Author Topic: Kissinger/Brzezinski [CSIS], 4-star Generals [NCOIC] taking over Internet  (Read 30073 times)

0 Members and 1 Guest are viewing this topic.

Offline Pio

  • Member
  • ****
  • Posts: 340
http://tech.yahoo.com/news/nm/20090307/tc_nm/us_cybersecurity_resignation
Cybersecurity chief Beckstrom resigns (Reuters)

    * Posted on Fri Mar 6, 2009 11:46PM EST
   
NEW YORK (Reuters) - The U.S. government's director for cybersecurity resigned on Friday, criticizing the excessive role of the National Security Agency in countering threats to the country's computer systems.

"He has tendered his resignation," Amy Kudwa, a Department of Homeland Security spokeswoman told Reuters.

Former Silicon Valley entrepreneur Rod Beckstrom said in a resignation letter published by the Wall Street Journal it was a "bad strategy" to have the National Security Agency, which is part of the Department of Defense, play a major role in cybersecurity.

Beckstrom headed the National Cybersecurity Center, which was created last March to coordinate all government cybersecurity efforts and answers to the Department of Homeland Security.

Homeland Security said in a statement that it has a strong relationship with the NSA and continues to work closely with all of its partners to protect the country's cyber networks.

Beckstrom wrote to Homeland Security Secretary Janet Napolitano on Thursday in his resignation letter that the NSA currently dominates most national cyber efforts.

"While acknowledging the critical importance of NSA to our intelligence efforts, I believe this is a bad strategy on multiple grounds," he wrote in the letter posted by the Wall Street Journal on its website.

National Security Agency officials could not immediately be reached for comment.

Beckstrom said in his letter that the cybersecurity group did not receive adequate support to accomplish its role during the previous administration of President George W. Bush, which only provided the center with five weeks of funding in the last year.

His resignation will be effective March 13, the letter said.

The newspaper said the Obama administration was conducting a 60-day review of the cybersecurity program started by Bush last year to protect government networks.

(Reporting by Sinead Carew in New York and Christopher Doering in Washington; Editing by Anthony Boadle)

Offline Pio

  • Member
  • ****
  • Posts: 340
Re: U.S. government's director for cybersecurity resigned
« Reply #1 on: March 07, 2009, 10:36:46 am »
Does this have anything to do with what  Anti_Illuminati uncovered about the attack on the web? I tried to read what he has been posting my gut says it is important but I get massive brain fry from this I don't understand. Does anyone know what he is talking about?

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
Cybersecurity chief Beckstrom resigns
Sat Mar 7, 2009 6:19am EST
 http://www.reuters.com/article/domesticNews/idUSTRE5260I620090307


NEW YORK (Reuters) - The U.S. government's director for cybersecurity resigned on Friday, criticizing the excessive role of the National Security Agency in countering threats to the country's computer systems.

"He has tendered his resignation," Amy Kudwa, a Department of Homeland Security spokeswoman told Reuters.

Former Silicon Valley entrepreneur Rod Beckstrom said in a resignation letter published by the Wall Street Journal it was a "bad strategy" to have the National Security Agency, which is part of the Department of Defense, play a major role in cybersecurity.

Beckstrom headed the National Cybersecurity Center, which was created last March to coordinate all government cybersecurity efforts and answers to the Department of Homeland Security.

Homeland Security said in a statement that it has a strong relationship with the NSA and continues to work closely with all of its partners to protect the country's cyber networks.

Beckstrom wrote to Homeland Security Secretary Janet Napolitano on Thursday in his resignation letter that the NSA currently dominates most national cyber efforts.

"While acknowledging the critical importance of NSA to our intelligence efforts, I believe this is a bad strategy on multiple grounds," he wrote in the letter posted by the Wall Street Journal on its website.

National Security Agency officials could not immediately be reached for comment.

Beckstrom said in his letter that the cybersecurity group did not receive adequate support to accomplish its role during the previous administration of President George W. Bush, which only provided the center with five weeks of funding in the last year.

His resignation will be effective March 13, the letter said.

The newspaper said the Obama administration was conducting a 60-day review of the cybersecurity program started by Bush last year to protect government networks.
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
DHS ‘Cyber Security Czar’, No Experience Required
http://www.liquidmatrix.org/blog/tag/rod-a-beckstrom/

Here is a story from last week (March 19) that I missed but, thanks to Bruce Schneier, I’m now standing here scratching my head. It turns out that the Bush administration will tap Rod A. Beckstrom “to head a new inter-agency group charged with coordinating the federal government’s efforts to protect its computer networks from organized cyber attacks.” Maybe I’m a little confused but, isn’t that part of what the DHS does?

From the Washington Post

The new inter-agency group, which will coordinate information sharing about cyber attacks aimed at government networks, is being created as part of a government-wide “cyber initiative” spelled out in a national security directive signed in January by President Bush, according to the sources, who asked to remain anonymous because they did not have permission to talk publicly about the information.

The presidential directive expanded the intelligence community’s role in monitoring Internet traffic to protect against a rising number of attacks on federal agencies’ computer systems. According to the sources, the center will be charged with gathering cyber attack and vulnerability information from a wide range of federal agencies, including the FBI, the National Security Agency and the Defense Department. Beckstrom will report directly to Homeland Security Secretary Michael Chertoff.

Reached via phone Wednesday evening, Beckstrom declined to provide any specifics about his new position, saying only, “I’m thrilled to be on the DHS team, and I am looking forward to doing my best to serve the country.”

The White House and the Department of Homeland Security declined to comment.

OK, leadership is a good thing but, what of his resume? Well, Beckstrom is an author of a book entitled “Starfish and the Spider: The Unstoppable Power of Leaderless Organizations“. He also founded the wiki company Twiki.net. So, he has management experience. But, wouldn’t one surmise that the role should have a person with security experience? Beckstrom apparently has none. I’m of two minds here. I have seen non-security folks run teams and do a fantastic job. That being said I have also seen the opposite with disastrous results.

Basically this has all the hallmarks of a corporate leader being tapped for a thankless job for which he has no experience.

A phrase just keeps rattling around in my head.

How does it go again?

Oh yeah, “Brownie, you’re doing a heck of a job”
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline Monkeypox

  • Member
  • *****
  • Posts: 16,844
  • He Loved Big Brother
    • Monkeypox
nObama Administration = complete joke.

It's like a bunch of High School kids were given control of the country.
War Is Peace - Freedom Is Slavery - Ignorance Is Strength


"Educate and inform the whole mass of the people... They are the only sure reliance for the preservation of our liberty."

—Thomas Jefferson

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
Cyber-Security Czar Quits Amid Fears of NSA Takeover
http://blog.wired.com/defense/2009/03/breaking-cyber.html
By Noah Shachtman March 06, 2009 | 11:52:14 AMCategories: Homeland Security   

Rod Beckström, the Department of Homeland Security's controversial cyber-security chief, has suddenly resigned amid allegations of power grabs and bureaucratic infighting.

Beckström — a management theorist, entrepreneur and author — was named last year to head up the new National Cybersecurity Center, or NCSC. To some, it seemed an odd choice since Beckström isn't an expert in security. But the hope was that he could use his management skills to help coordinate the nation's often-dysfunctional network defenses.

Part of the Department of Homeland Security — for now, the government's lead agency for cyber protection — the Center was supposed to be the one place where the defense of civilian, military and intelligence networks could all be marshaled together.

At least, that was the idea. But the Center never had a chance to even start doing its job, Beckström complained in a resignation letter to DHS Secretary Janet Napolitano that has been obtained by Danger Room. The Center "did not receive appropriate support" from the Department of Homeland Security to help coordinate network defenses, he said.

"During the past year the NCSC received only five weeks of funding, due to various roadblocks engineered within the department and by the Office of Management and Budget."

What's more, Beckström said, it is a fiction that DHS is in charge of the country's cyber security. That power, he asserts, is held by the National Security Agency — the supersecret signals intelligence service — that "currently dominates most national cyber efforts." And that, he says, is not a good idea.

While acknowledging the critical importance of NSA to our intelligence efforts, I believe this is a bad strategy on multiple grounds. The intelligence culture is very different than a network operations of security culture. In addition, the threat to our democratic processes are significant if all top government network security and monitoring are handled by any one organization (either directly of indirectly). During my term as Director we have been unwilling to subjugate the NSCS underneath the NSA.

Last Thursday, the new Director of National Intelligence told Congress that the NSA, not Homeland Security, should be put in charge of network defense.  A week and a day later, Beckström told his bosses that he was through.

"Rod [was] trying to get over NSA's power grab," a cyber-security source with deep government ties tells Danger Room. But in the end, Beckström couldn't. "He jumped nanoseconds before being pushed."
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
nObama Administration = complete joke.

It's like a bunch of High School kids were given control of the country.

actually this was a Bush appointee with zero experience whatsoever.

Looks like he matches the perfect profile for a "Live Free or Die Hard" scapagoat.

This upcomming cyber/bio false flag is what Anti_Illuminati has been exposing.
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
Look at his published articles (although he has no experience). It matches exactly the villain in "Live Free or Die Hard":

Beckstrom on cybersecurity
http://gcn.com/articles/2008/08/08/beckstrom-on-cybersecurity.aspx
LAS VEGAS — Cybersecurity is hampered by a lack of understanding about the physics and economics of the networks we are trying to defend, according to Rod Beckstrom, director of the Homeland Security Department’s National Cyber Security Center, said Thursday at the Black Hat Briefings.

Risk management is a process of balancing security efforts against an acceptable level of risk because absolute security is not possible. But Beckstrom, speaking at the Black Hat Briefings yesterday, said we have no method for valuing our networks or measuring the effectiveness of our security.

FULL ARTICLE:

Beckstrom on cybersecurity
By William Jackson
Aug 08, 2008

FBI takes cybersecurity to school
LAS VEGAS ' Cybersecurity is hampered by a lack of understanding about the physics and economics of the networks we are trying to defend, according to Rod Beckstrom, director of the Homeland Security Department's National Cyber Security Center, said Thursday at the Black Hat Briefings.

Risk management is a process of balancing security efforts against an acceptable level of risk because absolute security is not possible. But Beckstrom, speaking at the Black Hat Briefings yesterday, said we have no method for valuing our networks or measuring the effectiveness of our security.

'Without the economics, we don't have a risk-management function in terms of our investment,' Beckstrom added.

Beckstrom, who has been on the job about four months, did not go into detail about his office's plans, although he said the goal is to build bridges between the military, intelligence and civilian communities in government.

'We're a brand-new government initiative, and we are working on our initial plan,' he said. 'My job is to help foster cooperation and information-sharing between those three communities.'

Information sharing is a common refrain in his comments. His mantra is 'all of us are smarter than any of us.'

To balance cost and returns in risk management, the amount of money spent on security should not exceed the cost of the losses being prevented. Initial investments in IT security typically bring a high rate of return by sharply reducing losses. But finding the point of diminishing returns is difficult without a good economic model.

'We need to do a lot more work in that area,' he said. 'We may want to invest in protocols because it might be the best investment we can make.'

Fixing flaws in the protocols that underlie our networks would give us the biggest bang for the buck in the federal government's security spending, Beckstrom said. Such fixes are relatively cheap and have a wide impact, although they are not necessarily simple to implement, as the current effort to patch the Domain Name System shows. But in times of emergency, keeping network operations functioning is critical to any response.
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
ROD BECKSTRÖM
http://www.beckstrom.com/Bio

Rod Beckström is the Director of the National Cyber Security Center (NCSC) in the U.S. Department of Homeland Security and reports to Secretary Michael Chertoff.

Rod co-authored The Starfish and the Spider: The Unstoppable Power of Leaderless Organizations that presents a new model for analyzing organizations, leadership style and competitive strategy. He has co-authored three other books including one on Value at Risk (VAR), a fundamental theory of financial risk management now used to regulate banking globally.

As an entrepreneur Rod started his first company when he was 24 in a garage apartment and subsequently grew it into a global enterprise with offices in New York, London, Tokyo, Geneva, Sydney, Palo Alto, Los Angeles and Hong Kong. The company, CAT•S Software Inc., went public and was later sold. Nobel Laureates Myron Scholes and William F. Sharpe served on the company's boards of advisors and directors, respectively.

Rod also co-founded Mergent Systems. Mergent was a pioneer in inferential database engines and was sold to Commerce One for $200 million. He also co-founded TWIKI.NET, a company offering service and support for an open source wiki and collaboration software system.

From 1999 to 2001 Rod served as the Chairman of Privada, Inc. Privada was a pioneer in technology to enable private, anonymous and secure credit card transaction processing over the internet.

Rod has helped to start numerous non-profit groups and initiatives. In 2003 he co-founded a peace network of CEO's which initiated Track II diplomatic efforts between India and Pakistan. This group took symbolic actions which led to opening the borders to citizens, trade and contributed to ending the most recent Indo-Pak war. He serves on the boards of the Environmental Defense Fund and Jamii Bora Trust (micro-lending) in Africa.

Rod graduated from Stanford University with an MBA and a BA with Honors and Distinction. He served as Chairman of the Council of Presidents of the combined Stanford student body (ASSU) and was a Fulbright Scholar at the University of St. Gallen in Switzerland.
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
Monday, January 08, 2007
http://digitalnow-resources.blogspot.com/2007_01_01_archive.html
"The Starfish and the Spider"

As we move from Association 1.0 to Association 2.0 in this sea of Web 2.0 change, disruption rules…or does it?

Ori Brafman and Rod Beckstrom, start-up veterans and co-founders of the Global Peace Networks have written a book titled, “The Starfish and the Spider: The Unstoppable Power of Leaderless Organizations.” In this book, Brafman and Beckstrom talk about the age-old topic of decentralized management, but with a biological twist.

If you cut off the leg of a spider, you get a seven-legged, crippled creature. Cut off the leg of a starfish, and it grows a new leg. Not only that, but because a starfish’s major organs are replicated across each of its body parts, a severed leg can grow into an entirely new starfish.

Spiders are like the command-and-control models of industrial organizations—much like many associations today: If you take away a key component, the entire system is crippled. Starfish organizations, however, are organized not around a hierarchy of authority, but around a shared ideology.

So what does this have to do with DigitalNow? As the authors go on to explain the differences and characteristics of each type of organization, the example of the wisdom of the crowds and the work of Jimmy Wales are brought to light.

Back in 2000, Jimmy Wales originally launched Nupedia, a free online encyclopedia that could be used by children whose parents couldn't afford their own set. Publishing was a major task. In looking at how to publish more effectively and efficiently, wikis were discovered. Wiki is a technology that allows web users to easily edit the contents of a web site, facilitating collaborative authoring of articles around a topic. Embracing the technology, Nupedia became Wikipedia – which has grown into a starfish organization that overpowers its spider organization counterparts. Jimmy Wales will be telling the Wikipedia story at DigitalNow 2007; we'll hear more about what went on between the lines.

Regardless of how you characterize your association and its stage of development, the environment in which the world is operating requires thoughtful questions dealing with how your industry or profession and your membership will operate in a new world of decentralization. What will be the new rules and strategies to thrive? How can your association harness the power of the starfish?

Big questions require thoughtful approaches to understanding the implications to your association in 2007 and beyond!
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
Look, they take him out (force him to resign) and he has little connections with the big boys, but look who they put in a few weeks earlier:


Obama taps Bush official to head cybersecurity review

Melissa Hathaway, a former advisor to the Bush administration's Director of National Intelligence, has been selected to lead a 60-day cybersecurity review, after which she is expected to take a position as cybersecurity "czar" within the Obama White House.
http://arstechnica.com/tech-policy/news/2009/02/obama-taps-bush-official-to-head-cybersecurity-review.ars
By Julian Sanchez | Last updated February 10, 2009 2:08 PM CT


The White House announced Monday that Barack Obama has instructed his national security advisors to begin a comprehensive 60-day review of federal cybersecurity initiatives as a prelude to developing an integrated strategy that will coordinate security efforts across government agencies, and between the public and private sectors. The effort will be led by Melissa Hathaway, previously a senior advisor to the Bush administration's Director of National Intelligence, Michael McConnell. Upon completion of the review, Hathaway is reportedly in line for the new post of cybersecurity "czar" in the Obama White House.

Hathaway, a former consultant for Booz Allen Hamilton, played a lead role in developing the Bush administration's Comprehensive National Cybersecurity Initiative as chair of the interagency National Cyber Study Group. In previous published writing, she praised Bush-era cybersecurity efforts, but stressed the need to do far more to combat burgeoning threats to US data infrastructure. Her formal title during the current review will be Acting Senior Director for Cyberspace for the National Security and Homeland Security Councils.

One key question likely to be at the center of the review, which will be carried out jointly by the National Security Council and the Homeland Security Council, is whether leadership responsibility for cybersecurity should be more centralized in the White House. At present, this is primarily the province of the Department of Homeland Security, where former tech entrepreneur Rod Beckstrom heads the National Cyber Security Center. Former Homeland Security Secretary Michael Chertoff has urged that changes to the fledgling cybersecurity initiative—especially changes that would impose new layers of hierarchy—be undertaken cautiously.

An overview of Obama's cybersecurity agenda was posted on the White House website last month as part of the new administration's broader homeland security strategy outline.
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
THE CYBERSPACE FALSE FLAG IS BEING RUN BY BOOZ ALLEN HAMILTON, MITRE, AND PTECH!!!!!!!!!!!!!!!!!!!!!!!!!!

Not by this scapegoat!

He is being positioned to be the Mohammed Atta of the upcomming false flag!
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Anti_Illuminati

  • Guest
THE CYBERSPACE FALSE FLAG IS BEING RUN BY BOOZ ALLEN HAMILTON, MITRE, AND PTECH!!!!!!!!!!!!!!!!!!!!!!!!!!

Not by this scapegoat!

He is being positioned to be the Mohammed Atta of the upcomming false flag!

Holy f**ing sh*t, I just read all of this, OMFG.  I saw a few things in here that I deciphered on the fly, but some of it is going to have to require me to dig around a bit.  Man I hope Alex read and understands everything I posted.  Now you see why the hell I wanted to be on as a guest.  HE HAS TO START TALKING ABOUT THE DUAL-FALSE FLAG, THIS IS NOT JUST ABOUT F*CKING FLU, HE *MUST* UNDERSTAND THIS ASAP, DAMMIT!  SOMEONE SHOULD JUST GIVE ME HIS PERSONAL # SO I CAN TALK TO HIM.

I was trying to emphasize to everyone here that I have some kind of weird "sixth sense" or ultra high discernment capability, I could feel and envision what the hell was happening the more I looked into their documents.  This is NOT some issue which one can casually talk about, it is incredibly voluminous and requires a vast amount of research to really get this.

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
Holy f**ing sh*t, I just read all of this, OMFG.  I saw a few things in here that I deciphered on the fly, but some of it is going to have to require me to dig around a bit.  Man I hope Alex read and understands everything I posted.  Now you see why the hell I wanted to be on as a guest.  HE HAS TO START TALKING ABOUT THE DUAL-FALSE FLAG, THIS IS NOT JUST ABOUT F*CKING FLU, HE *MUST* UNDERSTAND THIS ASAP, DAMMIT!  SOMEONE SHOULD JUST GIVE ME HIS PERSONAL # SO I CAN TALK TO HIM.

I was trying to emphasize to everyone here that I have some kind of weird "sixth sense" or ultra high discernment capability, I could feel and envision what the hell was happening the more I looked into their documents.  This is NOT some issue which one can casually talk about, it is incredibly voluminous and requires a vast amount of research to really get this.

Yup, after reading this kind of crap all the time, these news articles are so easily deciphered to see what is really going on.

But remember, this guy is just being positioned. This is not a done deal, especially if people expose this early enough.

Let people know that now the scapegoat has been positioned into people's minds and who the real cyberterrorists are.
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

nofakenews

  • Guest
Re: U.S. government's director for cybersecurity resigned
« Reply #14 on: March 07, 2009, 05:06:59 pm »
The director of the US Homeland Security's National Cybersecurity Center, Rod Beckstrom resigned on Friday, because of what he described "a power grab by the National Security Agency". Beckstrom, in his resignation letter, harshly criticized NSA for playing undue role in countering threats to the nation's computer systems.

In his bold letter to Janet Napolitano, the secretary of the US Department of Homeland Security (DHS), Beckstrom complained about the excessive role that NSA is playing to control and protect the nation's vast computer networks and systems. In the letter, he stated that NSA currently dominates most national cyber efforts, and asked the DHS secretary, a big question whether the NSA should control cyber efforts.

He wrote that NSA's role in protecting domestic computer networks is debatable, particularly because privacy and civil liberties groups oppose giving such control to U. S. spy agencies. He also brought to the DHS secretary's attention that the National Cybersecurity Center was running short of money.

Confirming the resignation of Beckstrom, a Department of Homeland Security spokeswoman, Amy Kudwa said, "He has tendered his resignation."

In his resignation letter published by the Wall Street Journal, Beckstrom wrote, "It was a bad strategy to have the National Security Agency, which is part of the Department of Defense, play a major role in cybersecurity." He wrote, "While acknowledging the critical importance of NSA to our intelligence efforts, I believe this is a bad strategy on multiple grounds."

He also wrote that "NSA effectively controls DHS cyber efforts through detailees, technology insertions," and proposed moving some functions to the agency's Fort Meade, Maryland, headquarters.

Beckstrom's resignation has come at the time when Obama administration is conducting a 60-day review to determine whether the cybersecurity program started by Bush last year to protect government networks is working well.

In a statement, DHS stated that "it has a strong relationship with the NSA and continues to work closely with all of its partners to protect the country's cyber networks". DHS stated that Beckstrom's resignation will be effective from March 13.

Beckstrom, the former Silicon Valley entrepreneur, was picked for the job on March 20, 2008. He co-founded CATS Software, derivatives and risk management Software Company, and co-founded Twiki. net, a company that supports open-source wikis.

http://topnews.us/content/24173-rod-beckstrom-cybersecurity-director-steps-down

So the nsa will take over cyber security and your internet connection...  :(

Offline lordssyndicate

  • Moderator
  • Member
  • *****
  • Posts: 1,141
  • Stop The New World Order
    • LinkedIn Profile
So , let's get this straight for the record.

They have created a system that can do what the AI virus in terminator 3 can do.
They then stage an initial "Test false flag" to start scaring people into believing that IRAN can get past the fracking filters we have ON every ISPs router at every PHYSICAL BORDER THAT PREVENTS  THEM FROM EVEN SEEING US BASED WEBSITES EVEN ! They need  every one to believe that sh*t really went down just the way they say it did.

So, that when they use these  AI cybervirri that will make it look like IRAN or Terrorists attacked us and comprimised the internet and took out everything including government systems.......

[tangent rant] God let me not spend the next decade - DECADE EVEN (because I can...)- explaining how and why that's impossible that IRAN and terrorists could do such a thing PHYSICALLY IMPOSSIBLE EVEN especially with the evidence you - Anti Illuminati have just handed us. [/tangent rant]

The general  sheeople will all cry "Hobabhhammaaaa SAAAAvVVVVVeee  us from the evil terrorists give us back our internet pleeeeeeasees...." They will turn on Inet2 Sheeople will say " We LOVE joo Hobaaaaamhaaa bah bah bah" and we the true patriots  will loose the freedom we currently have to expose any of this via what we once called the internet . :(

FRAAAAAAAAAAAAAAAAAAACK


Perfect false flag they just layed the ground to destroy the internet any time they choose !

Ok hello people ? wake up they are about to kill the internet here people . Soon even !



We need to expose / stop this ASAP!!!!


"Biotechnology it's not so bad. It's just like all technologies it's in the wrong HANDS!"- Sepultura

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
So , let's get this straight for the record.

They have created a system that can do what the AI virus in terminator 3 can do.
They then stage an initial "Test false flag" to start scaring people into believing that IRAN can get past the fracking filters we have ON every ISPs router at every PHYSICAL BORDER THAT PREVENTS  THEM FROM EVEN SEEING US BASED WEBSITES EVEN ! They need  every one to believe that sh*t really went down just the way they say it did.

So, that when they use these  AI cybervirri that will make it look like IRAN or Terrorists attacked us and comprimised the internet and took out everything including government systems.......

[tangent rant] God let me not spend the next decade - DECADE EVEN (because I can...)- explaining how and why that's impossible that IRAN and terrorists could do such a thing PHYSICALLY IMPOSSIBLE EVEN especially with the evidence you - Anti Illuminati have just handed us. [/tangent rant]

The general  sheeople will all cry "Hobabhhammaaaa SAAAAvVVVVVeee  us from the evil terrorists give us back our internet pleeeeeeasees...." They will turn on Inet2 Sheeople will say " We LOVE joo Hobaaaaamhaaa bah bah bah" and we will loose the freedome we currently have to expose any of this via what we once called the internet . :(

FRAAAAAAAAAAAAAAAAAAACK


Perfect false flag they just layed the ground to destroy the internet any time they choose !

Ok hello people ? wake up they are about to kill the internet here people . Soon even !



We need to expose / stop this ASAP!!!!




Not Iran, they will blame homegrown terrorists possibly working with the guy that just resigned at the king pin.

Watch Live Free or Die Hard to see how this whole thing will look for the sheeple.
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
Re: U.S. government's director for cybersecurity resigned
« Reply #17 on: March 07, 2009, 05:21:53 pm »
Does this have anything to do with what  Anti_Illuminati uncovered about the attack on the web? I tried to read what he has been posting my gut says it is important but I get massive brain fry from this I don't understand. Does anyone know what he is talking about?

yup!

this guy is being positioned to be a scapegoat
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline lordssyndicate

  • Moderator
  • Member
  • *****
  • Posts: 1,141
  • Stop The New World Order
    • LinkedIn Profile
Right , good point Sane.

My bad ... they will claim it is people like us .....calling us all homegrown terrorists :(.... giving them an excuse for the main stream to legitimize  putting us in the FEMA camps even ...

Right :/

Gotcha :(
 Frack :/
 
"Biotechnology it's not so bad. It's just like all technologies it's in the wrong HANDS!"- Sepultura

Anti_Illuminati

  • Guest
"Risk management is a process of balancing security efforts against an acceptable level of risk because absolute security is not possible."

Um, we're not that dumb anymore, k?  Indira Singh's info got out in 2004, and you have permanently and irrevocabley been discredited and monumentally exposed.

"But Beckstrom, speaking at the Black Hat Briefings yesterday, said we have no method for valuing our networks or measuring the effectiveness of our security."

Translation:  Get ready for a false flag, our security is ineffective and once I have left, and Booz Allen secretly carries out the false flag, with the possible coordination by Northcom, I can sit back and say "I told you so."  "We have innumerable computer scientists with multiple master's degrees, Ph.D's, but we can't "secure the Internet", because we don't really want to secure it, we want to take away your rights, particularly free speech.  But nevermind the fact that the Internet is in no danger whatsoever anyways."

'Without the economics, we don't have a risk-management function in terms of our investment,' Beckstrom added.

Translation:  "The staged economic crisis is going to be blamed at least in part, for the staged Cyber attack (coordinating with the avian flu false flag).  And the public will buy into it, because everyone knows for a fact that the economy is in horrible shape, so it is the perfect culpable deniability shield for those at Booz Allen Hamilton.  But I am also engaging in confusion:  we have Risk management, based on the old Ptech, which Booz Allen Hamilton uses for TechGuard's Poliwall's AI filter, and incidentally, the risk management is in and of itself what would be used to execute the false flag, not protect the current Internet infrastructure."

"Beckstrom, who has been on the job about four months, did not go into detail about his office's plans, although he said the goal is to build bridges between the military, intelligence and civilian communities in government."

"'We're a brand-new government initiative, and we are working on our initial plan,' he said. 'My job is to help foster cooperation and information-sharing between those three communities.'"

Hey Mr. beckstrom, you know what?  Michael Chertoff said the same thing, "I wonder why (no that isn't a question)."

Link
BAH - WARGAMING *ALERT* - INTERNET FALSE FLAG - Preemptively Exposed
In a keynote speech at the exercise, Michael Chertoff, secretary of the Department of Homeland Security, warned that cyber threats to America are growing, and he called for a new model of collaboration between government, business and the public.

The goal is also to achieve that which was laid out over a decade ago in multiple documents, i.e. MITRE's Edge publication, research papers at George Mason university System Architectures Laboratory (where Ptech was studied, and used) to bring the final global information grid into existence to help the globalists dominate the Earth.  This will lay in place the technological groundwork for tyranny to be able to later enforce the cashless society, biometric ID cards to force crippling vaccinations, and so on.

Your job is to serve the New World Order, be directly involved in the permanent evisceration of inalienable rights of all, and you will have the blood of millions on your hands for your disgusting treason and murderous intentions, Mr. Beckstrom.

"Information sharing is a common refrain in his comments. His mantra is 'all of us are smarter than any of us.'"

Intelligence cannot supplant liberty and the inalienable rights of free humanity.  Oh, Mr. Beckstrom, if you only knew what you were really involved in...

Genesis 3:3-5
"But of the fruit of the tree which is in the midst of the garden, God hath said, Ye shall not eat of it, neither shall ye touch it, lest ye die.

And the serpent said unto the woman, Ye shall not surely die:

For God doth know that in the day ye eat thereof, then your eyes shall be opened, and ye shall be as gods, knowing good and evil.

"To balance cost and returns in risk management, the amount of money spent on security should not exceed the cost of the losses being prevented. Initial investments in IT security typically bring a high rate of return by sharply reducing losses. But finding the point of diminishing returns is difficult without a good economic model.

'We need to do a lot more work in that area,' he said. 'We may want to invest in protocols because it might be the best investment we can make.'"

http://edge.networkworld.com/news/2009/011509-bgp.html?page=1

[INSERT: U.S. plots major upgrade to Internet router security 01/15/2009
The U.S. federal government is accelerating its efforts to secure the Internet's routing system, with plans this year for the Department of Homeland Security to quadruple its investment in research aimed at adding digital signatures to router communications.


DHS says its routing security effort will prevent routing hijack attacks as well as accidental misconfigurations of routing data. The effort is nicknamed BGPSEC because it will secure the Internet's core routing protocol known as the Border Gateway Protocol (BGP). (A separate federal effort is under way to bolster another Internet protocol, DNS, and it is called DNSSEC.)
________________________________________________________________________
Fixing flaws in the protocols that underlie our networks would give us the biggest bang for the buck in the federal government's security spending, Beckstrom said. Such fixes are relatively cheap and have a wide impact, although they are not necessarily simple to implement, as the current effort to patch the Domain Name System shows. But in times of emergency, keeping network operations functioning is critical to any response.

You mean the false flag avian bird flu emergency so you can roll out IPv6 Teleworking for applicable DoD/Govt. employees, the absolutely perfect cover and credible excuse for the false flags?  You planned on the false flag preemptively, so seriously that you already have one of your NWO tech companies Juniper Networks able to provide Teleworking-enabled network products for COOP (Continuity of Operations), a "sub-component" of Continuity of Government.

Link
Singer says the simulation “really captured the imagination” of those who took part. “Rather than being just a symposium or a conference, it ended up being a learning event,” he says. It was a rare occasion that gave the participants a moment where they could really think things through.”

Right Mr. Singer, criminal terrorist.  because it IS going to be all too real to them because you fully intent to carry out this false flag attack.  Do you think I cannot see through your subtle, almost "cryptic" wording?  You fool.

A key challenge, he says, was to create a very believable scenario, one that would require the leaders to make the same kinds of decisions they would face had the cyber attack been real. Participants said afterward they gained invaluable knowledge.

Andy Singer

Your avian bird flu component of your multi-pronged false flag plan with NORAD-USNORTHCOM has already been peemptivley exposed, and now this.  It is no longer "very believable."  You have lost the element of surprise and shock and awe, and you WILL NOT get away with any false flag high treason against the constitution and bill of rights.

“People walked away saying, ‘I’m empowered to do something about this, and there are people I can work with,’ ” says Singer.  That was one of the goals of Cyber Strategic Inquiry 2008, he says. “It takes it out of the textbooks and articles and makes people experience it. It takes us from believing to knowing.”

We KNOW that you have and are planning to carry out false flag terrorism and just say that it was an accident, and conveniently turn on your IPv6 internet 2 network, and sell it to the public like it's just to be accepted as normal, like it's no big deal at all, while many millions are dead, and you will be relish in the suffering and death of innocent men, women, and children, for your perverted visions and lust for technology, power and "full spectrum dominance."  You are but a man, with red blood running through your veins, and you will pay for your wickedness.

The simulation created a “playbook” that points the way for government, business and civil society to unite against cyber threats, he says. “The findings themselves won’t be groundbreakers, but putting them together provides a coherency and comprehensiveness.”

We know about Dr. Ruth A. David, the 1st "Secretary" of "Homeland Security" 4 years before Booz Allen Hamilton played their part in the 9/11 black op.  WE can be fooled no longer.

Says Singer, “It’s not about solving the problem. It’s about what needs to be solved, and what are some of the possibilities to solve it.”

And that is mass extermination of the American people.  Has the "enemy weapon system" that is the Internet, hurt you, Northcom & Booz Allen Hamilton yet, Mr. Singer?

"Rod has helped to start numerous non-profit groups and initiatives. In 2003 he co-founded a peace network of CEO's which initiated Track II diplomatic efforts between India and Pakistan. This group took symbolic actions which led to opening the borders to citizens, trade and contributed to ending the most recent Indo-Pak war. He serves on the boards of the Environmental Defense Fund and Jamii Bora Trust (micro-lending) in Africa."

Ahh, the goal of world government.  Destroy all boundaries, borders, divisions, and sovereignty, to end war.  How quaint, right out of The Report From Iron Mountain, from the 1960's.

nofakenews

  • Guest
Look at the profile on the guy who is calling it quits

Mr. Rod Beckström is the Director of the National Cybersecurity Center in the United States Department of Homeland Security.  He was appointed to his current position on March 7, 2008,  and reports to Secretary Michael Chertoff.

In his capacity as Director of the Center, he facilitates information sharing and collaboration among Federal Government organizations responsible for various aspects of cybersecurity.  He leads the effort to fuse information across multiple Federal Government domains in order to represent the composite state of U.S. cyber networks and systems.

Before joining the Department of Homeland Security, he founded several companies, including C*ATS Software Inc., which he took public as the Chairman and CEO.  He has co-authored four books, including The Starfish and the Spider: The Unstoppable Power of Leaderless Organizations that presents a new model for analyzing organizational competitive strategies.  He is a graduate of Stanford University with an MBA and a BA with Honors and Distinction. He served as Chairman of the Council of Presidents of the combined Stanford student body and was a Fulbright Scholar at the University of St. Gallen in Switzerland.

http://www.dhs.gov/xabout/structure/bio_1218735057496.shtm


http://en.wikipedia.org/wiki/National_Cyber_Security_Center

The National Cyber Security Center (NCSC) is a newly formed office within the Department of Homeland Security (DHS) and is based on the requirements of National Security Presidential Directive 54/Homeland Security Presidential Directive 23 (HSPD-23), reporting directly to DHS Secretary Michael Chertoff. The NCSC is tasked with protecting the US Government’s communications networks. The Center will monitor, collect and share information on systems belonging to NSA, FBI, DoD, and DHS

Note the hspd-23 and how that correlates with biometrics and this center will move from the DHS over to the NSA..  :-X

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
Right , good point Sane.

My bad ... they will claim it is people like us .....calling us all homegrown terrorists :(.... giving them an excuse for the main stream to legitimize  putting us in the FEMA camps even ...

Right :/

Gotcha :(
 Frack :/
 

Well we do not have all the answers yet.  no need to speculste when their is so much criminal evidence it is amazing these guys are not in jail.  Basically companies like Booz Allen, Mitre, and Ptech are gearing up for a cyber/pandemic flase flag attack on US soil.  The USAF has even planned this to occur in 2009 according to their own documents.  The government organizations involved include the NRO and the NSA.  Ptech is already prevelant throughout the framework of many government agencies like the Secret Service, the White House, The Army, Navy, Air Force, and FAA.  So we know that they have the capability to do this.  We also know that they have motive as they have cornered the market for providing assistance to such false flags and are pushing for increased funding to help after this planned attack.  They also have put non target agencies on a separate system that is impeverous to attack.

So they have left holes in the system that they know about to prepare for their attack on their own system, but put their framework for post-attack services on a sepatate rframework that is impervious to attack.

Then the guy that was supposedly running cyberterror security (even though he has no clue about cyberterror) resign because he is not being taken seriously.

He also wrote a book about how non-centralized power is preferable to centralized power (how interesting-supporting constitutionalists and individual liberty).

So now just watch live free and die hard to see what kind of scenario they can set up and also who they have positioned as the villain.

It is the same exact profile as this guy.

Another "lone gunman" for an attack that could kill millions.

These guys really are conpletely nuts.
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline lordssyndicate

  • Moderator
  • Member
  • *****
  • Posts: 1,141
  • Stop The New World Order
    • LinkedIn Profile
The US government and every ISP / Carrier that has lines into the US has BGPSEC and has had BGPSEC  in place since 2003-05  when all carriers were required to adopt it as a standard and put it in place via legislation that went into place during that time....

Beck Strom is a shill and a puppet  moving the security hacking community into the realm of being useless - ever since he took over black hat. Which he was "forced" to do because  David Maynor  exposed that apple Wifi cards could be trojaned easily remotely without the vicitms knowledge even - and apple sued him and had a gag order placed on him for a year so they could slam him publicly and he couldn't even talk about any of it. Not even how apple knew it was there and didn't bother to fix it till over 2 months after the scandal broke ....  So now that blackhat has become nothing but a bunch of dilly dally know nothings blindly following small potato well known exploit channels... Calling the most advanced intelligent security systems ever developed easily hacked.... The sheeople and the general IT community who are in essence sheeeople believe him.

what a crock...
jeeese ... Beck Strom could barely hack his way out of a paper bag ... take away his nepherness console and his metasploit and he'd be powerless imho ... Isn't that what his testing of government systems proves? I mean he must have hit every single honey pot they wanted him to hit ... Now his box is an NSA trojan distribution center / Virtual Bug and he probably has no clue ....
But then again that's a personal opinion / assumptions and  should not be taken completely as fact ....


What is  a fact is they are indeed setting the stage to take down the internet and it is comming very soon :(....





Everything you just showed proves they are planning this . Please every one read and understand what AI , Sane and I are saying ... This is real and it's coming and we need to stop it now before they push the button and demolition OUR INTERNET.

Our tax dollars paid for DARPA, Our TAX dollars pay to lay the fiber . Then we pay even more on top of it as consumers from ISPs -just to access this system. So, we the people have  paid for the internet essentially - this is OUR internet.


Now they have the balls to try and take it away from us... Man I am hella pissed. Aren't you?
"Biotechnology it's not so bad. It's just like all technologies it's in the wrong HANDS!"- Sepultura

Offline lordssyndicate

  • Moderator
  • Member
  • *****
  • Posts: 1,141
  • Stop The New World Order
    • LinkedIn Profile
Also, this affects every one who uses the internet worldwide.

So, it's not just us americans who will loose, it's every one who uses the internet globally !!
"Biotechnology it's not so bad. It's just like all technologies it's in the wrong HANDS!"- Sepultura

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
The US government and every ISP / Carrier that has lines into the US has BGPSEC and has had BGPSEC  in place since 2003-05  when all carriers were required to adopt it as a standard and put it in place via legislation that went into place during that time....

Beck Strom is a shill and a puppet  moving the security hacking community into the realm of being useless - ever since he took over black hat. Which he was "forced" to do because  David Maynor  exposed that apple Wifi cards could be trojaned easily remotely without the vicitms knowledge even - and apple sued him and had a gag order placed on him for a year so they could slam him publicly and he couldn't even talk about any of it. Not even how apple knew it was there and didn't bother to fix it till over 2 months after the scandal broke ....  So now that blackhat has become nothing but a bunch of dilly dally know nothings blindly following small potato well known exploit channels... Calling the most advanced intelligent security systems ever developed easily hacked.... The sheeople and the general IT community who are in essence sheeeople believe him.

what a crock...
jeeese ... Beck Strom could barely hack his way out of a paper bag ... take away his nepherness console and his metasploit and he'd be powerless imho ... Isn't that what his testing of government systems proves? I mean he must have hit every single honey pot they wanted him to hit ... Now his box is an NSA trojan distribution center / Virtual Bug and he probably has no clue ....
But then again that's a personal opinion / assumptions and  should not be taken completely as fact ....


What is  a fact is they are indeed setting the stage to take down the internet and it is comming very soon :(....





Everything you just showed proves they are planning this . Please every one read and understand what AI , Sane and I are saying ... This is real and it's comming and we need to stop it now before they push the button and demolition OUR INTERNET.

Our tax dollars paid for DARPA, Our TAX dollars pay to lay the fiber . Then we pay even more on top of it just to access this system we the people have paid for essentially .


Now they have the balls to try and take it away from us... Man I am hella pissed. Aren't you?


This is about more than the internet, 50 years ago, we did not have the internet and this will be far worse than 50 years ago.  They are attempting to follow the 20 year old USAF plan to conduct a pandemic (via cyberterror) that was projected to kill 30 million humans.  The aftermath will probably be something like the dark ages.

Just expose this guy and Booz Allen Hamilton, Ptech, and Mitre (also Anser, Promis, and others)

These are the guys planning it.
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline lordssyndicate

  • Moderator
  • Member
  • *****
  • Posts: 1,141
  • Stop The New World Order
    • LinkedIn Profile
This is about more than the internet, 50 years ago, we did not have the internet and this will be far worse than 50 years ago.  They are attempting to follow the 20 year old USAF plan to conduct a pandemic (via cyberterror) that was projected to kill 30 million humans.  The aftermath will probably be something like the dark ages.

Just expose this guy and Booz Allen Hamilton, Ptech, and Mitre (also Anser, Promis, and others)

These are the guys planning it.

Agreed , Sane .

Yet again my bad - sorry for leaving out the full ramifications there... 

Understand this people.

This is of dire importance....
Thanks again  Sane, for the correction.
"Biotechnology it's not so bad. It's just like all technologies it's in the wrong HANDS!"- Sepultura

Offline Please Wake Up!

  • Member
  • ****
  • Posts: 428

Ok... Is it time for me to delve into the PhD Investigative Reports (only for the hardcore) Forum?  Where's the best place to find this info that keeps being referred to as the information that AI has revealed/learned?  I hate exposing myself as not following along but... I'm not following along and from the sounds of it... it's BIG!  I get the Avian Flu portion... not understanding the connection with the internet being squashed.  Clearly, I need some help with translation.  I can't be the only one. 



Offline Pio

  • Member
  • ****
  • Posts: 340
So does anyone talk to Alex? If so is he going to have this guy on the show tomorrow for the 2 hours? Can it be an emergency thing? Like a phone call and recorded by the "audio blog" is that possible? My gut is really saying this is that important! Am I wrong. SOME ONE NEEDS TO CALL ALEX! Has he reviewed the information?

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
Guys....

This is research in progress.

Do not stop your entire lives right now.

Just do what you can to research some of this stuff when you can.

No one said it is happening today.

We are uncovering 20 year old plans.  It is 20 years later and it has not happened yet, so I think we may have a little time.

Always remember that the NWO wants 50% to be asleep and the other 50% to be so bombarded with info about how they control everything (which they most surely do not!) that they are paralyzed to stop their very slow moving plans.

Just do your own research and see if we can piece more things together.

Also make sure people realize who has the most to gain from a possible false flag.  Just like 9/11 was not bin laden, any bio-cyber terror will not be from this scapegoat that just resigned.
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Anti_Illuminati

  • Guest
http://blog.wired.com/27bstroke6/2008/08/revealed-the-in.html
See this link for embedded links (I don't have time to embed them all here.)  Also see this new post:  http://forum.prisonplanet.com/index.php?topic=91498.0

Revealed: The Internet's Biggest Security Hole

Two security researchers have demonstrated a new technique to stealthily intercept internet traffic on a scale previously presumed to be unavailable to anyone outside of intelligence agencies like the National Security Agency.

The tactic exploits the internet routing protocol BGP (Border Gateway Protocol) to let an attacker surreptitiously monitor unencrypted internet traffic anywhere in the world, and even modify it before it reaches its destination.

The demonstration is only the latest attack to highlight fundamental security weaknesses in some of the internet's core protocols. Those protocols were largely developed in the 1970s with the assumption that every node on the then-nascent network would be trustworthy.  The world was reminded of the quaintness of that assumption in July, when researcher Dan Kaminsky disclosed a serious vulnerability in the DNS system. Experts say the new demonstration targets a potentially larger weakness.

"It's a huge issue. It's at least as big an issue as the DNS issue, if not bigger," said Peiter "Mudge" Zatko, noted computer security expert and former member of the L0pht hacking group, who testified to Congress in 1998 that he could bring down the internet in 30 minutes using a similar BGP attack, and disclosed privately to government agents how BGP could also be exploited to eavesdrop. "I went around screaming my head about this about ten or twelve years ago.... We described this to intelligence agencies and to the National Security Council, in detail."

[INSERT:  This tells me that they wanted to save this knowledge for their future attack against it, instead of fixing it for the people.]

The man-in-the-middle attack exploits BGP to fool routers into re-directing data to an eavesdropper's network.

Anyone with a BGP router (ISPs, large corporations or anyone with space at a carrier hotel) could intercept data headed to a target IP address or group of addresses. The attack intercepts only traffic headed to target addresses, not from them, and it can't always vacuum in traffic within a network -- say, from one AT&T customer to another.

The method conceivably could be used for corporate espionage, nation-state spying or even by intelligence agencies looking to mine internet data without needing the cooperation of ISPs.

BGP eavesdropping has long been a theoretical weakness, but no one is known to have publicly demonstrated it until Anton "Tony" Kapela, data center and network director at 5Nines Data, and Alex Pilosov, CEO of Pilosoft, showed their technique at the recent DefCon hacker conference. The pair successfully intercepted traffic bound for the conference network and redirected it to a system they controlled in New York before routing it back to DefCon in Las Vegas.

The technique, devised by Pilosov, doesn't exploit a bug or flaw in BGP. It simply exploits the natural way BGP works.

"We're not doing anything out of the ordinary," Kapela told Wired.com. "There's no vulnerabilities, no protocol errors, there are no software problems. The problem arises (from) the level of interconnectivity that's needed to maintain this mess, to keep it all working."

The issue exists because BGP's architecture is based on trust. To make it easy, say, for e-mail from Sprint customers in California to reach Telefonica customers in Spain, networks for these companies and others communicate through BGP routers to indicate when they're the quickest, most efficient route for the data to reach its destination. But BGP assumes that when a router says it's the best path, it's telling the truth. That gullibility makes it easy for eavesdroppers to fool routers into sending them traffic.

Here's how it works. When a user types a website name into his browser or clicks "send" to launch an e-mail, a Domain Name System server produces an IP address for the destination. A router belonging to the user's ISP then consults a BGP table for the best route. That table is built from announcements, or "advertisements," issued by ISPs and other networks -- also known as Autonomous Systems, or ASes -- declaring the range of IP addresses, or IP prefixes, to which they'll deliver traffic.

The routing table searches for the destination IP address among those prefixes. If two ASes deliver to the address, the one with the more specific prefix "wins" the traffic. For example, one AS may advertise that it delivers to a group of 90,000 IP addresses, while another delivers to a subset of 24,000 of those addresses. If the destination IP address falls within both announcements, BGP will send data to the narrower, more specific one.

To intercept data, an eavesdropper would advertise a range of IP addresses he wished to target that was narrower than the chunk advertised by other networks. The advertisement would take just minutes to propagate worldwide, before data headed to those addresses would begin arriving to his network.

The attack is called an IP hijack and, on its face, isn't new.

But in the past, known IP hijacks have created outages, which, because they were so obvious, were quickly noticed and fixed. That's what occurred earlier this year when Pakistan Telecom inadvertently hijacked YouTube traffic from around the world. The traffic hit a dead-end in Pakistan, so it was apparent to everyone trying to visit YouTube that something was amiss.

Pilosov's innovation is to forward the intercepted data silently to the actual destination, so that no outage occurs.

Ordinarily, this shouldn't work -- the data would boomerang back to the eavesdropper. But Pilosov and Kapela use a method called AS path prepending that causes a select number of BGP routers to reject their deceptive advertisement. They then use these ASes to forward the stolen data to its rightful recipients.

"Everyone ... has assumed until now that you have to break something for a hijack to be useful," Kapela said. "But what we showed here is that you don't have to break anything. And if nothing breaks, who notices?"

Stephen Kent, chief scientist for information security at BBN Technologies, who has been working on solutions to fix the issue, said he demonstrated a similar BGP interception privately for the Departments of Defense and Homeland Security a few years ago.

Kapela said network engineers might notice an interception if they knew how to read BGP routing tables, but it would take expertise to interpret the data.

A handful of academic groups collect BGP routing information from cooperating ASes to monitor BGP updates that change traffic's path. But without context, it can be difficult to distinguish a legitimate change from a malicious hijacking. There are reasons traffic that ordinarily travels one path could suddenly switch to another -- say, if companies with separate ASes merged, or if a natural disaster put one network out of commission and another AS adopted its traffic. On good days, routing paths can remain fairly static. But "when the internet has a bad hair day," Kent said, "the rate of (BGP path) updates goes up by a factor of 200 to 400."

Kapela said eavesdropping could be thwarted if ISPs aggressively filtered to allow only authorized peers to draw traffic from their routers, and only for specific IP prefixes. But filtering is labor intensive, and if just one ISP declines to participate, it "breaks it for the rest of us," he said.

"Providers can prevent our attack absolutely 100 percent," Kapela said. "They simply don't because it takes work, and to do sufficient filtering to prevent these kinds of attacks on a global scale is cost prohibitive."

Filtering also requires ISPs to disclose the address space for all their customers, which is not information they want to hand competitors.

Filtering isn't the only solution, though. Kent and others are devising processes to authenticate ownership of IP blocks, and validate the advertisements that ASes send to routers so they don't just send traffic to whoever requests it.

Under the scheme, the five regional internet address registries would issue signed certificates to ISPs attesting to their address space and AS numbers. The ASes would then sign an authorization to initiate routes for their address space, which would be stored with the certificates in a repository accessible to all ISPs. If an AS advertised a new route for an IP prefix, it would be easy to verify if it had the right to do so.

The solution would authenticate only the first hop in a route to prevent unintentional hijacks, like Pakistan Telecom's, but wouldn't stop an eavesdropper from hijacking the second or third hop.

For this, Kent and BBN colleagues developed Secure BGP (SBGP), which would require BGP routers to digitally sign with a private key any prefix advertisement they propagated. An ISP would give peer routers certificates authorizing them to route its traffic; each peer on a route would sign a route advertisement and forward it to the next authorized hop.

"That means that nobody could put themselves into the chain, into the path, unless they had been authorized to do so by the preceding AS router in the path," Kent said.

The drawback to this solution is that current routers lack the memory and processing power to generate and validate signatures. And router vendors have resisted upgrading them because their clients, ISPs, haven't demanded it, due to the cost and man hours involved in swapping out routers.

Douglas Maughan, cybersecurity research program manager for the DHS's Science and Technology Directorate, has helped fund research at BBN and elsewhere to resolve the BGP issue. But he's had little luck convincing ISPs and router vendors to take steps to secure BGP.

"We haven't seen the attacks, and so a lot of times people don't start working on things and trying to fix them until they get attacked," Maughan said. "(But) the YouTube (case) is the perfect example of an attack where somebody could have done much worse than what they did."

ISPs, he said, have been holding their breath, "hoping that people don’t discover (this) and exploit it."

"The only thing that can force them (to fix BGP) is if their customers ... start to demand security solutions," Maughan said.

---

(Image: Alex Pilosov (left) and Anton "Tony" Kapela demonstrate their technique for eavesdropping on internet traffic during the DefCon hacker conference in Las Vegas earlier this month. (Wired.com/Dave Bullock)

See Also:

    * More on BGP Attacks (Including Slides from DefCon Talk)
    * Black Hat: DNS Flaw Much Worse Than Previously Reported
    * Details of DNS Flaw Leaked; Exploit Expected by End of Today
    * Kaminsky on How He Discovered DNS Flaw and More
    * DNS Exploit in the Wild -- Update: 2nd More Serious Exploit Released
    * Experts Accuse Bush administration of Foot-Dragging on DNS Security Hole
    * OpenDNS Wildly Popular After Kaminsky Flaw Disclosure
__________________________________________________________
The following is red alert level sh*t:

Meeting Presentations
http://www.mors.org/completed_events.htm






Anti_Illuminati

  • Guest
Let's back up in time.  Welcome to totally unqualified, TS clearance, Senior Policy Analyst of Information Analysis Infrastructure Protection (IAIP), Mr. Faisal Gill, who had ZERO experience for this job at "DHS".




Faisal Gill

How did the spokesman for an organization founded by a declared Hamas supporter, and convicted Al Qaeda financier, land a top policy position at the Department of Homeland Security? The answer involves the terror donor's funding of another Muslim group, set up by Washington core insider Grover Norquist.

Total access lobbyist (GOP donors only), Bush vassal and Rove counselor, Norquist has been strategy point-man for Muslim votes and dollars. He's provided White House entree for a long list of "moderate Muslim" leaders to meet with the President. Though never officially tallied, six of the ten most prominent guests have since been charged with financing global terror, and the remaining four were connected with groups similarly charged.

Gill's former boss, Abdurrahan Alamoudi, was among the unfortunate seven, and is now serving a 23 year sentence. His American Muslim Council, despite Gill's efforts, was named a terror front group and disbanded. The group Alamoudi funded for Grover Norquist, called the Islamic Institute, remained unscathed. Gill was also its Director of Government Affairs. Gill has never been investigated for financing or supporting terror. He is one of several with close ties to Norquist given high posts in the Bush Administration. Only one of them has been criminally charged, and convicted.

Though lacking any known experience in security or information analysis, Gill's position at DHS was Senior Policy Analyst of Information Analysis Infrastructure Protection (IAIP) At 32 , former terror group spokesman Faisal Gil was among those drafting policy on "sensitive homeland security information." He had top security clearance.

Gill did have a bit of a problem in June '04, when it was reported he'd omitted his previous position with Alamoudi on his resume. He was suspended for five days, then reinstated, the explanation being that he'd worked for Alamoudi through his two-partner firm, AG Consulting, which he did include.

His partner Asim Ghafoor, also spokesman for the Alamoudi and Norquist groups, has been public liason for several major designated terror entities. Representing fugitive Soliman al-Buthe, indicted for terrorism, Ghafoor learned of government wiretaps without proper warrants, and sued for more than $1million.

Though the Senate Finance Committee, in August 2004, asked how Gill's terror group connections weren't discovered by DHS background checks, nothing came of the matter, and Gill was still at DHS in December of that year. That's when press reports caused a seven month postponement to the purchase of American owned, FCC-licensed Cypress Communications by Arcapita, a pan-Arabic privately owned $50 billion conglomerate..

Arcapita's chairman, Mohammed Abdulaziz Aljomaih, is among the names on the "Golden Chain," a list of Al Qaeda's top 20 financiers seized in a Bosnia anti-terror raid in 2002. Foreign takeovers of American companies in sensitive industries are reviewed by the Council on Foreign Investments in the United States (CFIUS). It's a cross-agency panel Chaired by the Treasury Secretary, at that time John Snow.

Prior to his appointment one year earlier, Snow had sold part of the American transport company he headed, to Dubai. He'd sold another chunk to the Bush-related Carlyle Group, One year after the delayed Arcapita deal was allowed, Secretary Snow was also the one formally approving the sale of US ports' management to Dubai.

When the NY Times broke the story, President Bush first claimed he'd known nothing about it, but two days later threatened a veto, his first in six years, if Congress tried to stop it. Bill Clinton was a high paid lobbyist for the Dubai deal, but it ultimately didn't go through. As for the Arcapita purchase of an FCC licensed company in 2005, that did go through. The company's president simply claimed the Al Qaeda financier on the "Golden Chain" document was some other Mohammed Abdulaziz Aljomaih, though there's no other known Arab billionaire with that name.

Gill's role in the approval process is not known, though his position was specifically defined for such matters. As of early 2008, Faisal Gill and partner Asim Ghafoor have a DC consulting firm company called Sapentia, whose website boasts of their Homeland Security expertise. Sapentia's focus, they say, is finding opportunities for government contractors, and "directing Federal resources to them through the appropriations process." At that same time, Gill was running for Virginia's House of Delegates.


Sources
www.wired.com/politics/law/news/2007/07/haramain_appeal
dir.salon.com/story/news/feature/2004/06/24/gill_review/index.html
www.theworld.org/latesteditions/05/20060504.shtml
Approval of Cypress/Arcapita deal: hraunfoss.fcc.gov/edocs_public/attachmatch/DA-05-1850A1.txt, www.state.tn.us/tra/orders/2004/0400417g.pdf
page15.com/2005/06/dhs-probes-bank-chairmans-terror-links.html? FCC Public Notice, June 28, 2005
Report from "Northeast Intelligence Network": www.mensnewsdaily.com/archive/m-n/manion/2005/manion063005.htm

Faisal Gill was a participant or observer in the following events:

It is discovered that the Department of Homeland Security's intelligence division policy director has disturbing associations with known radical militants. Faisal Gill, a White House political appointee with close ties to powerful Republican lobbyist Grover Norquist and no background in intelligence, failed to disclose on security clearance documents that he had worked with Abdurahman Alamoudi, a lobbyist with suspected terrorist ties. This is a potential felony. Jailed at the time, Alamoudi will be sentenced to 23 years in prison later in the year for plotting with Libyan agents to kill the de facto ruler of Saudi Arabia (see October 15, 2004).

Gill is briefly removed from his job when his incorrect disclosures are discovered, but it is ultimately decided that he can keep his job. Salon notes that "Gill has access to top-secret information on the vulnerability of America's seaports, aviation facilities, and nuclear power plants to terrorist attacks." Gill previously worked in an organization tied to both Alamoudi and Norquist. One anonymous official says, "There's an overall denial in the administration that the agenda being pushed by Norquist might be a problem. It's so absurd that a Grover Norquist person could even be close to something like this. That's really what's so insidious."

Another official complains, "Who is Abdurahman Alamoudi? We really don't know. So how can we say there is not a problem with his former aide?" [Salon, 6/22/2004]

http://www.historycommons.org/entity.jsp?entity=faisal_gill
__________________________________________________________

http://www.sapentia.us/faisal_gill.html

Faisal Gill served as a Senior Policy Advisor to the Under Secretary for Information Analysis and Infrastructure Protection at the Department of Homeland Security. As such he was responsible for formulating and coordinating policy for the intelligence directorate. In this capacity he advised the Under Secretary on policy issues ranging from intelligence policy, infrastructure protection, cyber security and information sharing initiatives.

Previously, he worked at the White House Office of Homeland Security and then later the Homeland Security Council as associate counsel where he handled critical infrastructure and border security issues. He also served as principal counsel to the President's Critical Infrastructure Protection Board.

Prior to coming to the White House, Faisal served as the Deputy General Counsel for Policy at the Office of Personnel Management.

Before joining the Bush Administration, Faisal was the field director for Jay Katzen, the Republican candidate for Lieutenant Governor of Virginia.

Gill also served in the United States Navy Judge Advocate General's Corps and currently is a Lieutenant Commander in the US Naval Reserve.

He has a BA and JD from American University in Washington, DC.

nofakenews

  • Guest
http://blog.wired.com/27bstroke6/2008/08/revealed-the-in.html
See this link for embedded links (I don't have time to embed them all here.)  Also see this new post:  http://forum.prisonplanet.com/index.php?topic=91498.0

Revealed: The Internet's Biggest Security Hole

Two security researchers have demonstrated a new technique to stealthily intercept internet traffic on a scale previously presumed to be unavailable to anyone outside of intelligence agencies like the National Security Agency.

The tactic exploits the internet routing protocol BGP (Border Gateway Protocol) to let an attacker surreptitiously monitor unencrypted internet traffic anywhere in the world, and even modify it before it reaches its destination.

The demonstration is only the latest attack to highlight fundamental security weaknesses in some of the internet's core protocols. Those protocols were largely developed in the 1970s with the assumption that every node on the then-nascent network would be trustworthy.  The world was reminded of the quaintness of that assumption in July, when researcher Dan Kaminsky disclosed a serious vulnerability in the DNS system. Experts say the new demonstration targets a potentially larger weakness.

"It's a huge issue. It's at least as big an issue as the DNS issue, if not bigger," said Peiter "Mudge" Zatko, noted computer security expert and former member of the L0pht hacking group, who testified to Congress in 1998 that he could bring down the internet in 30 minutes using a similar BGP attack, and disclosed privately to government agents how BGP could also be exploited to eavesdrop. "I went around screaming my head about this about ten or twelve years ago.... We described this to intelligence agencies and to the National Security Council, in detail."

[INSERT:  This tells me that they wanted to save this knowledge for their future attack against it, instead of fixing it for the people.]

The man-in-the-middle attack exploits BGP to fool routers into re-directing data to an eavesdropper's network.

Anyone with a BGP router (ISPs, large corporations or anyone with space at a carrier hotel) could intercept data headed to a target IP address or group of addresses. The attack intercepts only traffic headed to target addresses, not from them, and it can't always vacuum in traffic within a network -- say, from one AT&T customer to another.

The method conceivably could be used for corporate espionage, nation-state spying or even by intelligence agencies looking to mine internet data without needing the cooperation of ISPs.

BGP eavesdropping has long been a theoretical weakness, but no one is known to have publicly demonstrated it until Anton "Tony" Kapela, data center and network director at 5Nines Data, and Alex Pilosov, CEO of Pilosoft, showed their technique at the recent DefCon hacker conference. The pair successfully intercepted traffic bound for the conference network and redirected it to a system they controlled in New York before routing it back to DefCon in Las Vegas.

The technique, devised by Pilosov, doesn't exploit a bug or flaw in BGP. It simply exploits the natural way BGP works.

"We're not doing anything out of the ordinary," Kapela told Wired.com. "There's no vulnerabilities, no protocol errors, there are no software problems. The problem arises (from) the level of interconnectivity that's needed to maintain this mess, to keep it all working."

The issue exists because BGP's architecture is based on trust. To make it easy, say, for e-mail from Sprint customers in California to reach Telefonica customers in Spain, networks for these companies and others communicate through BGP routers to indicate when they're the quickest, most efficient route for the data to reach its destination. But BGP assumes that when a router says it's the best path, it's telling the truth. That gullibility makes it easy for eavesdroppers to fool routers into sending them traffic.

Here's how it works. When a user types a website name into his browser or clicks "send" to launch an e-mail, a Domain Name System server produces an IP address for the destination. A router belonging to the user's ISP then consults a BGP table for the best route. That table is built from announcements, or "advertisements," issued by ISPs and other networks -- also known as Autonomous Systems, or ASes -- declaring the range of IP addresses, or IP prefixes, to which they'll deliver traffic.

The routing table searches for the destination IP address among those prefixes. If two ASes deliver to the address, the one with the more specific prefix "wins" the traffic. For example, one AS may advertise that it delivers to a group of 90,000 IP addresses, while another delivers to a subset of 24,000 of those addresses. If the destination IP address falls within both announcements, BGP will send data to the narrower, more specific one.

To intercept data, an eavesdropper would advertise a range of IP addresses he wished to target that was narrower than the chunk advertised by other networks. The advertisement would take just minutes to propagate worldwide, before data headed to those addresses would begin arriving to his network.

The attack is called an IP hijack and, on its face, isn't new.

But in the past, known IP hijacks have created outages, which, because they were so obvious, were quickly noticed and fixed. That's what occurred earlier this year when Pakistan Telecom inadvertently hijacked YouTube traffic from around the world. The traffic hit a dead-end in Pakistan, so it was apparent to everyone trying to visit YouTube that something was amiss.

Pilosov's innovation is to forward the intercepted data silently to the actual destination, so that no outage occurs.

Ordinarily, this shouldn't work -- the data would boomerang back to the eavesdropper. But Pilosov and Kapela use a method called AS path prepending that causes a select number of BGP routers to reject their deceptive advertisement. They then use these ASes to forward the stolen data to its rightful recipients.

"Everyone ... has assumed until now that you have to break something for a hijack to be useful," Kapela said. "But what we showed here is that you don't have to break anything. And if nothing breaks, who notices?"

Stephen Kent, chief scientist for information security at BBN Technologies, who has been working on solutions to fix the issue, said he demonstrated a similar BGP interception privately for the Departments of Defense and Homeland Security a few years ago.

Kapela said network engineers might notice an interception if they knew how to read BGP routing tables, but it would take expertise to interpret the data.

A handful of academic groups collect BGP routing information from cooperating ASes to monitor BGP updates that change traffic's path. But without context, it can be difficult to distinguish a legitimate change from a malicious hijacking. There are reasons traffic that ordinarily travels one path could suddenly switch to another -- say, if companies with separate ASes merged, or if a natural disaster put one network out of commission and another AS adopted its traffic. On good days, routing paths can remain fairly static. But "when the internet has a bad hair day," Kent said, "the rate of (BGP path) updates goes up by a factor of 200 to 400."

Kapela said eavesdropping could be thwarted if ISPs aggressively filtered to allow only authorized peers to draw traffic from their routers, and only for specific IP prefixes. But filtering is labor intensive, and if just one ISP declines to participate, it "breaks it for the rest of us," he said.

"Providers can prevent our attack absolutely 100 percent," Kapela said. "They simply don't because it takes work, and to do sufficient filtering to prevent these kinds of attacks on a global scale is cost prohibitive."

Filtering also requires ISPs to disclose the address space for all their customers, which is not information they want to hand competitors.

Filtering isn't the only solution, though. Kent and others are devising processes to authenticate ownership of IP blocks, and validate the advertisements that ASes send to routers so they don't just send traffic to whoever requests it.

Under the scheme, the five regional internet address registries would issue signed certificates to ISPs attesting to their address space and AS numbers. The ASes would then sign an authorization to initiate routes for their address space, which would be stored with the certificates in a repository accessible to all ISPs. If an AS advertised a new route for an IP prefix, it would be easy to verify if it had the right to do so.

The solution would authenticate only the first hop in a route to prevent unintentional hijacks, like Pakistan Telecom's, but wouldn't stop an eavesdropper from hijacking the second or third hop.

For this, Kent and BBN colleagues developed Secure BGP (SBGP), which would require BGP routers to digitally sign with a private key any prefix advertisement they propagated. An ISP would give peer routers certificates authorizing them to route its traffic; each peer on a route would sign a route advertisement and forward it to the next authorized hop.

"That means that nobody could put themselves into the chain, into the path, unless they had been authorized to do so by the preceding AS router in the path," Kent said.

The drawback to this solution is that current routers lack the memory and processing power to generate and validate signatures. And router vendors have resisted upgrading them because their clients, ISPs, haven't demanded it, due to the cost and man hours involved in swapping out routers.

Douglas Maughan, cybersecurity research program manager for the DHS's Science and Technology Directorate, has helped fund research at BBN and elsewhere to resolve the BGP issue. But he's had little luck convincing ISPs and router vendors to take steps to secure BGP.

"We haven't seen the attacks, and so a lot of times people don't start working on things and trying to fix them until they get attacked," Maughan said. "(But) the YouTube (case) is the perfect example of an attack where somebody could have done much worse than what they did."

ISPs, he said, have been holding their breath, "hoping that people don’t discover (this) and exploit it."

"The only thing that can force them (to fix BGP) is if their customers ... start to demand security solutions," Maughan said.

---

(Image: Alex Pilosov (left) and Anton "Tony" Kapela demonstrate their technique for eavesdropping on internet traffic during the DefCon hacker conference in Las Vegas earlier this month. (Wired.com/Dave Bullock)

See Also:

    * More on BGP Attacks (Including Slides from DefCon Talk)
    * Black Hat: DNS Flaw Much Worse Than Previously Reported
    * Details of DNS Flaw Leaked; Exploit Expected by End of Today
    * Kaminsky on How He Discovered DNS Flaw and More
    * DNS Exploit in the Wild -- Update: 2nd More Serious Exploit Released
    * Experts Accuse Bush administration of Foot-Dragging on DNS Security Hole
    * OpenDNS Wildly Popular After Kaminsky Flaw Disclosure
__________________________________________________________
The following is red alert level sh*t:

Meeting Presentations
http://www.mors.org/completed_events.htm







Yep seen that one and remember how they said the were running out of space awhile back. I remember some youtube video on the subject but I'm running a blank but check this out.

Stimulus and internet2
https://admin.acrobat.com/_a823099699/p58724343/


Offline donnay

  • Member
  • *****
  • Posts: 17,961
  • Live Free Or Die Trying!
This is not only starting to sound like the plot from; Live Free or Die Harder but, it's beginning to sound like the plot in the movie-- The Net--the GateKeepers.

The Net: http://en.wikipedia.org/wiki/The_Net_(film)

A fellow analyst from Cathedral Software, Dale, sends Angela Bennett (Sandra Bullock) a program on a disk that when run displays a peculiar symbol (π) in the lower-right corner. Dale instructs Angela to hold the CTRL and SHIFT buttons while clicking the π symbol, revealing that it gives the user entry point access to government and military computer systems. It is learned 'they' have recently implemented a newly developed piece of illegitimate 'protection' software called The GateKeeper System and this is what the film hinges upon.

The movie Sneakers is another good flick: http://www.imdb.com/title/tt0105435/plotsummary

Martin Bishop is the head of a group of experts who specialize in testing security systems. When he is blackmailed by Government agents into stealing a top secret black box, the team find themselves embroiled in a game of danger and intrigue. After they recover the box, they discover that it has the capability to decode all existing encryption systems around the world, and that the agents who hired them didn't work for the Government after all...

Please visit my website: https://www.theherbsofthefield.com/

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
This is not only starting to sound like the plot from; Live Free or Die Harder but, it's beginning to sound like the plot in the movie-- The Net--the GateKeepers.

The Net: http://en.wikipedia.org/wiki/The_Net_(film)

A fellow analyst from Cathedral Software, Dale, sends Angela Bennett (Sandra Bullock) a program on a disk that when run displays a peculiar symbol (π) in the lower-right corner. Dale instructs Angela to hold the CTRL and SHIFT buttons while clicking the π symbol, revealing that it gives the user entry point access to government and military computer systems. It is learned 'they' have recently implemented a newly developed piece of illegitimate 'protection' software called The GateKeeper System and this is what the film hinges upon.

The movie Sneakers is another good flick: http://www.imdb.com/title/tt0105435/plotsummary

Martin Bishop is the head of a group of experts who specialize in testing security systems. When he is blackmailed by Government agents into stealing a top secret black box, the team find themselves embroiled in a game of danger and intrigue. After they recover the box, they discover that it has the capability to decode all existing encryption systems around the world, and that the agents who hired them didn't work for the Government after all...



Yes Sneakers seems to be a major subplot of Live Free or Die Hard.  Not too many people have seen that one though.  If you can find it at your video store (not a torrent, we do not approve of torrents or torrent searches at websites like pirate bay!), make sure to see it.  I have to watch the Net again.  Also the movie Hackers and Track Down shouls help to understand.
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline lordssyndicate

  • Moderator
  • Member
  • *****
  • Posts: 1,141
  • Stop The New World Order
    • LinkedIn Profile
So, they execute an IP reflection attack..
IP hijacking is allowed to occur ...
Boom they have an instant means to scapegoat for their false flag ...

I pointed out flaws in ARIN's SWIP process  to them and the FBI in 2002 even and never heard back about it... I wrote a letter that I will attempt to dig up describing end to end how some one could at the time and still even now fake a dns host resolution send an e-mail and SWIP entire blocks of IPs to who ever they wanted... This could in effect be done just long enough (without some one noticing ..) to convince some unknowing person to announce oh say sprint ... and knock entire ISPs offline.


The attack pillo has has taken this further and the only ones who could have let them were their handlers aka the governement.... So their attack shows they themselves can announce a block ips harvest the data and reroute packets anywhere they choose without client or host machine ever catching it!  Who else can and has claimed they have intentionally designed the net so they can do that ? Oh wait it's the federal government and the NSA ... rememebr the global spy grid the router level sniffing ?
Hello those are all intentional back doors....

 
So, to finish out my story .... At the time I told every one I knew at the time about about it, and I never heard back from the FBI or ARIN.... However I noticed that between 2003 and 2005 all of the border routers crossing over to other countries all of a sudden had filters to prevent IP Hijacking from comming from outside of the US bound for any US network.  This is already there... They already have filters that oprevent anything from coming from the outside of the US to successfully execute this attack...


Setting the stage for a major false flag by home grown terrorists / hackers.....

An attack that will affect anything hooked to the power grid essentially... So anything that  doesn't have a manual switch like a light switch must be unplugged ... or shut off on a breaker panel ...


They will then conveniently blame it on homegrown terrorists -knowing the public has no clue that the only ones capable are the government ... Think about those switching terminators they put in every power meter as mandated by federal law a couple years back....... Remember DARPA used power lines to communicate between facilities before they used anything else ... That was back in the 50s and 60s even !  It's a lot faster than fiber but if they told the public then every one would know how damning the FCC compliance laws are in exposing what they can really do with DARPAnet....


Now here they set the stage showing how they jump through their own INTENTIONAL backdoors so some one else could do the same ...in Theory .....

Thereby setting the stage and convincing the sheeople we are vunerable so they buy the load of crap they try to  sell them about this next major false flag ...
"Biotechnology it's not so bad. It's just like all technologies it's in the wrong HANDS!"- Sepultura

Anti_Illuminati

  • Guest
Setting the stage for a major false flag by home grown terrorists / hackers.....

An attack that will affect anything hooked to the power grid essentially... So anything that  doesn't have a manual switch like a light switch must be unplugged ... or shut off on a breaker panel ...

Ptech magnifies the problem by orders of magnitude, for the following reasons (and probably more reasons that I don't even know):

Ptech knows weaknesses into any electronic systems that are beyond what humans are able to find. It can execute the most devastating attacks possible. (Ptech is used to DESIGN weapons sytems, such as for Raytheon):

http://forum.prisonplanet.com/index.php?topic=89041.msg522402#msg522402

Raytheon has also used the Ptech Enterprise tool to develop Zachman and DoDAF views. Ptech’s concordant knowledge base was used to create the AV-2 and the OV-3 for a portion of the Military Information Architecture Accelerator (MIAA). Raytheon used the Ptech software to publish a CD, allowing the customer to examine the architecture through a web browser and also exported the OV-5 activity model as code for a Colored Petri Net simulation.

Ptech can act autonomously, so it could be used in a timeb0mb scenario, where it is already set to attack, but waiting for a certain time, or it can also be backdoor triggered

You could actually have people involved in the "cyber security" events that are not corrupt, and they would have no idea what the hell happened, they would believe whatever they were told.

Ptech is so powerful, because not only is it AI, it is a code generator.  It can CREATE other software by itself, it can create other architecture frameworks, God knows what it's limits are.  Official statements (I can't recall specifically who said this atm) were that Ptech can even improve ITSELF, if it determines that there are code patterns that will result in more realistic/powerful artificial intelligence.

There can be secret backdoors to it that even the people who know about it and have it setup are completely unaware of.

Look at this bs:  Critical Infrastructure Incidents
__________________________________________________________
RSA: Shutting down power grid is no problem for hackers
[LOL, Ptech is in RSA, fyi]
"Gaining access to IT systems and shutting down the electricity grid is simple, a security expert told the RSA security conference in Las Vegas. He told delegates he had done so in less than a day."
Link

INTERNET LAW - CIA Report: Cyber Extortionists Attacked Foreign Power Grid, Disrupting Delivery

In an unusually bold statement detailing another incursion of the Net battle targeting government sites, the CIA admitted web hackers penetrated overseas power grids, compromising service while demanding payment in exchange for cessation. The U.S. Central Intelligence Agency made this announcement at a meeting hosted by the SANS Institute on January 16, in New Orleans, LA. The meeting was of 300 U.S., British, Swedish, and Dutch government officials, engineers and security managers from electric, water, oil & gas and other essential infrastructure industry asset owners from North America. The SANS Institute offers solutions for hacked companies.

This topic has been detailed in previous IBLS articles on Internet attacks targeting governmental and industrial sites, such as 'Cyber Cold War' Has Been Launched. There are now a large number of hackers toiling round the clock to find weaknesses in important computer systems in order to steal intellectual property and also to plan a Cyber Cold War. These hackers have been especially linked to sites found in China and Russia, and are thought to be officially state-sanctioned employees. See also, Chinese Web Spies Steal Rolls Royce & Shell Oil Secrets.

Tom Donahue, the CIA's top cybersecurity analyst, said, "We have information, from multiple regions outside the United States, of cyber intrusions into utilities, followed by extortion demands. We suspect, but cannot confirm, that some of these attackers had the benefit of inside knowledge. We have information that cyber attacks have been used to disrupt power equipment in several regions outside the United States. In at least one case, the disruption caused a power outage affecting multiple cities. We do not know who executed these attacks or why, but all involved intrusions through the Internet."

An attendee of the meeting said that the attack was not well-known through the industry and came as a surprise to many there. Said the person who asked to remain anonymous, "There were apparently a couple of incidents where extortionists cut off power to several cities using some sort of attack on the power grid, and it does not appear to be a physical attack."

While Americans may believe they exist behind the walls of a fail-safe computer system, a recent demonstration has shown this is not the case. An example of the potential of unknown web users hacking into U.S. power grids was recently highlighted last September when CNN showed a U.S. Department of Homeland Security video, known as the "Aurora Generator Test." This test depicted an Idaho National Laboratory attack, showing how a software assault on the site computer system controlling power generators made one unit inoperable. In fact, the cyber-attack left the generator a smoking hulk.

At the annual DefCon Hacker Conference in August, staged at Las Vegas, analyst Ganesh Devarajan from the security firm Tipping Point gave a presentation on various techniques on how hackers could access a SCADA (Supervisory Control And Data Acquisition) system to hijacking and sabotage them. SCADA systems are typically used to control industrial site computer systems.

Alan Paller, director of the SANS Institute, says "In the past two years, hackers have in fact successfully penetrated and extorted multiple utility companies that use SCADA systems. Hundreds of millions of dollars have been extorted, and possibly more. It's difficult to know, because they pay to keep it a secret. This kind of extortion is the biggest untold story of the cybercrime industry."

Paller says he fears these types of industrial Internet sabotage incidents will increase in the future, stating, "There's been very active and sophisticated chatter in the hacker community, trading exploits on how to break through capabilities on these systems. That kind of chatter usually precedes bad things happening."

Hacker extortion also is more often against private entities, reports Bruce Schneier, chief technology officer for security firm BT Counterpane. A typical target of such activities would be offshore-hosted Web sites for pornography and gambling enterprises. Schneier claims power companies are a new victim.

Schneier believes that security analysts should not simply assume the SCADA system was the entry point in the assalts, especially since the CIA claimed the penetration resulted from "inside knowledge" of systems access. He said, "How much of this is a computer vulnerability, how much is a human vulnerability? I wouldn't jump to any conclusions." But Schneier also dismisses the idea that America is safer than the rest of the world in terms of industrial infrastructure attacks, stating "There's nothing magical about a system being in the U.S. The same vulnerabilities are everywhere."

Paller said he believes agent Tom Donahue and the CIA had very carefully pondered whether to reveal the disturbing information before they released the bombshell and had done so with a specific purpose, going against normal protocol to not unduly alarm the public. Said Pall, "My sense is that they wouldn't have disclosed this if they thought the problem had been fixed."
__________________________________________________________
I can see the headlines now:  "Hackers that were extremely angry over the economic crisis disabled the power grids to Washington DC".  Or: "Hackers miffed about the economy bypassed the security to the electronic doors in a bio weapons lab, releasing a deadly avian bird flu strain that was 'never intended to be allowed out of the lab'."  Again, culpable deniability, or plausible deniability, whichever it would be.

Offline lordssyndicate

  • Moderator
  • Member
  • *****
  • Posts: 1,141
  • Stop The New World Order
    • LinkedIn Profile
Enter the possible relevant coreleation further setting the stage for home grown terror :

https://www.fbo.gov/index?s=opportunity&mode=form&id=3c9d2849f07a72c7aeca93af2fea0c85&tab=core&_cview=1

Solicitation Number:
FA8751-08-R-0016 Notice Type:
Presolicitation Synopsis:
Added: February 25, 2008 Modified: March 7, 2008Track Changes
The purpose of this amendment is to correct the specifications. The response date of TUE 11 MAR 08 remains the same. The item description hereby is changed to read:

Item 1: Sony PlayStation 3 Game Console - 40 GB Hard Drive

Qty: 300

Sony Part Number 98006

Specifications:

Processor: CPU: Cell Broadband Engine. GPU: RSX.

Main Memory: 256MB XDR Main RAM. 256MB GDDR3 VRAM.

Hard Drive: 2.5" Serial ATA Drive- 40GB.

I/O Ports: (2) USB 2.0 ports.

Communication: Ethernet (10Base-T/100Base-TX/1000Base-T). IEEE 802.11 b/g Wi-Fi. Bluetooth 2.0 (EDR). Wireless Controller Bluetooth (up to 7).

A/V Output: Screen Size: 480i, 480p, 720p, 1080i, 1080p HDMI. HDMI Out (x1/HDMI). Analog: AV Multi-Out x 1 Digital Audio. Digital Out (OPTICAL) x 1 Blu-ray/DVD/CD Drive "read only".



Dimensions: 13.0"w x 3.92"h x 11.0"d.



Point of Contact

Robert Gigliotti, Contract Specialist, Phone 315-330-2205, FAX, 315-330-2555, Email [email protected].


Contracting Office Address:
Department of the Air Force, Air Force Materiel Command, AFRL - Rome Research Site, AFRL/Information Directorate 26 Electronic Parkway, Rome, NY, 13441-4514, UNITED STATES
Point of Contact(s):
Robert Gigliotti, Contract Specialist, Phone 315-330-2205, Fax 315-330-2555, Email [email protected]


Becomes more significant when combind with this article:
http://blogs.zdnet.com/security/?p=2339

SSL broken! Hackers create rogue CA certificate using MD5 collisions
Posted by Ryan Naraine @ 6:00 am

Using computing power from a cluster of 200 PS3 game consoles and about $700 in test digital certificates, a group of hackers in the U.S. and Europe have found a way to target a known weakness in the MD5 algorithm to create a rogue Certification Authority (CA), a breakthrough that allows the forging of certificates that are fully trusted by all modern Web browsers.

The research, which will be presented today by Alex Sotirov (top left) and Jacob Appelbaum (bottom left) at the 25C3 conference in Germany, effectively defeats the way modern Web browsers trust secure Web sites and provides a way for attackers to conduct phishing attacks that are virtually undetectable.

The research is significant because there are at least six CAs currently using the weak MD5 cryptographic algorithm in digital signatures and certificates.  The most commonly used Web browsers — including Microsoft’s Internet Explorer and Mozilla’s Firefox — whitelist these CAs, meaning that a fake Certificate Authority can display any site as secure (with the SSL padlock).

“We basically broke SSL,” Sotirov said in an interview ahead of his 25C3 presentation.


Our main result is that we are in possession of a “rogue” Certification Authority (CA) certificate. This certificate will be accepted as valid and trusted by many browsers, as it appears to be based on one of the “root CA certificates” present in the so called “trust list” of the browser. In turn, web site certificates issued by us and based on our rogue CA certificate will be validated and trusted as well. Browsers will display these web sites as “secure”, using common security indicators such as a closed padlock in the browser’s window frame, the web address starting with “https://” instead of “http://”, and displaying reassuring phrases such as “This certificate is OK ” when the user clicks on security related menu items, buttons or links.

Researchers at the Centrum Wiskunde & Informatica (CWI) in the Netherlands, EPFL in Switzerland, and Eindhoven University of Technology (TU/e) in the Netherlands helped in the design and implementation of the attack using an advanced implementation of a known MD5 collision construction and a cluster of more than 200 PlayStation 3 game consoles.

According to Sotirov, a rogue CA in combination with Dan Kaminsky’s DNS attack can have serious consequences:

For example, without being aware of it, users could be redirected to malicious sites that appear exactly the same as the trusted banking or e-commerce websites they believe to be visiting. The web browser could then receive a forged certificate that will be erroneously trusted, and users’ passwords and other private data can fall in the wrong hands. Besides secure websites and email servers, the weakness also affects other commonly used software.

Sotirov said the team was able to secure NDAs in advance of briefing the major browser vendors about the problem but because of issues — some practical and some political — there are no straightforward fixes unless the CAs stop using MD5 and move to the more secure SHA-1 algorithm.

To avoid abuse, the team back-dated its rogue CA (it was set only for August 2004) and will not release the private key.   “We’re also not going to release the special code that we used to do the MD5 collisions until later this year,” Sotirov added.

“We don’t anticipate this attack to be repeatable very easily.  If you do a naive implementation, you would need six months to run it successfully,” he added.

Arjen Lenstra, head of EPFL’s Laboratory for Cryptologic Algorithms, the key objective of the research was to stimulate better Internet security with adequate protocols that provide the necessary security.

The key takeaway, according to Lenstra: “It’s imperative that browsers and CAs stop using MD5, and migrate to more robust alternatives such as SHA-2 and the upcoming SHA-3 standard.”


Further Details:

Detailed explanation


Slides from the 25c3 presentation

Demo site (set your system date to August 2004 before clicking)

Colliding certificates:


Real Certificate

Rouge CA

Ryan Naraine is a security evangelist at Kaspersky Lab, an anti-malware company with operations around the world. See his full profile and disclosure of his industry affiliations.
Email Ryan Naraine

For daily updates on Ryan's activities, follow him on Twitter.





.....

So , yet another example of another piece being set on the stage...
"Biotechnology it's not so bad. It's just like all technologies it's in the wrong HANDS!"- Sepultura

Offline lordssyndicate

  • Moderator
  • Member
  • *****
  • Posts: 1,141
  • Stop The New World Order
    • LinkedIn Profile
Little Background here on Kaspersky Labs:

http://www.theregister.co.uk/2008/02/15/kaspersky_profile_mixup/
Eugene Kaspersky and the KGB man that never was
 -AV boss has bone to pick with The Guardian
By John Leyden • Get more from this author

Posted in Security, 15th February 2008 08:02 GMT

Free whitepaper – Trend Micro marries security with Cloud Computing

The Guardian has apologised to Eugene Kaspersky after mistakingly naming the anti-virus guru as a former KGB officer.

Eugene Kaspersky, co-founder and chief exec of the internet security company Kaspersky Lab, was described as a "KGB man" and a lieutenant in the KGB in an otherwise accurate article (The ex-KGB man stalking the cybercriminals since renamed The Russian defence against global cybercrime).

In reality, Kaspersky studied cryptography at a high school which was co-sponsored by the Russian department of defence and the KGB. He then went on to work for the department of defence as a cryptologist and later as an anti-virus researcher. During this time Kaspersky developed an interest in anti-virus research.

From 1991 to 1997 Eugene worked at the KAMI Information Technologies Center where he and his colleagues developed the AVP antivirus project. He founded Kaspersky Lab with former wife Natalia, who remains the chairman of the Russian anti-virus firm, in 1997.

Anti-virus firms often go to considerable lengths to imply they are involved in a hi-tech cloak-and-dagger fight against malware authors, so The Guardian can perhaps be forgiven its error (Don't be ridiculous - Ed). The phenomenon most clearly manifests itself in the facilities chosen by anti-virus firms to host security centres.

Symantec's European centre of operations, for example, is housed in a former nuclear shelter in rural Hampshire. Kaspersky's former Moscow HQ is in a building where scientists used to design nuclear weapons guidance systems. ®

Bootnote
Eugene Kaspersky is a colourful figure in the world of computer security, which has been taken over by marketing types in recent years. Not the sort of fella you want to end up facing across a poker table perhaps, at least if you're betting with money you don't want to lose. The Russian favours whisky over the local preference for vodka.

His motivation techniques are somewhat unusual. He owns a bone taken from a walrus penis which he used to jokingly wave around to inspire the troops carrying out the grunt work of anti-virus analysis during our visit to the firm's Moscow HQ in December 2003.


_____________________________________


While he has no ties to the KGB he merely worked for the Russian and Soviet DOD....



Merely showing that there are many international hands in this pie  so to speak ....




"Biotechnology it's not so bad. It's just like all technologies it's in the wrong HANDS!"- Sepultura

TheGoodFight1984

  • Guest
Wow, this is really starting to paint a fairly clear picture now isn't it. Took a few days for Anti_Illuminatis info to click in, what it all meant, but it now all makes sense..

Offline Pio

  • Member
  • ****
  • Posts: 340
I would like to know why this is not an emergency(getting this info out)? I mean this information is like having the plan before 9/11 and saying " No rush in getting it out" sorry for the record I disagree.