Tag Archives: CIA

A new danger

There is a setting of dangers, the dangers are not merely setting, and for the US it is inequal discussion on how many allies they have left in the near future. It is not a new danger; the actions have been under scrutiny for some time. Yet last night something changed. We understand that electing the 45th president, a ‘former’ greed driven billionaire would always have consequences, yet the amount of consequences shown is now escalating.

The Washington Post gave uis 90 minutes ago ‘GOP fundraiser Broidy under investigation for alleged effort to sell government influence, people familiar with probe say‘, the article (at https://www.washingtonpost.com/politics/gop-fundraiser-broidy-under-investigation-for-alleged-effort-to-sell-government-influence-people-familiar-with-probe-say/2018/08/17/c9e55792-a185-11e8-8e87-c869fe70a721_story.html?utm_term=.774c7a3358da) a different setting. We always knew that there are two sides and the ‘less progressive’ republican side was always a little of a hot potato to some. Yet with “The Justice Department is investigating whether longtime Republican fundraiser Elliott Broidy sought to sell his influence with the Trump administration by offering to deliver U.S. government actions for foreign officials in exchange for tens of millions of dollars“, that hot potato has now turned into a handgranate. With the quote “As part of their efforts, prosecutors have subpoenaed casino magnate Steve Wynn, the former RNC finance chairman and longtime Trump friend, for copies of records and communications related to Broidy” we see that there is a much larger net being used. It is not merely about Broidy, with names like Steve Wynn we see that there are several names involved, all people with almost direct access to the President of the United States, and with names like Jho Low and Guo Wengui we see another side of ‘entrepreneurship’ hitting the limelight.

Yet how real is the setting?

Part of it is seen in the Wall Street Journal, and with “through June and into July, Mr. Low had been living freely in China, a person aware of his travels said”, as well as “Mr. Low had a close relationship with former Malaysian Prime Minister Najib Razak, who in turn was courted by China. Malaysia’s new government suspects Mr. Low helped arrange infrastructure projects, financed by China, from which funds were diverted to cover debts”, the second part now giving us that America as well as other players wanted access to Mr. Low, yet that in itself is not evidence against Elliott Broidy. What it does tell us that multiple players want access to this billionaire, all for their own reasons and with the US with a debt surpassing 21 trillion, we can only wonder what some people want Mr. Low for. The additional part is that Malaysia is now pulling all the plugs. This is seen as Channel NewsAsia is reprting that “The Bombardier Global 5000 aircraft, estimated to cost US$35 million was allegedly bought with money belonging to 1Malaysia Development Berhad (1MDB)” (at https://www.channelnewsasia.com/news/asia/malaysia-to-prove-jho-low-private-jet-bought-stolen-money-1mdb-10621726). It seems so flaky and weird to merely focus on one plane. The amounts are massively larger then the $35 million, so in that case, if that evidence falls over, will the case on that side against Jho Low collapse? When we look in that direction and look at Malaysian Prime Minister Mahathir Mohamad, we see that hsi platform is set upon anti-Chinese activities and when we see the accusation “critic on Chinese ventures in his home country for being too expensive and has suspended three China-backed projects worth around $22 billion that were signed under the previous administration”, we see that there might be  case in that part, yet why focus on $35 million in a $22,000 million setting? We also see an additional stage in “Explaining his decision at a news conference last month, the veteran politician said the contract and loan terms behind the deals were unfair, noting that the interest rates on China’s loans were much higher than the 3 percent figure at which the government normally borrowed, the Associate Press reported“, is this all about the money, or merely a way to set the stage for re-negotiation. In that setting, the sound strategy becomes that Elliott Broidy was setting the stage for the United States to poach the finance deals away from China and in that setting, getting Jho Low to give the goods would help the US pretty decent. In addition, when we look at the education of Jho Low, we see that he is an alumni of the Wharton School of the University of Pennsylvania, the same school that has President Trump, as well as the bulk of CEO’s that at one stage were the captains of the Fortune 500 lists, it includes dozens of airline CEO’s, so in that setting the Malaysian government goes looking for a $35 million plane?

So what is exactly the danger?

It is not on merely the setting of Elliott Broidy in all this, it is the setting where we all need to realise that there is a cost to doing business and it has transgressed borders for the longest of times that, whilst we accepted that in Europe to some degree, Americans never accepted or comprehended that. The media players used that part in all kinds of election setting and fear mongering for the longest of times. From my point of view (optionally a wrong one), we see how people like John Brennan is a danger to that setting. People dedicated to the protection of that their nation will not accept the global cost of doing business; they are in line with monarchists and devoted workers to their nations like we see in the Netherlands, the United Kingdom, Sweden, Denmark, as well as Canada. In republics, republicans are in a setting that this time is gone; it is the age of the corporate setting of common sense towards pragmatism. The problem as I see it is that those of no use to the needs of such a republic lose value overnight, that whilst the monarchist setting is to embrace all the citizens and protect them all. It is done at a cost, one that those people tend to accept. Yet in the republican view, these costs are counterproductive to corporate profit, the non-consumers are a cancer, needed to be cut out. When globalisation sets in to the business degree that will be a lot easier and that is where we see the stage. So when we see “In the 48 hours since President Trump revoked the security clearance of former CIA director John Brennan, over 70 former intelligence officers and leaders have come forward denouncing the president’s decision to revoke or threaten to take away security clearances from former government officials, including a list of 60 former CIA officers who signed a statement today, obtained by Axios“, we also see that America (or is that Wall Street) are confronted with a change no one was ready for, so the economy becomes a stagnant danger to them, one where they do not make profit.

When we see names like:

  • Jeremy Bash, former CIA and DoD chief of staff
  • Bob Flores, former CIA chief technology officer
  • Kent Harrington, former national intelligence officer for East Asia and CIA director of public affairs
  • George Little, former chief spokesman, CIA and DoD
  • Phillip Mudd, former CIA analyst
  • John Nixon, former CIA analyst
  • Greg Vogel, former CIA deputy director for operations

We see that the USA is in an upcoming setting of polarisation and that is just within the republican side of government and its administration. There is a change coming and the outcome is hoped for (on both sides) but the outcry gives us that this is a round that Wall Street is likely to lose this battle and that changes the game. In addition, when we see the required application of intelligence data and who gets access to it sets a new border, the fact that others (like France and UK) need to realise that shared intelligence data is no longer safe, because the data shared within corporations while used to set a very different stage of what is regarded as needed for security. The corporate side is already countering the advantage that a national intelligence system has. We see this in part when we look at Business Wire (at https://www.businesswire.com/news/home/20180806005526/en/Global-Database-Valuable-Italian-Business-Intelligence-Data), where we see ‘Global Database Makes Valuable Italian Business Intelligence Data Available – Completely Free‘, before you dismiss this, also consider that “Any registered user can now access key information about 7,564.575 registered companies in Italy“, registration is free and that is merely one of close to a dozen places where this is happening. All connected, it is an optional setting of open source intelligence that is merely a foundation pillar. You merely have to add LinkedIn and Facebook to have a dataset that will allow you to extrapolate data that will make plenty of intelligence groups envious. You see, this is not about finding the criminal, or the terrorist. They are either known or not an issue. This is the setting of finding economic opportunities, the setting to see who is connected and interacting with the alumni of places like the Wharton School of the University of Pennsylvania. A group of people with connection and access to funds totaling well over 157 trillion Euro, so whilst we wonder on the fear of where is the terrorist (whilst the danger of getting run over in the street is 20 times more likely, we forgot that our futures, any future is set in the stage where there is economic viability and availability.

That is the part that we see to forget, or even worse actively avoid contemplating. In the time when we are led to believe that there is economic upturn everywhere, we seem to forget that as the river of economy changes, we will either be in a place of plenty, or we are set into the next stage of drought and it will be the one view we have until the end of our lives. It is about ability to live with a level of expected comfort which is likely no longer set to national boundaries, it will be set to the boundary of the corporation or business group that we work for and facilitate for, it will be as cold as that, and until we get past this greying generation, which is optional until 2035, that is how it will be for those in this era. The man behind the Global Database, namely Nicolae Buldumac has figured parts of that out, so that is why he and 30 others in London are doing this. When we look at the article (at https://medium.com/@buldumak/cookie-audience-vs-data-audience-which-is-better-44971ad12ee4), we also see ‘Cookie Audience Vs Data Audience: Which is Better?‘, he found a way to not create the best of both worlds, he found out how he can make both work for him and that is where he created more than economic opportunity. He has found the stage where he can optionally get the facilitators work for him and that seems to be exactly what he is doing. When he is done he will have a similar setting for France, Germany, the UK and Spain. So basically the 5 largest European economies are opportunities where he has the keys and data to.

So when we get to look at the US again, do you think that this will be about Elliott Broidy or people like him in an outdated setting? No, they are the garnishing of economic times that surpassed them and it is the data makers and facilitators like Nicolae Buldumac where the republican mindset of corporations will rely on next, they are the future and their path for enablement is what sets the stage for Europe. This is not clever technology (well in a way it is), it is about the quality of data and what it allows for and that is where we see that the moment that data hits a critical point, it will equal the value of Facebook or more. Some will argue that most of that is all in any Chamber of Commerce and they would be right, but those entities do not talk to each other, they are founded on borders of a national level or lower and in the entire euro setting they for the most never aligned, so someone did it for them and on their own dime, optionally replacing them, or better stated, reducing those previous players to mere data entry points. Governments had to realign their data dimensionality a decade ago, but everyone was so busy keeping their own pond clean that they forgot that the pond is only important to the land surrounding it, when that floods, the ponds become merely crevices of a lake, Lake Europa, that is where Nicolae Buldumac it taking them, so soon others (like Asia and America) they will look at the parts of Lake Europa and see where fishing is the best, those land borders no longer matter and that is the stage we find ourselves in. A changing setting of what sets the identity.

Am I the first?

Hell no! This was all done before. Forbes in 2013 gave us an article by George Bradt. The article called ‘How Army Intelligence Techniques Apply to Business Leads‘. Here we see “Marketing may have a bias to giving sales people a large number of leads, while sales people seek potential customers they can engage with. The answer is to move from big, unstructured data sets to “finding that guy” that really cares. This was Mishor’s ah-ha moment, realizing that army intelligence techniques could be applied to business“, yet it goes further, when you consider one, and the other, you should also realise that the parameters are bidirectional with the proper data flags. So when we see the two streams lead to the same insight. “On the one hand, Mishor is creating value with a systemic, scalable way to connect seemingly unconnected data to identify the most valuable target customers. On the other hand, Mishor built his business by connecting seemingly unconnected hopes and needs of his prospects” we see the solution at both ends, and in addition we see that we can define the need much more precise. From my point of view we can see a third direction. That part is not easily seen, so I will give an alternative example.

In factor analyses we go from many to one. We get the setting that the numbers equate to a factor, it is basic statistics. When we go into the other direction we see the foundation of a discriminant analyses. The third part is seen in that the data setting when something is proven in a factor analyses, it should almost always fail as a discriminant analyses and vice versa. I tend to use humour on that and state ‘It is sarcasm, when it backfires it is merely irony‘. The intelligence data was always on finding the person, yet in a stage of lacking resources, being able to safely remove a person as a threat is equally valuable. If you cannot find that one person, reducing the 5,000,000 stack to a mere 5,000 with 99% certainty is just as valuable, because the one final link could reduce that to 50 whilst not having to revisit the previous 4,995,000 considerations. As I see it in this day and age, not only is the stage of military intelligence and business intelligence not mutually exclusive, they are more and more overlapping. The overlapping field becomes an insightful pool of data where it will no longer be about the one person, it will be more and more about a setting where the value of Analysis of covariance will be important.

In the intelligence it could be seen that it is not merely about the terrorist and its connections. It will be about the moneyman and who else links, both optionally to the mastermind. In business intelligence that setting is not merely see as to where a person studied. It is more and more important on where the patents are and who has them as well as the people creating those patents. In this economy the economic value of a patent over overwhelmingly important. That part is seen when we get back to the 5G race, we saw that last march when we were confronted with “U.S. President Donald Trump has blocked microchip maker Broadcom Ltd’s (AVGO.O) $117 billion takeover of rival Qualcomm (QCOM.O) amid concerns that it would give China the upper hand in the next generation of mobile communications, or 5G“, in addition Forbes gives us within the article ‘Ericsson Vs Huawei: Who’s Winning The 5G Race?‘ Yet there we see two parts. The first is “However, two of particularly significant scale and market presence are Ericsson and Huawei. Will one conquer overall?“, as well as “Financial strength matters. Ericsson will have to turn the ship towards profitability and growth waters, in order to continue the required investment in product development”, which relies on “Ericsson recently announced what seems on the surface to be an impressive 5G patent application. Calling it an “end-to-end” submission, the filing combines the work of 130 Ericsson inventors and promises to include everything needed to build a complete 5G network“, the ability to set 600 million will give the optional 60 billion in return and it will in addition set the stage for European growth to a recently unprecedented (or was that non-presidential?) scale and America wants slices of that pie, if not the whole pie. The stage of corporate setting versus national setting in direct exposure of what is to come and the 5G battle theatre will be a big one, because the winners there will be the next kingmakers and everyone will want parts of it; that was never in doubt. The evidence is all over the place.

Forbes also gives us the new danger setting with the question ‘Does a global geographic footprint matter?‘ It is close to everything in this game, if only that the global footprint lets corporations walk all over government. Amazon, Apple, IBM and Microsoft have been doing that for the longest of times.

There is one part with Forbes that I do not agree with. They state “I would give Ericsson the edge here, considering its global presence includes North America“, I believe that Europe is the much larger powerhouse. You see, America is a mere 325 million, whilst the EU represents 512 million with direct access to India, China and Russia. All stages that America denied itself; if the setting of data (amounts and quality) determines their value; which players and where would they be able to grow this path the fastest and longer? The fact that Ericsson is not merely in the US, but they are showboating in Saudi Arabia is also a sign that they realise that stronger growth everywhere matters, the presented quote “Saudi telecom operator Mobily and Ericsson held a 5G demo at the Mall of Arabia in Jeddah, Saudi Arabia, showcasing the functionalities of the next-generation mobile technology. Ericsson supplied Mobily with a standalone 5G system, including a prototype 3.5GHz radio, baseband, and prototype UE device for the 5G demo, which showcased 5G throughput, targeting speeds of up to 1Gbps. The demo is part of Mobily’s plan to highlight expected 5G benefits consumers and industries across Saudi Arabia“, is merely one of many.

The question now becomes: ‘is exponential growth, growing too fast in all directions not a danger all on itself?’

 

Advertisements

Leave a comment

Filed under Finance, IT, Law, Military, Politics, Science

When inability drives fear

It is a dangerous place to be in. We all have been there and in most cases it is as innocent as it could ever be. You see, sometimes life throws you a curveball. Gamers tend to identify it most easily. In my particular case it was a game called Magic Carpet. It was a Bullfrog game and I was testing it on the PC. It played magnificently there, and soon thereafter I also tested it on the very first PlayStation. There, because of the controller it was good, but not great. Still, it was fun to play and I tended (in those early years) to really get into a game, so when the situation blew into my face, I got a little frustrated. The next two times were worse and the last time (on that day) I went slightly angry (with myself) and I kicked the door. The issue was not the door, it was my steel tipped boot and I went straight through the door, so, I was not merely ticked off, I had a hole in the door (which would require funds to repair) and the boss in Magic Carpet was still alive. We all have had these moments. Our car, our bike, the TV, things go wobbly on you and we sometimes react wrongly to this situation and in light of that get to reflect on our own ego’s a little.

These are the images going through me when I was confronted to new information when looking at the unrealistic response by America (and Australia) to Huawei. In the case of Australia it seemed the mere application of greed and fear as politicians cater to the greed of a large telecom company, which was not seemingly the case with America. Yet that tip was raised for me less than 24 hours ago. The article (at https://foreignpolicy.com/2018/08/15/botched-cia-communications-system-helped-blow-cover-chinese-agents-intelligence/), shows how the CIA got their own systems handed to them through ego and what I would regard as stupidity. The initial headline ‘The number of informants executed in the debacle is higher than initially thought‘ is rather unsettling. It gets to be worse with “The CIA had imported the system from its Middle East operations, where the online environment was considerably less hazardous, and apparently underestimated China’s ability to penetrate it. “The attitude was that we’ve got this, we’re untouchable,” said one of the officials who, like the others, declined to be named discussing sensitive information. The former official described the attitude of those in the agency who worked on China at the time as “invincible.” Other factors played a role as well, including China’s alleged recruitment of former CIA officer Jerry Chun Shing Lee around the same time.” This is the most dangerous of settings. The wrongful setting comes straight from Sun Tsu where we learn that all war is based on deception. China is not some place that is tinkering at the side of the road, the Art of War COMES FROM CHINA! It gets to be worse when you consider that that book was written long before Americans had adopted proper reading and writing skills, close to 1200 years before that, so that was their first error.

When we see: “But the penetration of the communication system seems to account for the speed and accuracy with which Chinese authorities moved against the CIA’s China-based assets. “You could tell the Chinese weren’t guessing. The Ministry of State Security [which handles both foreign intelligence and domestic security] were always pulling in the right people,” one of the officials said. “When things started going bad, they went bad fast.”“. The entire matter seems to be exponentially wrong. The big issue is not on how it was cracked, or even if it was cracked. My issue had been (for a much longer time now) that for too long, the deciding voices, all listening to some CTO, often with multiple sides lacking wisdom that the setting was not merely that there was ‘a security risk’, there was for the longer time a much larger security flaw. For much too long a time, we got the ‘slides of wisdom’ on how data in transit tends to be safe and data at rest tended to be in danger. Even when I started my CCNA, the amount of knowledge given in the Cisco books gave the rise to the consideration that data in transit is not merely as vulnerable, it was that a lot more could be done unnoticed (not merely by the Chinese mind you). It was some time before the Sony hack that I expected a setting where the routers themselves might be used against the owner, it went further when we consider Wired in 2013 (at https://www.wired.com/2013/09/nsa-router-hacking/). The headline is not merely ‘NSA laughs at pc’s, prefers hacking routers and switches‘. It is the setting where we see: ““No one updates their routers,” he says. “If you think people are bad about patching Windows and Linux (which they are) then they are … horrible about updating their networking gear because it is too critical, and usually they don’t have redundancy to be able to do it properly.” He also notes that routers don’t have security software that can help detect a breach“. This is where I was in 2011, when I started to comprehend the working of a router and router tables, I figured out that it is not the router they can see that is the problem; it is the one they cannot see. That idea came from a presentation by Thomas Akin, CISSP, Director, Southeast Cybercrime Institute who had a presentation for the Blackhat briefings. The 2002 presentation gave me the idea. You see apart from the lack of security, the +1 hop hack allows form something truly unique. Consider [.MIL Server], that server connects to <secure router 1> and things are set into motion. Now, we cannot direct all the traffic, yet materials from that location to let’s say ‘preferred consultant one‘ will go via certain paths, yet the first router after <secure router 1> tends to be merely one or two routers (depending on traffic) to that preferred consultant. It is easy to find a router that could optionally be a link to these routers and duplicate all packages that go to that specific next step. Not only is the task easily done, the path is not hindered, the router is not intervened with and a simple reset takes away whatever evidence existed in the first place. In addition, the additional part is that the compact flash in those routers is ‘The maximum storage capacity for the CF in Slot0 and Slot1 is 4GB‘, yet the only part here is that you only needed 32 MB, which is what most of us used then, but cards that small are no longer made, so most IT people just plug in what they have. You have well over 3GB of package storage, so all packages to that one location could be stored and redirected on the ‘off’ hours as not to leave any monitored spike. Until the CFlash card is ejected from the router and investigated no one will have a clue. That was 7 years ago and the systems are even more capable now, a 3GB glitch will not register on most systems, especially when those IT people do not block Spotify and/or YouTube. By the time they figured it out, the setting is already wiped, and this path can be adjusted on a daily bases so that most IT networkers never had a clue in the first place.

You think that I am alone in this, that I am this clever? No, I am not! There are plenty of IT Networkers running circles around me and that is now set into the stage of ‘we’re untouchable‘. The CIA was never that, they never needed to be touched, the opponent merely needed a clear line of sight to the router that is one skip from the secure router that they needed to get to. We see more in the Foreign Policy article with the quotes “Information about sources is so highly compartmentalized that Lee would not have known their identities. That fact and others reinforced the theory that China had managed to eavesdrop on the communications between agents and their CIA handlers” and “an encrypted digital program, allows for remote communication between an intelligence officer and a source, but it is also separated from the main communications system used with vetted sources, reducing the risk if an asset goes bad“. Now we merely add “But the CIA’s interim system contained a technical error: It connected back architecturally to the CIA’s main covert communications platform. When the compromise was suspected, the FBI and NSA both ran “penetration tests” to determine the security of the interim system. They found that cyber experts with access to the interim system could also access the broader covert communications system the agency was using to interact with its vetted sources, according to the former officials“. I believe it goes further than that. If we see the entire layer process and consider that in the end, certain systems merely replicate a process. Cisco (at https://www.cisco.com/c/en/us/support/docs/lan-switching/8021q/17056-741-4.html) gives us: “A device can determine which VLAN the traffic belongs to by its VLAN identifier. The VLAN identifier is a tag that is encapsulated with the data. ISL and 802.1Q are two types of encapsulation that are used to carry data from multiple VLANs over trunk links”, as well as “The DA field of the ISL packet is a 40-bit destination address. This address is a multicast address and is set at “0x01-00-0C-00-00” or “0x03-00-0c-00-00”. The first 40 bits of the DA field signal the receiver that the packet is in ISL format“, so as the destination was known, the people needing this could search very specifically. When we consider ‘It connected back architecturally to the CIA’s main covert communications platform‘, the connection back would enable those seeking to find the needed value of the DA field. That does not merely impede the CIA, it stands to reason that to some degree the NSA would be just as vulnerable.

The main course

In my case, I tend to go for the Bambi burger, ideally I watch Bambi whilst having that lovely slice of venison. You see when we get to “As part of China’s Great Firewall, internet traffic there is watched closely, and unusual patterns are flagged. Even in 2010, online anonymity of any kind was proving increasingly difficult. Once Chinese intelligence obtained access to the interim communications system,­ penetrating the main system would have been relatively straightforward, according to the former intelligence officials. The window between the two systems may have only been open for a few months before the gap was closed, but the Chinese broke in during this period of vulnerability“, I believe the setting is worse than that. These players still require their consultants. It does not matter whether you call them construction workers, members of Blackwater, Xe Services, or Academi. It is those places as well as Booz Allan Hamilton and other providers that still require to be informed, and that is where the interception could start. The setting is not ‘the Chinese broke in during this period of vulnerability‘, it is the long term flags that they were able to test at this point and that is the fear we see with their setting of Huawei and partners. Not that Huawei is the danger, but the fact that Chinese intelligence is just as able to get into nearly all systems, it merely can get into Chinese systems faster (for now). This is where it gets a little more complicated, because it is not about the now, it is about tomorrow and the tomorrows that are coming. The only ones who have a chance of getting things done are players like the Constellis Group and Palantir when they unite abilities. It is going to be about data and about the ability to forecast how traffic goes. Thomas Akin was teaching this wisdom 16 years ago. We see this when we are made to realise

  • Live system data is the most valuable.
  • Immediate shutdown destroys all of this data.
  • Investigators must recover live data for analysis.

And the loss is merely a reset away, in most cases if there is an automatic reset; the only data available is the last transgression at best. With the coming of 5G live real-time capturing data streams is what is more likely to set the stage of finding out what happened, in this the entire setting of ‘China’s Great Firewall‘, we are already looking at outdated Chinese technology and I do believe that those behind the article, as well as some DARPA people are aware of that. America and Europe are behind in ways that we cannot even perceive, because the players that need to move forward are doing so iteratively, that whilst the time of reengineering is now merely 10% of what the development time was. We see this with “Call this the IBM problem, which faced an existential threat as soon as Asian groups started churning out cheap PCs in the 1990s. But here IBM also provides a few tips to the future, with its pivot to software and solutions. By the time of IBM’s iconic “solutions for a small planet” ad campaign in 1996, the company was trumpeting voice recognition and ecommerce — producing the sort of digital enterprise backbone that ended up helping develop the internet economy” (source: Australian Financial Review). In the first instance the Asian market required 10-15 years to catch up, the second time around it took 2-3 years and now with Google and Apple working globally, it takes months. IBM (others too) took iterative steps to maximise the economic footprint, instead of truly leaping forward whenever possible, they lost the advantage and are now trailing the markets. Huawei is one clear example where the American market was surpassed. Samsung showed its supremacy by having 5G home routers ahead of everyone else and the advantage in Asia is only growing. It is seen with “Alternatively, authorities might have identified the system through a pattern analysis of suspicious online activities. China was so determined to crack the system that it had set up a special task force composed of members of the Ministry of State Security and the Chinese military’s signals directorate (roughly equivalent to the NSA), one former official said“. I do not read this part in the same way. I believe that with ‘set up a special task force composed of members of the Ministry of State Security‘, was not about cracking. I personally believe that the Cisco books were so illuminating that they decided to change the setting in their own game. I believe that the Chinese now have a more advanced system. They have done what players like Cisco should have done before 2014 and they did not. I believe that when we see a partnership between Constellis and Palantir, their findings will bear that out with in addition an optional link that shows part of the accusation that China let Russia in on certain findings (and the Russian evolution of certain networking devices). This and the next part is largely speculative, but it is supported to some extent. We see this in: “Once one person was identified as a CIA asset, Chinese intelligence could then track the agent’s meetings with handlers and unravel the entire network. (Some CIA assets whose identities became known to the Ministry of State Security were not active users of the communications system, the sources said.)“. I believe that he part given in ‘not active users of the communications system‘ gives us the third part. I believe that the system was not merely invaded. There is every chance that certain systems when activated also leave tags behind and that is where the intrusion would have paid off. You see, in the Cisco setting (as an example), the data frame has an optional 60 bytes of extension headers, yet is that always empty? More important, when were these data packages truly thoroughly checked? In this speculative setting I take you to the movie Die Hard 2. In that movie we see on how someone decided to get clever and uses the outer marker beacon to warn the planes that were in danger. The beacon can be used in other ways than merely give a beep. I believe that Cisco data packages have other optional parts than can be ‘reused’ to do something different, like the optional headers. They are to most merely empty pre-set ‘spaces’, but they could have more. That is the setting that America faces and the fact that they could get overwhelmed by Chinese intelligence because they did not rely on iterative parts. Huawei had been leaping forward, for example now offering a 128GB Android 8.1 phone (the Huawei nova 3i 128GB Handset), for 50% less than its competitors. A system that is just as advanced as anything Apple and Samsung offer; at merely half the price whilst Chinese Intelligence has been digging into that device for months, unlike the NSA that needs to queue up with all the other users to get to look at the Pixel 3 and the iPhone 8 on launch day. That is the setting we seem to be seeing and America is indeed and rightfully worried, not because Huawei has backdoors (which I never really believed) but because the players here had been held backwards through iterative technology. Apple is actually staged by Forbes that way with the quote ‘a minor point update for the iOS 11.1 iteration‘, even Forbes speaks about iterative changes. That is the setting that they are up against and they have been surpassed for years and with Huawei leading the 5G stage on a global setting the US authorities are merely getting more and more afraid that not only are they no longer the leading players, they are now sidelined by not being able to keep up with what will be presented ‘tomorrow’.

That part can be supported through the CIA with analyses reports (at https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol49no3/html_files/Collection_Analysis_Iraq_5.htm), in here we see that Richard Kerr, Thomas Wolfe, Rebecca Donegan, and Aris Pappas give us (in a different context): “The analysis on this issue by the Intelligence Community clearly was wide of the mark. That analysis relied heavily on old information acquired largely before late 1998 and was strongly influenced by untested, long-held assumptions. Moreover, the analytic judgments rested almost solely on technical analysis, which has a natural tendency to put bits and pieces together as evidence of coherent programs and to equate programs to capabilities. As a result the analysis, although understandable and explainable, arrived at conclusions that were seriously flawed, misleading, and even wrong“. It is important to realise that this was on the WMD setting, so in a different context and on a different setting. Yet the information systems were all designed to upholster that flaw to an ‘evolved’ placement, the systems in their entirety are nowhere near ready, now even for the previous setting. The movement from a lot of staff to more fruitful consultant settings is now paying off in a negative way for the CIA (and the NSA too). This is where it gets interesting. You see, the previous setting that I gave should partially have been dealt with through the flashlight program that DARPA has. Raytheon BBN is working on that with Professor Richard Guidorizzi from George Mason University Fairfax. I think that the system is not entirely ready here, not if the packages can be duplicated via the router and as long as the original is not touched, that system will not get the alert lights ringing.

To get you on board on how far all the NATO partners are behind, let me give you two settings. The first is a DARPA Project called ‘Probabilistic Programming for Advancing Machine Learning (PPAML)‘, the man in charge is Dr. Suresh Jagannathan, yet the bigger brain might be MIT graduate Dr. Jennifer Roberts. The given setting is “Probabilistic programming is a new programming paradigm for managing uncertain information. Using probabilistic programming languages, PPAML seeks to greatly increase the number of people who can successfully build machine learning applications and make machine learning experts radically more effective“, whilst we also see the goods in the DARPA article by Dr Roberts with “If successful, PPAML could help revolutionize machine learning capabilities in fields from Intelligence, Surveillance and Reconnaissance (ISR) and Natural Language Processing (NLP) to predictive analytics and cybersecurity“, this is certainly leaping forward, but it is still based on a system. I believe that the Chinese decided to turn the funnel upside down. To illustrate this I need to get you to an app called Inke. The article (at https://thenextweb.com/contributors/2018/02/09/hidden-world-chinese-livestreaming-app-inke/), gives us ‘The hidden world of Chinese livestreaming app Inke‘, this is not a few people; this is a craze that has already infected millions upon millions. So with “he was actually doing a livestream, an extremely popular hobby for young people in China. China is way ahead of the rest of the world when it comes to embracing livestreams.” you are missing out and missing out by a lot. These streams are real-time and often geo-tagged. I believe that the Chinese have changed the setting, they are optionally collecting Terabytes of daily data and they are converting that to actionable intelligence. Facial recognitions in phones, geo-tagged and all uploaded and streamed, all converted on the spot, like the SETI screensaver, millions of affordable mobiles (this is where the Huawei nova 3i 128GB Handset and all other new handsets come in), parsing all that data into uploaded files and Chinese intelligence gets global information close to real time, whilst their learning machines are about efficiencies of collected data, it is not about the better application by making them more effective, it is about the massive amounts of data offered to get the systems to upgrade the efficiency of parsing data, because parsing data is where the bottleneck will be in 5G and they already have a larger advantage.

In the meantime, on any given day thousands of Inke users are filming life around them in malls and famous places looking awesome doing it. Yet, if you look at the CCTV settings, how many users would have passed 935 Pennsylvania Avenue, Washington DC, or at London SE1 9EL, UK walking towards London Bridge? How many people were merely assuming that they were tourists face timing with mom and dad? Are you getting that picture now? and also realise that Inke is merely one of more than 300 live streaming companies, all capturing that data all those tags that a smartphone allows it to capture and at the top of all this, Facebook and YouTube are eagerly pushing people to gain following by doing just that. So how long until the user realises that uploading the same stream to 2-3 providers gets them to gain a lot more following and optionally cash? Yes, the intelligence community is that far behind at present. So when we are worrying on “The system was not designed to withstand the scrutiny of a place like China, where the CIA faced a highly sophisticated intelligence service and a completely different online environment“, we need to consider that China is already ahead of the game and the CIA systems might be merely an option to scrutinise their own data, because that remains the Chinese bottleneck, the data will require verification and that is the one field where their opposition could gain the advantage if they set their minds to a different algorithm, one on reliability, not on likelihood. It is a setting where all the players involved have a second tier of consideration. They embrace a ‘not now, but soon‘ thought, when ‘I needed this yesterday‘ is the proper setting as I personally see it, because data without proper vetting is merely used space on any given storage device.

That final part can be considered when we look at the linked article that NBC had from last January. There we see: “When agents searched Lee’s hotel rooms in 2012, they found notebooks with the names of covert CIA sources, according to court documents. But not all of the agent arrests and deaths could be linked to information possessed by Lee, who left the CIA in 2007“, an issue I mentioned in an earlier blog. We get there when we consider his actions and ‘found notebooks with the names of covert CIA sources‘, do you think that anyone, especially in this setting would be that stupid? It’s like keeping the condom as a trophy after having intercourse, its useless and stupid. I believe that either it is not the ‘covcom’ system, or not merely the ‘covcom’ system. I believe that (if it is all correct) that Chinese intelligence got in further and deeper into acquiring the data required and the notebook is the proverbial red herring in all this, especially as Jerry Chun Shing Lee left the CIA in 2007. You do not hold on to that level of information 11 years after you might have had some level of valid reasons to have it in the first place. That is the part many overlooked, or looked away from.

In the end, I do believe that it is not merely the inability that drove the anti-Huawei waves, it is the fact that those decision makers have no idea where to navigate towards next is what drives their fears almost exponentially.

 

Leave a comment

Filed under IT, Military, Politics, Science

Rocking the bullshit

There has been a massive issue with Huawei, the accusations by the US is the largest one, one of its sheep (aka Australia) has been on the same post on how Huawei is such a large danger to the safety and security of a nation. It gets ‘worse’ when we see ‘The DNC tells Democrats not to buy Huawei or ZTE devices ever’, (at https://www.theverge.com/2018/8/3/17649920/dnc-democrats-huawei-zte-devices-ban-china-hacking-threat). Here we see the quote “people shouldn’t be using devices from either Chinese company for work or personal use. The words echo what federal officials have already said about Huawei and ZTE posing possible security threats to the US. In February, CIA, NSA, and FBI chiefs testified in front of a Senate committee that the two companies were beholden to the Chinese government and the devices could become tools for undetected espionage“, my issue has always been: ‘show me the evidence!’ Basically EVERY phone can be used as a spying device, that is one clear thing we got out of the Cambridge Analytica part, in addition, the Fitness tracking app Strava was a great way to find CIA black ops bases, so even as Strava merely mapped ‘a regular jogging route’, using Google or Apple maps, you would be able to map out the base, the supply routes and so on, the Apple Fitbit would be there for the Russian government knowing where these specialists were and when the were there. So in all that, and all the security transgressions seen here, not of the were Huawei or ZTE, yet, how much noise have you heard from the CIA, NSA, or FBI on Apple? Even now, they are that one Trillion dollar company, are they too big to mention?

I wonder why?

Yet, Huawei is not out of the hot water yet, they are actually in deeper hot waters now but this time it is allegedly by their own actions. Reuters is giving u mere hours ago: ‘Huawei in British spotlight over use of U.S. firm’s software’, the news (at https://www.reuters.com/article/huawei-security-britain-usa/huawei-in-british-spotlight-over-use-of-us-firms-software-idUSL5N1US343) gives us: “One of those is due to Huawei’s use of the VxWorks operating system, which is made by California-based Wind River Systems, said three people with knowledge of the matter, all of whom spoke on condition of anonymity when discussing details which were not made public in the report“, which now leads me to the setting that the American accusations are set on the premise of American Software used? How dopey is that?

Then we get: “the version of VxWorks being used by Huawei will stop receiving security patches and updates from Wind River in 2020, even though some of the products it is embedded in will still be in service“. In all this, the fact that it is still serviced for another 2 years, how are we now in the stage of: “potentially leaving British telecoms networks vulnerable to attack“? Is that not equally a questioning setting? Do we not have enough issues out there with Microsoft which has been nearly forever a security concerns, at this point, 2 years early we get the security warning on Huawei, yet not on Microsoft or Apple for that matter, in all this Google is equally a place of patches, and in all this, Huawei is the one getting unbalanced and unfairly burned at the stake like a Catholic at an Elisabeth I barbecue gathering.

Yet the good stuff is “All three sources said there was no indication that the VxWorks mismatch was deliberate. There is also no suggestion that the software itself represents a security risk“, this now leads us to two parts. The first is if it is true that ‘no suggestion that the software itself represents a security risk‘, does this mean that Huawei never had a security risk and if that is incorrect, why not present that evidence so that every Huawei Owner can test for this transgressions ending whatever future Huawei had in the first place.

In the second part, if there is no proven security flaw in the Huawei on hardware, is the security flaw a software one, or better stated an American software one, and if so, why are these people only going after Huawei and not after a dozen American firms?

The one part that we see in Channel News Asia is “Consultant Edward Amoroso, a former chief security officer at AT&T, said Huawei’s experience in Britain showed the challenges of securing international supply chains. Although no one should dismiss Huawei as a supplier solely because of its geographical location, reliance on software that is going out of support is a legitimate concern, Amoroso said“, the news (at https://www.channelnewsasia.com/news/business/huawei-in-british-spotlight-over-use-of-us-firm-s-software-10590268) gives the part that does matter, in this Edward Amoroso is right, software at the end of its reign is often the true safety concern, not merely because of the time frame, but in extent the time required to properly update the software on all the devices, which is not always a smooth path and tends to open up additional security gaps. In that part of the equation Huawei does have a legitimate problem to address. The second part to all that is “In addition to the issue with VxWorks, this year’s report also cited technical issues which limited security researchers’ ability to check internal product code“, I believe it to be a minor part and the proper investigators could seek or test for the issues, not merely that, the limitations also remove whatever options there are for zero day breaches, which has a much larger legal frame to address. So even as we agree that the US setting of accusation without evidence (proper presented evidence is merely the stuff that makes the grass grow in Texas). We also get that the US is giving us: “In the United States, the Pentagon is working on a “do not buy” list to block vendors who use software code originating from Russia and China“, there is an actual thing called national security and as such, it is their right to implement that part, I do believe that in the end it might be somewhat counterproductive, but it is still within their rights to be in such a setting nor no other reasons.

In the end there are a few issues in the field and some are out there, but with a lack of technical details, some cannot be proven, yet the fact of what some have done in the past might give the setting of ‘is it more likely than not that some do not really have 5G‘ is a true setting, yet I prefer to have the actual evidence, that some are trying to keep buried, and the media is part of that chase, which is odd to say the least. Huawei is bouncing back and forth and their hold to grow fast via the UK will be there, but from my point of view, they will need to fix the VxWorks part a lot faster than they think they need. From my estimation a new software solution should be well beyond the Beta stage in Q1 2019 if they want to have any chance of keeping their lucrative growth contracts in place. In equal measure we need to look at Canada and Australia, as they are currently set to be nothing more than US tools in all this. In all respects no actual and factual evidence was thrown out in the open. If that was done Huawei would have lost pretty much every non-Chinese contract, the fact that the BS is spread even larger with absence of evidence gives more reliability that there is no real security danger and it is more a tool for some to get the slice of 5G pie, probably at the expense of a monthly data dump, nicely mailed via UPS to: N 11600 W, Saratoga Springs, UT 84045, USA. That alone should give us the goods on who to trust and who to be cautious of. In all this, no evidence has been presented to the public (and their right to know) on how Huawei is a threat to our security. The fact that I believe that this is all bogus in one thing, the issues seems to be blown up as everyone takes a queue from John Bolton, that whilst the setting “Five Eyes is an alliance between Canada, New Zealand, the United States, Australia, and the United Kingdom that facilitates collaboration in intelligence activities” gives us that there are three in the dark, the UK might be around with the knowledge and the rest merely takes a queue form the US, which has seemingly been whispering like they did in the WMD in Iraq phase, you do remember that in the end, they were never found and it was merely bad intel. So in that setting whilst Corporate America, Canada and Australia are all in fear of their gap against leading Huawei, in that setting we are supposed to have faith on the American gospel on what constitutes a danger from Huawei? And now that we are made aware that the software solution used is an American one?

Yup, we have all kinds of problems and some are valid issues of concern as Edward Amoroso phrases it. Yet between a setting of concern and an actual concern is a mile long gap and whilst we acknowledge that Huawei has some fixing to do, until actual evidence is shown that there is a security breach, the only thing that the US can do is to offer a $229 instant price match for the Apple, or an $100 instant price match for the Google Pixel 2, or a $400 instant price match for the Samsung 9, why would anyone in this day and age pay more for the same, actually, with the enhanced batteries of Huawei you will still miss out, but that might be the smallest cross to bear. All this because some players just didn’t get the pricing right, too many fingers on the margin pie, that alone seems to unbalance the entire equation, because all these players will miss out when Huawei is given free reign there. In this the equation is no longer about security, it will be merely about greed and those enabling for it. Is that not equally important an element to consider?

I’ll be honest, I am still happy with my Huawei P7, it was really affordable against anyone offering anything and after 3 years working 24:7, where would you think I would look first? The one who had proven himself, or the one overpricing its brand (OK, with the Pixel at a mere $100 more, that is still an awesome deal).

When we decide on pricing it is one, when unreliable players in the game force us away from the affordable option it becomes a different stage and so far, the US has proven to lose reliability again and again when it comes to their version of security. To emphasize on that, check on all the printing regarding the Landmines in Yemen placed by the Houthi and the amount of articles that we see in the NY Times, the LA Times and the Washington Post. Now consider the impact of mines and why Americans seem to be eager not to inform you. By the way, that setting was almost certain a setting that Iran enabled, if you questions that (which is fair) then answer the simple question, where did the Houthi forces get 1,000,000 mines from?

We are kept in the dark on the wrong topics and it is time to set the limelight on those people keeping us knowingly in the dark.

 

Leave a comment

Filed under Finance, IT, Law, Media, Politics, Science

Seeking security whilst growing anarchy

We all want national security; it does not matter whether you are American, Australian, British, Dutch, French, German or Swedish. National security is a matter that is not just set in laws; it is set in morality, in justice and in perception. Most of us are set in a stage where we are willing to give out many perks so that national security can be maintained. Many liberals grasp back at Benjamin Franklin who once said: “Those who would give up essential Liberty, to purchase a little temporary Safety, deserve neither Liberty nor Safety“, I would have agreed when he allegedly wrote it in 1755. In those days the biggest fear they had was England, the Dutch trade wars (the VOC) and apparently the French to the north. It was a very different age, in a setting where a naval was not done in minutes, but hours, battle settings took a while and there was clarity on who the enemy actually was (usually the one speaking your language and not firing on you, wearing the same uniform was also a nice indicator).

In this day and age it is not given, nowadays all the wolves have onesies looking like Shaun the sheep and often we cannot tell them apart. This is the setting where oversight, surveillance, data gathering and analyses can help, in equal setting there are a few players that still cannot get their algorithms correct and they are making the same mistake that I caught a few players on in the late 80’s.

There is however a new setting, a line that has been crossed and the Washington Post gives us that setting (at https://www.washingtonpost.com/world/national-security/there-have-to-be-limits-lawyers-for-guantanamo-inmates-challenge-lifetime-imprisonment-without-charge/2018/07/11/f3933faa-8533-11e8-9e80-403a221946a7_story.html). the title ‘‘There have to be limits’: Lawyers for Guantanamo inmates challenge lifetime imprisonment without charge‘ gives us that part and it is one that cannot be ignored, with ‘lifetime imprisonment without charge‘, we see not the first step, but an early setting that the law is changing into ‘Guilty until proven innocent‘ and I am not sure if that is merely a wrongful step, or a desire step for large corporations to give the setting a new life in other directions as well. There can be a setting where it is easier for the courts to work on that level. You see, when a corporation has failed their SLA’s, there will not be the documentation where they can prove it, yet when we see the application to ‘lifetime imprisonment without charge‘ the setting is very much inverted from what we find acceptable. We see the Post giving us “A handful of commission cases have inched along in pre-trial proceedings for years, many of them plagued by irregularities” and it is the ‘irregularities’ where we need to seek first, you see an abused system will rely on irregularities to remain in the shadows and active, whilst it almost never has bearing on National security and it will have even less a bearing on justice or lawful settings. The question becomes where it failed. There is a second side to the Post when we realise that the quote “Justice Department lawyer Ronald Wiltsie said authorities had a responsibility to detain suspects who could pose a future threat, even if it wasn’t clear they would actually take any action against the United States” is incomplete. The fact that we are faced with ‘it wasn’t clear they would actually take any intentional action against the United States‘. You see it comes with the setting that there is no proof that they had actually taken any action against the US, if so there would be a charge and that failure falls not merely on the FBI, it falls on the CIA, the NSA (data gathering agency) and most of all the investigator looking into the matter. We can illustrate this with the weirdest of examples.

In a spreadsheet we can use a random number, so we create 5 groups, each in one column, and each having 100 random observations. Now we will test for them stating that “IF(A2<0.2,1,0)“, I am setting the stage where 80% was guilty (so basically 20% was innocent). If the number is smaller then 0.2, they are presumed innocent. We do this for the 5 groups. Then we count the groups, in the initial test no one was innocent overall, but 3 were innocent on 3 counts and 20 were innocent on two counts. Now remember, this is merely 100 ‘persons’ tested on 5 elements. When we change the setting to “IF(A2<0.25,1,0)” (a joke on the premise that 3 out of 4 all people are guilty of something) we get a different setting. Now we see that two were innocent on 4 counts, yet 10 are innocent on 3 counts and 23 are innocent on 2 counts. Intelligence software works on facts not on random numbers, but the principle is partially the same, how many flags were raised by that one person, yet now not on 5 tests, but on dozens of tests, against people, places, actions and locations at specific times and as we consider that thousands are tested, in the random setting when the number of people are large enough we will get respectfully get a group that was innocent (less than 0.2 or 0.25) on all counts, that is the impact of random.

Yet on the flags raised in real live, we either have them guilty of something, which means that there can be a trial and a charge can be made, when you see the examples next to one another and we realise that the group of all people where no flags is raised did not occur (it will with a larger test group), we need to consider the flaws we are faced with and more importantly, the setting that we open ourselves to in legislation and in law when we allow for ‘lifetime imprisonment without charge‘. So in this setting, no matter how much we want actual national security Missy Ryan makes an interesting case. We get to see the larger issue when we look at Baher Azmy, legal director for the Center for Constitutional Rights, a group representing some of the detainees. With “Baher said the government had distorted a 2001 law authorizing U.S. military operations against al-Qaeda and affiliated forces by using it as a basis for indefinite imprisonment. He said insurgent wars, waged against small, clandestine and evolving bands of militants, could go on forever. But laws governing wars were devised with conflicts between states in mind, he said“, we are treated to the setting that we face in the upcoming decades. We are not waging was on nations, we are waging war on groups and tools. As Hezbollah is still the tool of Iran, the setting of a larger problem becomes apparent. In the first source (at https://www.terrorism-info.org.il/en/hezbollah-iran-handled-shiite-militias-integrated-syrian-army-campaign-take-control-south-syria/) we see “Shi’ite forces, handled by Iran, are being integrated into the campaign currently waged by the Syrian army in south Syria. There are at least two Iraqi-Shi’ite forces (the Dhu al-Fiqar Brigade and the Abu F–al-Abbas Brigade). There are also Afghan Shi’ite fighters in the Fatemiyoun Brigade. In addition, it was reported that Hezbollah operatives also participate in the fighting, including operatives from its elite al-Radwan unit, who were sent from Lebanon“, yet when we see “According to ITIC information, Hezbollah and the Shi’ite militias (some or all) have been integrated into the various Syrian army units and do not operate as independent forces. Pictures show Shi’ite militiamen wearing Syrian army uniforms, and it is difficult to distinguish them from Syrian soldiers“, we get the danger with ‘Pictures show Shi’ite militiamen wearing Syrian army uniforms‘. So now we get the setting of ‘who is exactly waging war on who’, or is that whom?

Not being able to identify the setting gives rise that Baher Azmy has a larger issue to deal with, because any denial from the Syrian army that these people were army units, and they get identified as militia who dressed ‘wrongly’, sets the stage that the defence ‘laws governing wars were devised with conflicts between states in mind‘ can no longer be upheld and that escalates the need for a much larger Guantanamo and indeed it continues and even fortifies the setting of ‘guilty until proven innocent‘.

the second source is a week old and gives us ““Hezbollah is a fundamental participant in planning and directing this battle,” a commander in the regional alliance that backs Damascus told Reuters. “Everyone knows this – the Israeli enemy, friends, and even the Russians.”“, it is given to us by Reuters (at https://www.reuters.com/article/us-mideast-crisis-syria-iran/hezbollah-role-in-syrian-south-exposes-limits-of-us-policy-idUSKBN1JV19U), so as the enemy changes its onesie (yup that was funny) we see a whole league of Shaun the sheep and we have no idea how to deal with them in life (the other alternative is solved through hiring people with the actual ability to aim).

Now change that setting away from the current ‘debacles’ in Yemen and Syria and consider the impact when we look at the Indian view of Pakistan (at http://www.dnaindia.com/analysis/column-terrorism-is-pak-s-business-2627746), it is not a hollow part, and there have been accusations from India and Afghanistan for the longest of times. In this setting we are given the quote: “India and Pakistan are not caught in some existential Punjabiyat love-hate relationship. Pakistan is a state sponsor of terrorism. No other nation has used terror so ruthlessly as an instrument of state policy as Pakistan has done for decades — principally against India but also against Afghanistan” is only the beginning. There are other headlines, even as they should be seen as no more than to illustrate that the issue exist, we cannot tell to what extent. So when we consider “The Islamic State’s flag emerges in Pakistan’s capital. How serious is the threat?” Is there a threat or is it merely a freedom of expression? So when we see the second headline ‘The terrorist group is increasingly present in Pakistan’s southern province‘, we are confronted with how to proceed, yet Reuters gives us 3 months ago “Islamic State claims attack on Christian family in Pakistan“, we see that the game changes. If state sponsored terrorism is the new ‘Letter of marque and reprisal‘, how can we proceed? Is there an actual option other than guilty until proven innocent?

What is clear is that the data crunchers will have their hands full because none of these algorithms and data gathering systems are ready for this leap. And it is not a small setting as Pakistan is a nuclear power who for the most is happy to push the button on India if need be, so the game is not merely changing, the players (Hamas, Hezbollah, Islamic State et al) are aware that hiding under the roof of any government gives them options and they accept being the tool for those governments, yet the systems and our mandates are less equipped to act. Yemen has so far been an excellent example on how to not act and it will escalate beyond this. Now consider that I do agree that ‘lifetime imprisonment without charge‘ is wrong, but what options do we have? Until 2016 I believe that the data and the evidence was the weak link. Now we are in a situation where we need to wage war on three fronts, an overt one, a covert one, and a data intelligence war and we need to find a way to intertwine them and use them to find the right checks and balances. We need to evolve what we can do so that we can determine how to do things correctly, or perhaps better stated efficiently to the right opponent.

You might think that this is ludicrous, yet have you considered the actions in Yemen? They were firing missiles into Saudi Arabia, on civilian targets, yet the only thing we see is messages like ‘Yemeni security officials claimed that cluster bombs were dropped in a civilian area of the Western suburbs of the Yemeni capital Sanaa‘, whilst we see ‘after Houthi rebels fired a missile at Riyadh‘ any justification reduced to an 8 word response. The media at large does not give us: ‘Houthi rebels fired a missile on Riyadh, the Saudi Capital with over 5 million people, the fired missile could have caused the death of hundreds of people if struck correctly, Saudi Arabia reacted in the attack against its citizens‘, we do not get that do we? Yet that is the game that is the danger some face. In light of the missiles getting fired under the noses of Yemeni security officials, they need to realise that not stopping the missiles does have repercussions and innocent people will always be caught in the middle.

The change of conflict is large and it will be growing over the next decade. I am on the side of Missy Ryan in this, lifetime imprisonment without charge must be challenged and everyone needs to know about the setting we have here, but when it comes to the defence of that setting, I wonder if we have any actual option to oppose it, those who are send to that place are willing to (allegedly) support people who hide in other uniforms knowingly firing methods of termination on civilians merely because they can and because it makes them continue the fight that they believe is just for much longer. It is a dangerous setting that strips the veneer of civilisation in nearly all nations, look at France and Germany, they went through this several times. We need to set a different stage and we need to do this before we set a legal lawful setting of targeted killing and the wrong people are shot, because that will be the point of no return for all of us.

You see ‘Guilty until proven innocent‘ (forced or not) is merely a first step, when that setting is entered in stone we get the second danger, when cyber-attacks removes the option to prove innocence, what do you think happens next? It is what I personally believe to be the setting stage for chaos leading to anarchy and there the game changes again, because most governments have cut on so many parts in infrastructure that most cannot overcome anarchy for a much longer time forcing the hands of many governments, especially in Europe and I feel certain that some of the players behind the screens realise that too and they might just be banking on it.

 

1 Comment

Filed under IT, Media, Military, Politics, Science

A mined pathway

There is news out there. It is coming from several sides making it slightly more reliable, yet the path that some seem to shine on is actually a very dangerous one. Now, let’s be straight, I am no fan of Iran, they overstepped the mark again and again and as such they are a genuine danger. Yet, the steps that we see contemplated is one that is slightly too dodgy as I see it. Don’t get me wrong, there are plenty of sanctions in place, there is all kinds of pressures on Iran and the direct threat that they pose to both the state of Israel and the Kingdom of Saudi Arabia is more than enough to make us all act against Iran, yet when we look at i24 News (at https://www.i24news.tv/en/news/international/179007-180708-mossad-chief-secretly-visited-washington-to-coordinate-on-iran-report), it is not the travel plans of Yossi Cohen, the El Jefe of Mossad that is an issue, it is the quote “held meetings with senior White House officials to discuss Iran” that needs more light. You see, a man like Yossi Cohen does not leave his operational bunker unless there is something that needs to be communicated directly. There have been all kinds of water-cooler chats on active operations (as some put it) in Iran to create more destabilisation. The Middle East Eye gives us “Is it the government’s policy to pursue regime change in Iran? Do they think the MEK actually have popular legitimacy in Iran?“, “This prospect moves the US and Iran closer to a direct military confrontation” from Forbes and “some segments of the economically driven protests are likely driven by Iran’s factional infighting over the direction of Iran’s policy, particularly within the context of elite disagreement on how to manage and mitigate the impact of US sanctions” from Nazanin Soroush at IHS Jane’s Intelligence Weekly. Now, realise that these three quotes are not on the same topic, yet the word of the week regarding Iran is ‘destabilisation‘. This is actually a lot more dangerous, it has the distinct danger of setting the people optionally against its own structures and the military tends to act rather negatively on that setting. Iran lost a lot of face and options with the Nuclear deal when the US backed out of it and even as the EU seems to be driven to keep it alive at the expense of every risk, the dangers are putting pressure in the wrong places and the visit from Yossi Cohen towards the US leaves us with the thought that more is coming. In this, the news that was given yesterday with the French shipping company CMA CGM pulling out of Iran is only increasing pressures. So even as Iran says it needs more help from Europe to keep alive the 2015 deal it worked out with world powers to curb its nuclear program, we need to consider that the Nuclear deal is unlikely to be salvaged unless the EU makes very large concessions making things even harder on the US-EU front. In this the prospect of being banned in the United States appears to have been enough to persuade some European companies to keep out and several others are now reconsidering the options that they have.

In all this, the news of internal actions remains on the table, yet I feel that this is not the best move to make. Part of the drive here is likely the news that had been around, in this former CIA officer Phil Giraldi gives us “what happens when Washington tries to sanction the Central Bank of China over business dealings with Iran — utter chaos on top of the already existing trade war!” This is a dangerous development and it is the most likely of settings that the US will want to avoid it, and some of the players are eager for a swift victory (yea right!), so here we have the dangers that the US will be pushing, or asking Mossad to contemplate to act directly in Iran, optionally in conjunction with CIA teams. If destabilisation is the operative word, there will be the implied dangers to all kinds of infrastructures (highly speculated by me here), and that is not the best of ideas. You see, even as there is Iranian opposition to both the clergy and military. A direct intervention in Iran, if proven could unite the people with the military and that is a dangerous step for both Israel, the US and Saudi Arabia. As there are internal conflicts Iran cannot and will not completely commit to the open setting of actions against the three nations. If the people unite the picture changes drastically almost immediate and that will most likely impact Saudi Arabia and Israel in the first instance, in addition to that Saudi Arabia would become a more visible target for Hezbollah overnight (with all the direct actions that follow), all issues that need to be avoided.

So how wrong am I?

I could be wrong, I honestly gave to some of the parts the setting that it was speculative, yet the quotes are from a collection of newscasts and news publications, the fact that some of it is not supported on an international setting needs scrutiny, yet the direct facts of additional pressures on Iran are clearly published making it much reliable. The additional fact that Haaretz released information that the IDF made their donations to an Iranian Air Force Base Near Homs, giving it loads of rubble is also clear indications that Israel is more and more active against Iran, yet there we must still consider that their actions remain still focussed on the Iranian presence in Syria (for now). Yet in all this, the setting is still not complete, there is evidence (a slight exaggeration) is pointing that Qatar is increasing its ties with US and Iran. Even as Haaretz gives us: “Treasury Secretary Steven Mnuchin sat next to the minister, Sheikh Mohammed bin Abdulrahman al-Thani. “You have been a great friend to the United States,” Mnuchin told Thani, praising Qatar for its cooperation on counter-terrorism financing efforts“, it must be looked into who instigated the Qatar-Iran ‘warming up’ party recently. If it is Iran then it is merely a tactic to increase policy gaps all over the Middle East, if it is Qatar, the issue becomes a larger problem. You see, just over a week ago, we saw the continuation (source: Arab News) through ‘Qatar will pay a price for its financial links with Iran‘, this is not news as it was going on for close to a year, yet if the previous setting was opened by Qatar, it implies that Saudi Arabia has a larger problem and even as the initial target might not be Saudi Arabia as the quote “Traditionally reliant on Dubai as a financial bridge to the outside world, Tehran is now looking to find new safe harbors to protect its financial interests, and Qatar is in its crosshairs. If Iran succeeds in building such a relationship with Qatar, it will be in a far stronger position to endure and evade US sanctions” implies, which makes operational and tactical sense, the secondary setting is that Iran could gain a more direct path of access to Saudi Arabia. This opens up Iranian settings towards Al Hofuf, Al Kharj and from there interference directly into Riyadh becomes (even though a far-fetched one) to Riyadh, all this at a time that Saudi Arabia should be focussing on Yemen and Hezbollah. It would force itself to instigate stronger internal security measures, all costing resources.

In the end

As some of this requires better access to data that goes beyond open source we need to learn (over time) if we are confronted with Iran playing a game of Fox and Rabbit, or is there more going on? Let’s not forget that Qatar has its own issues in the game, with Turkey in the mix on that level as well, the game is becoming much harder to read, especially when the intelligence setting of data is set to a much higher level than yours truly has access to. That part is not just seen in the January setting that Al Jazeera gave with ‘Qatar’s investment in Turkey exceeds $20bn, the second highest by any country‘ (at https://www.aljazeera.com/news/2017/10/turkey-qatar-strategic-alliance-171024133518768.html), the time lines and the weighting of the official and unofficial settings, these two matter as one does not merely invest $20 billion in a nation that has no real economic investment values, and when we consider that a large chunk of that party pie is about opening paths of facilitation the considerations we need to have tends to change by a fair bit. Even as the news was given in January, the setting of such an amount of money goes into a timeline of at least two years, so there is more to take notice of, especially now. So even as Al Jazeera makes a big thing on the import of milk and beef, the amount given could feed every Syrian refugee for close to three years, the math does not add up. there is however no telling what the actual settings are as the open books and the second balance need not be the same, and might not be set in covert needs, merely in non-taxable, or 100% deductibility reasoning, the mere legal application of tax avoidance could make all the difference.

Sometimes clarity of data tends to become murky, intentionally done for the mere reason as to avoid that supervillian (taxman) to gain access to the intended funds. If you doubt that reason, feel free to ask Ruth Porat (CFO Google) and Luca Maestri (CFO Apple) on the hardships that this supervillian (taxman) gives them.

 

Leave a comment

Filed under Finance, Media, Military, Politics

IQ versus PI

I could not believe my eyes this morning. OK, I admit I had a weird night. It was suddenly too warm (for winter) and I ended up cleaning my kitchen at 03:00, that’s how I roll at times. So when I got my morning routine together which was delayed by 30 minutes, I ended up having to wake up to ‘Moscow using UK as dumping ground for poison, says Sajid Javid’ (at https://www.theguardian.com/politics/2018/jul/05/sajid-javid-uk-to-consult-allies-over-novichok-response-russia-poisoning), whilst having my first (and second) coffee. Now as a conservative, I am worried. For the most, I do not consider politicians to be overly intelligent. Now that is not really a big deal, my IQ test was around 12 point lower than Alan Turing, so I don’t have the biscuit on Intelligence, I know that much. Yet as a former boss of the Deutsche Bank, I would have thought that Sajid Javid had a decent handle on things (like common sense). So when I get confronted with “using the UK as a “dumping ground” for poison and urged Russia to explain “exactly what has gone on””, I do wonder whether Sajid is smitten with IQ or with Plenty Ignorance (PI). So as the article is giving us things like “Sources close to the investigation dropped a hint that they may now know the identity of the would-be killers who targeted the Skripals”, that whilst the transmission method was never determined, for either case, the fact that the goods cannot be traced as the individual parts were never found, we are confronted with ‘dropped a hint’ that comes across as an almost desperate attempt to shake the tree and wonder if anyone will be running away. The additional part where we are all still confronted with what the fans of the Hammers might regard as a ‘load of bollocks’, so when you see “the novichok that harmed them may have been in a sealed container left following the attack”, we need to realise that the operative part in all the unknown parts is ‘may have been’.

Now, this is nothing against the metropolitan police or the counter terrorism units, as this is not ANYONE’S cup of tea and we can add the CIA to that list as they are learning the issues that the Salisbury detectives are confronted with and with Salisbury with an utter lack of CCTV’s, the detectives get to work with a lot less than their peers in Sussex and Brighton currently have access to.

Now, the article also gives us “The incident in Amesbury is being viewed by the authorities as an after-effect of the March attack rather than a major new development. This would suggest the police do not regard the agent as being from a fresh batch” and that is important as I mentioned towards that yesterday (it was speculative at the time), and the fact that it might have been thrown out (if that is true) then it was a dump, but I feel certain that it was not done as a state driven action. People in that setting do not leave evidence behind. In addition, we need more factual data before we can draw on any speculative conclusions, yet it seems that Sajid does not have them either. The ‘may have been’ and ‘dropped a hint’ give us that much.

I do get it, they are all about smothering optional panic, but being stupid about it does not tend to be a solution, it pretty much never is. So when we see: “Our strong working assumption is that they came into contact with the nerve agent in a different location to the sites that were part of the initial clean-up operation”, we see to a decent regard a factual part, yet most common sense brains would have gotten us there, in addition, there were only two affected in both initial cases, so the investigators do not have anything and the additional police officer hit, would have been most likely from a transfer from one of the initial victims, which makes sense. In addition to that, the fact that the second pair was hit so much later, knowing that all the Novichok versions are highly unstable. Now in all regards, we cannot give Sputnik news the sentiment of being unbiased yet they gave us in April parts that were already known. “the Novichok is a very unstable substance, which depends on [exposure to] water, on alkalis, on everything”, So when we consider the rain and humidity in the Salisbury region, how likely are some of the presented facts? They also gave a part that I did not know (having no degree in Biomedicine or Ways of Mass Discomfort). The quote: “Mirzayanov said that the toxin did not kill Skripals since the substance is vulnerable to humidity, and there was fog in the United Kingdom on March 4, the day of the poisoning attack on Skripals”. I surmised part due to its instability, yet the given ‘the substance is vulnerable to humidity, and there was fog in the United Kingdom on March 4, the day of the poisoning attack on Skripals’ gives us that humidity is a much stronger factor in negating the efficiency of the substance, making it a lot less terminal. Something a state ordered visiting person would have been made aware of. So as we are confronted with more and more media outbursts, we are watching a show where the cast is unflatteringly (and undeserving) caught with their pants around the ankles doing the penguin.

The final part that is questionable is the quote: “scientists had said novichok degraded in the natural environment over time, adding to the notion that the substance Sturgess and Rowley came into contact with was in a container.” Yet when we accept that all the Novichoks are unstable and that humidity impacts it in a larger degree implies that there was no ‘degradation’ not after such a long time, not to remain this potent. So if it was a sealed container, there might be some reflection on that, but that requires a lucid person to answers a lot of questions and the victims are still “critically ill and doctors at Salisbury district hospital are trying to stabilise them”, so there is that part gone. In addition, they either have the container, or they do not. It might make most sense, but in the end it seems that some people of authority are setting a stage of implied emotion through speculation and half truth, so whilst they are all members of the Ignoranus clan and basically blaming the Russian government on this (this one time they might actually be innocent, so go figure), we see ‘The eyes of the world are currently on Russia, not least because of the World Cup’. It is a dangerous setting, not because of the fact that it is done, but merely because the people are not looking and perhaps realising that there was something that they missed which might have actually helped the detectives working on this.

And in the end Sajid Javid made it worse with: “We will stand up to the actions that threaten our security and the security of our partners. It is unacceptable for our people to be either deliberate or accidental targets, or for our streets, our parks, our towns to be dumping grounds for poison” the mere fact that there is close to no evidence linking the Russian government to this event because they basically invented the stuff, is almost like blaming Alfred Nobel for all the blown up buildings in Syria in the last 5 years when dynamite was used. The fact that the man has been dead for almost 122 years is the smallest of issues that the media will find a loophole for. Adding: ‘Sources close to the investigation’ or ‘may have been’ usually does that trick.

Yet no one denies that there is an issue, there is one that needs a resolution and we need to realise that one of several Novichok nerve agents are out in the open. There is even the consideration that someone with an utter lack of common sense is playing with one (or more) of them. The fact that there are no terminal cases might imply this, yet the wielder and the reason are unknown. We can also agree that in the Skripal case there might have been Russian government employee involvement, yet no evidence was ever brought to light. In the second case it is so much less likely, yet there we do not know how the nerve agent was set upon the couple, the timeline clearly indicates that she was the initial infected and the setting of a third unharmed person implies with a level of certainty that it happened outside of their premises and that is about all we have been exposed to. There might be more, but the police will not and optionally should not reveal that for the longer of times, which is fair enough, they have a hard task ahead and they can do without the Monday morning quarterbacks called bloggers (including me) and journalists (pretty much every paper on the planet). I do hope that they can solve and close the case, yet until that point comes, I do hope that Sajid Javid gets clue and gets it fast, because the PI he is showing is getting to be exponentially larger than his IQ ever was.

 

Leave a comment

Filed under Uncategorized

The Iranian funds play

Today is all about Iran, the Washington Post and many others are giving the world the information that the previous president misled congress. Yet the Washington Post phrases it as ‘Obama administration misled Congress on possible Iranian access to U.S. financial system‘, they also mention that it is a Republican investigation. There are two issues, right off the bat, even before you read the article, the question becomes, where were the FBI and the CIA in this?

So when we get the first lines with “The Obama administration went out of its way in early 2016 to help Iran recoup previously sanctioned oil revenue stranded in an overseas account after the nuclear deal went into effect and actively misled Congress regarding those efforts, according to the results of a nearly two-year Republican investigation released early Wednesday“, we need to realise that the setting is wrong from the very start.

Before I go there, let’s follow the trail of crumbs that we get offered. next there is “Iran wanted to convert the money into U.S. dollars and then euros, but top U.S. officials had repeatedly promised Congress that Iran would never gain access to America’s financial system“, which is followed by “the Obama administration secretly issued a license to let Iran sidestep U.S. sanctions for the brief moment required to convert the funds through an American bank, an investigation by Senate Republicans released Wednesday showed. The plan failed when two U.S. banks refused to participate” and finally we get: “the revelation is re-igniting the bitter debate over the nuclear deal and whether former President Barack Obama was too eager to grant concessions to Tehran“. The full story (at https://www.washingtonpost.com/politics/federal_government/obama-era-license-aimed-to-let-iran-convert-money-in-dollars/2018/06/06/60be6d36-6971-11e8-a335-c4503d041eaf_story.html) gives us a lot more, but initially, we get ‘The plan failed‘. So this was seemingly (according to a previous Obama official) about the Iranian money held overseas. The issue seems seen with “No one involved seems certain whether Iran has yet received all of its $5.7 billion“, yet as I see it, that does not seem to be the case. When you think this through, $5.7 billion amounts to 11.2 million barrels based on the average oil price, this amounts to funds equal to 26 hours of oil production in Saudi Arabia, 26 hours! Now we are not debating whether Iran is allowed access to the funds, the fact that we see that this much oil (or so little in Saudi Arabia), whilst in Iranian production it amounts to 4 days of oil production is a Joke. Oil still goes to Asia, so all this fanfare for 4 days of oil production? This is about something else entirely, or it is about a very different amount of money. I let you mull that part over, so when we look at the second article (also Washington Post), we see in the article called ‘Secret Obama-era permit let Iran convert funds to dollars’ where we are ‘treated’ to “Iran had been promised access to its long-frozen overseas reserves, including $5.7 billion stuck in an Omani bank“, which we knew to some extent, yet the full economic value is not given, which is also an issue, you see that stuff makes interest, so at that point who gets that money? Is it locked in the Iranian account, or was it the balancing act to the seesaw that is going up and down on €11 trillion in essential European and American debt guarantees? The second article has pretty much what the first one had, but we also see (slightly more clearly) “And when questioned by lawmakers about the possibility of granting Iran any kind of access to the U.S. financial system, Obama-era officials never volunteered that the specific license for Bank Muscat in Oman had been issued two months earlier. According to the report, Iran is believed to have found other ways to access its money, possibly by exchanging it in smaller quantities through another currency“, this now gives us the part (when going back to the first article: “Lew, according to documents reproduced in the report, had been given Treasury talking points explaining the Omani conundrum, he chose not to mention it in a House hearing in late March“, this reference to former Treasury Secretary Jack Lew, where we wonder that if this is about the question, was the question correctly phrased, or perhaps the better setting is, was he breaking any laws not mentioning the ‘Omani Conundrum’?

I cannot state without the full text and even if we agree that there is an issue, we now get back to the very core of the matter. If it involves US Banks and when we reconsider ‘the plan failed when two U.S. banks refused to participate‘, two out of exactly how many banks? That part is also not revealed here. So now we get to the part where it becomes either the US treasury AND the FBI who seemingly did not act here, the Omani Conundrum implies that the CIA turf was trodden on and the communications (in several levels) give us that the NSA ignored it. So what is going on? Did anything actually happen? Because that question is becomes valid when we reconsider ‘the plan failed‘. If that is true, then why is the Washington Post, one of the most revered newspapers in the USA not giving the correct light on this? In addition, the outstanding questions that we get from the mere substance given becomes an issue when we see the words of President Trump “this disastrous deal gave this [Iranian] regime — and it’s a regime of great terror — many billions of dollars, some of it in actual cash — a great embarrassment to me as a citizen and to all citizens of the United States,”. Yet how much money was actually released, through the deal and from 2015 onwards? None of that data is available through the articles. So what exactly is US congress playing with now, because this all looks like a really loud smokescreen, all emotion and no contributable facts on the matter. How many banks were part of it (and their names), which two banks refused (double plus points for them two) and in light of merely one $5.7 billion source we need to see the scope of the money, especially in light of the setting that Iran is even now shipping oil to Asia. Are those not valid questions? In all this, where were the FBI and CIA when this was going down and more importantly why is there no mention of their part in all this, or were they not part of any of it? That is equally an issue, because if there is evidence that they were in different states of activity and actionable requirements regarding Iran during the two presidencies, the people have an equal right to know, do they not? You see, in the larger scope that matters, because the Yemeni issue is covering two presidencies, so if (a very clear if) the CIA was less vigilant during the previous presidency, it might also explain a few things on how missiles are getting shipped from Iran to Yemen, if the manifest states 1013 barrels of oil for humanitarian aid, it might explain a little more than we bargained for. Now the last part was speculative and knowingly incorrect, yet the question remains valid. This was not some article from the enquirer, or the Canton Cherokee Tribune, it is the Washington Post. In many (global) cases that newspaper is seen as gospel right next to the Financial Times, so when two articles give us so many questions in all this, I need to wrap my head around the option that Martin Baron is either on vacation or perhaps down with the flu. The man who inspired Tom McCarthy to make Spotlight should have a better grasp on the entire Iranian fund issue and how it should be made visible in my Hummer opinion.

Because behind all this is not merely the oil, or the Iranian uranium enrichment plans. It in equal measure gives another light that we get from “The draft involved a general license, a blanket go-ahead that allows all transactions of a certain type, rather than a specific license like the one given to Oman’s Bank Muscat, which only covers specific transactions and institutions“, you see, if that is in play and when we remember the G30 bankers group, the one that got some limelight, for ONE DAY. After that all the media dropped the issues when the people were given the sight of Mario Draghi being a member of this insiders only club, a club that he had to give up and no one (except for me that is) followed up on that. All the media left it alone. So when we see that part from April 18th 2018, where Reuters and the Financial Times give us that he would remain a member, the ECB and others never acted on it and silently wait it to go away, now we see the Omani Conundrum issue and I have to wonder, as bankers will do trade with anyone, what licenses are out there that no one knows about, more important, whoever the owner of the funds are that they get to play with ahead of all other banks, with close to €3 trillion in extra printed money for the game of bonds, in all this, what else are we not seeing and as this optionally directly reflects on Iran’s and all the billions we are left unaware of, how is it that the Washington Post seems to not care (or rather stated, believingly unimportant issues that are therefor not investigated) are out there with two pages set to issues in a setting of ‘the plan failed‘ and ‘at the end of the day, nothing worked‘. Which makes me wonder if any transgression was committed and what it was all about. Time will tell whether we see more revelations tomorrow and more important if it leads to anything actionable, because that will be come the heart of the matter soon enough.

 

Leave a comment

Filed under Finance, Law, Media, Military, Politics