Author Topic: Sen. Jay Rockefeller: NOW IS THE TIME TO CONDUCT CYBER FALSE FLAG ATTACKS!  (Read 43602 times)

0 Members and 1 Guest are viewing this topic.

Anti_Illuminati

  • Guest
Source


Amit Yoran on DHS, federal cybersecurity, enterprise security

December 5th, 2008 by Dennis Fisher

Amit Yoran, the former cybersecurity czar at the Department of Homeland Security and a veteran security executive, joins Dennis Fisher to discuss the state of enterprise security, the Obama administration’s cybersecurity priorities and why information sharing between the government and private sector hasn’t worked.

http://securitywireweekly.blogs.techtarget.com/podpress_trac/web/239/0/Yoran12042008.mp3
__________________________________________________________
From 2008 (this was NOT specified in 2007's Northcom Document, which shows their progression toward toward EVISCERATION of freedom and vicious attack now underway against the web.)

"Homeland Defense and Security scenario vignettes cover a broad range of significant terrorist activities, to include cyber attacks directed at Canada and the U.S. as a result of CTF (Coalition Task Force) operations as well as several natural disasters."

- NORAD-USNORTHCOM
__________________________________________________________
From 2005 (Applies hugely moreso now because they've been planning this for years, and as you can see from above, only starting in 2008 did NORTHCOM/Booz Allen Hamilton ramp up their attack plans on this.)

See: PROMIS/Ptech/Choicepoint/Infragard/DIEBOLD=World ID/Carbon Tax/IP v6  http://forum.prisonplanet.com/index.php?topic=79634.0

Below excerpt sourced from:
Source
Feb. 22, 2005

SAN FRANCISCO -- The federal government and several international partners will hold a cyber preparedness exercise in November, Homeland Security Department officials said here at the RSA Conference.  Its purpose is to give federal agencies an opportunity to test their plans for responding to a direct or indirect attack on the computer networks that control the nation's critical infrastructure such as power plants and oil pipelines. The exercise will be unclassified, and the public will be informed, said Hun Kim, deputy director of the National Cyber Security Division at DHS.

Instead, Wilson said he suspects that sophisticated intruders would
quietly try to wreak havoc, causing a loss of confidence in the
interconnected system of networks and information systems on which the nation's economy and security now depends. "Somebody's going to figure out how to get across a low wall and get on the inside, and they're not going to go in a chat room and talk about it," Wilson said. "We're talking about a sophisticated adversary."

Finding a hidden enemy and cleaning up the damage in such a scenario would be extremely difficult, Wilson said. "You're going to have not only national security issues; you're going to have privacy issues.
 
I'll leave it at that," he said.
__________________________________________________________
Source
Europe to get cybercrime alert system
 

Europe is getting a cybercrime alert system as part of a European Union drive to fight online criminals. According to plans, European law enforcement body Europol will receive 300,000 euros ($386,430) to build an alert system that pools reports of cybercrime, such as online identification and financial theft, from across the 27 member states.

Police will launch more remote searches of suspects' hard drives over the Internet, as well as cyberpatrols to spot and track illegal activity, under the strategy adopted by the European Union's council of ministers Thursday. The strategy, a blueprint for fighting cybercrime in the EU over the next five years, also introduces measures to encourage businesses and police to share information on investigations and cybercrime trends.

"The strategy encourages the much-needed operational cooperation and information exchange between the member states," said Jacques Barrot, vice president of the European Commission. "If the strategy is to make the fight against cybercrime more efficient, all stakeholders have to be fully committed to its implementation. We are ready to support them, also financially, in their efforts." Plans for the EU alert system follow the recent establishments of the Police Central E-crime Unit and National Fraud Strategic Authority, which aim to fight cybercrime in the United Kingdom.
__________________________________________________________
How might Obama's appointment to head the DHS turn things around for the department? Experts weigh in.

Source

Cyber Threats Await Next Homeland Security Chief

Janet Napolitano

Though it is charged with keeping America safe, the Department of Homeland Security (DHS) has also run up a record of high-profile failures during its short history.  Its role in the response to Hurricane Katrina, followed by a series of cyber security breaches, led to Congressional criticism of DHS Secretary Michael Chertoff and its CIO, Scott Charbo. And several of its proposed programs have stalled.

It's a legacy that Arizona Gov. Janet Napolitano is poised to inherit, having been named on Monday as President-elect Barack Obama's pick for DHS secretary.  And as a result of the DHS's troubles, information security experts have a laundry list of suggestions for Napolitano once she's confirmed.

First off, she should speed up the hiring process to better protect against future cyber security threats, according to Shannon Kellogg, director of information security policy at EMC (NYSE: EMC). Kellogg pointed out that the DHS has lost several employees involved in information security, including Greg Garcia, assistant secretary for cyber security and communications, who announced his departure this week.

Getting new people in quickly and retaining them will be important because US-CERT, the operational arm of the department's National Cyber Security Division and a key player in national and private sector Internet security, is building out broader capabilities and expanding quickly, Kellogg told InternetNews.com.

"That requires you hire people very quickly, but this is counter to how government hiring processes work," he added. US-CERT coordinates defenses against and responses to cyber attacks nationwide and issues security threat warnings. It developed software for the Einstein Program, an intrusion detection system in the federal government that is the result of the 2002 Homeland Security Act, the 2003 Federal Information Security Management Act (FISMA) and the Homeland Security Presidential Directive/Hspd-12, issued in August 2004. The first two versions of Einstein have been implemented in the Federal government.

EMC's Kellogg said that Einstein III is in the works. The project -- in which Kellogg called on Napolitano to continue investing -- will add real-time reporting capabilities to the system.

Clean up your own house

Napolitano should also make sure DHS deals with its own security vulnerabilities. The department suffered 844 security breaches during its fiscal 2005 and 2006, leading a House subcommittee on tech and cyber security to DHS CIO Scott Charbo of not doing his job, during a June 2007 hearing. The breaches also led to charges from a congressman that the IT vendor DHS contracted to build its networks, Unisys, bore partial responsibility for the breaches. The company quickly denied the accusations' validity, but the incident later led to an FBI probe of Unisys (NYSE: UIS).

"I hope the new secretary will continue to emphasize the importance of information security in this environment," EMC's Kellogg said. "DHS should be an example for information security within the federal government." As a result, the DHS should take a proactive approach to security, Scott Crawford, research director at Enterprise Management Associates, told InternetNews.com.

"There is no national agenda for taking cyber security all that seriously at this point," he said. "The DHS is left to reacting to events as they occur and leaving events to the private sector." Also at issue is how the next director of homeland security will work with the tech czar that Obama has promised to appoint -- a position commonly thought of as a national CTO. While details are scant on Obama's plans for the position, analyst Charles King of Pund-IT said he believes Napolitano should fight the idea of creating a single CTO position.

Instead, he thinks she should suggest a national council of CTOs, he told InternetNews.com in an e-mail. A long list of rumored candidates Obama's tech czar post has included names like that of Google CEO Eric Schmidt -- who later signaled his interest in remaining at the search giant -- as well as former FCC chair Reed Hundt, Apple CEO Steve Jobs, Amazon CEO Jeff Bezos and Julius Genachowski, an economic adviser to Obama and cofounder of venture capital firm Rock Creek Ventures.

But King thinks that's a bad idea. Napolitano should appoint working CTOs who have actually been involved in developing successful commercial projects, he said. He added that Napolitano ought to keep the national CTO on a tight leash, giving them three months to develop one-, two- and three-year plans for modernizing the nation's IT resources -- and refusing to extend the deadline.

All these suggestions will take time to flesh out. But one of the things Napolitano can do to score points quickly with the new administration is to have DHS establish a methodology to rate how well companies and agencies are communicating securely, one observer noted. "The DHS should enable agencies and the U.S. government to use a unified architecture to communicate securely, and a rating system will motivate people to use best practices for secure communication," said Kelly Mackin, president and COO of DataMotion, told InternetNews.com.

According to Mackin, whose firm handles secure e-mail for a U.K. government department, there are 4.7 terabytes of e-mail data for every 1,000 employees in a company -- data that could pose a danger if not properly locked down. "Although 93 percent of employees think e-mail is a critical piece of how they do business, most of that e-mail is not secured, and DHS must address this problem," she said.
__________________________________________________________
Voter Fraud Recount Revealed: AIPAC/Rockefeller!!!!!!!!!!!!
http://forum.prisonplanet.com/index.php?topic=21681.msg83959#msg83959


"FBI INFRAGARD - Kill your neighbors with FBI/CACI intelligence!
Infragard--Join now and get your own license to kill!!!
"

InfowarCon Advisory Board:  Dr. Dan Kuehl, National Defense University; Amit Yoran, NetWitness; Mark Rasch, FTI; Dorothy Denning, DoD; Richard Forno, Infowarrior.org; Lars Nicander, CATS; Bruce Brody, CACI.

InfowarCon Sponsors & Partners Include: The Department of Homeland Security (DHS), Mandiant, Netwitness, Purifile, Secure Computing, Lincoln Group, White Wolf Security, Department of Defense Cyber Crime Center (DC3), (ISC)2; Homeland Defense Journal, Government Security News, Homeland Defense Week, Officer.com, Continuity Insights, InfraGard National Members Alliance, ISSA NOVA, Terrorism Research Center and National Defense University.



Source

Mossad: RSA Security & Ptech Run US Govt Computers
Posted in the database on Monday, June 19th, 2006 @ 12:41:33 MST (818 views)
by Christopher Bollyn    American Free Press

The most critical computer and communication networks used by the U.S. government and military are secured by encryption software written by an Israeli "code breaker" tied to an Israeli state-run scientific institution.

The National Security Agency (NSA), the U.S. intelligence agency with the mandate to protect government and military computer networks and provide secure communications for all branches of the U.S. government uses security software written by an Israeli code breaker whose home office is located at the Weizmann Institute in Israel.

A Bedford, Massachusetts-based company called RSA Security, Inc. issued a press release on March 28, 2006, which revealed that the NSA would be using its security software:

"U.S. Department of Defense Agency Selects RSA Security Encryption Software" was the headline of the company's press release which announced that the National Security Agency had selected its encryption software to be used in the agency's "classified communications project.

RSA stands for the names of the founders of the company: Ronald L. Rivest, Adi Shamir, and Leonard M. Adleman. Adi Shamir, the lead theoretician, is an Israeli citizen and a professor at the Weizmann Institute, a scientific institution tied to the Israeli defense establishment.

"My main area of research is cryptography – making and breaking codes," Shamir's webpage at the Weizmann Institute says. "It is motivated by the explosive growth of computer networks and wireless communication. Without cryptographic protection, confidential information can be exposed to eavesdroppers, modified by hackers, or forged by criminals."

The NSA/Central Security Service defines itself as America’s cryptologic organization, which "coordinates, directs, and performs highly specialized activities to protect U.S. government information systems and produce foreign signals intelligence information."

The fact that the federal intelligence agency responsible for protecting the most critical computer systems and communications networks used by all branches of the U.S. government and military is using Israeli-made encryption software should come as no surprise. The RSA press release is just the icing on the cake; the keys to the most critical computer networks in the United States have long been held in Israeli hands.

AFP inquired with the NSA about its use of Israeli-made security software for classified communications projects and asked why such outsourcing was not seen as a national security threat. Why is "America’s cryptologic organization" using Israeli encryption codes?

NSA spokesman Ken White said that the agency is "researching" the matter and would respond in the coming week.

American Free Press has previously revealed that scores of "security software" companies – spawned and funded by the Mossad, the Israeli military intelligence agency – have proliferated in the United States.

The "security" software products of many of these usually short-lived Israeli-run companies have been integrated into the computer products which are provided to the U.S. government by leading suppliers such as Unisys.

Unisys integrated Israeli security software, provided by the Israel-based Check Point Software Technologies and Eurekify, into its own software, so that Israeli software, written by Mossad-linked companies, now "secures" the most sensitive computers in the U.S. government and commercial sector.

The Mossad-spawned computer security firms typically have a main office based in the U.S. while their research and development is done in Israel.

The Mossad start-up firms usually have short lives before they are acquired for exaggerated sums of money by a larger company, enriching their Israeli owners in the process and integrating the Israeli directors and their Mossad-produced software into the parent company.

RSA, for example, an older security software company, acquired an Israeli-run security software company, named Cyota, at the end of 2005 for $145 million.

In January 2005, Cyota, "the leading provider of online security and anti-fraud solutions for financial institutions" had announced that "security expert" Amit Yoran, had joined the company's board of directors.

Prior to becoming a director at Cyota, Yoran, a 34-year old Israeli, had already been the national "Cyber Czar," having served as director of the Department of Homeland Security's National Cyber Security Division.

Yoran had been appointed "Cyber Czar" at age 32 by President George W. Bush in September 2003.

Before joining DHS, Yoran had been vice president for worldwide managed security services at Symantec. Prior to that, he had been the founder, president and CEO of Riptech, Inc., an information security management and monitoring firm, which Symantec acquired in 2002 for $145 million.

Yoran and his brother Naftali Elad Yoran are graduates of the U.S. Military Academy at Westpoint. Elad graduated in 1991 and Amit in 1993. Along with their brother Dov, the Yoran brothers are key players in the security software market. Amit has also held critical positions in the U.S. government overseeing computer security for the very systems that apparently failed on 9/11.

Before founding Riptech in 1998, Yoran directed the vulnerability- assessment program within the computer emergency response team at the US Department of Defense.

Yoran previously served as an officer in the United States Air Force as the Director of Vulnerability Programs for the Department of Defense's Computer Emergency Response Team and in support of the Assistant Secretary of Defense's Office.

In June 2005, Yoran joined the board of directors of Guardium, Inc., another Mossad-spawned "provider of database security solutions" based in Waltham, Massachusetts.

Guardium is linked with Ptech, an apparent Mossad "cut out" computer security company linked with the 9/11 attacks. Ptech, a computer software company in Quincy, Mass., was supposedly a small start-up company founded by a Lebanese Muslim and funded by a Saudi millionaire.

Yet Ptech's clients included all the key federal governmental agencies, including the U.S. Army, the U.S. Air Force, the U.S. Naval Air Command, Congress, the Department of Energy, the Federal Aviation Administration, the Internal Revenue Service, NATO, the Federal Bureau of Investigation, the Secret Service and even the White House.

The marketing manager at Ptech, Inc. when the company started in the mid-1990s, however, was not a Muslim or an Arab, but an American Jewish lawyer named Michael S. Goff who had suddenly quit his law firm for no apparent reason and joined the Arab-run start-up company.

Goff was the company's information systems manager and had single-handedly managed the company's marketing and "all procurement" of software, systems and peripherals. He also trained the employees. Goff was obviously the key person at Ptech.

In the wake of 9/11, during the Citizens' Commission hearings in New York, Indira Singh, a consultant who had worked on a Defense Advanced Research Project, pointed to Ptech and MITRE Corp. being involved in computer "interoperability issues" between the FAA and NORAD. At this time Ptech's ties to Arabs was the focus, and Goff was out of the picture.

"Ptech was with MITRE Corporation in the basement of the FAA for two years prior to 9/11," Singh said. "Their specific job is to look at interoperability issues the FAA had with NORAD and the Air Force in the case of an emergency. If anyone was in a position to know that the FAA – that there was a window of opportunity or to insert software or to change anything – it would have been Ptech along with MITRE."

The Mossad-run Guardium company is linked with Ptech through Goff Communications, the Holliston, Mass.-based public relations firm previously run by Michael S. Goff and his wife Marcia, which represents Guardium. Since being exposed in AFP in 2005, however, Michael's name no longer appears on the company website.

Although he and his brother reportedly grew up in Pound Ridge, New York during the 1970s and 1980s, the heads of the Jewish community told AFP that they had never heard of him. One said that she had conducted a survey of the Jews living in the small village of Pound Ridge in the 1970s and she would have remembered if a wealthy Israeli family named Yoran had been found. Why did the locals in Pound Ridge NOT remember the Yorans?

Probably because they were NOT in Pound Ridge - but in Israel. The Pound Ridge address was used to give the appearance that the Yorans were Americans. I spoke with Elad and he has a distinctive Israeli accent - not what you would expect for a guy who grew up in a posh Yankee village.

So who are the Yorans? Who are their parents and why did they come to the United States? To raise a couple high-level moles to infiltrate the most sensitive U.S. computer networks? How could they have lived for 20 years in Pound Ridge and NOT be remembered.


GET READY FOR THE NEW AMERIKA!! A BETTER INFORMED SOCIETY WILL RESULT IN A FREER ONE WITH OUR MACHINE GUNS AND CYBER POLICE THAT CAN'T GET ANY OTHER TYPE OF JOBS BECAUSE THAT'S THE ONLY JOBS WE'VE LEFT FOR YOU IN THE NAU!!!  YOU PASS OUT ANTI-NWO MATERIAL, & PROTEST CLOUD COMPUTING?  YOU'LL BE SHOT ON SIGHT!!!  YOU WON'T EVEN HAVE TO GET ON THE TRAIN, BECAUSE THE SECRET THAT NO ONE HAS TOLD YOU IS THAT THE PUBLIC TRANSPORTATION, BUSES, ET.AL. WILL TAKE YOU TO THE FEMA CAMPS UNDER USTRANSCOM!  NOW SHUT UP SLAVES!!!!

Offline freeyrmind

  • Member
  • ****
  • Posts: 333
Re: ***L M F A O*** This NEEDS a FRONT PAGE article on all of AJ's sites!
« Reply #1 on: February 24, 2009, 03:49:03 pm »
just another set up to try and take away the interenet. some of these stories these poeple come up with to try and fearmonger are just hilarious.
"It is said the eskimos have 22 words for snow. Immortal has 23.."

Anti_Illuminati

  • Guest
Re: ***L M F A O*** This NEEDS a FRONT PAGE article on all of AJ's sites!
« Reply #2 on: February 24, 2009, 05:18:37 pm »
just another set up to try and take away the interenet. some of these stories these poeple come up with to try and fearmonger are just hilarious.

Amit Yoran should be arrested immediately and charged with murder, (and other crimes) period.  He is one of the many NWO criminals directly responsible for the deaths of all those people on 9/11, the 1st responders deaths and destruction of their health, and every other consequence resulting from the black op too many to list.  Seriously check out the mp3 I linked --that's what completely blew me away for me to post this because of the fact that someone actually interviewed this piece of globalist boot licking trash and to hear how he fearmongers:

"The cyber-initiative has--a, components which are near term in nature, actionable specific operational nature, and then there's--it goes, runs the entire gamut to longer term strategic research types of requirements so there's a, I think a good balance in the timelines of these things, but action is underway already there's a, I wouldn't say at a feverish pace, (he says that like he's lying, that it is in fact, feverish) (interviewer let's out a disgusting sheepish stupid f**ing laugh as if the death of the Internet is funny, but that's because he's a DUMB SON OF A BITCH, OR A PIECE OF NWO TRASH HIMSELF.) but "there's been a very aggressive effort", over the last 24 months in the Executive branch of the federal govt. to change the status quo on the cyber front."  I'd like to see that SOB squirm in an FBI Interrogation room being drilled about Guardium and Ptech, etc.

Listen to Amit Yoran reference the CSIS board members (Kissinger, Brzezinksi, etc.) what a sick son of a bitch.  Check out the document I linked in the forum thread in the 1st post.  Now, look at this:
__________________________________________________________
Feds Fight to Plug Security Holes

Breaches and computer losses continue where they shouldn't.

February 17, 2009
By Richard Adhikari

President Obama's recent order of an immediate two-month review of the federal government's cybersecurity plans apparently can't come fast enough. The federal government, dogged by computer security issues over the years, was hit by two more incidents this week.

One occurred at the Federal Aviation Administration (FAA), where data of 49,000 people were stolen during a data breach. The other occurred at the Los Alamos National Laboratory (LANL) in New Mexico, which is undergoing a security shakeup following the discovery that a total of 90 computers were reported missing or stolen over the past year.

Experts have been calling for an overhaul of federal computer security practices.

The latest incidents, which occurred at organizations which should have had a higher level of security, make it look as if things have not improved over the past four years.
INSERT:  THAT'S BECAUSE YOUR ENTERPRISE ARCHITECTURE/FEDERATED GLOBAL INFORMATION GRID CONTINUALLY SERVES AS AN UNOBTRUSIVE MEANS FOR YOU TO CARRY OUT FALSE FLAGS AGAINST ALL OF YOUR OWN SYSTEMS TO FOOL YOUR COMPARTMENTALIZED IDIOTS AND GENERAL PUBLIC INTO GIVING UP THEIR FREEDOMS ONLINE OTHERWISE THERE WILL BE A "NATIONAL CATASTROPHE."  STOP CARRYING OUT F**KING FALSE FLAGS, YOU'VE BEEN EXPOSED AND YOU'RE NOT GOING TO GET AWAY WITH THESE LIES!]  In 2005 and 2006, the Department of Homeland Security suffered 844 security breaches, leading a House subcommittee to accuse DHS CIO Scott Charbo of not doing his job during a hearing in 2007.

In the FAA breach, which could impact 49,000 people, data was stolen from 48 files on one server, FAA spokesperson Laura Brown told InternetNews.com. Two of the files combined had data on 49,000 employees.

One had names and social security numbers of 45,000 employees who joined the FAA on or after February 1, 2006. The other had names and encrypted medical information of 4,000 employees in the FAA's safety organization but did not contain any social security numbers, Brown said.

The remaining files have data that is either in the public domain or non-private data, Brown said. The FAA has notified those affected, and will offer them free credit monitoring. It is working with the FBI and the Department of Transportation's inspector general to investigate the breach.

Brown said the FAA was alerted February 1 by the Department of Transportation's cybersecurity monitoring system about the breach, and it took about a week to determine what data had been taken. Employees were notified a week later, this past Monday. No FAA operational systems appear to have been breached, Brown said. Since the breach occurred, the FAA has begun tightening up its security, Brown said. [INSERT:  HERE'S A HINT: THE BREACHES EXECUTED BY THE ENTERPRISE, OR SOA (SERVICE ORIENTED ARCHITECTURE) SYSTEM THAT IS STILL ON YOUR MACHINES DOESN'T LEAVE ANY EVIDENCE OF THE BREACHES THAT IT EXECUTES (BECAUSE IT LEARNS ALL WEAKNESSES AND DEFEATS ANY AND ALL SECURITY WITHOUT DETECTION AND DOESN'T GIVE A SHIT WTF OPERATING SYSTEM IT IS INSTALLED ON PERIOD!)  WAKE THE F**K UP!

Do you know where your computers are? INSERT:  Is that like CNBC's "Do you know where your Money is (a subtly mocking statement to all Americans of the globalists telling you that they stole your money, and "what the hell are you going to do about it.")

The problems at Los Alamos National Laboratory are more troubling because the lab, which bills itself as the premier national security science laboratory, deals with highly classified projects including safeguarding the U.S. nuclear deterrent and offering mission-critical support for NASA.

In January, three computers were stolen from the home of a LANL scientist in Santa Fe, New Mexico, earning the lab a rebuke from its client, the Department of Energy's National Nuclear Security Administration (NNSA), according to the Web site of the Project on Government Oversight (POGO). POGO is an independent nonprofit that says its mission is to investigate and expose corruption and other misconduct in the federal government.

The NNSA letter, signed by contracting officer Robert Poole, said that, although LANL has improved the robustness of its cybersecurity implementation, the theft revealed concerns in various areas. It also said that LANL later reported that 13 computers had been lost or stolen in the past 12 months and 67 others were missing. "The magnitude of exposure and risk to the laboratory is at best unclear as little data on these losses has been collected or pursued given their treatment as property management issues as well."

Poole directed LANL to treat any loss of computer equipment as a cybersecurity concern and to tighten security measures. LANL spokesperson Jeff Berger told InternetNews.com the computers stolen from the scientist's home in New Mexico did not contain classified data. Neither did the computers reported missing or stolen last year.

[INSERT: "DID NOT CONTAIN CLASSIFIED DATA"  HOW THE F**K DO WE KNOW THAT, HOW DO WE KNOW HE ISN'T LYING? HOW CAN HE EVEN KNOW THAT IF HE IS TELLING THE TRUTH WHEN THE PRECEDING PARAGRAPH SAID:  "The magnitude of exposure and risk to the laboratory is at best unclear as little data on these losses has been collected or pursued given their treatment as property management issues as well."

Another 11 computers, which could have gone missing or been stolen before 2008, were recovered last year, Berger said. Pointing out that LANL has accounted for 99.5 percent or more of its computers and computer related equipment, exceeding the 98.7 percent bar set by NNSA, Berger said the laboratory has tightened up its security measures since the theft.

"We've just initiated an inventory process calling in all computers," he said. "We're also reviewing policies that govern the home use of our computers."

WHY DOES NORAD-USNORTHCOM HAVE 2 NUCLEAR ATTACKS LISTED ON THE U.S MAP-ONE IN SAN FRANSISCO CALIFORNIA, AND THE OTHER ONE DENOTED AS "AN OFF-SHORE NUCLEAR EXPLOSION" IN THEIR 2008 US "WARGAMING" DOCUMENT?! (THE 2009 ONE HASN'T BEEN RELEASED BTW, I CHECKED.]

TheGoodFight1984

  • Guest
Re: ***L M F A O*** This NEEDS a FRONT PAGE article on all of AJ's sites!
« Reply #3 on: February 24, 2009, 05:35:02 pm »
Has the name Peter Varnish cropped up in your digging much A_I?

Been following some trails today from the SCL link and his name appears a hell of a lot..

Have a read of this PDF article he authored and what he says about 9/11.. http://www.ingenia.org.uk/ingenia/issues/issue15/Varnish.pdf

Spent 32 years in the MoD working on stealth techniques, radar and electronic warfare. Recently joined Definition International as chairman.
Also Director of Sparks Tech, S3T Ltd, CMB ltd and Int'l Geopolitical Solutions..
Sat on the board of SCL
Chairs shitloads of Defense and Security conferences & conventions etc.

International Geopolitical Solutions: Nothing on the web about this company at all.
Definition International: Nothing on the web about this company either.
Sparks technology: Basic Website, looks like a 'front' site. http://www.sparkstech.com/SparksTech/Welcome.html
S3T Software Ltd: http://www.s3bs.co.uk/
CMB Ltd: Not got there yet


Offline DCUBED

  • Member
  • *****
  • Posts: 3,882
  • Sieg Heil!
Re: ***L M F A O*** This NEEDS a FRONT PAGE article on all of AJ's sites!
« Reply #4 on: February 24, 2009, 05:57:45 pm »
This fits in with what the Bilderberg announced at there last meeting; focusing on preventing cyberterrorism.  All they need is an internet 9/11, which it looks like they are setting up now. 

Problem: Some cyberterrorists unleash hundreds of viruses simultaneously crippling the internet. 

Reaction: "Well, I can't go too long without the internet... Something must be done!! Anything! Just fix the internet NOW!!"

Solution: Internet Patriot Act, Homeland Security for the internet, limited usage, and implementation of Internet 2
“Once you eliminate the impossible, whatever remains, no matter how improbable, must be the truth.”  - Arthur Conan Doyle

"The individual is handicapped by coming face-to-face with a conspiracy so monstrous he cannot believe it exists." J. Edgar Hoover

drewt431

  • Guest
Re: ***L M F A O*** This NEEDS a FRONT PAGE article on all of AJ's sites!
« Reply #5 on: February 24, 2009, 06:20:28 pm »
Wow.  That top picture had a triangle with a triple 6 in it!

Offline donnay

  • Member
  • *****
  • Posts: 17,961
  • Live Free Or Die Trying!
Re: ***L M F A O*** This NEEDS a FRONT PAGE article on all of AJ's sites!
« Reply #6 on: February 24, 2009, 06:58:05 pm »
As usual great information!  Thanks!
Please visit my website: https://www.theherbsofthefield.com/

kushfiend

  • Guest
Re: ***L M F A O*** This NEEDS a FRONT PAGE article on all of AJ's sites!
« Reply #7 on: February 24, 2009, 07:11:33 pm »
Wow.  That top picture had a triangle with a triple 6 in it!

o snaps it does!  great catch.

Offline lordssyndicate

  • Member
  • *****
  • Posts: 1,141
  • Stop The New World Order
    • LinkedIn Profile
Re: ***L M F A O*** This NEEDS a FRONT PAGE article on all of AJ's sites!
« Reply #8 on: April 26, 2009, 03:25:25 pm »
So, the very people who engineered and made 9/11 possible are now conspiring and waging new Cyber False flags for their masters...


Well as they keep insisting in their fracking Air Force Commercials Welcome to the Battlefield of the 21st century...
"Biotechnology it's not so bad. It's just like all technologies it's in the wrong HANDS!"- Sepultura

Offline chris jones

  • Member
  • *****
  • Posts: 21,832
Re: ***L M F A O*** This NEEDS a FRONT PAGE article on all of AJ's sites!
« Reply #9 on: April 26, 2009, 04:21:01 pm »


I remember the day Nr. Bushmaster publicaly announced the formation of homeland S.

He and his playmates were having a laugh, and I do mean a laugh, they were gahaffing.  Victory for the elite. 911 serverd many a purpose for the masters of deception..

Check it out, I tried can not find it.

Homeland security. What ever happened to our multiple safegaurds we the people payed billions to keep us safe?? Easy one, they wanted a cash cow, and a manipulator, they have one among many others.

Offline Satyagraha

  • Global Moderator
  • Member
  • *****
  • Posts: 8,941
75,000+ Computers hacked by Michael Riconosciuto's PROMIS based code
« Reply #10 on: February 18, 2010, 09:08:19 am »
More than 75,000 computer systems hacked in one of largest cyber attacks, security firm says
http://www.washingtonpost.com/wp-dyn/content/article/2010/02/17/AR2010021705816.html?wpisrc=nl_tech
By Ellen Nakashima
Washington Post Staff Writer
Thursday, February 18, 2010

More than 75,000 computer systems at nearly 2,500 companies in the United States and around the world have been hacked in what appears to be one of the largest and most sophisticated attacks by cyber criminals discovered to date, according to a northern Virginia security firm.

The attack, which began in late 2008 and was discovered last month, targeted proprietary corporate data, e-mails, credit-card transaction data and login credentials at companies in the health and technology industries in 196 countries, according to Herndon-based NetWitness.

News of the attack follows reports last month that the computer networks at Google and more than 30 other large financial, energy, defense, technology and media firms had been compromised. Google said the attack on its system originated in China.

This latest attack does not appear to be linked to the Google intrusion, said Amit Yoran, NetWitness's chief executive. But it is significant, he said, in its scale and in its apparent demonstration that the criminal groups' sophistication in cyberattacks is approaching that of nation states such as China and Russia.

The attack also highlights the inability of the private sector -- including industries that would be expected to employ the most sophisticated cyber defenses -- to protect itself.

"The traditional security approaches of intrusion-detection systems and anti-virus software are by definition inadequate for these types of sophisticated threats," Yoran said. "The things that we -- industry -- have been doing for the past 20 years are ineffective with attacks like this. That's the story."

The intrusion, first reported on the Wall Street Journal's Web site, was detected Jan. 26 by NetWitness engineer Alex Cox. He discovered the intrusion, dubbed the Kneber bot, being run by a ring based in Eastern Europe operating through at least 20 command and control servers worldwide.

The hackers lured unsuspecting employees at targeted firms to download infected software from sites controlled by the hackers, or baited them into opening e-mails containing the infected attachments, Yoran said. The malicious software, or "bots," enabled the attackers to commandeer users' computers, scrape them for log-in credentials and passwords -- including to online banking and social networking sites -- and then exploit that data to hack into the systems of other users, Yoran said. The number of penetrated systems grew exponentially, he said.

"Because they're using multiple bots and very sophisticated command and control methods, once they're in the system, even if you whack the command and control servers, it's difficult to rid them of the ability to control the users' computers," Yoran said.

The malware had the ability to target any information the attackers wanted, including file-sharing sites for sensitive corporate documents, according to NetWitness.

Login credentials have monetary value in the criminal underground, experts said. A damage assessment for the firms is underway, Yoran said. NetWitness has been working with firms to help them mitigate the damage.

Among the companies hit were Cardinal Health, located in Dublin, Ohio, and Merck, according to the Wall Street Journal. A spokesman for Cardinal said the firm removed the infected computers as soon as the breach was found.

Also affected were educational institutions, energy firms, financial companies and Internet service providers. Ten government agencies were penetrated, none in the national security area, NetWitness said.

The systems penetrated were mostly in the United States, Saudi Arabia, Egypt, Turkey and Mexico, the firm said.

Staff researcher Madonna Lebling contributed to this report.

===================================

On Amit Yoran:
NRO Declassified/NIMA - Ptech/DHS terrorist Amit Yoran-In-Q-Tel
http://www.strategic-road.com/confid/archiv06/reperes_sem010506.htm

07/05/06  - IN-Q-TEL... La SEC enquêterait sur un scandale qui pourrait éclabousser la CIA

WMR May 6, 2006 -- "General Hayden's nomination to be the next CIA Director came as another scandal involving the intelligence agency emerged in addition to the "Hookergate" scandal centered on the Watergate and another Washington hotel. Under Goss, the CIA's venture capital arm, IN-Q-TEL, which provides CIA money to promising high-tech start-up firms, became the subject of a Securities and Exchange Commission (SEC) investigation for possible massive misappropriation of taxpayer money and private money involving IN-Q-TEL, NASA's venture capital branch -- Red Planet Capital -- The US Special Operations Command's venture capital firm On Point, and the infamous Carlyle Group -- the war profiteering company in which George H. W. Bush, the Bin Laden family, and former Secretary of State James Baker have held major financial interests.

Suspicions about IN-Q-TEL were raised in late April when its 35-year-old CEO, Amit Yoran, abruptly resigned to "spend more time with his family." Yoran, an Israeli-American, had been on the job for just four months after he succeeded IN-Q-TEL's first CEO, Gilman Louie, a well-known Silicon Valley investor and technical guru. Before taking over IN-Q-TEL, Yoran was the director of the National Cyber Security Division at the Department of Homeland Security.

Under Yoran, IN-Q-TEL's operating budget increased exponentially and the firm began negotiating with various high-tech firms to develop deep data mining programs and spy technology. Yoran's rumored successor was said to be Mark Frantz, who Yoran brought from The Carlyle Group to be IN-Q-TEL's managing general partner and board of trustees member. Frantz worked for George H. W. Bush and held a senior position with Alex Brown, later merged with Deutsche Bank, the firm where the CIA's former Executive Director, A. B. "Buzzy" Krongard served as Chairman. IN-Q-TEL's board of trustees chairman is Lee A. Ault III of Delray Beach, Florida, who also serves on the board of Office Depot.

Individuals familiar with IN-Q-TEL report that the company is suspected of steering CIA funds to start-up firms with close ties to the GOP as well as "pump and dump" penny stock firms tied to three foreign nations -- Israel, Dubai, and Malaysia. The emerging IN-Q-TEL scandal is mirrored by the financial scandal involving favoritism in CIA contracts to Brent Wilkes' ADCS and its subsidiaries.

Deputy DNI Gen. Michael Hayden, who presided over dubious multi-billion dollar contracts -- including Groundbreaker and Trailblazer -- as NSA director, has a great deal of experience in covering up cost overruns, contractor fraud, and contract favoritism. Beyond the need to have a good foot soldier at the helm of the CIA, the Bush administration is clearly hoping that Hayden, using his special form of intimidation through the use of psychiatric and security personnel to threaten whistleblowers, can tamp down the emerging financial "Watergate" emerging at the CIA."
_______________________________________________________
http://www.washingtonpost.com/wp-dyn/content/article/2006/04/23/AR2006042300701.html

Four Months Later, In-Q-Tel Again Needs New CEO
[INSERT: WTF, LOOK AT THE PTECH NAME ON AN OVERHEAD DISPLAY BEHIND HIS HEAD IN THE PHOTO!

Amit Yoran, former head of cybersecurity for the Homeland Security Department, says he wants to spend more time with his family. (By Bill O'leary -- The Washington Post)

By Terence O'Hara
Monday, April 24, 2006

Amit Yoran resigned over the weekend as chief executive of In-Q-Tel , the venture capital arm of the U.S. spy community, after less than four months on the job.

Yoran, a seasoned technology entrepreneur and investor as well as a former head of cybersecurity for the Department of Homeland Security, had led In-Q-Tel since January. He said yesterday that his reasons for leaving were entirely personal, including a desire to spend less time on the road and more with his family. He and his wife have three young children. In-Q-Tel has investments all over the country, and Yoran has traveled extensively. Considered a success inside the Central Intelligence Agency, which created it, In-Q-Tel's mandate has been expanding to find more technology for more spy agencies.

"It's a very amicable parting," said Yoran, 35. "I will say I'm sorry and disappointed as well. But these are personal issues. . . . My continued performance as CEO was not going to be possible."

Yoran said he will continue to work with In-Q-Tel as a part-time consultant. Before taking the chief executive job four months ago, Yoran had invested money in several private technology companies. He continues to serve on several company boards.

Lee A. Ault III , chairman of In-Q-Tel's board of trustees, said he accepted Yoran's resignation "with regret."

"In-Q-Tel has benefited from Amit's vision and leadership during his tenure as CEO," Ault said in a statement. "We appreciate his service to In-Q-Tel, and we look forward to continuing In-Q-Tel's unique and important mission of delivering important and cutting edge technologies to the CIA and the intelligence community."

In-Q-Tel calls itself a venture capital firm, but venture investing is a small part of what it does. The CIA created the organization as a nonprofit, and its job was to identify technologies being funded and developed by the private sector that could have value in intelligence-gathering or national security applications. In-Q-Tel makes small investments in start-up companies, almost always as a junior partner to traditional venture capital funds. Most of In-Q-Tel's money goes toward evaluating and funding the technology to make sure the CIA or other intelligence agencies can use it.

Yoran had begun to ramp up In-Q-Tel's investment activity to meet its growing budget and responsibilities. He said the organization has an annual budget of more than $50 million -- up from $30 million to $35 million several years ago -- and includes as "investors" several other intelligence and homeland security agencies in addition to the CIA. In its early years, In-Q-Tel was funded almost entirely by the CIA. All of In-Q-Tel's contacts with the intelligence community, no matter the agency, still run through a special office inside the CIA.

Last month, Yoran hired his old friend, Mark Frantz , a well-known local venture capitalist who spent the past five years with the Carlyle Venture Partners , as In-Q-Tel's managing general partner. Frantz in an interview last week said the organization would be hiring more people for its investing team.

"We're not exactly taking out help-wanted ads, but we want to add to our venture team," Frantz said. "We've got some very talented folks here, but we're here to turn it up a notch. "

Yoran took over from founding chief executive Gilman Louie , who ran In-Q-Tel since its 1999 inception. The board is expected to appoint an interim chief executive this week and begin a national search for Yoran's replacement.

Yoran said 120 technologies partly funded by In-Q-Tel have been deployed by the CIA or other agencies. "Unfortunately, we can't talk about the specific uses," he said.

Investing in Start-Up Banks

For two decades, Danielson Associates of Rockville has been among the leading dealmakers for start-up banks on the East Coast. Now, it's investing in them.

Founder Arnold Danielson , known for his deep relationships with the region's community bankers, advised dozens of young banks as they grew and ultimately were acquired. His credibility stemmed in part from the reams of cogent research he wrote on community banks. In the past 10 years, Danielson Associates represented sellers in 34 bank acquisition deals worth nearly $3 billion. One of Arnold Danielson's crowning achievements was the sale of Columbia Bancorp to Fulton Financial Corp . Columbia was a longtime Danielson client, and Danielson advised the bank in its $306 million sale to Fulton in February.

Arnold Danielson is semi-retired, spending a lot of time writing a history of banking at his residence in the south of France. The firm is run by his son, David , who is president, and by principle Jonathan D. Holtaway .

Last year, Danielson Associates started Ategra Capital Management , which is run by Holtaway. The new company runs an investment fund that has bought stakes in 32 small banks, totaling about $9.4 million, said Holtaway, who was an analyst at Danielson for 10 years until 2001 and rejoined the firm last year in part to help start the fund.

The fund was created to profit from Danielson's expertise in small banks, which typically have small, intensely local shareholder groups that don't seek out institutional investors.

Not that there's a lot of institutional investment money chasing those banks. The professionally managed investment funds that specialize in community bank stocks generally invest in bigger banks, typically with assets of $500 million or more. Holtaway is investing much earlier.

"We have been a seen a good three-year wave of bank start-ups, and it's expected to continue," Holtaway said. "We only exist at the very low end, where these stocks sometimes don't even trade. You really have to work it to buy some of these stocks."

A typical investment will be $300,000 to $500,000, Holtaway said. The fund is focused on East Coast banks, the region where bankers know Danielson well.

"People in this business identify with the Danielson brand," Holtaway said. Start-up banking "is a highly specialized thing, and if you're going to join these early investors, you really have to understand it and enjoy it."

And  the King shall answer and say unto them, Verily I say unto you, 
Inasmuch as ye have done it unto one of the least of these my brethren,  ye have done it unto me.

Matthew 25:40

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
Bilderberg WaPo is officially assisting Jay Rockefeller's CYBER FALSE FLAG PLAN
« Reply #11 on: February 18, 2010, 09:13:56 am »
MORE BULLSHIT BULLSHIT BULLSHIT FROM WAPO

ANTI_ILLUMINATI HAS EXPOSED FOR MONTHS THAT EVERY SINGLE PACKET IS SNOOPED BY MULTIPLE UNCONSTITUTIONAL SOCKET SPIES AND AND CATALOGED IN DATA WHAREHOUSES FOR CONTINUAL PREDICTIVE ANALYSIS.

THERE IS NO SUCH THING AS A CYBER ATTACK OTHER THAN ONES CAUSED OR ALLOWED BY BILDERBERG.

THIS IS AN ABSOLUTE FACT AND INCONTROVERTIBLE!


All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Anti_Illuminati

  • Guest
Bilderberg WAPO is officially assisting Jay Rockefeller's CYBER FALSE FLAG PLAN
« Reply #12 on: February 18, 2010, 09:31:34 am »

This latest attack does not appear to be linked to the Google intrusion, said Amit Yoran, NetWitness's chief executive. But it is significant, he said, in its scale and in its apparent demonstration that the criminal groups' sophistication in cyberattacks is approaching that of nation states such as China and Russia.

The attack also highlights the inability of the private sector -- including industries that would be expected to employ the most sophisticated cyber defenses -- to protect itself.
GET THE F*CKING ENTERPRISE ARCHITECTURE THE F*CK OFF OF ALL OF THE COMPUTERS DUMBASSES, THEY ARE ALL BACKDOORED WITH ADVANCED VERSIONS OF MICHAEL RICONOSCIUTO'S PROMIS CODE.  AMIT YORAN IS A CYBERTERRORIST WORKING FOR THE NWO AND MUST BE ARRESTED!

http://www.nationalcorruptionindex.com/pages/profile.php?profile_id=499
NetWitness Corporation
Last Updated: October 13, 2008

NetWitness, a subsidiary of defense contractor ManTech International, builds datamining programs that lurk undetected on computer networks, eavesdropping on their users and sorting the data. The company unveiled in September 2007 its first commercial product, a $40,000 program that captures everything that happens on a computer network and analyzes it, even going so far to reconstruct the activities of a single user. The program is designed to help customers find spying and downloading threats that come not from outside hackers but from users inside the network.

NetWitness has developed software for the Defense Department, and now boasts as its CEO former U.S. Cyber Security chief Amit Yoran. Yoran has worked at the highest levels of computer security and data collection, including stints as an executive for anti-virus behemoth Symantec; as CEO of In-Q-Tel, the investment arm of the CIA; and as the Director of National Cyber Security, in the U.S. Department of Homeland Security. His tenure as Cyber Security Chief lasted only 11 months.

NetWitness also employs Shawn Carpenter, a cyber security specialist fired by Sandia National Labs after notifying the FBI that hackers based in China had penetrated the servers on the network where U.S. nuclear weapons are designed. (Sandia is owned by defense giant Lockheed Martin.) Carpenter is the principal forensic analyst at NetWitness.

ManTech International is a defense contractor with more than $1 billion in revenue, much of it in U.S. military intelligence contracts. It is at the center of a land swap scandal that got U.S. Rep. Rick Renzi, (R-Arizona) indicted in February 2008. Renzi, whose late father was a ManTech executive, announced in 2007 he would not run for re-election.
Categories

    * Startup Led by Ex-DHS Cyberchief Rolls Out Forensics Tool, Dark Reading, September 10, 2007: www.darkreading.com/document.asp?doc_id=133432&WT.svl=news2_1
    * Cyberspies Target Silent Victims, Forbes, September 11, 2007: www.forbes.com/security/2007/09/11/cyberspies-raytheon-lockheed-tech -cx_ag_0911cyberspies.html
    * GOP Rep. Renzi Indicted, TPMmuckraker.com, February 22, 2008: tpmmuckraker.talkingpointsmemo.com/2008/02/breaking_gop_rep_renzi_in dicte.php
________________________________________
http://www.nationalcorruptionindex.com/pages/profile.php?profile_id=461

ManTech International Corporation
Last Updated: October 14, 2008

In the first year following the attacks of September 11th 2001 – a watershed year for companies supplying anything remotely useful in defending the United States from terrorism – ManTech went public, increased its revenues nearly 16 percent and posted revenues of $500 million for the first time in its history. In 2001, it had $203 million in federal contracts; in 2006, it broke $1 billion in revenue and its CEO predicted it would soon reach $5 billion.

It also made an investment that would quickly pay off – backing a Senate candidate whose father was then a senior ManTech executive. According to the Center for Responsive Politics, ManTech’s executives and PAC donated $14,700 to the 2002 campaign of Rick Renzi, Arizona Republican and the son of Eugene Renzi, then President of ManTech’s Defense Systems division. (Eugene Renzi died in February 2008.)

Renzi won the election, and he proved himself invaluable to ManTech almost immediately. He wrote a special rider for a military training bill that allowed ManTech to wriggle out of a federal agreement to preserve the threatened San Pedro River in Arizona. ManTech has a contract worth $1.1 billion with an Army base on the river; Renzi’s rider preserved ManTech’s contract, but not the river. It ran dry for eight days in 2005.

Renzi came under fire in late 2006 for this and other maneuvers. In 2008, he was indicted on charges of money laundering, fraud and extortion. Those charges say that Renzi abused his office to stuff money into the pockets of a friend and campaign donor, but he has also been investigated for favors he did for ManTech.

(Renzi also benefited from the politically-driven firings of at least eight U.S. Attorneys in 2006, many of whom were leading corruption investigations into Republican officials. Arizona’s U.S. Attorney, Paul Charlton, had been investigating Renzi for more than a year when he was fired, one month after an aide to Renzi called him up to ask about the investigation, an action that could be construed as attempting to intimidate the prosecutor, and is illegal.)

Renzi, in the face of these multiple investigations, announced that he would not seek re-election in 2008. But after his indictment, he refused to resign from Congress.
 
Before 2002, few people outside of the lucrative world of federal defense spending and contracting would have heard of ManTech.  Not long ago, it was a relatively small company selling high-tech software systems to the military; by 2008, it was deploying its staff to work along side soldiers in Afghanistan and Iraq; gathering and analyzing intelligence for the military; conducting background checks on people working for the National Security Agency; and developing sophisticated datamining software.

In addition to having its very own U.S. senator in Renzi, ManTech recruited many well-connected people to its staff and its board:  former Deputy Secretary of State Richard Armitage is a director; one of its subsidiaries is run by Amit Yoran, the one-time head of U.S. cybersecurity; and more than half of ManTech’s 5,000 employees have top-level classified security clearances. It acquires companies that have toeholds in lucrative areas of defense technology, allowing the company to expand its areas expertise:  In 2005, it bought Gray Hawk Systems Inc., which was one of the primary contractors for the CounterIntelligence Field Activity agency. (Gray Hawk was investigated for its association with MZM Inc., a defense contractor whose CEO has pleaded guilty to bribery and corruption charges.) A list of key companies that ManTech has acquired since 2002 is below.

And like all companies vying for government money, ManTech lobbies the politicians who can influence federal defense spending. It tends to favor the people who represent its home district of suburban Virginia. Rep. Jim Moran, D-Virginia, received $15,900 from ManTech’s employees and its political action committee in 2006, and $40,500 in 2004, according to the Center for Responsive Politics. Moran sits on the House Appropriations Committee.

ManTech also owns NetWitness Corp., which began as a division within the company. NetWitness builds datamining programs that lurk undetected on computer networks, eavesdropping on their users and sorting the data. NetWitness has developed the software for the Defense Department, and now boasts as its CEO Amit Yoran. Yoran has worked at the highest levels of computer security and data collection, including stints as an executive for anti-virus behemoth Symantec; as CEO of In-Q-Tel, the investment arm of the CIA; and as the Director of National Cyber Security, in the U.S. Department of Homeland Security.

Acquisitions:

Aegis Research Corp. in 2002 for $70 million. Aegis had contracts to provide computer system security to Defense agencies like the Air Force and the Counterintelligence Field Activity agency. (CIFA, conceived with the help of a man working for MZM, a defense contractor at the heart of the U.S. Rep. Randall “Duke” Cunningham scandal, was plagued by scandal almost since its inception. The Pentagon closed it in 2008.) ManTech acquired Aegis about a year before the war in Iraq would make those contracts even more valuable.

CTX Corp. in 2002 for $35 million. CTX had contracts with several U.S. intelligence agencies, for whom it was developing and running datamining programs.

Gray Hawk in 2005 for $100 million.  Gray Hawk designed and ran information technology systems for intelligence agencies. It won several contracts from CIFA shortly after its creation in 2003. Gray Hawk hired away three CIFA executives who had helped award contracts for the agency, won tens of millions in CIFA contracts, and passed many of them along to another defense contractor, MZM Inc. MZM’s founder and director Mitchell Wade later pleaded guilty to paying more than $1 million in bribes to Duke Cunningham. Gray Hawk has been under federal investigation because of its ties to Wade and MZM.

Integrated Data Systems in 2003 for $62.7 million. IDS designed software for sharing classified information on secure networks. Its clients included the National Security Agency and the CIA.

MSM Security Services in 2003 for $5.25 million. MSM performed background checks on prospective employees of sensitive agencies, including the State Department.  MSM later turned out to be less profitable than ManTech hoped, so the company sold it four years later to ManTech’s founder and CEO, George Pedersen.

SRS Technologies in 2007 for $170 million. SRS had more than $750 million in federal contracts at the time of its sale, including some for support services for missile defense. SRS was a prime contractor for the infamous Total Information Awareness program, a project that proposed to gather and analyze everything stored on computer databases, including the personal information in credit card and medical records. Congress, in the midst of public uproar over TIA’s potential for privacy invasion, cut off its funding in 2003.  SRS worked on TIA, and it also hired a subcontractor that requested and received the personal information of millions of people who flew on the airline JetBlue.

    * www.homelanddefensestocks.com/Companies/HomelandDefense/Stock_List.a sp
    * ManTech International Corporation (NASDAQ: MANT)
    * ManTech’s success fulfills George Pedersen’s lifelong ambition, Washington Technology, September 4, 2006: www.washingtontechnology.com/print/21_17/29217-1.html
    * Are Renzi Scandals Connected? TPM Muckraker, October 25, 2006
    * www.tpmmuckraker.com/archives/week_2006_10_22.php
    * Outsourcing the Pentagon, The Center for Public Integrity, September 29, 2004:
    * secure.publicintegrity.org/pns/report.aspx?aid=386
    * Election spending, from the Center for Responsive Politics:
    * 2006:
    * www.opensecrets.org/pacs/lookup2.asp?strID=C00208983
    * 2004:
    * www.opensecrets.org/pacs/lookup2.asp?strid=C00208983&cycle=2004< /a>
    * 2002:
    * www.opensecrets.org/pacs/lookup2.asp?strid=C00208983&cycle=2002< /a>
    * 2007 Post 200, Washington Post:
    * projects.washingtonpost.com/post200/2007/MANT/
    * Washington Technology Magazine Top 100 Federal Prime Contractors, 2007:
    * www.washingtontechnology.com/top-100/2007/31.html
    * Washington Technology Magazine Top 100, 2006:
    * www.washingtontechnology.com/top-100/2006/21.html
    * Washington Technology Magazine Top 100, 2005
    * www.washingtontechnology.com/top-100/2005/21.html
    * Washington Technology Magazine Top 100, 2004:
    * www.washingtontechnology.com/top-100/2004/22.html
    * Washington Technology Magazine Top 100, 2003:
    * www.washingtontechnology.com/top-100/2003/36.html
    * Washington Technology Magazine Top 100, 2001.
    * www.washingtontechnology.com/top-100-2001/top-100.html
    * Contract round up, Washington Technology, January 16, 2006:
    * www.washingtontechnology.com/print/21_01/27749-1.html
    * Corporate investor overview
    * phx.corporate-ir.net/phoenix.zhtml?c=130660&p=irol-IRHome
    *  A Few Good Recruits, Washington Post, February 28, 2005
    * www.washingtonpost.com/ac2/wp-dyn/A58237-2005Feb27?language=printer< /a>
    * ManTech closes SRS Technologies deal, Washington Technology, May 8, 2007
    * www.washingtontechnology.com/online/1_1/30584-1.html
    * ManTech Acquires Gray Hawk in Bid to Break the $1B Barrier, Defense Industry Daily, May 12, 2005
    * www.defenseindustrydaily.com/2005/05/mantech-acquires-gray-hawk-in-b id-to-break-the-1b-barrier/index.php
    * Capitol Crooks, USNews and World Report, September 17, 2006 :
    * www.usnews.com/usnews/news/articles/060917/25mzm_2.htm
    * Stephen Cambone, Rumsfeld’s henchman, Asia Times, May 25, 2004:
    * www.atimes.com/atimes/Front_Page/FE25Aa02.html
    * Army Admits Using JetBlue Data, Wired, September 23, 2003:
    * www.wired.com/politics/security/news/2003/09/60540
    * Armitage on Board, Washington Post, June 16, 2005:
    * www.washingtonpost.com/wp-dyn/content/article/2005/06/15/AR200506150 0869_pf.html
    * Press release about ManTech training Army soldiers to use armored vehicle:
    * www.forceprotection.net/news/news_article.html?id=15
    * M&A Roundup: ManTech Acquires Two Firms, Washington Technology, March 10, 2003:
    * www.washingtontechnology.com/print/17_23/20204-1.html
    * ManTech to Acquire IDS, Washington Technology, February 25, 2003:
    * www.washingtontechnology.com/online/1_1/20159-1.html
    * U.S. Defense Firms Consolidate as War Goes High Tech, The Washington Post, May 27, 2003:
    * www.corpwatch.org/article.php?id=7868
    * MANTECH TO BUY AEGIS RESEARCH FOR $70 MILLION, NYTimes, July 3, 2002: query.nytimes.com/gst/fullpage.html?res=9E04E4DC1531F930A35754C0A964 9C8B63
    * ManTech Makes a Deal, Washington Technology, July 15, 2002:
    * www.washingtontechnology.com/print/17_8/18554-1.html
    * Press Release CTX, note former CIA executive in charge of ManTech Science and Technology division
    * investor.mantech.com/phoenix.zhtml?c=130660&p=irol-newsArticle&a mp;ID=363318&highlight=
    * ManTech to acquire CTX Corp., Washington Technology, December 6, 2002:
    * www.washingtontechnology.com/online/1_1/19598-1.html
    * CTX Profile from Goliath:
    * goliath.ecnext.com/coms2/product-compint-0001168327-page.html
    * ManTech Receives up to $300M to Support US forces in Iraq & Afghanistan, Defense Industry Daily, January 6, 2006:
    * www.defenseindustrydaily.com/mantech-receives-up-to-300m-to-support- us-forces-in-iraq-afghanistan-01710/
    * One Hundred fastest-growing tech companies, Business 2.0, 2007
    * money.cnn.com/magazines/business2/b2fastestgrowing/2007/snapshots/45 .html
    * ManTech Revenue up nearly 16 percent in 2002, earning $500 million in revenue for first time ever:
    * investor.mantech.com/phoenix.zhtml?c=130660&p=irol-newsArticle&a mp;ID=388258&highlight=

Offline Satyagraha

  • Global Moderator
  • Member
  • *****
  • Posts: 8,941
Re: 75,000+ Computer Systems Hacked: PTech player Amit Yoran says...
« Reply #13 on: February 18, 2010, 09:36:17 am »

Somehow I think this might wind up being blamed on Iran. More fuel to the fire to get us into a war.
And  the King shall answer and say unto them, Verily I say unto you, 
Inasmuch as ye have done it unto one of the least of these my brethren,  ye have done it unto me.

Matthew 25:40

Anti_Illuminati

  • Guest
Re: 75,000+ Computers hacked by Michael Riconosciuto's PROMIS based code
« Reply #14 on: February 18, 2010, 10:17:03 am »
http://www.free-conversant.com/realtruth/1334

Israelis Hold Keys to NSA and U.S. Government Computers Christopher Bollyn - American Free Press - Url.:
http://www.rumormillnews.com/cgi-bin/forum.cgi?noframes;read=89717
http://forpressfound.blogspot.com/2006/09/israelis-hold-keys-to-nsa-and-us.html

CRITICAL U.S. GOVERNMENT AND MILITARY COMPUTER NETWORKS USING ISRAELI SECURITY" SOFTWARE
The most critical computer and communication networks used by the U.S. government and military are secured by encryption software written by an Israeli "code breaker" tied to an Israeli state-run scientific institution. The National Security Agency (NSA), the U.S. intelligence agency with the mandate to protect government and military computer networks and provide secure communications for all branches of the U.S. government uses security software written by an Israeli code breaker whose home office is located at the Weizmann Institute in Israel.

A Bedford, Massachusetts- based company called RSA Security, Inc. issued a press release on March 28, 2006, which revealed that the NSA would be using its security software: "U.S. Department of Defense Agency Selects RSA Security Encryption Software" was the headline of the company's press release which announced that the National Security Agency had selected its encryption software to be used in the agency's "classified communications project."

RSA stands for the names of the founders of the company: Ronald L. Rivest, Adi Shamir, and Leonard M. Adleman. Adi Shamir, the lead theoretician, is an Israeli citizen and a professor at the Weizmann Institute, a scientific institution tied to the Israeli defense establishment. The RSA press release is just the icing on the cake; the keys to the most critical computer networks in the United States have long been held in Israeli hands.

Unisys integrated Israeli security software, provided by the Israel-based Check Point Software Technologies and Eurekify, into its own software, so that Israeli software, written by Mossad-linked companies, now "secures" the most sensitive computers in the U.S. government and commercial sector.

RSA was acquired by an Israeli-run security software company, named Cyota, at the end of 2005 for $145 million. In January 2005, Cyota announced that security expert" Amit Yoran, had joined the company's board of directors. Prior to becoming a director at Cyota, Yoran, a 34-year old Israeli, had already been the national "Cyber Czar," having served as director of the Department of Homeland Security's National Cyber Security Division. YORAN HAD BEEN APPOINTED "CYBER CZAR" AT AGE 32 BY PRESIDENT GEORGE W. BUSH IN SEPTEMBER 2003.

Before joining DHS, Yoran had been vice president for worldwide managed security services at Symantec. Prior to that, he had been the founder, president and CEO of Riptech, Inc., an information security management and monitoring firm, which Symantec acquired in 2002 for $145 million.

Yoran and his brother Naftali Elad Yoran are graduates of the U.S. Military Academy at Westpoint. Elad graduated in 1991 and Amit in 1993. Along with their brother Dov, the Yoran brothers are key players in the security software market. Amit has also held critical positions in the U.S. government overseeing computer security for the very systems that apparently failed on 9/11. Before founding Riptech in 1998, Yoran directed the vulnerability- assessment program within the computer emergency response team at the US Department of Defense. Yoran previously served as an officer in the United States Air Force as the Director of Vulnerability Programs for the Department of Defense's Computer Emergency Response Team and in support of the Assistant Secretary of Defense's Office.

In June 2005, Yoran joined the board of directors of Guardium, Inc., another Mossad-spawned "provider of database security solutions" based in Waltham, Massachusetts. GUARDIUM IS LINKED WITH PTECH, AN APPARENT MOSSAD "CUT OUT" COMPUTER SECURITY COMPANY LINKED WITH THE 9/11 ATTACKS. Ptech, a computer software company in Quincy, Mass., was supposedly a small start-up company founded by a Lebanese Muslim and funded by a Saudi millionaire. Yet Ptech's clients included all the key federal governmental agencies, including the U.S. Army, the U.S. Air Force, the U.S. Naval Air Command, Congress, the Department of Energy, the Federal Aviation Administration, the Internal Revenue Service, NATO, the Federal Bureau of Investigation, the Secret Service and even the White House.

The marketing manager at Ptech, Inc. when the company started in the mid-1990s, however, was not a Muslim or an Arab, but an American Jewish lawyer named Michael S. Goff who had suddenly quit his law firm for no apparent reason and joined the Arab-run start-up company.

9/11 & "INTEROPERABILITY ISSUES" BETWEEN THE FAA AND NORAD
Indira Singh, a consultant who had worked on a Defense Advanced Research Project, pointed to Ptech and MITRE Corp. being involved in computer interoperability issues" between the FAA and NORAD. At this time Ptech's ties to Arabs was the focus, and Goff was out of the picture.

"Ptech was with MITRE Corporation in the basement of the FAA for two years prior to 9/11," Singh said. "Their specific job is to look at interoperability issues the FAA had with NORAD and the Air Force in the case of an emergency. If anyone was in a position to know that the FAA - that there was a window of opportunity or to insert software or to change anything - it would have been Ptech along with MITRE."

The Mossad-run Guardium company is linked with Ptech through Goff Communications, the Holliston, Mass.-based public relations firm previously run by Michael S. Goff and his wife Marcia, which represents Guardium. Since being exposed in AFP in 2005, however, Michael's name no longer appears on the company website.

Amit Yoran, and his brother reportedly grew up in Pound Ridge, New York during the 1970s and 1980s, the heads of the Jewish community told AFP that they had never heard of him. One said that she had conducted a survey of the Jews living in the small village of Pound Ridge in the 1970s and she would have remembered if a wealthy Israeli family named Yoran had been found. Probably because they were NOT in Pound Ridge - but in Israel. The Pound Ridge address was used to give the appearance that the Yorans were Americans I spoke with Elad and he has a distinctive Israeli accent - not what you would expect for a guy who grew up in a posh Yankee village. HOW COULD THEY HAVE LIVED FOR 20 YEARS IN POUND RIDGE AND NOT BE REMEMBERED? clip..

Offline ekimdrachir

  • Member
  • *****
  • Posts: 7,144
  • METATRON ON
    • Go Outside
Re: 75,000+ Computers hacked by Michael Riconosciuto's PROMIS based code
« Reply #15 on: February 18, 2010, 10:20:26 am »
Oh no hackers! Let's use skynet to fight the virus!

Anti_Illuminati

  • Guest
Re: 75,000+ Computers hacked by Michael Riconosciuto's PROMIS based code
« Reply #16 on: February 18, 2010, 10:47:28 am »
Remember when Rod Beckstrom resigned?  That's what I thought the below article was going to be about when I read the thread title, but it wasn't:

http://web.archive.org/web/20041209095744/http://www.azfamily.com/sharedcontent/ptech/generalstories2/100104ccjccwNatCybersecurity.2a785805.html

U.S. cybersecurity chief abruptly resigns

October 1, 2004

By TED BRIDIS
AP Technology Writer

WASHINGTON, D.C. — The government's cybersecurity chief has abruptly resigned from the Homeland Security Department amid a concerted campaign by the technology industry and some lawmakers to persuade the Bush administration to give him more authority and money for protection programs.

Amit Yoran, a former software executive from Symantec Corp., made his resignation effective Thursday as director of the National Cyber Security Division, giving a single's day notice of his intention to leave. He kept the job one year.

Yoran has privately confided to industry colleagues his frustrations in recent months over what he considers the department's lack of attention paid to computer security issues, according to lobbyists and others who recounted these conversations on condition they not be identified because the talks were personal.

Yoran said Friday he "felt the timing was right to pursue other opportunities." It was unclear immediately who might succeed him even temporarily. Yoran's deputy is Donald A. "Andy" Purdy, a former White House adviser on cybersecurity.

A department spokeswoman, Tasia Scolinos, praised Yoran as a valuable contributor. "Cybersecurity will continue to be a priority of the Department of Homeland Security, and we plan to move quickly to fill the position with someone who has demonstrated leadership in this important field," she said.

As cybersecurity chief, Yoran and his division - with an $80 million budget and 60 employees - were responsible for carrying out dozens of recommendations in the Bush administration's "National Strategy to Secure Cyberspace," a set of proposals to better protect computer networks.

Yoran's position as a director - at least bureaucratic three steps below Homeland Security Secretary Tom Ridge - has irritated the technology industry and even some lawmakers. They have pressed unsuccessfully in recent months to elevate Yoran's role to that of an assistant secretary, which could mean broader authority and more money for programs.

Rep. Zoe Lofgren, D-Calif., complained that Yoran's surprise departure was "yet another setback in the effort to protect our nation's cyber infrastructure," and described the efforts as "in complete disarray." Lofgren and Rep. Mac Thornberry, R-Texas, leaders on the House Homeland Security Subcommittee on Cybersecurity, have introduced a bill - now stalled in Congress - to make Yoran's job an assistant secretary's position.

Senior department officials consider equally important the protection of the nation's physical structures, such as bridges and buildings, and computer networks, which regulate the flow of electricity, phone calls, finances and other information. They maintain that gauging risks to physical structures and computers separately is inefficient and expensive because common problems threaten both.

Under Yoran, Homeland Security established a cyber alert system, which sends urgent e-mails to subscribers about major virus outbreaks and other Internet attacks as they occur, along with detailed instructions to help computer users protect themselves.

It also mapped the government's universe of connected electronic devices, the first step toward scanning them systematically for weaknesses that could be exploited by hackers or foreign governments. And it began routinely identifying U.S. computers and networks that were victims of break-ins.

"Amit's departure provides a challenge for industry and its relationship with the department on cybersecurity," said Shannon Kellogg, director of government affairs for RSA Security Inc., a leading security firm. "He knew how to get the job done."

Yoran effectively took over some responsibilities once assigned to Richard Clarke, a special adviser to President Bush, and to Howard Schmidt
, who succeeded Clarke but left government during the formation of the Homeland Security Department to work as chief security officer at eBay Inc.

Yoran cofounded Riptech Inc. of Alexandria, Va., in March 1998, which monitored government and corporate computers around the world with an elaborate sensor network to protect against attacks. He sold the firm in July 2002 to Symantec for $145 million and stayed on as vice president for managed security services.


© 2004 The Associated Press. All rights reserved. This material may not be published, broadcast, rewritten or redistributed.

Anti_Illuminati

  • Guest
Re: 75,000+ Computers hacked by Michael Riconosciuto's PROMIS based code
« Reply #17 on: February 18, 2010, 11:02:04 am »
http://www.stewwebb.com/nsa_spying_9-11_cover-up_reaching_critical_mass.htm

THE NSA SPYING 9-11 COVER-UP REACHING CRITICAL MASS

THE TIME IS NOW THE MATCH IS HOT

June 22, 2006

www.stewwebb.com

By Tom Heneghan

Four U.S. Senators, Pat Roberts (R. Kansas), William Frisk (R. Tenn.) along with Diane Republican-in-the-Closet Feinstein (D. Ca.) and Hillary Extortion-Friendly Lesbian Clinton-Rodenhurst are this time preventing New Jersey Attorney-General from having access to documents of Congressional investigations which are relevant to a State of New Jersey inquiry involving the use of Ptech Software aka encrypted code breaking technology which fingers the infamous Urban Moving Systems, Dancing Israelis link to 9/11, New Jersey phone companies and the F.A.A. (Federal Aviation Authority).

It can now be reported that the N.S.A. actually set loose an East coast dragnet  a.k.a. a spy program on September 10, 2001. Both Mega-MOSSAD agent Michael Chertoff, now head of U.S. Homeland Security and U.S. Department of Justice stooges Paul McNulty and Larry Thompson (former Deputy Attorney-General) have assisted in the obstruction of justice. The N.S.A. ordered the September 10th dragnet after French Intelligence had penetrated the 9/11 plot vis a vis The Wildcard in Toronto, Canada as it connected to the compromised U.S.-Canadian Red-Blue war games and the U.S. Justice Department Red-Blue war games which were mock drills that went live on September 11th. "The Mock Drill Became the Real Thing."

Accordingly, we can now report that there was a direct attempt to spy on the U.S. State Department which had received the warning at exactly 9:05 AM Eastern Standard Time on September 10, 2001.

Muzzled FBI translator Sibel Edmonds had decoded the encrypted messages sent from the The Weizmann Institute of Science in Israel to the American Turkish Counsel. The decoded message was the direct 9-11 command order "The time is now, the match is hot." (This was giving the green light to the 9/11 attack on America)

Note: The Weizman Institute in Israel is now used as a cover for Black Ops a.k.a. Ptech Software. In fact, other encrypted codes that were intercepted by Sibel Edmonds were messages from the Weizman Institute to the basement of the F.A.A. (Federal Aviation Authority) a.k.a. the wife of former Senator Tom Daschle (D. S.D.).

It should be noted that Saudi businessman Yassin Kadi along with the U.A.E. and Israeli Zim Corporation, helped market the Ptech Software System to the Pentagon with the financing involving noted Bush-Clinton Crime Syndicate Bucket Shop, the Riggs Bank, Washington, D.C.

Note: Riggs Bank was fined for loose rules involving alleged Al Qaeda money-laundering and Yassin Kadi has been listed by the FBI as a major worldwide terrorist suspect. It should also be noted that Kadi had a close personal relationship to U.S. CIA Custodial stooge Ali Mohammed (a terrorist) recently released by the U.S. Justice Dept.

Note: It was indicted White House aide MOSSAD agent Scooter Libby, soon to be pardoned as was his client Marc Rich, that was the liaison between Riggs Bank, Saudi Arabia, The Weizman Institute and the placing of the Ptech Software into the U.S. Pentagon pre-September 11th.

Note: Ptech Software failed to detect the Attack On America but was fully engaged under the command and control of Vice-President Dick Cheney in scripting the 9/11 War Games aka mock drills that became the real thing.

P.S. The current head of U.S. Cyber-Security is now an Israeli double agent Amit Yoran. Yoran, himself a MOSSAD agent, now has complete control over all U.S. National Security encrypted codes a.k.a. Ptech Software. Of course, Yoran received his position post-September 11th, on the recommendations of Michael Chertoff, Douglas Feith and Dick Cheney. Yoran regularly lunches with Scooter Libby.

P.P.S. Tom Ridge, former head of U.S. Homeland Security, actually launched a green quest inquiry of Ptech Software, New Jersey phone companies, and elements of NSA and FBI that had 9/11 problems. This was blocked and obstructed by then Deputy Attorney-General Michael Chertoff aka MOSSAD agent.

PPPS - Ptech, with its headquarters in Bedford, Mass. with links to the U.S. offices of the Weizman Institute in Quincy, Mass. has clearly been used by 9/11 co-conspirators, Marvin Bush, Houston Casualty Insurance (Boston, Mass.) and Bushfraud's third cousin and Year 2004 Electoral College stooge, John Skull & Bones Kerry-Cohen to reap a financial windfall from 9/11.

It should also be noted that Logan Airport in Boston was using Ptech Software on Sept. 11/01 and still does today.

Reference: Congratulations to Morton Kondrake of Fox News. Lets read all this classified info on WMD and the alleged Saddam 9/11 link.

We may get to see the Udday Hussein letter to Russian P.M. Putin on MSNBC rather than have to look at it only on www.StewWebb.com Plus we may also get to read the French Intelligence warning to America aka the U.S. State Dept. on Sept. 10/01. The direct reference being "the time is now; the match is hot."

Anti_Illuminati

  • Guest
ALERT, NWO EXECUTING MASSIVE CYBER FALSE FLAGS-YOU WERE WARNED
« Reply #18 on: February 18, 2010, 11:04:25 am »

Amit Yoran

The Department of Homeland Security is charged with securing the government's nonmilitary networks, and cybersecurity experts said the Obama administration will have to better define the extent of this military support to Homeland Security. "It's a fine line" between providing needed technical expertise to support federal agencies improving their own security and deeper, more invasive programs, said Amit Yoran, a former senior cybersecurity official at the Homeland Security Department.

Years earlier the Israeli Michael Goff working for PTech, an arab owned software company that developes key enterprise software for many government institutions like Norad and FAA, using his secure channel with another Israeli Amit Yoran, somehow manages to give Israeli army computer programmers access to this critical computer code. It was due to this manipulation that the hijackings on 9/11 remained unnoticed by the flight controller of Norad. Once this was in place the planes could be taken over by remote control and flown into the World Trade Center.

The hijacking of airliners by remote control had been tested as a dress rehearsel for 9/11 on the Egypt Air flight 990 that crashed into the Atlantic on october 31, 1999.
________________________________________________________________________
http://www.guardium.com/index.php/prprint/380

Nation’s Former Cyber Security Chief Joins Guardium Board of Directors
Amit Yoran to Provide Insight and Guidance to the Leading Database Security Company


WALTHAM, MA, June 16, 2005 – Guardium, Inc., a leading provider of database security solutions, today announced that Amit Yoran, a renowned expert in cyber security, has joined its board of directors. Mr. Yoran, who formerly served as the Bush Administration’s cyber security chief, will provide invaluable guidance into the security risks facing global enterprises and ways in which Guardium can help companies mitigate critical data security exposure.

“Databases and the information they store represent very critical corporate assets. They also rank among the most vulnerable and frequent cause of significant business disruption,” said Amit Yoran, President of Yoran Associates. “I am pleased to join Guardium’s board of directors because their database security solutions provide innovative, effective ways to safeguard the data stores typically considered an organization’s crown jewels. These types of solutions are and will increasingly be a fundamental and critical component of every information protection strategy.”

“We are extremely pleased that Amit Yoran, an internationally distinguished cyber security leader and visionary, is joining Guardium’s board of directors,” said Ram Metser, President and CEO of Guardium. “We are gratified he is joining based on his strong belief in our direction and solutions, and we are confident that Mr. Yoran will contribute significantly to our continued high growth.”

Mr. Yoran is President of Yoran Associates, a firm providing advisory services to global enterprises on technology strategies for addressing business exposure. Working with the Secretary of Homeland Security, Mr. Yoran was appointed by President Bush as the Administration’s cyber chief, responsible for coordinating national cyber security activities. Mr. Yoran previously served as CEO of Riptech until its acquisition by the Symantec Corporation, where he served as Vice President of Worldwide Managed Security Services.

About Guardium
Headquartered in Waltham, MA, Guardium (http://www.guardium.com) develops and delivers innovative database security solutions that remove complexity, and provide visibility and effective controls over database access activities of IBM, Oracle, Microsoft, and Sybase environments. Guardium’s family of non-intrusive, robust applications addresses key database security concerns that include database security assessment, access policy control and enforcement, auditing, and regulatory compliance. Guardium’s growing customer base includes some of the world’s most technically advanced organizations representing a wide range of industries. Financial services, telecommunications, media, manufacturing, healthcare, and government organizations trust Guardium’s solutions to protect their mission critical data and handle their compliance challenges. Guardium investors include the Cedar Fund, Veritas Venture Partners, and StageOne Ventures.

--------------------------------------------------------------------------------

Copyright © 2006 Guardium. All rights reserved. Information in this document is subject to change without notice. Guardium, SQL Guard, Safeguarding Databases, SQL HealthGuard, SQL AuditGuard, SQL PolicyGuard, SQL RemoteGuard, and SQL Guard Security Suite are trademarks of Guardium, Inc. All other trademarks and trade names are the property of their respective companies. Copying and redistribution of this material is expressly permitted by the copyright owner.

Press Contacts:
Corinne Sheen or Adam Parken
Corporate Ink
617-969-9192
________________________________________________________________________
Excerpt:

http://news.cnet.com/8301-13578_3-10009603-38.html

August 7, 2008 5:00 AM PDT
'Cybersecurity commission' to proffer advice to next president

LAS VEGAS--Transitions between presidential administrations are typically influence-peddling, power-consolidating, appointee-vetting exercises run by Washington insiders. Perhaps that's why the quintessential Washington think tank, the Center for Strategic and International Studies, is trying to insert itself into the process.

The private organization, which has close ties to the U.S. military and counts Henry Kissinger on its payroll, has gathered about 35 people and awarded them the official-sounding title of "Commission on Cyber Security for the 44th Presidency." Adding to the formality are some closed-to-the-public meetings and ex-officio members from federal agencies, congressional offices, and the nebulous "intelligence community."

One panelist said that the FBI's "InfraGard" information-sharing relationships with the private sector shouldn't change.

"We're not recommending to do away with InfraGard," said Jerry Dixon, director of analysis at the Team Cymru research firm, a former Homeland Security official, and a commission member. "That's something that the executive departments have set up... We're certainly not recommending to do away with those different partnerships because they belong to the different departments."

The CSIS panel is composed mostly of industry, government, and ex-government types. Among the other members: Mary Ann Davidson, Oracle's chief security officer; Doug Maughan, a Homeland Security program manager; Will Pelgrin of New York's cybersecurity office; Phil Reitinger, a Microsoft security strategist; and Amit Yoran, chairman of NetWitness and a former Homeland Security official.

The commission plans to publish the final report in "early November" and, perhaps, an earlier draft for public comment.

"It has to be elevated to the highest echelons of this government and internationally," Tom Kellermann, a vice president at Core Security Technologies, a former World Bank security official, and a commission member, said, referring to cybersecurity topics. "We're losing the war. It's essential. That's the key theme of the recommendations that will come out."

http://www.bloomberg.com/apps/news?pid=newsarchive&sid=arSqdOLQVK9g#

Louie, who was based in San Francisco during the dot-com heyday, went on to build the flight-simulation game F-16 Fighting Falcon. In-Q-Tel tapped him in 1999 when he was head of toymaker Hasbro Inc.'s interactive unit. Louie quit in December 2005. He says he had started to sound more like a federal employee than a techie. The CIA awarded him the Seal Medallion, an award that recognizes the contributions of nonagency personnel, the next year.

In a world rocked by the Sept. 11 attacks and the U.S. invasion of Iraq, In-Q-Tel's board sought a leader with better counterterrorism credentials. It hired Amit Yoran, 37, former director of the Department of Homeland Security's national cybersecurity division, which is charged with protecting the U.S. from Internet-based threats.

Entrepreneur/Executive

Yoran left four months later, in April 2006. He joined Herndon, Virginia-based NetWitness Corp., an Internet security startup, that November. In-Q-Tel then approached Mark Frantz, one of its managing general partners, who'd joined from buyout firm Carlyle Group. He declined and quit two months after Yoran, leaving the spy fund to Interim Chief Financial Officer Scott Yancey until Darby took over.

Amit Yoran, CEO, Yoran Associates
                               
Amit Yoran is president and CEO of Yoran Associates and currently serves as an independent director and advisor to several early stage security technology companies and large corporations. He was appointed by President Bush as the Administration's cyber chief, responsible for coordinating the national activities in cyber security. Working with the Secretary of Homeland Security, Mr. Yoran coordinated among federal departments, law enforcement and intelligence efforts, as well as direct interaction with many leading IT and IT security companies. These efforts were particularly focused on protection of the 13 critical infrastructures of the United States. Prior to joining the Bush Administration, Mr. Yoran was the Vice President of Worldwide Managed Security Services at the Symantec Corporation. Mr. Yoran was the co- founder of Riptech, a market leading IT security company, and served as its CEO until the company was acquired by Symantec. He previously served an officer in the US Air Force as the Director of Vulnerability Programs for the Department of Defense's Computer Emergency Response Team. Mr. Yoran received a Master of Science degree from the George Washington University and Bachelor of Science from the United States Military Academy at West Point.[/color]

See this post:  BAH - WARGAMING *ALERT* - INTERNET FALSE FLAG - Preemptively Exposed

http://forum.prisonplanet.com/index.php?topic=87140.msg506510#msg506510
________________________________________________________________________
http://www.guardium.com/index.php/pr/724

Guardium Hosts Executive Cybersecurity Seminar on Best Practices for Database Security, Privacy & Compliance

Leading Data Protection Experts Highlight Pressing Government Issues Including Cybersecurity and Emerging Threats

WALTHAM, Mass. (June 2, 2009) - Guardium, the database security company, is hosting a “Best Practices for Data Security, Privacy & Compliance” seminar, featuring Gartner’s John Pescatore, Booz Allen Hamilton’s Andy Singer and Guardium CTO Ron Ben Natan, Ph.D. The seminar will be held on June 16th from 8 a.m. to 12 p.m. at the Ritz Carlton, Pentagon City in Arlington, VA.

According to a recent report from IBM, SQL injection attacks jumped 134% in 2008, increasing from an average of a few thousand per day in 2007 to 450,000 attacks per day.  The report also states that China has now surpassed Russia and the U.S as the country hosting the most malicious Websites.

And a data breach study by Verizon Business Services revealed that more electronic records were breached in 2008 than in the previous four years combined. In addition, the study found that database servers accounted for 75% of all records breached, while end-user devices such as laptops and USB drives accounted for only 0.01%.

Protecting against cyberattacks, breaches, fraud and insider threats has heightened the need for federal agencies and contractors to carefully review their security programs against the FISMA-mandated NIST 800-53 standard and comply with the OMB M-06-16 directive ("Protection of Sensitive Agency Information"), in order to secure Personally Identifiable Information (PII) and other sensitive data such as financial data and classified information.  At the same time, agencies and contractors are looking to streamline their data security infrastructures with automated and centralized controls for complex, heterogeneous and highly-distributed environments.

This executive seminar will include the following cybersecurity experts:

    *

      John Pescatore, Gartner Vice President and Research Fellow, who has 28 years of experience in computer, network and information security.  John will discuss the federal government’s role in stimulating progress towards higher levels of cybersecurity; new and emerging threats such as SQL injection and privileged insider breaches; best practices for improving vulnerability management to reduce risks; and the security implications of cloud computing.

      Prior to joining Gartner, Mr. Pescatore was senior consultant for Entrust Technologies and Trusted Information Systems, where he started and managed security consulting groups. His previous experience includes 11 years with GTE, as well as employment with NSA and the U.S. Secret Service.  John has a BSEE from the University of Connecticut and is an NSA-certified Cryptologic Engineer.
    *

      Andy Singer, Principal at Booz Allen Hamilton, who recently retired as the Navy rear admiral holding positions as the director for intelligence in the Pacific and deputy of Naval Network Warfare Command, after spending 31 years in the Navy.  Andy will describe why traditional “fortress approaches” (such as firewalls and IDS/IPS systems) are no longer sufficient to protect against 21st-century attackers who can easily bypass perimeter defenses; best practices for implementing NIST 800-53 controls for critical database infrastructures; and a new way of thinking about cybersecurity that focuses on a “megacommunity” approach in which government, business and civil society collaborate to advance shared vital interests.

      Mr. Singer also worked at Spawar Systems Center Charleston, NETWARCOM and was Vice Commander at the Naval Network Warfare Command.  He has an MS in Security Strategy from the National War College.
    *

      Ron Ben Natan, Ph.D. and Guardium CTO, who has more than 20 years of experience developing enterprise applications and security technology for blue-chip companies.  Ron will discuss best practices for database security and compliance; how to leverage the latest technologies for database activity monitoring (DAM) and logging, vulnerability assessment, data discovery and configuration change control; and how to reduce the cost and complexity of compliance with automated controls and workflow processes.

      Prior to Guardium, Dr. Ben Natan worked for Merrill Lynch, J.P. Morgan, Intel and AT&T Bell Laboratories. Ron has also served as a consultant in data security and distributed systems for Phillip Morris, Miller Beer, HSBC, HP, Applied Materials and the Swiss Armed Forces.  He is an expert on distributed application environments, application security, and database security, and has authored 12 technical books including HOWTO Secure and Audit Oracle 10g and 11g (CRC Press, 2009) and Implementing Database Security and Auditing (Elsevier Digital Press, 2005), the standard texts in the field.

In this session, attendees will hear how key government agencies such as the FTC and Washington Metropolitan Transit Authority (WMTA), and private sector organizations including 3 of the top 4 U.S. banks, have implemented granular access controls and real-time monitoring to track all access to sensitive data - across all DBMS platforms and applications - without impacting performance or changing databases or applications.  You’ll also learn best practices for hardening your database environments and mitigating risk.


WHAT:   Executive seminar: “Best Practices for Database Security, Privacy & Compliance”
WHO:   John Pescatore, Vice President and Research Fellow, Gartner
Andy Singer, Principal, Booz Allen Hamilton
Ron Ben Natan, Ph. D., Guardium CTO and author of the newly published book: HOWTO Secure and Audit Oracle 10g and 11g, the definitive guide for database security and risk management professionals
WHEN:   Tuesday, June 16th, 2009
8:00 a.m. - 12:00 p.m.
WHERE:    Ritz Carlton, Pentagon City in Arlington, VA.
WHO SHOULD ATTEND:    C-level executives and day-to-day practitioners involved with IT security, risk management and compliance, governance and privacy, database administration and enterprise application architectures.

Register today to qualify for complimentary admission to “Best Practices for Data Security, Privacy & Compliance” and get strategic insights delivered by the most respected data security and compliance experts.

About Guardium
Guardium, the database security company, delivers the most widely-used solution for preventing information leaks from the data center and ensuring the integrity of enterprise data.

The company’s enterprise security platform is now installed in more than 450 data centers worldwide, including top government agencies; 3 of the top 4 global banks; 3 of the top 5 insurers; 2 of the top 3 global retailers; 15 of the world’s top telcos; 2 of the world’s favorite beverage brands; the most recognized name in PCs; a top 3 auto maker; a top 3 aerospace company; and a leading supplier of business intelligence software.

The company has partnerships with Oracle, Microsoft, IBM, BMC, EMC, Accenture, McAfee and ArcSight, with Cisco as a strategic investor, and is a member of IBM’s prestigious Data Governance Council and the PCI Security Standards Council.

Founded in 2002, Guardium was the first company to address the core data security gap by delivering a scalable enterprise platform that both protects databases in real-time and automates the entire compliance auditing process.

Guardium is a trademark of Guardium, Inc.

###

Media Contacts:
George Robertson
Corporate Ink
617.969.9192

Anti_Illuminati

  • Guest
Re: ALERT, NWO EXECUTING MASSIVE CYBER FALSE FLAGS-YOU WERE WARNED
« Reply #19 on: February 18, 2010, 11:05:27 am »
Amit Yoran should be arrested immediately and charged with murder, (and other crimes) period.  He is one of the many NWO criminals directly responsible for the deaths of all those people on 9/11, the 1st responders deaths and destruction of their health, and every other consequence resulting from the black op too many to list.  Seriously check out the mp3 I linked --that's what completely blew me away for me to post this because of the fact that someone actually interviewed this piece of globalist boot licking trash and to hear how he fearmongers:

"The cyber-initiative has--a, components which are near term in nature, actionable specific operational nature, and then there's--it goes, runs the entire gamut to longer term strategic research types of requirements so there's a, I think a good balance in the timelines of these things, but action is underway already there's a, I wouldn't say at a feverish pace, (he says that like he's lying, that it is in fact, feverish) (interviewer let's out a disgusting sheepish stupid f**ing laugh as if the death of the Internet is funny, but that's because he's a DUMB SON OF A BITCH, OR A PIECE OF NWO TRASH HIMSELF.) but "there's been a very aggressive effort", over the last 24 months in the Executive branch of the federal govt. to change the status quo on the cyber front."  I'd like to see that SOB squirm in an FBI Interrogation room being drilled about Guardium and Ptech, etc.

Listen to Amit Yoran reference the CSIS board members (Kissinger, Brzezinksi, etc.) what a sick son of a bitch.  Check out the document I linked in the forum thread in the 1st post.  Now, look at this:
__________________________________________________________
Feds Fight to Plug Security Holes

Breaches and computer losses continue where they shouldn't.

February 17, 2009
By Richard Adhikari

President Obama's recent order of an immediate two-month review of the federal government's cybersecurity plans apparently can't come fast enough. The federal government, dogged by computer security issues over the years, was hit by two more incidents this week.

One occurred at the Federal Aviation Administration (FAA), where data of 49,000 people were stolen during a data breach. The other occurred at the Los Alamos National Laboratory (LANL) in New Mexico, which is undergoing a security shakeup following the discovery that a total of 90 computers were reported missing or stolen over the past year.

Experts have been calling for an overhaul of federal computer security practices.

The latest incidents, which occurred at organizations which should have had a higher level of security, make it look as if things have not improved over the past four years.
INSERT:  THAT'S BECAUSE YOUR ENTERPRISE ARCHITECTURE/FEDERATED GLOBAL INFORMATION GRID CONTINUALLY SERVES AS AN UNOBTRUSIVE MEANS FOR YOU TO CARRY OUT FALSE FLAGS AGAINST ALL OF YOUR OWN SYSTEMS TO FOOL YOUR COMPARTMENTALIZED IDIOTS AND GENERAL PUBLIC INTO GIVING UP THEIR FREEDOMS ONLINE OTHERWISE THERE WILL BE A "NATIONAL CATASTROPHE."  STOP CARRYING OUT F**KING FALSE FLAGS, YOU'VE BEEN EXPOSED AND YOU'RE NOT GOING TO GET AWAY WITH THESE LIES!]  In 2005 and 2006, the Department of Homeland Security suffered 844 security breaches, leading a House subcommittee to accuse DHS CIO Scott Charbo of not doing his job during a hearing in 2007.

In the FAA breach, which could impact 49,000 people, data was stolen from 48 files on one server, FAA spokesperson Laura Brown told InternetNews.com. Two of the files combined had data on 49,000 employees.

One had names and social security numbers of 45,000 employees who joined the FAA on or after February 1, 2006. The other had names and encrypted medical information of 4,000 employees in the FAA's safety organization but did not contain any social security numbers, Brown said.

The remaining files have data that is either in the public domain or non-private data, Brown said. The FAA has notified those affected, and will offer them free credit monitoring. It is working with the FBI and the Department of Transportation's inspector general to investigate the breach.

Brown said the FAA was alerted February 1 by the Department of Transportation's cybersecurity monitoring system about the breach, and it took about a week to determine what data had been taken. Employees were notified a week later, this past Monday. No FAA operational systems appear to have been breached, Brown said. Since the breach occurred, the FAA has begun tightening up its security, Brown said. [INSERT:  HERE'S A HINT: THE BREACHES EXECUTED BY THE ENTERPRISE, OR SOA (SERVICE ORIENTED ARCHITECTURE) SYSTEM THAT IS STILL ON YOUR MACHINES DOESN'T LEAVE ANY EVIDENCE OF THE BREACHES THAT IT EXECUTES (BECAUSE IT LEARNS ALL WEAKNESSES AND DEFEATS ANY AND ALL SECURITY WITHOUT DETECTION AND DOESN'T GIVE A SHIT WTF OPERATING SYSTEM IT IS INSTALLED ON PERIOD!)  WAKE THE F**K UP!

Do you know where your computers are? INSERT:  Is that like CNBC's "Do you know where your Money is (a subtly mocking statement to all Americans of the globalists telling you that they stole your money, and "what the hell are you going to do about it.")

The problems at Los Alamos National Laboratory are more troubling because the lab, which bills itself as the premier national security science laboratory, deals with highly classified projects including safeguarding the U.S. nuclear deterrent and offering mission-critical support for NASA.

In January, three computers were stolen from the home of a LANL scientist in Santa Fe, New Mexico, earning the lab a rebuke from its client, the Department of Energy's National Nuclear Security Administration (NNSA), according to the Web site of the Project on Government Oversight (POGO). POGO is an independent nonprofit that says its mission is to investigate and expose corruption and other misconduct in the federal government.

The NNSA letter, signed by contracting officer Robert Poole, said that, although LANL has improved the robustness of its cybersecurity implementation, the theft revealed concerns in various areas. It also said that LANL later reported that 13 computers had been lost or stolen in the past 12 months and 67 others were missing. "The magnitude of exposure and risk to the laboratory is at best unclear as little data on these losses has been collected or pursued given their treatment as property management issues as well."

Poole directed LANL to treat any loss of computer equipment as a cybersecurity concern and to tighten security measures. LANL spokesperson Jeff Berger told InternetNews.com the computers stolen from the scientist's home in New Mexico did not contain classified data. Neither did the computers reported missing or stolen last year.

[INSERT: "DID NOT CONTAIN CLASSIFIED DATA"  HOW THE F**K DO WE KNOW THAT, HOW DO WE KNOW HE ISN'T LYING? HOW CAN HE EVEN KNOW THAT IF HE IS TELLING THE TRUTH WHEN THE PRECEDING PARAGRAPH SAID:  "The magnitude of exposure and risk to the laboratory is at best unclear as little data on these losses has been collected or pursued given their treatment as property management issues as well."

Another 11 computers, which could have gone missing or been stolen before 2008, were recovered last year, Berger said. Pointing out that LANL has accounted for 99.5 percent or more of its computers and computer related equipment, exceeding the 98.7 percent bar set by NNSA, Berger said the laboratory has tightened up its security measures since the theft.

"We've just initiated an inventory process calling in all computers," he said. "We're also reviewing policies that govern the home use of our computers."

WHY DOES NORAD-USNORTHCOM HAVE 2 NUCLEAR ATTACKS LISTED ON THE U.S MAP-ONE IN SAN FRANSISCO CALIFORNIA, AND THE OTHER ONE DENOTED AS "AN OFF-SHORE NUCLEAR EXPLOSION" IN THEIR 2008 US "WARGAMING" DOCUMENT?! (THE 2009 ONE HASN'T BEEN RELEASED BTW, I CHECKED.]


Anti_Illuminati

  • Guest
Re: ALERT, NWO EXECUTING MASSIVE CYBER FALSE FLAGS-YOU WERE WARNED
« Reply #20 on: February 18, 2010, 11:07:37 am »
So, why is John Pescatore a big deal?  Read on...

http://www.guardium.com/htmlemails/200905_seminar_invite/speakers.html



Featuring John Pescatore, vice president and Research Fellow, Gartner

John Pescatore is a vice president and research fellow in Gartner Research. Mr. Pescatore has 28 years of experience in computer, network and information security. John is Gartner's lead analyst on all Internet-facing security issues, covering a broad range of enterprise-critical areas. He also provides thought leadership in wireless security, ways to develop software without vulnerabilities, and trustable computing platforms.

Prior to joining Gartner, Mr. Pescatore was senior consultant for Entrust Technologies and Trusted Information Systems, where he started and managed security consulting groups. His previous experience includes 11 years with GTE, as well as employment with NSA and the U.S. Secret Service. John has a BSEE from the University of Connecticut and is an NSA-certified Cryptologic Engineer.
________________________________________________________________________
http://www.net-security.org/news.php?id=2844

http://searchsecurity.techtarget.com/news/interview/0,289202,sid14_gci905234,00.html

Gartner: Pescatore comments on state of enterprise security

By Michael S. Mimoso, SearchSecurity.com News Editor
09 Jun 2003 | SearchSecurity.com

WASHINGTON, D.C. -- Formerly with the National Security Agency and Secret Service, Gartner Inc. vice president John Pescatore has the perspective and experience to comment on just about everything related to IT security. In this interview, conducted during the Gartner IT Security Summit, Pescatore lends his two cents on security spending, trends, cyberterrorism, government's role in security and what enterprises need to do safely stay afloat.

Spending on security in the enterprise is either on the rise or flat, according to most accounts. What are companies spending money on?

Pescatore: If you look at the total spending on security, it's definitely going up strongly. We look at it as a percent of the IT budget. So, in 2001, the industry average was 3.3% of the IT budget toward security. In 2002, it went up to 4.3%. We're projecting for this year, 5.4%. Some segments, such as government, are going to grow faster. Government is going to grow faster than anybody because of the [Department of Homeland Security]. Places like universities are also bumping their budgets up because they're getting killed by places like the recording industry for piracy. The interesting thing for 2003, it's the first year ever that, when the CIO looks at the pie chart of where his money went, security will have its own label on the chart. It won't be lumped in with 'other.'

Now, what are they spending it on? In the IT security side, we're seeing a lot of firewall refresh. For example, in 1999 [and] 2000, with all the Y2K money, a lot of people upgraded Windows, NT, Solaris and got a new firewall. Now they're all replacing those and getting a firewall appliance. Because of Code Red, Nimda and Slammer, we see expenditures on antiviral going up. Spending on security audits and services like penetration testing [have] definitely gone up. So what we've seen with the economy, the growth in security spending has been on the keep-the-bad-guys-out side, traditional firewall, antivirus, vulnerability assessment tools and services. The good-guy-in side, like authentication, PKI, access control, that kind of spending has been flat to down, namely because companies aren't spending on new applications, because the whole IT world has been in a slump.

The third area of spending has been on the keep-the-wheels-on side, where you manage all your security stuff. There's been strong growth there this year. Tools that help enterprises manage firewalls, antivirus [and] intrusion detection, and help make sense of all the data, that's been a strong spend area.

In what areas has spending slowed down?

Pescatore: Intrusion detection. Most companies have said, 'This isn't helping me. It's just drowning me in false alarms.' PKI has experienced a slowdown with many of those companies up for sale.

At the RSA Conference, you predicted this would be the decade of security hardware. Can you explain what you meant?

Pescatore: We see a lot of discrete security functions: firewalls, intrusion detection, gateway-side antivirus, vulnerability assessment, even URL blocking. These are functions that look at stuff on the network and make decisions on what to do. That might be five different boxes an enterprise would have to manage. We're seeing this move toward network security platforms, which is fewer boxes, and that reduces the cost of ownership.

Then we saw some innovative companies start to build these ASICs [application-specific integrated circuits] and network-security processors that said 'There's some common processing going on in these boxes. Let's put it in hardware.' Put all the repetitive, heavy-lifting stuff in hardware so that I go much faster. We've seen three different architectures come out for small, medium enterprises (100 MB and less), large enterprises (100 MB to a gigabyte per second) and carrier-class (1 gigabyte per second and above).

In the large enterprise space, you'll have a blade approach where, instead of throwing a box at a problem, plug in a new appliance in a blade so that I can scale on one box, as opposed to multiple boxes. Above that, this is where the ASIC-based approach is for the top, large enterprises and carrier class. What we mean by hardware is the ability to do repetitive, network-stack processing, parsing of XML and decrypting Secure Sockets Layer (SSL). That's gotta be done in hardware to get to the speeds needed by the large enterprise and carrier classes. That's where the innovation is. With software, we'll see some innovation with algorithms for doing behavior-based or anomaly-based attack detection, but most of the innovation is at wire speeds.

As you talk to clients today, as compared to, say, 12 to 24 months ago, how has the conversation changed? What kinds of issues or questions are they raising?
Pescatore: Pre dot-com crash, very different security questions. Since the bubble burst, how much has changed? In that time, I think we've definitely seen disillusionment with intrusion detection. Two years ago, people were asking us, 'Which IDS is better? Cisco, ISS or Enterysys?' Now they are asking, 'Should I really do this?' That's changed.

We're seeing a lot more willingness to change user behavior. In the dot-com days, you couldn't hire people fast enough; we couldn't annoy users that much. If we put some onerous security in front of the user, the VP would complain, and the CIO would say 'What are you? Nuts?' Now that the economy is tougher and people can't change jobs as well, we're seeing enterprises be willing to block attachments, force users to go to Windows 2000, lock into their PCs.

The security group has a lot more power now and, because of that, we're seeing them trying to centralize security management more. The danger is that, when the economy comes back, if the security guys are not used to moving quickly, they'll be left behind again.

What has matured during that time frame?

Pescatore: We've definitely seen maturity in several spaces: firewall and antiviral, for example. But maturity doesn't mean commodity quite yet in those areas. There's still room for new guys to come along and blow the incumbents away.

When the National Strategy to Secure Cyberspace was released, it was criticized for its lack of mandates, or 'teeth.' Do you agree? Should it have had more 'teeth'?
Pescatore: No. Gartner came out with the first take, saying it did exactly what it should have done. Private industry will make the Internet more secure. Regulations, at best, will not hurt and, at worst, cause tremendous problems.

An example I always use: Back in 1995, Sen. Sam Nunn formed a committee to investigate the possibility of a digital Pearl Harbor. He used that term in 1995. If the government had dictated things back then, it would have said things like 'You better not let strong crypto get out because the bad guys are going to have it.' We would have been mandated 40-bit crypto be built in everywhere. If the government had passed regulations, Amazon.com would be taking orders by fax. It would never have taken off.

The government cannot legislate security in. You can't put a hierarchal solution on a distributed problem. The major people complaining are the security vendors. It was going to be like Christmas if the government mandated everybody needs a personal firewall.

What should government do then?

Pescatore: What [Richard] Clarke and [Howard] Schmidt came up with did a pretty good job of doing what we said, which is that government should use its market power. You want to make the Internet more secure? Every government agency should be buying denial-of-service protection with their Internet connectivity. Every government agency should make sure that every employee and every vendor who works for the government has a personal firewall installed on their PC. That drives the market more so than some government regulation. The government should be a model citizen on this. It should be the most secure industry segment, the most secure piece of critical infrastructure. And it's not today. It's not!

We need to see the government's strategy for securing the government's sector of cyberspace. Putting more pressure on the other critical segments, like telecoms, power and energy, and transportation to improve cybersecurity, is a good thing. But those critical infrastructures first better worry about physical security, because that's what terrorists do. They blow things up. They attack physically to cause terror. Blue screens of death don't cause terror.

How big of a deal is the departure of both Richard Clarke and Howard Schmidt as national cybersecurity advisor?

Pescatore: Richard Clarke is not an operational guy. He survived from Bush Sr., to Clinton, to Bush Jr. No one does that without being an experienced political bureaucrat. He was definitely good for raising visibility but, as the Department of Homeland Security moved to operational, he's not the guy.

Howard Schmidt, when he took the job, I wrote that this was a great thing. The most attacked domain name in the world is Microsoft.com [Schmidt was the former chief security officer at Microsoft Corp.], and he had experience defending that. The heavy lifting is going to be done by private industry. The government side will have two aspects. One is the moral suasion side: talking, keeping visibility up. The other is the bureaucratic in-fighting side of a brand new department trying to gain control. And Howard wasn't either of those guys. I think Richard Clarke could have stayed around to be the external face inside the government, but he's going to make a lot more from lucrative speaking fees.

Where a lot of the squawking has been is the talk about not burying it four layers down, that it needs to be at the president's level. I think that's totally wrong. You know what the most effective thing we have in critical infrastructure security is? It's been there for 15 years and it's called NSTAC [National Security Telecommunications Advisory Committee]. They were formed to make sure the U.S. telephone system could react if the government had concerns. They touch on cybersecurity and domain name security, and it's done very quietly -- an industry-government partnership. That's been most effective. I think it is appropriate to have it within Homeland Security, not [at] some presidential level.

So we don't need a recognizable name to lead the way?

Pescatore: No, I don't think so. We tend to mistake light for heat, if you know what I mean. If we hear the noise, and Richard Clarke is out squawking every week, you think something is getting done -- whereas it's time for heavy lifting. There's enough press coverage of every security incident. It's not like people don't hear about security incidents. Know what a good indicator is? Look at Symantec's stock price. It's going up and up. Know why? Consumer antiviral purchases are going up and up. There's awareness. Now the issue is: How do we make it easier for businesses to reach the next level of security? Evangelism can never hurt, but if I had to pick evangelism or implementation right now, I'd pick implementation.

What should the enterprise take away from the talk about cyberterrorism?

Pescatore: Terrorism is a real threat. We're going to get hit again. I worked for the Secret Service years ago, and the biggest thing we used to worry about was the Radio Shack criminal, the one who gets his technology at Radio Shack. You cannot plan for al Qaeda-type events. You have to protect against the most likely type of threat and hope they go bother somebody else.

As far as what the typical enterprise should do, there's a lot of simple things you need to make sure you're doing right.

Everyone has antiviral and firewalls, but how often do you update antivirus signatures? How often do you test if your firewall policy is what it should be? No. 1 thing, the way any cyberattack works, the bad guys check for vulnerabilities and then they attack. You need to check for vulnerabilities before the bad guys. If hackers are rattling your doorknobs, if they're open, the hacker is going to come in. You should rattle your doorknobs first, [do] more frequent vulnerability assessments to block those attacks. Doesn't matter if it's a terrorist, pimply faced 14-year-old or a cybercriminal trying to steal credit card numbers or medical records, they're all going to come in the same way.

Sixty-five percent of attacks exploit misconfigured systems, and only 30% exploit known vulnerabilities where there's a patch out. Only 5% exploit things we didn't know where there was a problem. Address the 65% and check that things are configured right and you've just eliminated two-thirds of your problem. Focus on patch management and forcing software vendors to write better software and you've got the other 30% taken care of. Then, later on, worry about the 5% of evil geniuses who are attacking us with zero-day attacks.

Anti_Illuminati

  • Guest
Re: ALERT, NWO EXECUTING MASSIVE CYBER FALSE FLAGS-YOU WERE WARNED
« Reply #21 on: February 18, 2010, 11:07:57 am »
Guardium news and Events
http://www.guardium.com/index.php/t1a/

http://www.guardium.com/index.php/t1/245/

About Guardium

More Global 1000 organizations trust Guardium to secure their critical enterprise data than any other technology provider.

The fact is, we provide the simplest, most robust solution for safeguarding financial and ERP information, customer and cardholder data, and intellectual property stored in enterprise systems such as Oracle E-Business Suite, PeopleSoft, Siebel, SAP, Business Objects, and in-house applications.

Our solution also optimizes operational efficiency by automating and centralizing compliance controls across heterogeneous and distributed data center environments.

Why Guardium [like, "Why Ptech"]


A Pioneer in Data Security

Founded in 2002, Guardium was the first company to address the core data security gap by delivering a scalable enterprise security platform that both protects databases in real-time and automates the entire compliance auditing process.  Our achievements have been recognized by industry analysts and other experts—but true recognition comes from our customers.

Leadership

Guardium’s experienced management team brings decades of business, technical, and project management expertise to the development, deployment, and support of market-leading products.

Investors

Recognized by Forrester as “a Leader across the board,” Guardium delivers the most widely-used solution for ensuring the integrity of enterprise data and preventing information leaks from the data center. 

Careers

At Guardium, we look forward to Mondays.  That’s because working at Guardium means being at the forefront of a rapidly-growing industry.  Each member of our team plays an important role in safeguarding critical data for the world’s largest organizations.  Our people enjoy a fresh and challenging work environment with excellent opportunities for advancement. 
________________________________________________________________________
http://www.guardium.com/index.php/t2/250/

Leadership

Guardium’s experienced management team brings decades of business, technical, and project management expertise to the development, deployment, and support of market-leading products.

Ram Metser – CEO
Ron Bennatan – CTO
David Valovcin – VP, International Sales
Paul Resten– VP, North American Sales
Boaz Barkai – Head of Customer Services & Support
Phil Neray – VP, Marketing
Mike Castricone – VP, Finance and Administration
Upesh Patel – VP, Business Development
Martin Pejko - VP, Global Channels
Roy Barr – Director, Business Development

Biographies

Ram Metser – CEO
Ram Metser has extensive entrepreneurial and executive management experience, having worked in a broad range of technology-based organizations.

Prior to joining Guardium, Ram served as vice president of Nokia (NYSE:NOK) and general manager of Nokia Intelligent Applications. He was also the co-founder and CEO of Telekol Corporation.  Under Ram’s leadership, Telekol grew to become a leading supplier of intelligent communications software and systems for the enterprise, and was acquired by Nokia. Previously, Ram fulfilled various executive advisory roles with technology start-ups.

Ram holds a bachelor’s degree in management and a master’s degree in business administration from the University of Massachusetts.

Ron Bennatan, Ph.D. – CTO
Dr. Ron Bennatan commands more than 20 years of experience developing enterprise applications and security technology for blue-chip companies.

Prior to Guardium, he worked for companies such as Merrill Lynch, J.P. Morgan, Intel and AT&T Bell Laboratories.  Ron has also served as a consultant in data security and distributed systems for Phillip Morris, Miller Beer, HSBC, HP, Applied Materials and the Swiss Armed Forces.

An IBM GOLD consultant with a Ph.D. in computer science, Ron is an expert on distributed application environments, application security, and database security, and has authored 12 technical books including HOWTO Secure and Audit Oracle 10g and 11g (CRC Press, 2009) and Implementing Database Security and Auditing (Elsevier Digital Press, 2005), the standard texts in the field.

David Valovcin – VP, International Sales
David Valovcin brings more than 20 years of direct, channel, and international sales and management experience to Guardium.

David previously served as vice president of worldwide sales for several Boston-area startups.  He drove exponential sales growth for Courion Corporation and helped Pegasystems Inc. go public using his business development and sales management skills as vice president of sales for the Americas.  Prior, David held sales management and international operations positions for companies in the security software and IT infrastructure markets.  A frequent speaker at industry events, David has also managed the design and implementation of best-of-breed solutions for leading global organizations.

David received a B.S. in business administration from American International College, with study abroad at the Université de Fribourg, Switzerland.

Paul Resten – VP, North American Sales
With more than 25 years of sales management experience, Paul Resten has built strong technology sales organizations that have sold into a variety of vertical markets.  His extensive sales, marketing, and entrepreneurial expertise has helped him maintain a successful track record of managing both direct and channel organizations.

Prior to joining Guardium, Paul worked for Courion Corporation, where he assumed the management of their North American sales force in 2000. Previously, Paul spent more than 22 years at Motorola, Inc. in a variety of sales leadership roles, including director of business development.

Paul is a graduate of Bryant University and holds a B.S. in business.

Boaz Barkai – Head of Customer Services & Support
Boaz Barkai brings more than 17 years of experience and has a proven track record of managing services organizations and delivering enterprise-class services to organizations worldwide.

He leads Guardium’s Customer Services & Support organization, which is responsible for providing professional services, technical support and training to Guardium customers and partners worldwide.  At Guardium, he started the Professional Services team and most recently served as Director of Professional Services.

During his career, Boaz has successfully implemented complex, multi-year, large-scale deployments for enterprise organizations such as Verizon, Bell Atlantic and Southwestern Bell.  Prior to Guardium, he held a range of technical and managerial positions at Amdocs.  Boaz holds a B.S. degree in computer science.

Phil Neray – VP, Marketing
Phil Neray brings more than 20 years of experience in successfully introducing advanced technology to mainstream users and organizations.
Phil was previously senior director of worldwide strategic marketing for Symantec’s Application and Infrastructure Management business unit.  He joined Symantec in 2004 as a result of its acquisition of ON Technology, a developer of enterprise security and configuration management solutions.  During his tenure as vice president of marketing at ON Technology, Phil played a critical role in growing the company’s revenue by more than 700%.

Phil has held senior marketing roles at Alias Research, a 3D special effects software company for film, video games, and the Web (acquired by Silicon Graphics), and Alliant Computer Systems, which works with network-based, parallel UNIX supercomputers.  He has also served as a product manager for UNIX-based graphics workstations and embedded computing systems at Digital Equipment Corp.  Phil started his career as a field operations engineer with Schlumberger Ltd. on remote oil rigs in South America.

Phil holds a bachelor’s degree in electrical engineering (honors) from McGill University, where he graduated with distinction.

Mike Castricone – VP, Finance and Administration
Mike Castricone possesses more than 14 years of financial and administrative experience.
Prior to joining Guardium, Mike served as a controller for Nokia Networks.  He also served as a controller for Telekol Corporation, where he managed financial operations, IT, and human resource functions.

Mike holds a B.S. in interdisciplinary mathematics from the University of New Hampshire and a master’s degree in accountancy from Bentley College. He is a licensed Certified Public Accountant.

Upesh Patel – VP, Business Development
Upesh Patel commands 20 years of technology experience, including more than a decade spent on security and compliance.  He is responsible for managing and expanding relationships with Guardium’s technology partners to provide customers with the most advanced and interoperable solution.

Prior to joining Guardium, Upesh was vice president of product partnerships for Network Intelligence (now part of RSA, The Security Division of EMC), a leading security information and event management (SIEM) company.  There he drove partnership and technology integration activities with top security and infrastructure companies including Cisco, Microsoft, Check Point Software, RSA, and Juniper Networks. Previously, Upesh managed business development for Check Point Software, where he spearheaded the award-winning OPSEC (Open Platform for Security) Alliance Initiative.  He has also worked at the Santa Cruz Operation (SCO) managing key strategic partnerships and the company’s ISV developer program.

Upesh received a B.S. with honors in computer science from the University of Kent in Canterbury, UK.

Martin Pejko - VP, Global Channels
Martin W. Pejko has acquired more than 25 years of experience in the technology industry.  Prior to joining Guardium, Martin served as vice president of global channel sales at Network Intelligence (acquired by EMC in 2006).  He has held senior business development and legal counsel positions with companies such as Cisco Systems, Quantum Bridge Communications (acquired by Motorola), and GeoTel communications (acquired by Cisco).  Martin is also a former consultant for Lotus Development and BBN Corporation.

Martin holds a bachelor’s degree in economics from Colby College and a law degree from Northeastern University.

Roy Barr – Director, Business Development
Roy Barr has extensive experience in sales and business development, with a proven record of building sales, channels, customer management, and OEM relations.
Prior to joining Guardium, Roy served as director of business development at Nokia Intelligent Applications.  He was also a cofounder and the director of business development of Telekol Corporation.  At Telekol, Roy was responsible for creating sales and developing channels, territories, and OEM relations.

Roy holds a B.A. in political science from Bar-Ilan University and an M.A. in international political economy from the London School of Economics.

Anti_Illuminati

  • Guest
Re: ALERT, NWO EXECUTING MASSIVE CYBER FALSE FLAGS-YOU WERE WARNED
« Reply #22 on: February 18, 2010, 11:08:24 am »
http://findarticles.com/p/articles/mi_m0EIN/is_2005_August_12/ai_n14891711/

Oh wow, look at who is going to be protecting us from "Identity Theft":

Guardium Raises $5.5 Million in 3rd Financing Round; Ascent Venture Partners Leads Investment Group to Provide Funding for Guardium's Continued Rapid Growth in Database Security Market
Business Wire ,  August 12, 2005

 WALTHAM, Mass. -- Guardium, Inc., a leader of database security and compliance solutions, today announced it has secured $5.5 million in a third round of financing. The round was led by new investor Ascent Venture Partners and includes existing investors Cedar Fund, Veritas Venture Partners and Stage One Ventures. This raises Guardium's total venture capital investment to date to $15 million.

Guardium also announced that, as part of this funding, Ascent Partner Geoff Oblak is joining its board, which also recently expanded with the addition of Amit Yoran, the Nation's former Cyber Security Chief.

Guardium will use the funding to expand its sales, marketing and customer support teams, in order to accelerate the company's growth in the rapidly expanding market for database security applications including identity theft prevention and regulatory compliance such as Sarbanes Oxley, HIPAA, PCI and GLBA. Congress and private industry continue to drive standards for protecting critical data. The recently published Payment Card Industry (PCI) Data Security Standard (for identity theft prevention), for example, is a mandatory requirement for the entire Payment Card Industry. In addition, regulatory compliance continues to be a key security initiative among corporations. (According to Nemertes Research, 63% of corporations view compliance as critical and are allocating up to 60% of their security budget for meeting these regulations.)

In the last year alone, Guardium has grown its employees by 60%, quadrupled its customer base and completed more than 100 product installations of its SQL Guard solution for diverse global enterprises, ranging from the financial services and manufacturing to energy and media industries.

"We identified database security and its application for regulatory compliance and identity theft prevention initiatives as an attractive market for investment," said Geoff Oblak, Partner, Ascent Venture Partners. "Through our extensive due diligence, we determined that Guardium provides the leading solutions customers need in this high-growth market, and we are thrilled to join their investment team."

Over the past 20 years, Ascent Ventures has focused on emerging information technology sectors such as IT security and has built extensive networks and deep knowledge of these sectors.

"Ascent has a very successful track record of investing in security and software companies," said Ram Metser, CEO, Guardium, Inc. "We are gratified by Ascent's recognition of Guardium's market leadership and we look forward to utilizing their deep industry knowledge to contribute to our continued growth."

About Ascent Venture Partners

Since 1985, Ascent Venture Partners has been dedicated to partnering with seasoned management teams to build successful technology companies. Focused on the New England and Mid-Atlantic regions, investments are sized from $2 to $8 million. Ascent is an active investor, offering strategic advice, leveraging its broad network and working patiently with portfolio companies to overcome challenges. Ascent has raised four venture funds totaling $400 million and has invested in over 80 companies. Ascent is currently investing out of the firm's fourth fund, a $140 million fund launched in 2004. For more information visit www.ascentvp.com.

About Guardium

Headquartered in Waltham, MA, Guardium (www.guardium.com) develops and delivers innovative database security solutions that remove complexity, and provide visibility and effective controls over database access activities of IBM, Oracle, Microsoft, and Sybase environments. Guardium's family of non-intrusive, robust applications addresses key database security concerns that include database security assessment, access policy control and enforcement, auditing, and regulatory compliance. Guardium's growing customer base includes some of the world's most technically advanced organizations representing a wide range of industries. Financial services, telecommunications, media, manufacturing, healthcare, and government organizations trust Guardium's solutions to protect their mission critical data and handle their compliance challenges. Guardium investors include the Cedar Fund, Ascent Ventures, Veritas Venture Partners, and StageOne Ventures.

Copyright (C) 2005 Guardium. All rights reserved. Information in this document is subject to change without notice. Guardium, SQL Guard, Safeguarding Databases, SQL HealthGuard, SQL AuditGuard, SQL PolicyGuard, SQL RemoteGuard, and SQL Guard Security Suite are trademarks of Guardium, Inc. All other trademarks and trade names are the property of their respective companies. Copying and redistribution of this material is expressly permitted by the copyright owner.
__________________________________________________________
http://www.guardium.com/index.php/pr/36

Guardium Closes Strategic Investment Round, Adds Cisco as Investor

Cisco Invests in Guardium’s Network-Based Platform for Protecting Sensitive Corporate Information

WALTHAM, Mass. (May 15, 2006) – Guardium, the database security company, today announced a strategic investment by Cisco Systems Inc., the worldwide leader in networking for the Internet.

Guardium’s network-based technology protects sensitive information stored in critical systems such as Oracle, PeopleSoft, SAP, Siebel and custom enterprise applications. In addition, the Guardium solution enhances operational efficiency by providing a unified set of policy-based controls for heterogeneous, multi-vendor database infrastructures.

Cisco’s investment will allow Guardium to grow its leadership position in real-time database security and auditing. Guardium’s customer base currently includes major organizations in financial services, energy, manufacturing, telecommunications, pharmaceuticals, media, retail and government.

“We are pleased about this relationship between Cisco and Guardium,” said Charles Kim, Information Security Officer, ING Investment Management. “Both companies provide important components of our critical data infrastructure. Guardium’s innovative network-based technology monitors, protects and audits access to key information assets at ING Investment Management.”

The Guardium solution supports a vision of adaptive, network-based security with application-layer intelligence for preventing unauthorized or malicious access to the corporate data center. This high-performance network continuously responds to security events as they take place, rather than later, when an organization may have already suffered damage. With the growth of Web-based applications and service-oriented architectures (SOA), it is now even more important to find new ways to protect confidential corporate information from both insiders and outsiders.

“Database activity monitoring and auditing is one of the most promising new categories of data security,” wrote Rich Mogull, Gartner research vice president, in Best Practices and Compliance with Data Security (October 2005). “These standalone appliances enforce separation of duties by segregating audit from administrative functions, and they allow alerting based on specific database activity. For example, if a database administrator runs a select query on the credit card field, or creates a new database user, a security administrator is notified. Thresholds for sensitive data can be set to detect if someone that normally accesses particular data starts accessing an unusual volume of that data.”

“We are pleased to be supported by a global leader in networking technology,” said Ram Metser, Guardium CEO. “This will allow us to significantly broaden our reach. We can now help even more enterprises safeguard their critical information, and save time and money while implementing key compliance and IT governance initiatives.”

Cisco’s investment occurred as part of a Series C strategic round totaling $6.3 million, which was led by Cedar Fund and Ascent Venture Partners, with additional participation from all existing equity investors including Stage One Ventures and Veritas Venture Partners. The latest round brings the total equity investment in the company to $21 million. The new funds will support rapid sales growth and accelerated product development initiatives.

“Guardium’s solution addresses a key data security problem for corporations in a unique and robust way,” said Nimrod Schwartz, Cedar Fund partner. “The company’s success in winning big deals with major customers has not gone unnoticed, and we are delighted to welcome Cisco as a new and strategic investor in the company.”

Geoff Oblak, Partner, Ascent Ventures, added, “Guardium developed the world’s first solution for both database security and compliance monitoring, and has continuously enhanced its offering based on real-world feedback from top IT organizations worldwide. We are pleased by the company’s record of customer success and growth.”

About Guardium
Guardium, the database security company, develops the most widely-used network solution for database security and auditing. By securing sensitive corporate information such as financial/ERP and personal identity data in real-time — and automating change controls and compliance reporting — Guardium protects the world’s best-known brands while reducing the cost of IT governance and compliance.

Customers include: a top five U.S. bank; a top ten European financial services institution; a global consumer products manufacturer with over 100,000 employees; one of the largest North American oil and gas companies; and other companies worldwide in financial services, energy, manufacturing, telecommunications, pharmaceuticals, media and entertainment, and government.

Named “Hot Pick” by Information Security magazine, Guardium’s family of network appliances continuously monitor and prevent unauthorized access to databases. Guardium’s patent-pending technology performs deep packet inspection on all network traffic and detailed SQL linguistic analysis to detect or block specific commands based on policies. Unlike traditional log-based or DBMS-resident approaches, Guardium’s technology provides fine-grained database activity monitoring without impacting the performance or stability of key production applications, while supporting the separation of duties required by auditors.

The Guardium software suite includes specialized modules for SOX, PCI, Basel II and data privacy laws. A centralized multi-tier architecture provides scalability for large and distributed enterprises.

Guardium’s partners include IBM, EMC, HP, Microsoft, Oracle and Sybase, and the company is a member of IBM’s prestigious Data Governance Council. For more information, please visit http://www.guardium.com or call 781.487.9400.

Anti_Illuminati

  • Guest
Re: ALERT, NWO EXECUTING MASSIVE CYBER FALSE FLAGS-YOU WERE WARNED
« Reply #23 on: February 18, 2010, 11:17:21 am »
Terrorist industrial complex preps huge cyber FFs: mass problem/reaction/solution
Here it comes folks, they are coming FULL F*CKING STEAM WITH BLACK F*CKING OPS TO STAGE MASSIVE DATA THEFT, CREDENTIAL THEFT, ID THEFT/FRAUD, UNPRECEDENTED FALSE FLAGS AGAINST ALL FINANCIAL INSTITUTIONS, AND ANY COMPANY THAT HAS ANYTHING TO DO WITH STORING PERSONAL/PRIVATE/CONFIDENTIAL/SECRET DATA.  

THIS IS SO F*CKING INSANE THAT I CAN BARELY HANDLE TYPING THIS.  IF YOU OWN A COMPUTER, YOU ARE IN POSSESSION OF A 500 MEGATON ANTI-MATTER BOMB.  IT IS YOUR FAULT FOR EVERY SINGLE CYBER ATTACK THAT HAPPENED BECAUSE YOU ARE NOT ALLOWING THE GOVERNMENT TO MONITOR EVERYTHING YOU DO IN REAL TIME WITH A PTECH/PROMIS BASED ENTERPRISE ARCHITECTURE INSTALLED DIRECTLY ON YOUR MACHINE.  IF YOU DO NOT ALLOW THE GOVT. TO COME INTO YOUR HOME AND CONFIGURE YOUR COMPUTER FOR YOU, YOU WILL BE DECLARED A THREAT TO "NATIONAL SECURITY" AS BY THEIR DEFINITION, YOU ARE ENDANGERING "CRITICAL INFRASTRUCTURE".


http://www.federalnewsradio.com/?nid=15&sid=1825800
USAF cybersecurity unit ready to launch

November 30, 2009 - 6:36am

The newly-created 24 U.S. Air Force is about to bring limited aspects of its cybersecurity command operations center online. InfoSecurity reports the unit, established in August, will be launching the San Antonio-based cybersecurity facility  by the end of the year. The commander of the unit, Major General Richard Webber, said that the cybersecurity center was still working to understand the scope of cyberwarfare operations. The Air Force is clearly getting tooled up on cybersecurity. In addition to the San Antonio center, a procurement document posted on the FedBizOpps website indicated that the Air Force wants to buy 2,200 PlayStation 3 game consoles to build a Linux-based research supercomputer for its research center in Rome, NY.

The next time you receive an email about computer security, you might want to think twice before clicking the link. Researchers at security firm Red Condor have detected a phishing attack that masquerades as an enhancement to your email security. The message sends you to a Web site that asks you to download the latest version of the Macromedia Flash Player. But the download is a trojan that can disable firewalls and steal financial information. It can also give hackers remote access to your computer. The safest way to update your Flash Player is directly through the company's Web site.

The National Institute of Standards and Technology is working with industry to develop standards for Iris recognition technology. The testing is for small images that can fit on identification cards. NextGov reports the tests were part of the first phase of Irex and included 19 algorithms from 10 providers. The goal is to help develop a reliable technology to be used for identity verification on distributed systems, with formats like the government's Personal Identity Verification smart ID card. To be successful, the format requires a high degree of accuracy when used across a variety of hardware and software products. And the compact files must be stored on devices with limited memory. Iris recognition is considered as distinctive as fingerprint recognition but the images can be captured at a distance.
____________________________________________________________________
http://gcn.com/Articles/2009/11/30/Update1-IREX-NIST-iris-recognition.aspx?Page=2

NIST zooms in on iris recognition

Irex program aims to help mature the biometric authentication method as a tool for PIV cards

    * By William Jackson
    * Nov 20, 2009

The National Institute of Standards and Technology is working with industry to encourage development of standards for iris recognition technology, and a recent testing program focused on small images that could fit on identification cards.

The Iris Exchange program, or Irex, “is about image-based interoperability,” said Patrick Grother, a supervisory computer scientist at NIST and co-author of a report on recently completed algorithm tests.

The tests were part of the first phase of Irex and included 19 algorithms from 10 providers, demonstrating strengths and weaknesses when used with various image formats and data compression methods defined by the International Organization for Standardization.

“As the largest independently administered test of iris recognition technology to date, Irex I includes a formal evaluation of the state of the art of iris recognition algorithms,” the report states. The tests showed significant improvement in recognition of small template files and resulted in recommendations for some changes in international image standards that are under consideration.

The goal of Irex is to help develop a reliable technology to be used for identity verification on distributed systems with formats such as the government’s Personal Identity Verification smart ID card. That requires a high degree of accuracy when used across a variety of hardware and software products, and compact files must be stored on devices with limited memory.

Fingerprint recognition is the most commonly used form of biometric authentication. However, no biometric verification is perfect, and a second mode of authentication is desirable, Grother said. The number of algorithms tested in the recent project illustrates the growth of interest in iris recognition. The technique is attractive because irises are as distinctive as fingerprints. But images can be captured at a distance, and the technology has a separate set of failure characteristics.

“It’s another option that may be suitable for certain environments and requirements,” Grother said. “There has been substantial vendor and government capital put into the industry in the past few years. A second modality is being bet on by the people putting money into this.”
____________________________________________________________
Look at this:  

IBM joins up with black ops 9/11 Israeli terrorist organization & Ptech client Guardium

http://www.federalnewsradio.com/?nid=15&sid=1826852

IBM buys database monitoring tools

December 1, 2009 - 6:49am

IBM announces a plan to integrate real-time database security into its product line, with the purchase of a company called Guardium. The firm is known for its multiplatform database monitoring software. The program looks for anomalies in data access and usage. IBM says it will integrate the product into its information management software portfolio. Financial terms of the sale were not disclosed, but early media reports indicated it could be worth as much as $225-million dollars.

Microsoft has confirmed it is checking out reports that a November security update is causing a so-called black screen of death on some Windows Pcs. The company tells Computerworld it is, quote, "investigating reports that its latest release of security updates is resulting in system issues for some customers." If it finds a problem, Microsoft is promising a fix. A security release from November 10 was tested by British security vendor Prevx. That company said the security releases prevents Windows from running properly, resulting in a blank screen for some users. This isn't the first reported problem with security patches. A recent Windows XP patch prevents computers with certain graphics cards from starting up.
______________________________________________________________
http://www-03.ibm.com/press/us/en/pressrelease/28889.wss

IBM Acquires Guardium

Helps Organizations Safeguard Critical Enterprise Data


 ARMONK, N.Y., - 30 Nov 2009:  IBM (IBM) today announced it has acquired Guardium, a market leader in real-time enterprise database monitoring and protection. Guardium's technology helps clients safeguard data, monitor database activity and reduce operational costs by automating regulatory compliance tasks. Guardium is a privately held company based in Waltham, Massachusetts. Financial terms were not disclosed.

Trusted information lies at the center of today's business transformations. To succeed in today's dynamic business environment, organizations must unlock the value of critical information stored in silos within and outside of the organization, while still safeguarding it from unauthorized access or changes.

The acquisition of Guardium will enable IBM clients to maintain trusted information infrastructures by continuously monitoring access and activity to protect high-value databases against threats from legitimate users and potential hackers. It will also help clients streamline compliance processes for ever-changing industry and government mandates with centralized and automated controls for all major platforms.

The combination of IBM and Guardium technology will help organizations safely realize the promise of business analytics and use trusted information to drive smarter business outcomes. Designed for cross-platform environments, Guardium's technology identifies patterns and anomalies in data access and usage allowing organizations to maintain the integrity of their data and turn it into a strategic business asset. The monitoring capabilities of Guardium's technology also detect fraud and unauthorized access via enterprise applications such as an organization's ERP, CRM or Data Warehousing solutions.

"Organizations are grappling with government mandates, industry standards and business demands to ensure that their critical data is protected against internal and external threats," said Arvind Krishna, general manager, IBM Information Management. "This acquisition is another significant step in our abilities to help clients govern and monitor their data, and ultimately make their information more secure throughout its lifecycle."

The Washington Metropolitan Area Transit Authority (Metro) operates the second largest rail transit system in the United States and transports more than a third of the federal government to work. Washington Metro needed to safeguard sensitive customer data and simplify compliance with the Payment Card Industry Data Security Standard (PCI-DSS), without impacting performance or changing database configurations. With more than 9 million credit and debit card transactions yearly, Metro is classified as a top-tier Level 1 merchant by the PCI-DSS standard. With Guardium's technology, Metro gained granular visibility into all database transactions, allowing it to protect the privacy and integrity of their critical data and identify potential fraud in their ERP/HR system.

According to the recent IBM Global CIO Study, one in three business leaders frequently make decisions based on information they do not trust or do not have. With renewed focus on transparency and accountability, businesses and government agencies cannot afford to make decisions based on data that has been compromised. To succeed, organizations need to maintain a vigilant real-time watch on database access to protect enterprise data and comply with regulatory requirements such as HIPAA and the European Data Protection Directive, the U.S. federal government's NIST 800-53 standard and industry mandates such as the PCI-DSS .

"Guardium gives clients unprecedented visibility and control over their data access activities while taking advantage of automation to deliver rapid return on investment," said Ram Metser, chief executive officer, Guardium. "The combination of IBM and Guardium provides clients with a comprehensive solution for safeguarding critical enterprise information and preventing fraud without the complexity of traditional approaches."

This acquisition extends IBM's business analytics strategy, including the range of offerings available through IBM's recently-announced Business Analytics and Optimization Consulting organization with 4,000 consultants, a network of analytics solution centers, and an overall investment of more than $12 billion in organic growth and acquisitions.

IBM will integrate Guardium within IBM's Information Management Software portfolio which has more than 35,000 experts dedicated to helping clients use information as a strategic asset to transform their business. This marks the 28th acquisition to support IBM's Information Management strategy.
IBM-from Nazi Deathcamp computers to Ptech/GIG RBAC Prison Infrastructure





"FORGET 24 TRILLION STOLEN BY THE NWO!!"

Cybercrime grows more devious and malicious

December 1, 2009 - 10:22am
http://media.bonnint.net/wtop/17/1703/170322.mp3

By Suzanne Kubota
Senior Internet Editor
FederalNewsRadio.com

Malware and financial fraud have been listed as the top concerns of security professionals in a new survey by the Computer Security Institute.

According to the 14th Annual CSI Computer Crime and Security Survey, the 443 respondents reported "big jumps in incidence of financial fraud (19.5 percent, over 12 percent last year); malware infection (64.3 percent over 50 percent last year); (and) denials of service (29.2 percent, over 21 percent last year)" among others.

Financial fraud was stated to be one of the biggest concerns because of consistently expensive attacks, "averaging almost $450,000 in losses, per organization that suffered fraud," according to the report's Executive Summary.

Senior Editor, Sara Peters, says the increase in financial fraud despite increased use of technologies to fight it, is "a testament to how sophisticated the attackers are becoming." The malware, said Peters, is more customized and targeted and less suspicious looking. As a result, bad guys are getting better at covering tracks.

Also curious, said Peters, was an increase in denial of service attacks.

"Don't quite know why that is since we've come around to the opinion that denial of services don't make attackers quite as much money as other attacks might because they're so noisy."

It's possible, said Peters, that they might be indication attackers are still willing to give old methods a try while using new ones.

The study also finds that "twenty-five percent of respondents felt that over 60 percent of their financial losses were due to non-malicious actions by insiders." It reasons the "non-malicious, merely careless behavior of insiders drives home the point that security awareness training for end users plays an important role in organizations' security programs. Unfortunately 43.4 percent of respondents stated that less than 1 percent of their security budget was allocated to awareness training."
_______________________________________________________
New cyber threat siphons government money

November 19, 2009 - 10:45am

http://icestream.bonnint.net:8000/dc/fnr/fed_sec_spotlight/!FED_SECURITY_SPOTLIGHT_11-19-2009.mp3

Nov. 19, 2009 -- Federal Security Spotlight this week hosts a return visit from Rodney Joffe, the chief technologist for Neustar  of Sterling, Va.

He has been making the rounds of law enforcement agencies and Capitol Hill with a new report on a new threat.

So-called man-in-the-middle malware is being launched on private and governmental networks with the aim of stealing credentials to access automated clearing houses.

The ACH attack is resulting in lost funds, including state and local governments to the tune of tens of millions of dollars.

Because the thieves use valid credentials, victims are out of luck when seeking help from their banks.

Joffe also says, there is evidence that federal networks are infected.

http://www.neustar.biz/pressroom/whitepapers/ACH_White_Paper.pdf
____________________________________________________
http://www.federalnewsradio.com/?nid=56&sid=1778734

The federal response to cybersecurity

November 24, 2009 - 11:37am

Encore Presenation
This week Federal Security Spotlight talks with Phil Reitinger, deputy undersecretary of Homeland Security for the National Protection and Programs Directorate.

He discusses how the federal response to the cybersecurity challenge is evolving.

He also talks about how his former job as a Microsoft executive is currently helping him.

Offline chris jones

  • Member
  • *****
  • Posts: 21,832
Re: ALERT, NWO EXECUTING MASSIVE CYBER FALSE FLAGS-YOU WERE WARNED
« Reply #24 on: February 18, 2010, 11:47:25 am »
When Billy boy Clinton staed that every American should have a PC and internett, that caused my hairs to stand on end.

Not just becasue I despised the Clint, because it hit me like a ton of bricks, this is going to be their method of tapping into the lives of the citizenry.

Yers ago I knew an electronics engineer, he did a contract job for the Gov. , he was in his cups but told me the Gov has networks intercepting phone messages 24 hours a day,(flag and tag) this was over 30 years ago.

Can you imagine what they are capable of doing with the net?

Offline Satyagraha

  • Global Moderator
  • Member
  • *****
  • Posts: 8,941
Re: ALERT, NWO EXECUTING MASSIVE CYBER FALSE FLAGS-YOU WERE WARNED
« Reply #25 on: February 18, 2010, 11:55:06 am »
When Billy boy Clinton staed that every American should have a PC and internett, that caused my hairs to stand on end.

Not just becasue I despised the Clint, because it hit me like a ton of bricks, this is going to be their method of tapping into the lives of the citizenry.

Yers ago I knew an electronics engineer, he did a contract job for the Gov. , he was in his cups but told me the Gov has networks intercepting phone messages 24 hours a day,(flag and tag) this was over 30 years ago.

Can you imagine what they are capable of doing with the net?

QFT.
Chris - if they were doing this 30 years ago, then today we can't make a sound without having it logged into some database.  Sick bastard control freaks with big-boy toys to blow up people ...they don't go home when nobody plays by their rules - they just blow shit up and blame their next target.



And  the King shall answer and say unto them, Verily I say unto you, 
Inasmuch as ye have done it unto one of the least of these my brethren,  ye have done it unto me.

Matthew 25:40

Anti_Illuminati

  • Guest
Re: NWO considered LIFE IN PRISON for alleged "computer hacking" in 2002
« Reply #26 on: February 18, 2010, 04:40:12 pm »
NWO considered LIFE IN PRISON for alleged "computer hacking" in 2002

http://news.zdnet.co.uk/internet/0,1000000097,2125946,00.htm
US considers jailing hackers for life

Declan McCullagh, CNET News.com CNet
Published: 14 Nov 2002 16:16 GMT

A last-minute addition to a proposal for a Department of Homeland Security would punish malicious computer hackers with life in prison.

The US House of Representatives on Wednesday evening voted 299 to 121 to approve the bill, which would reshape large portions of the federal bureaucracy into a new department combining parts of 22 existing federal agencies, including the Secret Service, the Coast Guard, and the FBI's National Infrastructure Protection Centre.

During closed-door negotiations before the debate began, the House Republican leadership inserted the 16-page Cyber Security Enhancement Act (CSEA) into the Homeland Security bill. CSEA expands the ability of police to conduct Internet or telephone eavesdropping without first obtaining a court order, and offers Internet providers more latitude to disclose information to police.

In July, the full House approved CSEA by a 385-to-3 vote, but it died in the Senate. By inserting CSEA into the Homeland Security bill, the measure's backers are hoping for a second chance before Congress adjourns for the holidays.

"Defending against terrorists who can strike any time with any method requires a change in our approach to the problem," CSEA sponsor Rep. Lamar Smith said in a statement. "We need a new government structure with a clear focus and clear mission to protect Americans and increase public safety. The new Department of Homeland Security will fulfil that vital role."

Earlier this year, Smith said: "Until we secure our cyber infrastructure, a few keystrokes and an Internet connection is all one needs to disable the economy and endanger lives. A mouse can be just as dangerous as a bullet or a bomb."

Smith heads a subcommittee on crime, which held hearings that drew endorsements of CSEA from a top Justice Department official and executives from Microsoft and WorldCom.

Citing privacy concerns, civil liberties groups have objected to portions of CSEA.

"There are a lot of different things to be concerned about, but preserving Fourth Amendment and wiretap standards continues to be a critical test of Congress' commitment of civil liberties," Marc Rotenberg, director of the Electronic Privacy Information Centre, said on Wednesday.

Rotenberg said that CSEA makes "ISPs more closely aligned with law enforcement interests than customer confidentiality interests. It may not be surprising, but it's not good news."

Democratic members of Congress said during Wednesday evening's floor debate that the Department of Homeland Security bill had been rushed to the floor without everyone having a chance to read it. They did not complain specifically about CSEA, which has already been approved near-unanimously by the House.

"We were given a massive new bill this morning that is being rushed through the House with no opportunity for debate," said Rep. Henry Waxman, D-Calif. "I doubt more than 10 people in Congress know (what's) in the bill."

House Majority Leader Dick Armey, R-Texas, replied by saying: "There seems to be a concern that the bill is being rushed to the floor...This was not rushed to the floor. We worked hard on it. We worked together on it."

What CSEA does

If approved by the Senate and signed by the president, who has called for a Department of Homeland Security, the law would:

* Promise life terms for computer intrusions that "recklessly" put others' lives at risk. A committee report accompanying the legislation predicts: "A terrorist or criminal cyberattack could further harm our economy and critical infrastructure. It is imperative that the penalties and law enforcement capabilities are adequate to prevent and deter such attacks."

* Permit limited surveillance without a court order when there is an "ongoing attack" on an Internet-connected computer or "an immediate threat to a national security interest." That kind of surveillance would, however, be limited to obtaining a suspect's telephone number, IP address, URLs or email header information -- not the contents of online communications or telephone calls. Under federal law, such taps can take place when there's a threat of "serious bodily injury to any person" or activity involving organised crime.

* Change current law, which says it's illegal for an Internet provider to "knowingly divulge" what users do except in some specific circumstances, such as when it's troubleshooting glitches, receiving a court order or tipping off police that a crime is in progress. CSEA expands that list to include when "an emergency involving danger of death or serious physical injury to any person requires disclosure of the information without delay".

* Specify that an existing ban on the "advertisement" of any device that is used primarily for surreptitious electronic surveillance applies to online ads. The prohibition now covers only a "newspaper, magazine, handbill or other publication."

Offline Satyagraha

  • Global Moderator
  • Member
  • *****
  • Posts: 8,941
Re: ALERT, NWO EXECUTING MASSIVE CYBER FALSE FLAGS-YOU WERE WARNED
« Reply #27 on: February 19, 2010, 09:43:42 am »
Put hackers (who learn something by hacking into some govt system) in jail for life?
Well.. they can't tell tales in jail.
Probably put them in one of those handy communications detention units; no contact with the outside world. Period.

They won't be making license plates either - they'll be hacking for the government.

And  the King shall answer and say unto them, Verily I say unto you, 
Inasmuch as ye have done it unto one of the least of these my brethren,  ye have done it unto me.

Matthew 25:40

Offline ekimdrachir

  • Member
  • *****
  • Posts: 7,144
  • METATRON ON
    • Go Outside
Re: ALERT, NWO EXECUTING MASSIVE CYBER FALSE FLAGS-YOU WERE WARNED
« Reply #28 on: February 19, 2010, 09:56:05 am »
Skynet Takes Control

http://www.youtube.com/watch?v=YLQlUGorwVA

And heres the ending where John realizes the truth about Skynet and his destiny.

http://www.youtube.com/watch?v=79XKeJtY63E

Anti_Illuminati

  • Guest
Sen. Jay Rockefeller: NOW IS THE TIME TO CONDUCT CYBER FALSE FLAG ATTACKS!
« Reply #29 on: April 29, 2010, 07:09:40 pm »
Richard Hunter, Gartner, discusses the need for CIOs to communicate risk & return in business terms
http://www.youtube.com/watch?v=3s2olGnEASc

This criminal scumbag is a modern day version of the same cyber terrorists who told Indira Singh that she "should have been killed" for exposing Ptech in 2004.

There is a very serious, multiple wargamed, multiple drilled agenda to cyber false flag the SCADA networks to cause an order of magnitute of chaos, fear, "shock and awe", and murder that the 9/11 black op caused.

InfraGard ADMITS in its own document that SCADA controls that are proprietary (non-interoperable) are more difficult to hack than the interoperable, non-proprietary implementations that they want.  This is the same as admitting that they are creating deliberate security.  Leon Panetta's recent extreme propaganda of terrorists preparing to carry out a "digital pearl harbor" is an insane, perpetuated RAND Corporation talking point that has been planned since the 1990's.  The information presented speaks for itself:

http://www.gartner.com/DisplayDocument?doc_cd=110534
   
'Digital Pearl Harbor': Defending Your Critical Infrastructure
4 October 2002

French Caldwell      Richard Hunter  

Gartner and the U.S. Naval War College held a war game to examine scenarios for cyberattacks on national critical infrastructure. Participants came away with a vivid sense of what cyberterrorism could do.

In July 2002, Gartner and the U.S. Naval War College hosted a three-day, seminar-style war game called "Digital Pearl Harbor" (DPH). Gartner analysts and national security strategists gathered in Newport, Rhode Island, with business and IT leaders from enterprises that control parts of the national critical infrastructure. Our objective was to develop a scenario for a coordinated, cross-industry cyberterrorism event.


Results of a post-game survey indicate that the DPH game experience had a profound impact on the participants: 79 percent of the gamers said that a strategic cyberattack is likely within the next two years.

DPH participants played the roles of terrorists, devising coordinated attacks against four national critical infrastructure areas: the electrical power grid, financial service systems, telecommunications and the Internet. Their goal was to determine if a cyberattack could create a crisis of confidence that would shift the strategic balance of power, at least temporarily. Since the game did not test defenses against cyberterrorism, the questions of whether a real attack would achieve the goals set in the game and how much economic damage it would cause are still open.

The question as to whether cyberterrorism is a realistic threat is resolved. DPH skeptics abound, of course, and level many criticisms, but two criticisms stand out.

The first criticism is that by engaging in this type of exercise, we are opening Pandora's box, showing those with malicious intent what could be done. Good point, but before we started, we ran this issue by national security officials, and as one of those officials succinctly put it: "The bad guys already have the knowledge of these systems, and they know what they are going to do." The purpose of the DPH game was to get inside the opponents' heads. All of the data and information created in the DPH game underwent a national security review before we published our analyses.

The second criticism is that there are no new lessons to be learned from the DPH game. Good point, and really a very daunting criticism. Yet, how often do we hear from these same critics: "If only enterprises (or users) would follow good IT security practices ..." But good practices are very difficult to follow. How many readers have ever installed a new operating system or application on their home PC, only to spend the next several days trying to get the PC to work again? Multiply that experience by thousands when you are talking about enterprises installing new applications, security patches and system connections on hundreds or thousands of servers, mainframes and PCs. Preventing such downtime requires deliberate, linear steps that take time, people and money. DPH-type exercises help identify the threats, improve risk management processes and, in turn, prioritize resources for IT security activities. As one military commander put it: "We must shoot the closest wolf first."

Nevertheless, the skeptics have history on their side (as do all Luddites at the dawn of a new era) — there has never been a cyberterrorism event. Or has there? Electrical power grid failures in some parts of the world, such as Western India, are so common that tampering with the grid to test cyberattacks could go unnoticed. This path leads to conspiracy theory oblivion, which is one of the reasons we ran the DPH game: determine what is really possible by a cyberattack.

Even skeptics of a DPH-type attack must acknowledge that our enterprises are under small-scale cyberattacks every day; hence, we are confident most readers will find our analyses of the DPH war game at least somewhat useful and very interesting.

Featured Research

"'Digital Pearl Harbor' War Game Explores 'Cyberterrorism'" By French Caldwell, Richard Hunter and John Bace

"Security Best Practices Will Do Most to Foil Cyberterrorists" By Paul Schmitz, John Mazur and Rich Mogull

"Cyberterror Poses Growing Threat to Financial Services" By John Bace, Annemarie Earley, Vincent Oliva and David Furlonger

"Utilities Should Upgrade the Security of Their Operations" By John Dubiel, Kristian Steenstrup and Paul Pechersky

"Prepare for Cyberattacks on the Power Grid" By John Dubiel, Kristian Steenstrup and Paul Pechersky

"Telecom Is Secure but Not a Cause for Complacence" By David Fraley and Ron Cowles

"Could Terrorists Bring Down the Public Switched Telephone Network?" By David Fraley and Ron Cowles

Recommended Reading and Related Research

"Force Vendors to Make Software More Secure" By Arabella Hallawell and Rich Mogull

"Cyberattacks and Cyberterrorism: What Private Business Must Know" (www.gartnerg2.com/qa/qa-0902-0091.asp ) By Rich Mogull and Richard Hunter

"Dealing With Cyberterrorism: A Primer for Financial Services" (www.gartnerg2.com/qa/qa-1002-0104.asp ) By David Furlonger

"Terrorists Could Hijack the Internet" By Ron Cowles and John Mazur

French Caldwell

Editor in Chief

Business and Public Policy

[email protected]

Richard Hunter

Contributing Editor

Business and Public Policy
_________________________
http://www.msnbc.msn.com/id/3072965/

Protecting against cyber-terrorism
Firms’ digital defenses lag other measures

By Hampton Pearson
D.C. Correspondent
CNBC

Dec. 16 - Visions of air traffic systems going black, online commerce grinding to a halt or a major stock market being taken out of commission may seem surreal. But a new generation of terrorism — targeting the “behind the scenes” infrastructure of companies large and small — is on the radar of Al Qaeda and their peers. So where does our nation stand on shoring up our cyber-defenses?

With images of the September 11th attacks forever forged in the nation’s psyche, another much less visible threat may be looming that could catch corporate America and the nation by surprise — while causing severe economic damage.


Quote
Paul Schoberg, right, at the Naval Postgraduate School in Monterey, Calif., is one of the first students in the Cyber Corps, which aims to boost government security by building experts from scratch. Students work at a federal agency for two years in exchange for a scholarship,

“The nightmare scenario for most in this space is a huge attack on the root servers or the domain name servers or the critical nodes at the Internet itself,” said Dave McCurdy, Executive Director of the Internet Security Alliance, referring to the digital address books and the electronic conduits that route traffic through cyberspace.

[INSERT:  Homeland Security wants master key for the Internet

http://infowars.com/articles/ps/internet_dhs_wants_master_key_for_net.htm
http://www.prisonplanet.com/articles/april2007/020407Internet.htm
Quote
The Inquirer | April 2, 2007
Nick Farrell

THE US Department of Homeland Security is insisting that Verisign hand over the master keys of the Internet.

If it succeeds, the US will be able to track DNS Security Extensions (DNSSec) all the way back to the servers that represent the name system's root zone on the Internet.

Effectively it would mean that US spooks could snoop on anyone in the Worldwide wibble and place control of the Interweb tubes firmly in the paws of the US government.


The information that Homeland security is after the "key-signing key", currently held by Verisign, was revealed to the the meeting of the Internet Corporation for Assigned Names and Numbers (ICANN) in Lisbon.

Not surprisingly other countries in the world are a little concerned about this. According to the German magazine Heise Online, a representative of the EU Commission said that the matter is being discussed with EU member states.

The Internet Assigned Numbers Authority (IANA), which handles route management within the ICANN, could be entrusted with the task of keeping the keys. But the US authorities claims the right to oversee ICANN/IANA.

Unlike aviation, nuclear sites or other high profile physical targets — where metal detectors and other security procedures screen people who gain access — the portal to get onto the Internet is simply a telephone dialup and a personal computer.

And with 85 percent of the Internet infrastructure in the hands of the private sector, the government is struggling to find its regulatory footing when dealing with this relatively immature yet enormously vital industry.

“Our understanding of crime in cyberspace is much worse than our understanding of crime on the street or in the corporate suite,” said Richard Hunter, an analyst with the technology research and consulting firm Gartner Group.

The White House weighed in in September with its National Strategy to Secure Cyberspace. The reaction was mixed.

“They have to first set a good example for the country,” said McCurdy. “By setting a good example they have to have good cyber security policies, procedures, and technology. And they’re not there”

To date, the lion’s share of the responsibility has fallen to companies like Verisign. The firm is tasked with managing and guarding a vast Internet that’s spread across all 7 continents — accessed by some 400 million people each day, who make some 400 billion queries.

Ken Silva is on the front lines for Verisign. His team manages two of the Internet’s 13 global root servers.

“Just to give you an idea, the domestic telephony system does about 2 billion transactions today,” he said. “And our 8 billion (Internet transactions) continues to redouble about every 8-12 months.

Analysts expect this breakneck growth to continue through 2005, when they project 10 percent of the world’s commerce will be Internet-based. But critics worry that business investment in cyber-security isn’t keeping up. And that could have dire consequences.

That’s why Gartner Group, in conjunction with the U.S. Naval War College, recently conducted a series of war games that brought together top industry experts and academics. Their mandate was to quantify potential fallout from cyber-terrorism and seek out the biggest holes in the system.

“Insiders, according to the scenarios we developed at Digital Pearl Harbor, could carry off large-scale attacks with damages in the tens or hundreds of millions of dollars that are aimed at disruption, not profit,” said Hunter.

Those dollar amounts aren’t the same magnitude as the September 11th attack, which took an estimated $150 billion toll on the nation’s economy. But the guardians of cyberspace, like Verisign’s director of public policy, Michael Aisenberg, warn that the government can only hope that we’re all doing our jobs well.

“They can jawbone, they can cajole, they can provide leadership, in some cases they can even provide financial support for security on the Net,” he said. “But in the final analysis, it is the private sector custodians of the key assets like Verisign on whose shoulder the responsibility for Internet security rests.”

Now, both business and government words must be matched by action.
© 2010 CNBC, Inc. All Rights Reserved
_________________________









Anti_Illuminati

  • Guest

Anti_Illuminati

  • Guest

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
Sen. Jay Rockefeller: NOW IS THE TIME TO CONDUCT CYBER FALSE FLAG ATTACKS!
« Reply #32 on: April 30, 2010, 07:35:12 am »
Important events: Sen. Jay Rockefeller to address Business Software Alliance on his and Snowe's CYBER legislation, which is gaining traction and might pass this summer; USecState Tauscher at Center for Am. Progress on NUCLEAR NON-PROLIFERATION TREATY, previewing the administration's position going into talks. ... NRSC chair Cornyn does Christian Science Monitor meal to rebut DNC chair Kaine's rosy Democratic "results" message. http://www.theatlantic.com/politics/archive/2010/04/the-night-beat-sorry-charlie/39662
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
Sen. Jay Rockefeller: NOW IS THE TIME TO CONDUCT CYBER FALSE FLAG ATTACKS!
« Reply #33 on: April 30, 2010, 07:36:41 am »
Business Software Alliance Releases Cybersecurity Framework to Guide Governments’ Efforts Around the World
http://www.businesswire.com/portal/site/home/permalink/?ndmViewId=news_view&newsId=20100429005546&newsLang=en


First Comprehensive Cybersecurity Policy Roadmap the Result of Years of Collaboration by IT Experts and Government Leaders

WASHINGTON--(BUSINESS WIRE)--The Business Software Alliance (BSA) today released a first of its kind Global Cybersecurity Framework to assist countries in crafting effective national policies and laws to thwart cybersecurity threats. The BSA Global Cybersecurity Framework is the result of BSA’s 17 years of work on cybersecurity issues, and represents years of discussion, collaboration and debate among leading software companies, government leaders and policy influencers.

“Our framework serves as an essential policy and enforcement roadmap for all countries around the globe.”


“The BSA Global Cybersecurity Framework provides a comprehensive set of principles and guidelines to help governments meet their responsibilities to protect cyberspace,” said Robert Holleyman, President and CEO of BSA. “Our framework serves as an essential policy and enforcement roadmap for all countries around the globe.”

The Global Cybersecurity Framework presents guiding principles on trust, innovation, policy and international standards. The Framework’s 12-point Roadmap outlines specifically how governments can implement these guiding principles, including strengthening their ability to deter and punish cybercrime, leveraging standards, keeping citizens informed and protected, and building the capacity to prevent and respond to cyber incidents.

“Cybersecurity is a global issue – and no nation can meet this challenge on its own,” said Holleyman. “In the borderless world of cybercrime, national laws and enforcement efforts must align with global approaches and practices.”

Following today’s announcement at the Cybersecurity Forum in Washington, D.C., Holleyman and association members will meet with government officials around the world to discuss the Framework and support its implementation in their respective countries. BSA will track the progress of participating countries in an annual Cybersecurity Scorecard, with the results being announced in 2011.

Today’s BSA Cybersecurity Forum in Washington, D.C., convened government and corporate leaders to discuss current and emerging cyber threats. BSA members, including Microsoft, Symantec, IBM, CA, HP and Intel, and government leaders, including Senator Jay Rockefeller, Chairman, U.S. Senate Committee on Commerce, Science and Transportation and the Honorable Gary Locke, Secretary, U.S. Department of Commerce, are among the participants discussing a global cybersecurity framework to protect public and private institutions and information systems from current and emerging cyber threats.

The full text of the framework is available on the BSA website.

About BSA

The Business Software Alliance (www.bsa.org) is the world’s foremost advocate for the software industry, working in 80 countries to expand software markets and create conditions for innovation and growth. Governments and industry partners look to BSA for thoughtful approaches to key policy and legal issues, recognizing that software plays a critical role in driving economic and social progress in all nations. BSA’s member companies invest billions of dollars a year in local economies, good jobs and next-generation solutions that will help people around the world be more productive, connected and secure. BSA members include Adobe, Altium, Apple, Autodesk, AVEVA, AVG, Bentley Systems, CA, Cadence, Cisco Systems, CNC/Mastercam, Corel, Dassault Systèmes SolidWorks Corporation, Dell, HP, IBM, Intel, Intuit, Kaspersky Lab, McAfee, Microsoft, Minitab, PTC, Progress Software, Quark, Quest Software, Rosetta Stone, Siemens, Sybase, Symantec, Synopsys and The MathWorks.
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
Sen. Jay Rockefeller: NOW IS THE TIME TO CONDUCT CYBER FALSE FLAG ATTACKS!
« Reply #34 on: April 30, 2010, 07:37:25 am »
Jay Rockefeller and Olympia Snowe:

Now Is the Time to Prepare for Cyberwar


http://politifi.com/news/Jay-Rockefeller-and-Olympia-Snowe-Now-Is-the-Time-to-Prepare-for-Cyberwar-375390.html
The Wall Street Journal - 2nd Apr 2010
1
BY Jay Rockefeller AND Olympia Snowe 'If the nation went to war today in a cyberwar, we would lose. We're the most vulnerable. We're the most connected. We have the most to lose." Former Director of National Intelligence Mike McConnell delivered that bracing statement at a recent Senate hearing on cybersecurity. The information networks that nearly every American relies on are under constant attack by sophisticated Cyber adversaries. These adversaries target our identities, our money, our...
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
Sen. Jay Rockefeller: NOW IS THE TIME TO CONDUCT CYBER FALSE FLAG ATTACKS!
« Reply #35 on: April 30, 2010, 07:39:56 am »
EVIDENCE OF PSYCHOSIS!!!!!!!!!!!!!!!!!!

MAYDAY MAYDAY MAYDAY

BATSHIT CRAZY PSYCHOPATHIC GENOCIDAL MANIAC BANKSTER JAY ROCKEFELLER IS IN FULL INSANITY MODE...

http://forum.prisonplanet.com/index.php?topic=129107.80
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
Sen. Jay Rockefeller: NOW IS THE TIME TO CONDUCT CYBER FALSE FLAG ATTACKS!
« Reply #36 on: April 30, 2010, 07:44:38 am »
NOW WE KNOW EXACTLY WHAT PSYCHOPATH JAY ROCKEFELLER MEANT WHEN HE SAID THE FOLLOWING....




Senator (D-WV) John D. Rockefeller IV
[In refererence to why he believes the Internet should not exist]
Wednesday, March 18th, 2009
Commerce Secretary Confirmation Hearing:

[...1:53...]
Both the President Bushs'  Director of National Intelligence, Mike McConnell who I greatly respect, and President Obama's Director of National Intelligence, Admiral (Dennis) Blair, who I greatly respect, have labelled cyber security, perpetrated through the
internet,
as
the #1 national hazard of attack
on the homeland
[...]
It almost makes you ask the question, 'would it have been better if
we'd never invented the internet?'.
[...1:57...]
And it threatens the nation
unlike anything else.
More so than...
suitcase booms,
dirty bombs,
plutonium bombs.
This is what threatens us.
I lay that down as a major, major subject.



[Care of the prison planet forum resident graphics artist Brocke]
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
Sen. Jay Rockefeller: NOW IS THE TIME TO CONDUCT CYBER FALSE FLAG ATTACKS!
« Reply #37 on: April 30, 2010, 07:45:42 am »
Jay Rockefeller: Internet should have never existed
http://www.youtube.com/watch?v=Ct9xzXUQLuY
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
Sen. Jay Rockefeller: NOW IS THE TIME TO CONDUCT CYBER FALSE FLAG ATTACKS!
« Reply #38 on: April 30, 2010, 07:46:00 am »
Jay Rockefeller Can’t Deny His Connection to Modern Eugenics
http://www.infowars.com/jay-rockefeller-cant-deny-his-connection-to-modern-eugenics/
Kurt Nimmo
Infowars
July 22, 2009

Near the end of the video here shot by WeAreChange activists, the great-grandson of John D. Rockefeller can only offer a telling smile when asked about the eugenics history of his family. “Go find somebody else to talk to,” snaps the West Virginia senator when politely asked to elaborate.   

   WeAreChange confront Jay Rockefeller.

As briefly documented in the short video, the Rockefeller family essentially created the modern eugenics movement from scratch. As John B. Sharpless of the University of Wisconsin documented in 1993 after examining the files of the Rockefeller Foundation, the records of the Population Council, and the personal papers of John D. Rockefeller III, Rockefeller spawned foundations are responsible for a “nearly unanimous change in attitudes and ideas about population that occurred during the 1960s.” In addition to the Rockefeller Foundation and the Population Council, other foundations active in eugenics include the Ford Foundation, the Milbank Memorial Fund, the Carnegie Corporation, and the Conservation Foundation.

The Carnegie Institution established a laboratory complex at Cold Spring Harbor on Long Island in 1904 that stockpiled millions of index cards on ordinary Americans, as researchers carefully plotted the removal of families, bloodlines and whole peoples. “From Cold Spring Harbor, eugenics advocates agitated in the legislatures of America, as well as the nation’s social service agencies and associations,” Edwin Black wrote for the San Francisco Chronicle in 2003.

In the United States, key eugenic organizations funded by the Rockefeller, Harriman and Carnegie families included the American Eugenics Society, and its sister organization, the American Society of Human Genetics established in 1947, the above mentioned Cold Springs Harbor Experimental Station for the Study of Evolution, the Eugenic Record Office, and the Rockefeller Institute for Medical Research.

It should be noted that J.D. Rockefeller and Averell Harriman were business partners of Prescott Bush in Brown Brothers Harriman. In addition to funding and promoting eugenics, they supported and funded the Nazi rise to power.   
   
   
Jay Rockefeller’s family is responsible for the racist eugenics policies that led to the mass extermination of millions.   
   


The Rockefellers funded the Kaiser Wilhelm Institute in Germany, ultimately responsible for Hitler’s mass extermination policy. In addition to supporting Alexis Carrel, who advocated the use of poison gas to get rid of useless eaters, the Rockefellers funded the program that Josef Mengele worked in before he went to Auschwitz where he became medical commandant and experimented on concentration camp inmates. These gruesome medical experiments included needles used to change eye color, work on infections and blood transfusions, the removal of limbs without anesthetics, sex changes, sterilization, and other unspeakable crimes. Countless people were murdered and their organs, eyeballs, heads, and limbs sent to the Rockefeller group at the Kaiser Wilhelm Institute.

The Rockefellers’ chief executive for the Kaiser Wilhelm Institute was the fascist Swiss psychiatrist Ernst Rudin. Rudin and his staff, as part of the Task Force of Heredity Experts chaired by SS chief Heinrich Himmler, crafted Germany’s sterilization law. Dr. Alexis Carrel of the Rockefeller Institute and a Nobel Prize winner publically applauded Hitler for advocating the mass murder of mental patients and prisoners.

Rockefeller and his bankster cronies were up to their eyes in eugenics and mass extermination. “Under the Nazis, the German chemical company I.G. Farben and Rockefeller’s Standard Oil of New Jersey were effectively a single firm, merged in hundreds of cartel arrangements. I.G. Farben was led, up until 1937, by the Warburg family, Rockefeller’s partner in banking and in the design of Nazi German eugenics,” writes Anton Chaitkin. Standard-Germany president Emil Helfferich testified after the war that Standard Oil funds helped pay for SS guards at Auschwitz, the notorious mass extermination and slave labor camp.

After the war, the Rockefeller eugenics movement experienced a facelift to distance itself from the discredited Nazis. In the 1950s, the Rockefellers reorganized the U.S. eugenics movement and added population-control and abortion groups. The Eugenics Society changed its name to the Society for the Study of Social Biology — a mere two months after Roe was handed down. “The name was changed because it became evident that changes of a eugenic nature would be made for reasons other than eugenics, and that tying a eugenic label on them would more often hinder than help their adoption. Birth control and abortion are turning out to be great eugenic advances of our time. If they had been advanced for eugenic reasons it would have retarded or stopped their acceptance,” commented Frederick Osborn, who oversaw the workings of the organization at the time.

As documented by Rebecca Messall and others, Roe v. Wade “relies directly and indirectly on the work of members of the British and American eugenic societies and of eugenics-related groups and initiatives.” Abortion has nothing to do with “choice” or empowering women — it is about controlling the masses and culling the herd.


In his excellent study of the Rockefellers, Gary Allen explains that the “Rockefeller game plan is to use population, energy, food, and financial controls as a method of people control which will lead, steadily and deliberately, into the Great Merger,” a one-world government and global fascism. “Understand that … enforced infertility is not planned for India or Senegal, but for the United States, where zero population growth is already a fact.

But we are being led to believe that unless we give Big Brother total power over people’s rights to have children, we will all be ankle deep in human beings within a decade. Such august organizations as the National Academy of Sciences are helping to hawk this Rockefeller line… Curbing population growth is just part of the Rockefeller war on the American family. Abortion is another.

Jay Rockefeller may deny knowledge of his family’s intimate connections to eugenics and abortion — and direct involvement in Hitler’s genocidal rampage across Europe — but the record is out there for all to see. It is easily researched on the internet.

And maybe that is why Jay Rockefeller mused during a Senate committee hearing a few months ago that we’d all be better off if the internet never existed. Minus the internet and search engines, it will be far easier to lead the masses to near extinction if they go ignorantly blissful like lambs to the slaughter with little more resistance than a bleat.

Drastically slashing world population and reducing the remainder into obedient slaves is the final act of the global elite. Jay Rockefeller knows it and that’s what his knowing smile was all about.
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
Sen. Jay Rockefeller: NOW IS THE TIME TO CONDUCT CYBER FALSE FLAG ATTACKS!
« Reply #39 on: April 30, 2010, 07:46:19 am »
WeAreChange NYC & LA make John D. Rockefeler IV run for the hills
http://www.youtube.com/watch?v=1JeFMwpjol4
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately