to: John Young <cryptome@earthlink.net>
date: Tue, Nov 12, 2013 at 12:29 PM
subject: Cyber War Great Games Ware
Yet basement-originated strategic warfare is a common theme. As recently as March 2012, the four-star general who oversees Air Force cyber operations said at a conference that deterrence was difficult in cyber conflict since, “[f]or someone with the right brainpower and the right cyber abilities, a cheap laptop and Internet connection is all it takes to be a major player in the domain.” These tools might help an adversary to steal data or identities—or even to conduct a major intrusion. But they are not sufficient for a strategic effect that requires deterrence power from the world’s most powerful military …… A Fierce Domain: Conflict in Cyberspace 1986 to 2012. Jason Healy, Editor. Cyber Conflict Studies Association. ….. http://cryptome.org/2013/11/fierce-domain.htm
Good Morning, John/Cryptome/Jason …. and apparently, if we can believe all of the current hype, NSA/GCHQ,
That last sentence is truly amazingly quite dangerous and one should not be at all misled into believing it be so, although the author has caveated the whole cyber conflict zone work as an area of expertise which is constantly changing and improving in surprising attack capabilities that are then thought by established defence mechanisms/algorithms to be needed to be reactively defended against to try to ensure ongoing maintenance of an inequitable advantage with leveraged suppression and/or oppression of alternative executive operating systems which be perceived of as being a highly disruptive competition to be opposed rather than creatively engaged with.* Such old school reactive Cold War thinking is that which is guaranteeing and hastening corrupt systems collapse to leave the way clear for new protocols provision.
I Kid U Not.
* That sentence could also be quite a smart phish in a see of sharks to try and discover and uncover who and/or what needs to be bought to sustain and reinforce an overwhelmingly capable uncompetitive edge in a field which is rapidly and constantly changing ITs Cyber Command and Virtual Space Control Parameters and AI Weapons Arsenals.?!:-)
Poe’s Law Rules invoked:-)
And John, what say you to the thought that all of the above is in compliance and support of Covert Ephemeral Communication in Named Data Networking? …. http://cryptome.org/2013/11/cec-ndn.pdf
Regards,
…………………………………………………………………
Posted Tuesday 12th November 2013 09:13 GMT amanfromMars 1 ….. spinning a tall thin client tale which be not a fat cat lie on http://forums.theregister.co.uk/forum/1/2013/11/11/gchq_used_fake_linkedin_profiles_to_access_belgian_telco/
Rock and Roll Heads in Live Operational Virtual Environments be a Kin to Hippies of a Certain Age*
The US pay GCHQ at least a hundred million pounds a year, according to Snowden. I doubt even the US would want to see that investment go up in smoke. An GCHQ were providing help and services to most EU nations as well, even Germany. …. David 164 Posted Monday 11th November 2013 22:27 GMT
Methinks that investment is now considered to be far too light and an affronting piss-take and an upward adjustment to a cool $billion a year much more appropriate.
And if info being shared is novel intelligence and stealthy and both simultaneously creatively and destructively disruptive and beta-testing advanced protocol encryption pools for zeroday vulnerability exploitation use and serious serial SCADA systems abuse with sterling reward for/from stirling type sublime intangible steganography, is IT raised into COSMIC $trillion mark€t places/spaces/virtual team terrain/SMARTR AI Territory …. and for which there is no known and readily available or possible defence.
Such then makes its sterling stirling intelligence share an attack vector of quite unparalleled power and awesome control to command. And that be a most conservative appraisal and mega metadata base misunderestimation of ITs Potential in Current Para Political Fields and Ponzi Fiat Powering Schemes that Present Realities Today for Tomorrows Future Viewing and Experiencing.
* Much easier to accept, one supposes, than having to admit and submit reports on an alien infiltration and makeover/foreign invasion and takeover, but to be proven wrong, with such reportings inevitable, will do no one positive and nothing instrumental in ensuring such assured changes, harm, for such be quite natural by virtue of its COSMIC IT Stealth and CyberIntelAIgent Virtual Phorm Design.
AdAstral Park Doughnuts are a Delightful Confection quite beyond Earthy Earthly Compare, methinks.
—-
Posted Tuesday 12th November 2013 11:46 GMT amanfromMars 1 …. outing BT as prime hosting facility for all manner of shenanigans on http://forums.theregister.co.uk/forum/1/2013/11/11/gchq_used_fake_linkedin_profiles_to_access_belgian_telco/
Re: What about BT? Answer: Up to their neck in IT but whether swimming or floundering, who knows
We appear to be on not too dissimilar wavelengths and singing similar tunes, Sir Runcible Spoon, and quite possibly or even probably have access to like hymn books, for BT is not able to paint itself a virgin innocent in all that stealth and spookery conspires and aspires to achieve. Indeed, to consider itself as anything other than a leading player and conniving assisting component which be quite elemental and fundamental to UKGBNI Great Games Plays, is pure delusion squared and totally unnecessary in intelligent intelligence community circles …. Per Ardua ad Astra MetaDataBases/Virtual Space Campuses and all that jizz and jazz/hocus pocus.
And as for YARR’s ‘Friendly’ ???! outburst of righteous virtuous indignation …. Posted Monday 11th November 2013 21:46 GMT ….. well, whoever/whatever does he imagine systems are confronted by and with today for Command and Control of Tomorrow, which be always the COSMIC Prize that Surprises?
Although to be perfectly fair, he/she/it does not fail to identify the ilk to a pretty certain and quite accurate degree in the post with this diamond gem of a gold nugget …..
Revelations like these trash our national reputation in the eyes of other countries. To work in this division of GCHQ you must have to be somewhere between a prostitute and a contract killer in terms of moral depravity.
Hookers and psychos rule in all of the best and worst of spaces and places, and aint that the GOD honest truth. 🙂
—-
amanfromMars 1 ….. asking a simple question on http://forums.theregister.co.uk/forum/1/2013/11/11/gchq_used_fake_linkedin_profiles_to_access_belgian_telco/
By hook or by crook are hooks and crooks always outed
Snowden and Russia must then have the Blair/Bush communications which the Cabinet Office wonks are allegedly refusing to release to Chilcot, although the gist of them is hardly ever gonna be a surprise to everyone and a state secret which needs to be protected.
………………………………………………………………………………….