Tag Archives: FBI

When inability drives fear

It is a dangerous place to be in. We all have been there and in most cases it is as innocent as it could ever be. You see, sometimes life throws you a curveball. Gamers tend to identify it most easily. In my particular case it was a game called Magic Carpet. It was a Bullfrog game and I was testing it on the PC. It played magnificently there, and soon thereafter I also tested it on the very first PlayStation. There, because of the controller it was good, but not great. Still, it was fun to play and I tended (in those early years) to really get into a game, so when the situation blew into my face, I got a little frustrated. The next two times were worse and the last time (on that day) I went slightly angry (with myself) and I kicked the door. The issue was not the door, it was my steel tipped boot and I went straight through the door, so, I was not merely ticked off, I had a hole in the door (which would require funds to repair) and the boss in Magic Carpet was still alive. We all have had these moments. Our car, our bike, the TV, things go wobbly on you and we sometimes react wrongly to this situation and in light of that get to reflect on our own ego’s a little.

These are the images going through me when I was confronted to new information when looking at the unrealistic response by America (and Australia) to Huawei. In the case of Australia it seemed the mere application of greed and fear as politicians cater to the greed of a large telecom company, which was not seemingly the case with America. Yet that tip was raised for me less than 24 hours ago. The article (at https://foreignpolicy.com/2018/08/15/botched-cia-communications-system-helped-blow-cover-chinese-agents-intelligence/), shows how the CIA got their own systems handed to them through ego and what I would regard as stupidity. The initial headline ‘The number of informants executed in the debacle is higher than initially thought‘ is rather unsettling. It gets to be worse with “The CIA had imported the system from its Middle East operations, where the online environment was considerably less hazardous, and apparently underestimated China’s ability to penetrate it. “The attitude was that we’ve got this, we’re untouchable,” said one of the officials who, like the others, declined to be named discussing sensitive information. The former official described the attitude of those in the agency who worked on China at the time as “invincible.” Other factors played a role as well, including China’s alleged recruitment of former CIA officer Jerry Chun Shing Lee around the same time.” This is the most dangerous of settings. The wrongful setting comes straight from Sun Tsu where we learn that all war is based on deception. China is not some place that is tinkering at the side of the road, the Art of War COMES FROM CHINA! It gets to be worse when you consider that that book was written long before Americans had adopted proper reading and writing skills, close to 1200 years before that, so that was their first error.

When we see: “But the penetration of the communication system seems to account for the speed and accuracy with which Chinese authorities moved against the CIA’s China-based assets. “You could tell the Chinese weren’t guessing. The Ministry of State Security [which handles both foreign intelligence and domestic security] were always pulling in the right people,” one of the officials said. “When things started going bad, they went bad fast.”“. The entire matter seems to be exponentially wrong. The big issue is not on how it was cracked, or even if it was cracked. My issue had been (for a much longer time now) that for too long, the deciding voices, all listening to some CTO, often with multiple sides lacking wisdom that the setting was not merely that there was ‘a security risk’, there was for the longer time a much larger security flaw. For much too long a time, we got the ‘slides of wisdom’ on how data in transit tends to be safe and data at rest tended to be in danger. Even when I started my CCNA, the amount of knowledge given in the Cisco books gave the rise to the consideration that data in transit is not merely as vulnerable, it was that a lot more could be done unnoticed (not merely by the Chinese mind you). It was some time before the Sony hack that I expected a setting where the routers themselves might be used against the owner, it went further when we consider Wired in 2013 (at https://www.wired.com/2013/09/nsa-router-hacking/). The headline is not merely ‘NSA laughs at pc’s, prefers hacking routers and switches‘. It is the setting where we see: ““No one updates their routers,” he says. “If you think people are bad about patching Windows and Linux (which they are) then they are … horrible about updating their networking gear because it is too critical, and usually they don’t have redundancy to be able to do it properly.” He also notes that routers don’t have security software that can help detect a breach“. This is where I was in 2011, when I started to comprehend the working of a router and router tables, I figured out that it is not the router they can see that is the problem; it is the one they cannot see. That idea came from a presentation by Thomas Akin, CISSP, Director, Southeast Cybercrime Institute who had a presentation for the Blackhat briefings. The 2002 presentation gave me the idea. You see apart from the lack of security, the +1 hop hack allows form something truly unique. Consider [.MIL Server], that server connects to <secure router 1> and things are set into motion. Now, we cannot direct all the traffic, yet materials from that location to let’s say ‘preferred consultant one‘ will go via certain paths, yet the first router after <secure router 1> tends to be merely one or two routers (depending on traffic) to that preferred consultant. It is easy to find a router that could optionally be a link to these routers and duplicate all packages that go to that specific next step. Not only is the task easily done, the path is not hindered, the router is not intervened with and a simple reset takes away whatever evidence existed in the first place. In addition, the additional part is that the compact flash in those routers is ‘The maximum storage capacity for the CF in Slot0 and Slot1 is 4GB‘, yet the only part here is that you only needed 32 MB, which is what most of us used then, but cards that small are no longer made, so most IT people just plug in what they have. You have well over 3GB of package storage, so all packages to that one location could be stored and redirected on the ‘off’ hours as not to leave any monitored spike. Until the CFlash card is ejected from the router and investigated no one will have a clue. That was 7 years ago and the systems are even more capable now, a 3GB glitch will not register on most systems, especially when those IT people do not block Spotify and/or YouTube. By the time they figured it out, the setting is already wiped, and this path can be adjusted on a daily bases so that most IT networkers never had a clue in the first place.

You think that I am alone in this, that I am this clever? No, I am not! There are plenty of IT Networkers running circles around me and that is now set into the stage of ‘we’re untouchable‘. The CIA was never that, they never needed to be touched, the opponent merely needed a clear line of sight to the router that is one skip from the secure router that they needed to get to. We see more in the Foreign Policy article with the quotes “Information about sources is so highly compartmentalized that Lee would not have known their identities. That fact and others reinforced the theory that China had managed to eavesdrop on the communications between agents and their CIA handlers” and “an encrypted digital program, allows for remote communication between an intelligence officer and a source, but it is also separated from the main communications system used with vetted sources, reducing the risk if an asset goes bad“. Now we merely add “But the CIA’s interim system contained a technical error: It connected back architecturally to the CIA’s main covert communications platform. When the compromise was suspected, the FBI and NSA both ran “penetration tests” to determine the security of the interim system. They found that cyber experts with access to the interim system could also access the broader covert communications system the agency was using to interact with its vetted sources, according to the former officials“. I believe it goes further than that. If we see the entire layer process and consider that in the end, certain systems merely replicate a process. Cisco (at https://www.cisco.com/c/en/us/support/docs/lan-switching/8021q/17056-741-4.html) gives us: “A device can determine which VLAN the traffic belongs to by its VLAN identifier. The VLAN identifier is a tag that is encapsulated with the data. ISL and 802.1Q are two types of encapsulation that are used to carry data from multiple VLANs over trunk links”, as well as “The DA field of the ISL packet is a 40-bit destination address. This address is a multicast address and is set at “0x01-00-0C-00-00” or “0x03-00-0c-00-00”. The first 40 bits of the DA field signal the receiver that the packet is in ISL format“, so as the destination was known, the people needing this could search very specifically. When we consider ‘It connected back architecturally to the CIA’s main covert communications platform‘, the connection back would enable those seeking to find the needed value of the DA field. That does not merely impede the CIA, it stands to reason that to some degree the NSA would be just as vulnerable.

The main course

In my case, I tend to go for the Bambi burger, ideally I watch Bambi whilst having that lovely slice of venison. You see when we get to “As part of China’s Great Firewall, internet traffic there is watched closely, and unusual patterns are flagged. Even in 2010, online anonymity of any kind was proving increasingly difficult. Once Chinese intelligence obtained access to the interim communications system,­ penetrating the main system would have been relatively straightforward, according to the former intelligence officials. The window between the two systems may have only been open for a few months before the gap was closed, but the Chinese broke in during this period of vulnerability“, I believe the setting is worse than that. These players still require their consultants. It does not matter whether you call them construction workers, members of Blackwater, Xe Services, or Academi. It is those places as well as Booz Allan Hamilton and other providers that still require to be informed, and that is where the interception could start. The setting is not ‘the Chinese broke in during this period of vulnerability‘, it is the long term flags that they were able to test at this point and that is the fear we see with their setting of Huawei and partners. Not that Huawei is the danger, but the fact that Chinese intelligence is just as able to get into nearly all systems, it merely can get into Chinese systems faster (for now). This is where it gets a little more complicated, because it is not about the now, it is about tomorrow and the tomorrows that are coming. The only ones who have a chance of getting things done are players like the Constellis Group and Palantir when they unite abilities. It is going to be about data and about the ability to forecast how traffic goes. Thomas Akin was teaching this wisdom 16 years ago. We see this when we are made to realise

  • Live system data is the most valuable.
  • Immediate shutdown destroys all of this data.
  • Investigators must recover live data for analysis.

And the loss is merely a reset away, in most cases if there is an automatic reset; the only data available is the last transgression at best. With the coming of 5G live real-time capturing data streams is what is more likely to set the stage of finding out what happened, in this the entire setting of ‘China’s Great Firewall‘, we are already looking at outdated Chinese technology and I do believe that those behind the article, as well as some DARPA people are aware of that. America and Europe are behind in ways that we cannot even perceive, because the players that need to move forward are doing so iteratively, that whilst the time of reengineering is now merely 10% of what the development time was. We see this with “Call this the IBM problem, which faced an existential threat as soon as Asian groups started churning out cheap PCs in the 1990s. But here IBM also provides a few tips to the future, with its pivot to software and solutions. By the time of IBM’s iconic “solutions for a small planet” ad campaign in 1996, the company was trumpeting voice recognition and ecommerce — producing the sort of digital enterprise backbone that ended up helping develop the internet economy” (source: Australian Financial Review). In the first instance the Asian market required 10-15 years to catch up, the second time around it took 2-3 years and now with Google and Apple working globally, it takes months. IBM (others too) took iterative steps to maximise the economic footprint, instead of truly leaping forward whenever possible, they lost the advantage and are now trailing the markets. Huawei is one clear example where the American market was surpassed. Samsung showed its supremacy by having 5G home routers ahead of everyone else and the advantage in Asia is only growing. It is seen with “Alternatively, authorities might have identified the system through a pattern analysis of suspicious online activities. China was so determined to crack the system that it had set up a special task force composed of members of the Ministry of State Security and the Chinese military’s signals directorate (roughly equivalent to the NSA), one former official said“. I do not read this part in the same way. I believe that with ‘set up a special task force composed of members of the Ministry of State Security‘, was not about cracking. I personally believe that the Cisco books were so illuminating that they decided to change the setting in their own game. I believe that the Chinese now have a more advanced system. They have done what players like Cisco should have done before 2014 and they did not. I believe that when we see a partnership between Constellis and Palantir, their findings will bear that out with in addition an optional link that shows part of the accusation that China let Russia in on certain findings (and the Russian evolution of certain networking devices). This and the next part is largely speculative, but it is supported to some extent. We see this in: “Once one person was identified as a CIA asset, Chinese intelligence could then track the agent’s meetings with handlers and unravel the entire network. (Some CIA assets whose identities became known to the Ministry of State Security were not active users of the communications system, the sources said.)“. I believe that he part given in ‘not active users of the communications system‘ gives us the third part. I believe that the system was not merely invaded. There is every chance that certain systems when activated also leave tags behind and that is where the intrusion would have paid off. You see, in the Cisco setting (as an example), the data frame has an optional 60 bytes of extension headers, yet is that always empty? More important, when were these data packages truly thoroughly checked? In this speculative setting I take you to the movie Die Hard 2. In that movie we see on how someone decided to get clever and uses the outer marker beacon to warn the planes that were in danger. The beacon can be used in other ways than merely give a beep. I believe that Cisco data packages have other optional parts than can be ‘reused’ to do something different, like the optional headers. They are to most merely empty pre-set ‘spaces’, but they could have more. That is the setting that America faces and the fact that they could get overwhelmed by Chinese intelligence because they did not rely on iterative parts. Huawei had been leaping forward, for example now offering a 128GB Android 8.1 phone (the Huawei nova 3i 128GB Handset), for 50% less than its competitors. A system that is just as advanced as anything Apple and Samsung offer; at merely half the price whilst Chinese Intelligence has been digging into that device for months, unlike the NSA that needs to queue up with all the other users to get to look at the Pixel 3 and the iPhone 8 on launch day. That is the setting we seem to be seeing and America is indeed and rightfully worried, not because Huawei has backdoors (which I never really believed) but because the players here had been held backwards through iterative technology. Apple is actually staged by Forbes that way with the quote ‘a minor point update for the iOS 11.1 iteration‘, even Forbes speaks about iterative changes. That is the setting that they are up against and they have been surpassed for years and with Huawei leading the 5G stage on a global setting the US authorities are merely getting more and more afraid that not only are they no longer the leading players, they are now sidelined by not being able to keep up with what will be presented ‘tomorrow’.

That part can be supported through the CIA with analyses reports (at https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol49no3/html_files/Collection_Analysis_Iraq_5.htm), in here we see that Richard Kerr, Thomas Wolfe, Rebecca Donegan, and Aris Pappas give us (in a different context): “The analysis on this issue by the Intelligence Community clearly was wide of the mark. That analysis relied heavily on old information acquired largely before late 1998 and was strongly influenced by untested, long-held assumptions. Moreover, the analytic judgments rested almost solely on technical analysis, which has a natural tendency to put bits and pieces together as evidence of coherent programs and to equate programs to capabilities. As a result the analysis, although understandable and explainable, arrived at conclusions that were seriously flawed, misleading, and even wrong“. It is important to realise that this was on the WMD setting, so in a different context and on a different setting. Yet the information systems were all designed to upholster that flaw to an ‘evolved’ placement, the systems in their entirety are nowhere near ready, now even for the previous setting. The movement from a lot of staff to more fruitful consultant settings is now paying off in a negative way for the CIA (and the NSA too). This is where it gets interesting. You see, the previous setting that I gave should partially have been dealt with through the flashlight program that DARPA has. Raytheon BBN is working on that with Professor Richard Guidorizzi from George Mason University Fairfax. I think that the system is not entirely ready here, not if the packages can be duplicated via the router and as long as the original is not touched, that system will not get the alert lights ringing.

To get you on board on how far all the NATO partners are behind, let me give you two settings. The first is a DARPA Project called ‘Probabilistic Programming for Advancing Machine Learning (PPAML)‘, the man in charge is Dr. Suresh Jagannathan, yet the bigger brain might be MIT graduate Dr. Jennifer Roberts. The given setting is “Probabilistic programming is a new programming paradigm for managing uncertain information. Using probabilistic programming languages, PPAML seeks to greatly increase the number of people who can successfully build machine learning applications and make machine learning experts radically more effective“, whilst we also see the goods in the DARPA article by Dr Roberts with “If successful, PPAML could help revolutionize machine learning capabilities in fields from Intelligence, Surveillance and Reconnaissance (ISR) and Natural Language Processing (NLP) to predictive analytics and cybersecurity“, this is certainly leaping forward, but it is still based on a system. I believe that the Chinese decided to turn the funnel upside down. To illustrate this I need to get you to an app called Inke. The article (at https://thenextweb.com/contributors/2018/02/09/hidden-world-chinese-livestreaming-app-inke/), gives us ‘The hidden world of Chinese livestreaming app Inke‘, this is not a few people; this is a craze that has already infected millions upon millions. So with “he was actually doing a livestream, an extremely popular hobby for young people in China. China is way ahead of the rest of the world when it comes to embracing livestreams.” you are missing out and missing out by a lot. These streams are real-time and often geo-tagged. I believe that the Chinese have changed the setting, they are optionally collecting Terabytes of daily data and they are converting that to actionable intelligence. Facial recognitions in phones, geo-tagged and all uploaded and streamed, all converted on the spot, like the SETI screensaver, millions of affordable mobiles (this is where the Huawei nova 3i 128GB Handset and all other new handsets come in), parsing all that data into uploaded files and Chinese intelligence gets global information close to real time, whilst their learning machines are about efficiencies of collected data, it is not about the better application by making them more effective, it is about the massive amounts of data offered to get the systems to upgrade the efficiency of parsing data, because parsing data is where the bottleneck will be in 5G and they already have a larger advantage.

In the meantime, on any given day thousands of Inke users are filming life around them in malls and famous places looking awesome doing it. Yet, if you look at the CCTV settings, how many users would have passed 935 Pennsylvania Avenue, Washington DC, or at London SE1 9EL, UK walking towards London Bridge? How many people were merely assuming that they were tourists face timing with mom and dad? Are you getting that picture now? and also realise that Inke is merely one of more than 300 live streaming companies, all capturing that data all those tags that a smartphone allows it to capture and at the top of all this, Facebook and YouTube are eagerly pushing people to gain following by doing just that. So how long until the user realises that uploading the same stream to 2-3 providers gets them to gain a lot more following and optionally cash? Yes, the intelligence community is that far behind at present. So when we are worrying on “The system was not designed to withstand the scrutiny of a place like China, where the CIA faced a highly sophisticated intelligence service and a completely different online environment“, we need to consider that China is already ahead of the game and the CIA systems might be merely an option to scrutinise their own data, because that remains the Chinese bottleneck, the data will require verification and that is the one field where their opposition could gain the advantage if they set their minds to a different algorithm, one on reliability, not on likelihood. It is a setting where all the players involved have a second tier of consideration. They embrace a ‘not now, but soon‘ thought, when ‘I needed this yesterday‘ is the proper setting as I personally see it, because data without proper vetting is merely used space on any given storage device.

That final part can be considered when we look at the linked article that NBC had from last January. There we see: “When agents searched Lee’s hotel rooms in 2012, they found notebooks with the names of covert CIA sources, according to court documents. But not all of the agent arrests and deaths could be linked to information possessed by Lee, who left the CIA in 2007“, an issue I mentioned in an earlier blog. We get there when we consider his actions and ‘found notebooks with the names of covert CIA sources‘, do you think that anyone, especially in this setting would be that stupid? It’s like keeping the condom as a trophy after having intercourse, its useless and stupid. I believe that either it is not the ‘covcom’ system, or not merely the ‘covcom’ system. I believe that (if it is all correct) that Chinese intelligence got in further and deeper into acquiring the data required and the notebook is the proverbial red herring in all this, especially as Jerry Chun Shing Lee left the CIA in 2007. You do not hold on to that level of information 11 years after you might have had some level of valid reasons to have it in the first place. That is the part many overlooked, or looked away from.

In the end, I do believe that it is not merely the inability that drove the anti-Huawei waves, it is the fact that those decision makers have no idea where to navigate towards next is what drives their fears almost exponentially.

 

Advertisements

Leave a comment

Filed under IT, Military, Politics, Science

Rocking the bullshit

There has been a massive issue with Huawei, the accusations by the US is the largest one, one of its sheep (aka Australia) has been on the same post on how Huawei is such a large danger to the safety and security of a nation. It gets ‘worse’ when we see ‘The DNC tells Democrats not to buy Huawei or ZTE devices ever’, (at https://www.theverge.com/2018/8/3/17649920/dnc-democrats-huawei-zte-devices-ban-china-hacking-threat). Here we see the quote “people shouldn’t be using devices from either Chinese company for work or personal use. The words echo what federal officials have already said about Huawei and ZTE posing possible security threats to the US. In February, CIA, NSA, and FBI chiefs testified in front of a Senate committee that the two companies were beholden to the Chinese government and the devices could become tools for undetected espionage“, my issue has always been: ‘show me the evidence!’ Basically EVERY phone can be used as a spying device, that is one clear thing we got out of the Cambridge Analytica part, in addition, the Fitness tracking app Strava was a great way to find CIA black ops bases, so even as Strava merely mapped ‘a regular jogging route’, using Google or Apple maps, you would be able to map out the base, the supply routes and so on, the Apple Fitbit would be there for the Russian government knowing where these specialists were and when the were there. So in all that, and all the security transgressions seen here, not of the were Huawei or ZTE, yet, how much noise have you heard from the CIA, NSA, or FBI on Apple? Even now, they are that one Trillion dollar company, are they too big to mention?

I wonder why?

Yet, Huawei is not out of the hot water yet, they are actually in deeper hot waters now but this time it is allegedly by their own actions. Reuters is giving u mere hours ago: ‘Huawei in British spotlight over use of U.S. firm’s software’, the news (at https://www.reuters.com/article/huawei-security-britain-usa/huawei-in-british-spotlight-over-use-of-us-firms-software-idUSL5N1US343) gives us: “One of those is due to Huawei’s use of the VxWorks operating system, which is made by California-based Wind River Systems, said three people with knowledge of the matter, all of whom spoke on condition of anonymity when discussing details which were not made public in the report“, which now leads me to the setting that the American accusations are set on the premise of American Software used? How dopey is that?

Then we get: “the version of VxWorks being used by Huawei will stop receiving security patches and updates from Wind River in 2020, even though some of the products it is embedded in will still be in service“. In all this, the fact that it is still serviced for another 2 years, how are we now in the stage of: “potentially leaving British telecoms networks vulnerable to attack“? Is that not equally a questioning setting? Do we not have enough issues out there with Microsoft which has been nearly forever a security concerns, at this point, 2 years early we get the security warning on Huawei, yet not on Microsoft or Apple for that matter, in all this Google is equally a place of patches, and in all this, Huawei is the one getting unbalanced and unfairly burned at the stake like a Catholic at an Elisabeth I barbecue gathering.

Yet the good stuff is “All three sources said there was no indication that the VxWorks mismatch was deliberate. There is also no suggestion that the software itself represents a security risk“, this now leads us to two parts. The first is if it is true that ‘no suggestion that the software itself represents a security risk‘, does this mean that Huawei never had a security risk and if that is incorrect, why not present that evidence so that every Huawei Owner can test for this transgressions ending whatever future Huawei had in the first place.

In the second part, if there is no proven security flaw in the Huawei on hardware, is the security flaw a software one, or better stated an American software one, and if so, why are these people only going after Huawei and not after a dozen American firms?

The one part that we see in Channel News Asia is “Consultant Edward Amoroso, a former chief security officer at AT&T, said Huawei’s experience in Britain showed the challenges of securing international supply chains. Although no one should dismiss Huawei as a supplier solely because of its geographical location, reliance on software that is going out of support is a legitimate concern, Amoroso said“, the news (at https://www.channelnewsasia.com/news/business/huawei-in-british-spotlight-over-use-of-us-firm-s-software-10590268) gives the part that does matter, in this Edward Amoroso is right, software at the end of its reign is often the true safety concern, not merely because of the time frame, but in extent the time required to properly update the software on all the devices, which is not always a smooth path and tends to open up additional security gaps. In that part of the equation Huawei does have a legitimate problem to address. The second part to all that is “In addition to the issue with VxWorks, this year’s report also cited technical issues which limited security researchers’ ability to check internal product code“, I believe it to be a minor part and the proper investigators could seek or test for the issues, not merely that, the limitations also remove whatever options there are for zero day breaches, which has a much larger legal frame to address. So even as we agree that the US setting of accusation without evidence (proper presented evidence is merely the stuff that makes the grass grow in Texas). We also get that the US is giving us: “In the United States, the Pentagon is working on a “do not buy” list to block vendors who use software code originating from Russia and China“, there is an actual thing called national security and as such, it is their right to implement that part, I do believe that in the end it might be somewhat counterproductive, but it is still within their rights to be in such a setting nor no other reasons.

In the end there are a few issues in the field and some are out there, but with a lack of technical details, some cannot be proven, yet the fact of what some have done in the past might give the setting of ‘is it more likely than not that some do not really have 5G‘ is a true setting, yet I prefer to have the actual evidence, that some are trying to keep buried, and the media is part of that chase, which is odd to say the least. Huawei is bouncing back and forth and their hold to grow fast via the UK will be there, but from my point of view, they will need to fix the VxWorks part a lot faster than they think they need. From my estimation a new software solution should be well beyond the Beta stage in Q1 2019 if they want to have any chance of keeping their lucrative growth contracts in place. In equal measure we need to look at Canada and Australia, as they are currently set to be nothing more than US tools in all this. In all respects no actual and factual evidence was thrown out in the open. If that was done Huawei would have lost pretty much every non-Chinese contract, the fact that the BS is spread even larger with absence of evidence gives more reliability that there is no real security danger and it is more a tool for some to get the slice of 5G pie, probably at the expense of a monthly data dump, nicely mailed via UPS to: N 11600 W, Saratoga Springs, UT 84045, USA. That alone should give us the goods on who to trust and who to be cautious of. In all this, no evidence has been presented to the public (and their right to know) on how Huawei is a threat to our security. The fact that I believe that this is all bogus in one thing, the issues seems to be blown up as everyone takes a queue from John Bolton, that whilst the setting “Five Eyes is an alliance between Canada, New Zealand, the United States, Australia, and the United Kingdom that facilitates collaboration in intelligence activities” gives us that there are three in the dark, the UK might be around with the knowledge and the rest merely takes a queue form the US, which has seemingly been whispering like they did in the WMD in Iraq phase, you do remember that in the end, they were never found and it was merely bad intel. So in that setting whilst Corporate America, Canada and Australia are all in fear of their gap against leading Huawei, in that setting we are supposed to have faith on the American gospel on what constitutes a danger from Huawei? And now that we are made aware that the software solution used is an American one?

Yup, we have all kinds of problems and some are valid issues of concern as Edward Amoroso phrases it. Yet between a setting of concern and an actual concern is a mile long gap and whilst we acknowledge that Huawei has some fixing to do, until actual evidence is shown that there is a security breach, the only thing that the US can do is to offer a $229 instant price match for the Apple, or an $100 instant price match for the Google Pixel 2, or a $400 instant price match for the Samsung 9, why would anyone in this day and age pay more for the same, actually, with the enhanced batteries of Huawei you will still miss out, but that might be the smallest cross to bear. All this because some players just didn’t get the pricing right, too many fingers on the margin pie, that alone seems to unbalance the entire equation, because all these players will miss out when Huawei is given free reign there. In this the equation is no longer about security, it will be merely about greed and those enabling for it. Is that not equally important an element to consider?

I’ll be honest, I am still happy with my Huawei P7, it was really affordable against anyone offering anything and after 3 years working 24:7, where would you think I would look first? The one who had proven himself, or the one overpricing its brand (OK, with the Pixel at a mere $100 more, that is still an awesome deal).

When we decide on pricing it is one, when unreliable players in the game force us away from the affordable option it becomes a different stage and so far, the US has proven to lose reliability again and again when it comes to their version of security. To emphasize on that, check on all the printing regarding the Landmines in Yemen placed by the Houthi and the amount of articles that we see in the NY Times, the LA Times and the Washington Post. Now consider the impact of mines and why Americans seem to be eager not to inform you. By the way, that setting was almost certain a setting that Iran enabled, if you questions that (which is fair) then answer the simple question, where did the Houthi forces get 1,000,000 mines from?

We are kept in the dark on the wrong topics and it is time to set the limelight on those people keeping us knowingly in the dark.

 

Leave a comment

Filed under Finance, IT, Law, Media, Politics, Science

It’s a bulletpoint

We all have these days. We have moments where we are confronted with superiors (or bosses) who seem to be able to do anything based on a one page memo that is drenched in bullet-points. It was an almost Neanderthal moment in management when those (getting tertiary education) were all brought up with the belief system that a memo is one page (which I can partially agree with), yet that memo should merely consist bullet-points that bring the goods.

I always thought of that part as an absolute load of bollocks. I can agree that sometimes luck works in our favour and that is exactly what happens, they are however rare. You see, the bullet-point might be correct to some extent, but you can only see part of the view with bullet-points. An actual tactical or strategic business setting is properly set in a SWOT analyses. If it is a serious action, that is what you need, because the boss requires the opportunity, yet he must also know the threat and the weakness. Some decisions are merely based on the balance of merits; do the strengths and opportunity outweigh the weakness and threat? That is the game we face in most business ventures and as they move forward. The Netflix balance, the ‘Nine+Fairfax=NEC’ setting, the setting that we saw in Natixis, Ubisoft and Verizon. The last one is apparently not focussing on big Mergers, that is, until we get the allegedly implied news in upcoming October, when in the black out period of Verizon Hans Vestberg will make an interesting announcement. This is not merely about the ‘fast-growing global market‘, this will be about the upper hand and those with the data will have the upper hand, plain and simple.

So when we go back to 2018, where the state of the union treated us to ‘President Trump claiming the military defeat of ISIS‘, yes, also I have a bridge to sell you, nice view of the Tower of London, going cheap! In that same setting we see the New Yorker giving us: “Trump was holding a press conference, a few blocks away, with the Presidents of the three Baltic states. He was visibly angry when asked about Syria. “I want to get out,” he said, his voice rising. “I want to bring our troops back home. I want to start rebuilding our nation. We will have, as of three months ago, spent seven trillion dollars in the Middle East over the last seventeen years. We get nothing—nothing out of it, nothing.” He called it “a horrible thing.”“, here I have to say that he was not entirely incorrect. There is no return on investment. In a war against terrorists, unless you are willing to become, or unleash the monsters, any fight against monsters is a cost, and will remain a cost; there will be no return on investment.

Unless you are willing to properly strike back, this fight will go on and on. The events in the New Yorker were in April 2018, three months after the so proclaimed not really existing victory. The New Yorker brought the news one day after Haaretz gave us: ‘Trump’s White House Says Military Mission to Eradicate ISIS in Syria ‘Coming to Rapid End’‘, a rapid end and not in a good way. Haaretz also emphasises on “Trump said Tuesday that he expects to decide “very quickly” whether to remove U.S. troops from war-torn Syria, saying their primary mission was to defeat the Islamic State group and “we’ve almost completed that task.” Trump’s national security team is advising against a hasty withdrawal even as he makes his preference clear: “I want to get out.”“. that was the setting in April, now a mere 84 days later we are treated (at https://www.theguardian.com/world/2018/jul/25/dozens-dead-suicide-attack-syria-sweida-isis) to ‘Surprise Isis attacks leave more than 200 dead in south-west Syria‘, several credit cards will not charge interest the first 90 days, not ISIS, the interest was served quick, to the point and basically deadly precise. The by-line giving us ‘Suicide bombers strike targets in Sweida city and launch simultaneous raids on nearby villages‘. That is the setting less than 24 hours ago and the directness of the attacks imply that we will see more over the next 4 days. This is not a quick hit and run, this is a message to President Trump that his Trumpet is false and full of lies.

As we are confronted with “The militants are also believed to have kidnapped dozens of people and taken them back to their hideouts. Local sources said the attacks began almost simultaneously in the early hours of Wednesday, between 3.50am and 4.30am“, we see a setting of coordination, creativity and direct action. Not merely proving that the State of the Union setting was wrong, it is a setting that implies that a lot more resources are required. In addition, it also proves that we need to shift gears and reactivate the monsters that can take care of business. This is not the theater of Chicago windy city makers; this is the battleground of people like Academi and the Wagner group. Yes, there is a case where it might be better that the actual governmental military organisations do the work, but it seems that America did not have the stomach for it, the Europeans and NATO are locked in everlasting debates and Israel is eager to stop it all, but that means a direct was with Syria, which it prefers not to be in. So there are not too many options at present. Even as the media at large is setting the stage on a Putin-Trump option, we see in equal measure on how Assad won and Trump is fine with that. We get loads of writing, but none of it reflects a solution and with all the papers all printing the same photo, all claiming a death count that is somewhere between 200-220 we are told that the count is high, yet they do not give us that this happened 35 Km from Jordan, 90 Km from Damascus and 90 Km from Israel. I think that the message from ISIS is clear. There is an issue; ISIS is still a player in the region and yes, from all we can tell ISIS with this one act melvined President Trump pretty much on the spot.

Yet everyone’s question will be how to counter this and deal with ISIS. From my point of view we see a setting that cannot be resolved the way it has been, it requires a different scope of activities and a very different level of investigation and intelligence analyses. That evidence is seen in the way the surprise attack went through and pretty much every part of it was a success (form the ISIS point of view), giving is to wonder how incomplete the current level of intelligence data is to begin with. We were aware that there is too much intelligence ego in Syria (or Iraq for that matter). Even now, in the last few months as sources go out and admit (or proclaim) intelligence failures in Israel, the US, NATO et al. Even as the Syrian nuclear reactor is the most visible one, the quality of the workers gathering the data, often in am allegedly precarious double agent setting tend to be not the greatest sources of intelligence. A less reliable source is seen in open source intelligence where we can get a taste of some things happening, but for the most the reliability is too low to be of operational use, even after the facts deeper digging tends to show issues that after the fact seemingly it could only have contributed towards failure, not towards success.

Iran is the second setting where some go from the balance of probability in a algorithm setting that dictates the tactical push forward, yet the people involved tend to forget the oldest IT setting in any data analytical collective where the protocols of GIGO are in effect, a given law that dates back to 1982 when I was in the Middle East for my own adventure. I always see (or better stated I have seen too often) that the officer’s response of GIGO would be: ‘some of it can be used‘, yet the setting Garbage In Garbage Out is merely the setting that as Garbage was accepted, all data involved becomes tainted, or is tainted. Those who bring you ‘some of it can be used‘, tend to rely on the creation of truths by aggregating false flags. So the setting where: ‘he never relies on computers’, we get ‘must create notes on their intelligence’. The one setting where he does not use computers because the person was dyslexic was overlooked. Aggregated data can be useful against the singular observation in a timeline, it gives the unit against the volume, but if one false flag was false, the others lose value and the column setting is no longer reliable. GIGO is devastatingly simple and pretty much always a given truth (or is that a confirmed non-false?), yes, I am at times that funny.

this now takes us to a setting almost three weeks ago in the Washington Post (at https://www.washingtonpost.com/news/made-by-history/wp/2018/07/09/russia-and-the-u-s-have-common-interests-in-syria-but-it-may-not-matter), where we see: “Last week, national security adviser John Bolton said that the meeting could offer a “larger negotiation on helping to get Iranian forces out of Syria” and that an agreement could be “a significant step forward” for U.S. interests in the Middle East“, it is a statement that I cannot agree with. You see, even as Iran in Syria is an issue for Russia, it is not the same where Iran is an American problem, pure and simple. Russia has a setting where it wants to waste as much of the resources that NATO and America have, plain and simple. There is plenty of data proving that. I have nothing against John Bolton, I do not know the man, but I know he has been out of ‘circulation’ for almost 12 years. He is however not that devious. He sails a straight course (a commendable setting), in this he was always against the Iranian deal, he has been advocating regime change for both Iran and North Korea. It does not matter whether he is neoconservative, pro-American, or a nationalist. The settings that are clearly out and visible is that he has placed his country before his personal interests again and again and that is always a good thing (a lesson Democrats should learn at some point), yet when we look at Politico (at https://www.politico.com/story/2018/07/25/bolton-cabinet-meetings-mattis-pompeo-trump-740429), he is also doing something dangerous. It is seen in part with: ‘Cabinet chiefs feel shut out of Bolton’s ‘efficient’ policy process‘, followed by “Defense Secretary James Mattis has gone so far as to draft a letter requesting the national security adviser hold more gatherings of agency and department chiefs“, this is followed by ““He doesn’t want to ‘meeting’ an issue to death,” said one White House official. “He wants to make the bureaucratic process more efficient so that decisions can be made at the principals level.” But across the U.S. national security establishment, there’s a growing sense of a breakdown in the policy process since Bolton took over the National Security Council on April 9“. From where I am sitting, it creates a different friction. The different stations always had their own way of registering intelligence and it is in the misinterpretation of each of the used Thesaurus, that is where the data gap is starting to form, an international data point is not seen the same by the NSA, DIA and CIA. This gets me to my party favourite, what is another word for ‘Thesaurus‘? It is funny when you think of it, because as there is no synchronicity between Defense Secretary James Mattis, Secretary of State Mike Pompeo, Director of the CIA Gina Cheri Haspel and National Security Advisor John Bolton, they only think there is synchronised thinking (they nearly always do). So now we have the hats of the big cheeses in a similar direction, but not in the same direction, it gives us the issue that there are losses, losses in intelligence, losses in data and losses in translations, and lets not forget an overall loss of quality. That tends to be a much larger problem, and that problem will hit the desk of Director of the FBI Christopher Wray a little sooner than he bargained for. It also sets a very dangerous precedent. You see, it is mishaps like this that caused the deaths of Ambassador J. Christopher Stevens, Sean Smith, Glen Doherty and Tyrone Woods. I see it as a setting where people that need to act are getting more than one version because of the lacking intelligence cohesion, which was never great to begin with is now in a setting of decay. I get where John Bolton is at, but the red tape has one setting which is intelligence quality, that is now too in a stage where the Dodo went. You see, the politico quote ‘cutting unnecessary bureaucratic red tape, pushing the nitty-gritty discussions to lower levels‘ shows the foundation of a good thing, but pushing certain issues to a lower level also means that the accountability and responsibility is brought down, whilst at the same stage, the essential lack of security clearance at that level also stops optional security leaks and as such some information will not be available at lower levels. So if ISIS decides to become surprisingly creative again and we see in a future news setting that they decided to visit Al-Umawyeen St, Amman, Jordan, We will see an entirely new escalation, one that President Trump cannot walk away from, in equal measure, if the changes by John Bolton enabled that scenario, we will see another setting where a National Security Advisor will immediately go into retirement and focus on his family life (the present assigned young-ling is 69 after all, so that excuse will be readily accepted).

So the shorting of the memo’s relying on bullet points, whilst setting the strategic placement of people to be placed at the point of a bullet is not so far-fetched, is it? Even as we will soon see that this gets paraded as a once off event, a rare option where ISIS got lucky. Remember that this was not merely an explosion. It was that, in addition the abduction of people and activities in other places as well that it all went down at the SAME TIME. It was not merely coordination; it required funds, facilitation of events and goods that were available at the right time. Should you consider my folly (never a bad thing to do), consider the one setting that we did not get to see in the news. The distance from the Zaatari Refugee camp to Al-Umawyeen St, Amman, Jordan is a mere 60,224 metres; I have actually walked that distance, so when we consider the dangers in place and we accept that there are ISIS sympathisers in Zaatari (we do not know how many), the one issue that the US cannot allow for is any more miscommunication between intelligence operations. On the plus side, if it does happen, Hollywood can do another movie, John Krasinsky was awesome in the Benghazi story, and he could prepare his Jordanian language skills if he reprises his role at: The Markaz, Arts Center for the Greater Middle East 1626 N. Wilcox Ave, Suite 702 Los Angeles, CA 90028.

You see there is something in this setting for everyone, whilst me successfully avoiding bullet points until the very end, how crazy was that?

#BulletPointsAreAlwaysInaccurate

Leave a comment

Filed under Finance, IT, Media, Military, Politics

Seeking security whilst growing anarchy

We all want national security; it does not matter whether you are American, Australian, British, Dutch, French, German or Swedish. National security is a matter that is not just set in laws; it is set in morality, in justice and in perception. Most of us are set in a stage where we are willing to give out many perks so that national security can be maintained. Many liberals grasp back at Benjamin Franklin who once said: “Those who would give up essential Liberty, to purchase a little temporary Safety, deserve neither Liberty nor Safety“, I would have agreed when he allegedly wrote it in 1755. In those days the biggest fear they had was England, the Dutch trade wars (the VOC) and apparently the French to the north. It was a very different age, in a setting where a naval was not done in minutes, but hours, battle settings took a while and there was clarity on who the enemy actually was (usually the one speaking your language and not firing on you, wearing the same uniform was also a nice indicator).

In this day and age it is not given, nowadays all the wolves have onesies looking like Shaun the sheep and often we cannot tell them apart. This is the setting where oversight, surveillance, data gathering and analyses can help, in equal setting there are a few players that still cannot get their algorithms correct and they are making the same mistake that I caught a few players on in the late 80’s.

There is however a new setting, a line that has been crossed and the Washington Post gives us that setting (at https://www.washingtonpost.com/world/national-security/there-have-to-be-limits-lawyers-for-guantanamo-inmates-challenge-lifetime-imprisonment-without-charge/2018/07/11/f3933faa-8533-11e8-9e80-403a221946a7_story.html). the title ‘‘There have to be limits’: Lawyers for Guantanamo inmates challenge lifetime imprisonment without charge‘ gives us that part and it is one that cannot be ignored, with ‘lifetime imprisonment without charge‘, we see not the first step, but an early setting that the law is changing into ‘Guilty until proven innocent‘ and I am not sure if that is merely a wrongful step, or a desire step for large corporations to give the setting a new life in other directions as well. There can be a setting where it is easier for the courts to work on that level. You see, when a corporation has failed their SLA’s, there will not be the documentation where they can prove it, yet when we see the application to ‘lifetime imprisonment without charge‘ the setting is very much inverted from what we find acceptable. We see the Post giving us “A handful of commission cases have inched along in pre-trial proceedings for years, many of them plagued by irregularities” and it is the ‘irregularities’ where we need to seek first, you see an abused system will rely on irregularities to remain in the shadows and active, whilst it almost never has bearing on National security and it will have even less a bearing on justice or lawful settings. The question becomes where it failed. There is a second side to the Post when we realise that the quote “Justice Department lawyer Ronald Wiltsie said authorities had a responsibility to detain suspects who could pose a future threat, even if it wasn’t clear they would actually take any action against the United States” is incomplete. The fact that we are faced with ‘it wasn’t clear they would actually take any intentional action against the United States‘. You see it comes with the setting that there is no proof that they had actually taken any action against the US, if so there would be a charge and that failure falls not merely on the FBI, it falls on the CIA, the NSA (data gathering agency) and most of all the investigator looking into the matter. We can illustrate this with the weirdest of examples.

In a spreadsheet we can use a random number, so we create 5 groups, each in one column, and each having 100 random observations. Now we will test for them stating that “IF(A2<0.2,1,0)“, I am setting the stage where 80% was guilty (so basically 20% was innocent). If the number is smaller then 0.2, they are presumed innocent. We do this for the 5 groups. Then we count the groups, in the initial test no one was innocent overall, but 3 were innocent on 3 counts and 20 were innocent on two counts. Now remember, this is merely 100 ‘persons’ tested on 5 elements. When we change the setting to “IF(A2<0.25,1,0)” (a joke on the premise that 3 out of 4 all people are guilty of something) we get a different setting. Now we see that two were innocent on 4 counts, yet 10 are innocent on 3 counts and 23 are innocent on 2 counts. Intelligence software works on facts not on random numbers, but the principle is partially the same, how many flags were raised by that one person, yet now not on 5 tests, but on dozens of tests, against people, places, actions and locations at specific times and as we consider that thousands are tested, in the random setting when the number of people are large enough we will get respectfully get a group that was innocent (less than 0.2 or 0.25) on all counts, that is the impact of random.

Yet on the flags raised in real live, we either have them guilty of something, which means that there can be a trial and a charge can be made, when you see the examples next to one another and we realise that the group of all people where no flags is raised did not occur (it will with a larger test group), we need to consider the flaws we are faced with and more importantly, the setting that we open ourselves to in legislation and in law when we allow for ‘lifetime imprisonment without charge‘. So in this setting, no matter how much we want actual national security Missy Ryan makes an interesting case. We get to see the larger issue when we look at Baher Azmy, legal director for the Center for Constitutional Rights, a group representing some of the detainees. With “Baher said the government had distorted a 2001 law authorizing U.S. military operations against al-Qaeda and affiliated forces by using it as a basis for indefinite imprisonment. He said insurgent wars, waged against small, clandestine and evolving bands of militants, could go on forever. But laws governing wars were devised with conflicts between states in mind, he said“, we are treated to the setting that we face in the upcoming decades. We are not waging was on nations, we are waging war on groups and tools. As Hezbollah is still the tool of Iran, the setting of a larger problem becomes apparent. In the first source (at https://www.terrorism-info.org.il/en/hezbollah-iran-handled-shiite-militias-integrated-syrian-army-campaign-take-control-south-syria/) we see “Shi’ite forces, handled by Iran, are being integrated into the campaign currently waged by the Syrian army in south Syria. There are at least two Iraqi-Shi’ite forces (the Dhu al-Fiqar Brigade and the Abu F–al-Abbas Brigade). There are also Afghan Shi’ite fighters in the Fatemiyoun Brigade. In addition, it was reported that Hezbollah operatives also participate in the fighting, including operatives from its elite al-Radwan unit, who were sent from Lebanon“, yet when we see “According to ITIC information, Hezbollah and the Shi’ite militias (some or all) have been integrated into the various Syrian army units and do not operate as independent forces. Pictures show Shi’ite militiamen wearing Syrian army uniforms, and it is difficult to distinguish them from Syrian soldiers“, we get the danger with ‘Pictures show Shi’ite militiamen wearing Syrian army uniforms‘. So now we get the setting of ‘who is exactly waging war on who’, or is that whom?

Not being able to identify the setting gives rise that Baher Azmy has a larger issue to deal with, because any denial from the Syrian army that these people were army units, and they get identified as militia who dressed ‘wrongly’, sets the stage that the defence ‘laws governing wars were devised with conflicts between states in mind‘ can no longer be upheld and that escalates the need for a much larger Guantanamo and indeed it continues and even fortifies the setting of ‘guilty until proven innocent‘.

the second source is a week old and gives us ““Hezbollah is a fundamental participant in planning and directing this battle,” a commander in the regional alliance that backs Damascus told Reuters. “Everyone knows this – the Israeli enemy, friends, and even the Russians.”“, it is given to us by Reuters (at https://www.reuters.com/article/us-mideast-crisis-syria-iran/hezbollah-role-in-syrian-south-exposes-limits-of-us-policy-idUSKBN1JV19U), so as the enemy changes its onesie (yup that was funny) we see a whole league of Shaun the sheep and we have no idea how to deal with them in life (the other alternative is solved through hiring people with the actual ability to aim).

Now change that setting away from the current ‘debacles’ in Yemen and Syria and consider the impact when we look at the Indian view of Pakistan (at http://www.dnaindia.com/analysis/column-terrorism-is-pak-s-business-2627746), it is not a hollow part, and there have been accusations from India and Afghanistan for the longest of times. In this setting we are given the quote: “India and Pakistan are not caught in some existential Punjabiyat love-hate relationship. Pakistan is a state sponsor of terrorism. No other nation has used terror so ruthlessly as an instrument of state policy as Pakistan has done for decades — principally against India but also against Afghanistan” is only the beginning. There are other headlines, even as they should be seen as no more than to illustrate that the issue exist, we cannot tell to what extent. So when we consider “The Islamic State’s flag emerges in Pakistan’s capital. How serious is the threat?” Is there a threat or is it merely a freedom of expression? So when we see the second headline ‘The terrorist group is increasingly present in Pakistan’s southern province‘, we are confronted with how to proceed, yet Reuters gives us 3 months ago “Islamic State claims attack on Christian family in Pakistan“, we see that the game changes. If state sponsored terrorism is the new ‘Letter of marque and reprisal‘, how can we proceed? Is there an actual option other than guilty until proven innocent?

What is clear is that the data crunchers will have their hands full because none of these algorithms and data gathering systems are ready for this leap. And it is not a small setting as Pakistan is a nuclear power who for the most is happy to push the button on India if need be, so the game is not merely changing, the players (Hamas, Hezbollah, Islamic State et al) are aware that hiding under the roof of any government gives them options and they accept being the tool for those governments, yet the systems and our mandates are less equipped to act. Yemen has so far been an excellent example on how to not act and it will escalate beyond this. Now consider that I do agree that ‘lifetime imprisonment without charge‘ is wrong, but what options do we have? Until 2016 I believe that the data and the evidence was the weak link. Now we are in a situation where we need to wage war on three fronts, an overt one, a covert one, and a data intelligence war and we need to find a way to intertwine them and use them to find the right checks and balances. We need to evolve what we can do so that we can determine how to do things correctly, or perhaps better stated efficiently to the right opponent.

You might think that this is ludicrous, yet have you considered the actions in Yemen? They were firing missiles into Saudi Arabia, on civilian targets, yet the only thing we see is messages like ‘Yemeni security officials claimed that cluster bombs were dropped in a civilian area of the Western suburbs of the Yemeni capital Sanaa‘, whilst we see ‘after Houthi rebels fired a missile at Riyadh‘ any justification reduced to an 8 word response. The media at large does not give us: ‘Houthi rebels fired a missile on Riyadh, the Saudi Capital with over 5 million people, the fired missile could have caused the death of hundreds of people if struck correctly, Saudi Arabia reacted in the attack against its citizens‘, we do not get that do we? Yet that is the game that is the danger some face. In light of the missiles getting fired under the noses of Yemeni security officials, they need to realise that not stopping the missiles does have repercussions and innocent people will always be caught in the middle.

The change of conflict is large and it will be growing over the next decade. I am on the side of Missy Ryan in this, lifetime imprisonment without charge must be challenged and everyone needs to know about the setting we have here, but when it comes to the defence of that setting, I wonder if we have any actual option to oppose it, those who are send to that place are willing to (allegedly) support people who hide in other uniforms knowingly firing methods of termination on civilians merely because they can and because it makes them continue the fight that they believe is just for much longer. It is a dangerous setting that strips the veneer of civilisation in nearly all nations, look at France and Germany, they went through this several times. We need to set a different stage and we need to do this before we set a legal lawful setting of targeted killing and the wrong people are shot, because that will be the point of no return for all of us.

You see ‘Guilty until proven innocent‘ (forced or not) is merely a first step, when that setting is entered in stone we get the second danger, when cyber-attacks removes the option to prove innocence, what do you think happens next? It is what I personally believe to be the setting stage for chaos leading to anarchy and there the game changes again, because most governments have cut on so many parts in infrastructure that most cannot overcome anarchy for a much longer time forcing the hands of many governments, especially in Europe and I feel certain that some of the players behind the screens realise that too and they might just be banking on it.

 

1 Comment

Filed under IT, Media, Military, Politics, Science

The Face of a book

So when we thought that the entire Cambridge Analytica was the tip of the iceberg, we were not kidding. The Washington Post (at https://www.washingtonpost.com/technology/2018/07/02/federal-investigators-broaden-focus-facebooks-role-sharing-data-with-cambridge-analytica-examining-statements-tech-giant) is giving us right now: “Representatives for the FBI, the SEC and the Federal Trade Commission have joined the Department of Justice in its inquiries about the two companies and the sharing of personal information of 71 million Americans“, that writing was always on the wall and it seems that it is pushing forward now, so even as Mark Zuckerberg thought that his day in court was done with a mere senate hearing, it seems that there is a much larger issue under the waterline and it is not merely data of a personal nature. The next parts that matters were: “Facebook discovered in 2015 that Cambridge Analytica, which later worked for the Trump campaign and other Republican candidates, had obtained Facebook data to create voter profiles. Yet Facebook didn’t disclose that information to the public until March, on the eve of the publication of news reports about the matter“, now this is nothing new but for some it is only now sinking in that the issue was known for two years. So when exactly did Facebook give us those goods? Two years of inaction, there are plenty of political players in the Democratic party who gotten results faster than that (which is saying a lot). So now we get to the first part, which is the SEC. The Securities and Exchange Commission will focus on “The questioning from federal investigators centres on what Facebook knew three years ago and why the company didn’t reveal it at the time to its users or investors”. You see, when a companies is valued on data, the setting that 20% of the details of the American people makes it into the public domain, that will impact a multi-billion value and that is now part of what could become a criminal investigation.

It is very likely that the SEC will focus primarily on TOPIC 8 – Non-GAAP Measures of Financial Performance, Liquidity, and Net Worth. Here we see:

8120.3 Measures of operating performance or statistical measures that fall outside the scope of the definition set forth above are not “non-GAAP financial measures”. Additionally, “non-GAAP financial measure” excludes financial information that does not have the effect of providing numerical measures that are different from the comparable GAAP measure.  Examples of measures that are not non-GAAP financial measures include:

  1. Operating and statistical measures (such as unit sales, number of employees, number of subscribers)
  2. Measures of profit or loss and total assets for each segment that are consistent with disclosures made in accordance with ASC Topic 280. (Non-GAAP C&DI Questions 104.01 through 104.06)

So, whilst we think it is merely data, the multi-billion dollar value of Facebook is data and they lost 20% of the Americans (and a chunk of Brits and Australians), so that reporting was not there for 3 years, and the SEC is slightly miffed on the subject.

And even as we see: “The Department of Justice and the other federal agencies declined to comment. The FTC in March disclosed that it was investigating Facebook over possible privacy violations” the setting that Justice is mulling over the impact and how to act (which is perfectly understandable), every person with their share of issues that can hide outstanding debts through ‘identity theft’ has optional paths to consider and the Justice department is not ready for the worst case scenario where 20% of all Americans filling for economic loss through identity theft, and the part where the financial systems on a flawed usage (authentication versus non-repudiation) now opens the optional flood gates, so the Justice department is taking everything very cautiously (whilst pussyfooting on a (path of commitment).

The next comment we see is: ““The fact that the Justice Department, the FBI, the SEC and the FTC are sitting down together does raise serious concerns,” said David Vladeck, former director of the FTC’s Bureau of Consumer Protection and now a Georgetown Law professor. He said he had no direct knowledge of the investigation but said the combination of agencies involved “does raise all sorts of red flags.”“. It goes a little further than the settings we considered. Vox gives part of that setting (at https://www.vox.com/policy-and-politics/2017/10/16/15657512/cambridge-analytica-facebook-alexander-nix-christopher-wylie) last year, yet the one part I missed here is that such systems require profiles to be made so that there is interaction. It can be done without is, but having the profiles makes it easier and better. The second source is Wired (at https://www.wired.com/story/cambridge-analytica-execs-caught-discussing-extortion-and-fake-news/) gives us “Britain’s Channel 4 News caught executives at Cambridge Analytica appear to say they could extort politicians, send women to entrap them, and help proliferate propaganda to help their clients“, as well as “They probed them on all manner of underhanded tactics, from deliberately spreading fake news to making up false identities. According to the video, the Cambridge executives took the bait” and there we have the reason why Justice is playing it slow. It is not merely about what was done, planned or enacted. Such profiles are complete enough to give rise or other uses as well, and if they have been used to acquire goods or services, we have ongoing settings towards corporate fraud. It will not matter whether they did, if anyone previously had access to those profiles, it could still fall on the lap of Cambridge Analytica. So, apart from finding those profiles (and there will be more likely than not way beyond a dozen), which profiles are they and how much interaction was used or given? With the honey trap we have an optional case of solicitation; we get identity fraud, optional Synthetic Identity Theft, all requiring investigation. The Justice Department will require time for that, not merely on whether things were done, but the likelihood of a conviction.

The final setting I gave is given weight with the quote: “Facebook also made Cambridge sign a legally binding agreement that it had deleted the data that year, but over the weekend, sources close to the company told WIRED that data was still visible to employees within Cambridge in early 2017“, which gives us that people had access and there is absolutely no evidence that no criminal acts were committed.

So we have two additional considerations. The first is can we work on the premise of guilty until proven innocent? In these cases of identity theft that is often the only path to take to shown innocence. The second is that there have been clear indications that the data was available to Russians, which now opens a path to organised crime as well. One source gives “A 2013 survey from Javelin Strategy and Research estimates that the annual total loss to Americans due to identity theft was roughly $20 billion“, now this is not merely criminal gains, also the cost that the crimes brought onto others is part of this, yet in that if there is even one link that gives us that Cambridge Analytica data was used, the bucket of consideration will become a lot messier for the Justice department and even more intense on scrutiny; that is one step as organised crime and compromised national security seem to be two sides of the same coin, there is a decade of evidence on that, so yes, this mess will become a whole lot less nice soon enough.

From the mere setting of organised crime as well as national security settings where people from all walks of life use Facebook and the setting that even those in denial had ‘blackmail’ in their operational minds, the cards that gone wide and available to a whole range of non-intentional people will be a growing farm of identities and connections.
This now gets us to last week’s issue of the Washington Examiner. The issue shown (at https://www.washingtonexaminer.com/news/facebook-dhs-fbi-help-russian-interference-future-elections-report) is not the one we need to focus on. You see with “Though Facebook has yet to find any serious interference in the current election cycle from the agencies guilty of social media meddling in 2016, the giant company was burnt just enough that year to warrant what amounted to a cry for help from the private tech sector to the government“, we aren’t actually supposed to look, the setting of ‘Facebook has yet to find any serious interference in the current election cycle‘ is the wrong one. The evidence that other sources had shown is that Facebook had not acted for well over two years on the Cambridge Analytica setting, in addition, the fact that more sources confirmed that staff members had access to the data to well into 2017 and most of that was kept quiet to all parties and shareholders, is a larger issue for the simple reason that there is optional evidence that Facebook wiped whatever data was against them from the data carriers. When Facebook was willing to keep people in the dark for three years and the setting that we get in addition to the Senate hearings implies that it is in the best interest of Facebook to get rid of bulk data settings on any election tampering. The mention of ‘bulk’ is actually intentional. You see, editing evidence is hard and in the end in a system as complex as the one Facebook has, people get found out. Wiping entire index settings and wiping complete profiles with all the connected usage is more efficient. A data dump that is lost can be regained with old backups (like a 2015 backup), editing the evidence will never ever work, not on a system as wide as the one Facebook has. So there is clearly the consideration that this has been happening, the two year silence, as well as the Bloomberg quote we can use in this content. With: “Christopher Ailman, chief investment officer of the California State Teachers’ Retirement System, said Wednesday that he deactivated his personal account due to the “offensive” lack of oversight and poor management at Facebook. CalSTRS has owned shares of the company since its initial public offering in 2012.” Now consider that all reference to ‘Christopher Ailman‘ seems to be gone, now consider the 100 profiles (speculated number) that was used to spike the Russian way of life to Americans. The moments that these profiles are gone, so is the rest, so as it is all wiped, the images the meme’s all go the way of the Dodo. Consider that some sources give 9% of profiles deleted in America (another source gave us 14% as a number), when it includes the fake ones, what are the chances that anything will be found? I am adding the dangers of intent here, because when a company like Facebook keeps quiet for well over 2 years that setting becomes very realistic.

So what other evidence has now been wiped? If the justice department wants a full log of all deletions together with interaction, engagement and images, how much could be retrieved? That becomes the question and even as we all signed up for it, we definitely did not agree to the slightest that it was to be used to turn us into tools.

so when we see ‘Facebook turns to Homeland Security, FBI for help‘ in the Washington Examiner, was that to actually seek help, or merely to see if the data was cleaned out (accidentally overwritten) as complete as possible?

Is it a given? No, it is not, yet the different sources from the US and UK newspapers should leave you with this thought, if not for the CNBC quote ‘Executives at Cambridge Analytica were caught on camera suggesting that the firm could use sex workers, bribes, ex-spies and fake news to help candidates win votes around the world‘, than for the mere realisation that Facebook cannot afford getting included in the setting that they were the tools for blackmail, fake mail and solicitation as empowering sides to any election, so the given side of ‘if it moves shoot it, if it doesn’t move shoot it to be certain‘ is a setting that also applies to data centres, although there we use the term ‘overwriting‘ which is a lot more efficient than merely deleting stuff.

I reckon that by the end of this year there will be a lot of limelight that includes executives of Facebook and a court of law, I have no idea if they can avoid it, but there you merely need to wonder if they should be allowed to avoid it, two years of silence nullifies and voids most of the goodwill they thought they created in the Senate hearing.

 

Leave a comment

Filed under Finance, IT, Law, Media, Politics, Science

The Iranian funds play

Today is all about Iran, the Washington Post and many others are giving the world the information that the previous president misled congress. Yet the Washington Post phrases it as ‘Obama administration misled Congress on possible Iranian access to U.S. financial system‘, they also mention that it is a Republican investigation. There are two issues, right off the bat, even before you read the article, the question becomes, where were the FBI and the CIA in this?

So when we get the first lines with “The Obama administration went out of its way in early 2016 to help Iran recoup previously sanctioned oil revenue stranded in an overseas account after the nuclear deal went into effect and actively misled Congress regarding those efforts, according to the results of a nearly two-year Republican investigation released early Wednesday“, we need to realise that the setting is wrong from the very start.

Before I go there, let’s follow the trail of crumbs that we get offered. next there is “Iran wanted to convert the money into U.S. dollars and then euros, but top U.S. officials had repeatedly promised Congress that Iran would never gain access to America’s financial system“, which is followed by “the Obama administration secretly issued a license to let Iran sidestep U.S. sanctions for the brief moment required to convert the funds through an American bank, an investigation by Senate Republicans released Wednesday showed. The plan failed when two U.S. banks refused to participate” and finally we get: “the revelation is re-igniting the bitter debate over the nuclear deal and whether former President Barack Obama was too eager to grant concessions to Tehran“. The full story (at https://www.washingtonpost.com/politics/federal_government/obama-era-license-aimed-to-let-iran-convert-money-in-dollars/2018/06/06/60be6d36-6971-11e8-a335-c4503d041eaf_story.html) gives us a lot more, but initially, we get ‘The plan failed‘. So this was seemingly (according to a previous Obama official) about the Iranian money held overseas. The issue seems seen with “No one involved seems certain whether Iran has yet received all of its $5.7 billion“, yet as I see it, that does not seem to be the case. When you think this through, $5.7 billion amounts to 11.2 million barrels based on the average oil price, this amounts to funds equal to 26 hours of oil production in Saudi Arabia, 26 hours! Now we are not debating whether Iran is allowed access to the funds, the fact that we see that this much oil (or so little in Saudi Arabia), whilst in Iranian production it amounts to 4 days of oil production is a Joke. Oil still goes to Asia, so all this fanfare for 4 days of oil production? This is about something else entirely, or it is about a very different amount of money. I let you mull that part over, so when we look at the second article (also Washington Post), we see in the article called ‘Secret Obama-era permit let Iran convert funds to dollars’ where we are ‘treated’ to “Iran had been promised access to its long-frozen overseas reserves, including $5.7 billion stuck in an Omani bank“, which we knew to some extent, yet the full economic value is not given, which is also an issue, you see that stuff makes interest, so at that point who gets that money? Is it locked in the Iranian account, or was it the balancing act to the seesaw that is going up and down on €11 trillion in essential European and American debt guarantees? The second article has pretty much what the first one had, but we also see (slightly more clearly) “And when questioned by lawmakers about the possibility of granting Iran any kind of access to the U.S. financial system, Obama-era officials never volunteered that the specific license for Bank Muscat in Oman had been issued two months earlier. According to the report, Iran is believed to have found other ways to access its money, possibly by exchanging it in smaller quantities through another currency“, this now gives us the part (when going back to the first article: “Lew, according to documents reproduced in the report, had been given Treasury talking points explaining the Omani conundrum, he chose not to mention it in a House hearing in late March“, this reference to former Treasury Secretary Jack Lew, where we wonder that if this is about the question, was the question correctly phrased, or perhaps the better setting is, was he breaking any laws not mentioning the ‘Omani Conundrum’?

I cannot state without the full text and even if we agree that there is an issue, we now get back to the very core of the matter. If it involves US Banks and when we reconsider ‘the plan failed when two U.S. banks refused to participate‘, two out of exactly how many banks? That part is also not revealed here. So now we get to the part where it becomes either the US treasury AND the FBI who seemingly did not act here, the Omani Conundrum implies that the CIA turf was trodden on and the communications (in several levels) give us that the NSA ignored it. So what is going on? Did anything actually happen? Because that question is becomes valid when we reconsider ‘the plan failed‘. If that is true, then why is the Washington Post, one of the most revered newspapers in the USA not giving the correct light on this? In addition, the outstanding questions that we get from the mere substance given becomes an issue when we see the words of President Trump “this disastrous deal gave this [Iranian] regime — and it’s a regime of great terror — many billions of dollars, some of it in actual cash — a great embarrassment to me as a citizen and to all citizens of the United States,”. Yet how much money was actually released, through the deal and from 2015 onwards? None of that data is available through the articles. So what exactly is US congress playing with now, because this all looks like a really loud smokescreen, all emotion and no contributable facts on the matter. How many banks were part of it (and their names), which two banks refused (double plus points for them two) and in light of merely one $5.7 billion source we need to see the scope of the money, especially in light of the setting that Iran is even now shipping oil to Asia. Are those not valid questions? In all this, where were the FBI and CIA when this was going down and more importantly why is there no mention of their part in all this, or were they not part of any of it? That is equally an issue, because if there is evidence that they were in different states of activity and actionable requirements regarding Iran during the two presidencies, the people have an equal right to know, do they not? You see, in the larger scope that matters, because the Yemeni issue is covering two presidencies, so if (a very clear if) the CIA was less vigilant during the previous presidency, it might also explain a few things on how missiles are getting shipped from Iran to Yemen, if the manifest states 1013 barrels of oil for humanitarian aid, it might explain a little more than we bargained for. Now the last part was speculative and knowingly incorrect, yet the question remains valid. This was not some article from the enquirer, or the Canton Cherokee Tribune, it is the Washington Post. In many (global) cases that newspaper is seen as gospel right next to the Financial Times, so when two articles give us so many questions in all this, I need to wrap my head around the option that Martin Baron is either on vacation or perhaps down with the flu. The man who inspired Tom McCarthy to make Spotlight should have a better grasp on the entire Iranian fund issue and how it should be made visible in my Hummer opinion.

Because behind all this is not merely the oil, or the Iranian uranium enrichment plans. It in equal measure gives another light that we get from “The draft involved a general license, a blanket go-ahead that allows all transactions of a certain type, rather than a specific license like the one given to Oman’s Bank Muscat, which only covers specific transactions and institutions“, you see, if that is in play and when we remember the G30 bankers group, the one that got some limelight, for ONE DAY. After that all the media dropped the issues when the people were given the sight of Mario Draghi being a member of this insiders only club, a club that he had to give up and no one (except for me that is) followed up on that. All the media left it alone. So when we see that part from April 18th 2018, where Reuters and the Financial Times give us that he would remain a member, the ECB and others never acted on it and silently wait it to go away, now we see the Omani Conundrum issue and I have to wonder, as bankers will do trade with anyone, what licenses are out there that no one knows about, more important, whoever the owner of the funds are that they get to play with ahead of all other banks, with close to €3 trillion in extra printed money for the game of bonds, in all this, what else are we not seeing and as this optionally directly reflects on Iran’s and all the billions we are left unaware of, how is it that the Washington Post seems to not care (or rather stated, believingly unimportant issues that are therefor not investigated) are out there with two pages set to issues in a setting of ‘the plan failed‘ and ‘at the end of the day, nothing worked‘. Which makes me wonder if any transgression was committed and what it was all about. Time will tell whether we see more revelations tomorrow and more important if it leads to anything actionable, because that will be come the heart of the matter soon enough.

 

Leave a comment

Filed under Finance, Law, Media, Military, Politics

The wrong claim to make

I have been taking a much larger interest on the entire Facebook and Cambridge Analytica issue. Not because of what was done, but because of what US politicians are about to try. In that view it seems to me that the media is assisting the US government. Pretty much every media publishes ‘Zuckerberg on Tuesday faced a variety of questions from 44 senators‘, yet not one gives us that list of these 44 senators. Online publication Vox had a list of 103 which was equally useless. So why are the readers not getting properly (read: more completely) informed?

As I have a promise to keep (to myself at least), let’s take a look at the first one who really pissed me off. The person in question is U.S. Representative David McKinley, not even a senator. Yet with the quote “Your platform is still being used to circumvent the law and allow people to buy highly addictive drugs without a prescription. With all due respect, Facebook is actually enabling an illegal activity and in so doing, you are hurting people. You’d agree with that statement?” he opened himself to all kinds of issue. So let us take a look. CNN gives us (at http://money.cnn.com/2018/04/11/technology/mark-zuckerberg-questioned-over-facebook-opioid-sales), with the additional quote “Google agreed to pay $500 million to the Department of Justice for showing prescription drug ads from Canadian online pharmacies to U.S. consumers. It stopped the practice in 2009 once it became aware of an investigation by a U.S. Attorney’s office. But sellers are still finding ways of posting about drug sales on platforms like Facebook and Instagram, which critics have accused of being reactive, largely waiting for activists, or the press, to surface issues and help police their platforms“, so the issue is a lot larger and has been around for a long time. So the US representative is not opening legal avenues attacking the Canadian Online pharmacies, no it is attacking Facebook and Google. The issue here is hypocrite on several levels. You see we see part of that evidence (at http://www.cbc.ca/news/opinion/oxycontin-in-canada-1.4607959), even as the investigation into Purdue Pharma is underway, the issue is a lot larger. We get one part from ‘OxyContin was aggressively marketed as a revolutionary painkiller. But many patients became addicted, leading to a country-wide class action lawsuit against its maker‘, the other part is seen in the NPR event “Doctors In Maine Say Halt In OxyContin Marketing Comes ’20 Years Late’“, so we see the news that is given in February 2018. These facts alone give rise to the geriatric dementia dangers that are possibly within business man David McKinley, a man currently elected as a U.S. Representative. In addition to that part, the fact that the US government failed its citizens is open to discussion in the 2015 release of “the Food and Drug Administration. (FDA) approved, in August 2015, extended-release oxycodone for use by children between 11 and 16 years old with “pain severe enough to require daily, around-the-clock, long-term opioid treatment for which alternative treatment options are inadequate“, so there is a much larger failure in play. The fact that the FDA approves (for specific reasons mind you) the use of OxyContin and the fact that it is FDA approved makes it a much larger issue.

The fact that there is ample evidence that US politicians were sitting on their hands for close to 2 decades gives rise to the thought that U.S. Representative David McKinley should give up his seat in what I personally would see as too old to hold any public office position, perhaps at 71 he no longer sees the need to correctly set the dimension of information of any issue. His attack, the fact that this is a lot more complex, in part because the US government chose to not act for 2 decades is also decent evidence to add in this case. In addition, we see that the reformulation to make it harder to abuse opioids (which is an act that makes perfect sense), gave way to ‘Making opioids harder to abuse led to a spike in heroin overdoses‘ (at https://www.axios.com/opioids-heroin-overdose-deaths-1523481019-63cfb423-e1fc-4925-9a80-3406625389b5.html). Here we see “Adapted from Evans et. al., 2018,  “How the Reformation of OxyContin Ignited the Heroin Epidemic”, The National Bureau of Economic Research; Note: “Opioids” includes all opioid related deaths aside from those that are exclusively attributed to heroin“, so basically the junkies and their facilitators found another way to get high and they died in the process (serves them right). It seems that as I found all this evidence in less than 30 minutes and there is almost 20Mb of unread text for me to go through, shows just how lame (or is that blatantly idiotic) U.S. Representative David McKinley is showing himself to be. There is an accepted issue that in some cases non-US advertisements have no business being shown in the US, yet in that situation, my e-mail wad been flooded with the options for silicone tits, 14 inch sausages, Viagra and Cialis for well over a decade from US sources, so how much ‘policing’ did these US senators opt for from 1996 onwards to ‘protect’ non US citizens from these ‘illegal’ drugs? It seems to me that this is an almost perfect example of ‘sauce for the goose, sauce for the gander‘, yet we can feel decently certain that U.S. Representative David McKinley will not see it that way. In addition to that CNN gives us “More than 63,600 lives were lost to drug overdose in 2016, the most lethal year yet of the drug overdose epidemic, according to a new report from the National Center for Health Statistics, part of the US Centers for Disease Control and Prevention. Most of those deaths involved opioids, a family of painkillers including illicit heroin and fentanyl as well as legally prescribed medications such as oxycodone and hydrocodone. In 2016 alone, 42,249 US drug fatalities — 66% of the total — involved opioids, the report says“, this has been going on for a while; this was not merely some Facebook advertisement issue. The CDC shows data going back to 2000, long before Facebook became the behemoth entity it is now. So whilst everyone is kicking up every stink in the place, the issue remains that the FDA approved Purdue Pharma to start making it, so even as U.S. Representative David McKinley could have been visiting their office in Stamford, Connecticut, USA. It is now shown that kicking it on the soul of Mark Zuckerberg is much more personally rewarding for him. In that his quote “why Facebook hasn’t done more to remove posts from sellers offering illicit opioids“, in equal measure does not show the efforts that the FBI has done to crack down on the sellers either. You see, if he had done that we would have ended up (at https://www.cbsnews.com/news/opioid-fentanyl-darknet-drugs-fbi/), showing just how easy it is to the evidence we see here: “Attorney General Jeff Sessions said darknet vendors are “pouring fuel on the fire of the national drug epidemic” and this year doubled the number of federal agents working on those cases. It’s part of the Trump administration’s tough approach to the drug crisis that has focused on harsh punishments for dealers. Critics say the overall strategy resembles a return to failed drug-war tactics and that the record $4.6 billion included in the spending plan the president signed last month is not nearly enough to establish the kind of treatment system needed to reverse the crisis“, it does not absolve Facebook, but it shows that when you are in a house without a roof, blaming the faucet for all the water is just as stupid as it gets. So with this small article I introduce the honourable U.S. Representative David Bennett McKinley, who should, as I personally see it, be up for replacement at the next election.

And may he be replaced by someone who truly takes a proper look at the dimensionality of events and present them equally correct and fair. So we will leave that consideration up to the people who are part of the West Virginia’s 1st congressional district. I reckon that with a population of 615,991 (2010) there is at least one other person who is up for the job.

Now, let’s take a look at the data of the next elected numbskull, have a great Friday all!

 

Leave a comment

Filed under Uncategorized