Tag Archives: Sun Tsu

Economic arrogance of Achieving

This is a station I recently came to and it has nothing to do with the bravery of Ukraine, or the stupidity of Russia. Even though that setting might have touch-points the larger station is NOT war. The thoughts came from the Art of War by Sun Tsu. There we learn ““The supreme art of war is to subdue the enemy without fighting.” “If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat.

Yet this quote was subverted by economists and wannabe economic strategists into smething like: ““The supreme art of profit is to gain profit without cost” “If you know the final cost and profit, you need not fear the result of 100 investments” If you know the profit but do not know the cost, for every profitable endeavour achieved one will fail.” This is a side I feel is going on in business, but now also in mobile gaming. A stage where games work but only if you watch advertisements. I tried a game and even as it has repetitive sides, it also has campaign sides and those sides are limiting, but if you watch 37 advertisements you are on your way to get to 50% in a three day event. Consider that 37 advertisements. To game, to play a free game, but it is hindered, not by repetition (well that too), but to get anywhere you need to watch that many advertisements. Now you can limit yourself by BUYING ad free settings, by buying elements in EVERY campaign. And I am not against these settings, just the statin that to get anywhere in that game will require you to invest in advertisements. Now this is not against any rules, not against any law and the makers are not doing anything wrong. Now consider the advertisement. The advertisement in SOME cases will allow for you to play a level, or part of a level, but in many cases should you touch the mouse or the pointer, the install screen is called for. A side I call deceptive conduct, but that could just be me. What is seen is iteration after iteration of “The supreme art of profit is to gain profit without cost” and it is deceptive, there is always a cost, in this case at the expense of the game.

It is the idiocy of “The supreme art of profit is to gain profit without cost”, it is a fictive state of exploitation and nearly all the larger players are involved in that. Do you think that I would have so much IP? Some people at Google, Amazon and even Microsoft should be running circles around me, around people like Elon Musk. But they are all in that pretentious state where “The supreme art of profit is to gain profit without cost” is the solution to everything. It is not, it really is not. 

My stage of 5G comes from a state of rejecting the obvious and inverting the funnel and then looking the other way. The stage of gaming came from looking in a direction no one was willing to look towards and none of them adhere to the stage of “The supreme art of profit is to gain profit without cost” And that is where I found optional billions, one of them has question marks, but if done right could amount to a lot more than even I had in mind and it does depend on a stage, but that stage is being catered to. So when it all comes out, I can look at players like Microsoft and laugh out loud. Consider that the wealthiest corporations are Apple (1), Microsoft (2, for now), Google/Alphabet (4) and Amazon (5) and I am the one with the IP? Consider that they should be ahead of the curve, but they are not, because I am speculating that their economic advisors told them “The supreme art of profit is to gain profit without cost”, and because of that Tesla has a mobile phone coming, a market that Microsoft pretty much lost to Google and Apple and now there is a third player. There am I with my 5G and gaming IP and a few more IP options, one directly opposing Sony and Fujitsu and it is based on technology of the 90’s. So how much did these companies lose by relying on “The supreme art of profit is to gain profit without cost”, I merely go by the old statement “You cannot make an omelet without breaking eggs”, a truth that has been out in the open for centuries. What else did these players overlook?

I will let you figure that out, I at least saw one additional failure, but no spoilers, it is up to you to see what they cannot see.

Advertisement

1 Comment

Filed under Finance, Gaming, IT, Science

During the script

Yes, it is part of a sequel. Yet the stories are not linked. It is a view that grew whilst contemplating the previous story, but it is not linked to that story. It is actually a spy story. In these stories the timeline is important, but the facts can be jumbled to add to the suspense in the story. We can use Anna, Tinker Tailor Soldier Spy and the Night watchman as examples. Of hand I will tell you now that the thought of equalling anything John Le Carre has written is ludicrous from the start, it is the delusion of a lifetime and if the writer did not work for a serious intelligence organisation, any dream of equalling Le Carre is plain folly.

Yet there are a few things we can learn from the master. I loved both Tinker Tailor as well as Smiley’s People. Not in the least for the fact that they were played by Alec Guinness, but the setting of the story was real, it was more than an exercise in nitpicking. Information and in that stage intelligence is about verification. I personally reckon that is why the CIA has failed more than once. We all want the setting of a mind boggling conspiracy, but what if the cogs are small? What if we have a setting with a former president and allegiances with other governments and that becomes a larger hindrance? 

You see if the man was indeed a former president, governor or senator there is a larger field. You cannot be certain that the people verifying the information can be trusted, so how to go about it? Smiley took a small team of people HE trusted, but they were in the cold, their allegiance was everything (as well as their love of country). We can mimic this to some degree, but too much makes for a copy and we want our own laurels. So we have two options. We can seek another player, in the light of the enemy of my enemy is my friend. Yet there is a problem. You see whomever is that person has their own agenda. In this case we can fall back on the Art of War by Sun Tsu and seek the wisdom of applying a setting of Reverse spy, inside spy and a few dead spies. The latter needs to be multiple and all but one get exactly the same story, one gets a slightly adjusted truth. When this is done we create a form of verification, what is the reverse spy playing? What is his or her personal agenda and more importantly how trustworthy is that data. The longer the dead spies are intact, the more reliable the data is seen and that is why one will have adjusted intelligence. In the mean time, the inside spy awaits certain information sources to ring or not ring that becomes the setting. Yet to apply that to a script is massive and time consuming. I reckon that the watchmaker approach is the best (but this is a personal view). We insert cog after cog and adjust the stories for each cog if needed, if a new cog is added we look at the timeline, we look at the interactions and we test the story and even better, if we have a person we truly trust with that story, we ask that person to read and test the logic of the approach. It is a way and if someone tells us that this is not the most efficient way, I would wholeheartedly agree, but re writing a spy story is murder on several levels, as such I personally believe that a slow and steady testing of all elements is the best way, moreover, as we see certain elements fall over, we can decide to add another cog, or perhaps join two cogs into a larger cog. The larger cog tends to need a much larger backstory, yet that is the smallest consideration. Consider the secret agent Demons Jab. What would that agent be without a support and information setting? 

Is there a reason? Well consider that there needs to be a reason to off a person (see previous article), the setting could be vengeance, the reason could be spy related, terrorist related or national security considerations? The latter part is often better served through smear campaigns and the media is always up for exclusive information, and they do not always properly vet that information, so there are alternatives. Yet the alternative might not be enough and then that act becomes a cog in the machine we need to build. 

Anyway these are the thoughts I had on creating a spy story and perhaps I am no good at it, but I reckon that I might give it a go when the other book is done, at 65000-70000 words I am well over half way at present, so whilst I await certain players to consider a few options (as well as a 5G solution) I might as well remain creative. Personally I would love to write one book in every genre but I am clueless on romance (Jane Austen) scared to death on Horror (Neil Gaiman), too present for Science Fiction (Arthur C Clarke) and optionally a little too dim for intelligence stories (John Le Carre), all masters in their own field and there are so many more fields to consider, but as life goes, I might not be bored until the day I die, which suits me just fine. 

Leave a comment

Filed under Military, movies

Operation Hazen Ames

It is night, Michael Weatherly is being casual, he is making small talk with another person. He explains that there is no need for the one exit to be watched. He closes the reinforced door that had the room with the information he needed. He then trips the alarm, turns around to the mirrored wall and pulls away the table, there is one screw. He unscrews it and pulls out the screw connected to an umbrella plug, the wall comes down. He clicks the other side open and points to the partner to get through. They go through and as he closes the initial mirror wall, the magnets in the table and wall push the table back in place. The umbrella plug is glued to the screw, it now operates as a screwdriver, Michael attaches something to the screw, he then click pushes the second wall back into place, the magnets hold it firm. They moved through an unmonitored small corridor and enter a supply room at the end is a rack with goods, he clicks on a button and the rack moves up a few millimetres, the wheels are now down, he moves the rack and signs the partner to quickly goes through. The moves through and there is a small food elevator there. He closes the wall and pulls two wires to set the rack back where it was, he had 10 seconds left, he can hear people running towards the place they had just left. They enter the food elevator and quietly opens the back panel, he goes through, the partner follows, he closes the elevator door and the back panel, then presses a button. The food elevator moves quietly down. 

For me it is easy to explain why the person is Michael Weatherly. I have been re-watching 12 seasons of NCIS during the lockdown the last two weeks. The issue is that this is part of a spy story, but not one you would expect. You see, this situation happened, it was a CIA operation, one of many and the story is not the common parts of the TV series, this series is not NCIS or Bull (I never saw Bull). The setting is that the TV series and episodes are a tell tale to the foreign governments to show them how they were transgressed upon and the TV episodes have fake names (as any series does) with a reference to an anagram to the operation. Someone decided to turncoat the CIA and uses the methods to make money on the side, from the studios as well as the extra checks from the governments he is supplying the evidence to, a nice little operation.

Yet the setting on TV series, as we see the use of ‘clever’ terrorists, there is a second fear, not that the opposition is more clever than the terrorists. It is that greed driven elements see their option clear AFTER the operation, not merely endangering what comes next, but giving away the past endangering more as well. It was the setting for an episode of any crime and spy driven series, yet I have no idea why the idea sparked into my mind. Whether it is about double agents, self turned greed driven agents or another kind, we are (through the Art of War) confronted with 5 types of spies. 

Local spies
Inward spies
Converted spies
Doomed spies
Surviving spies


The Art of war teaches us that if all five types are used it is impossible to discover the secret system, but as said the old days did not consider the greed driven logistics that we see today. You can read the Art of War to see and learn about the 5 types, yet the setting is altered in todays espionage. We have minders, archivists and now as one turns the colour of his shield, there is a larger danger that it turns Local spies into Doomed spies, a game changer many are not able to deal with. In any operation the local spy is the anchor, a barge without an anchor can move from the shadows into the floodlights of the other player. Am I right? Am I imagining (or fantasising) this? It is but a dream, yet in this we also find the larger stage of what matters. Even though von Clausewitz gives us that mot intelligence is false, there is a consideration that he considered himself a gentleman and as such espionage was beneath him and it was never considered a valid form of warfare. Sun Tsu is much more relevant, he saw espionage as a valid tool and his approach to any tool n hist setting to war is how to use tools the most efficiently. The concern he had for spies is like all other tools, if it protects the homeland, that is how we use it and in that era the general and his administrator were dedicated to the land they protect. In todays situation the logistics of war is on a sliding scope of what comes next and as such the undervalued and the discarded are drawn to whatever pays for a little better lifestyle than they are set to have, and they will use what is at their disposal, as such it is the archivist and the administrator that become the weakest link in a spy system. A situation that no movie or TV series has looked at. With all the thousands of episodes and hundreds of movies, I casually found a vulnerable unexplored link, yay me!

Leave a comment

Filed under Military, movies

The stage is the play

Famous words given to us by William Shakespeare, but are they actually true? I am not debating the insight or wisdom in this, but in a stage with Alien life, how far does it apply?

I have been working on Keno Diastima again and a few things were bothering me, well bothering is not really the right word, or the right sentiment. The stage became debatable, or perhaps shallow was the better definition. I needed a larger stage and the stage became the play. SO I decided to look back at some of the earliest original writings. There was Sun Tsu (the art of war) at 490 BC and the two works by Julius Caesar at 60BC, they are important because there was pretty much nothing of that calibre before that in their fields and their dome of influence. For me I focussed on Bellum Gallicum and on Bellum Civile. I wanted to avoid an intersection of ‘oriental thinking’. They are original as they were all ahead of their time and they set a stage that is still used today, the works were that good. It was an important stage because in any alien encounter we need to know where THEY are at and it is not some kind of wisdom puzzle, when we get visitors from the Sombrero galaxy it is not for mere tea and crumpets, there is a larger stage and that is what I needed to focus on.

I will not divulge too much, or set the stage too open, because it might still be a work of art to some stage (book, movie, TV series, etc), as such I cannot reveal my entire hand, but consider the use of Caesar, the fact that he wrote the two books in an age where writings were utterly rare and the idea that he was heading the battle in Thessalia, in a stage where the cavalry of Pompeii vastly outnumbered the one Julius Caesar had, all whilst the infantries were close to equally matched, still Pompeii missed out and lost that decisive battle, numbers matter, especially in a stage where two generals are grounded experienced veterans, in a stage when communication between parties was set in hours, not minutes or seconds. That part matters too, even as we look at our not so smart phones and forget that part altogether. 

My mind remained in brooding mode and I was starting to think things through, I was aware of the reasoning of the other side (trust me, you do not want to go there), but how and why are we reacting? Is it wishful thinking that they like tea and crumpets? It is not completely unrelated though, especially when you consider the building that once was in a place now known as Islam Abad (Iran) I think, if the right satellite looks in a proper way, they would see something that is odd, the evidence should still be there, even now 5500 years later, the evidence is still there, and I am covering that in something else, but that I keep under wraps for now, when I realised what I had found, when my mind perceived a stage that is almost undeniable I started to work on one part and in the back of my mind, my brain started to work on Keno Diastima, even the Greek part has meaning in ways that boggles the mind (well, at least to some degree). 

So as we consider the stage, the stage we are shown, what happens when it all goes topsy turvy? What happens when we become (have been for a long time) our own worst enemy, how will others react? How can we see the failings of us when we ignore what was in front of us the entire time? That is the stage I am digging through, because in all that mud a few nuggets can be found and I want to find them, they need not be there, but the mind can create them and as they are close enough to some presumptive truth, I am on the right track to create actual nuggets, not chicken, or pyrite, but golden nuggets, hoping that I can turn them to platinum bars (complete with a coca cola on the rocks), I an not driving a vehicle, as such I can have my coke on the rocks, so there!

Yet in the back of the mind, the two stations are more and more complete and soon there is a line between us and the Sombrero galaxy. Bioware, eat your heart out! What was once written can be written again in different ways, so as we see “The greatest enemy will hide in the last place you would ever look”, as well as “Experience is the teacher of all things”, two truths that have been out there for well over 2000 years and now I am trying to set an entirely new stage to part of that, or basically, I am incorporating the stage for 16 people on a space station, and in all that, what happens when we become our own worst enemy? 

The University of Melbourne published Farrago, there we see “The space that fills the gap between us and those stars, is perceived by us to be empty. From a conceptual standpoint, this is a perfectly valid definition, yet from a scientific perspective we can do better”, they are correct in more ways then one, they cannot see beyond a certain spectral point and the equipment that we design has similar limitations, we see in frequencies, yet an event 5500 years ago showed us at one point that we are limited by ourselves, and we forgot what we experienced, so at that point, what are we not seeing? We merely observe the parts we can see or measure, yet what happens when we mis out because we are focussing on a ruler, all whilst we need to use a version of a spatial Inclinometer, one that also measures spatial radiation, we never did that, did we, because we were never there, but evidence of that still exists, yet as we reach the limit of our expanded imagination, we forgot to push those boundaries and that in part made us our own worst enemy, a stage where the play is us, the stage was not the play, it was to show us the boundaries of the play of us. 

And as we go forwards, there will be people stating the list of original writers, but that was never the issue, Thessalia was. It was the place where the play showed a shift of borders, you can read it in Bello Civili, the set stage we see is “The book was for a time lost, but was rediscovered in Italian city archives in the Middle Ages”, it was found, but parts were missing, the papal powers feared the missing passages, did no one ever wonder why? I cannot tell how much is missing, but a part was omitted and another side of Thessalia optionally shows that. It is speculation, but when we consider a commander like Pompeii, a person as veteran as Julius Gaius Caesar was, did you actually believe he had no records? A stage with two sides, two sides of coins, not the same coin, but the same currency and that is where we see the play, the stage of Keno Diastima, not one coin, not more coins, but two distinct currencies, and the second currency we forgot about, but it was here all along. You merely have to open all eyes, we need to focus not with one mind, but with at least two. 

The stage is not the play, it defines the edges of the play, it makes all the difference.

Leave a comment

Filed under movies, Science

Tik..Tik..Tik..

Yes, the news is here, the news is also largely ignored, but it gives us that there is a clock in motion, a countdown if you will. It starts off with Notebook Check who gives us 15 hours ago (at https://www.notebookcheck.net/Huawei-is-expected-to-bring-HarmonyOS-to-up-48-devices.504072.0.html) ‘Huawei is expected to bring HarmonyOS to up 48 devices’, which might seem trivial, and to some considering what is out there is, yet they all forget that Android and iOS have never had any competitor, so this is a first and Germany is smack in the middle of it. So the German time makers might say ‘tik tik tik? Ve have vays to make you Tok!’ And after this pun there is one little bit where we see ‘Huawei will have ten per cent of German smartphone market’, which is a little over a week old, but it is merely support to ‘China is close to ‘world domination’ and Europe must wake up to the danger, German spy chief says’, to this (slightly less diplomatic) I would say “Yes, you stupid idiot, if you weren’t asleep at the wheel taking viagra 24:7, you might have a working pencil! And written acts of needs when it counted”, so you might think this is out of bounds, but it is not. When we consider “Beijing was ‘very cleverly’ spreading its influence across Europe, Asia and Africa – warning that its technology is now so advanced that Germany cannot tell if it is being used for sinister purposes”, so as Gerhard Schindler (no relation to Oskar) is giving us ‘its technology is now so advanced that Germany cannot tell if it is being used for sinister purpose’, we see the first truth, technology in the EU (and the US) is massively behind Huawei and Chinese IP as well. This is a stage I saw coming well over a year ago, optionally two, the stage was that clear already at that stage, and the administrations didn’t set their technology departments in gear like they should, now they are 2-5 years behind, in the stage where 5G is starting, the technology masters of the west are coming up short by a lot. So whilst some give us ‘German defence minister takes hard-line stance on Huawei’, I merely wonder what he will take a hard-line stance with, he has been made technologically inferior in more than one way. And whilst we are remembered for “Australia banned Huawei and ZTE from its fifth-generation wireless technology infrastructure in 2018, citing the likelihood that they would “be subject to extrajudicial directions from a foreign government.” Secretary of State Mike Pompeo took up that refrain in 2019, warning European allies that any partnership with Huawei could jeopardise U.S. military cooperation with their countries”, yes a collection of brown noses giving Pompeo what he wants and now he has nothing left. Whilst the US was screwing about with options they never had (only really large debts), Huawei took the low road and satisfied the user settings, now that the high road is still missing they are all squandering in the blame game whilst the infrastructure is missing and will be for the next 2 years in far too many places. 

Huawei took a massive hit, but the waiting game is almost over, the people making vast claims, showing no evidence are coming up short and in election years they better start typing their resume and give the crap they created to the next person who needs to make it work, good luck with the notion.

So whilst the mobile gamers take notice of “The Huawei Mate 40 Pro+ and Mate 40 RS Porsche have flash memory that bears the HiSilicon logo, which indicates that it was created by a division of Huawei. Not only that, but it is incredibly fast. Based on the results of measuring the homegrown Huawei SFS 1.0 flash module, it was possible to establish that it provides almost a twofold increase in the speed of operation in comparison with the UFS 3.1 flash memory. According to reports, the sequential write speed was 1280 MB/s, and random 548 MB/s”, it might not be the best in the business, but it is as close as you can get and more important, it is a lot cheaper, how many people with gaming needs and wealth do you know? And all this is hitting the consumers when Microsoft is releasing its Cloud to game on any mobile. Are we catching on yet? 

So in this stage we might go left, we might go right, but a large group will choose Huawei, in a stage where HarmonyOS (if it) satisfies, the larger rocks will fall and Huawei is setting the needs of the next generation. All issues that have been out in the open for two years, as such the lame excuse that ‘Germany cannot tell if it is being used for sinister purpose’ is a clear wash. A setting stage where those sucking the trombone of President Trump will need to wash their hands from any connection to the stupidity that they preached, as such The players are out in the open and calling them on their stupidity is making me warm and fuzzy, how about you?

As such we have a station where a collection of devices (I actually do not know how many) will be up to twice as fast where it matters, and you thought this was about something trivial?

100% more speed and power at 60-80% of the cost implies that Google and Apple will be getting massive hits in the beginning of 2021, and if HarmonyOS catches on, Google will have a much larger problem for a much longer time. If it is about data Google will lose a lot, if it is about branding Google will lose a little, yet Huawei will gain a lot on the global stage and Apple? Apple can only lose to some extent, there is no way that they break even. 

A stage ignored is a stage lost. I wonder if I got that from Sun Tsu, von Clausewitz or Machiavelli. It does not really matter who taught me, Sundar Pichai will feel that lesson, as will Tim Cook. I see no other options in this case, it is the setting after this that ill matter and the technology groups will have to work hard merely to keep up (for close to 3 years) that is the cost of falling asleep at the wheels of industry. Boy do I feel happy, jumpy and giggly with my IP, such is life and pounding on stupid people has its own internal reward I say!

2 Comments

Filed under IT, Media, Politics, Science

Groping in the dark

Yup it happens, we are sometimes caught without a clue and at that point some of us enter the blame game, some of us get emotional and shout at everyone who dislikes us and some try something else, like investigate for example. So even as we should feel sorry for Iran, we definitely feel sorry for all the innocent people in the crossfires, as well as the children caught in the event. We need to critically look at Iran and the choices that they are making.

You see, the attack did not wake me up to the event, I reckon that all the events by Iran in the dar in Yemen gave light that this event was always going to happen, how was of course not known. What woke me up was not on their professionalism, it was the lack of professionalism that got my attention.

Even as Al Jazeera gave us a lot of information, we see the headlines all over the media:

  • UAE official denies Iranian allegations of links to military parade
  • UAE dismisses Iran’s allegations on terror attack
  • Iran’s Khamenei says the attackers were paid by Saudis and UAE
  • Iran warns U.S, Israel to expect a ‘devastating’ revenge: state TV
  • Iran blames the US and Saudi Arabia for Ahvaz military parade attack
  • Iran blames US and Gulf allies for Ahvaz parade attack

All different headlines appearing within hours from one another giving us the insight that not only is stability absent in Iran, it might be missing a lot more then we bargained for. Even as we realise the setting of ‘Ahvaz military parade attack‘ as well as the statement given “Ahvaz National Resistance claimed responsibility for the 2018 Ahvaz military parade attack without providing evidence, the Ahvaz National Resistance is an ethnic Arab opposition movement in Iran which seeks a separate state in oil-rich Khuzestan Province” it is seemingly cast aside by the Iranian National guard (who seems to be missing a few members as per last Sunday).

Consider the smallest optional truth, the fact that there is an ‘Ahvaz National Resistance‘, as well as the part where we see ‘seeks a separate state in oil-rich Khuzestan Province‘, would that be the perfect place for a ‘show’ of strength? Even as Al-Jazeera gives us the voice of Yacoub Hor Al-Tostari claiming it was them and them alone, it seems interesting that Iranian officials are claiming that this is all due to financial support from the ‘outside’.

As we should argue whether any of it is true, we cannot deny the impact that a reported amount of 4 gunmen had on the entire event. The France24 English gives us a little more (at https://www.youtube.com/watch?v=agwNNpiU-uo), there is an additional part. The Claim by Islamic State, and as given from this source is the part that two of the gunmen resembles and that is optionally a setting, with the inclusion of the channel was an Islamic State channel, yet they do not speak about Islamic State, two were speaking Arabic and one Farsi, none of them refer to Islamic State by name, giving us not intelligence, but merely question marks. That is the setting that you need to consider. Even as they speak ‘Jihadi’, the language is oppositional, merely oppositional to Iran. Yet when I consider the facts, I see an optional new danger. With the separatism in Ahvaz, there is every chance that Islamic State will use this staging area to propel their needs. As there has been clear mention of support to Islamic state in Ahvaz, we see not merely an Iran that is in a state of lessened stability, it is in a state of internal turmoil. I would think that Iran would have been less likely to get hit by Islamic State ever, yet the attack on the Iranian Revolutionary Guard implies the weakness and the attacker, whether it was Islamic state or not have exploited that weakness and it is unlikely going to stop at that part.

And for these attackers, there is a benefit, as Iran is not merely accusing, but also setting cogs in motion to optionally stage settings against Saudi Arabia, the UAE, the US and Israel, they will open themselves to additional attacks as the IRGC will be looking and focusing in the wrong direction. Even as I have some issues not merely on the Abadan training base, but also its location, as well as its function. It seems to me that if the images were of an actual trainings base, it seems to be the weakest of stages and the easiest one to take on if they can get the timing right. Any successful attack would have a much larger impact as any successful event against 2 bases in Khuzestan could also start a level of demoralisation that the IRGC has not had before. A similar issue exists for the Semnan base. Even as we realise where the helicopter landing pad is, I see the setting where 2 sets of two jihadi teams could bring a level of devastation to the base, a level that Iran had never faced before giving more and more rise to more than mere destabilisation. And that is where this all starts, not with the accusations from Iran, but the active level of the accusations form Iran that gave rise not on who was guilty, but on the setting that Iran is weaker then it pretends to be. We can accept that any government will boast strengths they do not have, that is mere ego. The fact that the reported 4 gunmen did this attack and Iran decides to look into other directions is where we see their weakness, as well as the consideration that they are in denial on who could have attacked them, that was the element of the war that they just lost. You see, the Art of War (Sun Tsu) gave us: ‘If you know the enemy and know yourself, you need not fear the result of a hundred battles‘ and that is the first part of the stage that they lost, not merely do the not know their enemy, they seem to be in a stage where they no longer really know themselves and that leads to ‘If you know neither the enemy nor yourself, you will succumb in every battle‘. The revelation surprised me, because before last weekend I considered that they were still a force to be reckoned with. Even as they hid behind Houthi’s and Hezbollah, using them as told to do their bidding, there is now a much more realistic view that they are at present limited to proxy wars. Yet it is not enough to merely look at Sun Tsu. Carl von Clausewitz in his work On War gives us “War is thus an act of force to compel our enemy to do our will“, a path we can accept, yet it also shows the wisdom of Sun Tsu more clearly. To compel your will on your enemy is one path that requires clarity of vision. If you yourself cannot focus that vision the result is not merely chaos, it is as I see it the limitation that chaotic and non-engagement will be the result of both a lack of vision and a lack of will, so why Carl von Clausewitz? Well, he does give us a more modern part and one that is highly essential here. When he gave us: “No one starts a war — or rather, no one in his senses ought to do so — without first being clear in his mind what he intends to achieve by that war and how he intends to conduct it. The former is its political purpose; the latter its operational objective“. So as we consider the response on the attack, we see the following elements. The first is ‘being clear in his mind what he intends to achieve‘, even if this is a war in defence against the attackers, there is no clarity of mind. The senseless accusations are clear evidence of that reflection. The promise of retaliation might be the political purpose in all this, yet it is not aimed at its attacker, merely at those not friendly to Iran (for whichever reason), basically it could end up being senseless accusations against most nations except Pakistan and Turkey. Oh what a ‘bad web’ some people weave, right? The operational objective is not merely acting against the actual attackers, but properly preparing for these attacks and now we see the larger flaw. As I saw the staged weakness in two IRGC facilities, it is my personal belief that there are a lot more (I never saw all the data on all bases), but the optional of hitting half a dozen infrastructure points in several bases means that 4 facilities could optionally end up in lock-down, draining not merely resources, but in addition draining operational staging options for a much longer time. Consider that part. In any base, when you need to keep an additional 20% ready to actively defend a stronghold, how much operational activities will be available? when that sets in and local uprising start the IRGC will have a lot less abilities at their disposal as it requires to increase its foundational defences to be up and running around the clock. I think that Islamic State is starting to figure out that weakness (OK, that last part was highly speculative). When you consider that part, can you now also see on how Abadan is a much more appealing target in the near future?

Even as we accept that there is no evidence truly supporting Islamic State claims, we need to consider the Iranian News from August 29th (at https://en.mehrnews.com/news/137230/One-ISIL-member-arrested-in-S-Iran-intelligence-min). It is not the news reported that interested me, it is on what was missing that was of value. When we see: ‘One ISIL member arrested in S Iran: intelligence min.‘ (at https://en.mehrnews.com/news/137230/One-ISIL-member-arrested-in-S-Iran-intelligence-min), it gives us not merely that one member was arrested; it gives us not where it was. You see Southern Iran is not a small place. So when we see Iranian Intelligence Minister Seyed Mahmoud Alavi giving us that this one person was arrested and that “Around 32 terrorist groups and 100 grouplets in various sizes which are supported by foreigners to create insecurity in the country“, as well as “In the past year we have delivered blows to 269 groups, squads, and networks which were supported by terrorist groups like Kurdish Democrats, Komala Party and other similar groups“. So we see all these ‘successes’ and we see that they got one person. The imbalance in it all is just too hilarious. Now also consider that we see: “This shows the intelligence dominance of the intelligence ministry which does not allow the enemies to create insecurity in Iran“. He might claim that, yet the 25 dead and 70 wounded gives he shining light that not only does Iranian Intelligence Minister Seyed Mahmoud Alavi not have a handle on things. The fact that the attack was ‘successful’ implies that he has less then he thinks he does and that is where the teachings on Sun Tsu and Carl von Clausewitz come into play giving us a much larger stage of limitations on the side of Iran.

Yet there is also additional victory for the enemies of Iran in all this. The NY Times gave us that (at https://www.nytimes.com/2018/09/24/world/middleeast/iran-attack-military-parade.html). If we accept the used quote from Al ahed News (Hezbollah, Lebanon), we see: “In a speech on Monday at a funeral ceremony for the victims of the attack, the deputy commander of the Revolutionary Guards, Hossein Salami, said: “You have seen our revenge before, you will see that our response will be crushing and devastating, and you will regret what you have done”” Yet the actions of Grand Ayatollah Sayyid Ali Hosseini Khamenei. Brigadier General Hossein Salami accuses US, Saudi Arabia and Israel, which in light of decently reliable intelligence and evidence is now more in doubt and there we get back to the words of Sun Tsu: ‘If you know neither the enemy nor yourself, you will succumb in every battle‘. That is now partially the staging area that the enemies of Iran are given with the damage of 4 shooters against a military parade. If we optionally add the lack of results by Hezbollah/Houthi with at present 198 rockets fired implies not merely that the proxy war was an extremely bad (read: expensive) idea, when we consider the thought that Iran is limited to these actions because of the brewing instability, we see another stage, a stage where Iran either changes their direction by a lot, or we might witness the beginning of an essential regime change as the current one has little left to work with, either way, the issues involving the Ahvaz attack will worsen before the entire stage could optionally get better.

It is not the attack; it is the ‘groping in the dark’ hoping to get a bite that showed their weakness. And when we consider ‘If you have the virtue of patience, an hour or two of casting alone is plenty of time to review all you’ve learned‘. That wisdom could have been available to both Sayyid Ali Hosseini Khamenei and Brigadier General Hossein Salami, it did not come from either The Art of War, or On War. It is evidence in both books, but the clearest wisdom that the aftermath of the attack brought was neither of these books, it came from the Art of Fishing, a wisdom that every fishermen in Iran could have told them, if only they could have separated the noise from within and the wisdom on the outside could they have figured that part out, especially when you consider that Iran exported almost 250,000 tonnes of fish in 2014, we see that the Iranian hierarchy has stopped listening to the right people, who those right people are is a puzzle they get to figure out themselves. Watching their failures is just too entertaining to me to see that stop any day soon, I can’t wait to see the media conversations when they get to report on the intelligence that the commander of the Bandar-e Jask naval base had been missing out on for quite some time.

#ReturnOfThePranker

 

Leave a comment

Filed under Media, Military, Politics, Religion

When inability drives fear

It is a dangerous place to be in. We all have been there and in most cases it is as innocent as it could ever be. You see, sometimes life throws you a curveball. Gamers tend to identify it most easily. In my particular case it was a game called Magic Carpet. It was a Bullfrog game and I was testing it on the PC. It played magnificently there, and soon thereafter I also tested it on the very first PlayStation. There, because of the controller it was good, but not great. Still, it was fun to play and I tended (in those early years) to really get into a game, so when the situation blew into my face, I got a little frustrated. The next two times were worse and the last time (on that day) I went slightly angry (with myself) and I kicked the door. The issue was not the door, it was my steel tipped boot and I went straight through the door, so, I was not merely ticked off, I had a hole in the door (which would require funds to repair) and the boss in Magic Carpet was still alive. We all have had these moments. Our car, our bike, the TV, things go wobbly on you and we sometimes react wrongly to this situation and in light of that get to reflect on our own ego’s a little.

These are the images going through me when I was confronted to new information when looking at the unrealistic response by America (and Australia) to Huawei. In the case of Australia it seemed the mere application of greed and fear as politicians cater to the greed of a large telecom company, which was not seemingly the case with America. Yet that tip was raised for me less than 24 hours ago. The article (at https://foreignpolicy.com/2018/08/15/botched-cia-communications-system-helped-blow-cover-chinese-agents-intelligence/), shows how the CIA got their own systems handed to them through ego and what I would regard as stupidity. The initial headline ‘The number of informants executed in the debacle is higher than initially thought‘ is rather unsettling. It gets to be worse with “The CIA had imported the system from its Middle East operations, where the online environment was considerably less hazardous, and apparently underestimated China’s ability to penetrate it. “The attitude was that we’ve got this, we’re untouchable,” said one of the officials who, like the others, declined to be named discussing sensitive information. The former official described the attitude of those in the agency who worked on China at the time as “invincible.” Other factors played a role as well, including China’s alleged recruitment of former CIA officer Jerry Chun Shing Lee around the same time.” This is the most dangerous of settings. The wrongful setting comes straight from Sun Tsu where we learn that all war is based on deception. China is not some place that is tinkering at the side of the road, the Art of War COMES FROM CHINA! It gets to be worse when you consider that that book was written long before Americans had adopted proper reading and writing skills, close to 1200 years before that, so that was their first error.

When we see: “But the penetration of the communication system seems to account for the speed and accuracy with which Chinese authorities moved against the CIA’s China-based assets. “You could tell the Chinese weren’t guessing. The Ministry of State Security [which handles both foreign intelligence and domestic security] were always pulling in the right people,” one of the officials said. “When things started going bad, they went bad fast.”“. The entire matter seems to be exponentially wrong. The big issue is not on how it was cracked, or even if it was cracked. My issue had been (for a much longer time now) that for too long, the deciding voices, all listening to some CTO, often with multiple sides lacking wisdom that the setting was not merely that there was ‘a security risk’, there was for the longer time a much larger security flaw. For much too long a time, we got the ‘slides of wisdom’ on how data in transit tends to be safe and data at rest tended to be in danger. Even when I started my CCNA, the amount of knowledge given in the Cisco books gave the rise to the consideration that data in transit is not merely as vulnerable, it was that a lot more could be done unnoticed (not merely by the Chinese mind you). It was some time before the Sony hack that I expected a setting where the routers themselves might be used against the owner, it went further when we consider Wired in 2013 (at https://www.wired.com/2013/09/nsa-router-hacking/). The headline is not merely ‘NSA laughs at pc’s, prefers hacking routers and switches‘. It is the setting where we see: ““No one updates their routers,” he says. “If you think people are bad about patching Windows and Linux (which they are) then they are … horrible about updating their networking gear because it is too critical, and usually they don’t have redundancy to be able to do it properly.” He also notes that routers don’t have security software that can help detect a breach“. This is where I was in 2011, when I started to comprehend the working of a router and router tables, I figured out that it is not the router they can see that is the problem; it is the one they cannot see. That idea came from a presentation by Thomas Akin, CISSP, Director, Southeast Cybercrime Institute who had a presentation for the Blackhat briefings. The 2002 presentation gave me the idea. You see apart from the lack of security, the +1 hop hack allows form something truly unique. Consider [.MIL Server], that server connects to <secure router 1> and things are set into motion. Now, we cannot direct all the traffic, yet materials from that location to let’s say ‘preferred consultant one‘ will go via certain paths, yet the first router after <secure router 1> tends to be merely one or two routers (depending on traffic) to that preferred consultant. It is easy to find a router that could optionally be a link to these routers and duplicate all packages that go to that specific next step. Not only is the task easily done, the path is not hindered, the router is not intervened with and a simple reset takes away whatever evidence existed in the first place. In addition, the additional part is that the compact flash in those routers is ‘The maximum storage capacity for the CF in Slot0 and Slot1 is 4GB‘, yet the only part here is that you only needed 32 MB, which is what most of us used then, but cards that small are no longer made, so most IT people just plug in what they have. You have well over 3GB of package storage, so all packages to that one location could be stored and redirected on the ‘off’ hours as not to leave any monitored spike. Until the CFlash card is ejected from the router and investigated no one will have a clue. That was 7 years ago and the systems are even more capable now, a 3GB glitch will not register on most systems, especially when those IT people do not block Spotify and/or YouTube. By the time they figured it out, the setting is already wiped, and this path can be adjusted on a daily bases so that most IT networkers never had a clue in the first place.

You think that I am alone in this, that I am this clever? No, I am not! There are plenty of IT Networkers running circles around me and that is now set into the stage of ‘we’re untouchable‘. The CIA was never that, they never needed to be touched, the opponent merely needed a clear line of sight to the router that is one skip from the secure router that they needed to get to. We see more in the Foreign Policy article with the quotes “Information about sources is so highly compartmentalized that Lee would not have known their identities. That fact and others reinforced the theory that China had managed to eavesdrop on the communications between agents and their CIA handlers” and “an encrypted digital program, allows for remote communication between an intelligence officer and a source, but it is also separated from the main communications system used with vetted sources, reducing the risk if an asset goes bad“. Now we merely add “But the CIA’s interim system contained a technical error: It connected back architecturally to the CIA’s main covert communications platform. When the compromise was suspected, the FBI and NSA both ran “penetration tests” to determine the security of the interim system. They found that cyber experts with access to the interim system could also access the broader covert communications system the agency was using to interact with its vetted sources, according to the former officials“. I believe it goes further than that. If we see the entire layer process and consider that in the end, certain systems merely replicate a process. Cisco (at https://www.cisco.com/c/en/us/support/docs/lan-switching/8021q/17056-741-4.html) gives us: “A device can determine which VLAN the traffic belongs to by its VLAN identifier. The VLAN identifier is a tag that is encapsulated with the data. ISL and 802.1Q are two types of encapsulation that are used to carry data from multiple VLANs over trunk links”, as well as “The DA field of the ISL packet is a 40-bit destination address. This address is a multicast address and is set at “0x01-00-0C-00-00” or “0x03-00-0c-00-00”. The first 40 bits of the DA field signal the receiver that the packet is in ISL format“, so as the destination was known, the people needing this could search very specifically. When we consider ‘It connected back architecturally to the CIA’s main covert communications platform‘, the connection back would enable those seeking to find the needed value of the DA field. That does not merely impede the CIA, it stands to reason that to some degree the NSA would be just as vulnerable.

The main course

In my case, I tend to go for the Bambi burger, ideally I watch Bambi whilst having that lovely slice of venison. You see when we get to “As part of China’s Great Firewall, internet traffic there is watched closely, and unusual patterns are flagged. Even in 2010, online anonymity of any kind was proving increasingly difficult. Once Chinese intelligence obtained access to the interim communications system,­ penetrating the main system would have been relatively straightforward, according to the former intelligence officials. The window between the two systems may have only been open for a few months before the gap was closed, but the Chinese broke in during this period of vulnerability“, I believe the setting is worse than that. These players still require their consultants. It does not matter whether you call them construction workers, members of Blackwater, Xe Services, or Academi. It is those places as well as Booz Allan Hamilton and other providers that still require to be informed, and that is where the interception could start. The setting is not ‘the Chinese broke in during this period of vulnerability‘, it is the long term flags that they were able to test at this point and that is the fear we see with their setting of Huawei and partners. Not that Huawei is the danger, but the fact that Chinese intelligence is just as able to get into nearly all systems, it merely can get into Chinese systems faster (for now). This is where it gets a little more complicated, because it is not about the now, it is about tomorrow and the tomorrows that are coming. The only ones who have a chance of getting things done are players like the Constellis Group and Palantir when they unite abilities. It is going to be about data and about the ability to forecast how traffic goes. Thomas Akin was teaching this wisdom 16 years ago. We see this when we are made to realise

  • Live system data is the most valuable.
  • Immediate shutdown destroys all of this data.
  • Investigators must recover live data for analysis.

And the loss is merely a reset away, in most cases if there is an automatic reset; the only data available is the last transgression at best. With the coming of 5G live real-time capturing data streams is what is more likely to set the stage of finding out what happened, in this the entire setting of ‘China’s Great Firewall‘, we are already looking at outdated Chinese technology and I do believe that those behind the article, as well as some DARPA people are aware of that. America and Europe are behind in ways that we cannot even perceive, because the players that need to move forward are doing so iteratively, that whilst the time of reengineering is now merely 10% of what the development time was. We see this with “Call this the IBM problem, which faced an existential threat as soon as Asian groups started churning out cheap PCs in the 1990s. But here IBM also provides a few tips to the future, with its pivot to software and solutions. By the time of IBM’s iconic “solutions for a small planet” ad campaign in 1996, the company was trumpeting voice recognition and ecommerce — producing the sort of digital enterprise backbone that ended up helping develop the internet economy” (source: Australian Financial Review). In the first instance the Asian market required 10-15 years to catch up, the second time around it took 2-3 years and now with Google and Apple working globally, it takes months. IBM (others too) took iterative steps to maximise the economic footprint, instead of truly leaping forward whenever possible, they lost the advantage and are now trailing the markets. Huawei is one clear example where the American market was surpassed. Samsung showed its supremacy by having 5G home routers ahead of everyone else and the advantage in Asia is only growing. It is seen with “Alternatively, authorities might have identified the system through a pattern analysis of suspicious online activities. China was so determined to crack the system that it had set up a special task force composed of members of the Ministry of State Security and the Chinese military’s signals directorate (roughly equivalent to the NSA), one former official said“. I do not read this part in the same way. I believe that with ‘set up a special task force composed of members of the Ministry of State Security‘, was not about cracking. I personally believe that the Cisco books were so illuminating that they decided to change the setting in their own game. I believe that the Chinese now have a more advanced system. They have done what players like Cisco should have done before 2014 and they did not. I believe that when we see a partnership between Constellis and Palantir, their findings will bear that out with in addition an optional link that shows part of the accusation that China let Russia in on certain findings (and the Russian evolution of certain networking devices). This and the next part is largely speculative, but it is supported to some extent. We see this in: “Once one person was identified as a CIA asset, Chinese intelligence could then track the agent’s meetings with handlers and unravel the entire network. (Some CIA assets whose identities became known to the Ministry of State Security were not active users of the communications system, the sources said.)“. I believe that he part given in ‘not active users of the communications system‘ gives us the third part. I believe that the system was not merely invaded. There is every chance that certain systems when activated also leave tags behind and that is where the intrusion would have paid off. You see, in the Cisco setting (as an example), the data frame has an optional 60 bytes of extension headers, yet is that always empty? More important, when were these data packages truly thoroughly checked? In this speculative setting I take you to the movie Die Hard 2. In that movie we see on how someone decided to get clever and uses the outer marker beacon to warn the planes that were in danger. The beacon can be used in other ways than merely give a beep. I believe that Cisco data packages have other optional parts than can be ‘reused’ to do something different, like the optional headers. They are to most merely empty pre-set ‘spaces’, but they could have more. That is the setting that America faces and the fact that they could get overwhelmed by Chinese intelligence because they did not rely on iterative parts. Huawei had been leaping forward, for example now offering a 128GB Android 8.1 phone (the Huawei nova 3i 128GB Handset), for 50% less than its competitors. A system that is just as advanced as anything Apple and Samsung offer; at merely half the price whilst Chinese Intelligence has been digging into that device for months, unlike the NSA that needs to queue up with all the other users to get to look at the Pixel 3 and the iPhone 8 on launch day. That is the setting we seem to be seeing and America is indeed and rightfully worried, not because Huawei has backdoors (which I never really believed) but because the players here had been held backwards through iterative technology. Apple is actually staged by Forbes that way with the quote ‘a minor point update for the iOS 11.1 iteration‘, even Forbes speaks about iterative changes. That is the setting that they are up against and they have been surpassed for years and with Huawei leading the 5G stage on a global setting the US authorities are merely getting more and more afraid that not only are they no longer the leading players, they are now sidelined by not being able to keep up with what will be presented ‘tomorrow’.

That part can be supported through the CIA with analyses reports (at https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol49no3/html_files/Collection_Analysis_Iraq_5.htm), in here we see that Richard Kerr, Thomas Wolfe, Rebecca Donegan, and Aris Pappas give us (in a different context): “The analysis on this issue by the Intelligence Community clearly was wide of the mark. That analysis relied heavily on old information acquired largely before late 1998 and was strongly influenced by untested, long-held assumptions. Moreover, the analytic judgments rested almost solely on technical analysis, which has a natural tendency to put bits and pieces together as evidence of coherent programs and to equate programs to capabilities. As a result the analysis, although understandable and explainable, arrived at conclusions that were seriously flawed, misleading, and even wrong“. It is important to realise that this was on the WMD setting, so in a different context and on a different setting. Yet the information systems were all designed to upholster that flaw to an ‘evolved’ placement, the systems in their entirety are nowhere near ready, now even for the previous setting. The movement from a lot of staff to more fruitful consultant settings is now paying off in a negative way for the CIA (and the NSA too). This is where it gets interesting. You see, the previous setting that I gave should partially have been dealt with through the flashlight program that DARPA has. Raytheon BBN is working on that with Professor Richard Guidorizzi from George Mason University Fairfax. I think that the system is not entirely ready here, not if the packages can be duplicated via the router and as long as the original is not touched, that system will not get the alert lights ringing.

To get you on board on how far all the NATO partners are behind, let me give you two settings. The first is a DARPA Project called ‘Probabilistic Programming for Advancing Machine Learning (PPAML)‘, the man in charge is Dr. Suresh Jagannathan, yet the bigger brain might be MIT graduate Dr. Jennifer Roberts. The given setting is “Probabilistic programming is a new programming paradigm for managing uncertain information. Using probabilistic programming languages, PPAML seeks to greatly increase the number of people who can successfully build machine learning applications and make machine learning experts radically more effective“, whilst we also see the goods in the DARPA article by Dr Roberts with “If successful, PPAML could help revolutionize machine learning capabilities in fields from Intelligence, Surveillance and Reconnaissance (ISR) and Natural Language Processing (NLP) to predictive analytics and cybersecurity“, this is certainly leaping forward, but it is still based on a system. I believe that the Chinese decided to turn the funnel upside down. To illustrate this I need to get you to an app called Inke. The article (at https://thenextweb.com/contributors/2018/02/09/hidden-world-chinese-livestreaming-app-inke/), gives us ‘The hidden world of Chinese livestreaming app Inke‘, this is not a few people; this is a craze that has already infected millions upon millions. So with “he was actually doing a livestream, an extremely popular hobby for young people in China. China is way ahead of the rest of the world when it comes to embracing livestreams.” you are missing out and missing out by a lot. These streams are real-time and often geo-tagged. I believe that the Chinese have changed the setting, they are optionally collecting Terabytes of daily data and they are converting that to actionable intelligence. Facial recognitions in phones, geo-tagged and all uploaded and streamed, all converted on the spot, like the SETI screensaver, millions of affordable mobiles (this is where the Huawei nova 3i 128GB Handset and all other new handsets come in), parsing all that data into uploaded files and Chinese intelligence gets global information close to real time, whilst their learning machines are about efficiencies of collected data, it is not about the better application by making them more effective, it is about the massive amounts of data offered to get the systems to upgrade the efficiency of parsing data, because parsing data is where the bottleneck will be in 5G and they already have a larger advantage.

In the meantime, on any given day thousands of Inke users are filming life around them in malls and famous places looking awesome doing it. Yet, if you look at the CCTV settings, how many users would have passed 935 Pennsylvania Avenue, Washington DC, or at London SE1 9EL, UK walking towards London Bridge? How many people were merely assuming that they were tourists face timing with mom and dad? Are you getting that picture now? and also realise that Inke is merely one of more than 300 live streaming companies, all capturing that data all those tags that a smartphone allows it to capture and at the top of all this, Facebook and YouTube are eagerly pushing people to gain following by doing just that. So how long until the user realises that uploading the same stream to 2-3 providers gets them to gain a lot more following and optionally cash? Yes, the intelligence community is that far behind at present. So when we are worrying on “The system was not designed to withstand the scrutiny of a place like China, where the CIA faced a highly sophisticated intelligence service and a completely different online environment“, we need to consider that China is already ahead of the game and the CIA systems might be merely an option to scrutinise their own data, because that remains the Chinese bottleneck, the data will require verification and that is the one field where their opposition could gain the advantage if they set their minds to a different algorithm, one on reliability, not on likelihood. It is a setting where all the players involved have a second tier of consideration. They embrace a ‘not now, but soon‘ thought, when ‘I needed this yesterday‘ is the proper setting as I personally see it, because data without proper vetting is merely used space on any given storage device.

That final part can be considered when we look at the linked article that NBC had from last January. There we see: “When agents searched Lee’s hotel rooms in 2012, they found notebooks with the names of covert CIA sources, according to court documents. But not all of the agent arrests and deaths could be linked to information possessed by Lee, who left the CIA in 2007“, an issue I mentioned in an earlier blog. We get there when we consider his actions and ‘found notebooks with the names of covert CIA sources‘, do you think that anyone, especially in this setting would be that stupid? It’s like keeping the condom as a trophy after having intercourse, its useless and stupid. I believe that either it is not the ‘covcom’ system, or not merely the ‘covcom’ system. I believe that (if it is all correct) that Chinese intelligence got in further and deeper into acquiring the data required and the notebook is the proverbial red herring in all this, especially as Jerry Chun Shing Lee left the CIA in 2007. You do not hold on to that level of information 11 years after you might have had some level of valid reasons to have it in the first place. That is the part many overlooked, or looked away from.

In the end, I do believe that it is not merely the inability that drove the anti-Huawei waves, it is the fact that those decision makers have no idea where to navigate towards next is what drives their fears almost exponentially.

 

Leave a comment

Filed under IT, Military, Politics, Science