Thursday, 11 February 2016

160211

amanfromMars 1 Thu 11 Feb 12:45 [1602111245] …… sharing open source secrets on http://forums.theregister.co.uk/forum/1/2016/02/10/sap_plugs_critical_manufacturing_vuln/
Re: Feeds for Thoughts
Bit of a tangent, but definitely food for thought. …… allthecoolshortnamesweretaken
’Tis practically a feast which is rendering all manner of bodies unfit for future great purpose, allthecoolshortnamesweretaken, and creates for them contemporaries of novel anonymous origin which have to eventually be chosen for either lead engagement or pathetic static opposition. It is a phenomenon of certain particular and peculiar concern to more than just a few, given the quite extraordinary powers required to be displayed to deal with unfolding emergent Next Generation Events.
Some of the problems in this book look at ways of leveraging GCHQ’s passive SIGINT capabilities to give us a cyber edge, but researchers should always be on the look-out for opportunities to advance the cyber agenda. …… HIMR Data Mining Research Problem Book/https://cryptome.org/2016/02/gchq-malware-boing-boing-16-0202.pdf
And whenever advancing the cyber agenda equates to running the global humanised enterprise, what provision then for Special Source whenever clearly it can be always both in-house friendly asset and prime foreign bodied target? Does it all then reduce to the lowest common denominator and the cost of securing the asset/tax free bungs to principals granting secured access to cyber flight deck commands and controls?
Is it really just as simple and as cheap as that?
GCHQ has the legal authority to intercept communications for the specific purposes of safeguarding the UK’s national security and economic well-being, and to prevent and detect serious crime.
This section briefly discusses how sophisticated state actors (including ourselves and our five-eyes partners) currently conduct themselves in cyberspace. It is important to bear in mind that other states, in particular Russia and China, are not bound by the same legal framework and ideas of necessity and proportionality that we impose on ourselves. Moreover, there are many other malicious actors in cyberspace, including criminals and hackers (sometimes motivated by ideology, sometimes just doing it for fun, and sometimes tied more or less closely to a nation state). We certainly cannot ignore these non-state actors.
And all of that old hatted intel just opens the door to what is beyond and in store for future presentation, methinks. And a right mined mind field it is too, and easily able and enabled to defend itself against all base attacks and virtual hacks.
----
amanfromMars 1 Thu 11 Feb 14:28 [1602111438] …. adding more evidence for the case in question on http://forums.theregister.co.uk/forum/1/2016/02/10/sap_plugs_critical_manufacturing_vuln/
Further Feeds for Thoughts
.........................................

4 comments:

Casey Evans said...

RE:"Hmmmm? .......... http://www.theregister.co.uk/2014/11/11/german_spooks_want_millions_to_buy_0day_vulns/"

Does this mean that you (supposedly GCHQ) is also buying?

Right after the code law saying exploits were weapons right...
Not like it's a setup.

amanfromMars said...

If one has the vulgar crashing cash to flash spend on a cracking vulnerability, of course systems will be buying its base source codes. To not do so is to put at catastrophic risk, both personal private and public national and international security. And that would not be the least of the opportunities to be exploited and/or countered.

And, if one accepts that GCHQ are at the forefront of intelligence supply .... and we can easily substitute whatever other body we might like to think is more appropriate as a leading intelligence supplier .... one would realise they be much more into the business as a seller dealer than user buyer. And it is that fundamental distinction which sorts out and separates the Grand Master from the Obedient Slave and Operating Systems.

Casey Evans said...

Well then I suppose you need to be the united states government, and I will invest my time in developing exploits.

Do we have a deal?

amanfromMars said...

All evidence certainly indicates that such is their need indeed, for the extent of their intelligence deficit is accurately reflected in burgeoning size of their national debt.

That is what they have to deal with and what they are vainly fighting to prove is not the true reality of their position and condition.