask too many questions.

Just say you are with DOGE and no one will bother to check that the position exists.

Clive Robinson May 29, 2025 8:02 AM

@ ResearcherZero, ALL,

Identifing people is a fantasy

This is something I was going to “Squid About” with Regards Greg Abbot signing ridiculous “age verification” legislation[1]. That is unfortunately going to make identity theft almost trivial…

And also, as you note,

“Verifying a fraudulent identity locally is not something people typically do either.”

Because sensible people should after a little thinking and research find that,

There is no way to tie an individual biological to a paper trail.

As I’ve pointed out in the past, this came to a head in the UK when “National ID Cards” argument came up. As the first female Director of MI5 Stella Rimington spoke very publicly on the issue and got quoted in much of the UK MSM,

“ID cards have possibly some purpose…”

“But I don’t think that anybody in the intelligence services, particularly in my former service, would be pressing for ID cards.”

But her key point she warned they would be “absolutely useless” unless they could be “made unforgeable”.

And that’s the “key thing” they can not be made “unforgeable” for two basic reasons,

1, There is no way that the ordinary person can check in any way they have available to them if the ID card is genuine.

But secondly and more importantly,

2, Even if you could prove “the physical document” was not forged, it’s still meaningless. Because just as with “Code Signing” it attests nothing to the quality or reliability of the information that it has signed.

Even if you “follow the paper trail” it does not actually prove anything either each and every piece of information on all those documents likewise can not be attested to because of the second reason.

At one point the shills for blockchain were claiming it could solve these issues, they can not the only thing they might bring to the party is a “time line”. But there is nothing to stop the second issue.

The best you can achieve is by having having hash functions for every document “image” but hash functions rest on the unproven notion that there are non-invertible “One Way Functions”. A hypothesis that is “unproven” and worse some of those ideas for past OWF’s are now known to be false…

So if someone presents you with some kind of ID Token, the best you can do is

1, Sniff it.
2, Say “the ink is still wet”
3, Watch their face for tells.

That’s it, that’s all you can do.

[1] Both Apple and Google strongly protested and gave good reasons but the authoritarian idiot just signed everyone not just Texans into life long danger,

https://www.bbc.co.uk/news/articles/cz63ny02d8po

As pointed out,

“[I]t requires app marketplaces to collect and keep sensitive personal identifying information for every Texan who wants to download an app, even if it’s an app that simply provides weather updates or sports scores”

So a longterm kept “treasure trove of information” that will be very valuable to all those people,

1, You do not trust
2, You would be stupid to trust

And you can be as certain as night follows day that those that can not and should not be trusted will try to gain access to the detriment of anyone they get details of…

Apple told Bloomberg after Abbott signed the law,

“We believe there are better proposals that help keep kids safe without requiring millions of people to turn over their personal information,”

Yes that’s the nub of it “backdoor compulsory ID” surveillance assistance for Authoritarian Bureaucrats desperate to “collect everything” in the hope that it will give them those Cardinal Richelieu “six lines” “to hang” you by.

Leave a comment

Blog moderation policy

Login

Allowed HTML <a href="URL"> • <em> <cite> <i> • <strong> <b> • <sub> <sup> • <ul> <ol> <li> • <blockquote> <pre> Markdown Extra syntax via https://michelf.ca/projects/php-markdown/extra/

Sidebar photo of Bruce Schneier by Joe MacInnis.