Tag Archives: Hackers

Playing the 5 tones

That is what is happening g, but how did I get there? Well, I was considering a few things, all at the same time when the idea hit me. We all want to give the ‘complete’ solution. But how to disperse that idea is another matter. So here I was contemplating a few options when I thought that games are the novel and most useful setting and it doesn’t need to be merely one game. What happens when a nation (like the UAE) sets a new station, a station of games and these games might be old, but they are entertaining and considering this also take in heed that these games merely scratch the surface of a mobile processor. So what to do in the meantime? And at that point I remembered the SETI screensaver and that project uses millions of computers to get the data parsed. So what happens when we get a game which in the background checks that computer for viruses and invasions? The UAE Cyber sections might like the idea that their work will be partially done by simple games. The bulk of that 11.6 million people that travel by bus, sit in coffeeshops or do whatever they do when their body are at rest. And in that time when they play a game, the background is used to scan their devices for incursions of a viral nature. It seems like a slam dunk setting for safety, I wonder why no one else had that in mind to keep their citizens safe. Leaving it all to commercial solutions? That is not a bad idea, but there needs to be a reason to do this and perhaps a detector might be enough of a reason to do just that. So whilst Trump is attacking the pope stating “In a lengthy social media post Donald Trump said the pontiff was “terrible for foreign policy” and was damaging the Catholic Church.” I don’t know the pope and even as I was baptized a Catholic, I know less then little about Pope Leonardo da Vici or anything involving the Vatican and still I reckon I likely know more of catholics than President Trump does, especially as he states that the pope was “terrible for foreign policy”, I wonder where he got that idea? I personally think that the last one validly got accused of that transgression was Pope Pius XII for all the right reasons. So whilst we see this, I casually created an optional solution for the UAE (and other nations) to detect that there is a problem. You see, there are those who claim that there is a problem and there are people getting the problem being unaware. This solution will detect that there is a problem and at that point you might want to do something about that (sooner would have been better), but considering that “The United Arab Emirates (UAE) is currently facing a significant surge in cyberattacks, with daily breach attempts tripling to approximately 600,000 as of early 2026” there might be a need to see where they are and what is being hacked. As I see it, this solution might get actual numbers of transgressions in play and then something could be done about it and these games could be distributed on mobiles, tablets, PC, Mac an other devices, but this part can see how deep it goes and it is only about detecting. When something is found the border of the game could turn red, giving the user the idea that he (or she) has a problem.

That took less time than President Trump taking his insults to the Vatican. What next? Well, the idea is here and I reckon it is up to the rest to act on this. It could be something simple like a Puzzle game showing images of Dubai and Abu Dhabi, games using the same images and other games what are easily created, optionally based on a CBM64 classic, requiring no computing power or memory and as they are free the entire audience would love to play them. A simple setting that is easily replicated and gives the notion if there is a problem. Seems like a dine deal the moment my words hit the mind of the reader.

Have a great morning, it’s almost 10:00 here.

Leave a comment

Filed under Finance, Gaming, IT, Science

As evil goes

There is a setting that was inflicted upon us all by books like the bible, it goes like “the idea that humans are the source of their own suffering, whether through their actions, choices, or the inherent negative inclinations they possess” we refer to this like ‘the evil we create’ it is ‘told’ that it revolves around issues of free will and the connected moral responsibility we have. That and last week I went for a job interview. I was told that ‘older’ people are rejected as we lack certain views of adaptation and acceptance of new technologies. In a short saying, that is what my grandfather said when I was wrong until I unplugged his life support, showed him who was boss.

Anyway, something snapped in me and today it is the outcome of short sighted HR people, lazy It people and a dedicated techie who has little to lose, merely the effort that some have and the impact on a lazy business effort with the setting of “Well look at it next quarter” the right combination of issues and impact. And as it goes, places like Ukraine can release such a system on the larger Russian technology setting, so there is that. Although America makes much more likely a target than Moscow, Vladivostok, Saint Petersburg, Arkhangelsk, or Novosibirsk will likely be. 

The setting is that we have two parts. The first part is the automated setting of a standalone laptop with dedicated software that relies on its own (optionally with DML spaces), it is carried around by a drone, one that can hold up to 5Kg, as such a netbook and 3-4 battery packs for longer activities. I reckon that a setup like that would cost around $25,000. Now consider that it goes out looking for wireless enabled servers and in America it would be a lot, In Russia likely a lot less, but not zero. It infects these servers whilst flying around the buildings and in less then 2 minute per servers it does what it needs to do and in one swift control it gets activated, optionally all in one swoop and the location gets a load of DDOS attacks in under an hour. Consider what AWS did to the world, is done by third party players to the business industry. And without effort the business world goes down. So how’s that for an elderly person person without certain views you HR hack. 

As the US governmental settings are in shutdown it will take days to instigate anything and by the time others figure out that they were hacked remotely wirelessly others will destroy the evidence needed and nothing gets done yet again, until the next rounds of hacks come into the wireless connectors. 

So, as evil goes, I am doing quite well. I merely had it with the people deciding on what is possible and leaving me out to dry. Ill soak them all in hardship and terror in an instance. The too is the consequence of unleashed adaptability and considerable creativity. 

So is my idea likely? I am not sure, I think so, but it requires the engineer with effort to program a DML setting and there are other settings, so that they are on the ground hacking via the netbook in a drone so that they become the second hop and that is the unlikely setting, because the hacker needs to remain in an 8 block distance from the drone, not consider that setting that this hacker is drinking and working from a Starbucks at 233 S Wacker Dr, Chicago, or perhaps a coffeeshop in Pershing Square, Los Angeles. How many corporations and servers could be hacked in these 8 block radiuses? That is beside the settings in San Francisco, Houston, Phoenix, SanDiego, Dallas and Austin. Consider that before you write of IT people in their 50’s and 60’s. 

A simple setting and I combined a few simple variables with simple creativity. A setting others cannot dream of and I gave the world a new fear a fear where the world stops because of a simple setting that others (for greed reasons) left around for another quarter. 

That is the setting everyone seems to ignore. The setting that it comes to a halt because these places tend to be out for lunch at 21:00-23:00 hours and that gives the, something to be worried about and with the available IT people working remotely so they can tend to more corporations, that comes down to a grinding halt real quick.

So as such there is evil I can do and the world is not ready for my creativity, as such the HR wench that wrote me off because of age, have a nice day and consider what you unleashed unto the world. Time for me to consider hat else I have wreck havoc on, my creativity is going just fine, so have a great day and consider that the world is about to get more complicated in an instance. And with the police in shutdown to some degree, help might not be coming any day soon and in that same setting you bleed revenue every minute because you left something until the next quarter, which would be on you. 

Have a great day and enjoy the matcha today (apparently prices are currently soaring on that stuff).

Leave a comment

Filed under Finance, IT, Media, Politics, Science

The Gump setting

You remember that famous character? Forest Gump with his ‘stupid is as stupid does’. This is the setting that I saw happening when the BBC (at https://www.bbc.co.uk/news/technology-68025683) alerted us to ‘US regulator admits cyber-security lapse before rogue Bitcoin post’, this is not a lapse, this is a screwup of the umpteenth order. They give us “The Securities and Exchange Commission (SEC) did not have multi-factor authentication (MFA) in place when hackers gained access to the account.” To give a clear view, to give you proportions. MFA was a discussed issue in University when I was at UTS 10 years ago. It was invented in 1996, well over a quarter century ago, although it was called two factor authentication. It is my speculation but I think that they left it aside until the call was needed and that call was clearly needed a decade ago. As such heads at the SEC need to roll (a queen of hearts idea). As such the quote “cyber-security experts say it should be a wake-up call for other agencies” is equally a joke. Those who aren’t ready need to be sanitised on several levels. There is no boo or bah about it. The fact that it took hackers this long to catch on is perhaps a small blessing in disguise. And the quote ““While MFA had previously been enabled on the @SECGov X account, it was disabled by X Support, at the staff’s request, in July 2023 due to issues accessing the account,” the SEC said in a statement.” The setting here is the question whether this was an SEC staff request or an X staff request (it could be read either way), but to remove security for access reasons implies stupidity of an unacceptable level. It means that systems were not ready, protocols were not ready and systems were deployed and configured in unacceptable ways. Then we get “The SEC has confirmed the account was compromised by a fraudster convincing a mobile operator to transfer an SEC employee’s phone number to a new Sim.” As such is it purely the fraudster, or is the mobile operator equally guilty? I honestly cannot tell on these facts, but multiple systems were unable to perform because the human element was not correctly set in stone. At present (based on SLA, or Service Level Agreements) there is a case that the mobile operator did not have the proper hat on because certain facts might not have been known to the mobile operator. The fact that an SEC phone number got swapped leaves the guilty party in the middle, but in this I admit that it is based on missing information. That missing information might show who went wrong (SEC or Mobile operator). And above all a properly placed MFA is intended to protect against this kind of hack (and several others). And lets be clear, this was not a grocery store, this was the SEC that got compromised in this way. 

As such stupid is indeed as stupid does and I reckon the head honchos in charge there will be upturning every process, protocol and service level agreement in place just to keep their jobs somewhat secured. That might be merely my speculative view, but I personally believe that to be the only step left for those yahoo’s.

Enjoy the middle of the week.

Leave a comment

Filed under Finance, IT, Law, Media, Science

Christmas comes early

This came to me in a dream. It seems a nice setup for a story, but I am already dealing with 4. How to assassinate a politician is about 90% complete in my mind. Then Kenos Diastima a series in three seasons which is at 40%, Residuam Vitam the mini series is at 30% and Engonos is I have no idea, but it is still ongoing, season one is about 75%, the rest is less clear. What I got now did not fit anywhere and I do not want to start something else at present, so I am making it public domain. Perhaps it will be useful to someone else at present.

The story is in the first person (it is easier for me that way).

And so it begins
It is a late afternoon, I am working in a data centre owned by Heineken. I am not sue what I am, but I am doing my job. Something about cleaning data. We are suddenly attacked and Heineken is subject to ransomware.

3 hours earlier
In the WebCentre of Heineken people are doing their work, they are editing, they are checking and they are aligning on a global scale. One person is doing something else. He is embedding a small code tabulator, alternate 0255, tabulator, alternate 0255, tabulator. A simple code a mere 5 bytes, but that was all that was needed and it was embedded in several places. Someone higher up would clean the data and that was the purpose. 

You see, the hackers were smart but not the brightest. They had a database, but one that mattered. They had a database with disgruntled employees and several worked at Heineken. This was the setting, the honey was a payday of 50 Bitcoin cents. And two applied for that, the hackers knew that the invasion would get them 150 bitcoins in a week, spending one coin was a wise investment setting. 

So here we are, I am at my desk and I see the Ransomware invade, system after system becomes useless. That was what was intended. As the employees with much higher security settings cleaned out the 5 bits, the system saw that as a call to include a small script, a mere 73 bits and it was included in several places and as these systems started to buckle, people with higher security clearance took up the hammer and they infected even more systems. The operation took less than 25 minutes and in that time everything was smitten with Ransomware. All systems and the log files were getting encryption. All these systems and more were now Ransomed and they had no clue who was behind it. 

Now you want to see some clever way out of this, but there is none. As systems buckle governments are forced to put in place draconian laws whilst cleaning what they can and it is with that stupidity the hackers are subject to prisons and executions and as the dust settles, the hackers go deep underground. They are now regarded a global enemy. In the days when there was surplus people never cared, now as governments will buckle they are ready to hold these people (including children too smart for their own good) to account and it was not going to be a nice stage. Just like these ‘Just Stop Oil’ idiots. 6 months was merely the beginning. When the oil starts being reduced even more, the people will start their vigilante justice, as well the IT people against hackers and their supporters. A cleansing unlike any we have ever seen, the agents of chaos will hurt and suffer for a long time to come. A setting no one wanted, a setting we all denied, but we all saw that there was no other direction and that was when we realised that at times we cannot be nice to the monsters, we have no other choice but to put them out of their misery.

A sad day on this day so close to Christmas.

Enjoy today, have a muffin.

Leave a comment

Filed under IT, Science, Stories

One card to rule them all

This morning I was confronted with an image. The image wasn’t the unsettling part, it was the part that the image did not give. You see, I got my first smart-card in 1991 by Unilever. They already had smart-card security when it was a myth at best. 

Now consider the set-up above. This level of card cloning can now be done by a high schooler. And people think that this level of protection works? How quaint.

So my old noggin started to mull things over, we need to upgrade this stuff by a lot. I know all the people will state that this isn’t needed. But when insurance companies catch on that people are cutting corners the premium goes up by a lot. Now, my idea might not be the best solution, but I leave this to the ACTUAL cyber boys to mull this idea into something workable.

In my view the smart-card has 3 layers, the lowest layer is an RFID shield, this makes scanning the cards really hard, the middle layer is the circuitboard and the top layer is the plastic layer. Now the circuitboard can have 7 nano sims, but only a minimum of two are required. You see, all that cheap corner stuff is done for. The 6 sim locations are connected through printed circuitry, the one part a hacker cannot copy or clone. As such these sims become part of a non-repudiation process. And as they are specifically created for each client, you have 64 options right from the start and when you consider that each nano sim and the circuitry adds a few thousand combinations we can safely say that these hackers stop being a problem.

The centre sim is where specifics are programmed on site (hotel, corporation HR), the other one, or up to 3 other ones are SPECIFIC to that client. Yes, it could all fit ONE sim, but that is where people get into trouble and cyber criminals will have a field day.

You see, what we do is raise the threshold. The image below gives the side I was after. 

The lower part are the wannabe hackers, simple thieves and so on, that is a little over 50% of the lot and they are taken out of the equation completely. They lack the resources to make it work. The yellow are partial threats, these are the high end hackers. They are driven to results and finance, so if the goal is not the required need, it is left alone. That doesn’t make them a non-issue, but unless they have something really interesting to gain, they aren’t interested. The green ones are the remaining threats. People with government access, or serious funds. We have now removed a little over 90% of the threat that was in existence. You think and insurance company having to pay out millions upon millions will try to avoid having to pay at all. We can come with all the usual culprits, but that is not where it is at. Consider that a player like Northrop Grumman needs to keep their IP safe, the first stage is non-repudiation.  That person and that person alone could have done this and a cloned card makes that part near impossible. In the end some will always have access, but when we can remove 90% from the equation, that part matters and it matters a lot. So that is what I was mulling over and this idea came to the top. Perhaps not everyone’s cup of tea, but that is not my concern. I had another idea, number 4 (or 5) this week alone and now I will snore like a sawmill, it is Wednesday here now.

Enjoy the day.

Leave a comment

Filed under Finance, IT, Science

Equational parts

Today might take a moment. You see I was getting ready to write something else when my brain started to shout in my head. The phrase was ‘shifting sands’. I am uncertain what started that, but when the brain shouts, I tend to listen. I had to look it up as it was kinda familiar but the exact meaning wasn’t clear. The dictionary gave me “used in reference to something that is constantly changing, especially unpredictably” that did not completely helped me, yet a thought was getting hold there. You see, I offered part of my IP to the Kingdom of Saudi Arabia. And even as Amazon and Google decided to ignore the option, I saw the IP for what it was, a stage to something larger and the three elements that it did cover was a lot bigger then the sum of the individual parts, as such I thought I was sitting pretty, even  though I am not great at waiting. So as I was contemplating the individual parts, I suddenly realised that there are additional stages that interact. As such we get “used in reference to elements or parts that are constantly changing towards the engine that supports them, predictable or not” and if I am correct (still uncertain) then the IP picks up a few billion in value. Now, at this point I do not completely care about its total value, but the 20 year sales commission will take a leap forward. So let me try to explain it without compromising the IP. You have a game for example Skyrim, this came has locations and this game has clothing. You can see both as cosmetic parts, but when they become elements of the game they change application. For example cold Skyrim relies on warm clothing, we have (almost) never been been exposed to these elements, but what when that changes? What happens when the bad weather picks up? How useful will a bow be? All elements Skyrim ignored, but what if that is not the case? So what happens when you are dressed for Skyrim and you end up in a place like Valenwood? Now, you can see that when you are in a game like Elder Scrolls or Fallout. But what happens when we go into a game like Diablo? Or even more contextual, I saw today that someone is making Impossible Mission 3, a game franchise that flourished on the CBM64, so some people are picking up the ideas I had and they are evolving them. So what happens when we take the simple game below and make the terminals more interactive and more important, what happens when we do not have limited time, but limited access because elements are still unfound? 

Have you thought of that? I reckon Google did not and neither did Amazon, and no one cares what Microsoft thinks, but Apple remains an option. Now take THAT idea and add the game ‘V’. There on the CBM64, we merely ran from place to place and we were content, but what happens when we add the mini game of Impossible Mission to that game (or the other way round)? 

I had some thoughts in that direction in the past, but I never contemplated a larger stage but when the system is accepted by Saudi Arabia the larger stages become debatable and they become elements of discussion. They are not games, but the same setting applies. The shifting sands elements allow me to grow system one with system two and we get a much larger system 3. Systems like Facebook sort of gave it to you, but they basically added to the junk you had and called it novelty or ‘expanded opportunity’, but we could see that it was merely more for THEM. Yet when these systems are (partially) in YOUR control and you get to decide whether you want system two to enlarge system one? We get a form of system individuality, like a system SHOULD have been all along and that is at the back of my mind (without giving the IP away), as such we could optionally see that the application of shifting sands to a user system will make it truly user friendly, now consider that we add security like WE want it to be, whatever it is. Now we have a new setting, well optionally a new setting but these systems are up to US, like they should have been all along. I just never contemplated it because I was thinking like an American as the expression goes and now I see that more is possible, but the application is a new one, and it is not free of challenges. You see, how can we evolve a closed system? It has to be closed as there is too much cybercrime and cyber theft. There is not a way to make it zero, but we can make it so that only the top tier hackers might get away with it. So whomever the 80 people are that the NAB hires (see previous article), they are all about stopping hackers, whilst the access levels were the ones that required scrutiny. Should you doubt that then consider the news that we got merely an hour ago ‘Major crypto trader Wintermute hit by $160 million hack: CEO’, there we are being told “Decentralised finance platforms and software, which aim to provide crypto-based financial services without traditional gatekeepers such as banks, have been targeted by numerous heists in recent years. The sector is little-regulated and victims of crime rarely have recourse” yes, because hackers really take notice of rules and laws and a bank vault that is open is one they can access, and there is a reason that banks use traditional gatekeepers (pointless or not), the larger stage is that open systems are done for (like Microsoft) a new setting is required and that is what I figured out. I am certain that others have too, but the greed of Fintech is stopping them and as such they lose small amounts like $160,000,000 such is life. And as such the world turns, so congrats you hackers on getting enough to pay next year rent, but at some point Fintech will grow up (or they go out of business). It is merely a matter of time which of the two becomes the winner. 

Leave a comment

Filed under Finance, Gaming, IT, Science

S.P.I.D.

Yes, we do love our acronyms. There was SPQR (Senātus Populusque Rōmānus), there is RADAR (Radio Detection and Ranging), there is FUBAR (Fucked Up Beyond All Recognition) and my favourite SPID (Stupid people in defence). The last one gets a new level of non-intelligence when we see the BBC article ‘Nato investigates hacker sale of missile firm data’ (at https://www.bbc.co.uk/news/technology-62672184). The article alerts us to “Nato is assessing the impact of a data breach of classified military documents being sold by a hacker group online. The data includes blueprints of weapons being used by Nato allies in the Ukraine conflict.” And to show you just how stupid this is, lets take a look at ‘What did they not see?’, which I wrote on May 1st 2021. There I wrote “Ransomware gangs are now routinely targeting schools and hospitals. Hackers use malicious software to scramble and steal an organisation’s computer data”, in addition to this we have ‘Exposing lies?’ Which I wrote on July 23rd 2019. There I gave the readers “The FBI send their cyber experts and behold, they too agreed that it was North Korea. Even as we were extremely aware that they had no way of doing it, the FBI stood firm on their findings.” These elements matter. They matter because on July 30th 2021 I wrote ‘In retrospect’ where I gave the readers “It goes back when I designed an intrusion system that stayed one hop away from a router table between two points and to infect one of the routers to duplicate packages from that router on that path, one infection tended to not be enough, 2-3 infections needed to be made so that the traffic on that route between two points could be intercepted, I called it the Hop+1 solution, I came up with it whilst considering the non-Korean Sony hack. That  thought drove me to think of an approach to find the links.

So when we see ‘now’ (8 hours ago) that “The pan-European company, which is headquartered in France, said its information was hacked from a compromised external hard drive, adding that it was cooperating with authorities in Italy, where the data breach took place. It is understood investigations are centred around one of MBDA’s suppliers.” This is important because I learned basic issues like data at rest and data in movement A DECADE AGO, as such, how stupid were these people? And that is before we start digging into the ‘compromised external hard drive’ part, who got it compromised, where was IT, how did SE-Unix fail, or are these people even more stupid and they relied on Microsoft? So whilst we understand “a Nato spokesperson said: “We are assessing claims relating to data allegedly stolen from MBDA. We have no indication that any Nato network has been compromised.”” Yes, because admitting to a faulty network is a bad gig for all around. I reckon that this gets shovelled under any carpet as soon as possible, and the criminals? They get to fill their pockets. A stage that has a few issues from the get go and that is before we start digging into “Cyber criminals, operating on Russian and English forums, are selling 80GB of the stolen data for 15 Bitcoins (approximately £273,000) and claimed to have sold the stash to at least one unknown buyer so far.” There is still the issue whether the claim is true, who was the culprit and where did it all go? There are all kind of questions and that is not on the BBC or their fault. What one person claims is another person’s believe and yet another man’s doubt. But there is a rather large problem, the fact that there was an external hard drive, the fact that it allegedly was compromised implies that there are failing policies in place, there are failing IT divisions in play and there is a large amount of military IP in the open. There is a lack of questions and the fact that it is not front page news in EVERY paper is yet another matter. So when we take notice of “A former Nato official said: “There’s a lot of over-classification in Nato but these labels matter. They are applied by the originator of the information and NATO SECRET is not applied lightly.

“This really is the kind of information Nato doesn’t want out there in the public.”” We seem to see the change of a dance, what direction and which tempo is unknown to me. It gives a speculated view that there might be additional damage, but that is speculated and in light of one compromised device the question becomes how was this one undetected for so long and whatever more could be compromised? So when you take a dab at my hop+1 solution, consider that a compromised device indicates that some people of rank in that place were especially stupid. But that could just be me and I merely wonder how the relationship of mundane workers at place X versus the amount of SPID’s in that place becomes an interesting investigation. Merely because there are a whole range of players who would want that data and they are all willing to pay, so these hackers could end up with 10-50 times what they have now. 

Enjoy the day!

Leave a comment

Filed under IT, Military, Science

Return of Common Cyber Sense

So, is it the return of CCS, is it Son of CCS? With all the 60’s movie references it can go either way, like Son of Blob, Return of the Predator, the Swamp Man strikes again, take your pick. We can go in any direction. And it all starts with the NOS (Dutch News) article of ‘Hackers stole 3 gigabytes of data from Spanish Prime Minister’s phone’ (at https://nos.nl/l/2427306). There we get exposed to “The hackers who used Pegasus spyware to access the phone of Spanish Prime Minister Pedro Sánchez last year were able to extract 3 gigabytes of information from the device. They also managed to penetrate the telephone of the Minister of Defense, although less data was stolen from it. The hack of the Spanish Prime Minister’s phone came to light by chance during a routine check, it turned out today. The government was informed this weekend. The telephones of all cabinet members are now being searched for the espionage software.” As such we now have two settings, the first one is linked to ‘State of what?’ (at https://lawlordtobe.com/2022/04/24/state-of-what/) where some attacked the NSO on Catalan settings. Now we see that two Spanish governmental targets were out in the open, and its Prime Minister was not too intelligent and lacking Common Cyber Sense. 

So in what universe is it a good idea to put 3GB of data on your mobile? I have (by choice) 224MB of data on my phone (over 6 years) and well over 80% are ASCII files (a collection of articles I have written). 

A mobile phone is a transmitter at rest, no matter how much you run, as such it is a trove of information for any hacker with anti-Spanish sentiments. So in what universe should we see “Spanish opposition parties speak of “a very big coincidence” that the burglary into government telephones is just now becoming known. Others speak of a smoke screen. Already two weeks ago it became clear that 63 Catalan politicians and activists had Pegasus on their phones. Among them were members of the European Parliament, Catalan regional presidents, lawyers and political organisations”? Well the answer is none. You see the setting that we are a witness of shows a massive lack of Common Cyber Sense. And in this consider “Pegasus is sent via apps, a WhatsApp message from friends or acquaintances or an email. When the recipient clicks on such a message, the spy program settles in the phone. Secret services have access to all possible data such as passwords, telephone conversations, location or photos” You see, this is a side that might be on me. People like that have a work phone and a private phone. The work phone has no need for WhatsApp, Facebook, or a whole range of other social apps. Having them on your work phone is folly, extremely stupid and massively shortsighted. When you are a governmental tool (of any kind) you need to adhere to Common Cyber Sense. It applies to any Prime Minister, Defense minister, minister and that list goes on for a while. The only exception might be the cultural minister, but then that person tends to not have any classified data, or classified data of a limited stretch. So when we see “The organisation Citizen Lab, which previously revealed that the 63 Catalans were targeted, is drawing no conclusions about who is responsible for the covert operations against the Catalans. “But the circumstances indicate involvement of the Spanish government,” the authors of the report believe.” OK, that is fair, we are all seemingly nodding towards the Spanish team, but it is assumption. And when we have that stage, the lack of Cyber Sense is making it all into a farce. So whoever hacked the Spanish, might through that have gotten access to two teams for the price of $100,000 per phone. A good deal if any. 

So at what time will governmental teams (on a global setting) decide to embrace Common Cyber Sense, with the added realisation that apps like WhatsApp and several other have no business being on your work mobile? 

In this, my message to these politicians is as follows: You are (for the most) not an A-lister, a movie star or a social media revelation. For the most, you are all governmental tools and you need to take responsibility for the stupidity you employ. Keep personal stuff OFF your work phone, give the hackers a challenge, not a trip to easy street, Common Cyber Sense has reason, take it seriously.

Leave a comment

Filed under Law, Politics, Science

That first step

We have all heard it, the first step is admitting you have a problem. There is of course debate on WHAT the problem is. I am not any different. I hate stupidity, hypocorism and bot to mention short sighted issues. One of these issues is ‘Tax the rich’, we see all these stupid people screaming ‘tax the rich’ whilst the system is set, there is a tax system, there are tax laws and instead of all screaming to adjust the tax system we see the empty gesture to tax the rich, the rich do not care, they adhere to tax laws, so these laws will PROTECT them. Another issue was seen in ‘Greed and Law helping each other’, I wrote it on July 9th 2021 (at https://lawlordtobe.com/2021/07/09/greed-and-law-helping-each-other/). There I set out the short sighted setting of the Oxycontin setting. I wrote “Yes, there are culprits in this story. You see some sources give us that in 1996 316,000 prescriptions were dispensed, it grew to an impressive amount topping over 14 million prescriptions with an estimated value of $3,000,000,000. The issue we see everyone painting over is ‘prescriptions dispensed’, this is not something that a person can get, it needs a doctor and it needs a pharmacist.” You see there are laws and rules, and they were massively broken by doctors and pharmacists. So when do they go to court? 

It is Reuters who give us today (at https://www.reuters.com/legal/transactional/sacklers-near-deal-contribute-more-opioid-settlement-purdue-pharma-bankruptcy-2022-01-31/) the story of ‘Sacklers near deal to increase opioid settlement in Purdue bankruptcy’, I personally do not believe that members of the Sackler family who own Purdue Pharma LP were completely innocent, yet that is not the setting is it? SOMEONE handed a paper to dispense Oxycontin, a pharmacist handed over the drugs. Yet nearly all of them banked the money and did not ring the alarm bell (some really did that) and those who cashed in on 14,000,000 prescriptions? Why are they not in court? Members of the Sackler family cannot hand over prescriptions, they cannot dispense drugs to people, they can merely distribute to pharmacies. So I do not believe that they are completely innocent, but to go after them and not after the doctors and pharmacies is (as I personally see) immoral. 

Yes, I know that in Torts you go after the money.

So in that setting: “Jeff Bezos, I do believe you owe me $50,000,000 post taxation, pay up please!

But is any of that fair? You might say that fair has nothing to do with it and it is not incorrect but it is wrong. So when Reuters gives us “An agreement involving members of the Sackler family and several state attorneys general could potentially end a legal challenge that has prevented Purdue from exiting bankruptcy, and clear the way for a plan aimed at helping to abate the opioid crisis” my personal thoughts are wondering how many of these state attorney generals went after the doctors and the pharmacies? Justice handed in August 2021 a verdict, ‘Doctor Sentenced To More Than 15 Years In Prison For Conspiring To Distribute Thousands Of Oxycodone Pills Illegally’, there is no way in hell that only ONE doctor did that, so how many are serving 15 years? 

It is U.S. Attorney Audrey Strauss who gives us “Dr. Emmanuel Lambrakis wrote medically unnecessary prescriptions for thousands of oxycodone pills – an addictive and potentially fatal opiate.  Instead of abiding by his oath to ‘do no harm,’ Lambrakis pumped deadly drugs into the community.  Lambrakis put his own greed before his duties as a medical professional, and for that he will now spend a lengthy term in federal prison.” And as stated before, there is no way that there was merely one doctor guilty of that, in addition, there are truckloads of pharmacies that require the same amount of attention and that too is not being done to the degree it had to be done, it is my personal opinion that some state attorneys general’s were lazy and decided to go after the money, go for the easy conviction. Yes, the Sackler family benefitted, but who prescribed? Who handed them over? I see close to nothing on that. It is a simple tax the rich approach to a failing in law and a failing to observe the law and there are clearly a vast amount of doctors and pharmacies more guilty than any of the Sackler family. But we do not get to see that, do we?

As I see it, it started with that first step and the law has a problem, it cannot properly dispense justice to the wrongdoers. It merely went to the richest person and found them guilty. So what happens when it becomes about something more problematic? What happens when someone figures out that any Ponzi scheme can be done online handing the mess to Apple or perhaps Epic systems? So what happens when the hackers find the weakness in something like Nvidia’s GeForce Now service? What happens when 300,000,000 people lose $10-$35 and Epic goes ‘Not my Problem’, and Nvidia goes ‘We know nothing’? Who will end up with that bill of $3,000,000,000-$9,000,000,000 because the people will demand payment and as I see it the Justice departments will be globally clueless on how to proceed. The nice part here is that the court setting makes Apple automatically innocent, they had to open up the system and the people will merely lose their money. 

How a spindled world wide web we weave.

Leave a comment

Filed under Gaming, IT, Law, Media, Politics, Science

Political tools

We all daydream and I am no exception. Yet I believe that my brain is bonkers (probably related to the casing it is in). This all started last week when I saw Official Secret (2019), now I need no encouragement to watch anything with Keira Knightley, so when I saw the name, I picked up the title. I saw it was a spy story based on actual events. It was seeing the film that overwhelmed me. The movie was amazing, one that John Le Carre would have ben proud of if he had written it (it was written by history). It was still in the back of my mind when it crossed tracks with an event that started to play out two weeks ago. A man named Sywert van Lienden had allegedly “send a series of critical tweets to ensnare the Dutch health ministry, the tweets were arranged to create pressure”. From my side (not the most popular one) I believe that the Dutch Health department was foolish on a few levels. In the first Twitter is not a reliable source, so ego driven politicians jumped up fast and they did not do their homework by testing the tweet origins. Trolls have been using that method for years, so I think that Sywert was aggressively creative, some will call him deviously sneaky. Yet the two parts gave me an idea. In the proposed setting of all these honourable military complex vendors. You see, hackers are always the ones copying data FROM servers. Now consider the setting that an ammunition maker has devised a new kind of shell, a .50 shell that works like a drill, it might only in part get through bulletproof glass, but the delay and impact pressure will change the course. So the inner part like a mercury exploding bullet, there are a few items that [secret patent content deleted from story

So here we are, a manufacturer who has the inside track that no one else has. However, the Pentagon is not willing to buy it, because there is no need. So the maker engages with hackers to insert a secret file into the RFARP (Russian Foundation for Advanced Research Projects) server. The department also known as “Фонд перспективных исследований” will be hacked (the makers arranged that via another channel), so the hackers upload a similar but not identical one, it even has a fixed flaw that the makers left untouched. So when the CIA makes enquiry the report is given (a little) praise with the setting that they will incorporate that design in the next batch for testing. Now with the Russian data the maker secures an initial order of 50,000 bullets with a larger order coming if the first order proves its worth (and of course it does). A station where the CIA is ‘used’ as a tool for selling hardware the Americans never really needed. 

Now consider the setting as the hackers overwrite the server with an inserted trojan over a seemingly empty damaged file. Now they are in the clear and it becomes a CIA versus GRU game. The stage of what some think they need whilst the deciding players never correctly did their homework. A setting that could make for an entertaining (thrilling) 97.2 minutes.

Just an idea.

P.S. To any Russian investigator, I have no idea how this story got on my blog. (Nudge nudge wink wink)

Leave a comment

Filed under Media, Military, movies, Politics