Tag Archives: Hackers

Historic view versus reality

We all seem to have views, it is not wrong, it is not bad it is not evil, it merely is. I saw in 1998-2002 how governments sat on their hands, how lawmakers sat on their hands (and optionally on their mistresses) and they all vocally agreed that hackers were nothing more than a nuisance, and as I see it the traitor Bradley Edward Manning (aka Chelsea Elizabeth Manning) gave up secrets that it was not allowed to reveal and gave it to the world. There is no doubt on guilt, there was no doubt on treason, there merely was the act and that was that, it was the first moment where governments got the first clear hint that hackers were a much larger danger. After that came Julian Assange and Edward Snowden. Julian might be many things, but technically he was not a traitor. Edward Snowden was one, and the law again disregarded the steps that were taken, he went intentionally to a place where he might get the most value out of his deeds, Russia picked him up, just to piss of the US, which they were speculatively allowed to do, yet the stage is rather large, more hackers, all under the guise that the law saw them as a mere nuisance, we all got introduced to ransomware, now we see governments hacked through a sunny breeze (Solarwinds), and the voyage does not end. Now we see less than a day ago ‘Hackers threaten to leak plastic surgery pictures’, as well as ‘National Security Agency warns hackers are forging cloud authentication information’, now I do not care for the plastic surgery part, but it is another case where personal and person inclined data is no longer free, the two elements also give a rather large stage for us to place a new premise. One could now argue that hackers are the clear and present danger to personal and corporate needs and as such they can be hunted down and put t death. So from nuisance to global danger, as such when all these mommies cry that their little boys did not know what they were doing, I have no issues putting a HK model 23 to their foreheads and executing them (optionally with silencer as to not scare the neighbours). 

I think it is time for lawmakers and government administrative types to wake up and smell the situation, and in this, perhaps some remember the words of Martin C. Libicki in Newsweek (2015) where he pushed the view ‘Cyberattacks Are a Nuisance, Not Terrorism’, well that is not really true, is it? When we see the definition of terrorism we see “The unlawful use of violence and intimidation, especially against civilians, in the pursuit of political aims”, there we see two parts up for debate, the fist is that ‘mental violence’ is still violence and the setting of intimidation is already achieved, the stage we still need to address ‘the pursuit of political aims’, not all terrorism is set to political aims, unless if you call self-enrichment the pursuit of political aims. 

And with ‘National Security Agency warns hackers are forging cloud authentication information’ we see an initial stage where commerce will come to a screeching halt. My IP does not cover for that, darn. But there is the old way (1981-1991), just kill them, be done with it. 

Now some (especially in law) will state that I am overreacting, yet am I? It is the lawmakers that could optionally be seen as cowards, hiding behind their golden calf called jurpisprudence. The law, for the most does a good job, it is not perfect, so be it, but for the most, it is OK. This covers the never trespassers and the limited trespassers, they make up for 75% of all people, then there are the criminals, 24.99%, the law takes care of them, they are repeat offenders, career criminals and as such the law was designed to deal with them, then there is the remaining 0.01%, these criminals are in it for the kill, to create a maximum amount of cadavers physically, mentally and financially, to make life for nearly all impossible, and that golden calf, the law cannot deal with them and we accept that, so we remove them in other ways. We hunt them down and put them to death, and when it is some 16 year old claiming he didn’t know what he was doing, we know, he did it to seem cool, he was willing to make all others suffer, just to look cool, to get the tits, to rub the vagina, his friends never could, as such there is a 9mm solution that solves it, if only his parents had raised him right. 

You think I am kidding?
You forget the poverty line is shifting massively because of COVID-19 and soon the insurances will not cover the impact, the media will merely snigger and cash in on all those clicks they got from the $x donation to an unnamed source, and it is now time to make the long overdue change, before governments are pushed to take away more and more of our freedoms, which will push us into the dark-web, a situation these criminals would love. And it is close to 15 years too late, but in this case it is better to be late to the party than not get there at all. 

Am I overreacting?
That would remain a fair question, I do not believe so as this step is well over a decade overdue, it is not something that was pushed to the top in the last few days, and it is partially due to governments and lawmakers not acting when they could have and especially when they should have, now the dike is levied and people are soon to be drowning and something must be done. From my point of view, to hit terrorists, you hit them harder, so the more extreme you hit these hackers, the clearer the message becomes. And a clear message is years overdue.

In this there is a two step setting, there are the “cool wannabe’s” who are mot likely teenagers, some of them are easy to find and after the first examples a lot of them will hide like cockroaches, but the second tier, the one the media and governments intentionally ignore are those in organised crime, they will be the real challenge and as most governments have nothing on stopping them, at best they can limit the damage, which is basically no solution, that gap will take time, but with ‘hackers are forging cloud authentication information’ less than a week old, there is now a chance that the NSA and other intelligence networks will realise that compromised clouds will have global commercial implications, as such governments must now act, the moment any cloud is openly seen compromised, it will be too late for well over a decade. It becomes a clearer situation  when you consider that global e-commerce was set to ‘Global e-Commerce hits $25.6 trillion’, by the United Nations Conference on Trade and Development (UNCTAD), s how much losses must global commerce endure before we act? Oh and if you think that this is the end? How much more powerful will organised crime become if they only get their fingers on 0.1% ($25,600,000,000)? It will become a sliding scale that goes from bad to worse, and governments knew that, they knew for well over a decade, but their delusions saw other non-solution, like perhaps, it will go away on its own, so tell me when was that ever a solution?

1 Comment

Filed under Finance, IT, Law, Media, Military

Games on two levels

The BBC set us in the light of games being played, they are played n two levels, the first one is seen (at https://www.bbc.com/news/technology-53888148) where we see ‘‘Creepy men’ message women on Scrabble Go app’, now in itself it does not raise flags, these things happen, but we see a lot more when we consider “When enabled, players will only receive chat notifications and messages from players they already know and are connected with as a Facebook friend, favourite, or via their synced contacts”, did you pick up on that little part? ‘or via their synced contacts’ is a dangerous step, some people want to play scrabble and not having to deal with the BS, so why did the game not include a mute ALL speech from the very beginning? I will hazard a guess that synching your contacts will be pleasing to the makers of the scrabble game for a few reasons, but that question is not coming from the BBC is it? And “it had also received two about the previous EA app during the first half of 2020” is perhaps a little giveaway. It is all about our contacts. Basic personal security does not see to be the stage gamers are considering when they are offered free games. So even as the BBC ends with “Lisa Forte, from Red Goat Cyber-security, said: “As individuals, we really need to start treating unsolicited online contact with people we don’t know as suspicious until it’s proven otherwise”” and in all this the questions on gathered data is not coning from the BBC, so I am asking it. ‘What data is gathered and who profits?’ It is an essential question, but it is not asked, is it? I see this as a failure to protect consumers and as such there is a failure from government and media to take it into account. The government has a pass. It is not their responsibility to protect people who blatantly install stuff at their own leisure, but in the same side, we see that Apple and Google could be held to account to make sure that NO and I mean NO data is to be gathered via apps in their store, is that the case, or is it not? It is not the app maker that worries me, it is the hacker who uses the app to gather data for their personal needs, that is the larger setting and if the uses would be kind enough to wake up and smell the data they are giving up we might have the start of something sane. Yet the larger issue still plays, the stage of muting ALL from the start would have solved the issue, so why is it not in the app? The story gives out that this is not possible, why is that?

The second level is a little more serious (or so I hope), it is seen in ‘Danish military intelligence head Lars Findsen suspended’ (at https://www.bbc.com/news/world-europe-53889612), well on one side, I was looking for a new job, so I’ll take his, but my Danish is really bad, my Swedish is fine though. But back to the reality, when we see “the Defence Intelligence Service is accused of failing to investigate allegations of espionage in the armed services. It has also been accused of obtaining and passing on information about Danish citizens”, we see the repetition of a two edged sword, the first story implies that the people (including the Danish) have no problem handing over their security and data to any app designer, so when we realise that, what are we doing inspecting the actions of Danish Intelligence? It sounds nice that they have an Intelligence Watchdog, but with data being handed over left, right and centre, the setting is a larger stage and we need to see that we are measuring events to two different standards and we need to wake up because this has been going on for years now and we need to wake up. Oh and by the way, why was Danish Intelligence doing what it was doing? Perhaps it was to keep the Danish people safe (an assumed  speculation), all this whilst I am decently certain that the apps do not have anyones safety in mind, if so the chat would have a mute button from the very beginning, not on the required need to synch contacts. 

 

Leave a comment

Filed under Gaming, IT, Media, Science

In reference to the router

Is this a case of Mythopoeia? Am I the JRR Tolkien of bloggers (I wish) and writer of facts by a non-journalist? It might be. You see, this is all about a mythological theme that is constant as war is, because war never changes! Its concept and construct is as old as the first ‘soldier’ who combined a flint and a stick and started to spear people. In this mindset it is all about the other person, an archaic approach to the issue that does not lie beneath, it’s in front of the person not seeing what is right in front of him/her.

It is also the first evidence that we consider the concept ‘old soldier never die, they simply fade away’ to be no longer a genuine consideration. In this day and age, the old soldier gets his/her references deleted from the database of considerations. We remain with nothing more than an old person that cannot connect or interact, the router won’t let him/her!

This is how it begins, this is about certain events that just occurred, but I will specify this momentarily, you see, it goes back to an issue that Sony remembers rather well they got hacked. It was a long and hard task to get into that place Login=BigBossKazuoHirai; Password=WhereDreamsComeTrue;

Soon thereafter no more firewall, no more routers, just the bliss of cloud servers and data, so much data! The people behind it were clever, and soon it was gone and the blame fell to the one nation that does not even have the bandwidth to get 10% past anything. Yes, North Korea got blamed and got fingered and in all that the FBI and other spokespeople gave the notion that it was North Korea. The people who understand the world of data know better, it was the only player less then least likely to get it done, the knowhow and the infrastructure just isn’t there. I did have a theory on how it was done and I published that on February 8th 2015 (at https://lawlordtobe.com/2015/02/08/the-next-cyber-wave/) in the article called ‘The next cyber wave’. It is only a theory, but it is a lot more reliable and likely than a North Korean incursion because of a movie no one cares about.

The FBI has plenty of achievements (FIFA being the latest one), but within the FBI there is a weakness, not a failing, but a weakness. Because the US has such a niche setup for NSA, CIA and other Intel officers, their offices are for the most still archaic when it come to the digital era. They go to all the events, spend millions on courses and keep up to date, but for the most, these people are following a wave that is one generation old, they follow, they do not lead. The entire Edward Snowden issue is clear evidence. I remain to regard him a joke, not a hacker, so far he is just placed on a pedestal by the press, who have created something unreal and whatever they do not to change it, it will only cut themselves. That is the fall-back of creating an artificial hero who isn’t one.

Yet, this is not about Snowden, he is only an element. Now we get to the concept of paleo-philosophy and how it hits government structures behind IT. This all started yesterday (at http://www.theguardian.com/technology/2015/jun/04/us-government-massive-data-breach-employee-records-security-clearances), where we see ‘OPM hack: China blamed for massive breach of US government data’. Now first of all, if one power can do this, than it is China! France, UK and a few others can do it too, but let’s just assume it is not an ally! Here is where the entire paleo-philosophy comes into play. You see, even though war remained constant, the players changed and for the most, it is no longer about governments. This is all about corporations. Even the movies are catching on, there is no true side to Russia or China as the enemy. Yes, their students might do it to impress their superiors/professors, but that would just be there defining moment. Ethan Hunt is not hunting a nation, it is now hunting conglomerates, large players who remain and require to be zero percent taxable. Those are the actual ream enemies for the UK, the US and China. You see, I am not stating it was not China, I am only questioning the reasoning and other acts. You see, I tried to get an answer from State Secretary John Kerry at +1-202-647-9572, who does not seem to be answering the phone, neither is his right hand man, Jonathan J. Finer at +1-7234 202-647-8633. This is not a secret, the State Department has the PDF with office numbers, locations and phone numbers in an open PDF and you can Google the little sucker! In the age where loads of stuff is open the right person can combine tonnes of data in a moment’s notice.

So can the larger players! The quote in the beginning is the kicker “the impact of a massive data breach involving the agency that handles security clearances and US government employee records“, you see loads of this information is already with intelligence parts and counter parts. I reckon Beijing and Moscow had updated the records within the hour that the next record keeper moved into the office. Yet, now in 2015, as the engine starts up for the presidential elections of 2016, that data is important to plenty of non-governments, that part is not seen anywhere is it?

Then we get “A US law enforcement source told the Reuters news agency on Thursday night that a ‘foreign entity or government’ was believed to be behind the attack“, which is fair enough, so how was the jump made to China? You see, only 5 weeks ago, the Financial Review gave us “US Treasury pressures Tony Abbott to drop ‘Google tax’” (at http://www.afr.com/news/policy/tax/us-treasury-pressures-tony-abbott-to-drop-google-tax-20150428-1mu2sg). So as the Obama administration ‘vowed’ to crackdown on Tax avoidance, they are really not the player who wants to do anything to upset those luscious donators of pieces of currency paper (loads of currency paper), so a mere 6 months later the US, is trying to undo what they promised, whilst still trying to push the TPP papers through the throats of consumers everywhere, what an interesting web we weave!

You see, for the large corporation that list of who has access to papers, and his/her situation is worth gold today, for the Chinese a lot less so. Yet, I am not writing China off as a possible culprit! Let’s face it, they are not North Korea, which means that they do not need to power their router with a Philips 7424 Generator! So at this point, I would tend to agree with Chinese foreign ministry spokesman Hong Lei who branded the accusations “irresponsible and unscientific” at a news briefing on Friday.

Now we get to the quote that is central to the entire paleo-philosophy matters: “DHS is continuing to monitor federal networks for any suspicious activity and is working aggressively with the affected agencies to conduct investigative analysis to assess the extent of this alleged intrusion”, first of all, I am not having a go at the DHS. I have done so in the past with good reason, but this is not that case. I think that in many areas government in not just falling behind, it started to fall behind in 2005 and has been falling behind ever since. Not just them though, organised large corporations like Sony, CVS Health, Valero Energy and Express Scripts Holding are only a few of the corporations that do not even realise the predicament they are in. The Deep Web is not just a place or a community, some of the players there have been organising and have been sharing and evolving that what they know. A massive pool of information, because Data is money, governments know it, corporation know it and THE HACKERS know it too. For them it is all relative easy, they have been living and walking the cloud data with the greatest of ease they can conflict data points and flood certain shared data hosts, only to achieve to get behind the corridor and remain invisible whilst the data is available at their leisure. In that environment the intelligence community is still trying to catch up with the basics (compared to where the hackers are). You see, whilst people in corporations and government are all about politics, those hackers were bout mayhem and anarchy, now they are figuring out that these skills get them a wealthy and luxurious lifestyle and they like the idea of not having a degree whilst owning most of Malibu Drive, a 21st century Point Break, where the funds allow them to party all the time. Corporations got them into that thinking mode. So were the culprits ‘merely’ hackers or was it a foreign government? That is the question I am unable to answer with facts, but to point at China being likely is event less assuring. Consider who gains power with that data? This much data can be up for sale, it can be utilised. In the premise of both, China is not unlikely, but what is ‘more likely than not’ is also a matter, even though that question is less easily answered and without evidence (I have none) any answer should not be regarded as reliable!

Now we get to the quote “Embassy spokesman Zhu Haiquan said China had made great efforts to combat cyberattacks and that tracking such events conducted across borders was difficult” it is correct, it matters and it is to the point. In addition, we must accept that trackers can also be set on the wrong path, it is not easy, but it can be done, both the hackers and China have skills there, as do the NSA and GCHQ. Yet, in all that, with the Sony hack still fresh in memory, who did it, which is the interesting question, but WHY is more interesting. We tend to focus on clearances here, but what else was there? What if the OPM has health details? What is the value of health risk analyses of 4 million people? At $10 a month that is a quick and easy half a billion isn’t it?

You see, the final part is seen here: “DHS is continuing to monitor federal networks for any suspicious activity and is working aggressively with the affected agencies to conduct investigative analysis to assess the extent of this alleged intrusion”, This is to be expected, but the intruders know this too, so how did they get past it all again? That is the issue, I gave in my earlier blog one possible solution, but that could only be done through the inside person, to be clear of that, someone did a similar thing in the cloud, or in the stream of data, in a way that it does not show. Perhaps a mere pressure of data in a shared cloud point is all it took to get past the security. How many data packages are lost? what intel is gained from there, perhaps it is just a pure replication of packages job, there is no proper way to monitor data in transit, not in cloudy conditions, so as we see that more data is ‘breached’ we all must wonder what the data holders, both government and non-government are not ready for. It is the data of you and me that gets ‘sold’ who does it get sold to?

So as we see an article of a data hack and a photo of routers and wiring, which looks geeky and techy, was this in reference to the router? Or perhaps it is in reference to a reality many in charge are not ready to face any day soon, and in light of the upcoming US elections of 2016, some of these politicians definitely do not want to face it before 2017. Like the Google Tax, let the next person fix it!

A preferred political approach that will allow them to lose exclusivity of your data real fast!

 

2 Comments

Filed under Finance, IT, Media, Military, Politics, Science