Stilgherrian (@stilgherrian)

Wentworth Falls NSW AU

The below is an off-site archive of all tweets posted by @stilgherrian ever

April 13th, 2016

I’m sure that whatever you’re saying about me is witty and cutting, but I’n going to bed ‘cos I have an early start tomorrow.

via TweetDeck

Oh good. The conference dinner bus could drop me two blocks from the SEKRIT apartment because GPS.

via Tweetbot for iΟS

This man is sitting nearby and I know who he is. He should be more careful. twitter.com/nukolator/stat…

via Tweetbot for iΟS

Waiter just came to me and said “Here, I’ve been told you need more tiramisu.” Goddam trolls.

via Tweetbot for iΟS

Yeah so @darrenpauli is talking again and we are all so polite.

via Tweetbot for iΟS

Look, it’s complicated.

via Tweetbot for iΟS

So the Umbilical Bothers just told me to fuck off. I suppose they had their reasons.

via Tweetbot for iΟS

Something about a box of otters and hand lotion.

via Tweetbot for iΟS

@SMinney Some random blended 2015 SSB, at this stage.

via Tweetbot for iΟS in reply to SMinney

Is this a euphemism? It sounds like a euphemism. twitter.com/ThangNgo/statu…

via Tweetbot for iΟS

JZdziarski OH: Well, the way the Internet has turned out, researchers should have originally called it the DERPANET.

via Tweetbot for iΟS (retweeted on 8:51 PM, Apr 13th, 2016 via Tweetbot for iΟS)

jockywilson10 Yet another horrific road accident to mark the beginning of Songkran… pic.twitter.com/llD2Rw6tTC

via Twitter for Android (retweeted on 8:23 PM, Apr 13th, 2016 via Tweetbot for iΟS)

@voltagex Indeed, Princess, indeed… *magic wand*

via Tweetbot for iΟS in reply to voltagex

Tony Ate… at Eight #45: Tony takes the salty Greek balls deep into his mouth. (Photo: Tertius Pickard/AAPpic.twitter.com/9tTgZ0wu6w6w

via TweetDeck

“Tony Ate… at Eight” is a tribute to Abbott’s love of things in his mouth, and to doing it the Greek way. 0800 AEST, repeated 2000 AEST.

via TweetDeck

@voltagex I’m here until late morning Friday, but flat put except for tomorrow evening when @bigmac and some others will be seeking.

via Tweetbot for iΟS in reply to voltagex

johnb78 I’m told @stilgherrian carries a bunch of these around as pre-printed cards with the city name left to fill in. twitter.com/SuperCroup/sta…

via TweetDeck (retweeted on 7:12 PM, Apr 13th, 2016 via Tweetbot for iΟS)

Certain People at my table have just suggested I fire up a burner Grindr account.

via Tweetbot for iΟS

@riskybusiness Cool. I may not get it to you until Friday ‘cos I’m flat out. But… eventually. Just a Zoom from my table.

via Tweetbot for iΟS in reply to riskybusiness

@riskybusiness True. A couple of the Atlanta guys. I’ll grab their names later, or hit the conference program. Want audio later up?

via Tweetbot for iΟS in reply to riskybusiness

Our MC is ABC @666canberra’s Genevieve Jacobs.

via Tweetbot for iΟS

OH, on etiquette: “I copied @darrenpauli, that was my first fuckin’ mistake!”

via Tweetbot for iΟS

@lastres0rt It does. This is for enterprise targets, not SMEs. But yes. We were shocked.

via Tweetbot for iΟS in reply to lastres0rt

That’s all the formal sessions. Apparently there are buses to the dinner at the Australian Institute of Sport.

via Tweetbot for iΟS

“Airbus boarded by 12 nation-state, crimeware ‘breaches’ every year”, writes @darrenpauli theregister.co.uk/2016/04/13/air…

via TweetDeck

The #1 vector for ransomware is still macros in MS Office document attachments through email. [WTF?]

via TweetDeck

Moving stuff to the cloud makes it much harder to do post-breach forensics. At least CERT-AU doesn’t need chain of custody.

via TweetDeck

I think most parents would agree that we need a Kill List for 7-month-olds. twitter.com/CliveSSmith/st…

via TweetDeck

Brown is reinforcing the need for supply chain security. They’ve seen trojanised drivers on installation media.

via TweetDeck

@jheazlewood Everything* the FBI guys told us was both true and cool at all times and also very true.

via TweetDeck in reply to jheazlewood

Also having success with incident response exercises. CERT-AU ran 15 exercises last year.

via TweetDeck

CERT-AU has been having real success with STIX. Alerts go out automatically. pic.twitter.com/PKDT9JI90W

via Twitter for iPhone

“We’ve all got job security for the next 50 years.”

via TweetDeck

To get on the front foot, long-term change is required at many levels, and tactical solutions in the interim.

via TweetDeck

@jheazlewood According to the FBI guys, yes, actual eagles.

via TweetDeck in reply to jheazlewood

As for targeted intrusions, playbook hasn’t changed but motivation and targets have.

via TweetDeck

darrenpauli The calibre of questions asked at @Metlstorm talks pic.twitter.com/gy0ysXBOFK

via Twitter for Android (retweeted on 4:42 PM, Apr 13th, 2016 via TweetDeck)

Not much has changed in ransomware. There’s a few more variants and a lot more volume.

via TweetDeck

Volume increased “by an order of magnitude”, in fact.

via TweetDeck

The business category was business email compromise (BEC) and ransomware. Volume has increased dramatically in last 12 months.

via TweetDeck

Deal with three categories: issue-motivared groups (none recently); crimeware; targeted intrusions.

via TweetDeck

Most of the 14,000 were simple things like defacements, and CERT-AU is automating as much of their response as possible.

via TweetDeck

Next up, my final session: Scott Brown, CERT Australia, What has your National CERT been up to? acsc2016.com.au/program/?IntCa…

via TweetDeck

A disappointing outtake from the latest Manpower Australia audition reel. twitter.com/deemadigan/sta…

via TweetDeck

MolksTVTalk CHEMTRAILS twitter.com/1395FIVEaa/sta…

via TweetDeck (retweeted on 4:25 PM, Apr 13th, 2016 via Tweetbot for iΟS)

“You’re either current, or you’re screwed.”

via TweetDeck

@iain_chalmers Surely, since it’s shallow water, we’d need cyberhovercraft?

via TweetDeck in reply to iain_chalmers

MS Word is the CMS for ~138,000 websites globally. Now there’s a thing.

via TweetDeck

RealNickHodge How clean are your carpets?

via Twitter for Mac (retweeted on 4:03 PM, Apr 13th, 2016 via TweetDeck)

1,031,385 is a number I wish to remember later.

via TweetDeck

alliecoyne The federal govt will launch its cyber security strategy next Thursday, Lynwen Connick just confirmed itnews.com.au/news/revealed-…

via Twitter Web Client (retweeted on 3:54 PM, Apr 13th, 2016 via TweetDeck)

Next up: Kayne Naughton, Cosive, The Dusty Web - an Exploration of Australian Website Security acsc2016.com.au/program/?IntCa…

via TweetDeck

All the tactical threat intelligence and SIGINT doesn’t replace good ol’ HUMINT.

via TweetDeck

There’s a shift away from exclusively “cyber crime” towards to old-school crime networks. [Must get exact quote.]

via TweetDeck

The elite crime groups (not just cyber) are well connected and all seem to know each other.

via TweetDeck

The FBI guys recommends we adopt “the giant metaphor of a hug”. So there’s that.

via TweetDeck

alliecoyne FBI guys have prepared voice overs of hacker chat logs and it is hilarious

via Twitter Web Client (retweeted on 3:39 PM, Apr 13th, 2016 via TweetDeck)

That was a great walk-through of a $6M cyberheist [shut up]. Will write up some of it later.

via TweetDeck

@dmeeze @bulletproofnet Not my problem. Take it up with the FBI. ;)

via TweetDeck in reply to dmeeze

These bad guys have the ability to decrypt 550k card numbers per hour. The rest of the convo is full of indicators of skills.

via TweetDeck

Four days out from the crime, the attackers are in the bank’s network and sniffing everything.

via TweetDeck

“We can’t tell you how we obtained this audio and video. Just assume that we have our ways.”

via TweetDeck

Being stepped thru the conversation between attackers two months before the crime.

via TweetDeck

Yes, they are actually saying this.

via TweetDeck

“We’re the FBI. We don’t use gnomes. We use eagles to attack cybercriminals.” pic.twitter.com/qcaTHaFK8L

via Twitter for iPhone

The FBI guys are now explaining the link between online attackers the underpants gnomes. Great work.

via TweetDeck

So the FBI guys just gave a shout-out to @riskybusiness, which they listen to every week.

via TweetDeck

Step 1: Attack and steal your stuff. Step 3: Profit. This is about Step 3. We now watch the relevant South Park clip. Thanks, FBI.

via TweetDeck

The aim of this session is to show us that the attackers are doing and thinking during the attack.

via TweetDeck

Next up, in a few mins: Chad Hunt & Mark Ray, FBI, Mysterious ‘Phase 2’ - The Attacker’s View acsc2016.com.au/program/?IntCa…

via TweetDeck

AGD just asked whether it was me who asked the difficult question. (For the record, no, it wasn’t.)

via Tweetbot for iΟS

@christopherneal Well, @TFeakin_ASPI said the strategy will be “pushing hard” on private-sector involvement. So there’s that.

via TweetDeck in reply to christopherneal

Wood has just been challenged on basing her preso on vendor reports. The answer is a bit vague about “intelligence partners”.

via TweetDeck

@christopherneal @jturner_ibrs Oh indeed. The guy who made those comments was, um, passionate in that meeting.

via TweetDeck in reply to christopherneal

“Collaboration across government and industry is the most important thing.” Drink!

via TweetDeck

@bigmac I remember Centrebet ‘cos it was hours before Rugby World Cup final, was asked for $40k, told the crims to fuck off, wore the loss.

via TweetDeck in reply to bigmac

Slides of news stories about ransomware in hospitals etc.

via TweetDeck

A surprisingly large number of people in this room are leaning forward in rapt attention. I feel like an alien.

via TweetDeck

I am about to start sulking and/or being disruptive.

via TweetDeck

Because mysteries are scarier than facts. Der. twitter.com/NewtonMark/sta…

via TweetDeck

Now hearing about DDoS-extortion. [This has been happening for years, tho. Centrebet got hit… 10 years ago?sc

via TweetDeck

CyberTaters RT @darrenpauli: Potato crime in Australia costs the country somewhere around the current price of avocados.

via potatoes on the moon (retweeted on 2:12 PM, Apr 13th, 2016 via TweetDeck)

darrenpauli Cyber crime in Australia costs the country somewhere around the current price of avocados.

via Twitter for Android (retweeted on 2:11 PM, Apr 13th, 2016 via TweetDeck)

Dridex is the biggest credential-harvesting malware in AU.

via TweetDeck

Wood runs through the Dyre credential-harvesting malware. Again, open-source data, from IBM in this case.

via TweetDeck

So far all of the figures Wood is citing are from published ACC or vendor reports. Waiting.

via TweetDeck

alliecoyne I have a sneaking suspicion that figure may have been borrowed from the oft-cited Symantec estimate.

via Twitter Web Client (retweeted on 2:07 PM, Apr 13th, 2016 via TweetDeck)

alliecoyne Difficult to measure cost and harm of cybercrime, Crime Commission says, but puts the figure at $1 billion

via Twitter Web Client (retweeted on 2:07 PM, Apr 13th, 2016 via TweetDeck)

alliecoyne According to the Crime Commission, cybercrime is an “undeniable” and “unrelenting” threat to Australia

via Twitter Web Client (retweeted on 2:07 PM, Apr 13th, 2016 via TweetDeck)

Wood refers to ACC’s “The Costs of Serious and Organised Crime in Australia 2013-14” crimecommission.gov.au/publications/i…

via TweetDeck

Next up: Charlotte Wood, Australian Crime Commission, Current cybercrime threat picture for Australia. Standing room only.

via TweetDeck

ICS-CERT has a Top 7 mitigations on their website. ics-cert.us-cert.gov/Seven-Steps-Ef…

via TweetDeck

@Metlstorm Oh dear God I don’t even want to know the answer to that question.

via TweetDeck in reply to Metlstorm

Edwards is commenting on the 23 Dec attacks on the Ukraine power grid. I’ll write this up later.

via TweetDeck

Better than bacon? Better than chocolate? Better than tub waan? twitter.com/thegrugq/statu…

via TweetDeck

Nobody has the time to notify all the people with vulnerable ICS on the Internet. pic.twitter.com/oMSn3lh46N

via Twitter for iPhone

Edwards: In the hotel this morning, fire alarms went off. “Sorry, my script had a bug.” [laughter]

via TweetDeck

Edwards talks about the kind of medical implant hacks that we’ve seen before. [Me from 2011: cso.com.au/article/404909…]

via TweetDeck

What if a smart lightbulb is being used to backhaul the audio from a confidential presentation?

via TweetDeck

[Insert standard Internet of Things / medical devices scare story, but from an expert.]

via TweetDeck

“It’s a good thing that we’re detecting it, and… that we’ve got a notification system,” but would like to see companies find itsc

via TweetDeck

They’re not seeing low-grade ransomware on US critical ICS networks, but high-grade nation-state and criminal gear.

via TweetDeck

Edwards: “Incident handling isn’t… getting any slower in my shop.ser

via TweetDeck

I believe this to be excellent system architecture and I recommend it to everyone. twitter.com/Metlstorm/stat…

via TweetDeck

Watering hole attacks are also a thing in the ICS threat landscape thingo.

via TweetDeck

Edwards says supply chain attacks and spear phishing are the thing now. “People aren’t hacking the Gibson” any more.

via TweetDeck

@yinettesys @da_667 I COULD HANDLE SOME MORE FUCKING THOUGH BUT MAYBE THIS EVENING.

via TweetDeck in reply to yinettesys

@hartmant Funnily enough, Edwards just mentioned exactly this.

via TweetDeck in reply to hartmant

@da_667 DID YOU JUST THE FUCK FUCKING WRITE ABOUT THIS FUCKING THING?

via TweetDeck in reply to da_667

The speedy @alliecoyne has already written on the AFP presentation. I’ll be writing longer stuff later. twitter.com/alliecoyne/sta…

via TweetDeck

ICS security can learn from general cyber security. It lags 10y behind. And medical stuff lags 10y behind that.

via TweetDeck

Edwards:: In the US, the cyber threat “has been recogniused by senior leaders even though they no idea what it’s all about.”

via TweetDeck

The chair from this session, from ASD, referred to “that excellent cyber documentary Die Hard 4”. Glad to know ASD has it sorted.

via TweetDeck

I’ve just been mistaken for @duckblog, and I’m not sure that this is a good thing.

via TweetDeck

Today I’m tweeting from @ACSCConference in Canberra. acsc2016.com.au/program/?IntCa… Mute to avoid the cyber overload.

via TweetDeck

johnb78 This shows up as a stock image for “engineering collaboration”, which is impressively sarcastic pic.twitter.com/f8PMAH2vYd

via TweetDeck (retweeted on 12:46 PM, Apr 13th, 2016 via TweetDeck)

Feakin asked about mandatory breach notification. [Um, exposure draft legislation is up on AGD website. ag.gov.au/Consultations/…]

via TweetDeck

Feakin plugs @ASPI_org’s “Cyber maturity in the Asia-Pacific Region 2015” aspi.org.au/publications/c…

via TweetDeck

To be clear, this wasn’t a call for the CSGC to have more funding, just new funding for the strategy. twitter.com/stilgherrian/s…

via TweetDeck

@christopherneal Machine learning artificial intelligence cyber blockchain threat intelligence visibility!

via TweetDeck in reply to christopherneal

Feakin says he’d want a lot more than $30M [for Cyber Security Growth Centre]. He’d at least add a zero.

via TweetDeck

Feakin has just been asked what resources the govt should provide to prevent AU becoming a “cyber backwater”.

via TweetDeck

Feakin: “An effective cyber strategy will depend on the work done once it’s launched.”

via TweetDeck

Feakin: Australia is “perfectly poised” to leverage our skills and strategic position on the cybers.

via TweetDeck

@christopherneal There’s nothing here that isn’t cyber, surely?

via TweetDeck in reply to christopherneal

Feakin sys private sector needs to be part of dialog on “cybersecurity norms”. Me on this, Jun 2015: zdnet.com/article/austra…

via TweetDeck

Feakin says 2009 strategy had no concrete plan for regional engagement. That’s changed. But we need to engage with not-allies.

via TweetDeck

will_ock FBI paid professional hackers one-time fee to crack San Bernardino iPhone washingtonpost.com/world/national…

via TweetDeck (retweeted on 11:35 AM, Apr 13th, 2016 via TweetDeck)

Feakin says we need to speed up processes for declassification of data, and to deal with “impenetrable” government structures.

via TweetDeck

Strategy will be “pushing hard” on private-sector cooperation, esp threat info sharing. [Will they send The Van to recalcitrants?]

via TweetDeck

Feakin: “Once the strategy is released, that’s when the rubber hits the road … and the real work beginssc

via TweetDeck

What Feakin is saying supports what @alliecoyne reported was in the strategy. itnews.com.au/news/revealed-…

via TweetDeck

@dawnstarau No, they won’t. The release date is still secret. But it won’t be this week, that I can tell you. But very soon.

via TweetDeck in reply to dawnstarau

So @alliecoyne scored a look at the soon-to-be released AU cyber security strategy the other day. itnews.com.au/news/revealed-…

via TweetDeck

@darrenpauli @R_Chirgwin Mate, maybe less peyote before work, OK?

via TweetDeck in reply to darrenpauli

This room has quite different cyber hexagons. pic.twitter.com/HwptsTcEAp

via Twitter for iPhone

@FakeDanTosello @rohan_p Everything is fake. Even the non-fake things.

via TweetDeck in reply to FakeDanTosello

Watching @darrenpauli suck the side of his laptop.

via TweetDeck

Next up: Dr Tobias Feakin, @ASPI_org, Delivering Australia’s Cyber Security Strategy: a view from the independent advisory panel

via TweetDeck

“The human element is the toughest of all. It’s really hard, because there’s a lot of silly people out there.”

via TweetDeck

jeamland “Who ya gonna call?” “Ghostb…” “THA BLOCKCHAIN”

via Tweetbot for iΟS (retweeted on 11:07 AM, Apr 13th, 2016 via TweetDeck)

Mellis: “I blame the banks for this. They’ve done a great job of securing their systems,” so attackers move down the food chain.

via TweetDeck

Here’s a scary stat from @WadeAlcorn’s Bitboin stream. twitter.com/rtassotti/stat…

via TweetDeck

Here’s Mellis’ conclusions. AFP hasn’t seen a million dollar attack yet, but we’re on track. pic.twitter.com/9movfSwOWM

via Twitter for iPhone

AFP is now seeing transfers to mules of $200k to $500k, “unheard of 2 to 3 years ago”.

via TweetDeck

Confusion workflows a problem too. Staff come and go. Hard to spot irregular transactions.

via TweetDeck

Superannuation brokers are a problem. Usual poor security practices. Unpatched systems, shared passwords, unmonitored accounts.

via TweetDeck

CEO / Senior Executive a tracks on the rise, mostly West African attackers, net $90k to $300k. pic.twitter.com/LCazE6B2qy

via Twitter for iPhone

These attacks are rampant at the moment. Attackers also access invoicing software and alter payee. Can take months to detect.

via TweetDeck

Look, I think this should be done, actually. twitter.com/markhellewell/…

via TweetDeck

Driftnetting happens in HR payroll platforms, where payments are diverted. Tax info also stolen to submit false tax returns.

via TweetDeck

Mellis says phishing is an old word, and AFP is now using “driftnetting”. pic.twitter.com/CR1v4ppGy5

via Twitter for iPhone

I won’t be able to tweet much of this ‘cos I’m taking notes.

via TweetDeck

Next up: Scott Mellis, Australian Federal Police: The changing targets of cyber criminals acsc2016.com.au/program/?IntCa…

via TweetDeck

0x1C In every organisation for which I have worked that does “phishing awareness” emails, the pentesting teams have the highest click rates. >:)

via Twitter Web Client (retweeted on 10:18 AM, Apr 13th, 2016 via TweetDeck)

rtassotti CISO from @AirbusGroup: We get thousands of attacks daily, with 10-12 serious yearly. Ransomware is an issue

via Twitter for iPhone (retweeted on 10:15 AM, Apr 13th, 2016 via TweetDeck)

zimbani_ Stephane Lenco (CISO, @AirbusGroup). Explains current and future threats to @AirbusGroup pic.twitter.com/ydkIch1TMk

via Twitter for iPhone (retweeted on 10:15 AM, Apr 13th, 2016 via TweetDeck)

rtassotti CISO from @AirbusGroup: Frankly not a security A-Player yet, but have made big improvements over past 5 years

via Twitter for iPhone (retweeted on 10:09 AM, Apr 13th, 2016 via TweetDeck)

This echoes @MikePBurgess’ comments on the “attribution distraction”. zdnet.com/article/telstr…

via TweetDeck

Lenco says attribution is hard, no-one knows, leave it to law enforcement.

via TweetDeck

Some practical points about the “super-duper famous” Lockheed-Martin Kill Chain model. pic.twitter.com/bDK2U2LNQH

via Twitter for iPhone

This looks dry, but this guy is both practical and hilarious. pic.twitter.com/391Py4LUgl

via Twitter for iPhone

Airbus Group has around 139,000 employees globally, and 160,000 suppliers.

via TweetDeck

Lenco: I cannot make airliners without Britain. That’s a message for Brexit. My wings are made in the UK.

via TweetDeck

Note, this is the Airbus Group. Airliners, helicopters, space, cybersec, etc etc,

via TweetDeck

Next up: Stephane Lenco, Airbus, “Airbus Group: A journey to adapt security to modern day threats” acsc2016.com.au/program/?IntCa…

via TweetDeck

“Blockchain”! Drink! #2 for the day.

via TweetDeck

“… machine learning and artificial intelligence.” Drink! #1 for the daysc

via TweetDeck

Is it just me, or do those KPIs not measure what actual damage reduction was achieved? (2/2)

via TweetDeck

News Corp’s demos its infosec progress with program maturity, risk trending, operational dashboard, and incident reporting. (1/2)

via TweetDeck

Especially since the conf website and the chair in his intro both promoted the official hashtag. Arsehats. twitter.com/dawnstarau/sta…

via TweetDeck

Maripuri refers to Deloitte’s Four Faces of the CISO. www2.deloitte.com/content/dam/De… (PDF)

via TweetDeck

Maripuri points out there’s plenty of frameworks out there for infosec strategy and process. NIST, SANS Top 20 etc.

via TweetDeck

Maripuri refers to and praises the @AusCERT Incident Types chart. auscert.org.au/resources/down…

via TweetDeck

So far this is s straightforward presentation of the state of infosec. Slow to detect, rise in incidents etc.

via Tweetbot for iΟS

News Corp has set a target on 75% infrastructure in the cloud globally, so far at 50%.

via Tweetbot for iΟS

Roughly half the 1000+ delegates work for the Australian government in some capacity (plus those who didn’t raise their hands).

via TweetDeck

First up: Latha Maripuri, News Corp: Securing a Digital Enterprise acsc2016.com.au/program/?IntCa…

via TweetDeck

Even worse. He’s got me on one side and @jturner_ibrs on the other. He is so screwed, twitter.com/Anthony_Caruan…

via TweetDeck

In 2016, cybersecurity is made of hexagons.

via Tweetbot for iΟS

Realising that I won’t be heading up The Hill on this trip. And that tomorrow I should have a proper breakfast.

via Tweetbot for iΟS

Wed plan: 0830 @ACSCConference Day 1 acsc2016.com.au/program/?IntCa…; 1830 dinner, Australian Institute of Sport, apparently; stop cybering.

via TweetDeck

Tony Ate… at Eight #45: Tony takes the salty Greek balls deep into his mouth. (Photo: Tertius Pickard/AAPpic.twitter.com/qtqhJBjvuvuv

via TweetDeck

“Tony Ate… at Eight” is a tribute to Abbott’s love of things in his mouth, and to doing it the Greek way. 0800 AEST, repeated 2000 AEST.

via TweetDeck

This must make going to the toilet or taking a shower a bit weird. (Also, none of those things are made by chefs.) twitter.com/EdibleBrooklyn…

via TweetDeck

@feraldata Now there’s a thought! For some years I’ve referred to my mobile phone as “the leash”.

via TweetDeck in reply to feraldata

The person who just sent me a coffee emoji via Signal — and you know who you are — will be dealt with later.

via TweetDeck

@BundyB I have not. I’m about to have a shower and head out in search of coffee.

via TweetDeck in reply to BundyB

@PointZeroOne Yes. “Cyber” is an excellent verb.

via TweetDeck in reply to PointZeroOne

TheOnion Area Man Calls For Immediate Release Of His Endorphins onion.com/1N75fto pic.twitter.com/ZGF9AnNtq6

via SocialFlow (retweeted on 7:02 AM, Apr 13th, 2016 via TweetDeck)

Dear writers about IT, there are verbs other than “embrace” and “harness”. Try using them from time to time.

via TweetDeck

@SnarkyPlatypus @BundyB Look, spookland can be most accomodating to people with rare and valuable skills.

via TweetDeck in reply to SnarkyPlatypus

@SnarkyPlatypus @BundyB Yes. Last night I even met a hipster security analyst who worked for a government agency.

via TweetDeck in reply to SnarkyPlatypus

GIVE ME MY ADDICTIVE ALKALOID STIMULANTS YOU BASTARDS.

via TweetDeck

@BundyB So, you’re suggesting I put myself in the same location as hipsters before I’ve had a coffee? The bloodshed, Chris. The bloodshed.

via TweetDeck in reply to BundyB

I have just made the horrible, horrible discover that there’s no coffee in the SEKRIT apartment. There is something wrong with these people.

via TweetDeck

Wed plan, draft: 0830 @ACSCConference Day 1 acsc2016.com.au/program/?IntCa…; 1830 dinner Australian Institute of Sport (lulwut?). So much cybering.

via TweetDeck

@myrcurial Oh these ARE classy. I should get a pair.

via TweetDeck in reply to myrcurial

Wednesday. Did you remember your shoelaces? DID YOU REMEMBER YOUR SHOELACES? Wednesday.

via TweetDeck