Tag Archives: MI5

The cornered bully

We all have these moments, when we have to speak out against dopey (the bully in the corner) but the boss we report to is a spineless sack of shit and he will not do anything, more importantly he seems to be heralding the voice of the bully like he has credibility. So there we are, the bully (America), the spineless boss (pretty much most nations in the EU and the Commonwealth) and the people ready to speak out, the IT experts who are muzzled by bosses, because they are afraid to start a fight.

That is the setting that the Guardian introduces us to with ‘Using Huawei in UK 5G networks would be ‘madness’, US says‘ (at https://www.theguardian.com/technology/2020/jan/13/using-huawei-in-uk-5g-networks-would-be-madness-us-says). We have seen it before, the US is now getting more and more afraid of the billions being missed out on and they are going full throttle with the fear mongering. Even as we see “Matt Pottinger, presented an incendiary dossier which they said featured new evidence of the security risks of relying on Huawei technology in future phone networks“, we get introduced to the Gerbil-in-the-groceries Matt Pottinger the new flagship for presenting ‘news’ just like Colin Powell with his Silver briefcase. You see, I am not afraid to face that music, neither are the hundreds of intrusion experts who have been unable to validate the wild fantasies of America, America took the VHS example and is trying to steer the ships of nations and now they are boasting an unwillingness to share intelligence. This is nice, but in the end, the Intelligence from the US is backdated and there is every chance that it is as false as any news they spread. The entire bully network comes to blows when we see “The intense and public lobbying presents an immediate headache for Boris Johnson“, I also do not disregard “having been repeatedly advised by the UK’s security establishment that any security risks can be contained“, this is equally important, because Alex Younger who is the official Big Boss at MI-6 stated that infrastructure this important should not leave British hands, this is not a case of Huawei being a danger, it is a national policy and that is fine, I would even state that this gives the UK and option to buy the Huawei technology, rip it apart, set it under a loop and optionally give BT a chance to become a contender, US firms will jump at that opportunity, to have Huawei technology without the Huawei fear. Let’s face it, Huawei offered that solution to the US last year, but there is a larger concern and for the US it is not really spying, it is the fear where data will end and there are several new players all non-American whilst the American data gatherers are tapped out (financially), so the US is bullying all others to wait hoping that Silicon Valley will come with an American solution that is actually real 5G, all whilst it is not coming and at present all those who delay are losing momentum and twice the amount of time on the 5G path, so any delay up to a year means a 2 year delay and they all know that you are either better (the US is not), you are first (the US can not) or you cheat (the only path the US has at present). 

This all gives us two distinct realities, the first is that for the first time the US is not the first at the top in technology, a shock they have a hard time surpassing and they are not the only 5G company, they are really not ready for real 5G, you see in my past blogs I showed that whatever they call 5G is really not 5G, nowhere near, not at those speeds. The Guardian also gives us “Ahead of the UK decision the head of MI5, Andrew Parker, said over the weekend that he saw “no reason to think” that using Huawei technology should threaten intelligence sharing with the US“, Mr Parker is right, but mainly because the quality of US intelligence is seemingly fading, they are losing sources all over the Middle East and they have too little in the Far East, as such we lose out on a source that is mostly redundant. Mr Parker’s assertion is in opposition to “a senior US official who was part of the delegation, who said: “Congress has made it clear they will want an evaluation of our intelligence sharing.”“, two parts are shown here, the fact that the bullying continue and the fact that this ‘senior US official‘ is left nameless, just like the fact that this matter is on the desk of a deputy national security advisor. In the age where America goes to vote next year, no one wants to burn their fingers and their career on this, and when the truth comes out (and it will) their careers are gone in the international field and the national field no longer has the juicy options it once had. 

When we get to “The officials, who had flown in specially from the US, would not spell out what the “relatively recent information” that they had shared with their UK counterparts was“, it is all a load of HogWash (American expression), you see, If there was any actual danger the US would spread it like a wildfire to EVERY security IT Consultant, but they did not and the news is flat on that. What we do get is ‘Facebook and Google are as much of a threat as Huawei‘ (source: Marketwatch) where we see “Facebook is already undermining the democratic process, including in the U.S. itself, where the platform has facilitated foreign interference in elections.

 

In addition, Facebook has fueled division and fear, and refused to remove hate speech, Holocaust denial and anti-Semitic posts. The platform has been described as a “megaphone for hate” against Muslims, and it is accused of facilitating a genocide against the Rohingya in Myanmar. For these reasons, the British actor and comedian Sacha Baron Cohen recently called Facebook “the greatest propaganda machine in history.”” This is true but it is only he side effect of the matter, the real issue is not there it is seen in “these threats already exist, because Facebook (which also owns Instagram and WhatsApp) and Google (which owns YouTube) have an astonishingly comprehensive range of data about their users — their location, contacts, messages, photos, downloads, searches, preferences, purchases, and much else” It is not the porridge, it is the spoon, the data is everything and as the data no longer merely flow to America, but it will flow to China as well (via aps and so on) in a larger growing slice it will no longer flow to the US, that is the real fear, it will impact all firms relying on data and that is the real ticket and it will have an impact sizing up to billions of dollars every year, it is a larger impact as data becomes the new currency. I will go as far as setting the stage that the IP I had designed will impact it even further for the globally based 400 million small business firms. Even as America sneers at the little guy, they are the foundation of data, not Google and not Facebook, they are merely the facilitators not the creators. That reality is now up for grabs in more than one way. If it was really all about security, the news would have picked up to a much larger degree to ‘Cisco critical bugs: Nexus data center switch software needs patching now‘ with the added text “Cisco has disclosed a dozen bugs affecting its Data Center Network Manager (DCNM) software, including three critical authentication-bypass bugs that expose enterprise customers to remote attacks” (source: ZDNet), this is not the first time, I gave more info months ago when at least one such an issue woke up and whilst all are screaming about 5G security and feigned Chinese values, they all ignore the Elephant in the room (Cisco), I do believe that it was an honest mistake, there was no ill practice at work (from the side of Cisco), but there is a larger concern and those security advisors connected to the Oval office do not seem to care (or optionally merely not comprehend), it is a larger issue that is impacting the Fortune 500, but the press is blind to it. In support there is also ‘A Cisco Router Bug Has Massive Global Implications‘ (source: Wired) with the added information “The devices play a pivotal role at institutions, in other words, including some that deal with hypersensitive information. Now, researchers are disclosing a remote attack that would potentially allow a hacker to take over any 1001-X router and compromise all the data and commands that flow through it. And it only gets worse from there“, which was given to us last May, with the almost complete rundown by researchers from the security firm Red Balloon. And the added information “Once the researchers gain root access, they can bypass the router’s most fundamental security protection. Known as the Trust Anchor, this Cisco security feature has been implemented in almost all of the company’s enterprise devices since 2013“, this is the setting, an impact that is global and the US is keeping it quiet, yet the unproven stage without any real evidence is heralded to the max, which gives the larger implication that this is about data and about the financial security of the US, and why should we pay for that? They were flaccid for years, they refused to innovate and China started to innovate, even as we see in the Guardian article that the kit from Huawei “cheaper and more advanced than rivals“, we see one part, the fact that the US has nothing to counter what Huawei offers is the larger concern (for America), they are 2-3 years behind and that implies that they have nothing to enter the field with until 2025 and become a real contender, at which point Huawei is the new standard and as such data will flow via Huawei and not via American solutions, the data loss for America will be to some degree crippling. their revenue from advertisement, their revenue from data sale and other revenues liked to that are all impacted, it could cost the US 50-150 billion in the foreseeable future and that is where the US fear kicks in, their debt is out of control and that amount would have a much larger impact on the infrastructure that can no longer be paid for, one system after another will fail, a cascade of systems all collapsing because the US has no reserves left, the EU is also out of reserves and they see the 5G part as essential to surpass American firms and most need to contend with spineless politicians and long winded ‘talks’ by the EU gravy train, the are all in it for the money and commercial EU is seeing it all come apart, they can hold on if they get the 5G edge, an option that the US dreads. 

As such the cornered bully is getting more brazen, relying on past tactics that exploded in everyone’s face and they are still doing it, hoping that they can get away with it the second time around, optionally they will rely on other technologies, as long as they are not Chinese, it is not the hardware, it is the data. Ericsson gives us “5G is designed for industrial applications. This means that falling behind on 5G as a platform for innovation will jeopardize the European industrial base. With two global vendors based in Europe, the continent has the prerequisite to lead” (they merely fail to inform us (for valid reasons) that the two players are Ericsson and Nokia, but their solutions are almost two full generations behind Huawei, they would need two years to upgrade and that is what they face, they were all asleep at the wheel and now that the ferryman wants to get paid for all the time they were asleep, they are no longer willing to foot the bill, 4G is almost at a break even point and that is stopping most to go forward, even as they see that 5G is going to take over, they are all afraid that the next iteration of hardware is just beyond the horizon. And they are still setting larger foundations for themselves, because the real cash is the data, not the hardware and that is the stage where they all need to select an optional new provider, the devil you know beats the devil you know not and they want their coins. 

In all this the bully in the corner is getting more and more aggravated and we see that, but they did this to themselves, when I can surpass the US in IP (something I never thought possible) that is the point you need to realise where the US failed, their IP is just not there and they have no real counters other than the Silver Briefcase scenario hoping it will buy them enough time.  You see, when we accept the foundation of one quote: ‘5G Antenna Market was estimated to be US$ 9,835.0 Mn in 2018 and is expected to reach US$ 34,720.1 Mn by 2027 growing at a CAGR of 15.5% over the Forecast Period Owing to the Evolution of Smart Antennas‘, we see what the US is missing out of, the antennas alone are setting the stage of 9-15 billion each year surpassing my estimation of 50 billion value by 2022, yet that is merely the antenna’s, Huawei launched their 5G routers last week and that is where the money becomes a serious setting. When we combine the stage offered “The power of the chipset enables the router to be the first to support commercial application of 4G and 5G dual-modes. It is the first to have the capacity to perform to industry benchmarks of peak 1.65Gbps@100MHz download speeds” with “LTE Advanced has been available for several years now and some carriers (notably AT&T in the US) are calling it 5Ge, or 5G Evolution, even though it is most definitely not an official 5G standard, but rather the latest iteration of 4G” (source: Forbes) you get to see how dire the US situation is for the US, they claim to be 5G and they are not, they claim that Huawei is a danger and they cannot prove that it is, the data is everything and they are at an ever growing risk to lose large chunks of it. Now that Huawei is forced towards their Harmony OS, we will see a growing non US population switching, meaning that the data is no longer going to the US in a readable format. That is the larger loss for the US and they are getting close to desperate. 

In my view, that is the consideration of dumping the brains that they needed and that is the consequence of a flaccid business path, down the track it tends to cost and the US is scared of that moment, hoping to scare all others, we see that the EU is considering their options and as the US loses nation after nation we see  larger stage, when the data surpasses into national hands again, they will not care about US substandard intelligence, most will have their own and a new generation of apps will be adopted by its users on a global scale.

 

Leave a comment

Filed under Finance, IT, Media, Politics

The age of Christmas

I have been on the verge of many things, this, my last blog for a week (I expect) is also a path towards my goals, my delusional goal is to spend time on a really large yacht with half a dozen maiden vixens of 23-27 all roaring to try the lawlordtobe engine (whatever these girls mean with that), the reality of life is that I will be doing a truckload of chores that I left until this very last moment, so not much excitement there. 

For the blog, the end of the year tends to be a shallow ground for news, yet there was the Khashoggi convictions in Saudi Arabia, an event that the Guardian labelled ‘‘Mockery of justice’ after Saudis convict eight over Khashoggi killing‘, we all seem upset by “crown prince’s inner circle of involvement in murder of dissident journalist“. Yet the reality is that there was never any evidence, in some cases I have a few question marks with the evidence that Turkey gave, the UN Essay by Agnes Callamard read (for me) like a joke and in the end, we just do not know what happened, so it seems that the Saudi Courts, just like most other courts can only convict a person on evidence and that person needs to be sentenced when a person is found guilty beyond all reasonable doubt and that was never ever going to be the case. Consider hat the Guardian (at https://www.theguardian.com/world/2019/dec/23/saudi-arabia-accused-of-mockery-of-justice-over-jamal-khashoggi-trial) gives us “The findings contradict the conclusion of the CIA and other western intelligence agencies that Prince Mohammed directly ordered Khashoggi’s assassination“, yet the UN Essay states the CIA, yet no evidence is added, merely their point of view and ‘high reliability‘, which in light of their weapons of mass destruction claim is not that reliable. As for the claim ‘and other western intelligence agencies‘ is also a bit weird as I saw no mention of MI-5, MI-6, DGSE, or GCHQ, so what was it? Merely FBI and CIA? That is basically one source as such I rejected the UN Essay for what it was, a joke (to the largest degree)!

Yet, that is as good a the news is going to get, other actual (and factual) great news is that Robert Downey Junior is back in the news, and now not as an Avenger, talking to animals or another role, no this is a series that you can watch on Youtube premium, it is called the Age of A.I.. Now, the weird feeling is there, RDJ playing RDJ and being serious about it is part of the appeal, the other part is that this is not a sales rap, it is explanation and the series via RDJ does that swimmingly (read: pretty brilliantly). 

I need to be careful, because I do not want any spoilers here, apart from the fact that the series is well beyond informative, it shows the A.I. world as it is (well kinda), we see examples most have never seen before, these examples are often not sexy enough for glamour shows, but they are great as the underlying example in this system. If there is one small part that is criticism than it is the use of AI when (as far as I personally saw was no more than deeper learning) yet for the learning part that does not matter, the person watching it gets a much better grasp on AI and this series shines as such. The fact that really outshines the entire series is not RDJ, he is there but often enough we see celebrities that are a lot more than the media exposes (Will.I.Am for example), people in the movie making and we learn that some movie celebrities behind the screen are seemingly merely doing it to fund their real dream and we get to see a truckload of that, especially the truckload of examples the media thought to keep from us. That education is worth a lot more than you are grasping when you see it and you can see it (at https://www.youtube.com/watch?v=UwsrzCVZAb8), and the series bring out an interesting fear “This is new, we need to know what is real and what is not“, this is an interesting issue, it is almost never discussed, but it is within us all. And as RDJ narrates we take a trip all over the world visiting the places that are involved in the evolution of NAI (Near Artificial Intelligence) and we get the proper approach towards machine learning, I was pretty blown away after episode one and there are several more to go through, The age of A.I. is a homerun, a bullseye in a world of gratification small enhancements and publications. In the movie world RDJ has had its large shares of successes, the fact that he is part of a documentary like this will make him only a larger success and as such he will push this series to greater heights (the fact that you can watch episode one for free on Youtube does not hurt either), Matt Damon eat your heart out. 

As I personally see it, the Age of A.I. is the first series on A.I. that is actually informative to a much larger degree (than many of the other series). It is such a pleasant surprise to be confronted with a series like The Age of A.I. at the end of the year. I personally feel like a whole new person, for me this series was that much actual fun to watch. 

I hope to see and inform you all again in about a week, have a great holiday series.

 

Leave a comment

Filed under IT, Science

When we are merely given a paragraph

It happens, we get offered a paragraph and for some reason we wake up, we think: ‘That’s nice! Tell me more!‘ It can be for the strangest and least connected reasons out there. No matter that the push or the reason, we only get that one paragraph and are left hanging. That feeling came right off the bat when ABC gave me ‘ASIO warns of ‘hostile intelligence services’ using social media in annual report‘ (at https://www.abc.net.au/news/2019-10-17/asio-warns-of-hostile-intelligence-services-on-social-media/11609726) a day ago. Now, let’s be fair, ASIO is not really the one to play games of open communication, as its employees and governing staff were educated by the people of Sneaky, Peeping and Backstabbing incorporated, they have other markers to work with. As such as I was fed ““hostile intelligence services” using social media to target people across business and government“, which basically is a continuation (to some degree) of the quote we saw at ABC in July 2017 when we were given “help Australian security agencies get access to encrypted messages from suspected terrorists and other criminals“, in itself not an issue one would think, and there is exactly the problem, one did not think. I made references to private chat groups in Social media and extremism before 2016, just nice to know that someone gets around and wakes up every now and then. Or as I would phrase it as ‘What else is new?‘, Yet as Jade MacMillan takes us by the hand in this ABC article, we see: “A report in the New York Times earlier this year claimed China was using LinkedIn to try to recruit foreign spies“, again we go with the ‘What else is new?‘. There is nothing new under the sun as MI-6, CIA, DGSE and optionally ASIS have been using that very same tool to get information. The honey traps, the enticement parties and the stage where you are a winner, the tricks are as old as the very first sign stating: ‘Authorised Personally Only‘. In this the larger issue is avoided, you see financial entrepreneurs have been using these paths to gain information on how to find people with debts and some of them have (allegedly) been reporting those people to international whisper divisions, so that a deal could be struck. So whilst some look for foreign agents, they all ignore the debt collectors mining every bit of social media to gain a momentary advantage to collect on one debt and gain another bonus, and those people will always look for investors, especially investors that have a fluidic opinion of ethics and how to be working towards rewards.

It all comes across as silly and as mindless as “Attorney-General George Brandis said encryption was potentially the “greatest degradation of intelligence and law enforcement capability” in a lifetime“, he could not put gamers in a proper dimensional view, so why would he get this right? It is an easy enough question and there is a link. There was a reason why Facebook suspended and ended all group chat options (there were a few actually), they were off course way late, now that Lone wolves and others have found new means to get this started, they need to be more careful, but the state remains. Mining is the only way to do this and you need resources for that, as well as proper staff who comprehend data and not let some silly deep learning algorithm fix it. For example, consider that a facilitator created an auto fill chat system; it has 250,000 lines an hour, whilst the system has one anchor word, a word you can select. So as we see the chat go through, we make no sense on it, yet the users have set the word ‘الدراجين’ (meaning ‘riders’) even as the initial part makes no sense

WE now get:

يتيح للجميع وقتا طيبا والحزب

الهذيان الكبير في واحة في منتصف الليل

جميع الدراجين سباق اليوم

معلومات السباق في اللعبة

تسجيل جميع الدراجين بعد صلاة الفجر

يجب أن المؤمنين اقتبس مرور البقر

جميع الدراجين يعرفون أن السيارة مائة مؤهلة

 

Even in this setting the programming cannot make sense, and unless you knew that ‘riders’ was the operative word good luck in finding what comes next. a system like this has been in place for years, now there are dedicated programs, yet in the past there were 4-6 in a group of 100, so those 4 guest gamers would not be noticed and by the time someone woke up, it was already too late, the meeting was over and more secure conversations had taken place, this system worked global and now that Facebook chat groups are a thing of the past other means are used for all kinds of groups to find a way to pass a message along.

We get it, the employees of Sneaky, Peeping and Backstabbing incorporated are not supposed to put it in the open, yet the annual report seemingly ignores one part. Instead of having a dozen systems creating a small solution, we need to find the agencies actually working together to avert “ASIO has limited scope to redirect internal resources to address the increasing gap between demand for our counterespionage and foreign interference advice and our ability to furnish this assistance” and partially find a solution that will take care of the extremists, the organised crackpots and the corporate facilitators, if you do not consider the third group to be important, then you have remained asleep for far too long at the wheel.

So when I mentioned Brandis (never the sharpest tool in my personal opinion) we might consider the 2017 event and the quote: “If the laws are passed and technology companies comply, they could help with investigations into paedophile networks, major organised crime or terrorism”, the man is transparent as glass as he hid in the past behind ‘violent gamers’ and now he uses ‘paedophile networks’. Yet the larger issue not seen here are financial services, there is no oversight and there is no telling what an approached debt collector could find out without setting of ANY red flags. And that is with the players who are on the up and up and playing a proper game taking all the proper guidelines and consumer protection laws as noticed and complied with, this wild west group has a truckload of groups all willing to do what it takes to get the score and a foreign player is a stakeholder in finding needs. That group has been able to remain off the books for at least 2 years. They all seemingly forgot that places like Experian, Equifax, Dun & Bradstreet, have their own customer base and who checked out those credentials?

Yes, we can agree that the entire matter is too large for ASIO to deal with, but there is also the flaw that the scope of what they face is not dimensionalised in the proper fashion, it is openly misrepresented and that is optionally acceptable, as long as they know what they face in-house.

And it is not a rocket science deal; the FBI, MI5, BRGE, AIVD, MAD (yes that is the acronym for the German Intelligence Services) and the FSB all deal with these issues. OK, these players will not be calling the FSB but you get the idea. There are players that are about data and proper intelligence mining (Palantir Technologies), yet the field needs to widen but in another direction. If this is Business Intelligence then Palantir is SAS, whilst we need a more IBM statistics and IBM Modeller based solution rolled out, we do not need a solution that fits all, we need to feed clusters of investigators with power tools that allow them to surf data and mine activities to a much larger degree. We need to set server milestones with collected raw data that different clusters can attack. The intelligence branches have wanted to do it the wrong way around for too long (often pressured by wannabe politicians), what we need is a treasure trove of data that all players can have a go at and actually report findings. We create almost 3 Exabyte of data every day, and we need to find 1% of 1% in that, whilst all this happens before 5G, it is about to become 20 times worse and they cannot even handle what is out there now.

All whilst we know that the 1% of 1% remains a group of 98% which is merely misdemeanours playing around, as such we need to change the premise towards collected data, that is what we face at present so the entire matter of “greater awareness among our stakeholders of that threat — has increased demand for our advice and support”, which is misrepresentation in its own right. The stakeholders have their own needs and their own game to play. Consider the IP needs of Telstra (Australia), the Inside protection and mandates of Novartis (Pharmaceuticals), Insider trading on HSBC (Banking) and their needs are their financial protection needs and in this fearless leader Duncan Lewis (ASIO) has to optionally look out for the needs of Telstra (as some claim that hat Telstra needs, Australia needs) whilst hunting those wanting to harm Australians, in this the Stakeholders are more about the revenue and debatable a source of good (they allegedly merely want their bonus safe), as such we should optionally wonder about the needs of the stakeholders and the difference about their claim and their needs.

So whilst we see another batch of mobile swipe and pay solutions being rolled out whilst there are a few concerns on how that data is processed all over the world, we forget that those out to harm national needs are also out looking into all those apps and finding out that for the largest extent the IMEI number of any smartphone is a much easier anchor to work with and mapping the usage also gives a larger content on data and where the target might be, yet most forgot about how the old is still beneath the new, did they not? So even as we consider the title ‘ASIO warns of ‘hostile intelligence services’ using social media in annual report‘, we need to consider that ‘hostile intelligence services‘ is merely part of a much larger problem and that those services use all kinds of methods that the local knights of the round facilitating table (FBI, MI5, BRGE, AIVD, and MAD) are still not looking at (as far as I can tell).

In all this we were merely given a paragraph and whilst people wonder how to find resources, the matter on how to properly apply those resources so that they can have an impact was left off the table, and that was actually the delicious cream that should have graced the Strawberries, or are those Blackberries? I’ll let you work on that little last line conundrum yourself this weekend.

So have a nice day and let’s not forget that the weekend ends in 48 hours! #JustSaying

 

Leave a comment

Filed under IT, Media, Military, Politics, Science

Living with choices made

We do that at times, we also endure the bitter fruits that we gained from choices. I made some myself, in two cases I trusted the wrong person and it costed me dearly, an invoice payable over decades. I get that, it was my choice, I was an adult and therefor I accept to live with the choice made. It is partially the reason I go out and expose bullshit artists’ because of the dangers that they represent, as well as their friends who knowingly stand by them. So when I saw ‘UK will not put officials at risk to rescue Isis Britons, says minister‘, the article (at https://www.theguardian.com/uk-news/2019/feb/14/uk-isis-britons-officials-risk-syria-schoolgirl-shamima-begum) gives us “I’m not putting at risk British people’s lives to go looking for terrorists or former terrorists in a failed state,” I personally believe that this makes perfect sense. Some might have a bleeding heart when they see: “it was revealed Shamima Begum, one of three pupils from Bethnal Green, east London, who left to join Isis four years ago, told the Times she wanted to return to the UK“, yet there is no way to tell how radicalised she has become. In addition, even as we accept that “Wallace said that as a British citizen, Begum had a right to return home, but anyone who joined Isis should expect to be investigated, interviewed and “at the very least prosecuted” on their return“, we also need to accept that would need to be under scrutiny for some time to come, she is optionally a direct threat to the Britons around her and as such her return also means putting pressure on the budgets of GCHQ and MI5, so there is that to consider. Now, I am not stating that is a reason to keep her out, yet when people state that they are so adult, so well informed and go to places like ISIS Syria, getting married to a Muslim she did not know, have three children with two of them dead is the lifestyle she chose. In addition there is another matter that I had not considered. Even if she is not radicalised, Sir Peter Fahy (former chief constable of Greater Manchester police) gives us: “The biggest challenge if she did come back will be how the police will keep her safe and how she wouldn’t be some sort of lightning rod for both Islamic and far-right extremists“, as an optional catalyst she becomes a new threat on other levels too, as stated, that was something I had not considered and it is important to see that as a matter that could lead its own life. In all the papers and media events we focussed on radicalisation and we forgot that the threat of being a catalyst is actually a larger issue to consider.

And the news is now pouring in from all sides regarding Amira Abase, Shamima Begum and Kadiza Sultana. As all focus on Begum, we know that Kadiza Sultana is dead, the other two were alive in August 2018, and the present status of Amira Abase will be looked at in the near future. My reasons for having the position that I am showing to have is that all need to be held accountable for their actions, not merely governments and large corporations, individuals as well. So when we see “Aqsa Mahmood, a former Scottish university student, has been put under international sanctions for her role as an online recruiter, with other female jihadists including Khadijah Dare and Sally-Anne Jones have called for terror attacks on social media and called on other women to follow them to Syria” (source: the Independent), we need to realise that a governments job is to keep its citizens safe, with the danger of radicalisation and being a catalyst becoming too large a danger, there is everything to be said to leave these people to their fate, so they either become a danger or they die. It seems a simple equation. Yet, we know it is not. The move by more and more Muslim girls (and women) from the UK, Belgium and the Netherlands to step onto the ISIS platform is a given stage for dangers, more than we see at first light. You might think of Robert Ben Lobban Wallace being a softy, think again, he is Sandhurst trained, and a Scots Guard commander with 24 years of intelligence experience. He knows what he is in for and he is more aware of most on the dangers that former ISIS women present. That needs to be taken into consideration before we give rise to: ‘Let Shamima Begum come back, say Bethnal Green residents‘ (the Guardian), ‘British schoolgirl who fled London to join IS pleads to come home to have her baby‘ (News.com.au) and ‘UK schoolgirl Shamima Begum who fled to join Islamic State ‘wants to return home to England’‘ (ABC). you see, the moment she is back and some misguided catalyst event explodes (optionally very literally), we will get all the accusations and all the pointing fingers of a failed police force, yet from my point of view, the people of Bethnal Green will not be allowed to complain. It will be the direct consequence of ‘let her come back‘ and the family members of those victims can ask those people for reparations and grief counselling. So as we see the impact of Shamima Begum (19) mother of three with optionally only one child left alive is seeing the impact of what she thought would be a fairy tale in ISIS. The people who stayed awake have been aware of the danger that ISIS is more than half a decade before she left, she merely listened to the wrong people and it got her family and optionally soon enough her killed. That is the impact of terrorism.

ABC News also gives us: “Independent of this, Home Secretary Sajid Javid is expected to weigh in on whether Ms Begum should have the right to return to the UK, along with intelligence agencies MI5 and MI6 and counterterrorism police, who are anticipated to conduct further investigations into potential dangers Ms Begum could pose to the UK“, the issue is not merely that, the words of Sir Peter Fahy are important too, it is not merely what she does, it is what triggers others to do because of her that counts too and that is where the problem begins. This is not merely come algorithm, it is the dimensional impact that others will trigger at her presence, merely via news, or by seeing her. The part that is not about whether she was ISIS, but the part where others see her as a member of ISIS until she is dead, that is the larger issue and there is no way to set that stage in a dependable way. It is like fishing for sharks in the North Sea. You can go to places where they are most likely to be found, yet throwing out bait and a fishing line does not give rise to catching a shark, you could end up with another fish entirely.

It is in that light that I oppose the view of Amina Mohamed, 52, a housewife, who gave us in the guardian: “She was a baby, she didn’t know what was going on there. People played a game with her and brainwashed her. She was a child“, she made a very clear choice, she decided not to listen to her parents, and it is actually that simple. I do not have much on the parents of Shamima Begum, yet the Evening Standard gave us: ‘after deceiving their parents‘, so in all that, it seems to me that a choice was made and as such, they will have to live with the consequences that they created at the age of 15.

The BBC (at https://www.bbc.com/news/uk-47240100) if the sides in all this as even as there are sides that give rise to the responsibility of the British government, the question that we cannot answer is how radicalised has she become? The fact that we see: “She and two friends – Amira Abase and Kadiza Sultana – flew from Gatwick Airport to Turkey after lying to their parents about their plans for the day. Their aim was to join another friend, Sharmeena Begum“, there is a part that is seemingly ignored by a few people. Not only did was she able to get to Turkey (so they had passports and they tend to take a while, and apart from the fact that an unsupervised minor got one), the fact that the BBC gives us: “The trio were picked up by smugglers working for the IS group and taken across the border into the group’s territory in northern Syria” that there was a logistical support system in place that set the stage for minors to get to Syria from Turkey, the costs that is involved (three times £175 plus additional expenses), the fact that Gatwick raised no questions on unaccompanied minors, the smugglers they willingly followed (so waiting at the airport), there is a larger support system in place for this. There was a recruitment drive and there is a financial stage in all this. There are clear reasons that no one on the ISIS side wants her to be able to talk to MI5, so the issue is not that clear and it is a lot more hazardous for those around any of the optional two still alive that make it back to the UK, so from where I stand, I see that Sir Peter Fahy is correct in several ways.

Investigating these elements should be high on the priority list and they might be, yet the coverage I have seen so far does not ask any of those questions, do they?

I do realise that the entire matter is more complex that this, yet the fact that dissemination of information is lacking levels of scrutiny is a larger issue that needs to be addressed. To see this, we need to consider to parts, first a local one. In Australia Jenny McAllister has voted very strongly against more scrutiny of intelligence services & police on several occasions. Now, that is her right and partially it is her duty to vote one way or the other. Then there is the Financial Times two weeks ago who gave us: ‘Foreign Office criticised over scrutiny of UK spy agencies‘ (at https://www.ft.com/content/4a1cc4e6-2619-11e9-b329-c7e6ceb5ffdf) and we see: “The two agencies use section seven of the 1994 Intelligence Services Act, often referred to as the “James Bond clause”, to authorise activities overseas that might otherwise lead to criminal and civil liability under UK law“, yet in the same trend we see a lack of questions when it can be established that 15 year old girls are recruited in the UK, there is a logistical support system to get them to Syria and the media seems to remain oblivious to a much larger degree (it is the people need not know approach) to something much more pressing in all that. I must have forgotten the lessons on common law regarding the recruitment of children for criminal purpose, how did that go again?

So when I see: “Such missions could include MI6 agents breaking into properties in foreign countries to obtain documents or GCHQ infiltrating computers and networks in ways that might otherwise fall foul of UK laws“, which is a larger implication when a 19 year old is having her third child and it raises no questions, especially as the marriage might be seen as illegal?

At that point my question towards Dan Dolan, deputy director at Reprieve, who is so about doing the right ‘thing’, will be about: What should we do? How far are we allowed to go to prevent recruitment and radicalisation of minors straight out of primary school? How far are we allowed to go to keep British children safe? I think that plenty of intelligence operators lost the plot in the Huawei events (which the Financial Times endorses with a photograph), yet when it comes to threats like ISIS the intelligence industry hasn’t even seen the outer limits lights at present, I am not entirely sure if they are able to tell the colour of those lights when asked. the larger issue is that the intelligence operators are not merely walking a tightrope, they are walking one that is covered in razor blades and at any time there is not merely the risk that it cuts into the feet, it is also a risk that it cuts the rope they are walking on, giving rise to additional hazards, Shamima Begum is merely one of several risks at present and it is important to realise that a Queensberry Rules approach is not merely making us human and humane, it is getting us killed with 99% certainty, the opposition does not warrant, endorse of accepts any kind of rules. I do hope that the recruitment of 15 year old girls will suffice as evidence at present.

 

Leave a comment

Filed under Media, Military, Politics

MI5 to the rescue?

That is what one might think when we read the Guardian. The article: ‘MI5 to take over in fight against rise of UK rightwing extremism‘. The article (at https://www.theguardian.com/uk-news/2018/oct/28/mi5-lead-battle-against-uk-rightwing-extremists-police-action) gives us: “It comes amid growing global fears of the threat posed by far-right terrorists. In the US in recent days a man was charged with sending 13 pipe bombs to opponents of Donald Trump, including Barack Obama and Hillary Clinton“. It all makes sense, let’s be clear about this. When we look at the MI5 site we get: “The role of MI5, as defined in the Security Service Act 1989, is “the protection of national security and in particular its protection against threats such as terrorism, espionage and sabotage, the activities of agents of foreign powers, and from actions intended to overthrow or undermine parliamentary democracy by political, industrial or violent means”“. This all makes sense, and their mission statement is at (https://www.mi5.gov.uk/what-we-do). The Guardian also gives us: “Four extreme rightwing alleged plots have been thwarted in the UK since March 2017, compared to 13 Islamist plots. But with around 100 investigations into the extreme rightwing currently live, the threat is assessed as growing“, so one would think that a big shout out is due to all the boys and girls at MI5. Yet, it is not that simple. You see when we see the Concise Oxford Dictionary of Politics giving us: ‘the political right opposes socialism and social democracy. Right-wing parties include conservatives, Christian democrats, classical liberals, nationalists and on the far-right; racists and fascists‘. My issue is not with MI5 or with their mission statement. My issue is with the setting that there is a grey area that lies between ‘Right-wing parties include conservatives, Christian democrats, classical liberals, nationalists‘ and ‘racists and fascists‘. You see, that borderline is getting more and more blurry. It is perhaps a lot more visible in the US where the Washington Post gave us earlier this month: ‘States can’t punish businesses for boycotting Israel, federal judge in Arizona says‘, when corporations will be allowed racism through ‘freedom of speech‘. So when we see: “In his personal life, he avoids companies he considers complicit in Israel’s occupation of the Palestinian territories. His aim had been to extend his boycott to his one-person law office — for instance, refusing to purchase from Hewlett-Packard because its information technology services are used at Israeli checkpoints in the West Bank“, now we get the setting that companies are getting punished for selling to the Israeli government. When we see this change, we see the opening of a lot more options for both bias and optionally racism, merely as it undermines his First Amendment rights. I understand that there is a touchy legal setting here, yet when we transfer this to the European side of things, it changes the game by a lot. Even when we consider “The ACLU challenged the legislation in both cases. Its success in protecting boycott activity in the courts is notable, as a bipartisan group of lawmakers pushes for federal legislation penalizing cooperation with boycotts sponsored by international governmental organizations. Even after modifications made by the bill’s Senate sponsors — Benjamin L. Cardin (D-Md.) and Rob Portman (R-Ohio) — the civil-liberties group argues that the measure would be unconstitutional“, we see a setting where MI5 has a much larger issue to deal with.

Part of that is seen in a paper by the Anti-Defamation League. They give us a top 10 of anti-Israel groups. Here we need to notice Al-Awda, perhaps the largest Palestinian-American grassroots organization. We are informed on: “While Al-Awda champions itself as a Palestinian rights group that advocates for “right of return,” its core ideology is predicated on the notion that Israel’s existence is illegitimate, Zionism is racism and resistance against Israel is justified. Many of Al-Awda’s supporters readily express support for terrorist groups, including waving Hamas and Hezbollah flags at anti-Israel rallies and posting messages to Al-Awda’s listserves demanding violent resistance against Israel” and they seem to be growing. Their Yahoo groups in Sweden and London are implied to be on the rise, they are gaining steam in the US (to what degree is unknown and I was not able to find more data), yet in all settings Universities seem to be the growth foundation going all the way to Sydney Australia; so there is momentum and all this is not merely done through individuals. It is my personal belief that this wave is gaining momentum, partially due to focussed ideology, which is not a crime mind you, but those people become facilitators to a lot more and there is our number two issue. MI5 is now confronted with a lot more work, merely because they have to look into these people and first ascertain whether they are merely ideologists who seek ‘a fair playing ground‘ for those who do not have it, whilst enabling extremism to a degree that they did not intend to give. The entire anti-Israel is perhaps the strongest visible example, yet when we recollect the entire ‘Hezbollah flags fly once again at London’s Quds Day march‘, we see clear evidence that I am right. So when we got treated 5 months ago to: ‘Police: We can’t stop people flying Hezbollah flags on London march‘, we accept that it is a legal part, yet the facilitation in all this is clear, it is given and it is continuing and there lies the issue for MI5. How can they act against the extreme right, whilst the buffer zone between the right and extreme right is large enough to give a protective shield to Hezbollah recruitment drives? So when we recollect the words of Metropolitan Police Commander Jane Conners where she stated: “Purely holding a flag does not necessarily incite religious or racial hatred. It is the words or actions of the person holding the flag that can cause incitement“, I personally respectfully decline to agree with that part, even as she academically is not wrong, she is absolutely incorrect with the given statement.

And it does not stop there, the entire Anti Saudi Arabia setting is evolving as well, it is not merely evolving as an Anti-Saudi-Arabia, it is in part driven as Pro-Iranian, you know the people funding terrorist organisations like Hezbollah (firing missiles from Yemen into Saudi Arabia), a part the media is steering clear from for a few reasons. That too counts as a problem, as it intensifies the complications for the security services. Technically a person is allowed to be as pro-Iranian as they feel like, especially former Iranians building a new life. Yet in all this the plot does not thicken, it merely gets larger. It is seen a few hours ago when Ahmad Dastmalchian, the former Iranian ambassador to Lebanon states: “Hezbollah is an “effective actor” in the Middle East region“, the statement is more intelligent than you might think, as it is actually giving Hezbollah the cloak of facilitation, the mantle of enabling and the shroud of enacting, all settings that Hezbollah is staged in, via and through the acts of Iran and their activities in the UK are growing.

The next part is speculative (some might say highly speculative), yet I believe that CNN when they gave us (at https://edition.cnn.com/2018/08/17/uk/uk-anti-semitism-intl/index.html) 10 weeks ago the setting of: ‘Anti-Semitism is so bad in Britain that some Jews are planning to leave‘, I absolutely (as a conservative) disagree with the accusations that Jeremy Corbyn is anti-Semitic. He is also not anti-Semantic and that is where the issue lies. As he is trying to be more pro-Palestinian (or perhaps refuses to be anti-Palestinian, which is not the same) he actually enables anti-Semitic activities (not intentionally) and that is where the shoe becomes too tight for MI5. As we have a field so polarised, finding where the danger lies becomes a much harder mission and as such finding out the truth without revealing your hand is close to impossible. So when CNN gives us “Two people have previously been imprisoned for threatening to murder him for being Jewish, Lewis said. Now, he said, he’s reached the stage where he’s “almost being desensitized to the threats” — from both right and left — such is their regularity“, I am personally left in the understanding that many actions have been enabled by other actions, which is part of the nightmare setting for MI5. The second one is not merely a stage of miscommunications, it is almost hilarious when (using an example) hear that the market researcher who hated polls was offered membership in UKIP, which by the way is, merely my sense of humour acting up. It is a much larger problem. You see, the Independent gives us (at https://www.independent.co.uk/news/uk/crime/tommy-robinson-court-case-live-updates-trial-latest-edl-jail-sentence-old-bailey-contempt-free-a8596981.html) the stage where: “Tommy Robinson has walked free from court again after his contempt case was referred to the Attorney General“. If we see this in its execution, we might see the stage of ‘the Court of Appeal ruled that procedural failings had “given rise to unfairness”‘, yet is that the true setting, or is there support in the legal weeds for right winged groups? That question comes to mind when we see the Guardian revelation ‘Tommy Robinson could make more than £1m from a potential trip to the US next month, making him one of the best funded far-right figures‘ a mere 2 days ago. To see this much support and funding, places clearly places corporations in the line of shielding against acts against some of the far right players and that is where MI5 is about to fall short. If corporations are part of this, there is absolutely no doubt in my mind that some MP’s will make demands and ask open questions in the House of Commons that should not be asked. Not because they are wrong to ask, but because they hinder and optionally invalidate the MI5 process of investigation. You merely have to ask how often such questions of hindrance was given in support of the IRA in the last three decades to give consideration that there is polarisation in the UK, giving a larger question mark whether the rise of rightwing extremism can we stopped, or merely slowed down a little.

You merely have to consider the ‘wisdom’ given in Operation Petticoat, a movie (and absolute classic) from 1959. The quote “In confusion there is profit” is very apt to this situation. Nothing entices miscommunication like a polarised political field. The UK with their pro-Iranian and Pro-Saudi think tanks are partial proof of that and there is nothing that loads a field like enticing politicians to seek the limelight with a cause that can be twisted six ways form Sunday, even as the politicians are not doing anything wrong or shady, that part was clearly seen with the entire Jeremy Corbyn thing and it is not close from over, because that part can be seen when we dig into the EDL and their ant-Islam agenda’s. The Guardian gives part of that (at https://www.theguardian.com/world/2018/oct/25/tommy-robinson-and-the-far-rights-new-playbook), yet I believe that it goes beyond what the Guardian has (and I have absolutely no evidence either). It is my personal belief that their quote: “The Fox News presenter Tucker Carlson covered Yaxley-Lennon’s story extensively on his show; Donald Trump Jr, the president’s son, tweeted his support, while the US ambassador for international religious freedom reportedly lobbied the UK on Yaxley-Lennon’s behalf. The UK Independence party is debating offering Yaxley-Lennon membership, while Stephen Bannon, the former Trump adviser and co-founder of Breitbart, has described him as “the fucking backbone” of his country and proposed including him in a new far-right venture, a pan-European network called The Movement“. I think that those people (like Tucker Carlson, Donald Trump Jr and Stephen Bannon) come with corporate cloud. The ‘£1m from a potential trip to the US next month’ is merely the frothing on the icing of the cake. the actual financial support could go a hell of a lot faster, even as Stephen Yaxley-Lennon might not get a penny, $2 to $3 million in Google Ads funding (which is 100% tax deductible) goes a long way covering the UK in text and display ads for a year on keywords from ‘immigration‘ to ‘financial support‘, whilst blanketing a whole range of websites with some ‘the EDL is there for you‘ slogans. That is the stage and that is what MI5 faces on the short term. By the time MI5 has a handle on things, we see that the message is already getting spread by parties where they have no influence and the MP’s will not be willing to hand them any favours. That is the reality of the show we are about to see.

It is not the ‘contempt of court‘ failure we need to fear it is the optional ‘contempt of others through advertisements’ that becomes the worry and these people are clever enough to phrase it as to not upset any filters, they will have the know-how and experience at their back and call for that.

We can in the near future consider that it sucked to be Andrew Parker in 2018-2019, oh K?

 

Leave a comment

Filed under Finance, IT, Law, Media, Military, Politics

When inability drives fear

It is a dangerous place to be in. We all have been there and in most cases it is as innocent as it could ever be. You see, sometimes life throws you a curveball. Gamers tend to identify it most easily. In my particular case it was a game called Magic Carpet. It was a Bullfrog game and I was testing it on the PC. It played magnificently there, and soon thereafter I also tested it on the very first PlayStation. There, because of the controller it was good, but not great. Still, it was fun to play and I tended (in those early years) to really get into a game, so when the situation blew into my face, I got a little frustrated. The next two times were worse and the last time (on that day) I went slightly angry (with myself) and I kicked the door. The issue was not the door, it was my steel tipped boot and I went straight through the door, so, I was not merely ticked off, I had a hole in the door (which would require funds to repair) and the boss in Magic Carpet was still alive. We all have had these moments. Our car, our bike, the TV, things go wobbly on you and we sometimes react wrongly to this situation and in light of that get to reflect on our own ego’s a little.

These are the images going through me when I was confronted to new information when looking at the unrealistic response by America (and Australia) to Huawei. In the case of Australia it seemed the mere application of greed and fear as politicians cater to the greed of a large telecom company, which was not seemingly the case with America. Yet that tip was raised for me less than 24 hours ago. The article (at https://foreignpolicy.com/2018/08/15/botched-cia-communications-system-helped-blow-cover-chinese-agents-intelligence/), shows how the CIA got their own systems handed to them through ego and what I would regard as stupidity. The initial headline ‘The number of informants executed in the debacle is higher than initially thought‘ is rather unsettling. It gets to be worse with “The CIA had imported the system from its Middle East operations, where the online environment was considerably less hazardous, and apparently underestimated China’s ability to penetrate it. “The attitude was that we’ve got this, we’re untouchable,” said one of the officials who, like the others, declined to be named discussing sensitive information. The former official described the attitude of those in the agency who worked on China at the time as “invincible.” Other factors played a role as well, including China’s alleged recruitment of former CIA officer Jerry Chun Shing Lee around the same time.” This is the most dangerous of settings. The wrongful setting comes straight from Sun Tsu where we learn that all war is based on deception. China is not some place that is tinkering at the side of the road, the Art of War COMES FROM CHINA! It gets to be worse when you consider that that book was written long before Americans had adopted proper reading and writing skills, close to 1200 years before that, so that was their first error.

When we see: “But the penetration of the communication system seems to account for the speed and accuracy with which Chinese authorities moved against the CIA’s China-based assets. “You could tell the Chinese weren’t guessing. The Ministry of State Security [which handles both foreign intelligence and domestic security] were always pulling in the right people,” one of the officials said. “When things started going bad, they went bad fast.”“. The entire matter seems to be exponentially wrong. The big issue is not on how it was cracked, or even if it was cracked. My issue had been (for a much longer time now) that for too long, the deciding voices, all listening to some CTO, often with multiple sides lacking wisdom that the setting was not merely that there was ‘a security risk’, there was for the longer time a much larger security flaw. For much too long a time, we got the ‘slides of wisdom’ on how data in transit tends to be safe and data at rest tended to be in danger. Even when I started my CCNA, the amount of knowledge given in the Cisco books gave the rise to the consideration that data in transit is not merely as vulnerable, it was that a lot more could be done unnoticed (not merely by the Chinese mind you). It was some time before the Sony hack that I expected a setting where the routers themselves might be used against the owner, it went further when we consider Wired in 2013 (at https://www.wired.com/2013/09/nsa-router-hacking/). The headline is not merely ‘NSA laughs at pc’s, prefers hacking routers and switches‘. It is the setting where we see: ““No one updates their routers,” he says. “If you think people are bad about patching Windows and Linux (which they are) then they are … horrible about updating their networking gear because it is too critical, and usually they don’t have redundancy to be able to do it properly.” He also notes that routers don’t have security software that can help detect a breach“. This is where I was in 2011, when I started to comprehend the working of a router and router tables, I figured out that it is not the router they can see that is the problem; it is the one they cannot see. That idea came from a presentation by Thomas Akin, CISSP, Director, Southeast Cybercrime Institute who had a presentation for the Blackhat briefings. The 2002 presentation gave me the idea. You see apart from the lack of security, the +1 hop hack allows form something truly unique. Consider [.MIL Server], that server connects to <secure router 1> and things are set into motion. Now, we cannot direct all the traffic, yet materials from that location to let’s say ‘preferred consultant one‘ will go via certain paths, yet the first router after <secure router 1> tends to be merely one or two routers (depending on traffic) to that preferred consultant. It is easy to find a router that could optionally be a link to these routers and duplicate all packages that go to that specific next step. Not only is the task easily done, the path is not hindered, the router is not intervened with and a simple reset takes away whatever evidence existed in the first place. In addition, the additional part is that the compact flash in those routers is ‘The maximum storage capacity for the CF in Slot0 and Slot1 is 4GB‘, yet the only part here is that you only needed 32 MB, which is what most of us used then, but cards that small are no longer made, so most IT people just plug in what they have. You have well over 3GB of package storage, so all packages to that one location could be stored and redirected on the ‘off’ hours as not to leave any monitored spike. Until the CFlash card is ejected from the router and investigated no one will have a clue. That was 7 years ago and the systems are even more capable now, a 3GB glitch will not register on most systems, especially when those IT people do not block Spotify and/or YouTube. By the time they figured it out, the setting is already wiped, and this path can be adjusted on a daily bases so that most IT networkers never had a clue in the first place.

You think that I am alone in this, that I am this clever? No, I am not! There are plenty of IT Networkers running circles around me and that is now set into the stage of ‘we’re untouchable‘. The CIA was never that, they never needed to be touched, the opponent merely needed a clear line of sight to the router that is one skip from the secure router that they needed to get to. We see more in the Foreign Policy article with the quotes “Information about sources is so highly compartmentalized that Lee would not have known their identities. That fact and others reinforced the theory that China had managed to eavesdrop on the communications between agents and their CIA handlers” and “an encrypted digital program, allows for remote communication between an intelligence officer and a source, but it is also separated from the main communications system used with vetted sources, reducing the risk if an asset goes bad“. Now we merely add “But the CIA’s interim system contained a technical error: It connected back architecturally to the CIA’s main covert communications platform. When the compromise was suspected, the FBI and NSA both ran “penetration tests” to determine the security of the interim system. They found that cyber experts with access to the interim system could also access the broader covert communications system the agency was using to interact with its vetted sources, according to the former officials“. I believe it goes further than that. If we see the entire layer process and consider that in the end, certain systems merely replicate a process. Cisco (at https://www.cisco.com/c/en/us/support/docs/lan-switching/8021q/17056-741-4.html) gives us: “A device can determine which VLAN the traffic belongs to by its VLAN identifier. The VLAN identifier is a tag that is encapsulated with the data. ISL and 802.1Q are two types of encapsulation that are used to carry data from multiple VLANs over trunk links”, as well as “The DA field of the ISL packet is a 40-bit destination address. This address is a multicast address and is set at “0x01-00-0C-00-00” or “0x03-00-0c-00-00”. The first 40 bits of the DA field signal the receiver that the packet is in ISL format“, so as the destination was known, the people needing this could search very specifically. When we consider ‘It connected back architecturally to the CIA’s main covert communications platform‘, the connection back would enable those seeking to find the needed value of the DA field. That does not merely impede the CIA, it stands to reason that to some degree the NSA would be just as vulnerable.

The main course

In my case, I tend to go for the Bambi burger, ideally I watch Bambi whilst having that lovely slice of venison. You see when we get to “As part of China’s Great Firewall, internet traffic there is watched closely, and unusual patterns are flagged. Even in 2010, online anonymity of any kind was proving increasingly difficult. Once Chinese intelligence obtained access to the interim communications system,­ penetrating the main system would have been relatively straightforward, according to the former intelligence officials. The window between the two systems may have only been open for a few months before the gap was closed, but the Chinese broke in during this period of vulnerability“, I believe the setting is worse than that. These players still require their consultants. It does not matter whether you call them construction workers, members of Blackwater, Xe Services, or Academi. It is those places as well as Booz Allan Hamilton and other providers that still require to be informed, and that is where the interception could start. The setting is not ‘the Chinese broke in during this period of vulnerability‘, it is the long term flags that they were able to test at this point and that is the fear we see with their setting of Huawei and partners. Not that Huawei is the danger, but the fact that Chinese intelligence is just as able to get into nearly all systems, it merely can get into Chinese systems faster (for now). This is where it gets a little more complicated, because it is not about the now, it is about tomorrow and the tomorrows that are coming. The only ones who have a chance of getting things done are players like the Constellis Group and Palantir when they unite abilities. It is going to be about data and about the ability to forecast how traffic goes. Thomas Akin was teaching this wisdom 16 years ago. We see this when we are made to realise

  • Live system data is the most valuable.
  • Immediate shutdown destroys all of this data.
  • Investigators must recover live data for analysis.

And the loss is merely a reset away, in most cases if there is an automatic reset; the only data available is the last transgression at best. With the coming of 5G live real-time capturing data streams is what is more likely to set the stage of finding out what happened, in this the entire setting of ‘China’s Great Firewall‘, we are already looking at outdated Chinese technology and I do believe that those behind the article, as well as some DARPA people are aware of that. America and Europe are behind in ways that we cannot even perceive, because the players that need to move forward are doing so iteratively, that whilst the time of reengineering is now merely 10% of what the development time was. We see this with “Call this the IBM problem, which faced an existential threat as soon as Asian groups started churning out cheap PCs in the 1990s. But here IBM also provides a few tips to the future, with its pivot to software and solutions. By the time of IBM’s iconic “solutions for a small planet” ad campaign in 1996, the company was trumpeting voice recognition and ecommerce — producing the sort of digital enterprise backbone that ended up helping develop the internet economy” (source: Australian Financial Review). In the first instance the Asian market required 10-15 years to catch up, the second time around it took 2-3 years and now with Google and Apple working globally, it takes months. IBM (others too) took iterative steps to maximise the economic footprint, instead of truly leaping forward whenever possible, they lost the advantage and are now trailing the markets. Huawei is one clear example where the American market was surpassed. Samsung showed its supremacy by having 5G home routers ahead of everyone else and the advantage in Asia is only growing. It is seen with “Alternatively, authorities might have identified the system through a pattern analysis of suspicious online activities. China was so determined to crack the system that it had set up a special task force composed of members of the Ministry of State Security and the Chinese military’s signals directorate (roughly equivalent to the NSA), one former official said“. I do not read this part in the same way. I believe that with ‘set up a special task force composed of members of the Ministry of State Security‘, was not about cracking. I personally believe that the Cisco books were so illuminating that they decided to change the setting in their own game. I believe that the Chinese now have a more advanced system. They have done what players like Cisco should have done before 2014 and they did not. I believe that when we see a partnership between Constellis and Palantir, their findings will bear that out with in addition an optional link that shows part of the accusation that China let Russia in on certain findings (and the Russian evolution of certain networking devices). This and the next part is largely speculative, but it is supported to some extent. We see this in: “Once one person was identified as a CIA asset, Chinese intelligence could then track the agent’s meetings with handlers and unravel the entire network. (Some CIA assets whose identities became known to the Ministry of State Security were not active users of the communications system, the sources said.)“. I believe that he part given in ‘not active users of the communications system‘ gives us the third part. I believe that the system was not merely invaded. There is every chance that certain systems when activated also leave tags behind and that is where the intrusion would have paid off. You see, in the Cisco setting (as an example), the data frame has an optional 60 bytes of extension headers, yet is that always empty? More important, when were these data packages truly thoroughly checked? In this speculative setting I take you to the movie Die Hard 2. In that movie we see on how someone decided to get clever and uses the outer marker beacon to warn the planes that were in danger. The beacon can be used in other ways than merely give a beep. I believe that Cisco data packages have other optional parts than can be ‘reused’ to do something different, like the optional headers. They are to most merely empty pre-set ‘spaces’, but they could have more. That is the setting that America faces and the fact that they could get overwhelmed by Chinese intelligence because they did not rely on iterative parts. Huawei had been leaping forward, for example now offering a 128GB Android 8.1 phone (the Huawei nova 3i 128GB Handset), for 50% less than its competitors. A system that is just as advanced as anything Apple and Samsung offer; at merely half the price whilst Chinese Intelligence has been digging into that device for months, unlike the NSA that needs to queue up with all the other users to get to look at the Pixel 3 and the iPhone 8 on launch day. That is the setting we seem to be seeing and America is indeed and rightfully worried, not because Huawei has backdoors (which I never really believed) but because the players here had been held backwards through iterative technology. Apple is actually staged by Forbes that way with the quote ‘a minor point update for the iOS 11.1 iteration‘, even Forbes speaks about iterative changes. That is the setting that they are up against and they have been surpassed for years and with Huawei leading the 5G stage on a global setting the US authorities are merely getting more and more afraid that not only are they no longer the leading players, they are now sidelined by not being able to keep up with what will be presented ‘tomorrow’.

That part can be supported through the CIA with analyses reports (at https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol49no3/html_files/Collection_Analysis_Iraq_5.htm), in here we see that Richard Kerr, Thomas Wolfe, Rebecca Donegan, and Aris Pappas give us (in a different context): “The analysis on this issue by the Intelligence Community clearly was wide of the mark. That analysis relied heavily on old information acquired largely before late 1998 and was strongly influenced by untested, long-held assumptions. Moreover, the analytic judgments rested almost solely on technical analysis, which has a natural tendency to put bits and pieces together as evidence of coherent programs and to equate programs to capabilities. As a result the analysis, although understandable and explainable, arrived at conclusions that were seriously flawed, misleading, and even wrong“. It is important to realise that this was on the WMD setting, so in a different context and on a different setting. Yet the information systems were all designed to upholster that flaw to an ‘evolved’ placement, the systems in their entirety are nowhere near ready, now even for the previous setting. The movement from a lot of staff to more fruitful consultant settings is now paying off in a negative way for the CIA (and the NSA too). This is where it gets interesting. You see, the previous setting that I gave should partially have been dealt with through the flashlight program that DARPA has. Raytheon BBN is working on that with Professor Richard Guidorizzi from George Mason University Fairfax. I think that the system is not entirely ready here, not if the packages can be duplicated via the router and as long as the original is not touched, that system will not get the alert lights ringing.

To get you on board on how far all the NATO partners are behind, let me give you two settings. The first is a DARPA Project called ‘Probabilistic Programming for Advancing Machine Learning (PPAML)‘, the man in charge is Dr. Suresh Jagannathan, yet the bigger brain might be MIT graduate Dr. Jennifer Roberts. The given setting is “Probabilistic programming is a new programming paradigm for managing uncertain information. Using probabilistic programming languages, PPAML seeks to greatly increase the number of people who can successfully build machine learning applications and make machine learning experts radically more effective“, whilst we also see the goods in the DARPA article by Dr Roberts with “If successful, PPAML could help revolutionize machine learning capabilities in fields from Intelligence, Surveillance and Reconnaissance (ISR) and Natural Language Processing (NLP) to predictive analytics and cybersecurity“, this is certainly leaping forward, but it is still based on a system. I believe that the Chinese decided to turn the funnel upside down. To illustrate this I need to get you to an app called Inke. The article (at https://thenextweb.com/contributors/2018/02/09/hidden-world-chinese-livestreaming-app-inke/), gives us ‘The hidden world of Chinese livestreaming app Inke‘, this is not a few people; this is a craze that has already infected millions upon millions. So with “he was actually doing a livestream, an extremely popular hobby for young people in China. China is way ahead of the rest of the world when it comes to embracing livestreams.” you are missing out and missing out by a lot. These streams are real-time and often geo-tagged. I believe that the Chinese have changed the setting, they are optionally collecting Terabytes of daily data and they are converting that to actionable intelligence. Facial recognitions in phones, geo-tagged and all uploaded and streamed, all converted on the spot, like the SETI screensaver, millions of affordable mobiles (this is where the Huawei nova 3i 128GB Handset and all other new handsets come in), parsing all that data into uploaded files and Chinese intelligence gets global information close to real time, whilst their learning machines are about efficiencies of collected data, it is not about the better application by making them more effective, it is about the massive amounts of data offered to get the systems to upgrade the efficiency of parsing data, because parsing data is where the bottleneck will be in 5G and they already have a larger advantage.

In the meantime, on any given day thousands of Inke users are filming life around them in malls and famous places looking awesome doing it. Yet, if you look at the CCTV settings, how many users would have passed 935 Pennsylvania Avenue, Washington DC, or at London SE1 9EL, UK walking towards London Bridge? How many people were merely assuming that they were tourists face timing with mom and dad? Are you getting that picture now? and also realise that Inke is merely one of more than 300 live streaming companies, all capturing that data all those tags that a smartphone allows it to capture and at the top of all this, Facebook and YouTube are eagerly pushing people to gain following by doing just that. So how long until the user realises that uploading the same stream to 2-3 providers gets them to gain a lot more following and optionally cash? Yes, the intelligence community is that far behind at present. So when we are worrying on “The system was not designed to withstand the scrutiny of a place like China, where the CIA faced a highly sophisticated intelligence service and a completely different online environment“, we need to consider that China is already ahead of the game and the CIA systems might be merely an option to scrutinise their own data, because that remains the Chinese bottleneck, the data will require verification and that is the one field where their opposition could gain the advantage if they set their minds to a different algorithm, one on reliability, not on likelihood. It is a setting where all the players involved have a second tier of consideration. They embrace a ‘not now, but soon‘ thought, when ‘I needed this yesterday‘ is the proper setting as I personally see it, because data without proper vetting is merely used space on any given storage device.

That final part can be considered when we look at the linked article that NBC had from last January. There we see: “When agents searched Lee’s hotel rooms in 2012, they found notebooks with the names of covert CIA sources, according to court documents. But not all of the agent arrests and deaths could be linked to information possessed by Lee, who left the CIA in 2007“, an issue I mentioned in an earlier blog. We get there when we consider his actions and ‘found notebooks with the names of covert CIA sources‘, do you think that anyone, especially in this setting would be that stupid? It’s like keeping the condom as a trophy after having intercourse, its useless and stupid. I believe that either it is not the ‘covcom’ system, or not merely the ‘covcom’ system. I believe that (if it is all correct) that Chinese intelligence got in further and deeper into acquiring the data required and the notebook is the proverbial red herring in all this, especially as Jerry Chun Shing Lee left the CIA in 2007. You do not hold on to that level of information 11 years after you might have had some level of valid reasons to have it in the first place. That is the part many overlooked, or looked away from.

In the end, I do believe that it is not merely the inability that drove the anti-Huawei waves, it is the fact that those decision makers have no idea where to navigate towards next is what drives their fears almost exponentially.

 

Leave a comment

Filed under IT, Military, Politics, Science

The Red Flags

Today is a day where we are overloaded with actions on parties, yet there is little evidence shown, actual evidence that gives light to the danger. So first we see Russia, the old red with hammer and sickle. First we see ‘Expulsions of Russians are pushback against Putin’s hybrid warfare‘ (at https://www.theguardian.com/world/2018/mar/26/expulsions-of-russians-are-pushback-against-putins-hybrid-warfare), as well as ‘More than 130 people could have been exposed to novichok, PM says‘ (at https://www.theguardian.com/uk-news/2018/mar/26/130-people-feared-exposed-to-novichok-in-spy-attack-says-pm). These two matters are shown to us giving two lights. The first is “The expulsions of Russian diplomats on Monday reflect how widely Vladimir Putin has attempted to wage his brand of hybrid warfare and how many leaders and their intelligence agencies he has angered in the process. Even before the Salisbury poisoning, many governments had lost patience with Vladimir Putin’s grey war for domestic reasons of their own. Their response is not just an act of solidarity with the UK but a collective pushback“, I am not denying any of this. There are indicators that Putin has been waging ‘war’ for some time. There is also the larger indication that he is moving on several fronts and he is gaining field in economic options in the Middle East, whilst America has lost footing. The US needs to appease Saudi Arabia to the maximum degree to avoid the dangers of losing even more footing in the Middle East.

It is with “In Lithuania, the government found Russian spyware on its computers. As far back as 2007, Estonia suffered a three-week wave of cyber-attacks” we do get a first issue, as well as with “US and EU expel scores of Russian diplomats over Skripal attack“. You see when governments start to react with “in a show of solidarity” you should all be aware that there is a lot more going on. This is not some form of ‘conspiracy theory’, this is merely facts that you can check. How much solidarity was shown when we all got screwed over by the meltdowns of 2004 and 2008? The economic impact was shown in several countries. Of course not as massive outside of the US, but we all felt the pinch, millions of us. So how much solidarity was shown AGAINST Wall Street? Please show me the evidence, because for the most, these people might have lost their jobs, but left so wealthy that these men could go into brothels for the rest of their lives, shopping for virgins. So when it comes to solidarity, i have merely seen that as a government sham over the last 10 years. In addition, even if we acknowledge that the Novichok is of Russian making, there is evidence that it was not uniquely in Russian hands. In addition, there are clear questions regarding Vil Mirzayanov as well as some of his statements as I showed in the earlier presented blog ‘Something for the Silver Screen?‘ (at https://lawlordtobe.com/2018/03/17/something-for-the-silver-screen/) where I gave the readers “Regarding new toxic chemicals not listed in the Annex on Chemicals but which may nevertheless pose a risk to the Convention, the SAB makes reference to “Novichoks”. The name “Novichok” is used in a publication of a former Soviet scientist who reported investigating a new class of nerve agents suitable for use as binary chemical weapons. The SAB states that it has insufficient information to comment on the existence or properties of “Novichoks””. Now we need to consider that both the OPCW and the SAB are incompetent beyond belief, or that we are now getting a collection of Fish Stories. They presented the statements in 2013. Now TASS (I know, not the greatest source of non-biased journalism) gives us “As far back as 1998, we looked though a regular edition of the spectral database released by the US National Bureau of Standards, which has spectral data on about 300,000 compounds and is regularly updated, to find an agent that caught our attention as it was an organophosphorate chemical. We understood that it must have a lethal effect. Now it has turned out that, judging by the name of that agent, it was Novichok A234. It has surfaced,” Igor Rybalchenko, chief of the ministry’s chemical laboratory, said in an interview with the Voskresny Vecher news roundup on the Rossiya-1 television channel“. You see, this is something that could have been checked. Is TASS lying? If not than we get the additional of what some might regard as ‘fuck ups‘ by both MI5 and GCHQ. In that regard, the less stated involving MI6 at present the better. Now, that part could be easily verified, yet the US and the UK have not given any clear evidence, whilst several sources have clearly shown that Novichoks were out there. If any of the sources, that I mentioned on Novichoks (like Leonard Rink), are shown to be true than there is a larger issue in play. The issue is that some governments are in denial over the evidence and facts and that is a bad thing. Let’s be clear, that does not absolve the USSR (I love the old names) on many of their actions, it merely shows that painting everything with a single brush shows other levels of incompetence on several fields. Even if that was the Intelligence branch intervening for whatever reason, they went about it really bad and the wrong people end up getting scorched. It is the Guardian that gets credits here for asking the hard questions. With ‘UK’s claims questioned: doubts voiced about source of Salisbury novichok‘ (at https://www.theguardian.com/uk-news/2018/mar/15/uks-claims-questioned-doubts-emerge-about-source-of-salisburys-novichok) it asks the harder questions and in there we see the conflicts that Craig Murray brings. With ““There is no evidence it was Russia. I am not ruling out that it could be Russia, though I don’t see the motive. I want to see where the evidence lies,” Murray said. “Anyone who expresses scepticism is seen as an enemy of the state.”“. I am pretty much on his side on this matter. I found issues that gave rise to the blanket accusation within 30 minutes, perhaps better stated it took an hour because the OPCW documents read as smooth as sandpaper, more boring materials and meetings will seldom be read. Besides the questions from the Guardian, not one of the newspapers dug into the overkill matter. The entire exercise too overly complicated. I could have mugged, executed the two making it look like a robbery in mere minutes (excluding preparation time), it would be done in no time and no chemical risks at all, to no one. So as we saw PM Theresa May give us “More than 130 people could have been exposed to the deadly nerve agent novichok during the Russian spy attack in Salisbury, Theresa May said on Monday“, yet no one raises that it could be a mere individual or even the Russian Mafia. Two likely considerations in all this, and not one has raised that part. No matter how we see the opposing players in Special Forces or Intelligence. To set the stage of 130 bystanders getting in the crossfires is a realistic thing in places like Syria and Yemen, where there is open warfare, in places like Chantilly, Cheltenham, St Petersburg, or Lille is not where one goes playing like that. You see killing a target, a valid target is one thing, doing it whilst setting the stage for getting +100 plus knowingly in the crossfires requires an entirely different type of psychopath and governments tend to not hire those types in the first place.

That alone merely emphasizes the part that my view has been correct all the time. In addition to that, we still have seen no clear stated evidence on how it was done. The Scotsman (at https://www.scotsman.com/news/uk/sergei-skripal-exposed-to-nerve-agent-through-car-vents-reports-1-4707852) stated “may have been exposed to a deadly nerve agent through his car’s ventilation system“, which they got from the US. You see, when we get ‘may have been‘ and ‘possibly‘, we need to realise that we are either kept in the dark, or they actually just do not know at present, which makes a case for blaming the Russian government a weird choice at best. And with every delay in this it merely shows that the entire mess is a lot larger, yet the media ignores that. I call that an actual problem.

I mentioned Lithuania earlier. Now, the following speculation does not absolve Russia, but when you realise that people like the Russian Mafia might oblige the Russian government at times, they are still in it for money, for simple profit and coin. So when we see: “In March 2016, Vladislav Reznik, a Deputy of the State Duma, has been put on the international wanted list and officially charged with membership in Tambovsko-Malyshevskie organized criminal group and money laundering in Spain. Reznik’s villa has been searched. According to the indictment, Reznik was among those controlling the gang operations and a member of Gennady Petrov’s business circle” as well as “€16 million have been received from the British Virgin Islands, Panama, Lithuania, Switzerland, Great Britain, and Russia. On the other hand, monetary funds amounting to some $8.5 million have been transferred from his accounts to Russia, Panama, Cayman Islands, and U.S.“, we see that Lithuania has larger players in the fold. If it is a vessel for transferring funds, having their cyber infrastructure under attack seems to be an effective way to keep the eyes peeled in different direction (extremely speculative), yet in support there is also “In July, Russian hackers were blamed for a similar assault on Lithuanian government Web sites. In Security Fix’s account of that attack, I posted a copy of a congratulatory letter sent to nationalist Russian hackers by Nikolai Kuryanovich, a former member of the Russian Duma. The missive is dated March 2006, and addresses the hacker group Slavic Union after the group had just completed a series of successful attacks against Israeli Web sites“, which is a first link from a ‘gov.ge‘ site. Cyberwar – Georgia

In addition there is “The wave of attacks came after a row erupted over the removal of the Bronze Soldier Soviet war memorial in Tallinn, the Estonian capital. The websites of government departments, political parties, banks and newspapers were all targeted. Analysts have immediately accused the Russian Business Network (RBN), a network of criminal hackers with close links to the Russian mafia and government, of the Georgian attacks“, now remember that Tallinn is in Estonia, not Lithuania. Yet the methods that the Russian Mafia uses are quite often duplicated (an Amway solution) and that part is not so far stretched. It is another cog that is showing us on the acts of the Russian Mafia. The Russian government is not absolved in all this, yet Theresa May did not tell us: ‘we have strong indications that a member or Russian organised crime with links to the Russian governments are behind this‘. No! She went straight for the Russian government and offered no clear evidence, that whilst the clear evidence could be largely dismissed in most courts with merely the use of the documents of the SAB, the OPCW and the testimony of Vil Mirzayanov who seemed to be interested in upping the sold copies of his 2008 publication.

There are sides to my story as well, parts I am not happy about, parts that should be scrutinised, yet in all this, the current facts and statements seem to take down the UK case at present. More importantly it shows us that the US is also playing the fear game, it is now more afraid than ever that it loses more and more turf in the Middle East, whilst Russia is moving forward. That scares them more than anything, even more than any Novichooks (yup intentional typo) in play, especially when we consider the danger that these weapons are and additional could be down the line, is that not odd either?

Ready Player Two

And that is not the whole story. You see in all this the other red flag has a star and a crescent moon. Yes it’s everyone’s favourite humanitarian setting (or was that lack off?), it is Turkey. So when we are again treated to the marketing of ‘Turkey needs Europe, Europe needs Turkey‘, the people in Europe need to run to the Brexit, or any EU-Exit they can find. I stated it in a previous blog with ‘This relates directly to Turkey, because it shows the desperate EU trying to open a many doors as possible‘. I did that in ‘A changing language‘ (at https://lawlordtobe.com/2018/02/15/a-changing-language/) well over a month ago. Now we see “Turkey is not doing very well economically, it needs outlets” said Lamberts, “and it is very clear that bad relations with Europe are harmful to Turkey, so somewhere on the economic level Erdogan needs Europe and Europe in fairness needs Turkey“, which Euro news gave us yesterday. So we see how Philippe Lamberts, a Belgian Green MEP is willing to throw values overboard, the economy does not allow for any humanitarian values. So when I see any journalists hiding behind ‘constant attacks on transgressions of human rights‘, whilst attacking governments making any kind of economy based deals. Can they just kindly go fuck themselves? When we see the Turkish joke evolving on the EU field, no journalist gets to use the ‘Human Rights‘ card for a long time to come. If you want to do that, go visit Turkey and protest in front of those prisons that have journalists locked up for life. Until you can make that change there, do not come crying on other shores. If you need actual Human rights issues, then perhaps turn to Canada where we got “A French waiter who was fired for his “aggressive, rude and disrespectful” manner has claimed compensation, insisting that his behaviour is not unusual, but that he is simply French“, that is the story of Guillame Rey from Vancouver Canada. that is where the Human Rights have gotten us and that is a real win for the ‘15 children that were killed in an airstrike as they hid in the basement of a school in the town of Arbin‘, yes a real humanitarian win in this. So even as the financial Times reported less than 2 hours ago “The EU said it failed to win a pledge from Turkey to free journalists it has jailed and improve other rights for its citizens but that it will maintain talks with President Recep Tayyip Erdogan after their first meeting in almost year“, we see no place stating that turkey will not become a member of the EU. It is another side where the gross negligence of evidence is taking the toll of our humanity. So as the President of the European Council Donald Tusk gives us “Only progress on these issues will allow us to improve EU-Turkey relations, including the accession process” (at https://www.ft.com/content/dbefa9e6-313d-11e8-b5bf-23cb17fd1498), so I am proven correct yet again, they merely need to push the EU deeper in debt, which according to Bloomberg is coming for certain through “Draghi’s call for patience and persistence in delivering stimulus, suggesting bond-buying will be extended beyond September” or set the stage where the so called Humanitarian principles are ignored, which has been the case for close to a year. It has only strengthened my view that the UK is a lot better off outside the EU, because this entire EU mess will collapse onto itself and woe to those who are left behind paying for it all. It could set back the economic markers for close to two generations in Europe, which should scare anyone in the EU.

The last red flag is North Korea (it has blue too)

I mentioned it some time ago. The entire Sony mess and blaming North Korea was never really resolved. So when I got the news from ABC stating “Secret intelligence documents and photos unilaterally collected by the U.S. military were among the stolen cache of South Korea’s classified documents by North Korean hackers, but the totality of what was stolen remains unknown“, we should be starting to get careful. you see it implies one side, but to my view it gives an entirely different issue. It implies that North Korea is a capable cyber operator. Now, we know that one can do plenty of damage with a laptop (like in the movies). Yet when you see these pics you wonder what on earth is going on, because we now get the speculated but believable view that ‘the US gave documents to an ally that does not have its basic cyber protections in place‘, that is a very different kind of cheddar, isn’t it? Now, I have seen a few pics where the computers look a little more advanced, but nothing that an actual gamer would still be using two years ago. And that is the foundation of their hacking? Let’s be clear, there are situation where you can hack with a 10 year old laptop, but you need skills, you need access to documentation and the ability to get past the firewalls and past sniffers and network monitors. They do exist, yet that requires an equal incompetency on the South Korean side, a part that we are also ignoring, the use of Common Cyber Sense.

You see, when you get “Malware contamination of the intranet server of the cyber command that occurred in September last year was confirmed by the South Korea’s Defense Ministry in May but this is the first glimpse of the scope of the damage“, there is another layer in place, one that does make sense. Some of the European, Russian and optional US hackers are selling their stuff to North Korea. That is a very possible scenario, but in that case both the FBI (if the US was involved), as well as the CIA failed in their tasks. Perhaps better stated, the CIA seems to be unable to thwart North Korea from purchasing cyber hacking software from making it to North Korea, which is equally a failure on several levels. It is unfair to blame merely the CIA. It is fair enough to add the earlier avoided MI6 to the mix as they should have been watching that danger, because if these hackers can get to South Korea, they could in theory hit the UK in equal measure, the evidence is there. Even as we agree that North Korea does not have the skills (my personal belief) to create something like Wannacry. I already went there to some degree in ‘In light of the evidence‘ (at https://lawlordtobe.com/2017/05/28/in-light-of-the-evidence/), the evidence given was compelling that was given by ICIT. In addition we had ‘when IBM cannot give view of any mail that propagated the worm’, which also takes North Korea out of the loop, yet they could have acquired the software. So even as the largest cyber player like IBM remains in the dark, there is still evidence that it was North Korea? That view was only enforced when a Dutch media team went to North Korea a few years back. In some places their cameras were locked up because no photographs were allowed. Yet most had them anyway, because the North Korean officers had no idea what a smartphone was and that it was able to take pictures. The Dutch NOS showed it on Television, so that is the place that hacked into South Korea, the birthplace of Samsung? It is not impossible and was never denied by me, but it was so extremely unlikely that unless clearly proven with evidence considering it was utterly impossible to the common sense mind. Yet as the source is not in North Korea, hunting that source down is more important, because the next time it will not be some version like Wannacry 2.0, it could be Stuxnet 7.1 and as the UK has 15 reactors and the US has 99 reactors in 30 states, it seems to me that waking up both MI6 and the CIA to actually get to the bottom of these North Korean ‘praised’ cyber skills and find out where those skills actually were (read: came from), because not doing so is a much larger issue. I hope that the South Korean bungle of their network security constitutes as at least some level of evidence.

Three red flags, none of them are innocent, I never implied that, but as we are changing the play, the marketing vibe and the need of what is real we need to carefully weigh what the media gives us and what those giving the media are actually after. I have seen enough evidence thrown about and have been able to ask questions to the extent that gives rise to many question marks and whilst some media are playing the emotional waves, some are seeking clarity and that clarity gives us additional options and views that we did not consider before. People all over the world are told to jump to the left, whilst there is no evidence that anything form the right was going to hit us in the first place, which makes us wonder why they did not want us on the right side to begin with.

These red flags are important, because even if we had any faith on the Russians trying to attack us, we need to consider that Cambridge Analytica is an English firm and even as Fortune now reports “A non-partisan watchdog group has filed complaints with the Department of Justice and the Federal Election Commission alleging that the data firm Cambridge Analytica violated U.S. election law by having foreign nationals involved in the decisions of political committees“, we see that it was a British firm who scored that job.

So it is possible that the people in Moscow will be treated to a comedy in 22 hours, it will go something like “TASS Is Authorized to Declare that the accusations against the Russian government and its people were propagated by an English Firm“, in this I used part of the 1984 Soviet spy miniseries directed by Vladimir Fokin, because even with my weird sense of humour it seemed important to give it an Orwellian sling. Perhaps you should check out his new book. It apparently deals with life in the US after a presidential election.

 

3 Comments

Filed under Finance, IT, Media, Military, Politics, Science