Tag Archives: Bradley Edward Manning

Historic view versus reality

We all seem to have views, it is not wrong, it is not bad it is not evil, it merely is. I saw in 1998-2002 how governments sat on their hands, how lawmakers sat on their hands (and optionally on their mistresses) and they all vocally agreed that hackers were nothing more than a nuisance, and as I see it the traitor Bradley Edward Manning (aka Chelsea Elizabeth Manning) gave up secrets that it was not allowed to reveal and gave it to the world. There is no doubt on guilt, there was no doubt on treason, there merely was the act and that was that, it was the first moment where governments got the first clear hint that hackers were a much larger danger. After that came Julian Assange and Edward Snowden. Julian might be many things, but technically he was not a traitor. Edward Snowden was one, and the law again disregarded the steps that were taken, he went intentionally to a place where he might get the most value out of his deeds, Russia picked him up, just to piss of the US, which they were speculatively allowed to do, yet the stage is rather large, more hackers, all under the guise that the law saw them as a mere nuisance, we all got introduced to ransomware, now we see governments hacked through a sunny breeze (Solarwinds), and the voyage does not end. Now we see less than a day ago ‘Hackers threaten to leak plastic surgery pictures’, as well as ‘National Security Agency warns hackers are forging cloud authentication information’, now I do not care for the plastic surgery part, but it is another case where personal and person inclined data is no longer free, the two elements also give a rather large stage for us to place a new premise. One could now argue that hackers are the clear and present danger to personal and corporate needs and as such they can be hunted down and put t death. So from nuisance to global danger, as such when all these mommies cry that their little boys did not know what they were doing, I have no issues putting a HK model 23 to their foreheads and executing them (optionally with silencer as to not scare the neighbours). 

I think it is time for lawmakers and government administrative types to wake up and smell the situation, and in this, perhaps some remember the words of Martin C. Libicki in Newsweek (2015) where he pushed the view ‘Cyberattacks Are a Nuisance, Not Terrorism’, well that is not really true, is it? When we see the definition of terrorism we see “The unlawful use of violence and intimidation, especially against civilians, in the pursuit of political aims”, there we see two parts up for debate, the fist is that ‘mental violence’ is still violence and the setting of intimidation is already achieved, the stage we still need to address ‘the pursuit of political aims’, not all terrorism is set to political aims, unless if you call self-enrichment the pursuit of political aims. 

And with ‘National Security Agency warns hackers are forging cloud authentication information’ we see an initial stage where commerce will come to a screeching halt. My IP does not cover for that, darn. But there is the old way (1981-1991), just kill them, be done with it. 

Now some (especially in law) will state that I am overreacting, yet am I? It is the lawmakers that could optionally be seen as cowards, hiding behind their golden calf called jurpisprudence. The law, for the most does a good job, it is not perfect, so be it, but for the most, it is OK. This covers the never trespassers and the limited trespassers, they make up for 75% of all people, then there are the criminals, 24.99%, the law takes care of them, they are repeat offenders, career criminals and as such the law was designed to deal with them, then there is the remaining 0.01%, these criminals are in it for the kill, to create a maximum amount of cadavers physically, mentally and financially, to make life for nearly all impossible, and that golden calf, the law cannot deal with them and we accept that, so we remove them in other ways. We hunt them down and put them to death, and when it is some 16 year old claiming he didn’t know what he was doing, we know, he did it to seem cool, he was willing to make all others suffer, just to look cool, to get the tits, to rub the vagina, his friends never could, as such there is a 9mm solution that solves it, if only his parents had raised him right. 

You think I am kidding?
You forget the poverty line is shifting massively because of COVID-19 and soon the insurances will not cover the impact, the media will merely snigger and cash in on all those clicks they got from the $x donation to an unnamed source, and it is now time to make the long overdue change, before governments are pushed to take away more and more of our freedoms, which will push us into the dark-web, a situation these criminals would love. And it is close to 15 years too late, but in this case it is better to be late to the party than not get there at all. 

Am I overreacting?
That would remain a fair question, I do not believe so as this step is well over a decade overdue, it is not something that was pushed to the top in the last few days, and it is partially due to governments and lawmakers not acting when they could have and especially when they should have, now the dike is levied and people are soon to be drowning and something must be done. From my point of view, to hit terrorists, you hit them harder, so the more extreme you hit these hackers, the clearer the message becomes. And a clear message is years overdue.

In this there is a two step setting, there are the “cool wannabe’s” who are mot likely teenagers, some of them are easy to find and after the first examples a lot of them will hide like cockroaches, but the second tier, the one the media and governments intentionally ignore are those in organised crime, they will be the real challenge and as most governments have nothing on stopping them, at best they can limit the damage, which is basically no solution, that gap will take time, but with ‘hackers are forging cloud authentication information’ less than a week old, there is now a chance that the NSA and other intelligence networks will realise that compromised clouds will have global commercial implications, as such governments must now act, the moment any cloud is openly seen compromised, it will be too late for well over a decade. It becomes a clearer situation  when you consider that global e-commerce was set to ‘Global e-Commerce hits $25.6 trillion’, by the United Nations Conference on Trade and Development (UNCTAD), s how much losses must global commerce endure before we act? Oh and if you think that this is the end? How much more powerful will organised crime become if they only get their fingers on 0.1% ($25,600,000,000)? It will become a sliding scale that goes from bad to worse, and governments knew that, they knew for well over a decade, but their delusions saw other non-solution, like perhaps, it will go away on its own, so tell me when was that ever a solution?

Leave a comment

Filed under Finance, IT, Law, Media, Military

In this peachy White House

There have been a lot of issues going on lately when we get to the American El Jefe. There is a larger issue and there is consideration whether the larger issue exists for real. When it comes to the 45th President of the United States, the looneys and the conspiracy theorists are having a field day, this President has been the acceleration of looney tunes and goofy vision holders. He has been able to give rise to more conspiracies than the previous ten together. So there is what happens, what belongs to the ‘other’ classes of rumours. We now get ‘Michael Cohen recorded Trump discussing payment to Playboy model – report‘ (at https://www.theguardian.com/us-news/2018/jul/20/michael-cohen-trump-tapes-recording-playboy-model-karen-mcdougal-latest), so there is that adding fuel to the fire. By the way, have you seen Karen McDougal? I know that it is shallow to judge by looks, but if I got the attention of a woman THAT good looking, I would not be hiding it. OK, I get it, the man is married! Yet as we get another escalation that is taking the focus off the economy, there is now a serious setting where we need to look at the impeachment process (because of the shouting). It is not a new process, it was initially suggested by Benjamin Franklin in 1787; he thought it was a better solution then assassinating the ruler, which I disagree with, because I did not master 10 versions of Assassins Creed, just to get some idiot impeached. I was actually looking forward testing my skills against the US Secret Service, LOL!

The impeachment process plays is done in Congress and requires critical votes from both the House of Representatives as well as the Senate. So the House of represents the conviction and the Senate does the execution. This is not a simple setting. The House Judiciary Committee decides whether there is a case for impeachment or not. If they go for the Yay! Setting it will be up to the Chairman of the Judiciary Committee to propose a resolution calling for the Judiciary Committee to begin the formal inquiry towards impeachment. At this point we see the Judiciary Committee getting the resolution composed of one or more “Articles of Impeachment” to the full House stating that impeachment is warranted and why or that impeachment is not called for. So far there has not been a successful impeachment (Nixon resigned and Clinton got acquitted. Let’s get it out in the open that if President Trump gets to walk the path of former President Clinton, at least it was whilst he got allegedly caught with a woman (roughly) 2587% better looking than White House intern Monica Lewinsky ever did.

What gives?

Well the sweet part of all this is Article II, Section 4 of the Constitution says, “The President, Vice President and all civil Officers of the United States, shall be removed from Office on Impeachment for, and Conviction of, Treason, Bribery, or other high Crimes and Misdemeanours.

So now we get the list.

Bribery anyone? Well unless Karen McDougal was offered Hawaii for the optional alleged invasive action of penetration, there might not be a case, in addition to that, she is not a government official and there has never been any mention of a presidential vote being swayed by any of her deeds of desire.

Now we get to the part that is a bit of an issue. You see High crimes and misdemeanours seem to be intentionally ambiguous to cover a lot more than initially intended. The Constitutional rights foundation (at http://www.crf-usa.org/impeachment/high-crimes-and-misdemeanors.html) gives us:

At the Constitutional Convention in 1787, the framers wanted to create a stronger central government than what existed under the Articles of Confederation. Adopted following the American Revolution, the Articles of Confederation provided for a loose organization of the states. The framers wanted a stronger federal government, but not one too strong. To achieve the right balance, the framers divided the powers of the new government into three branches—the executive, legislative, and judicial. This is known as the separation of powers. They also gave each branch ways to check the power of the other branches. For example, although Congress (the legislative branch) makes laws, the president (the executive) can veto proposed laws. This complex system is known as checks and balances“.

So now we have a setting that covers allegations of misconduct peculiar to elected officials. This gives us: perjury of oath (Clinton), abuse of authority (Nixon), bribery, intimidation (Nixon), misuse of assets (Clinton and Trump, although the penis is personal property and is disregarded from being accused of misuse in this particular setting), failure to supervise, dereliction of duty, unbecoming conduct (Nixon, Clinton and Trump several Times), and refusal to obey a lawful order. There is another setting which we got in 1970 under Representative Gerald Ford. It was “Representative Gerald R. Ford defined impeachable offenses as “whatever a majority of the House of Representatives considers it to be at a given moment in history.”
Which opens the trough in a few ways, because in modern settings (when married) you are supposed to lie about having an affair, making it no longer an alleged crime, in addition, a Gentlemen is not supposed to tell on what he shoves where, which puts both Clinton and Trump in the Green. And let’s be honest, in public opinion, would you really want to be the one having to admit looking at other women when you are married to a woman looking like Melania Trump? And in finality, when it comes to ‘conduct unbecoming’, the media has been soiling their own meadows for the longest of times whilst acting unbecoming, shielding big corporations in regards to activities as they were advertisers and stake holders, so there!

So we think we have the foundation of an impeachment, the question becomes will the US government push ahead on this? If it is to the 1970 setting of getting this past the House of Representatives that has 240 republicans, good luck to that setting. I think that we can throw out any chance of getting traction here; any impeachment is dead in the waters. The issue is that this might become a tactic next year in light of the 2020 presidential elections. Yet it only holds any serious grounds if the Democratic Party has anyone to offer as a serious contender. It does not as far as I can tell. You see, they have two serious players (for now), Joe Biden and Bernie Sanders. Joe Biden cannot get the numbers, nowhere near what is needed, which gives us Bernie Sanders. He might be ready to get that distance, but the setting needs to become the conversion of all the independent votes to go towards the Democratic Party. A lot of them remain independent for a reason and that is the loss for Bernie Sanders. The conversion path is not there and is unlikely to get there, giving the Republicans a large advantage, so any impeachment needs to die in the House of Representatives and it likely will. So as Fox News is all about ‘Trump impeachment push emerges as next Dem litmus test‘, I can tell you now that this is not going to happen, if it cannot be opposed in the house for starting, it will most definitely end up getting killed there.

As we see Fox giving us: “CIA Director John Brennan all but endorsed impeachment when he tweeted that “Donald Trump’s press conference performance in Helsinki rises to & exceeds the threshold of ‘high crimes & misdemeanors'” and was “nothing short of treasonous.”“, the non-republican Americans get all emotional, yet the setting is that John Brennan does not see it going anywhere, and he did not endorse impeachment as it would never happen. That is the clarity of the matter. Over half a dozen video’s and news bytes, all about impeachment, yet the cold sighting of the rules of impeachment were all ignored by the news readers, all hoping for dozens of cycles on what gets Americans emotional, whilst the clinical side show us that this for now is not going to happen, if it would proceed, it would never make it through and that indicated that any impeachment action is about turning heads and taking attention away from matters that actually require attention.

The one act I moved away from is Treason. Treason is a dangerous setting, especially in this day and age. If we go back to the 1970 setting discussed earlier, we see acts of treason from Edward Snowden and Bradley Edward Manning. They got out, acquitted and given a ‘hero’ welcome, yet they fit the traitor bill, although in the case of Manning, it is likely to fall over on the indictment when discussing gender. I can already see the headlines: ‘Falling over technicality, Male, Nay Female overthrows conviction’, this is not some anti-LGBT rant. I think (s)he choose the exit strategy that no other person would have chosen. Julian Assange did not make the Traitor cut as he was not an American, in addition, he has given materials and as s publicist he might have acted wrongly. It was his mistake to make and that does not qualify for treason.

Especially in light of Snowden, the traitor issue becomes a much harder setting. I have written many articles in the past on Snowden and I stand by them, I believe that this matter is far from over. This is an entirely different setting, but it requires reflection for the mere reason that any consideration of President Trump being considered, and convicted a traitor whilst Snowden got acquitted should be regarded as a first marker that the insane are truly ruling America, but that is merely my personal view on the matter.


Leave a comment

Filed under Law, Media, Politics

Authentically Realistic

Whilst we see many sources talk about the need of blaming North Korea, we see an abundance of changes that are now not just changing the way we think, but these changes will also change the way we live and act. As we are soon to be lulled into more false sense of security, we must now content with the thought, what is real and what is not.

In IT these issues have existed on several layers for a long time, yet the overall lack of Common Cyber Sense has been absent for a massive amount of time. Bradley Edward Manning, now known as Chelsea Manning is only one of several parts of this puzzle. Wikileaks has added its own levels of damage and let us not forget the acts of Julian Assange and Edward Snowden. This is not on how things were done; it is about a lack of proper measures and controls. In the age of people screaming that they have a right to know, they will publish whatever they can for the need of ego and then scream on how the government is abusing their right to privacy.

These are all elements that link back to ‘Common Cyber Sense’.

CCS as I call it has in its foundations a few branches. The first is proper use and knowledge. Many still laugh and sneer at manuals and proper use of equipment, yet when other people started to ‘look’ through their webcams on laptops into their privacy, smiles disappeared quickly. We live in an age where everything is set around the fake image of comfort, it is fake because comfort at the expense of security is never comfort, it is just an added level of danger into your own life. At this point people forget that what is set into software, can usually be switched on and off at the leisure of a skilled ‘someone else’.

Buying what is cheap and what is right are worlds apart, that part is more and more a given fact. The bulk of people are lulled into ignoration when it comes to a simple easy tool that can be used everywhere, at which time they forget to ask ‘by everyone?’. Consider the HP laptop (one of many brands) has a build in webcam at the top of the screen, instead of relying on a software switch, these makers could have added a little slide that covers the lens, literally a low-tech solution making the lens see nothing, as far as I can tell, no one took that precaution for the safety and security of the consumer, is that not nice?

The second branch is access. If I got $.50 for every person that uses their name, ‘qwerty’ or ‘password’ or even ‘abc123’ for their login, I could buy a small Island like Hawaii or New Zealand, probably even both. Even though many websites and systems demand stronger passwords, there is always that bright person who uses the same password for every site. This is part of a larger problem, but let’s move on for now.

Third is the connection branch, places where we can ALWAYS connect! You think that not having passwords on your home Wi-Fi makes you safe? Wrong! You could add loads of problems on every device that connects to it by not properly setting things up. I wonder if those with an automotive router have considered the dangers of not setting it up properly and letting all the people they pass access to whatever is connected to it in the car.

The fourth branch is for the unknown. This might seem like a weird option, but consider how fast movable technology is growing, I am using ‘movable’ and not mobile, because this changing field includes phones, laptops, PDA’s, tablets and other not yet defined devices (like the apple watch, handheld game systems and consoles).

At the centre of all this is proper usage, but not just your hardware, it also includes your software, a fact many have remained oblivious to.

At this point, I will take a temporary sidestep and let you consider the following term ‘non-repudiation’.

Non-repudiation is about identity and authentication. Basically it states, ‘you and you alone‘ have sent this item (message, photo, financial transfer). In legal reasoning this will be the strong shift that will most likely hit many people in 2016 and onwards, it could hit you this year, but there are more than just a few issues with this situation for the immediate now. So when you lose your money and you state you were hacked, then you might soon have to prove it, which means that any evidence that you EVER gave your password or pin-code to a spouse, lover, boy/girl friend or sibling means that you nullified your rights. You get to pay for the consequences of THEIR acts at that point.

So when we see biometrics, we think fingerprint, we expect to be a lot safer. WRONG! Only last month did a group in Germany show how they recreated the finger print of the German Defence minister from simple digital photos, which means that this could have given them access to a whole collection of items, events and information they should not have gotten access to. So what to do? Well, that market is growing really fast. ‘Vein’ is the latest. It does not rely on fingerprint, but on the veins in a finger or hand, it is just as unique as a fingerprint, it is a 3d issue, making it even more secure and it requires an actual living hand. It also will lack the dangers of influence that a retinal scan has when a woman gets pregnant, or in case of a diabetes patient or alcohol levels. These all can shift retinal scans, with the added problem that this person stays outside the lock, becoming the valid person ‘no-more’. Yet, ‘Vein’ is still a new technology and not currently (or in the near future) available for movable devices, which gives us the issue on what devices are actually decently secure.

Let’s not forget, that even though this is not an immediate issue, the people will need to change their possible ‘lacking’ approach with more than just slow muffled interest, whilst they rely on the comfort of not having to comprehend the technology. That part is still not completely disregarded in several cases, the issue at Sony being likely the most visible one for some time to come. There is still a massive amount of actual intelligence missing. Most speculate, including me (yet I have been looking at these speculators and claimers of facts). Whilst Sony is visible, there are still unanswered issues regarding the NSA and how a place like that had the implied intrusion Edward Snowden claimed to have made.

Now let us take a step back to the four branches. I showed the webcam issue in the first branch, but the lack of consideration by the user is often a bigger problem. You see, many ‘lock’ their device, or just walk away and switch their screen off. Their computer remains connected and remains accessible to whoever is looking for a place to hack. I know that waiting 45 seconds is a bother at times, but learn to shut down your computer. A system that is switched off cannot get hacked, the same applies to your router (which actually has the added benefit of letting your adapter cool down, making the device last longer) and your overall electricity bill goes down too, all these benefits, all neglected for the fake comfort of accessing your social media the second you come home. Yet proper usage also includes software upgrades. Many do them, but more often than not, they tend to be made when the system reboots, when this is not done (or the software upgrades are not made) your system becomes increasingly at risk for intrusions of all kinds. Windows 7, which is a lot better than either Vista or Windows 8, still required 84 patches in 2014. With over half a dozen being either critical or important, you see why even in the best of times, under all conditions met, you still run some risk. And this is just Windows; in 2013 they had to fix 47 vulnerabilities regarding Outlook, explorer and the Windows kernel. There was a massive issue with remote execution, which means that your system was open to the outside without the need for a login (source: PCWorld). Now, to their defence, Windows and office are massive programs, but still, it seems that Microsoft (not just them) have taken a strong stride towards ‘comfort’ whilst ignoring ‘safety’ (to some extent).

Branch two is usually the biggest flaw. Even though many websites will require a decent level of strength (usage of small and capital letters, numbers and a special character), but that list is still way too small. The amount of people that I have met that use the lamest of simple words (like ‘abc123’) and these people cry the loudest when their money is gone. You see, it is easier to just hack your computer or device and use that system to order online via other means then it is to hack into your bank account. Yes, it is a bother (at times) to remember every password, yet in that regard you could be clever about it too. There is nothing stopping you from creating variations on a password whilst making sure it is a completely different one. I learned that someone had used her dictionary app to use a version of word of the day, she changed ‘adscititious’ into something like ‘Adsc1t!tious’. Good luck figuring that one out! (I had to look up the word in all honesty), the options become even more interesting if you speak additional languages. So, branch two is something that you the user largely control.

Branch three is actually the growing danger. It is not just when we connect, but when things connect automatically that becomes an issue (and where from). Insurance companies are more and more about your visibility, even though no official moves have been made, the day that junior uploads that catch of the day to his Facebook with dad in the background. That is the option for the members from the ‘institute of discrete entry and removal operations’ to help you with your old stuff (the missing items when you get home). The information you ‘give’ when you connect (especially on free Wi-Fi places), you see, when you connect to free Wi-Fi, more than one danger exists that others can connect to you, yes, you could learn that free Wi-Fi was the most expensive part of your vacation soon thereafter. It however moves more and more to your area of usage. As we get more connections and as we can connect from more places (like the automotive router), we will receive additional responsibilities in setting devices up properly for our safety and the safety of our children.

Now, to take a second sidestep. This is not about scaring you (a nice benefit for sure), some of these things can be prevented from point zero. Knowing what you switch off, switching off when not used are first easy and elemental steps. You see, a hacker looks for a place to get into, when your computer and router are switched off, the hacker will not spot these devices at all and move on. Hackers do not like to waste time, so when you use proper passwords, that same hacker will lose a lot of time getting access to your devices, time he could be having ‘fun’, so these two elements are already diminishing the chance of you getting transgressed upon. But in the end, there is another side. Makers of hardware and software need to become increasingly aware that their ‘toys’ have malicious usage. It was Geek.com that had the article ‘Yes, Xbox One Kinect can see you through your clothes‘ (at http://www.geek.com/games/yes-xbox-one-kinect-can-see-you-through-your-clothes-1576752/), which gives an interesting demo (without showing off anything indecent) how defined and articulate the scan system worked and it is a hackable solution, even there we see the mention that a lens cover would not have been a bad idea.

Yet we have digressed away from the heart of the matter. All these are linked, but the crown in the hardware is an increasing need for non-repudiation, showing that you and only you acted. A lack of this evidence could also go a long way in proving that you were innocent and that you were the victim. It is easy to claim that the makers are at fault and to some degree they are, but there is a growing need to have the right solution, and so far having any clean solution remains absent, whomever comes up with that could own the cornerstone of the global technology sector, an area that represents a massive amount of long term revenue.


Leave a comment

Filed under IT, Law