Category Archives: Military

As the pie shrinks

Yes, we all see it, we all notice it to some extent, but that is not a given that what we see is complete. As I personally see it, the stage is one one hand seen in ‘UK defence giant Ultra agrees to £2.6bn Cobham takeover’ (at https://www.bbc.com/news/business-58228657)

where we see it is not the first caper, Both Ultra Electronics and Meggitt are now US owned. So whilst we are sussed to sleep with ““safeguarding and supporting the UK’s national security” including national security clearance arrangements”, supported by “It has also pledged to protect existing and create new UK manufacturing and engineering jobs, and to increase investment in research and development (R&D) in the UK” some people will hope you ignore the larger picture, and a lot of you will. You see there is more to this and if someone did not notice the total invoice of £8.9B the American were happy to pay, consider that they need to get that money back and then some. They will keep to the letter of the agreement, which is anyones guess as it involves National security and no one (except for a really small few) will get to see it. 

What we see ignored is not what is done, but what it enables the US firms to do. You see products are phased out all the time, but now the Americans can phase out the low margin articles at their own speed, in more than a few cases 3-5 years sooner, giving the UK all kinds of headaches and the logistics of it as well as existing inventory will not be the shortest list there. There is an upside to the American setting, they get to call the needs and the make of a lot of articles to the largest degree. 

So, let’s create a fictive example. Consider that the UK Navy has all its operational and tactical stations record on a betamax tape, it gives the admiralty a good show of who and what is performing and what is not, it is standard operational practice. The Americans have a VHS alternative, but in the end it does the same thing. The UK took Betamax as it has the highest quality and they had no local alternative, the US took VHS because it is American. This is not new or unique, most nations have this. To give an example, the Dutch maker Tulip computers would not exist in the 90’s if that rule was not in place. So now consider that 3M buys the UK firm and now it can over 2-3 years phase out Betamax. Now we see a new stage, the UK admiralty will have to upgrade ALL the recorders and players in the ENTIRE Navy. 

The UK will over time face this. I personally see it as a given setting. Now consider these are not recorders and players, but Goalkeepers, Gatlings, and other parts. 

Now also (from the Ultra Group website) the optional stage of “Many nuclear facilities across the world are facing the rising challenge of replacing or refurbishing outdated and obsolete sensors and transmitters. Ultra’s advanced ageing and obsolescence technology transforms nuclear power plants and ensures economical long-term operation.” And consider the outdated (or soon to be) sensors in Nuclear submarines and other vessels, that is just the start, so over the next 10-15 years the UK will get an overhauled Navy, but on the time schedule and overspending of the USA. So in what universe was this allowed? I get it, there is a larger playing field, but now that field is decided on US needs and as their logistical stage changes, so much the UK or find another solution. Now, the UK budget cannot simply cut defence, it is adjusted for the American format and it will see large amounts of funds go to America. Or in another setting, we will see that a bullet normally costs 0.10, the making is 0.07, so the stage is 0.03 per bullets taxed. In the new setting we see 0.01 per bullet on paper, 70% of 0.09 goes to the USA as contribution (0.063) and the income per bullet is taxed at 0.027, which is now at a loss, so no taxation there. Moreover there would be a massive tax deduction, so that is one place to go I reckon and this is not a fictive setting, this has happened before and it gets to be better when the list is not ‘bullet’, but an amalgamation of all kinds of ‘perishable hardware’ a totalised invoice, which is much harder to tinker with. Yes as I see it for the Americans it is a very nice investment that will pay back well over 200% before year three is out. And as they are interacting with other players, the massive profits that usually serves the internal good of the UK will now go to America, so who approved all this?

Time for you to find out, have a great day!

Leave a comment

Filed under Military, Politics, Science

The stupidity of catering

Catering is a double sided coin, there is a plus side and there is a negative side. In this there are to problems with that equation, in the first these are not sides of the same coin, they are two coins, one is larger than the other and as such we see the reflective setting change. Consider two coins, like a dime and a dollar, or a pence and a pound. Now consider that they both have heads and tails, you can choice one or the other and you think that the biggest one is your gain, but that would be wrong, it is the smaller one and the other side of the larger coin is the headway and losses you make and they tend to be larger. It is the price of catering. Like the stupid manager with dollar shaped pupils, they see revenue, but they do not recognise cost, it is part of another branch of their company, so they sell and dump all the support to the services side, in some cases (what I personally witnessed) selling things that will not work. It was their revenue and their bonus. After which they will suddenly become helpful and let their services department solve it all, making sure that delays are set in motion so that the 90 day threshold is passed and then whatever is paid back will not affect their bonus. The stupidity of catering is always one sided. Even me, I cater to me, I admit that and I have no issues with catering to me, but I will remain fair. I will not sell what will not work, I will not cater to the impossible. And that is the setting we see today, catering to the impossible.

The news (at https://www.aljazeera.com/opinions/2021/8/16/the-us-the-taliban-and-the-stunning-defeat-in) gives us “The Taliban victory is a major humiliation for the US”, it is not a weird consideration and there have been like mind voices in the past. I myself voiced issues with inactivity as early as 2013 and 2014, yet the Americans made noise that they knew better and now we see another stage. A stage that the media is ignoring. Yes they give their ‘click bitch’ emotional setting, but the larger stage that Al Jazeera hints at with “It was expected, yes, but not so rapidly, so victoriously, so humiliatingly”. The issues is troops and material, as I voiced the Comanche approach (an American approach no less) well over half a decade ago, the Americans catered to stakeholders and set on a perch. They should have taken a page out of the book of Quanah Parker who gave them hell in the late 1800’s (around 1870), that would have been a way to deal with the Taliban, but they decided to sit on a perch and halt any action and now we see the other side of that coin, the Taliban overran nearly all of Afghanistan in less than a week, they had the troops, they had the hardware and no one had a clue.

Now as we see Kabul being overrun, we suddenly get ‘Afghan President Ashraf Ghani flees Kabul to ‘prevent bloodshed’’ (I personally think he ran for his life caring only for self, but that might be merely my thought). There is also ‘Afghans Need a Humanitarian Intervention Right Now’, yet if you believe that this will happen you are quite crazy. I find the call by Micheál Martin calling ‘calls on Taliban to respect humanitarian law’ and this is politics? The loser in a war does not get to make demands, that has been a set result long before the Americans held that clambake from 19 Apr 1775 to 3 Sept 1783. The Dutch had a picnic opposing the Spanish in the years from 1566 to 1609, as such, I have no idea what will happen in Afghanistan, but it will not be pretty, that much I feel certain about. You see ABC news gave the people 8 hours ago ‘Who are the Taliban and what do they want?’, the did not go into any part of the folly that allowed Afghanistan to be overrun so fast. And the people in the media are not asking that question, not the Democrats, not the Republicans, and as I personally see it both sides catered to stakeholders and the maximisation of war revenue which to the largest degree gave the victory to the Taliban. When you consider the projects that USAID finished in Afghanistan, when you consider the costs and who got paid? How were they paid? A group that can overthrow a nation in a week and we need to consider “USAID completed the construction of three generation plants in 2009, 2016, and 2019 and is constructing three solar power plants and a wind farm that will add 110 megawatts of power to the national power grid” and those are merely the highlights. 

So what will happen next?
That is actually the question that is harder to answer, because it depends on the Taliban and not on the politicians that make claims that there are options and that they are working on this. Because that will be something that is so far from the truth it will become laughable. And it gets to be worse than this, you see the ‘allied’ forces abandoned their translators, the world is seeing that so any encounter where translators are needed it will be on the US forces to find them and secure them beforehand, a much larger tactical advantage then they are considering. 

A stage that might seem to be evolving, but that would be wrong, the larger stage is not that they merely lost, it is that the intelligence services in that region had seemingly no clear insight into their opponents and their resolve, their size and the materials available to them. Afghanistan is 270% of the UK and it got overrun in a week, is anyone waking up to these numbers? The afghan military was useless and their weapons pointless, the same might be said for the departing allies the Afghan army had, as such we see defeat in three ways and the media is not picking up on that, how weird?

The Guardian gives us “The Taliban have 80,000 troops in comparison with a nominal 300,699 serving the Afghan government”, this now implies that the Taliban went up against an army almost 400% their size and still overtook Afghanistan in a week, a cause for alarm and a cause for concern, so when we see ‘The world must not look away as the Taliban sexually enslaves women and girls’ we see that they too forget that to the victor go the spoils, all the spoils. England learned that lesson the hard way, The Dutch taught the Spanish and the Indonesians taught the Dutch, it was an easy lesson and history is filled with examples and the biggest lesson? These winners did not sit on a perch, it never ever works. 

As such the largest station of lessons is about to unleash and it will be worse, because now the Taliban will cry for their right to vaccines, so which nation will ingratiate themselves by providing vaccines? I reckon we will know a lot more when we get to the next weekend when we can sit on our own perches again, preparing for that Monday morning game as a quarterback.

And the Afghan people? It seems to me that the stakeholders will not care, it is not part of their spreadsheet.

Leave a comment

Filed under Media, Military, Politics

Operation Hazen Ames

It is night, Michael Weatherly is being casual, he is making small talk with another person. He explains that there is no need for the one exit to be watched. He closes the reinforced door that had the room with the information he needed. He then trips the alarm, turns around to the mirrored wall and pulls away the table, there is one screw. He unscrews it and pulls out the screw connected to an umbrella plug, the wall comes down. He clicks the other side open and points to the partner to get through. They go through and as he closes the initial mirror wall, the magnets in the table and wall push the table back in place. The umbrella plug is glued to the screw, it now operates as a screwdriver, Michael attaches something to the screw, he then click pushes the second wall back into place, the magnets hold it firm. They moved through an unmonitored small corridor and enter a supply room at the end is a rack with goods, he clicks on a button and the rack moves up a few millimetres, the wheels are now down, he moves the rack and signs the partner to quickly goes through. The moves through and there is a small food elevator there. He closes the wall and pulls two wires to set the rack back where it was, he had 10 seconds left, he can hear people running towards the place they had just left. They enter the food elevator and quietly opens the back panel, he goes through, the partner follows, he closes the elevator door and the back panel, then presses a button. The food elevator moves quietly down. 

For me it is easy to explain why the person is Michael Weatherly. I have been re-watching 12 seasons of NCIS during the lockdown the last two weeks. The issue is that this is part of a spy story, but not one you would expect. You see, this situation happened, it was a CIA operation, one of many and the story is not the common parts of the TV series, this series is not NCIS or Bull (I never saw Bull). The setting is that the TV series and episodes are a tell tale to the foreign governments to show them how they were transgressed upon and the TV episodes have fake names (as any series does) with a reference to an anagram to the operation. Someone decided to turncoat the CIA and uses the methods to make money on the side, from the studios as well as the extra checks from the governments he is supplying the evidence to, a nice little operation.

Yet the setting on TV series, as we see the use of ‘clever’ terrorists, there is a second fear, not that the opposition is more clever than the terrorists. It is that greed driven elements see their option clear AFTER the operation, not merely endangering what comes next, but giving away the past endangering more as well. It was the setting for an episode of any crime and spy driven series, yet I have no idea why the idea sparked into my mind. Whether it is about double agents, self turned greed driven agents or another kind, we are (through the Art of War) confronted with 5 types of spies. 

Local spies
Inward spies
Converted spies
Doomed spies
Surviving spies


The Art of war teaches us that if all five types are used it is impossible to discover the secret system, but as said the old days did not consider the greed driven logistics that we see today. You can read the Art of War to see and learn about the 5 types, yet the setting is altered in todays espionage. We have minders, archivists and now as one turns the colour of his shield, there is a larger danger that it turns Local spies into Doomed spies, a game changer many are not able to deal with. In any operation the local spy is the anchor, a barge without an anchor can move from the shadows into the floodlights of the other player. Am I right? Am I imagining (or fantasising) this? It is but a dream, yet in this we also find the larger stage of what matters. Even though von Clausewitz gives us that mot intelligence is false, there is a consideration that he considered himself a gentleman and as such espionage was beneath him and it was never considered a valid form of warfare. Sun Tsu is much more relevant, he saw espionage as a valid tool and his approach to any tool n hist setting to war is how to use tools the most efficiently. The concern he had for spies is like all other tools, if it protects the homeland, that is how we use it and in that era the general and his administrator were dedicated to the land they protect. In todays situation the logistics of war is on a sliding scope of what comes next and as such the undervalued and the discarded are drawn to whatever pays for a little better lifestyle than they are set to have, and they will use what is at their disposal, as such it is the archivist and the administrator that become the weakest link in a spy system. A situation that no movie or TV series has looked at. With all the thousands of episodes and hundreds of movies, I casually found a vulnerable unexplored link, yay me!

Leave a comment

Filed under Military, movies

In retrospect

I (for the most) react to facts, as I do now, but the results are not anticipated new facts, what comes next is pure speculation, no matter how correct I think I am, it is speculation and that needs to be said up front. Even as I start now, my mind is racing through speculative ideas and options in other realms (science realms no less), but I digress. The thoughts started with a Reuter article called ‘Analysis: Biden’s COVID-19 strategy thwarted by anti-vaxxers, Delta variant’, the article (at https://www.reuters.com/world/us/bidens-covid-19-strategy-thwarted-by-anti-vaxxers-delta-variant-2021-07-29/) gives us “Dr. Peter Hotez, a vaccinologist and dean of the National School of Tropical Medicine at Baylor College of Medicine, said the Biden administration’s acknowledgement of the “terrible impact” of the anti-vaccine movement was important, but he said the government could do more. “Anti-science is arguably one of the leading killers of the American people, and yet we don’t … treat it as such. We don’t give it the same stature as global terrorism and nuclear proliferation and cyber attacks,” he said”, it might be a mere quote, it might be the paraphrasing from the article writer, which is not a negative view, but it got me thinking. When we see the anti-vaxxer movements in the US and EU, they are uncannily effective, they are almost too effective. For the most and proven since the 90’s, the anti-vaxxers are either religiously inclined like the Dutch people in Giethorn (their ‘sort of’ version of Amish) or loons (often people who are one shade away from being absolutely bug-nuts). In the first, these people are driven and they are also self isolationists, it is merely about them and their community, it makes them a danger to themselves, not to others. The second group is a danger to all, but often so stupid they merely hit other stupid people. These anti-vaxxers are driven, not merely by intelligent people, no, they are driven like they are terrorist tools, like biological DOS agents and they are growing. These people are not accepting any scientific evidence, they forward non-scientific papers as ‘their’ evidence and they are not merely more effective, they are almost centrally driven by a similar source. 

In the UK the Guardian is giving visibility to Kate Shemirani, in the USA we see Alabama Curt Carpenter and the list grows. Someone is somehow fuelling this, yes this is speculative and this is not merely the power of social media, someone had months to prepare the weaker minded and target them in a direction, limelight seeking nobodies all wanting their limelight with as large as an audience as possible. The evidence is not clear and as such this is speculation, yet consider the timelines of each of these Anti-vaxxers, what their audience was a year ago and each month after that. This goes beyond buying likes on places like Facebook. Some people are fuelling these ‘bright’ illumination spots and they are not done, even as they are retracting their ‘assistance’ there is still a digital footprint and it is now diminishing. Yes, I admit upfront that my view is speculative, but my speculation fits the profile, are the US and the EU under attack from bio-terrorists? You might think that they are not the same, but there you would be wrong. In this I grasp back to a writing from 2012 called ‘A Proposed Universal Medical and Public Health Definition of Terrorism’. Here we see “We propose the following universal medical and public definition of terrorism: The intentional use of violence — real or threatened — against one or more non-combatants and/or those services essential for or protective of their health, resulting in adverse health effects in those immediately affected and their community, ranging from a loss of well-being or security to injury, illness, or death”, in this, if even one of my speculations are proven, these anti-vaxxers become complicit in acts of terrorism. Did you even consider that? Now, there is a dangerous fence. I am not debating THEIR right to be anti vaccinated. If they die, they only have themselves to thank, just like Curt Carpenter. Yet by attacking science by non-science and debunked non-facts, the setting changes and that is where we are now. What should have been a straight path to recovery is now a much larger issue. The delay is not on President Biden, and now that we can optionally see that the US is yet again under terrorist attack his priorities need to change, attacking big-tech is futile and counter productive, the laws needs adjusting free speech, it needs to be validated by accountability. 

And for the love of god, can some well trained data analyst please take a look at the timeline of these anti-vaxxers? I think it is time to look at timelines here and that is when my brain went into some sort of overdrive. It goes back when I designed an intrusion system that stayed one hop away from a router table between two points and to infect one of the routers to duplicate packages from that router on that path, one infection tended to not be enough, 2-3 infections needed to be made so that the traffic on that route between two points could be intercepted, I called it the Hop+1 solution, I came up with it whilst considering the non-Korean Sony hack. That  thought drove me to think of an approach to find the links. In the first we most likely need to find on where and when they accessed the dark web, then we see another part, because if we can find their access, we can optionally see others too, when we have that list and we can correlate it to other anti-vaxxers we have an optional pattern for action. No matter how this is seen it will be staged towards my speculation, something that needs proof, proof is required to give validity to actions that follow. I believe that I am correct, but I admit that it is a speculative push in a path towards thinking something is what I personally think it is, not a path towards evidence, evidence needs to be found and the evidence that is made to fit the solution, is no evidence, it is like stating that there is a linear relationship when you only have two plot points. A pattern of evidence is required, it is always about the patterns. 

So when I look at the ‘in retrospect’ part, I am wondering when the connections were there in the early stages and I also wonder why the others are not on that path yet (or seemingly yet). The media is only partly to blame, yes they give limelight, but that was their job from the early days, like the people exploiting Google cookies, the media can be exploited too, seeking the limelight is not a crime, but in conjunction with a terrorist agenda we are on new shaky grounds, and that is the problem, any law eagerly over-quick created is pointless whilst inaction is useless, caught between two rocks whilst the floor is not lava it is the ever exploiting media, exploiting for clicks, for visibility and circulation, whilst calling it ‘the people have a right to know’. This has the option of heading into a really bad direction soon enough. Will it? I have absolutely no idea.

Leave a comment

Filed under IT, Military, Politics, Science

Retry or retrial?

It is time to revisit a few issues, actually one issue and a whole lot connected to it. To start, I decided to go with The Verge, it has its ducks decently in a row, the article ‘NSO’s Pegasus spyware: here’s what we know’ is the best of them all, they also make reference to a lot of articles, and they have a decent line. The article (at https://www.theverge.com/22589942/nso-group-pegasus-project-amnesty-investigation-journalists-activists-targeted) is best if you read it yourself. Mitchell Clark did a good job, and as you have read the article, I can make a few jumps. The important jump gets us to the Washington Post (at https://www.washingtonpost.com/investigations/interactive/2021/nso-spyware-pegasus-cellphones/). This came from the link in “However, much of the reporting centers around a list containing 50,000 phone numbers” and when we seek the Washington Post article, we get “reporters were able to identify more than 1,000 people spanning more than 50 countries through research and interviews on four continents: several Arab royal family members, at least 65 business executives, 85 human rights activists, 189 journalists, and more than 600 politicians and government officials — including cabinet ministers, diplomats, and military and security officers. The numbers of several heads of state and prime ministers also appeared on the list”, no evidence mind you, merely statement and boasting. I call it boast, because we see there that the Amnesty’s Security Lab examined 67 smartphones all whilst close to 50% had an inconclusive test. If this is 67, what about the other 49,933? So when we get to “NSO chief executive Shalev Hulio expressed concern in a phone interview with The Post about some of the details he had read in Pegasus Project stories Sunday, while continuing to dispute that the list of more than 50,000 phone numbers had anything to do with NSO or Pegasus”, my support goes to Shalev Hulio. The Washington Post has a declining amount of credibility and this does not help. From my point of view, I would have made a dashboard based on the 50,000 numbers with a clear separation, In the top layer the continents, then the countries, where we see number of mobiles, versus number of landlines. This basic setting was never done, how stupid is that? A second dashboard could be the identifying class (journalist, government, lawyer, NGO) just to coin a phrase, the Washington Post was all about emotion, not about fact. I see this as a prime time hack job, with the alleged journo’s being the hacks, we also do not get any level of trustworthy setting on how the leak got to the Washington Post. Question upon question and in the mean time we get to see “In Hungary, numbers associated with at least two media magnates were among hundreds on the list, and the phones of two working journalists were targeted and infected, forensic analysis showed” 4 people and 50,000 numbers, could the article be any less relevant? And the stupidity of the Washington Post does not end, no it goes further with “Amnesty’s forensics found evidence that Pegasus was targeted at the two women closest to Saudi columnist Khashoggi, who wrote for The Post’s Opinions section. The phone of his fiancee, Hatice Cengiz, was successfully infected during the days after his murder in Turkey on Oct. 2, 2018, according to a forensic analysis by Amnesty’s Security Lab”, we see ‘two women closest to Saudi columnist Khashoggi’, so how did they get there? Because the numbers were on the list? And when we see ‘The phone of his fiancee, Hatice Cengiz, was successfully infected’, so how was that evidence obtained? From my point of view the text “according to a forensic analysis by Amnesty’s Security Lab” just does not cover it. It even gets worse with “Also on the list were the numbers of two Turkish officials involved in investigating his dismemberment by a Saudi hit team”, I see it as a weak approach to mention “investigating his dismemberment” which was NEVER proven, the proof requires a body, they never got that, at best the man is theoretically still merely missing. And from there we get to “Khashoggi also had a wife, Hanan Elatr, whose phone was targeted by someone using Pegasus in the months before his killing. Amnesty was unable to determine whether the hack was successful”, consider the text “Amnesty was unable to determine whether the hack was successful”, if that is true, how come we get “targeted by someone using Pegasus in the months before his killing”, how was that timeline proven? It is a simple question, the article is a bad approach to give more visibility to a journalist no one gives a fuck about. I like the quote ““This is nasty software — like eloquently nasty,” said Timothy Summers, a former cybersecurity engineer at a U.S. intelligence agency and now director of IT at Arizona State University”, is it eloquent because the NSA never made it, or because an Israeli company has the lead on this? I wonder what Timothy would have said if this was an NSA application? 

And the Verge is on my side, they give us “WAIT, WHO MADE THIS LIST?”, as well as “At this point, that’s clear as mud. NSO says the list has nothing to do with its business, and claims it’s from a simple database of cellular numbers that’s a feature of the global cellular network”, which is supported by “A statement from an Amnesty International spokesperson, posted to Twitter by cybersecurity journalist Kim Zetter, says that the list indicates numbers that were marked as “of interest” to NSO’s various clients. The Washington Post says that the list is from 2016” and when we consider these quotes and we read the Washington Post article for the shite it seems to be, I wonder who is waking up to the fact that the media, all the other media is merely re-quoting what the Washington Post stated and it is absent of all kinds of facts, or they merely didn’t bother putting the facts there. 

The entire Pegasus setting seems like a Wag the Dog approach to whatever these papers want to create and it is optionally a setting (a speculative one) that this is the push from stakeholders who have an issue with the NSO group, all whilst no credible evidence is given to us that there is an actual issue. And in all this the money trail was ignored, I ignored it too, mainly because I was unaware, yet the Verge was aware and they give us “At the time, the costs were reportedly $650,000 to hack 10 iPhone or Android users, or $500,000 to infiltrate five BlackBerry users. Clients could then pay more to target additional users, saving as they spy with bulk discounts: $800,000 for an additional 100 phones, $500,000 for an extra 50 phones” this implies that the cheapest option would be 500 times $800,000, which gives us $400,000,000 that is a whole lot of cash for a lot of people no one cares about. Yes, there are a few alleged targets that makes the pricing worth it, but with the setting I have, there is no way that the 50,000 numbers make sense, oh and before I forget, if this is a list for multiple sources, how many of the numbers doubled up? Too many questions and the media stupidly reprinting what the Washington Post is giving us makes no sense at all, unless you are a stakeholder with anti-Israel sentiments. 

In this Shalev Hulio is right that he is “continuing to dispute that the list of more than 50,000 phone numbers had anything to do with NSO or Pegasus”, I would too and I found a lot of the disputable issues within an hour, I wonder how shortsighted the media was when they decided to reprint what the Washington Post gave them. So whilst the Guardian gives us ‘the global impact of the Pegasus project’, I merely see a storm in a teacup, because the issues in the Washington Post were never decently vetted on a few levels and that is likely the biggest failing of the media at present. It is merely my point of view and I am happy to state that I could be wrong, but the lack of credible evidence, all whilst the media has a declining level of credibility makes my view the most likely correct one, most likely, because I have not seen the evidence, but as you read the articles, that are all about details, lacking generic evidence, how would you see it?

2 Comments

Filed under IT, Media, Military, Politics, Science

Out of my depth

It happens, we all have ideas, or thoughts, but we are out of our depth. In my case, we will soon see just how out of my depth I can get. Yet I del that it matters. You see, I was watching an old episode of NCIS (season 6) and for some reason my mind started clicking things together. I don’t think it is even connected, but for some reason my mind wandered towards the old drone problem, as well as the attack drones flying into Saudi Arabia. It gave me an idea when I remembered an old physics class. And then my mind went towards an old toy named Meccano. 

Meccano

The combination made me consider an idea to down attack drones. There are are a few parts.

The first is that the drone needs to be shaped like the image, the drone needs to be more circular in body and it needs the space from wing to point to be extended by 40cm – 60cm. That is merely the first part. Now the Meccano part comes into play (optionally something more advanced), the idea is that two circles extent in flight. Within the circles we have copper parts (see image), at the edge we have 2-4 wires and one of the circles has 4 spokes that are shaped like propeller blades, so the drone in flight will power the blades and make one of the circles rotate. Now the elements between the two circles are copper parts, perhaps you remember the old physics device (the electrostatic generator), used to create lightning. This is exactly the same principle. Some of you (some with aero engineering degrees, a degree I do not have) will state that you can put the electrical elements within the drone, but in this situation you need no large battery, saving weight, more important you can fly close by the other drone and do not need a targeting system, all options that require weight and additional electronics. If the wire hits the other drone, the shock should end its systems and optionally its electronics as well. That was the thought that came to me, and for some reason, it feels important to push anti drone activity forward. 

Yes, I am out of my depth, but the idea was there for a reason, I have no idea why, merely that the creative part in me needed to stretch its boundaries and my keyboard helped out. I now merely miss my old Adobe suite. I love my Apple pages and keynote, but it misses out on a few design elements. So as my mind is going over what else could be done, I cannot see any, but then, I do not have a degree in aerodynamical engineering, I do have one in ships engineering, got it in 1979, never used it though, such is life.

Leave a comment

Filed under Military, Science

From horse to course

Yes, there is a horse, it is not Mr. Ed, there is no kind conversation. This one has wings, and there are a few versions, including the off-spring of Lord Poseidon. Whether we believe Hesiod or not, it does not matter. Pegasus became a part of our oldest mythological stories. Yet today, Pegasus is something else, a figment from the imaginations of the NSO group and it was made real. It has been out for some time and last week we got the media and their overemotional response that it had a connection to 50,000 people, with 0.36% of these people journalists.

So what gives?
It is important to look at a few sources. The first is the BBC (at https://www.bbc.co.uk/news/world-middle-east-57922543) who gives us ‘Princess Latifa and Princess Haya numbers ‘among leaks’’, perhaps yes, perhaps no, who cares? We do get “The discovery of the princesses’ phone numbers on the list – and those of some acquaintances – has raised questions about whether they could have been the possible target of a government client of the group.” And here the questions start and the BBC is not asking them. Just like it is steering clear of alleged man-slaughterer Martin Bashir. So when we see ‘could have been the possible target of a government client of the group’ could is here the operative word. You see, no one is doubting that list, no one has given us a clear rundown of the names, a dashboard if you like, with the option to drill per nation and per class of person. This could all be a ruse of anti-Israeli groups, optionally the ruse of a competitor. And when we see “NSO has denied any wrongdoing. It says the software is intended for use against criminals and terrorists, and is made available only to military, law enforcement and intelligence agencies with good human rights records”, so which government leaked the list and how did THAT government leak what is implied to be a complete list? Then we get to the option that the leak came from within the NSO Group, which might be the most ludicrous thought, but I tend to look at all angles, so it is an angle that is most unlikely, but the chance is not zero. The article is all about Princess Latifa, not much about the NSO Group, it is an emotional lamentation to steer clear of massive screw ups like Jimmy Savile, Lord McAlpine, Sir Cliff Richard, and Lady Diana Spencer. As some say, the credibility of the BBC has never been lower. 

The second article is also from the BBC (at https://www.bbc.com/news/technology-57922664) less than a day ago gives us ‘Pegasus spyware seller: Blame our customers, not us, for hacking’. Here we are given “Investigations have begun as the list, of 50,000 phone numbers, contained a small number of hacked phones”, silly me for thinking that when we see ‘Investigations have begun’, we also get ‘a small number of hacked phones’, as such there is a much larger stage, and the BBC gives us “Pegasus infects iPhones and Android devices, allowing operators to extract messages, photos and emails, record calls and secretly activate microphones and cameras”, so if there are only a small number of hacked phones, how does that part matter? And when we get “a consortium of news organisations, led by French media outlet Forbidden Stories, has published dozens of stories based around the list, including allegations French President Emmanuel Macron’s number was on it and may have been targeted.” We get the real deal, a consortium of news organisations, led by Forbidden Stories hide behind ‘allegations’ and ‘may have been targeted’. Is anyone catching on? The media want to create emotional waves, yet does not want to be held accountable for their actions. The stakeholders are key here. A ‘consortium’ implies shareholders and stakeholders. It implies also that their issue is not that the NSO Group might do something outside of governments, it might show that the media does a lot more to anger the audience it desperately needs. 

And then the media does one more jab towards a currently missing journalist no one cares about with “including those close to murdered Washington Post columnist Jamal Khashoggi”, this is the emotional stage handed to us. It is “67 agreed to give Forbidden Stories their phones for forensic analysis. And this research, by Amnesty International Security Labs, reportedly found evidence of potential targeting by Pegasus on 37 of those”, so out of 50,000 we see that 67 are investigated and potentially we see 37 are targets, but there is no evidence that the NSO Group did this, these 37 might have been targets of the NSA or even the DGSE. 

And at this point there is one interesting flaw. If it was me, the first think I did was set up a dashboard that allows us to see where these 50,000 names are part of, where they are and how they were hacked. They have had a week and the stretch of media that gives us emotion after emotion is a much larger stage of stakeholders that need a negative view to be pushed onto the NSO Group. I admit that my view is equally speculative, but is it a wrong view? 

Finally there is the Guardian (at https://www.theguardian.com/news/2021/jul/22/israel-examine-spyware-export-rules-should-be-tightened-nso-group-pegasus) where we see ‘Israel to examine whether spyware export rules should be tightened’. Here we are treated to “An Israeli commission reviewing allegations that NSO Group’s Pegasus spyware was misused by its customers to target journalists and human rights activists will examine whether rules on Israel’s export of cyber weapons such as Pegasus should be tightened”, I can accept that view, but that also means that governments are largely to blame for this mess, if the list is real that is. There is every chance that this was a ruse to make the NSO Group less large, less of a challenge to a competitor and this is exactly what stakeholders tend to do, and using the media as their bitch is not out of the question.

My view is reinforced by “NSO has said Macron was not a “target” of any of its customers, meaning the company denies he was selected for surveillance using its spyware, saying in multiple statements that it requires its government clients to use its powerful spying tools only for legitimate investigations into terrorism or crime”, so as Macron was never a target, the BBC articles are less than accurate and that leaves the media open to all kinds of attacks. Yes, I will admit that it is a he said she said setting (she being the media), but that also means and implies that the NSO Group is not out of the woods at present. And let’s be honest, who needs a tool like this to keep track of the Dalai Lama? The man is out there in nowhere land and when he is travelling we see 50-150 reporters surrounding him, all ways to keep track, no NSO Group required.

As we see the horse Pegasus go on a course towards the government destinations, I see less of an issue with the NSO Group and a hell of a lot more with the Stakeholders who do not have the ideas, the innovations, but they really like the money attached to it. Do you still think I am on the wrong horse track?

There is always the time will tell part, but consider that if the media has not released a dashboard of these 50,000 numbers, I believe that my case is rather clear, I would personally consider that list is nothing more than the fabrication of a stakeholder who needs the revenue that the NSO Group currently has.

2 Comments

Filed under Media, Military, Science

Powers that were

Consider the stage we are in now and the stage we were in once. We were driven by stories, stories with a centre of truth, but what that truth was, we might never know. Even now as we try to set the new stage to the current state we know about, we are almost desperate to see ourselves better than we are. So what if we go back?

In the age of Ancient times there were the gods, the Greek gods for one. They once made weapons of immense power, Devine weapons. Not because they were simply better to anything we hd then, but because they had an element that is not available now, it never was. The tinkerer (smith) in that company was Hephaestus, he had enough for 5 weapons, 5 choices imbued with that one element making the weapon  hundred times more powerful than anything available at that time. One already existed, the hammer of Hephaestus. It is the weakest of them all, but it already existed. A hammer that can hit any object in exact precision in angle and power. It could also hit another person with the strength of a thousand sledgehammers, it allowed Hephaestus to do what needed to be done. The five weapons were tremendous and Christianity borrowed from these ideas, but they were never theirs and whatever they claimed was nowhere near as powerful. So when we hear speak people about weapons of power, do they know what they mean? The third most powerful weapon is supposed to be the trident of Poseidon, the most powerful one is the bolt of Zeus and the stories seem to collaborate that, but why? Because he is king of the gods? The second most powerful one is the one you might not expect, it is the bident of Hades. Yet why are these weapons so powerful? A man named Erich von Daniken looked into this for years and wrote a massive amount of books on the subject. He started in 1968, I became aware on his books somewhere in the 70’s, in total he sold well over 60 million books spanning over 30 languages. Even as some people (to some degree me too) thinks he goes over the deep end, there is something to be said on this and my book (still writing it) touches on that part. So when the Ancient Greek gods came here (after they made a mess in Persia, now Iran), they had technological advantages, for reasons not that much, but they did. 

They brought the secrets of Celestrium, and more important, they allegedly had access to terahertz radiation devices , a substance we are only now considering to have medical implications. In 2019 Joo-Hiuk Son, Seung Jae Oh, and  Hwayeong Cheon found that ”Terahertz radiation has significant potential in medical diagnosis and treatment because its frequency range corresponds to the characteristic energy of bio molecular motion. Advantageously, terahertz-specific low energy does not cause the ionisation of biomolecules” We can speculate on how healing that source is, but it would seem that. Person in those days could not be hurt by arrows, spears and swords. Yes, this is off the deep end, but we are finally looking at the stories and that is not the only part, the same application on observation and identity safety goes on a much longer road, and we have not even scratched the surface. 

It is George Alexander Gazis who wrote “Homer and the Poetics of Hades”, he gives us Hades as a place of darkness, where even the gods cannot see, and from this he concludes that “Hades remains impenetrable even to the omnipresent Muses”, a point never made in the poem. “In this sense,” he adds, “life and death are equated with seeing and been seen or not seeing and been invisible”; hence, the negative epithets characterising Hades. But this is a common conceptual metaphor, and death is also presented as a journey.” Hades has a landscape as well, and it is shut in by gates, features Gazis does not explore and why would he? Yet now we know that the application of TeraHertz technology would have setbacks, It was not bout the dark, it was about what non-TeraHertz technology would not be able to see at that point, not for 4000 years. 

Is this all speculation? Yes it is, but so are the writings of Homer and Aristotle, we merely accept them as they are old, I wonder what they never considered because no one would in those days, and until recently no one had reason to, yet the clues were always n front of everyone, and I am merely speculating, yet if someone looked at specific maps of what is now Iran, if they were able to look at rock pressures, someone might notice an almost perfect square with sides that were about 3500 metres each side. Did anyone make any connection to the this sizeable amount of pressure and the Ancient Greeks? So what is this about?

As I stated, it is all speculation, but I am taking another gander at the classical writings and the paths no one walked on, because we only now start to get access to the technology that alters the view we now have and that is also a setting we need to have for all new IP, games, movies and TV series. Most of the writings point towards Hades and how he is the weakest of the brothers. Now we see an optional path where he is the loner, the most secretive and optionally right behind Zeus in strength. Does that not alter the perception of a lot of writings? And when we see that some of these speculations do have an acceptable setting of alleged truth, what happens after that? In a factual life we need to get evidence, but the creative IP has a few additional paths at their convenience and they merely need to be original. 

The powers that were can imbue the powers that want to be, they only need to grasp what is readily available out there. 

Leave a comment

Filed under Finance, Military, Science

The devil rang

This is too good, I had just finished yesterday’s article and the Guardian gives me ‘Spyware can make your phone your enemy. Journalism is your defence’, in this that I have some troubles accepting that journalism is my defence, they are al about circulation and satisfying their shareholders and stakeholders (optionally advertisers too). But the article came at the right moment, even as this is about Pegasus and the NSO group. Whenever I look back at the title ‘Pegasus’ I think back to Pegasus mail and windows 3.1. It is a reflex, but a nice one. So, the article gives us “The Pegasus project poses urgent questions about the privatisation of the surveillance industry and the lack of safeguards for citizens”, which is nice, but Microsoft, Solarwinds and Cisco made a bigger mess and a much larger mess, so pointing at Pegasus at this point seems a little moot and pointless. (Microsoot’s Exchange anyone?)

Yes, there are questions and it is fair to ask them, so when we see “This surveillance has dramatic, and in some cases even life-threatening, consequences for the ordinary men and women whose numbers appear in the leakbecause of their work exposing the misdeeds of their rulers or defending the rights of their fellow citizens”, yes questions are good, but the fact that millions of records went to the open air via all kinds of methods (including advertiser Microsoft) is just a little too weird. And it is not up to me, it was The Hill who asked the people (5 days ago after the Kaseya hack gone public, the larger question that actually matters ‘Kaseya hack proves we need better cyber metrics’ and they are right, when we see “Once “infected”, your phone becomes your worst enemy. From within your pocket, it instantly betrays your secrets and delivers your private conversations, your personal photos, nearly everything about you” we read this and shrug, but at this point how did a third party operator (NSO group) get the data and the knowhow to make an app that allows for this? Larger question should be handed to both Google and Apple. The fact that the phones are mostly void of protection comes from these two makers. This is a setting of facilitation and a lack of cyber security. The NSO group decided to set a limited commercial application (more likely to facilitate towards the proud girls and boys of Mossad) and they took it one step further to offer it to other governments as well, is that wrong?

So when we see “All of these individuals were selected for possible surveillance by states using the same spyware tool, Pegasus, sold by the NSO Group. Our mission at Forbidden Stories is to pursue – collaboratively – the work of threatened, jailed or assassinated journalists”, if that were true, we would see a lot more articles regarding the 120 Journalists jailed in Turkey, not to mention the 60 journalists that were assassinated (read: targeted killing exercise) there as well. The papers are all about a journalist no one cares about (Jamal Khashoggi) but the other journalists do not really make the front page giving pause and skepticism to “the work of threatened, jailed or assassinated journalists”, my personal view is that the advertisers and stake holders don’t really care about those lives. Then I have issues with “This investigation began with an enormous leak of documents that Forbidden Stories and Amnesty International had access to”, was it really a leak, or did one government take view away from them (by Amnesty International) and handed it towards the NSO group? A list of 50,000 numbers is nothing to sneer at, as such, I doubt it was a leak, it was a tactical move to push the limelight away from them and push it somewhere else. As we consider Kaseya, Solarwinds, Microsoft and Cisco, the weak minded democratic intelligence players from the Unified Spies of America come to mind, but I admit that I have no evidence, it is pure speculation.

And then we see the larger danger “But the scale of this scandal could only be uncovered by journalists around the world working together. By sharing access to this data with the other media organisations in the Forbidden Stories consortium, we were able to develop additional sources, collect hundreds of documents and put together the harrowing evidence of a surveillance apparatus that has been wielded ferociously against swaths of civil society”, who did they share access to? Who reports to another faction that is not journalism or is purely greed driven? In this, the article (at https://www.theguardian.com/world/commentisfree/2021/jul/19/spyware-can-make-your-phone-your-enemy-journalism-is-your-defence) gives us one other gem, it is “not to mention more than 180 journalists from nearly two dozen countries”, as such we see 0.36% of the data is about journalists, so if I was to look at a slice and dice dashboard, how will these 50,000 people distribute? So when we see “If one reporter is threatened or killed, another can take over and ensure that the story is not silenced”, yes, how did that end up for those journo’s in Turkey? What about outliers in data like Dutch journalist Peter R. De Vries? He is not getting the limelight that much in the last three days, you all moved on? You pushed the limelight towards Jamal Khashoggi for well over a year, who achieved less than 0.01% compared to Peter R. De Vries. I reckon that this article, although extremely nice is there to cater to a specific need, a need that the article does not mention (and I can only speculate), but when we see all this holier than though mentions and we see an inaction on Turkey’s actions, as well as a lack of news regarding Peter R. De Vries, I wonder what this article was about, it wasn’t really about the NSO group and Pegasus, they are mentioned 4 and 7 times, the article was to push people towards thinking it is about one thing and it becomes about the 0.36% of journalists in a list of 50,000, all whilst the number is mentioned once in the article without a breakdown. Someone else is calling, when you answer, just make sure the local number is not 666.

Leave a comment

Filed under IT, Military, Science

What one reads

We all have that what one reads can be the opportunity for the other. I wrote about this in the past. On June 4th in ‘The left corner’ (at https://lawlordtobe.com/2021/06/04/the-left-corner/). Today, Reuters gives us ‘Facebook says Iranian hackers used site in spying on U.S. military personnel’ (at https://reut.rs/3rbz5Uf), and yes that is the direct result from Digital Direct Marketing. They all get to have a bite, so when I see “Facebook said on Thursday it had taken down about 200 accounts run by a group of hackers in Iran as part of a cyber-spying operation that targeted mostly U.S. military personnel and people working at defence and aerospace companies” I am not that surprised, I am just giggling that it took them that long. On the other hand there is a chance it took Facebook this long to wake up, either way is possible. Yet that also gives the opportunity for Cocoon to grow their marketshare, by a lot. Consider that one in the cocoon pays the $40 a year, no matter what the size, no matter what the trade. And in all this time no one in the Defence department (not even the DARPA boffins) made clear consideration to adapt Cocoon for military messaging. A stage that was out in the open when Google created Google+ in 2011. Yup the uniform people did seemingly not catch on. So when we see optional a whole range of security issues, is it that much of a stretch to set the IP of Cocoon to a much larger base (it will piss off Facebook, but who cares). A stage that is international is governmental and as we see it, there is an almost boundless level of custodians and customers and they all need privacy. So, as we see the setting of the digital sun on some, we can hide behind “Facebook said the hackers mostly targeted people in the United States, as well as some in the United Kingdom and Europe, in a campaign running since mid-2020”, whilst hiding behind the spoof “its head of cyber espionage Mike Dvilyanski said it was notifying the “fewer than 200 individuals” who were targeted”, yet this is Iran (and others), do you really think that they are merely hitting 200 people? Even at 1-3 per day it implies that in 2021 alone 197-594 would have been targeted, as well as their family members to find leverage. And all that time there was an alternative. 

And let’s be clear, this is not on Facebook, they did what their solution intended to do, Iran merely saw more and it is time to change that, Cocoon came at the right time and they have the inside track to a lot more. 

Leave a comment

Filed under IT, Military, Science