What's new

Pilot Information Compromised

Sparrow, you are missing the entire point here.

It does not matter what info was on the laptop.

It is however suspect that this laptop was used to commit a fraudulent act. One that has the former legal counsel Seeham pretty pissed off about. So upset that he traced the IP address from where said fraudulent e-mails originated.

For this laptop to then go missing when it looked like it might be called upon to verify who sent the e-mails is highly suspect.

So, what it looks like is that the VP somehow convieniently "lost" his laptop so that there would be no possibility of tracing the e-mails back to him.

The fact that usapa is in possesion of info such as pilots SS numbers, is immaterial. However, since they are a bunch of lying, cheating scumbags that like to set the stakes at termination whenever they think they can be a thorn in the company's or the West pilots side, makes turnabout fair play.

I would very much like to see the usapa VP get his rear kicked by the little lawyer, but I think the BPR will roll over and pay Seeham the money they owe him and it will all just go away.

So, since usapa has failed to safeguard the West pilots info, we are well within bounds of the usapa started witch hunt to seek a 30 day suspension for whoever gave usapa the info, plus the same lifelock coverage given the east pilots, plus a thorough examination of the usapa data archive to see just what other illegal info they have obtained.

I'm actually not missing yours and others points, I'm ignoring it. I'm speaking here because data security is something I know quite a bit about. Pilot labor squabbles and the arcane labor laws I know little about except what I learn here, which has been quite a bit. My apologies but I'm not jumping into the East West cesspool beyond stating that Parker is the real enemy.
 
I'm actually not missing yours and others points, I'm ignoring it. I'm speaking here because data security is something I know quite a bit about. Pilot labor squabbles and the arcane labor laws I know little about except what I learn here, which has been quite a bit. My apologies but I'm not jumping into the East West cesspool beyond stating that Parker is the real enemy.
No, you're speaking here because you crave attention.

And you seem to keep jumping into this cesspool over and over and over talking about blah, blah, and blah.

I've never seen a poster need a board as much as you need this one.
 
No, you're speaking here because you crave attention.

And you seem to keep jumping into this cesspool over and over and over talking about blah, blah, and blah.

I've never seen a poster need a board as much as you need this one.

well then you haven't looked in the mirror have you? From the stats page:

Move2clt
Registered Member
Active Posts:
2,922 (16.76 per day)
Most Active In:
US Airways (2920 posts)
Joined:
17-August 11


Sparrowhawk

Registered Member
Active Posts:
4,418 (5.53 per day)
Most Active In:
The Water Cooler (2444 posts)

Joined:
30-November 09

Like my colleague 700UW says, Never let facts get in the way!!! Enjoy your evening 😀
 
Sparrow, you are missing the entire point here.

It does not matter what info was on the laptop.

It is however suspect that this laptop was used to commit a fraudulent act. One that has the former legal counsel Seeham pretty pissed off about. So upset that he traced the IP address from where said fraudulent e-mails originated.

For this laptop to then go missing when it looked like it might be called upon to verify who sent the e-mails is highly suspect.

So, what it looks like is that the VP somehow convieniently "lost" his laptop so that there would be no possibility of tracing the e-mails back to him.

The fact that usapa is in possesion of info such as pilots SS numbers, is immaterial. However, since they are a bunch of lying, cheating scumbags that like to set the stakes at termination whenever they think they can be a thorn in the company's or the West pilots side, makes turnabout fair play.

I would very much like to see the usapa VP get his rear kicked by the little lawyer, but I think the BPR will roll over and pay Seeham the money they owe him and it will all just go away.

So, since usapa has failed to safeguard the West pilots info, we are well within bounds of the usapa started witch hunt to seek a 30 day suspension for whoever gave usapa the info, plus the same lifelock coverage given the east pilots, plus a thourough examination of the usapa data archive to see just what other illegal info they have obtained.

Ok, genius...

On the one hand you argue that the laptop was deliberately removed from the office in a manner so secure that not even a million dollar lawyer could ever get his mittens on it for evidence (What you wanna bet, the laptop was incinerated and the ashes were scattered out over the Potomac)....

But on the other hand USAPA failed to safeguard the supposed West Pilot data on said laptop dust particles that are floating their way on a 12 month trek to Bermuda.... (Are you telling us we should be on the look out for wide spread fraudulent credit card use in Europe after the tourist return from Bermuda vacations next year?)

You tell me.. Did Gary safeguard the data or not... you can't have it both ways. 😛
 
well then you haven't looked in the mirror have you? From the stats page:

Move2clt
Registered Member
Active Posts:
2,922 (16.76 per day)
Most Active In:
US Airways (2920 posts)
Joined:
17-August 11


Sparrowhawk

Registered Member
Active Posts:
4,418 (5.53 per day)
Most Active In:
The Water Cooler (2444 posts)

Joined:
30-November 09

Like my colleague 700UW says, Never let facts get in the way!!! Enjoy your evening 😀

I have a reason to post here. I actually work here and add to the conversation.

How about you?
 
Ok, genius...

On the one hand you argue that the laptop was deliberately removed from the office in a manner so secure that not even a million dollar lawyer could ever get his mittens on it for evidence (What you wanna bet, the laptop was incinerated and the ashes were scattered out over the Potomac)....

But on the other hand USAPA failed to safeguard the supposed West Pilot data on said laptop dust particles that are floating their way on a 12 month trek to Bermuda.... (Are you telling us we should be on the look out for wide spread fraudulent credit card use in Europe after the tourist return from Bermuda vacations next year?)

You tell me.. Did Gary safeguard the data or not... you can't have it both ways. 😛

Ok, genius...

Ever heard of a flash drive? Once the data is out of the company's control, that is it...no telling who or where it goes to. Same exact arguement usapa made about AOL getting pilot info.

How or why the laptop went missing is anybody's guess. Most educated guessers would think Mowery intentionally lost the laptop which could link him to his POSSIBLE criminal activity. Oh, and that whole destruction of evidence thing would look really bad if Seeham had asked usapa to retain all records prior to the laptop being "stolen".

Who is Gary?
 
I'm actually not missing yours and others points, I'm ignoring it. I'm speaking here because data security is something I know quite a bit about. Pilot labor squabbles and the arcane labor laws I know little about except what I learn here, which has been quite a bit. My apologies but I'm not jumping into the East West cesspool beyond stating that Parker is the real enemy.

Well then maybe you could answere my question.

Could the person who sent the fraudulent e-mails be traced by sales info, even if the computer/laptop from which the e-mails had been sent is unobtainable.

Seeham knows the IP address, would the server or whatever retain the MAC address or whatever of the particular machine that originated the e-mails. Then would it be a possibility to identify that machine as being purchased on a particular date by a particular individual or organizations credit card?

Moral to the story might be, buy computers with cash!!
 
Well then maybe you could answere my question.

Could the person who sent the fraudulent e-mails be traced by sales info, even if the computer/laptop from which the e-mails had been sent is unobtainable.

Seeham knows the IP address, would the server or whatever retain the MAC address or whatever of the particular machine that originated the e-mails. Then would it be a possibility to identify that machine as being purchased on a particular date by a particular individual or organizations credit card?

Moral to the story might be, buy computers with cash!!

I would say the answer is YES, however that would be half the answer. Most anything that lives on line leaves an electronic "signature" of some type. So it's likely technologically possible to go back through all of the electronic information and find out a great deal. The best you could hope for is that you'd know that on this day person X bought Computer Y from Store Z and installed it on a network at a location in A. Circumstantial at best, if there was any wrong doing. Some real hard core spy/geek types could likely come up with more but it would be to costly

Buying a laptop cash might be helpful if there was as they say malice aforethought. IMO what likely happened is that the organization went out and bought X number of Laptops for their officers and others who required them, Configured them in a minimum configuration with little regard for security. The thought process being "Who would want our information?" Well the answer is "Quite a few people". If what I read here is accurate little if any security protocols were established or enforced. So the surprise is not that their was a data breech but rather given the situation that it took this long.

Now we find that a laptop "Grew Legs" and wandered off with some amount of private data on it. The open question that IMO will likely go unanswered is not "what data was compromised" but rather "Who made the laptop grow legs and why". I found a very interesting article on Data Breeches. It has to do with Health Care and HIPAA, However the basic concepts are similar enough warrant a read. Bill Blake is one of the go to guys in this area of IT. Some Highlights and a link for those interested.

A lot of this information is most likely in spreadsheets, documents, image and audio files. Protecting them with a persistent security policy that lets the creator of the information decide who can access it will help deter breaches.

With data breaches increasing at an alarming rate, healthcare organizations should take the initiative for that security by encrypting any files they share. That ensures that only those people who need the information can access it.
MORE HERE

A couple of statistics in the Redspin report stand out.

97% increase in total records breached since 2010
59% of all breaches involved a business associate
76% increase in records breached involving a business associate since 2010
39% occurred on a laptop or other portable device

I hope this helps.
 
I would say the answer is YES, however that would be half the answer. Most anything that lives on line leaves an electronic "signature" of some type. So it's likely technologically possible to go back through all of the electronic information and find out a great deal. The best you could hope for is that you'd know that on this day person X bought Computer Y from Store Z and installed it on a network at a location in A. Circumstantial at best, if there was any wrong doing. Some real hard core spy/geek types could likely come up with more but it would be to costly

Buying a laptop cash might be helpful if there was as they say malice aforethought. IMO what likely happened is that the organization went out and bought X number of Laptops for their officers and others who required them, Configured them in a minimum configuration with little regard for security. The thought process being "Who would want our information?" Well the answer is "Quite a few people". If what I read here is accurate little if any security protocols were established or enforced. So the surprise is not that their was a data breech but rather given the situation that it took this long.

Now we find that a laptop "Grew Legs" and wandered off with some amount of private data on it. The open question that IMO will likely go unanswered is not "what data was compromised" but rather "Who made the laptop grow legs and why". I found a very interesting article on Data Breeches. It has to do with Health Care and HIPAA, However the basic concepts are similar enough warrant a read. Bill Blake is one of the go to guys in this area of IT. Some Highlights and a link for those interested.




MORE HERE



I hope this helps.

Thanks for the reply.

Here is what I was thinking about sales info. If you could identify a given machine by MAC address or whatever it is called, and determine the serial number of that machine, it is as simple as a phone call to the manufacturer to detrmine who originally bought that machine.

From that point, if the machine did not belong to seham, seham, meltz & petersen, and in fact was sold to any agent of usapa, Lee has usapa's ass in a sling.
 
Thanks for the reply.

Here is what I was thinking about sales info. If you could identify a given machine by MAC address or whatever it is called, and determine the serial number of that machine, it is as simple as a phone call to the manufacturer to detrmine who originally bought that machine.

From that point, if the machine did not belong to seham, seham, meltz & petersen, and in fact was sold to any agent of usapa, Lee has usapa's ass in a sling.

Well short of a "Black Bag" job to gather the Sales Information I don't know how you'd acquire it electronically, especially if the machine has been destroyed, which has a high likelihood.

But you're right the Sales Information would be a "Smoking Gun" The open question is who would it point to?
 
Here is what I was thinking about sales info. If you could identify a given machine by MAC address or whatever it is called, and determine the serial number of that machine, it is as simple as a phone call to the manufacturer to determine who originally bought that machine.
The MAC addressed is assigned to a computer connecting to the ISP, but probably not logged by brand/serial #. Take your laptop to the local McDonalds that has WiFi and it will be assigned a different MAC address than when you use it on the internet at home since most ISP's use dynamic assignment of MAC addresses to conserve bandwidth. Heck, for most ISP's these days a WiFi modem/router is standard and it's the modem/router that is assigned the MAC address, not the individual computers. The router, in turn, assigns addresses to the individual computers connected to the LAN (your home wireless/wired network). So you could have 2 desktops, a laptop, an IPad, and an internet connected TV all connected to the internet through one MAC address as far as the ISP is concerned.

That's not to say that someone couldn't take the ISP's logs plus the header info from an email and track down a specific computer, especially if they had access to the suspect computer, but it wouldn't be as simple as you suggest and I suspect in most cases would require a court order to get the ISP's logs and the suspect computer. Of course, if the suspect computer has been "stolen" it becomes more difficult...

Jim
 

Latest posts

Back
Top