Tag Archives: Palantir

Where the insane runs the asylum

The Guardian had an unsettling article yesterday (at http://www.theguardian.com/politics/2015/dec/22/david-cameron-us-america-refuses-british-muslim-family-disneyland). Now we all know that US protocol is not completely up to scrap. It gets enforced by people and certain systems are updated by people, so things will go bump into the night. For a family of 11, trying to get their Christmas dream in play, that fact must be overwhelmingly unsettling. You see, they were refused to get to the US. The issue “a family party of 11, about to embark on a dream holiday for which they had saved for months, were approached by officials from US homeland security as they queued in the departure lounge and told their authorisation to travel had been cancelled, without further explanation“.

On the one side… No scrap that!

There are two sides, either there is a genuine issue and in that case DHS would have had to have updated the British security services. If that is not the case than we have a first case of evidence that the DHS data systems are now so garbled it can no longer distinguish between friend or foe, which is another matter entirely.

So “Stella Creasy, the Labour MP for Walthamstow, has written to the prime minister she is concerned that a growing number of British Muslims are saying they have had similar experiences of being barred from the US without being told the reasons for the exclusion“, this is indeed an issue.

Friedrich Nietzsche: A casual stroll through the lunatic asylum shows that faith does not prove anything

First we must acknowledge that the US has not given a reason, so we are merely speculating, yet why avoid tourist income? Well, the Canadian Star had reported on a similar issue in March 2015, here we see the following quote: “United States Customs and Border Protection refused to comment on the Al-Rawi incident, but said travellers are responsible for proving their innocence“, so a tourist is regarded as guilty until proven innocent? How does that relate to the Law that is unless the Supreme Court states that presumption of innocence does not apply to tourists and Muslims and that should be a barrel of fun for everyone all over!

From my side, I always tend to keep an open mind, but here I have too many questions. refusal means flags, flags means data, that data should be shared with British Security services, if not, then why are we allies with America? Because they are so powerful? They remain utterly bankrupt in my eyes, the fact that they buckled a few times and the fact that the press is now looking at Russia as the possible salvation for the Syrian situation should be ample signs that America has outlasted their power base. The fact that the Canadian example involves a physician from Toronto General Hospital gives way to even more questions as this was not some plumber with a small business, it was a doctor with a position and a solid foundation for the future of his family, the idea that he wants to throw that away for an uncertain live in a nation now ruled by bigotry is not really that reliable a source, is it? I would choose live in any town in Canada over any city in the US any day of the week, but that’s just me!

Havelock Ellis: The place where optimism most flourishes is the lunatic asylum

The MP, having “hit a brick wall” in her own attempts to get answers from the American embassy, has asked the prime minister to press US officials for an explanation for the Mahmood family’s exclusion“, which is interesting, the fact that an elected official is not receiving any answers leans towards the fact that the issue is not founded and that the lack of foundation implies unreliable data.

You see, an individual might not get an answer, an elected official (in this case Labour MP Stella Creasy, would have had access to a higher echelon of staff, meaning the answer ‘security flag’ could have been received. It will then be up to the British Security Services to resolve this (or investigate this). At which point the mere notice “We apologise, yet information has been obtained that regards you and your family a possible risk“. Now that might not be nice to hear, but that also means there is something to work from. As British Security Services are on average 300% more efficient than the US alphabet teams, more info would have been begotten. In my mind the question now becomes, if US data is unreliable, how come, who has been filling up that part of the system? The old ‘Garbage in Garbage out’ applies, even to today’s systems (even a little more when you see some of the assumptionary techniques Palantir Government allows to use). That last part needs a little explanation, actually Palantir has a good handle on it. You should read ‘THE POKÉMON PROBLEM: A NEW ANTI-PATTERN‘ (at https://www.palantir.com/2009/03/the-pokemon-problem/). As I see it (read: assumption), some analysts have been rehashing data, iteration upon iteration. So as such, some given elements will become the anchor while it should be nothing more than a passing event that is linked to an ACTUAL anchor. You see the article has ‘the’ solution with ‘the visitor pattern‘, yet consider, when someone makes these files, using temp files (as any analyst will do), now consider that those temp files are not properly managed and over a set of iterations that value was saved in the file for speed reasons. So the end of that article reads: “We now have easy re-factoring, no resource leaks, and have simplified calling code. And finally: there are no new bugs to be introduced by callers that aren’t sure how to use our resource. Looks like we caught ‘em all!

True, there were no resource leaks, they were possibly written in a temporary variable by an analyst and not correctly wiped when needed. In this instance groups of people are wrongly classified, more irritating is that it could also clear people who should not have been. This solution is nothing more than an indication on how easily a mere flag can go wrong. The US manages bulk data on a massive scale on a daily basis, so one mistake is not an assumption, it is a guarantee, a system drained, stretched and under resourced is leaving a mark, now on people in different ways, a massive problem for the US government no matter how you slice it.

James L. Petigru: South Carolina is too small for a republic and too large for an insane asylum

The quote “Mahmood said neither he nor his brother, Mohammad Zahid Mahmood, had ever been in trouble with the police. They have been told by the airline they were to travel with that the £9,000 cost of their flights, for which they had been saving for many months, will not be refunded” gives way to even more issues. Not only were they deprived of status, they are deprived of funds. At which point we could see either an immediate refund, or if not given an overhaul of the US tourist industry. You see, the US would be required to give mandatory answers before the flight is paid for, that means that any interest in travelling to the US must be met with clearance, so not the 25,000 travelers, no the 354,000 interested parties must be vetted, which means that the DHS would run out of resources almost instantly, implying that they become useless even before they are needed. In addition, it also seems that they have a brother in Southern California. Perhaps there is an issue with data there (too)?

So how does this sit with the Prime Minister?

A Downing Street spokeswoman said Cameron would consider the issues raised in Creasy’s letter and respond in due course, which is of course fair enough, immediate response would not possible without all the facts and the US Embassy does not seem to be given any.

From the view I have, I don’t have one perse! You see data is at the core of this, but beyond the core there is the policy and the policy in play has been broken for some time now, the issue is that even in a broken policy, or should I say especially in a broken policy things will go wrong and the wrong people are labelled, it happens and for this family that is unfortunate, yet in all this the equal stress is that those who should be labelled are not, because that is a reality the US might not be properly investigating, mainly because it can’t, the data could realistically have become that cross contaminated.

How much value should you hold to my view?

Oscar Levant: There’s a fine line between genius and insanity. I have erased this line

My knowledge of data got me partially here, my knowledge/experience part of that way, you see on one side you do not go lightly with such rejections, not even the US, so we should expect smoke, but the two examples shows clear questionable issues and I do not believe that this is only two instances, the real amount will be much larger, especially when we consider the UK, Canada, France and a few others. So how to use a data system where the data is no longer reliable? Because that is the question that is currently in question. If it turns out to be mere policy than the US will be in more problem than they realise because discrimination of that magnitude will not go unanswered for long.

So can this still be a mere security issue?

Yes, that remains possible but in that case another response should have been voiced by more than one party, no matter what, the cancellation of funds in excess of £9,000 will be another topic still, because the cancellation was not due to any fault of the travelling party, which is an issue the UK Watchdog should address and they should address it very soon.

 

Leave a comment

Filed under IT, Law, Media, Military, Politics

For our spies only!

It’s out in the open, apparently Australia will get its first feel of a ‘cold war’, which according to Attorney General Brandis, will be a lot worse, will it?

Let us take a look.

The first source is the Guardian (at http://www.theguardian.com/world/2014/sep/26/spy-agencies-to-get-stronger-powers-but-what-exactly-will-they-be), as I am all about a certain level of consistency, let us add a few quotes. “Crossbench senators and many stakeholders raised their concern that, in the absence of a clear definition of a computer network, a single warrant could be used to access a wide range of computers, given the internet is a network of networks” as well as the response to the greens who wanted to add a limit of 20. “Brandis said such an amendment “would impose an arbitrary, artificial and wholly unworkable limitation that would frustrate the ability of Asio to perform its statutory functions“.

These are both fair points, in regards to the sunset clause the response was “No. Brandis rejected a call to put a 10-year expiry date on the new law related to special intelligence operations, despite agreeing to similar sorts of sunset clauses in the yet-to-be-debated foreign fighters bill“.

And the fourth quote, which we need later on is ““Freedom is not a given,” the attorney general said. “A free society is not the usual experience of mankind. Freedom must be secured, and particularly at a time when those who would destroy our freedoms are active, blatant and among us”“.

So, this sounds fine and it all sounds viable, but what about the dangers here (are there even dangers)?

For those with some insight in law, here is the bill as it currently stands (at http://parlinfo.aph.gov.au/parlInfo/download/legislation/bills/s969_first-senate/toc_pdf/1417820.pdf), which for the most is an amendment to the Australian Security Intelligence Organisation Act 1979 (at http://www.comlaw.gov.au/series/c2004a02123).

Initially, it seemed that there was an issue on page 76, yet, when we look at the final product, the change makes perfect sense. The first change here is the approach to information; basically, we will not have a weaky leaky speaky person. So we will (hopefully) not have an issue with some person dreaming to be on team Manning, Snowden and Moronic. It was so nice of the NSA to get into ‘hot’ water, so that we can prevent it. However, not all is well; this is seen (at http://www.theguardian.com/world/video/2014/sep/26/internet-threat-existence-video). Whether it was just bad form, or over generalisation, Senator Glenn Lazarus stated “The internet is a serious threat because it can be used to orchestrate and undertake criminal behaviour across the world“. He then continues how ASIO and ASIS are there to increase security. It is this slight casual quote that seems to voice the dangers, as these powers are needed to combat security threats of several shapes. Yet the senator states “orchestrate and undertake criminal behaviour“, which is a lot broader then initially implied. This does not mean that this will be used as such, and quite honestly, if it stops shady financial advisors, then I am all fine with that, but it goes further than that as it was voiced (not stating the reality will be as such). Another part of the Guardian showed the ‘grilling’ of Attorney General Brandis by Senator Scott Ludlam, yet it seems that there the kettle is off the boil too. The Senator knew that Brandis would not answer or resort to speculation. He stated “I am not going to indulge Senator Ludlam by answering hypothetical cases or cases of historical interest“, which is fair enough. The Senator should know that, when he did a similar thing on October 4th 2013.

So where is the fire and is there a fire? You see, what is happening now, is what should have been done some time ago. I oppose Brendan Molloy from Pirate Bay (a fellow student), but his heart is in the right place (top right behind the rib cage, just like mine) and all these posters we see all over the place in regards to whatever, whenever, forever and prison. It is nice that we see all these posters on dangers and so on, yet some people seem to ignore the debilitating blows the US suffered at the hands of Manning and Snowden, not to mention Jullian Assange (which I will not go into at present). This will now change. At times those who don’t know speak those who know remain silent. It is when those who know speak out, that is when the casualties really go into many digits and Australia has its own brand of security issues. America has a little over 19,000 border miles on an area occupied by 320 million people. Australia seems larger, with a 22,000 border miles coastal line, yet overall Australia only has 22 million people, so with a population less than 10% we have to play the game another way. The security measures are one way, not the only way, but it will possibly stem several issues, which gives our intelligence branches a little more time to figure it out. Let us not forget that we have an intelligence structure and a form of Signal Intelligence, but if you think that they get a serious chunk of cash, then consider that the total Australian intelligence budget is a little under 1% of what America gets, and we get to look at a similar sized chunk of land to observe and a lot less people.

This got me to two issues that are now forming, yet the bill seems to not cover it as such. I am referring to the Telecommunications (Interception and access) Act 1979. Intelligence is essential, so is data collection and analyses. What happens when new solutions are needed? What happens when we face a change? The US had this when they needed more efficiency for the buck and a system called Palantir was used in the tests. Like Deployable Ground Station (DGS), the army ended up with a version known as DCGS-A. Now we get off to the races, the initially optional new system Palantir, its software was rated as easier to use (not unlike the analytical tool IBM Modeller), but did not have the flexibility and wide number of data sources of DCGS-A, which now gets us into hot water, or what the London Chef of Sketch might classify as: ‘from the frying pan into the fire’, these changes will also impact other systems and other people. In many cases the use of a NDA (Non-Disclosure Agreement) is used (or in many cases Positive Vetting). The entire mess (slight exaggeration), will take on new forms as we see how the changes might also have a flaw (as I see it), what happens when there is a sudden spike of collected data. Scripts, automation, production jobs and moreover the gathering, sifting and storing of data will soon take an entirely new dimension. The current intelligence framework is in my humble opinion not even close to ready for a growth in excess of 400% (800% is more realistic). You see, if we are to set up a path that gives us a possible trace of events, then we need several snapshots, now, they will not snapshot the entire nation, but the amount of data that needs to be stored so that the people who need to know can follow the trace will be a massive one. I for one, am absolutely not in the mood to allow a ‘3rd party’ (read IBM, Oracle and a few others) to set up shop, as that data could even end up in America. Even though I have no issue with my data, feel free to check my Diablo 3 save file guys! The issue is when a grey field allows other uses. For this I recall the article ‘NSA linked to corporate dangers?‘, which I wrote on September 22nd 2013 (Yes, a year ago!), where I quoted the NSA site (the open source unclassified part), “The Information Assurance Business Affairs Office (BAO) is the focal point for IA partnerships with industry. It also provides guidance to vendors and the NSA workforce in establishing IA business relationships and cultivates partnerships with commercial industry through demonstrations and technical exchanges“.

So when we see such an escalation, how long until we see an ‘evolution’ of our intelligence data to create a business space? Let’s be honest upfront, the NSA has a different charter and as such has a massive amount of additional tasks, yet in the current form, is such an evolution that far-fetched? How dishonest is the advantage when a firm like Telstra or iiNet gets their greedy little marketing claws on data so verbose that they can target 10%-20% more ‘efficient’? So we have 2 sides and as far as I see it an element that might need tweaking because of it (reference to the: Telecommunications (Interception and access) Act 1979). The entire Data mining issue is also on the table as I have not met an abundance of miners who have my levels of skill when it comes to massive data sets. When the pressure is on and they need to create a creative alternative to a missing values data set, the race will be pretty much over. Then what? Get external experts?

Now we go back to the initial fourth statement ““Freedom is not a given,” the attorney general said. “A free society is not the usual experience of mankind. Freedom must be secured, and particularly at a time when those who would destroy our freedoms are active, blatant and among us”“. I do not oppose the statement perse, yet in my view the statement is “Freedom is a given in Australia, to keep the Australian values, in a time and under conditions that were designed to remove the tranquillity of our lives, steps must be taken to safeguard the freedom we hold dear. As such we need to act according to new paths for the sole purpose of stopping these elements amongst us, who are driven to remove freedoms, we and all those who came here to enjoy our way of life“.

Freedom remains a given, we will just add a few new solutions to stop those intent on destroying our lives and our freedoms!

In the end, both the Attorney General and myself decided to make Pappas Bravas, he said potato, I said tomato, yet I remain at present cautious on who else is eating from our plate, without the balance of the whistle blower, that person might remain undetected, in that regard, I would have preferred that a clear location would be there to alert someone, even if it was a special appointed judge (who would be added in subsection “(4) The persons to whom information may be communicated under subsection (3) are the following:

Was that such a stretch?

 

Leave a comment

Filed under Law, Military, Politics

For free or for naught?

It is less than a day after I wrote the previous blog ‘The danger ahead’, now I read in the Guardian (at http://www.theguardian.com/world/2014/jan/27/nsa-gchq-smartphone-app-angry-birds-personal-data) that the quote I made in yesterday’s blog “Speed and disregard of proper development has allowed for open access to many computers and devices, which allows for almost complete collection and stored and such storage can only be done by just a few. This open level of availability allows the NSA and GCHQ (amongst others) to collect open source intelligence, hoping to gain the upper hand in the war on terror.“, which is close to what the Guardian reported, as well as what is currently shown on Sky News!

At this point, I am looking at a few issues and the more I look at the data that the press is stating, the more I see that Edward Snowden is more than just a traitor. He claims being a victim in a German TV interview (at http://www.dw.de/wanted-dead-by-us-officials-snowden-tells-german-tv/a-17388431), where he speaks the fear that he is being targeted for long term sleep therapy (aka ‘terminal sleep’).

The ‘problem’ is that the issue is not just Snowden. The more I look into the breaches, the more I look into a possible functional approach on the way the NSA server parks (plural) are set up, the more I am convinced that not only was Edward Snowden not alone in this all, I feel some level of certainty that this person might still be in the NSA, endangering both NSA and GCHQ as well as other allied monitoring agencies.

The humongous amount of ‘revelations’ that are claimed in the name of Snowden do two things. First of all it turns Benedict Arnold in a stumbling saint (I just had to wash my mouth with soap for making such a claim). Linked to this is the fact that the many dozens of operations as his ‘revelations’ seem to touch on would have been on at least a dozen of servers (as projects are spread around). The fact that NSA uses an upgraded edition of SE-LINUX means that a system with logs and mandatory access control cannot get transferred to such a degree. The fact that IT and security monitors it all, as well that he was civilian contractor means that his name should have popped up a dozen times. Even if he used other accounts, the logs should have triggered alerts all over the field when they were scanned through solutions not unlike a program like Palantir Government.

The claims I am making are growing in reliability with every ‘revelation’ that is being made. There is however another side that is now the consequence of all these whingers and whiners about ‘their privacy‘ (at http://www.theguardian.com/world/2014/jan/27/tech-giants-white-house-deal-surveillance-customer-data). We now enter a field where it is important to realise that the new situation could be regarded as a danger.

It is linked to a previous newscast where President Obama was considering moving telephony data out of government hands (at http://www.washingtonpost.com/blogs/the-switch/wp/2014/01/23/government-privacy-board-members-say-shifting-nsa-data-to-third-parties-is-a-bad-idea/)

As stated before, this is a really bad idea. Consider that criminals, if enough money is in play, can use places like HSBC to launder their money (I am not talking about forgetting your wallet whilst washing your jeans), but the idea that commercial enterprises can get away with these events for just a 5 week fee (at http://www.forbes.com/sites/afontevecchia/2012/07/16/hsbc-helped-terrorists-iran-mexican-drug-cartels-launder-money-senate-report-says/, as well as http://uk.reuters.com/article/2014/01/23/uk-standardbank-fine-idUKBREA0M0LF20140123) is a lot more dangerous than many realise. Handing data storage out of government hands is just too dangerous. I am steering away from the issue whether the monitoring program should go on or stop. The intelligence community needs to do what it needs to do. Leaving that data with third parties is just not an option. The worst case scenario would see the US government paying out billions if any data leading to a registered IP ends up in ‘other’ hands. Once that evidence is ever given, the US would lose whatever credibility they ever thought they had.

At this point the title can be used as a joke. What is the difference between for free and for naught? Someone got rich for free, the US got rich for naught! That would end up being the reality of a project that was meant to map levels of global terrorism. This joke only gets stronger when we see another ‘view of shock’, but now from Google CLO David Drummond (at http://www.bbc.co.uk/news/world-25911266). It is hard to state against his view, or the premise of the company. These carefully pronounced statements from legal eagles are to be expected from many firms for some time to come. There is however a commercial positive view (at http://www.bbc.co.uk/news/technology-25914731). Here we see how entrepreneurs in makeup and clothing are showing options to avoid detection. In more than one instance it is stated to be metal based, so standing next to airport detectors should be fun soon enough. I wonder how much more would get checked when the boxers or briefs are also metal based.

So whether we get entertainment for free or fashion for naught will be discussed by many soon enough, the main fact remains. If we want to remain safe, then data needs to be collected. It is not for free, or for naught. It is for the simple reason that the world is filled with bad people; some will go any distance to hurt as many as they can. Our governments have a duty to keep us safe, it is only fair that they are given the tools, the methods and the opportunity to do so.

This does get us to the final part (or final side) to these events. This morning, the Guardian (at http://www.theguardian.com/world/2014/jan/28/microsoft-rules-out-back-door-access-to-mps-electronic-communications) reported on backdoor access allegations. The quote “Both Ludlam and South Australian independent senator Nick Xenophon have been concerned about the security of Australian parliamentary communications since the Prism surveillance program was first revealed by National Security Agency contractor-turned-whistleblower Edward Snowden.” gives the information that was the part of all this. So again we see more resources squandered in regards to Snowden. Do not get me wrong, the question by both Ludlam and Xenophon is fair enough and as such it should be looked at. Whoever wants access to certain information, which might always be the case, could consider Intruding a system, which, unless you are a real expert is getting harder and harder, as it should be.

Yet, capturing and copying frames sent over a router system makes a lot more sense. You just capture it all and decrypt it later. Now, most people will not have the ability to do this, but consider the amount of elements to get this all from user1 to user2 via server X. If you think that this is highly encrypted hard to achieve effort, then think again. The more common the method used, the easier it is to read into it. So, there is a level of entertainment as we see leagues of technicians concentrate on the door of the bank vault, whilst in reality one of the walls is missing.  To give you another example, we take a look at a paper by Daehyun Strobel, Benedikt Driessen, Timo Kasper et al (at https://eprint.iacr.org/2013/598.pdf). As we look at the quote “Despite the fact that nowadays strong and well-analyzed cryptographic primitives are available for a large variety of applications, very weak cryptographic algorithms are still widely deployed in real products all over the world.” This relates to the IT issue as, we might have secure servers and powerful password rules, but files are send from one computer to another via the ‘internet’, which goes via a router system (no matter how you twist or turn it). So, as someone gets to any router on the track and wireshark’s the traffic, the stream can be rebuilt. From there the hacker still faces a few obstacles, but you better believe that above a certain skill level, this data can be retrieved. So what exactly are we all crying about?

 

Leave a comment

Filed under IT, Media, Politics

Patrons of Al-Qaeda

Many people have some form of religion, which is fine. To have a personal believe in something that is bigger than yourself or bigger then that what you see is not a bad thing. Many Christians have their father, their son and their holy ghost. Some go the other way and give credence to Satan, the anti-Christ and the false prophet. I cannot vouch for any of that. I agree that there is more than this in the universe, but what?

No matter how that part falls, it is likely that Al-Qaeda believes in their personal ‘information’ trinity.

They would be Edward Snowden, Bradley Manning and Julian Assange. These three people have done more to support Al-Qaeda then Osama Bin Laden ever could.

Assange, who is still hiding in an embassy, is the lowest transgressor of the three. First of all, as an Australian he did not really break any laws (although some debate should be had over hindering the actions of an ally under war time conditions). The public view is that on one side he should be nailed to a cross and on the other side he should be heralded. Information is often a lot more complex than many consider. If you want an example, you only need to look at this week’s situation where Assad is now blocking peace talks. Should there be any surprise?

I still am not completely convinced he was directly involved with the Sarin attacks; the issue here is that too much intelligence is questionable. If the USA had shown ALL OF IT publicly, the doubt might not have been there. Yet, the reality is whether they actually had hard evidence on who did it. Let us not forget that the evidence collected in the investigation was all about whether it had happened, not who did it. And guess what, Al-Qaeda was an element in Syria too, so what exactly did happen? Watching Secretary of State John Kerry go on a plane with his briefcase, shown on the news like he is some kind of rock star is not helping anyone either. It seemed as empty to me as a PowerPoint on some concept that no one wants to spend money on.

It shows two possible sides, either they have actual evidence that needs to remain a secret (which no one seemed to be accepting), or they actually didn’t have any and we were watching some version of the Punch and Judy show!

The other side is one that Assange was not into, the acts of terrorism by Al-Qaeda and the Taliban were not shown, we saw through WikiLeaks just one side of it and it changed the overall balance.

Then WikiLeaks released thousands of diplomatic cables, which I consider to be an act of utter stupidity, the information was one-sided, so the US opposition (all of them) get several free punches into play and as such, US recovery is still being hindered. This is the ‘bad’ side of Julian Assange. Their one sided act destabilised many events. Yes, there is a case to be made, but by not exposing the other side, we get a one-sided situation. In the end, the damage is done and even as there might not be any criminal activity by Julian Assange, we should ask questions.

In case the reader thinks that ‘actions’ against Julian Assange should be made, then consider that many in the financial industry did nothing ‘criminals’ either, even though thousands became homeless because of their ‘non-criminal’ actions.

By the way, remember the quote by CNBC (and many others), somewhere in 2010: “WikiLeaks honcho Julian Assange told Andy Greenberg at Forbes that he was in possession of a trove of documents that ‘could take down a bank or two.’ The documents wouldn’t necessarily show illegality but they would reveal an ‘ecosystem of corruption’ at one of the biggest banks in the United States. WikiLeaks would release it ‘early next year.’

They never came! So was this about intelligence, or about positioning banks in an even stronger place? Is it not interesting that Al-Qaeda’s patron number three and number one patron are all about neutering governments, whilst the banks stay out of play? Is it such a far fetching thought that these two idealists get played by those who believe greed is all?

In the middle we see Bradley Manning. This is not some ‘foreigner’; this was a member of the US military. In my view, he is a traitor plain and simple. A private, without any in depth education thought he had it all figured out, decides on US military policy. Which is interesting as many military members above the rank of Colonel are still trying to figure out what the best course of action is, even those with Ivy League degrees. The only positive thing from all this is that the military needs to seriously start to address its mental health issues, but beyond that small sparkle of recognition, this person was more than a small danger.

That part is not addressed even as the news still discusses the winner of this unholy threesome. Three days ago USA today published information on the fact that anti-leak software had still not been installed. I think it is even worse than many think it is. Some of these applications have (as any good application would) powerful log files. Even when we look at non-military solutions we see the following:

“The client’s log file is located at <user_directory>/Palantir/<version>/logs/client.log”

We can see at Palantir’s wiki what it logs, and depending on the settings it can give a lot (at https://wiki.palantir.com/pgkb/does-the-palantir-product-do-any-logging.html)

By the way, one needed only to change three settings to really log a lot:

# log4j.logger.com.palantir.services=error # package level
# log4j.logger.com.palantir.serveres.Nexus=warn # class level
# log4j.logger.MyLabeledLogger=info # specific logger

Removing ‘# ‘ on each line was all it would take.

This one warning gives a final view “Note that we do NOT recommend enabling logging below the warn level for production scenarios.” which means that all logging is possible mapping out the active military network in real time as the user muddles along.

This is not about Palantir, or even anti-Palantir. It is a software solution that part of the Intelligence community is currently using. IBM Modeler and SAS Miner are both data mining tools with similar abilities (and there are more). They all have these options as it is needed to make their products go smoothly. So when Bradley Manning gave it all away, he really gave it all away! The consequence might have (or could be resulting) in deep targeted attacks against a military server system. The question becomes how good is the anti-leak software? As many logging is set at higher levels (read administrator), many of them would be able to log events unhindered by many prying eyes (it is not realistic to monitor all logs on even 1 server). Even if it is all covered, who else has access to just read these log files? It is not uncommon to negate log files, as their users are usually vetted for use of the application. LOG files can however show more than many bargain for.

Unless the server architecture has been re-arranged, there is plenty of worry whether these servers are safe at this time, because log files are inherently their and needed, they are not linked to a password change and often, they do not get reconfigured away from their standard configuration as the case has been with plenty of application that it would hinder smooth operations.

Last on the list of the Patron Threesome is Edward Snowden. I have mentioned him often enough, so I will not go through it all again. He is in my view a traitor and not some ‘holier than thou’ protector. He is not some idealist, too much pointed to him making a getaway with the eye on some quick bucks (and many of them), I might be wrong, but that is how I see him. As he showed us how ‘naughty’ the NSA was, did he show us how unscrupulous Microsoft seems to be?

That view can be seen through an article in Techbeat just 4 days ago. The first quote is “Microsoft is developing a new technology to replace cookies. This work is similar to projects being undertaken by Amazon, Apple, Facebook and Google. Tracking cookies have come under scrutiny recently from regulators by many concerned about privacy; certain types of cookies (Third party tracking cookies) are now easily blocked through built-in functions and extensions/add-ons within main web browsers.

The second one from the same article is “This technology should also include Microsoft services including their search engine Bing. Tracking in mobile devices remains a key point. The big advantage of Microsoft’s emerging technology is that it could track a user across a platform.

So basically, this reads like: ‘we the consumer used to have a little privacy, but soon, thanks to Microsoft, that privacy might be gone forever, allowing for non-stop online harassment wherever we are‘ So, That Snowden fellow never gave us anything on that, did he? Even though the NSA should have been aware of such plans long before Techbeat had a clue. Does the reader still think he is such an idealist?

Yet, on the other side, he has shown one important weakness. The US intelligence branch is on that same low level as the organisation that in the 50’s used to be laughingly referred to as ‘British Intelligence’. The question is not just how weak is the NSA seems to be; it links to questions regarding the weakness that GCHQ and its current Commonwealth peers might have. There are in addition issues with the personal digital safety of people on a global scale. Not because the NSA is scanning to identify terrorist networks, but if one person (Snowden) could get away, is there anyone else who just wanted money and gave their data download to cyber criminals? There is absolute 0% guarantee that this did not happen, so in how much danger are our details?

So, why this blog today? Many do this at the start, but in certain light this had to be done at the very end. It is not just about their acts, but also about the acts you and I undertake. We willingly give out our details to Facebook (including a beheading, but excluding exposed breasts), LinkedIn and Google+, yet many scream about ‘some government‘ seeing what we are doing and who we are doing it with (or without).

The twisted world we allowed to be created is likely to throw us at least two more curve balls before Christmas. Enjoy!

 

 

1 Comment

Filed under IT, Law, Military