Tag Archives: Kim Jong-un

The Good, the Bad, and North Korea

This article is late in the making. There is the need to be first, but is that enough? At times it is more important to be well informed. So let’s start with the good. The good is that if there is a nuclear blast, North Korea need not worry. The game maker Bethesda made a management simulator called Fallout Shelter. You can, on your mobile device manage a fallout shelter, get the goods of food, energy and water. Manage how the people procreate and who gets to procreate. Fight off invaders and grow the population to 200 people, so with two of these shelters, North Korea has a viable solution to not become extinct. The bad news is that North Korea has almost no smart phones, so there is not a device around to actively grow the surviving community. Yes, this matter, and it is important to you. You see the Dutch had some kind of a media tour around 2012. There were no camera’s allowed, still the images came through, because as the cameras were locked away, the military and the official escorts were seemingly unaware that every journalist had a mobile with the ability to film. The escorting soldier had never seen a smartphone before in his life. So a year later, we get the ‘fake’ news in the Dutch Newspaper (at https://www.volkskrant.nl/buitenland/noord-korea-beweert-smartphone-te-hebben-ontwikkeld-niemand-gelooft-het~a3493503/) that North Korea finished ‘their’ own local smartphones. This is important as it shows just how backwards North Korea is in certain matters.

The quote “Zuid-Koreaanse computerexperts menen dat hun noorderbuur genoeg van software weet om cyberaanvallen uit te voeren, zoals die op banken en overheidswebsites van eerder dit jaar. Maar de ontwikkeling van hardware staat in Noord-Korea nog in de kinderschoenen“, stating: “South Korean computer experts believe that their northern neighbour knows enough of software to instigate cyber-attacks, such as those on banks and Government websites earlier this year. But the development of hardware in North Korea remains in its infancy“. I believe this to be a half truth. I believe that China facilitates to some degree, but it is keeping its market on a short leash. North Korea remains behind on several fronts and that would show in other fields too.

This is how the two different parts unite. You see, even as America had its hydrogen bomb in 1952, it did not get there in easy steps and it had a massive level of support on several fronts as well as the brightest minds that this plane had to offer. The same could be said for Russia at the time. The History channel of all places gives us “Opponents of development of the hydrogen bomb included J. Robert Oppenheimer, one of the fathers of the atomic bomb. He and others argued that little would be accomplished except the speeding up of the arms race, since it was assumed that the Soviets would quickly follow suit. The opponents were correct in their assumptions. The Soviet Union exploded a thermonuclear device the following year and by the late 1970s, seven nations had constructed hydrogen bombs“, so we get two parts here. The fact that the evolution was theoretically set to 7-10 years, the actual device would not come until much later. The other players who had nowhere near the academic and engineering capacity would follow close to 18 years later. That is merely an explosion, something North Korea is claiming to consider. With the quote “North Korea’s Foreign Minister has said the country may test a hydrogen bomb in the Pacific“, we need to realise that the operative word is ‘may‘. Even then there will be a large time lapse coming. Now, I am not trying to lull you into sleep. The fact that North Korea is making these steps is alarming to a much larger scale than most realise. Even if it fails, there is a chance that, because of failed safety standards, a setting that is often alien to North Korea, wherever this radiation is, it can impact the biological environment beyond repair; it is in that frame that Japan is for now likely the only one that needs to be truly worried.

All this still links together. You see, the issue is not firing a long range rocket; it is keeping it on track and aiming it precisely. Just like the thousands of Hamas rockets fired on Israel with a misfiring percentage of 99.92% (roughly), North Korea faces that same part in a much larger setting. You see ABC touched on this in July, but never gave all the goods (at http://www.abc.net.au/news/2017-07-06/north-korea-missile-why-it-is-so-difficult-to-intercept-an-icbm/8684444). Here we see: “The first and most prominent is Terminal High Altitude Area Defence, or THAAD, which the US has deployed in South Korea. THAAD is designed to shoot down ballistic missiles in the terminal phase of flight — that is, as the ballistic missile is re-entering the atmosphere to strike its target. The second relevant system is the Patriot PAC-3, which is designed to provide late terminal phase interception, that is, after the missile has re-entered the atmosphere. It is deployed by US forces operating in the region, as well as Japan.” You see, that is when everything is in a 100% setting, but we forget, North Korea is not there. You see, one of the most basic parts here is shown to undergrads at MIT. Here we see Richard C. Booton Jr. and Simon Ramo, executives at TRW Inc., which would grow and make military boy scouts like Northrop Grumman and the Goodrich Corporation. So these people are in the know and they give us: “Today all major space and military development programs recognize systems engineering to be a principal project task. An example of a recent large space system is the development of the tracking and data relay satellite system (TDRSS) for NASA. The effort (at TRW) involved approximately 250 highly experienced systems engineers. The majority possessed communications systems engineering backgrounds, but the range of expertise included software architecture, mechanical engineering, automatic controls design, and design for such specialized performance characteristics as stated reliability“, that is the name of the game and North Korea lacks the skill, the numbers and the evolved need for shielded electronic guidance. In the oldest days it would have been done with 10 engineers, but as the systems become more complex, and their essential need for accuracy required evolution, all items lacking in North Korea. By the way, I will add the paper at the end, so you can read all by yourself what other component(s) North Korea is currently missing out on. All this is still an issue, because even as we see that there is potentially no danger to the USA and Australia, that safety cannot be given to China and Japan, because even if Japan is hit straight on, it will affect and optionally collapse part of the Chinese economy, because when the Sea of Japan, or the Yellow sea becomes the ‘Glowing Sea’, you better believe that the price of food will go up by 1000% and clean water will be the reason to go to war over. North Korea no matter how stupid they are, they are a threat. When we realise just how many issues North Korea faces, we see that all the testosterone imagery from North Korea is basically sabre rattling and because they have no sabres, they will try to mimic it with can openers. The realisation of all this is hitting you now and as you realise that America is the only player that is an actual threat, we need to see the danger for what it is, it is a David and Goliath game where the US is the big guy and North Korea forgot their sling, so it becomes a one sided upcoming slaughter. It is, as I see it diplomacy in its most dangerously failed stage. North Korea rants on and on and at some point, the US will have no option left but to strike back. So in all this, let’s take one more look, so that you get the idea even better.

I got this photo from a CNN source, so the actual age was unknown, yet look at the background, the sheer antiquity that this desktop system represents. In a place where the President of North Korea should be surrounded by high end technology, we see a system that seems to look like an antiquated Lenovo system, unable to properly play games from the previous gaming generation, and that is their high technology?

So here we see the elements come together. Whether you see Kim Jong-un as a threat, he could be an actual threat to South Korea, Japan, China and Russia. You see, even if everything goes right, there is a larger chance that the missile gets a technology issue and it will prematurely crash, I see that chance at 90%, so even as it was fired at the US, the only ones in true peril are Japan, South Korea, Russia and last China, who only gets the brunt if the trajectory changes by a lot. After which the missile could accidently go off. That is how I see it, whatever hydrogen bomb element they think they have, it requires a lot of luck for North Korea to go off, because they lack the engineering capacity, the skills and the knowhow and that is perhaps even more scary than anything else, because it would change marine biology as well as the aftermath as it all wastes into the Pacific ocean for decades to come. So when you consider the impact that sea life had because of Hiroshima and Nagasaki for the longest time, now consider the aftermath of a bomb hundreds of times more powerful by a megalomaniac who has no regards for safety procedures. That is the actual dangers we face and the only issue is that acting up against him might actually be more dangerous, we are all caught between the bomb and an irradiated place. Not a good time to be living the dream, because it might just turn into a nightmare.

Here is the paper I mentioned earlier: booten-ramo


Leave a comment

Filed under IT, Military, Politics, Science

A Christmas Carroll


This is one of those stories that don’t begin with ‘Once upon a time’; it is nowhere near starting with that. The reality is that such a beginning would make the actual events unreal, it would be like setting the editorial of the Times in the same place as the Broadmoor Criminal Lunatic Asylum as stating that there was no longer a difference. The reality of the matter is actually a little different, you see the reality is “Sanity was dead: to begin with. There is no doubt whatever about that. The register of the loss and funeral of sanity was signed by the clergyman, the clerk, the undertaker, and the chief mourner. The March Hare signed it: and the bunnies name was good upon ’Change, for anything he chose to put his hand to. The Mad Hatter was as dead as a door-nail“.

It is the slightly paraphrased beginning of A Christmas Carol, in this story the lead is played by Donald Trump and Kim Jong-un. Yet at present we cannot tell who is who, so is the bunny Korean, or is that person just mad as a hatter? I cannot tell and I feel certain others cannot tell either. In all this, we might think that the Yanking matter is not crazy or in the sane mindset. We have seen enough from Donald to regard him as a Disney character of another kind. Now plenty of people will regard President Trump to be the sane version, to be the one on the moral high ground. And in regards to any ruling party in North Korea, he certainly is. Yet the event that are unfolding are uncertain, there are ghosts in play, just like Marley was the ghost to reckon with the soul of one close to utter deprivation of goodness, there is a play, it is fuelled in ways that should offend nearly every reader on the planet. News dot com dot au ‘hides’ behind “A FORMER ambassador to South Korea reveals how war could start in North Korea”. They are not alone, so as we hear doom say and nae say we are getting nervous, but the actual issue is subjugated by one word. The use of former gives rise that this person is only up to scrap to some degree, unlikely to the complete degree. So, even as a former ambassador has information to contribute, we need to put a question mark with every statement and the makers of that article did not do that.

One paper made mention of a clever play (by North Korea), others make mention of the time it takes for North Korea to lose. The issue is that as soon as even one nuclear missile makes it to ‘inflight: Warhead activated‘ everyone else loses. Japan and South Korea are the initial worst victims, but the fallout will affect the Pacific Ocean in a few ways. It took decades for the ocean to heal from Hiroshima and Nagasaki. Let’s revisit the response by General Grover in a special Senate hearing. His response was “I am not a doctor. But I will answer it anyway. The radioactive casualty can be of several classes. He can have enough that he will be killed instantly. He can have a smaller amount which will cause him to die rather soon, and as I understand it from the doctors, without undue suffering. In fact, they say it is a very pleasant way to die“. Shall we try that on him? Actually, No! I would not want to try that on anyone. Unless you are at ground zero, vaporised in the moment, you will enter an age of suffering until the moment you die. Over the decades we learned much more and we know that there was ignorance in those days. This time around that ignorance will not be acceptable or be regarded with kind words. After WW2, Japan would grow a new class of people, the Hibakusha, more than 400,000 in fact. They were not illuminated as a result of the events, they were ostracised in Japanese culture, in Japanese life and by themselves.

Another fact often buried in several ways was “Two months after the explosion, the city’s total incidence of miscarriages, abortions, and premature births was 27% as compared with a normal rate of 6%.“, whatever will be fired now will be 1,000%-27,000% stronger than the two bombs on Hiroshima and Nagasaki. So when North Korea fires a live nuke, the devastation might not be one that any mind set in reality will be able to face.

When the bomber Captain Lewis of the Enola Gay was asked regarding his experience, the quote we now get was Well, Mr Edwards, just before 8.15am Tokyo time, Tom Ferribee — a very able bombardier — carefully aimed at his target, which was the Second Imperial Japanese Army headquarters. At 8.15 promptly, the bomb dropped. We turned fast to get out the way of the deadly radiation and bomb effects … Shortly after we turned back to what had happened. And there, in front of our eyes, the city of Hiroshima disappeared“, this was added by “I wrote down later: ‘My God, what have we done?’“. This was a person believing in ending a war, yet not knowing anything sincere about the bomb. Like many others who served in the 80’s, I have seen test firing of actual Atomic bombs (the movie the military made in the pacific) and I saw a replay of some of that in ‘the Day after‘ (1983). Yet, in a cinema, as part of a movie, our mind pushes away the issue of reality, the reality is however even more unsettling than any nightmare on Elm Street.

Now, North Korea has been playing a very dangerous game for slightly too long and we cannot fault the reactions by America, because there is a clear and present danger that stretches a lot further than we can comprehend, but is there a way to stop this?

This is where we see the impact of the lack of sanity, because no way how we characterise Kim Jong-un. The danger is too large. So, even as I refer to the statement from 1500 which gave us “Then they begin to swerve and to stare, and be as brainless as a March hare“, we state “Then he began to swear and stare, and be as brainless as a March hare. Such we see the man that is Jong-un“. In the other view we see “Working each day with mercury-soaked felt turned hat makers crazy“, so as the hatter was mad, we became mad because of the hat, all due to the lack of comprehension of how dangerous Mercury was. Now, we know better and all who know it should never play with the fire of fission.

Now the news escalates with every minute. The UK, Japan, China, the USA. They are all in a phase of planning, presenting statements and seeking advice. Yet the vulgar part is that as long as North Korea has placed nuclear solutions on the table, no one is safe and too much is at stake. In an age of cascading statistics only one fault gets us to watch a house of cards fall over and any card could hit a button under it making the events fire a blaze of radiation onto too large an area. The repercussions cannot be measured or correctly anticipated, because when one fires at least one other will fire. The question will there be two parties firing or will all others fire on the firing party, no matter what happens, the ecology around the events will change for decades, perhaps even forever. The bigger issue is not the USA or North Korea, it is Japan. They went through it once before, the reasons were very different, but the fear of what happened remains with the Japanese people, so when the missile goes live, Japan will face its ultimate fear for the second time and this time they were merely caught in the middle, and as for President Trump? His statement that ‘talks are not the answer’ is not wrong, yet it puts him on near equal footing with Kim Jong-un, one as the March Hare, the other as the Mad Hatter. Yet who is who?

The assignment on the person is not depending on the Tim Burton version of the movie. We need to move back to the age of Lewis Carroll and see why these two characters exist, some show the terms to be much older and it is in that comprehension that we see the wisdom of both characters. More important, when we see the external forces we might see that the actions of North Korea make sense in the most insane of ways. For decades that nation has been cut off from all levels of luxury. All levels of resources and when we consider the Human Rights Watch we saw in 2006 that North Korea was in a stage towards famine and in utter poverty (at https://www.hrw.org/sites/default/files/reports/northkorea0506webwcover.pdf). Al Jazeera gives us in 2014 (at http://www.aljazeera.com/indepth/opinion/2014/03/n-korea-myth-starvation-2014319124439924471.html) no famine, yet a massive inequality. The quote that matters is: “It brings growth, but it also brings a large amount of income inequality and social tensions with it too. In spite of North Korea’s Stalinist rhetoric, North Korea is now a country in which there are rich and poor – and the gap between these two groups, already large, is widening quickly”. I believe that there is still a famine issue, but it is underground, or very much away from prying eyes. When we see that there was an average 800K Tonne of food shortage. Add drought and natural disasters and we see a curve that is not realistic. The question is how large a population died since then, now we get to the good stuff, you need to be insane to comprehend this. I believe that Kim Jong-un is steering towards a failed war; he wants to lose and move towards a luxurious exile, whilst the rest of North Korea collapses and they will all blame America and not their leader.

How wrong am I?

I am on the fence I hope in near equal measure that I am both right and wrong. If I am right, this entire stage we have seen lately was a last sabre rattling exercise, if I am wrong than we have a mad man with the finger on the button ready to die with whomever he can bring along for the ride of his nuclear missile. In this case I desperately want to be right, if only to avoid the idea of the enhanced dangers to the Sea of Japan, Japan and the Pacific Ocean. The simplest of reasons is that our ecology might not survive a megaton blast irradiating water and sea life. It would change our ecology forever and that is actually slightly too scary to me.


Leave a comment

Filed under Military, Politics, Science

Missed it by THAT much?

It started last night. Actually, it started a little earlier, yet I get information from so many sides, that I have to make a choice what I focus on (my final assignment for my master degree being the big number one). So when I initially heard about a missile issue I had no real interest. You see, the things PwC is up to with added narration of missed issues on Tesco, BHS and two others is a lot more interesting to me. Any missile issue tends to be a simple engineering problem. At times it is about other matters, but that is once properly tested a mere 9% of the time, with 91% being engineering or interfacing, which is basically another realm of interfacing. Oh, for the underlying entertainment. I am writing this whilst listening to The Tales of Hoffmann, which is applicable to all this on more than one level.

So back to the Lockheed Trident we go. Let’s start with the BBC (at http://www.bbc.com/news/uk-politics-38719346) with “Theresa May finds herself under pressure for refusing to answer whether she did, or did she not know that something had gone wrong with our nuclear weapons, when she asked MPs to vote to renew the costly Trident system?

So when I see “So the simple “who knew” question will keep being asked. And for as long as the opposition parties keep pushing for clearer responses, ministers will keep looking like they are awkwardly, even shiftily trying to evade a straight question“, I feel that asking the question is a loaded canon to say the least. In this day and age, regarding any issue on nuclear facilitation, do you really want the other players to openly know that UK defence does not work, so Russia and/or China only needs to work about each other and the USA? With pressures at present it is not the best idea to say the least.

My issue is with “A missile test involving Britain’s Trident nuclear deterrent system ended in failure off the coast of Florida last year, a US defense official with direct knowledge of the incident told CNN on Monday“, so not only are US defense officials sanctimonious on the best of days. It seems that they have no problems revealing certain classified events when it concerns their allies.

OK, I can accept that, so how about I reserve a little space at the end and let the public at large know on the storage issues that PRISM is still bringing, not the observation part, but the fact that the storage as it had been one and how the list of people with access was a lot larger than anyone realises. With the New York Times bringing the people on June 6th 2013 ‘U.S. Confirms That It Gathers Online Data Overseas‘ (at http://www.nytimes.com/2013/06/07/us/nsa-verizon-calls.html), but that the quote by Josh Earnest “has been a critical tool in protecting the nation from terror threats as it allows counterterrorism personnel to discover whether known or suspected terrorists have been in contact with other persons who may be engaged in terrorist activities, particularly people located inside the United States.” is missing one important element, which is “it equally allows the better hackers to alert certain people of red flags they can scan for“, which is not something they wanted us to know. I’ll get back to that later.

Let’s focus on those Lockheed cigars named Trident. You see, there is a question why the US spokesperson opened his mouth in the first place. When we consider (at http://www.businessinsider.com/upgraded-trident-ii-missile-being-tested-from-us-nuclear-submarines-2016-9), the quote “This was the 161st successful Trident II launch since design completion in 1989“, now I have no idea how many test launches we have seen, but 161 good strikes sounds like a good deal, so why suddenly this ‘revelation‘? I am all for fair display of facts, including failures, but the air that this one flaw gives give in addition other considerations, so if this US spokesperson thinks that the UK is grateful for him opening his mouth, I think it is time we make sure his bosses make sure he never considers that ever again. This all gets us to the reasoning of that US spokesperson.

Brown University is/was housing a Nina Tannanwald, who had an interesting essay. Titled ‘Renewing a Regime of Nuclear Restraint‘, we get “the non-nuclear weapons states of the world are growing increasingly impatient with the failure of the nuclear weapons states to move toward what are seen as their moral and legal obligations to eliminate their nuclear stockpiles. The humanitarian consequences movement, a globally popular movement barely discussed in the United States, is one reflection of this frustration with the slow pace of nuclear disarmament. A similar tension plays out in the United States, as the Obama administration committed to move towards a world without nuclear weapons while concurrently authorizing a multi-decade, trillion-dollar modernization of American strategic nuclear forces“, there is a truth in this, there is also the realisation that even as most want to move into a non-nuclear era, with Iran and North Korea in the mix, that is a reality that will not come any day soon, if ever. Time has taught us that putting the genie back in the bottle is not an option. If that is not an indication, try to interview Pandora on what happened to hope. Good luck with the answer to that one in this day and age!

Yet when we consider Tannanwald, there is more and more the need to consider Robert McNamara’s presentation to NATO in Athens laying out flexible response doctrine. I think that Robert McNamara is one of those essential Americans that show the American spirit. Serving under both John F. Kennedy and Lyndon Johnson, he has been confronted with the need to alter perspective and a dimensional scope that has been almost unheard of ever since. He is almost the founding father of policy analysis. In addition he is the person who consolidated functions that is amongst others now known as the Defense Intelligence Agency.

So you might think of him as a spooks Yoda, with a flair for pragmatism. Which gets us to the opposition in all this, namely Dr Julian Lewis, who in the Guardian stated yesterday (at https://www.theguardian.com/uk-news/2017/jan/24/commons-watchdog-criticises-unnecessary-surreptitiousness-trident-missile-malfunction) “chairman of parliament’s defence watchdog has criticised the government’s “unnecessary surreptitiousness” over the Trident missile malfunction, as Michael Fallon declined an invitation to appear before his committee“, in this we congratulate Dr. Lewis for his ability to employ a 17 letter word, yet the issue in all this is twofold. the first is that as far as we can tell this is a 1 in 161 cases, making it an outlier that could have been addressed outside of the view of the public, second that the Government had already clarified a need much earlier (which I will point out a little further, with a link off course) that there was a certain need, that need is now directly undermined. Perhaps there is a political need to get something else started and scuttling one solution will open up a set of new problems onto which certain people with interests can throw a lot of money at, they would only need to get rid of 4 submarines. We know that a new HMS Dreadnought is coming, but what is possibly less known is that a refit of the Vanguard Class should start in 2019, which will impact the defense budget because an overhaul of this kind really requires a serious amount of coins. Now, the latter part is speculation, but is it far-fetched? It is 2017, these matters take time, there is no doubt about that, so there is a gap where certain actions have a lot of impact and the misfire is just a lucky break for some people. In all this I could be, and I am probably wrong in all this. Yet when you look at the facts as they are clear, as we know that our cold war opponent has satellites, so they know about the event, calling this into the open only serves another platform. I have no idea which one, but the visibility of these events call a lot into question, especially the actions of a blabbing yank. Now, for some this might actually be one of those democratic losers with no prospect considered ingratiating himself to optional future employers in the media as this person could be democratically replaced by the new party in charge if his function was high enough and the CNN quote “US defense official with direct knowledge of the incident told CNN on Monday” implies that he is higher up the ranks to some degree.

So how does this reflect back to Trident? Well, if we accept that regional tensions are made worse regarding nuclear policies by unstable regimes where the mental balance of the one in charge leaves a lot to be desired (examples: Kim Jong-un and Mahmoud Ahmadinejad, when he was in office) , we should consider that the solution does not work, tension is not eased, it only invigorates that person to consider pressing the famous red button. This comes mainly from the premise of the thought ‘theirs might not work initially‘, which would only instigate a false sense of ego of that person pressing the button. I am going one step further stating that such a person could call in some simpleton cook, asking him ‘Can you press this button? My hand hurts!‘, so that unsavoury character now has the genuine option of remaining in denial.

Even as we consider that 2 out of 161 might not work, the stats are extremely unkind on the chances for the receiving party. Still the issue remains, what was that US spokesperson thinking off when he/she considered speaking on the matter at all was a good idea? Don’t get me wrong, I am not stating that we should be lied to, but there were clear security considerations in play and I wonder if that person was even high enough on the pay scale to make have this consideration, speaking out regarding an allied nation (read: the UK).

My view?

Well, personally, when I look into the error, I am considering that it was not a simple flaw, you see, when the missile is off by a degree, or even less. When it is that small it becomes an issue because that takes time. When the direction is off by a maximum dart score round (180), it tends to be a simple construction flaw, an interface that was not properly checked, basically, the kind of flaw that requires Lockheed (on average) to send the next missile at $0 (and they also have to pay for postage, packaging, gift wrapping and shipping too). Which would be another reason for some people not to speak, unless officially ordered to do so, as it would start an entirely different debate on the Trident Project. So in this light, as we see that 1 out of 161 went wrong, the dust cloud is very much disproportionate to the events as we see them. Even when we see the connected views on Jeremy Corbyn, who has been for the longest times in the light of ‘Jeremy Corbyn says he will put nuclear disarmament at the heart of his leadership re-election campaign‘. which  is what we saw in July 2016, in September 2016 we see: “to put to one side any attempt to reverse Labour’s support for renewing Trident in a bid to reduce tensions with unions and rebel MPs“, yet that ship has sailed, so he can ‘revive’ his lifelong view of being the soul that is anti-Trident. We might see that as a decent view, yet in all that we see evolve is it the correct one? I think that there is no clear answer and this is not on Jeremy, but it all now shows to be a valid political attack, which he cannot be faulted for. Yet how to proceed?

What makes a cigar a cigar?

So this Lockheed device has several elements. I will not some conceded jerk telling you what went wrong. We can speculate that the electronics were wrong, yet what if that is actually not the case? Consider the following sources. the first (at http://www.publications.parliament.uk/pa/cm200506/cmselect/cmdfence/986/98605.htm) gives us at [40]: “‘De-targeting’ and ‘State of Readiness’: The SDR stated that the Trident missiles aboard the Vanguard-class submarines would not be targeted and would normally be at several days ‘notice to fire’. However, the SDR also noted that “we will… ensure that we can restore a higher state of alert should this become necessary at any time”. In the course of our inquiry, we were told that targeting the missiles does not take very long“, in that is it not interesting that an actual metric was not given?

In addition we get “Dr Rebecca Johnson, of the Acronym Institute for Disarmament Diplomacy, argued that both de-targeting and the reduced state of readiness were essentially meaningless since they could be could be easily overridden“, which was in the same paragraph and it gave me the part that is soon to come. You see (at https://www.gov.uk/government/publications/uk-nuclear-deterrence-factsheet/uk-nuclear-deterrence-what-you-need-to-know) we see ‘A minimum and credible deterrent‘, with the quote “we require a fleet of 4 submarines to maintain 1 continuously on patrol and retaining this posture is essential to assure the invulnerability of the deterrent“.

So, this is me speculating, the triviality that we saw regarding the ‘we were told that targeting the missiles does not take very long‘. So what if the targeting could be messed with? In this day and age, is that such a leap? If that is true and if the targeting can be messed with, the issue now becomes that Her Majesty’s Navy now has 4 cigar boxes that could potentially be regarded as useless, making them extremely expensive non-deterrents. Let’s not forget, this is pure speculation, so it becomes only the smallest of options if the missile was not malfunctioning in a normal way.

So how does this reflect on me making some other case earlier and why mention it?

Well, let’s take you through the motions, it will take a few paragraphs. First there is “NSA whistle-blower Edward Snowden has denied he committed treason with his revelations that the US had been hacking Hong Kong and China since 2009. He said his revelations did not disclose military targets – a treasonable act – only civilian infrastructure“, try and focus on the red parts in all this. The next part is “Without asking for public permission, the NSA is running network operations that affect millions of innocent people. In a previous interview with the South China Morning Post, Snowden said he was releasing the information to demonstrate “the hypocrisy of the US government when it claims that it does not target civilian infrastructure, unlike its adversaries“, which gets us part of the first part. The source is the IB Times (at http://www.ibtimes.co.uk/nsa-whistleblower-edward-snowden-479709) and they are only one of several sources.

From that same source we get “Internet companies – including Facebook, Google, Yahoo, Apple and Microsoft – were reported to have given the NSA “direct access” to their servers under a data collection programme called Prism” as well as “US government agency had access to the raw databases of these companies. “They can enter and get results for anything they want [such as] phone numbers, email, user id, cell phone handset id,”” and “Additionally, audits are cursory, incomplete, and easily fooled by fake justifications. At GCHQ, the number of audited queries is only 5% of those performed.” now we need to consider that “He was employed by several outside contractors including his current employer, defence contractor Booz Allen Hamilton“.

Now I make one step back to a statement I made some time ago. You see, there is a part that never rang true, especially as the amount of data he allegedly took with him, yet this data never saw the light of day. In addition, for one person to have this level of clearance and access is something I always questioned! On the 23rd June 2013 I wrote ‘Who are the real watchers?‘ (at https://lawlordtobe.com/2013/06/23/who-are-the-real-watchers/), in there I wrote “his account is broken down and thousands of dollars on internal communications, price agreements, customer’s details and many more details are now duplicated. It would be worth quite a few coins for the right competitor. As such the quiet student will have all his University debts paid off long before he gets his degree. So, what is this about?“, which I bring on January 18th 2014 in ‘Diary for a wimpy President‘ (at https://lawlordtobe.com/2014/01/18/diary-for-a-wimpy-president/) with “The government will no longer store the phone call information of millions of Americans. But he did not say who should maintain the information, instead giving the intelligence community 60 days to come up with options” as well as former Presidents Obama quote “What I did not do is stop these programs wholesale, not only because I felt that they made us more secure, but also because nothing in that initial review, and nothing that I have learned since, indicated that our intelligence community has sought to violate the law or is cavalier about the civil liberties of their fellow citizens“, the point in all this is not just the traitor Edward Snowden, who decided to become the judge, what also happened is that several sides of this went to private contractors, some of them very much greed driven. It is my belief that one event is linked. It was given on October 5th 2016, I wrote about it, but I will not give the link. The Telegraph (at http://www.telegraph.co.uk/news/2016/10/05/nsa-contractor-charged-over-alleged-theft-of-secret-us-governmen/) gives us the parts we need. “Harold Thomas Martin, 51, was secretly arrested by the FBI in August for allegedly stealing classified information. The US Department of Justice says it found Top Secret documents in Mr Martin’s home, vehicle, and two storage sheds on his property in Glenn Burnie, Maryland during a search on August 27th” as well as “Those documents were reportedly “source code” developed by the NSA to hack its adversaries. The codes would allow the NSA to covertly place malware in the computer systems of foreign governments and to monitor or even attack the networks“. Now, the part that comes next remains speculation!

I think that is exactly what has been happening. I think that whatever Harold Thomas Martin did get out before the NSA/FBI could lock down on it. I think that these contractors have been doing their job, but I also believe that someone has been getting access because part two gave access to part one and those people aren’t sworn in executives of agents of any government.  What if we consider when we combine the ‘claimed facts‘ as published, where other parties have been gathering information from selected mobiles, and where users have been interfered with. You see, we all got the messages as seen (at https://www.nytimes.com/2016/12/13/us/politics/russia-hack-election-dnc.html), where we see “At least one computer system belonging to the D.N.C. had been compromised by hackers federal investigators had named “the Dukes,” a cyberespionage team linked to the Russian government“, so even if we question whether this is a Yay or a Nae, the issue is that the DNC is not the gemstone. Yes, most foreign governments want to see in what direction policies are likely to go. Which is why people like Marine Le Pen are getting monitored and not just by the French. You remember the earlier quote “giving the intelligence community 60 days to come up with options“? What if that has been rolled out, don’t you think that both the Russians and the Chinese are a lot more interested in access to those systems (read: that data)? Now we see the dangers that Harold Thomas Martin brought to America, the fact that these intrusion tools are in the open and possibly in Russian hands. We now see that tools can be used against their collection points. They only need to open one port and slowly siphon data away. How much damage do you think that this brings. In addition, and this last part is pure speculation, as those Tridents rely on ‘targeting the missiles does not take very long‘ yet if the specifications come from the outside, can these tools interfere with that? Do not forget that “would normally be at several days ‘notice to fire’” implies that there is a track that the targeting goes through and only the final step is the most secure one. Can we even know how secure those previous steps are? Which tools have been pushed to less controlled civilian hands due to the entire Snowden debacle? What dangers has he placed us all in? We now see via the Wall Street Journal and The Australian that what is now published in 2017, I already covered to some degree in 2013, I was correct to the largest degree all along. We see the quote “According to a unanimous report declassified on December 22 by the house permanent select committee on intelligence, the investigation showed Snowden had “removed” 1.5 million documents“, with added “based on, among other evidence, electronic logs that recorded the selection, copying and moving of files“, another issue I raised due to my knowledge of SE-UNIX. The fact that he had done this over a period of 6 weeks implies that there is a level of what should be regarded criminal negligence concerning Intelligence matters which is truly unsettling. The fact is that this stuff went into the open void, the question was who else got a hold on that stuff? The Wall Street Journal gives one part I never had (due to a lack of specific knowledge). That part is seen in the quote “Since the NSA was created in 1952, Russia and other adversary nations had been trying to penetrate its Level-3 secrets without great success“, he fact that they clearly have access to some degree, both Edward Snowden and Harold Thomas Martin have made that a near certainty.

This now reflects back to the Lockheed devices. Consider that the UK has a different methodology regarding its missiles. If a test was performed through the normal track and if we accept that the Russians have to some degree Level-3 documentation ‘access’, when we also accept that they have a clear understanding on the PRISM system now and we already know that both China and Russia can interfere with data packages (read: transmitted data) whilst in motion, is it really far-fetched that they intervened (read: corrupted) the data meant for the failed Trident test? Let me reiterate, I am not stating they retargeted that missile as there are too many components they do not control, the package just needed to be corrupt to the smallest degree, which would get the missile into a wrong destination and then self-destruct. Now, as stated, this is speculative, yet based on data which after 3 years is now proving to be utterly (read: mostly) correct. Is the speculation that far-fetched? And Russia has every reason to scuttle the UK Vanguard units now before the newer and totally unknown entity HMS Dreadnought comes into play, as stated by other academics in this field that it is  ‘essential to assure the invulnerability of the deterrent‘, when that invulnerability is gone, what remains?

I can tell you that I might not be entirely correct, but I can tell you that based on 3 years of data coming true that my aim is a lot better than the latest Lockheed Trident missile, which was allegedly off by almost 180 degrees.


Leave a comment

Filed under IT, Media, Military, Politics

Slander versus Speculation

There is a lot wrong in this world, we cannot disagree with that. Soon we might see rental prices go down in London, because of Superman (the New Ecstasy), yay to those needing an apartment, being free of drugs was never so nicely rewarded! So is this speculation, or slander?

We could debate my sense in taste (many have for decades), yet in the firm juridical ground, when can speculation be regarded as slander?

That part is more and more a question when we consider the US sanctions against North Korea. Oh, and perhaps we forgot to mention that Sony Is a Japanese firm (even though the crime was on US soil), giving additional spotlights to the reasoning of certain actions. Consider the following sources. First let’s take the BBC (at http://www.bbc.com/news/world-us-canada-30661973). Here we see sanctions against organisations and individuals. First there is “Jang Song Chol: Named by the US Treasury as a Komid representative in Russia and a government official“, then there is “Kim Yong Chol: An official of the North Korean government, according to the US, and a Komid representative in Iran” and last there is “Ryu Jin and Kang Ryong: Komid officials and members of the North Korean government who are operating in Syria, according to the US“. Now the article ends with the most hilarious of all quotes “White House officials told reporters the move was in response to the Sony hack, but the targets of the sanctions were not directly involved“.

So the White House is within this part confessing to the breach where they are targeting innocent civilians (of that crime at least)? Can anyone explain to me how this is anything less than legalised slander? Consider that if (not when, but if) they ever figure out who exactly was responsible for the Sony hack (the actual individuals involved), how the US government could be held responsible in any court of law for this. Consider this part (source was the APA of all places, at http://www.apa.org/about/gr/issues/violence/hate-crimes-faq.pdf). “Current federal law defines hate crimes as any felony or crime of violence that manifests prejudice based on “race, colour, religion, or national origin” (18 U.S.C. §245). Hate crimes can be understood as criminal conduct motivated in whole or in part by a negative opinion or attitude toward a group of persons. Hate crimes involve a specific aspect of the victim’s identity (e.g., race)“. If we clinically look at the facts, then these acts are a hate crime against North Korea.

Now, let’s be fair as well. Most will not care, I reckon that the North Koreans might not even care, but this act does remain a legal transgression!

Let me show you why (because without reason, there is nothing), part one is found in yesterday’s news in the Guardian (at http://www.theguardian.com/technology/2015/jan/02/sony-hackers-may-still-access-computer-systems-the-interview).

Here we see the following parts:

  1. Sony Entertainment is unable to confirm that hackers have been eradicated from its computer systems more than a month after the film studio was hit by a debilitating cyber-attack, a report says

So not only has the hack occurred, it is very possible that the transgression and the damage is currently still ongoing, in addition, one of the most watched and scrutinised nations is still accessing Sony? Not one press agency is asking the questions that matter. For example, there was some visible Press Tour into North Korea (must have been around when Kim Jong-Un was elected big boss in 2011), when we saw some of the filmed events there, we saw North Korean officials in total disbelieve that a smartphone could take photographs and these people walked over Sony’s cyber security?

Now we get to the Chief Executive of Sony himself, his quote gets us the following:

  1. “It took me 24 or 36 hours to fully understand that this was not something we were going to be able to recover from in the next week or two,” Lynton told the Wall Street Journal

So this was not a mere grab for data, this is a system paralyses of sizeable renown, the hack was so complete, high paid executives could not get their minds around the events. So, are we still looking at North Korea? Basically this requires an evolved form of ‘stuxnet’, the hack was seemingly more complete then the stuxnet virus could achieve. We now have only three players left. Russia, China and whatever hacking organisation walks around within the US and its allied nations. How is North Korea anything else but a mere puppet for slander? Whilst some people are possibly hiding their lack of skills, and likely other people linked to all this are trying to cover up issues that have been ignored ever since the first hack of 2011 (the Sony PSN hack). By the way, I am using stuxnet as a comparison, I have zero knowledge how the transgressions was done, but we can all agree it was way beyond a normal level of sophistication.

Yes there is another scenario and I will get to that soon, North Korea is not off the hook yet!

You see we have been looking at the event, but not at the capital involvement that is two tiered at present.

  1. Sony’s network is expected to be fully operational within the next two months but hackers have so far released only a tiny fraction of the 100 terabytes of data they claim to have stolen“, so not only will it take months to repair security measures, the fact that the new fences are there are still no guarantee that the data remains safe.

When gets us to the first tier. Data! Someone streamed 100 Tb, which is more than just a number; it would require every PlayStation 3 on the planet to download up to 2Mb. The fact that this is not monitored, or that is got through to this extent, is a first view that this was no mere trifle event. And even though 100,000 Gigabytes seems small when compared to the PSN issues, it becomes interesting when we consider that the PSN had been hit more than once, but as those members did not all download, where did all this data get syphoned to?

Now we get to the one part that might be regarded as tier two. You see, it is not just the amount taken, which takes a good server park to store, it goes back to issues I discussed in regards to piracy and the parts I mentioned in my blog ‘For our spies only!‘ on September 26th 2014. There I stated “in the end this is NOT about copyright, this is about bandwidth“, the big players all knew it and they were all very concerned if such events would start to get measured and logged. Now someone casually walked away with 100,000 gigabytes of data?

Before I restate, it was not North Korea, let us take a look at another article by the Guardian in that regard. The title is ‘North Korea may have hired outside hackers for Sony attack, says US‘ (at http://www.theguardian.com/world/2014/dec/30/north-korea-hackers-sony-pictures-cyber-attack) and it was written on December 30th. Now we must consider the following: “US investigators believe that North Korea most likely hired hackers from outside the country to help with last month’s cyber-attack against Sony Pictures, an official close to the investigation has said“. The operative word is ‘believe‘, they just do not know. As a speculation that would be my guess as North Korea does not have the skill needed for this, not even close. By the way, those hackers might want to get paid, how will North Korea do that, or perhaps that is beyond US oversight too, because it would be a sizeable amount for something this complete.

The next part is the part that opens the discussion ““The FBI has concluded the government of North Korea is responsible for the theft and destruction of data on the network of Sony Pictures Entertainment,” it said in a statement“. The first question: What evidence?  As stated before, North Korea is lacking in many ways, the fact that they hacked past Sony to this extent, whilst at present no guarantee can be given that the systems are secure at all, whilst North Korea has been watched 24:7 for a long time now gives rise to the demand of evidence showing the guilt of North Korea. So, they are seemingly better than the cyber divisions of both Russia and China? I am not buying it, in addition, the fact that the article implies that outside help was engaged for a hack this thorough leaves us with two thoughts.

  1. If true, where is the real balance of power in cyberspace, because this now implies that North Korea is a real player, even though no one (including people a lot more intelligent than me) have concurred that North Korea does not count when it comes to the internet and cyberspace.
  2. If false, what incompetence is the US hiding from us all and is that not the true crime?

Consider this quote (from the Guardian article too): “Some private security experts have begun to question whether Pyongyang was behind the Sony cyber-attack at all. The consulting firm Taia Global said the results of a linguistic analysis of communications from the suspected hackers suggested they were more likely to come from Russia than North Korea. The cyber security firm Norse said it suspected a Sony insider might have helped launch the attack

I cannot disagree with Taia Global, as this could be Russia hitting back at US sanctions, but that would be speculation on my side, I also very much agree with Norse. Consider that if someone walks into a bank vault and it is empty. There was no sign of break in, the doors were not forced. At this point the police and the FBI will initially look at ‘the insider’ plot. It makes perfect sense. To get past the Sony server parks to this degree someone was giving aid in some way. Initial passwords, the network structure, because if that was not the case there would be a lot more logging evidence to giver clear view whether North Korea was guilty (or not involved).

Mark Rasch hits the nail on the head with this quote ““I think the government acted prematurely in announcing unequivocally that it was North Korea before the investigation was complete,” said Mark Rasch, a former federal cybercrime prosecutor. “There are many theories about who did it and how they did it. The government has to be pursuing all of them.”” there is the crux, the mention of theries on who did it. Even if it is outside help, Russia would still make more sense, the Russian Mafia could be the front for cashing in on selling the data, they pay commission to the people ‘hurt’ through US sanctions, they are looking at the least likely suspect because of a comedy, one that I (and many others) had not even heard of before these events.

It is the last quote that is food for thought from Kevin Mandia of Mandiant “Mandia, who has supervised investigations into some of the world’s biggest cyber-attacks, said the Sony case was unprecedented. “Nobody expected when somebody breaks in to absolutely destroy all your data, or try to anyway, and that’s just something that no one else has seen,” he said

That part is not entirely true, I remember the DBase virus of 1988, I remember some people who had fallen victim to them, a garble parser that does not show until the virus is removed, it leaves your data garbled from that point forward. There was also a data virus in the 80’s. I forgot the specifics, but whilst most viruses would attack ‘.com’ and ‘.exe’ files, this one would attack data files, until that day a truly scary moment. So, it is not entirely unprecedented. Consider, if you copy someone’s data, the best sale is to sell it to the competitors, yet, what happens if the owner no longer has that data, does that not drive up the price? Yet, it is bad tactics, to copy in secret and resell it all makes perfect sense, the fact that these events happened, whilst Sony IT, the Cyber divisions of the FBI and others are not able to track the events is something very novel. It is a first to this degree, do you now understand why it makes no sense to accuse the one nation where we see this as their highlight: “Aug 6, 2013 – North Koreans hungry for tech skills are buying up used desktops on the black market, these desktops smuggled in from China have become a much sought-after item in North Korea“, this is the nation that thwarted one of the biggest cyber power players?

People please wake up. The question becomes what was real? I call my version insightful speculation. I have been involved in IT since the 80’s, this level of hacking requires serious system skills with in depth knowledge of all layer one components (hardware layer), if we ignore the inside job part, this takes North Korea out of the loop, it also removes a massive amount of hackers of the table too. It requires the skills we would require to see from people at the NSA and other high tiered cyber firms. From these facts I come to three options:

  1. The hackers are a new level of hacker with the ability to get past the security of nearly any large firm and government data system.
  2. Sony has been criminally negligent and the US is willing to ‘aid’ this Japanese firm for a price.
  3. A simple inside job (possibly even a disgruntled employee) with links to organised crime.

Please feel free to give me a valid fourth alternative.


1 Comment

Filed under Finance, IT, Law, Media, Military, Politics

When movies fall short

There is nothing as intensely satisfying as when we are confronted with a reality that is a lot more entertaining than a movie would be. Those are moments you live for, that is unless you are a part of Sony and it is your system getting hacked. Life tends to suck just a little at that point.

This is not the latest story to look at, but in light of the elements that have been visibly resolved, it is the best one around. Some will state that the Hostage story in Martin’s Place, Sydney is the big issue, but that is an event that is getting milked for every second possible by the media, I checked! The price of chocolate remains unaffected, so let’s move on to Sony!

The first part is seen in the article ‘Sony hack would have challenged government defences – FBI’ (at http://www.theguardian.com/technology/2014/dec/12/sony-hack-government-defences-fbi), those who think it is new news seem to have forgotten the issues people had in May 2011 (at http://uk.playstation.com/psn/news/articles/detail/item369506/PSN-Qriocity-Service-Update/). “As the result of a criminal cyber-attack on the company’s data centre located in San Diego, California, USA, SNEI shut down the PlayStation Network and Qriocity services on 20 April 2011, in order for the company to undergo an investigation and make enhancements to the overall security of the network infrastructure” 77 million accounts were compromised and the perpetrators got away with a truckload of data.

So when we see the quote “The cyber-attack that crippled Sony Pictures, led to theft of confidential data and leak of movies on the internet would have challenged almost any cyber security measures, the US Federal Bureau of Investigation (FBI) has said“, we should consider the expression once bitten twice shy and not, when bitten use antiseptic, go into denial and let it be done to your network again.

The fact that this revolves around another branch of Sony is just ludicrous, it’s like listening to a prostitute stating that the sick man used the other entrance this time, so we need not worry! If you think that this is an over the top graphical expression, consider that twice in a row that the personal details of millions in the form of data ‘leaked’ to somewhere.

The second quote will not make you feel any safer ““In speaking with Sony and separately, the Mandiant security provider, the malware that was used would have slipped or probably got past 90% of internet defences that are out there today in private industry and [would have] challenged even state government,” Joseph Demarest, assistant director of the FBI’s cyber division told a US Senate hearing“, as we know that governments tend to be sloppy with their technology as they do not have the budgets the bulk of commercial enterprises get, we can look at the quote and regard the statement to be a less serious expression of ‘do we care’, which is nothing compared to the ignored need to keep personal data safe.

You see, commercial enterprises have gotten sloppy. getting newly graduates to look into a system where you need seasoned veterans and you need a knowledge base and a good setup, all factors that seem to be in ‘denial’ with a truckload of companies the size of Sony, as they are all cutting corners so that they can project revenue and contributions in line with the ‘market expectations’.

The quote that becomes interesting is “A link between Gop and North Korea has been muted over Pyongyang’s reaction to the Sony Pictures film The Interview, which depicts an assassination attempt on Kim Jong-un“, so is this group calling itself Guardians of Peace (Gop), the ‘simpleton’ group they are trivialised to be, or is there more. You see, we see a growing abundance of data collections that seem to go nowhere, but is this truly the case? You see, data is money, it is a currency that can be re-used several times, the question becomes, finding someone willing to buy it. If we regard the 2 billion Microsoft paid for Minecraft to be more than just the IP of the sandbox game, then what is it? Which part of that 2 billion is seen as value for the 120 million registered users on PC? Do you now see the currency we are confronted with?

In my book the Sony exercise is a display of the expression ‘a fool and his money are soon parted‘. In light of the 2011 issue, the fact that security was increased to the extent that it could be done again makes for entertainment on a new level, in addition, like a bad infomercial it does not stop here, no! For $9.95 you get so much more then you see now. That we see in the article that was published two days before that (at http://www.theguardian.com/technology/2014/dec/10/fbi-doubts-north-korea-link-sony-pictures-hack). The part that should make you howl like a hyena is seen here “The security firm hired by Sony to investigate the attack, FireEye, described the attack as an “unparalleled and well-planned crime, carried out by an organised group, for which neither SPE nor other companies could have been fully prepared” in a leaked report“, So did you notice ‘unparalleled and well-planned crime‘ and ‘leaked report‘, oh sarcasm, thy name be Miss Snigger Cackle!

The leaked report, which was from the 7th of December (at http://recode.net/2014/12/07/sony-describes-hack-attack-as-unprecedented/) gives us “demanding that organizations which have obtained the leaked information avoid publishing any more material from the hackers, and destroy existing copies. Boies called it “stolen information.”“, you see, the issue here is that if we consider the quote “This attack is unprecedented in nature. The malware was undetectable by industry standard antivirus software and was damaging and unique enough to cause the FBI to release a flash alert to warn other organizations of this critical threat“, so even after the malware, info was still going past the firewall, or was this just ‘leaked’ by an internal source? It takes a little twist when we look at the quote in the December 10th article “The malware had been signed and authorised by Sony Pictures, allowing it to bypass certain security checks“, in my mind this reads as follows: ‘Some idiot gave a pass to malware to roam free on the system‘, so is it that, or was this an internal operation all along? If the second part is true, then who was the beneficiary of all that private data? Who is it means for? You see, many forget that our information is not always for stealing from our credit cards, sometimes it is used to profile us, as a customer, as marketing or as leverage. Why the word leverage? Consider healthcare, consider usage, what happens when an insurance company gets to profile 20 million couch potatoes, what if your healthcare premium suddenly goes up by 15%, do you have any idea how much money that is? So as insurance companies keep the leveraged margins of charge, whilst overcharging risks in addition, we see a growing margin of profit for these insurance companies, whilst getting them to pay for what you are insured for has not gotten any easier has it?

So is this simply a cinematography from Sony Pictures film, called The Interview, which depicts an assassination attempt on Kim Jong-un, or was that the smoke screen? The FBI seems to have ruled out North Korea, as far as I have been able to tell, the only fans of North Korea are the North Koreans and Dennis Rodman (who has no fame in any IT endeavour), so is there enough doubt regarding the reality of what happened and why it happened? Yes, as I see it there is, the question becomes, when there is this much smoke, where are we not looking? That part is to some extent seen in another Guardian Article (at http://www.theguardian.com/film/2014/dec/12/hackers-attack-film-studios-sony-pictures-leak-cybersecurity-warning). We see this quote “Sean Sullivan, senior adviser and researcher at the security company F-Secure, said that he believes the purpose of the Sony hack was extortion. “If it was just hacktivists, they’d have released everything all at once,” he said. “But these releases, it’s like they’re shooting hostages. One thing one day, another the next. This is a really different tactic from what we usually see.”“, this is certainly plausible, but is that it? Why ransom of data and sell it back with the FBI and others on your tail, when you can sell it in Hong Kong, Bangkok, Riyadh and a host of other locations. A simple transaction for an external encrypted drive, a deal you can offer to ALL parties for amount X, the more you offer, the higher X is.

Whilst our data is sold on and on, we run additional risks of getting invoiced for our lives choices and extorted by other financial firms because our privacy is no longer a given in the age of data and it is directly linked to corporations that cannot clean up their act. In the mean time we see leaked report on impossible hack successes, whilst it took only one executive to ‘accidently’ sign and authorise a mere trinket of malware.

So yes, the movies are falling short; reality can be scary and entertaining all at the same time. The question becomes, will there be a change to our invoice of life because of corporate considerations, or lack there off?


1 Comment

Filed under Finance, IT, Law, Media, Science