Tag Archives: Hackers

As evil goes

There is a setting that was inflicted upon us all by books like the bible, it goes like “the idea that humans are the source of their own suffering, whether through their actions, choices, or the inherent negative inclinations they possess” we refer to this like ‘the evil we create’ it is ‘told’ that it revolves around issues of free will and the connected moral responsibility we have. That and last week I went for a job interview. I was told that ‘older’ people are rejected as we lack certain views of adaptation and acceptance of new technologies. In a short saying, that is what my grandfather said when I was wrong until I unplugged his life support, showed him who was boss.

Anyway, something snapped in me and today it is the outcome of short sighted HR people, lazy It people and a dedicated techie who has little to lose, merely the effort that some have and the impact on a lazy business effort with the setting of “Well look at it next quarter” the right combination of issues and impact. And as it goes, places like Ukraine can release such a system on the larger Russian technology setting, so there is that. Although America makes much more likely a target than Moscow, Vladivostok, Saint Petersburg, Arkhangelsk, or Novosibirsk will likely be. 

The setting is that we have two parts. The first part is the automated setting of a standalone laptop with dedicated software that relies on its own (optionally with DML spaces), it is carried around by a drone, one that can hold up to 5Kg, as such a netbook and 3-4 battery packs for longer activities. I reckon that a setup like that would cost around $25,000. Now consider that it goes out looking for wireless enabled servers and in America it would be a lot, In Russia likely a lot less, but not zero. It infects these servers whilst flying around the buildings and in less then 2 minute per servers it does what it needs to do and in one swift control it gets activated, optionally all in one swoop and the location gets a load of DDOS attacks in under an hour. Consider what AWS did to the world, is done by third party players to the business industry. And without effort the business world goes down. So how’s that for an elderly person person without certain views you HR hack. 

As the US governmental settings are in shutdown it will take days to instigate anything and by the time others figure out that they were hacked remotely wirelessly others will destroy the evidence needed and nothing gets done yet again, until the next rounds of hacks come into the wireless connectors. 

So, as evil goes, I am doing quite well. I merely had it with the people deciding on what is possible and leaving me out to dry. Ill soak them all in hardship and terror in an instance. The too is the consequence of unleashed adaptability and considerable creativity. 

So is my idea likely? I am not sure, I think so, but it requires the engineer with effort to program a DML setting and there are other settings, so that they are on the ground hacking via the netbook in a drone so that they become the second hop and that is the unlikely setting, because the hacker needs to remain in an 8 block distance from the drone, not consider that setting that this hacker is drinking and working from a Starbucks at 233 S Wacker Dr, Chicago, or perhaps a coffeeshop in Pershing Square, Los Angeles. How many corporations and servers could be hacked in these 8 block radiuses? That is beside the settings in San Francisco, Houston, Phoenix, SanDiego, Dallas and Austin. Consider that before you write of IT people in their 50’s and 60’s. 

A simple setting and I combined a few simple variables with simple creativity. A setting others cannot dream of and I gave the world a new fear a fear where the world stops because of a simple setting that others (for greed reasons) left around for another quarter. 

That is the setting everyone seems to ignore. The setting that it comes to a halt because these places tend to be out for lunch at 21:00-23:00 hours and that gives the, something to be worried about and with the available IT people working remotely so they can tend to more corporations, that comes down to a grinding halt real quick.

So as such there is evil I can do and the world is not ready for my creativity, as such the HR wench that wrote me off because of age, have a nice day and consider what you unleashed unto the world. Time for me to consider hat else I have wreck havoc on, my creativity is going just fine, so have a great day and consider that the world is about to get more complicated in an instance. And with the police in shutdown to some degree, help might not be coming any day soon and in that same setting you bleed revenue every minute because you left something until the next quarter, which would be on you. 

Have a great day and enjoy the matcha today (apparently prices are currently soaring on that stuff).

Leave a comment

Filed under Finance, IT, Media, Politics, Science

The Gump setting

You remember that famous character? Forest Gump with his ‘stupid is as stupid does’. This is the setting that I saw happening when the BBC (at https://www.bbc.co.uk/news/technology-68025683) alerted us to ‘US regulator admits cyber-security lapse before rogue Bitcoin post’, this is not a lapse, this is a screwup of the umpteenth order. They give us “The Securities and Exchange Commission (SEC) did not have multi-factor authentication (MFA) in place when hackers gained access to the account.” To give a clear view, to give you proportions. MFA was a discussed issue in University when I was at UTS 10 years ago. It was invented in 1996, well over a quarter century ago, although it was called two factor authentication. It is my speculation but I think that they left it aside until the call was needed and that call was clearly needed a decade ago. As such heads at the SEC need to roll (a queen of hearts idea). As such the quote “cyber-security experts say it should be a wake-up call for other agencies” is equally a joke. Those who aren’t ready need to be sanitised on several levels. There is no boo or bah about it. The fact that it took hackers this long to catch on is perhaps a small blessing in disguise. And the quote ““While MFA had previously been enabled on the @SECGov X account, it was disabled by X Support, at the staff’s request, in July 2023 due to issues accessing the account,” the SEC said in a statement.” The setting here is the question whether this was an SEC staff request or an X staff request (it could be read either way), but to remove security for access reasons implies stupidity of an unacceptable level. It means that systems were not ready, protocols were not ready and systems were deployed and configured in unacceptable ways. Then we get “The SEC has confirmed the account was compromised by a fraudster convincing a mobile operator to transfer an SEC employee’s phone number to a new Sim.” As such is it purely the fraudster, or is the mobile operator equally guilty? I honestly cannot tell on these facts, but multiple systems were unable to perform because the human element was not correctly set in stone. At present (based on SLA, or Service Level Agreements) there is a case that the mobile operator did not have the proper hat on because certain facts might not have been known to the mobile operator. The fact that an SEC phone number got swapped leaves the guilty party in the middle, but in this I admit that it is based on missing information. That missing information might show who went wrong (SEC or Mobile operator). And above all a properly placed MFA is intended to protect against this kind of hack (and several others). And lets be clear, this was not a grocery store, this was the SEC that got compromised in this way. 

As such stupid is indeed as stupid does and I reckon the head honchos in charge there will be upturning every process, protocol and service level agreement in place just to keep their jobs somewhat secured. That might be merely my speculative view, but I personally believe that to be the only step left for those yahoo’s.

Enjoy the middle of the week.

Leave a comment

Filed under Finance, IT, Law, Media, Science

Christmas comes early

This came to me in a dream. It seems a nice setup for a story, but I am already dealing with 4. How to assassinate a politician is about 90% complete in my mind. Then Kenos Diastima a series in three seasons which is at 40%, Residuam Vitam the mini series is at 30% and Engonos is I have no idea, but it is still ongoing, season one is about 75%, the rest is less clear. What I got now did not fit anywhere and I do not want to start something else at present, so I am making it public domain. Perhaps it will be useful to someone else at present.

The story is in the first person (it is easier for me that way).

And so it begins
It is a late afternoon, I am working in a data centre owned by Heineken. I am not sue what I am, but I am doing my job. Something about cleaning data. We are suddenly attacked and Heineken is subject to ransomware.

3 hours earlier
In the WebCentre of Heineken people are doing their work, they are editing, they are checking and they are aligning on a global scale. One person is doing something else. He is embedding a small code tabulator, alternate 0255, tabulator, alternate 0255, tabulator. A simple code a mere 5 bytes, but that was all that was needed and it was embedded in several places. Someone higher up would clean the data and that was the purpose. 

You see, the hackers were smart but not the brightest. They had a database, but one that mattered. They had a database with disgruntled employees and several worked at Heineken. This was the setting, the honey was a payday of 50 Bitcoin cents. And two applied for that, the hackers knew that the invasion would get them 150 bitcoins in a week, spending one coin was a wise investment setting. 

So here we are, I am at my desk and I see the Ransomware invade, system after system becomes useless. That was what was intended. As the employees with much higher security settings cleaned out the 5 bits, the system saw that as a call to include a small script, a mere 73 bits and it was included in several places and as these systems started to buckle, people with higher security clearance took up the hammer and they infected even more systems. The operation took less than 25 minutes and in that time everything was smitten with Ransomware. All systems and the log files were getting encryption. All these systems and more were now Ransomed and they had no clue who was behind it. 

Now you want to see some clever way out of this, but there is none. As systems buckle governments are forced to put in place draconian laws whilst cleaning what they can and it is with that stupidity the hackers are subject to prisons and executions and as the dust settles, the hackers go deep underground. They are now regarded a global enemy. In the days when there was surplus people never cared, now as governments will buckle they are ready to hold these people (including children too smart for their own good) to account and it was not going to be a nice stage. Just like these ‘Just Stop Oil’ idiots. 6 months was merely the beginning. When the oil starts being reduced even more, the people will start their vigilante justice, as well the IT people against hackers and their supporters. A cleansing unlike any we have ever seen, the agents of chaos will hurt and suffer for a long time to come. A setting no one wanted, a setting we all denied, but we all saw that there was no other direction and that was when we realised that at times we cannot be nice to the monsters, we have no other choice but to put them out of their misery.

A sad day on this day so close to Christmas.

Enjoy today, have a muffin.

Leave a comment

Filed under IT, Science, Stories

One card to rule them all

This morning I was confronted with an image. The image wasn’t the unsettling part, it was the part that the image did not give. You see, I got my first smart-card in 1991 by Unilever. They already had smart-card security when it was a myth at best. 

Now consider the set-up above. This level of card cloning can now be done by a high schooler. And people think that this level of protection works? How quaint.

So my old noggin started to mull things over, we need to upgrade this stuff by a lot. I know all the people will state that this isn’t needed. But when insurance companies catch on that people are cutting corners the premium goes up by a lot. Now, my idea might not be the best solution, but I leave this to the ACTUAL cyber boys to mull this idea into something workable.

In my view the smart-card has 3 layers, the lowest layer is an RFID shield, this makes scanning the cards really hard, the middle layer is the circuitboard and the top layer is the plastic layer. Now the circuitboard can have 7 nano sims, but only a minimum of two are required. You see, all that cheap corner stuff is done for. The 6 sim locations are connected through printed circuitry, the one part a hacker cannot copy or clone. As such these sims become part of a non-repudiation process. And as they are specifically created for each client, you have 64 options right from the start and when you consider that each nano sim and the circuitry adds a few thousand combinations we can safely say that these hackers stop being a problem.

The centre sim is where specifics are programmed on site (hotel, corporation HR), the other one, or up to 3 other ones are SPECIFIC to that client. Yes, it could all fit ONE sim, but that is where people get into trouble and cyber criminals will have a field day.

You see, what we do is raise the threshold. The image below gives the side I was after. 

The lower part are the wannabe hackers, simple thieves and so on, that is a little over 50% of the lot and they are taken out of the equation completely. They lack the resources to make it work. The yellow are partial threats, these are the high end hackers. They are driven to results and finance, so if the goal is not the required need, it is left alone. That doesn’t make them a non-issue, but unless they have something really interesting to gain, they aren’t interested. The green ones are the remaining threats. People with government access, or serious funds. We have now removed a little over 90% of the threat that was in existence. You think and insurance company having to pay out millions upon millions will try to avoid having to pay at all. We can come with all the usual culprits, but that is not where it is at. Consider that a player like Northrop Grumman needs to keep their IP safe, the first stage is non-repudiation.  That person and that person alone could have done this and a cloned card makes that part near impossible. In the end some will always have access, but when we can remove 90% from the equation, that part matters and it matters a lot. So that is what I was mulling over and this idea came to the top. Perhaps not everyone’s cup of tea, but that is not my concern. I had another idea, number 4 (or 5) this week alone and now I will snore like a sawmill, it is Wednesday here now.

Enjoy the day.

Leave a comment

Filed under Finance, IT, Science

Equational parts

Today might take a moment. You see I was getting ready to write something else when my brain started to shout in my head. The phrase was ‘shifting sands’. I am uncertain what started that, but when the brain shouts, I tend to listen. I had to look it up as it was kinda familiar but the exact meaning wasn’t clear. The dictionary gave me “used in reference to something that is constantly changing, especially unpredictably” that did not completely helped me, yet a thought was getting hold there. You see, I offered part of my IP to the Kingdom of Saudi Arabia. And even as Amazon and Google decided to ignore the option, I saw the IP for what it was, a stage to something larger and the three elements that it did cover was a lot bigger then the sum of the individual parts, as such I thought I was sitting pretty, even  though I am not great at waiting. So as I was contemplating the individual parts, I suddenly realised that there are additional stages that interact. As such we get “used in reference to elements or parts that are constantly changing towards the engine that supports them, predictable or not” and if I am correct (still uncertain) then the IP picks up a few billion in value. Now, at this point I do not completely care about its total value, but the 20 year sales commission will take a leap forward. So let me try to explain it without compromising the IP. You have a game for example Skyrim, this came has locations and this game has clothing. You can see both as cosmetic parts, but when they become elements of the game they change application. For example cold Skyrim relies on warm clothing, we have (almost) never been been exposed to these elements, but what when that changes? What happens when the bad weather picks up? How useful will a bow be? All elements Skyrim ignored, but what if that is not the case? So what happens when you are dressed for Skyrim and you end up in a place like Valenwood? Now, you can see that when you are in a game like Elder Scrolls or Fallout. But what happens when we go into a game like Diablo? Or even more contextual, I saw today that someone is making Impossible Mission 3, a game franchise that flourished on the CBM64, so some people are picking up the ideas I had and they are evolving them. So what happens when we take the simple game below and make the terminals more interactive and more important, what happens when we do not have limited time, but limited access because elements are still unfound? 

Have you thought of that? I reckon Google did not and neither did Amazon, and no one cares what Microsoft thinks, but Apple remains an option. Now take THAT idea and add the game ‘V’. There on the CBM64, we merely ran from place to place and we were content, but what happens when we add the mini game of Impossible Mission to that game (or the other way round)? 

I had some thoughts in that direction in the past, but I never contemplated a larger stage but when the system is accepted by Saudi Arabia the larger stages become debatable and they become elements of discussion. They are not games, but the same setting applies. The shifting sands elements allow me to grow system one with system two and we get a much larger system 3. Systems like Facebook sort of gave it to you, but they basically added to the junk you had and called it novelty or ‘expanded opportunity’, but we could see that it was merely more for THEM. Yet when these systems are (partially) in YOUR control and you get to decide whether you want system two to enlarge system one? We get a form of system individuality, like a system SHOULD have been all along and that is at the back of my mind (without giving the IP away), as such we could optionally see that the application of shifting sands to a user system will make it truly user friendly, now consider that we add security like WE want it to be, whatever it is. Now we have a new setting, well optionally a new setting but these systems are up to US, like they should have been all along. I just never contemplated it because I was thinking like an American as the expression goes and now I see that more is possible, but the application is a new one, and it is not free of challenges. You see, how can we evolve a closed system? It has to be closed as there is too much cybercrime and cyber theft. There is not a way to make it zero, but we can make it so that only the top tier hackers might get away with it. So whomever the 80 people are that the NAB hires (see previous article), they are all about stopping hackers, whilst the access levels were the ones that required scrutiny. Should you doubt that then consider the news that we got merely an hour ago ‘Major crypto trader Wintermute hit by $160 million hack: CEO’, there we are being told “Decentralised finance platforms and software, which aim to provide crypto-based financial services without traditional gatekeepers such as banks, have been targeted by numerous heists in recent years. The sector is little-regulated and victims of crime rarely have recourse” yes, because hackers really take notice of rules and laws and a bank vault that is open is one they can access, and there is a reason that banks use traditional gatekeepers (pointless or not), the larger stage is that open systems are done for (like Microsoft) a new setting is required and that is what I figured out. I am certain that others have too, but the greed of Fintech is stopping them and as such they lose small amounts like $160,000,000 such is life. And as such the world turns, so congrats you hackers on getting enough to pay next year rent, but at some point Fintech will grow up (or they go out of business). It is merely a matter of time which of the two becomes the winner. 

Leave a comment

Filed under Finance, Gaming, IT, Science

S.P.I.D.

Yes, we do love our acronyms. There was SPQR (Senātus Populusque Rōmānus), there is RADAR (Radio Detection and Ranging), there is FUBAR (Fucked Up Beyond All Recognition) and my favourite SPID (Stupid people in defence). The last one gets a new level of non-intelligence when we see the BBC article ‘Nato investigates hacker sale of missile firm data’ (at https://www.bbc.co.uk/news/technology-62672184). The article alerts us to “Nato is assessing the impact of a data breach of classified military documents being sold by a hacker group online. The data includes blueprints of weapons being used by Nato allies in the Ukraine conflict.” And to show you just how stupid this is, lets take a look at ‘What did they not see?’, which I wrote on May 1st 2021. There I wrote “Ransomware gangs are now routinely targeting schools and hospitals. Hackers use malicious software to scramble and steal an organisation’s computer data”, in addition to this we have ‘Exposing lies?’ Which I wrote on July 23rd 2019. There I gave the readers “The FBI send their cyber experts and behold, they too agreed that it was North Korea. Even as we were extremely aware that they had no way of doing it, the FBI stood firm on their findings.” These elements matter. They matter because on July 30th 2021 I wrote ‘In retrospect’ where I gave the readers “It goes back when I designed an intrusion system that stayed one hop away from a router table between two points and to infect one of the routers to duplicate packages from that router on that path, one infection tended to not be enough, 2-3 infections needed to be made so that the traffic on that route between two points could be intercepted, I called it the Hop+1 solution, I came up with it whilst considering the non-Korean Sony hack. That  thought drove me to think of an approach to find the links.

So when we see ‘now’ (8 hours ago) that “The pan-European company, which is headquartered in France, said its information was hacked from a compromised external hard drive, adding that it was cooperating with authorities in Italy, where the data breach took place. It is understood investigations are centred around one of MBDA’s suppliers.” This is important because I learned basic issues like data at rest and data in movement A DECADE AGO, as such, how stupid were these people? And that is before we start digging into the ‘compromised external hard drive’ part, who got it compromised, where was IT, how did SE-Unix fail, or are these people even more stupid and they relied on Microsoft? So whilst we understand “a Nato spokesperson said: “We are assessing claims relating to data allegedly stolen from MBDA. We have no indication that any Nato network has been compromised.”” Yes, because admitting to a faulty network is a bad gig for all around. I reckon that this gets shovelled under any carpet as soon as possible, and the criminals? They get to fill their pockets. A stage that has a few issues from the get go and that is before we start digging into “Cyber criminals, operating on Russian and English forums, are selling 80GB of the stolen data for 15 Bitcoins (approximately £273,000) and claimed to have sold the stash to at least one unknown buyer so far.” There is still the issue whether the claim is true, who was the culprit and where did it all go? There are all kind of questions and that is not on the BBC or their fault. What one person claims is another person’s believe and yet another man’s doubt. But there is a rather large problem, the fact that there was an external hard drive, the fact that it allegedly was compromised implies that there are failing policies in place, there are failing IT divisions in play and there is a large amount of military IP in the open. There is a lack of questions and the fact that it is not front page news in EVERY paper is yet another matter. So when we take notice of “A former Nato official said: “There’s a lot of over-classification in Nato but these labels matter. They are applied by the originator of the information and NATO SECRET is not applied lightly.

“This really is the kind of information Nato doesn’t want out there in the public.”” We seem to see the change of a dance, what direction and which tempo is unknown to me. It gives a speculated view that there might be additional damage, but that is speculated and in light of one compromised device the question becomes how was this one undetected for so long and whatever more could be compromised? So when you take a dab at my hop+1 solution, consider that a compromised device indicates that some people of rank in that place were especially stupid. But that could just be me and I merely wonder how the relationship of mundane workers at place X versus the amount of SPID’s in that place becomes an interesting investigation. Merely because there are a whole range of players who would want that data and they are all willing to pay, so these hackers could end up with 10-50 times what they have now. 

Enjoy the day!

Leave a comment

Filed under IT, Military, Science

Return of Common Cyber Sense

So, is it the return of CCS, is it Son of CCS? With all the 60’s movie references it can go either way, like Son of Blob, Return of the Predator, the Swamp Man strikes again, take your pick. We can go in any direction. And it all starts with the NOS (Dutch News) article of ‘Hackers stole 3 gigabytes of data from Spanish Prime Minister’s phone’ (at https://nos.nl/l/2427306). There we get exposed to “The hackers who used Pegasus spyware to access the phone of Spanish Prime Minister Pedro Sánchez last year were able to extract 3 gigabytes of information from the device. They also managed to penetrate the telephone of the Minister of Defense, although less data was stolen from it. The hack of the Spanish Prime Minister’s phone came to light by chance during a routine check, it turned out today. The government was informed this weekend. The telephones of all cabinet members are now being searched for the espionage software.” As such we now have two settings, the first one is linked to ‘State of what?’ (at https://lawlordtobe.com/2022/04/24/state-of-what/) where some attacked the NSO on Catalan settings. Now we see that two Spanish governmental targets were out in the open, and its Prime Minister was not too intelligent and lacking Common Cyber Sense. 

So in what universe is it a good idea to put 3GB of data on your mobile? I have (by choice) 224MB of data on my phone (over 6 years) and well over 80% are ASCII files (a collection of articles I have written). 

A mobile phone is a transmitter at rest, no matter how much you run, as such it is a trove of information for any hacker with anti-Spanish sentiments. So in what universe should we see “Spanish opposition parties speak of “a very big coincidence” that the burglary into government telephones is just now becoming known. Others speak of a smoke screen. Already two weeks ago it became clear that 63 Catalan politicians and activists had Pegasus on their phones. Among them were members of the European Parliament, Catalan regional presidents, lawyers and political organisations”? Well the answer is none. You see the setting that we are a witness of shows a massive lack of Common Cyber Sense. And in this consider “Pegasus is sent via apps, a WhatsApp message from friends or acquaintances or an email. When the recipient clicks on such a message, the spy program settles in the phone. Secret services have access to all possible data such as passwords, telephone conversations, location or photos” You see, this is a side that might be on me. People like that have a work phone and a private phone. The work phone has no need for WhatsApp, Facebook, or a whole range of other social apps. Having them on your work phone is folly, extremely stupid and massively shortsighted. When you are a governmental tool (of any kind) you need to adhere to Common Cyber Sense. It applies to any Prime Minister, Defense minister, minister and that list goes on for a while. The only exception might be the cultural minister, but then that person tends to not have any classified data, or classified data of a limited stretch. So when we see “The organisation Citizen Lab, which previously revealed that the 63 Catalans were targeted, is drawing no conclusions about who is responsible for the covert operations against the Catalans. “But the circumstances indicate involvement of the Spanish government,” the authors of the report believe.” OK, that is fair, we are all seemingly nodding towards the Spanish team, but it is assumption. And when we have that stage, the lack of Cyber Sense is making it all into a farce. So whoever hacked the Spanish, might through that have gotten access to two teams for the price of $100,000 per phone. A good deal if any. 

So at what time will governmental teams (on a global setting) decide to embrace Common Cyber Sense, with the added realisation that apps like WhatsApp and several other have no business being on your work mobile? 

In this, my message to these politicians is as follows: You are (for the most) not an A-lister, a movie star or a social media revelation. For the most, you are all governmental tools and you need to take responsibility for the stupidity you employ. Keep personal stuff OFF your work phone, give the hackers a challenge, not a trip to easy street, Common Cyber Sense has reason, take it seriously.

Leave a comment

Filed under Law, Politics, Science

That first step

We have all heard it, the first step is admitting you have a problem. There is of course debate on WHAT the problem is. I am not any different. I hate stupidity, hypocorism and bot to mention short sighted issues. One of these issues is ‘Tax the rich’, we see all these stupid people screaming ‘tax the rich’ whilst the system is set, there is a tax system, there are tax laws and instead of all screaming to adjust the tax system we see the empty gesture to tax the rich, the rich do not care, they adhere to tax laws, so these laws will PROTECT them. Another issue was seen in ‘Greed and Law helping each other’, I wrote it on July 9th 2021 (at https://lawlordtobe.com/2021/07/09/greed-and-law-helping-each-other/). There I set out the short sighted setting of the Oxycontin setting. I wrote “Yes, there are culprits in this story. You see some sources give us that in 1996 316,000 prescriptions were dispensed, it grew to an impressive amount topping over 14 million prescriptions with an estimated value of $3,000,000,000. The issue we see everyone painting over is ‘prescriptions dispensed’, this is not something that a person can get, it needs a doctor and it needs a pharmacist.” You see there are laws and rules, and they were massively broken by doctors and pharmacists. So when do they go to court? 

It is Reuters who give us today (at https://www.reuters.com/legal/transactional/sacklers-near-deal-contribute-more-opioid-settlement-purdue-pharma-bankruptcy-2022-01-31/) the story of ‘Sacklers near deal to increase opioid settlement in Purdue bankruptcy’, I personally do not believe that members of the Sackler family who own Purdue Pharma LP were completely innocent, yet that is not the setting is it? SOMEONE handed a paper to dispense Oxycontin, a pharmacist handed over the drugs. Yet nearly all of them banked the money and did not ring the alarm bell (some really did that) and those who cashed in on 14,000,000 prescriptions? Why are they not in court? Members of the Sackler family cannot hand over prescriptions, they cannot dispense drugs to people, they can merely distribute to pharmacies. So I do not believe that they are completely innocent, but to go after them and not after the doctors and pharmacies is (as I personally see) immoral. 

Yes, I know that in Torts you go after the money.

So in that setting: “Jeff Bezos, I do believe you owe me $50,000,000 post taxation, pay up please!

But is any of that fair? You might say that fair has nothing to do with it and it is not incorrect but it is wrong. So when Reuters gives us “An agreement involving members of the Sackler family and several state attorneys general could potentially end a legal challenge that has prevented Purdue from exiting bankruptcy, and clear the way for a plan aimed at helping to abate the opioid crisis” my personal thoughts are wondering how many of these state attorney generals went after the doctors and the pharmacies? Justice handed in August 2021 a verdict, ‘Doctor Sentenced To More Than 15 Years In Prison For Conspiring To Distribute Thousands Of Oxycodone Pills Illegally’, there is no way in hell that only ONE doctor did that, so how many are serving 15 years? 

It is U.S. Attorney Audrey Strauss who gives us “Dr. Emmanuel Lambrakis wrote medically unnecessary prescriptions for thousands of oxycodone pills – an addictive and potentially fatal opiate.  Instead of abiding by his oath to ‘do no harm,’ Lambrakis pumped deadly drugs into the community.  Lambrakis put his own greed before his duties as a medical professional, and for that he will now spend a lengthy term in federal prison.” And as stated before, there is no way that there was merely one doctor guilty of that, in addition, there are truckloads of pharmacies that require the same amount of attention and that too is not being done to the degree it had to be done, it is my personal opinion that some state attorneys general’s were lazy and decided to go after the money, go for the easy conviction. Yes, the Sackler family benefitted, but who prescribed? Who handed them over? I see close to nothing on that. It is a simple tax the rich approach to a failing in law and a failing to observe the law and there are clearly a vast amount of doctors and pharmacies more guilty than any of the Sackler family. But we do not get to see that, do we?

As I see it, it started with that first step and the law has a problem, it cannot properly dispense justice to the wrongdoers. It merely went to the richest person and found them guilty. So what happens when it becomes about something more problematic? What happens when someone figures out that any Ponzi scheme can be done online handing the mess to Apple or perhaps Epic systems? So what happens when the hackers find the weakness in something like Nvidia’s GeForce Now service? What happens when 300,000,000 people lose $10-$35 and Epic goes ‘Not my Problem’, and Nvidia goes ‘We know nothing’? Who will end up with that bill of $3,000,000,000-$9,000,000,000 because the people will demand payment and as I see it the Justice departments will be globally clueless on how to proceed. The nice part here is that the court setting makes Apple automatically innocent, they had to open up the system and the people will merely lose their money. 

How a spindled world wide web we weave.

Leave a comment

Filed under Gaming, IT, Law, Media, Politics, Science

Political tools

We all daydream and I am no exception. Yet I believe that my brain is bonkers (probably related to the casing it is in). This all started last week when I saw Official Secret (2019), now I need no encouragement to watch anything with Keira Knightley, so when I saw the name, I picked up the title. I saw it was a spy story based on actual events. It was seeing the film that overwhelmed me. The movie was amazing, one that John Le Carre would have ben proud of if he had written it (it was written by history). It was still in the back of my mind when it crossed tracks with an event that started to play out two weeks ago. A man named Sywert van Lienden had allegedly “send a series of critical tweets to ensnare the Dutch health ministry, the tweets were arranged to create pressure”. From my side (not the most popular one) I believe that the Dutch Health department was foolish on a few levels. In the first Twitter is not a reliable source, so ego driven politicians jumped up fast and they did not do their homework by testing the tweet origins. Trolls have been using that method for years, so I think that Sywert was aggressively creative, some will call him deviously sneaky. Yet the two parts gave me an idea. In the proposed setting of all these honourable military complex vendors. You see, hackers are always the ones copying data FROM servers. Now consider the setting that an ammunition maker has devised a new kind of shell, a .50 shell that works like a drill, it might only in part get through bulletproof glass, but the delay and impact pressure will change the course. So the inner part like a mercury exploding bullet, there are a few items that [secret patent content deleted from story

So here we are, a manufacturer who has the inside track that no one else has. However, the Pentagon is not willing to buy it, because there is no need. So the maker engages with hackers to insert a secret file into the RFARP (Russian Foundation for Advanced Research Projects) server. The department also known as “Фонд перспективных исследований” will be hacked (the makers arranged that via another channel), so the hackers upload a similar but not identical one, it even has a fixed flaw that the makers left untouched. So when the CIA makes enquiry the report is given (a little) praise with the setting that they will incorporate that design in the next batch for testing. Now with the Russian data the maker secures an initial order of 50,000 bullets with a larger order coming if the first order proves its worth (and of course it does). A station where the CIA is ‘used’ as a tool for selling hardware the Americans never really needed. 

Now consider the setting as the hackers overwrite the server with an inserted trojan over a seemingly empty damaged file. Now they are in the clear and it becomes a CIA versus GRU game. The stage of what some think they need whilst the deciding players never correctly did their homework. A setting that could make for an entertaining (thrilling) 97.2 minutes.

Just an idea.

P.S. To any Russian investigator, I have no idea how this story got on my blog. (Nudge nudge wink wink)

Leave a comment

Filed under Media, Military, movies, Politics

The balance of one and zero

I just woke up from the weirdest dream, so take my word on this, this is not about reality, this is entertainment (or the future). The dream was nice and ‘uplifting’ there is nothing not sexy about a dozen women in tight outfits defending a location killing anything in sight. I am sitting in a chair (I think), the women are patrolling the place, there are at least 4-5 women in my room and a lot more outside. But the difference between peace and the other thing is a mere switch. From one moment to another all the women change from tranquil to deadly, waves of attacks start and the women kill whatever comes in view and there is a lot coming their way, yet in the end it does not matter, nearly all are killed, the exercise is over. It was a training, but not one you would see. This was the training of a true AI. You see, AI’s lean differently. They had similar training a child has, but the AI becomes mature a lot faster, a thousand times faster and to teach an AI they get pointers. They literally get data points and point references. This is called aggregated evolution. 

This specific AI is owned by the CIA and the year is 21xx something. 

The evolution happens through what will call an Exabyte drive. The parsing of that data takes a little while and it is done in the background, and the AI takes in every aspect of the training. It makes the AI the dangerous thing it is, and it is truly dangerous. So at this time there are only a few true AI’s, some are economic, some are logistic, some are tactical, some are operational. And only the big players can afford them, a true AI is not some server, it is like making the 1984 comparison between an IBM model 36 mainframe to an IBM PCXT. There are other AI’s, they are not true AI’s, but are a lot similar. They are a lot smaller and they are evolved deeper learning systems. They bring the bacon but only to a degree and the world is in a stage to create stronger AI’s, and as people find cheap ways to evolve their AI, a hacker team is dedicated to finding and hacking streams with data from Exabyte drives. They cannot comprehend the data, but any AI can and the evolution of an AI is worth a lot of money, so as these hackers seek they find the wrong Aggregation file. They find the one that was highly secure, but still someone found a way and got the stream of the CIA and there the problem starts. At some point the wrong one is pushed into a zero (yes, it had to be a sexual reference). But here we get a new lesson, one that as out there, but not the one we envisioned. When you were young, you tried to play with matches and your parents stopped you, just like you were stopped playing with knifes. You were told danger, and evil, bad and dangerous. It was how we learn. An AI does not learn, it does not merely learn the game of chess, it gets handed the history of EVERY chess game ever played. It gets pointers and create the experience, free of morality, free of ‘burden’, so when it gets data it never had it learns in its own way and has no morality baggage, yet what it learns could be anything. The pointers the AI creates evolves it and it makes it worth a lot more. 

So as we turn a page to another time we see a young woman dressed in retro miniskirt (70’s) and tight tank-top, she is looking in a store for a 4K movie, she picks up the Notebook (off course she did) and walks to the counter to pay, but now the stage changes, the operational AI in that mall was fed the CIA drive and recognises the woman, it sees a danger and EVERY system in the mall is now out to kill her and her kind (basically all women overly nicely dressed). The woman has no problems dealing with any attack, the security guards were easily dispersed but it suddenly happens all over the mall, and the security guards and the police accept the alarms that AI’s give them, the AI locks down the mall to protect the people outside but the mall becomes a deathtrap and all the other nice women who have no idea what’s going on are killed almost instantly. Those women who were not alone are suddenly seen as group dangers and women, men and children are executed, the AI never understood foundational stages and disperses as it was taught that a transgressing danger must be killed. And it happens all over the place, not merely in one mall, in any mall that had the same operational AI. 

It becomes over time the dangers that short cuts, hackers and greedy overseers represent, it is not some avoidable setting, when we consider Solarwinds, Microsoft and a few other hacked places, they all gave the goods, but we need to understand that true AI’s have foundational differences. We have seen this in many movies, but did we learn anything? 

You see, we saw periodic tables of what one day might be an AI, we see ‘Knowledge refinement’, we see ‘Relationship learning’ but they are separated entities, and the AI is supposed to operate like this and it does not matter what you think or say, someone will come, someone will be stupid enough to enlarge any AI for a lot of cash and there lies the rub, once we give any true AI the exabyte drive it is out of our hands, we do not get to become ‘caring’ parents, we merely unleash what we have wrought and there is no cautionary tale, because the greed driven will not care. In this the news is already there. Bloomberg gave us a week ago ‘Trained in the American intelligence community, cyber-contractors are now making their expertise available to governments around the world’, and today the Financial Times give us ‘Hackers stole cryptocurrencies from at least 6,000 Coinbase customers’ (at https://www.ft.com/content/43ab875b-2e96-48b7-926d-be17e925f1c3) there we see “by exploiting a flaw in its two-factor authentication system. The news, first reported by Bleeping Computer, comes just a week after the company had to drop its plans to launch a new lending product following the threat of legal action from US securities regulators.” It is followed by a lot of yaba-yaba and with “Coinbase said it had “immediately” fixed the flaw, but it did not reveal when it had discovered the vulnerability or the hacking campaign” we see that whatever it fixed was AFTER the fact and the use of ‘immediately’ indicates that no one was cruising their system trying to find optional defects, so it could happen again. All this whilst there is a debatable situation on the timeline that was out there getting to 6000 clients, so now consider a CTO using hackers to make its system a lot more valuable. 

Are you catching on yet?

Yes, the story I started with was merely the setting for entertainment, a movie or a TV episode, but it is founded on the dangerous premise we see every day, we use servers, we are online and hackers are a danger, yet what happens when we see the adaptation from Bloomberg, who gave us “To meet the surging demand for their services, these firms recruited cyber-operatives and analysts from U.S. intelligence agencies, offering what one former Federal Bureau of Investigations agent described to me as “buy-yourself-a-Ferrari” salaries. For some, their job description evolved from playing defence against hackers to going on the offence, heading attackers off at the pass. Others were assigned to counterterrorism operations, doing for their new clients what they had previously done for their country, and often using the same tools.” These nations evolved their systems with the experts that they could afford. Were they wrong? We seem to forget that US greed allowed for this setting to evolve and everyone wants people with top notch cyber skills. As I see it they did nothing wrong, they merely went where the financial security takes them and when we see the US as bankrupt as it presently is, all those nations get to go on a shopping spree and start a digital brain-drain of the US (and Europe too). 

We are seeing the impact of billion in damage and an almost absent stage of stopping it from happening. Close to a dozen events in this year alone and how long until the damage ends at our desk, the insurance and banks can no longer foot the bill, and that is happening now. We are handed phrases like “Potential future lost profits. Loss of value due to theft of your intellectual property. Betterment: the cost to improve internal technology systems, including any software or security upgrades after a cyber event”, so consider the dangers we saw with solarwinds, at this point there is still debate whether the full extent of that damage is known and it has been more than 6 months. So change back to the AI story I had, when it is an exabyte of data (which is 1,000,000,000 gigabyte), how long until this is parsed? That is before you realise that there is almost no rolling back from that setting, the cost would be?

This is the balance of one and zero, we need a larger change in what people are allowed to do, not because we want to, but because we have to, a change that final needs to pushed to a larger station, and this is not merely against hackers, the greed driven need to be held to account, optionally doing double digits in a holiday location known as Rikers Island. We have entertained ‘fines’ for too long, it only fuelled what needs to be seen as a wave of enriching crime, but that might be merely my point of view on the matter.

Leave a comment

Filed under Finance, IT, Military, Politics, Science