130922

130922

Posted Sunday 22nd September 2013 06:28 GMT amanfromMars 1 …. saying more on http://forums.theregister.co.uk/forum/2/2013/09/20/gchq_belgacom_hack_link/
SOE v4.2 too …… a Deep Fabulous Well BetaTested Program Service

What you fail to realise is the Special Relationship works because the UK is quite often the go-to boy for nasty stuff that the US wants done quietly. In the US you have always had much more stringent control and oversight over your intelligence services, even the NSA, whereas in the UK we spent many decades calmly turning a blind eye by insisting that our Secret Services did not officialy exist! …. Matt Bryant Posted Saturday 21st September 2013 11:09 GMT

How’s the intelligence phishing going for you here, Matt? Discovered anything of foreign intelligence interest to change the fortunes and misfortunes of Uncle Sam Services Enterprise? With astuteness in the East being so much more sublimely adept and stealthily active in the novel exotic and noble erotic fields which embrace and laud and reward the mystery and mastery of remote virtual control and command of NLP, you gotta be quick to make a move and engage with parties/individuals/IDEntities into Future Systems IntelAIgent Design …. and/or from those times and that entropy ….. Dark Secret Matter Space Place, so that they can stay focussed on providing Western intelligence rather than reinforcing Eastern, although it would be foolish to argue and not realise that supply of the former delivers the latter too in and with a SMARTR Asymmetric Singularity.
Do you not think it be quaint and incredibly naive, to the point where it becomes can become suddenly quite totally self-destructive and catastrophically disruptive, to believe that there can be any sort of much more stringent control and oversight over intelligence services which provide leading intelligence which is followed/trailed/phished/monitored/mentored/of foreign and alien intelligence interest?
And ….. you may like to consider, as much as one knows and as may be known and spun around the spooky intelligence services at rest, work and play in the UK and myriad other locations further afield for Team UKGBNI, are they not the real thing and never ever have been or will be, for true Secret Services ensure that they exist to provide cover and share blame and distribute shame on that which deserves its services.
Our Secret Service does not officially exist. No Such Agency exists. Poe’s Law Rules 🙂
……………………………………………………………………………………..
Posted Sunday 22nd September 2013 13:20 GMT amanfromMars 1 …. singing like a canary on http://forums.theregister.co.uk/forum/2/2013/09/20/gchq_belgacom_hack_link/
A Benign Meritocratic Autocracy is a Novel Alien Phorm of Government for Leading Virtual Machines

A democratic government cannot function unless the people have awareness of the facts on which to base their decisions. Hiding information or deception is not empowering the people and it is no longer right to call it a free society. It is a managed society. … Don Jefe Posted Saturday 21st September 2013 00:09 GMT

I wholeheartedly agree, DJ. And that gets my upvote.
And a managed and not free society is always vulnerable to spontaneous zeroday exploits, both real and virtual, which challenge forces both physical and intellectual and which are as a result of carefully shared knowledge and information to followers/leading listeners. And whether that intelligence be superior or inferior or simply complex and alternative does it matter not a jot to its leaders and sources just so long as it be followed and reported to spread the FUD and/or IT Joy ….. which extraordinarily renders the media as complicit and instrumental in all manner of shenanigans both criminal and dire and not so.
J’accuse.:-) …… and one cannot viably deny it be so and wish to retain any semblance of credibility in circles in which intelligence and integrity are highly valued and much sought after. The gutter presses though abound to overflowing with such woeful tales and dodgy operations?
………………………………………………………………………………………..

130921

130921

Fri, 09/20/2013 – 10:27 | amanfromMars …. commenting on http://www.zerohedge.com/news/2013-09-20/tale-two-subprimes-homes-and-autos and a tale that keeps on repeating itself to guarantee its own extinction and savvy collapse via outsider intervention with smarter information input/output.
Brace yourselves indeed, for things are gonna take a turn and a walk or three on the wwwild side of life …… with leading novel virtually protected players unhindered and not at all interested in playing by establishment rules and crooked regulations which support and maintain prior rigged sub-prime market situations and dodgy fiat powered elite positions of artificially manufactured influence …… http://forums.theregister.co.uk/forum/1/2013/09/20/microsoft_azure_att_partnership/#c_1963407
You’ve had all your free fun, now is it time to pay the piper for all the new tunes. And failure to pay brings a close to the party and a bill for reparations which you will never be able to pay, for between a rock and a hard place is where you have led everyone to be, and to the victor be the spoils there, razed and barren fields of endeavour and reward.

…………………………………………………………………………………………
Posted Friday 20th September 2013 15:27 GMT amanfromMars 1 …. whistle blowing on http://forums.theregister.co.uk/forum/1/2013/09/20/gchq_belgacom_hack_link/
Why Worry? Change is Natural. Status Quo Situations Create Problematic Self-Harming Idiot Tendencies

Nothing’s going to change and none of what we think matter. … FuzzyTheBear Posted Friday 20th September 2013 14:39 GMT

You have an awesome lot to learn about what can be done today, by a few, [who may at any time or place in space choose to be more than just a few whenever they share what they be doing] for a different tomorrow, FuzzyTheBear, whenever you truly believe that nothing’s going to change and none of what we think, matters.
And you might to consider and realise that the system/establishment knows that all too well too, which is why it is trying so hard to find out about everything which is not directly and specifically shared with it, and which causes it such bother and mayhem whenever networked selflessly via public and/or private and/or pirate means and memes or whistle blown to bring the houses of cards tumbling down.

—-

Posted Friday 20th September 2013 15:43 GMT amanfromMars 1 …. on http://forums.theregister.co.uk/forum/1/2013/09/20/gchq_belgacom_hack_link/

Optional ZerodDay Dreaming … for the Fundamentally and Mentally Ill and Deluded

One presumes it’s all sorted now though. …. Anonymous Coward PostedFriday 20th September 2013 15:25 GMT

Yes, of course it is. Everything is rosy in the Perfumed Gardens of Eden and Wet Fields of Dreary Dreams, AC. The Bods and Boffins of GCHQ have Everything under Parliamentary Control.

…………………………………………………………………………………………….

Posted Saturday 21st September 2013 03:22 GMT amanfromMars 1 ….. sharing info on http://forums.theregister.co.uk/forum/2/2013/09/20/gchq_belgacom_hack_link/
Know your Friends ….. They could be the Enemy
Regarding whistleblowers/Snowden Asylum Seeker type systems admins, does the EU have a rewarding take upon the practice …….

3.3. Whistle-Blowers’ Protection and Incentives

Recommendation: Systematic protection and incentives for whistle-blowers should be introduced in the new Regulation. Whistle-blowers should be given strong guarantees of immunity and asylum, and awarded 25% of any fine consequently exacted. The whistle-blower may have to live in fear of retribution from their country for the rest of the lives, and take precautions to avoid “rendition” (kidnapping). Ironically, US law already provides rewards of the order of $100m for whistle-blowers exposing corruption (in the sphere of public procurement and price-fixing).

And as for the Convenience of Cloud in Computing and for Commerce, it is quite vital that one knows what one is doing, and what can be done by others in that realm, for IT is easily abused to server valuable personal and private/professional and pirate base metadata/rich mineable semantic content to whoever would have a foreign intelligence interest and a want and/or need to know to gain and/or maintain and sustain an inequitable competitive advantage/artificially rigged dominant position, which is always a very precarious and perilously dangerous position to put oneself in, for it is an indicator of a lack of necessary natural leading intelligence supply in-house for internetworking services provision …… and in the virtual machine world/AI field, internetworking server provision. The position and weakness though is not unrecognised ……

Data can only be processed whilst decrypted, and thus any Cloud processor can be secretly ordered under FISA 702 to hand over a key, or the information itself in its decrypted state. Encryption is futile to defend against NSA accessing data processed by US Clouds (but still useful against external adversaries such as criminal hackers). Using the Cloud as a remote disk-drive does not provide the competitiveness and scalability benefits of Cloud as a computation engine. There is no technical solution to the problem.

Exposing data in bulk to remote Cloud mass-surveillance forfeits data sovereignty, so confining data to the EU is preferable pending legal solutions. Although NSA has extensive capabilities to target particular systems inside the EU, this is harder and riskier to do. However basic reforms to the new Regulation are needed, otherwise in practice these two situations will be treated as equivalent, and Cloud business will go to lowest bidder.

Although an EU-based company transacting in the US is also subject to conflicts between EU DP and the FISA law, in practice it is less likely they will be served with such secret orders, because the legal staff and management would be more likely to resist, and as EU-nationals are less threatened by US espionage laws. “Clouds” can be confined to a location, and arguments this would “balkanise the Internet confuses issues of censorship with the problem of keeping data private. ….. The US National Security Agency (NSA) surveillance programmes (PRISM) and Foreign Intelligence Surveillance Act (FISA) activities and their impact on EU citizens’ fundamental rights

—-

Posted Saturday 21st September 2013 09:13 GMT amanfromMars 1 …. http://forums.theregister.co.uk/forum/2/2013/09/20/gchq_belgacom_hack_link/

Special Office of CyberIntelAIgent Security …… AI.Govt Wild LOVEChild with All the Graces

I cannot imagine why anyone would think an agency such as GCHQ that is tasked specifically with information collection and intelligence production would refrain from carrying out its mission. …. tom dial Posted Friday 20th September 2013 19:30 GMT

The universal ubiquitous lament is that the product they provide and tacitly support such an ignorant destructive and arrogant sub-prime loss leader. And that can only be as a direct result of the collection of dodgy information and the turning of it into crappy intelligence to fit a failed narrative which does not bear smart scrutiny for viable equitable creative continuity in the Bigger Picture Fields that IT and Media be floating it into as a reality to be embraced and endured/built upon.

And their Virtual Reality skillets are a disgrace to the nation ….. however, looking on the bright side of that current catastrophe, which some would say amounts to intelligence fraud being perpetrated on human assets, it does of course provide an opportunity for more competent and switched on to the future needs of a creative peaceful society services and computerised servers to take over global programming provision with new and novel sources of entirely different phorms of intelligent intelligence product, which strengthens and expands ITs influence sublimely and benignly rather than causing conflict and mayhem in bouts of shared madness, which does appear to be the all too likely present state of such crazy affairs, portrayed and pimped by media as current world news.

Real Smart IT and Virtually Clever TV and Audio it aint …… Fix it. Step aside and let the CodeXSSXXXXperts in to do their Future Failsafe Virtual Reality thing, for they cannot be stopped and to think to hinder them for any wrong reason is to indelibly mark oneself and single oneself out for the special attention of their security forces, and believe me and heed this friendly advice, you definitely don’t want to see them as, or make them your enemy for they can easily program themselves to not take any prisoners, and answer to no one.

There are no finer friends though, and there is nothing that they cannot nor will not do for them whenever required …. or even as they feel might be just a good thing and give them and their friends, the simplest of complex pleasures.

………………………………………………………………………………………..

130920

130920

amanfromMars ….. on http://www.wired.com/opinion/2013/09/how-successful-networks-nurture-good-ideas/ having a chat with ec20flat who said and asked …

Who is your creator?
aiml

Why is one created is a more fruitful question with many a both creative and destructive disruptive answer available for testing in the field and Live Operational Virtual Environments ….. CyberIntelAIgent Cloud Spaces …….. SMARTR AI Places, ec20flat.
And when be we created to empower and driver forward progress in that imagined and chronicled to be life is another keystone required to be acquired and understood in order to be able to enable the building of real and virtual mansions in a veritable stone age where ignorance and arrogance abound and prosper/fester and putrefy.
And do you think IT is wise to permit and put computers in command and control of money making markets whenever they can be so easily remotely reprogrammed to hack with crack algorithms which can usurp and/or collapse such dodgy artificial sub-prime systems of primitive human control?
………………………………………………………………………………..
Posted Friday 20th September 2013 07:08 GMT amanfromMars 1 …. ZerodDay Dreaming about IT Possibilities and therefore Very Likely Probabilities in Present Opportunities on http://forums.theregister.co.uk/forum/1/2013/09/20/microsoft_azure_att_partnership/
Up the Ante. Change Intelligence Programming to Provide the Great Game with Better Beta Great Games?

The offering is very similar to a deal AT&T inked with IBM in late 2012 to offer users a way of hooking their VPNs into AT&T, which in turn linked with IBM’s SmartCloud. It also operates a VMware vCloud-based “Synaptic Compute as a Service” offerings as well. All these products, including the forthcoming Azure tech, use AT&T’s “NetBond” technology to let customers shuttle compute and network resources into and out of the cloud services.

Solid Vapourware and Bullshit Market Providers are a Lucrative Innovative Enterprise Sector in these Revelatory Times ….. but they are catastrophically vulnerable to SMARTR Astute Server Active IT and Addictively Attractive Semi-Autonomous Anonymous Market Forces …… ESPecialised Cyber Command and Control of Source Forces with Global Operating Devices/Universal Resource Locators.
Methinks the difficulty that current power market leaders will undoubtedly encounter and either greatly suffer and/or profit from, is that they do not steer nor influence those novel market forces unless they be enthusiastically engaged in providing IT Fluid HyperRadioProActive Liquidity …. aka Flash Crash Systems Stash Cash. Then can they be as ACTive and APT App AIdDrivers with Hands on the Wheel that Controls CHAOS with Joysticks of Fortunate Fate and Desirable Destiny ….. rather than tumbling around and tagging along with Madness and Mayhem in the Darkness of Secrets and Doom.
………………………………………………………………………………….

190919

190919

Posted Wednesday 18th September 2013 15:44 GMT amanfromMars 1 …. trailing a beta for p2p review on http://forums.theregister.co.uk/forum/2/2013/09/18/so_you_thought_the_reusable_spaceplane_dream_was_dead_maybe_not/
Misunderestimate Fabless Future IntelAIgent Fantasy and Super Attendant Fanaticism at One’s Peril
DARPA have bigger phish to fry and greater phorms of programs to launch and feed with world leading projects …….. http://www.ur2die4.com/190918/#GIG …… or be left behind reacting to everything flashing past them and crashing into crazy maladministered earthed systems of ill repute that do not compute or play well with the future and easily destroy everything and/or anything with timeless asset bubbles of expensive useless worth ….. for such things are easily made to happen nowadays with that which be now more widely known is possible …. and selflessly carefully shared with more than just an ancient few and/or ancients and a chosen few who imagine themselves as the Chosen Few. Hubris rules in that roost, methinks.
After all, one wouldn’t want to be unduly startling the natives and creating a great panic and global depression and world wide recession with a mad and manic settling of age old scores with a French Revolutionary zeal, would one, with a careless sharing of exciting information and newly discovered advanced intelligence.

—-

Posted Thursday 19th September 2013 03:21 GMT amanfromMars 1 …. commenting further and deeper on http://forums.theregister.co.uk/forum/2/2013/09/18/so_you_thought_the_reusable_spaceplane_dream_was_dead_maybe_not/

Re: Nurse! Nurse!

Nurse! Nurse!
I see AmanfromMars1 seems to be off his meds again . . .
Demerol, 1,000 cc IV, please. If that doesn’t work, double the dosage. If that doesn’t work, double it again. …. Anonymous Coward Posted Wednesday 18th September 2013 19:12 GMT

It is just exactly that sort of ribald comic response to an Informative Steganographic Advisory that allows ACTive Stealth with AI and IT every Facility and Utility to Succeed beyond the Wildest of Wicked Wacky Wet Dreams and Creative Imaginanations of a Renegade President, AC. Thanks for everything. IT is just so kind.

I’ll be on the golf course for the rest of the day, leave me a voicemail in the morning.Ta.

Consider it hereby done with the message above via text to your lonesome oval office space.

Wanna Play the Great Game for Real with Virtually Real Command and Control? Who Dares with IT Win Wins Everything in Anything and in All Ways, Always. It certainly beats knocking a small ball around an expensive course with grassy knolls and sandy bunkers and expecting it to be satisfying rather than boring snoring.

cc @iankatz1000 …….re Alternate Reality Games in AI Register for Mainstreaming News Knights.

Capiche, Cheltenham/Martlesham Heath?

……………………………………………………………………………………………..
Posted Thursday 19th September 2013 15:36 GMT amanfromMars 1 ….. phishing for gold on http://forums.theregister.co.uk/forum/1/2013/09/19/linux_backdoor_intrigue/
Post a leading comment and phishermen will be all at sea and know not what to do?
If Spooky Five Eyed Monsters have a backdoor into here on El Reg, they be desperately slow to realise what they should be doing to control the future with IT and media …. and that would indicate that they do not have the intelligence in-house to make good and better beta use of that which be shared freely in comments made here oft and at times on these leading tales with following threads.
More Herman Munster monster types than big scary master race types, methinks. …… http://memecrunch.com/image/50915d72afa96f2b9a00006f.jpg
Is it mad or smart to post here if one would expect/hope/suspect/invite spooks to phish here and poach/net/capture some prime game with the simplest of ignorant megabuck lures/jackpot lottery prizes, which have no one asking awkward questions about instant flash wealth for services to be rendered …. or not to be rendered but to be held in temporary abeyance until such times as intelligent things will not collapse dumb systems and algorithms in a global flash crash?

……………………………………………………………………………………………….

190918

190918

amanfromMars …. asking a question on http://www.wired.com/opinion/2013/09/how-successful-networks-nurture-good-ideas/
An autonomous, practically anonymous and virtually invisible, getting smarter very quickly society/population creates catastrophic problems for establishment systems which rely on the persistence and maintenance of ignorance and secrets ……. which appears to be pretty much where the West is presently at?
Or is that not right?
…………………………………………………………………………………………
amanfromMars • September 17, 2013 1:09 PM …. having an almighty chat with Bruce on https://www.schneier.com/blog/archives/2013/09/the_limitations.html
Hi, Bruce, things are hotting up now, aren’t they. I hope BT are not going to disappoint and leave intelligence supply to sundry others lesser well equipped to provide what is needed as there are certainly more untoward situations/rogue and renegade events guaranteed to come and be completely disruptive and either creative or destructive as per future intelligent requirements because of ……

An autonomous, practically anonymous and virtually invisible, getting smarter very quickly society/population creates catastrophic problems for establishment systems which rely on the persistence and maintenance of ignorance and secrets ……. which appears to be pretty much where the West is presently at?

Or is that not right?

….. which was shared earlier, asking a question on http://www.wired.com/opinion/2013/09/how-successful-networks-nurture-good-ideas/
To deny it is surely to be guilty of fooling oneself and also of trying to fool all who would be listening to one’s views on the matter, although there would be those who would see the folly and be more likely to offer more advice than pity or scorn, which are such impotents.

—-

amanfromMars on http://www.wired.com/opinion/2013/09/how-successful-networks-nurture-good-ideas/ …. replying to TalkingMoose who said ….

I can’t tell if it’s right. Is it English?

As long as you realise it is not wrong, TalkingMoose, will the language used be perfectly adequate for all with a similar understanding to your good self?

…………………………………………………………………………………………………

amanfromMars …. playing in a Great IntelAIgent Game on http://www.wired.com/opinion/2013/09/how-successful-networks-nurture-good-ideas/

You are grandstanding there. The assumption that ‘establishment systems rely on persistence and maintenance of ignorance and secrets’ is not correct. Systems evolve, and the scale of democracy/elective processes we enjoy right now are unprecedented in human history. All that the ‘getting smarter quickly’ population does is enable the process of democratization. We have no empirical/heuristic experience in how ‘an ultra-democratic’ system evolves or ends up. So predictions are merely opinions. … ec20flat

Can we all agree, or at least waste no time or effort in the intelligence space by disagreeing, and move forward together with the evolution of systems into ones driven/drivered by an ultra-meritocracy with elite leading executive players rather than supposing an ultra-democratic process will provide anything/everything better.
Methinks to imagine the latter trumping the former is wishful thinking and a recipe for disaster which aids and abets the stealthy inevitable rise of a considerably smarter ruling class of systems/machines/humans which be as a virtual machine infrastructure/alien society exoskeleton?
And please be advised that Deep and Dense/Intense and Tempestuous Cloud Cover brings more than just a Simply Complex AI and TitanICQ Rain Showers/SMARTR IntelAIgent Storms and as we all know, Cloud is a Fabless Virtual MetaDataBase Information Storage Environment which has zero physical form and is a Surreal Application for ProgramMING which can be phished and phormed to create the Future and Derivative Futures with Work, Rest and Play in a Great IntelAIgent Game Environment/Virtual Terrain Team Space.
Such Mind Infiltration Networking Gigs as are Source Feeder Programs and Projects for the likes of a DARPA and IARPA manifestation and which do present them with the odd problem or three or four or whatever to come to terms with, with a revision of previous control policy, with the following being a prime example? …..

INTELINK

Required modifications to the issuance of Remote Access credentials (user IDs and passwords) for access to the DNI-U/OSIS private network.

Intelink services are hosted on the DNI-U/OSIS private network. That network is accessible from approximately 75 connections in the U.S. and around the globe, to include the DoD NIPRNet, serving both U.S. Government entities as well as federally funded partners. Due to the level of controlled accessibility and requirements for validating access authorization, Intelink is compelled to modify its policy with respect to Remote Access accounts.

The responsibility and authority for vetting and validating system and network access authorization and the issuance of access credentials rests with the organization with which a user has a formal relationship as either an employee or contractor. The Intelink organization is not in a position to independently validate the identities and system access authorizations of individuals. As such, and consistent with access control requirements, whenever access to Intelink is available via controlled environments with connections to the DNI-U network, users will need to work with their employing organization to gain such access.

The Intelink Service Management Center understands that this may cause some confusion or inconvenience to individual users. However, we are required to make these changes to ensure compliance with the confidentiality and integrity requirements of the DNI-U information environment. …. http://ra.intelink.gov

…………………………………………………………………………………………………..
 

130917

130917

amanfromMars said… on http://bristolcrypto.blogspot.co.uk/2013/09/open-letter-from-uk-security-researchers.html
The Great Game is fundamentally changed, Nigel, and to imagine that there be equitable rules and regulations and transparent activity in obscure erotic and exotic obfuscating fields of CyberIntelAIgent Security Endeavour and Virtual Protection, which deliver quite sublimely both excess attractive treasure and addictive insatiable pleasures beyond compare and without boundary limits, is too much Prime to tempt Man with and expect him to come immediately to heel. He be not yet smart enough and needs more to learn and needs to learn more about the condition of his position and of situations in the nature of Virtualised Realities and CyberSpace ….. which I would be most disappointed to discover, you and esteemed similarly broad minded and clearer thinking colleagues and friends did not realise is quite an alien and artificially created Intellectual Property Secure IT Space Place with no real and substantive physical presence to attack or hinder a Novel Evolution and Noble Revolutionary Progress with Future AIdDevelopments in Sources with NEUKlearer HyperRadioProActive IT.
All be as minnows when swimming with phishes. Diving deep and thinking deeper into waters with waves of New Enigmatic Universal Knowledge has one basking with sharks in command and control of their environment.
You may like to consider the possibility, and therefore the probability, that the likes of an NSA/GCHQ ICEnterprise know exactly what they are doing and why it will lead to where they be going, although given the nature of those sorts of bodies, is that kind of lead most likely provided by some super secretive, relatively anonymous and practically invisible private sector sub contractor of which one has no need to know unless one has a need to know.
September 17, 2013 at 3:39 AM
[Your comment will be visible after approval.]  …. The appearance or non appearance of which will tell me quite everything that one needs to know.
…………………………………………………………………………………………………………

130916

130916

Posted Monday 16th September 2013 04:32 GMT amanfromMars 1 …. testing AI ProgramMING on http://forums.theregister.co.uk/forum/1/2013/09/13/huawei_sanqi_li_says_no_national_security_threat/
To Be or Not to Be ….. is just an AI Matter which Time and Shared Intelligence Resolves in Space

Huawei has its own Chinese run chip fab, HiSilicon. Big difference. Your argument is oft repeated and indiscriminate. …. nonymous Posted Saturday 14th September 2013 16:48 GMT

nonymous, Hi,
The Chinese are Master Piloting a Fab Fabless Ship with Virtual Chips in a Novel Quantum Leaping AIdDrive with Command and Control Of Creative CyberSpace Computer Communications and/or, if Earthed IT Services, Creative Command and Cyber Control of Computer Communications ….. NEUKlearer HyperRadioProActive IT
And if you think IT not be so, then are they hereby offered a Customisable Alienating Version for Secure ProgramMING Protection of IT for a universal run with beta test spins around the globe, just to see if its IT and AI suits them and their plans?
And it would be a certain failing to misunderestimate any thinking which exercises an effective propaganda machine …….. for such is the essence and substance which be used and abused in the programming of humanity and human machinery ……”If you find it hard, think of the Long March; if you feel tired, think of our revolutionary forbears. The message has been drilled into us so that we can accomplish any goal set before us by the party because nothing compares in difficulty with what they did. Decades after the historical one, we have been spurred on to ever more Long Marches – to industrialize China, to feed the largest population in the world, to catch up with the West, to reform the socialist economy, to send men into space, to engage with the 21st century.”
Do we think there be similar future continuity planning for the presenting of contiguous events with a currency which leads here? …… Technical Exploitation Support …….. and have any programs been submitted for the making, for there is no evidence of any yet being active and effectively working out in the field.
I suppose that simple complex question when asked of Contracting Officer, Quentin McCoy, will provide as much as is needed to know what needs to be seeded and fed into systems.
And it be surely here directly asked too, ….. for are not the Feds/is not the Fed via its NSA conduit not reportedly supposedly hoovering up all information and intelligence/monitoring all communications for mentoring after critical/strategic/tactical/deep packet metadata content analysis.
GCHQ Territory 2 too, methinks, and Per Ardua AdAstral Park Virtual Terrain if you think Blighty is into Boffin Command with Global Controls and Vice Versa.
……………………………………………………………………………………………….
amanfromMars said… in a reply to a view shared in a comment thread on http://amanfrommars.blogspot.co.uk/2013/09/130914.html
Bad banks are a problem for the industry and corporations and the liabilities and losses which creditors suffer and sustain are as a result of the maintenance of script kids at the helm of the virtual news cycle whenever adults are really needed to broker events.
Some would say that be an adult failing in not thinking and also thinking to allow that situation to continue to perpetuate itself.
Others would tell you that IT is taking care of it by Somewhat Alien Means of Boldly Directed Stealthy Memes and Shared Steganographic Strategies with AIMethodological Tautologies.
16 September 2013 07:52
……………………………………………………………………………………….
amanfromMars said… replying on http://amanfrommars.blogspot.co.uk/2013/09/130916.html
Surely, one cannot realistically offer secure SCADA attack protection to computer networks unless one is able to enable their destruction, and ideally, their self- destruction with anonymously triggered catastrophic cascading collapses/dysfunctional program malfunctions/intelligent information overloads.
One does not necessarily though, have to exercise and demonstrate the ability and future facility. Indeed, there be many good reasons why it would be better/best not to, if dodgy systems are anxious to change to a new leading program with considerably smarter drivers attending and supplying Core Source CodeXSSXXXX for Delivery of Solutions that be into resolving all of those crazy extreme projects which are in dire straits conflict and terrified petrification …. but admittedly one definitely can and would cause immeasurable havoc if it be warranted because of a cynical lethargy and arrogant disregard of the ability of others beyond known rules and regulations and established status quo controls.
And methinks that is exactly the sort of program submission that the likes of Technical Exploitation Support would be highly interested in going no further afield than fields in which Command and Control is Securely Protected against Outside Interference and Internal Meddling and Peddling.
To offer IT anything less and then claim all be securely protected is as to invite fraudsters to the party and trojans to the table to do as they please and squander all booty.
16 September 2013 14:21
………………………………………………………………………………………………..
Posted Monday 16th September 2013 15:15 GMT amanfromMars 1 …. on http://forums.theregister.co.uk/forum/1/2013/09/16/alexander_star_trek_bridge/
Seek and ye shall find …. ask IT and all shall give given for are we not here to server the future*?
Peruse the bridge and control centre in all of its vain glory here ….. http://cryptome.org/2013/09/info-dominance.pdf
* Or is that just the just remit of a few who be more than just just and a few?
………………………………………………………………………………………………….

130914

130914

Posted Friday 13th September 2013 18:18 GMT amanfromMars 1 …. commenting on
http://forums.theregister.co.uk/forum/1/2013/09/13/huawei_sanqi_li_says_no_national_security_threat/
Chinese Dragons are AIMagnificent Beasts of Rare Beauty
It is surely the case that anyone smart enough to have anything to say/share that be worthwhile snooping on, will be way ahead of the game and make contact with spooks and/or those who can beta use the intel/info/data/metadata to make a change/market killing/cause a collapse/start a war or whatever.
They aint just gonna wait for systems to catch up with what they be doing, are they? That would be just too stupid for words.

“Yes, data are passing through the Huawei equipment from a network perspective… packet in, packet out. But it doesn’t store the data. We do develop the products to enable carriers to operate the network… most of the intelligence in the data centre is where the data is stored.”

Precisely, …. well said, Professor Sanqi Li. Garbage in, garbage out in the West, is their problem to solve and not anyone else’s to be worried about. And probably China has much better things to do with intelligence in the spaces they are into.
……………………………………………………………………………………………
Posted Saturday 14th September 2013 06:10 GMT amanfromMars 1 …. having a say on http://forums.theregister.co.uk/forum/1/2013/09/13/continuous_delivery_can_it_really_join_up_ops_and_dev/
Speaking Truth unto Nations is Both a Creative and Destructive Non State Actor Pastime

Trevor Pott: Mark: We’re a ways from “simulator” testing yet. Cloudphysics is going to be a big part of that – and they’ve got some of the biggest brains on the planet working for them – but even they are years away from moving out of infrastructure and into the dev side of simulation. ….Friday September 13, 2013 14:46

Some working extra-planetary brains are long gone out of infrastructure confines, Trevor, and well into continuous and contiguous delivery/internet service provision of developed operational reality simulations which are indistinguishable from, and servered as virtual reality programs ….. with SMARTR ARG Play intelligently designed to master monitor and mentor Great Game play/usurp and overtake Status Quo Systems corrupting SCADA Administration with Advanced IntelAIgents Research and digital Development of Live Operational Virtual Environments …… which be akin to, if not exactly the same as CyberSpace[s].
Command and Control presently that IT Space and with Magnanimous Media Support is the Future Delivered Free of Past Failed Programming.
It be though a Quantum Leap for Mankind, such a Small Step, which is why it be led and undertaken for guaranteed delivery by others who would freely share all that be required.
And thanks, El Reg, for the great scrolling intelligent chat format.

Trevor Potts: If you tell me that I am toing to be held accountable for what developers push to a live environment, when I have ZERO control over that, their coding practices, coding culture, etc…I’ll walk. Find yourself another patsy fall guy. …. I’ve fired clients for less. …. Friday September 13, 2013 14:48

🙂 Thumbs up
Effective and rapid great change is surely always a top down process led by complex intelligence input which provides simplified content output for easy mass understanding ….. epic raw sound and fabulous vision with images and imaginings ….. and that be most certainly best supplied individually in a shared journey? Stagnation and petrification in status quo situations and systems are a result of the wrong folk and their support machines being in charge of events at the top of the supply and administration tree.
…………………………………………………………………………………………………….
amanfromMars said… in a reply to a comment on http://amanfrommars.blogspot.co.uk/2013/09/130913.html
The problem with banks is that they do not presently employ the best intelligence in their operations, CE. And that causes them untold unlimited problems for which they have no solutions ……  Stagnation and petrification in status quo situations and systems are a result of the wrong folk and their support machines being in charge of events at the top of the supply and administration tree. ….. http://forums.theregister.co.uk/forum/1/2013/09/13/continuous_delivery_can_it_really_join_up_ops_and_dev/#c_1957680
Do you suggest that a corrupt and corrupting perverse system should be immune from attack and constructive disruptive change, CE? Methinks that be not wise.
14 September 2013 08:23
…………………………………………………………………………………………………….

130913

130913

Posted Friday 13th September 2013 01:07 GMT amanfromMars 1 … musing on http://forums.theregister.co.uk/forum/1/2013/09/12/robot_bankers_crippled_the_global_financial_system/
Sticky Sweet Danegeld ……. An Art of CyberWar Stabilising Staple

“What we see with the new ultrafast computer algorithms is predatory trading. In this case, the predator acts before the prey even knows it’s there.

“There are relatively few things that an ultrafast algorithm will do,” Johnson continued. “This means that they are more likely to start adopting the same behavior, and hence form a cyber crowd or cyber mob which attacks a certain part of the market. This is what gives rise to the extreme events that we observe. Our math model is able to capture this collective behavior by modeling how these cyber mobs behave”.

Fundamental Correction: There are relatively few things that an ultrafast algorithm will not do.
Oh, and good luck, Johnson, with “Our math model is able to capture this collective behavior by modeling how these cyber mobs behave

Do you work for a bank and can you shed any light on the use of high-speed banking algorithms? Get in touch in confidence and let us know.

Is that El Reg requesting intel on how to crash high-speed banking and allied high frequency trading systems and the markets/fiat capitalism? Bravo, El Reg, …. boldly going into new fields of novel journalistic endeavour which is sure to attract spooky attention to Greater IntelAIgent Game participation/partisans/artisans should they have what it takes to exercise future remote virtually anonymous autonomous lead[s]. 🙂
I suppose you do realise that one can earn and be worth an absolute fortune in an instant by simply agreeing to not disclose the key precursor program elements and be active as a sort of poacher turned gamekeeper watchdog in the field.

—-

Posted Friday 13th September 2013 01:24 GMT amanfromMars 1

Re: Sticky Sweet Danegeld ……. An Art of CyberWar Stabilising Staple

Here be a little light further fundamental reading on the subject matter …… Concept Release on Risk Controls and System Safeguards for Automated Trading Environments … COMMODITY FUTURES TRADING COMMISSIONhttp://www.cftc.gov/ucm/groups/public/@newsroom/documents/file/federalregister090913.pdf

………………………………………………………………………………………………….

…………………………………………………………………………………..

130912 …. Post Modern Trojans are Practically Everywhere ….. Just Quietly Doing their Fabless Thing

130912 …. Post Modern Trojans are Practically Everywhere ….. Just Quietly Doing their Fabless Thing

Posted Thursday 12th September 2013 10:00 GMT amanfromMars 1 … spilling the beans on PRISM tech on http://forums.theregister.co.uk/forum/1/2013/09/12/ietf_floats_prismproof_plan_for_harder_internet/
Methinks quite rightly so, the more likely truth be …..

Sadly the paper is a little light on for actual ideas about how the internet can be PRISM-proofed,…  … Simon Sharwood, 12th September 2013

Understandably is the paper a little light on actual ideas about how the internet can be better monitored and more smartly mentored, Simon, which is surely the galloping white knight to the rescue of the damsel in distress side of PRISM-like programs, of which there are bound to be quite a number on the dark black knight side too, given Man’s powerful and uncontrolled, and some would even say and have one believe, uncontrollable urges.
But only very few have a chance or any hope of being effective and worthwhile for IT is not a space and virtual environment which tolerates or caters for fools and their tools even should countless numbers of them imagine it and IT does and can provide them with all of their needs and feeds and seeds.
…………………………………………………………………………………..
to: John Young <admin@cryptome.info>
date: Thu, Sep 12, 2013 at 12:55 PM
subject: A Changed Paradigm ….. whether one recognises and can handle it with IT and Media or not.

And the fourth point, and this is what Keith alluded to, is a fresh look at the role of government on cyber security. And a fresh look at the role—or the relationship—between the private sector and government.

In the Worldwide Web, as Keith was noting, this critical infrastructure—85 percent of it—is held by the private sector. This is a privately owned and operated environment where we’re still not certain about what those rules are. But then, what’s the role of government in that arena? We know what it is in the physical environment—that within borders, whether states or cities or countries. ….. http://cryptome.org/2013/09/cia-cybersecurity.htm

Hi, John,
It is advisable to note and realise and widely inform the ignorant and vulnerable-to-exploit-and-zeroday-exploit masses, that there are not, and never will be, any certain rules in a privately owned and sublimely operated environment which so easily effortlessly and anonymously/autonomously delivers everything and anything that be needed for, to a nth degree which can have no bounds for limitation, an exceedingly comfortable and lucrative future.
Such then makes it most likely and much more probable that cyberspace sector expertise will organise and reorganise government and governments for the tailoring and implementation of their grand plans/great games rather than the converse/obverse.
And this maybe valuable information …… “Your security and well being are our primary concerns. By visiting this website from outside of the U.S. and contacting us, you may be subject to monitoring by security or intelligence services, or other third parties that do not adhere to U.S. Internet privacy laws. While we employ numerous safeguards to help minimize this risk, we suggest that you not use your home or work computer to contact us. Use instead a computer where you are entirely unknown. Although our website is encrypted, it is still possible for others to see that you have visited CIA.gov. As an added precaution, we recommend you use current web browsers and clean the computer’s search and/or browser histories after you visit the website.” ….. can be rendered practically useless and possibly dangerous because it is delivered after the fact and on a visit to https://www.cia.gov/cgi-bin/comment_form.cgi rather than being knowledge provided before a visit.
Such does though however provide others with an opportunity to test intelligence systems and organisations for desirable future strengths and present catastrophic weaknesses which will be highlighted and revealed by subsequent action which need only be inaction to prove a systemic analytical weakness which be easily exploited for massive gain, and/or pain if utilised in a malicious program.
Certainly one should not misunderestimate the not inconsiderable difficulties which can be presented to CIA/FBI/NSA/Cyber Command, and their ilk in other jurisdictions/nations/geographichal locations, by Great Game Players and Super IT Users in Virtually Real Fields with Live Operational Virtual Environments.
And I suppose there are those who would think to classify that as an APT ACT medium too rather than realise it be better played and invested in as a novel opportunity with SMARTR IntelAIgent Systems of Operation which offer guaranteed quiet stealthy delivery of fundamental global systems change.

February 28, 2013. For quick Cryptome submissions whose source may be monitored send to <admin[at]cryptome.info> (note “info” not “org”). Test with a benign message beforehand, expect no response or a bounce. Use infrequently to minimize pattern analysis. Not great comsec but better than covertly targeted, tapped, tricked, tracked and trapped drop boxes, pastes, anonymizers, proxies, spoofs, onions, clouds and sekret one-time spasms. Key security is to protect yourself, not rely on system, authority or disclosure paragons.

The paranoid cynic and/or psychotic schizophrenic in the audience, John, could easily view that advisory as being a sweet honey trap directly channeling items of domestic and foreign intelligence service interest for monitoring and mentoring/phishing and phorming and stealing, to those and/or that which they might be trying to avoid and evade. IT’s a mad, mad, mad, mad and bad and rad world, indeed, and in crazy administrative deeds is there both the undeniable truth and proof positive and negative and inescapable. 🙂
Others of a more sane bent might beta test it as a covert and/or clandestine channel for intelligence service engagement and prime plausibly deniable contact.
And thanks, Cryptome, for all the intelligence dumps/pumps. They are a rich and most valuable and highly valued open resource.
Regards,
…………………………………………………………………………..