The first global cyber war has begun

Moderators: Elvis, DrVolin, Jeff

Re: The first global cyber war has begun

Postby Plutonia » Mon Aug 01, 2011 12:26 pm

Looks like they got their man after all and he's cooler than ever:

Jake Davis [aka LulzSec spokesman Topiary]the Scottish Hacker looks like Neo from the Matrix, was Reading book about Libertarian Scientists

Image

Arrested teen hacker Jake Davis cut a defiant figure outside the City of Westminster Crown Court, wearing sunglasses and waving a science book at the massed photographers and press keen to see the human behind the hacker persona.

The Police are now certain that Davis was Topiary - a LulzSec ringleader responsible for many of their high-profile attacks including SOCA and The Sun, and also the group's flamboyant press releases and Twitter accounts.

Tweeter ShonaGosh pointed out Davis' resemblance to Neo from the Matrix. It's those sunglasses isn't it. Damn that film for making hacking look cool.

The book Davis was reading in custody was "Free radicals. The secret anarchy of science" by Michale Brooke (on Amazon)

The book is described on Amazon as blowing out the myths of scientists as rational sober experimenters.

"For more than a century, science has cultivated a sober public image for itself. But the truth is very different: many of our most successful scientists have more in common with libertines than librarians. This thrilling exploration of some of the greatest breakthroughs in science reveals the extreme lengths some scientists go to in order to make their theories public. Inspiration can come from the most unorthodox of places: Nobel laureates sometimes get their ideas through drugs, dreams and hallucinations. Science is a highly competitive and ruthless discipline, and only its most determined and passionate practitioners make headlines - and history. That's why fraud, suppressing evidence and unethical or reckless PR games are sometimes necessary to bring the best and most brilliant discoveries to the world's attention. In science, anything goes."

Image


http://www.shinyshiny.tv/2011/08/jake-d ... -book.html
[the British] government always kept a kind of standing army of news writers who without any regard to truth, or to what should be like truth, invented & put into the papers whatever might serve the minister

T Jefferson,
User avatar
Plutonia
 
Posts: 1267
Joined: Sat Nov 15, 2008 2:07 pm
Blog: View Blog (0)

Re: The first global cyber war has begun

Postby Joe Hillshoist » Mon Aug 01, 2011 10:55 pm

operator kos wrote:http://www.rawstory.com/rawreplay/2011/07/former-bush-nsa-director-calls-for-digital-blackwater/

Former Bush NSA director calls for ‘digital Blackwater’

Posted on 07.30.11
By David Edwards
Categories: Featured, Nation

The man who headed the NSA and CIA under President George W. Bush suggested Friday that mercenaries were needed to deal with growing cyber threats.

Gen. Michael Hayden told the Aspen Security Forum that in the near future, the Department of Defense may have to allow the creation of a “digital Blackwater.”

Private sector offense “might be one of those big new ideas in terms of how we have to conduct ourselves in this new cyber domain,” Hayden explained. “You think back long enough in history and there are times when the private sector was responsible for its own defense.”

“We may come to a point where defense is more actively and aggressively defined even for the private sector and what is permitted there is something that we would never let the private sector do in physical space… Let me really throw out a bumper sticker for you. How about a digital Blackwater?” he suggested.

“I mean, we have privatized certain defense activities even in physical space and now you’ve got a new domain in which we don’t have any paths trampled down in the forest in terms of what it is we expect the government or will allow the government to do. In the past when that has happened, private sector expands to fill the empty space. I’m not quite an advocate for that, but these are the kinds of things that are going to be put into play here very, very soon.”



Haven't they already fucked that one up?
Joe Hillshoist
 
Posts: 10616
Joined: Mon Jun 12, 2006 10:45 pm
Blog: View Blog (0)

Re: The first global cyber war has begun

Postby Hugh Manatee Wins » Mon Aug 01, 2011 11:11 pm

The Pentagon/DARPA/NSA have ruled the internets ever since there was an internets.

See 'Echelon,' a strategy, not an event.

DeVeNCI - Defense Venture Capitalist Initiative. See the airport decoy novel by Dan CIA Brown and movie by Tom CIA Hanks.

Image

http://devenci.dtic.mil/

The Defense Venture Catalyst Initiative (DeVenCI) focuses on increasing Department of Defense (DoD) awareness of emerging commercial technologies developed by non-traditional DoD procurement sources, and on increasing the awareness of DoD needs and requirements within these sources.

Interactive participation of the venture capital community, small innovative companies, and potential DoD customers is a proven way to accelerate the identification of emerging commercial technologies relevant to DoD needs. The DeVenCI model is to broker interactions that transfer knowledge and understanding between DoD participants with specific capability needs and small innovative companies. The goal is to find emerging technologies aimed at commercial market driven needs that also could be applied to DoD needs.


Image
CIA runs mainstream media since WWII:
news rooms, movies/TV, publishing
...
Disney is CIA for kidz!
User avatar
Hugh Manatee Wins
 
Posts: 9869
Joined: Wed Nov 23, 2005 6:51 pm
Location: in context
Blog: View Blog (0)

Re: The first global cyber war has begun

Postby seemslikeadream » Sat Aug 06, 2011 8:11 pm

AntiSec Hackers Release 10GB of Law Enforcement Data
David Murphy By David Murphy

Hackers associated with the "AntiSec" collaboration between Anonymous and recently disbanded hacker group LulzSec have released more than ten gigabytes of information from 70 different law enforcement agencies across the United States. The leakers call it one of their largest data dumps yet, released as retaliation for recent U.S. and U.K. arrests of alleged AntiSec members.

Nestled within the data dump, posted as both a BitTorrent release and posted on sites accessible via the Tor anonymity network, are more than 300 different email accounts from 56 law enforcement websites. Details from the ransacked Missouri Sherriff's Association website also appear in the release, including user names and passwords as well as users' home addresses, phone numbers, and social security numbers – a move that's sure to infuriate law enforcement officials even before they note the actual name of the hackers' release, "Shooting Sheriffs Saturday."

Also found within the release are various police training files, a list of users who have submitted information to an online "anonymous" crime tip system, and various server-related information and login credentials.

"We have no sympathy for any of the officers or informants who may be endangered by the release of their personal information. For too long they have been using and abusing our personal information, spying on us, arresting us, beating us, and thinking that they can get away with oppressing us in secrecy," reads the hackers' Pastebin-posted manifesto. "Well it's retribution time: we want them to experience just a taste of the kind of misery and suffering they inflict upon us on an everyday basis."

The hack was allegedly perpetuated following an initial breach of a server owned by the company Brooks-Jeffrey Marketing, which hosts various sheriff's association sites. The server was initially taken offline following confirmation of the first attack, but its subsequent relaunch allegedly kept intact the same backdoor methods the hackers users to access the original server. At that point, the hackers went ahead and started defacing the more than 70 different law enforcement agency domains associated with Brooks-Jeffrey Marketing.

"We lol'd as we watched the news reports come in, quoting various Sheriffs who denied that they were ever hacked, that any personal information was stolen, that they did not store snitch info on their servers. Many lulz have been had as we taunted the sheriffs by responding to their denials by tweeting teasers exposing their SSNs, passwords, addresses, and private emails," reads the hackers' manifesto.

The hackers also used stolen credit card information to make donations to the American Civil Liberties Union, the Electronic Frontier Foundation, and the Bradley Manning Support Network, among other organizations.
Mazars and Deutsche Bank could have ended this nightmare before it started.
They could still get him out of office.
But instead, they want mass death.
Don’t forget that.
User avatar
seemslikeadream
 
Posts: 32090
Joined: Wed Apr 27, 2005 11:28 pm
Location: into the black
Blog: View Blog (83)

Re: The first global cyber war has begun

Postby seemslikeadream » Mon Aug 22, 2011 3:56 pm

New Leaks Reveal Insider Tips on S&P’s U.S. Credit Downgrade to Killer-Drone Firm
by Tom Burghardt / August 22nd, 2011

We live in an age where insider deals, conflicts of interest, revolving doors between “regulators” and the “regulated” (lubricated with oceans of cash) accompanies the generalized looting of social wealth by deviant capitalist elites.

That such behavior by our corporate masters no longer raises an eyebrow, let alone elicit action by authorities charged with stopping criminal miscreants destroying other people’s lives, is an unmistakable sign that the much-vaunted “free market” system, staring into an abyss of its own creation, has entered a terminal phase.

It now appears that insiders at Standard and Poor’s or the Treasury Department, take your pick, may have leaked information to privileged clients on the recent U.S. credit downgrade, with confirmation coming from a surprising source.

Last week, AntiSec cyber-guerrillas (a loose alliance amongst individuals affiliated with LulzSec and Anonymous) released a 1GB cache of emails filched from security contractor Vanguard Defense Industries (VDI).

Previously Anonymous and LulzSec have wrapped their keyboards around defense grifters Booz Allen Hamilton, ManTech International, NATO, the Department of Homeland Security, the FBI, InfraGard (a “public-private” security alliance amongst corporate heavy-hitters and the Bureau), the CIA, the Arizona Department of Public Safety, the Arizona Counter Terrorism Information Center (a so-called “fusion center” staffed by cops, federal agents, private contractors and the U.S. military), the Bay Area Rapid Transit agency (BART), Britain’s Serious Organised Crime Agency, PBS, Fox News, and repressive governments such as Egypt, Tunisia and Zimbabwe.

Their latest campaign targeted VDI, a Texas-based firm, which specializes in the “development and deployment” of Unmanned Aerial Systems (UAS, killer drones). VDI “draws on specialized experience of senior aerospace engineers, former military special operations officers, military instructor pilots as well as retired Senior Executive Service Federal Agents,” claiming their “background and operational knowledge has afforded us the unique vision to provide a platform that will extend the security and response capabilities of any organization,” according to a blurb on their web site.

While VDI touts their ability to offer “support” to the “military, local, state and federal law enforcement as well as the private sector,” the firm also offers “a full scope of consulting services independent of our aerial technology.”

That “unique vision”, however, didn’t prevent AntiSec from spiriting away thousands of emails from VDI’s Senior Vice President Richard T. Garcia, a former FBI Assistant Director in Los Angeles who recently left a well-paid position as Global Security Manager for the environment-killing Shell Oil Corporation (can you say Niger Delta?) for “greener” pastures.

A press statement from AntiSec announced that the leak “contains internal meeting notes and contracts, schematics, non-disclosure agreements, personal information about other VDI employees, and several dozen ‘counter-terrorism’ documents classified as ‘law enforcement sensitive’ and ‘for official use only’.”

“Vanguard Defense Industries,” AntiSec writes, “manufactures unmanned ‘ShadowHawk’ drones which cost $640,000 and are equipped with grenade launchers and shotguns. ShadowHawks are currently in use by law enforcement, military, and private corporations deploying them in the US, the Horn of Africa, Panama, Columbia [sic], and US-Mexico border patrol operations. These emails contain contracts, schematics, non-disclosure agreements, and more. Additionally we found evidence of a Merrill Lynch wealth management advisor giving private advance notice to Garcia about upcoming S&P US credit rating downgrades.”

Improper Disclosures

In an April 25, 2011 email from Garcia to Gloria Newport, Cindy Cook, a Wealth Management Advisor with Bank of America-owned Merrill Lynch “advised that Standard and Poors, may lower the credit rating of the US Government which could cause a run on US Banks that will affect the Federal Reserve. They give the US Govt. 2 years to correct the current situation, which they believe both the Republican and Democratic solutions do not do enough and both parties may make this a political situation for the 2012 Presidential election and never come up with a answer to correct the situation within the two years set by Standard and Poors. She did not see any real Cyber issue that could change the situation.”

Investigative journalist Steve Ragan, writing at The Tech Herald (the publication that broke the story on Anonymous’s HBGary hack) informs us that “the U.S. Securities and Exchange Commission was investigating whether there was any sort of insider trading done by S&P employees before the downgrade was official. The story hinged on comments made to the paper by sources close to the investigation itself.”

“On the day S&P cut the U.S.’s credit rating” Ragan writes, “Wall Street was flooded with downgrade rumors. These rumors started earlier in the day while trading was active. It turned out they were true.”

According to Bloomberg News the SEC “is scrutinizing the method Standard & Poor’s used to cut the U.S.’s credit rating and whether the firm properly protected the confidential decision, according to a person with direct knowledge of the matter.”

Reporter Joshua Gallu wrote August 14 that SEC staff are “looking into whether certain market participants learned of the downgrade before its announcement.”

Downplaying speculation that S&P employees may have breached SEC rules by leaking sensitive information to privileged clients, The New York Times, as is their wont, claimed “it is arguable whether S.&P.’s announcement on Aug. 5 of the rating change was all that confidential, given the speculation about it.”

“Assuming information about the downgrade was confidential,” the Times pontificates, “it must also be material, which means a reasonable investor would consider it important. This seems to be an easy element to establish because the wild gyrations in the market on the first trading day after the downgrade shows how investors viewed it.”

But Cook’s email to Garcia didn’t arrive in his in-box “on the first trading day after the downgrade” but nearly four months earlier, long before July’s political shenanigans over raising the federal debt ceiling, the ostensible reason why S&P downgraded America’s credit worthiness.

Maxine Waters (D-CA), wrote to SEC chairwoman, cover-up specialist Mary Schapiro, demanding that the commission “conduct an investigation into whether S.&P. selectively disclosed information related to the U.S. government debt downgrade to any financial institutions, and whether any institutions that had that nonpublic information traded on that information prior to the official announcement.”

It appears that Cook’s email to Garcia would confirm that S&P insiders did just that, providing information to Merrill Lynch and one can assume other financial firms.

Throwing cold water on charges that the rating’s agency acted improperly, the Times argues that “even if if the S.E.C. finds that the information was improperly disclosed, proving insider trading will be difficult.”

Why might that be?

According to the Times, “while S.&P. and other credit rating agencies are required to adopt policies to prevent such disclosure, it is questionable whether just leaking information violates any federal regulations, even if it breaches a corporate confidentiality policy.”

Lest readers believe, however, that the SEC will mount a comprehensive investigation of leaks by S&P insiders, they would do well to read Matt Taibbi’s latest piece for Rolling Stone.

According to congressional testimony by an SEC whistleblower, which sparked an investigation by that agency’s Inspector General, the commission’s enforcement division, under orders from higher-ups, who went on to secure well-paid positions with the firms they were charged to regulate, shredded a mountain of incriminating evidence detailing wrongdoing by some of the world’s top financial firms.

How many files, called “Matters Under Investigation” or MUI were destroyed? According to whistleblower Darcy Flynn, the SEC’s enforcement division “disappeared” some 18,000 files, including those of convicted fraudster Bernie Madoff, accused swindler, suspected CIA banker and drug money launderer R. Allen Stanford, as well as accusations that top-tier Wall Street investment banks such as J.P. Morgan Chase had engaged in insider trading.

Taibbi writes that “under a deal the SEC worked out with the National Archives and Records Administration, all of the agency’s records–’including case files relating to preliminary investigations’–are supposed to be maintained for at least 25 years. But the SEC, using history-altering practices that for once actually deserve the overused and usually hysterical term ‘Orwellian,’ devised an elaborate and possibly illegal system under which staffers were directed to dispose of the documents from any preliminary inquiry that did not receive approval from senior staff to become a full-blown, formal investigation.”

It’s a nice deal if you can get it, which, of course, firms like Goldman Sachs, J. P. Morgan Chase, Deutsche Bank, AIG and Lehman Brothers (before their 2008 collapse) managed to get in spades.

“We’ll never know,” Taibbi avers, “what the impact of those destroyed cases might have been; we’ll never know if those cases were closed for good reasons or bad. We’ll never know exactly who got away with what, because federal regulators have weighted down a huge sack of Wall Street’s dirty laundry and dumped it in a lake, never to be seen again.”

In this light, AntiSec’s hack of VDI is instructive. If for nothing else, it demonstrates that well-connected insiders reap billions from the collapse of the global economy, divvying-up the spoils amongst privileged friends and clients, including those inhabiting the nethermost regions of the secret state.

Cyberwar: Bringing it All Back Home, and Waging War on the Global Economy

As global elites scramble to seize as much advantage as possible over their rivals as the economy craters, intelligence methods deployed as part of imperialism’s endless “War on Terror” have migrated with a vengeance onto Wall Street.

Revelations by Anonymous earlier this year that a passel of Pentagon-linked security contractors had joined forces to run covert ops on whistleblowers and journalists set alarm bells ringing.

February’s release of some 75,000 emails filched from servers controlled by security grifters HBGary Federal and HBGary, uncovered a sordid scheme by the Bank of America and the U.S. Chamber of Commerce to target supporters of WikiLeaks and left-wing corporate critics.

That hack, in addition to exposing BofA’s illicit “Team Themis” gambit, a co-production of white shoe law firm Hunton & Williams, HBGary Federal, HBGary, Palantir Technologies (a recipient of CIA slush funds from its venture capital arm In-Q-Tel) and Berico Technologies, also revealed that the Pentagon and giant defense contractors such as General Dynamics had teamed up with HBGary to develop undetectable malware or “rootkits” for America’s emerging Cyberwar-Intelligence Complex, according to a series of documents published by the secrecy-shredding web site Public Intelligence.

Additional files revealed that HBGary and ManTech International had partnered-up with the National Security State for what they described as “Internet Based Reconnaissance Operations” that use “non-attributable internet access” methodologies (approved hacking by the secret state) for “operating system and network application identification,” “identification of possible perimeter defense” for “intelligence gap fill” and “counterintelligence research.” In other words, broad based internet spying on an array of “adversaries” (e.g., political dissidents, antiwar activists, anticorporate campaigners and other enemies of the state).

Further research by Project PM’s OpMetalGear revealed that defense giant Northrop Grumman and other firms such as HBGary Federal, TASC and ManTech International were engaged in a bidding war to spear the Pentagon’s Romas/COIN program (since renamed Odyssey).

That program, researcher Barrett Brown writes, is “a secretive and immensely sophisticated campaign of mass surveillance and data mining against the Arab world, allowing the intelligence community to monitor the habits, conversations, and activity of millions of individuals at once.” (For additional background see: “Security Grifters Partner-Up on Sinister Cyber-Surveillance Project,” Antifascist Calling, July 3, 2011)

We can assume that once intelligence sources and methods intended to target external enemies are turned inward and attack the American people, financial insiders too, would find such tools an exemplary means to crush their competitors and adversaries, the global working class.

Bankrupting and Criminalizing the State

“Economic warfare,” economist and researcher Michel Chossudovsky, writing in The Global Economic Crisis: The Great Depression of the XXI Century, “consists in destabilizing countries and impoverishing their respective populations.”

Chossudovsky argues that “the manipulation of market forces through the imposition of strong ‘economic medicine’ under the helm of the IMF supports U.S.-NATO strategic and geopolitical objectives.”

Similarly,” Chossudovsky observes, “the speculative attacks waged by powerful banking conglomerates in the currency, commodity and stock markets are acts of financial warfare,” one in which the “financing of an oversized U.S. war economy triggers imbalances in the U.S. monetary system, destabilizes the U.S. fiscal structure and creates imbalances in the allocation of human and material resources.”

This tragedy is playing out today. The on-going market meltdown in the wake of the U.S. credit downgrade and the crisis in the Eurozone has affected tens of millions of workers who saw their retirement funds gobbled up by speculators. Additionally, states and municipalities “carrying debt tied to federal creditworthiness,” The Tech Herald avers, “each took a hit.”

Hard hit cities and states struggling under an enormous debt burden due to falling revenues, are held hostage by the credit rating agencies. As economist Michael Hudson points out in Global Research credit rating agencies such as Standard and Poor’s, Moody’s and Fitch “are playing the political role of ‘enforcer’ as the gatekeepers to credit, to put pressure on Iceland, Greece and even the United States to pursue creditor-oriented policies that lead inevitably to financial crises.”

Hudson writes that these “crises in turn force debtor governments to sell off their assets under distress conditions. In pursuing this guard-dog service to the world’s bankers, the ratings agencies are escalating a political strategy they have long been refined over a generation in the corrupt arena of local U.S. politics.”

As the World Socialist Web Site observes, “the crisis of the world’s stock exchanges and financial markets is increasingly spiraling out of control. Governments are being driven by developments which they are unable to influence.”

Socialist critic Peter Schwarz notes that “the panic on the stock markets shows that traders are expecting a deep recession, already heralded by stagnating growth and rising unemployment rates,” and that “corporations will respond with new waves of layoffs, governments with further budget cuts.”

In a climate stoked by fear, war and those all-purpose boogeymen, “debt,” “terror” and now, “cyberwar,” the cost of bailing-out a looted capitalist economy are shouldered by the working class. These pressures in turn increase the downward spiral as employment, wages, manufacturing and consumer spending go into a tail-spin, a self-destructive feed-back loop that further exacerbates levels of unemployment, home foreclosures and generalized misery. The tentacles of this manufactured “debt crisis” reach everywhere–from the smallest town to the largest city.

Hudson avers that “localities are pressured when their rising debt levels lead to a financial stringency. Banks pull back their credit lines, and urge cities and states to pay down their debts by selling off their most viable public enterprises.”

And waiting in the wings are a new class of corporate vultures and rentier vampires who swoop down to reap the rewards gleaned by gobbling-up (looting) public assets at fire sale prices.

The rating agencies who profit at both ends of any transaction according to Hudson, “offer opinions” that have become a “big business” for the agencies. “So it is understandable why their business model opposes policies–and political candidates–that support the idea of basing public financing on taxation rather than by borrowing. This self-interest colors their ‘opinions’.”

Accordingly, “to acquiescence in such economically destructive financial behavior is the opposite of fiscal responsibility. Cutting federal taxes and Social Security payments to obtain a more positive S&P ‘opinion,” Hudson writes, “would give banks an ability to ‘pull the plug’ and force privatization and anti-labor austerity plans by refraining from rolling over the U.S. debt–and cutting taxes Tea-Party style rather than funding spending by taxation on a pay-as-you-go-basis.”

In this light, one can certainly understand why a Merrill Lynch “wealth management advisor” would offer her “knowledgeable judgement” (clubby insider info) to a dodgy security outfit such as VDI.

Working classes across Europe have not “gone gently into the night” of impoverishment; the great fear here in the heimat amongst corporatists and militarists alike, is that once working people realize the game is up they just might impose some “shock therapy” of their own!

As Salon columnist Glenn Greenwald (a target of “Team Themis’s” dirty tricks campaign) avers, speaking out about “the sprawling Surveillance State and the attempted criminalization of WikiLeaks and whistleblowing are so vital” to the defense of democracy.

“The free flow of information and communications enabled by new technologies–as protest movements in the Middle East and a wave of serious leaks over the last year have demonstrated–is a uniquely potent weapon in challenging entrenched government power and other powerful factions,” Greenwald writes.

“And that is precisely why those in power–those devoted to preservation of the prevailing social order–are so increasingly fixated on seizing control of it and snuffing out its potential for subverting that order: they are well aware of, and are petrified by, its power, and want to ensure that the ability to dictate how it is used, and toward what ends, remains exclusively in their hands.”

This is why actions by disparate groups such as AntiSec, Anonymous and WikiLeaks are informational beacons in an otherwise homogenized media landscape, one characterized by celebrity gossip, sex scandals and “crimes” carried out by poor and marginalized populations–never the filthy rich or the warmongers who murder millions as they launch resource wars that steal other people’s social property.

While firms such as VDI, Boeing, General Atomics and Lockheed Martin hawk drone technologies that transform human beings into red mist, and do so as their “patriotic” (and highly-profitable) duty as the Pentagon wholeheartedly embraces hypermodern forms of robotized mass murder, the bill for American hubris, long past due, is coming faster than most people think.




faster than most people think
Mazars and Deutsche Bank could have ended this nightmare before it started.
They could still get him out of office.
But instead, they want mass death.
Don’t forget that.
User avatar
seemslikeadream
 
Posts: 32090
Joined: Wed Apr 27, 2005 11:28 pm
Location: into the black
Blog: View Blog (83)

Re: The first global cyber war has begun

Postby hanshan » Mon Aug 22, 2011 4:09 pm

...


“The free flow of information and communications enabled by new technologies–as protest movements in the Middle East and a wave of serious leaks over the last year have demonstrated–is a uniquely potent weapon in challenging entrenched government power and other powerful factions,” Greenwald writes.

“And that is precisely why those in power–those devoted to preservation of the prevailing social order–are so increasingly fixated on seizing control of it and snuffing out its potential for subverting that order: they are well aware of, and are petrified by, its power, and want to ensure that the ability to dictate how it is used, and toward what ends, remains exclusively in their hands.”


ain't it the truth...


...
hanshan
 
Posts: 1673
Joined: Fri Apr 22, 2005 5:04 pm
Blog: View Blog (0)

Re: The first global cyber war has begun

Postby Allegro » Mon Oct 17, 2011 10:04 pm

.
I'm thinking this article might support other RI documentation currently searchable or will be.

Defense Contractors Face Withheld Payments Over ‘Significant’ System Flaws
Bloomberg | By Tony Capaccio | Aug 29, 2011 5:37 AM CT

    The Pentagon is imposing a new contract provision which calls for withholding as much as 10 percent of payments to defense companies when it finds “significant” shortcomings in any of six business systems used to track performance and cost of weapons programs or services.

    The measure is intended to protect taxpayers from overbilling. It focuses on the systems that companies such as Lockheed Martin Corp. (LMT), the No. 1 defense contractor, use to estimate costs for bids, purchase goods from subcontractors or manage government property and materials.

    A rule, which took effect Aug. 16, requires that all new contracts include language that spells out the potential for withholding payments due to deficiencies, such as those involving the standard “Earned Value Management” system used to determine whether companies are meeting cost and schedule goals.

    As initially drafted, the Pentagon would have been empowered to withhold as much as 20 percent of billings. After industry complaints, that was cut to a 10 percent maximum in the fiscal 2011 defense policy bill.

    The rule resulted from an August 2009 hearing of the congressionally mandated Commission on Wartime Contracting at which major business-system deficiencies were described within companies working in Iraq and Afghanistan.


    “These changes are long overdue and reflect potential risk associated with longstanding and continuing contractor business system deficiencies,” said commission Co-Chairman Michael Thibault in an e-mail.

< snip >

    ‘Fair and Timely’

    The DCMA and Defense Contract Audit Agency continue to develop a final version of their internal audit procedures and workforce guidance to align with the new rule, he said.

    The Defense Department has assured the council that “updating their guidance is a top priority and is under way but may not be finished for several months,” he said.

    Thibault agreed, saying the regulation will require “fair and timely audit evaluation” to assure that unnecessary contractor expenses are not incurred.

    The aeronautics unit of Bethesda, Maryland-based Lockheed Martin, which makes the F-16 and F-35 jets, has a deficient “earned value” system that makes the unit candidate for potential withholds from new contracts after Aug. 16.

    The contract management agency in October decertified the Earned Value system used by the Fort Worth, Texas, aircraft unit to track costs and schedules. The company’s system was deficient in 19 of 32 areas, a Pentagon spokeswoman said at the time
    .

    Lockheed Comments

    The decertification remains in effect until the company demonstrates compliance during the next review in the first four months of 2012, Noble said.

    Lockheed Martin spokesman Joe Stout said in an e-mail that “we are committed to having the best and most highly rated EV system in the industry.

    “We’re now well into implementing” corrective actions that include rewriting all the processes that relate to EVMS in our media library and developing new computer-based tools for our users, in addition to extensive training of employees,” Stout said.

    “We [Lockheed Martin] expect to be ready for a re-audit in early 2012,” Stout said. “We have not been notified of any withholding or plans for withholding.”
Art will be the last bastion when all else fades away.
~ Timothy White (b 1952), American rock music journalist
_________________
User avatar
Allegro
 
Posts: 4456
Joined: Fri Jan 01, 2010 1:44 pm
Location: just right of Orion
Blog: View Blog (144)

Re: The first global cyber war has begun

Postby happenstance » Tue Feb 28, 2012 6:36 pm

this is so great...

The Overdub Tampering Committee

How a group of Boston musicians exacted their weird price from the world of online music sharing — without actually doing a thing

http://thephoenix.com/Boston/music/1339 ... committee/
happenstance
 
Posts: 115
Joined: Sun Oct 12, 2008 3:23 pm
Blog: View Blog (0)

Re: The first global cyber war has begun

Postby crikkett » Wed Feb 29, 2012 1:13 am

^^^ but music isn't war.
:backtotopic:
crikkett
 
Posts: 2206
Joined: Sun Sep 09, 2007 12:03 pm
Blog: View Blog (5)

Re: The first global cyber war has begun

Postby Luther Blissett » Wed Feb 29, 2012 9:31 am

Does anyone think this is the real deal?

Interpol arrests suspected 'Anonymous' hackers
By Hilary Whiteman, CNN
updated 7:19 AM EST, Wed February 29, 2012


(CNN) -- Police in Europe and South America have arrested 25 alleged members of the "Anonymous" hacking group, Interpol said, amid a suspected attack on its own website by the group's supporters.

The arrests include four people in Spain, 10 in Argentina, six in Chile and five in Colombia as part of a worldwide sweep carried out as part of Interpol operation "Exposure."

Interpol did not immediately announce charges against the 25.

After Interpol announced the attacks, its website failed to load, a fact acknowledged by Anonymous on Twitter with the message "interpol.int DOWN."

Who or what is Anonymous?

The Spanish police website also failed to load after it announced police had arrested four people in the country as part of the international action.
Suspected 'Anonymous' hackers arrested
FBI, Scotland Yard hacked
FBI & Scotland Yard phone call hacked
'Hacktivist' group Anonymous strikes back

Spanish police said the four suspects were accused of carrying out denial of service attacks, defacing the websites of political parties, institutions and companies, as well as publishing personal information relating to high-profile figures.

One of those arrested was a 16-year-old girl, who was allegedly part of international "sector 404," a hacking group which is believed to be linked to the attacks claimed by Anonymous. Police said the girl had been released to the custody of her parents.

Two of the others had been detained, while the third was released on bail, police said.

Anonymous made headlines in 2010 when it carried out distributed denial of service or DDOS attacks targeting MasterCard, Visa and PayPal websites.

DDOS is a kind of network stress test in which each attacker gives consent to have his or her computer linked to a bot net. The force of all those computers working together, focused on one site, overwhelms the targeted site's server and consequently disrupts or takes the site down.

At the time, Anonymous claimed that it was lashing out at the corporations because they had stopped doing business with WikiLeaks, the publisher huge tranches of confidential information under the leadership of founder and editor Julian Assange.

Since then, the group has claimed responsibility for a number of attacks, notably claiming that it attacked government websites in Tunisia and Egypt as a way to show support for protesters during Arab Spring uprisings.

A video -- laced with Anonymous' typical computer-voiceover -- appeared online during the January 2011 revolution. It threatened Egyptian authorities if they attempted to censor Internet access and other freedoms.

"Anonymous is you. You will not be denied your right to free speech, free press, free association and your universal right to freely access information both in real life and on the Internet," the voice said.

Anonymous had a hand in organizing and agitating in the Occupy movement throughout 2011. Protesters have been seen at Occupy demonstrations across the globe wearing Anonymous' distinctive Guy Fawkes mask.

This year, the group claimed to have posted an internal FBI conference call discussing investigations into Anonymous. It also posted e-mails that it claimed were from an adviser to the Syrian president, suggesting how Bashar al-Assad could downplay violence in the country when he was interviewed by Barbara Walters last summer.

CNN's Ashley Fantz contributed to this report
The Rich and the Corporate remain in their hundred-year fever visions of Bolsheviks taking their stuff - JackRiddler
User avatar
Luther Blissett
 
Posts: 4993
Joined: Fri Jan 02, 2009 1:31 pm
Location: Philadelphia
Blog: View Blog (0)

Re: The first global cyber war has begun

Postby Luther Blissett » Wed Feb 29, 2012 11:19 am

And pair the above with this. Anonymous has become one of the largest global child pornography task forces:

‘Anonymous’ Forces 40+ Child Pornography Sites Offline
By Graeme McMillan | @graemem | October 24, 2011

Anonymous has turned its attentions from corporations to pedophiles with the news that the hacktivist group has taken down multiple child pornography sites, including one of the largest known, with account details of its 1589 users being posted online as evidence.

The incident was just part of something Anonymous is calling “Operation Darknet,” a move by the group to eliminate child pornography on the Tor network. Tor, which was originally developed as a way of protecting government communications by the U.S. Navy, now describes itself as “a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet.” But the privacy and anonymity it offers has been abused by child pornographers, something that Anonymous aims to correct with its new campaign.

In its statement about the takedown, Anonymous says that the group “identified [hosting service] Freedom Hosting as the host of the largest collection of child pornography on the internet,” adding “By taking down Freedom Hosting, we are eliminating 40+ child pornography websites, among these is Lolita City, one of the largest child pornography websites to date containing more than 100GB of child pornography. We will continue to not only crash Freedom Hosting’s server, but any other server we find to contain, promote, or support child pornography.”

The group’s statement ends with the following demands:

“Remove all child pornography content from your servers. Refuse to provide hosting services to any website dealing with child pornography. This statement is not just aimed at Freedom Hosting, but everyone on the internet. It does not matter who you are, if we find you to be hosting, promoting, or supporting child pornography, you will become a target.”


The Rich and the Corporate remain in their hundred-year fever visions of Bolsheviks taking their stuff - JackRiddler
User avatar
Luther Blissett
 
Posts: 4993
Joined: Fri Jan 02, 2009 1:31 pm
Location: Philadelphia
Blog: View Blog (0)

Re: The first global cyber war has begun

Postby Pele'sDaughter » Wed Feb 29, 2012 5:11 pm

http://blog.alexanderhiggins.com/2012/0 ... ons-87452/


Anonymous Takes Down Interpol For Arresting 25 Anons

Supporters of the Anonymous hacker group attacked Interpol’s main website after the international police agency conducted a number of hacker arrests across the globe.

­The website Interpol.int was unreachable for a half hour on Wednesday, Forbes reports. Access was later restored, although the loading time remains slow. The attack appears to have been conducted using a botnet. Anonymous Twitter accounts tweeted “interpol.int seems to be #TangoDown. We can’t say that this surprises us much,” and “Looks like interpol.int is having some traffic issues. Now who would have expected that?”

The attacks came as Interpol announced the arrests of 25 suspected Anonymous members, aged between 17 and 40, who it alleges planned coordinated cyber-attacks against Colombia’s defense ministry and presidential websites, Chile’s Endesa electricity company and national library, among other targets. The arrests were part of Operation Unmask, during which police in Colombia, Argentina, Chile and Spain seized computers, mobile phones, credit cards and cash at 40 locations in 15 cities.

Among the 25 under arrest are four Anonymous hackers detained by police in Spain earlier on Tuesday under claims that they conducted attacks on Spanish political parties’ websites. The Spanish National Police also said two servers in Bulgaria and the Czech Republic had been blocked as part of Operation Unmask, and that a manager of Anonymous’ operations in Spain and Latin America, known by the aliases “Thunder” and “Pacotron,” was among those arrested.

The four are also suspected of vandalizing websites, conducting DDoS attacks and publishing sensitive data on police officers assigned to Spain’s royal palace and its prime minister’s office.

Source: RT
Don't believe anything they say.
And at the same time,
Don't believe that they say anything without a reason.
---Immanuel Kant
User avatar
Pele'sDaughter
 
Posts: 1917
Joined: Thu Sep 13, 2007 11:45 am
Location: Texas
Blog: View Blog (0)

Re: The first global cyber war has begun

Postby crikkett » Mon Mar 26, 2012 10:03 am

http://it.slashdot.org/story/12/03/26/1 ... us-botnets
"Today, Microsoft announced in what it called its 'most complex effort to disrupt botnets to date,' the company in collaboration with partners from the financial services industry, have successfully taken down operations that fuel a number of botnets that make us of the notorious Zeus family of malware. In what Microsoft is calling 'Operation b71,' Microsoft and its co-plaintiffs, escorted by U.S. Marshals, seized command and control (C&C) servers in two hosting locations on March 23 in Scranton, Pennsylvania and Lombard, Illinois. The move was to seize and preserve data and evidence from the botnets for the case. In addition to seizing the C&C servers, the group took down two IP addresses behind the Zeus command and control structure, and secured 800 domains that Microsoft is now monitoring and using to help identify computers infected by Zeus. "


http://www.securityweek.com/microsoft-a ... -operation << reference

from the comments wrote:
TFA wrote:Microsoft has conducted physical seizures

Since when can a CORPORATION perform seizures of private property???
crikkett
 
Posts: 2206
Joined: Sun Sep 09, 2007 12:03 pm
Blog: View Blog (5)

Re: The first global cyber war has begun

Postby Wombaticus Rex » Mon Mar 26, 2012 10:16 am

In light of Hayden's comments about "digital blackwater" -- that's already existed for awhile as cut-outs.

Via: viewtopic.php?p=453479#p453479

Wombaticus Rex wrote:DAMN. A little heavy on warfare theory, but this is hands down the most complete, best written examination of "Th3 J35t3r" I've found ==> http://www.sans.org/reading_room/whitep ... fare_33889 (PDF)

The author makes some interesting findings by looking at the meta-pattern of his attacks, but two assumptions really stick out: 1) Robin Jackson might easily be j35t3r -- his denial of that is not really sufficient grounds to rule him out. Remember, when Sabu got d0xed, he denied it, too. 2) The notion that J35t3r is truly working alone without support or compensation from US NatSec is absurd to me. Pentagon Red Teaming is an established and effective practice and intelligence history is a endless hall of cut-out mirrors.

Aside from the author's curious refusal to examine those two points, still a really excellent piece of work, though.
User avatar
Wombaticus Rex
 
Posts: 10896
Joined: Wed Nov 08, 2006 6:33 pm
Location: Vermontistan
Blog: View Blog (0)

Re: The first global cyber war has begun

Postby seemslikeadream » Tue Jun 12, 2012 8:35 am

Oh Pat do you even remember Valerie? Really remember the truth?

Image

Will Heads Roll for the Stuxnet Leak?
by Patrick J. Buchanan, June 12, 2012

Within days of SEAL Team Six’s killing of Osama on that midnight mission in Pakistan, Defense Secretary Bob Gates, reading all about the raid in the press, went to the White House to tell President Obama’s national security adviser pungently to “shut the [bleep] up.”

Leaked secrets of that raid may have led to the imprisonment for 33 years of a Pakistani doctor who helped us locate bin Laden.

Yet, according to Judicial Watch, the White House has been providing Hollywood with details of the raid for a movie that will, we may be sure, heroize our commander in chief. More troubling are two recent stories in The New York Times.

One, by Jo Becker and Scott Shane, describes how, at meetings in the Situation Room, Obama examines “baseball cards” of al-Qaeda targets in Pakistan and Yemen and decides on the “kill list” for drone strikes.

Most explosive was the June 1 story by David Sanger, who wrote of the origins and operation of a secret U.S-Israeli cyberwar strike on Iran’s uranium enrichment plant at Natanz. The Stuxnet virus we introduced into Natanz put 1,000 centrifuges out of action.

These security leaks raise moral, strategic, and legal issues.

Does Obama alone decide in the War on Terror who dies, where and when, whom it is permissible to terminate as collateral damage, who gets a reprieve? What are the criteria that this, our caesar, has settled upon for who gets whacked? Do we have a right to know?

And there is blowback to actions like these. Asked why he would target civilians, the Times Square bomber replied that U.S. drones do not spare civilians in Pakistan.

Is it wise to have it leaked that President Obama is routinely ordering assassinations? Have we forgotten our history?

After John F. Kennedy was assassinated in Dallas, we discovered that the CIA had been plotting to kill Fidel Castro, and Lee Harvey Oswald had visited the Cuban embassy in Mexico City. The Kennedys were “running a damned Murder Inc. in the Caribbean,” Lyndon Johnson allegedly said.

Men targeted for assassination in their countries may feel justified in reciprocating and assassinating Americans in our country.

As for the malware, or Stuxnet virus, introduced into Natanz, was it wise to use this powerful and secret weapon against a plant that is under international inspection and enriches uranium only to 5%?

We may have disrupted Natanz for months, but we also revealed to Iran and the world our cyberwar capabilities. And we became the first nation to use cyberwar weapons on a country with which we are not at war.

If we have a right to attack Iran’s nuclear facilities like Natanz and Bushehr that are under U.N. supervision, does Iran have a right to attack our nuclear plants, like Three Mile Island, with cyberwar viruses they create?

We have now alerted technologically advanced nations like Russia and China to our capabilities and impelled them to get cracking on their own cyberwar weapons, both offensive and defensive.

After President Truman informed him at Potsdam of our atom bomb, Joseph Stalin went home and ordered Soviet scientists to replicate the U.S. success. By 1949, far sooner than expected, Stalin had the bomb.

Sanger describes how this “highly classified program,” code-named “Olympic Games,” was begun in the Bush years, how the worm was inserted in Natanz, and how it escaped from the centrifuges to outside computers and the world.

He quotes the president’s dismayed reaction: “Should we shut this thing down?” Sanger implies that he spoke with “participants in the many Situation Room meetings on Olympic Games.”

Obama seems outraged by such a suggestion: “The notion that my White House would purposely release classified national security information is offensive.”

Fair enough. But presidential meetings are held in the Situation Room because they involve the most sensitive security secrets, and Olympic Games was, as Sanger relates, “a highly classified” program.

Whom did Sanger get all this from? Who leaked and why?

For this is far more serious than the leak that Joe Wilson’s wife, Valerie Plame, worked for the CIA, which triggered a special prosecutor and got Dick Cheney’s top aide, Lewis “Scooter” Libby, indicted and convicted.

Pvt. Bradley Manning faces a life sentence for divulging security secrets to WikiLeaks. What did he do that the leakers of the Stuxnet secrets did not do?

John McCain alleges that the leaking of security secrets — on how SEAL Team Six got Osama, on the Stuxnet virus that ravaged the Natanz plant, on the president ordering up drone strikes on a “kill list” of al-Qaeda operatives — is politically motivated.

Purpose: paint the president as a ruthless and relentless warrior against America’s enemies.

Whatever the purpose, the leaks appear to be breaches of national security and violations of federal law, and two U.S. attorneys are investigating.

It is not improbable that officials on Obama’s national security team, if not White House aides, will soon be addressing a federal grand jury.
Mazars and Deutsche Bank could have ended this nightmare before it started.
They could still get him out of office.
But instead, they want mass death.
Don’t forget that.
User avatar
seemslikeadream
 
Posts: 32090
Joined: Wed Apr 27, 2005 11:28 pm
Location: into the black
Blog: View Blog (83)

PreviousNext

Return to General Discussion

Who is online

Users browsing this forum: stickdog99 and 188 guests