Tag Archives: NSA

Real life in virtuality

The other night I was pondering the setting (as you might have read in the previous blog) on RPG’s and the setting of a dream within a dream. The idea took another turn as I was considering the interaction of reality with virtuality, and in this a game based on a 1 exabyte setting, an online multiplayer game based on virtuality. A game where players fight each other, they create alliances and they conquer. To get this done, we either create a world that is believable, or we turn it around and let the world create our reality. 

And as I was pondering this, I remember a game called ‘Virus’, in this shooter the game created the levels depending on your hard-drive, that was when the cogs clicked together. 

The new game an entire exabyte of challenges.

The world where we are thrown into is not unlike TRON, but in this setting we become citizens of a cloud environment, we are kidnapped and as we scape we end up getting left to our own devices. So as such we see a challenge, but consider a cloud environment, one that has a dozen Fortune 500 companies, thousands of mid sized companies and a lot more small companies. So will you take on a large player, or do you start small? A game with settings unlike we have ever seen and it is a game that develops further as more players sink into a company, a game without a timeline, but with time as either an ally or an enemy. A stage we have (as far as I know) never seen before and as the cloud evolves, so does the world and the enemies we face. So consider creating a cloud environment for that event and turning it into a game, we are always looking for a challenge, so why not become the infecting part and take over companies, corporations and grow in that way and this is the game with a difference, it is hard core only, one life! You can restart as often as you want, but one defeated you start at square one, until you have complete control of your first company, corporation or enterprise. So as we see and as we get into one cloud, it will be close to an all out war with anyone you face, that is unless you can strike an alliance, and alliances require all parties to see the benefit of one another. The nice part here is that this might (or might not) be the stage where we either love it or hate it. You see this will not appeal to all, there is no doubt it is, yet how can we create the challenge of such a game? We appeal to the player and we set the event that the player will embrace. An approach where the benefit of both sledgehammer and scalpel are seen, and the creation of an environment where both can thrive. And that is the challenge, creating the environment where everything piece of hardware is shown as something, where every router and its components are shown as challenges, I wonder if it can be done.

The question
Yes, I do ask myself the question if it is feasible, if it is even remotely possible. You see, we all have Monday morning quarterbacks in one end, but the other end is also taken. Usually by some manager that has a new plan every Monday morning, but it never pans out to be possible, achievable or even deeply contemplated. I see that, I always question my own thoughts, you see the person who does not question their own thoughts ends up drawing castles in the sky, and then expects a dot matrix printer to print a 1200 DPI photograph. We must question ourselves at all times, especially when we caress our creative side. 

So is my idea a castle in the sky? Perhaps it is, there is no doubt on that. Yet for every 8-10 failures, that one idea will push through and become a real winner. In 1997 I opted and idea to my bosses to use a marketing strategy that used websites as the central core for reaching out to others, my bosses laughed, stating that there was no business model for something that delusional, and stupid me, I listened, 4 years before Facebook, I had the idea for a digital marketing path and it was ignored, silly stupid me, as such I am putting ALL my ideas on the public domain, some will find ground, some will not, perhaps most will not, yet in this I am setting the stage for some to take the idea and push it into a direction that I am currently unable to pursue, for a few reasons, but I digress.

We can try to literally translate a cloud, or we can set the inventory of any given cloud and create a converted one that boggles the mind. Consider that a company has a server, users, computers, routers, Cloud Connectors, Data Center Interconnect Platforms, Mobile Internet Routers and a few other devices, and the larger the company becomes, the larger the hardware and that is before the cloud, in the cloud we see all kind of other issues and to map these out we need a different set of rules, a different set of limits to add to the game, to give some version of ‘reality’ to the game, a set of spawning rules (I hate spawning in games) or to set a better stage, if a cloud is represented in elements (see image) now consider that each company has larger or smaller elements of all, how diverse will be the challenge a gamer has, even as the gamer goes from place to place, he is still in one cloud and there is the larger cloud security to content with. Perhaps the game is a fools errant, yet I believe that if gaming is the edge of technology, the only way we get beyond what we have now, is to push the stage of a new game towards and beyond the horizon of what we now can see. Sony gave us the console to do it, so let’s push into a realm we have never seen before, it is the only way to keep gaming at the height of any system, if we do not do that, we are hopelessly lost.

So where is your virtual gaming life? In a new version of an existing game, or in a stage of gaming we haven’t seen yet? I have nothing against the next iteration in gaming, I played Tombraider, 1, 2 and 3 and never regretted that, yet even there, we saw evolution of gaming. That part was less and less visible in some other franchises and that is a sad part, because only those who push gaming beyond the limits will show a game worthy of conquering. We have all kind of views on this, some hate them, some love them and that is OK. I was never a GTA fan, but a lot are, some hate Watchdogs 2, I loved it (3 as well). Some love Breakpoint, me not that much. That is fine, I always state that those claiming to create a game that appeals to all, will create a game that pleases none, so if I am not part of any equation, that is fine by me. Others, will serve the game I like. 

This is how it should be and in all this creativity will push limits and creativity will open up other doors, such is life and we need to push as many doors as we can if we are to make life better all around us, the iterators never will, they are part of the margin spreadsheet, sailing a safe course to last longer, it will never ever go their way. Nintendo is perhaps one of the shiniest examples. It pushed the Wii, which was a decent success, then the WiiU, an abysmal failure, yet it resulted in the Nintendo Switch, an absolute home run in gaming and there we see that failings will optionally turn to wins, an iterator will never see that, only the innovator will get there. Nintendo at present is close to 75,000,000 switch consoles sold, that implies 2 Nintendo’s for every Xbox, so where is their ‘most powerful system in the world’ now? Iterators always have a good story, but they do not yield results, we will get another ‘We’re not driven by how many consoles we sell, it is the same all over, the losers will say the numbers are shallow, but when they are in pole position, it is everything. A brand gone to the dogs, largely because they ignored the voice of the gamer, I saw that almost a decade ago. And now we see a new world rising, one run by Sone ind Nintendo, it is fine by me, although I needed Microsoft to keep Sony on their toes, this idea will soon be a bust. So the best I can do is to set a stage of creativity and hope that some will Create more and more Sony exclusive games, those who do will be able to use my gaming IP free of charge, I do have commercial needs (income) for my 5G IP, such is life and I do like to enjoy a good meal.

So is my cloud game a bust? Perhaps it is, but for now I will try to envision more and more of that approach, consider a complete created cloud, one where you travel and set the premise of ruling the cloud, yet not alone, it is too big making alliances more and more important, a stage that several have attempted, some a lot more successful then others, I merely want to add to the success rate, or at least attempt to do so. It is the price of creativity and its push to innovation, only the successful continue that battle stronger, the failures continue too, but on a smaller scale, and that is fine, every person will fail at some point, it is what they do next that matters, because Steve Jobs had its successes, but he also had the NeXT computer. We recognise success, but we fail to recognise the failures and where they lead to, it is the flaw in many of us. And this is a larger stage, so how can we set that stage, when people keep on pushing Microsoft and their Blue solution. So as ZDnet reported “Microsoft acknowledged it was a service update targeting an internal validation test ring that caused a crash in Azure AD backend services. “A latent code defect in the Azure AD backend service Safe Deployment Process (SDP) system caused this to deploy directly into our production environment, by passing our normal validation process,” officials said”, a lot of bla bla and yada yada, yet the flaw is not merely within Microsoft, it is the same approach that is replicated again and again. So as we see mentions of Active Directory, we also see ‘a validation ring that doesn’t include customer data’, as well as ‘the SDP didn’t correctly target the validation ring due to a defect and all rings were targeted concurrently causing service availability to degrade’, so how long until there are more and more failures and the rollback merely adds to the problem? This is what I saw when I considered the NSA approach towards Trust Zero, the idea is good, but larger players will screw up making any rollback a much larger issues over the whole field. This is part of the idea to make the cloud a game, we could optionally see something we never noticed before, because thousands of gamers will kick the one part everyone ignored. 

Whether we see the issue in reality, or merely virtual. We need to look with different kind of glasses, I see that because 20 years ago I listened to the wrong people, those relying on bullet points, memo’s and ego. There is no space for that in gaming, or in innovative design, I wonder when Microsoft will figure that part out, they are now in 3rd position, what happens when they become deal last (behind Amazon), will they blame metrics or will it be a Covid set of variables? No matter what they will rely on, they are in a stage where they are losing more and more slices of business cake, they are losing slices in a time where they should have had the entire pie, as I personally see it stupidity, greed driven short sightedness and ego driven conviction made them lose field after field, and now they are in a ratchet state, they have no ability to get close to Amazon and at the same time there is every chance that Google could catch up with them. When that happens, Microsoft will be holding a losing hand in the both the cloud and the gaming field and as their surface solution falls short, we see them handing over slices of that pie to Apple, a three sided losing streak, it is a rare but slightly satisfying field. Why do I think that Microsoft will fail? ZDnet stated it best with “There is still no publicly available data on Azure sales. Azure is the part of Microsoft’s cloud business that most rhymes with AWS, but is buried in the commercial cloud”. In a lifetime of working in IT, I have learned that when commercial driven players rely on ‘no publicly available data’, it tends to be because someone is too close, they are too far behind, or the results create questions, and as I personally see it, Microsoft does all three, Google is too close, they are too far behind with Amazon and the Exchange server issues call in question issues with the Microsoft cloud as a whole. As we saw (from 2019 onwards) more and more hacks towards clouds, there is every notion that together with one source claiming that 90% of clouds are in danger, Microsoft has a lot is problems coming their way, I do not know if this is completely fair on Microsoft, as all three have issues, but the replicated approach Microsoft has (Active Directory anyone?), we see a larger issue, if hacks can be transposed from one system to the other, Microsoft hacks might be seen as lucrative (from the organised crime point of view), it makes the NSA approach more and more essential, yet I personally feel that any rollback has hidden flaws and flaws are a problem, especially in a cloud where one flaw transfers to a whole number of corporations. I will be the first to agree that my view is speculative, because it is, but to see that part you need to grasp back to 2003 where the people got “Erroneous VeriSign-Issued Digital Certificates Pose Spoofing Hazard”, this needs to happen only once on the cloud and the mess is almost complete and I believe that a rollback will make it happen. So how do you feel about ‘due to a defect and all rings were targeted concurrently’ now?

So perhaps my idea for a cloud game has a few additional benefits, apart from it being an interesting approach to a new game. 

Have a great day

Leave a comment

Filed under Gaming, IT, Science

SET trust = 0.

Yup, we all have a stage when there is no trust, there is no confidence and we wonder the why part. In this, I had questions, so I asked the agency, but they did’t know, then I asked the FBI, I asked Langley and I asked Commander Andrew Richardson, they all gave the same story, there is No Such Agency, so I Googled them and Yes! There they were, complete with phone number (+1 301-677-2300) and all, yup, we got them, so now we get to their story (at https://breakingdefense-com.cdn.ampproject.org/c/s/breakingdefense.com/2021/04/nsa-about-to-release-unclassified-5g-security-guidance/amp/).

Via the BBC, we get ‘NSA About To Release Unclassified 5G Security Guidance’ and I started to read, the article makes a lot of sense. Which gave me “Noble’s speech highlighted the importance of zero-trust architecture in 5G networks”, and it got me thinking, the approach makes a lot of sense, just like SE-LINUX, the setting of ‘no-trust’ makes sense, especially in a world where Microsoft keeps on fumbling the ball, not merely their exchange servers, but the (what I personally see as greed driven) push towards Azure, it comes with all kinds of triggers and dangers, especially as they are ready to cater to as many people as possible, the no-trust rule is pretty much the only one that makes sense at present. I have written about the dangers more than enough. So when we are given “it’s reasonable to expect that future NSA 5G security recommendations will emphasise zero trust as a key component”, I believe that the approach has a lot of benefits, especially when such a setting can be added to anti viral and Google apps, it could increase safety to well over 34% overnight, and option never achieved before and we should all applaud such a benefit. There are a few thoughts on “NSA has characterised zero trust as “a security model, a set of system design principles, and a coordinated cybersecurity and system management strategy.” It’s a “data-center centric” approach to security, which assumes the worst — that an organisation is already breached or will be breached.” A choice that is logical and sets the cleaning directly at servers and ISP’s, and they are the backbone in some cases to close to 75% of all connections, so to set a barricade on those places makes sense, there is no debating, the choice of calling themselves No Such Agency wasn’t their best idea, but this is a game changer. 

I have been critical of the US government in all kinds of ways for years and on a few topics, yet I have to admit that this is an excellent approach to prevent things going from bad to worse, moreover, there is every chance that it will make things better for a lot of us overnight as such a system deploys, it will have a trickle down effect, making more and more systems secure. 

That one thing
Yup there is always one thing and we see the dangers when we consider Solarwinds and Microsoft (their mail server), the one part is when we rely on rollbacks and we see rollback after rollback creating a hole and optionally a backdoor, the most dangerous system is the one deemed to be safe, ask Microsoft, or their exchange server. When you believe all is safe, that is when the most damage can be made. And as the article looks at 4 parts, we see ‘Improved network resiliency and redundancy’, yes it makes sense, but rollback efforts are possibly out of that equation and when we get some people tinkering there, there is a chance that the solarwinds paradox returns, yet this time with a dangerous seal of approval by the No Such Agency, it will be the one part all criminal minds are hoping for, in this I personally hope they fail, but these buggers can be resilient, tenacious and creative, the triangle that even the Bermuda Triangle fears and that is saying something.

Leave a comment

Filed under IT, Military, Science

Historic view versus reality

We all seem to have views, it is not wrong, it is not bad it is not evil, it merely is. I saw in 1998-2002 how governments sat on their hands, how lawmakers sat on their hands (and optionally on their mistresses) and they all vocally agreed that hackers were nothing more than a nuisance, and as I see it the traitor Bradley Edward Manning (aka Chelsea Elizabeth Manning) gave up secrets that it was not allowed to reveal and gave it to the world. There is no doubt on guilt, there was no doubt on treason, there merely was the act and that was that, it was the first moment where governments got the first clear hint that hackers were a much larger danger. After that came Julian Assange and Edward Snowden. Julian might be many things, but technically he was not a traitor. Edward Snowden was one, and the law again disregarded the steps that were taken, he went intentionally to a place where he might get the most value out of his deeds, Russia picked him up, just to piss of the US, which they were speculatively allowed to do, yet the stage is rather large, more hackers, all under the guise that the law saw them as a mere nuisance, we all got introduced to ransomware, now we see governments hacked through a sunny breeze (Solarwinds), and the voyage does not end. Now we see less than a day ago ‘Hackers threaten to leak plastic surgery pictures’, as well as ‘National Security Agency warns hackers are forging cloud authentication information’, now I do not care for the plastic surgery part, but it is another case where personal and person inclined data is no longer free, the two elements also give a rather large stage for us to place a new premise. One could now argue that hackers are the clear and present danger to personal and corporate needs and as such they can be hunted down and put t death. So from nuisance to global danger, as such when all these mommies cry that their little boys did not know what they were doing, I have no issues putting a HK model 23 to their foreheads and executing them (optionally with silencer as to not scare the neighbours). 

I think it is time for lawmakers and government administrative types to wake up and smell the situation, and in this, perhaps some remember the words of Martin C. Libicki in Newsweek (2015) where he pushed the view ‘Cyberattacks Are a Nuisance, Not Terrorism’, well that is not really true, is it? When we see the definition of terrorism we see “The unlawful use of violence and intimidation, especially against civilians, in the pursuit of political aims”, there we see two parts up for debate, the fist is that ‘mental violence’ is still violence and the setting of intimidation is already achieved, the stage we still need to address ‘the pursuit of political aims’, not all terrorism is set to political aims, unless if you call self-enrichment the pursuit of political aims. 

And with ‘National Security Agency warns hackers are forging cloud authentication information’ we see an initial stage where commerce will come to a screeching halt. My IP does not cover for that, darn. But there is the old way (1981-1991), just kill them, be done with it. 

Now some (especially in law) will state that I am overreacting, yet am I? It is the lawmakers that could optionally be seen as cowards, hiding behind their golden calf called jurpisprudence. The law, for the most does a good job, it is not perfect, so be it, but for the most, it is OK. This covers the never trespassers and the limited trespassers, they make up for 75% of all people, then there are the criminals, 24.99%, the law takes care of them, they are repeat offenders, career criminals and as such the law was designed to deal with them, then there is the remaining 0.01%, these criminals are in it for the kill, to create a maximum amount of cadavers physically, mentally and financially, to make life for nearly all impossible, and that golden calf, the law cannot deal with them and we accept that, so we remove them in other ways. We hunt them down and put them to death, and when it is some 16 year old claiming he didn’t know what he was doing, we know, he did it to seem cool, he was willing to make all others suffer, just to look cool, to get the tits, to rub the vagina, his friends never could, as such there is a 9mm solution that solves it, if only his parents had raised him right. 

You think I am kidding?
You forget the poverty line is shifting massively because of COVID-19 and soon the insurances will not cover the impact, the media will merely snigger and cash in on all those clicks they got from the $x donation to an unnamed source, and it is now time to make the long overdue change, before governments are pushed to take away more and more of our freedoms, which will push us into the dark-web, a situation these criminals would love. And it is close to 15 years too late, but in this case it is better to be late to the party than not get there at all. 

Am I overreacting?
That would remain a fair question, I do not believe so as this step is well over a decade overdue, it is not something that was pushed to the top in the last few days, and it is partially due to governments and lawmakers not acting when they could have and especially when they should have, now the dike is levied and people are soon to be drowning and something must be done. From my point of view, to hit terrorists, you hit them harder, so the more extreme you hit these hackers, the clearer the message becomes. And a clear message is years overdue.

In this there is a two step setting, there are the “cool wannabe’s” who are mot likely teenagers, some of them are easy to find and after the first examples a lot of them will hide like cockroaches, but the second tier, the one the media and governments intentionally ignore are those in organised crime, they will be the real challenge and as most governments have nothing on stopping them, at best they can limit the damage, which is basically no solution, that gap will take time, but with ‘hackers are forging cloud authentication information’ less than a week old, there is now a chance that the NSA and other intelligence networks will realise that compromised clouds will have global commercial implications, as such governments must now act, the moment any cloud is openly seen compromised, it will be too late for well over a decade. It becomes a clearer situation  when you consider that global e-commerce was set to ‘Global e-Commerce hits $25.6 trillion’, by the United Nations Conference on Trade and Development (UNCTAD), s how much losses must global commerce endure before we act? Oh and if you think that this is the end? How much more powerful will organised crime become if they only get their fingers on 0.1% ($25,600,000,000)? It will become a sliding scale that goes from bad to worse, and governments knew that, they knew for well over a decade, but their delusions saw other non-solution, like perhaps, it will go away on its own, so tell me when was that ever a solution?

Leave a comment

Filed under Finance, IT, Law, Media, Military

Institutionalised Positioning

Yes, we can take IP in several directions. For me it started yesterday at 17:15 when I got home with my new iPad, after 6 months, minus one week, my iPad finally arrived. So happy happy joy joy. Yet the story is not that simple. I was able to get mot of the apps from my iPad 1st generation onto my iPad Air 4th generation, in a few cases I bought the program again (the $5 will not kill me I assume). And for the most, these programs held up for a long time, so I am happy. 

Yet there the issue started. You see, there was a problem with one program, the program no longer existed. It was a data vault, this data vault kept projects in directories, and they were all hidden. When I needed it I could open one of the folders and I was ready for the presentation. This was the first hurdle. There were all kinds of programs, I must have liked at a few dozen of them, all with cloud backup, all with options to hide all these secret pictures, WTF do I care? I needed a specific application and the 2-3 dozen are all copies of one another, all copies of an idea they all had at the same time. With the exception of two, a massive waste (in my specific case). I got one of them working first with two projects, that was the one I got. Some will think that I am all about the fuss, all about paranoia. So consider January 2020, Forbes gives us ‘Microsoft Security Shocker As 250 Million Customer Records Exposed Online’, with the two additional quotes “Paul Bischoff, a privacy advocate and editor at Comparitech, has revealed how an investigation by the Comparitech security research team uncovered no less than five servers containing the same set of 250 million records”, as well as “the researchers say that many contained plain text data including customer email addresses, IP addresses, geographical locations, descriptions of the customer service and support claims and cases, Microsoft support agent emails, case numbers and resolutions”, as this point, do you think that I am trueing any cloud with my IP? Do you think that I will give any reliability to any firm handing control of their cloud to the NSA? The IP wi worth a pretty penny and there is no way in hell that I trust anyone with that. Especially when you consider “A new report from the National Security Agency (NSA) titled “Mitigating Cloud Vulnerabilities” identifies what the agency considers the top cloud security issue plaguing organisations: misconfigured privacy settings” (source: unconfirmed), so according to the source, not only is it a cloud solution, but the makers cannot properly administer this, so the NSA is needed? I have question marks, but more so in the direction of Microsoft who had been shoving this solution down our throats like it was the second coming. It reminds me, there was a comedian who had this story: “I apparently had a rare disease, but my older brother knew the cure, just eat a handful of sand, thank god for older brothers”, I think you can relate this to both Azure and Microsoft, can you? So as my trust is close to zero Kelvin, I have my IP in a secure location, and I have an encrypted version that I can access via Webmail and then into the Vault. It takes a few steps, but the chance it gets hacked is less than 2%, this in light of Business Insider giving us “Seventy percent of companies using cloud computing vendors get hacked or leak data, Sophos found”, so I am rather picky on how and where my data goes. The fact that almost NONE of the data vaults took that precaution, r allows for it is the larger stage that needs addressing. Apple gave me 4 confrontations in that regard, and let’s be clear, this is not the fault of Apple. Their app store has limits and abilities and as such we are confronted with the larger evil, and evil Apple did not create, the developers are optionally also unaware of the stage that they are on, but the stage we do see is that things need to change, a new IP, one that has the foundations of a 30 year old program called DBMS/Copy, with the foundations of something that resembles ODBC. A setting where WE decide what the source is, where the source is and how we get it to the point of destination, if the cloud can no longer be trusted, we need that solution fast and we need it to be clearly controlled and set in a station where the user is allowed to make the decisions. Now, let be clear, this is not for all, this is not a solution we all need to consider, but enough need to consider it, for one, all those with bankable IP. 

So when we are in a stage where we have 25-50 passwords, and the setting is now that we can’t rely on these passwords because the rainbow tables of today are more and more efficient, in some cases we added simplicity to the working of these tables, as such, in a stage where we enter 5G, where dat travels 10-25 times faster, a rainbow table becomes a lot more dangerous to a much larger group of people and when you see the alleged Microsoft Blunders, we have a lot more to fear. And let be clear, Microsoft might be the clearest example, I for one am unwilling to believe that they are the only one, especially when you see the Sophos numbers. 

In all this, the institutionalised positioning is that there is no issue, there are no glitches and there is no lack of safety. I will let you decide whether I am right, or whether I am wrong, type is enough out there to form your own opinion, yet when you do and you get it wrong, do not come crying. Consider that IP can only be sold once (if it is done right), do you really want to take a chance on something that could be your life’s work and sets you up for retirement? I will let you decide, because that is your right.

Leave a comment

Filed under IT, Media, Science

And so it begins

Yes, it is beginning and the quote is not from me, the phrase was used by King Theoden in the Lord of the Rings movie “The Two Towers“, right before the major battle at Helms Deep. It is not the first time it was used, but there is where most get it from. As we were treated a few hours ago ‘The US is making its own 5G technology with American and European companies, and without Huawei‘, in this I have no objection, but the larger image is ignored by those less intelligent individuals in the White House. 

What I predicted is coming to pass and big tech companies are about to face the larger setback in the US. So no matter how this gets warped by players like the Wall Street Journal. In my personal view this step now gives us a clear view, the US will be lagging by 3-5 years in 5G as per now. When we see the article in the Business Insider (at https://www.businessinsider.com.au/5g-huawei-white-house-kudlow-dell-microsoft-att-nokia-ericsson-2020-2), we forget a few items, in the first the US is nowhere near ready for 5G, in the second Huawei is already fully ready for 5G and any nation embracing either temporary or long term with Huawei will get the jump on American Big Tech. Even as “sic infit” (so it begins) goes back to The Metamorphoses of Apuleius, we need to understand that the reference to ‘The Golden Ass‘ might actually apply to certain players in the White House, we need to understand that the push for anti-Huawei sentiments was never doused in evidence, merely non-US paranoia. The world to a much larger degree has demanded evidence from the US, who actually never produced it. 

So as the Wall Street Journal gives us “the White House is working with U.S. technology companies to create advanced software for next-generation 5G telecommunications networks. The plan would build on efforts by some U.S. telecom and technology companies to agree on common engineering standards that would allow 5G software developers to run code on machines that come from nearly any hardware manufacturer. That would reduce, if not eliminate, reliance on Huawei equipment.

And here we see a few points. First there is ‘create advanced software‘, which is only partially true, the hardware is a larger part that is currently incomplete when we look at non-Huawei players, as such the presentation given is one that is debatable on a few sides. Then we get ‘agree on common engineering standards‘, a statement which would have been a given long before any of this started, as such the presentations we will see will be doused in ambiguity and in that format it implies that the US will be being whatever it was +2 years as it will not fill the gap it currently does not. Then we get a larger issue ‘run code on machines that come from nearly any hardware manufacturer‘, which should not be a 5G issue in the infrastructure, they would need to pass on anything on the system, this is a mobile setting. It is basically telling the stage that Apple and Android should have the same code and optionally set the stage to bar Harmony OS, so is this an actual 5G setting or a filtering setting to keep unwanted players out?

Yet this setting is one that is massively dangerous to the US, it relies on Big Tech (Google and Facebook) to enter a new stage where they cannot gather data and merge data in a global stage which would redefine their global data settings and such a delay would be monumental for these two. 

So we get all this because the US cannot provide evidence of optional Huawei wrongdoing? How weird is that? It is actually not weird that the data gathering tools are on the Chinese side now, the US is about to learn that being 4th in a place where they were alone is not the place to ever be, not in this economy, as such setting a stage for segregation now would give them a larger benefit down the road and that is where the shoes get to tight to dance.

There is a decent chance that Huawei is not the player that will be disregarded on the global stage, as such several EU countries are willing to entertain Huawei and with the Middle East and Asia already there, we will see Huawei getting a larger share of data than the US (with 325 million people) represents and that is what the US fears and that fear through the White House will be pushed onto Google, Facebook and Apple, and I am guessing not with their approval, they will have to adjust their models by a fair bit and feel the brint for a year at least (that is if hardware manufacturers agree on standards) and good luck with that part. 

Then we get to look at “the White House is working with US companies, and potentially European companies, to deploy the United States’5G architecture and infrastructure, according to White House economic adviser Larry Kudlow who spoke with The Wall Street Journal’s Bob Davis and Drew FitzGerald“, so not only are they 3-5 (or 4-6) years behind, we now see ‘the United States’5G architecture‘, so not only is it their 5G, but based on their standards and when we consider the stage of AT&T and their 5G Evolution we saw last year, the US (and those who sign on) are in for a really rough ride that might never be 5G, merely a reset 4G+ standard. Of course the latter part is not a given, but time is the one part that the White House does not have and the hardware setting in the US is nationwide too far behind. In this there will be no national 5G in the US for a much longer time. 

As such were these steps even considered by Big Tech who relies on billions of users, not merely the 325,000,000 Americans? With the UK starting now on Huawei and their 68 million people, will that stop Europe? No, it will make them switch against American paranoia and Huawei gets a much bigger boost and this will have a larger impact, as these places go ahead and gain speed the rest of the EU will find themselves in a bind to accept other standards faster and leaving the US in a stage of isolation which will impact the US in several ways. And if you think that the restrictions will work? Yes they will but only to show that those not on the Huawei pool will lag in several stages and there will be a screaming to get Huawei in a larger pool soon enough. From there we will see Germany who is partially  on board and when they see the impact in the UK, Spain, France, and Germany will sway and that means that three of the large 4 will get the fourth on board, that is what we will see in 2020 and optionally 2021 when stubborn people delay, in that stage those who are early on the 5G path they will get a much larger commercial slice of that cake and there will be a massive amount of governments blaming the US for paranoia, in my view I would state that it is all their own fault. 

And whilst nations have their own policies in place are now in a stage where the option to buy the 5G technology and develop their own national cores would be a perfect solutions for these nations whilst Huawei will enjoy the financial benefits it brings, in this their pool of talents and showing a stage of training that is much larger than expected, training these nations in making their own national 5G developers on a Huawei core is a larger play and that is one that brings in the revenue and then some.

All this was a path that the US could have committed to but they do see that the data is the future currency and they do not want to share, the US was the only one efficiently gathering data and their value is based on all this, all that whilst their prospect was ludicrous all the way to sieve based routers on a global scale. The NSA and GCHQ aren’t the only players in the field, the US merely wanted to limit the data drain value and 5G makes it a non place, ata will go nearly anywhere, you merely need to ask Amazon (Jeff Bezos) and ask him where his data has gone to and he cannot answer that question, neither can former FBI agent Anthony J. Ferrante (an FTI consulting joke), as such we see a 4G failure and it will merely get larger in 5G, more data will go anywhere and the US is on board with limiting this as long as they get the data. That is the stage we see and it is not idle speak, there is too much information out there. 

So as we see the events unfold over this year we will merely see that non US success stories will take the limelight showing us just how far the US has fallen behind in 5G. That is the stage we are sailing to and we will see large players in media remaining in denial of that, that is until the evidence of data will open all over the place, at that point the carefully stated denials come out, as well as some claims that 5G is so much more complicated than anything else. Yet, it is a stage where we all see the impact without it hurting us too much, at least not more than it is hurting us now. 

In finality we see a first case where a lack of evidence is still enough to warrant a level of discrimination, did you consider that? We are getting short changed on cheaper phones and internet because the larger players have their own bonus to consider and we do get to pay for that part, we will to a much larger degree than ever before.

 

Leave a comment

Filed under IT, Politics, Science

The incompetent view

I’ll admit, there are other things to write about, yet this is a larger issue than anyone thinks it is. The previous writers did not ponder the questions that were adamant, and Stephanie Kirchgaessner follows suit (at https://www.theguardian.com/us-news/2020/jan/27/nsa-faces-questions-over-security-of-trump-officials-after-alleged-bezos-hack) when we consider that the focus here is the NSA in ‘NSA faces questions over security of Trump officials after alleged Bezos hack‘. You see, it is not merely the fact that they got the stage wrong, it is the fact that everyone is looking at the stage, whilst the orchestra is missing, so how about that part of the equation and that leads to very uncomfortable question towards WHY the US is tailing on 5G and why it is trying to tailgate into the 5G room. They forgot what real innovation is and Saudi Arabia is seemingly passing them by, a nation that has forever been seen as a technological third world is surpassing the US and it is upsetting more and more people.

The US National Security Agency is facing questions about the security of top Trump administration officials’ communications following last week’s allegations that the Saudi crown prince may have had a hand in the alleged hack of Jeff Bezos“, with this the article opens and basically nothing wrong is stated here, yet when seen in the light of the byline which was “Democratic lawmaker asks agency if it is confident the Saudi government has not sought to hack US officials“, as such it becomes an issue. first off, the question is not wrong, because the US administration has a duty to seek the safety of communications for its coworkers (senators and such), yet in all this, it does become a little more clear when we see “Ron Wyden, a senior Democratic lawmaker, asked the director of the NSA whether he was confident that the Saudi government had not also sought to hack senior US government officials“. You see in the first, Saudi intentional involvement was NEVER established, moreover, the report (I looked at that last week) has several hiatus of a rather large kind, as such the formulation by this 70 year old person is quite the other issue. 

It is my personal conviction that a Fortune 100 company should consider the danger they open themselves up to when letting cyber issues be investigated by FTI Consulting. The entire matter of how infection was obtained (if it was infection), and that the entire matter was instigated by any third party who had gained access to the phone of Jeff Bezos, and in all this enough doubt was raised who got access and more importantly that there was no evidence that this was ANY Saudi official, as such the short sighted “whether he was confident that the Saudi government had not also sought to hack senior US government officials” by a 70 year old who shows issues of lack of critical thinking, no matter what which school he went to when he was half a century younger.

And again we see the reference towards “The senator from Oregon is separately seeking to force the Trump administration to officially release the intelligence it collected on the murder of Jamal Khashoggi, the Washington Post journalist who was killed in a state-sponsored murder in October 2018“, which is another flaw as there was never any clear evidence that anyone in Turkey was “killed in a state-sponsored murder in October 2018“, more importantly, the French UN Essay writer who was seemingly involved in both reports is showing a lack of critical thinking all by herself.

All this whilst Paul Nakasone (director NSA) is confronted with “was believed to have been the victim of a hack that was instigated after he allegedly received a WhatsApp message from the account of Crown Prince Mohammed bin Salman“, the problem is twofold, in the first I personally see the report by FTI Consulting as a hack job, not a job on a hack. There are several sides that give doubt on infection source and moreover there is additional lack of evidence that the source was a Saudi one. More importantly other sources gave away issues on WhatsApp some time overlapping the event, exploits that made it into the press from all sides giving the weakness that any unnamed party could have played to be a Saudi delivery whilst the file was not from that delivery point. Issues that were out in the open and the report gives that FTI Consulting ignored them. It could read that a certain French Essay writer stated ‘I Have a Saudi official and an American phone, find me a link, any link‘, I am not stating that this happened, but it feels like that was the FTI Consulting case. When was the last time you saw an intentional perversion of justice and truth?

And when we see: “The issue is now the subject of an investigation by two independent UN investigators“, we see an almost completed path. When we see all this lets take a step back and consider. 

  1. An American Civilian had his mobile allegedly (and optionally proven) hacked.
  2. The hacker is not found, the one accused cannot be proven (at present) to be the hacker.
  3. This ends up with the UN?

And I am not alone here. Three days ago (after my initial findings) I see (at https://edition.cnn.com/2020/01/24/tech/bezos-hacking-report-analysts/index.html) the headline ‘Bezos hacking report leaves cybersecurity experts with doubts‘, there we see “independent security experts, some of whom say the evidence isn’t strong enough to reach a firm conclusion” as well as “several high-profile and respected researchers, highlights the limits of a report produced by FTI Consulting, the company Bezos hired to investigate the matter“, so basically, the hair lacking CEO, who owns the Washington Post (where Khashoggi used to work) is allegedly hacked, he seemingly hires FTI Consulting on what I personally believe to be a hack job on hacking phones and the UN is using that biased piece of work to slam Saudi Arabia? Did I miss anything?

Yes, I did, the quote “The report suggested the incident bore hallmarks of sophisticated hacking software“, the problem here is that there is no way to see WHERE IT CAME FROM. Yet other sources give out several pieces on WhatsApp and how other sources could have a free go at infesting people. All whilst we also see “the paper revealed a lack of sophistication that could have been addressed by specialized mobile forensics experts, or law enforcement officials with access to premium tools“, all this whilst the entire setting went around the existence of cyber divisions. There is a link Jeff Bezos – Amazon – FTI Consulting – United Nations. At no point in this do we see any police department, or the FBI, why is that?

As such when we see “A key shortcoming of the analysis, Edwards said, was that it relied on a restricted set of content obtained from Bezos’s iTunes backup. A deeper analysis, she said, would have collected detailed records from the iPhone’s underlying operating and file systems. Other security experts characterized the evidence in the report as inconclusive“, I would state that this is merely the beginning.

Rob Graham (CEO Errata security) gives us “It contains much that says ‘anomalies we don’t understand,’ but lack of explanations point to incomplete forensics, not malicious APT actors” and Alex Stamos, the former chief information security officer at Facebook and a Stanford University professor gives us “Lots of odd circumstantial evidence, for sure, but no smoking gun“, in all this the extreme geriatric Ron Wyden (Oregon) is asking questions from the NSA with the text “asked the director of the NSA whether he was confident that the Saudi government had not also sought to hack senior US government officials” with the emphasis on ‘also‘, a stage that is not proven, and more importantly is almost redundant in the hack job we got to read about. As such I am not surprised to see “FTI Consulting declined to comment“, I wonder why?

It is even more fun to see the CNN article have the stage where we see “a research group at the University of Toronto, offered a suggestion that could allow investigators to gain access to encrypted information that FTI said it could not unlock“, as such we see that there are skill levels missing in FTI, for the simple reason that this report was allowed to leave the hands of FTI Consulting, a Firm that is proudly advertising that they have 49 of the Global 100 companies that are clients. If I had anything to say about it, those 49 companies might have more issues down the road than they are ready for, especially as they have over 530 senior managing directors and none of them stopeed that flimsy report making it to the outside world. I would personally set a question mark to the claim of them being advisor to 96 of the world’s top 100 law firms. I would not be surprised if I could punch holes in more cases that FTI Consulting set advice to, in light of the Bezos report, it might not be too hard a stage to do.

CNN also has a few critical points that cannot be ignored. With “The report’s limited results are a reminder that it can be extremely challenging to reconstruct the activities of a determined, well-resourced hacker, said Kenneth White, a security engineer and former adviser to the Defense Department and Department of Homeland Security“, I do not disagree with that, but the stage where WhatsApp had a much larger problem, is a given, and the report does not bring that up for one moment, that report was all about painting one party whilst the reality of the stage was that there was an open floor on how it was done, yet the report silenced all avenues there. In addition, Chris Vickery (Director UpGuard) gives us “other evidence provided by FTI increased his confidence that Bezos was being digitally surveilled“. that is not in question, core information directs that way, yet the fact that it was a Saudi event cannot be proven, not whilst Jeff Bezos is around hundreds of people in most moments of the day, that part is the larger setting and FTI Consulting knowingly skated around the subject, almost as it was instructed to do so.

One expert who wanted to remain anonymous gave us all “There’s an absurd amount of Monday morning quarterbacking going on” as well as “This isn’t a movie — things don’t proceed in a perfect, clean way. It’s messy, and decisions are made the way they’re made“, that expert is not wrong, and he/she has a point, yet the foundation of the report shows a massive lack in critical thinking whilst the report relies in its text on footnotes (as one would) yet on page 3, the text is “Al Qahtani eventually purchased 20 percent ownership in Hacking Team, apparantly acquired on behalf of the Saudi government. 8

all whilst footnote 8 gives us “https://www.vice.com/en_us/article/8xvzyp/hacking-team-investor-saudi-arabia” so not only does the FTI Consulting Job rely on ‘apparantly‘, the article gives in the first paragraph “Hacking Team was thoroughly owned, with its once-secret list of customers, internal emails, and spyware source code leaked online for anyone to see” as such we see ‘spyware source code leaked online for anyone to see‘, how did FTI Consulting miss this? That and the WhatsApp issue in that same year opens up the optional pool of transgressors to all non state hackers with considerable knowledge, as such the amount of transgressors ups to thousands of hackers (globally speaking). 

FTI Consulting missed that! and it missed a lot more. The article also sets a link to David Vincenzetti and for some reason he is not even looked at, there is no stage in the FTI report that his input was sought out, which in light of all this is equally puzzling. He might not have had anything to report, or perhaps he had enough to report taking the focal point away from Saudi players, we will never know, the joke (read: report) is out in the open in all its glory on limitation. 

In light of all this, did the question by Ron Wyden to the NSA make sense? As far as I can see, I see several points of incompetance and that has nothing to do with the one expert stating that this is a messy, the entire setting was optionally incompetent and for certain massively incomplete. 

More importantly, the last paragraphs has more funny parts than a two hour show by Jimmy Carr. The quote is “Anyone who has had communication with either MBS or his brother Khaled should assume their phone is hacked. Congress needs to get answers from NSA on what it knew about the hack of Bezos phone, when it knew it, and what it has done to stop Saudi criminal hacking behavior” and it comes from CIA analyst Bruce Riedel. Now, the quote is fine, but the hilarious part is how it was phrased (expertly done). Lets go over it in my (super subtle) way: “Anyone who has had communication with either MBS or his brother Khaled should assume their phone is hacked by Saudi, US or Iranian officials. Congress needs to get answers from NSA for a change on a matter that they were never consulted on whilst the report ended up with the UN on what it knew about the hack of Bezos phone, a person who has a few billion and a lack of hair but beyond that has no meaning to the US economy, he keeps all his gotten gains, when it knew when the phone of a civilian was allegedly hacked and, and what it has done to stop Saudi criminal hacking behavior which is not proven at present other than by people who have something to gain from seeing the Saudi’s as the bad party (like Iran), all in a report that is lacking all levels of clarity and proper investigation“, this is an important setting here. Just like the disappearance of a Saudi columnist writing for the Washington Post (another Jeff Bezos affiliate), we do not proclaim Saudi Arabia being innocent, merely that the lack of evidence does not make them guilty, in the present the hacking issue does not make Saudi Arabia guilty, the irresponsible version of the FTI Consulting report shows a massive lack of evidence that makes any Saudi Arabian party more likely than not innocent of all this and as both reports have one UN Female French Essay writer in common, it is more and more like a smear campaign than an actual event to find out what actually happened. Who signed up for that? I wonder if the NSA did, I feel decently certain that until they get all the actual evidence that they do not want to get involved with political painting, their left foot is busy keeping them standing up in a world of hunkered and crouched idiots.

Yet that is just my simple personal view on the matter.

 

1 Comment

Filed under IT, Media, Military, Politics

The cornered bully

We all have these moments, when we have to speak out against dopey (the bully in the corner) but the boss we report to is a spineless sack of shit and he will not do anything, more importantly he seems to be heralding the voice of the bully like he has credibility. So there we are, the bully (America), the spineless boss (pretty much most nations in the EU and the Commonwealth) and the people ready to speak out, the IT experts who are muzzled by bosses, because they are afraid to start a fight.

That is the setting that the Guardian introduces us to with ‘Using Huawei in UK 5G networks would be ‘madness’, US says‘ (at https://www.theguardian.com/technology/2020/jan/13/using-huawei-in-uk-5g-networks-would-be-madness-us-says). We have seen it before, the US is now getting more and more afraid of the billions being missed out on and they are going full throttle with the fear mongering. Even as we see “Matt Pottinger, presented an incendiary dossier which they said featured new evidence of the security risks of relying on Huawei technology in future phone networks“, we get introduced to the Gerbil-in-the-groceries Matt Pottinger the new flagship for presenting ‘news’ just like Colin Powell with his Silver briefcase. You see, I am not afraid to face that music, neither are the hundreds of intrusion experts who have been unable to validate the wild fantasies of America, America took the VHS example and is trying to steer the ships of nations and now they are boasting an unwillingness to share intelligence. This is nice, but in the end, the Intelligence from the US is backdated and there is every chance that it is as false as any news they spread. The entire bully network comes to blows when we see “The intense and public lobbying presents an immediate headache for Boris Johnson“, I also do not disregard “having been repeatedly advised by the UK’s security establishment that any security risks can be contained“, this is equally important, because Alex Younger who is the official Big Boss at MI-6 stated that infrastructure this important should not leave British hands, this is not a case of Huawei being a danger, it is a national policy and that is fine, I would even state that this gives the UK and option to buy the Huawei technology, rip it apart, set it under a loop and optionally give BT a chance to become a contender, US firms will jump at that opportunity, to have Huawei technology without the Huawei fear. Let’s face it, Huawei offered that solution to the US last year, but there is a larger concern and for the US it is not really spying, it is the fear where data will end and there are several new players all non-American whilst the American data gatherers are tapped out (financially), so the US is bullying all others to wait hoping that Silicon Valley will come with an American solution that is actually real 5G, all whilst it is not coming and at present all those who delay are losing momentum and twice the amount of time on the 5G path, so any delay up to a year means a 2 year delay and they all know that you are either better (the US is not), you are first (the US can not) or you cheat (the only path the US has at present). 

This all gives us two distinct realities, the first is that for the first time the US is not the first at the top in technology, a shock they have a hard time surpassing and they are not the only 5G company, they are really not ready for real 5G, you see in my past blogs I showed that whatever they call 5G is really not 5G, nowhere near, not at those speeds. The Guardian also gives us “Ahead of the UK decision the head of MI5, Andrew Parker, said over the weekend that he saw “no reason to think” that using Huawei technology should threaten intelligence sharing with the US“, Mr Parker is right, but mainly because the quality of US intelligence is seemingly fading, they are losing sources all over the Middle East and they have too little in the Far East, as such we lose out on a source that is mostly redundant. Mr Parker’s assertion is in opposition to “a senior US official who was part of the delegation, who said: “Congress has made it clear they will want an evaluation of our intelligence sharing.”“, two parts are shown here, the fact that the bullying continue and the fact that this ‘senior US official‘ is left nameless, just like the fact that this matter is on the desk of a deputy national security advisor. In the age where America goes to vote next year, no one wants to burn their fingers and their career on this, and when the truth comes out (and it will) their careers are gone in the international field and the national field no longer has the juicy options it once had. 

When we get to “The officials, who had flown in specially from the US, would not spell out what the “relatively recent information” that they had shared with their UK counterparts was“, it is all a load of HogWash (American expression), you see, If there was any actual danger the US would spread it like a wildfire to EVERY security IT Consultant, but they did not and the news is flat on that. What we do get is ‘Facebook and Google are as much of a threat as Huawei‘ (source: Marketwatch) where we see “Facebook is already undermining the democratic process, including in the U.S. itself, where the platform has facilitated foreign interference in elections.

 

In addition, Facebook has fueled division and fear, and refused to remove hate speech, Holocaust denial and anti-Semitic posts. The platform has been described as a “megaphone for hate” against Muslims, and it is accused of facilitating a genocide against the Rohingya in Myanmar. For these reasons, the British actor and comedian Sacha Baron Cohen recently called Facebook “the greatest propaganda machine in history.”” This is true but it is only he side effect of the matter, the real issue is not there it is seen in “these threats already exist, because Facebook (which also owns Instagram and WhatsApp) and Google (which owns YouTube) have an astonishingly comprehensive range of data about their users — their location, contacts, messages, photos, downloads, searches, preferences, purchases, and much else” It is not the porridge, it is the spoon, the data is everything and as the data no longer merely flow to America, but it will flow to China as well (via aps and so on) in a larger growing slice it will no longer flow to the US, that is the real fear, it will impact all firms relying on data and that is the real ticket and it will have an impact sizing up to billions of dollars every year, it is a larger impact as data becomes the new currency. I will go as far as setting the stage that the IP I had designed will impact it even further for the globally based 400 million small business firms. Even as America sneers at the little guy, they are the foundation of data, not Google and not Facebook, they are merely the facilitators not the creators. That reality is now up for grabs in more than one way. If it was really all about security, the news would have picked up to a much larger degree to ‘Cisco critical bugs: Nexus data center switch software needs patching now‘ with the added text “Cisco has disclosed a dozen bugs affecting its Data Center Network Manager (DCNM) software, including three critical authentication-bypass bugs that expose enterprise customers to remote attacks” (source: ZDNet), this is not the first time, I gave more info months ago when at least one such an issue woke up and whilst all are screaming about 5G security and feigned Chinese values, they all ignore the Elephant in the room (Cisco), I do believe that it was an honest mistake, there was no ill practice at work (from the side of Cisco), but there is a larger concern and those security advisors connected to the Oval office do not seem to care (or optionally merely not comprehend), it is a larger issue that is impacting the Fortune 500, but the press is blind to it. In support there is also ‘A Cisco Router Bug Has Massive Global Implications‘ (source: Wired) with the added information “The devices play a pivotal role at institutions, in other words, including some that deal with hypersensitive information. Now, researchers are disclosing a remote attack that would potentially allow a hacker to take over any 1001-X router and compromise all the data and commands that flow through it. And it only gets worse from there“, which was given to us last May, with the almost complete rundown by researchers from the security firm Red Balloon. And the added information “Once the researchers gain root access, they can bypass the router’s most fundamental security protection. Known as the Trust Anchor, this Cisco security feature has been implemented in almost all of the company’s enterprise devices since 2013“, this is the setting, an impact that is global and the US is keeping it quiet, yet the unproven stage without any real evidence is heralded to the max, which gives the larger implication that this is about data and about the financial security of the US, and why should we pay for that? They were flaccid for years, they refused to innovate and China started to innovate, even as we see in the Guardian article that the kit from Huawei “cheaper and more advanced than rivals“, we see one part, the fact that the US has nothing to counter what Huawei offers is the larger concern (for America), they are 2-3 years behind and that implies that they have nothing to enter the field with until 2025 and become a real contender, at which point Huawei is the new standard and as such data will flow via Huawei and not via American solutions, the data loss for America will be to some degree crippling. their revenue from advertisement, their revenue from data sale and other revenues liked to that are all impacted, it could cost the US 50-150 billion in the foreseeable future and that is where the US fear kicks in, their debt is out of control and that amount would have a much larger impact on the infrastructure that can no longer be paid for, one system after another will fail, a cascade of systems all collapsing because the US has no reserves left, the EU is also out of reserves and they see the 5G part as essential to surpass American firms and most need to contend with spineless politicians and long winded ‘talks’ by the EU gravy train, the are all in it for the money and commercial EU is seeing it all come apart, they can hold on if they get the 5G edge, an option that the US dreads. 

As such the cornered bully is getting more brazen, relying on past tactics that exploded in everyone’s face and they are still doing it, hoping that they can get away with it the second time around, optionally they will rely on other technologies, as long as they are not Chinese, it is not the hardware, it is the data. Ericsson gives us “5G is designed for industrial applications. This means that falling behind on 5G as a platform for innovation will jeopardize the European industrial base. With two global vendors based in Europe, the continent has the prerequisite to lead” (they merely fail to inform us (for valid reasons) that the two players are Ericsson and Nokia, but their solutions are almost two full generations behind Huawei, they would need two years to upgrade and that is what they face, they were all asleep at the wheel and now that the ferryman wants to get paid for all the time they were asleep, they are no longer willing to foot the bill, 4G is almost at a break even point and that is stopping most to go forward, even as they see that 5G is going to take over, they are all afraid that the next iteration of hardware is just beyond the horizon. And they are still setting larger foundations for themselves, because the real cash is the data, not the hardware and that is the stage where they all need to select an optional new provider, the devil you know beats the devil you know not and they want their coins. 

In all this the bully in the corner is getting more and more aggravated and we see that, but they did this to themselves, when I can surpass the US in IP (something I never thought possible) that is the point you need to realise where the US failed, their IP is just not there and they have no real counters other than the Silver Briefcase scenario hoping it will buy them enough time.  You see, when we accept the foundation of one quote: ‘5G Antenna Market was estimated to be US$ 9,835.0 Mn in 2018 and is expected to reach US$ 34,720.1 Mn by 2027 growing at a CAGR of 15.5% over the Forecast Period Owing to the Evolution of Smart Antennas‘, we see what the US is missing out of, the antennas alone are setting the stage of 9-15 billion each year surpassing my estimation of 50 billion value by 2022, yet that is merely the antenna’s, Huawei launched their 5G routers last week and that is where the money becomes a serious setting. When we combine the stage offered “The power of the chipset enables the router to be the first to support commercial application of 4G and 5G dual-modes. It is the first to have the capacity to perform to industry benchmarks of peak 1.65Gbps@100MHz download speeds” with “LTE Advanced has been available for several years now and some carriers (notably AT&T in the US) are calling it 5Ge, or 5G Evolution, even though it is most definitely not an official 5G standard, but rather the latest iteration of 4G” (source: Forbes) you get to see how dire the US situation is for the US, they claim to be 5G and they are not, they claim that Huawei is a danger and they cannot prove that it is, the data is everything and they are at an ever growing risk to lose large chunks of it. Now that Huawei is forced towards their Harmony OS, we will see a growing non US population switching, meaning that the data is no longer going to the US in a readable format. That is the larger loss for the US and they are getting close to desperate. 

In my view, that is the consideration of dumping the brains that they needed and that is the consequence of a flaccid business path, down the track it tends to cost and the US is scared of that moment, hoping to scare all others, we see that the EU is considering their options and as the US loses nation after nation we see  larger stage, when the data surpasses into national hands again, they will not care about US substandard intelligence, most will have their own and a new generation of apps will be adopted by its users on a global scale.

 

Leave a comment

Filed under Finance, IT, Media, Politics

Wrong way intersection?

We all look at times, we look in the direction that we are going we look at where we want to be, in this we are all alike and for the most, we stop to look where we were, what we passed and where we came from. These are natural moments. So what is natural on focussing on Huawei, especially the accusations by Finite State, a Matt Wyckhouse undertaking. I have a few issues here. You see, when a person hides behind statements like: “‘The Finite State report was highly critical of Huawei, claiming that the Chinese company’s “devices quantitatively pose a high risk to their users. In virtually all categories we examined, Huawei devices were found to be less secure than those from other vendors making similar devices.” According to Finite State, this included potential backdoors. “Out of all the firmware images analyzed, 55% had at least one potential backdoor,” Finite State reported. “These backdoor access vulnerabilities allow an attacker with knowledge of the firmware and/or with a corresponding cryptographic key to log into the device.”“, when the bla bla is surrounding “Out of all the firmware images analyzed, 55% had at least one potential backdoor“, a percentage with ‘potential backdoor‘, you should optionally be regarded as a hack giving a hatchet job, plain and simple. A real cyber security firm will give us: “These are the clear backdoors found“, there is no percentage, and it will be presented as evidence plain and simple. That is how this works; let’s face it, Columbus Ohio is not really Silicon Valley, is it? (there is a plot twist, read on please)

And when TechRadar gives us: ‘Huawei’s telecom equipment is more likely to have flaws than rivals’ claims report‘, my question becomes based on what evidence? When it is linked to: “when compared to similar equipment manufactured by its rivals Juniper and Arista“, why are they dependable? Or perhaps only the NSA has those backdoors? There is a disgusting amount of bias coming out of the mouths from those who should stay absolutely neutral, and it gets to be worse.

Twenty four

It is like a real time drama with Kiefer Sutherland, less than 24 hours ago, Cisco gave us: “Cisco issued three “critical” security warnings for its DNA Center users – two having a Common Vulnerability Scoring System rating of 9.8 out of 10“, which is really really bad and the rest of the media ignores it completely. So when we get: “In one advisory Cisco said a vulnerability in the web-based management interface of DCNM could let an attacker obtain a valid session cookie without knowing the administrative user password by sending a specially crafted HTTP request to a specific web servlet that is available on affected devices. The vulnerability is due to improper session management on affected DCNM software” there is a much larger story, especially as Cisco is working to remove a few severe failings in its own system, which are unlikely to be removed for a few more months, all leading to larger issues, but the media is seemingly more interested in spouting anti-Huawei materials and not interested in warning optional victims, how does that go over to you?

TechRadar also gives us: “Finite State makes big claims in its report but until it is publicly released, we won’t know for sure if its findings are accurate. However, now that the news is out, further investigation into its legitimacy will likely be carried out by the media, world governments and of course by Huawei itself“, a relatively unknown company in the middle of nowhere; that is how it reads to me and I will happily have my serve of humble pie when they are proven to be correct, yet that public release is likely to find delays to maximise on fear, all whilst Cisco is evading the limelight by media friends. This is not entirely correct from my side, Cisco has been warning all kinds of parties since they were found and that is a noble thing, yet the media does not hand out that reality to the larger media does it? (They had not responsibility to do so)

I have a second issue, this is supposed to be a ‘for profit‘ venture and that is fine, they have been around for 2 years, yet we now see: “the security report was done pro-bono as the company believed making this information public was the best way to inform policy makers of the security issues in Huawei’s equipment“, so this report requiring a massive amount of hours and testing if we go by: ‘all the firmware images analysed‘, the (initial) absence of numbers is also debatable here, so in all this time and resources required, this report was done pro-bono? Is (like it goes in deceptive conduct) merely a pro-bono report, or are they servicing Juniper and/or Arista? Is that not a valid question?

I find the setting debatable from the mere TechRadar point of view. From my point of view, well known cyber experts have looked at Huawei and none of them have given any clear indication that there was a clear and present danger with anything that Huawei has, they had shown previous issues and they had been dealt with, so unless Finite State gives the golden bullet with clear evidence, than the future of Finite State might not be that bright. Can we expect anything form a cyber-firm that facilitates for others? Well, yes but those are not known as Cyber Experts, they are merely digital marketing firms and the method used implies that they are not very good at what they do.

So I can jump in there and show them how to do it, as long as it comes with 300 W Spring St #1904 as a stating bonus (we all have our price), it is 2 blocks from the Ohio FBI office, as well as a nice view of the Scioto River (good for enjoying coffee in the morning). Would I compromise? Optionally, but do you want to have faith in someone who compromises, or someone telling you how it is at a price? I get it, at times there is a tactical reason to do things pro-bono, sometimes it brings in the larger fish, yet in this case, when the floor falls from under them, in the way it was presented, do you have faith in them looking towards keeping you safe? Is that really the security you want to bank on?

Cisco has issue, yet they came forward (almost) immediately telling us how it is, the fact that the media is treating them darling and keeping them out of the media to the largest degree is not a crime, it places merely question marks on the integrity of the media, and how much credibility do they really have?

There is a larger concern and it is a serious one, the media has set the stage that less and less information is trusted, especially in fields where trust is essential. It changes the game, but how is not to be told, we cannot tell, yet there is every concern that Europe, Asia and India are less and less likely willing to trust US equipment. There has been clear indicators that 5G evolution did not give rise to trust, the fact that so called pro-bono work is working out is also not a given, until there are clear trustworthy sources showing all that Finite State had indeed the silver bullet, things can only go worse for many over the long term and that has been proven in several ways offer the last decade. It is not that I want.

Let’s not start kidding around here, the report is damning, there is no doubt. When we look past the TechRadar hype created and take a serious look at the paper (at the end), we get 55 pages of tech heaven, all jetlagged turbo text, with all the hypes that any techie get off on.

When a firm gives us: “Across the firmware tested, there were 8,826 observations of vulnerabilities with a CVSS score of 10.0, the maximum severity level, indicating serious flaws in the systems“, it better come with backing, and the source of the data, as well as the firmware better be verifiable, from my point of view, any discrepancy shown and Finite State becomes liable. Even when we see: “Our automated system analyzed more than 1.5 million files embedded within 9,936 firmware images supporting 558 different products within Huawei’s enterprise networking product lines“, the sources are not given to us (as far as I saw). The appendix does give us the hardware list and it is a huge list, so now that the die is cast we will have to see what happens next, not merely to Huawei and Finite State, large names have stated on the record that no issues had been found, they will be in equal measure get judged if the scrutiny on the Final State paper holds up, no matter how this goes, there is a shit storm coming and it will impact at least one party, yet how large it will be cannot be stated at present, the claims are too loud and if the scrutiny breaks the paper it might be the end of Finite State and its board of directors before they got decently started, should they make it, the opposition is a lot larger and it gets to be a lot uglier for many players involved.

The paper also gives clear premises, for one there is: “It is common for embedded devices to ship with a default password enabled for the primary account, “root” in this case, as long as the password can be changed and is documented as part of the standard operating procedure of the device.” OK, that is fair enough, but there is a second part, how many consumer get told on how to change that? And how does that compare to issues found with Sprint, T-Mobile and Verizon as documented parts that show users how to do that. Is that not equally important? In the end I can debate all the parts until I look like a failed auto asphyxiation attempt, yet the scrutiny from me has little to no value, it is the response of Huawei and the other players that now becomes the part, because these expert making 1000% or more of what I make will not be allowed the ‘Oops!’ or ‘That was not part of our investigation’ excuse, in that way whatever comes next will get ugly fast and in light of my initial exposure of anti-Huawei goons, I have an equal responsibility to take this to the next level, no matter how it goes, because that too is part of accountability. No matter how we slice it, Finite State has given us something serious to look at (one of the very first to do so), so now we look at the boffins at MiT and Stanford on what they make of it, and if the technical dudes at DARPA decide to wake up for this one, that would be nice too.

I look forward to round two, because it will be a beauty to watch on hundreds of channels all over the planet, this would make for great TV (and optionally ten times better than anything the Kardashians can show) so I’ll get the popcorn for this one.

https://finitestate.io/wp-content/uploads/2019/06/Finite-State-SCA1-Final.pdf

Finite-State-SCA1-Final

 

Leave a comment

Filed under Finance, IT, Law, Military, Politics, Science

Blackadder to the rescue

Yes, now for something completely different. Today only partially continues yesterday’s conversation. The article ‘Iranian puppets‘ gives us (at https://lawlordtobe.com/2019/06/14/iranian-puppets/) where I mention: “I will never proclaim myself towards Iran“, I also made mention of the 15 bitches and a serve of coffee (between the lines), yet I will always proclaim towards evidence. Evidence is everything and even whilst Iran is the most likely guilty party, I tend to follow the evidence. The evidence puts us with Houthi forces, optionally there is enough circumstantial evidence involving Hezbollah, however, this seemingly changes today as more than one now give us: ‘UK joins US in accusing Iran of tanker attacks as crew held‘, here I remain cautious. You see, the US had graphics in the Iraq WMD part and that got us in different waters, even as much better questions should have been asked with that clusterfuck in the making. The UN secretary general António Guterres called for an independent investigation, a part I very much support.

The intelligence suckers tend to be driven by EGO and whoever their Commander in Chief is and that tends to be needlessly politically driven and there the not guilty tends to be a target, this is not the same as the innocent, but you see the impact I am referring to. In the UK the Foreign Office is giving us: “It is almost certain that a branch of the Iranian military – the Islamic Revolutionary Guard Corps – attacked the two tankers on 13 June. No other state or non-state actor could plausibly have been responsible“, I am willing to agree with this, however we have seen decently clear evidence that in more than one case Iranian flag officers acted on their extreme self, not with the official support from the actual government. It is the consequence of the Iranian clerics having direct access to Iranian generals and acting on what they proclaim is the will of Allah. Those who do not grasp that part are out in the cold, pointing at the wrong party and creating escalations.

So whilst the world goes with: “Iran did do it. You know they did it because you saw the boat. I guess one of the mines didn’t explode and it’s probably got essentially Iran written all over it … You saw the boat at night, successfully trying to take the mine off – and that was exposed” that is one view to have and it might be the correct view, yet we already have two parts here. The fact that the mine did not work implies that Iranian hardware has additional issues (or optionally a non-trained individual had access to that hardware and did not set it up correctly, which is actually more likely). The second part is that the act was about deniability, giving more need to point at a state actor, but was it one with clearance or one deciding that they had to make their government look good? The issue around deniability is set not in stone, but it seems to be on a tablet where someone else has the erase function active. And in this the US and the UK have played similar games over the last 10 years. So let’s set this in a speculative example.

The Iranian Ministry of Roads and Transportation is run by Ali Nikzad. He decided that the boats were transgressing on Iranian sovereign waters and ships are transport, so Ali Nikzad decided to give these transgressors a lesson, he gets a hold of officers who are eager for promotion and he plays the ‘I need to test our equipment for transportation of dangerous goods’, he gets mines (plural) and he tests the mines with an engineer who is not really qualified to operate mines. The attack works, but one mine was not set properly. Now he has a problem, because even as he got the equipment, he was not allowed to operate in the way he did as that was a military action, and he is merely a lowly Minister of Roads, commercial shipping lanes and Transportation, he now has to resolve the issue before it taints him and he gets someone to remove it (most likely the engineer who wrongly set the mine).

In addition to this, when we see how Belgium defused a mine situation according to the Dutch, will we see more or less reliability? Was it the image that made for the change?

All this a speculation, but the play is not that speculative, several players have engages in similar games, optionally the IRGC knew of the operation, and they did not act because their fingers were not in the cookie jar; they all have a scapegoat and there is no physical evidence to support any story that anyone tells.

This is one of the intelligence games that are out there and now we have a state actor and everyone (led by the US) are now pointing at the wrong state actor and the evidence is out there proving some right as the involved person is seemingly Iranian, but wrong as this is a bogus action in the first place. Now we see Hamid Baeidinejad (Iranian ambassador to the UK) all huffy and puffy because he is doing what Tehran told him to do and the game he plays looks good, because he truly believes that he is playing the proper game as instructed by Tehran and let’s face it, the US does not have a great track record when it comes to Intelligence data and parsing intelligence data to create actual verifiable data, do they. When in doubt, call the NSA at +1-301-688-6311, ask for Deputy Director Barnes (General Nakasone is often too busy according to his personal aide).

In all this, there is a surprising realisation, you see, the opposite is also an option and I wonder why it is not actively investigated, there is an opposing solution that takes Iran out of the equation and it is a solid solution that stretches 74,967 meters in length and could change the game, in addition to that it could hinder Iran to the larger degree, basically to the degree where Bandar Abbas would financially be decimated, its economy would plummet to below basement levels.

I wonder how willing the UAE would be to change the game to benefit their economy. Oman could optionally benefit as well, so there is a solution that could propel two nations, whilst freezing the Iranian economy twice over. You see, as I look at the state of play, a proxy war can go in two directions; you can be in denial as there is no proof, or you can go into proclamation to set the stage of something that is legally allowed, people look at the first and then ignore number two. I let you work out the puzzle and let you figure out what some never considered.

A Monty Python solution presented by Blackadder gives us the second option in two ways (at https://www.youtube.com/watch?v=ZzXhLp2wLQo) we see the approach to a literal following of orders then (at https://www.youtube.com/watch?v=UBhN28eTuP8) we see the application of intelligence: “I beg leave to commence a private prosecution the accused for wasting the courts time“, and in all this, the stage is set and optionally correctly set, yet there is a range of issues that have not been addressed.

Some will go with the smoke and fire part and that is all good and fine, yet when did we get a proper investigation before pointing the finger (optionally through the slipping them the bird)? To let this sink in, let’s take a look at American accusations: “By labelling some of the high-level waste as low level, the US would save $40bn in cleanup costs across the nation’s entire nuclear weapons complex. The waste which has been stored in South Carolina, Washington and Idaho would be taken to low-level disposal facilities in Utah or Texas“, whilst the clear danger of radioactive waste has been out in the open for decades we are confronted with: “This administration is proposing a responsible, results-driven solution that will finally open potential avenues for the safe treatment and removal of the lower level waste. DOE is going to analyze each waste stream and manage it in accordance with Nuclear Regulatory Commission standards, with the goal of getting the lower-level waste out of these states without sacrificing public safety“. In this application of rules, we are not merely rephrasing the stage of what is regarded as ‘safe treatment‘, it changes the face of danger by diminishing risks on the need for cutting 40 billion. Now we can agree that 40 billion is serious cash, yet after it passed the facilities in Utah and Texas, what damage will be left behind because standards and definitions were changed by people who desperately need things to get cheaper? And when this backfires, how will the US afford the reparations that will be in excess of a trillion dollars easily? saving $40 with a decent certainty that it will cost you $1,000 around the corner is not clever, it does not save anyone anything and it decimates the quality and value of living in Utah and Texas, so how good is that step once the proper denials are in place?

The same can be said in the UK and their approach of Fracking, shale gas options. In a stage where the Netherlands has had: “A total of 127 damage reports were received after a fracking earthquake in Groningen on Sunday morning“, in addition “the TCMG receives around 200 damage reports per week. Over the past two weeks, the committee received at least 200 reports per day“. Also before I forget, when I was young and living in the Netherlands, Groningen was plenty of things, there was even a rare occurrence of an earthquake (once ever whilst I was in primary school), the entire stage of living in Groningen changed after Fracking, a clear change in values and cost of living as properties have diminished and the entire area is now a minefield of accusations and litigations, how much will that cost the government in addition to the claims they get? There is a second danger, if any of those chemicals ever make it into the groundwater; the Netherlands has some options, whilst the UK as an island does not. Dangers that we see give the rise towards people and politicians seem to regard the element of denial, a dangerous stage on two fronts, in the UK the danger for living expenses as it goes up by 1500% when UK tap water is no longer safe to drink; in the US where radiation contamination when found too late will have new long lasting disastrous effects.

Merely two elements that have the same stage; the stage of denial can be a very dangerous one and in Iran we see a stage where we cannot afford to give in to that danger. We need to be certain, an actual war, one that Iran will lose regardless will still impact and optionally disrupt crude oil paths for decades, consider the next decade when oil returns to prices like $163/barrel. The restoration of any economy becomes close to nil, unless you make money from the oil industry. That is why I want to make sure that Iran is properly dealt with and in all this, my plan B remains valid and an optional alternative path to increase pressure on Iran.

Nobody is saying, stating or implying that Iran is not involved, the issue is WHO placed the mine and there is where we get the issue. The US and the UK clearly know this. In case of the US we have Timothy James McVeigh. Now consider what would have happened if that attack was post 9/11? I am not stating that anything wrong was done by the FBI, I am however decently certain that the entire investigation would have had a dozen other turns and double turns. There is absolutely no guarantee that the same result would have been presented. I am not stating that the FBI did anything wrong, I am not stating that anything else happened.

To look at this setting we need to consider a quote by Counterpuch.org. Here we see: “The FBI suffered another debacle last Friday when an Orlando jury returned a not guilty verdict for the widow of Omar Mateen, who killed 49 people and wounded 53 in his attack on Orlando’s Pulse nightclub in June 2016. The biggest terrorism case of the year collapsed largely thanks to FBI misconduct and deceit” there are more sources. NPR Radio gives us: “the prosecution had withheld crucial information for the development of their argument. It was not until after the prosecution had rested its case, nearly two weeks after the trial opened, that prosecutors disclosed the information in an email last Saturday“, as well as “federal authorities had also opened an investigation of Seddique Mateen after the shooting, basing the probe on a series of money transfers he made to Turkey and Afghanistan not long before the massacre. The defense argued that without those details, the defense had been unfairly hamstrung — an assertion that Byron rejected. He denied the motion earlier this week and allowed the trial to proceed” denial of facts as well as denial access to facts, denial of due process in light of whatever reasoning was given and as denial of circumstances. At this point the widow of Omar Mateen was regarded as not guilty and there is no way of knowing whether this was just, correct or merely the consequence of stacking the deck knowingly and willingly.

When you consider that personal ego made these leaps of consideration, and we see the impact, the need for higher intelligence usage and the better investigation of what is happening in Iran and by which person becomes a lot more essential. When we see three players all in a stage to wage war on Iran (an idea that I do not oppose) lets at least do it for the right reasons. Doing the right thing based on flawed and incorrect intelligence corrupts the act and over time degrades the reasoning of the act. It is important to see that difference, and whilst there are optional paths to making the Iranian economy tanking it to the bottom of the Strait of Hormuz, I will remain in favour of doing that. You need to have seen war in all its majesty of cadavers and victims to appreciate alternative parts, only those who played call of duty might like a direct war, which will only last until you actually get to wash the blood out of your hands, that sweet smell of blood will follow your nose until the day you die.

Iran might be going into a wrong direction, yet we do not have to follow them like stupid lemmings, as I stated, I am not against setting a war against Iran, I merely want alternatives that gets us the same result. A proxy war goes both ways, we merely have to alter the signs on the entrance door; it is our door, so we get to do that.

 

Leave a comment

Filed under Law, Media, Military, Politics

Iranian puppets

Saudi Arabia has been under attack for a while, yet the latest one has been the hardest hit for now. 26 people were injured in a drone attack on Abha Airport. The fact that it is 107 Km away from the border gives rise that this is not the end. Even as we see: “a late-night cruise missile attack by Houthi rebel fighters”, I wonder if they were really Houthi or members of Hezbollah calling themselves Houthi. In addition, when we see: “the missile directed at the airport had been supplied by Iran, even claiming Iranian experts were present at the missile’s launch” as the Saudi government stated this, I am not 100% convinced. The supply yes, the presence is another matter. There is pretty hard evidence that Iran has been supplying drone technology to Lebanon and they have been training Hezbollah forces. I think this is a first of several operations where we see Hezbollah paying the invoice from Iran by being operationally active as a proxy for Iran. It does not make Iran innocence, it does change the picture. the claim by Washington “Iran is directing the increasingly sophisticated Houthi attacks deep into Saudi territory” is more accurate as I see it. It changes the premise as well as the actions required. From my point of view, we merely need to be able to strike at one team, if anyone is found to be Lebanese, Saudi Arabia can change the premise by using Hezbollah goods and strike Beirut – Rafic Hariri International Airport with alternative hardware. Lebanon stops being the least volatile country in the Middle East and it would stop commerce and a few other options at the same time. I wonder how much support they get from Iran at that point. I believe in the old operational premise to victory

Segregation, isolation, and assassination, the tactical premise in three parts that is nice and all solving; It can be directed at a person, a location, or even an infrastructure, the premise matters. It is time to stop Hezbollah, that part is essential as it does more than merely slow down Houthi rebels, it pushes for Iran to go all in whilst being the visible transgressor, or it forces them to back off completely; that is how I personally see it.

So as we see the Pentagon rally behind diplomatic forces, I cannot help but wonder how it is possible for 15 dicks to be pussies? For the non-insiders, it is comprised of the 7 joint chiefs of staff, the septet of intelligence (Army, Navy, Air force, Marine, FBI, CIA and NSA) and of course the National Security Advisor. It is time to change the premise, it really is. It is also a must to proclaim ourselves to either the Kingdom of Saudi Arabia, or Iran and I will never proclaim myself towards Iran (a man must keep some principles).

We can be all angry find a solution to erase them. As I see it, my version is more productive in the end. They are targeting close to the border as much as possible, this implies that their hardware has limitations. Even so to merely rely on anti-drone and some version of an Aveillant system is economically not too viable, it will merely make some places (like airports more secure). When we look around we see that there are 6 ways to take care of drones.

  1. Guns, which requires precision and manpower
  2. Nets, same as the first, yet a net covers an area better chance of results and a chance to get the drone decently unharmed, or retrieve enough evidence to consider a counter offensive
  3. Jammer, a two pronged option, as the connection fails most drones go back to their point of origin giving the option of finding out who was behind it.
  4. Hacking, a drone can be used for hacking, but the other way is also an option if the drone lacks certain security measures, optionally getting access to logs and other information
  5. Birds of Prey (Eagle, Falcon), A Dutch solution to use a bird of prey to hunt a drone, an Eagle will be 10 times more deadly than a drone, Eagles are a lot more agile and remaining as fast all the time.
  6. Drones, Fighting drones with drones is not the most viable one, however these drones have paint guns which would hinder rotor function and speed, forcing gravity and drag to be the main issues for the drone.

The issue is not merely how to do it, but the specifics of the drone become a larger issue. An Eagle and most solutions will not work against the MQ-9 Reaper drone (to name but an example), yet Hezbollah and Iran rely on the Qods Mohajer (optionally the Raad 85), which when considering the range is the more likely suspect. What is important to know is that these devices requires a certain skill level, hence there is no way that a Houthi forces could have done this by themselves. It required Hezbollah/Iranian supervision. There the option of jamming and drones with a paint gun would work, if a jammer gets shot onto the drone, it will give them a way to follow, paint can have the same effect whilst at the same time limit its capabilities. If the drone is loaded with explosives and set for a one way trip there is a lot less to do, yet the paint could still impact its ability if there is enough space left, if the paint is loaded with metal it could light it up making it a much better target. All options that have been considered in the last few years in anti-drone activities, the question is how to proceed now.

I believe that inaction will no longer get us anywhere, especially when Hezbollah is involved. That is the one speculative part. There is no way that Houthi rebel forces have the skills; I believe that Iran is too focussed on having some level of deniability, hence the Hezbollah part. It is entirely probable that Iranian forces are involved, yet that would be the pilot and with the range, that pilot would have been really close to the Yemeni border making Abha airport a target, yet unlikely that more inland another target would be available to them.

Knowing that gives more options, but also makes it harder to proceed, the earlier five methods mentioned are direct, there is one other option, but I am not discussing it here at present as it optionally involves DoD classified materials (and involves DARPA’s project on Machine learning applied intelligence to the radio spectrum) and lets not put that part out in the open. It is actually a clever program conceived by Paul Tilghman, a graduate from RIT (Rochester Institute of Technology), an excellent school that is slightly below MIT and on par with UTS (my creative stomping grounds).

It is a roadmap that needs to be followed, I am all for bombing Hezbollah sites, unlike the earlier mentioned group of 15, I prefer my level of evidence to be a little higher as such the Tilghman solution is called for, after that, when we get that we can address the viability of Beirut and Tripoli with 2500 lbs hardware donations, depending on the evidence found mind you, we can make adjustments, as some materials would have needed to be shipped to Yemen either directly or via Lebanon and in all honesty, I am of the mind that Iran would not have done this directly. Proxy wars require a higher level of deniability to remain proxy wars; as such we need the hardware as evidence.

And even as we see: “Mohamed Abdel Salam, said the attack was in response to Saudi Arabia’s “continued aggression and blockade on Yemen”. Earlier in the week, he said attacks on Saudi airports were “the best way to break the blockade”” (at https://www.theguardian.com/world/2019/jun/12/yemen-houthi-rebel-missile-attack-injures-26-saudi-airport) we need to realise that this is growing and potentially a lot larger than before. Even as we acknowledge that the forces have withdrawn from the harbour, we have no insight on where they went, there is no indication that they have stopped fighting, merely that they are at the moment inactive, a status that can change at any given moment.

Add to that the threat (or is that the promise) by Tehran who decided to “threaten to resume enriching uranium towards weapons-grade level on 7 July if US sanctions are not lifted or its European allies fail to offer new terms for the nuclear deal“, here my answer is ‘What deal?‘, there is enough indication that enriching never stopped, but was merely scaled down to 95% of previous effort, as such there is no need to offer more incentives that will only be broken. As such my strategy to seek out Houthi (and optionally Hezbollah forces) to take away the proxy options of Iran, they must either commit 100% or back down, at present their fear is having to commit fully to this and change the stage of proxy war to actual war, and as such my strategy makes sense. They have no hope of winning as too many government would be willing to align with Saudi Arabia (that might make them surprised and happy as well), and a united front against Iran is what Iran fears, because Turkey would have no option but to cut ties out of fear what happens when we are done with the other Iranian puppets.

It is perhaps the only side where I disagree with James Jeffrey (US special representative for Syria engagement), I do not believe that it is a “hegemonic quest to dominate the Middle East“, I believe that Iran knows that this is no longer an option, yet bolstering foundations of a growing alliance is the best that they hope for and here Iran merely facilitates in the urge to state to Syria (the government and its current president) in the voice of ‘You owe us, we helped you‘, it is slightly pathetic and merely the voice of a used car salesman at present. As more of the proxy war becomes open and proven Iran is backed into a corner, it makes Iran more dangerous, but it also forces them to act, not through proxy and I am decently certain that Iran has too much to lose as present, especially as Russia denied them the S-400 solution.

Even as Gevorg Mirzayan (an expert in Middle East and a leading analyst at the agency Foreign Policy) is getting headlines with ‘‘Dumping’ Iran Would Be Mistaken, Since Russia Doesn’t Know What The US Will Offer In Return‘, we see that the stage is a valid question, but there we also see the answer. the direct (and somewhat less diplomatic) answer is “Never set a stage where a rabid dog can call the shots“, the more diplomatic answer (by Russian Deputy Prime Minister Yury Borisov) was “Russia has not received any requests from Iran for delivering its S-400 air defense systems” is nice, and it puts Iran in a space where they need to admit to needing this kind of hardware, yet on the other side, Russia realises that Iran is driven to flame the middle East and down the track if its alliance is too strong, takes Saudi Arabia out of consideration for several lucrative Russian ventures and they know it.

All these elements are in play and in place, so segregating and isolating Hezbollah limits the options of Iran, making it an essential step to pursue. Interesting is that these steps were firmly visible as early as last year August, and that group of 15 did little to bolster solutions towards truly isolating Iran, that Miaow division was optionally seeking milk and cream and finding not that much of either.

So the time is now essential moving to critical to take the options away from Iran, we let Lebanon decide whether they want to get caught in a room painted in a corner with no directions remaining, at that point they become a real easy target.

That was not hard was it?

Happy Friday and remember, it will be Monday morning in 60 hours, so make the most of it.

 

1 Comment

Filed under IT, Military, Politics, Science