Skip to main content

Cancer

Looking at a picture of my mother laying in her hospital chair taking her chemo medication makes me think about cyber. Our bodies are a network of connected computers. Blood and lymph are the communication channels that relay information between these computers. The mainframe, of course, is your brain, which is another highly connected network of computers.

When cancer invades it starts by infiltrating a system. The system is homomophic usually, which makes it easier for the cancer (cyber infiltrator) to gain its foothold. Sometimes the infiltrator moves fast and runs through multiple systems wrecking havoc. Yet there are those infiltrators who move slow, learning each system as it goes slowly through the entire system. Nonhodgkins Lymphoma is that slow hacker. That's what my mother has. She's had this for a very long time. Mostly ignored by her "doctors" 8, 12, maybe 30 years ago, finally they see the infiltration and recognize the need to respond.

Once the cancer becomes apparent, like the infiltrator, we struggle to figure out where it started. That's where we need to address the treatment otherwise we just move it around. That sounds exactly like the cat and mouse chase of counter infiltration. How do we backtrack?

None of the medical "doctors" who work on my mother are savvy enough to even think about this concept. They are mostly preoccupied with billing medicare and collecting their fee for their time. The nurses care, but they're so overwhelmed (like those network techs) that they don't have time to think deeply. Who can stomach a deep dive on the root cause when your system is about the suffer a catastrophic failure, right? Dead humans make for bad test subjects.

Let's work backwards from the visible evidence of infiltration. We see the "cancer" tumor which is the equivalent of a malware drop or data erase, or even a damn DNS exfil that the Cisco guy described. How the infiltrator get into that zone? We look at the path you would take, follow the network, the connected lymp tissue and where it could stage. Look for a similar exploit in that staging area and then again, backtrack. Like a worthy infiltrator, you eventually find rings of exploit that lead back to themselves. That's the frustrating part, and it's the part where most just stop looking. There's always a trail, often some escape that transcends the homomorphic nature of the system.

So you jump across system barriers too. Instead of on a Windows system, you look into the Linux network that has a physical separation (maybe it was your IB HPC network). This is akin to looking into the circulatory system (blood) where it intersects with the lymphatic system, i.e. the liver. The liver would be another computing system with an embedded switch. You look for signs of collateral infiltration, for instance signs of renal cancer (she had that a few years ago).

In all of this backtracking you keep looking for the infiltrator. There is a fingerprint out there, there is always a fingerprint. No matter if it's cancer or a hacker, each infiltrator leaves its mark where it started. Not even the most fantastic NSA red team hacker is immune to leaving a trace. Not every trace is measured in the system they infiltrator.

I am a firm believer that most cancers are the result of viral infection that goes unstopped by an immune system. Sometimes that IPS doesn't know how to handle the foreign "zero day" known as cancer. Maybe one day I will be able to reconnect with Travis, the virology cohort I knew during my SERS experience.

Until then, somebody still needs to collect on the $100 challenge. How many neutrons does it take to make a black hole? My hundo awaits...

Popular posts from this blog

THE RISE OF FASCIST SOCIAL MEDIA

The Merriam-Webster dictionary defines fascism as: a tendency toward or actual exercise of strong autocratic or dictatorial control .  The phrase "dictatorial control" is important for the case that I am going to make about fascism in social media. The word "dictatorial" means "of or relating to a dictator," and a dictator is "one ruling in an absolute and often oppressive way." In 2020, social media has seen a rise in the number of autocratic events of censorship. The two social media outlets that I am going to focus on are Facebook and Twitter.  Background Facebook is a semi-private curated blogging platform where you, the user, share information at your leisure. The public part of Facebook is in Facebook Groups. With a group, outside people who are not privy to your "Facebook Wall" will join your group and establish a communal discourse. This can be private, by invitation only, or public. The Facebook is auth-walled so that you must ...

Clustered Foolishness

I had morning coffee with a well respected friend of mine recently. Aside from chatting about the usual wifery and family, we touched on the subject of clustered indices and SQL Server performance. A common misconception in the software industry is that a clustered index will make your database queries faster. In fact, most cases will demonstrate the polar opposite of this assumption. The reason for this misconception is a misunderstanding of how the clustered index works in any database server. A clustered index is a node clustering of records that share a common index value. When you decide on an index strategy for your data, you must consider the range of data to be indexed. Remember back to your data structures classes and what you were taught about hashtable optimizations. A hashtable, which is another way of saying a database index, is just a table of N values that organizes a set of M records in quickly accessible lists that are of order L, where L is significantly less than M. ...

Trademarks In The Dark

If you have a business, then you know that filing for a trademark is pretty easy in the USA. You just go to the USPTO web site ( www.uspto.gov ) and start filling out the form. The cost is significantly less now, nearly a third of what it was a couple of years ago. That's great news. What you don't know about your mark, though, is that there is a plethora of common law that dictates whether or not you can file with your specimens. The specimens are documents that clearly show your mark being used in commerce. Well, my last mark registration came back to me with the examiner asking for a better specimen that places the mark in closer proximity to evidence of commerce. Closer proximity. Yeah. Right. Apparently Lands’ End, Inc. v. Manbeck, 797 F. Supp. 511, 514, 24 USPQ2d 1314, 1316 (E.D. Va. 1992); In re Dell Inc., 71 USPQ2d 1725, 1727-1729 (TTAB 2004); In re MediaShare Corp., 43 USPQ2d 1304 (TTAB 1997); TMEP §§904.06(a) and (b), establish some common law that determines an acce...