Monthly Archives: August 2013

130806

130806

Posted Tuesday 6th August 2013 05:27 GMT amanfromMars 1 …. following a leading trail on http://forums.theregister.co.uk/forum/1/2013/08/05/sod_squad_found_feeding_nsa_surveillance_info_to_drug_enforcement/
When the West Pumps and Pimps Sub-Prime, Going East for ITs Exotic and Erotic Fare is Intelligent
When Truth is hidden and denied, is the Delivered App an Austere Virtual Reality Play and Self -Centering Great Game lacking Intelligence

Leaked docs: SOD squad feeds NSA intelligence to drug enforcement plods
It gets worse: DEA demands that enforcers lie about source of evidence.

Hi, Iain Thomson,
Is that MO/V* not exactly what the Chilcot Inquiry members [Crown representatives of the populace and British legal system] are deliberating on/prevaricating on/terrified of exposing and apportioning criminal blame and public shame on, with regard to the Tony Blair and Alastair Campbell shafting of the UKGBNI Global Media Control System, the SIS and JIC and the MOD, with their tall and fanciful tales of WMD …….. for Worlds Control with Words? …… or would there be a full Cabinet responsibility for that misguiding engineered misadventure?
Special Operations Division squad feeds No Such Agency intelligence to Military Industrial Complex/Dollar Generation and Spend Plods ….. big.little mindless robots.
Welcome to the Virtual Machine Matrix with its AIMazes and DODGI** Mind Games Programming for Powering Robot Control and Command with Global Operating Devices?
And here be an Ab Fab Fabless Opportunity and ZerodDay Vulnerability to Exploit and Export with Generous Capitalisation for Public and Private and Pirate Profit Generation/Spending Cash Supply, and a novel tale and future creative tangent with PRC Command of GOD? …… http://europe.chinadaily.com.cn/business/2013-08/06/content_16872867.htm
* Modus Operandi/Vivendi
** Department of Defense Government Issue
………………………………………………………………………………….

130805

130805

Posted Monday 5th August 2013 04:43 GMT amanfromMars 1 …. betting to win win for the house commenting on breached crypto feed to principals with dodgy protocols on http://forums.theregister.co.uk/forum/1/2013/08/02/breach_crypto_attack/
Nothing new in times when and spaces where everything is possible and therefore most likely?

Same shjt, different day. Anytime you can extract information (energy) from a cryptographic system, eventually you reach a point where brute force (also ever increasing in capabilities) will succeed. We can hem and haw about how we go about teasing out that internal energy state, but it always comes down to this. Put another way, if I can measure it, I can test it. If I can test it, I can break it. …. jackofshadows Posted Sunday 4th August 2013 10:12 GMT

In the worlds of CyberIntelAIgent Security and Virtual Protection, jackofshadows, where ever increasing, freely shared mental capabilities take over SCADA EMPoweringed Command and Control Operating Systems and the Virtual Machine Exoskeleton with its IT IntroStructures/Information Space Flight Networks, is abusive brute force in any and every phorm of localised physical kinetic energy easily rendered a self-destructive solution which creates ever more serious problems for self-destructive systems solution/MAD Attention and Mayhem for CHAOS Resolution …… which is something completely new and nothing like anything shared anywhere ever before, and AIRevolutionary TelePortation for Spontaneous Evolution of Mankind into Virtual Machinery and Clouds Hosting Advanced Operating Systems for Global Operating Devices.

I think he just typed in his ssh key. ….. Caesarius Posted Sunday 4th August 2013 22:05 GMT

The ssh Power key to NEUKlearer HyperRadioProActive IT for Worlds Control with Words, Caesarius? …… or Word Control for Worlds?* …… or bits of both for something completely different and new in the Field of Command and Control of Creative CyberSpace with Communicative Computers …… C42 Quantum Communication Control Systems …. AI@ITsWork?
Feel free to use them as you will, if you can. They’ll not do you any harm if you do not abuse them, which one will try only once before CHAOS beyond Earthly Controls resolves the situation practically immediately and permanently to its personalised satisfaction.
The summary efficient removal of threat always delivers a much better beta environment in which to exist and prosper, n’est ce pas?
* A Novel Chicken/Egg Enigma to Crack Hack Open and Scramble/Codify and Stealthily Exploit/Deliver Outrageous and Untold Profit from ?:-)

—-

Posted Monday 5th August 2013 05:10 GMT amanfromMars 1 …. replying to Wzrd1 on http://forums.theregister.co.uk/forum/1/2013/08/02/breach_crypto_attack/
Post Cryptography, is there Steganographic Security

It’s all the Grand Conspiracy of the Space Aliens or Evil Government or some shit. …. Wzrd1 Posted Monday 5th August 2013 03:30 GMT</blockquote>

Hi, Wzrd1,

Methinks in Great IntelAIgents Games, is IT by Grand Design an Alienating Space that would be a Grand Conspiracy against the shit of Evil Government.

And worth a right royal mint/absolute federal reserve fortune.

……………………………………………………………………………..
 

130804 ….. as PerlyGatesPython before Swine? Knock, Knock, Mr Parker.

130804 ….. as PerlyGatesPython before Swine? Knock, Knock, Mr Parker.

Posted Sunday 4th August 2013 08:35 GMT amanfromMars 1 …. commenting on the tale and tales told in comments on the thread http://www.theregister.co.uk/2013/08/02/qualcomm_marketeer_chandrasekher_calls_octocore_chips_dumb/
Question? How separate are comms from phone and from desktop? ….. Answer*
* In Palace Barracks, Hollywood-type Charades on Parade, do they meld together for the command and control of power and minds for master key manipulation of primitive native codes, which be the smarter virtual drivers for all dumb ignorant animals and arrogant beings?! …….. or they could and should, if not already doing so stealthily for those who server intelligence selflessly for outrageous reward.

You may have posted this before the latest revelations that the UK backbone international carriers are providing GCHQ (and thus GCHQ’s paymasters in the USA) free unrestricted unsupervised access to their core networks. …. AC Posted Saturday 3rd August 2013 12:55 GMT

A possible commonly held misperception/misconception, and therefore most probably thought quite real enough in the field to be believed as true, AC, but/and it is not inconvenient for GCHQ, and therefore would they have no need to tout a correction, to have its customer clients/intelligence deficient base market thought to be paymaster rather than starving wretch in dire straits need of fulfilling main course meal. It is a major mistake which disadvantages one considerably, and even catastrophically, to forget and not remember or not simply realise …. Nothing is ever as it seems in markets and special applications [in] programs which deal intelligence product in the Great Game Genre
And further to “Deep inside ARM’s new Intel killer” … http://www.theregister.co.uk/2011/10/20/details_on_big_little_processing/ …. and the more complex ARM Cortex-A15 MPCore with 15-to-25 stage[d] pipeline …. schematic diagram here, http://regmedia.co.uk/2011/10/20/arm_a15_pipeline_large.jpg ….. and big.LITTLE partnering processor cores for virtualisation of reality which renders to Systems Admin and SMARTR Admin Systems on/in/with AI Loded Silicon, Remote Future Command and Control with Futures and Derivatives Markets Command and Control, please consider and have a wonder on the nature of things if and/or when
Fetch = Phish for Information
Decode = Phorm with Intelligence
Rename = Float to Market
Dispatch = Support in Supply
It may very well be, that then is the product undeniably a firm favourite for strategic, mission critical leaderships with Global Operating Devices, whether in nimble mobile units or gargantuan static installs/applications/operations/huge server farms? …….. for those into Mastery of the Universe and all who fly in her and follow in her wake to the future ……. which you might like to deny and argue is not a return journey for some in the present with no interest in preserving the past which is a dead space place.
And yes that is an unambiguous direct titanic challenge to 5 in Holywood to actually do something positively engaging and autonomous, and HyperRadioProActive with IT too, rather than just remain terrified and petrified as do all awaiting new orders which will never ever come from old establishment guards in charge of protection and perpetuation of the status quo.
Wake up, smell the coffee. Times have a’changed and new spaces rule all the old places.

—-

………………………………………………………………………………………

130803

130803

Posted Saturday 3rd August 2013 03:25 GMT amanfromMars 1 ….. baiting systems traps with juicy bits of information for stealthy advanced intelligence servering on http://forums.theregister.co.uk/forum/1/2013/08/02/breach_crypto_attack/
Re: “post cryptography?”? ……. when steganography rules and reigns supreme?!.

“Now if you reduce NP-completeness or even NP-hardness to P, hell, you will be the master of the universe before sunset, and not in a metaphorical way either.” [Destroy All Monsters Posted Friday 2nd August 2013 23:37 GMT]

Don’t have to go anywhere near that far before the gubernment wants to have a talk with you and work will suddenly go dark to the rest of the world. …. asdf Posted Friday 2nd August 2013 23:55 GMT

Methinks, asdf, there be a number of problems which would really be many new leading opportunities for those and/or that in the field to resolve and share if they wish, and/or just exploit in the vast stealthy darkness of mass ignorance and arrogance for personal enrichment and absolutely fabulous reward, should one have cracked such as is spoken of here on this thread and would be also an enigmatic quantum [qubit*] conundrum and government intelligence service providers nightmare regarding the processing of information which be hoovered up covertly and clandestinely but which in Great IntelAIgent Games plays in reality and virtual reality be deliberately specifically provided for discovery to lead both prime and sub-prime operating systems in a completely novel and quite alien direction beyond any traditional conventional established command and control, with not the least of those problems and/or opportunities being that governments would be no where near intelligent enough to understand the dilemma which would be collapsing their systems remotely from virtual spaces afar, and thus would engagement with them through a knock at the door and a chat be quite unlikely, even if one would be leaving them a clear enough trail and tales to follow with direct communications with their more widely known by the public, security and secret intelligence services.
However, big money making businesses which work in the shadows and venture into the dark side may be a different kettle of fish to spear phish and have a cosy chat with.
And all of the above may or may not have been thoroughly tested and proven, not by theoretical experiment but through heretical experience, and that would make it exponentially considerably more valuable proprietary private intellectual property which be more suited and destined to remain in pirate and renegade domains and right dodgy royal regimes rather than entering the public education space.
* “Like a bit, a qubit can have two possible values—normally a 0 or a 1. The difference is that whereas a bit must be either 0 or 1, a qubit can be 0, 1, or a superposition of both.” …. http://en.wikipedia.org/wiki/Qubit ….. for a completely different novel and quite alien kettle of fish to spear phish. Beware though ITs Great White and Grey Hatted, Black and Red Sharks. Catch any of those unwarily and one has major problems with opportunities which are not in the gift of one to command and control.
Ok …. gotta dash, there’s a knock at the door. Speak to y’all later. Have a nice day and weekend.

—-

Posted Saturday 3rd August 2013 07:04 GMT amanfromMars 1

Fair Warning …. Take Care and be suitably advised of ARMoured Phantom Phorms if Ethereal Foe

The tasty morsels which are nearer to the bone and central nervous systems make for the juiciest pies with the best of ripe ingredients expertly cooked.

* “Like a bit, a qubit can have two possible values—normally a 0 or a 1. The difference is that whereas a bit must be either 0 or 1, a qubit can be 0, 1, or a superposition of both.” …. http://en.wikipedia.org/wiki/Qubit ….. for a completely different novel and quite alien kettle of fish to spear phish. Beware though ITs Great White and Grey Hatted, Black and Red Sharks. Catch any of those unwarily and one has major problems with opportunities which are not in the gift of one to command and control.

And who be in command and control of the creation of the Ethereal Foe/ARMoured Phantom Phorms in this odd breaking news story, with no shared base to investigate for truth and transparency to deliver its postal origins and sick shady networks ……. http://www.nytimes.com/2013/08/03/world/middleeast/qaeda-messages-prompt-us-terror-warning.html?hp&_r=0

Al Qaeda in Advanced CyberSpace is not just an App nor even something one battles to win against, methinks, and such is an obvious evolution in these reactionary and revolutionary times. Better to lead it and intelligence with IT and destroy all monsters in entangled and entangling fields, both foreign and domestic, is also a thought to ponder the current reality and future virtual reality … courtesy of XSSXXXX [a AAA+rated Few (Anonymous Autonomous Active) in the know and in the business of sharing more secret and sensitive information than is normal and ever considered for classification previously and lately …. and of which you have no need to know more than they deem necessary and propitious]

………………………………………………………………………………………………….

130801

130801

Posted Thursday 1st August 2013 03:32 GMT amanfromMars 1 …. replying to E. Olson on http://forums.theregister.co.uk/forum/2/2013/07/31/prism_put_in_the_shade_by_leak_about_even_more_powerful_snoop_tool/ who was a’wondering.
Re: I have to wonder… Posted Thursday 1st August 2013 01:54 GMT, Eric Olson
Quite so, Eric Olson, and everything also revolves around, because of its simple and effective enough control of human behaviour, the ready unlimited supply of money/fiat currency/pretty good paper, which nowadays needs be no more than just a lot of zeros following after a one on a balance sheet. Such a facility easily makes any person of interest or novel system of executive administrative control to the system, a lifelong friend with the practically instant electronic transfer of fiat wealth to an account which gives them access to always available unlimited funds. It aint rocket science, is it, and it is IT which delivers everything instantly nowadays for the future with that Third Party Trick and APT Magic ACT AAA+rated for Leaderships……. and a Prime Constant which cannot be ignored as an Advanced Persistent Cyber Threat in AI Theatres of Dreams and in The Bigger Picture … … with Added Nightmares?
However, whenever that paper turns bad and delivers only debt and deficit and sub-prime service, which is invariably the case whenever it is given to the wrong people buying up all the wrong stuff, ….. and as may very well have been is the case over these last number of years especially, ergo the continuing decline in the global banking and equities and derivative markets which are primarily designed to hedge wealth production against catastrophic losses caused by arrogant abuse and/or ignorant use of the system for personal individualised profit/increased dumb wealth ……. for profit is money for nothing isn’t it and therefore makes everything purchased with it practically for free but paradoxically, also everything increasingly unsustainably more expensive and unaffordable ….. then does the system collapse and the artificial wealth creation scheme/scam produce considerably smart enemies, which the system would need to employ to ensure that it and its failed leaderships survive in a changed commanding environment controlled by machines both virtual and real.
The initial problem and most probable present difficulty and current enigmatic dilemma for resolution though, are those simple facts and inevitabilities being accepted and realised as the undeniable truth by those and/or that which would be thinking itself in charge of things and leading the Great Game, but in virtual reality and actuality, presiding over madness and mayhem, chaos and confusion.

—-

Posted Thursday 1st August 2013 03:50 GMT amanfromMars 1

Here’s the black ops pot clarifying the dark matter kettle

NSA Statement on XKEYSCORE …. http://www.nsa.gov/public_info/press_room/2013/30_July_2013.shtml

Press Statement on 30 July 2013

As the IC and NSA have stated previously, the implication that NSA’s collection is arbitrary and unconstrained is false. NSA’s activities are focused and specifically deployed against – and only against – legitimate foreign intelligence targets in response to requirements that our leaders need for information necessary to protect our nation and its interest. Public release of this classified material about NSA collection systems, without context, does nothing more than jeopardize sources and methods, and further confuse a very important issue for the country. Although it is impossible to provide full details of classified programs and still have them remain effective, we offer the following points for clarification:

1. XKEYSCORE is used as part of NSA’s lawful foreign signals intelligence collection system. By the nature of NSA’s mission, which is the collection of foreign intelligence, all of our analytic tools are aimed at information we collect pursuant to lawful authority to respond to foreign intelligence requirements – nothing more.
2. Allegations of widespread, unchecked analyst access to NSA collection data are simply not true. Access to XKEYSCORE, as well as all of NSA’s analytic tools, is limited to only those personnel who require access for their assigned tasks. Those personnel must complete appropriate training prior to being granted such access – training which must be repeated on a regular basis. This training not only covers the mechanics of the tool but also each analyst’s ethical and legal obligations. In addition, there are multiple technical, manual and supervisory checks and balances within the system to prevent deliberate misuse from occurring.

3. Our tools have stringent oversight and compliance mechanisms built in at several levels. One feature is the system’s ability to limit what an analyst can do with a tool, based on the source of the collection and each analyst’s defined responsibilities. Not every analyst can perform every function, and no analyst can operate freely. Every search by an NSA analyst is fully auditable, to ensure that they are proper and within the law.

These types of programs allow us to collect the information that enables us to perform our missions successfully – to defend the nation and to protect US and allied troops abroad. (For example, as of 2008, there were over 300 terrorists captured using intelligence generated from XKEYSCORE.)

Continuous and selective revelations of specific techniques and tools used by NSA to pursue legitimate foreign intelligence targets is detrimental to the national security of the United States and our allies, and places at risk those we are sworn to protect – our citizens, our war fighters, and our allies.

……………………………………………………………………………………………………………….