Tag Archives: von Clausewitz

Operation Hazen Ames

It is night, Michael Weatherly is being casual, he is making small talk with another person. He explains that there is no need for the one exit to be watched. He closes the reinforced door that had the room with the information he needed. He then trips the alarm, turns around to the mirrored wall and pulls away the table, there is one screw. He unscrews it and pulls out the screw connected to an umbrella plug, the wall comes down. He clicks the other side open and points to the partner to get through. They go through and as he closes the initial mirror wall, the magnets in the table and wall push the table back in place. The umbrella plug is glued to the screw, it now operates as a screwdriver, Michael attaches something to the screw, he then click pushes the second wall back into place, the magnets hold it firm. They moved through an unmonitored small corridor and enter a supply room at the end is a rack with goods, he clicks on a button and the rack moves up a few millimetres, the wheels are now down, he moves the rack and signs the partner to quickly goes through. The moves through and there is a small food elevator there. He closes the wall and pulls two wires to set the rack back where it was, he had 10 seconds left, he can hear people running towards the place they had just left. They enter the food elevator and quietly opens the back panel, he goes through, the partner follows, he closes the elevator door and the back panel, then presses a button. The food elevator moves quietly down. 

For me it is easy to explain why the person is Michael Weatherly. I have been re-watching 12 seasons of NCIS during the lockdown the last two weeks. The issue is that this is part of a spy story, but not one you would expect. You see, this situation happened, it was a CIA operation, one of many and the story is not the common parts of the TV series, this series is not NCIS or Bull (I never saw Bull). The setting is that the TV series and episodes are a tell tale to the foreign governments to show them how they were transgressed upon and the TV episodes have fake names (as any series does) with a reference to an anagram to the operation. Someone decided to turncoat the CIA and uses the methods to make money on the side, from the studios as well as the extra checks from the governments he is supplying the evidence to, a nice little operation.

Yet the setting on TV series, as we see the use of ‘clever’ terrorists, there is a second fear, not that the opposition is more clever than the terrorists. It is that greed driven elements see their option clear AFTER the operation, not merely endangering what comes next, but giving away the past endangering more as well. It was the setting for an episode of any crime and spy driven series, yet I have no idea why the idea sparked into my mind. Whether it is about double agents, self turned greed driven agents or another kind, we are (through the Art of War) confronted with 5 types of spies. 

Local spies
Inward spies
Converted spies
Doomed spies
Surviving spies


The Art of war teaches us that if all five types are used it is impossible to discover the secret system, but as said the old days did not consider the greed driven logistics that we see today. You can read the Art of War to see and learn about the 5 types, yet the setting is altered in todays espionage. We have minders, archivists and now as one turns the colour of his shield, there is a larger danger that it turns Local spies into Doomed spies, a game changer many are not able to deal with. In any operation the local spy is the anchor, a barge without an anchor can move from the shadows into the floodlights of the other player. Am I right? Am I imagining (or fantasising) this? It is but a dream, yet in this we also find the larger stage of what matters. Even though von Clausewitz gives us that mot intelligence is false, there is a consideration that he considered himself a gentleman and as such espionage was beneath him and it was never considered a valid form of warfare. Sun Tsu is much more relevant, he saw espionage as a valid tool and his approach to any tool n hist setting to war is how to use tools the most efficiently. The concern he had for spies is like all other tools, if it protects the homeland, that is how we use it and in that era the general and his administrator were dedicated to the land they protect. In todays situation the logistics of war is on a sliding scope of what comes next and as such the undervalued and the discarded are drawn to whatever pays for a little better lifestyle than they are set to have, and they will use what is at their disposal, as such it is the archivist and the administrator that become the weakest link in a spy system. A situation that no movie or TV series has looked at. With all the thousands of episodes and hundreds of movies, I casually found a vulnerable unexplored link, yay me!

Leave a comment

Filed under Military, movies

Tik..Tik..Tik..

Yes, the news is here, the news is also largely ignored, but it gives us that there is a clock in motion, a countdown if you will. It starts off with Notebook Check who gives us 15 hours ago (at https://www.notebookcheck.net/Huawei-is-expected-to-bring-HarmonyOS-to-up-48-devices.504072.0.html) ‘Huawei is expected to bring HarmonyOS to up 48 devices’, which might seem trivial, and to some considering what is out there is, yet they all forget that Android and iOS have never had any competitor, so this is a first and Germany is smack in the middle of it. So the German time makers might say ‘tik tik tik? Ve have vays to make you Tok!’ And after this pun there is one little bit where we see ‘Huawei will have ten per cent of German smartphone market’, which is a little over a week old, but it is merely support to ‘China is close to ‘world domination’ and Europe must wake up to the danger, German spy chief says’, to this (slightly less diplomatic) I would say “Yes, you stupid idiot, if you weren’t asleep at the wheel taking viagra 24:7, you might have a working pencil! And written acts of needs when it counted”, so you might think this is out of bounds, but it is not. When we consider “Beijing was ‘very cleverly’ spreading its influence across Europe, Asia and Africa – warning that its technology is now so advanced that Germany cannot tell if it is being used for sinister purposes”, so as Gerhard Schindler (no relation to Oskar) is giving us ‘its technology is now so advanced that Germany cannot tell if it is being used for sinister purpose’, we see the first truth, technology in the EU (and the US) is massively behind Huawei and Chinese IP as well. This is a stage I saw coming well over a year ago, optionally two, the stage was that clear already at that stage, and the administrations didn’t set their technology departments in gear like they should, now they are 2-5 years behind, in the stage where 5G is starting, the technology masters of the west are coming up short by a lot. So whilst some give us ‘German defence minister takes hard-line stance on Huawei’, I merely wonder what he will take a hard-line stance with, he has been made technologically inferior in more than one way. And whilst we are remembered for “Australia banned Huawei and ZTE from its fifth-generation wireless technology infrastructure in 2018, citing the likelihood that they would “be subject to extrajudicial directions from a foreign government.” Secretary of State Mike Pompeo took up that refrain in 2019, warning European allies that any partnership with Huawei could jeopardise U.S. military cooperation with their countries”, yes a collection of brown noses giving Pompeo what he wants and now he has nothing left. Whilst the US was screwing about with options they never had (only really large debts), Huawei took the low road and satisfied the user settings, now that the high road is still missing they are all squandering in the blame game whilst the infrastructure is missing and will be for the next 2 years in far too many places. 

Huawei took a massive hit, but the waiting game is almost over, the people making vast claims, showing no evidence are coming up short and in election years they better start typing their resume and give the crap they created to the next person who needs to make it work, good luck with the notion.

So whilst the mobile gamers take notice of “The Huawei Mate 40 Pro+ and Mate 40 RS Porsche have flash memory that bears the HiSilicon logo, which indicates that it was created by a division of Huawei. Not only that, but it is incredibly fast. Based on the results of measuring the homegrown Huawei SFS 1.0 flash module, it was possible to establish that it provides almost a twofold increase in the speed of operation in comparison with the UFS 3.1 flash memory. According to reports, the sequential write speed was 1280 MB/s, and random 548 MB/s”, it might not be the best in the business, but it is as close as you can get and more important, it is a lot cheaper, how many people with gaming needs and wealth do you know? And all this is hitting the consumers when Microsoft is releasing its Cloud to game on any mobile. Are we catching on yet? 

So in this stage we might go left, we might go right, but a large group will choose Huawei, in a stage where HarmonyOS (if it) satisfies, the larger rocks will fall and Huawei is setting the needs of the next generation. All issues that have been out in the open for two years, as such the lame excuse that ‘Germany cannot tell if it is being used for sinister purpose’ is a clear wash. A setting stage where those sucking the trombone of President Trump will need to wash their hands from any connection to the stupidity that they preached, as such The players are out in the open and calling them on their stupidity is making me warm and fuzzy, how about you?

As such we have a station where a collection of devices (I actually do not know how many) will be up to twice as fast where it matters, and you thought this was about something trivial?

100% more speed and power at 60-80% of the cost implies that Google and Apple will be getting massive hits in the beginning of 2021, and if HarmonyOS catches on, Google will have a much larger problem for a much longer time. If it is about data Google will lose a lot, if it is about branding Google will lose a little, yet Huawei will gain a lot on the global stage and Apple? Apple can only lose to some extent, there is no way that they break even. 

A stage ignored is a stage lost. I wonder if I got that from Sun Tsu, von Clausewitz or Machiavelli. It does not really matter who taught me, Sundar Pichai will feel that lesson, as will Tim Cook. I see no other options in this case, it is the setting after this that ill matter and the technology groups will have to work hard merely to keep up (for close to 3 years) that is the cost of falling asleep at the wheels of industry. Boy do I feel happy, jumpy and giggly with my IP, such is life and pounding on stupid people has its own internal reward I say!

2 Comments

Filed under IT, Media, Politics, Science

Exposing lies?

We are confronted with lies all the time, the CIA (who is truly gifted in the act) uses it to spread all kinds of discourse, but that is their operandus mondi, so we are not surprised. Yet now we are confronted that these tactics have been embraced by both the FBI and the Pentagon. And it is not my source; it is an American source that gives us this part.

To get to the heart of the matter, we will have to borrow a TARDIS and do some time-travel (a valid Dr Who reference). During this trip we will not be looking at apples and oranges, but we will be investigating fruit, and this has all the bearings on the case.

Trip one

Let’s travel back to November 24th, 2014. It is a sunny day at Sony Square New York, 21 degrees, nice and relaxing weather. It had all the marks of it being a lovely day, were it not that someone decided to hack Sony and they did it, not only did they do it, they left all the markers blaming North Korea. The FBI send their cyber experts and behold, they too agreed that it was North Korea. Even as we were extremely aware that they had no way of doing it, the FBI stood firm on their findings.

Trip two

We are pushing the envelope and stopping at 2015, 2016, 2017 and 2018. We are given “North Korea’s offensive cyber capabilities” and we see Randall Schriver, a top Pentagon official and all the ‘so called’ expressionistic ideas on how North Korea is the big nasty, the large danger and the big hacker. In addition to this the Financial times gives us (at https://www.ft.com/content/cbb28ab8-8ce9-11e9-a24d-b42f641eca37) “Pyongyang controls an army of thousands of hackers who bring in hundreds of millions of dollars annually, according to experts’ estimates“, which was given to us in June 2019.

Into the Heart of Darkness

It was only hours ago that we were given the first light of truth by the Washington Post. To give you that we need to change the topic to fruit and not apples or oranges. You might realise that to get ahead, you need to be ahead. Unless you build a system yourself, you need access to a system of equal quality to hack into a place. Unless you have the passcodes (current password = Inc0rrect%) and inner workings, you cannot hack past the Pentagon Cray, it is close to impossible to do with even the most updated equipment and North Korea is well over a decade behind. It is defended by firewalls and other encrypted matters. Sony is not that advanced, yet still has a lovely set of firewalls and other means to limit access. Yet North Korea, with technology that was considered advanced in 1990, was nothing of the sort a decade before they hacked Sony. In addition, certain access methods or planting of other abilities would have required 4G mastery, a mastery that they do not have. The digital footprint does not match up and it is there that the Washington Post (at https://www.washingtonpost.com/world/national-security/leaked-documents-reveal-huaweis-secret-operations-to-build-north-koreas-wireless-network/2019/07/22/583430fe-8d12-11e9-adf3-f70f78c156e8_story.html) is giving us the goods.

So as we are given: “Before 2008, North Korea struggled to find multinational companies willing to build a 3G network in such a risky business environment. That ended with the creation of the wireless provider Koryolink, which emerged from a discreet visit in 2006 by Kim’s father, Kim Jong Il, to Huawei’s headquarters in Shenzhen, China” this is the first piece of evidence, 6 years before the hack North Korea did not have access to 3G, it was not there, as such the knowhow of hacking would have been severely limited. In addition to this we need to consider “Alexandre Mansourov, an adjunct professor at Georgetown University’s School of Foreign Service, who in 2011 wrote about North Korea’s digital transformation. “They decided to work with Huawei from that time on.”” gives us that in 3 years that stage was not surpassed, or even achieved. The paper by Mansourov also gives: “less than 3 percent of the population currently use modern telecommunication services, it has adequately trained human capital, a rather developed industrial and technological base, and sufficient financial resources to pursue the digital revolution to the benefit of the majority“, which now implies that the fall back is actually a lot larger. If they truly had a ‘rather developed industrial and technological base‘, then they would be the oranges that need not rely on Huawei, yet they are technologically speaking merely apples, they are both fruit, but on a different shelf, a lower shelf and that is where we see the technology fail (especially in North Korea). In his paper we also see: “Because the cell phones connect to Chinese cell phone towers it is difficult for the North Korean government to eavesdrop on the calls, but it does mean use is restricted to the border area“, this implies that the limitations in North Korea are actually larger and as such knowledge is more limited. that last part came from ““How Chinese Cell Phones Help Information Flow,” Martyn Williams, 1 April 2010” which was 4 years before the hack, there is no way for any nation to evolve their technology level in that amount of time without having billions, as well as all the technology available for installation and implementation. Which was never the case, North Korea is hardly on the 3G path keeping them a decade behind everyone else.

Fruit, Apples and Oranges

So even if I am looking at fruit, looking at mobile technology versus hackers is like setting apples against oranges, yet the larger truth remains, a hacker cannot surpass certain levels of access if they lack access to the current generation of technology and that is where we see the flaw in all this. To have antiquated equipment access the Sony mainframe calls for all kind of issues as the access requires speed, and if you rely on old technology there is a limit to what you can get. For example getting a 4TB drive for a PlayStation 3 is bogus as it cannot address the complete drive, so when you look at it from that path, you lack the ability to store all that data and Sony was all about data. More important, if the skill to get behind a 4G system is not there, there was not even 3G, how can you get into the hack? Now we might rely on normal lines, but the flaw is already shown, you need a larger comprehension of technology and telecommunication to proceed and North Korea is stated that it could not get 3G without Huawei; at that point we should recognise that it could not get into Sony. If they actually had done that, then they would have been able to design and build their own 4G (which would still be half a decade too late), but that would be the premise. That absence gives us that the Washington Post, who also gives us: “According to a 2008 contract, Panda would transport Huawei equipment to Dandong, a town in northeastern China known for cross-border trade. From there, it would be taken by rail into Pyongyang“, as well as “In spring 2008, Orascom and Korea Post tasked Huawei with developing an encryption protocol for the network, noting that the government would create its own encryption algorithm, according to the documents” this much larger stage does not absolve Huawei (it is not about that), but the fact that encryption protocols were not in existence implies a delay of at least 2-3 years to get their 3G up and running, the entire matter would have given North Korea less than 2 years to get trained to the levels required to visit the Sony Server and become an actual cyber threat. There is no realistic chance that this would be the case and again, when we consider the press visit to North Korea (somewhere in 2012) where the Dutch press learned that their high ranking escorts had no idea of what a smartphone was, that alone gives a lot more insight in the technological limitations of North Korea and its army.

There is no doubt that North Korea would love to be an actual threat, but when it cannot comprehend 3G to the degree it needs and it has no 4G, how is North Korea an actual threat? I believe that Sony was hacked by someone else, there is also enough valid intelligence to see that those people would love to do business with North Korea, yet the entire matter connected to Huawei implies that North Korea is missing several links on the chain of telecom cleverness, the reigns of the horse of innovation and the armour of progress is all rusty, heavy and useless. In this stage the North Korean cavalry might be the most advanced they had but it still does not match up what other nations have had access to from the late 1800 onwards, when you realise the difference to that degree, do you still believe that North Korea could have been the hackers?

That is seen when we look at ‘The Hill’ in 2017. There we get North Korea and the quote: “Today, when warfare can include the operational use of nuclear weapons, the cumulative consequences of underestimating “friction” could be exponentially more serious. This conclusion is true by definition and thus, thoroughly incontestable” yet when we see in a 4G world that North Korea has not even mastered 3G to the degree it needs, we see a shift of needs, needs that are all about the consultants charging their overexposed ego’s by the hour, whilst we see a lack of evidence on the abilities towards the dangers that we are seemingly exposed to. In that regard the FBI and the pentagon has played into the hands towards consultants like Randall Schriver, yet the actual evidence (implied to be) as we now see in the Washington Post gives us another picture, one that bounces against earlier accusations and speculations. March 27th, 2019 C-Span gives us the premise that China and North Korea are set together as a threat, yet the overbearing accepted evidence shows that the division sets the stage where China is 99% the threat and North Korea a mere 1%, yet together is nice to bump the budget. So far no actual or factual evidence has been shown where North Korea is an actual cyber power. As I personally see it, even the NY Times is in on it.

When we are given: Their track record is mixed, but North Korea’s army of more than 6,000 hackers is undeniably persistent, and undeniably improving, according to American and British security officials who have traced these attacks and others back to the North“, as well as “North Korean hackers tried to steal $1 billion from the New York Federal Reserve last year, only a spelling error stopped them“, and “only sheer luck enabled a 22-year-old British hacker to defuse the biggest North Korean cyber-attack to date“. when we are confronted with ‘spelling error‘ and ‘sheer luck‘ we are sold a bag of goods, the fact that North Korea is at the most about 3G, we see the lack of certain abilities. If these hackers were that good, than their abilities would have been to acquire all the technology that we have full access to and that has seemingly not happened. In any war we acquire the weapons to be an equal footing, or more advanced footing, von Clausewitz and Sun Tzu taught us that. You do not rely on the flintlock when the opposition is walking with a 7.62mm MAG. The accusation (also from the NY Times) “the country is suspected of having thousands of hackers capable of carrying out global cyber-attacks, like the recent ransomware attack in more than 150 countries” gives us that they are a large threat and this is only possible with a large established infrastructure. That is seemingly not the case so as we ponder ‘suspected‘ we see the speculated inflated danger that North Korea is, and until today, until the Washington Post gave us the article, that part was too eagerly accepted.

There is no doubt that there are hackers in North Korea, but as the technology shows, they are fighting with one hand on the back wearing a blindfold. It does not make them less dangerous, but it also implies that the events that have taken place were done by others and as such the cyber operatives trying to stop it are not merely failing, they are at present completely unaware who they are actually up against and that is the sad part of this story. after all the billions they got they are still clueless in the dark, a sad story that only came to light as the Washington Post gave us: ‘Leaked documents reveal Huawei’s secret operations to build North Korea’s wireless network‘, seemingly a 3G network no less. And even there we have no evidence at present. That part is given through: “Since then, any company to provide Panda with telecom items intended for North Korea and containing at least 10 percent U.S.-origin content without a license would be in violation of the export ban”, so not only is there a question on one side, the lack of evidence at present gives rise to a lot more issues and that makes for such a sad situation at present.

 

Leave a comment

Filed under Uncategorized

Changing the rules of Democracy

An interesting thought isn’t it? It was CNN that gave me the idea in the first place. It all started with the article on the upcoming Argentinian default (at http://money.cnn.com/2014/07/25/investing/argentina-default/index.html). I have skin in the game here. Part of my family comes from there, which is why it caught my eyes in the first place. This is not the first time that Argentina has been in such a problematic state. The last time was in the late 90’s when it faced the great depression.

So, why is this event such a big deal?

Let us not forget that apart from soccer, many regard Argentina, no matter how beautiful it is, as a third world nation. So why is it allowed on the International Capital markets in the first place?
That was not an offensive question, but I need to ask it so that I can answer the questions many of us have in the first place. Argentina is in second place when it comes down to South American GDP, after Brazil (who is in first place by a massive margin), it is followed by Colombia and Argentina has a GDP that is 50% better than the nation holding position three, Colombia. So, within the ‘third world’ Argentina is pretty high up there. The second fact is that Argentina has the 21st position in regards to GDP, so this gives a massive view to how big its economy is. So why is it about to default on a 1.5 billion bond?

Well, Argentina is playing hard ball, a statement that seemed weird, because in the light of Argentina it seemed like worrying about a shave on route to the guillotine (a fake fear many former French Aristocats had, pun intended).

My first thought was the ‘worry’ why the IMF was not speaking out on all this. It seems so outspoken on a little place like Cyprus (no insult intended), yet is remains silent on an economy a hundred times larger?
What gives?

Well, my faithful old Yahoo had a nice part on this (at https://au.finance.yahoo.com/news/impact-argentine-default-100849473.html).
I particularly liked the following quotes: “The IMF proposed an international debt restructuring mechanism in 2003 but the plan was abandoned under pressure from the United States, the institution’s largest stakeholder, and the major emerging-market economies“, so the USA needed to keep Argentina as a cash cow or what?

The second one was “Under a US court order, Argentina has until Wednesday to either pay hedge funds demanding full payment on of its bad debts — or face a default that could have serious economic consequences“. So is this another USA hedge fund game?

If we consider the generic statement “Hedge funds are made available only to certain sophisticated or accredited investors and cannot be offered or sold to the general public. As such, they generally avoid direct regulatory oversight, bypass licensing requirements applicable to investment companies, and operate with greater flexibility than mutual funds and other investment funds“, we see the fear that governments are financially no longer run by governments but by those holding the credit bill behind the scenes.

This gives us a lot more fear then we should have to deal with and as such, it seems that democracy is no longer in the hands of the people, but in the hands of those managing the hedge funds. As such, did US District Judge Thomas Griesa buckle under internal pressures or is there something else in play? We should ask this question as we see that the response we see (at http://www.irishtimes.com/business/economy/us-judge-orders-argentina-and-bondholders-to-agree-deal-1.1875547), which is quotes as “Jonathan Blackman, a lawyer for Argentina said even with around-the-clock talks ‘it would be unlikely, if not impossible, to result in settlement. It simply can’t be done by the end of the month’ he said

This feels like a game played with millions of households on the butcher’s counter, with the meat cleaver already raised up high. There is not enough information in these sources to clearly state how the game was played up to now, or the involved players behaved and how the international justice courts (not just the US) as such have been behaving on the given facts. The fact that the IMF has warned that an Argentine economic default could not only hurt the country’s economy, but also the global financial system is another fact in the entire game as this is currently playing out. What is FACT, is that we have seen hedge funds cash in at the expense of close to a billion people, they played a game that made them wealthy and left the rest in destitution, yet now we see more and more that these players are implied not to be held to rules of oversight and it can bypass licensing in apparently too many flexible ways. Yet, it must also be clear that Argentina is not blameless in this game either.

Not unlike the USA, when we compare debt to GDP (governments seem to love that comparison) USA is currently set to 101.45%, whilst Argentina is only at 45.6%, which implies that Argentina has an economy twice as solid as the US has (a false statistic, I know!). So when we play the numbers game, this default, or even to allow for this event to occur seems massively stupid in my books. The question becomes why Argentina is continuing to play such a level of hardball, the debts will not go away, Argentina would lose its place as a G20 member and beyond that the foundations of the Argentinian economy will be shaking for a long time to come, opening additional doors for investors to bail out of Argentina, take the first row boat across the Rio de La Plata and set up shop there. This in the end will be a massively good thing to Uruguay and the economy of Montevideo for the next 10 years.

So, how is this all affecting democracy?

In my view if we want to remain true democracies, then it is time to regulate Hedge Funds and their managers. It will require a level of oversight that is beyond reasonable, as the economic fall of the USA in 2008 has proven to require. In that regards the term ‘Vulture funds‘ seem very appropriate. The US and in particular its FBI are all about hunting down Loan Sharks, whilst at the same time they ignore a 2.4 trillion dollar market right under their noses.

Yet, in all this Argentina is not without blame either. Someone approved these debts. If we accept, no matter how repulsive that these funds, referred to the behaviour of vulture birds “preying” on debtors in financial distress by purchasing the now-cheap credit on a secondary market to make a large monetary gain, is as such opening a market, which is high risk and also at time high yielding, then we must accept that Argentina stepped, willingly or not, into a field with their eyes wide open, as such they largely have themselves to blame.

If these are matters of fact then we see the acts on both sides of the isle to allow and even mandatory pursue the need for a change to the democratic standards we see in monarchies and republics. If you wonder why I made the reference to the Guillotine, than consider the History of France, its bankers and the change as it brought order through Napoleon Bonaparte. The statement ‘War never changes‘ seems highly appropriate here, it is a quote from a Videogame, yet the truth behind it is as solid as the writings of ‘von Clausewitz’ and ‘Sun Tzu’. The question remains in these economic wars, who are the warring parties and who are the people behind the screens. You can be certain that those names are not the names of any elected official. Does that not change the premise of both economic war and democracy?

Leave a comment

Filed under Law, Politics