ꕤArticle SOURCE as indicated Universal Music of 14 financial instutions
/ hinder regulators + prosecutors to investigate misconduct? ie ... if not rummaging, knows where to go & where to get it, deception software ineffective Deception software
---------------------- ꕤ ----------------------
COMMENT Bunch of random stuff I looked at.
ꕤ
|
TOKYO MASTER BANNER
MINISTRY OF TOKYO
|
Showing posts with label Keith Alexander. Show all posts
Showing posts with label Keith Alexander. Show all posts
September 15, 2015
Latest CyberSec News & Related
July 24, 2015
Bill Blunden - 'Mass surveillance is all about money and power'
SOURCE Mass surveillance is all about money and power “We are under pressure from the Treasury to justify our budget; and commercial espionage is one way of making a direct contribution to the nation’s balance of payments” -Sir Colin McColl, former MI6 Chief.
---------------------- COMMENT
And it's all for the sake of 'powerful corporate interests' that control the state. |
August 07, 2014
US PASSING SNEAKY CYBER SECURITY LAWS TO GIVE NSA MORE POWER ... & NSA STAFF GO PRIVATE
Ex-NSA chief defends his profitable cyber-security business
Published time: August 06, 2014 10:05
Edited time: August 06, 2014 12:43
|
The thing that struck me most in this article is the cyber security bill was voted for approval by the 'Senate Select Committee on Intelligence'.
As Thomas Gaist says, the Cyber Security Information Sharing Act (CSIS) exposes the public to 'unrestrained informatin sharing between the US government and corporations'. That's creepy.
New to looking at politics and unfamiliar with US politics, but I believe the next step is back to the House of Representatives and to Senate, before a finally rubber stamping by Obama and bringing the proposed legislation into being as law.
...........................................................................
Discussion Draft of CSIS proposed Bill - here.
Wikipedia - CSIS proposed Bill - here.
The Guardian - says Senate giving more powers to NSA in secret - here.
Wikipedia on, former NSA head, Keith Alexander - here. Military background (now retired). Introduced the 'collect it all' approach:
believed by Glenn Greenwald of The Guardian to be the model for the comprehensive world-wide mass archiving of communications which NSA had become engaged in by 2013.
Note also: 'stockpiling of zero-days'. Not really sure what this means specifically, but it relates to exploiting unpatched (and unknown) software vulnerabilities ... for spying.
Wired reported:
Obama’s response to his advisers’ review, however, added a major loophole, allowing any zero-day vulnerabilities to be exploited if they have a “clear national security or law enforcement” application.
.. read the article - here - if interested.
Hey, following the Wired link, found this:
This, of course, gives the government wide latitude to remain silent on critical flaws like the recent Heartbleed vulnerability if the NSA, FBI, or other government agencies can justify their exploitation.
A so-called zero-day vulnerability is one that’s unknown to the software vendor and for which no patch therefore exists. The U.S. has long wielded zero-day exploits for espionage and sabotage purposes, but has never publicly stated its policy on their use. Stuxnet, a digital weapon used by the U.S. and Israel to attack Iran’s uranium enrichment program, used five zero-day exploits to spread.
The stuff about US and Israel hacking(?) Iran is pretty interesting. Why doesn't Iran hack right back?
Anyway, I'm not sure what the fuss is about because it stands to reason that they'd use ANYTHING they can to their advantage. Why is this surprising?
Subscribe to:
Posts (Atom)