

{"id":1033,"date":"2012-05-10T13:09:02","date_gmt":"2012-05-10T18:09:02","guid":{"rendered":"https:\/\/rud.is\/b\/?p=1033"},"modified":"2017-03-27T09:40:26","modified_gmt":"2017-03-27T14:40:26","slug":"off-by-one-the-importance-of-fact-checking-breach-reports","status":"publish","type":"post","link":"https:\/\/rud.is\/b\/2012\/05\/10\/off-by-one-the-importance-of-fact-checking-breach-reports\/","title":{"rendered":"Off By One : The Importance Of Fact Checking Breach Reports"},"content":{"rendered":"<p>I didn&#8217;t read through the <span class=\"removed_link\" title=\"http:\/\/www.mass.gov\/ocabr\/docs\/2011-data-breach-report.pdf\">Massachusetts 2011 Report on Data Breach Notifications<\/span>\u00a0[PDF] until recently, but once I went through the report my brain kept telling me &#8220;something is wrong&#8221;. Not something earth shattering, but more of a &#8220;something is off&#8221; signal. This happens more than I&#8217;d like as I tend to constantly background process what I intake visually.<\/p>\n<p>As Twitter followers may lament, I have been known to transcribe useful tabular information from reports such as these, especially when I need to communicate them internally and I <a href=\"https:\/\/docs.google.com\/spreadsheets\/d\/1qTaujYqPeMDNC9vMm0xB_oN_GXah5RW7cY8nuxThPxg\/edit\">have done so with this report<\/a> [gdocs]\u00a0as well.<\/p>\n<p>After working through the whole document, the last page of data is where I found the &#8220;off by one&#8221; error (see figure below). Someone performed &#8220;head math&#8221; vs copying &amp; formatting from a spreadsheet. Never a good idea if you aren&#8217;t going to double-check the report thoroughly.<\/p>\n<p>\u00a0<\/p>\n<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" style=\"display: block; margin-left: auto; margin-right: auto;\" title=\"breach-error-1.png\" src=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/05\/breach-error-1.png?resize=510%2C191&#038;ssl=1\" alt=\"Off By One\" width=\"510\" height=\"191\" border=\"0\" \/><\/p>\n<p>My transcription (&#8220;Lost Stolen Misplaced&#8221; tab in the aforelinked workbook) assumes the &#8220;5&#8221; and &#8220;48&#8221; are correct and has the correct total (&#8220;53&#8221;). One of the problems when an error like this crops up is that you do not know where the error occurred, but since the sums of &#8220;12&#8221; and &#8220;277&#8221; are both correct in the spreadsheet and in the report, I think I&#8217;ve found the culprit. Unfortunately, a computational error such as this does foster suspicion on the accuracy of the rest of the report data.<\/p>\n<p>It&#8217;s a lesson report writers should heed well: compute twice, publish once. Errant data can cut as deeply as a saw blade.<\/p>\n<h3>While I Have Your Attention<\/h3>\n<p>Since there aren&#8217;t many visualizations in \u00a0Massachusetts 2011 Report on Data Breach Notifications\u00a0(3D numbers do not count), here are a few I made that I found helpful during my interpretation (2011 data unless otherwise specified):<\/p>\n<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" style=\"display: block; margin-left: auto; margin-right: auto;\" title=\"orgresbrch.png\" src=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/05\/orgresbrch.png?resize=500%2C300&#038;ssl=1\" alt=\"# Residents Impacted By Breah Org\" width=\"500\" height=\"300\" border=\"0\" \/><\/p>\n<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" style=\"display: block; margin-left: auto; margin-right: auto;\" title=\"numbrchbyorg.png\" src=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/05\/numbrchbyorg1.png?resize=500%2C328&#038;ssl=1\" alt=\"Number Of Breached By Org\" width=\"500\" height=\"328\" border=\"0\" \/><\/p>\n<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" style=\"display: block; margin-left: auto; margin-right: auto;\" title=\"numbrchsbytype08-11.png\" src=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/05\/numbrchsbytype08-11.png?resize=500%2C325&#038;ssl=1\" alt=\"Number of Breaches by Type 2008-2011\" width=\"500\" height=\"325\" border=\"0\" \/><\/p>\n<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" style=\"display: block; margin-left: auto; margin-right: auto;\" title=\"resimpbrchtyp.png\" src=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/05\/resimpbrchtyp.png?resize=500%2C292&#038;ssl=1\" alt=\"Residents Impacted By Breach Type\" width=\"500\" height=\"292\" border=\"0\" \/><\/p>\n<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" style=\"display: block; margin-left: auto; margin-right: auto;\" title=\"loststolen.png\" src=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/05\/loststolen.png?resize=500%2C326&#038;ssl=1\" alt=\"Lost\/Stolen\/Misplaced\" width=\"500\" height=\"326\" border=\"0\" \/><\/p>\n<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" style=\"display: block; margin-left: auto; margin-right: auto;\" title=\"malnonmal.png\" src=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/05\/malnonmal.png?resize=500%2C343&#038;ssl=1\" alt=\"Malicious\/Non-Malicious\" width=\"500\" height=\"343\" border=\"0\" \/><\/p>\n<p>\u00a0<\/p>\n<p>\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I didn&#8217;t read through the Massachusetts 2011 Report on Data Breach Notifications\u00a0[PDF] until recently, but once I went through the report my brain kept telling me &#8220;something is wrong&#8221;. Not something earth shattering, but more of a &#8220;something is off&#8221; signal. This happens more than I&#8217;d like as I tend to constantly background process what [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":true,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"activitypub_content_warning":"","activitypub_content_visibility":"","activitypub_max_image_attachments":3,"activitypub_interaction_policy_quote":"anyone","activitypub_status":"","footnotes":""},"categories":[61,24,70,4,650,646,25],"tags":[],"class_list":["post-1033","post","type-post","status-publish","format-standard","hentry","category-breach","category-charts-graphs","category-encryption","category-risk","category-risk-management-2","category-security-awareness","category-threats"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Off By One : The Importance Of Fact Checking Breach Reports - rud.is<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/rud.is\/b\/2012\/05\/10\/off-by-one-the-importance-of-fact-checking-breach-reports\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Off By One : The Importance Of Fact Checking Breach Reports - rud.is\" \/>\n<meta property=\"og:description\" content=\"I didn&#8217;t read through the Massachusetts 2011 Report on Data Breach Notifications\u00a0[PDF] until recently, but once I went through the report my brain kept telling me &#8220;something is wrong&#8221;. Not something earth shattering, but more of a &#8220;something is off&#8221; signal. This happens more than I&#8217;d like as I tend to constantly background process what [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/rud.is\/b\/2012\/05\/10\/off-by-one-the-importance-of-fact-checking-breach-reports\/\" \/>\n<meta property=\"og:site_name\" content=\"rud.is\" \/>\n<meta property=\"article:published_time\" content=\"2012-05-10T18:09:02+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-03-27T14:40:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/rud.is\/b\/wp-content\/uploads\/2012\/05\/breach-error-1.png\" \/>\n<meta name=\"author\" content=\"hrbrmstr\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"hrbrmstr\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2012\\\/05\\\/10\\\/off-by-one-the-importance-of-fact-checking-breach-reports\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2012\\\/05\\\/10\\\/off-by-one-the-importance-of-fact-checking-breach-reports\\\/\"},\"author\":{\"name\":\"hrbrmstr\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#\\\/schema\\\/person\\\/d7cb7487ab0527447f7fda5c423ff886\"},\"headline\":\"Off By One : The Importance Of Fact Checking Breach Reports\",\"datePublished\":\"2012-05-10T18:09:02+00:00\",\"dateModified\":\"2017-03-27T14:40:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2012\\\/05\\\/10\\\/off-by-one-the-importance-of-fact-checking-breach-reports\\\/\"},\"wordCount\":303,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#\\\/schema\\\/person\\\/d7cb7487ab0527447f7fda5c423ff886\"},\"image\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2012\\\/05\\\/10\\\/off-by-one-the-importance-of-fact-checking-breach-reports\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2012\\\/05\\\/breach-error-1.png\",\"articleSection\":[\"Breach\",\"Charts &amp; Graphs\",\"Encryption\",\"Risk\",\"Risk Management\",\"Security Awareness\",\"Threats\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/rud.is\\\/b\\\/2012\\\/05\\\/10\\\/off-by-one-the-importance-of-fact-checking-breach-reports\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2012\\\/05\\\/10\\\/off-by-one-the-importance-of-fact-checking-breach-reports\\\/\",\"url\":\"https:\\\/\\\/rud.is\\\/b\\\/2012\\\/05\\\/10\\\/off-by-one-the-importance-of-fact-checking-breach-reports\\\/\",\"name\":\"Off By One : The Importance Of Fact Checking Breach Reports - rud.is\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2012\\\/05\\\/10\\\/off-by-one-the-importance-of-fact-checking-breach-reports\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2012\\\/05\\\/10\\\/off-by-one-the-importance-of-fact-checking-breach-reports\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2012\\\/05\\\/breach-error-1.png\",\"datePublished\":\"2012-05-10T18:09:02+00:00\",\"dateModified\":\"2017-03-27T14:40:26+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2012\\\/05\\\/10\\\/off-by-one-the-importance-of-fact-checking-breach-reports\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/rud.is\\\/b\\\/2012\\\/05\\\/10\\\/off-by-one-the-importance-of-fact-checking-breach-reports\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2012\\\/05\\\/10\\\/off-by-one-the-importance-of-fact-checking-breach-reports\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2012\\\/05\\\/breach-error-1.png?fit=550%2C206&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2012\\\/05\\\/breach-error-1.png?fit=550%2C206&ssl=1\",\"width\":\"550\",\"height\":\"206\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2012\\\/05\\\/10\\\/off-by-one-the-importance-of-fact-checking-breach-reports\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/rud.is\\\/b\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Off By One : The Importance Of Fact Checking Breach Reports\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#website\",\"url\":\"https:\\\/\\\/rud.is\\\/b\\\/\",\"name\":\"rud.is\",\"description\":\"&quot;In God we trust. All others must bring data&quot;\",\"publisher\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#\\\/schema\\\/person\\\/d7cb7487ab0527447f7fda5c423ff886\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/rud.is\\\/b\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#\\\/schema\\\/person\\\/d7cb7487ab0527447f7fda5c423ff886\",\"name\":\"hrbrmstr\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/i0.wp.com\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/ukr-shield.png?fit=460%2C460&ssl=1\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/ukr-shield.png?fit=460%2C460&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/ukr-shield.png?fit=460%2C460&ssl=1\",\"width\":460,\"height\":460,\"caption\":\"hrbrmstr\"},\"logo\":{\"@id\":\"https:\\\/\\\/i0.wp.com\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/ukr-shield.png?fit=460%2C460&ssl=1\"},\"description\":\"Don't look at me\u2026I do what he does \u2014 just slower. #rstats avuncular \u2022 ?Resistance Fighter \u2022 Cook \u2022 Christian \u2022 [Master] Chef des Donn\u00e9es de S\u00e9curit\u00e9 @ @rapid7\",\"sameAs\":[\"http:\\\/\\\/rud.is\"],\"url\":\"https:\\\/\\\/rud.is\\\/b\\\/author\\\/hrbrmstr\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Off By One : The Importance Of Fact Checking Breach Reports - rud.is","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/rud.is\/b\/2012\/05\/10\/off-by-one-the-importance-of-fact-checking-breach-reports\/","og_locale":"en_US","og_type":"article","og_title":"Off By One : The Importance Of Fact Checking Breach Reports - rud.is","og_description":"I didn&#8217;t read through the Massachusetts 2011 Report on Data Breach Notifications\u00a0[PDF] until recently, but once I went through the report my brain kept telling me &#8220;something is wrong&#8221;. Not something earth shattering, but more of a &#8220;something is off&#8221; signal. This happens more than I&#8217;d like as I tend to constantly background process what [&hellip;]","og_url":"https:\/\/rud.is\/b\/2012\/05\/10\/off-by-one-the-importance-of-fact-checking-breach-reports\/","og_site_name":"rud.is","article_published_time":"2012-05-10T18:09:02+00:00","article_modified_time":"2017-03-27T14:40:26+00:00","og_image":[{"url":"https:\/\/rud.is\/b\/wp-content\/uploads\/2012\/05\/breach-error-1.png","type":"","width":"","height":""}],"author":"hrbrmstr","twitter_card":"summary_large_image","twitter_misc":{"Written by":"hrbrmstr","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/rud.is\/b\/2012\/05\/10\/off-by-one-the-importance-of-fact-checking-breach-reports\/#article","isPartOf":{"@id":"https:\/\/rud.is\/b\/2012\/05\/10\/off-by-one-the-importance-of-fact-checking-breach-reports\/"},"author":{"name":"hrbrmstr","@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886"},"headline":"Off By One : The Importance Of Fact Checking Breach Reports","datePublished":"2012-05-10T18:09:02+00:00","dateModified":"2017-03-27T14:40:26+00:00","mainEntityOfPage":{"@id":"https:\/\/rud.is\/b\/2012\/05\/10\/off-by-one-the-importance-of-fact-checking-breach-reports\/"},"wordCount":303,"commentCount":0,"publisher":{"@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886"},"image":{"@id":"https:\/\/rud.is\/b\/2012\/05\/10\/off-by-one-the-importance-of-fact-checking-breach-reports\/#primaryimage"},"thumbnailUrl":"https:\/\/rud.is\/b\/wp-content\/uploads\/2012\/05\/breach-error-1.png","articleSection":["Breach","Charts &amp; Graphs","Encryption","Risk","Risk Management","Security Awareness","Threats"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/rud.is\/b\/2012\/05\/10\/off-by-one-the-importance-of-fact-checking-breach-reports\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/rud.is\/b\/2012\/05\/10\/off-by-one-the-importance-of-fact-checking-breach-reports\/","url":"https:\/\/rud.is\/b\/2012\/05\/10\/off-by-one-the-importance-of-fact-checking-breach-reports\/","name":"Off By One : The Importance Of Fact Checking Breach Reports - rud.is","isPartOf":{"@id":"https:\/\/rud.is\/b\/#website"},"primaryImageOfPage":{"@id":"https:\/\/rud.is\/b\/2012\/05\/10\/off-by-one-the-importance-of-fact-checking-breach-reports\/#primaryimage"},"image":{"@id":"https:\/\/rud.is\/b\/2012\/05\/10\/off-by-one-the-importance-of-fact-checking-breach-reports\/#primaryimage"},"thumbnailUrl":"https:\/\/rud.is\/b\/wp-content\/uploads\/2012\/05\/breach-error-1.png","datePublished":"2012-05-10T18:09:02+00:00","dateModified":"2017-03-27T14:40:26+00:00","breadcrumb":{"@id":"https:\/\/rud.is\/b\/2012\/05\/10\/off-by-one-the-importance-of-fact-checking-breach-reports\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/rud.is\/b\/2012\/05\/10\/off-by-one-the-importance-of-fact-checking-breach-reports\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/rud.is\/b\/2012\/05\/10\/off-by-one-the-importance-of-fact-checking-breach-reports\/#primaryimage","url":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/05\/breach-error-1.png?fit=550%2C206&ssl=1","contentUrl":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/05\/breach-error-1.png?fit=550%2C206&ssl=1","width":"550","height":"206"},{"@type":"BreadcrumbList","@id":"https:\/\/rud.is\/b\/2012\/05\/10\/off-by-one-the-importance-of-fact-checking-breach-reports\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/rud.is\/b\/"},{"@type":"ListItem","position":2,"name":"Off By One : The Importance Of Fact Checking Breach Reports"}]},{"@type":"WebSite","@id":"https:\/\/rud.is\/b\/#website","url":"https:\/\/rud.is\/b\/","name":"rud.is","description":"&quot;In God we trust. All others must bring data&quot;","publisher":{"@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/rud.is\/b\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886","name":"hrbrmstr","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1","url":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1","contentUrl":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1","width":460,"height":460,"caption":"hrbrmstr"},"logo":{"@id":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1"},"description":"Don't look at me\u2026I do what he does \u2014 just slower. #rstats avuncular \u2022 ?Resistance Fighter \u2022 Cook \u2022 Christian \u2022 [Master] Chef des Donn\u00e9es de S\u00e9curit\u00e9 @ @rapid7","sameAs":["http:\/\/rud.is"],"url":"https:\/\/rud.is\/b\/author\/hrbrmstr\/"}]}},"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p23idr-gF","jetpack_likes_enabled":true,"jetpack-related-posts":[{"id":727,"url":"https:\/\/rud.is\/b\/2011\/12\/30\/three-resolutions-for-web-developers\/","url_meta":{"origin":1033,"position":0},"title":"Three Resolutions For Web Developers","author":"hrbrmstr","date":"2011-12-30","format":false,"excerpt":"I'm on a \"three things\" motif for 2012, as it's really difficult for most folks to focus on more than three core elements well. This is especially true for web developers as they have so much to contend with on a daily basis, whether it be new features, bug reports,\u2026","rel":"","context":"In &quot;Breach&quot;","block_context":{"text":"Breach","link":"https:\/\/rud.is\/b\/category\/breach\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":10257,"url":"https:\/\/rud.is\/b\/2018\/05\/08\/wrangling-data-table-out-of-the-fbi-2017-ic3-crime-report\/","url_meta":{"origin":1033,"position":1},"title":"Wrangling Data Table Out Of the FBI 2017 IC3 Crime Report","author":"hrbrmstr","date":"2018-05-08","format":false,"excerpt":"The U.S. FBI Internet Crime Complaint Center was established in 2000 to receive complaints of Internet crime. They produce an annual report, just released 2017's edition, and I need the data from it. Since I have to wrangle it out, I thought some folks might like to play long at\u2026","rel":"","context":"In &quot;R&quot;","block_context":{"text":"R","link":"https:\/\/rud.is\/b\/category\/r\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2018\/05\/ic3_victim_treemap-1.png?fit=1200%2C771&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2018\/05\/ic3_victim_treemap-1.png?fit=1200%2C771&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2018\/05\/ic3_victim_treemap-1.png?fit=1200%2C771&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2018\/05\/ic3_victim_treemap-1.png?fit=1200%2C771&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2018\/05\/ic3_victim_treemap-1.png?fit=1200%2C771&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":416,"url":"https:\/\/rud.is\/b\/2011\/03\/26\/checkboxes-fail-to-defend-maine-department-of-conservation-against-attacks\/","url_meta":{"origin":1033,"position":2},"title":"Checkboxes Fail To Defend Maine Department of Conservation Against Attacks","author":"hrbrmstr","date":"2011-03-26","format":false,"excerpt":"I tweeted a quick note about the 2010 Maine Department of Conservation state park pass ordering system breach. The brief AP story indicated that the breach itself was caused by a malware infection on systems at their SasS provider InfoSpherix. While the article claims notices were sent to ~1,000 impacted\u2026","rel":"","context":"In &quot;Breach&quot;","block_context":{"text":"Breach","link":"https:\/\/rud.is\/b\/category\/breach\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":6351,"url":"https:\/\/rud.is\/b\/2017\/09\/17\/armchair-quarterbacking-systemic-organization-and-industry-failures\/","url_meta":{"origin":1033,"position":3},"title":"Armchair Quarterbacking Systemic Organization and Industry Failures","author":"hrbrmstr","date":"2017-09-17","format":false,"excerpt":"insert(post, \"{ 'standard_disclaimer' : 'My opinion, not my employer\\'s' }\") This is a post about the fictional company FredCo. If the context or details presented by the post seem familiar, it's purely coincidental. This is, again, a fictional story. Let's say FredCo had a pretty big breach that (fictionally) garnered\u2026","rel":"","context":"In &quot;Cybersecurity&quot;","block_context":{"text":"Cybersecurity","link":"https:\/\/rud.is\/b\/category\/cybersecurity\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1376,"url":"https:\/\/rud.is\/b\/2012\/06\/23\/breach-reach-google-insights\/","url_meta":{"origin":1033,"position":4},"title":"Breach Reach : Google Insights","author":"hrbrmstr","date":"2012-06-23","format":false,"excerpt":"UPDATE: I had to remove the Google Insight widgets and replace them with static images. There was inconsistent loading far too often in non-Chrome browsers. Click on the graphs to go to the Google Insights detail pages for more interaction with the data. Information security breaches have been the \"new\u2026","rel":"","context":"In &quot;Breach&quot;","block_context":{"text":"Breach","link":"https:\/\/rud.is\/b\/category\/breach\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1948,"url":"https:\/\/rud.is\/b\/2013\/01\/27\/once-more-into-the-prc-aggregated-breaches\/","url_meta":{"origin":1033,"position":5},"title":"Once More Into The [PRC Aggregated] Breaches","author":"hrbrmstr","date":"2013-01-27","format":false,"excerpt":"If you're not on the SecurityMetrics.org mailing list you missed an interaction about the Privacy Rights Clearinghouse Chronology of Data Breaches data source started by Lance Spitzner (@lspitzner). You'll need to subscribe to the list see the thread, but one innocent question put me down the path to taking a\u2026","rel":"","context":"In &quot;Breach&quot;","block_context":{"text":"Breach","link":"https:\/\/rud.is\/b\/category\/breach\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/posts\/1033","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/comments?post=1033"}],"version-history":[{"count":0,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/posts\/1033\/revisions"}],"wp:attachment":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/media?parent=1033"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/categories?post=1033"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/tags?post=1033"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}