Posts tagged ID
Public asked to help identify indecent exposure suspect
Police in Boulder have released a sketch of a male who witnesses say exposed himself to them outside Macy’s, located at 1900 29th Street, on August 24, 2012. The incident happened around 1:00 p.m.
The two victims are females, 22 and 23 years old. They told investigators that they were sitting on a bench outside the department store when they noticed a male locking his bike at a bike rack near the parking garage. They say he stared at them as he walked up the stairs of the parking garage, and reappeared on the second floor where they could see him masturbating. They say he fully exposed himself to them. (The case number is 12-11459).
Police are trying to identify the male suspect. He is described as:
- White male
- 5’8” – 5’9” tall
- 130 lbs. – 160 lbs.
- Short, dark hair
- Between 20-and-24 years old
- “Scruffy” facial hair
- Wearing a gray shirt & either blue shorts or blue jeans, and carrying a backpack
- Riding a mountain bike
The mountain bike has been recovered by police and is being processed for evidence.
Another incident involving a similarly-described suspect occurred on August 18 in the 2600 block of Mapleton. Investigators are looking into the possibility that the two cases are related. (The Mapleton case number is 12-11092).
In the Mapleton incident, a female resident reported that a male suspect, riding a mountain bike, exposed himself while masturbating as she was doing yard work at 5:45 p.m. The suspect fled the area on the bike. In this case, the suspect was wearing a white shirt and long, checkered, light-colored shorts.
Anyone with information is asked to contact Detective Ruth Christopher at 303-441-1850. Those who have information but wish to remain anonymous may contact the Northern Colorado Crime Stoppers at 1-800-222-TIPS (8477) or 1-800-444-3776. Tips can also be submitted through the Crime Stoppers website at www.crimeshurt.com. Those submitting tips through Crime Stoppers that lead to the arrest and filing of charges on a suspect(s) may be eligible for a cash reward of up to $1,000 from Crime Stoppers.
The body of missing CU student Nicholas Valore was presumably found in the Flatirons west of NCAR Friday at the base of a steep, rocky ridge. He had been missing since Sunday when he told friends he was going hiking. Fellow classmates alerted authorities that he had not returned by Thursday, His car was subsequently found in the NCAR parking lot. His hiking gear was not in the car.
Boulder Parks and Recreation launches recreation pass program for veterans and active duty military personnel
The Boulder Parks and Recreation Department will offer a special recreation facility pass program for veterans, active duty and reservist military personnel beginning Monday, May 21. Boulder City Councilmember Tim Plass proposed the program, which was approved by City Council on May 15.
The program includes a one-time, free, 90-day recreation facility pass for post-9/11 veterans who are City of Boulder residents. It also offers a 25 percent discount on annual passes for all military personnel and veterans who reside in the City of Boulder or Boulder County. The program is not retroactive for current pass holders. The passes provide entry to all three city recreation centers, two outdoor pools and the Boulder Reservoir.
“We are honored to offer this program and provide an opportunity for returning veterans and other service personnel to participate in health and fitness programs in our local community,” said Alice Guthrie, recreation superintendent for the Parks and Recreation Department.
To qualify, applicants must have served in one of the following branches of service, identified by the Department of Defense:
● Air Force
● Coast Guard
● National Guard
● Merchant Marines
To receive the free 90-day recreation pass, applicants must go to the Parks and Recreation administrative offices at 3198 Broadway Ave. and show a DD-214 form with separation date and a photo ID. To receive the 25 percent discount, applicants must bring either a DD-214 form, valid Veterans ID from the Veterans Affairs Office or valid Active Duty or Reservist ID to one of the three city recreation centers (North Boulder Recreation Center at 3170 Broadway Ave., East Boulder Community Center at 5660 Sioux Drive or South Boulder Recreation Center at 1360 Gillaspie Drive).
The Parks and Recreation Department also offers veterans a variety of therapeutic recreation programs through the EXPAND (EXciting Programs, Adventures and New Dimensions) program.
For more information on the veterans and active duty military personnel facility pass program, visit www.BoulderParks-Rec.org.
In a recent phone call from Seth Brigham to Boulder Channel 1 news , he said that he had retained famed civil rights attorney, David Lane, and planned on suing the city of Boulder for arresting him again. Below is tonights email from Brigham and court documents for discovery. (In full disclosure David Lane is the personal attorney of Jann Scott and Boulder Channel 1 in matters of civil rights violations by the city of Boulder. Seth Brigham has been a columnist for Boulder Channel 1 and has produced videos for us)
MUNICIPAL Court, city of boulder,
state of Colorado
Court Address: 1777 – Sixth Street, Boulder, CO 80302
Court Phone: 303.441.1842
Plaintiff: THE PEOPLE OF THE CITY OF BOULDER,
by and on behalf of, THE PEOPLE OF THE STATE
Defendant: SETH RUBIN BRIGHAM
COURT USE ONLY
Attorney Name: Philip Bienvenu,
206 UCB, UMC 311
Boulder, CO 80309-0206
Attorney Reg. #: 10412
Attorney Phone: 303.492.6813
Attorney Fax: 303.735.5398
Attorney Email: email@example.com
MOTION FOR DISCOVERY
Defendant in this case agreed to a Deferred Prosecution on 8-17-11. The following week, Defense Counsel informed the City Prosecutor that we wished to move forward with further discovery, in particular any contents of the case file maintained at the Boulder Police Department, whether or not those materials had yet been turned over to the City Prosecutor’s Office for its file. We are aware that such a separate file is routinely maintained in Municipal Court Criminal cases and the materials sometimes not turned over until the eve of trial. We were informed by the Prosecutor Ms. Michels that she considered the case files and materials no longer discoverable because the Deferred Prosecution is in effect. Defendant’s position is that the case has not been dismissed and is in fact subject to reopen on the Prosecution’s judgment call. There is nothing precluding continuing investigation and preparation for possible trial by either party to the case. We therefore maintain that discovery rights have not been waived or abandoned by the Defendant and should be honored as with any pending case not yet dismissed. The only way the Prosecution could cut off further discovery rights under the case would be full dismissal, which has not happened. Delaying discovery burdens and prejudices Defendant’s right to prepare for possible trial and to be ready should that eventuality become necessary. There can be no claim of prejudice or unfair burden on the Prosecution if this request is granted, because these are just rights the Defendant has in any pending criminal case, and concomitant duties of the Prosecution in any pending criminal case.
We therefore ask the Court to Order continuing discovery of all relevant materials in the case, including all material in the Police Department’s case file, including photos, interview tapes and/or notes, and all materials.
Philip Bienvenu #10412
Attorney for Defendant
Police seek help identifying identity theft suspect
Boulder police are asking for the public’s assistance identifying a suspect in an identity theft case. On Jan. 6, a suspect entered a parked car and stole the victim’s wallet and ID. The suspect then used the victim’s stolen credit cards and made over $2,000 in purchases at the Best Buy in Boulder.
The suspect who used the credit cards is described as a white male with reddish brown hair and a light complexion. He appeared to be in his 20’s. Surveillance photos of the suspect are attached.
The case number for this incident is 11-226.
Anyone with information about this crime is asked to contact the Boulder Police Detective Section at 303-441-3330. Those who have information but wish to remain anonymous may contact the Northern Colorado Crime Stoppers at 1-800-222-TIPS (8477) or1-800-444-3776. Tips can also be submitted via the Crime Stoppers website at www.crimeshurt.com. Those submitting tips through Crime Stoppers that lead to the arrest and filing of charges on a suspect(s) may be eligible for a cash reward of up to $1,000 from Crime Stoppers.
from Read Write Web
Obama’s Internet Plan Sounds an Awful Lot Like a National Internet ID
White House Cybersecurity Coordinator Howard Schmidt announced to the Stanford Institute for Economic Policy Research on Friday that President Obama intended to turn over development of a national Internet ID to the Commerce Department.
Pursuant to the Orwellian-sounding National Strategy for Trusted Identities in Cyberspace, which the administration is currently writing, Commerce will create a program to provide and administer an allegedly voluntary interoperable verified online IDs.
An early draft makes the case for such an ID.
“(A) secure cyberspace is critical to the health of our economy and to the security of our Nation. In particular, the Federal Government must address the recent and alarming rise in online fraud, identity theft, and misuse of information online. One key step in reducing online fraud and identity theft is to increase the level of trust associated with identities in cyberspace. While this Strategy recognizes the value of anonymity for many online transactions (e.g., blog postings), for other types of transactions (e.g., online banking or accessing electronic health records) it is important that the parties to that transaction have a high degree of trust that they are interacting with known entities.”
According to Commerce Secretary Gary Locke, as reported by CNET:
“We are not talking about a national ID card. We are not talking about a government-controlled system. What we are talking about is enhancing online security and privacy, and reducing and perhaps even eliminating the need to memorize a dozen passwords, through creation and use of more trusted digital identities.”
We are talking about a government-controlled system. That is exactly what we are talking about. In fact, the presentation of what few facts exist is vague enough as to be good for nothing but worry.
Here are the few facts on the program that are available.
- The government will enable the creation of verified identities
- The government will create an “Identity Ecosystem”
- Getting a verified identity will be elective
- Verizon, Google, PayPal, Symantec and AT&T support the program
- A user would be able to use one login to sign in to all of their sites
So, a user would have one, “verified” ID, which would be known by the government, and a set of large corporations. Given the periodic outbreak of governmental and corporate shenanigans, we fail to see the benefit of such a system.
Further, the “Identity Ecosystem” sounds strangely like the national intranet the Chinese government has been working on, as an alternative to the Internet as a whole, and more controllable.
“The Identity Ecosystem is the embodiment of the vision. It is an online environment where individuals, organizations, services, and devices can trust each other because authoritative sources establish and authenticate their digital identities.”
We write frequently here about Facebook’s efforts to become the source of a universal verified online ID system, but a campaign by the US government to do something similar is another matter. It would be niave to assume that either party is motivated by nothing more than convenience on the part of users.
from: Coding Horror
Programming and human factors
by Jeff AtwoodNov 13, 2010
The Firefox add-in Firesheep caused quite an uproar a few weeks ago, and justifiably so. Here’s how it works:
- Connect to a public, unencrypted WiFi network. In other words, a WiFi network that doesn’t require a password before you can connect to it.
- Install Firefox and the Firesheep add-in.
- Wait. Maybe have a latte while you’re waiting.
- Click on the user / website icons that appear over time in Firesheep to instantly log in as that user on that website.
Crazy! This guy who wrote Firesheep must be a world-class hacker, right?
Well, no. The work to package this up in a point-and-click way that is (sort of) accessible to power users is laudable, but what Firesheep actually does is far from magical. It’s more of an art project and PR stunt than an actual hack of any kind. Still, I was oddly excited to see Firesheep get so much PR, because it highlights a fundamental issue with the architecture of the web.
The web is kind of a primitive medium. The only way websites know who you are is through tiny, uniquely identifiying strings your browser sends to the webserver on each and every click:
GET / HTTP/1.1
If-Modified-Since: Tue, 09 Nov 2010 04:41:12 GMT
These are the typical sort of HTTP headers your browser sends to a website on every click. See that little cookie in bright red? To a website, that’s your fingerprint, DNA, and social security number all rolled into one. Some part of the cookie contains a unique user ID that tells the website you are you.
And guess what? That cookie is always broadcast in plain text every single time you click a link on any website. Right out in the open where anyone — well, technically, anyone who happens to be on the same network as you and is in a position to view your network packets — can just grab it out of the ether and immediately impersonate you on any website you are a member of.
Now that you know how cookies work (and I’m not saying it’s rocket surgery or anything), you also know that what Firesheep does is relatively straightforward:
- Listen to all HTTP traffic.
- Wait for HTTP headers from a known website.
- Isolate the part of the cookie header that identifies the user.
- Launch a new browser session with that cookie. Bam! As far as the target webserver is concerned, you are that user!
All Firesheep has to do, really, is listen. That’s pretty much all there is to this “hack”. Scary, right? Well, then you should be positively quaking in your boots, because this is the way the entire internet has worked since 1994, when cookies were invented.
So why wasn’t this a problem in, say, 2003? Three reasons:
- Commodity public wireless internet connections were not exactly common until a few years ago.
- Average people have moved beyond mostly anonymous browsing and transferred significant parts of their identity online (aka the Facebook effect).
- The tools required to listen in on a wireless network are slightly … less primitive now.
Firesheep came along at the exact inflection point of these three trends. And mind you, it is still not a sure thing — Firesheep requires a particular set of wireless network chipsets that support promiscuous mode in the lower level WinPcap library that Firesheep relies on. But we can bet that the floodgates have been opened, and future tools similar to this one will become increasingly a one-click affair.
The other reason this wasn’t a problem in 2003 is because any website that truly needed security switched to encrypted HTTP — aka Secure HTTP — long ago. HTTPS was invented in 1994, at the same time as the browser cookie. This was not a coincidence. The creators of the cookie knew from day one they needed a way to protect them from prying eyes. Even way, way back in the dark, primitive ages of 2003, any banking website or identity website worth a damn wouldn’t even consider using plain vanilla HTTP. They’d be laughed off the internet!
The outpouring of concern over Firesheep is justified, because, well, the web’s cookie jar has always been kind of broken — and we ought to do something about it. But what?
Yes, you can naively argue that every website should encrypt all their traffic all the time, but to me that’s a “boil the sea” solution. I’d rather see a better, more secure identity protocol than ye olde HTTP cookies. I don’t actually care if anyone sees the rest of my public activity on Stack Overflow; it’s hardly a secret. But gee, I sure do care if they somehow sniff out my cookie and start running around doing stuff as me! Encrypting everything just to protect that one lousy cookie header seems like a whole lot of overkill to me.
I’m not holding my breath for that to happen any time soon, though. So here’s what you can do to protect yourself, right now, today:
- We should be very careful how we browse on unencrypted wireless networks. This is the great gift of Firesheep to all of us. If nothing else, we should be thanking the author for this simple, stark warning. It’s an unavoidable fact of life: if you must go wireless, seek out encrypted wireless networks. If you have no other choices except unencrypted wireless networks, browse anonymously — quite possible if all you plan to do is casually surf the web and read a few articles — and only log in to websites that support https. Anything else risks identity theft.
- Get in the habit of accessing your web mail through HTTPS. Email is the de-facto skeleton key to your online identity. When your email is compromised, all is lost. If your webmail provider does not support secure http, they are idiots. Drop them like a hot potato and immediately switch to one that does. Heck, the smart webmail providers already switched to https by default!
- Lobby the websites you use to offer HTTPS browsing. I think we’re clearly past the point where only banks and finance sites should be expected to use secure HTTP. As more people shift more of their identities online, it makes sense to protect those identities by moving HTTPS from the domain of a massive bank vault door to just plain locking the door. SSL isn’t as expensive as it used to be, in every dimension of the phrase, so this is not an unreasonable thing to ask your favorite website for.
This is very broad advice, and there are a whole host of technical caveats to the above. But it’s a starting point toward evangelizing the risks and responsible use of open wireless networks. Firesheep may indeed have broken the web’s cookie jar. But it was kind of an old, beat up, cracked cookie jar in the first place. I hope the powers that be will use Firesheep as incentive to build a better online identity solution than creaky old HTTP cookies.
Posted by Jeff Atwood
Boulder County, Colo. – Registered voters can choose to vote at any early-voting location in Boulder County beginning Monday, Oct. 18.
Boulder County will have six early-voting locations available this year:
- County Clerk’s Office – 1750 33rd St., Boulder
- County Courthouse, East Wing – 2025 14th St., Boulder
- University of Colorado at Boulder, Recreation Center – UCB 355, Boulder
- Lafayette Public Library – 775 W. Baseline Road, Lafayette
- County Clerk’s Office – 529 Coffman St., Longmont
- Twin Peaks Mall (near Sears) – 1250 S. Hover Road, Longmont
Locations will be open:
- 8 a.m.-6 p.m., Monday-Friday, Oct. 18-29
- 9 a.m.-3 p.m., Saturday, Oct. 23
Voters can choose to vote on paper ballots or ADA-accessible voting machines at any location.
Voters are required to present an acceptable form of ID such as a valid Colorado driver’s license, valid U.S. passport or valid student identification card with a photograph of the voter. A complete list of acceptable forms of ID is available at www.VoteBoulder.org.
Voters also have the option to vote by mail-in ballot or at their assigned polling places on Tuesday, Nov. 2. Boulder County began mailing ballots on Oct. 12.
Voters can check their voter information at www.VoteBoulder.org or call 303-413-7740 to verify their voter registration information, ensure their ballots were mailed and received by the clerk’s office or to find their assigned polling places.
30th Street murders INSIDE JOB no suspect being sought; 3 dead in Boulder shooting at “Boulder Stove and Flooring;
It turns out this was a murder suicide, a work place incident and it was over money.
According to a source close to all parties and Boulder Channel 1 here’s what happened. Robert Montgomery was the shooter. Monday was his day off, but he came to work anyway. He left his car at home and had no ID on him. He took the bus to work. He waited for all other employees to leave and the store to be empty except for the two owners husband and wife Gerald and Staci Griffin. He then shot and killed them and then killed himself.
It seems that last week the griffins had changed the payments of commission checks to spread the payments out equally through the month, but they did not tell Montgomery. He was due $800 in commissions plus his salary, but when he saw his direct deposit to his account on Friday he received only $250 in commissions. Montgomery had quit one and one half months ago over a commission check discrepancy but came back when that situation was resolved.
He also suffered from Asbergers syndrome which according to wiki:
“Asperger syndrome or Asperger’s syndrome is an autism spectrum disorder, and people with it therefore show significant difficulties in social interaction, …”
He apparently cracked and killed everybody. And that….. is just what happened.
As a special note; here at boulder channel 1 we always pay our people on time and what we promised. We pay 100% commissions the week they are earned. We do not change commissions structure. We bring this up because of the aggressive nature of sales reps and it is good to not have them pissed off all of the time. with a poor an unstable economy, the increase in violence and suicides over financial woes, this unfortunate incident should serve a lesson to employers. Employees operate much better when their pay is stable. It is also good to hire people with good mental health which proved to be pivotal here.