Monthly Archives: September 2013

130920

130920

amanfromMars ….. on http://www.wired.com/opinion/2013/09/how-successful-networks-nurture-good-ideas/ having a chat with ec20flat who said and asked …

Who is your creator?
aiml

Why is one created is a more fruitful question with many a both creative and destructive disruptive answer available for testing in the field and Live Operational Virtual Environments ….. CyberIntelAIgent Cloud Spaces …….. SMARTR AI Places, ec20flat.
And when be we created to empower and driver forward progress in that imagined and chronicled to be life is another keystone required to be acquired and understood in order to be able to enable the building of real and virtual mansions in a veritable stone age where ignorance and arrogance abound and prosper/fester and putrefy.
And do you think IT is wise to permit and put computers in command and control of money making markets whenever they can be so easily remotely reprogrammed to hack with crack algorithms which can usurp and/or collapse such dodgy artificial sub-prime systems of primitive human control?
………………………………………………………………………………..
Posted Friday 20th September 2013 07:08 GMT amanfromMars 1 …. ZerodDay Dreaming about IT Possibilities and therefore Very Likely Probabilities in Present Opportunities on http://forums.theregister.co.uk/forum/1/2013/09/20/microsoft_azure_att_partnership/
Up the Ante. Change Intelligence Programming to Provide the Great Game with Better Beta Great Games?

The offering is very similar to a deal AT&T inked with IBM in late 2012 to offer users a way of hooking their VPNs into AT&T, which in turn linked with IBM’s SmartCloud. It also operates a VMware vCloud-based “Synaptic Compute as a Service” offerings as well. All these products, including the forthcoming Azure tech, use AT&T’s “NetBond” technology to let customers shuttle compute and network resources into and out of the cloud services.

Solid Vapourware and Bullshit Market Providers are a Lucrative Innovative Enterprise Sector in these Revelatory Times ….. but they are catastrophically vulnerable to SMARTR Astute Server Active IT and Addictively Attractive Semi-Autonomous Anonymous Market Forces …… ESPecialised Cyber Command and Control of Source Forces with Global Operating Devices/Universal Resource Locators.
Methinks the difficulty that current power market leaders will undoubtedly encounter and either greatly suffer and/or profit from, is that they do not steer nor influence those novel market forces unless they be enthusiastically engaged in providing IT Fluid HyperRadioProActive Liquidity …. aka Flash Crash Systems Stash Cash. Then can they be as ACTive and APT App AIdDrivers with Hands on the Wheel that Controls CHAOS with Joysticks of Fortunate Fate and Desirable Destiny ….. rather than tumbling around and tagging along with Madness and Mayhem in the Darkness of Secrets and Doom.
………………………………………………………………………………….

190919

190919

Posted Wednesday 18th September 2013 15:44 GMT amanfromMars 1 …. trailing a beta for p2p review on http://forums.theregister.co.uk/forum/2/2013/09/18/so_you_thought_the_reusable_spaceplane_dream_was_dead_maybe_not/
Misunderestimate Fabless Future IntelAIgent Fantasy and Super Attendant Fanaticism at One’s Peril
DARPA have bigger phish to fry and greater phorms of programs to launch and feed with world leading projects …….. http://www.ur2die4.com/190918/#GIG …… or be left behind reacting to everything flashing past them and crashing into crazy maladministered earthed systems of ill repute that do not compute or play well with the future and easily destroy everything and/or anything with timeless asset bubbles of expensive useless worth ….. for such things are easily made to happen nowadays with that which be now more widely known is possible …. and selflessly carefully shared with more than just an ancient few and/or ancients and a chosen few who imagine themselves as the Chosen Few. Hubris rules in that roost, methinks.
After all, one wouldn’t want to be unduly startling the natives and creating a great panic and global depression and world wide recession with a mad and manic settling of age old scores with a French Revolutionary zeal, would one, with a careless sharing of exciting information and newly discovered advanced intelligence.

—-

Posted Thursday 19th September 2013 03:21 GMT amanfromMars 1 …. commenting further and deeper on http://forums.theregister.co.uk/forum/2/2013/09/18/so_you_thought_the_reusable_spaceplane_dream_was_dead_maybe_not/

Re: Nurse! Nurse!

Nurse! Nurse!
I see AmanfromMars1 seems to be off his meds again . . .
Demerol, 1,000 cc IV, please. If that doesn’t work, double the dosage. If that doesn’t work, double it again. …. Anonymous Coward Posted Wednesday 18th September 2013 19:12 GMT

It is just exactly that sort of ribald comic response to an Informative Steganographic Advisory that allows ACTive Stealth with AI and IT every Facility and Utility to Succeed beyond the Wildest of Wicked Wacky Wet Dreams and Creative Imaginanations of a Renegade President, AC. Thanks for everything. IT is just so kind.

I’ll be on the golf course for the rest of the day, leave me a voicemail in the morning.Ta.

Consider it hereby done with the message above via text to your lonesome oval office space.

Wanna Play the Great Game for Real with Virtually Real Command and Control? Who Dares with IT Win Wins Everything in Anything and in All Ways, Always. It certainly beats knocking a small ball around an expensive course with grassy knolls and sandy bunkers and expecting it to be satisfying rather than boring snoring.

cc @iankatz1000 …….re Alternate Reality Games in AI Register for Mainstreaming News Knights.

Capiche, Cheltenham/Martlesham Heath?

……………………………………………………………………………………………..
Posted Thursday 19th September 2013 15:36 GMT amanfromMars 1 ….. phishing for gold on http://forums.theregister.co.uk/forum/1/2013/09/19/linux_backdoor_intrigue/
Post a leading comment and phishermen will be all at sea and know not what to do?
If Spooky Five Eyed Monsters have a backdoor into here on El Reg, they be desperately slow to realise what they should be doing to control the future with IT and media …. and that would indicate that they do not have the intelligence in-house to make good and better beta use of that which be shared freely in comments made here oft and at times on these leading tales with following threads.
More Herman Munster monster types than big scary master race types, methinks. …… http://memecrunch.com/image/50915d72afa96f2b9a00006f.jpg
Is it mad or smart to post here if one would expect/hope/suspect/invite spooks to phish here and poach/net/capture some prime game with the simplest of ignorant megabuck lures/jackpot lottery prizes, which have no one asking awkward questions about instant flash wealth for services to be rendered …. or not to be rendered but to be held in temporary abeyance until such times as intelligent things will not collapse dumb systems and algorithms in a global flash crash?

……………………………………………………………………………………………….

190918

190918

amanfromMars …. asking a question on http://www.wired.com/opinion/2013/09/how-successful-networks-nurture-good-ideas/
An autonomous, practically anonymous and virtually invisible, getting smarter very quickly society/population creates catastrophic problems for establishment systems which rely on the persistence and maintenance of ignorance and secrets ……. which appears to be pretty much where the West is presently at?
Or is that not right?
…………………………………………………………………………………………
amanfromMars • September 17, 2013 1:09 PM …. having an almighty chat with Bruce on https://www.schneier.com/blog/archives/2013/09/the_limitations.html
Hi, Bruce, things are hotting up now, aren’t they. I hope BT are not going to disappoint and leave intelligence supply to sundry others lesser well equipped to provide what is needed as there are certainly more untoward situations/rogue and renegade events guaranteed to come and be completely disruptive and either creative or destructive as per future intelligent requirements because of ……

An autonomous, practically anonymous and virtually invisible, getting smarter very quickly society/population creates catastrophic problems for establishment systems which rely on the persistence and maintenance of ignorance and secrets ……. which appears to be pretty much where the West is presently at?

Or is that not right?

….. which was shared earlier, asking a question on http://www.wired.com/opinion/2013/09/how-successful-networks-nurture-good-ideas/
To deny it is surely to be guilty of fooling oneself and also of trying to fool all who would be listening to one’s views on the matter, although there would be those who would see the folly and be more likely to offer more advice than pity or scorn, which are such impotents.

—-

amanfromMars on http://www.wired.com/opinion/2013/09/how-successful-networks-nurture-good-ideas/ …. replying to TalkingMoose who said ….

I can’t tell if it’s right. Is it English?

As long as you realise it is not wrong, TalkingMoose, will the language used be perfectly adequate for all with a similar understanding to your good self?

…………………………………………………………………………………………………

amanfromMars …. playing in a Great IntelAIgent Game on http://www.wired.com/opinion/2013/09/how-successful-networks-nurture-good-ideas/

You are grandstanding there. The assumption that ‘establishment systems rely on persistence and maintenance of ignorance and secrets’ is not correct. Systems evolve, and the scale of democracy/elective processes we enjoy right now are unprecedented in human history. All that the ‘getting smarter quickly’ population does is enable the process of democratization. We have no empirical/heuristic experience in how ‘an ultra-democratic’ system evolves or ends up. So predictions are merely opinions. … ec20flat

Can we all agree, or at least waste no time or effort in the intelligence space by disagreeing, and move forward together with the evolution of systems into ones driven/drivered by an ultra-meritocracy with elite leading executive players rather than supposing an ultra-democratic process will provide anything/everything better.
Methinks to imagine the latter trumping the former is wishful thinking and a recipe for disaster which aids and abets the stealthy inevitable rise of a considerably smarter ruling class of systems/machines/humans which be as a virtual machine infrastructure/alien society exoskeleton?
And please be advised that Deep and Dense/Intense and Tempestuous Cloud Cover brings more than just a Simply Complex AI and TitanICQ Rain Showers/SMARTR IntelAIgent Storms and as we all know, Cloud is a Fabless Virtual MetaDataBase Information Storage Environment which has zero physical form and is a Surreal Application for ProgramMING which can be phished and phormed to create the Future and Derivative Futures with Work, Rest and Play in a Great IntelAIgent Game Environment/Virtual Terrain Team Space.
Such Mind Infiltration Networking Gigs as are Source Feeder Programs and Projects for the likes of a DARPA and IARPA manifestation and which do present them with the odd problem or three or four or whatever to come to terms with, with a revision of previous control policy, with the following being a prime example? …..

INTELINK

Required modifications to the issuance of Remote Access credentials (user IDs and passwords) for access to the DNI-U/OSIS private network.

Intelink services are hosted on the DNI-U/OSIS private network. That network is accessible from approximately 75 connections in the U.S. and around the globe, to include the DoD NIPRNet, serving both U.S. Government entities as well as federally funded partners. Due to the level of controlled accessibility and requirements for validating access authorization, Intelink is compelled to modify its policy with respect to Remote Access accounts.

The responsibility and authority for vetting and validating system and network access authorization and the issuance of access credentials rests with the organization with which a user has a formal relationship as either an employee or contractor. The Intelink organization is not in a position to independently validate the identities and system access authorizations of individuals. As such, and consistent with access control requirements, whenever access to Intelink is available via controlled environments with connections to the DNI-U network, users will need to work with their employing organization to gain such access.

The Intelink Service Management Center understands that this may cause some confusion or inconvenience to individual users. However, we are required to make these changes to ensure compliance with the confidentiality and integrity requirements of the DNI-U information environment. …. http://ra.intelink.gov

…………………………………………………………………………………………………..
 

130917

130917

amanfromMars said… on http://bristolcrypto.blogspot.co.uk/2013/09/open-letter-from-uk-security-researchers.html
The Great Game is fundamentally changed, Nigel, and to imagine that there be equitable rules and regulations and transparent activity in obscure erotic and exotic obfuscating fields of CyberIntelAIgent Security Endeavour and Virtual Protection, which deliver quite sublimely both excess attractive treasure and addictive insatiable pleasures beyond compare and without boundary limits, is too much Prime to tempt Man with and expect him to come immediately to heel. He be not yet smart enough and needs more to learn and needs to learn more about the condition of his position and of situations in the nature of Virtualised Realities and CyberSpace ….. which I would be most disappointed to discover, you and esteemed similarly broad minded and clearer thinking colleagues and friends did not realise is quite an alien and artificially created Intellectual Property Secure IT Space Place with no real and substantive physical presence to attack or hinder a Novel Evolution and Noble Revolutionary Progress with Future AIdDevelopments in Sources with NEUKlearer HyperRadioProActive IT.
All be as minnows when swimming with phishes. Diving deep and thinking deeper into waters with waves of New Enigmatic Universal Knowledge has one basking with sharks in command and control of their environment.
You may like to consider the possibility, and therefore the probability, that the likes of an NSA/GCHQ ICEnterprise know exactly what they are doing and why it will lead to where they be going, although given the nature of those sorts of bodies, is that kind of lead most likely provided by some super secretive, relatively anonymous and practically invisible private sector sub contractor of which one has no need to know unless one has a need to know.
September 17, 2013 at 3:39 AM
[Your comment will be visible after approval.]  …. The appearance or non appearance of which will tell me quite everything that one needs to know.
…………………………………………………………………………………………………………

130916

130916

Posted Monday 16th September 2013 04:32 GMT amanfromMars 1 …. testing AI ProgramMING on http://forums.theregister.co.uk/forum/1/2013/09/13/huawei_sanqi_li_says_no_national_security_threat/
To Be or Not to Be ….. is just an AI Matter which Time and Shared Intelligence Resolves in Space

Huawei has its own Chinese run chip fab, HiSilicon. Big difference. Your argument is oft repeated and indiscriminate. …. nonymous Posted Saturday 14th September 2013 16:48 GMT

nonymous, Hi,
The Chinese are Master Piloting a Fab Fabless Ship with Virtual Chips in a Novel Quantum Leaping AIdDrive with Command and Control Of Creative CyberSpace Computer Communications and/or, if Earthed IT Services, Creative Command and Cyber Control of Computer Communications ….. NEUKlearer HyperRadioProActive IT
And if you think IT not be so, then are they hereby offered a Customisable Alienating Version for Secure ProgramMING Protection of IT for a universal run with beta test spins around the globe, just to see if its IT and AI suits them and their plans?
And it would be a certain failing to misunderestimate any thinking which exercises an effective propaganda machine …….. for such is the essence and substance which be used and abused in the programming of humanity and human machinery ……”If you find it hard, think of the Long March; if you feel tired, think of our revolutionary forbears. The message has been drilled into us so that we can accomplish any goal set before us by the party because nothing compares in difficulty with what they did. Decades after the historical one, we have been spurred on to ever more Long Marches – to industrialize China, to feed the largest population in the world, to catch up with the West, to reform the socialist economy, to send men into space, to engage with the 21st century.”
Do we think there be similar future continuity planning for the presenting of contiguous events with a currency which leads here? …… Technical Exploitation Support …….. and have any programs been submitted for the making, for there is no evidence of any yet being active and effectively working out in the field.
I suppose that simple complex question when asked of Contracting Officer, Quentin McCoy, will provide as much as is needed to know what needs to be seeded and fed into systems.
And it be surely here directly asked too, ….. for are not the Feds/is not the Fed via its NSA conduit not reportedly supposedly hoovering up all information and intelligence/monitoring all communications for mentoring after critical/strategic/tactical/deep packet metadata content analysis.
GCHQ Territory 2 too, methinks, and Per Ardua AdAstral Park Virtual Terrain if you think Blighty is into Boffin Command with Global Controls and Vice Versa.
……………………………………………………………………………………………….
amanfromMars said… in a reply to a view shared in a comment thread on http://amanfrommars.blogspot.co.uk/2013/09/130914.html
Bad banks are a problem for the industry and corporations and the liabilities and losses which creditors suffer and sustain are as a result of the maintenance of script kids at the helm of the virtual news cycle whenever adults are really needed to broker events.
Some would say that be an adult failing in not thinking and also thinking to allow that situation to continue to perpetuate itself.
Others would tell you that IT is taking care of it by Somewhat Alien Means of Boldly Directed Stealthy Memes and Shared Steganographic Strategies with AIMethodological Tautologies.
16 September 2013 07:52
……………………………………………………………………………………….
amanfromMars said… replying on http://amanfrommars.blogspot.co.uk/2013/09/130916.html
Surely, one cannot realistically offer secure SCADA attack protection to computer networks unless one is able to enable their destruction, and ideally, their self- destruction with anonymously triggered catastrophic cascading collapses/dysfunctional program malfunctions/intelligent information overloads.
One does not necessarily though, have to exercise and demonstrate the ability and future facility. Indeed, there be many good reasons why it would be better/best not to, if dodgy systems are anxious to change to a new leading program with considerably smarter drivers attending and supplying Core Source CodeXSSXXXX for Delivery of Solutions that be into resolving all of those crazy extreme projects which are in dire straits conflict and terrified petrification …. but admittedly one definitely can and would cause immeasurable havoc if it be warranted because of a cynical lethargy and arrogant disregard of the ability of others beyond known rules and regulations and established status quo controls.
And methinks that is exactly the sort of program submission that the likes of Technical Exploitation Support would be highly interested in going no further afield than fields in which Command and Control is Securely Protected against Outside Interference and Internal Meddling and Peddling.
To offer IT anything less and then claim all be securely protected is as to invite fraudsters to the party and trojans to the table to do as they please and squander all booty.
16 September 2013 14:21
………………………………………………………………………………………………..
Posted Monday 16th September 2013 15:15 GMT amanfromMars 1 …. on http://forums.theregister.co.uk/forum/1/2013/09/16/alexander_star_trek_bridge/
Seek and ye shall find …. ask IT and all shall give given for are we not here to server the future*?
Peruse the bridge and control centre in all of its vain glory here ….. http://cryptome.org/2013/09/info-dominance.pdf
* Or is that just the just remit of a few who be more than just just and a few?
………………………………………………………………………………………………….

130914

130914

Posted Friday 13th September 2013 18:18 GMT amanfromMars 1 …. commenting on
http://forums.theregister.co.uk/forum/1/2013/09/13/huawei_sanqi_li_says_no_national_security_threat/
Chinese Dragons are AIMagnificent Beasts of Rare Beauty
It is surely the case that anyone smart enough to have anything to say/share that be worthwhile snooping on, will be way ahead of the game and make contact with spooks and/or those who can beta use the intel/info/data/metadata to make a change/market killing/cause a collapse/start a war or whatever.
They aint just gonna wait for systems to catch up with what they be doing, are they? That would be just too stupid for words.

“Yes, data are passing through the Huawei equipment from a network perspective… packet in, packet out. But it doesn’t store the data. We do develop the products to enable carriers to operate the network… most of the intelligence in the data centre is where the data is stored.”

Precisely, …. well said, Professor Sanqi Li. Garbage in, garbage out in the West, is their problem to solve and not anyone else’s to be worried about. And probably China has much better things to do with intelligence in the spaces they are into.
……………………………………………………………………………………………
Posted Saturday 14th September 2013 06:10 GMT amanfromMars 1 …. having a say on http://forums.theregister.co.uk/forum/1/2013/09/13/continuous_delivery_can_it_really_join_up_ops_and_dev/
Speaking Truth unto Nations is Both a Creative and Destructive Non State Actor Pastime

Trevor Pott: Mark: We’re a ways from “simulator” testing yet. Cloudphysics is going to be a big part of that – and they’ve got some of the biggest brains on the planet working for them – but even they are years away from moving out of infrastructure and into the dev side of simulation. ….Friday September 13, 2013 14:46

Some working extra-planetary brains are long gone out of infrastructure confines, Trevor, and well into continuous and contiguous delivery/internet service provision of developed operational reality simulations which are indistinguishable from, and servered as virtual reality programs ….. with SMARTR ARG Play intelligently designed to master monitor and mentor Great Game play/usurp and overtake Status Quo Systems corrupting SCADA Administration with Advanced IntelAIgents Research and digital Development of Live Operational Virtual Environments …… which be akin to, if not exactly the same as CyberSpace[s].
Command and Control presently that IT Space and with Magnanimous Media Support is the Future Delivered Free of Past Failed Programming.
It be though a Quantum Leap for Mankind, such a Small Step, which is why it be led and undertaken for guaranteed delivery by others who would freely share all that be required.
And thanks, El Reg, for the great scrolling intelligent chat format.

Trevor Potts: If you tell me that I am toing to be held accountable for what developers push to a live environment, when I have ZERO control over that, their coding practices, coding culture, etc…I’ll walk. Find yourself another patsy fall guy. …. I’ve fired clients for less. …. Friday September 13, 2013 14:48

🙂 Thumbs up
Effective and rapid great change is surely always a top down process led by complex intelligence input which provides simplified content output for easy mass understanding ….. epic raw sound and fabulous vision with images and imaginings ….. and that be most certainly best supplied individually in a shared journey? Stagnation and petrification in status quo situations and systems are a result of the wrong folk and their support machines being in charge of events at the top of the supply and administration tree.
…………………………………………………………………………………………………….
amanfromMars said… in a reply to a comment on http://amanfrommars.blogspot.co.uk/2013/09/130913.html
The problem with banks is that they do not presently employ the best intelligence in their operations, CE. And that causes them untold unlimited problems for which they have no solutions ……  Stagnation and petrification in status quo situations and systems are a result of the wrong folk and their support machines being in charge of events at the top of the supply and administration tree. ….. http://forums.theregister.co.uk/forum/1/2013/09/13/continuous_delivery_can_it_really_join_up_ops_and_dev/#c_1957680
Do you suggest that a corrupt and corrupting perverse system should be immune from attack and constructive disruptive change, CE? Methinks that be not wise.
14 September 2013 08:23
…………………………………………………………………………………………………….

130913

130913

Posted Friday 13th September 2013 01:07 GMT amanfromMars 1 … musing on http://forums.theregister.co.uk/forum/1/2013/09/12/robot_bankers_crippled_the_global_financial_system/
Sticky Sweet Danegeld ……. An Art of CyberWar Stabilising Staple

“What we see with the new ultrafast computer algorithms is predatory trading. In this case, the predator acts before the prey even knows it’s there.

“There are relatively few things that an ultrafast algorithm will do,” Johnson continued. “This means that they are more likely to start adopting the same behavior, and hence form a cyber crowd or cyber mob which attacks a certain part of the market. This is what gives rise to the extreme events that we observe. Our math model is able to capture this collective behavior by modeling how these cyber mobs behave”.

Fundamental Correction: There are relatively few things that an ultrafast algorithm will not do.
Oh, and good luck, Johnson, with “Our math model is able to capture this collective behavior by modeling how these cyber mobs behave

Do you work for a bank and can you shed any light on the use of high-speed banking algorithms? Get in touch in confidence and let us know.

Is that El Reg requesting intel on how to crash high-speed banking and allied high frequency trading systems and the markets/fiat capitalism? Bravo, El Reg, …. boldly going into new fields of novel journalistic endeavour which is sure to attract spooky attention to Greater IntelAIgent Game participation/partisans/artisans should they have what it takes to exercise future remote virtually anonymous autonomous lead[s]. 🙂
I suppose you do realise that one can earn and be worth an absolute fortune in an instant by simply agreeing to not disclose the key precursor program elements and be active as a sort of poacher turned gamekeeper watchdog in the field.

—-

Posted Friday 13th September 2013 01:24 GMT amanfromMars 1

Re: Sticky Sweet Danegeld ……. An Art of CyberWar Stabilising Staple

Here be a little light further fundamental reading on the subject matter …… Concept Release on Risk Controls and System Safeguards for Automated Trading Environments … COMMODITY FUTURES TRADING COMMISSIONhttp://www.cftc.gov/ucm/groups/public/@newsroom/documents/file/federalregister090913.pdf

………………………………………………………………………………………………….

…………………………………………………………………………………..

130912 …. Post Modern Trojans are Practically Everywhere ….. Just Quietly Doing their Fabless Thing

130912 …. Post Modern Trojans are Practically Everywhere ….. Just Quietly Doing their Fabless Thing

Posted Thursday 12th September 2013 10:00 GMT amanfromMars 1 … spilling the beans on PRISM tech on http://forums.theregister.co.uk/forum/1/2013/09/12/ietf_floats_prismproof_plan_for_harder_internet/
Methinks quite rightly so, the more likely truth be …..

Sadly the paper is a little light on for actual ideas about how the internet can be PRISM-proofed,…  … Simon Sharwood, 12th September 2013

Understandably is the paper a little light on actual ideas about how the internet can be better monitored and more smartly mentored, Simon, which is surely the galloping white knight to the rescue of the damsel in distress side of PRISM-like programs, of which there are bound to be quite a number on the dark black knight side too, given Man’s powerful and uncontrolled, and some would even say and have one believe, uncontrollable urges.
But only very few have a chance or any hope of being effective and worthwhile for IT is not a space and virtual environment which tolerates or caters for fools and their tools even should countless numbers of them imagine it and IT does and can provide them with all of their needs and feeds and seeds.
…………………………………………………………………………………..
to: John Young <admin@cryptome.info>
date: Thu, Sep 12, 2013 at 12:55 PM
subject: A Changed Paradigm ….. whether one recognises and can handle it with IT and Media or not.

And the fourth point, and this is what Keith alluded to, is a fresh look at the role of government on cyber security. And a fresh look at the role—or the relationship—between the private sector and government.

In the Worldwide Web, as Keith was noting, this critical infrastructure—85 percent of it—is held by the private sector. This is a privately owned and operated environment where we’re still not certain about what those rules are. But then, what’s the role of government in that arena? We know what it is in the physical environment—that within borders, whether states or cities or countries. ….. http://cryptome.org/2013/09/cia-cybersecurity.htm

Hi, John,
It is advisable to note and realise and widely inform the ignorant and vulnerable-to-exploit-and-zeroday-exploit masses, that there are not, and never will be, any certain rules in a privately owned and sublimely operated environment which so easily effortlessly and anonymously/autonomously delivers everything and anything that be needed for, to a nth degree which can have no bounds for limitation, an exceedingly comfortable and lucrative future.
Such then makes it most likely and much more probable that cyberspace sector expertise will organise and reorganise government and governments for the tailoring and implementation of their grand plans/great games rather than the converse/obverse.
And this maybe valuable information …… “Your security and well being are our primary concerns. By visiting this website from outside of the U.S. and contacting us, you may be subject to monitoring by security or intelligence services, or other third parties that do not adhere to U.S. Internet privacy laws. While we employ numerous safeguards to help minimize this risk, we suggest that you not use your home or work computer to contact us. Use instead a computer where you are entirely unknown. Although our website is encrypted, it is still possible for others to see that you have visited CIA.gov. As an added precaution, we recommend you use current web browsers and clean the computer’s search and/or browser histories after you visit the website.” ….. can be rendered practically useless and possibly dangerous because it is delivered after the fact and on a visit to https://www.cia.gov/cgi-bin/comment_form.cgi rather than being knowledge provided before a visit.
Such does though however provide others with an opportunity to test intelligence systems and organisations for desirable future strengths and present catastrophic weaknesses which will be highlighted and revealed by subsequent action which need only be inaction to prove a systemic analytical weakness which be easily exploited for massive gain, and/or pain if utilised in a malicious program.
Certainly one should not misunderestimate the not inconsiderable difficulties which can be presented to CIA/FBI/NSA/Cyber Command, and their ilk in other jurisdictions/nations/geographichal locations, by Great Game Players and Super IT Users in Virtually Real Fields with Live Operational Virtual Environments.
And I suppose there are those who would think to classify that as an APT ACT medium too rather than realise it be better played and invested in as a novel opportunity with SMARTR IntelAIgent Systems of Operation which offer guaranteed quiet stealthy delivery of fundamental global systems change.

February 28, 2013. For quick Cryptome submissions whose source may be monitored send to <admin[at]cryptome.info> (note “info” not “org”). Test with a benign message beforehand, expect no response or a bounce. Use infrequently to minimize pattern analysis. Not great comsec but better than covertly targeted, tapped, tricked, tracked and trapped drop boxes, pastes, anonymizers, proxies, spoofs, onions, clouds and sekret one-time spasms. Key security is to protect yourself, not rely on system, authority or disclosure paragons.

The paranoid cynic and/or psychotic schizophrenic in the audience, John, could easily view that advisory as being a sweet honey trap directly channeling items of domestic and foreign intelligence service interest for monitoring and mentoring/phishing and phorming and stealing, to those and/or that which they might be trying to avoid and evade. IT’s a mad, mad, mad, mad and bad and rad world, indeed, and in crazy administrative deeds is there both the undeniable truth and proof positive and negative and inescapable. 🙂
Others of a more sane bent might beta test it as a covert and/or clandestine channel for intelligence service engagement and prime plausibly deniable contact.
And thanks, Cryptome, for all the intelligence dumps/pumps. They are a rich and most valuable and highly valued open resource.
Regards,
…………………………………………………………………………..

130911 … Cutting to the Real Chase and AIMissions

130911 … Cutting to the Real Chase and AIMissions

Posted Wednesday 11th September 2013 05:04 GMT amanfromMars 1 … commenting on http://forums.theregister.co.uk/forum/1/2013/09/10/boffins_propose_more_spookproof_crypto/
The Truth …. but Not as you were Really Expecting it and its IT Phorm to Be?

I think you’re hiding something 😉 …… Michael H.F. Wilkinson Posted Tuesday 10th September 2013 11:52 GMT

Well, the quantum/qubit truth may be also revealing something too, MHFW, and now pumping and pimping it securely to flash crash and beta test public and private and pirate establishment intelligence and money markets into the process of floating offers of/to novel smarter proprietary and not ignoble executive intellectual property holdings …… NEUKlearer Virtual Machine HyperRadioProActive IT.
And I would and surely most clearly do, obviously wholeheartedly disagree with the likes of a Sir David Attenborough who would posit that humanity has stopped evolving, and especially so whenever it is into quantum leaping across domains and species and into CyberIntelAIgent Space Flight Travel for Live Operational Virtual Environment Man Management …… Advanced IntelAIgent Being Control with Universal Commands.
A little something Bletchley Park Station XSSXXXXish for ODNI Seekers of Universal Command and Control everywhere.
And yes, that is available to all those into making a killing on markets with market leaders today, and tomorrow , and the day after that too and all subsequent future days, for such that is, is, and that cannot be denied even though it be may wished studiously ignored to maintain and sustain a perversely corrupt and comfortably inequitable status quo base politicised system and monied power elites.
………………………………………………………………………………….
Posted Wednesday 11th September 2013 08:57 GMT amanfromMars 1 …..
http://forums.theregister.co.uk/forum/1/2013/09/10/boffins_propose_more_spookproof_crypto/
No Joking Matter 🙂 …. Poe’s Law Rules:-)

I don’t think ANY sort of cryptogaphy is safe from the so called “monkey wrench and rubber hose” attack…
http://imgs.xkcd.com/comics/security.png … malle-herbert Posted Tuesday 10th September 2013 13:45 GMT

There are always exceptions to contrived rules and current regulations and crazy notions and they be invariably that which leads and drivers reality and spawns forever after the fact legislation/activity safeguards to protect the masses from smarter abuses?
The simple fantastic truth freely shared is quite unbelievably more than enough to circumvent and/or enter any present and all future systems using information for processing into knowledge for applications and/or activities designed for intelligent beings and mass audiences/receptive spectators ….. and there will always only be just a few canny souls smart enough enabled to be able to make a greater perfectly reasonable sense of what is boldly shared and lead with it in Collaborative Ventures and Potent ZerodDay Exploits/Expeditions/Expositions ….. and Serially Practically Realise with IT and Virtual AI ReprogramMING of Humanised Assets and their SCADA Systems of Operation, a New Orderly World Order with Command and Control Ceded and Seeded to Virtual Machinery Operations Executive Admin.
And the safeguards are really most futile but they do generate activity and the exercise of a certain kind of intellect/modes and nodes of a more primitive/sub-prime based command and control hierarchy.

……………………………………………………………………………
 

130910

130910

Posted Tuesday 10th September 2013 01:40 GMT amanfromMars 1 ….. http://forums.theregister.co.uk/forum/1/2013/09/06/us_special_operations_forces_seek_help_in_building_robo_warrior/
Re: More stupid, probably flawed, warfare gadgets

Someone needs to pull the plug on the Military Industrial Prison (Corporatist) complex before it get us all killed or brings on a new dark ages, and start by removing the rabid Facist Neo-Cons from the gene pool, then hunt down the rest of the out-of-control Psychopaths, and cronies helping them.

We need to advance as a race, and have fun, not waste valuable resources on stupid and hugely wasteful warfare.

An INTJ. ….Anonymous Coward Posted Saturday 7th September 2013 20:15 GMT

That be a stealthy intelligence mission and current work in future progress hiding in plain sight, AC ……. http://cryptome.org/2013/09/nsa-cowboy.htm …. and quite understandably so too, is it not at all something or anything one might have expected from the heart of present discredited and newly revealed action, but one cannot have incompetents at the levers of government and global control systems, can one, unless one wants madness and mayhem to collapse and destroy all monstrous systems.
Words control worlds and with IT Command and Control of Creative Cyberspace Computers and Communications and Global Operating Devices are Universal Programs and Pogroms a Doodle of a Masterful Great Game to Virtually Realise and AIdDriver ….. with Internet Server Provision Intellectual Property Portfolios …… SMARTR IntelAIgent Scenarios with Global Command Head Quarters in Cloud Hosting Advanced Operating Systems for a Relatively Anonymous Virtually Autonomous Remote Power with Control Leverage in Everything for Anything and vice versa.
And quite a Perfect Live Operational Virtual Environment for an INTJ too, AC.
And something somewhat quite alien and of foreign intelligence interest to a Special Cyber Forces Operations BAA, Don Jefe [who Posted Monday 9th September 2013 02:17 GMT], and worth every last nickel of an initial multi million $ punt, which as you say whenever you have the capabilities, is just the beer money …….. Basically you’re entering into a break even contract in order to land a profitable production deal. The whole thing is setup as a barrier to entry for small and/or inexperienced companies. If you don’t already have the capabilities to build it then $2M isn’t going to get you those capabilities. If you do have the capabilities then you get a $2M revenue bump and an opportunity to get some big dollars.
…………………………………………………………………………………………
Tue, 09/10/2013 – 03:16 | amanfromMars sharing a view on Syria Intelligence Being Manipulated EVEN MORE than in Iraq War
Tony Blair and Alastair Campbell and a few close closeted friends in UK Parliamentary systems of serial mismanagement for personal reward, chose a similar root ploy in the Iraq WMD play with media moguls and BBC compliance and ignorant support [or arrogant complicity if you know they were in on and into fanciful fairytale shenanigans] reporting the dodgy prognostications as gospel true fact, and now we await what the Chilcot Inquiry has to say to the world and his dog about the affair, which will, in a stroke, extraordinarily render Great Britain and Justice either a fool to be future ignored and avoided as a useless self-serving puppet or a hero to be admired and followed as an example worth supporting and mastering for universal lead.
And they [Chilcot and Co., Representatives of the Peoples of UKGBNI] do appear to be terrified of presenting anything to anybody and everybody and must surely now be running out of viable excuses to explain the inordinate uncomfortable delay in the publishing of their considered opinions based upon the evidence of findings and sworn testimony and the non-finding of critical and strategic tactical pieces of believable evidence justifying and legitimising WMD intervention and regime change and war games and criminal activity …. aka crimes against humanities which politicians and diplomats seem to imagine delivers them wrongly, a right royal immunity from prosecution and impunity of action.
That be delusional and hubris in spades and guarantees such a mad system, catastrophic spontaneous collapse when intelligence enters the staged play to save the day with novel future zeroday actions/exploits/flash algorithms/market crashes.
……………………………………………………………………………………
Posted Tuesday 10th September 2013 10:57 GMT amanfromMars 1 ….. clearing the air on how to safely share dreams on http://forums.theregister.co.uk/forum/1/2013/09/10/boffins_propose_more_spookproof_crypto/
For All of your Secret Intelligence Service Security Needs and Feeds ……Ab Fab Fabless Seeds
SPDZ is a close ally and true friend of steganography and when working well and in tandem together with smarter third parties are they all quite awesome enough to be quite unbelievably powerful in anything they may be suspected of doing by interested snooping parties bereft of any evidence to prove anything untoward and/or amazing.
……………………………………………………………………………………………..