Episode 255: ControlTalk NOW — Smart Buildings Videocast and PodCast for week ending Feb 18, 2018 features our interview and cyber security discussion with two of our industry’s most venerated experts from Intelligent Buildings, Darryl Benson and Fred Gordy. Darryl and Fred offer the ControlTrends Community some astute advice and pose an interesting question to system integrators: Do you want to maintain the cyber security risks [Read more…]
Episode 224: ControlTalk NOW — Smart Buildings VideoCast|PodCast for Week Ending May 7, 2017 features interviews with Leroy Walden, President and Chief Consultant, Highrose Consultants; Fred Gordy, Director of Cyber Security, Intelligent Buildings; and Ken Sinclair, owner and editor of Automated Buildings. Also in Episode 224: 2017 CGNA Synergy Conference highlights; EasyIO’s Global Event update and the 9-video EasyIO Training Video series is now available; 2017 Haystack Connect starts May 8th; and much more!
A Note to the Smart Buildings Controls Industry. This just in from Lynxspring’s Marc Petock: Lynxspring is pleased to announce that we will be demonstrating our latest edge-to-enterprise and IoT solutions at Haystack Connect 2017. The biennial Conference of the Project Haystack Organization is being held this year at the Saddlebrook Resort Tampa, May 8 through May 10, 2017. These solutions will be demonstrated in Lynxspring’s Booth # E11. Lynxspring is a founding member and holds a seat on the Board of Directors of Project Haystack, and is a Sponsor of the Haystack Connect 2017 Conference.
ControlTrends takes a deep-dive into CyberSecurity with our interview with two top industry experts, Leroy Walden, President and Chief Consultant, Highrose Consultants and Fred Gordy, Director of Cyber Security, Intelligent Buildings. Listen in, as Leroy and Fred advise the ControlTrends Community about attending industry events that are real opportunities to get up-to-speed with threat assessment, risks, and best practices — to deal effectively with the cyber terrorism. Both experts caution that the liability to safeguard networks is being shifted onto the shoulders of the system integrator integrating the building automation system into the network. Be sure to contact Leroy Walden at (email@example.com) — to take advantage of Leroy’s $100.00 discount for the 2017 Realcomm|IBcon Conference and Smart Buildings Integrator Summit, June 13th-15th in San Diego, CA.
Ken Sinclair’s Automated Buildings May, 2017 Theme: Our second interview is with Automated Buildings owner and editor, Ken Sinclair, who discusses the many IoT challenges and trends facing our industry along with his May theme, “The Uberization of Comfort, Satisfaction, and Wellbeing.” “Occupant self-love” continues to improve its presence and functionality — integrating itself more readily into our building automation industry with a host of IoT applications that input the human whereabouts — and its condition, into the building network of things. Click here to read another great edition of Automated Buildings.
ControlTrends Interview with ACI’s Barry Gordon at the 2017 CGNA Synergy Conference. ControlTrends had the opportunity to visit with Barry Gordon, Senior Sales Engineer at ACI, who was excited to tell us about ACI’s new DLP Low Pressure Transmitter. The DLP Series is based on a piezoresistive, silicon sensing element which senses Differential Pressure and provides an analog output. The hinged cover on the DLP can be easily opened using the integrated locking tab on the side of the enclosure. This allows for easy access to the zero function and field selectable ranges and outputs.
2016 ControlTrends Awards Highlight: Catch all the excitement as the global ControlTrends Community crowns the 2016 Light Commercial Controls Solution of of the Year Award winner. In this case, it will take two crowns as both KMC Controls and Proton Optergy get recognized for their outstanding solutions. KMC’s mission is to “provide innovative, intuitive building automation and Smart Buildings Controls solutions from responsive and supportive people,” and the KMC Commander delivers as an open building automation and Smart Buildings control system that is open, secure, and scaleable. “Proton by Optergy became the first true open supervisor and controller that can interoperate with any BACnet unitary controller and is 100% web based. It has all the needed tools to setup, operate and maintain the system, and has all of this at economical price points.”
The Complete EASYIO FG Training Series. In this 9 part video training course, Mike Marston shows you everything you need to know to get up and running with one of the most powerful controllers in Smart Building controls — the EASYIO FG controller. Learn how to program the controller, and create graphics and analytics. Click here to go to the EASYIO FG Training Course.Great job Mike!
The EasyIO Global Partner Event agenda has been set with the following speakers: David Kipling, vice president of Jabil Circuit Inc. (US), Andrius Jasiulionis, automation engineer of Helgevold Electro (Norway), Jason Briggs, CEO of J2 Innovations (US). And of course, key people from EasyIO will tell you all about where we are going as a company: Johan Schakenraad, President & CEO of EasyIO Europe B.V., Mike Marston, vice president of EasyIO Holdings Pte Ltd., Lim Hoon Chiat, CTO/R&D EasyIO Holdings Pte Ltd., and EasyIO Tech Team. But there’s more than just the conference: an informal pre-event gathering at the Hard Rock Café on Sunday evening May 21, dinner and awesome entertainment on Monday evening, May 22, and an exclusive VIP training for CPT Tools and EasyStack on Tuesday, May 23. Check out the full program.
PC WORLD FROM IDG. Credit: Mark Hachman
This was twittered to us via cyber security guru, Fred Gordy, and was too interesting and too important not to pass on to the ControlTrends Community, especially those with smart thermostats.
What happens if a bad actor turns off your heat in the middle of winter, then demands $1,000 to turn it back on? Or even holds a small city’s power for ransom? Those kinds of attacks to personal, corporate, and infrastructure technology were among the top concerns for security experts from the SANS Institute, who spoke Wednesday during the RSA conference in San Francisco.
Some of these threats target consumers directly, but even the ones that target corporations could eventually “filter down” to consumers, though the effects might not be felt for some time.
Here are the seven most dangerous attack vectors, according to SANS, and what, if anything, you can do about them:
1. Ransomware: Ransomware surfaced more than 20 years ago, but it has since evolved into a seriously scary form of malware: crypto-ransomware, which encrypts your files and demands payment to unlock them. It’s an ideal way for bad guys to attack: Ransomware spreads like a virus, locks up your data independently, and forces you to contact the criminals for payment and recovery, according to Ed Skoudis, an instructor at the SANS Institute.
What you can do: Practice “network hygiene:” patching your system, using antimalware, and setting permissions and network-access controls to limit exposure—once a PC is infected, you don’t want the infection spreading to other PCs on the network. Remember that ransomware is being monitored by actual people, with whom you can negotiate: “Your best bet is to appear small and poor,” Skoudis said, to try to reduce the amount you’ll pay.
2. The Internet of Things. The next stage of the evolution in consumer products is connectedness: Everything from baby cameras to toothbrushes are using wireless protocols to connect to each other and the internet. That, in turn, has left them vulnerable to hacks. Worse still, IoT devices are now attack platforms, as the Mirai worm demonstrated.
What you can do: Change the default passwords. If your smart-home gadget doesn’t allow it, either return it or wait (or petition the manufacturer) for firmware that allows a custom password. You can also take further steps to insulate connected devices by disabling remote access, using a separate dedicated home LAN for IoT devices, as well as a dedicated cloud account for controlling them, Skoudis said.
3. The intersection of ransomware and IoT. Last year, an Austrian hotel was hacked, disrupting its keycard system. Such attacks could eventually migrate to your home, holding your smart thermostat hostage (and set at 40 degrees, say) until you pay up.
What you can do: Right now, this sort of attack is more theoretical than anything else. But it’s something to think about as you start building out your home: How much automation is too much? “You have to ask yourself, what is the right balance between man and machine?” said Michael Assante, director of industrials and infrastructure for SANS.
4. Attacks against the industrial Internet of Things. In 2015 and again in 2016, unknown hackers took down power stations in the Ukraine, leveraging the growing trend of automated, distributed systems against the power company. Fortunately, first responders were quickly able to manually flip the breakers and restore power. But there’s no guarantee that will always be the case—and what happens if Pacific Gas & Electric or Con Edison’s infrastructure is hacked?
What you can do: As consumers, not much. Infrastructure organizations are going to have to decide whether to operate with intelligent systems, or shut them down. Scaling up with increased automation can help lower your power costs—but the penalty may be increased vulnerability to outside attacks, Assante warned.
5. Weak random number generators. Truly random numbers are the basis of good encryption, securing Wi-Fi and a broad range of security algorithms, according to Johannes Ulrich, the director of the SANS Internet Storm Center. But “random” number generators aren’t truly random, which makes the encryption they’re based upon easier to crack. This gives an edge to criminals, who may exploit this and unlock “secure” encrypted connections.
What you can do: This is a problem for device manufacturers to solve. Just keep in mind that your “secure” network may in fact be weaker than you think.
6. An over-reliance on web services. More and more, apps and software are talking to and incorporating third-party services, such as Docker or Azure. But there’s no real certainty that those apps are connecting to the expected entity, or whether an attacker is stepping in, stealing data, and returning false information.
What you can do: Again, this is a problem for developers. But Ulrich warned that mobile apps are becoming increasingly vulnerable—so even if an app isn’t trying to steal your data, the “service” that it thinks it’s connecting to may be.
7. SoQL Attacks against NoSQL databases. This is another developer problem, but it could affect data collected about you. For years, SQL injections, where executable code was forced inside of a SQL database entry field, were one of the scourges of the internet. Now, as developers move away from SQL to NoSQL databases like MongoDB, they’re finding that those databases aren’t as secure as they should be.
ControlTalk NOW — Smart Buildings VideoCast|Podcast will resume full video and podcast operations next week. Scheduling only allowed for a quick review of week ending October 2, 2016, which was another amazing week in our industry — featuring Echelon Corp’s Converged Controller; Tim Chamblee’s How to Measure Energy Webinar; Lynxspring’s JENEsys® Edge™ 100 New Universal Input Option; Fred Gordy’s Cyber Security review of exposed BBMDs; ControlTrends People Episode 5, with Ed Merwin; and Ken Sinclair’s October edition of Automated Buildings.
Echelon Corp. Delivers First-Of-Its-Kind Converged Controller For Buildings, Lighting And Other IoT Applications Press Release. SANTA CLARA, Calif.–(BUSINESS WIRE)–Echelon Corp., a leading independent control networking company for the Industrial Internet of Things (IIoT), today announced the availability of a first-of-its-kind converged controller for building automation, lighting controls and Internet of Things applications combined with power line communication meshing capability.
Live Rewind: How to Measure Energy in Smart Buildings. Stromquist & Company’s Tim Chamblee, who is also one of the best trainers in the HVAC industry, breaks down the different ways to measure energy in smart buildings in this replay of a live stream training. Video does not actually start until about 10 minutes in, so be sure to skip forward.
New Universal Input Option for the JENEsys® Edge™ 100 Now Available. The JENEsys® Edge™ 100 is our new generation of controllers combining Lynxspring’s Onyxx® platform with the Niagara Framework® and its programming tools and the Fox Protocol to facilitate communication between Niagara stations and software for control and analytics managed at the edge.
Fred Gordy’s Cyber Security Review of Publicly Exposed Control System BBMD – No Login Required! There are free tools readily available to anyone that can not only scan BACnet networks, it gives the user the ability make changes to individual control points, set schedules, review logs, view alarms and acknowledge, and turn your BACnet devices into “bricks.” The first thing I found was the ease of use of this program. In order to scan the network all I needed was one BBMD.
CTP 005 ControlTrends People Explores the Life and Times of Ed Merwin. On episode 5 of ControlTrends People we take a deep dive into the life and times of one of the greats in our industry, Ed Merwin, the Director, Vykon Automation Energy Security at Tridium. Ed is credited by many, including us, as being one of the reasons Tridium and open platforms exist today. Ed, one of the great communicators in our industry, shares his early history including how he got into the business. Like all great people, Ed has had many mentors through his life.
Ken Sinclair’s Automated Buildings October Theme — When Evolution Turns to Revolution. In this October issue of Automated Buildings, Ken Sinclair, owner and editor, delves deeper into the impacts of IoT and self-machine learning, as well as the rapidity of change that is circling the building automation industry. Is our industry preparing itself — at last for this explosive and disruptive evolution or will it get hit broadside? If you still need convincing that major changes are afoot, be sure to review the attention-getters and direct links to Ken’s references and articles.
ControlTalk NOW — Smart Buildings VideoCast|PodCast for Week Ending Sep 25, 2016 features Intelligent Buildings’ Director of Cyber Security, Fred Gordy, who details the exposure and vulnerability of Operational Technology, which run our buildings. Watch as Fred reviews, step by step — the hacker’s modus operandi. Sameer Pradhan, Director of ControlTrends India, updates the ControlTrends Community on India’s colossal Smart City imitative; Schneider Electric releases their new MG350 Smart Actuators with alarming features; Contemporary Controls’ newest network solution offers greater speed and diagnostics; Larry Andriunas takes the helm at Kodaro, LLC; and this week’s ControlTalk Rewind takes us back to the future with Ecorithm’s Dr. Igor Mezic and artificial intelligence.Schneider Electric Has a Hit with The New MG350 SmartX Actuators. Awesome video and cool new actuator series from Schneider Electric. The SmartX MG 350 is the first NEW SmartX Actuator released globally. It is designed to control two and three-way globe valves in a wide range of applications. The MG350 SmartX Actuator is the platform for the future, acting as the foundation of both a SmartStruxure™ solution and SmartStruxure Lite solution. The critical information delivered by the actuator helps the BMS operate at optimal efficiency.
ControlTalk NOW’s first interview is with Fred Gordy, Intelligent Building’s Director of Cyber Security. As our industry’s leading cyber security expert, Fred focuses on the specific vulnerabilities concerning Operational Technology, controllers on building networks that control the HVAC equipment and building systems and equipment versus Information Technology. Operational Technologies were designed for availability and comfort, which was suitable at the time, but when the need to share information across subnets made Broadcast BACnet Management Devices necessary, as well as using a public IP address, the security imperative was not factored into the equation. Watch this video! and, visit the NIST Cyber Security Framework website for basic recommendations to protect your Operational Technology.
Larry Andriunas Larry Andriunas announces the launch of Kodaro, LLC, a software development company which he will lead from California’s Bay Area. Operating in the building automation industry, Kodaro is hard at work creating ways to connect building controls through software drivers, software applications, and enterprise solutions. “I’m very excited about launching Kodaro,” said Andriunas, a 28-year building controls expert. “The building automation industry is at an interesting time where new technologies are finally converging. Kodaro will lead the way for innovation in support of contractors and integrators.”
ControlTalk NOW’s second interview is with Director, ControlTrends India, Sameer Pradhan. Sameer Pradhan is also the Managing Director of CICC Automation Technologies, a leading international building automation systems provider. Sameer recently chaired a panel discussion on Smart Connected Intelligent Buildings — The Foundation for Smart Cities,” that discussed in great detail, the critical aspects of the smart city standard and its core component, the intelligent building. India has presently identified 60 cities that will be included in this massive initiative. Great update!
Contemporary Controls: The Need for Speed and Diagnostics. Contemporary Controls is introducing the unmanaged EISK8-GT/H 8 port gigabit Ethernet switch with hub functionality. Yes, we purposely “broke” the address learning functionality of the switch so that all messages – directed, multicast, broadcast – are flooded to all ports on the switch allowing a protocol analyzer tool such as Wireshark® the ability to observe all traffic on the network.ControlTalk Rewind: Using Artificial Intelligence to Make Smart Buildings Smarter. Last Spring Ken and I had the opportunity to interview a couple of very interesting characters, who put a new spin on how to make smart buildings smarter through the use of artificial intelligence. This is next-gen analytics! Dr. Igor Mezic, Ecorithm’s Chief Scientific and Technology Advisor & Co-Founder, and John Morris, VP Marketing and Sales. Ecorithm is able to provide faster and more accurate results that other analytics companies, and why Ecorithm’s SaaS is necessary for the entire lifetime of the system.
6 million commercial buildings in the US are believed to be secure. Every single one has exposed building controllers, security cameras and access control systems that an entry level hacker can hack into. Join Fred Gordy, Director of Cyber Security at Intelligent Buildings, and Ping Yao, CEO of Optigo Networks as they discuss the incredible vulnerabilities in our buildings’ systems, and what to do about it. If you are responsible for operational systems using open protocols such as BACnet & ONVIF, you won’t want to miss this webinar. We will discuss how easy it is to hack into many of the building systems, and more importantly, what are some of the basic steps that can and should be used to protect them.
Webinar Details: Date: Thursday September 15th Time: 11AM PDT | 2PM EDT
Thanks to our friend, Fred Gordy, we got to participate in an eye opening event.Stromquist & Company had the privilege of hosting the Atlanta Cyber Security meet up. The speaker, Doug Wylie, CISSP VP Product Marketing & Strategy at NexDefense was amazing. Doug explains several different types of cyber attacks and breaks down blow by blow two major cyber attacks on control systems that caused major disruptions. If you are interested in joining a cyber security meet up group on your area please let us know in comments and we will connect you.
ControlTalk NOW — Smart Buildings VideoCast for week ending June 12, 2016 features a rather deep and dark Cyber Security update from Fred Gordy, and an enlightening interview with Automated Buildings’ Ken Sinclair discussing his June edition; next, a look at new technology with Cisco’s Digital Ceiling and Optigo Networks’ solution to eliminate BACnet complexity; Lynxspring and SkyFoundry offer a combo webinar on Data and Analytics; Functional Devices released a pre-enclosed panel; and don’t miss out on Neptronic’s special product sample offering — available through ControlTrends!
Cyber Security Expert Fred Gordy Waives the Cyber Security Caution Flag! Censys Device Search Engine Picking Up Exposed Niagara 4 — Wake Up! Thanks once again to Intelligent Buildings’ Director of Cyber Security, Fred Gordy, who keeps the global ControlTrends Community and systems integrators current with his Cyber Security updates. Fred is calling for the widest dissemination of this information possible, and for responsible parties, at every level to take immediate actions to eliminate their exposure and safeguard their building against eminent attack. Fred Gordy: “I did a cursory search using Censys device search engine of building control systems and the first systems to pop up were Niagara 4 systems.”
Cisco’s Digital Ceiling WILL Change the Way You Do Smart Building Controls. Building Automation Systems Integrators, meet your new BAS partner — Cisco. That’s right, Cisco. Cisco just might be your new front end, and the ceiling in the building you are working in, right now, might be your new junction box to the future. The lighting world is evolving from the analog world to the digital world and soon, those lights connected to the network, not just for a data path, but also for power, will have temperature, occupancy, and daylight harvesting sensors in them — that will finally bridge the gap between building automation and connected lighting control.
ControlTalk NOW Interview with Ken Sinclair, owner and editor of Automated Buildings. Always an informative experience, Ken Sinclair reviews Automated Buildings’ June theme of Measured Variables; Health, Wellbeing, & Productivity. More insight into HVAC by engineers and HVAC by Behavioral Experts that are driving the $3-$30-$300 metrics, and the realization that the most promising potential value lies in building wellness that leads to greater productivity, greater tenant retention, and less absenteeism. Also, understanding the benefit differences between digital ceilings versus the 24 VDC ceiling (Edison wins the current war after all, though Tesla has scheduled a return bout) and much more!
30 Minutes with Lynxspring Webinar Series — Data and Analytics by Lynxspring and SkyFoundry. 30 Minutes with Lynxspring Webinar Series Presents: Data and Analytics. The next “30 Minutes with Lynxspring,” our monthly webinar series featuring Lynxspring subject-matter experts and special guests, is scheduled for Wednesday, June 15th at 12:00 PM CDT. This month’s installment looks at Data and Analytics. Data and analytics are changing the way companies in EVERY industry do business and manage business. And yes, it is changing ours — it’s changing the way buildings and facilities are managed and operated.
Optigo — The New Way to Cut through BACnet Complexity. As IoT continues to intersect with the Smart Buildings Controls Industry, more and more new players are showing up in our space with proven solutions that will work well in our applications. Ken and I had the chance to connect with just such a company, Optigo Networks. We had the privilege of speaking with their CEO Pook-Ping Yao. We were very impressed with Ping and his product solutions. Check out the video below to see the elegance and efficiency of the of the Optigo Connect network solution.
A Special Offer From Neptronic at the 2016 Niagara Summit. We had a chance to catch up with Biagio Delorenzio and Luis Melgares from Neptronic at the 2016 Niagara Summit. Great stuff from our innovative friends in Canada. As you can see in the video, the TUCB is a very flexible universal wall mount controller with built-in temperature sensor and scheduler. The unit is designed for simple and accurate control of a heat pump or other heating/cooling equipment. Its field configurable algorithms enable versatile implementation of required control sequences. but what is even more impressive is the new TRLG 24. The TRLG 24 takes al that is good about the TUCB and adds an on board humidity and CO2 sensor.
Functional Devices — Innovation at the Panel Level. Nick Walker at the 2016 Niagara Summit Vendor Show. Functional Devices — Innovation at the Panel Level 2016 Niagara Summit Vendor Show. Nick Walker, Strategic Account Manager for Functional Devices walks the ControlTrends Community through the new MHP pre-enclosed enclosure series that features a 100 VA (or (2) 100 VA) transformers along with with a convenience outlet and a polymetal or perforated back drop. Functional Devices products are a contractors’ best friend — offering savings in installation time and money for all of your building automation projects.
Thanks once again to Intelligent Buildings’ Director of Cyber Security, Fred Gordy, who keeps the global ControlTrends Community and systems integrators current with his Cyber Security updates. Fred is calling for the widest dissemination of this information possible, and for responsible parties, at every level to take immediate actions to eliminate their exposure and safeguard their building against eminent attack.
Fred Gordy, Director of Cyber Security at Intelligent Buildings, LLC: I did a cursory search using Censys device search engine of building control systems and the first systems to pop up were Niagara 4 systems. As most know Niagara 4 was released after the first of the year to integrator community at large. The discussion of cyber security for control system has been going on for over 4 years. So it is still amazing to me that control system devices are still being put directly on the web. These Niagara 4 systems would have had to been installed in the last 4 months.
The screen shot below are just the first page. I didn’t count the Niagara 4 system but I was still finding them 5 pages into the 357 pages listed.
Okay… Your control system was installed a couple of years ago and you were handed riser diagrams, As-Builts, mechanical drawings, etc. and you were good to go. Right?
Up until recently the standard implementation for a controls network was created by the integrator and given either a 192.168.X.X or 10.0.X.X IP schema. In some cases the only way to access the system was from a PC on the same network. In other cases the control network did not touch the corporate network, but it was accessible remotely. This was done by purchasing a router/VPN from a big box electronic store and your ISP (internet service provider) supplied you with a public IP to access your front-end from anywhere in the world.
But is that still the way it is setup?
If it is, it is the right way? Or it may have been set up correctly, but because of zero change management and oversight, your control network and corporate network have converged or holes have been punched in your security.
The following examples are possible representations of what a control network may look like or maybe what is has become after a few years of “a change here” and “a change there”. It is important that you know your control system network configuration and keep your documentation up-to-date.
Example 1 – The control network was originally air gapped (physically separated from the corporate network) and the only access was via a public IP to front end. The public IP put the control system in jeopardy by itself. At some point in time a second network card was added to the front-end and connected directly to the corporate network. By doing this there is now a hole punched into the corporate network and it can be used as a pivot point to access company systems.
Example 2 – The control network and corporate network are air gapped. There is no physical connection between the two. However, the control system is exposed to the world with a public IP. The leaves the control system vulnerable to have infected payloads ready and waiting for anyone who accesses the system.
Example 3 – Everything in this example is behind the corporate firewall and is seemingly safe. It has been my experience in some cases that the control system front-end is highly accessible and is used to check email, social media, etc. This practice can either cause the front-end crash or a means for a threat actor to inject malware for data mining, command & control, etc.
Example 4 – This example is little different in that there is a mix of public and private IP’s. Certain parts of the system are exposed and some would think that others are not. Depending on the system you have, most will allow tunneling, which means if the bad guy can get to a controller with attached devices, they can tunnel and command or damage the end devices.
Example 5 – This example deals with the physical security of a control network. In the example below, equipment with IP connectivity has been added to the network outside of the building. Because typically there is never traffic monitoring of a control network, the bad guy connects something either inline to remotely access the network from the comfort of their home or temporarily connect and inject malicious software to perform whatever task they have chosen.
Example 6 – In this final example, there is a segment of the control network that is exposed with a public IP and the other segment is on an internal, private network. At some point someone wanted or needed to get data from the internal networked control equipment the other network or vice versa, so they introduce a BBMD to route the traffic across the different subnet. Using Shodan, Censys, or ZoomEye the bad will more than likely find the BBMD and then with FREE Bacnet software scan the network and find the devices on the other side. With this FREE Bacnet software they now have unrestricted, no password needed, command and control of these devices.
If you haven’t reviewed your control system network architecture in a while, I suggest you do. If you don’t have change management in place, you need to. If you have any segment of your control network exposed to the world, work with IT and get it behind a high quality firewall.
The BlackHats are looking and probing and they have plenty of tools available to them to find you. Let’s not make it too easy for them.