TOKYO MASTER BANNER

MINISTRY OF TOKYO
US-ANGLO CAPITALISMEU-NATO IMPERIALISM
Illegitimate Transfer of Inalienable European Rights via Convention(s) & Supranational Bodies
Establishment of Sovereignty-Usurping Supranational Body Dictatorships
Enduring Program of DEMOGRAPHICS WAR on Europeans
Enduring Program of PSYCHOLOGICAL WAR on Europeans
Enduring Program of European Displacement, Dismemberment, Dispossession, & Dissolution
No wars or conditions abroad (& no domestic or global economic pretexts) justify government policy facilitating the invasion of ancestral European homelands, the rape of European women, the destruction of European societies, & the genocide of Europeans.
U.S. RULING OLIGARCHY WAGES HYBRID WAR TO SALVAGE HEGEMONY
[LINK | Article]

*U.S. OLIGARCHY WAGES HYBRID WAR* | U.S. Empire's Casino Unsustainable | Destabilised U.S. Monetary & Financial System | U.S. Defaults Twice A Year | Causes for Global Financial Crisis of 2008 Remain | Financial Pyramids Composed of Derivatives & National Debt Are Growing | *U.S. OLIGARCHY WAGES HYBRID WAR* | U.S. Empire's Casino Unsustainable | Destabilised U.S. Monetary & Financial System | U.S. Defaults Twice A Year | Causes for Global Financial Crisis of 2008 Remain | Financial Pyramids Composed of Derivatives & National Debt Are Growing | *U.S. OLIGARCHY WAGES HYBRID WAR*

Who's preaching world democracy, democracy, democracy? —Who wants to make free people free?
[info from Craig Murray video appearance, follows]  US-Anglo Alliance DELIBERATELY STOKING ANTI-RUSSIAN FEELING & RAMPING UP TENSION BETWEEN EASTERN EUROPE & RUSSIA.  British military/government feeding media PROPAGANDA.  Media choosing to PUBLISH government PROPAGANDA.  US naval aggression against Russia:  Baltic Sea — US naval aggression against China:  South China Sea.  Continued NATO pressure on Russia:  US missile systems moving into Eastern Europe.     [info from John Pilger interview follows]  War Hawk:  Hillary Clinton — embodiment of seamless aggressive American imperialist post-WWII system.  USA in frenzy of preparation for a conflict.  Greatest US-led build-up of forces since WWII gathered in Eastern Europe and in Baltic states.  US expansion & military preparation HAS NOT BEEN REPORTED IN THE WEST.  Since US paid for & controlled US coup, UKRAINE has become an American preserve and CIA Theme Park, on Russia's borderland, through which Germans invaded in the 1940s, costing 27 million Russian lives.  Imagine equivalent occurring on US borders in Canada or Mexico.  US military preparations against RUSSIA and against CHINA have NOT been reported by MEDIA.  US has sent guided missile ships to diputed zone in South China Sea.  DANGER OF US PRE-EMPTIVE NUCLEAR STRIKES.  China is on HIGH NUCLEAR ALERT.  US spy plane intercepted by Chinese fighter jets.  Public is primed to accept so-called 'aggressive' moves by China, when these are in fact defensive moves:  US 400 major bases encircling China; Okinawa has 32 American military installations; Japan has 130 American military bases in all.  WARNING PENTAGON MILITARY THINKING DOMINATES WASHINGTON. ⟴  
Showing posts with label Cybersecurity Information Sharing Act (CISA). Show all posts
Showing posts with label Cybersecurity Information Sharing Act (CISA). Show all posts

January 01, 2016

Weev - 'Ian's death and antifa at CCC: why hackers must become nationalists'

Article
SOURCE
http://weev.livejournal.com/415737.html



        
Ian's death and antifa at CCC: why hackers must become nationalists. - Andrew Auernheimer
Oðinnsson. Market abuser. Internationally notorious computer criminal.

[Oðinnsson - Odin's son]

03:02 pm January 1st, 2016

People outside the technology industry don't quite understand the scope of Ian Murdock's contributions to the world. The internet is a big place. It has about a hundred million servers on it. Of those hundred million, about twelve percent are running Debian, Ian's distribution. After Slackware 8 came out in 2001, I switched to Debian and have been running it on my infrastructure since. Beyond servers, the most popular GNU/Linux system distributing for the desktop is called Ubuntu, and it uses Debian's core contributions.

By scope of deployment, Ian Murdock was one of the biggest contributors to the Internet in the world. Bill Gates and Linus Torvalds have shipped more widely deployed software, but Ian Murdock certainly exhibited a scale of contribution that approaches their level.

Over the past week Ian had his home invaded without cause. He was kidnapped at gunpoint and falsely charged with assaulting the officer who assaulted him. He subsequently committed suicide. Many people are commenting that he wasn't in a lucid state when he did so. I'm not so sure. His chances of seeing a California prison were very high. California state prisons are the worst in the nation. His chances of losing a significant bit of his assets to the state were also high. Ian had a lot of assets. Rather than endure torture in prison and a loss of his assets to those that were wronging him he killed himself. He was also hoping to catalyze retaliation in revenge against his tormentors, and his death will mean nothing if we don't make it so.

Before we go any further, let's examine the data.
[ GRAPHIC ]
This is a chart of various economic sectors and the total market cap of the associated companies. As you can see, of all the major sectors only financials exceed computing in value. I'm going to say pretty confident that none of them exceed computing in actual social contribution. This year, the Cybersecurity Information Sharing Act passed. It was regarded as a terrible thing and opposed by the entire computing industry. It passed anyways. Computing is twice the market value of the energy industry. When is the last time a bill universally opposed by the energy industry has passed? Never. Such a thing is unthinkable. It does not happen. Utilities, the smallest sector on this list, a fifth of computing's value, has a gigantic multiple of its political power. Computing is regularly made the bitch of the media industry through legislation, which is too small to even appear in this chart.

The food/staples retailing industry is very small in comparison to computing, but I quite assure you that in my home of Northwest Arkansas, the cops have a record of every family with a Walmart executive in it and they know damn well better not to fuck with them. Even a low level Walmart executive isn't going to get beaten, humiliated, and falsely charged in the Ozarks. It simply won't happen because the cops know who runs that place. In contrast, one of the most important contributors to computing on the earth just had that happen to him in San Francisco of all places. The telecom services industry is relatively tiny by comparison to computing, but it still petitioned the government to violate my rights and the protests of the entire computing industry did not prevent it.

Ian is dead for the same reason Lance and Jonathan and Aaron are: computing, as an industry, has no will to power. Computing is filled with nerds who want to focus on their own shit and think politics is stupid. They are right, politics is stupid, and I had the same worldview up until the point a gun was pointed in my face, my home was reduced to rubble, and I was being beaten and starved in solitary confinement. Computing's lack of will to power is especially tragic not only because it has the highest potential for power, but because the big players of the game realize that it does. Regardless of the apolitical nature of the industry it is being dragged into Marxist struggles anyways.

Over at Status451, @maradydd has a brilliant analysis of the feminist part of the cultural Marxist ecosystem that has now turned its eye towards the technology industry, but her reduction of cultural Marxism to a simple protection racket is flawed, because feminists are not the only force agitating against the tech industry, and well funded companies are not the only target.

The other thing that happened over the past week is that antifa was out in force at Chaos Communications Congress. If you are unfamiliar with this, it is the most prestigious gathering of hackers in the world. It is not something done for profit, but for the exchange of ideas amongst hacker luminaries. Unlike feminism, antifa has no profit model in this space, and even if it did, the CCC is not a well capitalized company. It is a loose association of hackers.

Antifa at CCC took the chance to protest emerson's talk as racist. I might be a white nationalist and have been so in public since 2008, but if I were to give a talk at CCC I don't see how I could even make it racist. These are technical talks about real world software deployments. The talk itself was about emerson's travels to Sierra Leone at great personal risk to help use open source software to assist with the eradication of the Ebola virus. Why would they choose this talk?

Let me tell you something. I, as a public white nationalist, have never had problems with these people. Nowadays they are afraid to even say my name. I am Voldemort-tier:

    @MariachiMacabre @davidsgallant (he went on to make real buddy buddy friends with W 3 3 V)
    — MisAndri ಠ_ಠ (@AndriErlingsson) December 30, 2015
    @molon_labia @jack_o_bee4u @dlw624 @PowersThatBeat @Sid_Fishous are we talking about haxor w. E. E. V? Don't want him to find his name
    — GlitterBombTheWorld (@SparkleChaos) December 23, 2015
I'll tell you why they chose that talk: someone who goes to Africa to try to help 3rd world people not die is more likely than a white nationalist to cower their head in accusations of racism. They are looking for easy victims to create a narrative with. Their bonuses depend on it.

As it turns out, there is an economic interest in keeping the hacker community docile, afraid, and Balkanized. The last term is best because it is the same guy that catalyzed the genocides in the Balkans who funds most antifa groups: George Soros. Just as he funded the destruction of Yugoslavia because the unification of Slavs presented a threat to his geopolitical interests, he, along with the Rothschilds and the Weinsteins, now funds attempts to culturally subjugate the hacker community. You know that chart we look at above? They are desperately attempting to keep the political elements of computing subdued by Marxism because a rebalance of power according to value would be against their interests and for yours. Most of these antifa types are paid shills, but a few of you are honestly fooled. You are being cuckolded, advocating directly against the interests of your own community and for the interests of predatory billionaires.
When you push leftwards, you are screaming for more corpses of men like Ian, Lance, and Aaron.

There's a table that all those other people eat at, and they don't want to clear a seat for your tribe at it. I learned something in prison: if someone takes your seat at a table, you pick something up and bash them with it repeatedly. Ian's death was a result of an act of disrespect and violence, an extension of continual disrespect that has emanated from the power establishment for decades now. It's going to continue until we respond in kind.

Embrace the will to power. We can seize it. It won't take very many of us.

http://weev.livejournal.com/415737.html




San Francisco Police Brutality
Death of Ian Murdock
Link | Post

---------------------- ꕤ ----------------------

COMMENT

Wow, that was interesting reading.

Will need to do some look ups, as I'm not familiar with those mentioned in the article (although I know 'Aaron' would be Aaron Schwartz).

Might leave the look-ups for later, as I'm struggling (headache).
The prison canteen tray imagery was funny.  Not sure if he meant it to be, as he really did do prison.


September 15, 2015

Latest CyberSec News & Related

Article
SOURCE
as indicated





Universal Music
abusing the DMCA
ie #Copyright Act
rightsholders MUST consider FAIR USE
prior take-down issues
http://boingboing.net/2015/09/14/eff-scores-a-giant-victory-for.html


#India IT security
1.2 billion in 2016
http://www.consultancy.uk/news/2591/indian-IT-security-market-reaches-12-billion-next-year

#Microsoft
signs landmark agreement with #NATO
re govt #cybersecurity
/ solidification relationship
http://www.neowin.net/news/microsoft-signs-agreement-with-nato-to-bolster-government-cybersecurity

Intel in #cybersecurity - auto-mobiles
auto security board set up:
Automotive Security Review Board (ASRB)
Intel Security (formerly McAfee)
published a whitepaper
re automotive security best practices
http://forexreportdaily.com/2015/09/14/6873-intel-in-cyber-security-driving-seat-sets-up-connected-auto-security-board/


NSA Recruiting / Scholarships
USA Colleges
vie to entice w. NSA cyber program
scholarship stipulation
= NSA job on degree
http://fedscoop.com/colleges-vie-to-entice-students-with-nsa-cyber-program


USA + China
meet re #cybersecurity - White House
Kerry, Rice + Homeland Sec. Jeh Johnson
> comm. competition blocks

USA whining that the following
 stop US competing on level playing field in China:
  • fines
  • opaque regulatory system
http://www.lidtime.com/u-s-chinese-officials-meet-on-cyber-security-issues-white-house-5652/

University of Texas at San Antonio
grant puts city on centre #cybersecurity stage
emerging cybersecurity + tech hub
/ expressnews (subscipt)


#cybersecurity #hacker
Millennial Gen / Gen Y
born post 1980
social media over-sharing / lax security
http://www.afr.com/technology/a-third-of-millennials-warned-by-employers-over-social-media-posts-norton-20150914-gjlw1h

Cybersecurity Bill  |  CISA   |  USA
Cybersecurity Information Sharing Act (CISA)
Light on Security
legal immunity for sharing cyber-intel with govt
PRIVACY implications
/ poised to pass

http://foreignpolicy.com/2015/09/14/a-cybersecurity-bill-light-on-security-heavy-on-corporate-

Jeb Bush
wants USA Internet gov.
against transfer of  ICANN oversight to multistakeholders

Following Presidential candidates also get a mention re cybersec:
  • Rubio - Marco Rubio
  • Fiorina - Carly Fiorina
http://fedscoop.com/jeb-bush-unveils-cybersecurity-plan


Clinton appears to be 
the CYBERSEC & MILLENNIAL candidate

#Clinton2016
'Best Choice' Cybercrime
Wakefield Research poll - 42%
over half millennials Dems better
http://www.inc.com/will-yakowicz/poll-hillary-clinton-most-qualified-presidential-candidate-for-cyberattack.html


Hackers hit the Kremlin  #Russia
target: election commission website
sounds like DDoS
http://thehill.com/policy/cybersecurity/253609-hackers-hit-the-kremlin


#cybersecurity #banking #cloud
x4 US banks
agreement w/ regulators
re 'guaranteed data deletion' issues

Symphony
= service created thru consortium
of 14 financial instutions
  1. Goldman Sachs
  2. Deutsche Bank
  3. Credit Suisse
  4. Bank of New York Mellon
= guaranteed data deletion
/ hinder regulators + prosecutors to investigate misconduct?
Does use of Symphony re communications
= regulators avoidance?
[ I'm not clear on that]

http://www.stockhouse.com/news/newswire/2015/09/14/four-us-banks-reach-agreement-with-regulators-on-guaranteed-data-deletion-issues

#Russia
Yuri Ushakov
fmr career diplomat
fmr deputy Foreign Minister
PhD:  history
2008 appointment Putin deputy chief staff
foreign-policy + international economics
[various sources - incl. Foreign Policy]

#cybersecurity
DECEPTION SOFTWARE 
/ HONEYPOT SOFTWARE

Deception to Catch #hacker
fake network component, server or database
to study their behaviour

DECEPTION cybersecurity aims:
1. ID intruders / share info
2. drains hacker resources until aware duped
3. study hackers
Deception
has long been part of the art of war
WWII, USA & British armies
set up fake camps
to dupe Germans
/ Penny Crosman {cybersec}

Honeypot software
= fake system
= sits on network
= exposes fake or real services to the attacker

new gen. honeypot software
= called 'deception software'
centrally managed, integrated w/ other security software

deception software
popular with:  financial services

x4 layers  (ie "deception stack"):
  1. network
  2. endpoint
  3. application
  4. data

each layer of x4 deception software
= has deception capabilities

deception layers:
eg. fake credentials in browser caches
of decoy workstations, phony files & data sets.

deception layers:
eg. endpoint set up to look like it runs eg Windows,
when is a Linux machine.

deception layers:
eg. fake OS = deceive malware into attacking
vulnerabilities OS does not have.

deception strategy:
once intruder detected
/ continue to 'entertain'
*find out what intruder knows re system

decoy documents
eg fake 'new product designs'
= embedded w/ tracking element
= knowing when & where opened
deception software
hidden tech in documents
= beacon calling 'home'
= info re intruder

DECEPTION software providers:
  • Attivo Networks
  • TrapX Security
  • Allure Security Technology
  • CyberTrap
  • Cymmetria
  • ForeScout
  • GuardiCore
  • Hexis Cyber Solutions
  • LogRhythm
  • Percipient Networks
  • Rapid7
  • Shape Security
  • Specter
  • TopSpin Security

DECEPTION software LIMITATIONS
If the hacker:
1) obtained correct credentials re system
2) knows where to look
ie ... if not rummaging, knows where to go & where to get it, deception software ineffective
Deception software
= not foolproof
= but significantly raises odds of detection & lowers false positives

http://www.americanbanker.com/news/bank-technology/deception-may-be-the-best-way-to-catch-cybercriminals-1076667-1.html

#cybersecurity
US Dept Commerce
rethinking proposed rule controlling 
EXPORT of hacking TOOLS / intrusion software
b/c stifles research
source (subscription)
http://www.law360.com/articles/702478/commerce-to-revise-cyber-rule-said-to-hamper-research

#cybersecurity #hacker
Cisco routers vulnerable to new attack
attacks replace OS used in network Cisco equip.

Cisco router attacks
= x14 instances of router implants found in:
  • India
  • Mexico
  • Philippines
  • Ukraine
http://www.reuters.com/article/2015/09/15/us-cybersecurity-routers-cisco-systems-idUSKCN0RF0N420150915


Malvertising
#cybersecurity #hacker

Malvertising Campaign Rages Undetected For 3 Weeks
/ manipulate ad networks' chain of trust
Malvertising
= number of new tactics to make attackers harder to track down
eg use domain names registered years ago w/ BBB

#Hacker
= look like legit bus. using real-time bidding
= ads clean
= ads redirected to point for download malicious code

ads  thru
encrypted HTTPS channel
= lets third party directly serve up content
+ encrypt comm.
/ no inspect.

Malvertising
attackers used Google URL shortener in redirects
Malwarebytes + Google working to solve

Malvertising hits, incl: http://ebay.co.uk  http://drudgereport.com  http://answers.com

Malvertising
compromised various small ad networks
+ major ad networks, incl DoubleClick, AppNexus + ExoClick

Malvertising hits, adult, incl:
nuvid.com
upornia.com
eroprofile.com

very low-cost intro packages
= attacker opportunity for short campaigns w/ small investments
http://www.darkreading.com/attacks-breaches/malvertising-campaign-rages-undetected-for-3-weeks/d/d-id/1322169

#cybersecurity
National Cyber Security Hall of Fame
2015 INDUCTEES
Thu 29th Sept
x5 - listed
http://news.sys-con.com/node/3456101

#cybersecurity - REPORT - Insurance
PWC
Insurance 2020 & beyond: Reaping the dividends of cyber resilience
http://www.pwc.com/gx/en/industries/financial-services/insurance/publications/insurance-2020-cyber.html

#cybersecurity #insurance
market to reach $7.5 billion annual premiums by end 2020
& min.  $5 billion by 2018
insurance co's may MITIGATE risks by
partnering w/ technology co's
+ data sharing b/w insurance co's

Insurer mitigation also by:
conditional regular risk assessments
of client ops & required remedies re reviews
http://www.pymnts.com/in-depth/2015/cyber-insurance-market-to-thrive-triple-by-2020/

#military
DOD - Overhaul of Military Ground Systems
in favour of single UNIFIED system for satellite networks

Satellite networks
multiple siloed ground systems
aka “stove-piped”
=  inhibits security, resiliency, agility & affordability

stovepiped / single ununified systems
=  op systems each functioning w/ unique proprietary software from contractors

#military ground systems
- USG wants to move away from reliance original contractor
/ own tech baseline
/ free up competition

DOD overhaul aim:
  • *control interfaces + standards
  • *no limits interface / proprietary s/w
  • *no contractor control architecture

DOD overhaul of military ground systems goals
 *agility
 *automation
 *security
 *resilience
 Cost savings = inherent result

cybersecurity
= too many interfaces + incongruous software:
*multiple cyber attack surfaces
*must be defended individually
Enterprise Ground System (EGS)
/ DOD interested in using #cloud tech for EGS
/ type undecided
/ Airforce favours private (b/c physically reside w/in operation centres)
http://www.satellitetoday.com/regional/2015/09/14/dod-prepares-for-overhaul-of-military-ground-systems/


NYSE
STUDY by Veracode
2015 Survey
#cybersecurity in the Boardroom - 8pg PDF
https://www.veracode.com/sites/default/files/Resources/Whitepapers/cybersecurity-in-the-boardroom-whitepaper.pdf

Associated article:
Boardrooms and cyber security http://thetandd.com/news/boardrooms-and-cyber-security/article_5edccb5b-aed1-5e88-b2e4-0dd396d5540d.html


Twitter
hired a trio of firms
/ first outside lobbyists to work DC
spent $160K / first-half
http://www.odwyerpr.com/story/public/5332/2015-09-14/twitter-enters-dc-lobbying-fray.html


quantum encryption
quantum random number 
generator | Entropy Engine
/ 200 million random Nos.
http://www.santafenewmexican.com/news/health_and_science/science-on-the-hill-for-cybersecurity-in-quantum-encryption-we/article_2ce4c8bb-78fa-5dbc-826f-ffdd33501ae3.html

WEBINAR - cybersecurity
Former NSA Tech. Dir.
Jim Penrose
cyber ops expert
subtle traces compromise detection
http://www.bankinfosecurity.com/webinars/view-from-inside-intelligence-driven-approaches-to-cyber-detection-w-764

#Germany #cybersecurity
new IT Security Law
July 24, 2015
foresees admin fines
4-yr evaluation
*overview & links
http://www.natlawreview.com/article/what-you-need-to-know-about-germany-s-cybersecurity-law

#cybersecurity #hacker
9 FBI Warnings
/ risks posed by Internet of Things ('IoT')
x10 device examples
http://www.defenseone.com/threats/2015/09/fbi-department-homeland-security-warnings-internet-connected-everyday-objects/120905/

IronNet
fmr  NSA Director Keith Alexander
raised $7.5 million in equity
re IronNet #Cybersecurity
pt  $25-m Trident Capital financing

IronNet Cybersecurity
funds to go to:
*cybersecurity products
*building the company’s workforce
http://www.bizjournals.com/baltimore/blog/cyberbizblog/2015/09/keith-alexander-led-ironnet-cybersecurity-raises-7.html

#cybersecurity
digital tax fraud 
skyrocketed over last year
/ data breaches
PROPOSED bill re notices ID theft

almost half USA states
= reported spikes in electronic filing fraud
= Minnesota stopped accepting some electronic returns

http://thehill.com/policy/cybersecurity/253542-senate-committee-will-mark-up-digital-tax-fraud-bill


#cybersecurity
new chip developed by Xerox
= self-destruct on command
Gorilla Glass / shattering chip

Potential use:   storage device for encryption keys

https://www.siliconrepublic.com/enterprise/2015/09/14/self-destructing-chip-xerox

Korean-based SK Telecom
+ Greenville USA co.
to develop vehicle cybersecurity
/  Quantum Cryptography

... securely distributes a secret key to legitimate parties. Here, a key is a table of random numbers shared by legitimate users in such a way that the information is known only to them, and secure means secure against any possible eavesdropping, which is the highest level of security. The system is expected to enhance security of critical network infrastructure.

Currently, most systems, including the connected vehicle ecosystems, use software-based pseudo-random number generators for encryption, meaning that they can fall vulnerable to hackers who decrypt the sequence of digits. Once developed for commercial use, SK Telecom’s technology will eliminate such concerns for security as it generates true random numbers based on hardware.
http://gsabusiness.com/news/55654-greenville-center-korean-firm-to-develop-vehicle-cybersecurity

#cybersecurity
E-ZPass
vulnerable to hackers, ID thieves + govt spying
/ not using encryption
E‑ZPass
= electronic toll-collection system
=  tolled roads, bridges, & tunnels USA
http://www.whdh.com/story/30022568/report-e-zpass-vulnerable-to-hackers-identify-thieves

#SouthAfrica #law
proposed bill too broad
consequences beyond remit
/ state cyberwarfare
/ warrantless seizure

#SouthAfrica
/  penalties - to 25 years in prison
/  has until Nov 30 to submit comment on proposed bill.

http://www.zdnet.com/article/south-africa-gets-first-look-at-cybercrime-bill-that-comes-with-25-year-jail-terms/

#Tor
.onion domain
= formal recognition granted
security certificates available to site admins
http://www.cbronline.com/news/cybersecurity/business/regulators-give-tors-onion-domain-name-special-use-status-4669709

USA Dept Energy
DOE REPORT linked
US #Energy Tech
Exports
= cybersecurity risks - b/c rely on digital tech
http://www.theepochtimes.com/n3/1751096-global-energy-growth-could-disrupt-americas-grid-security-doe-report-says/

---------------------- ꕤ ----------------------
COMMENT

Bunch of random stuff I looked at.

It all seemed very exciting ... at the time.  Now, I'm not so sure.  lol

The onion domain news and the self-destructing chip is exciting, I guess.

I'm no techie, so the 'internet of things' doesn't bother me.  I like everything manual, if I can help it.  lol

Twitter hiring Washington lobbyists is kind of exciting.  Wonder why?

The US military proposed overhaul of ground satellite communications (if I understand correctly), is pretty cool.

Surprise that it has taken them until 2015 to come up with those ideas, when they're in the business and should know what they're doing when it comes to multiple contracts and software applications etc.

It doesn't sound too efficient at the DOD.

Digital tax fraud sounds boring.  I don't even know what the point of it is.  lol  People pretend to be someone else ... but then what?

Oh, the best news it the Ninth Circuit Court ruling regarding copyright!

Take that, Universal Music a#@!@#s!


August 26, 2015

Intel & Surveillance News



US vows to help #Philippines in intel gathering
/ oldest US ally in Asia
no specifics re support

see Territorial dispute
South China Sea #China claim
Philippines, Vietnam, Malaysia, Brunei + Taiwan have overlapping claims
http://www.philstar.com/headlines/2015/08/26/1492532/us-vows-help-philippines-intel-gathering


MacDonald, Dettwiler & Associates Lttd /MDA
CA$3.9 million contract with National Geospatial-Intelligence Agency
http://softwaredev.itbusinessnet.com/article/MDA-to-provide-operational-enhancements-for-information-solution-to-support-flight-operations-at-airports-4038599
other
MacDonald, Dettwiler & Associates Lttd /MDA 
https://en.wikipedia.org/wiki/MacDonald,_Dettwiler_and_Associates

National Geospatial-Intelligence Agency
combat support agency, under USA DOD
& intelligence agency US intel comm
GEOINT
NGA credited by WH military officials
for providing info re Op Neptune's Spear 2011 / bin Laden
#Serbia
National Geospatial-Intelligence Agency
cause of #NATO Bombing of Chinese embassy in Belgrade
/ CIA argues otherwise.
https://en.wikipedia.org/wiki/National_Geospatial-Intelligence_Agency

USA military - DRONES
Spent last decade amassing over 7,000 surveillance drones
/ some size of birds / others as big as as jetliners

Drone technology
= USA spy planes will be phased out starting in 2018

Without US ground troops in Iraq and Syria,
#USA commanders rely on airborne #surveillance more than ever before
Iraq war
- USA had plenty fighter pilots
- low on aerial surveillance re what happening ground
/ long distance pilots on amphetamine paste

Over decades, U-2 spy plane
claimed lives of 30 pilots
/ many have nearly crashed after suffering decompression sickness

Russia
U-2 spy plane
shot down over Soviet Union in 1960
/ capture of pilot Francis Gary Powers
/ traded for Soviet spy 1962

It is after satellites could be relied upon for remote control that drones could be used for surveillance.

US Airforce trained:
  • x18 U-2 pilots trained 2014
  • x57 ground-based pilots for Global Hawk (drone)
[ looks like drones are the go ]
DRONES
= cost about half what the U-2 spy planes cost per flying hour to operate
Global Hawk
= drone

http://www.latimes.com/nation/great-reads/la-na-c1-spy-plane-pilot-20150826-story.html

Potomac Advocates (PRASAM)
PRASAM, intel community's 'official' lobbyist
grabbed lion’s share of USG lobbying 4 intel community
/subsription
http://www.intelligenceonline.com/government-intelligence/due-diligence/2015/08/26/prasam-intelligence-community-s--official--lobbyist,108088706-ART

More

Potomac Advocates

http://www.opensecrets.org/lobby/firmsum.php?id=D000036775

Kratos Defense & Security Solutions, Inc
provides war fighter solutions and security related services
engineering, Information Technology services and war fighter solutions primarily for US National Security priorities

services include command, control, communications, computing, combat systems, intelligence, surveillance and reconnaissance (c5ISR), weapon systems lifecycle support, military weapon range and technical services, network engineering services, advanced information technology services, security and surveillance systems, and critical infrastructure design and integration services.
http://www.americantradejournal.com/kratos-defense-security-solutions-inc-short-interest-update-2/657949/


#Canada Surveillance
Police surveillance camera goes up in East Vancouver neighbourhood
/ gang violence issue
http://www.news1130.com/2015/08/25/police-surveillance-camera-goes-up-in-vancouver-neighbourhood/


#Surveillance
Windows 10 heralds a future in which the cloud rules and computers snitch on us by default

default / automatic sharing of data the new normal — from your voice & typing patterns to unique machine ID s/ track & target

#surveillance
By default, users of Mac OSX & Ubuntu Linux
transmit local search terms to respective companies + third parties
http://america.aljazeera.com/opinions/2015/8/when-surveillance-is-a-feature-not-a-bug.html

#AmericanAggression
masked as deterrence to 'Russian aggression'
USA send F-22 Raptors to Europe
European Reassurance Initiative
$985 million in overseas contingency operations USA funding - 2015 current fiscal year.
http://www.ainonline.com/aviation-news/defense/2015-08-25/us-will-send-f-22s-europe-bolster-allies-deter-russia


Understanding Indications & Warning Efforts Of US Ballistic Missile Defence – Analysis
http://www.eurasiareview.com/26082015-understanding-indications-and-warning-efforts-of-us-ballistic-missile-defense-analysis/

Surveillance / Militarised Police
#Baltimore police
Coming Storm 'Stingray' Surveillance by Police
http://www.citylab.com/crime/2015/08/youre-going-to-hear-a-lot-more-about-police-use-of-stingray/402283/

USA
Cybersecurity Information Sharing Act | CISA
concerns re proposed Cybersecurity Information Sharing Act
ie - nature and volume of private data about users being funneled to the government (and intelligence agencies) by companies who opt to participate in the information sharing scheme contemplated by the law
https://www.justsecurity.org/25475/cisa-surveillance-law-xss-attack/

USA - Surveillance Act (FISA)
electronic surveillance under Foreign Intelligence Surveillance Act (FISA)
fed appeals court upheld sentence
http://www.startribune.com/federal-appeals-court-upholds-women-s-prison-sentences-in-terror-case/322843851/


Military Drones Market to Reach $11 Billion by 2021 From $3 Billion in 2014
http://www.aviationpros.com/news/12106991/military-drones-market-to-reach-11-billion-by-2021-from-3-billion-in-2014

Ghostery privacy extension / Ghostrank
Ghostery privacy extension
http://www.extremetech.com/internet/212476-is-it-safe-to-use-the-ghostery-privacy-extension

---------------------- ꕤ  ----------------------
COMMENT


Random surveillance articles.  Bit of a mixed bag that's thrown up some military stuff.  Mostly just skimmed.

The ballistic missiles article could be interesting, as it's a bit hard to apply lessons of history to present day strategy, without knowing anything about today's military capabilities. 

That might be a reading list article.  Not sure I'll get there.  Swamped with all the earmarked stuff I think might be a good read.  Not enough time in the day for all this stuff.  lol

The US proposal for companies to share info with government and spy agencies is about as totalitarian as it gets.


October 07, 2014

US - War On Internet

USA - War on Internet

Legislative Push


#US lobbying for #cybersecurity laws post JPMorgan hack >> makes you wonder who did the hacking lol / tinyurl.com/kxympnv / see CISA

#USA -- govt trying to pass Cyber Information Sharing Act (CISA) legislation / more #surveillance via sharing - tinyurl.com/kxympnv

Legislators using the JP Morgan hack to "spread fear in support of their legislation of choice" >> Take Russians didn't do that hack then.

#USA >> CISA >> sharing info between government & technology & manufacturing companies! Wow, big #PoliceState >> tinyurl.com/mj5w48w

#USA - The Stop Online Piracy Act (SOPA) - attack on FREE SPEECH & INNOVATION - unprecedented internet CENSORSHIP- on hold?

>> Who supports this? Big BUSINESS, Hollywood, greedy corporate-puppet entertainers


PIPA - Protect IP Act (Attack Internet Act)>rewrite rejected COICA & SOPA>at stake: freedom of speech, innovation& Internet integrity #USA

>> "constitutionally unsound" >>> en.wikipedia.org/wiki/PROTECT_I

>>> status: postponed 2012 -- tinyurl.com/otwmoj4



FBI - Media Push

FBI director James Comey lobbying for corporate US: China is waging aggressive cyber-war against US / costs US business billions p.a.

>> LMAO ... he's done 60 Minutes program!! >>> FBI exploits hackers to do their hacking. Trust him?

Hey, Comey -- US has been hacking into the WORLD'S info, spying on govts, heads of state & engaged in CORPORATE spying!!

>>> What's the bet the JPMorgan hack was orchestrated by the lobbyists for depriving America of liberty?

---------------------------------------

COMMENT


Judging by the above, in the US there's a constant push to pass legislation to restrict the internet.  

We're warned this will result in: 
  • stifling of free speech;
  • stifling of innovation;
  • unprecedented censorship; and
  • undermining the integrity of the internet

So far, it looks like legislation has been shelved -- but it always rears its ugly head again in some form or another.

Of course, any time there's a hack, 'the chorus' (I like that, thanks Greepeace) begins to wail about the need for legislation.

What's interesting, is that they've got the FBI dude pimped out on 60 Minutes and in other media, spooking the public about everything under the sun:

FBI dir. Comey - is tasked w. whipping up the fear in US >Chinese hackers, Khorosan, ph encryption, ISIS, online terror recruiting!!

A concerted government push to control the internet and beyond?

Seeing conspiracy in everything these days, I'm also seriously wondering about the legitimacy of the JPMorgan hack where no money was taken and nothing was damaged.
NOTE:  The above affects *everybody* -- not just the US.

-------------------- 

Combating Online Infringement & Counterfeits Act (COICA)






August 07, 2014

US PASSING SNEAKY CYBER SECURITY LAWS TO GIVE NSA MORE POWER ... & NSA STAFF GO PRIVATE



Ex-NSA chief defends his profitable cyber-security business
Published time: August 06, 2014 10:05
Edited time: August 06, 2014 12:43


As the marriage between surveillance and non-governmental cyber-security firms comes under the spotlight, former NSA chief Keith Alexander fends off criticism of his new lucrative business, which he claims will revolutionize cyber-security.

Alexander, who recently announced work on a number of “game-changing” patents to propel cyber security forward, sees nothing improper in the practice, as he revealed in a Tuesday interview with the AP.

The former NSA head also stands to answer why he failed to share some of his groundbreaking ideas in his time as a government employee. But for Alexander, this seems to be a straightforward pursuit of doing business and making a living.
...

The business was rumored to be bringing him a cool $1 million a month, but Alexander has brushed off the figure as inflated.

Explaining further why IronNet Cybersecurity is different to how the government uses information, Alexander said that the NSA only had authority to defend secret government networks, whereas his work will be focused on the private sector.

The tools and technical reach are at this point unknown, but "If it actually works, this will be worth a lot," he said of his new “behavioral model,” which purports to use sophisticated techniques to catch unconventional hackers.

Critics see a number of issues with Alexander’s new venture, IronNet Cybersecurity. Apart from the generally disliked idea of government officials cashing in on sensitive information learned and tools retained from public service, people worry that any type of access to sensitive information by private firms using high-tech tools is not good. Only recently there was a private sector initiative to pool top officials from eight US government agencies to create a council that would defend the banking industry from cyber-attacks.

Indeed, the Securities Industry and Financial Markets Association (SIMFA), the Wall Street group that proposed the council, has retained Alexander’s services. That agreement and others have raised concerns among those who’ve said Alexander may be in the business of disclosing state secrets for any company with a budget big enough to afford his services[Conflict of interests? - May have moved on from public service, but does it form a 'conflict of interest' type of problem from mixing it up in the private sector?]

Last month, The Senate Select Committee on Intelligence voted overwhelmingly to approve the new controversial cyber security bill – the Cybersecurity Information Sharing Act (CISA), which SIMFA endorses. Privacy advocates are naturally opposed to the legislation, which lawmakers have been trying to push through for years. They believe that codifying a program to share digital data between the government and private sector would open the private sector up to sensitive information pertaining to millions of Americans.

One scornful comment illustrating this came from the World Socialist Website’s Thomas Gaist, who says that “CISA clears the way for virtually unrestrained information sharing between the US government and corporations.”

The criticism is not unique to rights groups – government officials occasionally also voice concern.

...
Although Alexander’s move into private business has caused concern in some circles, he is traveling an already paved road, being the latest in a line of government, intelligence and security officials who go on to private sector work after an illustrious government career. Some examples include the first secretary for homeland security, Tom Ridge – he now has his own firm; the second homeland security secretary, Michael Chertoff, also has one; just as the NSA’s previous director, Michael Hayden, who now works with Chertoff.
...




The thing that struck me most in this article is the cyber security bill was voted for approval by the 'Senate Select Committee on Intelligence'.

As Thomas Gaist says, the Cyber Security Information Sharing Act (CSIS) exposes the public to 'unrestrained informatin sharing between the US government and corporations'.  That's creepy.

New to looking at politics and unfamiliar with US politics, but I believe the next step is back to the House of Representatives and to Senate, before a finally rubber stamping by Obama and bringing the proposed legislation into being as law.

...........................................................................
Discussion Draft of CSIS proposed Bill - here.

Wikipedia - CSIS proposed Bill - here.

The Guardian - says Senate giving more powers to NSA in secret - here.

Wikipedia on, former NSA head, Keith Alexander - here.  Military background (now retired).  Introduced the 'collect it all' approach:
believed by Glenn Greenwald of The Guardian to be the model for the comprehensive world-wide mass archiving of communications which NSA had become engaged in by 2013.

Note also:  'stockpiling of zero-days'. Not really sure what this means specifically, but it relates to exploiting unpatched (and unknown) software vulnerabilities ... for spying.

Wired reported:

“In almost all instances, for widely used code, it is in the national interest to eliminate software vulnerabilities rather than to use them for US intelligence collection,” the report reads. “Eliminating the vulnerabilities–’patching’ them–strengthens the security of U.S. Government, critical infrastructure, and other computer systems.”

Obama’s response to his advisers’ review, however, added a major loophole, allowing any zero-day vulnerabilities to be exploited if they have a “clear national security or law enforcement” application.


.. read the article - here - if interested.

Hey, following the Wired link, found this:


This, of course, gives the government wide latitude to remain silent on critical flaws like the recent Heartbleed vulnerability if the NSA, FBI, or other government agencies can justify their exploitation.

A so-called zero-day vulnerability is one that’s unknown to the software vendor and for which no patch therefore exists. The U.S. has long wielded zero-day exploits for espionage and sabotage purposes, but has never publicly stated its policy on their use. Stuxnet, a digital weapon used by the U.S. and Israel to attack Iran’s uranium enrichment program, used five zero-day exploits to spread.

The stuff about US and Israel hacking(?) Iran is pretty interesting.  Why doesn't Iran hack right back?

Anyway, I'm not sure what the fuss is about because it stands to reason that they'd use ANYTHING they can to their advantage.  Why is this surprising?