Tag Archives: FBI

Blackadder to the rescue

Yes, now for something completely different. Today only partially continues yesterday’s conversation. The article ‘Iranian puppets‘ gives us (at https://lawlordtobe.com/2019/06/14/iranian-puppets/) where I mention: “I will never proclaim myself towards Iran“, I also made mention of the 15 bitches and a serve of coffee (between the lines), yet I will always proclaim towards evidence. Evidence is everything and even whilst Iran is the most likely guilty party, I tend to follow the evidence. The evidence puts us with Houthi forces, optionally there is enough circumstantial evidence involving Hezbollah, however, this seemingly changes today as more than one now give us: ‘UK joins US in accusing Iran of tanker attacks as crew held‘, here I remain cautious. You see, the US had graphics in the Iraq WMD part and that got us in different waters, even as much better questions should have been asked with that clusterfuck in the making. The UN secretary general António Guterres called for an independent investigation, a part I very much support.

The intelligence suckers tend to be driven by EGO and whoever their Commander in Chief is and that tends to be needlessly politically driven and there the not guilty tends to be a target, this is not the same as the innocent, but you see the impact I am referring to. In the UK the Foreign Office is giving us: “It is almost certain that a branch of the Iranian military – the Islamic Revolutionary Guard Corps – attacked the two tankers on 13 June. No other state or non-state actor could plausibly have been responsible“, I am willing to agree with this, however we have seen decently clear evidence that in more than one case Iranian flag officers acted on their extreme self, not with the official support from the actual government. It is the consequence of the Iranian clerics having direct access to Iranian generals and acting on what they proclaim is the will of Allah. Those who do not grasp that part are out in the cold, pointing at the wrong party and creating escalations.

So whilst the world goes with: “Iran did do it. You know they did it because you saw the boat. I guess one of the mines didn’t explode and it’s probably got essentially Iran written all over it … You saw the boat at night, successfully trying to take the mine off – and that was exposed” that is one view to have and it might be the correct view, yet we already have two parts here. The fact that the mine did not work implies that Iranian hardware has additional issues (or optionally a non-trained individual had access to that hardware and did not set it up correctly, which is actually more likely). The second part is that the act was about deniability, giving more need to point at a state actor, but was it one with clearance or one deciding that they had to make their government look good? The issue around deniability is set not in stone, but it seems to be on a tablet where someone else has the erase function active. And in this the US and the UK have played similar games over the last 10 years. So let’s set this in a speculative example.

The Iranian Ministry of Roads and Transportation is run by Ali Nikzad. He decided that the boats were transgressing on Iranian sovereign waters and ships are transport, so Ali Nikzad decided to give these transgressors a lesson, he gets a hold of officers who are eager for promotion and he plays the ‘I need to test our equipment for transportation of dangerous goods’, he gets mines (plural) and he tests the mines with an engineer who is not really qualified to operate mines. The attack works, but one mine was not set properly. Now he has a problem, because even as he got the equipment, he was not allowed to operate in the way he did as that was a military action, and he is merely a lowly Minister of Roads, commercial shipping lanes and Transportation, he now has to resolve the issue before it taints him and he gets someone to remove it (most likely the engineer who wrongly set the mine).

In addition to this, when we see how Belgium defused a mine situation according to the Dutch, will we see more or less reliability? Was it the image that made for the change?

All this a speculation, but the play is not that speculative, several players have engages in similar games, optionally the IRGC knew of the operation, and they did not act because their fingers were not in the cookie jar; they all have a scapegoat and there is no physical evidence to support any story that anyone tells.

This is one of the intelligence games that are out there and now we have a state actor and everyone (led by the US) are now pointing at the wrong state actor and the evidence is out there proving some right as the involved person is seemingly Iranian, but wrong as this is a bogus action in the first place. Now we see Hamid Baeidinejad (Iranian ambassador to the UK) all huffy and puffy because he is doing what Tehran told him to do and the game he plays looks good, because he truly believes that he is playing the proper game as instructed by Tehran and let’s face it, the US does not have a great track record when it comes to Intelligence data and parsing intelligence data to create actual verifiable data, do they. When in doubt, call the NSA at +1-301-688-6311, ask for Deputy Director Barnes (General Nakasone is often too busy according to his personal aide).

In all this, there is a surprising realisation, you see, the opposite is also an option and I wonder why it is not actively investigated, there is an opposing solution that takes Iran out of the equation and it is a solid solution that stretches 74,967 meters in length and could change the game, in addition to that it could hinder Iran to the larger degree, basically to the degree where Bandar Abbas would financially be decimated, its economy would plummet to below basement levels.

I wonder how willing the UAE would be to change the game to benefit their economy. Oman could optionally benefit as well, so there is a solution that could propel two nations, whilst freezing the Iranian economy twice over. You see, as I look at the state of play, a proxy war can go in two directions; you can be in denial as there is no proof, or you can go into proclamation to set the stage of something that is legally allowed, people look at the first and then ignore number two. I let you work out the puzzle and let you figure out what some never considered.

A Monty Python solution presented by Blackadder gives us the second option in two ways (at https://www.youtube.com/watch?v=ZzXhLp2wLQo) we see the approach to a literal following of orders then (at https://www.youtube.com/watch?v=UBhN28eTuP8) we see the application of intelligence: “I beg leave to commence a private prosecution the accused for wasting the courts time“, and in all this, the stage is set and optionally correctly set, yet there is a range of issues that have not been addressed.

Some will go with the smoke and fire part and that is all good and fine, yet when did we get a proper investigation before pointing the finger (optionally through the slipping them the bird)? To let this sink in, let’s take a look at American accusations: “By labelling some of the high-level waste as low level, the US would save $40bn in cleanup costs across the nation’s entire nuclear weapons complex. The waste which has been stored in South Carolina, Washington and Idaho would be taken to low-level disposal facilities in Utah or Texas“, whilst the clear danger of radioactive waste has been out in the open for decades we are confronted with: “This administration is proposing a responsible, results-driven solution that will finally open potential avenues for the safe treatment and removal of the lower level waste. DOE is going to analyze each waste stream and manage it in accordance with Nuclear Regulatory Commission standards, with the goal of getting the lower-level waste out of these states without sacrificing public safety“. In this application of rules, we are not merely rephrasing the stage of what is regarded as ‘safe treatment‘, it changes the face of danger by diminishing risks on the need for cutting 40 billion. Now we can agree that 40 billion is serious cash, yet after it passed the facilities in Utah and Texas, what damage will be left behind because standards and definitions were changed by people who desperately need things to get cheaper? And when this backfires, how will the US afford the reparations that will be in excess of a trillion dollars easily? saving $40 with a decent certainty that it will cost you $1,000 around the corner is not clever, it does not save anyone anything and it decimates the quality and value of living in Utah and Texas, so how good is that step once the proper denials are in place?

The same can be said in the UK and their approach of Fracking, shale gas options. In a stage where the Netherlands has had: “A total of 127 damage reports were received after a fracking earthquake in Groningen on Sunday morning“, in addition “the TCMG receives around 200 damage reports per week. Over the past two weeks, the committee received at least 200 reports per day“. Also before I forget, when I was young and living in the Netherlands, Groningen was plenty of things, there was even a rare occurrence of an earthquake (once ever whilst I was in primary school), the entire stage of living in Groningen changed after Fracking, a clear change in values and cost of living as properties have diminished and the entire area is now a minefield of accusations and litigations, how much will that cost the government in addition to the claims they get? There is a second danger, if any of those chemicals ever make it into the groundwater; the Netherlands has some options, whilst the UK as an island does not. Dangers that we see give the rise towards people and politicians seem to regard the element of denial, a dangerous stage on two fronts, in the UK the danger for living expenses as it goes up by 1500% when UK tap water is no longer safe to drink; in the US where radiation contamination when found too late will have new long lasting disastrous effects.

Merely two elements that have the same stage; the stage of denial can be a very dangerous one and in Iran we see a stage where we cannot afford to give in to that danger. We need to be certain, an actual war, one that Iran will lose regardless will still impact and optionally disrupt crude oil paths for decades, consider the next decade when oil returns to prices like $163/barrel. The restoration of any economy becomes close to nil, unless you make money from the oil industry. That is why I want to make sure that Iran is properly dealt with and in all this, my plan B remains valid and an optional alternative path to increase pressure on Iran.

Nobody is saying, stating or implying that Iran is not involved, the issue is WHO placed the mine and there is where we get the issue. The US and the UK clearly know this. In case of the US we have Timothy James McVeigh. Now consider what would have happened if that attack was post 9/11? I am not stating that anything wrong was done by the FBI, I am however decently certain that the entire investigation would have had a dozen other turns and double turns. There is absolutely no guarantee that the same result would have been presented. I am not stating that the FBI did anything wrong, I am not stating that anything else happened.

To look at this setting we need to consider a quote by Counterpuch.org. Here we see: “The FBI suffered another debacle last Friday when an Orlando jury returned a not guilty verdict for the widow of Omar Mateen, who killed 49 people and wounded 53 in his attack on Orlando’s Pulse nightclub in June 2016. The biggest terrorism case of the year collapsed largely thanks to FBI misconduct and deceit” there are more sources. NPR Radio gives us: “the prosecution had withheld crucial information for the development of their argument. It was not until after the prosecution had rested its case, nearly two weeks after the trial opened, that prosecutors disclosed the information in an email last Saturday“, as well as “federal authorities had also opened an investigation of Seddique Mateen after the shooting, basing the probe on a series of money transfers he made to Turkey and Afghanistan not long before the massacre. The defense argued that without those details, the defense had been unfairly hamstrung — an assertion that Byron rejected. He denied the motion earlier this week and allowed the trial to proceed” denial of facts as well as denial access to facts, denial of due process in light of whatever reasoning was given and as denial of circumstances. At this point the widow of Omar Mateen was regarded as not guilty and there is no way of knowing whether this was just, correct or merely the consequence of stacking the deck knowingly and willingly.

When you consider that personal ego made these leaps of consideration, and we see the impact, the need for higher intelligence usage and the better investigation of what is happening in Iran and by which person becomes a lot more essential. When we see three players all in a stage to wage war on Iran (an idea that I do not oppose) lets at least do it for the right reasons. Doing the right thing based on flawed and incorrect intelligence corrupts the act and over time degrades the reasoning of the act. It is important to see that difference, and whilst there are optional paths to making the Iranian economy tanking it to the bottom of the Strait of Hormuz, I will remain in favour of doing that. You need to have seen war in all its majesty of cadavers and victims to appreciate alternative parts, only those who played call of duty might like a direct war, which will only last until you actually get to wash the blood out of your hands, that sweet smell of blood will follow your nose until the day you die.

Iran might be going into a wrong direction, yet we do not have to follow them like stupid lemmings, as I stated, I am not against setting a war against Iran, I merely want alternatives that gets us the same result. A proxy war goes both ways, we merely have to alter the signs on the entrance door; it is our door, so we get to do that.

 

Advertisements

Leave a comment

Filed under Law, Media, Military, Politics

Iranian puppets

Saudi Arabia has been under attack for a while, yet the latest one has been the hardest hit for now. 26 people were injured in a drone attack on Abha Airport. The fact that it is 107 Km away from the border gives rise that this is not the end. Even as we see: “a late-night cruise missile attack by Houthi rebel fighters”, I wonder if they were really Houthi or members of Hezbollah calling themselves Houthi. In addition, when we see: “the missile directed at the airport had been supplied by Iran, even claiming Iranian experts were present at the missile’s launch” as the Saudi government stated this, I am not 100% convinced. The supply yes, the presence is another matter. There is pretty hard evidence that Iran has been supplying drone technology to Lebanon and they have been training Hezbollah forces. I think this is a first of several operations where we see Hezbollah paying the invoice from Iran by being operationally active as a proxy for Iran. It does not make Iran innocence, it does change the picture. the claim by Washington “Iran is directing the increasingly sophisticated Houthi attacks deep into Saudi territory” is more accurate as I see it. It changes the premise as well as the actions required. From my point of view, we merely need to be able to strike at one team, if anyone is found to be Lebanese, Saudi Arabia can change the premise by using Hezbollah goods and strike Beirut – Rafic Hariri International Airport with alternative hardware. Lebanon stops being the least volatile country in the Middle East and it would stop commerce and a few other options at the same time. I wonder how much support they get from Iran at that point. I believe in the old operational premise to victory

Segregation, isolation, and assassination, the tactical premise in three parts that is nice and all solving; It can be directed at a person, a location, or even an infrastructure, the premise matters. It is time to stop Hezbollah, that part is essential as it does more than merely slow down Houthi rebels, it pushes for Iran to go all in whilst being the visible transgressor, or it forces them to back off completely; that is how I personally see it.

So as we see the Pentagon rally behind diplomatic forces, I cannot help but wonder how it is possible for 15 dicks to be pussies? For the non-insiders, it is comprised of the 7 joint chiefs of staff, the septet of intelligence (Army, Navy, Air force, Marine, FBI, CIA and NSA) and of course the National Security Advisor. It is time to change the premise, it really is. It is also a must to proclaim ourselves to either the Kingdom of Saudi Arabia, or Iran and I will never proclaim myself towards Iran (a man must keep some principles).

We can be all angry find a solution to erase them. As I see it, my version is more productive in the end. They are targeting close to the border as much as possible, this implies that their hardware has limitations. Even so to merely rely on anti-drone and some version of an Aveillant system is economically not too viable, it will merely make some places (like airports more secure). When we look around we see that there are 6 ways to take care of drones.

  1. Guns, which requires precision and manpower
  2. Nets, same as the first, yet a net covers an area better chance of results and a chance to get the drone decently unharmed, or retrieve enough evidence to consider a counter offensive
  3. Jammer, a two pronged option, as the connection fails most drones go back to their point of origin giving the option of finding out who was behind it.
  4. Hacking, a drone can be used for hacking, but the other way is also an option if the drone lacks certain security measures, optionally getting access to logs and other information
  5. Birds of Prey (Eagle, Falcon), A Dutch solution to use a bird of prey to hunt a drone, an Eagle will be 10 times more deadly than a drone, Eagles are a lot more agile and remaining as fast all the time.
  6. Drones, Fighting drones with drones is not the most viable one, however these drones have paint guns which would hinder rotor function and speed, forcing gravity and drag to be the main issues for the drone.

The issue is not merely how to do it, but the specifics of the drone become a larger issue. An Eagle and most solutions will not work against the MQ-9 Reaper drone (to name but an example), yet Hezbollah and Iran rely on the Qods Mohajer (optionally the Raad 85), which when considering the range is the more likely suspect. What is important to know is that these devices requires a certain skill level, hence there is no way that a Houthi forces could have done this by themselves. It required Hezbollah/Iranian supervision. There the option of jamming and drones with a paint gun would work, if a jammer gets shot onto the drone, it will give them a way to follow, paint can have the same effect whilst at the same time limit its capabilities. If the drone is loaded with explosives and set for a one way trip there is a lot less to do, yet the paint could still impact its ability if there is enough space left, if the paint is loaded with metal it could light it up making it a much better target. All options that have been considered in the last few years in anti-drone activities, the question is how to proceed now.

I believe that inaction will no longer get us anywhere, especially when Hezbollah is involved. That is the one speculative part. There is no way that Houthi rebel forces have the skills; I believe that Iran is too focussed on having some level of deniability, hence the Hezbollah part. It is entirely probable that Iranian forces are involved, yet that would be the pilot and with the range, that pilot would have been really close to the Yemeni border making Abha airport a target, yet unlikely that more inland another target would be available to them.

Knowing that gives more options, but also makes it harder to proceed, the earlier five methods mentioned are direct, there is one other option, but I am not discussing it here at present as it optionally involves DoD classified materials (and involves DARPA’s project on Machine learning applied intelligence to the radio spectrum) and lets not put that part out in the open. It is actually a clever program conceived by Paul Tilghman, a graduate from RIT (Rochester Institute of Technology), an excellent school that is slightly below MIT and on par with UTS (my creative stomping grounds).

It is a roadmap that needs to be followed, I am all for bombing Hezbollah sites, unlike the earlier mentioned group of 15, I prefer my level of evidence to be a little higher as such the Tilghman solution is called for, after that, when we get that we can address the viability of Beirut and Tripoli with 2500 lbs hardware donations, depending on the evidence found mind you, we can make adjustments, as some materials would have needed to be shipped to Yemen either directly or via Lebanon and in all honesty, I am of the mind that Iran would not have done this directly. Proxy wars require a higher level of deniability to remain proxy wars; as such we need the hardware as evidence.

And even as we see: “Mohamed Abdel Salam, said the attack was in response to Saudi Arabia’s “continued aggression and blockade on Yemen”. Earlier in the week, he said attacks on Saudi airports were “the best way to break the blockade”” (at https://www.theguardian.com/world/2019/jun/12/yemen-houthi-rebel-missile-attack-injures-26-saudi-airport) we need to realise that this is growing and potentially a lot larger than before. Even as we acknowledge that the forces have withdrawn from the harbour, we have no insight on where they went, there is no indication that they have stopped fighting, merely that they are at the moment inactive, a status that can change at any given moment.

Add to that the threat (or is that the promise) by Tehran who decided to “threaten to resume enriching uranium towards weapons-grade level on 7 July if US sanctions are not lifted or its European allies fail to offer new terms for the nuclear deal“, here my answer is ‘What deal?‘, there is enough indication that enriching never stopped, but was merely scaled down to 95% of previous effort, as such there is no need to offer more incentives that will only be broken. As such my strategy to seek out Houthi (and optionally Hezbollah forces) to take away the proxy options of Iran, they must either commit 100% or back down, at present their fear is having to commit fully to this and change the stage of proxy war to actual war, and as such my strategy makes sense. They have no hope of winning as too many government would be willing to align with Saudi Arabia (that might make them surprised and happy as well), and a united front against Iran is what Iran fears, because Turkey would have no option but to cut ties out of fear what happens when we are done with the other Iranian puppets.

It is perhaps the only side where I disagree with James Jeffrey (US special representative for Syria engagement), I do not believe that it is a “hegemonic quest to dominate the Middle East“, I believe that Iran knows that this is no longer an option, yet bolstering foundations of a growing alliance is the best that they hope for and here Iran merely facilitates in the urge to state to Syria (the government and its current president) in the voice of ‘You owe us, we helped you‘, it is slightly pathetic and merely the voice of a used car salesman at present. As more of the proxy war becomes open and proven Iran is backed into a corner, it makes Iran more dangerous, but it also forces them to act, not through proxy and I am decently certain that Iran has too much to lose as present, especially as Russia denied them the S-400 solution.

Even as Gevorg Mirzayan (an expert in Middle East and a leading analyst at the agency Foreign Policy) is getting headlines with ‘‘Dumping’ Iran Would Be Mistaken, Since Russia Doesn’t Know What The US Will Offer In Return‘, we see that the stage is a valid question, but there we also see the answer. the direct (and somewhat less diplomatic) answer is “Never set a stage where a rabid dog can call the shots“, the more diplomatic answer (by Russian Deputy Prime Minister Yury Borisov) was “Russia has not received any requests from Iran for delivering its S-400 air defense systems” is nice, and it puts Iran in a space where they need to admit to needing this kind of hardware, yet on the other side, Russia realises that Iran is driven to flame the middle East and down the track if its alliance is too strong, takes Saudi Arabia out of consideration for several lucrative Russian ventures and they know it.

All these elements are in play and in place, so segregating and isolating Hezbollah limits the options of Iran, making it an essential step to pursue. Interesting is that these steps were firmly visible as early as last year August, and that group of 15 did little to bolster solutions towards truly isolating Iran, that Miaow division was optionally seeking milk and cream and finding not that much of either.

So the time is now essential moving to critical to take the options away from Iran, we let Lebanon decide whether they want to get caught in a room painted in a corner with no directions remaining, at that point they become a real easy target.

That was not hard was it?

Happy Friday and remember, it will be Monday morning in 60 hours, so make the most of it.

 

1 Comment

Filed under IT, Military, Politics, Science

Diànhuà X2 (Xīnchē xíng)

This is not a name, it is not a brand and it is not a weapon system, Diànhuà is Chinese for ‘telephone’ plain and simple. The issue is that we need to start learning words that we normally never would have learned. Anyone who has spent time in a dojo in Eastern China (aka Japan) or perhaps in Thailand or in Indonesia knows this. You see when you start your path in Karate you learn the word ‘構え’, and you think, ‘I am learning the secrets of the universe‘ and that is how it feels, yet in Japanese it merely means ‘stance’ and that is what you did. In Pencak Silat, we learn the word ‘Pukul’, which translated Indonesian comes over as ‘Hit it’, which is exactly what you did; you punched it/him/her.

Simplicity is key here and what we might consider to be gibberish actually makes sense soon after we take more than 10 minutes of effort to see what information we are confronted with. When we start looking closer at the Huawei issues we see a lot to be concerned about. Not unlike Jeffrey Sachs, I had my issues with the Huaweian executive arrested in Canada. Apart from the fact that the United States does not get to set policy for other nations, the fact that China has economic ties to some degree with Iran also implies that Huawei would have had optional business with Iran.

Oh, and before you think that the US has its ducks in a row, you might want to look at the business partners (read: personal friends) of Vagit Alekperov (LUKoil) and look at their whereabouts in the last 5 months. Also wonder on how many were not arrested whilst in the US (or Canada for that matter), so whilst we all consider on how the US is doing business, we need to consider that more than one of them was roughly 13270 metres from a local FBI office there, we could ask the FBI, but they are currently closed, they will open at 08:15 with a fresh smile and optional free coffee, the coffee is there is apparently quite decent.

Yet back to what matters, you see, Huawei is not merely in the race, it is showing to make headway making 5G locations a lot better. We see the news in Poland, Spain and Italy, all this whilst surpassing the impressive achievement that Ericsson had. It surpassed the annual $100 billion revenue and as it stands, there is every indication that with certain projects in an ongoing state in Saudi Arabia, the UAE and optionally Egypt, Huawei could move towards 30% growth from the $100 billion last year. To a much larger extent it is also due to their mobiles Nova 3i, Mate 20 and the upcoming Nova 4i and Mate 30, it is not merely the excellence of their mobile; it is the sharp and competitive prices that will optionally allow Huawei to chip away the market share that Apple falsely believes to have secured. I believe that certain quotes, like: “Apple’s World Smartphone Market Share Above 50% For the first time ever Apple Inc. (AAPL) has garnered more than 50% of the global smartphone market during the fourth quarter, thanks to its high-end iPhone X“, in light of certain production places shutting down and earlier agreement with other providers should be considered as debatable, there is a definite drop in Apple choice. From my point of view, the people wanted a Golden delicious and they ended up with a Granny Smith. I personally love the sour taste of the Granny Smith, other do not. They objected to the iPad Pro ‘Bendy’, massive quality control problems, and not to forget the Extreme Tech quote: “Apple decided to actually make people’s products slower without telling them it had done so. It took this step after failures in its own manufacturing process caused damage to its batteries“. I am willing to go with the alternative path that the BS sold by Tim Cook where we see “but Cook states that all of the decline is attributable to Apple iPhone sales and that most of those sales (didn’t) occur in China“, all this whilst some sources still hang onto that 50% market share, a stage that is incorrect on more than one level, especially when we consider that the bulk of the people on this planet (roughly 80% plus) cannot afford some bloated new phone model that was close to 40% more expensive than a decent alternative, in this age the difference between $2369 and $1299 is too much for many households, it was the clear shot across the bow we all saw coming, but many remain in denial. In addition, the lawsuit files last month where we see: “plaintiffs Christian Sponchiado and Courtney Davis, alleges that Apple’s marketing claims about the iPhone X, iPhone XS, and iPhone XS Max are misleading“. If that case is ruled against Apple the impact will be massive. On the upside, Apple can buy into my IP with the entry price of $25 million upfront and get the optional 90% share of the patents linked to those (in case Google turns me down of course, they get first dibs (they have the reliability and credibility that I prefer).

In addition, as Apple lost $106 billion in value (almost 10%) a few hours ago, shows that the trillion dollar mark was merely a first step to become critically ill, optionally dead on arrival at the Wall Street hospital, more precisely the NYU Langone Health on Wall Street, Tim Cook might take a look at https://nyulangone.org/conditions, where he will learn that Bad Management choices is not a treatable ailment, yet Mental and behavioural Health is actually taken care of, although I am not certain that there is a cure for embossed ego and blindly following greed is not really a diagnosed behavioural health condition, he might be better off looking at Traditional Chinese medicine at that point, there he has an option to get advice from his friend Ren Zhengfei, if Tim forgot the number, Ren Zhengfei can be reached at +86-755-2878-0808.

What was THAT about?

When you consider the sidestep, it was not really a sidestep, when we see the European standards accepted in three countries and four optional additions, whilst the stage is now moving forward faster and faster in Saudi Arabia, the UAE, and Egypt, in a stage where 25 commercial contracts have been signed and all of them are moving forward, we see the initial failing in the US, Apple is a clear visibility, the lacking evidence of national security risks is out there louder and louder and now we see increased volumed voices in Commonwealth nations to reverse on the Huawei 5G ban. The fact that too many of the opposition have been in a stage of pussyfooting, micro stepping and calling these actions innovation and leaping ahead is where we see the failing of a larger group of Telecom players, at any stage, when (not if) those 5G standards are not met, it merely makes the case for other governments to either side towards a Huawei driven solution or fail in their 5G needs completely, and at this point, those who are not there at the beginning will merely lose millions of business opportunities every day. That is the clear setting and that is what we will see unfold. Players like AT&T might be the most visible ones, but they are not the only ones. Even when we look at current 4G abilities of Vodafone in France, good luck on finding ‘national coverage’ at that point, I have heard from more than one source that the map looks nice, but reality is nothing like their so called coverage map. And in the stage of once bitten twice shy, these players are putting it all one the table, betting everything they have to make a 5G turnaround whilst there is more than one indicating chance that this will falter. That is the gambling stage and all this is done without realising that Huawei does not need to bet, they merely have to deliver what they are promising making the others fold, losing it all over hardware that they cannot provide, or even better are already failing to manufacture. you see, the Wall Street Journal gave us a mere 4 days ago: “Major European wireless providers—big customers of all three—say Nokia and Ericsson have been slow to release equipment that is as advanced as Huawei’s“, the article (at https://www.wsj.com/articles/huawei-rivals-nokia-and-ericsson-struggle-to-capitalize-on-u-s-scrutiny-11546252247) gives us the parts that I mentioned weeks ago, I saw this coming a mile away and now that this is showing to be just as I said it would be, we now see the upcoming failures in a few countries, all of them ‘eager to be the number one‘, now soon to be trailing BEHIND what they call is a technological third world nation (Saudi Arabia), whilst Saudi Arabia is seemingly still speeding ahead and Huawei wants to be completely successful there as it almost guarantees them Middle Eastern 5G Supremacy.

The other players are in a deeper pool of trouble when we consider: “Both Nokia and Ericsson fear that if they are seen trying to take advantage, Beijing could retaliate by cutting off access to the massive Chinese market, people familiar with the matter said“, this is not news, this was always going to happen, you might want to pick up a decent history book and reread the British Telecom phase in the UK around 3 decades ago, it is not as comfortable to face these scrutinies when you are receiving the damage, not dishing it out, is it?

As I personally see it the US is due a few setbacks, these setbacks could cost Wall Street, the DJI and the NASDAQ in larger ways than I can foresee at present. What will happen to claimants when the delivery is not met and those 5G wannabe’s all make legal claims on goods and speeds not delivered? I do not need to remind the readers of the Trumped ego of nations when promises are not kept, do I?

These are not merely obstacles or pitfalls; the entire setting was bogus on a few levels. Whenever I see the Huawei ban mention on TV, my mind races back and remembers the US Secretary of State Colin Powell in clownish fashion running around with a silver briefcase showing it off at closed sessions with WMD events, you do remember how that ended, do you not? As I personally see it, the entire 5G debacle will be the same, but now the nations adhering to that alliance will face a lot more backwash from their own local political parties when it all falls down, and I feel 80% certain that this is exactly what will happen down the road. As I stated more than once, in the UK Alex Younger was at least in the proper stage where he did not claim National security risk, he merely stated that such infrastructure must be held national, not international hands. It is not a great decision, but at least it made sense, yet there too Huawei has economic options by investing in training the Bright Cambridge, London Poly tech and Oxford people in creating excellent 5G devices, optionally merely funding it and gaining huge windfalls over the upcoming decade. It would be a so called scenario of all the gains without the optional pains.

Interesting that we see nothing on such an optional solution in the media, do we? So as the new modelled 5G pushes forward there is no doubt that in the immediate time it will be ruled by Huawei, the others were (as I personally see it) too short-sighted for too long and that is the Tim Cookie we all forgot about, so whilst we see new Cookie policies, we merely see a collection of cyber analysts all gathered around some jar and not around the place of true innovation, the memo they received was in the end not that clear on the matter (Go Figure).

If you were up to speed to certain events and got the previous reference, my congratulations to you; if you missed it, no worries. Merely look (at http://scientists4wiredtech.com/2018/03/4g-5g-wireless-is-the-new-bait-and-switch-scandal/) and do not go on faith with: “4G/5G Wireless antennas require a fiber optic wire to be attached to each cell site, every block or two. No private company is going to roll out fiber to lots of new areas. The FCC rarely, if ever, mentions that 4G/5G densification requires fiber optic wires. Commissioner Carr’s 5G statement never mentions the terms “fiber” or “state utility”“, and when you add: “AT&T just changed its mind about deploying fixed wireless. The operator has been touting its plans to deploy a mobile 5G network in 12 markets in the United States this year using millimeter wave (mmWave) spectrum in the 28 GHz and 39 GHz bands. And while it still plans to move forward with those deployment plans, it announced today that it will deploy fixed wireless in late 2019 using the unlicensed Citizens Broadband Radio Service (CBRS) spectrum. It will initially deploy LTE but then migrate to 5G. The company did not say how many markets it would deploy” (from another source) and consider the two statements we see an optional shift in a few direction, more important all the places where AT&T will not reach (beside the difference in range that the two very different standards have), so at that point, how much subsidy will never ever be in favour of the American people and in addition to that, their created ALEC group (American Legislative Exchange Council), at that point when these documents and legislative agreement are scanned and we end up seeing some version of: “grants LICENSEE and its AFFILIATES, a nonexclusive right to USE the 5G hardware provided with these license terms (hereinafter the “HARDWARE”) for its intended purpose, as defined below. USE means the right to enable the HARDWARE in the manner and for the purpose for which it was intended by the manufacturer“, at what point will the people realise that ‘intended by the manufacturer‘ will end up being massively ambiguous and that in the end no rights will remain with the user when it end up not being up to the expected scrap? It is not even a slippery slope; it is a slippery slope not being able to support part of the weight it was supposed to support.

The worst part of it all is that it was not even a surprise to me that this was going to happen, so as others claim to be so much more intelligent to me, is that true intelligence, or is that intelligence that enabled them to fill their pockets? You tell me, I am not presuming any answers here, I am merely pointing out the facts that are actually available in a whole range of sources, several of them respectable; they merely did not bother to connect the highlighted dots, which is also a matter of concern at some point soon enough.

 

1 Comment

Filed under Finance, IT, Law, Media, Military, Politics, Science

When wrong is right

There is now too little doubt, I got it wrong, and I will happily and freely admit to it. You see, the entire Salisbury and Novichok was a shamble from the beginning. There was little doubt in my view, as I have been around the world twice, as I saw things on several levels, there was a massive issue with the entire Skripal case, as such I had a massive lack of faith in the reports all over the news. Not merely the setting where we see from the early setting that GRU players were mentioned, the fact that the hit was unsuccessful and the setting that I still see as an event framed in stupidity. A setting with a whole host of issues that could go wrong from the very beginning, how could anyone support it?

And I decided not to do it without clear evidence.

So I was in a stage of impressing denial, plain and simple. Apart from the setting that was brought by the media, there were issue with the evidence as Vil Mirzayanov gave clear evidence that was countered from day one with publications in all kinds of magazines, even the documents in the OPCW gave rise to doubt, but the media all ate it like flame baked chocolate chip cookies. The Guardian brought its version of doubt and also gave us valid questions and in all this the media machines continued with a mix of facts and speculations (as media would have done).

Yet we have seen that and in the stage of all this, the LA Times now gives us ‘Spate of fumbled spycraft may be laughing matter for ordinary Russians, but not for President Putin‘, now that we see that there is a chance that the FSB has messed up to this degree cannot be ignored. So as we are treated to both “Like Russian President Vladimir Putin, the GRU — the country’s military intelligence agency — is more accustomed to being feared than being mocked. But a recently exposed run of bumbling spycraft — think Austin Powers, not James Bond — has made the spy agency the subject of biting humor, at which Russians happen to excel“, as well as “the Kremlin is worried about its “brand, image and reputation as a great power.” And Putin, a former KGB officer whose approval ratings have been slipping, is doubtless “unhappy with the image of Russia as being incompetent, and the potential public perception of themselves as fools,”” Finally we get “Putin-watchers saw peril for the head of the GRU, Igor Korobov. Unconfirmed reports in the Russian press said that after the U.S. indictments of seven military intelligence officers, the Russian president summoned Korobov for an official dressing-down” It is the final part that makes for the entertainment as I wrote yesterday: “How badly are these ladies trained (me stating the need for a well-paid job and replacing Colonel general Igor Valentinovich Korobov), I mean, I could hardly do any worse, could I? Let’s face it, in Australia a general’s pay starts at $235,595 with 0 years of experience in that rank. I’d accept that as a starting wage (LOL), even if it turns out to be merely for a year“. I wrote it in ‘Consideration for dinner‘ (at https://lawlordtobe.com/2018/10/15/consideration-for-dinner/). So now we see that in the end, I would have been a better director of Russian Military Intelligence than Russian General Igor Valentinovich Korobov, who would have thunk it? Yes, I stated that expression and in light of history it would be quite apt.

So as we have been treated to all kinds of sources far, wide and speculative, I have tried to maintain to the facts as much as possible. A few years ago, the open setting of who were GRU officers, who would rely on an operation using unstable elements, the lack of investigating a certain laboratory. Yet, now looking back, there is additional implied evidence that there was a much larger issue and it is not with the UK, it is with Russia. We see this in the writing of Mark Galeotti. We see: “If Putin is showing his anger, it is not because they are spying and hacking and killing, but because they are not doing it well enough“, a statement from a senior fellow at the Institute of International Relations Prague. He is correct. It is nice to see that there is an implied failure on the Russian side and it sets the GRU back to the age of the early cold war where they would walk in the US wearing a weird trench coat, thinking that everyone in the US looked and dressed like Humphrey Bogart. It makes counter intelligence exceedingly easy for the FBI and MI-5, so they should be relieved, but they are unlikely to be that. All these issues are pointing towards a larger game and falling asleep now is perhaps the largest of all failings to embrace. Part of this was tipped on in February by the BBC (at https://www.bbc.com/news/world-europe-42636245). Here we see the mention ‘Just weeks before Litvinenko died, Russia passed a law giving the FSB authority to act against “extremists” and “terrorists” abroad‘, yet the issue is not the statement, it is the Russian definition of what THEY consider to be a terrorist and an extremist. You see an extremist is someone who holds extreme political or religious views, yet in case or Russia is that a political view that is not their political view? Then we get the part of terrorist. Here we see that this is a person who uses unlawful violence and intimidation, especially against civilians, in the pursuit of political aims. Yet is the word ‘violence’ mandatory? We have e-terrorism, which is still terrorism, is it not?

So as we were going into the entire Salisbury debacle, we were treated to two people allegedly called Alexander Petrov and Ruslan Boshirov and they were giving us: “insisting they were sports nutritionists on a holiday jaunt to Britain — and that with all the iconic tourist sites available to them in London, what they really, really wanted to see was the cathedral in a provincial city“. I was in disbelief! Someone was going to be this stupid about it? Now, I have heard and seen the folly of underestimating an opponent, yet until this week I had never considered that overestimating an opponent could be so equally deadly. It is like watching that old series The Top Secret Life of Edgar Briggs, where I am thwarted by Briggs, in this case played by Igor Valentinovich Korobov, it feels that unsettling, to face an opponent you rigorously overestimate.

It got to be even worse when they were caught ‘red’ handed, trying to hack into the computers of the OPCW, which in light of the fact that I got most their memo’s merely Google searching them. OK, they wanted the Skripal case documents, which were likely slightly more secure, yet in all that, when we are faced with such bungling, how can we lose sleep over any operation the GRU does when we can read it on page two of The Sun staring at the ‘lung’ section of a page three girl. It seems that the job (for now) for MI-5 is exceedingly simple. So as we are treated to the operandis modi of the Kremlin (according to the LA Times, where we see: ““Step No. 1 is deny; Step No. 2 is to undermine whoever made the allegations,” said Polyakova. “And usually Step No. 3 is to spin multiple versions of the story, to try to confuse the public narrative about what is the truth, and what is not.”” so, if we give a view to Alina Polyakova and her view in this, we need to compare that to the political field, the US political field might be the most apt one. So, the deny part, how did that work out for former president Bill Clinton? Then we see the undermining part, how did that work out for former (being the operative word) FBI Agent Peter Strzok, and the third and final part, the spin part? Well, the spin part is actually decently effective (usually it is), partially as most people can no longer tell the difference between journalistic news sources and morning TV shows that cast some version of the news on a malleable turntable. So that one the Kremlin is seemingly getting right (at least partially), although having a much better trained GRU might not be the worst idea in all this.

If we can keep a sense of humour in all this, we should take notice of Grigorii Golosov, a political scientist who stated: “thanks to the efforts of the two (Russian agents), the word “Novichok” was now better known to non-Russian speakers than “Sputnik.”” Yes, that is certainly true. The LA Times also re-staged the setting of: “the Kremlin not only vehemently denied involvement, but demanded definitive proof of the suspects’ guilt, which seemed at the time like a tall order“. That is where several insiders were, as well as myself, as we saw the train and CCTV footage and saw such a large lack of tradecraft that is seemed a joke to consider it at all, yet the egg is on out faces, I admit that! The fact that my skills surpass these so called Special Forces people at the GRU is just blowing my mind (quite literally). It gets to be even worse (or more hilarious depending on your placing on the table of intelligence) when we consider “seeing the cathedral in a provincial city“. So with the options ranging from Aldershot to Wrexham, they went to Salisbury? How could this be sold in any believable way?

There is one additional consideration and yet it is also a danger. As we are laughing at what the GRU is unable to do, we need to be weary that the SVR has not made these levels of blunders (a speculative statement, I know). In this, we need to recollect the words of Foreign Intelligence Service chief Sergei Naryshkin: “Russia couldn’t have been behind the operation because it was done so unprofessionally“, me and several others agree on that, so if that is the setting of the stage then we need to consider that the SVR might be poised to take over that part and properly train those people, giving us optionally new waves to deal with. Now, in all honesty, one would think that this is never going to happen, yet Vladimir Putin is an SVR alumni, so the thought is not that crazy and being placed in a setting of such embarrassment might make him jump and demand success stories, just as Saudi Arabia has its own optional folly to deal with, getting on board selling non ethical solutions is not beyond any opponent of those relying on overly ethically accepting solutions.

You see as several sources are now all heralding “Saudi Arabia is preparing to acknowledge the death of Saudi journalist Jamal Khashoggi happened as the result of a botched interrogation” into the media (CNN et al), I need to accept that I was wrong twice, considering that generals have a much better handle on things, so me getting proven wrong twice (so close together) is not the craziest theory to embrace at present. The fact that there is no reliability on the sources at present makes me a little cautious. As CNN gives us: “The Saudis are preparing a report that will conclude Jamal Khashoggi’s death was the result of an interrogation that went wrong, one that was intended to lead to his abduction from Turkey, according to two sources“, there is not just the lack of who the two sources are, there is a larger setting that is still weird, so after we were informed on “Turkish authorities have an audio recording which indicates that missing Saudi journalist Jamal Khashoggi was killed“, we see Reuters give us: “A team of around 10 Turkish police investigators had already left after a nine-hour search“, so why not just publicly play the audio? It would have given Turkey huge bonus points with Iran, yet that part we do not see (or hear) do we? We get to hear no evidence for now, which is another matter of concern. As Turkey will not play the audio, they would if the audio is not openly played that they are merely showing that their claims cannot be trusted (here is me hoping that I am not played a fool a third time in a row).

And all the sources, the Sun being the weirdest one give us: Audio and video recordings which emerged yesterday proved Khashoggi, 59, was tortured and murdered inside a Saudi consulate in Istanbul, Turkey, by a 15-strong hit team yesterday“, so where is that evidence? And a hit team of 15? This is part of the entire fake news matter and the UK newspapers (if you call the Sun a newspaper) is part of the problem, is it not?

So I might have been wrong, but in the setting where even the news is optionally fake news, I still think that I walked the right path in the end, even as I overestimated the abilities of the GRU to an almost unfathomable distance, I feel that I was bringing the news better, more complete and with the right questions, questions that some parties have never and will optionally never ever be able to answer. So, London School of Economics, I will happily and with a slight case of humility accept my master in Business Intelligence and Master of Journalism.

Thank you very much!

Elvis has left the building, until tomorrow that is!

Leave a comment

Filed under Media, Military, Politics

When inability drives fear

It is a dangerous place to be in. We all have been there and in most cases it is as innocent as it could ever be. You see, sometimes life throws you a curveball. Gamers tend to identify it most easily. In my particular case it was a game called Magic Carpet. It was a Bullfrog game and I was testing it on the PC. It played magnificently there, and soon thereafter I also tested it on the very first PlayStation. There, because of the controller it was good, but not great. Still, it was fun to play and I tended (in those early years) to really get into a game, so when the situation blew into my face, I got a little frustrated. The next two times were worse and the last time (on that day) I went slightly angry (with myself) and I kicked the door. The issue was not the door, it was my steel tipped boot and I went straight through the door, so, I was not merely ticked off, I had a hole in the door (which would require funds to repair) and the boss in Magic Carpet was still alive. We all have had these moments. Our car, our bike, the TV, things go wobbly on you and we sometimes react wrongly to this situation and in light of that get to reflect on our own ego’s a little.

These are the images going through me when I was confronted to new information when looking at the unrealistic response by America (and Australia) to Huawei. In the case of Australia it seemed the mere application of greed and fear as politicians cater to the greed of a large telecom company, which was not seemingly the case with America. Yet that tip was raised for me less than 24 hours ago. The article (at https://foreignpolicy.com/2018/08/15/botched-cia-communications-system-helped-blow-cover-chinese-agents-intelligence/), shows how the CIA got their own systems handed to them through ego and what I would regard as stupidity. The initial headline ‘The number of informants executed in the debacle is higher than initially thought‘ is rather unsettling. It gets to be worse with “The CIA had imported the system from its Middle East operations, where the online environment was considerably less hazardous, and apparently underestimated China’s ability to penetrate it. “The attitude was that we’ve got this, we’re untouchable,” said one of the officials who, like the others, declined to be named discussing sensitive information. The former official described the attitude of those in the agency who worked on China at the time as “invincible.” Other factors played a role as well, including China’s alleged recruitment of former CIA officer Jerry Chun Shing Lee around the same time.” This is the most dangerous of settings. The wrongful setting comes straight from Sun Tsu where we learn that all war is based on deception. China is not some place that is tinkering at the side of the road, the Art of War COMES FROM CHINA! It gets to be worse when you consider that that book was written long before Americans had adopted proper reading and writing skills, close to 1200 years before that, so that was their first error.

When we see: “But the penetration of the communication system seems to account for the speed and accuracy with which Chinese authorities moved against the CIA’s China-based assets. “You could tell the Chinese weren’t guessing. The Ministry of State Security [which handles both foreign intelligence and domestic security] were always pulling in the right people,” one of the officials said. “When things started going bad, they went bad fast.”“. The entire matter seems to be exponentially wrong. The big issue is not on how it was cracked, or even if it was cracked. My issue had been (for a much longer time now) that for too long, the deciding voices, all listening to some CTO, often with multiple sides lacking wisdom that the setting was not merely that there was ‘a security risk’, there was for the longer time a much larger security flaw. For much too long a time, we got the ‘slides of wisdom’ on how data in transit tends to be safe and data at rest tended to be in danger. Even when I started my CCNA, the amount of knowledge given in the Cisco books gave the rise to the consideration that data in transit is not merely as vulnerable, it was that a lot more could be done unnoticed (not merely by the Chinese mind you). It was some time before the Sony hack that I expected a setting where the routers themselves might be used against the owner, it went further when we consider Wired in 2013 (at https://www.wired.com/2013/09/nsa-router-hacking/). The headline is not merely ‘NSA laughs at pc’s, prefers hacking routers and switches‘. It is the setting where we see: ““No one updates their routers,” he says. “If you think people are bad about patching Windows and Linux (which they are) then they are … horrible about updating their networking gear because it is too critical, and usually they don’t have redundancy to be able to do it properly.” He also notes that routers don’t have security software that can help detect a breach“. This is where I was in 2011, when I started to comprehend the working of a router and router tables, I figured out that it is not the router they can see that is the problem; it is the one they cannot see. That idea came from a presentation by Thomas Akin, CISSP, Director, Southeast Cybercrime Institute who had a presentation for the Blackhat briefings. The 2002 presentation gave me the idea. You see apart from the lack of security, the +1 hop hack allows form something truly unique. Consider [.MIL Server], that server connects to <secure router 1> and things are set into motion. Now, we cannot direct all the traffic, yet materials from that location to let’s say ‘preferred consultant one‘ will go via certain paths, yet the first router after <secure router 1> tends to be merely one or two routers (depending on traffic) to that preferred consultant. It is easy to find a router that could optionally be a link to these routers and duplicate all packages that go to that specific next step. Not only is the task easily done, the path is not hindered, the router is not intervened with and a simple reset takes away whatever evidence existed in the first place. In addition, the additional part is that the compact flash in those routers is ‘The maximum storage capacity for the CF in Slot0 and Slot1 is 4GB‘, yet the only part here is that you only needed 32 MB, which is what most of us used then, but cards that small are no longer made, so most IT people just plug in what they have. You have well over 3GB of package storage, so all packages to that one location could be stored and redirected on the ‘off’ hours as not to leave any monitored spike. Until the CFlash card is ejected from the router and investigated no one will have a clue. That was 7 years ago and the systems are even more capable now, a 3GB glitch will not register on most systems, especially when those IT people do not block Spotify and/or YouTube. By the time they figured it out, the setting is already wiped, and this path can be adjusted on a daily bases so that most IT networkers never had a clue in the first place.

You think that I am alone in this, that I am this clever? No, I am not! There are plenty of IT Networkers running circles around me and that is now set into the stage of ‘we’re untouchable‘. The CIA was never that, they never needed to be touched, the opponent merely needed a clear line of sight to the router that is one skip from the secure router that they needed to get to. We see more in the Foreign Policy article with the quotes “Information about sources is so highly compartmentalized that Lee would not have known their identities. That fact and others reinforced the theory that China had managed to eavesdrop on the communications between agents and their CIA handlers” and “an encrypted digital program, allows for remote communication between an intelligence officer and a source, but it is also separated from the main communications system used with vetted sources, reducing the risk if an asset goes bad“. Now we merely add “But the CIA’s interim system contained a technical error: It connected back architecturally to the CIA’s main covert communications platform. When the compromise was suspected, the FBI and NSA both ran “penetration tests” to determine the security of the interim system. They found that cyber experts with access to the interim system could also access the broader covert communications system the agency was using to interact with its vetted sources, according to the former officials“. I believe it goes further than that. If we see the entire layer process and consider that in the end, certain systems merely replicate a process. Cisco (at https://www.cisco.com/c/en/us/support/docs/lan-switching/8021q/17056-741-4.html) gives us: “A device can determine which VLAN the traffic belongs to by its VLAN identifier. The VLAN identifier is a tag that is encapsulated with the data. ISL and 802.1Q are two types of encapsulation that are used to carry data from multiple VLANs over trunk links”, as well as “The DA field of the ISL packet is a 40-bit destination address. This address is a multicast address and is set at “0x01-00-0C-00-00” or “0x03-00-0c-00-00”. The first 40 bits of the DA field signal the receiver that the packet is in ISL format“, so as the destination was known, the people needing this could search very specifically. When we consider ‘It connected back architecturally to the CIA’s main covert communications platform‘, the connection back would enable those seeking to find the needed value of the DA field. That does not merely impede the CIA, it stands to reason that to some degree the NSA would be just as vulnerable.

The main course

In my case, I tend to go for the Bambi burger, ideally I watch Bambi whilst having that lovely slice of venison. You see when we get to “As part of China’s Great Firewall, internet traffic there is watched closely, and unusual patterns are flagged. Even in 2010, online anonymity of any kind was proving increasingly difficult. Once Chinese intelligence obtained access to the interim communications system,­ penetrating the main system would have been relatively straightforward, according to the former intelligence officials. The window between the two systems may have only been open for a few months before the gap was closed, but the Chinese broke in during this period of vulnerability“, I believe the setting is worse than that. These players still require their consultants. It does not matter whether you call them construction workers, members of Blackwater, Xe Services, or Academi. It is those places as well as Booz Allan Hamilton and other providers that still require to be informed, and that is where the interception could start. The setting is not ‘the Chinese broke in during this period of vulnerability‘, it is the long term flags that they were able to test at this point and that is the fear we see with their setting of Huawei and partners. Not that Huawei is the danger, but the fact that Chinese intelligence is just as able to get into nearly all systems, it merely can get into Chinese systems faster (for now). This is where it gets a little more complicated, because it is not about the now, it is about tomorrow and the tomorrows that are coming. The only ones who have a chance of getting things done are players like the Constellis Group and Palantir when they unite abilities. It is going to be about data and about the ability to forecast how traffic goes. Thomas Akin was teaching this wisdom 16 years ago. We see this when we are made to realise

  • Live system data is the most valuable.
  • Immediate shutdown destroys all of this data.
  • Investigators must recover live data for analysis.

And the loss is merely a reset away, in most cases if there is an automatic reset; the only data available is the last transgression at best. With the coming of 5G live real-time capturing data streams is what is more likely to set the stage of finding out what happened, in this the entire setting of ‘China’s Great Firewall‘, we are already looking at outdated Chinese technology and I do believe that those behind the article, as well as some DARPA people are aware of that. America and Europe are behind in ways that we cannot even perceive, because the players that need to move forward are doing so iteratively, that whilst the time of reengineering is now merely 10% of what the development time was. We see this with “Call this the IBM problem, which faced an existential threat as soon as Asian groups started churning out cheap PCs in the 1990s. But here IBM also provides a few tips to the future, with its pivot to software and solutions. By the time of IBM’s iconic “solutions for a small planet” ad campaign in 1996, the company was trumpeting voice recognition and ecommerce — producing the sort of digital enterprise backbone that ended up helping develop the internet economy” (source: Australian Financial Review). In the first instance the Asian market required 10-15 years to catch up, the second time around it took 2-3 years and now with Google and Apple working globally, it takes months. IBM (others too) took iterative steps to maximise the economic footprint, instead of truly leaping forward whenever possible, they lost the advantage and are now trailing the markets. Huawei is one clear example where the American market was surpassed. Samsung showed its supremacy by having 5G home routers ahead of everyone else and the advantage in Asia is only growing. It is seen with “Alternatively, authorities might have identified the system through a pattern analysis of suspicious online activities. China was so determined to crack the system that it had set up a special task force composed of members of the Ministry of State Security and the Chinese military’s signals directorate (roughly equivalent to the NSA), one former official said“. I do not read this part in the same way. I believe that with ‘set up a special task force composed of members of the Ministry of State Security‘, was not about cracking. I personally believe that the Cisco books were so illuminating that they decided to change the setting in their own game. I believe that the Chinese now have a more advanced system. They have done what players like Cisco should have done before 2014 and they did not. I believe that when we see a partnership between Constellis and Palantir, their findings will bear that out with in addition an optional link that shows part of the accusation that China let Russia in on certain findings (and the Russian evolution of certain networking devices). This and the next part is largely speculative, but it is supported to some extent. We see this in: “Once one person was identified as a CIA asset, Chinese intelligence could then track the agent’s meetings with handlers and unravel the entire network. (Some CIA assets whose identities became known to the Ministry of State Security were not active users of the communications system, the sources said.)“. I believe that he part given in ‘not active users of the communications system‘ gives us the third part. I believe that the system was not merely invaded. There is every chance that certain systems when activated also leave tags behind and that is where the intrusion would have paid off. You see, in the Cisco setting (as an example), the data frame has an optional 60 bytes of extension headers, yet is that always empty? More important, when were these data packages truly thoroughly checked? In this speculative setting I take you to the movie Die Hard 2. In that movie we see on how someone decided to get clever and uses the outer marker beacon to warn the planes that were in danger. The beacon can be used in other ways than merely give a beep. I believe that Cisco data packages have other optional parts than can be ‘reused’ to do something different, like the optional headers. They are to most merely empty pre-set ‘spaces’, but they could have more. That is the setting that America faces and the fact that they could get overwhelmed by Chinese intelligence because they did not rely on iterative parts. Huawei had been leaping forward, for example now offering a 128GB Android 8.1 phone (the Huawei nova 3i 128GB Handset), for 50% less than its competitors. A system that is just as advanced as anything Apple and Samsung offer; at merely half the price whilst Chinese Intelligence has been digging into that device for months, unlike the NSA that needs to queue up with all the other users to get to look at the Pixel 3 and the iPhone 8 on launch day. That is the setting we seem to be seeing and America is indeed and rightfully worried, not because Huawei has backdoors (which I never really believed) but because the players here had been held backwards through iterative technology. Apple is actually staged by Forbes that way with the quote ‘a minor point update for the iOS 11.1 iteration‘, even Forbes speaks about iterative changes. That is the setting that they are up against and they have been surpassed for years and with Huawei leading the 5G stage on a global setting the US authorities are merely getting more and more afraid that not only are they no longer the leading players, they are now sidelined by not being able to keep up with what will be presented ‘tomorrow’.

That part can be supported through the CIA with analyses reports (at https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol49no3/html_files/Collection_Analysis_Iraq_5.htm), in here we see that Richard Kerr, Thomas Wolfe, Rebecca Donegan, and Aris Pappas give us (in a different context): “The analysis on this issue by the Intelligence Community clearly was wide of the mark. That analysis relied heavily on old information acquired largely before late 1998 and was strongly influenced by untested, long-held assumptions. Moreover, the analytic judgments rested almost solely on technical analysis, which has a natural tendency to put bits and pieces together as evidence of coherent programs and to equate programs to capabilities. As a result the analysis, although understandable and explainable, arrived at conclusions that were seriously flawed, misleading, and even wrong“. It is important to realise that this was on the WMD setting, so in a different context and on a different setting. Yet the information systems were all designed to upholster that flaw to an ‘evolved’ placement, the systems in their entirety are nowhere near ready, now even for the previous setting. The movement from a lot of staff to more fruitful consultant settings is now paying off in a negative way for the CIA (and the NSA too). This is where it gets interesting. You see, the previous setting that I gave should partially have been dealt with through the flashlight program that DARPA has. Raytheon BBN is working on that with Professor Richard Guidorizzi from George Mason University Fairfax. I think that the system is not entirely ready here, not if the packages can be duplicated via the router and as long as the original is not touched, that system will not get the alert lights ringing.

To get you on board on how far all the NATO partners are behind, let me give you two settings. The first is a DARPA Project called ‘Probabilistic Programming for Advancing Machine Learning (PPAML)‘, the man in charge is Dr. Suresh Jagannathan, yet the bigger brain might be MIT graduate Dr. Jennifer Roberts. The given setting is “Probabilistic programming is a new programming paradigm for managing uncertain information. Using probabilistic programming languages, PPAML seeks to greatly increase the number of people who can successfully build machine learning applications and make machine learning experts radically more effective“, whilst we also see the goods in the DARPA article by Dr Roberts with “If successful, PPAML could help revolutionize machine learning capabilities in fields from Intelligence, Surveillance and Reconnaissance (ISR) and Natural Language Processing (NLP) to predictive analytics and cybersecurity“, this is certainly leaping forward, but it is still based on a system. I believe that the Chinese decided to turn the funnel upside down. To illustrate this I need to get you to an app called Inke. The article (at https://thenextweb.com/contributors/2018/02/09/hidden-world-chinese-livestreaming-app-inke/), gives us ‘The hidden world of Chinese livestreaming app Inke‘, this is not a few people; this is a craze that has already infected millions upon millions. So with “he was actually doing a livestream, an extremely popular hobby for young people in China. China is way ahead of the rest of the world when it comes to embracing livestreams.” you are missing out and missing out by a lot. These streams are real-time and often geo-tagged. I believe that the Chinese have changed the setting, they are optionally collecting Terabytes of daily data and they are converting that to actionable intelligence. Facial recognitions in phones, geo-tagged and all uploaded and streamed, all converted on the spot, like the SETI screensaver, millions of affordable mobiles (this is where the Huawei nova 3i 128GB Handset and all other new handsets come in), parsing all that data into uploaded files and Chinese intelligence gets global information close to real time, whilst their learning machines are about efficiencies of collected data, it is not about the better application by making them more effective, it is about the massive amounts of data offered to get the systems to upgrade the efficiency of parsing data, because parsing data is where the bottleneck will be in 5G and they already have a larger advantage.

In the meantime, on any given day thousands of Inke users are filming life around them in malls and famous places looking awesome doing it. Yet, if you look at the CCTV settings, how many users would have passed 935 Pennsylvania Avenue, Washington DC, or at London SE1 9EL, UK walking towards London Bridge? How many people were merely assuming that they were tourists face timing with mom and dad? Are you getting that picture now? and also realise that Inke is merely one of more than 300 live streaming companies, all capturing that data all those tags that a smartphone allows it to capture and at the top of all this, Facebook and YouTube are eagerly pushing people to gain following by doing just that. So how long until the user realises that uploading the same stream to 2-3 providers gets them to gain a lot more following and optionally cash? Yes, the intelligence community is that far behind at present. So when we are worrying on “The system was not designed to withstand the scrutiny of a place like China, where the CIA faced a highly sophisticated intelligence service and a completely different online environment“, we need to consider that China is already ahead of the game and the CIA systems might be merely an option to scrutinise their own data, because that remains the Chinese bottleneck, the data will require verification and that is the one field where their opposition could gain the advantage if they set their minds to a different algorithm, one on reliability, not on likelihood. It is a setting where all the players involved have a second tier of consideration. They embrace a ‘not now, but soon‘ thought, when ‘I needed this yesterday‘ is the proper setting as I personally see it, because data without proper vetting is merely used space on any given storage device.

That final part can be considered when we look at the linked article that NBC had from last January. There we see: “When agents searched Lee’s hotel rooms in 2012, they found notebooks with the names of covert CIA sources, according to court documents. But not all of the agent arrests and deaths could be linked to information possessed by Lee, who left the CIA in 2007“, an issue I mentioned in an earlier blog. We get there when we consider his actions and ‘found notebooks with the names of covert CIA sources‘, do you think that anyone, especially in this setting would be that stupid? It’s like keeping the condom as a trophy after having intercourse, its useless and stupid. I believe that either it is not the ‘covcom’ system, or not merely the ‘covcom’ system. I believe that (if it is all correct) that Chinese intelligence got in further and deeper into acquiring the data required and the notebook is the proverbial red herring in all this, especially as Jerry Chun Shing Lee left the CIA in 2007. You do not hold on to that level of information 11 years after you might have had some level of valid reasons to have it in the first place. That is the part many overlooked, or looked away from.

In the end, I do believe that it is not merely the inability that drove the anti-Huawei waves, it is the fact that those decision makers have no idea where to navigate towards next is what drives their fears almost exponentially.

 

Leave a comment

Filed under IT, Military, Politics, Science

Rocking the bullshit

There has been a massive issue with Huawei, the accusations by the US is the largest one, one of its sheep (aka Australia) has been on the same post on how Huawei is such a large danger to the safety and security of a nation. It gets ‘worse’ when we see ‘The DNC tells Democrats not to buy Huawei or ZTE devices ever’, (at https://www.theverge.com/2018/8/3/17649920/dnc-democrats-huawei-zte-devices-ban-china-hacking-threat). Here we see the quote “people shouldn’t be using devices from either Chinese company for work or personal use. The words echo what federal officials have already said about Huawei and ZTE posing possible security threats to the US. In February, CIA, NSA, and FBI chiefs testified in front of a Senate committee that the two companies were beholden to the Chinese government and the devices could become tools for undetected espionage“, my issue has always been: ‘show me the evidence!’ Basically EVERY phone can be used as a spying device, that is one clear thing we got out of the Cambridge Analytica part, in addition, the Fitness tracking app Strava was a great way to find CIA black ops bases, so even as Strava merely mapped ‘a regular jogging route’, using Google or Apple maps, you would be able to map out the base, the supply routes and so on, the Apple Fitbit would be there for the Russian government knowing where these specialists were and when the were there. So in all that, and all the security transgressions seen here, not of the were Huawei or ZTE, yet, how much noise have you heard from the CIA, NSA, or FBI on Apple? Even now, they are that one Trillion dollar company, are they too big to mention?

I wonder why?

Yet, Huawei is not out of the hot water yet, they are actually in deeper hot waters now but this time it is allegedly by their own actions. Reuters is giving u mere hours ago: ‘Huawei in British spotlight over use of U.S. firm’s software’, the news (at https://www.reuters.com/article/huawei-security-britain-usa/huawei-in-british-spotlight-over-use-of-us-firms-software-idUSL5N1US343) gives us: “One of those is due to Huawei’s use of the VxWorks operating system, which is made by California-based Wind River Systems, said three people with knowledge of the matter, all of whom spoke on condition of anonymity when discussing details which were not made public in the report“, which now leads me to the setting that the American accusations are set on the premise of American Software used? How dopey is that?

Then we get: “the version of VxWorks being used by Huawei will stop receiving security patches and updates from Wind River in 2020, even though some of the products it is embedded in will still be in service“. In all this, the fact that it is still serviced for another 2 years, how are we now in the stage of: “potentially leaving British telecoms networks vulnerable to attack“? Is that not equally a questioning setting? Do we not have enough issues out there with Microsoft which has been nearly forever a security concerns, at this point, 2 years early we get the security warning on Huawei, yet not on Microsoft or Apple for that matter, in all this Google is equally a place of patches, and in all this, Huawei is the one getting unbalanced and unfairly burned at the stake like a Catholic at an Elisabeth I barbecue gathering.

Yet the good stuff is “All three sources said there was no indication that the VxWorks mismatch was deliberate. There is also no suggestion that the software itself represents a security risk“, this now leads us to two parts. The first is if it is true that ‘no suggestion that the software itself represents a security risk‘, does this mean that Huawei never had a security risk and if that is incorrect, why not present that evidence so that every Huawei Owner can test for this transgressions ending whatever future Huawei had in the first place.

In the second part, if there is no proven security flaw in the Huawei on hardware, is the security flaw a software one, or better stated an American software one, and if so, why are these people only going after Huawei and not after a dozen American firms?

The one part that we see in Channel News Asia is “Consultant Edward Amoroso, a former chief security officer at AT&T, said Huawei’s experience in Britain showed the challenges of securing international supply chains. Although no one should dismiss Huawei as a supplier solely because of its geographical location, reliance on software that is going out of support is a legitimate concern, Amoroso said“, the news (at https://www.channelnewsasia.com/news/business/huawei-in-british-spotlight-over-use-of-us-firm-s-software-10590268) gives the part that does matter, in this Edward Amoroso is right, software at the end of its reign is often the true safety concern, not merely because of the time frame, but in extent the time required to properly update the software on all the devices, which is not always a smooth path and tends to open up additional security gaps. In that part of the equation Huawei does have a legitimate problem to address. The second part to all that is “In addition to the issue with VxWorks, this year’s report also cited technical issues which limited security researchers’ ability to check internal product code“, I believe it to be a minor part and the proper investigators could seek or test for the issues, not merely that, the limitations also remove whatever options there are for zero day breaches, which has a much larger legal frame to address. So even as we agree that the US setting of accusation without evidence (proper presented evidence is merely the stuff that makes the grass grow in Texas). We also get that the US is giving us: “In the United States, the Pentagon is working on a “do not buy” list to block vendors who use software code originating from Russia and China“, there is an actual thing called national security and as such, it is their right to implement that part, I do believe that in the end it might be somewhat counterproductive, but it is still within their rights to be in such a setting nor no other reasons.

In the end there are a few issues in the field and some are out there, but with a lack of technical details, some cannot be proven, yet the fact of what some have done in the past might give the setting of ‘is it more likely than not that some do not really have 5G‘ is a true setting, yet I prefer to have the actual evidence, that some are trying to keep buried, and the media is part of that chase, which is odd to say the least. Huawei is bouncing back and forth and their hold to grow fast via the UK will be there, but from my point of view, they will need to fix the VxWorks part a lot faster than they think they need. From my estimation a new software solution should be well beyond the Beta stage in Q1 2019 if they want to have any chance of keeping their lucrative growth contracts in place. In equal measure we need to look at Canada and Australia, as they are currently set to be nothing more than US tools in all this. In all respects no actual and factual evidence was thrown out in the open. If that was done Huawei would have lost pretty much every non-Chinese contract, the fact that the BS is spread even larger with absence of evidence gives more reliability that there is no real security danger and it is more a tool for some to get the slice of 5G pie, probably at the expense of a monthly data dump, nicely mailed via UPS to: N 11600 W, Saratoga Springs, UT 84045, USA. That alone should give us the goods on who to trust and who to be cautious of. In all this, no evidence has been presented to the public (and their right to know) on how Huawei is a threat to our security. The fact that I believe that this is all bogus in one thing, the issues seems to be blown up as everyone takes a queue from John Bolton, that whilst the setting “Five Eyes is an alliance between Canada, New Zealand, the United States, Australia, and the United Kingdom that facilitates collaboration in intelligence activities” gives us that there are three in the dark, the UK might be around with the knowledge and the rest merely takes a queue form the US, which has seemingly been whispering like they did in the WMD in Iraq phase, you do remember that in the end, they were never found and it was merely bad intel. So in that setting whilst Corporate America, Canada and Australia are all in fear of their gap against leading Huawei, in that setting we are supposed to have faith on the American gospel on what constitutes a danger from Huawei? And now that we are made aware that the software solution used is an American one?

Yup, we have all kinds of problems and some are valid issues of concern as Edward Amoroso phrases it. Yet between a setting of concern and an actual concern is a mile long gap and whilst we acknowledge that Huawei has some fixing to do, until actual evidence is shown that there is a security breach, the only thing that the US can do is to offer a $229 instant price match for the Apple, or an $100 instant price match for the Google Pixel 2, or a $400 instant price match for the Samsung 9, why would anyone in this day and age pay more for the same, actually, with the enhanced batteries of Huawei you will still miss out, but that might be the smallest cross to bear. All this because some players just didn’t get the pricing right, too many fingers on the margin pie, that alone seems to unbalance the entire equation, because all these players will miss out when Huawei is given free reign there. In this the equation is no longer about security, it will be merely about greed and those enabling for it. Is that not equally important an element to consider?

I’ll be honest, I am still happy with my Huawei P7, it was really affordable against anyone offering anything and after 3 years working 24:7, where would you think I would look first? The one who had proven himself, or the one overpricing its brand (OK, with the Pixel at a mere $100 more, that is still an awesome deal).

When we decide on pricing it is one, when unreliable players in the game force us away from the affordable option it becomes a different stage and so far, the US has proven to lose reliability again and again when it comes to their version of security. To emphasize on that, check on all the printing regarding the Landmines in Yemen placed by the Houthi and the amount of articles that we see in the NY Times, the LA Times and the Washington Post. Now consider the impact of mines and why Americans seem to be eager not to inform you. By the way, that setting was almost certain a setting that Iran enabled, if you questions that (which is fair) then answer the simple question, where did the Houthi forces get 1,000,000 mines from?

We are kept in the dark on the wrong topics and it is time to set the limelight on those people keeping us knowingly in the dark.

 

Leave a comment

Filed under Finance, IT, Law, Media, Politics, Science

It’s a bulletpoint

We all have these days. We have moments where we are confronted with superiors (or bosses) who seem to be able to do anything based on a one page memo that is drenched in bullet-points. It was an almost Neanderthal moment in management when those (getting tertiary education) were all brought up with the belief system that a memo is one page (which I can partially agree with), yet that memo should merely consist bullet-points that bring the goods.

I always thought of that part as an absolute load of bollocks. I can agree that sometimes luck works in our favour and that is exactly what happens, they are however rare. You see, the bullet-point might be correct to some extent, but you can only see part of the view with bullet-points. An actual tactical or strategic business setting is properly set in a SWOT analyses. If it is a serious action, that is what you need, because the boss requires the opportunity, yet he must also know the threat and the weakness. Some decisions are merely based on the balance of merits; do the strengths and opportunity outweigh the weakness and threat? That is the game we face in most business ventures and as they move forward. The Netflix balance, the ‘Nine+Fairfax=NEC’ setting, the setting that we saw in Natixis, Ubisoft and Verizon. The last one is apparently not focussing on big Mergers, that is, until we get the allegedly implied news in upcoming October, when in the black out period of Verizon Hans Vestberg will make an interesting announcement. This is not merely about the ‘fast-growing global market‘, this will be about the upper hand and those with the data will have the upper hand, plain and simple.

So when we go back to 2018, where the state of the union treated us to ‘President Trump claiming the military defeat of ISIS‘, yes, also I have a bridge to sell you, nice view of the Tower of London, going cheap! In that same setting we see the New Yorker giving us: “Trump was holding a press conference, a few blocks away, with the Presidents of the three Baltic states. He was visibly angry when asked about Syria. “I want to get out,” he said, his voice rising. “I want to bring our troops back home. I want to start rebuilding our nation. We will have, as of three months ago, spent seven trillion dollars in the Middle East over the last seventeen years. We get nothing—nothing out of it, nothing.” He called it “a horrible thing.”“, here I have to say that he was not entirely incorrect. There is no return on investment. In a war against terrorists, unless you are willing to become, or unleash the monsters, any fight against monsters is a cost, and will remain a cost; there will be no return on investment.

Unless you are willing to properly strike back, this fight will go on and on. The events in the New Yorker were in April 2018, three months after the so proclaimed not really existing victory. The New Yorker brought the news one day after Haaretz gave us: ‘Trump’s White House Says Military Mission to Eradicate ISIS in Syria ‘Coming to Rapid End’‘, a rapid end and not in a good way. Haaretz also emphasises on “Trump said Tuesday that he expects to decide “very quickly” whether to remove U.S. troops from war-torn Syria, saying their primary mission was to defeat the Islamic State group and “we’ve almost completed that task.” Trump’s national security team is advising against a hasty withdrawal even as he makes his preference clear: “I want to get out.”“. that was the setting in April, now a mere 84 days later we are treated (at https://www.theguardian.com/world/2018/jul/25/dozens-dead-suicide-attack-syria-sweida-isis) to ‘Surprise Isis attacks leave more than 200 dead in south-west Syria‘, several credit cards will not charge interest the first 90 days, not ISIS, the interest was served quick, to the point and basically deadly precise. The by-line giving us ‘Suicide bombers strike targets in Sweida city and launch simultaneous raids on nearby villages‘. That is the setting less than 24 hours ago and the directness of the attacks imply that we will see more over the next 4 days. This is not a quick hit and run, this is a message to President Trump that his Trumpet is false and full of lies.

As we are confronted with “The militants are also believed to have kidnapped dozens of people and taken them back to their hideouts. Local sources said the attacks began almost simultaneously in the early hours of Wednesday, between 3.50am and 4.30am“, we see a setting of coordination, creativity and direct action. Not merely proving that the State of the Union setting was wrong, it is a setting that implies that a lot more resources are required. In addition, it also proves that we need to shift gears and reactivate the monsters that can take care of business. This is not the theater of Chicago windy city makers; this is the battleground of people like Academi and the Wagner group. Yes, there is a case where it might be better that the actual governmental military organisations do the work, but it seems that America did not have the stomach for it, the Europeans and NATO are locked in everlasting debates and Israel is eager to stop it all, but that means a direct was with Syria, which it prefers not to be in. So there are not too many options at present. Even as the media at large is setting the stage on a Putin-Trump option, we see in equal measure on how Assad won and Trump is fine with that. We get loads of writing, but none of it reflects a solution and with all the papers all printing the same photo, all claiming a death count that is somewhere between 200-220 we are told that the count is high, yet they do not give us that this happened 35 Km from Jordan, 90 Km from Damascus and 90 Km from Israel. I think that the message from ISIS is clear. There is an issue; ISIS is still a player in the region and yes, from all we can tell ISIS with this one act melvined President Trump pretty much on the spot.

Yet everyone’s question will be how to counter this and deal with ISIS. From my point of view we see a setting that cannot be resolved the way it has been, it requires a different scope of activities and a very different level of investigation and intelligence analyses. That evidence is seen in the way the surprise attack went through and pretty much every part of it was a success (form the ISIS point of view), giving is to wonder how incomplete the current level of intelligence data is to begin with. We were aware that there is too much intelligence ego in Syria (or Iraq for that matter). Even now, in the last few months as sources go out and admit (or proclaim) intelligence failures in Israel, the US, NATO et al. Even as the Syrian nuclear reactor is the most visible one, the quality of the workers gathering the data, often in am allegedly precarious double agent setting tend to be not the greatest sources of intelligence. A less reliable source is seen in open source intelligence where we can get a taste of some things happening, but for the most the reliability is too low to be of operational use, even after the facts deeper digging tends to show issues that after the fact seemingly it could only have contributed towards failure, not towards success.

Iran is the second setting where some go from the balance of probability in a algorithm setting that dictates the tactical push forward, yet the people involved tend to forget the oldest IT setting in any data analytical collective where the protocols of GIGO are in effect, a given law that dates back to 1982 when I was in the Middle East for my own adventure. I always see (or better stated I have seen too often) that the officer’s response of GIGO would be: ‘some of it can be used‘, yet the setting Garbage In Garbage Out is merely the setting that as Garbage was accepted, all data involved becomes tainted, or is tainted. Those who bring you ‘some of it can be used‘, tend to rely on the creation of truths by aggregating false flags. So the setting where: ‘he never relies on computers’, we get ‘must create notes on their intelligence’. The one setting where he does not use computers because the person was dyslexic was overlooked. Aggregated data can be useful against the singular observation in a timeline, it gives the unit against the volume, but if one false flag was false, the others lose value and the column setting is no longer reliable. GIGO is devastatingly simple and pretty much always a given truth (or is that a confirmed non-false?), yes, I am at times that funny.

this now takes us to a setting almost three weeks ago in the Washington Post (at https://www.washingtonpost.com/news/made-by-history/wp/2018/07/09/russia-and-the-u-s-have-common-interests-in-syria-but-it-may-not-matter), where we see: “Last week, national security adviser John Bolton said that the meeting could offer a “larger negotiation on helping to get Iranian forces out of Syria” and that an agreement could be “a significant step forward” for U.S. interests in the Middle East“, it is a statement that I cannot agree with. You see, even as Iran in Syria is an issue for Russia, it is not the same where Iran is an American problem, pure and simple. Russia has a setting where it wants to waste as much of the resources that NATO and America have, plain and simple. There is plenty of data proving that. I have nothing against John Bolton, I do not know the man, but I know he has been out of ‘circulation’ for almost 12 years. He is however not that devious. He sails a straight course (a commendable setting), in this he was always against the Iranian deal, he has been advocating regime change for both Iran and North Korea. It does not matter whether he is neoconservative, pro-American, or a nationalist. The settings that are clearly out and visible is that he has placed his country before his personal interests again and again and that is always a good thing (a lesson Democrats should learn at some point), yet when we look at Politico (at https://www.politico.com/story/2018/07/25/bolton-cabinet-meetings-mattis-pompeo-trump-740429), he is also doing something dangerous. It is seen in part with: ‘Cabinet chiefs feel shut out of Bolton’s ‘efficient’ policy process‘, followed by “Defense Secretary James Mattis has gone so far as to draft a letter requesting the national security adviser hold more gatherings of agency and department chiefs“, this is followed by ““He doesn’t want to ‘meeting’ an issue to death,” said one White House official. “He wants to make the bureaucratic process more efficient so that decisions can be made at the principals level.” But across the U.S. national security establishment, there’s a growing sense of a breakdown in the policy process since Bolton took over the National Security Council on April 9“. From where I am sitting, it creates a different friction. The different stations always had their own way of registering intelligence and it is in the misinterpretation of each of the used Thesaurus, that is where the data gap is starting to form, an international data point is not seen the same by the NSA, DIA and CIA. This gets me to my party favourite, what is another word for ‘Thesaurus‘? It is funny when you think of it, because as there is no synchronicity between Defense Secretary James Mattis, Secretary of State Mike Pompeo, Director of the CIA Gina Cheri Haspel and National Security Advisor John Bolton, they only think there is synchronised thinking (they nearly always do). So now we have the hats of the big cheeses in a similar direction, but not in the same direction, it gives us the issue that there are losses, losses in intelligence, losses in data and losses in translations, and lets not forget an overall loss of quality. That tends to be a much larger problem, and that problem will hit the desk of Director of the FBI Christopher Wray a little sooner than he bargained for. It also sets a very dangerous precedent. You see, it is mishaps like this that caused the deaths of Ambassador J. Christopher Stevens, Sean Smith, Glen Doherty and Tyrone Woods. I see it as a setting where people that need to act are getting more than one version because of the lacking intelligence cohesion, which was never great to begin with is now in a setting of decay. I get where John Bolton is at, but the red tape has one setting which is intelligence quality, that is now too in a stage where the Dodo went. You see, the politico quote ‘cutting unnecessary bureaucratic red tape, pushing the nitty-gritty discussions to lower levels‘ shows the foundation of a good thing, but pushing certain issues to a lower level also means that the accountability and responsibility is brought down, whilst at the same stage, the essential lack of security clearance at that level also stops optional security leaks and as such some information will not be available at lower levels. So if ISIS decides to become surprisingly creative again and we see in a future news setting that they decided to visit Al-Umawyeen St, Amman, Jordan, We will see an entirely new escalation, one that President Trump cannot walk away from, in equal measure, if the changes by John Bolton enabled that scenario, we will see another setting where a National Security Advisor will immediately go into retirement and focus on his family life (the present assigned young-ling is 69 after all, so that excuse will be readily accepted).

So the shorting of the memo’s relying on bullet points, whilst setting the strategic placement of people to be placed at the point of a bullet is not so far-fetched, is it? Even as we will soon see that this gets paraded as a once off event, a rare option where ISIS got lucky. Remember that this was not merely an explosion. It was that, in addition the abduction of people and activities in other places as well that it all went down at the SAME TIME. It was not merely coordination; it required funds, facilitation of events and goods that were available at the right time. Should you consider my folly (never a bad thing to do), consider the one setting that we did not get to see in the news. The distance from the Zaatari Refugee camp to Al-Umawyeen St, Amman, Jordan is a mere 60,224 metres; I have actually walked that distance, so when we consider the dangers in place and we accept that there are ISIS sympathisers in Zaatari (we do not know how many), the one issue that the US cannot allow for is any more miscommunication between intelligence operations. On the plus side, if it does happen, Hollywood can do another movie, John Krasinsky was awesome in the Benghazi story, and he could prepare his Jordanian language skills if he reprises his role at: The Markaz, Arts Center for the Greater Middle East 1626 N. Wilcox Ave, Suite 702 Los Angeles, CA 90028.

You see there is something in this setting for everyone, whilst me successfully avoiding bullet points until the very end, how crazy was that?

#BulletPointsAreAlwaysInaccurate

Leave a comment

Filed under Finance, IT, Media, Military, Politics