Jump to content

Rate this topic

Recommended Posts

POST 1

 

(salam)

 

I has been about a year since Ed Snowden's Documents -allegedly 1.7 million of them- has been moving into the public domain.

 

What portion so far has had the most significant ?

 

For Me: That the Electronic Warfare applications have invaded nearly every transistorized system in the World.

 

For Me, this is insane. :realangery:  The "people" that unthinkingly dreamed this up are the ones who belong in Gitmo.!

 

Consider the access developed just on innocent people's cell phones.  Turn "on" when they wish and listen in (this was a 60s' capability with landlines; dial in and the rotary phone would not ring); take or recover pictures; track and locate; ...

 

Also consider workstations. The "evil ears"/"evil eyes" are more capable than StuxNet ever was.  For example, "floating gate attacks" where the charge storage is manipulated in such a way as to install undetectable Trojans. Remember years ago when BotNets overloaded your hard drive? Similarly, this can be done in a controlled, calculated way -like with the erase/dump functions-  to change the dopant polarity to install Trojans and other espionage systems. Gate manipulation is also a function of EW radar deception, for example, as when the intell flight "walked" their location over and onto Korean Air 007. So this is not a novel idea.

It is not just "Becker Attacks", but also using the target computer's random number generator in several variations to insert stuff.

 

You see where I am going with this. (I hope.) That these "masters of the sewer system" have created an electronic World open to everybody, essentially. Consider if you work for Boeing, GE Aviation, General Dynamics...even a listed internet company like Yahoo, and now everything done on CAD, emailed, calculated, whatever is now the same as posting it on the front door in large print. :mad: So, as an example, you are calculating centers-of-gravity for a series of parts design to put in your jet engine, and some foreign country is sucking in this data, they can determine what part-cluster, type of equipment, material composition, etc that is being worked on- in a continuous stream of fragmentary information.  Plus, they will also have a data library available to save themselves hundreds of man-days in research in case they wish to pursue the same/similar/improved project.

 

What _____ damned s.o.b.-ez did not see this coming? They are supposed to be the national security specialists.! :realangery:  And not one of these jerks could figure out that if they themselves could do this, other people could too.?????

 

So the only recourse these companies now have is to shut down their computers if they wish to have any security and go back to drafting boards, but fortunately, they don't need sliderules as they can still use unconnected pocket calculators.

 

Heck (to write reasonably politely), it was revealed last year that NSA et alia were hacking-in to the financial statements of companies. Why???? Can you say, "de facto insider trading". I bet the in-the-know/in-the-loop people made fortunes just on puts and calls, not counting shorting, warrants, etc.

 

No wonder Putin had every computer yanked out his building and typewriters immediately brought in -- the same day as he was informed.

 

These are the people that belong in Gitmo --for being so ____ damned stupid.!  And for most likely profiting from their positions --or taking stock in their positions.

 

Here are some sites you might like:

 

Edward-Snowden.net

 

darkread.com

 

securityaffairs.com

 

bleepingcomputer.com

 

You can also google these news items:

--"NSA intercepts computer deliveries to plant spyware"

 

--"An Undetectable Hardware Trojan is Reality"

 

--and someone recommended COTTONMOUTH, but I haven't looked at it.

 


.

 

 

Post 2 I will do later on another theme.

Share this post


Link to post
Share on other sites

Well, losing CAD capability would put me at an advantage over younger engineers in my workplace. I never hand drafted on the job, but I did learn how. They don't teach it anymore.

But I think a lot of work can be done offline, maybe even on older machines/software (which would put me at a dramatic advantage) and life will go on. Frankly, I expect most companies to ignore the data insecurity and continue to pretend projects are confidential.

Share this post


Link to post
Share on other sites

knotme:, (salam)

 

I was so trained too.

 

A few years ago I corner taped a paper, used a home-made "T" (I was in a foreign country and had no resources), and people asked me "what are you doing?"

 

:lol:

 

I saw a weatherman last month talk about how astonished these 6th graders he visited were when he wrote in cursive.

 

When I taught, I had a rule with the students: Get caught with a calculator and you fail for the day. An automatic "F".

The reason is, if you don't know how to do it by hand, then you do not know what the machine is telling you -especially if the machine errs.

Share this post


Link to post
Share on other sites

Friday the 13th  :squeez:  of June, 2014:

 

(salam)

 

The AP is carrying a story by Jack Gillum and Eileen Sullivan, "US pushes local cops to stay mum on surveillance", which reveals that the Obamites want the cops not to talk about all the enhanced, in-the-home, surveillance they now have.

 

In a pertinent article with this is, "How Real-Time Crime Center Technologies are Force Multipliers", correctionsone.com, 09June14 by Mike Fox.

 

"force multipliers" is a military idiom beginning from the 1970s.    This is a read, also.

 

While looking up the new report, "Inventing Terrorists:..." about LaWarfare -which is recommended for download- I found this:

 

@ electronicIntifada,  "Young Muslims face Sentencing..." by Maureen Clare Murphy, 11Jan12, were these young guys convicted of terrorism related charges for traveling to Israel :lol: and Jordan.

They were 'sponsors of terrorism' for an "unspecified group of terrorists in an unspecified place at an unspecified time".  :sick:

 

One of the FBI's testilying statements was that the audio recording where you hear "going to the beach" it means "violent jihad". [isn't 'The Beach' a waterpark in Ohio?]

The article also has: 'preemptive prosecution is defined as "law enforcement strategy, adopted after 9/11, to target and prosecute individuals or organizations whose beliefs, ideology or religious affiliation raises security concerns for the gov't" ' [boldface added -ed]

 

Would this not include Obama? After all, as well documented, he went to that crazy-hate church in Chicago for 23-24 years. If you remember, where white folks are damned, etc.  Then of course, is Obama's recent "Honorary Aryan" status after backing neo-Nazis and Reich Sektor violence in Ukraine. Should not this guy be arrested?

 

Meanwhile, comparative news stories today, show what really concerns the BrainWashington nutcases:

 

oldie: "Holder Convicts Switzerland", Wall Street Journal, 21May14, because Swiss gov't regulations protect Swiss banks.

-and-

"Black Flags Over Mosul -OPED", 13 June14, by Mike Whitney in EurAsia Review, opined that if these US & Consortium backed ISIS nuts start blowing up the oil pipelines, "...it's Game-Over USA", because the oil futures market will see this as a create-a-panic-button to bid up the price of oil and gasoline, although World supplies are in surplus -ed.

 

So back to the "black flags", I guess the omnipotent NSA is on this like they are the drug trade in Afghanistan. :lol:

Edited by hasanhh

Share this post


Link to post
Share on other sites

29June14:

 

"New NSA Chief Calls Damage From Snowden Leaks Manageable", by David Sanger, New York Times, 29June14

 

Mostly a puff piece, but did say the new NSA Director, Adm. Micheal Rogers, said the priority is that new Snowden-type leaks be stopped/prevented.

 

The article also says that none of the stuff Snowden took was encrypted.  :lol:

Share this post


Link to post
Share on other sites

02July2014:  NSA given righteous re-approval, as writ in several articles, although CNN is taking a different  emphasis --unresolved privacy issues.

 

So while the nutworks and media are filled with "threats" from overseas ISIS/ISIL, al-Qaeda, etc., we are again "reassured" by l3rainWashingTown that PRISM and other peeping-Tom tactics by the gov't 'stop terrorism'. :lol:

Share this post


Link to post
Share on other sites

(salam)

 

06July14: New York Daily News, citing a VVashPo article, "Nine out of lO users in NSA-intercepted conversations are not original targets", SunO6Julyl4, by Larry McShane

 

"...every time a targeted individual entered an online chat room the NSA snapped up the identities and conversations of everyone who posted or lurked on the site" (underline added-ed.)

 

external search point: Xkeyscore program

Share this post


Link to post
Share on other sites

09July14: Saw the film, Phreaked Out which is a two part -about 25 minute total- presentation on vulnerabilities to Society from being hacked. The lst part is about an uncorrected fault in the LA traffic Control System. The 2nd part is about car-hacking.

Share this post


Link to post
Share on other sites

(salam)

 

24July14: "Is the VVhite House vvebsite tracking your data?" 'new canvas fingerprinting difficult to track', by Miranda Green, decoded.com, 24July2014

 

Yep, like the NSA and despite the VVhite House'z own "privacy policy", your activities from visiting your dot-gov is being profiled with canvas fingerprinting -a very difficult to detect spyware.

 

-4 suggestions from the article;

---disable your GPS frequently and check frquently

---keep checking all your settings "they could change without warning"

---if you at an event, post photos or other info later so people do not know you are not at home as burglars track you.

---others you tag may not have the same security sensitivity. encourage them and assume they are wide-open.

Share this post


Link to post
Share on other sites

(salam)

 

from The Intercept, "Barak Obama's Secret Terrorist-Tracking System, by the Numbers" by Jeremy Scahill, 05Aug14 1245hrs

 

--a listing of the numbers of people categorized by Big Mother Gov't in Big Mother's "electronic concentration camp"

 

--one number, on the No-Fly List: 47,000 people

 

--hundreds of thousands of "terrorists

 

--quotes an FBI agent as saying "if everything is terrorism, then nothing is"

 

Opine, to use an old quip, "Everything causes Cancer, Everyone is a Terrorist"

Share this post


Link to post
Share on other sites

(salam)

 

DW.de "Binney: The NSA Main Motives: Power and Money"

 

-an interview with former Technical Director of NSA who retired in October 2001 after 30 years service and became a critic of the agency.

 

--said, NDAA Sec 1201 reads "exactly" like the Nazi Special Order 48 in 1933 [aka "Riechstag Fire Decree"]

 

--said, Section 215 of Patriot Act, Section 702 of FISA Amendment Act, and Executive Order 12333 specify that NSA is to find terrorism and int'l dope smuggling

 

--said, after 13 years, they have "found" or accomplished "nothing"; NSA is "totalitarian"

 

--Binney has been testifying in Germany (as a news story alleging that German Intell hacked Hillary Clinton's phone)

 

Opine: As we know from earlier this past Spring, NSA had total coverage of Afghanistan, but could find one drug smuggler, and as news crews have filmed, Taliban using cell phones, does not seem have contributed to the protection of troops.

Neither can they protect the public from foreign Internet theft, like the 1+ Billion stolen IDs and passwords this Summer, or the Community Health theft of 4+Million patients this week...ad nauseum...

We Do Not Need This Money-Pit

 

--we could put the money into medical research.

Edited by hasanhh

Share this post


Link to post
Share on other sites

(salam)

 

Despite the article's title and primary subject, the article describes an app used to track subjective identifiers.

 

WKUHerald (Western Kentucky University) 22Sept14, "Ebola app tracks virus using Twitter", by Aaron Mudd

 

----- "The app is a part of (Armin) Smailhodzic's graduate research in the Homeland Security Sciences masters program, which includes using Twitter to track trends."

 

--- (The Software used, name and owner not named) "If it's just adapted a little it can track anything, anywhere', he said."

 

- Has applied for funding support from the Gates Foundation

 

-In this application, it tracks people in West Africa and their Tweets to track/map the progress and locations of Ebola.

Share this post


Link to post
Share on other sites

(salam)

 

The Atlantic, 23Oct14 1422EDT "Where is the Investigation Into Financial Corruption at the NSA?"

subtitle:   "Suspicious business dealings by several high-ranking officials easily warrant an inquiry. Does anyone in Congress care enough to make it happen?"

by Conor Friedersdorf

 

--singles out frmr Gen.Keith Alexander --who Initially tried to sell his "expertise" for $1million per month; and alleges that in the short time since his retirement, he and a partner have developed new insights into stopping hackers, thieves and spies --and as the article asks, was this, if done, done on "the public dime"?

 

--forget Congress, they, like Alexander, have inside-invested into companies. Remember the Congress-Stock Revelations a couple years back?

 

-- NSA/DoD hand-out over $80 Billion in intell contracts last year.

Share this post


Link to post
Share on other sites

(salam)

 

28Oct14:

 

New York Times, 28Oct14, 1430EDT, "Tracking the Postal Surveillance System", by Ron Nixon (who discovered last year mail was being monitored by USPS)

 

---- despite minor catches like Shannon Richards who sent ricin through the mails, letter carriers have many required copying mail info before delivery.

--- USPS stalled and changed excuses on why they did not conform to FOIA requests.

--one excuse is "consultation"

-Opine question: why USPS carriers are asked to do this is a mystery as most mail surveillance is computerized under the FBI's MIT-C programs.

Share this post


Link to post
Share on other sites

(salam)

 

source: www.engadget.com/2014/11/13/stuxnet-worm-targeted-companies-first

 

"Stuxnet Worm entered IRAN's Nuclear Facilities through Hacked Suppliers", by J. Fingas

 

-----from a theme in the new book Countdown to Zero Day

 

---- the e-code "reached the Internet before it hit Natanz" (boldface in original -ed.)

 

--- NSA is known for "frequent use of malware against network administrators"

 

--- info based on "Karp" research (which is still continuing -ed.);

 

-- Stux has characteristics which show it has "American roots"

 

--  Ed. Note: as reported in a Stuxnet program last year or so, Stuxnet is a virus loose in the environment

Share this post


Link to post
Share on other sites

(salam)

 

Reuters, 23Nov14 1207EST; "Computer spying malware uncovered with 'stealth' features: Symantec"

------ Symantec does 'protective services' including Norten

 

----- "An advanced malicious software application has been uncovered that since 2008 was used to spy on private companies, gov'ts, research institutes and individuals in 10 countries..."

---- "...a 'nation state' was likely the developer..."

--- called "Regin" or "Backdoor"

 

The virus was used 2008 through 2011 and was restarted in 2013

 

The virus is tactically deployed in 5 stages/penetrations. Unless all 5 penetrations are detected, it is difficult to determine 'what the virus is doing'; so code line analysis is stymied.

 

-- 28% of targets are telecoms

 

Also:

Nightly Business Report, PBS, 24Nov14 telecast

 

In an interview with Eamon Javers, ( author of Broker, Trader, Lawyer, Spy: The Secret World of Corporate Espionage --ed.)  , said Russia and Saudia Arabia are the most noticeable targets, "but not China or the US".. Design to "get in and stay in systems".

"Yahoo Messenger" is a more prominent "vector".

Edited by hasanhh

Share this post


Link to post
Share on other sites

(salam)

 

"Back doors they opened for NGOs and ForOs"

 

In the continuing whirl of InterNet fiascoes, we have this from Reuters by Jim Finkle (Monday,01Dec14)

 

"Cyber ring stole secrets for gaming U.S. stock market: FireEye"

 

[Guess? I'd guess people in the NSA or corporate contractors, or both]

 

------ stealing corporate secrets:  Cybersecurity firm FireEye Inc, which disclosed the operation on Monday, said that since the middle of last year, the group has attacked email accounts at more than 100 firms, most of them pharmaceutical and healthcare companies."

 

---- "Victims also include firms in other sectors, as well as corporate advisors including investment bankers, attorneys and investor relation firms, according to FireEye."

 

--- "... targeted people with access to highly insider data..."

 

*** ""The hackers don't infect the PCs of their victims. Instead they steal passwords to email accounts, then use them to access those accounts via the InterNet, according to FireEye."

.     "They expand their networks by posing as users of compromised accounts, sending phishing emails to associates, ..."

 

-- These hackers remain unidentified "...because they hide their tracks using Tor, a service for making the location of Internet users anonymous."

 

- China is not a suspect "based on the content"

 

-possibly "the hackers were trained at Western investment banks, giving them the know-how to identify their targets and draft convincing phishing emails."  [ahhhhhh, Jackie]

 

 

As I've writ in this thread or the other, NSA and contractors have been going into corporate accounts for financial data. l suspect that the yakusa is fronting for people in the US again --since they operate as "facilitators" and were behind the bank problem a decade ago.

Edited by hasanhh

Share this post


Link to post
Share on other sites

(salam)

 

Corruption: ref to post 16 dated 24Oct14 we have:

 

1] theDailyBeast, 03Nov14, by Shane Harris; DARK MONEY: "NSA Chief Bet Money on AT&T as It Spied on You"

------ about Gen. Keith Alexander, former Director NSA, betting "tens of thousands of dollars"

---- a good read discussing this summation in a little detail and nuance

 

2] :yaali: the guardian.com, 01Dec14, 1326EST, "Edward Snowden wins Swedish human rights award for NSA revelations", by Ewen MacAskill

------ to "several standing ovations" in "an emotional ceremony"

----- the Right Livelihood award was established in 1980 by philanthropist Jacob von Uexkull (2nd "u" is umlauted)

 

3] :yaali: theguardian.com, 11Oct14, "Second leaker in US intelligence says Glenn Greenwald", by Ewen MacAskill

------ :Hijabi: the "number of people on the US gov't watchlist of potential terrorists or suspects": 1.2 million  :!!!:

 

4] Defenseone.com 12Nov14 by Patrick Tucker, "Public Increasingly Wary of the NSA, Poll Finds",

------ During Senate confirmation hearings, Adm. Micheal Rogers, now commander CyberCommand and D-NSA, said his job included "to change public attitudes towards NSA activities"

 

----- but with a steady increasing distrust, "very concerned" is now at 37% in a Pew Poll

 

---- "privacy sensitivity" is increasing^

Share this post


Link to post
Share on other sites

(salam)

 

02Dec14 DeutscheWelle -Documentaries & Reports

 

Preface: In ancient Rome, a persistent question was, "Who guards the Guards?"

Note: Ed Snowden is at the end and his contribution is described as "a quantum jump"

 

Documentary:  Guards of the Guardians

 

Quips and Notes:

 

1] "In God We Trust. Everyone else we tap."

 

2] Letter Opening: People who did this gave their reason as "acting on other people's orders". Typical totalitarian-prostitute answer, just like Nazis.

 

3] 1968 "The G-10 Law" --so named to circumvent Article 10 of the (German) Basic Law

------- Article 5 of this law gave the U.S. surveillance powers over Germans

 

4] R.A.F. -Red Army Faction: Dragneting  --residing or living in "certain locations" --"like Paris"-- or other "geographically close" positions to a "suspect" brought complete surveillance, to include following.

 

5] G-10 Committee --decided on surveillance methods. Literally, "truckloads" of mail would be given to the US, which was physically impossible to go through, transcribe or otherwise analyze.  Diverted mail was actually "thrown out" and not delivered.

 

6] A boyfriend who felt spurned went after his girlfriend and the US major after they started seeing each other.

 

7] Tactic used on the Public:  " Security agencies frighten their audiences."boo

 

8] It is "difficult to fight surveillance". (especially when they utilize 'concerned citizens', like churches, the Klan, etc)

 

9] The German Federal Investigative Service "doesn't spy on Germans. It uncovers disloyal employees.", said a pro-peeping-Tom-er

 

Note: in the 1970s, it was revealed that the ClA sent "campaign workers" to help "sympathetic" election hopefuls.

Edited by hasanhh

Share this post


Link to post
Share on other sites

(salam)

 

Is Your Computer really "Yours" ?

 

New York Times via Boston Globe, 24Dec14, by Nicole Perlroth, "Some experts wonder if North Korea actually hacked Sony";

Summarizing the article:

---- most conclude it was an "inside job"

--- Stylometry -linguistic analysis- points to Russian language speakers; "Korean settings" can be used by anyone; many wiping tools are commercially available; and no mention of "The Interview" until after this was discussed in the media

-- anyone could have used anyone's computer ----[[Hmmmm, like when planting evidence on Muslims? -ed.'s Question]]

- one dissenting firm that supports the USGov't's rhetoric is CrowdStrike (CA) "...has been tracking the same group that attacked Sony in 2006, believes they are located in North Korea and have been hacking targets in South Korea for years."

 

It's not just NSA and GCHQ "peeping-tom-ing":

 

International Business Times, 25Dec14,1900EST; "Judge to FaceBook: Scan Users' Private Messages For Targeted Advertising, Prepare for Class-Action Lawsuits", by Barbara Herman

--- Judges comments were Tues, 23Dec14

--FB is using "links" to websites as "likes" of these pages.

-case, USDistrict Court-Northern District of California-No.13-5996

 

Q: How are "links" and "likes" not behaviorally  equivalent ?

Edited by hasanhh

Share this post


Link to post
Share on other sites

(salam)

 

Is Your Computer really "Yours" ?

 

Q: How are "links" and "likes" not behaviorally  equivalent ?

 

(wasalam)

This is exactly a question that I have had over the years. Just because a person clicks on a link to go to a website, that does not mean that the person likes all the content on that website. The person might be doing research or is completely opposed to the content on the website. In the future are we going to be questioned by law enforcement or be arrested because we clicked on certain websites that are deemed to be anti-something or other? 

Share this post


Link to post
Share on other sites

(salam) Hameedeh,

True, yet what l was trying to emphasize is that our computers can be co-opted for attacking other parties, and become repositories of files we have no knowledge about.

 

One thing l do is disconnect my printer until used. This way, the memory cannot be read about what l printed -Iike personal letters- and read for other purposes. Example, my printer's manufacturer somehow ;) found my printer and asked permission via pop-up if they could read my printer. (How'd they know what l have? lt is second-hand)  l clicked "no". Then this past Tuesday, because l guess the printer was not connected, l turned on my desktop and found they were searching for the unconnected printer.

Edited by hasanhh

Share this post


Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now


  • Recent Posts on ShiaChat!

    • Shaitan or Iblis is also a hypocrite & a zalim. Surah Al-Hashr, Verse 16:
      كَمَثَلِ الشَّيْطَانِ إِذْ قَالَ لِلْإِنسَانِ اكْفُرْ فَلَمَّا كَفَرَ قَالَ إِنِّي بَرِيءٌ مِّنكَ إِنِّي أَخَافُ اللَّهَ رَبَّ الْعَالَمِينَ Like the Shaitan when he says to man: Disbelieve, but when he disbelieves, he says: I am surely clear of you; surely I fear Allah, the Lord of the worlds.
      (English - Shakir) And the next verse again mentions his final place and the one who obeys him. Surah Al-Hashr, Verse 17:
      فَكَانَ عَاقِبَتَهُمَا أَنَّهُمَا فِي النَّارِ خَالِدَيْنِ فِيهَا وَذَٰلِكَ جَزَاءُ الظَّالِمِينَ Therefore the end of both of them is that they are both in the fire to abide therein, and that is the reward of the unjust.
      (English - Shakir)
    • Is there some reasonable idea to block corporate interests from getting into politics? When you also look at pictures like this I uploaded it makes you think whether these groups are unstoppable. Did Bernie Sanders have any policy to help end corporate money from getting into politics? I know he talked a lot about campaign finance system but I am sure that isn’t the only way money gets into politics.  What about breaking banks up by ownership to ensure that not only an oligarchy is destroyed but also consumer competitiveness starts to become a thing again. Or maybe we just need everything to collapse so we can get to rebuilding and not waste any more time? America has been doing nothing to limit their deficit because I’m sure they know there is absolutely no credible way to pay a sum like they owe back. Sit back, relax and watch it all burn to the ground. Maybe another communist revolution or two and see how it all goes. Income equality is already making the masses angry if you tell them one day you don’t know where their next salary is going to come from...kaboom.  Im more of a centralisation kind of guy.
    • How old is she? Do you know her friends? Buy some beautiful modest dresses and tell her that she looks more beautiful when she wears them. Ask your mother to do the same.
    • Shirazi and his muqallids are not part of a cult, I don't agree with him but I do notice that a lot of people say things about him that aren't true.
    • I am sorry to hear that, at least you tried.  But I like said, there's nothing you can really do except pray and understand that in the end, her decision doesn't affect anyone but her and nobody but herself is responsible her choices in life.
×