Tag Archives: SIGINT

War and Pieces

This world seems to become less and less of a good place. I feel that I could be able to stick my head in the sand were it not from my law assignment, which is making decently progress. I feel that focussing on this as much as I can drains me, but the fact that things are lining up feels like a rush. The feeling that definite defeat is leaving me as the feeling of stalemate and even the tiniest partial feeling of a small victory is just too good a feeling. After this 2 more weeks and a final exam. That feeling is one we do not experience too often. We tend to be slightly ahead of the curve, go with the flow (and the masses) and in some cases be a little ahead of the pack. So in that regard making it from lets academically state ‘a state of depression’ into ‘the sunny feeling of victory’ might be my only reference to what drug users chase. I got there all by myself.

Yet, this is not about me. Not completely. You see, in the back of my mind is something that John Oliver stated regarding Toyota and how it is the car of choice for ISIS. Global Research (at http://www.globalresearch.ca/the-mystery-of-isis-toyota-army-solved/5480921) claims: “So far the UK has sent around £8m of “non-lethal” aid, according to official papers seen by The Independent, comprising five 4×4 vehicles with ballistic protection; 20 sets of body armour; four trucks (three 25 tonne, one 20 tonne); six 4×4 SUVs; five non-armoured pick-ups; one recovery vehicle; four fork-lifts; three advanced “resilience kits” for region hubs, designed to rescue people in emergencies; 130 solar powered batteries; around 400 radios; water purification and rubbish collection kits; laptops; VSATs (small satellite systems for data communications) and printers“, in addition we see “It’s fair to say that whatever pipeline the US State Department and the British government used to supply terrorists in Syria with these trucks was likely used to send additional vehicles before and after these reports were made public“. This is an implied action, not a real action. In this two parts get to me.

  1. Why are the origin of these trucks so hard to find? The sketchiness of the information implies that certain parties have less satellite oversight than they would like to.
  2. If the implications are true, why were these cars not seeded?

In the first there are of course all kinds of issues. SIGINT will never reveal what they actually have and those assigning SIGINT duties will remain silent too, yet in all this another cog is operating. This is seen when we consider the CNN title ‘U.S. Treasury inquires about ISIS use of Toyota vehicles‘, can anyone explain to me how the US treasury got involved in matters regarding a Japanese brand? That the State Department and the alphabet groups are all over it makes perfect sense, the US treasury does not, not even the Secret Service (who is stretched thin these days), would explain that push, because the people involved are unlikely to be on their front page. You see, this gives a clear feeling that someone in the US Treasury got a phone call (or they want to focus away from governmental bankruptcy papers).

Did no one wonder about the starting paragraph: “The U.S. Treasury is seeking information from Toyota about how ISIS has gotten hold of the automaker’s trucks, which have been shown in the terror group’s propaganda videos“? The second paragraph is even more puzzling: “Toyota said it is part of a broader U.S. Treasury inquiry looking more closely at how international supply chains and capital flow into the Middle East“. This means either they followed the money towards the end of the line, which means that there is a direct American link (which is another issue), or someone is demanding answers. John Oliver gave a funny nudge towards GM (at https://www.youtube.com/watch?v=3BRTEXomD6s), yet consider the GM earnings release: “Jul 23, 2015 – Net revenue in the second quarter of 2015 was $38.2 billion, compared to $39.6 billion in the second quarter of 2014“, so are we awake now?

In addition the second issue on seeding. Did no one consider seeding those exported cars with passive id chips? Those puppies can be placed nearly everywhere. You see, you can do more than just keep a DVD in the store, you can also tag a part of the car you never see, after which you can keep track of those puppies. It is a low tech level of low jacking. Try to find a one by one inch sticker on a metal frame. Good luck I say!

So as I am winning the war with myself, there is now an implied war being lost by allied forces. We can state that intentionally or not supplying ISIS is not a win. Even if that was not the case, even if the rebels had been provided with equipment, the fact that it goes to ISIS in mint condition is another worry, it implies that rebels have no clue (and no James Dean acting skills either), whilst in addition the lines of the rebels are getting more and more blurry. This now reflects on ‘U.S. Weaponry Is Turning Syria into Proxy War with Russia‘ (at http://www.nytimes.com/2015/10/13/world/middleeast/syria-russia-airstrikes.html). The quote “With the enhanced insurgent firepower and with Russia steadily raising the number of airstrikes against the government’s opponents, the Syrian conflict is edging closer to an all-out proxy war between the United States and Russia” is also alarming. Not the US/Russia escalation, but the danger in light of earlier revelations that there is the danger that ISIS gets a hand on some of this stuff and hits Israel. Consider the speculative event that an Iron Dome within the Birya, Safed and Rosh Pina Airport triangle gets hit by a confiscated US TOW? That puppy needs to get within 2.5 miles, but still, if it gets done the moral push, the danger of all-out war and the escalation that ISIS gets to take control Gaza are all options that are not completely impossible, even as the current leadership of Hamas is downplaying ISIS in their region. Hamas has been playing a dangerously stupid game in Gaza and their power is not as good as they claim it to be. The fact that more and more extreme claims are met with lack of determined discipline in their own following gives rise to that claim. In equal measure, there is still a danger that some of the Russian materials will also make it to ISIS hands, which just amplifies the dangers over there. Like Hamas, Hezbollah talks up a storm, yet in all this the ‘thousands’ of missiles they claim to have would have been fired already if they were at least 3% dependable, the Russian hardware could change that. Is it enough? That is hard to say as there are several tiers of data missing. Hezbollah has been playing certain facts closer to the chest, which does not mean that they have what they need, but in all this, several sides have claimed that the Iranian – Hezbollah supply line of missiles is a fact. That part was conveniently kept out of those ‘reliable’ papers for a long time as they commented on a nuclear Iran. It is one side Israel protested against for a very long time. So as an organised war falls to pieces, we see that there is a fractural war going on, each with their own agenda and many pieces having a hatred of Israel. We can consider that part when we look at the quote “the failed $500 million Pentagon program that was cancelled last week after it trained only a handful of fighters. That was unsuccessful largely because few recruits would agree to its goal of fighting only the militant Islamic State and not Mr. Assad“, which was also in the NY Times. The quote should in my mind have ended with “and not Mr. Assad or Israel“, two words that make all the difference. Two words kept out of papers, quotes and off the record, but in the minds and hearts that some of these people who received the training. Many of them with family ties to Hezbollah, even though not directly.

As I see it, we are watching pieces of a kinetic puzzle. They are moving and the watchers that should be watching every piece are lacking resources on both the hardware and software side, which means that events pass by unnoticed, giving the involved parties less warning and more losses, not just now, but down the track too. When this escalates beyond control the providers of current hardware will only have themselves to blame in the end, but as those involved parties will never end up being in the firing line, they might not care. That could start a phase where ‘it was not my responsibility‘ and ‘I did not care‘ end up being one and the same, which could end up being the most dangerous of escalations.

 

Leave a comment

Filed under Finance, Media, Military, Politics

Spooky Spooky Mobile

Spooky Spooky Mobile
Hacking thyne own file
Upload and Download
And as you have your chatter
I met a Telco
That would not give its data
So I took their servers
And gave it a little patch
(Goosy, Goosy, Gander)

Yes, when we look at the article ‘US and UK accused of hacking Sim card firm to steal codes‘ (at http://www.bbc.com/news/technology-31545050) I seem to resort to nursery rhymes. There is method to my madness, just as my madness could be regarded as methodical (to the smallest degree). I read the article with other eyes, perhaps you did too? The first part is seen here “The Intercept alleges that the hack organised by Britain’s GCHQ and the US National Security Agency (NSA) began in 2010, and was organised by operatives in the “Mobile Handset Exploitation Team”. Neither agency has commented directly on the allegations“, now, I will continue on the premise that this fact is true (not whether it is correct). In 2010 there was still a massive hunt for this bearded dude underway named Osama something or other. For this part I need to take you on a side trip ‘Banking Giant HSBC Sheltered Murky Cash Linked to Dictators and Arms Dealers‘ (at http://www.icij.org/project/swiss-leaks/banking-giant-hsbc-sheltered-murky-cash-linked-dictators-and-arms-dealers). The issue might be ‘news’ now, but it had been known in the intelligence industry for some time. After 2008 several individuals with additional limitations on moral and ethics were willing to assist the grey area of free trading in setting up funds. This group had ALWAYS existed, greed is such an easy tool to grow under, yet, the fact that some would be willing to be the money orchard for terrorist organisations is decently novel. 2008 had made many hungry so some would be willing to get at what they wanted, more money. A problem that has existed for a long time, so the premise to get access to mobiles so that possible lines of communications would be uncovered make perfect sense.

The trail goes further, you see, most people have a contract, or stay with the same provider for years, this not an issue for the hunters. You (roughly 99.99993243% of the mobile users) are not an issue, but how to find the rest? Hope on some random lucky draw? Governments rely on income from lotteries, not rely on getting a price in that same way. So getting a hold of ALL Sims is a much better solution. It made perfect sense. Do I like it? I actually do not care, I lead one of the dullest mobile lives and I believe that some people must be hunted down. So to go all out on ‘Yes’, hunt them down and ‘No’, you cannot monitor me, seems to be both hypocrite and sanctimonious all in one package. In addition, I tend to not break the law, which makes it even easier. So let’s get back to the article!

The next part is seen here “A Gemalto spokeswoman said the company was unable to verify whether there had indeed been a breach, and highlighted that other Sim manufacturers could also have been targeted. She added: “We take this publication very seriously and will devote all resources necessary to fully investigate and understand the scope of such highly sophisticated techniques to try to obtain Sim card data””, so we see two parts, one that the known provider is not the only provider, were they all targeted?

Linked to this is: “Eric King, deputy director of the campaign group Privacy International, said the NSA and GCHQ had “lost sight of what the rule of law means and how to weigh what is necessary and proportionate”“. This sounds nice in theory, but after taking a look at the Privacy International site, I see him as (only) slightly sanctimonious. all this on surveillance and SIGINT (the Five Eyes group), yet, they have ZERO visibility on the issue that I have on the exchange of data on a global scale by large corporations and how people are almost lulled into a sleepy state of just agreeing with it all, not to mention the other versions of the Lenovo ‘Superfish’ instances that we have not seen brought to daylight yet. It seems that governments are not allowed any options, whilst the propulsion of greed from large corporations and their data remains uninhibited by using the ‘US-EU Safe Harbor Framework‘ (at http://genomebiology.com/2014/15/8/430), when we consider the quote “A multinational seeking approval must submit its global policies and practices to a ‘lead’ EU data protection authority (DPA) – typically in the country of its European headquarters. Once the lead DPA gives its ‘stamp of approval’, a mutual recognition scheme among most EU member states facilitates approval by other relevant DPAs. To date, over 50 corporations have received BCR approval” When we see the list (at http://ec.europa.eu/justice/data-protection/document/international-transfers/binding-corporate-rules/bcr_cooperation/index_en.htm), we see NOVARTIS, which gives us a direct link to Natixis (and the massive amounts of links that they have). Ernst & Young and Motorola among others, so how can one satellite locations allow indirectly to move data across other borders, or make them accessible for query? Is it not interesting that Privacy International has not been looking at that (as far as I could tell), so do you see the issue I have with their ‘statement’?

Linked to the ‘alleged’ sim code heist is another article. This one is a lot older. It was from July 2013 and called “Millions of Sim cards are ‘vulnerable to hack attack’” (at http://www.bbc.com/news/technology-23402988), so, yes, when we see the quote “Karsten Nohl has said he has found a way to discover some Sims’ digital keys by sending them a special text message. He warned criminals could potentially use the technique to listen in on calls or steal cash“. So, yes getting the data from the sim makers directly would make a lot of sense (an ergonomically terrific solution), but this method might be less visible. So why was another method used. Now we get back to the beginning: “US and British intelligence agencies hacked into a major manufacturer of Sim cards in order to steal codes that facilitate eavesdropping on mobiles, a US news website says“, which News website? The fact that this news is followed by “The Intercept says the revelations came from US intelligence contractor turned whistle-blower Edward Snowden” gives another pause. What is actually happening? It seems to me that the Snowden stamp is making us chase ghosts (pun intended), but overall I see less and less reliability in these ‘spectacular revelations‘ and the press does not seem to be asking the questions they should be asking. The investigations that they should do, do not seem to be done. The ‘revelation‘ is made and then we see one party line response from GCHQ “However GCHQ reiterated that all its activities were “carried out in accordance with a strict legal and policy framework which ensures that our activities are authorised, necessary and proportionate”“, which is now linked to this, but there is no evidence that this has actually happened. The subtitle ‘Full investigation‘ seems to be a header without a factual link. That subtitle ends with some group shot and the by-line “Experts say that the alleged hack is a major compromise of worldwide mobile phone security“, is that actually the fact? Would phone security be compromised? It seems to me that the 2013 is a much larger threat to phone security and Google stopping its continued development to anything before Android KitKat is just an additional cause for alarm, how did the alleged government activities create more danger? It seems to me that the BBC has not illuminated parts that should have been illuminated. When we see “The UN’s telecoms agency – the International Telecommunications Union – said that it would now contact regulators and other government agencies worldwide to ensure they were aware of the threat“, is also an issue. When we consider the UK issue of telecom caps and the fact that nothing has been done for years, can we dimensionally see that awareness of the ITU could be regarded as a similar demure step is a valid question, yet the current article does not reflect on the earlier issue. The end of the latest article gives the one part that is important as I see it “But perhaps this latest leak has done more to highlight how a single company is in control of millions of people’s private data“. So was this an actual leak, or did someone figure out a possible issue with current technology and they added the ‘Snowden’ link to give it a little more fear. The last part could have been done by any decent technologist, no MIT degree required. So what about the one time mention of ‘a US news website says‘? Who was it and how come that this media courtier, depending on visibility is reduced to 5 words, which seemed a little odd to me from the very first time I read the message.

Leave a comment

Filed under IT, Media, Military, Science

For our spies only!

It’s out in the open, apparently Australia will get its first feel of a ‘cold war’, which according to Attorney General Brandis, will be a lot worse, will it?

Let us take a look.

The first source is the Guardian (at http://www.theguardian.com/world/2014/sep/26/spy-agencies-to-get-stronger-powers-but-what-exactly-will-they-be), as I am all about a certain level of consistency, let us add a few quotes. “Crossbench senators and many stakeholders raised their concern that, in the absence of a clear definition of a computer network, a single warrant could be used to access a wide range of computers, given the internet is a network of networks” as well as the response to the greens who wanted to add a limit of 20. “Brandis said such an amendment “would impose an arbitrary, artificial and wholly unworkable limitation that would frustrate the ability of Asio to perform its statutory functions“.

These are both fair points, in regards to the sunset clause the response was “No. Brandis rejected a call to put a 10-year expiry date on the new law related to special intelligence operations, despite agreeing to similar sorts of sunset clauses in the yet-to-be-debated foreign fighters bill“.

And the fourth quote, which we need later on is ““Freedom is not a given,” the attorney general said. “A free society is not the usual experience of mankind. Freedom must be secured, and particularly at a time when those who would destroy our freedoms are active, blatant and among us”“.

So, this sounds fine and it all sounds viable, but what about the dangers here (are there even dangers)?

For those with some insight in law, here is the bill as it currently stands (at http://parlinfo.aph.gov.au/parlInfo/download/legislation/bills/s969_first-senate/toc_pdf/1417820.pdf), which for the most is an amendment to the Australian Security Intelligence Organisation Act 1979 (at http://www.comlaw.gov.au/series/c2004a02123).

Initially, it seemed that there was an issue on page 76, yet, when we look at the final product, the change makes perfect sense. The first change here is the approach to information; basically, we will not have a weaky leaky speaky person. So we will (hopefully) not have an issue with some person dreaming to be on team Manning, Snowden and Moronic. It was so nice of the NSA to get into ‘hot’ water, so that we can prevent it. However, not all is well; this is seen (at http://www.theguardian.com/world/video/2014/sep/26/internet-threat-existence-video). Whether it was just bad form, or over generalisation, Senator Glenn Lazarus stated “The internet is a serious threat because it can be used to orchestrate and undertake criminal behaviour across the world“. He then continues how ASIO and ASIS are there to increase security. It is this slight casual quote that seems to voice the dangers, as these powers are needed to combat security threats of several shapes. Yet the senator states “orchestrate and undertake criminal behaviour“, which is a lot broader then initially implied. This does not mean that this will be used as such, and quite honestly, if it stops shady financial advisors, then I am all fine with that, but it goes further than that as it was voiced (not stating the reality will be as such). Another part of the Guardian showed the ‘grilling’ of Attorney General Brandis by Senator Scott Ludlam, yet it seems that there the kettle is off the boil too. The Senator knew that Brandis would not answer or resort to speculation. He stated “I am not going to indulge Senator Ludlam by answering hypothetical cases or cases of historical interest“, which is fair enough. The Senator should know that, when he did a similar thing on October 4th 2013.

So where is the fire and is there a fire? You see, what is happening now, is what should have been done some time ago. I oppose Brendan Molloy from Pirate Bay (a fellow student), but his heart is in the right place (top right behind the rib cage, just like mine) and all these posters we see all over the place in regards to whatever, whenever, forever and prison. It is nice that we see all these posters on dangers and so on, yet some people seem to ignore the debilitating blows the US suffered at the hands of Manning and Snowden, not to mention Jullian Assange (which I will not go into at present). This will now change. At times those who don’t know speak those who know remain silent. It is when those who know speak out, that is when the casualties really go into many digits and Australia has its own brand of security issues. America has a little over 19,000 border miles on an area occupied by 320 million people. Australia seems larger, with a 22,000 border miles coastal line, yet overall Australia only has 22 million people, so with a population less than 10% we have to play the game another way. The security measures are one way, not the only way, but it will possibly stem several issues, which gives our intelligence branches a little more time to figure it out. Let us not forget that we have an intelligence structure and a form of Signal Intelligence, but if you think that they get a serious chunk of cash, then consider that the total Australian intelligence budget is a little under 1% of what America gets, and we get to look at a similar sized chunk of land to observe and a lot less people.

This got me to two issues that are now forming, yet the bill seems to not cover it as such. I am referring to the Telecommunications (Interception and access) Act 1979. Intelligence is essential, so is data collection and analyses. What happens when new solutions are needed? What happens when we face a change? The US had this when they needed more efficiency for the buck and a system called Palantir was used in the tests. Like Deployable Ground Station (DGS), the army ended up with a version known as DCGS-A. Now we get off to the races, the initially optional new system Palantir, its software was rated as easier to use (not unlike the analytical tool IBM Modeller), but did not have the flexibility and wide number of data sources of DCGS-A, which now gets us into hot water, or what the London Chef of Sketch might classify as: ‘from the frying pan into the fire’, these changes will also impact other systems and other people. In many cases the use of a NDA (Non-Disclosure Agreement) is used (or in many cases Positive Vetting). The entire mess (slight exaggeration), will take on new forms as we see how the changes might also have a flaw (as I see it), what happens when there is a sudden spike of collected data. Scripts, automation, production jobs and moreover the gathering, sifting and storing of data will soon take an entirely new dimension. The current intelligence framework is in my humble opinion not even close to ready for a growth in excess of 400% (800% is more realistic). You see, if we are to set up a path that gives us a possible trace of events, then we need several snapshots, now, they will not snapshot the entire nation, but the amount of data that needs to be stored so that the people who need to know can follow the trace will be a massive one. I for one, am absolutely not in the mood to allow a ‘3rd party’ (read IBM, Oracle and a few others) to set up shop, as that data could even end up in America. Even though I have no issue with my data, feel free to check my Diablo 3 save file guys! The issue is when a grey field allows other uses. For this I recall the article ‘NSA linked to corporate dangers?‘, which I wrote on September 22nd 2013 (Yes, a year ago!), where I quoted the NSA site (the open source unclassified part), “The Information Assurance Business Affairs Office (BAO) is the focal point for IA partnerships with industry. It also provides guidance to vendors and the NSA workforce in establishing IA business relationships and cultivates partnerships with commercial industry through demonstrations and technical exchanges“.

So when we see such an escalation, how long until we see an ‘evolution’ of our intelligence data to create a business space? Let’s be honest upfront, the NSA has a different charter and as such has a massive amount of additional tasks, yet in the current form, is such an evolution that far-fetched? How dishonest is the advantage when a firm like Telstra or iiNet gets their greedy little marketing claws on data so verbose that they can target 10%-20% more ‘efficient’? So we have 2 sides and as far as I see it an element that might need tweaking because of it (reference to the: Telecommunications (Interception and access) Act 1979). The entire Data mining issue is also on the table as I have not met an abundance of miners who have my levels of skill when it comes to massive data sets. When the pressure is on and they need to create a creative alternative to a missing values data set, the race will be pretty much over. Then what? Get external experts?

Now we go back to the initial fourth statement ““Freedom is not a given,” the attorney general said. “A free society is not the usual experience of mankind. Freedom must be secured, and particularly at a time when those who would destroy our freedoms are active, blatant and among us”“. I do not oppose the statement perse, yet in my view the statement is “Freedom is a given in Australia, to keep the Australian values, in a time and under conditions that were designed to remove the tranquillity of our lives, steps must be taken to safeguard the freedom we hold dear. As such we need to act according to new paths for the sole purpose of stopping these elements amongst us, who are driven to remove freedoms, we and all those who came here to enjoy our way of life“.

Freedom remains a given, we will just add a few new solutions to stop those intent on destroying our lives and our freedoms!

In the end, both the Attorney General and myself decided to make Pappas Bravas, he said potato, I said tomato, yet I remain at present cautious on who else is eating from our plate, without the balance of the whistle blower, that person might remain undetected, in that regard, I would have preferred that a clear location would be there to alert someone, even if it was a special appointed judge (who would be added in subsection “(4) The persons to whom information may be communicated under subsection (3) are the following:

Was that such a stretch?

 

Leave a comment

Filed under Law, Military, Politics

Are they the real losers?

Yes, it is a nice new day and to be quite honest, I feel ashamed that fellow gamers and fellow men on the internet are starting to show that many are the type of person, real man are disgusted to know.

Let’s have a look at the facts lately. First we get the 101 naked celebrities, which, fair enough could have been done by any over enthusiastic (read: horny) teenager. That does not make it OK or any way acceptable. Then we get the persecution of Anita Sarkeesian and Zoe Quinn for the most ridiculous of reasons and now, because an actress speaks out for all women, you know, through that usage of ‘freedom of expression‘, she now gets haunted by hackers, posting her stolen images (because she was wearing not that much) to scare her and to ridicule her and finally there was Caroline Criado-Perez who had a really nice idea and got threatened because of voicing the idea.

You see, I am very willing to do something about it, but I am not that good a hacker. I can remove them with a sniper rifle pretty efficiently, but that gets me into hot water (the Crimes Act of NSW 1900 gets a bit iffy at this point) the police seems unable to do anything about the victims, but the hackers will apparently have all the rights to protection and privacy. I am willing to test these rights.

So, here I throw down the gauntlet! Because, I am sick of these cowards feeling safe and secure. I challenge these groups of so called ‘greater than life‘ hackers to prove their greatness and find those hackers who did this to Anita Sarkeesian, Zoe Quinn, Emma Watson and Caroline Criado-Perez. I think the people (and me) have a right to know, so I challenge the hackers to find them, post the evidence as well as their identity and address on all places, as well as 4chan. If the press is so into ‘the people have a right to know‘ then let’s find out who they are. It would also be nice to know who hacked the celebrity mobiles and add those names and identities too.

Let us find out whether there are real men amongst those hackers, who would like to get recognised as the man who gave us the names of these hiding cowards. If these people claim a right to ‘privacy’, let us recall a tweet that was send to Caroline Criado-Perez. The tweet ended with “NO MEANS YES“, let us test that theory!

You see, I reckon that once they are out in the open, the game changes. Their neighbours will point at them. Those guys in school who were always smitten with Hermione Granger will want to prove to their hero actress that they will stand up for her. These fathers living nearby who have seen their darling daughter cry because she got bullied, will feel the rage of violence boil their blood when they spot them. I wonder how secure their confidence is during the day when they all know who they are.

Did you, the threatener and abuser consider that?

When we look at the piece in the Guardian (at http://www.theguardian.com/women-in-leadership/2014/sep/23/hackers-tried-silence-emma-watson-naked-photos-but-made-her-voice-louder), we see an article that is decent, but substandard. It gives us a psychology part and some referencing, which is how I saw it. Of course the daily star front cover was there. There was a part I did really like. The quote was “Emma Watson did not talk to the UN about the need for equality because all forms of gender discrimination have been eradicated from our world. She spoke about it because every day, in every country, women face violence, abuse or just plain old ignorance”, yet this was countered by the quote that follows “Much as we’ll cheer for the underdog in a sports match, in real life we don’t want them to defend themselves”, which I found offensive. Of course the debate then becomes whether that statement has any truth. You see, if we truly believed that, we would be outspoken about it. The reality is that those acting out against it are cowards, like those old white men in white outfits with burning crosses (KKK reference). These people hold their believe in the dark corners, where no one can see who they truly are, which is why I want these ‘hackers’ out in the open. I am truly curious what we will find and whether we see some crying father on how his son was misled and it was all one big misunderstanding.

The second article http://www.theguardian.com/film/2014/sep/23/feminists-rally-emma-watson-4chan-nude-photo-threats is also decent, but I had a huge issue with the title ‘Feminists rally round Emma Watson after 4chan nude pictures threats‘. I personally believe that the title ‘All real man and real women go to bat for UN spokesperson under siege‘. That would be the title that wakes up nations! Let’s be clear, this is not because she looks nice, is pretty or an actress. I felt the same way when we saw the utter injustice that befell Caroline Criado-Perez.

The question is how to deal with these people, because they are tearing at the foundation of our freedom, not just the woman, the men are in equal danger. If you doubt this, then ask the father of Emma, the parents of Caroline. Do you have a daughter? It could even be a son, what happens when your child speaks out against injustice? Then what do we do? Let them be victims to some coward, who does not believe in their freedom of speech, their freedom of expression or their support to a person they ‘hate’.

I believe that they fear the light and accountability, so let’s give them some bright light to bake under. Even though the intelligence community has a few other priorities, can you guys (NSA, GCHQ, DSD, DGSE and FAPSI) make it into a competition (perhaps for your interns)? The first correct publication is worth 4 gold stars, second place gets 2 gold stars and third gets one star and the rest will have to fend for the next round. Like a hacker Olympics for signal intelligence.

Seems like a harmless enough sport and let’s face it, the hacker wants a challenge, he/she is baiting you to find them! Are you, the upcoming SIGINT officers of the future up to the challenge?

But I very much liked the quote in the end: ““All I can say Emma, is: fuck them,” wrote Rhiannon Lucy Cosslett“, she took the words right out of my mouth!

UPDATE:

At 21:00 the games changed a little. It seems that the threats against Emma Watson were a viral marketing ploy. (at http://www.abc.net.au/news/2014-09-24/emma-watson-threats-actually-stunt-to-shut-down-4chan/5766882). In my mind there is no change, the others were victims of harassment and psychic assault. Yet, these issues have other issues too. You see, the origin of 4chan was nice, clean and pure. It was altered by some to be used in other ways. It was the brainwave of the then 15 year old Christopher Poole who was into Japanese comics and anime. there is a lot more to 4chan. I found a reference to ‘A 21-year-old man was arrested after 4chan had provided the police with the IP address of the poster.’, so 4chan is more then just trollers and hackers. Which makes the actions of the company Rantic more then just a little dubious. Yet all is not clear there either as the ABC has one excellent quote “The #shutdown4chan hashtag gained some momentum on Twitter, but some users raised concerns that it aimed to eclipse conversation about Watson’s gender equality speech“, which beckons the thought, what exactly is going on and perhaps 4chan is not the nuisance, but the saviour for the message that prevails with #heforshe and whether they could do something extra to spread the message Emma Watson had for all people visiting the internet.

So was my article right or wrong? In the end, the issue I had remains and remains clearly. The press acted directly and corrected as soon as they had the information, the question becomes what about the other victims?

Leave a comment

Filed under Gaming, Law, Media, Military

The Wrong questions!

Another day and another day we see escalations into the direction that was once called ‘No Such Agency’ and now regarded as the only server in the US that allows anonymous and the People’s Republic of China to get port 8080 access. Go figure!

As we see another article in the Guardian, this time the limelight shines on Dianne Feinstein, chairperson for the Senate Intelligence Committee. It seems that she wants to a complete review of the NSA (at http://www.theguardian.com/world/2013/oct/28/nsa-surveillance-dianne-feinstein-opposed-allies)The article leaves the doctors check on the pulse that listening in on several leaders of the allied nations is taking a dip for the worst. All this is shown against another reference towards Snowden’s disclosures. This picture is wrong in many ways. You see, the first two events might have had some work by Snowden, yet overall, when we consider the amount of data that Snowden has walked away with is beyond strange.

We could come to the following conclusions.

1. The NSA is completely oblivious to a silly little thing called Common Cyber Sense.
2. The NSA is completely oblivious to standard network security and logging.

Consider that SE-Linux is a NSA invention (OK, that was a strong word, but they were the driving force of SE-Linux). The first two issues show that the NSA either lost the plot, or they decided to hire a multitude of Americans with IT skills that seems limited to the connection that their child has a Nintendo!

Now feel free to laugh out loud, but consider the information. Allegedly listening in on conversations of the leader of a sovereign nation is not something one would admit to. This is not a bulk thing, this is specific. The fact that only a chosen few had that information would be the way to go. Consider any firm having a ‘second’ bookkeeping system. What are the chances that anyone but the CEO, CFO and the head of IT knew about that? That is just a ‘little’ tax evasion and commission increase. In case of the NSA they are alleged to keep phone records on most of their European allies. You think that this is NSA lunchroom conversation material? Snowden should never have had any access to it. So either the NSA system is completely broken, or we are dealing with something completely different.

3. The NSA has decided staff monitoring was not an issue?

That point is actually less correct, however when reading “Intelligence Authorization Legislation: Status and Challenges” at http://www.fas.org/sgp/crs/intel/R40240.pdf you will see on page 15 “the Intelligence Authorization Act for FY2013, passing the legislation by a vote of 14-1, and the bill was reported to the Senate on July 30, 2012. Among other things, S. 3454 as passed by the committee:” linked to this it states: “Requires the intelligence community to develop a comprehensive insider threat program management plan.” So after the Brits showed you in the 60’s that someone could be working for MI-6 and Russia at the same time, this was not clearly in place? (actually, such systems have been in place for a long time, yet the document seems to refer to ‘developing’ and not ‘upgrading’, which makes me wonder why the tax payer is paying for all these internal security officers.

Also, this was at least 6 months BEFORE there was Snowden, and all the members of the Alphabet Soup have their own Internal Security Officers. How come the NSA missed so many alert events? I can understand some leakage with the CIA. Those people are all over the place, hundreds of locations, thousands of involved people. So statistically, if only one person slips up a day, it would be a really good day for the CIA. If we compare it to the restricted, bundled and compact NSA, they seemed to have ‘loosened’ up its standards twice each 10 minutes. This does not add up!

If you question some of this (you should always do that, never take things at face value).

Then consider that the US Intelligence Community consists of:

  • Air Force Intelligence
  • Army Intelligence
  • Central Intelligence Agency
  • Coast Guard Intelligence
  • Defense Intelligence Agency
  • Department of Energy
  • Department of Homeland Security
  • Department of State
  • Department of the Treasury
  • Drug Enforcement Administration
  • Federal Bureau of Investigation
  • Marine Corps Intelligence
  • National Geospatial-Intelligence Agency
  • National Reconnaissance Office
  • National Security Agency (<- free data access here)
  • Navy Intelligence

And the massive amount of leaked information comes from just one of these groups. Now let me make a jump out of the box. Consider the picture I have shown you and consider that the NSA was mostly invisible before the 90’s. Now, nothing remains invisible forever, yet, the step from unknown to open source is a mighty leap. Is it so weird that we should look into other directions?

What if Snowden is not the person he claims to be? I personally still believe he is a joke at best, a patsy at worst. What if the leak is NOT a person? Consider the amount of data that SIGINT parses. What if the Echelon system was compromised? Is someone having a backdoor into the SIGINT satellite system not a lot more likely than one person walking out with Gigabytes of data, through the front door of one of what used to be regarded as one of the most secure locations on the planet? Yes, these satellites are supposed to have top level encryption, yet in 2004 two Chinese academics wrote a paper on how such levels of encryption could be broken. That was 8 years ago!

This would mean that Director James Clapper has another issue on his plate. Getting into an intelligence satellite is supposed to be really hard, so was there an ‘open information supporter’ when it was build? Is there a security flaw in its logical system? Is this option so much more unlikely then a person, who was according to several magazines seen as “The CIA believed Snowden had tried to access classified data that he wasn’t authorized to view. Based on this suspicion, the agency decided to send Snowden packing.

So that person made it into the NSA? Even if that was the case (which it was), would this person be allowed to remain unmonitored and get his hands on the amount of data that is now all over the Guardian editorial?

Not even the US could ever get to be THAT dim! Now consider what I said at the beginning, the CIA flagged him accessing data he was not cleared for. Do you think a mere technician had access to the phone data collection of not one, but a host of national leaders. Top Secret information that would have been limited to an absolute minimum number of people.

The numbers do not add up and it seems that nobody is asking the right questions.

 

Leave a comment

Filed under IT, Military, Politics