Tag Archives: NSA

A screen made with real silver

Forbes gave us the news on Monday. Many expected it; many saw it coming and no one is really surprised. It’s ‘Netflix’s Worst Nightmare Is Coming True‘. Stephen McBride gives us: “If you’ve been reading RiskHedge, you know I’ve been warning to keep money out of stock market darling Netflix (NFLX)“, he was of course correct, yet I would not go there for different reasons, reasons he actually mentions in part. As we are treated to: “It comes down to the lifecycle of disruptive businesses. Netflix pioneered “streaming” video where you watch shows through the Internet rather than on cable TV. For years, it was the only streaming service in town. Early investors rode this first-mover advantage to 10,000% gains from 2008 to July of this year.” Many, for the most the investors rejoiced. I saw the loaded cannon in another direction. As Forbes gives us, we are treated to: “Netflix had planned to spend $8 billion on shows and series this year… now it’ll spend roughly $12 billion. It now invests more in content than any other American TV network” that is where the danger is. You see, the cold hearted calculation is: 137 million users worldwide. This gets us on average $24 billion a year, it looks good, but it is not great. You see, this only works if this goes on in the long run, whilst it requires growth, it also requires people to stay with Netflix for a long time. Now, both are an option, but they have muddied the waters in another way. First there are the loans and the interest is due, as well as the principle of the matter (aka, the loan). It is optionally not a big thing if things were great moving forward, yet they are not. I had an idea earlier this year and I thought that handing it to Netflix is a great way to gain momentum. You see, I have written 1100 articles within the last 6 years alone and as such I do have a few ideas running around in my head.

Yet Netflix has a no-unsolicited submissions policy, so until you have an agent and such, there is no option. They only accept submissions through a licensed literary agent or from a producer, attorney, manager or entertainment executive with the players that Netflix has a pre-existing relationship. This makes total sense, yet it also gives rise to a much more expensive track, and $12 billion shows part of that. From my point of view new ideas and optionally the most profitable ones are found in what some would call ‘the geek corner’, these people can often not relate, cannot present but they tell great stories, they are most often really cheap and original. It is a much harder sell, yet the entire expense track could be down by at least 10%, saving Netflix $1.2 billion on the spot. Then there is the international concept. Some TV series became great in their own way. Sweden had Pipi Longstocking and that become a much loved character on a very global stage. Another Swedish treasure was a 70’s series called the White Stone, based on the book by Gunnel Linde, Sweden had its own share of successes down the track and we realise that some might seem less interesting nowadays. The Netherlands had the legendary series ‘Kunt U mij de weg naar Hamelen vertellen meneer?‘ It was a song story by children based on the Grimm story of the ratcatcher of Hameln. The series apart from some a few episodes is lost forever, which is a shame as this was a cultural highlight for the Dutch. The French had Thierry la Fronde, La demoiselle d’Avignon and several more, all unseen by a global audience. It is an option, but is that the case?

No it is not.

Netflix has shown that their money is well spent; series like Sabrina, The Haunting of Hill House and Altered Carbon are amazing achievements. We can clearly see that billions were well spend, yet in this donuts for dollars world, the overall stage (non-advertising space mind you), the annual setting for their audience is set to a requirement of close to 365 to 700 hours of TV entertainment a year to keep them, which that adds up to Sabrina, Star Trek Discovery, Haunting of Hill house, the Good Witch, Marvel’s The Punisher, Lost In Space, The OA, Seven Seconds, The Rain, Requiem, 3%, The Innocents, Sense 8, Grace and Frankie, Godless, The Mechanism, Dark, The Crown, Marvel’s Daredevil, A Series of Unfortunate Events, Stranger Things, Lady Dynamite, Glow, Sabrina, Altered Carbon, Mindhunter and at least 20 movies. They need to pull this off each year, and that pressure with Disney+ also increases, as the chance of switching to someone else is more and more likely.

We get that there are series that will always take the cake (Game of Thrones), and in this we see that there is some space to manoeuvre, but it is not a lot. You see, if someone loses the interest for 3 days, they will wonder what Netflix is for and optionally cancel, especially in this economy. That is the clear math I saw at the very beginning. It is not the price; $15 (the medium option) is more often than not a really acceptable price to most people. Netflix got that right, they merely need to find another additional venue for materials, because the well of creation will soon dry up, not merely because there are other players on the field, it is that Free to air TV, and other medium are vying for that same pool of viewers. Netflix as the first one has an advantage, but for how long?

Stephen McBride, a professional fund manager and the chief analyst at RiskHedge makes his financial case and that adds up to the findings I have. I am not sure on what the share price needs to be, yet his financial case and my mere view of the low average viewer gives light to a Netflix in trouble, how much is a clear unknown. Netflix has shown that with Sabrina and The Haunting of Hill House a new level of creepiness can be reached. Sabrina is a new take on what was fluffy, whilst The Haunting of Hill House had most of my friends scared beyond belief, so that series hit the mark. I saw the interesting catch on Lost in Space that after the original series and a movie can capture hearts all over the place, so Netflix is bringing the good stuff, no doubt about it. However, the entire setting is still low on hours. Even if year one for the audience is great, they will want more, or at least no less in the stage of year two and that is where I see trouble for Netflix. This business model will not work pumping billion after billion in a stage that grows ever more, and the path gets worse as more and more is borrowed.

That is the business case that is lost from the very start. This is all before we all realise that the need for Internet and 4K grows, so their infrastructure will shift within the next two years as well and their cloud will need a serious amount of cash to deal with that. I speculatively reckon that by 2021 (if Netflix makes it that long) will equal the NSA data server site at Camp Williams (Utah), so please take a moment to reflect on this. Netflix will in three years require the systems to facilitate to an audience and its hardware will be bigger than the Comprehensive National Cybersecurity Initiative (CNCI), with the ability to serve optionally a little over half a billion people. That is the path that Netflix is on and people wonder why I am overly negative. Well, overly negative is a stretch. It is the old fashioned sales pitch. A man sells his soul to the devil, the devil agrees and the deal is that he needs to grow his customer base by 20%. Those who know of the value of a chess set might know that one too. That man required as payment one grain the first tile, and double one the next one and so on, until all 64 tiles were paid for. 1,2,4,8,16,32,64,128 (totaling 255 grains) and that is merely the first row, after that it goes fast and by the last row it the tile payment equalled the total grain production of Russia. In customer base you require a customer base that surpasses the total population, or in this specific case the hardware of a former super power. Also consider that over time Netflix needs to open a similar base in Europe and Asia to maximise the streaming within the time zones. How much will that cost? Oh and before you think that this is it, how much power will it take to keep that running? It is set to be $50 million a year in energy cost and 1 million gallons of water a day (per base). That is if there are no power surges and other calamities giving hardship to all this. Now we see more and more providers handing out one year of free Netflix, they will have a deal with Netflix, yet year one is not the problem, year two is the bigger issue, content makes that a challenge and as is stated in Forbes: “Netflix has three bad choices: continue borrowing billions and bury itself deeper in debt… dramatically raise its subscription prices… or cut back on making new content“, if we see the three, we wonder what impact monthly increases does, I reckon that they could go for the option of one price (HD, 4K) at the same price of $16. Basically get rid of Normal and merely have basic and premium (for $5 more), it will give a boost and most people might not worry about the $5, knowing that they could always upgrade their hardware and get better viewing. Borrowing billions is a non-starter as I see it, it merely lowers the lifespan, yet the final option ‘cut back on making new content‘, is not set in stone. What if we go by ‘making different new content‘, are they exploring that? This is where the golden oldies might bring life to the amount of materials they get at a much lesser expense. Disney is all about the family and the younger viewers. Disney rules that land, yet in the 70’s we saw that Scandinavia had its share of series appreciated by kids all over Europe and that might lower the edge that Disney has (to a small extent).

In addition, making different new content might also increase the amount of content that can be made with $12 billion. I hope Netflix pulls through, when we are confronted with The Haunting of Hill House we see that they have amazing diamonds to offer any crown viewer and I am curious what else they can come up with, especially after Sabrina.

When we consider this, how many have taken a look for the best TV series from the 70’s? I did and I reckon that this is not where we find the answers, there will be too many people remembering those, yet the international field where a local TV series makes it into the global population will be for the most real new stuff to many, there will be a risk, you see, for every remake like Three man and a baby there is the risk of having at least two mediocre versions like ‘the Birdcage’, and with an audience of 135 million moving towards 200 million diversity will be key. I am not sure how it is to be solved and the makers will have their challenge cut out for them, but the takings for them will be huge if they pull it off. In the end, the search for originality goes on and as we go for books, movies and optional video games (Alicia Vikander or Michael Fassbender anyone?) we see options. Yet how does it go when we go dark, really dark and we take a night at the museum into a very different direction? What if we push the nightwatchman into the Night watch and he has to survive the events of The Shooting Company of Frans Banning Cocq and Willem van Ruytenburch in 1640, where he has to survive the night, not get shot for optional accusation of theft of the 100 florins that each of the 16 members had brought as payment to Rembrandt van Rijn and get back out without leaving a mark. We might think it is fun to walk in on Hortense Mancini by Jacob Fredinand Voet, yet what happens when you end up in The Wayfarer by Hieronymus Bosch (1503) and you have to get back then?

We can add twists on nearly any TV series, but will it work? It is not for us to solve, it is for Netflix to find a solution and that is where the problem starts, I might phrase it wrong, the problem did not start there. We were informed last year that Netflix cancelled 21 series, it does not really matter why, number of viewers tends to be the most likely reason, it merely adds the pressure for new content to be created, remember that they need between 365 and 700 hours per viewer for them to remain decently content. And in that picture, creating new content is a lot harder than merely creating a new season, the ante is up for the creators and so is the pressure for Netflix.

At least that is how I see it, and in this, the cinema has a silver screen, Netflix will need gold to score and they have to do it 20 times over each year making the effort unfathomable and each year that they do pull it off will add to the legend that started as Netflix.

 

Advertisements

Leave a comment

Filed under Finance, IT, Media, movies, Science

Those we needlessly fear

All others pay cash! Yes, that was direct, was it not? We have seen millions of articles fly by, all given the very same announcement: ‘Fear Saudi Arabia‘, as well as ‘MBS is a monster‘. Yet, what evidence was given? What actual evidence did we get?

Turkey played its innuendo game, we can also accept that the US is playing a protective game for Saudi Arabia and that too should be highlighted, yet NO ONE has taken an academic look at those so called tapes as have given the audience the rundown, what was there, what was proven. Is there even enough evidence that Jamal Khashoggi is on the tapes? Journalists are in their own corrupt little world of satisfying the shareholders, the stake holders and the advertisers and they all want Saudi Arabia to look like they are all guilty, all to the very top. In addition we see the G20 Argentina game that France played with their ‘confrontation’, conveniently enough staged to be caught on CNN. He was not that amateur like when he had to have a few words with someone high up at Crédit Agricole, was he? Where have they got that leaked conversation?

I see it as a simple operational premise to counter the fear that they have. It gets worse, at present the vultures are circling and we get to see more fallout. News dot com dot au are giving us (at https://www.news.com.au/world/middle-east/saudi-friend-of-jamal-khashoggi-sues-israeli-surveillance-firm/news-story/b0bf9d501332df9ad31bede7de904b6c) ‘Saudi friend of Jamal Khashoggi sues Israeli surveillance firm‘ gives us ‘A Saudi dissident‘, as well as ‘Omar Abdulaziz, said he was friends with Khashoggi‘. Now people make all kinds of claims, I can make the claim that I am the lover of Scarlett Johansson; she just does not know it yet. Anyone in the media can contact frukan Johansson and verify that fact (or prove it to be wrong), we can’t in the case of Khashoggi, can we? Was there corroborating evidence that they were actual friends? If so, why was that not added? The news site makes no real effort to substantiate that friendship and that is not what this is about. You see, it is the claim ‘a lawsuit against an Israeli surveillance company, claiming its sophisticated spyware targeted him and helped lead to the killing of his friend‘. We have two problems here. In the first, is there any evidence to back that up? In the second, Jamal Khashoggi was an unknown person to 93% of the planet, yet he was a journalist for the Washington Post, and as such he was a lot more visible than most others. Also, the entire filing matter in Istanbul gave rise that plenty of people knew where he was, so the spyware seems redundant. If there was quality spyware in place he could have been killed anywhere and leave the optional involvement of Saudi Arabia almost completely out of it. Does that not make sense?

The last paragraph is the killer here: “citing news reports and other sources claiming that NSO Group sold Saudi Arabia the technology in 2017 for $US55 million ($A75 million)“. The first thing here is to look at those news reports; I wonder how much innuendo is in there. Then we get the stage that technology worth $55 million was bought when JK was very much alone, giving rise to the reason of purchase, last by not least is the investigation on the NSO group and their software and that is what I believe was the foundation, it does not matter where and how the NSO group software was used. I believe that Omar Abdulaziz got wind of a 2016 article not unlike those on Vice (at https://motherboard.vice.com/en_us/article/3da5qj/government-hackers-iphone-hacking-jailbreak-nso-group), and saw ‘Government Hackers Caught Using Unprecedented iPhone Spy Tool‘. so when we see (or saw) “Ahmed Mansoor, a 46-year-old human rights activist from the United Arab Emirates, received a strange text message from a number he did not recognize on his iPhone“, the brain of Omar Abdulaziz  optionally went ‘ka-chink‘ and his pupils turned to dollar signs, It was optionally his opportunity of a lifetime.

So who is right?

I am telling you right now that all I am writing from my opposition is pure speculation, yet is it less of more believable? Is the NSO group real? Yes they are and they have something that every nation on the planet with a decent technology level requires. Any government have people they want to keep tabs on, and that is what this solution optionally provides for. It is not a killing tool, and at $55 million it is not some tool you use for simply ending someone’s life, there are more convenient and more elegant ways to facilitate to punch out someone time clock of life. When you stage a $55 million solution when $50K in an account does it, that solution does not make sense.

Still, we cannot ignore the NSO group software and it might have been used to keep tabs on JK, that is optionally a reality we face, yet we all face that optional for a number of reasons and there we have the crux, knowing where a person is does not mean that their life has to be ended, the fact that we have tools, does not imply that we have to use other tools. The audience factor is trying to give us that idea, an emotional driven premise of events to set the stage of intentional international execution. There has been, and unlikely will be any evidence showing that. Not by some eager frog (an unnamed France governmental executive) stating to Saudi Crown Prince Mohammed bin Salman ‘I am really worried!‘ worried about what? Conversations eagerly and ‘unintentionally’ leaked right in full view of the CNN camera, are people truly stupid enough to go for that bait?

Then we get claims in papers like the Sydney Morning Herald trying to up their game, yet at present I am not certain if the Saudi government would lose if a defamation case was brought to court and that is me merely contemplating two of the JK articles that I have read in the last two days.

In addition, the article has the claim ‘and helped lead to the killing of his friend‘, which is actually very clever as in this way stated we have a problem, or do we? Is there any evidence that the solution was or was not used? If there is a way to check the usage of that software then Omar Abdulaziz opened an interesting door. You see at that point, under the US freedom of information act, close to two dozen claims can be made regarding the NSA (the San Antonio location) on how they have been keeping tabs on people. In the January case of Sherretta Shaunte Washington, her attorney might optionally (with properly applied intelligence) be able to overturn any given sentence against her. There has been the rumour that the NSA assisted in keeping tabs on a dozen burner phones. You see, it is not the sim card; it is the mobile imei number on EVERY phone that is the issue. The NSO group seemingly figured out the algorithm to take this to the races and that advantage is worth well over $55 million. That is exactly why the Mexicans wanted the solution too. Most Mexicans are still believing that without the sim it is nothing, yet one call gave away the imei number and that number is a lot more useful than most consider.

And in the end it is Forbes who gives us the missing diamond going all the way back to August 2016. Here we are treated to: “looking at the domains registered by NSO, they determined Pegasus could have been used across Turkey, Israel, Thailand, Qatar, Kenya, Uzbekistan, Mozambique, Morocco, Yemen, Hungary, Saudi Arabia, Nigeria, and Bahrain, though there was no clear evidence“, in all this the one logical step, the one thought that no one has been willing to voice for a number of reasons. Turkey is on that list. So what if this was Turkey all along from beginning to end? Turkey, who had the solution to keep tabs on thousands of journalists, reporters and bloggers, and jailing hundreds of journalists, do you actually think that they are beyond killing a journalist? I mentioned a few yesterday, so you there is evidence all over the field and so far no actual and factual evidence has been given on any involvement of the Saudi Royal family, yet everyone is playing that card as often as possible.

I am not in denial, I am not stating that they are innocent, I am merely looking and hoping to see real evidence, and so far the absence of that investigation has been astounding. There is enough evidence on the involvement of Saudi’s in all this, yet the proper vetting of Turkish evidence by the media has seemingly been lacking. The press (and the media as a whole) merely pushed that same button again and again and it makes me wonder on the premise in which other ways we are (seemingly) being deceived. That is the clear consequence of orchestration, it makes us all doubt all the other evidence, and in light of the USA playing their silver briefcase WMD game in regards to Iraq, that has made us distrust a lot of other evidence, evidence that might have been valid, but we are in a stage where we no longer trust the messengers in all that and as the media and newspapers lose more and more credibility, we have started to treat most news as fake news.

That is the price of orchestration and the players remain in denial that it is happening. That is the part we see form a source called Foreign Policy dot com. The article (at https://foreignpolicy.com/2018/12/03/how-an-internet-impostor-exposed-the-underbelly-of-the-czech-media/), gives us: ‘How an Internet Impostor Exposed the Underbelly of the Czech Media. When politicians own the press, trolls have the last laugh‘, the article by Tim Gosling gives us: “Czech Prime Minister Andrej Babis—and expose just how easily disinformation can slip into the mainstream press, especially when politicians control it.” It is a mere introduction to: “In September, the Czech broadsheet Lidove Noviny published an op-ed by Horakova expressing support for Babis’s refusal to offer asylum to 50 Syrian orphans, as was proposed by an opposition member of parliament. Playing up to his populist pledge not to allow “a single refugee” into the Czech Republic, the prime minister said the country had its own orphans to care for“. It merely gives us parts to ponder, the amount of pondering increases with: “In tapes released by unknown sources onto the internet last year, for instance, he was heard discussing stories damaging to his political rivals with a reporter from Mlada fronta Dnes, which alongside Lidove Noviny is controlled by Agrofert—the agrochemicals conglomerate that is the centerpiece of Babis’s business empire.

I have written again and again against the media facilitation for the shareholders, the stakeholders and the advertisers, here we see the impact when the media and the shareholder are one and the same. That article from a freelance reporter who seemingly contributed to Foreign Policy, The Telegraph, Politico Europe, Deutsche Welle, World Politics et al. He shows that there is a much larger issue and that the difference between those bringing the news and fake news bringers is almost indistinguishable. We might give passage to the LA Times, the Washington Post, New York Times, the Times, the Guardian and several others, yet after that the mess becomes no longer trusted, mostly because the source is too unknown to us. The media did this to themselves through facilitation and until that changes fake news will have too many options to gain traction with the people influencing a populist political nation on a near global scale.

It is one of the reasons why I refuse to merely accept the view of people blaming Saudi Crown Prince Mohammed bin Salman for it all. There are too many intelligence gaps, too many parts of merely insinuated conjecture whilst the intelligence was not properly vetted and it happened for the most in Turkey (the consulate is Saudi ground). We might never ever get the answer of what truly happened, and to a very large extent it is because of the games that the media played from the very beginning. A game staged in innuendo, unnamed sources and people talking on the promise of anonymity. It is not the fact that these elements exist, it is because to a much larger extent too many of them were used at the same time, pressing the same directional button, most of it not scrutinised to the degree that was essential, and when contra dictionary evidence was found, those issues were ignored by the largest extent by all the media, that too is the foundation of fake news, we merely chose to ignore it, it is our emotional side and that is the bigger issue. People are no longer adhering to innocent until guilty, the media has become a ‘guilty until proven innocent machine‘ and that drives the populist agenda more than anything else, so I oppose them all by stating: ‘The Saudi government is one we needlessly fear, until we have conclusive evidence of their action that is the only way we should be‘. We have become puppets in a world where tyrants (Robert Mugabe), alleged mass murderers (Slobodan Milošević), criminals (shooters who were granted indemnity from prosecution) and paedophiles (Catholic clergy) get more consideration than any Muslim ever had, how sad has our world become?

 

Leave a comment

Filed under Law, Media, Military, Politics

The truth hurts

Even as the headlines hit us 3 hours ago, like the Herald Sun giving us ‘French remarks on Khashoggi prompt anger‘, we see the outrage from Turkish Foreign Minister Mevlut Cavusoglu and IO wonder if he comprehends how transparent the actions by turkey has been. Even as he gives us “Our intelligence shared information with them on Oct 24, including the voice recordings,” the political card is shown by his own admission. You see Jamal Khashoggi went missing and presumably died on 2 October 2018, so the tapes if they are authentic were created 3 weeks earlier, so that is the first piece of evidence right there. And even as some accept it, until the tapes are properly vetted, I will remain in doubt. The fact that this happened in a nation where well over 200 journalists are in prison for a very long time, in a country that is clearly allied with Iran, a nation in a proxy war with Saudi Arabia, I would be hard pressed to take anything at face value, yet the overall media has kept these two parts on the down low and some did make small mentions of that part, but for the most, the people were kept in the dark.

So when we initially see: “French Foreign Minister Jean-Yves Le Drian had questioned Erdogan’s weekend remarks that Turkey gave tapes relating to Khashoggi’s killing to the United States, Saudi Arabia, Germany, France and Britain. Le Drian said he was not aware that France had any tapes“, we need to accept that there is more and even as we see that Justin Trudeau has confirmed receiving the tapes, I wonder how much scrutiny the tapes will receive as it took 3 weeks to hand them over. In addition, when you look back at all the media, we see that games were played by both Turkish officials and the media as a whole, I wonder if I get my fingers on the tape, whether we will hear the dismemberment as was claimed last month. There is a whole range of issues with politicised evidence, it loses value overnight as it get to be put under scrutiny and in the end, will we be able to tell whether the person who was recorded to be under duress, was that really Jamal Khashoggi? You might take offense on this, but the reality is that evidence is either real or fake and it is the job in any investigation to discredit fake evidence, to merely accept evidence ‘as is’ is folly. In addition, the media claims will also impact the reliability of the evidence. that is the consequence of the media game when it is all about ‘clicks’ and then there is the circulation, all newspapers want as big a slice of the 56 million newspaper readers and we have seen how certain overpaid editors will go to seem more and more exclusive and scoop like. So as we now get to put the unnamed sources against the tape we will see the impact that it had, and perhaps it will hold up, I do not know, I never heard the tapes.

We also see the repeated claim: “Erdogan says the murder was ordered at the “highest levels” of the Saudi government“, whilst we merely get in confirmation: “Saudi authorities have acknowledged that the killing was premeditated“, the first cannot be proven, and the second does not warrant the first part. Even as we accept the entire setting of premeditation, we still have no idea where Mohammad al-Otaibi is, we have not heard anything from him or anything about his whereabouts and the media is not too eager to look there either, are they?

So when we see: “the kingdom of Saudi Arabia would detain or fire more than 20 people in connection with alleged killing of Jamal Khashoggi, Otaibi was not among them. He has not been heard from for weeks at this present day“, I looked at it, the Washington Post (at https://www.washingtonpost.com/world/senior-saudi-diplomat-in-istanbul-when-khashoggi-was-killed-drops-out-of-sight/2018/11/12/85f8e406-d7b1-11e8-8384-bcc5492fef49_story.html) is also still looking at it, but the bulk of the newspapers have either written him off, or have no idea how to exploit his situation at present, another political game still played and the Turkish government is silent on that too, merely some version of ‘he did not work out‘. The Washington Post also gives us: “Given his role as the senior diplomat in the consulate, Turkish authorities have been sceptical of the notion that Otaibi was an unwitting bystander to the killing“, I agree with that initial assessment. Even as I have seen government stages where it is easy enough to push through 15 people under the radar (the US does it all the time), the staging can be done in a few ways merely depending on the degrees of freedom that middle management in any policy environment has. You only need to retrace the steps of CIA rogue operative Frank Terpil to know that not only has it happened before, it has happened a few times. People like Lao Ta Saenlee who got almost free reign and intelligence worker happily looked the other way for a price and the irritating sturgeons that were nipping at the heel of Lao Ta Saenlee were removed, so that some people had their success stories. This is not new; it isn’t even original it is merely how some people stay in business by keeping other people in business. In that environment it is easy to push through half a battalion on people and whilst the successes go the other way, no questions are asked, because there is success. The CIA, the NSA, MI6, DGSE, Mossad. they all have their versions and they are all still operating under similar operative states, so I was not surprised on the 15 people and yes, there is a chance that there was orchestration on a higher level, but as Turkey decided to drip feed the media and people on accusations and ‘revelations’ these people got to hide into the Monty Python shrubbery of denial. They were not in ‘this’ shrubbery, they were in ‘another shrubbery’, so the people looked under the ‘S’, whilst they were already under the ‘A’ of accomplished, achieved and away.

The Washington Post also gives us: “Mehdi Eker, a lawmaker and senior member of Erdogan’s party, said the nature of Otaibi’s involvement could be determined if Turkish authorities were allowed to interrogate him as a witness. Eker said he is mystified as to why Otaibi was not among the Saudis arrested or fired over the case“, I agree. Mehdi Eker is as I personally see it correct and the fact that the media ignored it for weeks is still part of the problem. As they are to a larger degree not asking the questions, we are feeling not merely left out, we are left with the feeling that we are intentionally kept in the dark, making us question whatever evidence is shown even more. And it is there at the end of the Washington Post where we get one more gem. It is the quote: “Turkey’s public prosecutor said last week that Khashoggi was strangled almost immediately after entering the consulate on Oct. 2“, if that is true, then exactly who was tortured and dismembered whilst still alive? Perhaps you recall the part that several news outlets gave us on October 17, 18 and 19? The headline: ‘Recordings reveal Khashoggi tortured then dismembered while still alive‘. As we see that we get more and more conflicting parts handled to us, is it even a surprise that the evidence presented is called into doubt as valid evidence? So when French Foreign Minister Jean-Yves Le Drian gave us: “He has a political game to play in these circumstances” he gave us something that is as close as an absolute truth as truth is likely to get in this case. The evidence is all around us; it is shown in well over two weeks of articles. If only turkey had decided not to play the Iranian game and handed it all over, there would have been no issues and there would have been a total victory from the Turkish side, so at that point, as this never happened, is it not the most direct stage where we do not trust the evidence given to us? We all accept that Jamal Khashoggi is dead and possibly dies on October 2nd, yet so far there is no clear evidence on that either is there?

The fact that people classified as ‘enemy of Iran’ can travel all over Turkey unseen whilst they have the entire embassy wired, does that not contradict one another on a few levels either? It does not mean that it did not happen; he might have been dissolved as one source gave us two weeks ago, yet that also contradicts evidence in a few ways. All these questions and many papers aren’t asking them.

The truth hurts and the plain truth is that this was folly on several levels, first of all the Saudi side where something was allegedly optionally done in-house where the denial factor would have been removed. A stage where a model 24 from 400 metres would have finished a job outside of Saudi premises, the entire paperwork would have implied travels and honeymoon situations giving a non-peaceful opponent of Jamal Khashoggi even more options. Then there was the waiting on the Turkish side, whilst the implied evidence from the Turkish side would have broken the case open instantly, giving Iran what they desperately desired. this all points to the evidence being either tainted, or optionally fabricated, and the Turkish players got the media involved to make it emotionally worse making the evidence even less reliable all at the same time. That is merely the truth of the matter and the truth hurts, it really does in this case.

Oh and the partial denial from France merely indicates that French Foreign Minister Jean-Yves Le Drian might not have been on the recipient side, the question becomes who exactly were given the tapes for each nation, the fact that we do not see this question in the media, or revelation of those names by Turkey, who seems to focus on who did get it does not help much either.

It is scary as to what governments nowadays stage as competency in ‘execution’ of policy. It is even scarier to see all the elements that the media seems to skate around (almost non stop I might add).

 

Leave a comment

Filed under Media, Military, Politics

The price of identity

We all have needs, we all have identities. It is important to us, as it is for many others. No one debates or disagrees with it. Yet what to do when identity hinders us? When we see the Washington Post (at https://www.washingtonpost.com/world/national-security/former-nsa-deputy-is-mattiss-leading-choice-to-head-the-spy-service-if-it-splits-from-cyber-command/2018/10/05/1be8d7a8-c73d-11e8-b2b5-79270f9cce17_story.html) giving us ‘Former NSA deputy is Mattis’s leading choice to head the spy service if it splits from Cyber Command‘, we need to consider the impact of identity, corporate identity, governmental identity, military identity, projected and presented identity. They are not the same and can vary to a much larger degree. When someone is part of what used to be referred to ‘No Such Agency‘. We will get the impact of identity; we all know that and many faced it too. Look at any friend or co-worker you have ever known and ask him/her about the impact of a merger and they will tell you, there are changes. Some are subtly, some are not noticed, yet others are, usually in infrastructure and the way things were done. Now the change tends to be for the good in the long run but that is not a given.

So what gives?

It is my personal observation and a highly speculative one at that. Yet I believe that the Washington Post giving us: “The current head of both organizations, Gen. Paul Nakasone, has urged Mattis to keep the NSA and U.S. Cyber Command under one leader on the grounds that the nine-year-old military organization is not ready to stand on its own, these people said. In recent weeks, Mattis was close to a decision to separate the leadership arrangement, but Nakasone’s counsel has caused him to reconsider, according to two U.S. officials. The officials spoke on the condition of anonymity to discuss sensitive internal deliberations“, is not entirely accurate. I believe that ‘military organization is not ready to stand on its own‘ is not the setting that matter. I believe that Stratfor who gives us ‘A New, More Aggressive U.S. Cybersecurity Policy Complements Traditional Methods‘ is very much at the heart of that. I believe that the general is not ready or perhaps unwilling to set the offensive and aggressive part in motion. Now, this is no bad reflection on the general, let that be a first. He is well decorated, he has seen the field in many ways and he has done a fair share of field events. He has earned his rank. I merely wonder that a man who has seemingly played a defence and protection game is the man for the offense. I think that this is a football moment, and as a non-football expert (and a 49ers fan) I would compare the General to DeMarcus Lawrence from the Dallas Cowboys against what the US seems to demand is a Derrick Henry (Tennessee Titans), or even a Tom Brady (New England Patriots), roles that are not really moveable. Even as a Quarterback might become a really good Derick Henry that Quarterback will never become a DeMarcus Lawrence. The defence and offense game is that far apart. This is where Chris Inglis comes in. He is an analyst (at heart), he is used to counter offensive strategies and introduce strategies of his own (effective one’s mind you). I believe that this is the game that is in the open at present and these two will need to find a way to make it work. Not merely because it is good for the needed strategy, but because the segregation of the two elements might hurt U.S. Cyber Command in a few ways, not merely funding, but the elements that U.S. Cyber Command currently have access to will partially fall away and getting two infrastructures like the NSA is unyielding, unaffordable and in the end will introduce flaws and dangers on both sides of the isle making the setting (as I personally see it) a non-option right of the bat. Stratfor gives us a few other items.

One of them is “A best-case scenario for a U.S. cyberattack would be disabling computer systems and networks being used against U.S. interests to prevent an attack from happening or to disrupt an attack that is in progress“. The problem there is that some of the opponents are getting to be really good at what they do and a few of them are not state driven, not by any state changing the dynamics of the solution. Even as I discussed the hop+1 strategy almost three years ago, settings like that require an expert layer one knowledge and the players cannot both have these experts changing the needs of the infrastructure overnight.

The second consideration is: “Perhaps the main challenge to U.S. engagement in tit-for-tat cyberattacks is that the United States is by far the biggest target for such attacks“. That might be true but that goes beyond mere true enemies, it includes a truckload of students wanting to finger the man (or is that giving them the bird)? Do they really want to waste resources to those people whilst the US has actual enemies in the world?

The larger issue is seen with: “Discussing the strategy, national security adviser John Bolton hinted that the administration had already taken steps to bolster offensive efforts in recent weeks, warning that the United States is no longer just playing defense when it comes to cybersecurity. But despite the Trump administration’s more hawkish tone regarding cybersecurity, it will continue mainly to rely on traditional measures such as the legal process, regulations and cooperation with the private sector when it comes to cybersecurity” It is here when we get the consideration of the resources required. The defence, offense and legal sides of it all becomes a real mess if the two split up giving the chance that targets and issues walk away on technicalities. How does that help?

The strategy s even more profound when we consider “Clandestine, discreet attacks are certainly already key elements of U.S. cyber tactics. There have likely been more examples of U.S.-launched attacks that have not come to light, perhaps because they were never recognized as cyberattacks. While the less known about U.S. cyber capabilities, the more effective they will be when deployed, this by definition limits the deterrence value of U.S. cyber capabilities“, at this point is the setting of ‘discreet’ that comes into play. With the two separated they will get into each other’s fare waters and more important give accidental light to the discreet part of the operation, there will be no avoiding it, only the most delusional person would think that it does not get out when more than one player is involved, because that will always introduce a third item being the intermediary, the cold war taught many players that part of the equation. And that is even before we get to the statement: “recent cases like the September indictment of North Korean cyber operatives, which displayed heavy FBI reliance on private security firms such as Mandiant and Alphabet to collect technical evidence and carry out investigations“, now we see the folly as Mandiant and Alphabet are mentioned, the entire matter grows further as soon as Constellis becomes part of the equation. That is beside the point of realising (highly speculative on my side) that neither three Mandiant, Alphabet and Constellis have the required safe servers in place to prevent names, places and facts from going out into the open. I might not be able to get in, but there are dozens who will get in and that voids the security of the matter to a much larger degree. For arguments sake I will leave Booz Allan Hamilton out of that equation, they have been snowed on long enough.

And even as we see the instance of legal preference, the US must realise that any attack from state or non-state parties in China or Russia has close to 0% of being successful (outside of the exposure part), the entire matter in case of the OPCW in the Netherlands is one. An attack was thwarted, yet was it THE attack? The guardian article (at https://www.theguardian.com/world/2018/oct/04/visual-guide-how-dutch-intelligence-thwarted-a-russian-hacking-operation) reads nice, and we see all these facts and from my point of view, things do not add up. You see, I would have used the car that we see mentioned “In the boot of their car was uncovered an arsenal of specialist electronic Wi-Fi hacking equipment” as a fire and forget consumable, use it as an access point, segregating the hacker from the accessing unit. When you have (as they stated) “cash: €20,000 and $20,000” getting a second car far enough to access yet not be directly linked is seemingly easy enough. Then there is the setting of the photo at Amsterdam’s Schiphol airport. I am not debating the issue of the photo, it seems genuine enough. In this operation they did not fly to Germany and took the train, or take a car and cross at Oldenzaal, Emerich, or even via Belgium and enter via Antwerp, or Eindhoven. It almost read like they wanted to get noticed. They know that Amsterdam Airport is high tech and nothing escapes their camera eyes. To me (a paranoid me) it comes across as ‘Where did they not want us to look‘. A mere sleight of hand deception, and again the entire GRU mention. A phone outside of that building and they had the taxi receipt? No one merely driving them to the airport in Russia or even them taking a bus from any hotel in Moscow. No a taxi receipt of all things, is anyone buying that? So in this it is not the Dutch, it is the Russian side that makes no sense at all.

How did I get there?

This is the initial setting of offense and defence. The proper application of strategy in all this matters, because we seem to undervalue and underestimate the need of either in all this. Because we get to push a button anywhere and anytime we seem to underestimate on what is recorded, what is collected and what can we verify. That entire mistake is how any offensive strategy can optionally become folly from the moment the instigation of ‘press any key‘ to start gets us. Proper offensive is not about doing what needs to be done, it is about being able to prove who did what. Perhaps Sony remembers that part as they were given that it was North Korea did something, whilst their computers were not even close to PC gaming ready, the mere processor, which was about 25% (at best) of a 1994 Silicon Graphics Indigo system is not the system that gives you what you need to hack the night away. The tools are equally as important as the access and ability to negate identity. When you see that part, the entire hop+1 intrusion path makes a lot more sense.

This now gets us to the end of the Washington Post, where we were treated to: ““As the build of the cyber mission force wraps up, we’re quickly shifting gears from force generation to sustainable readiness,” Nakasone said in a statement in May. “We must ensure we have the platforms, capabilities and authorities ready and available” to carry out successful cyber-offensives. Some former senior intelligence and defense officials oppose separating the “dual-hat” leadership arrangement, including former NSA Director Keith Alexander, former Director of National Intelligence Mike McConnell and former Defense Secretary Robert Gates. This week, former CIA Director David Petraeus, a retired Army general, said during a Washington Post cyber summit that he’d keep the dual-hat arrangement “for the time being.”” It is not merely the ‘we have the platforms, capabilities and authorities ready and available‘, you see, when we get to capabilities we see the need of offensive players and even as Cyber command might be aces in their field, the offensive game differs to some degree and even as we see that they are way above the student levels, we get back to the Football equivalent you see the application of defence and offense. It is not DeMarcus Lawrence versus Derrick Henry, the question becomes can DeMarcus Lawrence be a Derrick Henry that is good enough, that is the battle within. The mere realisation that if you fail this when the offensive is broken into a train wreck that makes the limelight in every paper, that is the game that is the dilemma that Gen. Paul Nakasone faces as I personally see it.

And when we see Stratfor with the one little gem we did not consider, the mere proposed fact that North Korea has a mere 9,000 IP Addresses, do you really think that they could have done this all, or are we in a setting where someone had the ability to act on BGP hijacking and was able to mask it to the level it needed to be masked at, because that was the offensive play that needed to be considered and there was no way that the evidence had been uncovered to that degree with a backdoor could be removed with a simple reset of routers.

#FourtyNinersRule

 

Leave a comment

Filed under IT, Law, Media, Military, Politics, Science

When inability drives fear

It is a dangerous place to be in. We all have been there and in most cases it is as innocent as it could ever be. You see, sometimes life throws you a curveball. Gamers tend to identify it most easily. In my particular case it was a game called Magic Carpet. It was a Bullfrog game and I was testing it on the PC. It played magnificently there, and soon thereafter I also tested it on the very first PlayStation. There, because of the controller it was good, but not great. Still, it was fun to play and I tended (in those early years) to really get into a game, so when the situation blew into my face, I got a little frustrated. The next two times were worse and the last time (on that day) I went slightly angry (with myself) and I kicked the door. The issue was not the door, it was my steel tipped boot and I went straight through the door, so, I was not merely ticked off, I had a hole in the door (which would require funds to repair) and the boss in Magic Carpet was still alive. We all have had these moments. Our car, our bike, the TV, things go wobbly on you and we sometimes react wrongly to this situation and in light of that get to reflect on our own ego’s a little.

These are the images going through me when I was confronted to new information when looking at the unrealistic response by America (and Australia) to Huawei. In the case of Australia it seemed the mere application of greed and fear as politicians cater to the greed of a large telecom company, which was not seemingly the case with America. Yet that tip was raised for me less than 24 hours ago. The article (at https://foreignpolicy.com/2018/08/15/botched-cia-communications-system-helped-blow-cover-chinese-agents-intelligence/), shows how the CIA got their own systems handed to them through ego and what I would regard as stupidity. The initial headline ‘The number of informants executed in the debacle is higher than initially thought‘ is rather unsettling. It gets to be worse with “The CIA had imported the system from its Middle East operations, where the online environment was considerably less hazardous, and apparently underestimated China’s ability to penetrate it. “The attitude was that we’ve got this, we’re untouchable,” said one of the officials who, like the others, declined to be named discussing sensitive information. The former official described the attitude of those in the agency who worked on China at the time as “invincible.” Other factors played a role as well, including China’s alleged recruitment of former CIA officer Jerry Chun Shing Lee around the same time.” This is the most dangerous of settings. The wrongful setting comes straight from Sun Tsu where we learn that all war is based on deception. China is not some place that is tinkering at the side of the road, the Art of War COMES FROM CHINA! It gets to be worse when you consider that that book was written long before Americans had adopted proper reading and writing skills, close to 1200 years before that, so that was their first error.

When we see: “But the penetration of the communication system seems to account for the speed and accuracy with which Chinese authorities moved against the CIA’s China-based assets. “You could tell the Chinese weren’t guessing. The Ministry of State Security [which handles both foreign intelligence and domestic security] were always pulling in the right people,” one of the officials said. “When things started going bad, they went bad fast.”“. The entire matter seems to be exponentially wrong. The big issue is not on how it was cracked, or even if it was cracked. My issue had been (for a much longer time now) that for too long, the deciding voices, all listening to some CTO, often with multiple sides lacking wisdom that the setting was not merely that there was ‘a security risk’, there was for the longer time a much larger security flaw. For much too long a time, we got the ‘slides of wisdom’ on how data in transit tends to be safe and data at rest tended to be in danger. Even when I started my CCNA, the amount of knowledge given in the Cisco books gave the rise to the consideration that data in transit is not merely as vulnerable, it was that a lot more could be done unnoticed (not merely by the Chinese mind you). It was some time before the Sony hack that I expected a setting where the routers themselves might be used against the owner, it went further when we consider Wired in 2013 (at https://www.wired.com/2013/09/nsa-router-hacking/). The headline is not merely ‘NSA laughs at pc’s, prefers hacking routers and switches‘. It is the setting where we see: ““No one updates their routers,” he says. “If you think people are bad about patching Windows and Linux (which they are) then they are … horrible about updating their networking gear because it is too critical, and usually they don’t have redundancy to be able to do it properly.” He also notes that routers don’t have security software that can help detect a breach“. This is where I was in 2011, when I started to comprehend the working of a router and router tables, I figured out that it is not the router they can see that is the problem; it is the one they cannot see. That idea came from a presentation by Thomas Akin, CISSP, Director, Southeast Cybercrime Institute who had a presentation for the Blackhat briefings. The 2002 presentation gave me the idea. You see apart from the lack of security, the +1 hop hack allows form something truly unique. Consider [.MIL Server], that server connects to <secure router 1> and things are set into motion. Now, we cannot direct all the traffic, yet materials from that location to let’s say ‘preferred consultant one‘ will go via certain paths, yet the first router after <secure router 1> tends to be merely one or two routers (depending on traffic) to that preferred consultant. It is easy to find a router that could optionally be a link to these routers and duplicate all packages that go to that specific next step. Not only is the task easily done, the path is not hindered, the router is not intervened with and a simple reset takes away whatever evidence existed in the first place. In addition, the additional part is that the compact flash in those routers is ‘The maximum storage capacity for the CF in Slot0 and Slot1 is 4GB‘, yet the only part here is that you only needed 32 MB, which is what most of us used then, but cards that small are no longer made, so most IT people just plug in what they have. You have well over 3GB of package storage, so all packages to that one location could be stored and redirected on the ‘off’ hours as not to leave any monitored spike. Until the CFlash card is ejected from the router and investigated no one will have a clue. That was 7 years ago and the systems are even more capable now, a 3GB glitch will not register on most systems, especially when those IT people do not block Spotify and/or YouTube. By the time they figured it out, the setting is already wiped, and this path can be adjusted on a daily bases so that most IT networkers never had a clue in the first place.

You think that I am alone in this, that I am this clever? No, I am not! There are plenty of IT Networkers running circles around me and that is now set into the stage of ‘we’re untouchable‘. The CIA was never that, they never needed to be touched, the opponent merely needed a clear line of sight to the router that is one skip from the secure router that they needed to get to. We see more in the Foreign Policy article with the quotes “Information about sources is so highly compartmentalized that Lee would not have known their identities. That fact and others reinforced the theory that China had managed to eavesdrop on the communications between agents and their CIA handlers” and “an encrypted digital program, allows for remote communication between an intelligence officer and a source, but it is also separated from the main communications system used with vetted sources, reducing the risk if an asset goes bad“. Now we merely add “But the CIA’s interim system contained a technical error: It connected back architecturally to the CIA’s main covert communications platform. When the compromise was suspected, the FBI and NSA both ran “penetration tests” to determine the security of the interim system. They found that cyber experts with access to the interim system could also access the broader covert communications system the agency was using to interact with its vetted sources, according to the former officials“. I believe it goes further than that. If we see the entire layer process and consider that in the end, certain systems merely replicate a process. Cisco (at https://www.cisco.com/c/en/us/support/docs/lan-switching/8021q/17056-741-4.html) gives us: “A device can determine which VLAN the traffic belongs to by its VLAN identifier. The VLAN identifier is a tag that is encapsulated with the data. ISL and 802.1Q are two types of encapsulation that are used to carry data from multiple VLANs over trunk links”, as well as “The DA field of the ISL packet is a 40-bit destination address. This address is a multicast address and is set at “0x01-00-0C-00-00” or “0x03-00-0c-00-00”. The first 40 bits of the DA field signal the receiver that the packet is in ISL format“, so as the destination was known, the people needing this could search very specifically. When we consider ‘It connected back architecturally to the CIA’s main covert communications platform‘, the connection back would enable those seeking to find the needed value of the DA field. That does not merely impede the CIA, it stands to reason that to some degree the NSA would be just as vulnerable.

The main course

In my case, I tend to go for the Bambi burger, ideally I watch Bambi whilst having that lovely slice of venison. You see when we get to “As part of China’s Great Firewall, internet traffic there is watched closely, and unusual patterns are flagged. Even in 2010, online anonymity of any kind was proving increasingly difficult. Once Chinese intelligence obtained access to the interim communications system,­ penetrating the main system would have been relatively straightforward, according to the former intelligence officials. The window between the two systems may have only been open for a few months before the gap was closed, but the Chinese broke in during this period of vulnerability“, I believe the setting is worse than that. These players still require their consultants. It does not matter whether you call them construction workers, members of Blackwater, Xe Services, or Academi. It is those places as well as Booz Allan Hamilton and other providers that still require to be informed, and that is where the interception could start. The setting is not ‘the Chinese broke in during this period of vulnerability‘, it is the long term flags that they were able to test at this point and that is the fear we see with their setting of Huawei and partners. Not that Huawei is the danger, but the fact that Chinese intelligence is just as able to get into nearly all systems, it merely can get into Chinese systems faster (for now). This is where it gets a little more complicated, because it is not about the now, it is about tomorrow and the tomorrows that are coming. The only ones who have a chance of getting things done are players like the Constellis Group and Palantir when they unite abilities. It is going to be about data and about the ability to forecast how traffic goes. Thomas Akin was teaching this wisdom 16 years ago. We see this when we are made to realise

  • Live system data is the most valuable.
  • Immediate shutdown destroys all of this data.
  • Investigators must recover live data for analysis.

And the loss is merely a reset away, in most cases if there is an automatic reset; the only data available is the last transgression at best. With the coming of 5G live real-time capturing data streams is what is more likely to set the stage of finding out what happened, in this the entire setting of ‘China’s Great Firewall‘, we are already looking at outdated Chinese technology and I do believe that those behind the article, as well as some DARPA people are aware of that. America and Europe are behind in ways that we cannot even perceive, because the players that need to move forward are doing so iteratively, that whilst the time of reengineering is now merely 10% of what the development time was. We see this with “Call this the IBM problem, which faced an existential threat as soon as Asian groups started churning out cheap PCs in the 1990s. But here IBM also provides a few tips to the future, with its pivot to software and solutions. By the time of IBM’s iconic “solutions for a small planet” ad campaign in 1996, the company was trumpeting voice recognition and ecommerce — producing the sort of digital enterprise backbone that ended up helping develop the internet economy” (source: Australian Financial Review). In the first instance the Asian market required 10-15 years to catch up, the second time around it took 2-3 years and now with Google and Apple working globally, it takes months. IBM (others too) took iterative steps to maximise the economic footprint, instead of truly leaping forward whenever possible, they lost the advantage and are now trailing the markets. Huawei is one clear example where the American market was surpassed. Samsung showed its supremacy by having 5G home routers ahead of everyone else and the advantage in Asia is only growing. It is seen with “Alternatively, authorities might have identified the system through a pattern analysis of suspicious online activities. China was so determined to crack the system that it had set up a special task force composed of members of the Ministry of State Security and the Chinese military’s signals directorate (roughly equivalent to the NSA), one former official said“. I do not read this part in the same way. I believe that with ‘set up a special task force composed of members of the Ministry of State Security‘, was not about cracking. I personally believe that the Cisco books were so illuminating that they decided to change the setting in their own game. I believe that the Chinese now have a more advanced system. They have done what players like Cisco should have done before 2014 and they did not. I believe that when we see a partnership between Constellis and Palantir, their findings will bear that out with in addition an optional link that shows part of the accusation that China let Russia in on certain findings (and the Russian evolution of certain networking devices). This and the next part is largely speculative, but it is supported to some extent. We see this in: “Once one person was identified as a CIA asset, Chinese intelligence could then track the agent’s meetings with handlers and unravel the entire network. (Some CIA assets whose identities became known to the Ministry of State Security were not active users of the communications system, the sources said.)“. I believe that he part given in ‘not active users of the communications system‘ gives us the third part. I believe that the system was not merely invaded. There is every chance that certain systems when activated also leave tags behind and that is where the intrusion would have paid off. You see, in the Cisco setting (as an example), the data frame has an optional 60 bytes of extension headers, yet is that always empty? More important, when were these data packages truly thoroughly checked? In this speculative setting I take you to the movie Die Hard 2. In that movie we see on how someone decided to get clever and uses the outer marker beacon to warn the planes that were in danger. The beacon can be used in other ways than merely give a beep. I believe that Cisco data packages have other optional parts than can be ‘reused’ to do something different, like the optional headers. They are to most merely empty pre-set ‘spaces’, but they could have more. That is the setting that America faces and the fact that they could get overwhelmed by Chinese intelligence because they did not rely on iterative parts. Huawei had been leaping forward, for example now offering a 128GB Android 8.1 phone (the Huawei nova 3i 128GB Handset), for 50% less than its competitors. A system that is just as advanced as anything Apple and Samsung offer; at merely half the price whilst Chinese Intelligence has been digging into that device for months, unlike the NSA that needs to queue up with all the other users to get to look at the Pixel 3 and the iPhone 8 on launch day. That is the setting we seem to be seeing and America is indeed and rightfully worried, not because Huawei has backdoors (which I never really believed) but because the players here had been held backwards through iterative technology. Apple is actually staged by Forbes that way with the quote ‘a minor point update for the iOS 11.1 iteration‘, even Forbes speaks about iterative changes. That is the setting that they are up against and they have been surpassed for years and with Huawei leading the 5G stage on a global setting the US authorities are merely getting more and more afraid that not only are they no longer the leading players, they are now sidelined by not being able to keep up with what will be presented ‘tomorrow’.

That part can be supported through the CIA with analyses reports (at https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol49no3/html_files/Collection_Analysis_Iraq_5.htm), in here we see that Richard Kerr, Thomas Wolfe, Rebecca Donegan, and Aris Pappas give us (in a different context): “The analysis on this issue by the Intelligence Community clearly was wide of the mark. That analysis relied heavily on old information acquired largely before late 1998 and was strongly influenced by untested, long-held assumptions. Moreover, the analytic judgments rested almost solely on technical analysis, which has a natural tendency to put bits and pieces together as evidence of coherent programs and to equate programs to capabilities. As a result the analysis, although understandable and explainable, arrived at conclusions that were seriously flawed, misleading, and even wrong“. It is important to realise that this was on the WMD setting, so in a different context and on a different setting. Yet the information systems were all designed to upholster that flaw to an ‘evolved’ placement, the systems in their entirety are nowhere near ready, now even for the previous setting. The movement from a lot of staff to more fruitful consultant settings is now paying off in a negative way for the CIA (and the NSA too). This is where it gets interesting. You see, the previous setting that I gave should partially have been dealt with through the flashlight program that DARPA has. Raytheon BBN is working on that with Professor Richard Guidorizzi from George Mason University Fairfax. I think that the system is not entirely ready here, not if the packages can be duplicated via the router and as long as the original is not touched, that system will not get the alert lights ringing.

To get you on board on how far all the NATO partners are behind, let me give you two settings. The first is a DARPA Project called ‘Probabilistic Programming for Advancing Machine Learning (PPAML)‘, the man in charge is Dr. Suresh Jagannathan, yet the bigger brain might be MIT graduate Dr. Jennifer Roberts. The given setting is “Probabilistic programming is a new programming paradigm for managing uncertain information. Using probabilistic programming languages, PPAML seeks to greatly increase the number of people who can successfully build machine learning applications and make machine learning experts radically more effective“, whilst we also see the goods in the DARPA article by Dr Roberts with “If successful, PPAML could help revolutionize machine learning capabilities in fields from Intelligence, Surveillance and Reconnaissance (ISR) and Natural Language Processing (NLP) to predictive analytics and cybersecurity“, this is certainly leaping forward, but it is still based on a system. I believe that the Chinese decided to turn the funnel upside down. To illustrate this I need to get you to an app called Inke. The article (at https://thenextweb.com/contributors/2018/02/09/hidden-world-chinese-livestreaming-app-inke/), gives us ‘The hidden world of Chinese livestreaming app Inke‘, this is not a few people; this is a craze that has already infected millions upon millions. So with “he was actually doing a livestream, an extremely popular hobby for young people in China. China is way ahead of the rest of the world when it comes to embracing livestreams.” you are missing out and missing out by a lot. These streams are real-time and often geo-tagged. I believe that the Chinese have changed the setting, they are optionally collecting Terabytes of daily data and they are converting that to actionable intelligence. Facial recognitions in phones, geo-tagged and all uploaded and streamed, all converted on the spot, like the SETI screensaver, millions of affordable mobiles (this is where the Huawei nova 3i 128GB Handset and all other new handsets come in), parsing all that data into uploaded files and Chinese intelligence gets global information close to real time, whilst their learning machines are about efficiencies of collected data, it is not about the better application by making them more effective, it is about the massive amounts of data offered to get the systems to upgrade the efficiency of parsing data, because parsing data is where the bottleneck will be in 5G and they already have a larger advantage.

In the meantime, on any given day thousands of Inke users are filming life around them in malls and famous places looking awesome doing it. Yet, if you look at the CCTV settings, how many users would have passed 935 Pennsylvania Avenue, Washington DC, or at London SE1 9EL, UK walking towards London Bridge? How many people were merely assuming that they were tourists face timing with mom and dad? Are you getting that picture now? and also realise that Inke is merely one of more than 300 live streaming companies, all capturing that data all those tags that a smartphone allows it to capture and at the top of all this, Facebook and YouTube are eagerly pushing people to gain following by doing just that. So how long until the user realises that uploading the same stream to 2-3 providers gets them to gain a lot more following and optionally cash? Yes, the intelligence community is that far behind at present. So when we are worrying on “The system was not designed to withstand the scrutiny of a place like China, where the CIA faced a highly sophisticated intelligence service and a completely different online environment“, we need to consider that China is already ahead of the game and the CIA systems might be merely an option to scrutinise their own data, because that remains the Chinese bottleneck, the data will require verification and that is the one field where their opposition could gain the advantage if they set their minds to a different algorithm, one on reliability, not on likelihood. It is a setting where all the players involved have a second tier of consideration. They embrace a ‘not now, but soon‘ thought, when ‘I needed this yesterday‘ is the proper setting as I personally see it, because data without proper vetting is merely used space on any given storage device.

That final part can be considered when we look at the linked article that NBC had from last January. There we see: “When agents searched Lee’s hotel rooms in 2012, they found notebooks with the names of covert CIA sources, according to court documents. But not all of the agent arrests and deaths could be linked to information possessed by Lee, who left the CIA in 2007“, an issue I mentioned in an earlier blog. We get there when we consider his actions and ‘found notebooks with the names of covert CIA sources‘, do you think that anyone, especially in this setting would be that stupid? It’s like keeping the condom as a trophy after having intercourse, its useless and stupid. I believe that either it is not the ‘covcom’ system, or not merely the ‘covcom’ system. I believe that (if it is all correct) that Chinese intelligence got in further and deeper into acquiring the data required and the notebook is the proverbial red herring in all this, especially as Jerry Chun Shing Lee left the CIA in 2007. You do not hold on to that level of information 11 years after you might have had some level of valid reasons to have it in the first place. That is the part many overlooked, or looked away from.

In the end, I do believe that it is not merely the inability that drove the anti-Huawei waves, it is the fact that those decision makers have no idea where to navigate towards next is what drives their fears almost exponentially.

 

Leave a comment

Filed under IT, Military, Politics, Science

Rocking the bullshit

There has been a massive issue with Huawei, the accusations by the US is the largest one, one of its sheep (aka Australia) has been on the same post on how Huawei is such a large danger to the safety and security of a nation. It gets ‘worse’ when we see ‘The DNC tells Democrats not to buy Huawei or ZTE devices ever’, (at https://www.theverge.com/2018/8/3/17649920/dnc-democrats-huawei-zte-devices-ban-china-hacking-threat). Here we see the quote “people shouldn’t be using devices from either Chinese company for work or personal use. The words echo what federal officials have already said about Huawei and ZTE posing possible security threats to the US. In February, CIA, NSA, and FBI chiefs testified in front of a Senate committee that the two companies were beholden to the Chinese government and the devices could become tools for undetected espionage“, my issue has always been: ‘show me the evidence!’ Basically EVERY phone can be used as a spying device, that is one clear thing we got out of the Cambridge Analytica part, in addition, the Fitness tracking app Strava was a great way to find CIA black ops bases, so even as Strava merely mapped ‘a regular jogging route’, using Google or Apple maps, you would be able to map out the base, the supply routes and so on, the Apple Fitbit would be there for the Russian government knowing where these specialists were and when the were there. So in all that, and all the security transgressions seen here, not of the were Huawei or ZTE, yet, how much noise have you heard from the CIA, NSA, or FBI on Apple? Even now, they are that one Trillion dollar company, are they too big to mention?

I wonder why?

Yet, Huawei is not out of the hot water yet, they are actually in deeper hot waters now but this time it is allegedly by their own actions. Reuters is giving u mere hours ago: ‘Huawei in British spotlight over use of U.S. firm’s software’, the news (at https://www.reuters.com/article/huawei-security-britain-usa/huawei-in-british-spotlight-over-use-of-us-firms-software-idUSL5N1US343) gives us: “One of those is due to Huawei’s use of the VxWorks operating system, which is made by California-based Wind River Systems, said three people with knowledge of the matter, all of whom spoke on condition of anonymity when discussing details which were not made public in the report“, which now leads me to the setting that the American accusations are set on the premise of American Software used? How dopey is that?

Then we get: “the version of VxWorks being used by Huawei will stop receiving security patches and updates from Wind River in 2020, even though some of the products it is embedded in will still be in service“. In all this, the fact that it is still serviced for another 2 years, how are we now in the stage of: “potentially leaving British telecoms networks vulnerable to attack“? Is that not equally a questioning setting? Do we not have enough issues out there with Microsoft which has been nearly forever a security concerns, at this point, 2 years early we get the security warning on Huawei, yet not on Microsoft or Apple for that matter, in all this Google is equally a place of patches, and in all this, Huawei is the one getting unbalanced and unfairly burned at the stake like a Catholic at an Elisabeth I barbecue gathering.

Yet the good stuff is “All three sources said there was no indication that the VxWorks mismatch was deliberate. There is also no suggestion that the software itself represents a security risk“, this now leads us to two parts. The first is if it is true that ‘no suggestion that the software itself represents a security risk‘, does this mean that Huawei never had a security risk and if that is incorrect, why not present that evidence so that every Huawei Owner can test for this transgressions ending whatever future Huawei had in the first place.

In the second part, if there is no proven security flaw in the Huawei on hardware, is the security flaw a software one, or better stated an American software one, and if so, why are these people only going after Huawei and not after a dozen American firms?

The one part that we see in Channel News Asia is “Consultant Edward Amoroso, a former chief security officer at AT&T, said Huawei’s experience in Britain showed the challenges of securing international supply chains. Although no one should dismiss Huawei as a supplier solely because of its geographical location, reliance on software that is going out of support is a legitimate concern, Amoroso said“, the news (at https://www.channelnewsasia.com/news/business/huawei-in-british-spotlight-over-use-of-us-firm-s-software-10590268) gives the part that does matter, in this Edward Amoroso is right, software at the end of its reign is often the true safety concern, not merely because of the time frame, but in extent the time required to properly update the software on all the devices, which is not always a smooth path and tends to open up additional security gaps. In that part of the equation Huawei does have a legitimate problem to address. The second part to all that is “In addition to the issue with VxWorks, this year’s report also cited technical issues which limited security researchers’ ability to check internal product code“, I believe it to be a minor part and the proper investigators could seek or test for the issues, not merely that, the limitations also remove whatever options there are for zero day breaches, which has a much larger legal frame to address. So even as we agree that the US setting of accusation without evidence (proper presented evidence is merely the stuff that makes the grass grow in Texas). We also get that the US is giving us: “In the United States, the Pentagon is working on a “do not buy” list to block vendors who use software code originating from Russia and China“, there is an actual thing called national security and as such, it is their right to implement that part, I do believe that in the end it might be somewhat counterproductive, but it is still within their rights to be in such a setting nor no other reasons.

In the end there are a few issues in the field and some are out there, but with a lack of technical details, some cannot be proven, yet the fact of what some have done in the past might give the setting of ‘is it more likely than not that some do not really have 5G‘ is a true setting, yet I prefer to have the actual evidence, that some are trying to keep buried, and the media is part of that chase, which is odd to say the least. Huawei is bouncing back and forth and their hold to grow fast via the UK will be there, but from my point of view, they will need to fix the VxWorks part a lot faster than they think they need. From my estimation a new software solution should be well beyond the Beta stage in Q1 2019 if they want to have any chance of keeping their lucrative growth contracts in place. In equal measure we need to look at Canada and Australia, as they are currently set to be nothing more than US tools in all this. In all respects no actual and factual evidence was thrown out in the open. If that was done Huawei would have lost pretty much every non-Chinese contract, the fact that the BS is spread even larger with absence of evidence gives more reliability that there is no real security danger and it is more a tool for some to get the slice of 5G pie, probably at the expense of a monthly data dump, nicely mailed via UPS to: N 11600 W, Saratoga Springs, UT 84045, USA. That alone should give us the goods on who to trust and who to be cautious of. In all this, no evidence has been presented to the public (and their right to know) on how Huawei is a threat to our security. The fact that I believe that this is all bogus in one thing, the issues seems to be blown up as everyone takes a queue from John Bolton, that whilst the setting “Five Eyes is an alliance between Canada, New Zealand, the United States, Australia, and the United Kingdom that facilitates collaboration in intelligence activities” gives us that there are three in the dark, the UK might be around with the knowledge and the rest merely takes a queue form the US, which has seemingly been whispering like they did in the WMD in Iraq phase, you do remember that in the end, they were never found and it was merely bad intel. So in that setting whilst Corporate America, Canada and Australia are all in fear of their gap against leading Huawei, in that setting we are supposed to have faith on the American gospel on what constitutes a danger from Huawei? And now that we are made aware that the software solution used is an American one?

Yup, we have all kinds of problems and some are valid issues of concern as Edward Amoroso phrases it. Yet between a setting of concern and an actual concern is a mile long gap and whilst we acknowledge that Huawei has some fixing to do, until actual evidence is shown that there is a security breach, the only thing that the US can do is to offer a $229 instant price match for the Apple, or an $100 instant price match for the Google Pixel 2, or a $400 instant price match for the Samsung 9, why would anyone in this day and age pay more for the same, actually, with the enhanced batteries of Huawei you will still miss out, but that might be the smallest cross to bear. All this because some players just didn’t get the pricing right, too many fingers on the margin pie, that alone seems to unbalance the entire equation, because all these players will miss out when Huawei is given free reign there. In this the equation is no longer about security, it will be merely about greed and those enabling for it. Is that not equally important an element to consider?

I’ll be honest, I am still happy with my Huawei P7, it was really affordable against anyone offering anything and after 3 years working 24:7, where would you think I would look first? The one who had proven himself, or the one overpricing its brand (OK, with the Pixel at a mere $100 more, that is still an awesome deal).

When we decide on pricing it is one, when unreliable players in the game force us away from the affordable option it becomes a different stage and so far, the US has proven to lose reliability again and again when it comes to their version of security. To emphasize on that, check on all the printing regarding the Landmines in Yemen placed by the Houthi and the amount of articles that we see in the NY Times, the LA Times and the Washington Post. Now consider the impact of mines and why Americans seem to be eager not to inform you. By the way, that setting was almost certain a setting that Iran enabled, if you questions that (which is fair) then answer the simple question, where did the Houthi forces get 1,000,000 mines from?

We are kept in the dark on the wrong topics and it is time to set the limelight on those people keeping us knowingly in the dark.

 

Leave a comment

Filed under Finance, IT, Law, Media, Politics, Science

Seeking security whilst growing anarchy

We all want national security; it does not matter whether you are American, Australian, British, Dutch, French, German or Swedish. National security is a matter that is not just set in laws; it is set in morality, in justice and in perception. Most of us are set in a stage where we are willing to give out many perks so that national security can be maintained. Many liberals grasp back at Benjamin Franklin who once said: “Those who would give up essential Liberty, to purchase a little temporary Safety, deserve neither Liberty nor Safety“, I would have agreed when he allegedly wrote it in 1755. In those days the biggest fear they had was England, the Dutch trade wars (the VOC) and apparently the French to the north. It was a very different age, in a setting where a naval was not done in minutes, but hours, battle settings took a while and there was clarity on who the enemy actually was (usually the one speaking your language and not firing on you, wearing the same uniform was also a nice indicator).

In this day and age it is not given, nowadays all the wolves have onesies looking like Shaun the sheep and often we cannot tell them apart. This is the setting where oversight, surveillance, data gathering and analyses can help, in equal setting there are a few players that still cannot get their algorithms correct and they are making the same mistake that I caught a few players on in the late 80’s.

There is however a new setting, a line that has been crossed and the Washington Post gives us that setting (at https://www.washingtonpost.com/world/national-security/there-have-to-be-limits-lawyers-for-guantanamo-inmates-challenge-lifetime-imprisonment-without-charge/2018/07/11/f3933faa-8533-11e8-9e80-403a221946a7_story.html). the title ‘‘There have to be limits’: Lawyers for Guantanamo inmates challenge lifetime imprisonment without charge‘ gives us that part and it is one that cannot be ignored, with ‘lifetime imprisonment without charge‘, we see not the first step, but an early setting that the law is changing into ‘Guilty until proven innocent‘ and I am not sure if that is merely a wrongful step, or a desire step for large corporations to give the setting a new life in other directions as well. There can be a setting where it is easier for the courts to work on that level. You see, when a corporation has failed their SLA’s, there will not be the documentation where they can prove it, yet when we see the application to ‘lifetime imprisonment without charge‘ the setting is very much inverted from what we find acceptable. We see the Post giving us “A handful of commission cases have inched along in pre-trial proceedings for years, many of them plagued by irregularities” and it is the ‘irregularities’ where we need to seek first, you see an abused system will rely on irregularities to remain in the shadows and active, whilst it almost never has bearing on National security and it will have even less a bearing on justice or lawful settings. The question becomes where it failed. There is a second side to the Post when we realise that the quote “Justice Department lawyer Ronald Wiltsie said authorities had a responsibility to detain suspects who could pose a future threat, even if it wasn’t clear they would actually take any action against the United States” is incomplete. The fact that we are faced with ‘it wasn’t clear they would actually take any intentional action against the United States‘. You see it comes with the setting that there is no proof that they had actually taken any action against the US, if so there would be a charge and that failure falls not merely on the FBI, it falls on the CIA, the NSA (data gathering agency) and most of all the investigator looking into the matter. We can illustrate this with the weirdest of examples.

In a spreadsheet we can use a random number, so we create 5 groups, each in one column, and each having 100 random observations. Now we will test for them stating that “IF(A2<0.2,1,0)“, I am setting the stage where 80% was guilty (so basically 20% was innocent). If the number is smaller then 0.2, they are presumed innocent. We do this for the 5 groups. Then we count the groups, in the initial test no one was innocent overall, but 3 were innocent on 3 counts and 20 were innocent on two counts. Now remember, this is merely 100 ‘persons’ tested on 5 elements. When we change the setting to “IF(A2<0.25,1,0)” (a joke on the premise that 3 out of 4 all people are guilty of something) we get a different setting. Now we see that two were innocent on 4 counts, yet 10 are innocent on 3 counts and 23 are innocent on 2 counts. Intelligence software works on facts not on random numbers, but the principle is partially the same, how many flags were raised by that one person, yet now not on 5 tests, but on dozens of tests, against people, places, actions and locations at specific times and as we consider that thousands are tested, in the random setting when the number of people are large enough we will get respectfully get a group that was innocent (less than 0.2 or 0.25) on all counts, that is the impact of random.

Yet on the flags raised in real live, we either have them guilty of something, which means that there can be a trial and a charge can be made, when you see the examples next to one another and we realise that the group of all people where no flags is raised did not occur (it will with a larger test group), we need to consider the flaws we are faced with and more importantly, the setting that we open ourselves to in legislation and in law when we allow for ‘lifetime imprisonment without charge‘. So in this setting, no matter how much we want actual national security Missy Ryan makes an interesting case. We get to see the larger issue when we look at Baher Azmy, legal director for the Center for Constitutional Rights, a group representing some of the detainees. With “Baher said the government had distorted a 2001 law authorizing U.S. military operations against al-Qaeda and affiliated forces by using it as a basis for indefinite imprisonment. He said insurgent wars, waged against small, clandestine and evolving bands of militants, could go on forever. But laws governing wars were devised with conflicts between states in mind, he said“, we are treated to the setting that we face in the upcoming decades. We are not waging was on nations, we are waging war on groups and tools. As Hezbollah is still the tool of Iran, the setting of a larger problem becomes apparent. In the first source (at https://www.terrorism-info.org.il/en/hezbollah-iran-handled-shiite-militias-integrated-syrian-army-campaign-take-control-south-syria/) we see “Shi’ite forces, handled by Iran, are being integrated into the campaign currently waged by the Syrian army in south Syria. There are at least two Iraqi-Shi’ite forces (the Dhu al-Fiqar Brigade and the Abu F–al-Abbas Brigade). There are also Afghan Shi’ite fighters in the Fatemiyoun Brigade. In addition, it was reported that Hezbollah operatives also participate in the fighting, including operatives from its elite al-Radwan unit, who were sent from Lebanon“, yet when we see “According to ITIC information, Hezbollah and the Shi’ite militias (some or all) have been integrated into the various Syrian army units and do not operate as independent forces. Pictures show Shi’ite militiamen wearing Syrian army uniforms, and it is difficult to distinguish them from Syrian soldiers“, we get the danger with ‘Pictures show Shi’ite militiamen wearing Syrian army uniforms‘. So now we get the setting of ‘who is exactly waging war on who’, or is that whom?

Not being able to identify the setting gives rise that Baher Azmy has a larger issue to deal with, because any denial from the Syrian army that these people were army units, and they get identified as militia who dressed ‘wrongly’, sets the stage that the defence ‘laws governing wars were devised with conflicts between states in mind‘ can no longer be upheld and that escalates the need for a much larger Guantanamo and indeed it continues and even fortifies the setting of ‘guilty until proven innocent‘.

the second source is a week old and gives us ““Hezbollah is a fundamental participant in planning and directing this battle,” a commander in the regional alliance that backs Damascus told Reuters. “Everyone knows this – the Israeli enemy, friends, and even the Russians.”“, it is given to us by Reuters (at https://www.reuters.com/article/us-mideast-crisis-syria-iran/hezbollah-role-in-syrian-south-exposes-limits-of-us-policy-idUSKBN1JV19U), so as the enemy changes its onesie (yup that was funny) we see a whole league of Shaun the sheep and we have no idea how to deal with them in life (the other alternative is solved through hiring people with the actual ability to aim).

Now change that setting away from the current ‘debacles’ in Yemen and Syria and consider the impact when we look at the Indian view of Pakistan (at http://www.dnaindia.com/analysis/column-terrorism-is-pak-s-business-2627746), it is not a hollow part, and there have been accusations from India and Afghanistan for the longest of times. In this setting we are given the quote: “India and Pakistan are not caught in some existential Punjabiyat love-hate relationship. Pakistan is a state sponsor of terrorism. No other nation has used terror so ruthlessly as an instrument of state policy as Pakistan has done for decades — principally against India but also against Afghanistan” is only the beginning. There are other headlines, even as they should be seen as no more than to illustrate that the issue exist, we cannot tell to what extent. So when we consider “The Islamic State’s flag emerges in Pakistan’s capital. How serious is the threat?” Is there a threat or is it merely a freedom of expression? So when we see the second headline ‘The terrorist group is increasingly present in Pakistan’s southern province‘, we are confronted with how to proceed, yet Reuters gives us 3 months ago “Islamic State claims attack on Christian family in Pakistan“, we see that the game changes. If state sponsored terrorism is the new ‘Letter of marque and reprisal‘, how can we proceed? Is there an actual option other than guilty until proven innocent?

What is clear is that the data crunchers will have their hands full because none of these algorithms and data gathering systems are ready for this leap. And it is not a small setting as Pakistan is a nuclear power who for the most is happy to push the button on India if need be, so the game is not merely changing, the players (Hamas, Hezbollah, Islamic State et al) are aware that hiding under the roof of any government gives them options and they accept being the tool for those governments, yet the systems and our mandates are less equipped to act. Yemen has so far been an excellent example on how to not act and it will escalate beyond this. Now consider that I do agree that ‘lifetime imprisonment without charge‘ is wrong, but what options do we have? Until 2016 I believe that the data and the evidence was the weak link. Now we are in a situation where we need to wage war on three fronts, an overt one, a covert one, and a data intelligence war and we need to find a way to intertwine them and use them to find the right checks and balances. We need to evolve what we can do so that we can determine how to do things correctly, or perhaps better stated efficiently to the right opponent.

You might think that this is ludicrous, yet have you considered the actions in Yemen? They were firing missiles into Saudi Arabia, on civilian targets, yet the only thing we see is messages like ‘Yemeni security officials claimed that cluster bombs were dropped in a civilian area of the Western suburbs of the Yemeni capital Sanaa‘, whilst we see ‘after Houthi rebels fired a missile at Riyadh‘ any justification reduced to an 8 word response. The media at large does not give us: ‘Houthi rebels fired a missile on Riyadh, the Saudi Capital with over 5 million people, the fired missile could have caused the death of hundreds of people if struck correctly, Saudi Arabia reacted in the attack against its citizens‘, we do not get that do we? Yet that is the game that is the danger some face. In light of the missiles getting fired under the noses of Yemeni security officials, they need to realise that not stopping the missiles does have repercussions and innocent people will always be caught in the middle.

The change of conflict is large and it will be growing over the next decade. I am on the side of Missy Ryan in this, lifetime imprisonment without charge must be challenged and everyone needs to know about the setting we have here, but when it comes to the defence of that setting, I wonder if we have any actual option to oppose it, those who are send to that place are willing to (allegedly) support people who hide in other uniforms knowingly firing methods of termination on civilians merely because they can and because it makes them continue the fight that they believe is just for much longer. It is a dangerous setting that strips the veneer of civilisation in nearly all nations, look at France and Germany, they went through this several times. We need to set a different stage and we need to do this before we set a legal lawful setting of targeted killing and the wrong people are shot, because that will be the point of no return for all of us.

You see ‘Guilty until proven innocent‘ (forced or not) is merely a first step, when that setting is entered in stone we get the second danger, when cyber-attacks removes the option to prove innocence, what do you think happens next? It is what I personally believe to be the setting stage for chaos leading to anarchy and there the game changes again, because most governments have cut on so many parts in infrastructure that most cannot overcome anarchy for a much longer time forcing the hands of many governments, especially in Europe and I feel certain that some of the players behind the screens realise that too and they might just be banking on it.

 

1 Comment

Filed under IT, Media, Military, Politics, Science