Archive for November 20th, 2008

Forget Bretton Woods II – we need a gold standard

November 20, 2008

Seems that what I have said over the years, as well as many others have about fiat money is getting some press…

Too much credit and easy money. Those were the biggest culprits behind this financial crisis. Yet, apallingly, the government’s rescue attempt is built on more credit and even easier money. That’s like giving a procrastinator a deadline extension. By choosing this course, Washington has steered us on to the “road to Weimar” – the road to runaway inflation.

It didn’t have to come to this. And it still doesn’t. But the proper remedy will take tremendous political courage: Bring back the gold standard. That, more than any byzantine regulations that emerge from the Bretton Woods II conference this weekend, would provide stability and safety for nations and individuals around the world.

Sadly, current policy seems to reflect a desire to weaken the dollar as quickly as possible.

The Federal Reserve’s own data tells the story. The headline is the doubling of Federal Reserve credit, the main component of the US monetary base. Since Labor Day 2008, it’s risen from $894 billion to $2.2 trillion.

That’s the greatest monetary expansion in the Fed’s 95-year history. How the Fed is doing it matters almost as much. It has nearly abandoned its traditional instrument for monetary policy, open-market operations, which involves the purchasing and selling of full-faith-and-credit US Treasury securities. With increasing frequency and amounts, it has relied primarily on “discount window operations” – lending to specific institutions for specific purposes instead of general injections of funds into an open market – since August 2007. This shift may weaken its ability to “tighten” monetary conditions should inflation reach dangerous levels.

A gold standard offers exactly the kind of discipline that’s missing from the Fed. But its impact would be wider: Both in substance and in symbolism, gold provides integrity to the entire global financial system. Governments, however, have historically bridled at the constraint and accountability a gold standard brings. After all, when currency can be exchanged for gold, it’s harder for governments to inflate the money supply, which they’re tempted to do in order to spend beyond their means or cheat on their debts.

~snip~ Full story here

Related story from the Wall Street Journal

WATERFOWL HUNTING CLINIC IN COLORADO SPRINGS

November 20, 2008

The Colorado Division of Wildlife (DOW) will host a Waterfowl Hunting Clinic in Colorado Springs Nov. 20, from 6-9 p.m.

The class will be led by a trio of DOW biologists who will cover the basics on waterfowl hunting with subject matter geared for the novice waterfowl hunter.  Topics will include hunting tactics, regulations, duck identification, hunting techniques, and where to go and what to look for in a hunting location.

The class is free, but space is limited to 50, so participants must call (719) 227-5207 to pre-register.

The Division of Wildlife office is located at 4255 Sinton Road.

For more information about Division of Wildlife go to: http://wildlife.state.co.us.

SPECIAL SEASON OFFERS ANOTHER CHANCE FOR YOUNG TURKEY HUNTERS

November 20, 2008

Get off your butt, and take a kid hunting!

DURANGO _ Young hunters who did not fill their fall turkey tags will have a second chance at bagging a holiday bird at the end of November.

A special late fall season for all Colorado hunters under age 18 is set for Nov. 22-30. Any youngsters who did not get a turkey during the regular fall season can hunt in southwest Colorado. Each hunter must be accompanied by a mentor who is 18 or older. The mentor cannot hunt and must have a Colorado Hunter Safety Card.

The special season opens a new opportunity for youth in Colorado’s southwest corner, said Tom Spezze, southwest regional manager for the Colorado Division of Wildlife.

“Unlike other areas of the state, in the southwest we don’t have upland game birds,” Spezze said. “Turkey hunting gives our young hunters a great opportunity to learn about hunting, and this special season will encourage families to get out together to hunt.”

Turkey hunting is somewhat easier in the fall than the spring. Hunters can take birds of either sex in the fall, and turkeys travel in flocks and can be tracked on the ground. Turkeys are abundant in southwest Colorado and large expanses of public land allow hunters to enjoy a high-quality experience during this season.

The season also follows the last big game season.

“This is a great time of year to hunt; people will have the woods to themselves,” Spezze said. “And you never know, your son or daughter could provide your family with a turkey for Thanksgiving or Christmas.”

Young hunters who previously purchased a regular fall turkey license anywhere in the state for 2008 are eligible for this special season. Separate licenses will not be sold for this season.

The season will be open in these game management units: 52, 54, 55, 60, 61, 62, 64, 65, 66, 67, 68, 70, 71, 72, 73, 74, 75, 76, 77, 78, 79, 82, 83, 411, 521, 551, 681, 682, 711, 741, 751 and 771. For more information refer to one of the Colorado hunting brochures or the DOW Web Site (http://wildlife.state.co.us) for the exact locations of these units.

For more information about Division of Wildlife go to: http://wildlife.state.co.us.

LICENSE STRUCTURE CHANGE FOR ANGLERS AND SMALL GAME HUNTERS

November 20, 2008

This is something that was long over due, and all that I can say is better late than never!

The Colorado Division of Wildlife (DOW) would like to remind anglers and small game hunters that the license structure for fishing and small game hunting has changed.

Beginning April 1, 2009, all annual licenses including fishing, senior fishing, small game, furbearer, combination fishing and hunting, Colorado waterfowl stamps, habitat stamps and walk-in access permits are valid from April 1 through March 31 of the following year.

“Annual licenses will no longer expire on January 1,” said Henrietta Turner, DOW licensing manager.  “We’ve changed the calendar-based system to a season-year format, so licenses coincide better with our small game seasons.”

All licenses purchased in 2008 will remain valid through March 31, 2009.

Anglers should continue using the 2008 Colorado Fishing Regulations brochure through March 2009. The 2009 Colorado Fishing Regulation brochure will be available mid-to-late March at all DOW offices and license agents statewide. The new brochure will be valid until March 31, 2010, coinciding with the new license structure.

All 2009 annual fishing, small game, furbearer and combination licenses will be available for purchase beginning on December 15.  These licenses will remain valid through March 31, 2010.

Licenses make great holiday gifts and are available on the DOW Web site (www.wildlife.state.co.us), at license agents or by calling: 1-800-244-5613.

For more information about Division of Wildlife go to: http://wildlife.state.co.us.

An ongoing Internet threat

November 20, 2008

I know, I usually don’t post about Internet security threats. On occasion though it seems like a good idea. Windows Secrets free news letter arrived today landing in the in-box with all the subtly of a sonic boom. Seems that Microsoftas well as the AV companies are hard pressed to come up with a solution for this super trojan. Do yourself a favor, and sign up for Windows Secrets via the link.


TOP STORY

Don’t be a victim of Sinowal, the super-Trojan

Woody Leonhard By Woody Leonhard

The sneaky “drive-by download” known as Sinowal has been, uh, credited with stealing more than 500,000 bank-account passwords, credit-card numbers, and other sensitive financial information.

This exploit has foiled antivirus software manufacturers time and again over the years, and it provides us in real time a look at the future of Windows infections.

Imagine a very clever keylogger sitting on your system, watching unobtrusively as you type, kicking in and recording your keystrokes only when you visit one of 2,700 sensitive sites. The list is controlled by the malware’s creators and includes many of the world’s most popular banking and investment services.

That’s Sinowal, a super-Trojan that uses a technique called HTML injection to put ersatz information on your browser’s screen. The bad info prompts you to type an account number and/or a password. Of course, Sinowal gathers all the information and sends it back home — over a fancy, secure, encrypted connection, no less.

Washington Post journalist Brian Krebs wrote the definitive overview of Sinowal’s criminal tendencies in his Oct. 31, 2008, column titled “Virtual Heist Nets 500,000+ Bank, Credit Accounts” — a headline that’s hard to ignore. Krebs cites a detailed analysis by RSA’s FraudAction Research Lab: “One Sinowal Trojan + One Gang = Hundreds of Thousands of Compromised Accounts.”

Sinowal has been around for many years. (Most virus researchers nowadays refer to Sinowal as “Mebroot,” but Sinowal is the name you’ll see most often in the press. Parts of the old Sinowal went into making Mebroot. It isn’t clear whether the same programmers who originally came up with Sinowal are also now working on Mebroot. Mebroot’s the current villain.)

Microsoft’s Robert Hensing and Scott Molenkamp blogged about the current incarnation of Sinowal/Mebroot back in January. RSA has collected data swiped by Sinowal/Mebroot infections dating to 2006. EEye Digital Security demonstrated its “BootRoot” project — which contains several elements similar to Sinowal/Mebroot — at the Black Hat conference in July 2005.

That’s a long, long lifespan for a Trojan. It’s important for you to know how to protect yourself.

A serious infection most antivirus apps miss

I haven’t even told you the scariest part yet.

Sinowal/Mebroot works by infecting Windows XP’s Master Boot Record (MBR) — it takes over the tiny program that’s used to boot Windows. MBR infections have existed since the dawn of DOS. (You’d think that Microsoft would’ve figured out a way to protect the MBR by now — but you’d be wrong.)

Vista SP1 blocks the simplest MBR access, but the initial sectors are still programmatically accessible, according to a highly technical post by GMER, the antirootkit software manufacturer.

The key to Sinowal/Mebroot’s “success” is that it’s so sneaky and is able to accomplish its dirty work in many different ways. How sneaky? Consider this: Sinowal/Mebroot doesn’t run straight out to your MBR and overwrite it. Instead, the Trojan waits for 8 minutes before it even begins to analyze your computer and change the Registry. Digging into the MBR doesn’t start until 10 minutes after that.

Sinowal/Mebroot erases all of its tracks and then reboots the PC using the adulterated MBR and new Registry settings 42 minutes into the process. Peter Kleissner, Software Engineer at Vienna Computer Products, has posted a detailed analysis of the infection method and the intricate interrupt-hooking steps, including the timing and the machine code for the obfuscated parts.

Once Sinowal/Mebroot is in your system, the Trojan runs stealthily, loading itself in true rootkit fashion before Windows starts. The worm flies under the radar by running inside the kernel, the lowest level of Windows, where it sets up its own network communication system, whose external data transmissions use 128-bit encryption. The people who run Sinowal/Mebroot have registered thousands of .com, .net, and .biz domains for use in the scheme.

Wait, there’s more: Sinowal/Mebroot cloaks itself entirely and uses no executable files that you can see. The changes it makes to the Registry are very hard to find. Also, there’s no driver module in the module list, and no Sinowal/Mebroot-related svchost.exe or rundll32.exe processes appear in the Task Manager’s Processes list.

Once Sinowal/Mebroot has established its own internal communication software, the Trojan can download and run software fed to it by its creators. Likewise, the downloaded programs can run undetected at the kernel level.

Sinowal/Mebroot isn’t so much a Trojan as a parasitic operating system that runs inside Windows.

Windows XP users are particularly vulnerable

So, what can you do to thwart this menace? Your firewall won’t help: Sinowal/Mebroot bypasses Windows’ normal communication routines, so it works outside your computer’s firewall.

Your antivirus program may help, for a while. Time and time again, however, Sinowal/Mebroot’s creators have modified the program well enough to escape detection. AV vendors scramble to catch the latest versions, but with one or two new Sinowal/Mebroot iterations being released every month, the vendors are trying to hit a very fleet — and intelligent — target.

Peter Kleissner told me, “I think Sinowal has been so successful because it’s always changing … it is adjusting to new conditions instantly. We see Sinowal changing its infection methods and exploits all the time.”

Similarly, you can’t rely on rootkit scanners for protection. Even the best rootkit scanners miss some versions of Sinowal/Mebroot. (See Scott Spanbauer’s review of free rootkit removers in May 22’s Best Software column and Mark Edwards’ review of rootkit-remover effectiveness in his May 22 PC Tune-Up column; paid subscription required for the latter.)

Truth be told, there is no single way to reliably protect yourself from Sinowal/Mebroot, short of disconnecting your computer from the Internet and not opening any files. But there are some historical patterns to the exploit that you can learn from.

First of all, most of the Sinowal/Mebroot infections I’ve heard about got into the afflicted PCs via well-known and already-patched security holes in Adobe Reader, Flash Player, or Apple QuickTime. These are not the only Sinowal/Mebroot infection vectors by a long shot, but they seem to be preferred by the Trojan’s creators. You can minimize your risk of infection by keeping all of your third-party programs updated to the latest versions.

Windows Secrets associate editor Scott Dunn explained how to use the free Secunia Software Inspector service to test your third-party apps, and how to schedule a monthly check-up for your system, in his Sept. 6, 2007, column.

In addition, according to Peter Kleissner, Sinowal/Mebroot — at least in its current incarnation — doesn’t infect Vista systems. Windows XP remains its primary target, because Vista’s boot method is different and its User Account Control regime gets in the worm’s way.

Don’t look to your bank for Sinowal safeguards

So, you’d figure the banks and financial institutions being targeted by Sinowal/Mebroot would be up in arms, right? Half a million compromised accounts for sale by an unknown, sophisticated, and capable team that’s still harvesting accounts should send a shiver up any banker’s spine.

I asked Rob Rosenberger about it, and he laughed. Rosenberger’s one of the original virus experts and was also one of the first people to work on network security at a large brokerage firm.

“I’ll be labeled a heretic for saying this, but … from a banking perspective, frauds like this have never qualified as a major threat. A banker looks at his P&L sheets and writes off this kind of fraud as simply a cost of doing business. Such fraud may amount to billions of dollars each year, but the cost is spread across all sectors of the banking industry all over the world.

“Banks have dealt with this kind of fraud for many, many decades,” Rosenberger continued. “Forget the Internet — this kind of fraud existed back in the days of credit-card machines with carbon paper forms. The technology of fraud gets better each year, but this type of fraud remains consistent. From a banking perspective, the cost to obey government regulations dwarfs the cost of any individual case of fraud.”

If the bankers aren’t going to take up the fight against Sinowal/Mebroot, who will? The antivirus software companies have a long tradition of crying wolf, and their credibility has suffered as a result.

In this particular case, the major AV packages have failed to detect Sinowal/Mebroot over and over again. It’s hard to imagine one of the AV companies drumming up enough user interest — or enough business — to fund a mano-a-mano fight against the threat. Besides, the AV companies are chasing the cows after they’ve left the barn, so to speak.

The folks who make malware these days constantly tweak their products, often using VirusTotal or a proprietary set of scanners to make sure their programs pass muster. A day or an hour later — before the AV companies can update their signatures — the bad guys unleash a new version. AV companies know that and are moving to behavioral monitoring and other techniques to try to catch malware before it can do any harm.

The only company that seems to be in a position to fix the Master Boot Record problem is Microsoft. But it’s hard to imagine MS management devoting the time and resources necessary to fix major security holes in a seven-year-old product, particularly when XP’s successors (I use the term lightly) don’t appear to have the same flaw.

This is short-sighted, however. It’s only a matter of time before Sinowal/Mebroot — or an even-more-dangerous offshoot — finds a way to do its damage on Vista systems as well.

If Microsoft decides to take on Sinowal/Mebroot, the company is up against a formidable opponent that draws on many talented programmers. John Hawes at Virus Bulletin says “I recently heard someone estimate that a team of 10 top programmers would need four full months of work to put together the basic setup.”

As Peter Kleissner puts it, “I personally think most people behind the [Sinowal] code do not know what they have done. I would bet that more than half of the code was written by students around the world.”

Kleissner’s in a good position to judge. He’s a student himself, 18 years old. I’m glad he’s on our side.