Tag Archives: Edward Snowden

The Syrian Fuck Up

There are a few things playing, for one the Bremain group is trying to push again in some way to scare people and set uncertainty all over the place. To be quite honest, at what point are such people regarded as traitors? I know the term is much to harsh, yet the fact is that the vote has been passed, there is a direction and those people are actively trying to mislead left right and centre, like the roaches of the old ways of profit, profit for the few! How come that side is not placed into the limelight? The second issue is seen in NY and a few other places where bombs are exploding. We can speculate in several ways, but that is not my way and until solid intelligence is seen, only then can we form a view. The most likely being that the US is now seeing the direct consequence from lone wolf attacks. There is no likely answer immediately, it will take time, yet the numbers are on terrorism. Confirmation is outstanding for now, but the most likely scenario. We will see later, no matter what the answer is, for the US their issues have now become a lot more complex. It is my personal view that I still believe that Edward Snowden is to some extent a joke at best and a traitor at worst. By illuminating actual parts of projects like PRISM, the lone wolves are now taking other measures and what might have been prevented will now only be prevented after many casualties, so feel free to send him a card with the text “شكرا لمساعدتك” (source: Google Translate).

Where we are actually going is Syria. You see, there has been an issue for a long time, we can go with the idea that people have been lucky for too long and there is the idea that a truce was never an option in Syria. Yet when we read ‘Syria ceasefire on brink of collapse after raids on Aleppo, Syrian troops’ (at http://www.abc.net.au/news/2016-09-19/syria-ceasefire-teeters-after-raids-on-aleppo/7856670). You see, my view comes from the initial issue I had when President Obama claimed ‘No boots on the ground in Syria‘ (at http://www.usatoday.com/story/news/politics/onpolitics/2015/10/30/16-times-obama-said-there-would-no-boots-ground-syria/74869884/), shows that this statements goes back as far as ‘meeting with Baltic State leaders, August 30th, 2013‘. Here we see the quote “In no event are we considering any kind of military action that would involve boots on the ground that would involve a long-term campaign. But we are looking at the possibility of a limited, narrow act that would help make sure that not only Syria, but others around the world, understand that the international community cares about maintaining this chemical weapons ban and norm. So again, I repeat, we’re not considering any open-ended commitment. We’re not considering any boots-on-the-ground approach“. You see, my issue is that any air force strike needs quality intelligence. You see, as I personally see it, the Air force is meant to be force in support of the Army! That’s how it is supposed to be! This is not negativity, because the Air force is its own power in the sky, but when it is required to go after ground forces, it needs eyes on the ground, which implies boots on the ground. It is that simple. Of course they can try to rely on the INTEL that they get from third parties, but that tends to lead to wrong tagging, inaccurate intelligence and not to mention the wrong coordinates get to be transmitted. I reckon that this latest issue could be either one of those failures. And when we get to see this “Russia said the situation in Aleppo city was “especially tense” on Sunday, blaming the instability on rebels.” The amount of shelling by rebel groups against positions of the Syrian Government troops and of residential areas is increasing,” Defence Ministry spokesman Igor Konashenkov said“, so what ceasefire? If a ceasefire is one-sided, there is no ceasefire. It seems to me that the issues shown on the news is that there is inaccuracies on all sides, not just the military parts. That can be construed from the quote “Also on Sunday, a senior adviser to President Bashar al-Assad said Damascus believes Saturday’s strike that killed the Syrian soldiers was “intentional”.” None of the facts on the ground show that what happened was a mistake or a coincidence,” Buthaina Shaaban said.” This could be the case on one side, if there was no ceasefire. So what is the case? Al Jazeera gives us ‘Ceasefire terms pose major risks for Syrian rebels‘ (at http://www.aljazeera.com/indepth/opinion/2016/09/ceasefire-terms-pose-major-risks-syrian-rebels-160915092126740.html), there we see the agreement painted as a one-sided solution for the Syrian government. Sharif Nashashibi writes in this article “This is a clear indication that, to him, such ceasefires are stepping stones to achieving that aim, not to a negotiated political solution. Indeed, pro-Assad forces continue to besiege rebel-held areas during the current ceasefire“, so from all this we can speculate that that fingers can be pointed on more than one issue. When we look at the BBC (at http://www.bbc.com/news/world-middle-east-37398721) we see “The US said its planes had halted the attack in Deir al-Zour when informed of the Syrian presence. A spokesman for the US administration expressed “regret” for the “unintentional loss of life”.“, as I remember it, a meeting at the United Nations Security Council under these conditions tends to be not too boring, so my advice to the Honourable Matthew Rycroft and the Honourable Gerard van Bohemen would be to bring tea and cucumber sandwiches to the next meeting, it should be fun to watch the US and Russian incriminate back and forth!

Now, I am not going to give you the goods on those two, the upcoming cold war will be a fun job soon enough. What is essential is to realise that the Air force could possibly have acted on incorrect, inaccurate or incomplete data soon enough. This is however an issue on more than one level. If you recall the initial chemical attacks, the US was unable to give clear evidence on who did what, meaning that either the satellite lag is too great or lacking too much details. You see, this is not TV, this is not an episode of NCIS where we see that the satellite could be used to watch a topless girl sucking the sunshine. This is real life and even as we know that it can give clear mechanical movements, troop movements, especially in an urban environment like Aleppo could be an issue to some extent, this is corroborated in this event. There will be conspiracy minds giving the notion that the US is trying to win by striking Assad forces ‘accidently’, a scenario that is not impossible, but likely a lot more improbable. Without clear deniability President Obama would not got near this issue now, so close to the election with the possibility of wrecking the election chances of the Democratic Party. In addition, with minus 18 trillion and no exit strategy there, increasing actions and requirements in Syria is one part he cannot afford in any way shape or form. That leads back to the attacks on the US, if there is any possibility that this is indeed a lone wolf wave, the US will have dire need for many more resources soon. No matter how it looks in the news and how it is played. Syria has been an issue for too long and as politicians and ambassadors seem to try and find a solution that will make everyone winners, I have to look back at 1939 when the UK decided that Hitler had to be stopped. It would take 2 years and a large sacrifice of part of the US Navy until the US took that stance openly. The issue is that too many politicians are taking the Charlie Brown approach (Walk softly and carry a Beagle). I think that with so many political fires stating that you are the fireman and you are here to chop away flammable constructs is not the worst position to take. In all this there is a genuine issue of missing trust. The BBC stated “Russia’s defence ministry earlier said that if the US air strikes did turn out to be an error, it would be because of Washington’s refusal to co-ordinate military action with Moscow“, it is not that Russia has any level of record in creating trust. The Ukraine and the Crimea region both have visible scars regarding that issue, there is of course the MH-117 so I reckon that Sergey Shoygu should review his options and find a third solution all parties can work with. The simple truth is that during these election the US side (for now) will be flaccid and useless unless a clear and distinct order is given by the Obama administration. Russia might gain trust all over the field if an actual solution for Syrian battle intelligence is found.

The worst issue in all this is that this is a serious fuck up, because the intelligence as given, is now sitting on the premise of two sides. From the initial part we can go with the two possibly oversimplified sides. US Air force was either unable or unwilling to see the intel. This path is taken because it is a simple truth, when we cut away the sides these two give rise to the actions. If actions were taken whilst unable to see, they would be rash actions, showing that boots on the ground were essential to recon data. If they were unwilling to see the Intel, it becomes a very different discussion, one with large implications on the US military actions. This path is taken to show you that for the most the path was not that complex. The only complexity is the accountability of actions. Sometimes, especially in armed conflict the issue tends to remain simple, or better stated ‘lacking complexity’. So why was it a ‘fuck up’? Again, in my personal view, and standing aside human error, the air force relies on levels of quality intelligence. Whenever we add just one level of impurity, we see that actions become a risk or rash to say the least, the fact that there was no supporting recon team means that someone let US pilots enter a blind stage where identification is hard at best. That is not the fault of the pilot or his commander. In this arena where uniforms are very much alike, telling one party from another becomes nearly impossible. This explains why ‘no boots on the ground’ was close to idiotic from day zero. This would always happen and it is a near miracle that it did not happen more often. One could argue that the entire mission as set out as it was doomed to fail from the very beginning, which now makes us wonder if the current administration wanted a clear victory to begin with. If not, we have ample evidence that this American administrations wasted billions on posturing, which sounds odd too.

In the end, the reality around this will take years to clarify and even then messages, mails and documents will have been ‘accidently’ destroyed or classified for 2 generations at least. In the end, for the most it is easy to agree that the Syrian events were a fuck up, but to what extent and until which person and function (read: who’s desk) is a question not easily (if ever) answered.

 

Leave a comment

Filed under Media, Military, Politics

What the law allows

This is not the usual article for me. This is not a mere look at facts and at information, one could say that I have skin in the game (me using the loosest of all interpretations). You see, I know Paul Farrell. We might not be on the same side at times, for the same reason I am on opposite sides of Brendan Molloy, but we all went to the same University and I know them both to be good people, both with integrity and with a decent moral compass. These issues matter. For the same reason that I stand next to David Cameron, yet I remain holding a healthy respect for Ed Miliband. Ed sees things wrong (read: does not see them my way), but he truly believes that he was fighting the good fight for his party, which is all that mattered.

So how does this relate?

You see, whenever the name Edward Snowden comes up, it seems to raise a red flag for me, like a bull my horns go into battle mode. There is something really wrong about the Snowden case and it forever will be from my point of view, so when I read ‘Edward Snowden on police pursuing journalist data: the scandal is what the law allows‘ (at http://www.theguardian.com/australia-news/2016/apr/17/edward-snowden-on-police-pursuing-journalist-data-the-scandal-is-what-the-law-allows) got my attention to the smallest degree, yet when the quote “singled out for critique the Australian government’s contention that it broke no laws in its leak investigation of Paul Farrell, a Guardian reporter who in 2014 exposed the inner workings of Australia’s maritime interception of asylum seekers“, I became wide awake. You see, I know Paul, which makes it another matter entirely. This links back to an article where Paul Farrell was part of a team (at http://www.theguardian.com/world/2014/jul/07/asylum-seekers-will-be-handed-to-police-on-return-sri-lanka-confirms), that reported on certain issues. The quote “a group of 53 legal experts have called on the federal government to reveal how asylum seekers are being assessed on board customs vessels” points towards an issue that is very valid to be raised upon. When we see “a group of 53 legal scholars from 17 Australian universities warned that the government’s conduct under its hardline military-led border regime “Operation Sovereign Borders” was in violation of international law“, that point of view does not change one bit. The press has every right and even a mandate to report on it (read: why this is not done more often in commercial cases remains a mystery). These elements are not part of the actual spying issue, but they are related to the issue.

The rest of the article reads nice, but there is a side that I saw missing. Where were these people stopped? You see that makes all the difference. How far have people looked into the matter? When we consider UNCLOS (United Nations Convention on the Law of the Sea), we need to consider article 17 where we see “Subject to this Convention, ships of all States, whether coastal or land-locked, enjoy the right of innocent passage through the territorial sea“, which is at the heart of the matter. Refugee boats are for the most smugglers, meaning that they cannot rely on ‘innocent passage’, in addition, article 18 gives us the passage bit with “traversing that sea without entering internal waters or calling at a roadstead or port facility outside internal waters“, which is exactly what smugglers are intent on doing, and whilst doing so we get article 19 where we see “Passage is innocent so long as it is not prejudicial to the peace, good order or security of the coastal State“, which again is exactly what smugglers ignore, because the status of these people cannot be confirmed, as such they can be regarded as prejudicial to both the peace and the good order as well as the security of the coastal state. Perhaps these 53 legal experts looked at that part, perhaps not (read: if I get any documents proving that part, I will reopen this blog article at a later stage).

So at this point, I saw an article that has issues, but I see nothing short of a mere article, nothing that should have woken up Edward Snowden, more important, why did it wake up the AFP? The article gives more than just 53 legal experts, it mentions “Hanson-Young also called on the minister to reveal the fate of a second vessel of 153 asylum seekers believed to have departed from India“, it mentions “The Tamil Refugee Council of Australia” as well as “UNICEF Australia and Save the Children said they were also “seriously concerned” over the secrecy on the second boat“, which are clear quotes, clear issues to be raised by a member of the press, so why do we get: ‘Federal police admit seeking access to reporter’s metadata without warrant‘ (at http://www.theguardian.com/world/2016/apr/14/federal-police-admit-seeking-access-to-reporters-metadata-without-warrant)? You see, in the 2014 case we have the quote “The Australian government’s “on-water” activities to turn back asylum seekers have been shrouded in secrecy under the military-led Operation Sovereign Borders. They led to several incursions into Indonesia’s territorial waters in December and January”, you see, this makes it not an AFP case, but an ASD case as this was a military led operation. The quote: “incorrect calculation of the boundaries of Indonesian waters” is even more hilarious especially when you realise that RADAR, SATNAV and other means tend to show shorelines, can we assume that those on board of the Ocean Protector should have known these little facts? If not, than let us meet with the captain and discuss the International Regulations for Preventing Collisions at Sea, where we see in section 2(a):

Nothing in these Rules shall exonerate any vessel, or the owner, master or crew thereof, from the consequences of any neglect to comply with these Rules or of the neglect of any precaution which may be required by the ordinary practice of seamen, or by the special circumstances of the case.

Which gets us nicely to the duties of being a ship’s captain, where we could now conclude that the Ocean Protector could be regarded as in violation of that pesky UN law named UNCLOS, to be more precise in violation of section 19 of that one, because it could be seen as acting against the ‘security of the coastal State’. This is why I looked at the IRPCS, as that is foremost on the mind of any ship captain, which gives us section 2a and this now gets that person in hot water with section 19 of UNCLOS. Going from other sides there are now the 1st and second mate to consider of the Ocean Protector, as the transgression, unless clearly defined in a military agreement, could be cause for a tribunal and as such the captain could stand a chance to be ‘captain-no-more’, which means that the mates move up a position, this is sometimes regarded as promotion through termination (read: this doesn’t always require extreme prejudice).

My issue is less with the statements of Edward Snowden and much more about (as I see it) the stupidity of the AFP to look into a matter that has so many clear sources named, especially names of people who would know more than the article revealed that the investigation into Paul Farrell seems to be a waste of time to say the least. To be honest, I am much more worried about the escalations we get from the SMH with the title ‘Scott Morrison to share Australian Christian Lobby stage with anti-gay extremists‘ than anything Paul has written here (sorry Paul, I am not trying to diminish your work).

You see, the article Paul partially wrote asks questions, they ask the right question. What is a clear issue is: “the secrecy on the second boat and were worried that unaccompanied minors could be on board whom required additional assistance from Australia under international law“, now also consider “The council had previously stated that at least 11 of those on board had previously been tortured by the Sri Lankan authorities before fleeing“, we see a pattern. A pattern that some elements (I reckon mostly UNICEF) had data and information that was vital, in all this we see the statement that also matters “Morrison told Sydney radio that the second boat was no longer in Australian waters“, so basically Morrison has clearly stated that the second boat had entered Australian waters. Yet when and where? This does not change my view on UNCLOS and its interpretation of it, but it does have an issue with what happened afterwards and the Guardian does not really report on it, it asks questions. Now if Paul got Morrison to make the statement, than that does not make Paul a better investigative journalist, but it does make him an awesome and dangerous interviewer and no matter how he got the quote, he did get the quote and Morrison will have to place his virtually burned bum on a cushion for a little while. So why did the AFP need the metadata of Paul Farrell?

You see, I look at the article with different eyes, as a data miner I see other patterns and the article skates on one that seems to be ignored. We get that from “The AFP have undertaken a number of investigations targeting journalists’ sources, many related to stories about asylum seeker operations“, a statement where I see ‘many’ in a different light. I am wondering, especially in light of what was written why Paul’s data was sought for. My assumption is that there is another side to this. I personally reckon that Paul has had interactions with another person, on perhaps another story. I reckon that someone else is under investigation and Paul Farrell is only connected to some extent.

Can I prove this?

That is of course part of all this. You see, I cannot without seeing more than one source smitten with all this. But consider all the sources the Guardian has had. Any maritime issue can be much easier ascertained by the ASD (and it was a military led operation), they have a lot more resources and any maritime leak can more easily be traced at the maritime source (you know the instigating server side of things). In all this, the quote “Earlier this year Guardian Australia reported that the AFP had accrued a file of at least 200 pages on Farrell in an attempt to uncover and prosecute his confidential sources” from the ‘surveillance’ article now matters. It links to a Feb 12th article where we see the quote “In April 2014 I reported for Guardian Australia that one of the vessels involved in Australia’s unlawful incursions into Indonesian waters, the Ocean Protector, had gone far deeper into Indonesian waters than the government had disclosed“, which is the statement that caused all this. You see, the Ocean Protector is a government vessel, yet a civilian one that falls under the Australian Customs and Border Protection Service. The ASD has options here, but it seems overkill to use them when it is not a military operation. The ASD can rely on “The Australian Signals Directorate (ASD) provides foreign signals intelligence, known as SIGINT, to the Australian Defence Force and Australian Government to support military and strategic decision-making“. So why use the AFP instead of a much better equipped ASD? That is the question that comes to mind. What is without doubt is that this is not merely a Paul Farrell investigation. This is just a personal opinion, but when we see the amount of sources Paul Farrell had, in addition if the ship had an Automatic Identification System (AIS) on board, was it logged off and shut down? Even crew members with a smartphone turned on could have been enough of a source. A dozen sources all lower than open intelligence sources, were they looked at? In addition if the Ocean Protector had any switched on Esterline Technologies equipment on board, there might be additional ways to get certain information. I wonder how deep this was investigated before someone had the less than bright idea to, no matter how lawful I was, to the metadata of a journo?

The article raises questions, and what it does not tell us makes me wonder about several other questions, none of them considered.

In all this the by-line of a picture in the February article gives us “Michael Pezzullo, secretary of the immigration department, told a Senate committee this week he had referred a cabinet leak to the police. He also referred a Guardian Australia journalist to the AFP after a report that revealed a customs ship had entered Indonesian waters far deeper than previously disclosed“, which makes sense, yet that line gives me the issue of the Cabinet leak and a lot less about the Guardian leak. It seems to me that the massive file on Paul Farrell reads like a bright light, one that dissuades away from the cabinet investigation that is one that many parties would want to keep out of the press. I just wonder what Paul will find when he takes a look at that Cabinet member and the information that is being looked at. I am not certain that it will be about Asylum seekers or refugees, or another matter entirely, but that again is merely speculation from my side.

Can I be wrong?

Off course I can. You see, my speculations are merely the consequences of data I saw and other data I read. Now ask yourself, knowing the backlash spying on the press gets you; do you think that the AFP is actually this stupid? As I raised issues of location tracking in many forms, the essential part isn’t whether he got a hold of that data, the question becomes how many non-illegal methods could he have used to get it. So, the actions by the AFP seems to be a massive overreaction. That is even before we see whether the Ocean Protector is on http://www.marinetraffic.com. Even after that, there are Indonesian systems to consider. If anyone had revealed that data it would have been a political issue between Indonesia and Australia (the second party without any claim to secrecy within the territorial waters of Indonesia). All these mere issues, all clearly within the view of the public, the audience, the press and the governments at large.

So now ask yourself: ‘Is there any sense to exposing one’s self to internal investigation as the press demands visible answers?

That is why I got to the path I am on. Consider one additional path. If we consider a phone number, for example (purely a random example): 8816 273 14432, now consider that this is an Iridium sat phone. You see these puppies also tend to be on boats. They have been used in many non-metro environments since the mid 90’s. These puppy’s come with data and GPS enabled and Iridium is actually one of the better more secure solution, there are few cheap ones that offer very little security. So was this about Paul Ferrell, or did Mike Pezzullo (or one of his top minions) drop the ball in another way and was this his panic solution?

These are mere thoughts in all this. It took mere minutes to get to this place and I had initially read the article in February. We must acknowledge the issue that “Law enforcement did not need a warrant for accessing the information at the time“, which is not as much a cause for concern as people make it out to be. Let’s face it, we are all held to a need for results. So was the AFP wasting time? In my summary they were for other reasons. The need to give the image that they are looking in one area is adamant, for politicians the need for the AFP to look somewhere else is equally their personal need, yet where lies the real need? On the foundations given, it was clearly not looking aty Paul’s data I raised many issues on that matter.

This gets me to the final article. There is nothing about the article that is wrong, it is the reflection of Paul Farrell (at http://www.theguardian.com/world/2016/apr/15/australias-attacks-on-journalists-sources-are-about-politics-not-national-security). The title ‘Australia’s attacks on journalists’ sources are about politics, not national security‘ hits the mark on several issues. The quotes that I needed in my case were “It’s become a sadly normal reality that journalists’ sources can be targeted in Australia in an effort to hunt down whistle-blowers“, the operative word here is ‘can‘, which is not a given, just a mere option. It does not make the action correct. What is more an issue is “this is the first time the AFP has ever made such an admission in Australia“, you see, why is this the first time? Was there too much overwhelming evidence, or is was the clear visibility of the search a reason to hide something else?

You see, that could be seen as a clear case of ‘conspiracy theory’, but regarding the evidence. The document (at https://www.scribd.com/doc/298816051/Paul-Farrell-AFP-Decision-Letter-and-Documents) that reveals nothing really, there is too much marked out. So was this a clear case of wrongful investigation, or was that the case because it dims the lights of what the AFP is actually looking into. So when we see the quote “From the AFP’s point of view, it has done nothing wrong. As it has indicated in its statement, it has sought to undertake investigations within the scope of the law. It has “sought to identify the source of the disclosure, and then determine whether they had the appropriate authority to release that information”“, to me it shouts not ‘what was wrongfully looked at‘, in my personal belief it screams ‘We are actually sneakily looking at something else‘, again, it is a speculation and I could be massively wrong, yet there is enough in the air to wonder about that issue, not just by me.

 

Leave a comment

Filed under IT, Law, Media, Military, Politics, Science

the Other Currency

Sometimes you have to halt a moment. Take a step back and breathe. It is an essential act that I myself have forgotten to take heed on. That part became partially clear in the article the Guardian had yesterday in the TV News section. The title “Paul Mason warns political journalists: ‘You have no real idea what is going on’” is only half of it (at http://www.theguardian.com/media/2016/apr/08/paul-mason-political-international-journalism-festival-channel-4-news). You see this is linked to several pieces I wrote regarding the (what I believe) to be less than intelligent acts by Alexis Tsipras. So apart from me thinking I was right (read: correct), that piece is an equal mirror for me to look at myself at times, which I am very willing to do.

Linked to these events, not to the articles is a secondary issue I reported on. The date was January 7th 2015. The article is called ‘As we judge morality‘ (at https://lawlordtobe.com/2015/01/07/as-we-judge-morality/). In this article I looked at the accusations made by something that walks around with a dripping snatch. Yes! I am that rude! You see, you do not get to make the false allegation ‘a former masseuse employed by Epstein, that she was forced to have sex with the Duke of York over 10 years ago, as well as the Harvard law professor Alan Dershowitz‘, you do not get to accuse these people falsely and not get branded for life! This part links into the previous part and the follow up from the not so light allegation I made in the article. I stated: “It is somewhat sickening to see that the press might be the fuel for falsely alleged trials and claims“, even though (much too late) as we see today in the Boston Globe “Two plaintiffs’ lawyers admitted Friday that they made “a mistake” when they accused famed attorney Alan Dershowitz of having sex with their client when she was a minor” a year later. I am uncertain why Attorney and law professor Alan Dershowitz would show such grace against the mindless stupidity of his peers by dropping (read: settle) against Lawyers Paul G. Cassell and Bradley J. Edwards. It is my personal believe that the District Attorney has a mandatory function to keep the quality of law above reproach and high in standards (we do know the standards board is for that). I believe that Attorney General Pam Bondi (our famous Sydney Bondi beach was not named after her), still has a clear duty to look into the matter of the claims made against Alan Dershowitz. Cassell and Edwards wasted the courts time, they gave real damage to the integrity of Alan Dershowitz, as such in light of all I reported then, there is still a case of consideration against the two lawyers. As I personally see it, they tried to strongarm a situation, which had basically nowhere to go but backfire. As such there needs to be a price against the false claimant and against those proceeding on those false claims without due diligence.

I do not think that it changes anything against billionaire Jeffrey Epstein, the slimy little weasel (as I would see him) who got off way too light. Yet, the false statements making him violent now also wrongly diminishes his guilt in all this and it smeared the Duke of York in addition, who is not mentioned in the Boston Globe article. Those false claims had a likely impact on the charity work he has done for decades, so this ‘tactical’ legal act should come with a massive price tag, not only because it took serious resources from the FBI to clearly show that there was contradictory evidence as brought by former director Louis Freeh of the Federal Bureau of Investigation.

This now reflects to the article that got this all started, namely the press. You see, there is a quote in that article “And I think we need to understand that we [journalists] generally know very little about what is really happening”, which might be a grand gesture by Paul Mason, but I think it is the revelation that he was aware of. We do not know everything and most often we don’t even know a lot, which is something I have always known. The second quote he makes is “If you are one of those poor people who have to report Brussels, you’ll know how difficult it is, even for the guys with the press passes, to get the story. They just get handed effectively a series of semi-leaks and spun information”, which is now at the axial of that what matters. The press has with some regularity not been the informer, they were merely the ignorant patsies ‘revealing’ things spin doctors wanted to get revealed. Now, mind you, the revealed info was often true, it was however a truth misstated in proportion and in wrongful secondary considerations. Which is what I have stated on numerous occasions. Especially when we consider Edward Snowden as well as the Panama Papers. They were, as I see them both hostile takeovers, one in the intelligence industry and one in the financial industry. We will forever debate and speculate on the acts of Edward Snowden. I see him as a traitor, plain and simple. That evidence is clearly seen as his first port of call was Hong Kong. That choice limited him and changed the game for him. I reckon as I speculated before that China saw him for what he was: ‘A joke with delusions of grandeur’. He was not evil, just embossed by the option for greed and ‘sainthood’, just the small detail that treason and sainthood tend to be mutually exclusive when it is done to merely enrich one’s self. This is the one element that gives Julian Assange the benefit of the doubt (and because he technically never committed treason).

When we get back to Edward, we see that he had access to some extent and I reckon he got to see a few documents. Documents involving James Fisher, Mike McConnell and Gary Labovich. I think that they had started a path at that point, merely in the planning stage and if that path worked out a small group at Booz Allan would become rich beyond believe and Edward was missing out. I think he had the opportunity to move forward and he took a chance, the wrong one I might add. You see, there was always an issue with all the data and I still believe that some of the players have been miscommunicating the value of all that data and those ‘documents’ I believe that the initial news around that time (at http://www.huffingtonpost.com.au/entry/former-government-officials-cybersecurity-boom_n_958790.html) in September 2011 and in the Washington Technology (at https://washingtontechnology.com/Articles/2011/06/06/Booz-Allen-Top-100-government-contractors.aspx?Page=2) in June 2011. Perhaps the path was not clear at that point, but the idea had taken shape. Last year we saw ‘Booz Allen builds on Vision 2020 strategy with SPARC acquisition‘ (at https://washingtontechnology.com/articles/2015/11/02/booz-allen-sparc-deal.aspx) and last month we had the conclusion ‘Booz Allen Hamilton hired to support 5 billion CSTAT contract‘ (at http://www.consultancy.uk/news/3402/booz-allen-hamilton-hired-to-support-5-billion-cstat-contract), a path that took likely a little longer because of the damage Edward Snowden caused. He is no saint and definitely no Ideologist. A failed intervention, that if successful would have given great wealth to Edward Snowden, he gambled and lost a little. Yet in all this the Cyber Security and Information Systems technical area task contract (CSTAT) is nowhere near done. As I see it the cloud might be wonky and leaking data like ‘a sift’, so this is something that needs to be investigated.

This again reflects back to the sometimes ‘ignorant’ press. What they are expecting to receive, and what they really receive are two dimensions, in an age of circulation they are not aligned. Yet getting back to Greece, is also important, you see Paul gives us the part that matters in more than one way: “If Syriza falls, there won’t be a conservative government. It will be replaced by a technocratic government. That’s the plan of the Greek establishment. This technocratic government will mess up. We are really lucky that the fascists want to be black-shirted type hoodlums, because in other countries fascists have developed a brain and reinvented themselves as democratic politicians. We are lucky for the moment that the fascists have no chance of ruling Greece, but that may not be the case forever“, he is only partially right as I personally see it. A technocratic government will do what he expects, but it is more the result of what a technocratic government actually wants. They want profit and non-accountability. Tsipras is right that it is about the people, the Greeks, those who make up the land, but there cannot be non-accountability, which is why I opposed the acts of Tsipras and his rock star associate Yanis Varoufakis. They were wrong, they were never evil. The technocratic wave that comes will be evil, because they will keep alive only those who add to the profit wave, the rest is painted away in spreadsheets. I never signed up for a world like that. In equal measure those who ruined Greece are still not held to account, which I personally see as another failing by Tsipras. They must stand trial and bleed for the hardship they gave the Greek people. There is no other way, the technocrats will take a fee from them and ignore their acts. As the EU falls, it does not fall towards the xenophobes as Varoufakis states, they fall towards the nationalists. I agree that they are not mutually exclusive groups, yet I personally believe that these nationalists are not in fear of non-nationalists, they just prefer nationalists to push their nation forward, something that has not happened in over a decade and non-accountability tends to be weird that way.

So as I look at these elements we cannot ignore Paul Mason who wrote the Guardian article and other too is also linked to #ThisIsACoup (at https://www.youtube.com/watch?v=MZsHT2FZkxk). There are elements that I cannot completely agree with, but they are valid views, they look at parts I did not realise/ignored. Yet, they are writing about sides I have been trying to illuminate for over 3 years. So I do not attack ‘How the EU destroyed the Tsipras government‘, I do have a few reservations. That is a good thing, because I never claimed to have all the answers or all the truths. I have a view, based on information, often from valid sources, which is also an issue as we saw on quotes earlier here that the press seems to have been a ‘willing’ propulsion system for spin doctors. This is the issue on many levels, so accepting some truths that might not be in my perception of truth is equally important. So please watch that video on #ThisIsACoup. You will learn a few things I did not know (so I learned a lot too) and parts I never realised. Not because I wanted to be ignorant, but because others would not truly inform its population. Paul Mason also illuminates the issues that 2017 will be bringing. He stated “There is no template for those who had 4% last time are winning the election with 35% this election” which is what the Netherlands are facing with the PVV and what France is still likely to face with Front National. A left template and a right template. Neither is correct and both are essential. If this is truly about national governing it must be about the nation and its population, not in fear, but in enlightenment. In that the Economic industry is feeling the pinch in real ways. Because the changes we see now are becoming the massive fear that Dow Jones, Mossack Fonseca, Rothchild, Natixis and several other financial managers are facing, including the IMF (the Christine Lagarde edition, not the Tom Cruise version).

This need is escalating, especially in light of the revelations last month that due to the actions of DuPont Dordrecht its population has been exposed (for many years) to a large dose of perfluorooctanoic acid (aka C8), even as the Dutch NOS reports “Parliament has decided to take random tests within the population of Dordrecht to look at the consequences of C8, the people are not willing to wait, they want to test their blood as soon as possible. Reimke Hitimana-Willemze of the GGD (Dutch version of NHS) stated that there is no reason for it as there is no treatment this substance will only leave the body over time. She stated ‘Keep your money in your wallet’ (paraphrased from http://nos.nl/artikel/2097987-zorgen-in-dordrecht-om-dupont-fabriek.html)”

This illuminates the massive problem (as I see it). A class-action lawsuit and community settlement had revealed in earlier that Chemours would bear the cost. The fact that Chemours Netherlands B.V. might be seen as a coincidence is one side, the fact that C8 (as shown at http://ehp.niehs.nih.gov/121-a340/) gives us also links to kidney cancer, testicular cancer, ulcerative colitis, thyroid disease, hypercholesterolemia (high cholesterol), and pregnancy-induced hypertension. The report has limitations, the reporter notes that there are issues, but the results are too overwhelming. So as we read that this is from 2013, how irresponsible is the response from Reimke Hitimana-Willemze? This is exactly why the shift is growing larger and larger, notably to either the left or the right, but not towards the balance of the middle. You see, the government players have been too deep in the pockets of big business and as such we see misinformation. Is it not weird that yesterday’s article from NOS states: “It is not easy to show whether high concentrations of C8 lead to diseases, according to Warry van Gelder, director of the Albert Schweitzer-hospital (paraphrased)”, I reckon that a mere search on Google revealed that C8 is real nasty stuff and the settlement that DuPont made in 2013 is additional evidence to start immediate blood tests. Especially if there is a chance that a misinformed Dutch parliament makes a quick settlement offer with DuPont (or likely Chemours Netherlands B.V.) at a mere 2% speculated value of the damages, leaving the Dutch NHS to clean the mess up for this fat chemical cat (or is that Chemical Fat Cat?).

This shows as I see it the dangers of spin doctors, especially as the Dutch NOS makes no mention of the 3,500 lawsuits from Ohio and West-Virginia water (at http://www.bloomberg.com/news/articles/2015-10-07/dupont-jury-reaches-verdict-in-ohio-toxic-water-lawsuit) a mere 6 months ago. How did the NOS miss this?

You see, this part only grows the PVV in stronger measures, making the issues Paul Mason mentioned more and more important, in addition, as large corporations are not held to account the consequences of more and more extreme governing is only accelerated and they will be more extreme in dealing with these issues, which tends to be a bad thing as well.

For me there is a shift, the parts reported up to now and the realisation that the movie is bringing. There is an issue with the press, namely a fight between time and value. The issues shown is that speed is not value, the lack of data depth and data realisation deprives value, the speed of it does not equal it. The press is lacking data comprehension centres, something that can oppose spin doctors, which is not realistic because editors are about speed above all, they dumped the level of quality as they are up against the social media message; hacks that rise as the planetary population is lacking more and more intelligence. It is an unequal race and the hacks seem to be winning which will be the biggest loss of all times when that war is done with.

In that we still have the valid question on how Greece can get back on its feet. Making it a tax haven is not really an option but something needs to be infused on Greece. This battle is not one that will be settled any day soon as the economic coup d’état is still developing. As Mossack Fonseca offices are now getting raided the competitors of Mossack Fonseca are still laughing. Consider that for all intent and purposes there is no evidence that Mossack Fonseca has broken any laws. A police force that refuses to clearly intervene in the known guilty El Salvador drug world is eagerly going into a clearly not guilty and non-transgression set Law Firm. How is that anything but a political step and a posturing to scare its customers towards US non-taxable havens? The article from ABC relies on “all under the radar of local authorities“, yet there is no impression at all at present that the law has been broken. Consider that these are the same members of the comedy capers group that never got to El Burro or other members of the Texis Cartel and they are now going after a firm with no established guilt of any kind?

The question that Paul Mason is directing within me is: “Has the press truly become the joke to be played on those not aware of the rules of the land?“, for one part Paul’s acts at present could indicate that I am wrong, but for every Andrew Jennings and Paul Mason, there are at least a thousand ‘anonymous reporters’ hopping for a break and are eagerly taking quotes from the power players in the land. You only need to see the developments regarding Rothchild in the Financial Times regarding Petro Poroshenko as well as the Quay Quarter development (linked to the Rothchild branch), set at a mere 2 billion to see that I am not (entirely) wrong.

 

Leave a comment

Filed under Finance, IT, Law, Media, Politics

Within the realm of privacy

We all have an inherent need for privacy, we want things to be at our leisure of contemplated sharing. Yet, what is privacy? On one side we want privacy, but the next moment ladies will share whether their carpet is a landing strip or a martini glass, I for one do not care. If they want to share certain parts that’s fine with me. I am not too much about sharing. On the other side, apart from a few MP3 files, there is nothing interesting on my mobile. I reckon that my mobile is one of the dullest ones around.

So when I initially heard about the FBI wanting to access the iPhone of Syed Farook, I shrugged my shoulders and went ‘whatever!’ meaning that I was not opposed and I did not care. It was the techdirt site that has an interesting fact from the court case.

Footnote 7, on page 18 details four possible ways that Apple and the FBI had previously discussed accessing the content on the device without having to undermine the basic security system of the iPhone, and one of them only failed because Farook’s employers reset the password after the attacks, in an attempt to get into the device“, so the boss went into ‘auto-moronic’ mode and did not check? He acted without knowing? So when we see “The ‘owner’ of course, being the San Bernardino Health Department, who employed Farook and gave him the phone. Basically, what this is saying is that if the password hadn’t been reset, it would have been possible to try to connect the phone to a ‘trusted’ network, and force an automatic backup to iCloud — which (as has been previously noted) was available to the FBI. But by ‘changing’ the password, apparently that option went away“, should we consider that his boss was stupid, or that his boss was scared he had done something wrong and this was his/her way of covering the mess up? (at https://www.techdirt.com/articles/20160219/17463033656/footnote-reveals-that-san-bernardino-health-dept-reset-syed-farooks-password-which-is-why-were-now-this-mess.shtml).

For the record, that was clear speculation on my side!

What happened was that Apple, the firm that initially ‘screwed over’ its customer base with error 53. A few days ago, the Guardian reported ‘Apple ordered to decrypt iPhone of San Bernardino shooter for FBI‘ (at http://www.theguardian.com/us-news/2016/feb/17/apple-ordered-to-hack-iphone-of-san-bernardino-shooter-for-fbi). In there we see the important quote: “In 2014, Apple began making iPhones with additional encryption software that they said they could not unlock, even if faced with a court order. Apple said this was done in the name of consumer privacy and cybersecurity, but the company has been locked in a public feud with the FBI since“. I understand that there is a need for privacy. My issue is why THIS level of privacy is needed. One could speculate that this is to keep the financial adviser’s customer base happy. I reckon that those people look for other means the moment their actions could be monitored, or investigated afterwards. Again, speculation from my side.

You see, I do not comprehend why law abiding citizens are so in fear, of what the government finds out. Most people can’t stop selfie themselves, their fashion and body parts to social media on a global scale. They tend to Facebook all details, especially when they are far away from home to ‘all’ their friends, so that the department of discreet entry and removal operations can empty their homestead in the meantime. With so much sharing, what privacy do you think you still have?

So back to the Granny Smith of automation, the next article (again the Guardian) gives us ‘FBI escalates war with Apple: ‘marketing’ bigger concern than terror‘ (at http://www.theguardian.com/technology/2016/feb/19/fbi-apple-san-bernardino-shooter-court-order-iphone), here we see the subtitle ‘Court filing from Department of Justice says Apple is more concerned with ‘its marketing strategy’ than helping FBI unlock San Bernardino shooter’s iPhone‘, which is fair enough when we consider that a failed marketing equals an alleged death in those houses. The quote “Cook called for public debate and has been backed in his fight by some of tech’s biggest names, including Google’s chief executive Sundar Pichai, WhatsApp and whistle-blower Edward Snowden“. I think that this is less about Americans and more about the 7 billion non-Americans that have this false fear of the CIA and the NSA. Yet in all this, the only true group to fear this is the 0.0001% of the population, I do not even register and in that regard most do not even register. Like the previous mass surveillance marketing ploy, simple fear mongering.

Now, let it be said that I have nothing against a person’s privacy and there is nothing wrong with wanting privacy, yet when we consider the 1.5 billion on Facebook, the 100 million on Instagram, the 307 million on Twitter and over 100 million users on Pinterest, we have well over 80% of the iPhone users on social media all sharing from mere events attended up to the grooming of the most private of parts, Which makes the shout for privacy a little too hilarious.

So how does this fit legally?

Well first there is the part that the DoJ is now relying on. It is the All Writs Act of 1789, which states “The Supreme Court and all courts established by Act of Congress may issue all writs necessary or appropriate in aid of their respective jurisdictions and agreeable to the usages and principles of law“, which sounds rather nice,

Yet the fact that the DoJ needs to rely on an act that has, according to several press sources, only been used thrice is a little too novel.

When we consider that the ‘self-destruct’ was enable by Farook’s boss (making the device useless to thieves), only leaves the DoJ without options. What is interesting is when the last cloud backup has happened, had it happened at all? Too many question that are all in the realm of speculation and none of it gives way to legislation. The question becomes should it be? I am not opposing the FBI, CIA or NSA. Yet these alphabet groups do know that they are fishing in murky waters. You cannot expect a corporation to set a product meant for 1,000 million to have options for the internally build exemption of 5,000-7,000 users. The math just does not add up!

I was talking about the legality, so let’s continue there.

In McCabe v British American Tobacco Australia Services Ltd,’ and the appeal, British American Tobacco Australia Services Ltd v Cowell (Representing the Estate of McCabe (deceased)), exposed some of the difficulties that plaintiffs who sue large corporations may face in litigation involving access to documentation. The Victorian Court of Appeal reversed the first instance decision which had struck out the defence of a tobacco company (‘BAT’). The basis for the first instance decision was that BAT had systematically destroyed documents that might have been relevant to the plaintiff’s case. It important to state WHO destroyed documents. You see, in case of Farook it was the boss who ‘destroyed’ the options for information retrieval. The important issue is that INTENT becomes near impossible to prove. In addition that case gives us: “The High Court declined the opportunity to clarify the law in this important area by refusing leave to appeal. The effect of this case, absent statutory reform, is that corporations may destroy potential evidence provided that their actions do not constitute an attempt to pervert the course of justice or a contempt of court. These are notoriously difficult to establish” (source: Playing for keeps? Tobacco litigation, document retention, corporate culture and legal ethics by Matthew Harvey and Suzanne Lemire. The reason for going towards this case is that the entire approach to mobile architecture and auto-backup could instigate updates where the mirror is encrypted extern from Apple. Which means that any phone would have an XML set-up and data object, but the object would be irretrievable. The ‘responsibility’ for proper password maintenance would be kept with the ‘client’ or end user. Taking Apple out of the equation leaving the DoJ with the apple pie made from the famous Granny Smith (AKA Janet Abigail Doe).

This takes the entire cyber conversation towards Spoliated Evidence, where we see “a party is faced with the fact that certain key evidence has been destroyed, altered, or simply lost“, destroyed implies intent, but proving that is next to impossible (which got us the tobacco case. Altered is basically what the DoJ faces as the boss decided to reset the password, again malicious intent becomes next to impossible to prove, whilst lost is not in play in this case but could clearly complicate the issue if that was the case, as the DoJ would have no implied evidence at all.

This entire endeavour goes even further south when we consider Federal Insurance Co. v. Allister, 622 So. 2d 1348, 1351 (Fla. 4th DCA 1993), where the Fourth District decided to set forth five factors to consider before imposing sanctions for spoliation of evidence. They were:

  • whether there is prejudice;
  • whether the prejudice can be cured;
  • the practical importance of the evidence;
  • the good faith or bad faith surrounding the loss of evidence;
  • Possible abuse if the evidence is not excluded.

As bad faith is now linked to the degree of wilfulness, we get back to intent. If mere ‘negligent loss’ does not cut the cake and the cake cannot be devoured without the essential evidence, the entire issue goes nowhere really fast. Basically, it boils down to the boss of Farook having one set of glasses on with the limiting mindset of cost if his mobile was ‘abused in usage’, leaving Apple in the clear shrugging their shoulders going ‘not my problem now’, whilst in all this we are left with no evidence linking to intent or malice. That small scope that was available will in all expectations to be diminished further. It basically solves all of Apple’s problems.

In the need for privacy we have gone from exceptionally rare to just hilariously ridiculous. The Guardian article (at http://www.theguardian.com/technology/2016/feb/20/apple-fbi-iphone-explainer-san-bernardino) shows in equal measure another side. Which comes from Senator Ron Wyden, Democrat from Oregon. Here we read “Some are calling for the United States to weaken Americans’ cybersecurity by undermining strong encryption with backdoors for the government,” he wrote on Medium on Friday afternoon. “But security experts have shown again and again that weakening encryption will make it easier for foreign hackers, criminals and spies to break into Americans’ bank accounts, health records and phones, without preventing terrorists from ‘going dark’“, as such correctly implying that the medication will end up being a lot worse than the disease they face. In addition to that, should Farook have relied on another path, for example receive orders and message a ‘guild’ within a Facebook RPG game, the wasted time on the iPhone becomes nothing more than an iconic episode of the Comedy Capers. With these games receiving billions of messages a day, parsing though 1 of a dozen games would take years. The fact that none of this required any encrypted android or IOS system, just a mere desktop like millions of students use makes for the case against the Alphabet teams. When looking at Extremetech, we see a quote that is important in all this, the quote: “how terrorist organization uses social media to spread its message and radicalize curious readers. GWU’s research found that while ISIS uses a wide range of services, including Facebook, Google Plus, Kik, WhatsApp, and Tumblr, Twitter is the social media site of choice. Twitter already patrols and bans the accounts of ISIS supporters“, it casually forgets the 3-4 dozen accounts that do not raise any flags, the accounts that ACTUALLY bring details of the attacks to the transgressors.

 

 

 

Leave a comment

Filed under IT, Law, Media, Politics

Where are my lenses?

For a moment I was contemplating the Guardian article ‘National borders are becoming irrelevant, says John McDonnell‘, which could be seen as a load of labour by the Bollocks party, or is that a load of bollocks by the Labour party? Anyway, the article was so shaky that it did not deserve the paper to explain the load of bollocks in there. What is however an interesting article, is the article in the National Security section of the Washington Post. The article “‘Eyewash’: How the CIA deceives its own workforce about operations” is worthy of digging into for a few reasons (at https://www.washingtonpost.com/world/national-security/eyewash-how-the-cia-deceives-its-own-workforce-about-operations/2016/01/31/c00f5a78-c53d-11e5-9693-933a4d31bcc8_story.html).

Initially, the very first thought I had was regarding Lao Tsu, who gave us the quote: ‘Those who know do not speak. Those who speak do not know‘, which is a truth in all this.

Apart from the title, the first quote to look at is: “Senior CIA officials have for years intentionally deceived parts of the agency workforce by transmitting internal memos that contain false information about operations and sources overseas“, there are a number of issues here, but let’s focus on one thread for now.

You see the second quote “Agency veterans described the tactic as an infrequent but important security measure, a means of protecting vital secrets by inserting fake communications into routine cable traffic while using separate channels to convey accurate information to cleared recipients” is at the very core of this.

No matter how you slice and dice it, the CIA has had a number of issues since 2002. The first is that after two planes got the wrong end of a vertical runway, the game changed, suddenly there was a massive overhaul and suddenly it had to deal with the United States Department of Homeland Security. In 2002 the DHS combined 22 different federal departments and agencies into a unified, integrated cabinet agency. More important, the DHS was working within and outside of American borders.

Now, the blissfully ignorant (including a host of politicians) seemed to live with the notion that under one flag and united, these people would start playing nice. Now, apart from that being a shaped a joke of titanic proportions, hilarious and all, the reality is far from that. You see, both the FBI and the CIA (not to mention the NSA) suddenly had to worry about 240,000 people, 240,000 security screenings. What do you think was going to happen? The issue of ‘false information about operations and sources overseas‘ is not an issue until you try to exploit that information, which means that you are doing something ILLEGAL (to the extent of being worthy of a shot through the back of the head). ‘Eyewash’ is only one cog in a vast machine of smokescreens that counterintelligence has to see how certain tracks of misinformation makes it outside the walls of intelligent wailing. You must have heard the story of the Senator/Governor who has a ‘friend’ in the CIA, not all those ‘friends’ are working valid paths. The intelligence community is a closed one for a reason. There is a clear chain of command, which means that the CIA has a chain of command and if a Senator or a Governor wants information, there is a clear path that he/she walks, from that point a politician gets informed if that person is allowed or has a valid reason for knowing. If anyone needs to move outside that path, you better believe that it is for political or personal reasons!

Now we get the quote that matters “officials said there is no clear mechanism for labelling eyewash cables or distinguishing them from legitimate records being examined by the CIA’s inspector general, turned over to Congress or declassified for historians“, I am not sure that this is correct. The question becomes what paths and what changes were pushed through in the last 2 administrations? I am willing to contemplate that errors have popped up since the Bush Government, yet in all this the parties seem to forget that the DHS was a political solution pushed through by politicians within a year. I know at least three companies that seriously screwed up a reorganisation of no more than 1,500 people over the period of 2 years, so what did you think would happen when 240,000 people get pushed all over the place? In addition, when a massive chunk of the intelligence section went private to get an income that was 400% better than there previous income (same place, same job), additional issues became their own level of a problem within the DHS, CIA, FBI (and again the non-mentioned NSA).

There were all levels of iterative issues in DATAINT, SIGINT, IT and Tradecraft. Names like Bradley/Chelsea Manning and Edward Snowden might be the most visible ones, but I feel 99.99993422% certain (roughly), that there were more. Eyewash is one of the methods essential to keep others off balance and in the dark what actually was going on, because it was not their business or place to know this. This gets us to the following quotes “But a second set of instructions sent to a smaller circle of recipients told them to disregard the other message and that the mission could proceed” and ““The people in the outer levels who didn’t have insider access were being lied to,” said a U.S. official familiar with the report. “They were being intentionally deceived.”“, now consider this quote from another source “Having DOOMED SPIES, doing certain things openly for purposes of deception, and allowing our spies to know of them and report them to the enemy“, which comes from chapter 13 of Sun Tzu’s ‘The Art of War‘, a book that is almost 2,500 years old, and the tactic remains a valid one. Should you consider that to be hollow, than consider the little hiccup that the British Empire faced (I just love the old titles). Perhaps you remember the names:  Kim Philby, Donald Duart Maclean, Guy Burgess and Anthony Blunt. They made a massive mess of British Intelligence, it took them years to clean up the mess those four had left behind, now consider adding 245,000 names, for the most none of them had passed CIA and/or FBI clearances. So what options did the CIA have? In addition, as we saw more and more evidence of the events linking to Edward Snowden, additional questions on the clearing process should be asked in equal measure, which leads to: ‘What options did the CIA have?’

In that light, the quote “Federal law makes it a criminal offense when a government employee “conceals, covers up, falsifies or makes a false entry” in an official record. Legal experts said they knew of no special exemption for the CIA, nor any attempt to prosecute agency officials for alleged violations” becomes little more than a joke, for the mere reason that not making the intelligence community exempt from this would be a very dangerous issue indeed. You see, today the CIA has a larger issue than just small players like North Korea, it has to deal with business conglomerates all over the world and they have become close to sovereign financial entities in their own right. What happens when a Senator chooses to take a book filled with intelligence anecdotes, just because it is an American Corporation? What happens when he gets the multi-billion dollar deal and he only has to ‘sweeten’ the deal a little? This is entering a grey area that most regard to be a grey area no one wants to touch, but what if it is not a high ranking official? What if it is just a mid-level controller, or a mere IT member looking for a retirement fund? Suddenly, this scenario became a whole lot more realistic, didn’t it?

Eyewash is just one cog in a machine of cogs, it drives a certain amount of cogs of the machine and as certain levels of Intel makes it outside of the walls, counterintelligence has a path to trot on, the article only lightly (too lightly) treads on those elements (yet they are mentioned), but the overall issue of internal dangers that the CIA (et al) faces are almost trivialised, in addition, the entire issue of the DHS and the linked dangers of intelligence access remains untouched. That is perhaps the only issue the article has. Well, from my point it has a few more, like under valuating the need for counter intelligence and the fact that this tactic had been around for around 2,500 years, but let’s not squabble on minor details.

The only additional minor detail I would like to add is that in all this is the missing component of the chain of command towards the Director of National Intelligence (which at present is James Clapper), in opposition, there is no denying that there is an issue that the internal mechanisms for managing eyewash cables were largely informal, which is an issue, even if there would be a clear document, likely higher than Top Secret within the CIA on how to identify and/or classify eyewash cables. Which now only leaves us with the Eyewash cables by No Such Agency like the CIA, but that is something for another day.

 

Leave a comment

Filed under IT, Media, Military, Politics

Imperitos idiot

This is a view I have had for a while, it is a view that I have advocated on more than one situation, yet business remains silent, deaf and as they hide in ignorance they are limiting the options they have, in the future and in an acted decimation of one’s own future. The information in the Guardian (at http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy) shows a title ‘Facebook case may force European firms to change data storage practices‘ that questions certain elements. The quote “a court accused America’s intelligence services of conducting “mass, indiscriminate surveillance”” in the first paragraph is the act of alerting, but is that all?

The Case C‑362/14 Maximillian Schrems v Data Protection Commissioner is the calling entity here. A request for a preliminary ruling.

Let’s take a look at the elements. We see at [25] Mr Schrems lodged a complaint with the Commissioner on 25 June 2013, claiming, in essence, that the law and practices of the United States offer no real protection of the data kept in the United States against State surveillance. That was said to follow from the revelations made by Edward Snowden from May 2013 concerning the activities of the United States intelligence services, in particular those of the National Security Agency (‘the NSA’).

[35] Nevertheless, according to the High Court, the revelations made by Edward Snowden demonstrated a significant over-reach on the part of the NSA and other similar agencies. While the Foreign Intelligence Surveillance Court (‘the FISC’), which operates under the Foreign Intelligence Surveillance Act of 1978, (18) exercises supervisory jurisdiction, proceedings before that court take place in secret and are ex parte. In addition, apart from the fact that decisions relating to access to personal data are taken on the basis of United States law, citizens of the Union have no effective right to be heard on the question of the surveillance and interception of their data.

This all goes back to ‘the revelations made by Edward Snowden‘. I have forever had issues with the ‘revelations’, too many holes, too many issues that from an IT perspective are a given no no. In addition, it assumes a level of ‘openness’ within the alphabet group that does not exist. Such openness has never existed, yet the press and many others have been very willing to blindly accept the events of Edwards Snowden, yet the data was never made bare, the data is filtered and was largely ‘stamped’ as complex, as too dangerous. Yet proper analyses of the data was never made by any person that could be regarded as trustworthy. For now, to underline what comes, I will give you this quote “An intelligence operation is the process by which governments, military groups, businesses, and other organizations systematically collect and evaluate information for the purpose of discovering the capabilities and intentions of their rivals. With such information, or intelligence, an organization can both protect itself from its adversaries and exploit its adversaries’ weaknesses“, the source is not important right now, the impact will be discussed, yet before I do this I want to continue the other elements I started.

Now consider [224] where we see “In addition, the Commission expressly acknowledged at the hearing that, under Decision 2000/520, as currently applied, there is no guarantee that the right of citizens of the Union to protection of their data will be ensured. However, in the Commission’s submission, that finding is not such as to render that decision invalid. While the Commission agrees with the statement that it must act when faced with new circumstances, it maintains that it has taken appropriate and proportionate measures by entering into negotiations with the United States in order to reform the safe harbour scheme“.

Now consider the following thought by transforming the quote: ‘there is no guarantee that the right of citizens of the Union to protection of their data will be ensured‘ into ‘it will be certain that the right of citizens of the Union to protection of their data will be unsuccessful‘. The issue is that moving data will open up a massive amount of dangers, data instabilities and data security hazards. Too many players within the EEC and other places all want their fingers on the data so that they can get a foothold of power. It is THAT simple in my opinion!

All these nations wanting access to data, setting up corporations, all trying to make a quick buck whilst during political manipulating, the security of our data will be available to anyone offering 39 pieces of silver. Before you start listening to people with nice PowerPoint presentations and long winded explanations with considerable non liability asterisks on how this is so not possible consider the following events (at http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/). Ashley Maddison might be the most sensual one, but also the most embarrassing. In that same light we can see 145 million records of EBay, Sony, Heartland with 130 million and that list goes on for a long time. So the last thing I want to see is our data in the hands of some ‘seemingly’ ignorant individual, whilst completely unexpectedly and totally against ‘protocol’ the data will make it into the hands of third parties. Now I go back to that other quote, which I will paraphrase: “An intelligence operation is the process by which businesses systematically collect and evaluate information for the purpose of discovering the capabilities and intentions of their rivals and exploit the weakness of its adversaries“. This is what I foresee. This is why the crying over the NSA, whilst handing over health data to parties too unprepared to properly protect that data is more than just a big farce. Now we need to look at two sources. The first is the Guardian on the 28th February 2014 (at http://www.theguardian.com/society/2014/feb/28/nhs-data-will-not-be-sold-insurance-companies-jeremy-hunt), which gives us “Health secretary to provide assurance that confidential information will not be used for commercial insurance“, now Wired three days before that reported (at http://www.wired.co.uk/news/archive/2014-02/25/insurance-companies-buy-medical-records) “Details relating to hospital admissions from 1989 to 2010 were given (for an extraction fee) to the Institute and Faculty of Actuaries. The 13 years of data covering 47 million patients were given to the professional body to help them ‘improve accuracy in pricing’ of insurance“, yet all insurance is commercial, so as data goes, it is out there and too many players want a slice of that pie. Forcing more personal data into any open direction is beyond dangerous. That part can be constructed from http://www.wsj.com/articles/more-health-care-insurers-seek-big-premium-increases-1433206078. “Blue Cross and Blue Shield of Illinois is looking to raise rates by averages of 29% or more. In Pennsylvania, Highmark Health Insurance Co. is asking for 30%, according to proposals submitted by insurers for the year ahead. Around the country, some of the main market leaders are looking for double digit increases“. What do you think in all honesty will happen when they get the option to make healthcare unaffordable to all or unaffordable to some. Data will become the compromise and that danger is a lot larger when it is in the hands of ‘other’ third parties whilst the law is unable to deal with the issues at hand. The US has some strict rules in place that barring national security cannot be broken. Now we see a push towards fields where these levels of security do not stringently exist. What do you expect will happen? And healthcare is not the biggest slice of it all, just the most visible one.

In all this there are issues on both sides, yet at the core the pushed fear for governmental access is a fake and an illusionary one and it is shouted the loudest by people who have a little too much to hide. Hiding for the sake of their ego, their acts and/or the need for continue or renewed satisfaction of greed. Yes, I agree that my view is polarised to some extent, I agree that my view has flaws, but I approach it from a clinical side, whilst the others are all hiding through the shouting and claims set behind the emotions, the push to fear.

In all this I have yet to see the cold light of evidence that the alphabet group is disserving the people. The link to movies and conspiracy theories, nearly all of those claimants with their own agenda, sometimes badly hidden. Yet, in that light, is my view not too conspiracy theory set? I ask that of myself too, because without that consideration it is just a viewpoint. It will remain a viewpoint no matter what, yet consider that when you seek ‘NSA transgressions’ you find very little acceptable news events, with this I mean events that are of a decent level of report. When we look at data transgressions from other parties, that list is growing at an almost exponential rate and the size of the transgressions seems to be increasing, shifting data all over the place is not my first idea of safety.

Is it your choice?

When you decide and it goes wrong, you only have yourself to blame and as I see it, you lose all rights to complain when (not if) it goes wrong.

The next iteration of our lifestyles that what happens over the next 2 generations will all be about data and who has control over it and who gets access to it, which is not freedom.

 

Leave a comment

Filed under IT, Law, Media, Politics

Spooky Spooky Mobile

Spooky Spooky Mobile
Hacking thyne own file
Upload and Download
And as you have your chatter
I met a Telco
That would not give its data
So I took their servers
And gave it a little patch
(Goosy, Goosy, Gander)

Yes, when we look at the article ‘US and UK accused of hacking Sim card firm to steal codes‘ (at http://www.bbc.com/news/technology-31545050) I seem to resort to nursery rhymes. There is method to my madness, just as my madness could be regarded as methodical (to the smallest degree). I read the article with other eyes, perhaps you did too? The first part is seen here “The Intercept alleges that the hack organised by Britain’s GCHQ and the US National Security Agency (NSA) began in 2010, and was organised by operatives in the “Mobile Handset Exploitation Team”. Neither agency has commented directly on the allegations“, now, I will continue on the premise that this fact is true (not whether it is correct). In 2010 there was still a massive hunt for this bearded dude underway named Osama something or other. For this part I need to take you on a side trip ‘Banking Giant HSBC Sheltered Murky Cash Linked to Dictators and Arms Dealers‘ (at http://www.icij.org/project/swiss-leaks/banking-giant-hsbc-sheltered-murky-cash-linked-dictators-and-arms-dealers). The issue might be ‘news’ now, but it had been known in the intelligence industry for some time. After 2008 several individuals with additional limitations on moral and ethics were willing to assist the grey area of free trading in setting up funds. This group had ALWAYS existed, greed is such an easy tool to grow under, yet, the fact that some would be willing to be the money orchard for terrorist organisations is decently novel. 2008 had made many hungry so some would be willing to get at what they wanted, more money. A problem that has existed for a long time, so the premise to get access to mobiles so that possible lines of communications would be uncovered make perfect sense.

The trail goes further, you see, most people have a contract, or stay with the same provider for years, this not an issue for the hunters. You (roughly 99.99993243% of the mobile users) are not an issue, but how to find the rest? Hope on some random lucky draw? Governments rely on income from lotteries, not rely on getting a price in that same way. So getting a hold of ALL Sims is a much better solution. It made perfect sense. Do I like it? I actually do not care, I lead one of the dullest mobile lives and I believe that some people must be hunted down. So to go all out on ‘Yes’, hunt them down and ‘No’, you cannot monitor me, seems to be both hypocrite and sanctimonious all in one package. In addition, I tend to not break the law, which makes it even easier. So let’s get back to the article!

The next part is seen here “A Gemalto spokeswoman said the company was unable to verify whether there had indeed been a breach, and highlighted that other Sim manufacturers could also have been targeted. She added: “We take this publication very seriously and will devote all resources necessary to fully investigate and understand the scope of such highly sophisticated techniques to try to obtain Sim card data””, so we see two parts, one that the known provider is not the only provider, were they all targeted?

Linked to this is: “Eric King, deputy director of the campaign group Privacy International, said the NSA and GCHQ had “lost sight of what the rule of law means and how to weigh what is necessary and proportionate”“. This sounds nice in theory, but after taking a look at the Privacy International site, I see him as (only) slightly sanctimonious. all this on surveillance and SIGINT (the Five Eyes group), yet, they have ZERO visibility on the issue that I have on the exchange of data on a global scale by large corporations and how people are almost lulled into a sleepy state of just agreeing with it all, not to mention the other versions of the Lenovo ‘Superfish’ instances that we have not seen brought to daylight yet. It seems that governments are not allowed any options, whilst the propulsion of greed from large corporations and their data remains uninhibited by using the ‘US-EU Safe Harbor Framework‘ (at http://genomebiology.com/2014/15/8/430), when we consider the quote “A multinational seeking approval must submit its global policies and practices to a ‘lead’ EU data protection authority (DPA) – typically in the country of its European headquarters. Once the lead DPA gives its ‘stamp of approval’, a mutual recognition scheme among most EU member states facilitates approval by other relevant DPAs. To date, over 50 corporations have received BCR approval” When we see the list (at http://ec.europa.eu/justice/data-protection/document/international-transfers/binding-corporate-rules/bcr_cooperation/index_en.htm), we see NOVARTIS, which gives us a direct link to Natixis (and the massive amounts of links that they have). Ernst & Young and Motorola among others, so how can one satellite locations allow indirectly to move data across other borders, or make them accessible for query? Is it not interesting that Privacy International has not been looking at that (as far as I could tell), so do you see the issue I have with their ‘statement’?

Linked to the ‘alleged’ sim code heist is another article. This one is a lot older. It was from July 2013 and called “Millions of Sim cards are ‘vulnerable to hack attack’” (at http://www.bbc.com/news/technology-23402988), so, yes, when we see the quote “Karsten Nohl has said he has found a way to discover some Sims’ digital keys by sending them a special text message. He warned criminals could potentially use the technique to listen in on calls or steal cash“. So, yes getting the data from the sim makers directly would make a lot of sense (an ergonomically terrific solution), but this method might be less visible. So why was another method used. Now we get back to the beginning: “US and British intelligence agencies hacked into a major manufacturer of Sim cards in order to steal codes that facilitate eavesdropping on mobiles, a US news website says“, which News website? The fact that this news is followed by “The Intercept says the revelations came from US intelligence contractor turned whistle-blower Edward Snowden” gives another pause. What is actually happening? It seems to me that the Snowden stamp is making us chase ghosts (pun intended), but overall I see less and less reliability in these ‘spectacular revelations‘ and the press does not seem to be asking the questions they should be asking. The investigations that they should do, do not seem to be done. The ‘revelation‘ is made and then we see one party line response from GCHQ “However GCHQ reiterated that all its activities were “carried out in accordance with a strict legal and policy framework which ensures that our activities are authorised, necessary and proportionate”“, which is now linked to this, but there is no evidence that this has actually happened. The subtitle ‘Full investigation‘ seems to be a header without a factual link. That subtitle ends with some group shot and the by-line “Experts say that the alleged hack is a major compromise of worldwide mobile phone security“, is that actually the fact? Would phone security be compromised? It seems to me that the 2013 is a much larger threat to phone security and Google stopping its continued development to anything before Android KitKat is just an additional cause for alarm, how did the alleged government activities create more danger? It seems to me that the BBC has not illuminated parts that should have been illuminated. When we see “The UN’s telecoms agency – the International Telecommunications Union – said that it would now contact regulators and other government agencies worldwide to ensure they were aware of the threat“, is also an issue. When we consider the UK issue of telecom caps and the fact that nothing has been done for years, can we dimensionally see that awareness of the ITU could be regarded as a similar demure step is a valid question, yet the current article does not reflect on the earlier issue. The end of the latest article gives the one part that is important as I see it “But perhaps this latest leak has done more to highlight how a single company is in control of millions of people’s private data“. So was this an actual leak, or did someone figure out a possible issue with current technology and they added the ‘Snowden’ link to give it a little more fear. The last part could have been done by any decent technologist, no MIT degree required. So what about the one time mention of ‘a US news website says‘? Who was it and how come that this media courtier, depending on visibility is reduced to 5 words, which seemed a little odd to me from the very first time I read the message.

Leave a comment

Filed under IT, Media, Military, Science

Authentically Realistic

Whilst we see many sources talk about the need of blaming North Korea, we see an abundance of changes that are now not just changing the way we think, but these changes will also change the way we live and act. As we are soon to be lulled into more false sense of security, we must now content with the thought, what is real and what is not.

In IT these issues have existed on several layers for a long time, yet the overall lack of Common Cyber Sense has been absent for a massive amount of time. Bradley Edward Manning, now known as Chelsea Manning is only one of several parts of this puzzle. Wikileaks has added its own levels of damage and let us not forget the acts of Julian Assange and Edward Snowden. This is not on how things were done; it is about a lack of proper measures and controls. In the age of people screaming that they have a right to know, they will publish whatever they can for the need of ego and then scream on how the government is abusing their right to privacy.

These are all elements that link back to ‘Common Cyber Sense’.

CCS as I call it has in its foundations a few branches. The first is proper use and knowledge. Many still laugh and sneer at manuals and proper use of equipment, yet when other people started to ‘look’ through their webcams on laptops into their privacy, smiles disappeared quickly. We live in an age where everything is set around the fake image of comfort, it is fake because comfort at the expense of security is never comfort, it is just an added level of danger into your own life. At this point people forget that what is set into software, can usually be switched on and off at the leisure of a skilled ‘someone else’.

Buying what is cheap and what is right are worlds apart, that part is more and more a given fact. The bulk of people are lulled into ignoration when it comes to a simple easy tool that can be used everywhere, at which time they forget to ask ‘by everyone?’. Consider the HP laptop (one of many brands) has a build in webcam at the top of the screen, instead of relying on a software switch, these makers could have added a little slide that covers the lens, literally a low-tech solution making the lens see nothing, as far as I can tell, no one took that precaution for the safety and security of the consumer, is that not nice?

The second branch is access. If I got $.50 for every person that uses their name, ‘qwerty’ or ‘password’ or even ‘abc123’ for their login, I could buy a small Island like Hawaii or New Zealand, probably even both. Even though many websites and systems demand stronger passwords, there is always that bright person who uses the same password for every site. This is part of a larger problem, but let’s move on for now.

Third is the connection branch, places where we can ALWAYS connect! You think that not having passwords on your home Wi-Fi makes you safe? Wrong! You could add loads of problems on every device that connects to it by not properly setting things up. I wonder if those with an automotive router have considered the dangers of not setting it up properly and letting all the people they pass access to whatever is connected to it in the car.

The fourth branch is for the unknown. This might seem like a weird option, but consider how fast movable technology is growing, I am using ‘movable’ and not mobile, because this changing field includes phones, laptops, PDA’s, tablets and other not yet defined devices (like the apple watch, handheld game systems and consoles).

At the centre of all this is proper usage, but not just your hardware, it also includes your software, a fact many have remained oblivious to.

At this point, I will take a temporary sidestep and let you consider the following term ‘non-repudiation’.

Non-repudiation is about identity and authentication. Basically it states, ‘you and you alone‘ have sent this item (message, photo, financial transfer). In legal reasoning this will be the strong shift that will most likely hit many people in 2016 and onwards, it could hit you this year, but there are more than just a few issues with this situation for the immediate now. So when you lose your money and you state you were hacked, then you might soon have to prove it, which means that any evidence that you EVER gave your password or pin-code to a spouse, lover, boy/girl friend or sibling means that you nullified your rights. You get to pay for the consequences of THEIR acts at that point.

So when we see biometrics, we think fingerprint, we expect to be a lot safer. WRONG! Only last month did a group in Germany show how they recreated the finger print of the German Defence minister from simple digital photos, which means that this could have given them access to a whole collection of items, events and information they should not have gotten access to. So what to do? Well, that market is growing really fast. ‘Vein’ is the latest. It does not rely on fingerprint, but on the veins in a finger or hand, it is just as unique as a fingerprint, it is a 3d issue, making it even more secure and it requires an actual living hand. It also will lack the dangers of influence that a retinal scan has when a woman gets pregnant, or in case of a diabetes patient or alcohol levels. These all can shift retinal scans, with the added problem that this person stays outside the lock, becoming the valid person ‘no-more’. Yet, ‘Vein’ is still a new technology and not currently (or in the near future) available for movable devices, which gives us the issue on what devices are actually decently secure.

Let’s not forget, that even though this is not an immediate issue, the people will need to change their possible ‘lacking’ approach with more than just slow muffled interest, whilst they rely on the comfort of not having to comprehend the technology. That part is still not completely disregarded in several cases, the issue at Sony being likely the most visible one for some time to come. There is still a massive amount of actual intelligence missing. Most speculate, including me (yet I have been looking at these speculators and claimers of facts). Whilst Sony is visible, there are still unanswered issues regarding the NSA and how a place like that had the implied intrusion Edward Snowden claimed to have made.

Now let us take a step back to the four branches. I showed the webcam issue in the first branch, but the lack of consideration by the user is often a bigger problem. You see, many ‘lock’ their device, or just walk away and switch their screen off. Their computer remains connected and remains accessible to whoever is looking for a place to hack. I know that waiting 45 seconds is a bother at times, but learn to shut down your computer. A system that is switched off cannot get hacked, the same applies to your router (which actually has the added benefit of letting your adapter cool down, making the device last longer) and your overall electricity bill goes down too, all these benefits, all neglected for the fake comfort of accessing your social media the second you come home. Yet proper usage also includes software upgrades. Many do them, but more often than not, they tend to be made when the system reboots, when this is not done (or the software upgrades are not made) your system becomes increasingly at risk for intrusions of all kinds. Windows 7, which is a lot better than either Vista or Windows 8, still required 84 patches in 2014. With over half a dozen being either critical or important, you see why even in the best of times, under all conditions met, you still run some risk. And this is just Windows; in 2013 they had to fix 47 vulnerabilities regarding Outlook, explorer and the Windows kernel. There was a massive issue with remote execution, which means that your system was open to the outside without the need for a login (source: PCWorld). Now, to their defence, Windows and office are massive programs, but still, it seems that Microsoft (not just them) have taken a strong stride towards ‘comfort’ whilst ignoring ‘safety’ (to some extent).

Branch two is usually the biggest flaw. Even though many websites will require a decent level of strength (usage of small and capital letters, numbers and a special character), but that list is still way too small. The amount of people that I have met that use the lamest of simple words (like ‘abc123’) and these people cry the loudest when their money is gone. You see, it is easier to just hack your computer or device and use that system to order online via other means then it is to hack into your bank account. Yes, it is a bother (at times) to remember every password, yet in that regard you could be clever about it too. There is nothing stopping you from creating variations on a password whilst making sure it is a completely different one. I learned that someone had used her dictionary app to use a version of word of the day, she changed ‘adscititious’ into something like ‘Adsc1t!tious’. Good luck figuring that one out! (I had to look up the word in all honesty), the options become even more interesting if you speak additional languages. So, branch two is something that you the user largely control.

Branch three is actually the growing danger. It is not just when we connect, but when things connect automatically that becomes an issue (and where from). Insurance companies are more and more about your visibility, even though no official moves have been made, the day that junior uploads that catch of the day to his Facebook with dad in the background. That is the option for the members from the ‘institute of discrete entry and removal operations’ to help you with your old stuff (the missing items when you get home). The information you ‘give’ when you connect (especially on free Wi-Fi places), you see, when you connect to free Wi-Fi, more than one danger exists that others can connect to you, yes, you could learn that free Wi-Fi was the most expensive part of your vacation soon thereafter. It however moves more and more to your area of usage. As we get more connections and as we can connect from more places (like the automotive router), we will receive additional responsibilities in setting devices up properly for our safety and the safety of our children.

Now, to take a second sidestep. This is not about scaring you (a nice benefit for sure), some of these things can be prevented from point zero. Knowing what you switch off, switching off when not used are first easy and elemental steps. You see, a hacker looks for a place to get into, when your computer and router are switched off, the hacker will not spot these devices at all and move on. Hackers do not like to waste time, so when you use proper passwords, that same hacker will lose a lot of time getting access to your devices, time he could be having ‘fun’, so these two elements are already diminishing the chance of you getting transgressed upon. But in the end, there is another side. Makers of hardware and software need to become increasingly aware that their ‘toys’ have malicious usage. It was Geek.com that had the article ‘Yes, Xbox One Kinect can see you through your clothes‘ (at http://www.geek.com/games/yes-xbox-one-kinect-can-see-you-through-your-clothes-1576752/), which gives an interesting demo (without showing off anything indecent) how defined and articulate the scan system worked and it is a hackable solution, even there we see the mention that a lens cover would not have been a bad idea.

Yet we have digressed away from the heart of the matter. All these are linked, but the crown in the hardware is an increasing need for non-repudiation, showing that you and only you acted. A lack of this evidence could also go a long way in proving that you were innocent and that you were the victim. It is easy to claim that the makers are at fault and to some degree they are, but there is a growing need to have the right solution, and so far having any clean solution remains absent, whomever comes up with that could own the cornerstone of the global technology sector, an area that represents a massive amount of long term revenue.

 

Leave a comment

Filed under IT, Law

Vindication

Today is turning out to be a nice day after all. I have made mention on more than one occasion that I am not an economist, I am an analyst and for some time now, the numbers have not been adding up. Certain action had been taken and they never made sense. The issue I had is that because the press seemed not to dig into this gave a decent amount of persuasion that I might have been wrong, which would have been fair enough, yet I know data, I lived data for decades and the numbers just did not add up.

Yesterday I saw a first glimpse, and today there is now a clear indication that I had been right all along. Goldman Sachs had been a part of a lot more than many can fathom. So whilst Cuppa Joe and the press at large has all been about the ‘naughty’ intelligence branch, they all ignored the trap behind it and let the banks do whatever they damn well liked.

One step back

The first inkling was Goldman Sachs directly in my blog ‘Banks, eunuchs of a new congregation‘ of February 7th 2013, more than 1.5 years ago! In there I gave this quote: “It is almost that there is a voice whispering in the ear of Dutch Finance minister Jeroen Dijsselbloem. The whispers seem to be about the Bad Bank and the whispers could involve Goldman Sachs” and “This thought was also mentioned by Rolfe Winkler at the New York Daily News. How is it even possible that a company that seems to have been one of the major reasons for the financial meltdown be regarded, or even ALLOWED to make any continued presence?“, this would get followed by my blog ‘The Italian menace?‘ on February 10th, 3 days later. “Berlusconi, who said he won’t seek the executive position but rather prefers to become Finance Minister, has seduced the masses saying he will repeal a property tax imposed by Monti, returning about €4 billion“. These elements are all in league with one massive step. As these members are directly linked to Goldman Sachs. Not just Berlusconi, it is also Mario Monti who has direct links to Goldman Sachs (at http://www.independent.co.uk/news/business/analysis-and-features/what-price-the-new-democracy-goldman-sachs-conquers-europe-6264091.html). The independent article shows even more, steps that I had not looked at (for various reasons). Yet, overall Goldman Sachs has been keeping their fingers in all these pies.

In the near past

As we look at the events in the near past I wrote ‘Two deadly sins‘. It was November 27th 2013. There we see the following quote “After the issues we had seen in the last 3 years, I started to doubt the correctness of the Dow (and I reported on that in past blogs). It goes up and up, but with JP Morgan Chase, Goldman Sachs, VISA, American Express putting pressures on those numbers, the three big boys (drugs) could rock the boat in a massive way, which scares Wall Street to no extent. Greed and Treason, it is all connected and it hits us all critically hard sooner rather than later!” I had no idea that I was so much closer to it all then I thought. That part has just been made clear!

Now

The Huffington post (at http://www.huffingtonpost.com/2014/09/28/elizabeth-warren-new-york-fed_n_5896778.html), has just release this article stating that “Sens. Elizabeth Warren (D-Mass.) and Sherrod Brown (D-Ohio) are both calling for Congress to investigate the New York Federal Reserve Bank after recently released secret recordings show the central bank allegedly going light on firms it was supposed to regulate“, but there is more, like a bad infomercial from TV we see the added flavours that would silence Dante Alighieri and reduce Niccolo Machiavelli to a mere checkers player when we consider the additional quote “Segarra says that she was fired from her job in 2012 for refusing to overlook Goldman’s lack of a conflict of interest policy and other questionable practices that should have brought tougher regulatory scrutiny“. So, this was NOT just the banks, this seems to imply that the US government themselves have been linked to the massive degrees of freedom that Goldman Sachs has been enjoying. So that leaves us with the thought that the EEC is not enjoying any freedoms at all, it is enjoying the allowance to decide on how much they all are in debt to Goldman Sachs and whatever is behind them. Because, a choice of one is not a choice, it is a directive and now we see the amount of people that have been involved in orchestrating all this.

I wonder if the mentioned 48 hours of taped conversations will ever make it into the daylight, chances are that this will get locked up real fast. As the American people were so smitten with a joke called Snowden, they all got played into the side where the banks were given freedom of movement through all this and the press at large did NOTHING to truly look into the dangers their populations faced, it is the ultimate Machiavellian play.

I particularly liked this quote “In one instance, she said she alerted a colleague that a senior compliance officer at Goldman had said that the bank’s view was that “once clients became wealthy enough, certain consumer laws didn’t apply to them.” Segarra claims that her New York Fed colleagues asked her to ignore the remark and change meeting minutes she had taken, which contained evidence of what the Goldman executive said“, which basically means that the rich do not just get a free play in the game, they remain unaccountable beyond a certain point. Did we who will never be rich sign up for that? I have no issue with people becoming rich, providing it is through non-criminal ways, yet the fact that this also implies non-accountability to the law is an entirely different matter. If you think that this is not an issue, then wonder what a firm like Microsoft is getting away with or Goldman Sachs for that matter. It is easy to remain unaccountable when the lawmakers are in your pockets.

Recently

Now this all links to another party, who only recently got visible thanks to a ‘dubious’ ideologist as he exposed the Swedish left winged system. I am talking about Natixis! Its assets exceeds well over half a trillion dollars, not bad for a French bank! Why are they here? You see, I always saw that there was more to Goldman Sachs, yet as my stories were never explicitly about Goldman Sachs, but about events that involved them, Goldman Sachs was clearly on my radar. Natixis until the Swedish election was not, nor needed it to be. Yet when we look at their Portfolio of Investments – as of December 31, 2013, we see that they are linked to the bulk of large corporations and their financial needs. They also have a nice little chunk of Goldman Sachs. Now we have a race, because together they hold over 1.5 trillion in assets. Are we all awake now?

Two corporations with the power to shift, change and pressure government oversight in America and pretty much the entire European Economic Community, is more than just a nuisance. Remember how Goldman Sachs promised (read threatened) to transfer a substantial part of their European business from London to a Eurozone location – the most obvious contenders being Paris and Frankfurt. It was a statement by Michael Sherwood, co-chief executive of Goldman Sachs International (at http://www.theguardian.com/business/2013/dec/04/goldman-sachs-warns-london-exit-britain-eu), at this point we get to wonder whether it was a business decision, or whether it was a phone call from a person with direct access to the ear of the President of the United States (yes the last part is an assumption on my side, but is it such a wild one?), if any of this is ever confirmed, I reckon that this is the one straw that breaks parliaments back and results in a shift of power to Ukip so fast it will make all the heads in Whitehall spin.

This is just the parts I got a hold on, I feel certain that a REAL investigative journalist (if one still exists) would have been able to find a lot more, yet nothing has made the papers in this regards for close to two years. You should really start to ask the question why!

Because, when we see the press entrap MP’s with fake profiles, whilst ignoring these levels of power, then the press has failed on so many levels it is not even funny anymore.

Tomorrow

Today is the start to plan for the questions that many should be asking government and the press tomorrow, the press because they seem to be asleep at the wheel, asleep that two companies have so much power that they can set the entire political tone. Freedom has never been about this. Freedom lost, because of what I regard to be cowardly (and possibly greed driven) politicians who are enabling a group to be flaccid economists to empower wealth and greed and condemn us to consumer based slavery until our numbers are no longer balanced as profitable.

How can we ever attain a better life, or in regards to the links that I recently discovered any form of a healthy life at all? Will be see vindication, but who in the end gets vindicated is an entirely different discussion.

Leave a comment

Filed under Finance, Law, Media, Politics

For our spies only!

It’s out in the open, apparently Australia will get its first feel of a ‘cold war’, which according to Attorney General Brandis, will be a lot worse, will it?

Let us take a look.

The first source is the Guardian (at http://www.theguardian.com/world/2014/sep/26/spy-agencies-to-get-stronger-powers-but-what-exactly-will-they-be), as I am all about a certain level of consistency, let us add a few quotes. “Crossbench senators and many stakeholders raised their concern that, in the absence of a clear definition of a computer network, a single warrant could be used to access a wide range of computers, given the internet is a network of networks” as well as the response to the greens who wanted to add a limit of 20. “Brandis said such an amendment “would impose an arbitrary, artificial and wholly unworkable limitation that would frustrate the ability of Asio to perform its statutory functions“.

These are both fair points, in regards to the sunset clause the response was “No. Brandis rejected a call to put a 10-year expiry date on the new law related to special intelligence operations, despite agreeing to similar sorts of sunset clauses in the yet-to-be-debated foreign fighters bill“.

And the fourth quote, which we need later on is ““Freedom is not a given,” the attorney general said. “A free society is not the usual experience of mankind. Freedom must be secured, and particularly at a time when those who would destroy our freedoms are active, blatant and among us”“.

So, this sounds fine and it all sounds viable, but what about the dangers here (are there even dangers)?

For those with some insight in law, here is the bill as it currently stands (at http://parlinfo.aph.gov.au/parlInfo/download/legislation/bills/s969_first-senate/toc_pdf/1417820.pdf), which for the most is an amendment to the Australian Security Intelligence Organisation Act 1979 (at http://www.comlaw.gov.au/series/c2004a02123).

Initially, it seemed that there was an issue on page 76, yet, when we look at the final product, the change makes perfect sense. The first change here is the approach to information; basically, we will not have a weaky leaky speaky person. So we will (hopefully) not have an issue with some person dreaming to be on team Manning, Snowden and Moronic. It was so nice of the NSA to get into ‘hot’ water, so that we can prevent it. However, not all is well; this is seen (at http://www.theguardian.com/world/video/2014/sep/26/internet-threat-existence-video). Whether it was just bad form, or over generalisation, Senator Glenn Lazarus stated “The internet is a serious threat because it can be used to orchestrate and undertake criminal behaviour across the world“. He then continues how ASIO and ASIS are there to increase security. It is this slight casual quote that seems to voice the dangers, as these powers are needed to combat security threats of several shapes. Yet the senator states “orchestrate and undertake criminal behaviour“, which is a lot broader then initially implied. This does not mean that this will be used as such, and quite honestly, if it stops shady financial advisors, then I am all fine with that, but it goes further than that as it was voiced (not stating the reality will be as such). Another part of the Guardian showed the ‘grilling’ of Attorney General Brandis by Senator Scott Ludlam, yet it seems that there the kettle is off the boil too. The Senator knew that Brandis would not answer or resort to speculation. He stated “I am not going to indulge Senator Ludlam by answering hypothetical cases or cases of historical interest“, which is fair enough. The Senator should know that, when he did a similar thing on October 4th 2013.

So where is the fire and is there a fire? You see, what is happening now, is what should have been done some time ago. I oppose Brendan Molloy from Pirate Bay (a fellow student), but his heart is in the right place (top right behind the rib cage, just like mine) and all these posters we see all over the place in regards to whatever, whenever, forever and prison. It is nice that we see all these posters on dangers and so on, yet some people seem to ignore the debilitating blows the US suffered at the hands of Manning and Snowden, not to mention Jullian Assange (which I will not go into at present). This will now change. At times those who don’t know speak those who know remain silent. It is when those who know speak out, that is when the casualties really go into many digits and Australia has its own brand of security issues. America has a little over 19,000 border miles on an area occupied by 320 million people. Australia seems larger, with a 22,000 border miles coastal line, yet overall Australia only has 22 million people, so with a population less than 10% we have to play the game another way. The security measures are one way, not the only way, but it will possibly stem several issues, which gives our intelligence branches a little more time to figure it out. Let us not forget that we have an intelligence structure and a form of Signal Intelligence, but if you think that they get a serious chunk of cash, then consider that the total Australian intelligence budget is a little under 1% of what America gets, and we get to look at a similar sized chunk of land to observe and a lot less people.

This got me to two issues that are now forming, yet the bill seems to not cover it as such. I am referring to the Telecommunications (Interception and access) Act 1979. Intelligence is essential, so is data collection and analyses. What happens when new solutions are needed? What happens when we face a change? The US had this when they needed more efficiency for the buck and a system called Palantir was used in the tests. Like Deployable Ground Station (DGS), the army ended up with a version known as DCGS-A. Now we get off to the races, the initially optional new system Palantir, its software was rated as easier to use (not unlike the analytical tool IBM Modeller), but did not have the flexibility and wide number of data sources of DCGS-A, which now gets us into hot water, or what the London Chef of Sketch might classify as: ‘from the frying pan into the fire’, these changes will also impact other systems and other people. In many cases the use of a NDA (Non-Disclosure Agreement) is used (or in many cases Positive Vetting). The entire mess (slight exaggeration), will take on new forms as we see how the changes might also have a flaw (as I see it), what happens when there is a sudden spike of collected data. Scripts, automation, production jobs and moreover the gathering, sifting and storing of data will soon take an entirely new dimension. The current intelligence framework is in my humble opinion not even close to ready for a growth in excess of 400% (800% is more realistic). You see, if we are to set up a path that gives us a possible trace of events, then we need several snapshots, now, they will not snapshot the entire nation, but the amount of data that needs to be stored so that the people who need to know can follow the trace will be a massive one. I for one, am absolutely not in the mood to allow a ‘3rd party’ (read IBM, Oracle and a few others) to set up shop, as that data could even end up in America. Even though I have no issue with my data, feel free to check my Diablo 3 save file guys! The issue is when a grey field allows other uses. For this I recall the article ‘NSA linked to corporate dangers?‘, which I wrote on September 22nd 2013 (Yes, a year ago!), where I quoted the NSA site (the open source unclassified part), “The Information Assurance Business Affairs Office (BAO) is the focal point for IA partnerships with industry. It also provides guidance to vendors and the NSA workforce in establishing IA business relationships and cultivates partnerships with commercial industry through demonstrations and technical exchanges“.

So when we see such an escalation, how long until we see an ‘evolution’ of our intelligence data to create a business space? Let’s be honest upfront, the NSA has a different charter and as such has a massive amount of additional tasks, yet in the current form, is such an evolution that far-fetched? How dishonest is the advantage when a firm like Telstra or iiNet gets their greedy little marketing claws on data so verbose that they can target 10%-20% more ‘efficient’? So we have 2 sides and as far as I see it an element that might need tweaking because of it (reference to the: Telecommunications (Interception and access) Act 1979). The entire Data mining issue is also on the table as I have not met an abundance of miners who have my levels of skill when it comes to massive data sets. When the pressure is on and they need to create a creative alternative to a missing values data set, the race will be pretty much over. Then what? Get external experts?

Now we go back to the initial fourth statement ““Freedom is not a given,” the attorney general said. “A free society is not the usual experience of mankind. Freedom must be secured, and particularly at a time when those who would destroy our freedoms are active, blatant and among us”“. I do not oppose the statement perse, yet in my view the statement is “Freedom is a given in Australia, to keep the Australian values, in a time and under conditions that were designed to remove the tranquillity of our lives, steps must be taken to safeguard the freedom we hold dear. As such we need to act according to new paths for the sole purpose of stopping these elements amongst us, who are driven to remove freedoms, we and all those who came here to enjoy our way of life“.

Freedom remains a given, we will just add a few new solutions to stop those intent on destroying our lives and our freedoms!

In the end, both the Attorney General and myself decided to make Pappas Bravas, he said potato, I said tomato, yet I remain at present cautious on who else is eating from our plate, without the balance of the whistle blower, that person might remain undetected, in that regard, I would have preferred that a clear location would be there to alert someone, even if it was a special appointed judge (who would be added in subsection “(4) The persons to whom information may be communicated under subsection (3) are the following:

Was that such a stretch?

 

Leave a comment

Filed under Law, Military, Politics