Thursday 11 February 2016

160211

amanfromMars 1 Thu 11 Feb 12:45 [1602111245] …… sharing open source secrets on http://forums.theregister.co.uk/forum/1/2016/02/10/sap_plugs_critical_manufacturing_vuln/
Re: Feeds for Thoughts
Bit of a tangent, but definitely food for thought. …… allthecoolshortnamesweretaken
’Tis practically a feast which is rendering all manner of bodies unfit for future great purpose, allthecoolshortnamesweretaken, and creates for them contemporaries of novel anonymous origin which have to eventually be chosen for either lead engagement or pathetic static opposition. It is a phenomenon of certain particular and peculiar concern to more than just a few, given the quite extraordinary powers required to be displayed to deal with unfolding emergent Next Generation Events.
Some of the problems in this book look at ways of leveraging GCHQ’s passive SIGINT capabilities to give us a cyber edge, but researchers should always be on the look-out for opportunities to advance the cyber agenda. …… HIMR Data Mining Research Problem Book/https://cryptome.org/2016/02/gchq-malware-boing-boing-16-0202.pdf
And whenever advancing the cyber agenda equates to running the global humanised enterprise, what provision then for Special Source whenever clearly it can be always both in-house friendly asset and prime foreign bodied target? Does it all then reduce to the lowest common denominator and the cost of securing the asset/tax free bungs to principals granting secured access to cyber flight deck commands and controls?
Is it really just as simple and as cheap as that?
GCHQ has the legal authority to intercept communications for the specific purposes of safeguarding the UK’s national security and economic well-being, and to prevent and detect serious crime.
This section briefly discusses how sophisticated state actors (including ourselves and our five-eyes partners) currently conduct themselves in cyberspace. It is important to bear in mind that other states, in particular Russia and China, are not bound by the same legal framework and ideas of necessity and proportionality that we impose on ourselves. Moreover, there are many other malicious actors in cyberspace, including criminals and hackers (sometimes motivated by ideology, sometimes just doing it for fun, and sometimes tied more or less closely to a nation state). We certainly cannot ignore these non-state actors.
And all of that old hatted intel just opens the door to what is beyond and in store for future presentation, methinks. And a right mined mind field it is too, and easily able and enabled to defend itself against all base attacks and virtual hacks.
----
amanfromMars 1 Thu 11 Feb 14:28 [1602111438] …. adding more evidence for the case in question on http://forums.theregister.co.uk/forum/1/2016/02/10/sap_plugs_critical_manufacturing_vuln/
Further Feeds for Thoughts
.........................................

No comments: