{"id":196,"date":"2023-04-30T18:30:25","date_gmt":"2023-04-30T18:30:25","guid":{"rendered":"https:\/\/www.hexkey.co.uk\/lee\/?p=196"},"modified":"2023-04-30T18:30:25","modified_gmt":"2023-04-30T18:30:25","slug":"person-of-interest-s2e13","status":"publish","type":"post","link":"https:\/\/www.hexkey.co.uk\/lee\/log\/2023\/04\/person-of-interest-s2e13\/","title":{"rendered":"Person of Interest S2E13"},"content":{"rendered":"\n<p>Notes for season 2 episode 13, &#8220;<a href=\"https:\/\/personofinterest.fandom.com\/wiki\/Dead_Reckoning\">Dead Reckoning<\/a>&#8220;<\/p>\n\n\n\n<p>02:07 Finch pulls a bunch of fake books to construct the social security number, among them &#8220;Debugging the Mind: A Guide to Information Ethics&#8221;<\/p>\n\n\n\n<p>09:39 I believe the game being played in the disk-seller&#8217;s place is 2012&#8217;s &#8220;Far Cry 3&#8221;.<\/p>\n\n\n\n<p>09:41 The disk is plugged into what looks like a USB-SATA interface, probably an Icy Box IB-110. The disk looks like a 3.5in unit consisting of a smaller 2.5in laptop HDD mounted on to a big heat sink. It looks fictional, but this was an actual product &#8211; the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Western_Digital_Raptor\" data-type=\"URL\" data-id=\"https:\/\/en.wikipedia.org\/wiki\/Western_Digital_Raptor\">Western Digital VelociRaptor\u00a0HLFS<\/a> &#8211; something that could only exist in the brief window where disk temperature was a pressing issue but SSDs were still too expensive in high capacities.<\/p>\n\n\n\n<p>The seller places the drive in a black Pelican case (Peli 1120) similar to the one I used to carry off-site LTOs in. Sometimes I find myself considering making lifestyle changes such that would justify having a number of Pelican cases.<\/p>\n\n\n\n<p>13:30 Uncle Decima shows a different &#8220;Ordos laptop&#8221; than the Toughbook seen in an earlier episode, but even within the reality of the scene, it&#8217;s just a prop.<\/p>\n\n\n\n<p>18:43 The building&#8217;s domain <code>780mercer.org<\/code> is currently unregistered.<\/p>\n\n\n\n<p>18:50 The shell company&#8217;s corporate report is dated Jan 2013, and this episode aired in Jan 2013. But since the last few episodes (with Reese in prison) need to have taken place over a short number of days, it&#8217;s still late 2012.<\/p>\n\n\n\n<p>28:42 The DoD memo indicated the development of a malware, like Stuxnet or Flame, called Cygnus, that can be delivered via mp3 players.<\/p>\n\n\n\n<p>29:35 Based on a brief shot, I think the servers hosting the cyberweapon are based on a Supermicro 1U chasis.<\/p>\n\n\n\n<p>30:24 The government is investing millions in a project wholly located at the top of a large New York building with no backups? Was there a meeting where someone pointed out a very obvious failure state for this plan?<\/p>\n\n\n\n<p>31:16 Obligatory <a href=\"https:\/\/nmap.org\/zenmap\/images\/zenmap-no-648x700.png\" data-type=\"URL\" data-id=\"https:\/\/nmap.org\/zenmap\/images\/zenmap-no-648x700.png\">NMAP screenshot<\/a>.<\/p>\n\n\n\n<p>37:22 &#8220;All phones have a universal unlock code based on their model and the unique IMEI number.&#8221; This is sort of true, but an unlock code that&#8217;s derived from the IMEI is used to unlock the phone from a specific network, not the code used to unlock the phone&#8217;s interface.<\/p>\n\n\n\n<p>39:48 If I were developing a user interface for a suicide vest, I&#8217;d avoided making. the touch target for &#8220;Cancel&#8221; right next to &#8220;Trigger&#8221;. Touch targets are unreliable enough as it is, but this is designed to be for a device strapped to a non-stationary object. I hope someone left an issue on the suicide bomb software&#8217;s GitHub project.<\/p>\n\n\n\n<p>42:15 Apparently the next-gen malware is coded in Visual C++. The visual map of the drive is seemingly taken using <a href=\"https:\/\/daisydiskapp.com\" data-type=\"URL\" data-id=\"https:\/\/daisydiskapp.com\">Daisy Disk<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Notes for season 2 episode 13, &#8220;Dead Reckoning&#8220; 02:07 Finch pulls a bunch of fake books to construct the social security number, among them &#8220;Debugging the Mind: A Guide to Information Ethics&#8221; 09:39 I believe the game being played in the disk-seller&#8217;s place is 2012&#8217;s &#8220;Far Cry 3&#8221;. 09:41 The disk is plugged into what [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[7],"class_list":["post-196","post","type-post","status-publish","format-standard","hentry","category-notes","tag-person-of-interest"],"_links":{"self":[{"href":"https:\/\/www.hexkey.co.uk\/lee\/wp-json\/wp\/v2\/posts\/196","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hexkey.co.uk\/lee\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hexkey.co.uk\/lee\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hexkey.co.uk\/lee\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hexkey.co.uk\/lee\/wp-json\/wp\/v2\/comments?post=196"}],"version-history":[{"count":1,"href":"https:\/\/www.hexkey.co.uk\/lee\/wp-json\/wp\/v2\/posts\/196\/revisions"}],"predecessor-version":[{"id":197,"href":"https:\/\/www.hexkey.co.uk\/lee\/wp-json\/wp\/v2\/posts\/196\/revisions\/197"}],"wp:attachment":[{"href":"https:\/\/www.hexkey.co.uk\/lee\/wp-json\/wp\/v2\/media?parent=196"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hexkey.co.uk\/lee\/wp-json\/wp\/v2\/categories?post=196"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hexkey.co.uk\/lee\/wp-json\/wp\/v2\/tags?post=196"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}