Tag Archives: GCHQ

The Setting of strategies

The danger of any person trying to look through the mud that we know as political strategies related to ‘what is real’ and ‘what is unlikely’. There is no ‘non-reality’!
We know that certain steps have been staged (as a good politician would). This staging is not unlike the game ‘GO’ where we place the pebbles in such a way that entices to other to place their pebbles, completing our strategies.

This I discussed in last week’s blog involving the fading pension plans. Yes, and as suspected, whilst Dutch politicians are in vacation mode, the Dutch pension funds are now filling the Dutch with dread of a possible 10%-20% loss of retirement. That is some fear in their world of quick rising prices. (www.nos.nl)

Today is not about that, even though there are possible links! Today it is about renewed issues on telephone taps and how the powerful Murdoch gets another painted target. Yet are his words so wrong? We had the phone tap probe, we have seen the Leveson report, and instead of actually acting on the Leveson report as much as possible. Parties involved seem to be having another go at Rupert ‘the Piñata’ Murdoch. A lot or the press is getting a little sour as words are hashed and rehashed into statements of whatever they could be called.

You see, is this an ACTUAL criminal investigation, you know the one with barristers, judges and both parties taking notice of the evidence act?

Or is this another inquiry that has gone on for two years, giving more visibility to Chairman Keith Vaz and a few other political head honcho’s? Do not think that I am on Mr Murdoch’s side. I will instantly stand by the views of Hugh Grant and Lord Justice Leveson in the attack on the events that surrounded phone hacking, and not just the Sun/News of the world.

There is however the valid thought that cooperation is required and should be given. However the following quote “The committee has heard from the Metropolitan Police’s assistant commissioner Cressida Dick that since May ‘voluntary co-operation (with News UK) has been significantly reduced’ and that police have had to obtain court orders regards ‘requests for new material’“.

Is that the issue? This has gone on for 2 years now. Is thus the statement by Mr Murdoch “totally incompetent” when it comes to describing the acts by the Metropolitan Police entirely wrong? If this has gone on now for 2 years, then yes, I think it is time to look at the questions being asked, and asking additional relevant questions to the investigating offices.

Not doing so could turn this entire phone hacking scandal into a fair label of ‘Witch hunt’ and as such, I would see this as the premise to attack the Leveson report. This is because the two are linked. I remain in favour of implementing the entire Leveson report. Not because I am so much in the know of things, but because I have utter faith in the wisdom of Lord Justice Leveson. Those who claim to know and judge the report as invalid, whilst not in possession of a Law doctorate are required to remain very silent on the matter, unless they show actual valid documentation! I admit that this is slightly strong wording, yet having listened to a few people blatantly attacking the Leveson report in favour of unmonitored freedom of the press, after which I asked in regards to the reports footnote 417 in regards to the accuracy of information, their….. ‘emotional repartee’ in my direction gave me what I needed to know. (They had no clue, or better stated, having never read the Leveson report).

By the way, that footnote is “Clause 1(i) of the PCC Code requires the press to take care not to publish inaccurate, misleading or distorted information, including pictures” (page 673, Leveson report).

If we could only apply this requirement to advertisements at times! (Big Smiles).

So we must prevent that these events to ‘evolve’ into a witch hunt. I am NOT stating that this is happening, but after 2 years that image is starting to linger and that is wrong too. My issue is with the statement that was in that same Sky news article (at http://news.sky.com/story/1117618/murdoch-phone-hacking-probe-excessive)

In his letter he set out how the company disclosed 500,000 documents after 185,000 man hours at a cost of more than £65m.” When the coffers are at minus 1 trillion and student costs are growing and growing, these costs are only excessive if the government is not able to make Mr Murdoch pay for these costs.

I personally have always been to mind that once we need to focus and stretch the actual letter of speech, we lose facts of what is the goal. Basically, in these words I am wondering whether the committee has lost the view of the Big picture. (My apologies if I am incorrect).

So where is the issue of strategy? Well, if we read the “The Leveson Report: implementation” (at http://www.parliament.uk/briefing-papers/SN06535), then at 6.5 (in the full PDF version) we see some additional delays in implementing the Royal charter. I quote: “Lord Wallace of Saltaire: My Lords, my briefing says that it is not appropriate for the Privy Council to consider more than one royal charter at a time on the same issue. The noble Lord may consider that the Press Standards Board of Finance has therefore been extremely clever in what it has done and may draw his conclusions from that – and that accounts for some of the delay.

So we have more delays. Granted that they are procedural, but I wonder how many papers have reported on that delay? I reckon not many! Out of sight, out of mind is a valid strategy that has been in long standing with politicians and corporate spokes people all over the world.

So is this a strategy by Mr Murdoch to keep the focus away, or is this an investigation that is getting stretched in a very expensive way to stop your privacy from getting chartered protection? Not non-privacy by government (aka GCHQ), but by those who are making money out of side stepping commercial reasoning for ignoring privacy for the simple reasons of greed?

The issues of strategies are actually wider set then most will think. Against the Dutch pension issues, there is the view of George Osborne, the British Chancellor of the Exchequer. This is viewed in the subtitle “A majority of directors at the Washington-based International Monetary Fund disagrees with its own advice on UK fiscal policy.” which is part of the article at http://news.sky.com/story/1117069/imf-board-disagrees-over-uk-fiscal-policy.

Even though this sounds good for the Exchequer, the issues of no tax rises in the upcoming years (or after 2015 as he states it) is not just short of wrong (at http://www.guardian.co.uk/politics/2013/jul/11/george-osborne-deficit-tax-rises) , I feel that this could only be kept if a play is made to the pension funds (like the Dutch are trying now), as well as the shale gas approach which is seen as ‘frackalicious’, yet, we should not forget the issues that the Dutch county ‘Groningen’ is going through as it has seen a rise in small earthquakes giving home owners massive costs to repair and additional losses in house values. These issues are to some extent denied/ignored as the investigation is going on, yet the damages that the people see in the news on a regular bases tells another story. At present corporations are now claiming for millions in damages from both the Dutch gas company (NAM) and the government. (at http://www.dvhn.nl/nieuws/groningen/article9972913.ece/Corporaties-claimen-miljoenen-bij-Nam) there is also the claim for compensation to be awarded for the loss of housing value, which adds up to over 10,000 houses for up to 25000 Euro. (Yet one house in the newscast has a value decrease of almost 150,000 Euro). Let us not forget that these were only test drilling, the actual drilling has not even commenced. If the exchequer is depending on these numbers then he might be in for a rough ride. In addition, even though Isla Britannia is decently larger then the Netherlands, there is enough evidence that these issues will have a serious impact on housings and the environment.

If this is all about strategy, then playing the cards close to the chest seems a debatable wisdom. Because when this all goes south, it is not about the Isle politicians are sitting on, but the issue whether there will be a nation left to serve.

Should you doubt that statement (which is fair enough), then consider on how ‘well‘ the US claims their economy is getting. The fact that Detroit is now bankrupt should be enough concern that the American way is not a solution.
We, the Commonwealth nations must stick together to stay afloat and survive, fight together to become the nations of true prosperity again.

None of these strategies are ready for that essential need!

1 Comment

Filed under Finance, Law, Media, Politics

Smear campaign vs Blame campaign

Another day, another NSA/GCHQ article! I must admit that the thread, not threat of privacy is getting a little too biased. I must admit that slapping the government comes over slightly cheap at this point (for the reason that too many articles out there are more and more based on speculation and less on actual facts). It is also the time I think that Mr John Naughton (the Guardian / Observer) should add a little more balance in his very valid opinions. As his profiles states “John Naughton is professor of the public understanding of technology at the Open University“. So the man knows his stuff (and reading his articles makes that clear), and let me be upfront that even though his pieces are definitely opinionated at times, he has not stated anything false or in error (as far as I can tell).

What does bother me to a little extent is that in his article “To the internet giants, you’re not a customer. You’re just another user” (at: http://www.guardian.co.uk/technology/2013/jun/09/internet-giants-just-another-customer) he states when relating to Gmail and Yahoo mail “You do however ‘pay’ in a different currency, namely your personal data.

This is the issue I have as well. Especially when comparing to the article “The NSA/GCHQ metadata reassurances are breathtakingly cynical“, where he states “the metadata is what the spooks want for the simple reason that it’s machine-readable and therefore searchable” (at: http://www.guardian.co.uk/technology/2013/jul/07/nsa-gchq-metadata-reassurances). This is correct, and it is preferred for automated systems, as it takes one person his/her entire career to get through 1 hour of non-spam e-mail for one area of London. So any chance of getting anything useful needs massive levels of automation. So it seems acceptable to be a marketing outlet (the consequence of a free service), yet the group trying to keep you alive gets tarred, feathered, drawn and quartered for doing their jobs.

I am at times slightly amazed that these security measures are such an issue for the UK population. Let us not forget that the UK had decades of issues as they needed to overcome the ‘difference of opinion’ the UK government had with the IRA. As such they have had plenty of reasons to be cautious, compared the limited amount of events the US went through.

I still remember the 1993 bombing of Liverpool street station. I also remember attending the ECTS (Electronic Consumer Trade Show) 5 months later and that area was still an indescribable mess. So the UK population clearly know the dangers of terrorism.

So is this truly about privacy or fear? Not the fear of being attacked, but the fear others have if someone read the messages they send/receive (and I am not even talking about the actual criminal ones that get mailed).

Consider that there is another attack (anywhere in London) and it was not stopped, because privacy laws stopped the intelligence community. Then what? How long until the press, who is all so up in arms on privacy comes with the text ‘why did the Intelligence community not do more?‘ whilst at the same time making people expectant that in Facebook, Google+, Gmail and Yahoo mail your data can be sold on, your details on parade like a debutante to all eligible data sources who would want to have a go at you. Seems a little short sighted doesn’t it?

I am all for privacy, I truly am! However, data being private does not mean that I am not willing to assist the government in keeping the nation safe. And the argument that ‘I’ was not guilty, so there was no reason, does not hold water here. Knowing who is innocent (read safe) is as important as those who raise flags. A raised XML flag does not make you guilty, 5 raised flags do not make you guilty. Especially when this is about automatic parsing of information (read Meta data). When we look at on how these service giants deal with privacy is actually less important than the fact that their international size allows these people to avoid taxes a lot better than Ebenezer Scrooge ever could. So people are up in arms on what governments know, yet these fat cat collecting corporations paying 0.1% tax in this day and age of economic hardship is an acceptable act? I wonder whether people have their priorities straight.

In that regard it is also interesting to read the Benjamin Franklin Quote “They who can give up essential liberty to obtain a little temporary safety deserve neither“. So many are often so easy to hide behind this quote, when siting issues on privacy, yet in those days of Franklin, they thought of war as a gentleman’s game. You know the time of clean Red uniforms. Stand up straight! Moobs forward! Aim! Fire!
Those people, if they ever saw the Vietnam War in their dreams, would wake up screaming.

In this same way we should regard data collecting a la von Clausewitz “Many intelligence reports in war are contradictory; even more are false, and most are uncertain” in that light, the survivor had superior information, which means it is another form of war altogether. Our protectors must get it right all the time; a terrorist, only needs to succeed once. The quote and the premise is the issue we face today and history never properly prepared us for what we now face. I think that under these conditions I prefer the quote “War is such a dangerous business that mistakes that come from kindness are the very worst.” This one is true and also most appropriate. If Privacy is seen as a human right (which it is) and it is a driving force in humanity, then we could see the danger that our Humanity gives strength to the Terrorist (this is of course false), however, in the light of fighting terrorism it does hold a truthful foundation. This brings me to an interesting question I recently saw! “What if the right to privacy depends upon the existence of surveillance and an acknowledgement that some of it, at least, is legitimate?” This is not my question, this was voiced in a discussion paper called “Navigating the Data verse privacy, Technology, Human Rights“, which was published by the International council on Human Rights Policy and can be found at (http://www.ichrp.org/files/reports/64/132_report_en.pdf). It is well worth reading.

The question in my mind is that if we see the news as valid. Is the press on a smear campaign against the Governments? Even though I singled out John Naughton, does not mean that I call him that. His work is amongst the most interesting to read and his writing is pretty compelling, and even though I feel I cannot agree with him at times, he puts down his points clearly and precise. The reason I cannot agree is again the fact that we are expected to be marketed by those offering ‘free’ services, but must oppose those who are out to keep us safe. It seems a very topsy turvy approach from us on keeping ourselves safe.

That makes me think, this could actually be a new Gilbert and Sullivan (read with the tune of ‘A wandering minstrel’ from the Mikado)

A surfing seeker I…
A man of links and searchings
of Mails, Pics and Profiles,
and selling you on my Facebook,
my friend list is so long,
through every like and linking,
and to your e-mail sending
I mine all data for cash!
I mine all data for cash!

So are we giving up essential liberties? I feel we do not, data mining is today’s efficient way of approaching the ‘right’ population, yet this is also a danger! Not of freedom, but of choice. As these companies focus on the options that embrace the bulk of people, the outside innovation will reach us less and less likely. Is that not giving up liberties? As we become part of mass media only, the small innovator will no longer reach us? Who thought of that part of the equation? Actually, John Noughton did raise it in some way in his article “Technology is a double-edged sword” in December 2012. Even though he focusses on Evangelists and Luddites, the outcome is similar. We can look at a coin from either side, but one coin is only complete with both sides.

Consider that the police and intelligence communities are the ‘other’ side (the evangelists), then most people (the Luddites) have a point no less fair, but we must accept that if the people get their way, once things go wrong we have no right to invoke a blame campaign, for the simple reason that with the freedom of choice comes the responsibility of consequence.

A combination of views often forgotten!

Leave a comment

Filed under IT, Media, Politics

Classes of Classification

I was about to do that horizontal thing (sleeping, in case you wondered), where one is in a natural state and loudly snores like the local sawmill! I was actually looking forward to that event. It is almost 00:30, so I need to get up in about 5 hours. However, Sky News stopped that idea pretty quick.

The reason is that the news just showed me a part involving Edward Snowden and more information he ‘leaked’. In this case it was all about spying on the EU diplomatic mission and how that was ‘strictly confidential‘, roughly 0.0324 seconds later I was more than wide awake and started this blog.

So what are the issues? Well three come to mind, but the third one is for a little later down this story.

So the first issue is the classification. No matter, whether the documents were from the CIA, NSA or Alphabet Soup Incorporated. There are levels of classification. Confidential is a lower level. Apart from the issue that there is an issue that the diplomatic integrity of an ally was ‘transgressed’ upon, is there actually any reason why such information would not be Secret or higher? I would even think that this would be Top Secret level information and as such that information remains with a small (read extremely small) group.

Let’s take a look at this ‘Strictly confidential’. I do not have the rules that the NSA applies, but I was able to get the protocol from a World Bank document as to how this is treated. They might be kids play compared to the NSA, but you will get the idea (and I have to start somewhere).

Information and documents that are deemed to be of a highly sensitive nature or to be inadequately protected by the CONFIDENTIAL classification shall be classified as STRICTLY CONFIDENTIAL and access to them shall be restricted solely to persons with a specific need to know. The staffs of the Institutions shall establish a control and tracking system for documents classified as STRICTLY CONFIDENTIAL, including the maintenance of control logs. Documents classified as STRICTLY CONFIDENTIAL shall be:
(i) marked with such classification on each page;
(ii) kept under lock and key or given equivalent protection when not in use;
(iii) in the case of physical documents, transmitted by an inner sealed envelope indicating the classification marking and an outer envelope indicating no classification, or, in the case of documents in electronic form, transmitted by encrypted or password-secured files.

So if we consider the digital version, and consider that most intelligence organisations use Security Enhanced Unix servers, then just accessing these documents without others knowing this is pretty much a ‘no no’. EVEN if he had access, there would be a log, and as such there is also a mention if that document was copied in any way. It is not impossible to get a hold of this, but with each document, his chance of getting caught grows quicker and quicker. He did not get caught, not for many megabytes of duplication.

So, whether these events were true or not, there is now an issue. Not with external trust, but from my point of view with internal trust. If he remained undetected, then several alphabet groups have IT issues of an unprecedented level. Could this even be remotely true?

The second issue is that like any Intelligence organisation like the GCHQ for example, most people are assigned certain areas. The fact that Edward Snowden had such a wide access is more than questionable. The fact that the press seems to just take whatever he serves up with a certain air that whatever Edward Snowden claims is true should also be looked at. In my view it does not. Especially when we consider that he is stuck in some Russian airport terminal awaiting the option to ‘escape’ to Ecuador. You see, his access raises too many flags. It does not matter whether he is the IT guy. The NSA has dozens upon dozens of them, and as such, the fact that he was able to syphon off such a wide area of information (and get it out of the building) seems to be an issue that no one is too investigative about.

What is this all about? That is the question we should be asking. All these events do not add up. This is not some FBI leak (no attack on the FBI). This is a group that was referred to for a long time as ‘No Such Agency‘. The fact that he passed all kinds of interviews befroe the job (on psychological probing levels far above most can imagine), a man who ‘just’ walked away with the kitchen sink and a USB drive loaded with tagged documents. It does not add up in my book.

Now we get to the third issue.

If some amount of this data would be rock solid, then the US has an intelligence community that is leaky as a sieve.

1. A disillusioned intelligence operator gets a job at a department even more hush hush then the CIA and the psychological interview does not raise flags considering the conditions he left the CIA?
2. That person gets access to information on several levels and from several branches and no one is the wiser. More important no flags on these secure servers are tripped?
3. This person gets the goods into Hong Kong, then casually flies into Russia and now is waiting for his flight to Ecuador, whilst at the same time US extradition groups (according to Hong Kong media) drop the ball in getting a hold of Edward Snowden?

Is no one suspicious on what is going on? I for one see reason to distrust several sources at present.

Looking back, Julian Assange got access to his documents though military channels. There have been less than positive issues with the lack of Common Cyber Sense in several military areas. The fact that those events happened outside of the US and under military field conditions where certain security measures are hard to uphold is understandable. That does not make it right, but the circumstances were pretty unique. The fact that someone walks out of places like the NSA or GCHQ with a USB filled with all levels of information is an entirely different matter.

If we accept this article by Sky News as true http://news.sky.com/story/1109739/snowden-spying-claims-us-bugged-eu-offices, then we could be in for a rough ride.

In the end, reality is that spying goes on at all times on many levels (as stated by Mr Reardon on Sky News UK). Mi-5 tries to keep an eye on what the CIA does in the UK, the FBI keeps tabs on MI-6 in the US and none of them care what happens in Australia. Works for me!

So the fact that the CIA is keeping tabs on the EU makes perfect sense, especially with all those new states getting added. However, bugging the hell out of all these buildings is not that productive overall (as there are other sources to these kinds of information). So is the reality that there were just 2-3 bugs (the German Spiegel was aware of one of them) and some document Edward Snowden had just adds loads more?
What Intel does he have that is actually reliable? Are we being run by some wannabe laying it on thick hoping for a nice fat pay check? I wonder what happens now that Russia and China both lack interest (and Ecuador is not that appealing if one lives there without money). So what of Edward Snowden? Sky had another article on that. http://news.sky.com/story/1109235/whistleblower-snowden-may-return-to-the-us. In this article the father is afraid his son is being manipulated by different parties. Even by WikiLeaks. He might return to US if certain conditions are met.

Conditions? For a traitor? And next they claim that all politicians are straight shooters too!
Well, for those who believe that, I have a bridge to sell you, GREAT view on the Tower of London!

Leave a comment

Filed under IT, Media, Military

Who are the real watchers?

It is 02:00, SpyHardwareI slowly move into the building that is owned through puppet corporations. The true owner is no one less then Vladimir Kumarin, the most powerful man in St. Petersburg. Entering the building is relatively simple. I avoid the guards, one almost saw me. It is tempting to use sentry killing, but the body will be found. There can be no trace. I install the small remote webcam. Hacking into his wireless router is relatively simple. It is military grade, but my link to the Cray Titan in Langley soon has that fixed. The router got hit by 400,000 requests a second. It cries for its mamma in less than 7 seconds, a new record. I am in and ghost accounts are set up less than 15 seconds later. The scripts run without a hitch. a low tech wireless microphone is set up 3 minutes later. That is the one they will have issues finding, but it will be found, so the rest remains invisible. I leave silent as the night, no trace left and less than 2 hours later I look like a drunk American exchange student studying in Sweden, on a train to Helsinki.

Yes, it reads like such a nice story, but none of it is true! Thinking of Splinter Cell’s Sam Fisher, I am not even that good a spy writer, so I will leave that skill to Mr Clancy. The closest I get to action is the Xbox360 edition. Suits me just fine!

If we look at today, then all we need is a little box that fits into the palm of our hand. We sit in a coffee shop where the ‘privileged young executives’ tend to show off their expensive mobile, laptop, slightly overcharged suits and they look for that young lady dressed to… ‘Impress’. He then logs in does some basic wizardry stuff and considers himself in the running for a possible afternoon of great sex. That was his plan, will she bite? Nearby is a guy who no one notices. He wears a polo-shirt, likely cargo pants too, has a crossover bag and is typing on his laptop. He looks like many Uni students that get casually ignored. He was waiting for the guy (or anyone like him) to show off. He did just that, and less than 3 seconds after the information is typed in, he has link and login details. He now knows what network he can invade. Perhaps the young executive is lucky and he is of no value. If not, his account is broken down and thousands of dollars on internal communications, price agreements, customer’s details and many more details are now duplicated. It would be worth quite a few coins for the right competitor. As such the quiet student will have all his Uni debts paid off long before he gets his degree. So, what is this about?

You see, the Guardian today is having another go at the intelligence industry. I am referring to http://www.guardian.co.uk/uk/2013/jun/21/gchq-cables-secret-world-communications-nsa. Here they discuss several acts that GCHQ has allegedly involved in. My issue is with this part of the sentence “process vast quantities of communications between entirely innocent people“. Is that any different from what Social media and market research is doing? Let us not forget it is all about the latter part of that same sentence “as well as targeted suspects“.
If there was a way to just focus on that 0.0003% of that population, then it would be easy. But life is not that easy as we learn ourselves on a very daily basis. The only issue I truly have with that article is “Snowden told the Guardian. ‘They [GCHQ] are worse than the US’”. Really Mr Snowden? Let us go over those facts again. First he betrays his country. He is not some guy who got into the thick of it. He first does not make it past basic training. He then gets a chance to serve in the CIA (whomever gave him that brake is truly regretting that act I reckon). He then walks away and joins the NSA. Is there anyone not having any questions at present? So, he knows what is required and then he walks away and not just to anybody. He runs off to Hong Kong. In my mind, he must have thought that the Chinese cyber division would want to offer him a cushy job. But these boys would see through him in no time. Those savants know every in and out of every bit a Cisco system routes, how it does that, why it does that, and where the threats are. Snowden does not instil that level of ingenuity to me. So again, he did not go to some non-extradition country out of conviction (like Ecuador), no he went straight for the ‘enemy’ and is now allegedly enjoying Borsjt and Blackbread in Russian company.

Let us get back to the issues that really matter. This is not about those who claim to be ‘entirely innocent’. This is not even about your average criminals that much. GCHQ is one part to keep England safe. As described earlier, security is no longer done through a backpack full of tricks. The bulk of today’s danger comes to individuals we know not where, and it arrives to them in the simple form of a message. It could be an e-mail, an SMS or even a chat message left on a gaming site. To find them GCHQ needs to get to them all. Do you think they read these messages? That is not humanly possible, every second internet information is created that would take one person a lifetime just to get through. So it becomes about flagging. We can look at two flags. 1 flag is green and is zero threat. That is well over 95% of all communications. This also includes all the dicey and spicy spam messages we get. In effect, they know where it came from, where it is going to. The people they seek are of a different variety. They are all about not being able to detect, or to detect the origin. That is already less than 0.3% of all these messages. Then we go on and on. 1% out of that 0.3% is now a possible threat. Is it? They do not know yet, but the amount is now so small, they can actually start taking a look at the facts. Even then it could be harmless, yet many millions were crunched into less than 1000. That group might be part of the second flag. Even that number is still too high. As time progresses more is crunched and then those people at GCHQ will really go to town and pass on what might be a threat. So, was there an issue? You might think that it is, but if you are entirely innocent then the chance that they saw your data is actually so small that winning the lottery has a much better chance. Do I worry? Hell no. My usage is even less than that. Many download movies, some download pirated games. None of that interests the Intelligence community. They want to learn one thing. Where is the threat to us coming from?

The bulk of us will not even register on their radar. If we rely on the numbers in the article “By May last year 300 analysts from GCHQ, and 250 from the NSA, had been assigned to sift through the flood of data.” that is 550 people to sift through amounts of data that is so much that 1 minute of generated internet traffic will require them all to work their entire careers to sift through that much. Reading our emails? We are just not that important and we likely never will be.

If you are worried, then worry about real threats. The real non-terrorist threat out there today, are the many normal people, not using Common Cyber Sense as they use free internet to do what they need to do from the comfort of their non-desk. Those are the people endangering YOUR data, because they are out to get some personal gain.

1 Comment

Filed under Media, Military

The Hunchback of the NSA

We have been hearing information in this regard for some time now. I added my thoughts in my last blog, and as this is such a growing story, let me see if I can add some details to this by looking at a few issues from another side. (Source: www.NOS.nl , www.Guardian.co.uk , et al).

Edward Snowden, His view is that it is up to the people to decide what is to be done. Is it?

2003: Edward joins the Army to deploy to Iraq. He suffers injuries during (basic) training and cannot continue the training.

200?: Edward has been selected into the sanctum and becomes an IT specialist with the CIA, placed in Geneva. Well, that is a nice handle up from basic training isn’t it. Some people dream of opportunities like that all their life.

He gets a dose of disillusionment. (Not my words, just quoting here). The CIA methodology does not sit well with him. As a data analyst with a few decades of experience, including some not to mention data depositories, I can tell him now, that there is method to their madness. I know where he is at this point, because when it is all about data cleaning, integrity checks and verification, whatever you do feels like carrying a bucket of water towards the ocean, but hey, that is what it is. He then decides to quit. That is fair enough! Not all are meant for that lifestyle (including unappreciative bosses that we see by the container load in the commercial world), and as such we should recognise that some of these jobs have a decidedly larger chance of burning out.

2009: He joins the NSA. Really? After he left the CIA? That is an interesting step. Especially knowing that one worries you, the other would not?

Well Edward, this is what you signed up for! But fair enough, you wanted to give it a go. He then becomes NSA’s own Arnold Benedict. Oh joy! (I say in a slightly sarcastic voice) and he ends up feeding the information to the PRESS. I will add that this is slightly better than dumping all this on Wiki-leaks. I will also applaud him for going to the Guardian as I personally see these people as slightly more devoted to Ethics then anything Rupert Murdoch has at present in my humble opinion. Still, Arnold, oops, I meant Edward goes out into the limelight. Consider that his job was to make sure that the American people remained safe. Did he? Many people including terrorists knew this was likely to happen. Now they have confirmation and they might employ new methods, making it harder for the NSA to find them. So who did Edward Snowden actually service? From my point of view it was not the American people. Oh, and Hong Kong of all places? It seems to me that he preferred to be bankable to several potential donators. (But that is just my view).

The NSA has an uncomfortable job that must be done. The terrorist (or perhaps better stated the extremist) threat is real, and as such organisations like NSA, GCHQ and DSD need to look at information as it flows to keep its citizens safe. There is an ugly looking sterile approach to information. It has no emotion; it is simple collection of data. Yes, if anyone gets the wrong phone call we could be checked. Yet, the data is up to a point so complete that these organisations can easily see whether this is a fluke, or if there is more. Is that not the best solution? Most people have this illusion that we have some kind of privacy. The reality is that our information had been collected and data mined by large corporations well over a decade before governments started to collect data.

Do you think that I am kidding?

Take a day in your life. You fill up the tank at a gas station. You use your tank pass to get the 3% extra discount. You pay with either ‘their’ card, or your card. Nowadays it is rare that people pay cash. You go to work. Lunch means that you get lunch at some place. You get a snack and you get 1-2 extra items. Anything at these points that have a pass, or card is in 70% of the cases collected data. Now you go home, get dinner, use your customer loyalty card and you go home. Whenever you did not use cash (and in some cases even if you did) your details were recorded. EVERY day of your life! Whenever you use your mobile, your mobile carrier knows roughly where you are (with some smart-phones they know exactly where you are). All that data has been collected in one way or another.

Yes, even beyond what Orwell contemplated, you are a data collection point, you are marketable!

This is the ugly reality that has been happening since even before 2001. The big problem for you is that many of these companies need to survive, they need revenue, so to survive and you are for sale. Whatever you did is for sale. No matter the amount of cleaning you think they do. It takes but one linkable fact to your raw data details to know exactly who you are, where you are and where you are likely to go. People like the NSA only want to know whether you are a danger to the nation and the people around you. Are you? The others want to make money off you? Only you know how ‘dangerous’ you are, the others want you to spend cash where they like it. It is a never-ending story of greed. So who do you really need to worry about?

So when we see the news on how politicians are all about worries, all about what was done, then ask yourself, what questions have they been asking, investigating and contemplating when it came to the data handed by all to commercial facilities.

Getting back to Edward, whatever his views are. If he was TRULY for the people, and TRULY doing something to make the world better, then he would have done something about the real issues and all those e-mails from bankers and so on. That did not happen, did it? Didn’t Julian Assange ‘vanish’ to Ecuador before he could make good on that promise? So when people are driven by who hold the usage of their credit card, what do we call them then? As for bankable matters, seems that his move to Hong Kong could be all about bankability, but who is banking who?

Leave a comment

Filed under IT, Media, Military, Politics

Privacy and (fake) fears

It has been all over the news. The US government has access to your email and your details. It was quite the show to read this all yesterday and the issues this morning was set in a nothing less than A-level theatre play. A play that would make Robert Ludlum envious I might add.

The issue is that the US Government (NSA in this case) is reading your e-mails. They have been doing that for some time. Basically, it was the Patriot act that opened the (back) doors for them to get access to all this information. As they were dealing with data on a lower level in those days, their task was simple. Find Terrorists! Find those who attack America and deal with them. So readers, here is your fake fear! This is one moment where I agree with President Obama 100%. You cannot have 100% security and 100% privacy. Anyone claiming different is lying to you.

The NSA is not interested in you soliciting erotic acts from a recipient on the other side of the e-mail track. They are not interested in the deals you make offering a quick buck! So those in fear (roughly 99.8932353%) you have nothing to fear but fear itself. The part you are not afraid of is the part that SHOULD scare you. You see all that data that you ‘surrender’ to Facebook, Google, MySpace, and Friendster and so on. All THAT data you gave can be crunched, marketed and sold to companies, corporations and all who would buy them. THAT is an interesting part. That is the fear people need to have when they looked at the dangers that Dutch Equens represent (as reported in the earlier blog: ‘You might soon be sold by the banks!‘).

It is not just that part, it is the possibility that data miners offer as they combine data files in one coherent file that could be a personal ‘danger’ to you.

The NSA issues are not that. They need these abilities to fight the existing and growing threat called ‘the lone wolf terrorist’. These people are guided by sources like ‘Inspire’ magazine, which is created by AQAP (al-Qaeda in the Arabian Peninsula). It is however not that simple. The real lone wolves get their ‘guidance’ remotely from sources most do not know and all that under the eyes of the Intelligence Community. To have a grip on stopping these people, monitoring the internet is essential to keeping us the common people safe. If you think that reading mails was enough, then you are wrong. The further going plans by some to monitor the internet is going to be an essential part. Do not think that this is a fun exercise for those involved. It is pricey, it drains resources and it is never ending. As people move to the cloud the need to monitor upcoming dangers will only increase.

Most readers will have heard of the soldier killed in Woolwich UK. Home Secretary Theresa May was quoted when the mention came that this attack was not from a ‘Lone Wolf’ terrorist. I am not opposing this thought. Yet, it cannot be denied that magazines like Inspire might be central to these events. As such it is no wonder that GCHQ wants to peek over the shoulders of the NSA to see if dangers are hitting their small island (I meant the UK, for those who wonder).

There were additional issues that are growing on several grounds, which give weight to the need of monitoring and in all of these cases people like you and me are not an issue.

For most of you feeling fear of this, your fear is unwarranted. Your fear should be how Microsoft and Sony are very interested on squeezing your details out of you as they are preparing and implementing their Next Gen consoles. That will affect you a lot sooner than the security services ever will. (Blog: ‘Government ministers, be warned!‘)

It looks almost sanctimonious that people are so shouting at these government actions and after that spread their visions with pictures and reveal all they can (and sometimes with way too much info) using Shutterfly/Instagram and Facebook. When their identities are stolen they will whine that it is ALL the fault of the government on how their identity was not safe.

Seems almost laughable doesn’t it.

When we sit on the fence we do see that there is a responsibility to hold parties to account for what they do. In case of the NSA this is Judge Roger Vinson. So, yes, someone does take a look at what is done. When did you last hear a loud scream on what Facebook is doing with your details? How about never? Only when Facebook had certain plans involving Instagram did the inner demon of personal greed scream out stating that the pictures were not to be open for business. Again we see a show of double standards. Judge Roger Vinson, born in the state where the delicious Forest Reserve Bourbon is from (Kentucky). He is the Federal Judge for the state famous for Pina Colada and cool Mojito’s (Florida). He approved the data request that the NSA made. So, yes there is oversight on this. It is however not needed for foreign requests. Is that bad? We give it freely to Facebook, so why are they stopped from sharing that with the government. Are you having that drink yet?

The NSA, GCHQ, DSD, CSE and a few others need these data streams. They would like to prevent people who are eager to get other people blown up. For you and me to stand on ‘principle’ on one side and then we give away our identity to be marketed and spammed to commercial content is just way too weird.

The world is now visibly changing. It is in my mind a little frightful as we are soon to become part of something different. As the finance markets were not contained, and soon no longer can be contained ever, we see a move away from nations and nationalities. We are about to be reduced to a metadata tag. With an added weighting that is soon to be set to ‘useful’ or ‘waste’. This was not instigated by governments and not even by the intelligence community. It was instigated by corporations behind Social media; and as we openly surrendered our details we are now placed in boxes where we can be approached. When we have moved through all the boxes and we are no longer an asset in any box we will be given the ‘waste’ tag. Then what?

These are my words, but funnily enough I was not the first one to mention this. In the Netherlands there was a New-Age entrepreneur called Luc Sala. Even from the late 80’s he evangelized the dangers of the groups “have” and “have not” and how we were allowing ourselves to be placed in these boxes. I wonder if he ever realised that not only was he correct, but that it could even fade national borders? Consider what you heard over the last months, what we will see in the next 13 months. Prime Minister David Cameron was strong about keeping the UK identity safe, to protect it. He was not willing to step out of the EU for this. That step is now being sought after by UKIP and their leader Nigel Farage.

How are these related? This is a valid question that is forming in your mind. And I have been fighting with these thoughts and especially evidence around this. Without evidence all this is nothing more than a bad level of Conspiracy Theory. You see, all these messages we read in the last few days and the next week are in my mind a smokescreen to some level. We are all so shouting about privacy. Yet, who was up in arms when MySpace started to sell their data in 2010. (Source: http://www.pcworld.com/article/191716/myspace_selling_user_data.html).

Did you stop to think about your data on Facebook? Did you think ‘whatever’? So what other ‘evidence’ is there? In that case I point to several blogs I wrote, but more important you should look at more reputable sources like the Guardian and the Wall Street Times, where we faced stories in regards to the pay outs by all towards Greece, Cyprus and other nations to keep the economy ‘alive’. Whilst now we read how the IMF made errors. How a train line sucks up over 7 billion and is presently still not operational in the way it should be. This is a time and place where other nations are now giving aid as budgets are not met in various degrees by nearly all EU nations. So is it such a far stretch to see National borders fade as these issues are ‘resolved’ (read: ‘put on hold’) by group driven options. All this happens whilst we hear ‘voices’ that seem less and less aware of consequences or claim ignorance and error afterwards.

For this train of thought we need to see three parts

In the first part there is last year when this was quoted “The slight uptick is largely due to Europe, which is expected to return to very slow growth of 0.3 percent after the -0.2 percent contraction in 2012” (Source: http://www.conference-board.org/data/globaloutlook.cfm). Yet the guardian in two articles where the 2012 version stated in: http://www.guardian.co.uk/world/2012/nov/07/eurozone-growth-next-year-ec the following “with the 17-nation Eurozone eking out expansion of just 0.1% in 2013”. However 6 months later we read in: http://www.guardian.co.uk/business/2013/jun/06/ecb-eurozone-recession-deepen, where it states “European Central Bank says the Eurozone economy will shrink by 0.6% in 2013 as it considers unconventional policies to kick-start growth”. Numbers change and get adjusted, but the game can only be one of profit by those who have the right numbers (read the better data source). This game is played and replayed, again and again. This has bearing on all the privacy issue in the form of the collected data these predictors require. If the power of voicing the future is based upon data then your privacy is a thorn in the eyes of commerce as they do react to data, but whose data and created how? So as companies are making less, as economic values go down, other paths to revenue must be found and this does have bearing on your privacy, as you are data. This means you are commercial currency, not government currency as such.

This is the other side of data. Many corporations decided to ‘store’ their backup data in some High-Tech solution off-site facility, not unlike the hosting solution Peer1. Peer1 is a Canadian corporation with hosting locations in for example San Antonio (when they acquired ServerBeach). That is corporate data and as such there is an issue in this place. There had been soft voices of concern in those early days on who gets to access these data servers. American linked companies implementing off-site storage options in America from all over their European locations. Was local management realising that they gave their customer base and (financial) details to US insight?

There is NO; I say again NO evidence that these data files were ever ‘violated’ for commercial gain. If we consider the dangers of greed and in the light of what we read earlier, can we be certain that this did not happen, or even whether this is not likely to happen in the near future?

It had been clear that parties like the NSA had access. There is however a side we do need to take proper heed of. If they have access, then who else has access? From corporate documents from these hosts, corporations would have likely read how impossible access was, and how they never give out access. If that part was shown to be ‘violated’, then what other dangers lurk that these companies did not expect? (In this concept violated does not mean a legal violation as the data storage company would have been adhering to their government rules, yet the fact that corporations might not know this is a question for many and as such legal questions should be asked).

So think again, as social media is in their right to sell the data they have in some shape and that it is the price you paid for all these ‘free’ abilities that these places give you. Most do not worry, but then worry about information the government has/looks in to.

For private individuals all this is simply a fake fear.

Leave a comment

Filed under Finance, IT, Law, Media, Politics

The Data Intelligence bill

GCHQ_StampBThe events that occurred in Woolwich have sparked more than just one debate. The new debate is involving the additional powers that Home Secretary May wants to hand to the intelligence branch. It involves a data bill that was vetoed by the Deputy Prime Minister Nick Clegg. He stated that it was too much of an invasion of privacy.

Is he correct?

Initially I would side with that part. Yet, you cannot have it both ways. There is a plain and simple need to keep England’s citizens safe from radicalised attacks. The issue of Home grown terrorism had been an issue going back to Sir Jonathan Evans reign of MI-5. He was more than just a little concerned with outside influences on the British way of life. This now falls firmly on the shoulders of both Andrew Parker, who is well aware of the issues as well as the needed response and Sir Iain Robert Lobban of GCHQ. As this is Signal intelligence and as such it falls in his lap as the data would be needed for MI-5, MI-6 and some parts of local law enforcements.

I would think that part of this bill will start with Lord Carlile. His involvement in this goes back to the Terrorism Act of 2000. Current issues are ‘tainted’ by two reports and as such they both are important. First there is the National council of Civil Liberties that drafted a response to the definition of terrorism, which seems to have been the work of Gareth Crossman and Jago Russel. You should take a look at it (source: http://www.liberty-human-rights.org.uk/pdfs/policy06/response-to-carlile-review-of-terrorism-definition.pdf). It is an interesting work, and important to read is how they see this all. Part of the weakness is the approach on page 3 where they state: “It is vital that the definition of ‘terrorism’ is drawn as tightly as possible“. It is a decent stance to have, yet in the light of fear against home grown/lone wolf terrorism it is actually counterproductive. Terrorism is a shifty acre of quicksand and the strict approach is not only going to fail, it will get the people involved stopping this drowned. Not a good thing me thinks!

I feel uncertain to the point 6 they make on page 5. Yes, they do state that it is outside of the scope of the document, and as such they only raise the comments made that Terrorism should be dealt with under Criminal law. Here is where I might be the dissenting voice. The law should cover all, I do believe in that, however, what part of law? We are dealing with a group that does not seem to be categorised as such. These people are not transgressing in a way where we approach a normal person, or even the average person. Whilst we approach these transgressors in one way or another, even when if possible their defence starts going into the Mental Health act we will see a case where the court is drawn into years of litigation and dealing with a case that as such should be seen as a non-combatant involved in hostile military actions against civilians with no allegiance to any nation and as such it becomes a mess where each case locks down the justice system more and more. Consider the American situation (Foreign Intelligence Surveillance act). This comes from a special report by their Justice department stated in June 2005.

This allowed the use of FISA information in a criminal case provided that the ‘primary purpose’ of the FISA surveillance or search was to collect foreign intelligence information rather than to conduct a criminal investigation or prosecution. The seminal court decision applying this standard to information collected in intelligence cases was issued in 1980. See United States v. Truong Dinh Hung, 629 F.2d 908 (4th Cir. 1980). In this case, the Fourth Circuit Court of Appeals ruled the government did not have to obtain a criminal warrant when ‘the object of the search or the surveillance is a foreign power, its agents or collaborators,’ and ‘the surveillance is conducted primarily for foreign intelligence purposes.’ Id. at 915. However, the court ruled that the government’s primary purpose in conducting an intelligence investigation could be called into question when prosecutors had begun to assemble a prosecution and had led or taken on a central role in the investigation.

This shows that the narrowness of the scope would be the obstacle we should be trying to prevent. The issue is NOT our privacy at that point; it is all about them having access to go after the right people. This requires them to blanket us with collection of data. Even though the data is all collected, it will turn out that 99.9% might never be accessed. Having it is however essential for their success of stopping terrorist attacks. So when the Sky News UK reporter Stephen Douglas mentioned “are they playing politics with fear” then he is in my humble opinion incorrect. This data bill has been needed for a long time. It can even be safely speculated that MI-5 could have intervened with the Kenyan involved in the Woolwich murder at an earlier stage as more flags would have been raised. Their interview with him would have led to other questions, confirmations of danger. That seems to not have happened at this stage.

So from the civil liberty document we move to document cm7058 from June 2007 which holds “The Government Reply to the Report by Lord Carlile of Berriew Q.C. Independent Reviewer of Terrorism Legislation The Definition of Terrorism“. (Source: http://www.official-documents.gov.uk/document/cm70/7058/7058.pdf). My issue is with point 5 on page 5. Idiosyncratic terrorism imitators should generally be dealt with under non-terrorism criminal law. This is the point that shows the need of the data bill. Especially when we consider Lone wolf or Home grown terrorists there will be the issue whether the person was a mental health wannabe, or a more intelligent individual being allowed a second go at harming groups of people, after civil rights protected him the first time.

So even if we want to give strength to both Nick Clegg and the National council of Civil Liberties. They are there speaking out to protect your rights. Yet, in that process, they are giving strength and freedom to terrorist attacks like the one in Woolwich (not intentionally). This issue is like a seesaw. These two viewpoints are utterly opposing and as we give power to one, we remove it from the other. The interesting part is that the information we surrender will not harm us unless we support terrorism. Should that not convince you then please remember that you have already given away your privacy to most market research and financial institution data centres. They only want your money, or in a product driven way bank you. The intelligence community wants to keep you safe. In my mind, there is no debate. The data bill is likely to come and should be there, if only to prevent a second Woolwich.

Leave a comment

Filed under Law, Media, Politics