Tag Archives: Cisco

The Scott Pilgrim of Technology

There is a moment when we have to take account of actions; we have to push into the direct limelight the ACTUAL dangers. I did some of it when the DJI issues hit the news. With ‘That’s the way the money flows‘ (at https://lawlordtobe.com/2019/05/21/thats-the-way-the-money-flows/) we see certain actions, but have you considered the actual dangers?

In this case (for a few reasons I move towards the article in the Verge. Here (at https://www.theverge.com/2019/5/22/18634401/huawei-ban-trump-case-infrastructure-fears-google-microsoft-arm-security) we see what transpired half a day ago. With the ARM announcement people are getting worried. Yet they validly ask: “halting its access to current and future chip designs and coming on the heels of similar breaks from Google and Microsoft. Huawei is in deep, deep trouble, and we still don’t have a clear picture of why“.

Yes that is seemingly an issue, if there actually was an issue, in addition we are given “There’s never been a full accounting of why the US government believes Huawei is such a threat, in large part because of national security interests, which means much of the evidence remains secret” and that is where the issue is, it is hidden. There has not been one respectable cyber engineer giving a clear account of where the actual flaws are.

So when we see: “There was never any hard evidence of backdoors in Huawei’s cell towers — but, as hawks saw it, there didn’t need to be. As a hardware provider, Huawei needs to be able to deploy software the same way Apple deploys iOS updates. But as long as there was a pipeline from Huawei’s China headquarters to cell towers in the US, there would be a strong risk of Chinese surveillance agencies using it to sneak malware into the network“. We can accept that to some degree, yet the actual issue stated with: ‘there would be a strong risk of Chinese surveillance agencies using it to sneak malware into the network‘. If it is about risk then that risk is actually zero, you see Cisco solved that problem for Russian, Chinese and North Korean intelligence months ago. The fact that all over the US and now Europe, we see the dropping of Huawei as a consideration is not merely an act of discrimination, it could also be seen as an act of customer being betrayed by their governments.

What is the evidence?

As some experts give us something like: “The vulnerability could allow an authenticated, local attacker to write a modified firmware image to that component. A successful exploit could either cause the device to become unusable (and require a hardware replacement) or allow tampering with the Secure Boot verification process, according to Cisco’s advisory” and make no mistake, routers from Parks and recreation, to the Pentagon right up to the White House are optionally affected at present, the list (at https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190513-secureboot#vp) shows a list that is impacting vulnerabilities to MILLIONS of devices and the media remains largely silent on it.

And when we also consider: “Other routing and switching gear patches won’t roll out until July and August, with some products slated for even later fixes, in October and November.” we should all realise that Chinese equipment does not make US hardware vulnerable, Cisco (an American company no less) did it for them. The Washington Post is not really covering it, are they? Perhaps because we see (at https://www.washingtonpost.com/brand-studio/wp/tag/cisco-webex) loads of space reserved for partner content, giving us the credo that I have mentioned a few times before. The media has become a whore (or perhaps better stated a person relying on questionable ethics). They cater to their shareholders, their stake holders and their advertisers; there is the real danger and the real vulnerability.

Keeping the people knowingly in the dark from actual dangerous situations, but that is not really what big business wants is it. The dangers that Huawei grew to twice its size was just too dangerous for those on the Wall Street gravy train, and whilst we see these dangers for almost a month, the value of Cisco goes up? Whilst millions of devices are vulnerable with many of them in that state to deep into November, optionally remaining a danger until well into January 2020, for the simple reason that delays are almost inevitable in these situations?

When we realise that we can Google on reported true and false weaknesses that hit Huawei and Cisco, it is shameful to see the following list:

News source

Huawei ‘danger’ given

Cisco vulnerability mentioned

Sydney Morning Herald

Yay

Nay

the Age

Yay

Nay

the Guardian

Yay

Nay

BBC

Yay

Nay

The Times

Yay

Nay

Australian Financial Review

Yay

Nay

Financial Times

Yay

Nay

Washington Post

Yay

Nay

LA Times

Yay

Nay

NOS (Dutch)

Yay

Nay

Dagens Nyheter (Swedish)

Yay

Nay

 

However, in case of the Sydney Morning Herald we do get to see sponsored content for Cisco and the Washington Post gave the readers Cisco Partner content.

As far as I have been able to tell, none of them gave any light to the vulnerabilities in Cisco Routers and Firewalls. Would you agree that a flaw impacting millions of devices is news? Many of them pulled a similar stunt in 2012 regarding Sony in the month before the release of the PS4. In regards to the list, these are supposed to be the more respectable choices for news; the list of absent news giving sources is a lot larger.

Whilst the IT news magazines gave the broader setting (as well as Cisco on their own site), we see that the media is seemingly playing a game of: ‘Let’s rent a hotel room on an hourly rate‘.

When we see Tara Seals in Threatpost giving us: “A critical vulnerability in Cisco’s software-defined networking (SDN) software could allow an unauthenticated, remote attacker to connect to a vulnerable data-center switch and take it over, with the privileges of the root user” (at https://threatpost.com/cisco-critical-nexus-9000-flaw/144290/), I suddenly realise that there is an inner demon with a pitchfork stabbing into my brain telling me that I am a pussy, I disagree! So here it is: “A message for the Pentagon IT department; Do you still have the password ‘Cisco123‘ on some of your routers? If so would it not be a great idea to change it before the Chinese Ministry of State Security and the Foreign Intelligence Service of the Russian Federation (SVR RF) decides to download your servers at their earliest convenience?

I know it is an annoyance, but with Cisco flaws the way they were it is merely a small consideration, and let’s not forget that at this stage no Huawei device was required to acquire the information on your servers. I personally believe that it is time to reward those who do not apply common cyber sense to be rewarded with limelight. I have had to clean up the mess of others for well over a decade and now it is time to give those people the exposure they deserve (my findings regarding Credit Agricole will have to wait for a few more days). When you consider that the flaw also hits the Nexus 9000 Data Centre Switch, a device that is according to their own site ‘Built for scale, industry-leading automation, programmability, and real-time visibility‘, as well as “operate in Cisco NX-OS Software or Cisco ACI modes with ground-breaking Cloud Scale ASIC technology“, and lets be fair, there will always be an issue, a device on such scale cannot be flawless, yet when such a flaw is clearly reported on a level this big and the media merely looks at accusations against Huawei and leaves actual dangers unreported, the integrity of the media has become too large an issue on a global scale.

The issue is twofold for me, the first is that Huawei was never a risk and even as I disagree with the dumb headed approach that the US had, I am very much on the side of Alex Younger (the apparent fearless leader of MI-6), he is merely stating that non-British equipment (in this case Chinese) could be an optional threat in the future. His issue is that this level of infrastructure must be British and he is not wrong, no nation is wrong to have high level infrastructure equipment (whether it is 4G or 5G) in national hands. That is the application of common sense (yet realistically speaking not always pragmatic or achievable). so when he stated last February ‘It’s more complicated than in or out,‘ he is actually spot on, no one denies that. Yet the Americans had their big boots, brainless and started accusations that cannot be proven, that is an issue! For the US it was all about the money and American technology is losing more and more headway, they are literally falling further behind on a daily basis. As I personally see it the direct consequence on iteration versus innovation technology. When the best innovative step is Samsung giving the consumer the ability to share power wireless (which is awesome), even me as an anti-Samsung person will admit that they hit the jackpot with that one. How sad have players like Apple, Microsoft, IBM, INTEL et al really become?

How much of a Scott Pilgrim must we become fighting all the tech companies in the world before we get told the direct truth by the media? How much shaming must we do to make the media make us the number one directive, not the number four option? and as I have been considering more and more to put my IP vision valued at $2 billion public domain and let them fight it out among themselves, basically I am just too tired to engage in another round of bullshit with these so called executives and VP’s who (with the exception of Huawei and Google) do not have a clue on what they are doing in technology in the first place.

The larger problem is not Cisco; it is security and identity management. Most corporations are close to 5 years late into implementing an actual non-repudiation system and that is partially because there is no real good system or good way to ensure non-repudiation, an issue that should have been addressed almost 10 years ago, but never was, I personally tend to blame complacency there. I personally believe that a drive to iteration prevented innovation to get us there, but that is merely my view on the matter and I am perfectly happy to be proven wrong on this specific part.

Dozens of options (I actually had another idea towards a new solution to applied solar technology) all having larger impacts in larger cities and pilot places like Neom City, what does it take for some of these players to wake up and smell the dangers of corporate death through marketing set towards iterative release?

 

Advertisements

Leave a comment

Filed under Finance, IT, Media, Military, Politics, Science

That’s the way the money flows

The Independent had an interesting article 2 hours ago. The article (at https://www.independent.co.uk/news/world/americas/china-drones-spy-us-dhs-security-data-alert-a8922706.html). The title leaves little to the imagination with: ‘Chinese drones may be stealing sensitive information, DHS warns‘, after the Trump google play, after his refusal to submit to subpoena’s, after the anti Huawei activities that so far has never yielded any active evidence (the 8 year old case was settled within months are done with). Now we see: “Chinese-made drones in America may be sending sensitive data to their manufacturers back home where it can be accessed by the government, the United States Department of Homeland Security (DHS) has warned“, which might be a nightmare if it was not so hilarious. You see the next quote: “CNN, which obtained the internal alert, reported that the DHS fears drones will offer Chinese intelligence unfettered access to American data“, it comes across like we have a case where a CNN reporter has been hit by a silly stick and never recovered. Consider the drones we see, there is no space to have a dedicated hack system on board. Yes some can be done with a mobile, and there is plenty of space in that device, now consider the ‘sensitive’ data that needs to be found, the data needs to be connected to (and with all these faulty Cisco routers that is relatively easy at present), then a selection needs to be downloaded and that is merely for one place, one device. All this stops when any person uses common cyber sense. It is the revelation that we see next, that is the one that matters. With: “Though the alert didn’t name specific companies, the vast majority of drones used in the US and Canada are made by the Shenzen based Company, DJI, CNN reported” we see the part that matters. As drone services are up on an almost exponential growth as we see the push that got there. The news from November 2016 gave us: “Domino’s Pizza Enterprises Limited (Domino’s) and drone delivery partner Flirtey delivered the first order, a Peri-Peri Chicken Pizza, and a Chicken and Cranberry Pizza“. Consider the option to avoid traffic in New York, Los Angeles, San Francisco, Boston, Chicago, Seattle, Pittsburgh, all places with massive congestion. Drones are the optionally the newest quick way to deliver food, Amazon needs, Walmart needs, all in growing need due to the events where retailers and shippers combine forces to avoid a few items, and with congestion set to zero, people will flock to that consideration. Now the operational part, it seems that DJI is ahead of the curve, another Chinese company decided to truly innovate and now that the push is there and America is bankrupt (as I personally see it) anything possible to avoid money going to China, America is taking a pot shot at that. So when we are also treated to: “A spokesman for DJI denied that any information was being transmitted to it from its drones, adding that the security of its technology has been independently verified by the US government.” I start wondering if DHS was able to do its job properly. Now let’s be clear, there is no doubt that ANY drone can be used for espionage, especially if it is quiet enough. Yet is that the issue for DJI, or is that an issue with the spy that utilises drone technology? Yet that is actually not the only side, on the other side we see mentioned: “Those concerns apply with equal force to certain Chinese-made (unmanned aircraft systems)-connected devices capable of collecting and transferring potentially revealing data about their operations and the individuals and entities operating them, as China imposes unusually stringent obligations on its citizens to support national intelligence activities,” Now, this part does make sense. It is the same as the Apple Fitbit, that due to its global nature started to hand out the jogging patterns of Special forces in the Middle East, so within 3 days several members of the two dozen operatives had a check on their calorie burning and health, whilst the mapping data showed the world where the CIA black site was (oh apologies, I meant to say a military specialist endeavouring location of an undetermined nature). The question becomes how was the ‘the security of its technology has been independently verified by the US government‘ achieved? Was that verification process competent, or perhaps slightly less so?

I am not stating my verdict in either direction; yet the entire Huawei mess, as well as the DJI setting implies that the growth industries are shunned from America, mainly because it is not an American industry. Yet in all this, the forget that places like the EU and India are large enough to go forward with both players and truly grow further, whilst the downturn and the economic lag that the US is creating will merely grow the loss of momentum and the recession it will fuel in other ways. I would consider that the setback that Google is trying to create will have larger repercussions down the road. As larger Data vendors will now optionally choose the Chinese side, they will grow market share. You see no matter how it is sliced, all this is data based and data can only grow if there is usage. So when people remain with Huawei as their phone keeps on working, we see that there is a larger concern soon enough. At some point people will stop trusting Samsung, Google and Apple phones, which works out nicely for several players (Microsoft actually more than most), what do you think happens when the larger share of 14.7% of a global market changes to player three and not use Google apps to some degree? Google momentum relies on non-stop data and usage, when a third of the 60% that these three cover stops, do you think that this has no impact for Google?

The same applies to drones. You see intelligence makes the drone and as it grows its market share and the collected data of drone usage is set, the innovation of DJI grows faster. It is the difference between generation now and generation 2022, DJI will grow and can grow in several directions, yet the entire the setting of ‘data theft’ we see that there is a lack of ‘what’ data. What data is collected, the flight path? Well, I think we all need to know in 2023 what flight path was taken for the delivery of 342,450 pizza’s delivered per hour, is it not? It is not that Google Map has that data, and within a building in New York, is there truly a clear sign in the drone itself who exactly the merchandise was for, or was that on the box (instead of the drone). Now, there is no denying that some of that data would optionally be accessible to the Chinese government? Yet what data, what level of data? Do you think that they have time for the hundreds of drones and the data whilst they can monitor 20,000 times that data with a spy satellite (and an additional truckload of data that the drone never had in the first place?

It is when I see ‘unfettered access to American data‘ where the questions become pressing. It is like watching Colin Powell coming into a non-disclosed location with his silver briefcase and in the end the lack of WMD’s, are we going in that direction again? when I see ‘unfettered access to American data‘, it is at that moment I see the optional comparison (an extreme lose comparison mind you) with the innocent preachers daughter who did the naughty thing to 30% of the boys coming to Sunday sermon, having attempted things I cannot even rent on adult video. It is the CNN article (at https://edition.cnn.com/2019/05/20/politics/dhs-chinese-drone-warning/index.html) that gives additional rise to concerns. When you see: “Users are warned to “be cautious when purchasing” drones from China, and to take precautionary steps like turning off the device’s internet connection and removing secure digital cards. The alert also warns users to “understand how to properly operate and limit your device’s access to networks” to avoid “theft of information.”” It seems to me that there are dozens of ways to get this data, a drone seems like an expensive long way round-trip to get to that data, whilst more can be accessed in several other ways and it is the speculation through ‘device’s internet connection‘, so when we see one of these devices (at https://www.dji.com/au/phantom-4-pro-v2/info#specs), we are treated to: “The new Phantom 4 Pro V2.0 features an OcuSync HD transmission system, which supports automatic dual-frequency band switching and connects to DJI Goggles wirelessly“, where did the internet come in? Yes there is an app, to get a live view from the drone, so what ‘unfettered access to American data‘ could there be that Google Maps at present does not have in more detail?

It is the next part that is the actual ace. When we see: “DJI, which reported $2.7 billion in revenue in 2017, is best known for its popular Phantom drone. Introduced in 2013, the drone is the top-selling commercial drone on the market“, information the Independent did not give us, that is the actual stage as I personally see it. It was $2.7 billion in 2017, there is no doubt that when drone delivery truly takes off, at that point revenue that sits between $15 and $27 billion is not unrealistic, the dire need to avoid congestion on a global scale will drive it and that is before you realise the non-US benefits in London, Amsterdam, Paris, Berlin, Munich, Madrid, Barcelona, Rome, Athens, Moscow. At that point you will see stronger growth and I haven’t even looked at the opportunities in a place like Mumbai, Tokyo, Delhi, Bangkok, Rio, Buenos Aires and Sydney yet. Everything leaves me with the impression that this is not about security, it is about money. That fact can be proven when you realise that everyone remains silent on the 29 new vulnerabilities that Cisco reported merely a month ago. How many Cisco router stories have come from that non-technologically refined White House, where they are currently optionally limited by “Cisco routers, including ones that can be found in malls, large companies or government institutions, are flawed in a way that allows hackers to steal all of the data flowing through them“, the cybersecurity company Red Baron handed out that issue to the media last week, so who picked up on that danger to ‘unfettered access to American data‘? And when you consider ‘it allows potential malicious actors to bypass the router’s security feature, Trust Anchor. This feature has been standard in Cisco’s routers since 2013‘, when we realise that Cisco is a household name on a global scale (especially when connected to the internet), the entire Cisco matter seems to be at least 15,000 times worse than any DJI drone ever could be, and the fact that DHS remains silent on that gives (again, as I personally see it) is added proof that this is merely about the money and the fact that US companies are losing markets on a global scale.

I could set the stage by singing ‘All ‘Bout the money‘ by Meja and ‘That’s the way the money goes‘ by M, but then, I realise that people would most likely pay me serious money not to sing (my voice is actually that bad).

That’s the way the money flows, specifically at present in a direction that the US is for the foreseeable future most displeased about.

 

1 Comment

Filed under Finance, IT, Media, Military, Science

The €0.01 pledge

Yes, we all heard it before, ‘I hereby solemnly swear‘, ‘I pledge my allegiance‘ and ‘for what we are about to receive‘. All nice sounding words, yet are they worth the value of the printed paper when people speak these words? That is where you stand when we were given ‘Leaders and tech firms pledge to tackle extremist violence online‘. And the quotes are nice to read too. First there is: “World leaders and heads of global technology companies have pledged at a Paris summit to tackle terrorist and extremist violence online in what they described as an “unprecedented agreement”“. The article (at https://www.theguardian.com/world/2019/may/15/jacinda-ardern-emmanuel-macron-christchurch-call-summit-extremist-violence-online), and President Macron, who is in all kind of non-economic states took the time to shed light on this. So when I saw: “a “plan of action” to be adopted by countries and companies to prevent extreme material from going viral on the internet” I needed well over 10 minutes to stop howling with laughter. It was funny, I agree, but in the article there is supporting evidence for my ‘howls of deriving laughter‘ (borrowed from Monty Python).

You see, the first delusion is ‘prevent extreme material from going viral on the internet‘, the internet is all about going viral, and we enabled marketing and SEO systems of doing just that for the need of creating awareness in whatever way possible. The creation of viral events is what drives Facebook and their social companions. And even as their might be some form of control on Facebook, places like 4Chan have close to 0% control and whilst people are trying to find the viral video, a dozen copies will be spread to alternative locations. If you want to understand viral video, take a look at Medium dot com (at https://medium.com/this-happened-to-me/10-ways-to-make-your-video-go-viral-d19d9b9465de), they make a nice top 10 with actually interesting issues to consider. Social media is about getting viral (or is that virile?), they need to sell advertisements and the list mentioned give at the second tip the stage where you have millions of views in just under 72 hours, and that was merely some girl dancing.

The Guardian gives another part. When we see: “The footage was picked up by some international media outlets who initially published excerpts of the video and links to the gunman’s extremist “manifesto” before quickly dropping them in the face of political and public outrage“, so until outrage became slightly too loud, the news media themselves had no issue propagating the video (partially), that is the larger failure. You want to stop social media, whilst the media themselves use the material? What was that, ‘the people have a right to know clause?

As I see it: “as a voluntary initiative it is for individual countries and companies to decide how to honour their pledge” that pledge is (as I personally see it) nothing more than another way to grease the wheels of the EU gravy train. When we add “nations to bring in laws that ban offensive material and to set guidelines on how the traditional media report acts of terrorism“, so we get non mandatory actions linked to censoring of the traditional media, and you wonder why I was laughing? All this whilst a mere two days before that we got: “The case has been appealed, and in the time since two federal Courts of Appeals have ruled in separate cases that viewpoint discrimination on government social media pages is illegal.” Even as we see that they are separate issues, the stage of ‘Courts to Government Officials: Stop Censoring on Social Media‘ sets a larger stage and sets the stage where there is a much larger issue not addressed. So as we look at the term ‘viewpoint discrimination’, we see places like Heavy.com who had extremist video (at https://lawlordtobe.com/2016/05/01/homerun-by-ukip/), in May 2016. there in the article ‘Homerun by UKIP‘ I added a link to an ISIS video that remained viewable for well over a year. And that was something that was openly searchable. So at what point will we get a true status change? These places need the clicks to get their cash and many of them will not care how they get their money, their traction, their visibility.

So as we see “The US has reportedly refused to sign up because of concerns about freedom of speech“, we will see these people move to US servers, as there is free speech, as such this entire effort is largely wasted, when the larger players on social media are not willing to play ball, when we see that shifting stories and videos can move location in seconds, we see a gravy train switching tracks again and again, never resolving anything. Yet, they mostly agree on Huawei being a national security threat (without documented evidence), all that whilst the Cisco mess is presently well over 1000% worse (and documented).

This is all about money and it is time that we wake up and realise that as soon as something can be made to currency, it gets free reign. That is the consequence of debts that go into the trillions. And the traditional media only stopped after the outrage, after the cost of publishing started to grow that is when they stopped. In this I have nothing against the actions of Jacinda Ardern, they make perfect sense, but the Intelligence community could have clearly explained the traps of lone wolves, the traps of a media stage that is out of control. It is also nice to note that the presence of Justin Trudeau and President Macron was encouraging (according to Emmanuel Macron), yet these are two politicians with the ratings that are deep into the basement, any positive news that mentions them is political currency for them, so I wonder what their attending stake is in the end.

In this Jacinda Ardern makes one mistake (unintentional). As we see: “Facebook had made a changes to its livestreaming, announced at the same time as the summit, under which the Christchurch terrorist “would not have been able to livestream his act of violence”“, might be true to some point, yet there are so many other streams (like 4Chan), so even as the wave towards a viral video goes down in the reach to maximum (see the Medium article), the moment the links get spread through all media, the race is on and the multimillion views are almost guaranteed, optionally with a few minutes delay from slaughter happening, to slaughter watched. And after the event the world en mass will likely be watching. That is the impact of viral views and the ca$h for those cashing in on the advertisement on those pages. Because as the views go over the millions, the ads will get visibility and the dollars come pouring in stacks of them per tenth of a second. When you realise those numbers, you see the first part in why this is not getting resolved, and the danger merely increases as lone wolves get to make themselves martyrs for a cause they never understood, shouting a name they were never part of giving extremism even more visibility.

Unless you take these glossy propagators of what they call news off the 0% VAT (read: GST, BTW and so on) list, this will merely continue, for the media circulation is everything. Consider that we hear 4 days ago that ISIL was using Instagram to promote jihad and what does the Telegraph do (at https://www.telegraph.co.uk/news/2019/05/11/isil-extremists-using-instagram-promote-jihad-incite-support/), they used the picture of a smiling ISIL fighter as well. I think we can agree that this is like mopping the floor whilst the tap is running at full, we merely shift the mess and never end up with a dry floor.

You merely have to look at the Google failure and search: ‘Abu Bakr Al-Baghdadi‘, he is not a terrorist; he is labelled as a ‘political leader‘. So how exactly will we end up seeing forward momentum, true forward momentum not presented momentum whilst we see that others label terrorists as political leaders. The pledge is worth a mere €0.01 and I think we are all still getting screwed on the deal at that price.

 

Leave a comment

Filed under IT, Law, Media, Military, Politics

Facebook Folly and 5G

There was an article in the Guardian last Thursday. I had initially ignored it for all the usual reasons, yet when I sat down this morning, there was something that made me take another look and the article is actually a lot more important than most people would think. The article (at https://www.theguardian.com/technology/2019/jan/31/apple-facebook-campus-permissions-revoked-teens-access-data-iphone-app) named ‘Apple leaves Facebook offices in disarray after revoking app permissions‘ shows a different side that goes a lot further than merely Facebook. We see this with: “We designed our Enterprise Developer Program solely for the internal distribution of apps within an organisation. Facebook has been using their membership to distribute a data-collecting app to consumers, which is a clear breach of their agreement with Apple”, this statement alone shows the failing of their legal department, as well as their senior board that works under the strict sense of assumptions. We see this not merely with ‘Facebook had allegedly exploited a loophole in Apple’s approval system to bypass rules that banned the harvesting of data about what apps are installed on a user’s phone.‘ We see another level when we reconsider “Facebook Research, an app the company paid users as young as 13 to install that routed their iPhone traffic through the company’s own servers“. This is not merely about hijacking data; it is about the fact that both the IOS and Android paths are a little too transparent. Academically speaking it would be possible for Apple to distribute a similar app guiding Android people to the IOS data path.

The fact that we now see that others are affected through: “According to an internal memo, obtained by Business Insider, apps including Ride, which lets employees take shuttles between buildings on the company’s sprawling campus, and Mobile Home, an employee information portal, were down“. And it is not merely the Guardian, the Apple Insider gives us: “A report from December claimed Facebook had made special data sharing arrangements with other tech companies, enabling Facebook to collect more data on its users generated on Apple devices, without either Apple or the users’ permission or knowledge.” This now gives the setting that Facebook is getting desperate, when any company needs to rely on Data snooping to keep their momentum up that is the moment we see that any tower, data based or not will fall over.

Part of that came from an article last December giving us: “A damning report on Tuesday provides further details on Facebook’s shady data sharing practices, already under intense scrutiny for the Cambridge Analytica fiasco, suggesting the social media giant enabled Apple devices to surreptitiously collect information about users without their — or apparently Apple’s — knowledge” and the nightmare scenario is not merely that Facebook is gathering data, it is the ‘data sharing‘ part and more important, who it is shared with. This has over the last two months changed my position from waiting what is actually afoot into investigation into actively prosecute Facebook for their actions.

I am certain that the prosecution goes nowhere, mainly because the legal departments allowed for the loopholes to get into position in the first place. It enables the train of thought on how involved Apple was in all that. That train of thought continues when we revisit the Apple Insider quote: “It was revealed yesterday Facebook paid users $20 to sideload a VPN onto their devices, allowing the social network to monitor what participants aged 17 to 35 did online. Claimed to be a “social media research study,” the Facebook Research iOS app took advantage of Apple’s Enterprise Developer Certificates to allow the apps to be distributed separately from the main App Store, as well as effectively providing root access to a user’s device.” In all this the legal teams did not consider the usage and installation of linked VPN applications? Is that not weird?

Bloomberg is trying to water down the event with “Facebook seems clearly to have earned its latest privacy black eye, but it’s important not to overstate what’s going on here. This is essentially a contract dispute“, is it? It seems that the users are victims of deceptive conduct; it seems to me that root access clearly implies that all data and content of the mobile device was made available to Facebook, was that ever clearly communicated to the users installing that?

It is my sincere belief that this was never ever done. So as Bloomberg in trying to add more water to the wine with “Apple’s concern about it’s “users and their data” might well be sincere, but this particular dispute isn’t about the fact that Facebook collected user data; it’s about the way that Facebook collected user data.” Here we see more than merely deceptive conduct, or to use the quote: “I’m not suggesting that what Facebook has done isn’t serious. But neither is it the end of user privacy as we know it“. You see, when you had over root access it means that you had over everything and at that point you have revoked your own right to privacy. And at the top of the watering down of wine, making it impossible to distinguish between the taste of either we see: “But users seemed to know what they were getting into — and were also paid for the privilege“, likely to be Bloomberg foulest statement of the day. Not only do they knowingly hide behind ‘seemingly’ they know for certain that no one will ever knowingly and willingly hand over root access to an unknown third party. It also tends to introduce security flaws to any phone it was installed to, when exactly were the users informed of that part?

So whilst we get another version of: “Twenty dollars per month might not sound like a lot to, say, the typical Bloomberg reader. So imagine Facebook instead had promised one free local Uber ride per month” you all seemingly forget about the international community, who like all others will never get to cash in on those events, or paid responses or alleged dollars for donuts deals. That becomes for the most direct profit for Facebook, access without a fee, how many of those people were part of that event?

Cnet phrases it a lot better with: “I think it’s highly unlikely that the vast majority of the people who went through this whole process really knew the kind of power they were giving Facebook when they clicked OK to install this (app),“, which we see (at https://www.cnet.com/news/facebook-shuts-down-ios-research-app-it-used-to-access-user-data/) by Bennett Cyphers, a staff technologist for the Electronic Frontier Foundation.

And that is not the only part, not when we enlarge the circle. Two days ago, my predictions become fact after the Sydney Morning Herald gives us: ‘Optus concedes 5G service without best technology after Huawei ban‘, which is awesome, as the IP I came up with does not affect either and allows for Global Huawei (or Google) continued growth. So as we are treated to: “”From a pure technology perspective, Huawei is probably ahead of the other three “Mr Lew said after Optus unveiled plans for a $70-a-month unlimited service with guaranteed minimum speeds of 50Mbps. “But what we’ve got from the other suppliers will enable us to provide a globally competitive service.”” This is actually a lot more important than you think, when mobile app users seek the fastest solution, the more bang per gigabyte, the Huawei solution was essential in all this. So as Optus chief executive Allen Lew now concedes that those not using Huawei technology will be second best in the game at best, my solution will set a new level of e-commerce and information on a global scale and all I asked for was $25M upfront and 10% of the patents, the rest was for Google (or Huawei). It is a great deal for them and a really nice deal for me to, a win-win-win, because the consumer and SMB communities will equally profit. I merely circumvented paths that were not strictly legally required; merely a second tier to equal the first tier and when the speed map drives us forward, the players using second rate materials will end up losing customers like nothing they have ever seen. It’s good to use political short sighted policies against them. So whilst the world is listening on how Apple and Facebook values are affected, no one is properly looking on how Huawei and Google have a much clearer playing field on how 5G can be innovated for the consumers and small businesses. It will be on them to restart economies and they will. They are moving from ‘Wherever the consumer is‘ to ‘Whenever the consumer wants it‘, the systems are there and ready to be switched on, which will be disastrous for many wannabe 5G players. I am giving a speculative part now. I predict that Huawei holding players will be able to gain speed over all others by 0.01% a day when they go life. This implies that within 6 months after going life they can facilitate 2% better than the others and within a year is double that. These are numbers that matter, because that means that the businesses depending on speed will vacate to the better provider a hell of a lot faster than with other players. This effect will be seen especially in the Middle East and Europe. And before you start screaming ‘Huawei’ and ‘security threat’ consider that the entire Facebook mess was happening under the noses of that so called cyber aware place America. It happened under their noses and they were seemingly unaware (for the longest of time), so as security threats go, they are more clueless than most others at present. It boils down to the boy howling Huawei, whilst his sheep are getting eaten by fellow shepherds, that is what is at stake and it shows just how delusional the Huawei accusations have been form many nations. How many of them were aware of the Facebook data syphoning actions?

This gives us the final part where we see the growth of Huawei as we see ‘Saudi-based Telco opens joint ICT Academy with Huawei‘, you might not find it distinct and that is fine, yet this is the same path Cisco took a decade ago to grow the size it has now and it was an excellent example for Huawei to adopt. The middle East is the global 5G growth center and with Qatar 2022 introducing maximised 5G events, we will see that Huawei took the better path, feel free to disagree and rely on AT&T and their 5G Evolution, yet when you learn the hard way that it is merely 4G LTE and now that we also see that ‘Verizon likely halting its ‘5G Home’ service roll-out after test cities, waiting for 5G hardware to actually exist‘, we see the events come into play as I have said it would, America is lagging and it is now likely to lag between 12 and 18 months at the very least, so whilst the world is starting their 5G solutions, America gets to watch from the sidelines, how sad it all is, but then they could still intervene into the Facebook events. They are not likely to do so as they do not see that as a ‘security threat‘. So as we are given: “As reported by VentureBeat, Verizon has detailed that it won’t have true 5G hardware for its 5G Home service ready until later this year. That means expansion to more markets beyond Indianapolis, Los Angeles, Sacramento, and Houston won’t be likely until the second half of 2019“, how many people have figured out that ‘expansion to more markets beyond Indianapolis, Los Angeles, Sacramento, and Houston‘ implies the largest part of the USA and they are not up for anything before 2020 (and that is me being optimistic).

It is he direct impact of a stupid policy, which in the end was not policy at all, it was merely stupid and we all get to witness the impact and the carefully phrased political denials linked to all that; funny how evidence can be used to sink a politician.

This reminds me of my blog of August 2018 (at https://lawlordtobe.com/2018/08/23/liberalism-overboard/) where I opened the premise of “the topic would be ‘How to assassinate a politician‘“, I should sell it to Alibaba Pictures or Netflix, it could be my Oscar moment (and cash in the wallet). So, it is true, political folly is good for the wallet, who would have thunk it?

 

1 Comment

Filed under Finance, Law, Media, Politics, Science

Does smoke mean fire?

We have all heard the expression before: ‘Where there is smoke, there is fire‘, yet what happens when no fire is found, what happens when certain involved parties are all combined in the need for deception?

That is the question; it is not a direct accusation, as I am not aware of all the facts. I am merely in possession of a whole heap of doubt. The latest is given with: “On Thursday, communications giant Vodafone said it is pausing the deployment of new Huawei equipment in its core networks across the globe. The core networks are particularly sensitive as if they are compromised, mass spying can be conducted across them“, the operative part is ‘if they are compromised‘, there is no evidence, there is no case, it is merely Vodafone sucking the proverbial addendum of America. This comes with the addition of “the University of California at Berkeley and UC San Diego — are removing Huawei equipment and shunning its cash. They apparently don’t want to lose funding under the terms of last year’s National Defense Authorization Act (NDAA), which banned federal funding recipients from using certain products and services“. The mess is increasing and the whole fiasco is all connected to the fact that there is no evidence. At least with Alex Younger (MI6), the premise was that no government should be allowed to be in an optional point of weakness through foreign technology. I do not believe that was the cleverest step to make, but we can argue that it should be seen as a valid national reason, which is fair enough.

There is of course concern in opposition and the Guardian gives is (at https://www.theguardian.com/technology/2019/jan/27/huaweis-problems-deepen-as-western-suspicions-mount) with: “Critics say Huawei’s rapid expansion is suspicious. Founded in 1987 and focused on selling telecom equipment in rural areas of China, it has grown into the world’s largest supplier of telecoms equipment and second largest smartphone maker. It operates in more than 170 countries, employing about 180,000 people“. OK, I am willing to give that thought, because there is suspicion on that level, yet there is also Facebook, it grew to a multibillion dollar behemoth in less than a decade. At least with technology there are supporting investors when they comprehend the technology and it has been clear in the last 10 years that Huawei was ahead of the curve. My initial assessment in 2014 was that Huawei would soon have at least 20% of the mobile market. I was laughed at by several people, now when I remember them of their short sightedness, they seem to react in denial with statements like ‘I don’t know what you mean‘ and ‘Well, you should have communicated it better‘. Although I did state that Huawei will soon have well over 20% of the mobile market‘ seems to have been clear enough. Now they surpass that with a comfortable distance, and they are not done growing. When I initially discussed my $2B IP idea there were only two players. Google and Huawei, now my benefit to only consider Huawei will have a few more tactical benefits as well as leaving me with a larger slice of that cake which I find appealing as well. that is beside the point of me sticking it to Microsoft and Apple to show them how stupid their path of iterative technology was, in addition, if Huawei pulls it off, it will create a very new cloud technology based growth system. they will do so because all these jokers who are hiding behind ‘security concerns‘ will soon learn that evidence is still adamant and the people are finding out that getting sold short for the benefit of specific Telecom operators come with a massive price tag.

So I found a way around it and create a second system that avoids them altogether, that also means that these players will lost on terabytes of data per day making their losses increasingly uncomfortable. I do have an issue with the quote: “Ren went on a media blitz, breaking years of silence to say the company has never engaged in espionage on behalf of Beijing. “China’s ministry of foreign affairs has officially clarified that no law in China requires any company to install mandatory back doors. Huawei and me personally have never received any request from any government to provide improper information,” he said” I have no doubt that Ren Zhengfei is speaking the truth, yet I am also aware that someone like Chen Wenqing will never knock on the door of Ren Zhengfei, he will find a way around it and get what he needs in another way. By the way that same picture applies to Gina Cheri Haspel and General Paul Nakasone and their links to Microsoft, IBM, Facebook and Apple. You better believe that they are very much on the same page when it comes to their national security, your rights be damned (when National security is discussed).

So let’s not have that pot, kettle and black conversation, shall we?

Then we get to the trade secret part of it all. Oh, and before you get any crazy idea’s. Perhaps you have heard of how in the mid 60’s Israel, through Mossad acquired (read borrowed) the blueprints from the French and when the ban for Israel was clear, they producing an uncanny identical likeness of the Mirage 5, I believe it was called the Nesher, with technical specifications for several main parts to be as perfectly identical as a fingerprint. We were not really that surprised when it happened, yet what was less known was that some documents in the mid 90’s implied that the CIA was very aware of it all before the operation was completed, which shines a light on their need of what they regard to be a trade secret.

This part is important when we realise that the accusation reads: ‘conspiring to steal trade secrets from T-Mobile US Inc.‘. The question is: ‘What Trade Secrets?‘ You see Huawei is a lot more advanced than T-Mobile. Perhaps it is what BGR Media LLC claimed with: “unscrupulous T-Mobile sales reps lie to customers and open lines on their accounts without permission, all to meet unrealistic sales goals“, which is interesting as this is not a think Huawei does, they merely sell hardware and services to companies, not to individuals. Or perhaps the EFF (Electronic Frontier Foundation) findings with: ‘EFF Confirms: T-Mobile’s Binge on Optimization is Just Throttling, Applies Indiscriminately to All Video‘, so how is any of that interesting to Huawei? So what exactly is the formal brief for the case? You see, the media does not divulge that, they give us all the innuendo but not the facts. And when it comes to the accusation ”Huawei used a Hong Kong shell company called Skycom to sell equipment in violation of the US sanctions in Iran“, which might hold water (I actually do not know), yet if the US is unwilling to set that stage by “The U.S. has agreed to let eight countries — including Japan, India and South Korea” to let the Iran sanctions be waived, why are they so specific? Is it merely because their financial and economic setting demands it? How is that proper sanctioning? All that, whilst the media at large is not making any mention of the other 5, we need to see that the entire Iran Sanction is to be seen as a cloak of corruption, if that was not allowed, the oil price would suddenly soar and at that point the US economy would be in deep drenching goo, is that not an interesting side as well? Or perhaps a better clue on how Cisco, Sun and HP equipment makes it to Iran without any hassle, an event that has been going on since 2012, so in all this, the entire Huawei discrimination debacle reads like a joke.

to be quite honest, if there was an actual security issue, I would go after Huawei without a moment’s hesitation, I know I can best Director Igor Kostyukov (GRU), yet going after Chen Wenqing, a man who eats, dreams and lives by the Art of War and optionally one of the few people on the planet whose eyes have seen the actual original version, he would be a lovely challenge for the likes of me. I am no Steinitz, Karpov, Kasparov or Carlsen, but I could be a crazy Bobby Fischer, he’ll never see me coming! (OK, that was my ego talking for a second).

You see, I look beyond the data, beyond what people and politicians hide behind and the entire Huawei mess is a political play of nepotism and fear, because those getting momentum in 5G will set the pace and win the race, that is what America fears it was that simple all along. That truth is easily found, the orchestration (read: rigging) of what would be global 5G rules and the FCC of setting a different stage, the non-accountability of AT&T in all this and that list is growing almost on a daily basis, it gets to be more interesting now that the Democrats from the “Leaders of the House Energy and Commerce Committee sent a letter to the Federal Communications Commission today demanding information concerning possible coordination between FCC officials and carriers in an ongoing legal fight” (source: the Verge) and a few more like them. In the last 15 days we have seen more orchestration and the setting of the stage with specific judges, to get a more appealing situation, when we see that part, we see that the technology gap in America is a lot larger than we think and it is setting the stage of fear against an advanced players like Huawei on an almost exponential growing path. America has seemingly no other optional left. That is why I saw from the beginning that places like Saudi Arabia could fuel exponential growth in 5G and making Huawei larger by the day. It also fuels the growth path back to Europe, because the moment Huawei proves that they have the good stuff, the EU will chose profit over short sighted American policies, because those policies do not pay the bills, profit does and the EU is desperate for any profit it can get.

Consider the billions of value of those networks and the billions of revenue that these networks make in addition through information, advertisement and data collection. America is starting to lose out because they were asleep at the wheel for close to 3 years, it is enough to miss out on an entire technology generation. That is the danger that iterative technology brings. For now I merely wonder what Google can do to stay ahead of it all, because their lives depend on the technologies that Huawei has, when Google search becomes less and less at the point of the spear, merely to be laughingly called Bing v2.1, how do you think Google will react? They optionally have the path to equal Huawei in a new network facilitating stream giving them additional revenue in a new dimension. We might initially think Saudi Arabia and Neom city in the pilot stage, yet that could so one thereafter evolve towards London, Paris and other places to grow strong and fast, because in the end all these policies sound nice, but they all forget the number one clause required. It all requires users and that is the part both Google and Huawei figured out a decade before the sheep (read: IBM and Microsoft) started to get a proper clue.

Too many intelligence wannabe’s focussed on Mark Lowenthal’s Intelligence: From Secrets to Policy, which is an awesome book, and when you consider the simple: “on how the intelligence community’s history, structure, procedures, and functions affect policy decisions“, which is also an absolute truth, yet behind what you would like to have, these people all forgot about the consumers and what they demanded to be their right, that is where their gravy train became another Titanic and the greed driven path went not by one iceberg, but it steered towards one every other hour making it a wreck in the making, the entire 5G debacle in the US is no difference in that regard and I will be around to laugh at those in denial thinking and parroting ‘security concern‘ on all the media without any proper cause or evidence to show for it. Oh, and I am not the only one, a whole score of cyber experts are on that same path, so I am not alone in seeing through the media stupidity, merely seeing on how much bigger experts like me are totally ignored on several levels giving merely the rise and early expectation to someone screaming in some policy department ‘Iceberg dead ahead‘, whilst none of them are qualified or sanctioned to alter course, going straight for the natural Whiskey coolant.

Life can be exceedingly entertaining at time, but for all the tea (and Huawei mobiles) in China, I never expected them to be this hilarious. Sometimes smoke is not fire, it is the steam of a ship striking an iceberg and going down. For those on that ship do not worry, the direct path to land is only 3800 meters away (straight down).

 

Leave a comment

Filed under Finance, IT, Law, Media, Military, Politics, Science

When inability drives fear

It is a dangerous place to be in. We all have been there and in most cases it is as innocent as it could ever be. You see, sometimes life throws you a curveball. Gamers tend to identify it most easily. In my particular case it was a game called Magic Carpet. It was a Bullfrog game and I was testing it on the PC. It played magnificently there, and soon thereafter I also tested it on the very first PlayStation. There, because of the controller it was good, but not great. Still, it was fun to play and I tended (in those early years) to really get into a game, so when the situation blew into my face, I got a little frustrated. The next two times were worse and the last time (on that day) I went slightly angry (with myself) and I kicked the door. The issue was not the door, it was my steel tipped boot and I went straight through the door, so, I was not merely ticked off, I had a hole in the door (which would require funds to repair) and the boss in Magic Carpet was still alive. We all have had these moments. Our car, our bike, the TV, things go wobbly on you and we sometimes react wrongly to this situation and in light of that get to reflect on our own ego’s a little.

These are the images going through me when I was confronted to new information when looking at the unrealistic response by America (and Australia) to Huawei. In the case of Australia it seemed the mere application of greed and fear as politicians cater to the greed of a large telecom company, which was not seemingly the case with America. Yet that tip was raised for me less than 24 hours ago. The article (at https://foreignpolicy.com/2018/08/15/botched-cia-communications-system-helped-blow-cover-chinese-agents-intelligence/), shows how the CIA got their own systems handed to them through ego and what I would regard as stupidity. The initial headline ‘The number of informants executed in the debacle is higher than initially thought‘ is rather unsettling. It gets to be worse with “The CIA had imported the system from its Middle East operations, where the online environment was considerably less hazardous, and apparently underestimated China’s ability to penetrate it. “The attitude was that we’ve got this, we’re untouchable,” said one of the officials who, like the others, declined to be named discussing sensitive information. The former official described the attitude of those in the agency who worked on China at the time as “invincible.” Other factors played a role as well, including China’s alleged recruitment of former CIA officer Jerry Chun Shing Lee around the same time.” This is the most dangerous of settings. The wrongful setting comes straight from Sun Tsu where we learn that all war is based on deception. China is not some place that is tinkering at the side of the road, the Art of War COMES FROM CHINA! It gets to be worse when you consider that that book was written long before Americans had adopted proper reading and writing skills, close to 1200 years before that, so that was their first error.

When we see: “But the penetration of the communication system seems to account for the speed and accuracy with which Chinese authorities moved against the CIA’s China-based assets. “You could tell the Chinese weren’t guessing. The Ministry of State Security [which handles both foreign intelligence and domestic security] were always pulling in the right people,” one of the officials said. “When things started going bad, they went bad fast.”“. The entire matter seems to be exponentially wrong. The big issue is not on how it was cracked, or even if it was cracked. My issue had been (for a much longer time now) that for too long, the deciding voices, all listening to some CTO, often with multiple sides lacking wisdom that the setting was not merely that there was ‘a security risk’, there was for the longer time a much larger security flaw. For much too long a time, we got the ‘slides of wisdom’ on how data in transit tends to be safe and data at rest tended to be in danger. Even when I started my CCNA, the amount of knowledge given in the Cisco books gave the rise to the consideration that data in transit is not merely as vulnerable, it was that a lot more could be done unnoticed (not merely by the Chinese mind you). It was some time before the Sony hack that I expected a setting where the routers themselves might be used against the owner, it went further when we consider Wired in 2013 (at https://www.wired.com/2013/09/nsa-router-hacking/). The headline is not merely ‘NSA laughs at pc’s, prefers hacking routers and switches‘. It is the setting where we see: ““No one updates their routers,” he says. “If you think people are bad about patching Windows and Linux (which they are) then they are … horrible about updating their networking gear because it is too critical, and usually they don’t have redundancy to be able to do it properly.” He also notes that routers don’t have security software that can help detect a breach“. This is where I was in 2011, when I started to comprehend the working of a router and router tables, I figured out that it is not the router they can see that is the problem; it is the one they cannot see. That idea came from a presentation by Thomas Akin, CISSP, Director, Southeast Cybercrime Institute who had a presentation for the Blackhat briefings. The 2002 presentation gave me the idea. You see apart from the lack of security, the +1 hop hack allows form something truly unique. Consider [.MIL Server], that server connects to <secure router 1> and things are set into motion. Now, we cannot direct all the traffic, yet materials from that location to let’s say ‘preferred consultant one‘ will go via certain paths, yet the first router after <secure router 1> tends to be merely one or two routers (depending on traffic) to that preferred consultant. It is easy to find a router that could optionally be a link to these routers and duplicate all packages that go to that specific next step. Not only is the task easily done, the path is not hindered, the router is not intervened with and a simple reset takes away whatever evidence existed in the first place. In addition, the additional part is that the compact flash in those routers is ‘The maximum storage capacity for the CF in Slot0 and Slot1 is 4GB‘, yet the only part here is that you only needed 32 MB, which is what most of us used then, but cards that small are no longer made, so most IT people just plug in what they have. You have well over 3GB of package storage, so all packages to that one location could be stored and redirected on the ‘off’ hours as not to leave any monitored spike. Until the CFlash card is ejected from the router and investigated no one will have a clue. That was 7 years ago and the systems are even more capable now, a 3GB glitch will not register on most systems, especially when those IT people do not block Spotify and/or YouTube. By the time they figured it out, the setting is already wiped, and this path can be adjusted on a daily bases so that most IT networkers never had a clue in the first place.

You think that I am alone in this, that I am this clever? No, I am not! There are plenty of IT Networkers running circles around me and that is now set into the stage of ‘we’re untouchable‘. The CIA was never that, they never needed to be touched, the opponent merely needed a clear line of sight to the router that is one skip from the secure router that they needed to get to. We see more in the Foreign Policy article with the quotes “Information about sources is so highly compartmentalized that Lee would not have known their identities. That fact and others reinforced the theory that China had managed to eavesdrop on the communications between agents and their CIA handlers” and “an encrypted digital program, allows for remote communication between an intelligence officer and a source, but it is also separated from the main communications system used with vetted sources, reducing the risk if an asset goes bad“. Now we merely add “But the CIA’s interim system contained a technical error: It connected back architecturally to the CIA’s main covert communications platform. When the compromise was suspected, the FBI and NSA both ran “penetration tests” to determine the security of the interim system. They found that cyber experts with access to the interim system could also access the broader covert communications system the agency was using to interact with its vetted sources, according to the former officials“. I believe it goes further than that. If we see the entire layer process and consider that in the end, certain systems merely replicate a process. Cisco (at https://www.cisco.com/c/en/us/support/docs/lan-switching/8021q/17056-741-4.html) gives us: “A device can determine which VLAN the traffic belongs to by its VLAN identifier. The VLAN identifier is a tag that is encapsulated with the data. ISL and 802.1Q are two types of encapsulation that are used to carry data from multiple VLANs over trunk links”, as well as “The DA field of the ISL packet is a 40-bit destination address. This address is a multicast address and is set at “0x01-00-0C-00-00” or “0x03-00-0c-00-00”. The first 40 bits of the DA field signal the receiver that the packet is in ISL format“, so as the destination was known, the people needing this could search very specifically. When we consider ‘It connected back architecturally to the CIA’s main covert communications platform‘, the connection back would enable those seeking to find the needed value of the DA field. That does not merely impede the CIA, it stands to reason that to some degree the NSA would be just as vulnerable.

The main course

In my case, I tend to go for the Bambi burger, ideally I watch Bambi whilst having that lovely slice of venison. You see when we get to “As part of China’s Great Firewall, internet traffic there is watched closely, and unusual patterns are flagged. Even in 2010, online anonymity of any kind was proving increasingly difficult. Once Chinese intelligence obtained access to the interim communications system,­ penetrating the main system would have been relatively straightforward, according to the former intelligence officials. The window between the two systems may have only been open for a few months before the gap was closed, but the Chinese broke in during this period of vulnerability“, I believe the setting is worse than that. These players still require their consultants. It does not matter whether you call them construction workers, members of Blackwater, Xe Services, or Academi. It is those places as well as Booz Allan Hamilton and other providers that still require to be informed, and that is where the interception could start. The setting is not ‘the Chinese broke in during this period of vulnerability‘, it is the long term flags that they were able to test at this point and that is the fear we see with their setting of Huawei and partners. Not that Huawei is the danger, but the fact that Chinese intelligence is just as able to get into nearly all systems, it merely can get into Chinese systems faster (for now). This is where it gets a little more complicated, because it is not about the now, it is about tomorrow and the tomorrows that are coming. The only ones who have a chance of getting things done are players like the Constellis Group and Palantir when they unite abilities. It is going to be about data and about the ability to forecast how traffic goes. Thomas Akin was teaching this wisdom 16 years ago. We see this when we are made to realise

  • Live system data is the most valuable.
  • Immediate shutdown destroys all of this data.
  • Investigators must recover live data for analysis.

And the loss is merely a reset away, in most cases if there is an automatic reset; the only data available is the last transgression at best. With the coming of 5G live real-time capturing data streams is what is more likely to set the stage of finding out what happened, in this the entire setting of ‘China’s Great Firewall‘, we are already looking at outdated Chinese technology and I do believe that those behind the article, as well as some DARPA people are aware of that. America and Europe are behind in ways that we cannot even perceive, because the players that need to move forward are doing so iteratively, that whilst the time of reengineering is now merely 10% of what the development time was. We see this with “Call this the IBM problem, which faced an existential threat as soon as Asian groups started churning out cheap PCs in the 1990s. But here IBM also provides a few tips to the future, with its pivot to software and solutions. By the time of IBM’s iconic “solutions for a small planet” ad campaign in 1996, the company was trumpeting voice recognition and ecommerce — producing the sort of digital enterprise backbone that ended up helping develop the internet economy” (source: Australian Financial Review). In the first instance the Asian market required 10-15 years to catch up, the second time around it took 2-3 years and now with Google and Apple working globally, it takes months. IBM (others too) took iterative steps to maximise the economic footprint, instead of truly leaping forward whenever possible, they lost the advantage and are now trailing the markets. Huawei is one clear example where the American market was surpassed. Samsung showed its supremacy by having 5G home routers ahead of everyone else and the advantage in Asia is only growing. It is seen with “Alternatively, authorities might have identified the system through a pattern analysis of suspicious online activities. China was so determined to crack the system that it had set up a special task force composed of members of the Ministry of State Security and the Chinese military’s signals directorate (roughly equivalent to the NSA), one former official said“. I do not read this part in the same way. I believe that with ‘set up a special task force composed of members of the Ministry of State Security‘, was not about cracking. I personally believe that the Cisco books were so illuminating that they decided to change the setting in their own game. I believe that the Chinese now have a more advanced system. They have done what players like Cisco should have done before 2014 and they did not. I believe that when we see a partnership between Constellis and Palantir, their findings will bear that out with in addition an optional link that shows part of the accusation that China let Russia in on certain findings (and the Russian evolution of certain networking devices). This and the next part is largely speculative, but it is supported to some extent. We see this in: “Once one person was identified as a CIA asset, Chinese intelligence could then track the agent’s meetings with handlers and unravel the entire network. (Some CIA assets whose identities became known to the Ministry of State Security were not active users of the communications system, the sources said.)“. I believe that he part given in ‘not active users of the communications system‘ gives us the third part. I believe that the system was not merely invaded. There is every chance that certain systems when activated also leave tags behind and that is where the intrusion would have paid off. You see, in the Cisco setting (as an example), the data frame has an optional 60 bytes of extension headers, yet is that always empty? More important, when were these data packages truly thoroughly checked? In this speculative setting I take you to the movie Die Hard 2. In that movie we see on how someone decided to get clever and uses the outer marker beacon to warn the planes that were in danger. The beacon can be used in other ways than merely give a beep. I believe that Cisco data packages have other optional parts than can be ‘reused’ to do something different, like the optional headers. They are to most merely empty pre-set ‘spaces’, but they could have more. That is the setting that America faces and the fact that they could get overwhelmed by Chinese intelligence because they did not rely on iterative parts. Huawei had been leaping forward, for example now offering a 128GB Android 8.1 phone (the Huawei nova 3i 128GB Handset), for 50% less than its competitors. A system that is just as advanced as anything Apple and Samsung offer; at merely half the price whilst Chinese Intelligence has been digging into that device for months, unlike the NSA that needs to queue up with all the other users to get to look at the Pixel 3 and the iPhone 8 on launch day. That is the setting we seem to be seeing and America is indeed and rightfully worried, not because Huawei has backdoors (which I never really believed) but because the players here had been held backwards through iterative technology. Apple is actually staged by Forbes that way with the quote ‘a minor point update for the iOS 11.1 iteration‘, even Forbes speaks about iterative changes. That is the setting that they are up against and they have been surpassed for years and with Huawei leading the 5G stage on a global setting the US authorities are merely getting more and more afraid that not only are they no longer the leading players, they are now sidelined by not being able to keep up with what will be presented ‘tomorrow’.

That part can be supported through the CIA with analyses reports (at https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol49no3/html_files/Collection_Analysis_Iraq_5.htm), in here we see that Richard Kerr, Thomas Wolfe, Rebecca Donegan, and Aris Pappas give us (in a different context): “The analysis on this issue by the Intelligence Community clearly was wide of the mark. That analysis relied heavily on old information acquired largely before late 1998 and was strongly influenced by untested, long-held assumptions. Moreover, the analytic judgments rested almost solely on technical analysis, which has a natural tendency to put bits and pieces together as evidence of coherent programs and to equate programs to capabilities. As a result the analysis, although understandable and explainable, arrived at conclusions that were seriously flawed, misleading, and even wrong“. It is important to realise that this was on the WMD setting, so in a different context and on a different setting. Yet the information systems were all designed to upholster that flaw to an ‘evolved’ placement, the systems in their entirety are nowhere near ready, now even for the previous setting. The movement from a lot of staff to more fruitful consultant settings is now paying off in a negative way for the CIA (and the NSA too). This is where it gets interesting. You see, the previous setting that I gave should partially have been dealt with through the flashlight program that DARPA has. Raytheon BBN is working on that with Professor Richard Guidorizzi from George Mason University Fairfax. I think that the system is not entirely ready here, not if the packages can be duplicated via the router and as long as the original is not touched, that system will not get the alert lights ringing.

To get you on board on how far all the NATO partners are behind, let me give you two settings. The first is a DARPA Project called ‘Probabilistic Programming for Advancing Machine Learning (PPAML)‘, the man in charge is Dr. Suresh Jagannathan, yet the bigger brain might be MIT graduate Dr. Jennifer Roberts. The given setting is “Probabilistic programming is a new programming paradigm for managing uncertain information. Using probabilistic programming languages, PPAML seeks to greatly increase the number of people who can successfully build machine learning applications and make machine learning experts radically more effective“, whilst we also see the goods in the DARPA article by Dr Roberts with “If successful, PPAML could help revolutionize machine learning capabilities in fields from Intelligence, Surveillance and Reconnaissance (ISR) and Natural Language Processing (NLP) to predictive analytics and cybersecurity“, this is certainly leaping forward, but it is still based on a system. I believe that the Chinese decided to turn the funnel upside down. To illustrate this I need to get you to an app called Inke. The article (at https://thenextweb.com/contributors/2018/02/09/hidden-world-chinese-livestreaming-app-inke/), gives us ‘The hidden world of Chinese livestreaming app Inke‘, this is not a few people; this is a craze that has already infected millions upon millions. So with “he was actually doing a livestream, an extremely popular hobby for young people in China. China is way ahead of the rest of the world when it comes to embracing livestreams.” you are missing out and missing out by a lot. These streams are real-time and often geo-tagged. I believe that the Chinese have changed the setting, they are optionally collecting Terabytes of daily data and they are converting that to actionable intelligence. Facial recognitions in phones, geo-tagged and all uploaded and streamed, all converted on the spot, like the SETI screensaver, millions of affordable mobiles (this is where the Huawei nova 3i 128GB Handset and all other new handsets come in), parsing all that data into uploaded files and Chinese intelligence gets global information close to real time, whilst their learning machines are about efficiencies of collected data, it is not about the better application by making them more effective, it is about the massive amounts of data offered to get the systems to upgrade the efficiency of parsing data, because parsing data is where the bottleneck will be in 5G and they already have a larger advantage.

In the meantime, on any given day thousands of Inke users are filming life around them in malls and famous places looking awesome doing it. Yet, if you look at the CCTV settings, how many users would have passed 935 Pennsylvania Avenue, Washington DC, or at London SE1 9EL, UK walking towards London Bridge? How many people were merely assuming that they were tourists face timing with mom and dad? Are you getting that picture now? and also realise that Inke is merely one of more than 300 live streaming companies, all capturing that data all those tags that a smartphone allows it to capture and at the top of all this, Facebook and YouTube are eagerly pushing people to gain following by doing just that. So how long until the user realises that uploading the same stream to 2-3 providers gets them to gain a lot more following and optionally cash? Yes, the intelligence community is that far behind at present. So when we are worrying on “The system was not designed to withstand the scrutiny of a place like China, where the CIA faced a highly sophisticated intelligence service and a completely different online environment“, we need to consider that China is already ahead of the game and the CIA systems might be merely an option to scrutinise their own data, because that remains the Chinese bottleneck, the data will require verification and that is the one field where their opposition could gain the advantage if they set their minds to a different algorithm, one on reliability, not on likelihood. It is a setting where all the players involved have a second tier of consideration. They embrace a ‘not now, but soon‘ thought, when ‘I needed this yesterday‘ is the proper setting as I personally see it, because data without proper vetting is merely used space on any given storage device.

That final part can be considered when we look at the linked article that NBC had from last January. There we see: “When agents searched Lee’s hotel rooms in 2012, they found notebooks with the names of covert CIA sources, according to court documents. But not all of the agent arrests and deaths could be linked to information possessed by Lee, who left the CIA in 2007“, an issue I mentioned in an earlier blog. We get there when we consider his actions and ‘found notebooks with the names of covert CIA sources‘, do you think that anyone, especially in this setting would be that stupid? It’s like keeping the condom as a trophy after having intercourse, its useless and stupid. I believe that either it is not the ‘covcom’ system, or not merely the ‘covcom’ system. I believe that (if it is all correct) that Chinese intelligence got in further and deeper into acquiring the data required and the notebook is the proverbial red herring in all this, especially as Jerry Chun Shing Lee left the CIA in 2007. You do not hold on to that level of information 11 years after you might have had some level of valid reasons to have it in the first place. That is the part many overlooked, or looked away from.

In the end, I do believe that it is not merely the inability that drove the anti-Huawei waves, it is the fact that those decision makers have no idea where to navigate towards next is what drives their fears almost exponentially.

 

Leave a comment

Filed under IT, Military, Politics, Science

The academic colour

This goes back to me having a very young age and in those days we had a saying in chess: ‘white begins and black wins‘. It had nothing to do with race, it was that those in reaction have a benefit; we can play whilst considering in response what the opponent is doing. It is a mere tactic, some you win, some you lose, yet overall, I still believe that the one moving first is out on a limb until the game unfolds and as long as the player using black comprehends the moves that are set, that player has an advantage, the size of that advantage is how quickly white picks up on the countermoves by black.

Yet, I made the race connection and here it is: ‘Trump administration moves to rescind Obama-era guidance on race in admissions‘, the Washington Post headline (at https://www.washingtonpost.com/local/education/trump-administration-moves-to-rescind-obama-era-guidance-on-race-in-admissions/2018/07/03/78210e9e-7ed8-11e8-bb6b-c1cb691f1402_story.html) gives us a dangerous setting. The issue is the reasoning behind it is what matters. The quote starts us with: “rescind Obama-era guidance to colleges and universities on how they can use race in admissions decisions to promote diversity, according to an administration official“, yet I am not certain whether that is a good setting. You see I have had my share of tertiary education. I was lucky to some extent and I finished with three post graduate degrees, one a Master. I have lived in many places where diversity was the cornerstone of education and I expected that to be the norm, yet we all know that it is not.

If we look at the Pre-Obama era and take the sport players out of the consideration (Football and Basketball), the racial diversity is pretty much non-existent as I see it. Even now, if we look at American education and we take the top 30% we get a really skewed view of ‘educated Americans‘ it is seen even better when we look at the census. We see (at https://www.census.gov/prod/99pubs/99statab/sec04.pdf), the fact of educated people, and even if we realise that the percentages are all going up, the setting that in 1998 that 80% of those with high school were white and merely 50% was black, that is a number that matters, in a diversity given setting, they should be a lot closer together, not 30% apart. The Hispanic community is much closer to the white one, yet still trailing. When we look at the next step, those with 4 years (or more) of college, we see that Caucasians lead with 25%, that against Hispanics at roughly 12% and blacks at 10%, that is a problem, there is no level of equality. Any civilisation that truly embraces diversity and equality can see that these numbers are just wrong, and as such changes, many large changes are essential. Now, we can argue with the Obama setting, or find a way to improve it, not rescind it.

There is another setting that we see (at https://www.census.gov/content/dam/Census/library/publications/2016/demo/p20-578.pdf). It makes no sense to completely chew the report and mull over the entire spectre of data, yet the one that lighted up were those with advanced degrees. 8.2% Black and 12.1 were Caucasian, what was interesting that the Asian group is 21.4% surpassing all others. There is a change and we need to earn what that is, because here we have a shift in success. The numbers seem to add up more evenly (after 20 years) between black and white, yet the shift starts from Associate degree and later, that is where we see the numbers drop. Yet in all, how was this weighted? You see, the counts give us White with 168,420, Black with 25,420, and Asian with 12,331, so a setting so uneven is unsettling, because this implies that if there is weighting that it is too unbalanced. That issues grows even further when we see (at https://www.census.gov/prod/cen2010/briefs/c2010br-02.pdf), the setting “This report looks at our nation’s changing racial and ethnic diversity. It is part of a series that analyses population and housing data collected from the 2010 Census, and it provides a snapshot of race and Hispanic origin in the United States. Racial and ethnic population group distributions and growth at the national level and at lower levels of geography are presented” is one that I cannot agree with. We see in 2010 223,553,265 (72.4%) white, 38,929,319 (12.6%) black or African American and 14,674,252 (4.8%) is Asian. If we go from the (I admit a wrongful set assumption) that there is equality to some degree, that if we take the black population as part of the white population as comparison, there should be some equality between the educated and the ‘actual’ population (yes, it is shallow, I know), they should be close together, yet they are not, they are 2% apart and when you consider it reflects a total of 200,000 students (roughly rounded), the African Americans lose out on a few thousand completed education seats and that is actually a much larger issues than anyone realises.

I will not tell you what the reason is for the difference, because it takes someone a lot more clever than me to do that, but the data (even when not optimally used) should not add up to this. In equal measure I feel that I need to disagree with Roger Clegg, president of the Center for Equal Opportunity. We see: “He said it was appropriate for the administration to ditch policies that had encouraged schools to weigh race and ethnicity in deciding where students would be assigned or admitted. “Students should be able to go to a school without regard to their skin color or what country their ancestors came from,”“, I agree with the premise he states, yet we already see that the African American population are getting short changed for a few thousand higher education seats and we need to find out why that is happening, because if diversity can lead to academic salvation of a nation, we need to change the books and values most held for granted. This is seen in the Teacher Education Quarterly, Fall 2008 in the article by Rita Kohli called: ‘Breaking the Cycle of Racism in the Classroom: Critical Race Reflections from Future Teachers of Color‘, we see on page 178: “Eddie came up to us and asked, “Ms. Wright, I don’t got no lunch money, can I sit in your room and use the computer?” Ms. Wright was a seventh year White teacher who received a lot of respect for the high academic standards that she held students to at this underperforming school. Ms. Wright immediately responded, “I am not going to answer that question until you speak correctly. How can we say that in proper English?” We both looked at Eddie, waiting for him to rephrase his words, but instead he calmly replied, “Maybe not in your house, but in my house that is how we speak correctly.” Ms. Wright and I were both caught off guard and a little speechless, and Eddie just stood there un-phased, waiting for us to let him use the computer“, it is there that we see the reflection on “what I was not conscious of, until Eddie so confidently pointed it out, was that although differences exist in the structure of African American Language (AAL) and Standard American English (SAE), at this school, we were actually teaching a hierarchy of those differences (FairesConklin& Lourie, 1983)“. The article goes on regarding racial issues that are beyond my comprehension, as my life has been very different, yet this one setting where we see that the cards are already set against the African American population in a mere AAL versus SAE setting, these kids have not even made it to high school and they are already at an advantage, I cannot even perceive the disadvantages that the Native Americans face in such a setting. But that small setting can already impact thousands, thousands of students who could be the prospering African American minds that America desperately needs. Let me state it in a simplified way, the mere setting of AAL versus SAE would not prevent any African American becoming the next Mary Frances Berry, Stephen L. Carter, Patricia Hill Collins, Roland G. Fryer, Jr., or Rhonda Vonshay Sharpe. Hell, I’d be happy just to get another James Earl Jones so we get to enjoy a really good movie that is relying on zero special effects.

The issue is that in a true society, race is not the deciding factor. Or as I see it, when we look at the average year of a university we should get a racial setting that approaches the national population. That will never be true, because some are more driven to be successful than others. You merely need to see the Asian graduation numbers to see that some drives are inherent to family values and history. Yet, they should not be as unequal as we currently see them and that is why I am not on the side of Roger Clegg, even as he might be completely correct.

I also need to raise the issue that we see with: “Harvard University’s use of race in admissions has come under scrutiny in a federal lawsuit that alleges the school has discriminated against Asian Americans. Separately, the Justice Department is conducting its own civil rights investigation of Harvard admissions. The university denies wrongdoing and says its methods — weighing race and ethnicity as one factor among many in a review of an applicant’s background and credentials — conform to decades of settled law“. I do not think that there is anything that Harvard is likely to have done wrong, I merely think that the system has stopped working correctly and we need to see if another mould might do the trick in getting it right, yet the setting of ‘weighing race and ethnicity ‘ might be the wrong path. You see, weighing is dangerous, even if we use it to set towards a path of minimum inclusion, which is a good thing, most tend to see it as a reference line to exclusion, which is a lot more dangerous. The old setting that has been going around for the longest time is ‘will that person succeed’, ‘will that person contribute’, ‘will this not be a failure’. The third is important, as it highlights my issue with a place like Ubisoft for the longest of time. To set the stage of something not being a failure is also the stage of creating mediocrity, for those who are not willing to put it all out, they will never create something truly exceptional. In gaming those are the games that are that are scoring 97% or higher. You merely have to look at the track record of Ubisoft to see that I am correct. The next group of upcoming billionaires are not created in Wall Street, they come from the streets and high schools; they figured out on how the next generation of technology (5G) can be harnessed in productive ways, the will start something new, whilst those around them will try to copy and mimic that creativity. We forgot all about the creative arts, the one side that does not rely on AAL versus SAE, it relies on vision and that matters, because vision allows to create that what does not yet exist and growing that group with academic skills is all that matters, giving them the comprehension of tools and concepts is what allows them to link one to the other and that is where trillions are created. I came up with three systems not by pushing the boundaries further, but by inverting the process. We do not need someone who solves the next small clever iteration, we have thousands of that, we optionally need the one solving the puzzle of CELL(150) (or is that CELL(182)?), it cannot be created here, but when you figure out where it could be found, you solve two other puzzles and that is where we need to look.

We don’t need another John Paulson; we need another James Edward Allchin. As data speeds go up, the systems that need to store are becoming the bottle neck in all this, and whilst everyone smiles and points at the cloud, we will see some people losing the plot, and some sales figures will point at the Cisco QoS: Congestion Management Configuration Guide. We will see clever articles on “control congestion by determining the order in which packets are sent out an interface based on priorities assigned to those packets. Congestion management entails the creation of queues“, it all sounds so easy and so logical. Yet the truth is that most have no clue. You see, 3 billion people using the peak of 5G (2024-2027) will impose  levies of congestion on nearly all systems; some cannot even keep up now (a jab at Australia’s NBN). It is very serious matter and even as all the players are in the dark. So, someone, who was into painting night skies would optionally get into astrology and whilst that person decided to paint a starry night outside Lambert Montana, the thought: ‘What if I stored it that way?‘ came to that persons mind and then considered the storage that mother had in the kitchen and things start falling together. It would never have worked in any other way, sometimes the biggest fluke is actually the brainwave that solves a lot more than we ever considered.

Exceptional solutions are not grown or trained, they come from people with vision and growing those people into levels of comprehension towards analytical and critical thinking is what gets the golden eggs that change everything. True wealth is not following or being better, true wealth is being first and pushing the boundaries for everyone else. Mark Zuckerberg might be the clearest example, but he is not the only one. And when we consider that some of the solutions were seen as early as the 70’s with the benefits of VAX/VMS whilst the connection of one with the setting 5D optical data storage and now replace that ‘contact lens’ for a hollow cylinder where the inside writes and the outside reads and you’ll end up with a storage system that offers no less than 250 Petabyte, has a half-life of well over  an eon and is 75,000 times faster than anything found in the Pentagon (at present or in the next decade). You merely need to reset the mind to not adhere to the current rules of any proclaimed captain of industry (especially the self-proclaimed ones). And whilst you laugh on the CP/M part, consider that it was equal to anything else and was merely surpassed by IBM because they relied on business sense and marketing, not on technological advantage. Oh, and whilst you giggle on VAX/VMS, it had full 64-bit addressing around 21 years before Microsoft, it also had version control and decent security at least a decade before Microsoft or their Windows 95 version had a decent setting towards security, so looking back at what the ‘old guys’ offered is never the worst idea.

So when we change the given and make 5G the weakest link in speed, we will finally get to the hardware that will give us a true advantage, although I merely want it so that I can call Sundar Pichai, telling him that the Bristlecone processor is the slowest link in my computer system and I need a quicker chip so that I can enjoy a nice game of Pong, because that is how weirdly warped my sense of humour is at times.

#RealtimeIsJustTooSlow

 

Leave a comment

Filed under IT, Military, Science