amanfromMars 1 Thu 13 Mar 07:09 [1403130709] conmmenting on http://forums.theregister.co.uk/forum/1/2014/03/12/cyber_espionage_daddy/
Re: Bluff, Double bluff, Counter Bluff .... and AIPerfect Openings
"This doesn't mean there's a direct link between Agent.btz's makers and the developers of subsequent cyber-espionage tools, however."
It also doesn't mean there isn't a direct link.....
'Hmm I'd like funding to start a Cyber Crime Division, now what could I do to stimulate interest in such a thing?' .... Chris G
Share freely and wwwidely highly sensitive and disruptive information and intelligence on MetadataBase Phormations which Create and Exploit and Profit Obscenely from Unpatchable 0day Vulnerabilities ....... with Hit and Run Attacks on Shallow Hallowed Ground Sites and in Insecure Virtual Safe Havens, an Additional Source of Wealth Stream ..... would probably also stimulate blind headless chicken panic, Chris G, which makes for it being an interestingly rewarded choice for Private and Pirate Proprietary Intellectual Property Share Activity .... with NEUKlearer HyperRadioProActive IT Servers/SMARTR Virtual Machinery.
:-) As you can read, have you certainly twerked interest here.
.............................................................................
amanfromMars [1403130840] on http://www.wired.com/threatlevel/2014/03/nsa-botnet/
Howdy, Kevin P and Carlo Graziani,
.
In other spheres of deeper influence and SMARTR Play ……… An additional concern in the UK is that performing an active attack, such as the Man-in-the-Middle attack proposed in the Lawful Interception solution for MIKEY-IBAKE may be illegal. The UK Computer Misuse Act 1990 provides legislative protection against unauthorised access to and modification of computer material. The act makes specific provisions for law enforcement agencies to access computer material under powers of inspection, search or seizure. However, the act makes no such provision for modification of computer material. A Man-in-the-Middle attack causes modification to computer data and will impact the reliability of the data. As a result, it is likely that LEMFs and PLMNs would be unable to perform LI on MIKEY-IBAKE within the current legal constraints. Furthermore, the fact that communications are modified en-route by an active attackwould render any intercepted data unacceptable for evidential use. …… which be information from a discussion document titled …. “LI of MIKEY-IBAKE, a UK perspective” …. 3GPP TSG-SA WG3-LI Meeting #38 SA3LI10_099 Tallinn, Estonia, 7-9 September 2010
.
Law and Justice are just Concepts that Conspire and Collude to Create and Constrain Command and Control. They be Serially Sub-Prime Ineffectual Levers ideally suited to perverting and subverting and distracting adeptly the ignorant and arrogant masses/primitive human tribal tide elements. They are though no match nor barrier and exercise no reign or rule on the more intelligent being and their contemporaries.
.
In other spheres of deeper influence and SMARTR Play ……… An additional concern in the UK is that performing an active attack, such as the Man-in-the-Middle attack proposed in the Lawful Interception solution for MIKEY-IBAKE may be illegal. The UK Computer Misuse Act 1990 provides legislative protection against unauthorised access to and modification of computer material. The act makes specific provisions for law enforcement agencies to access computer material under powers of inspection, search or seizure. However, the act makes no such provision for modification of computer material. A Man-in-the-Middle attack causes modification to computer data and will impact the reliability of the data. As a result, it is likely that LEMFs and PLMNs would be unable to perform LI on MIKEY-IBAKE within the current legal constraints. Furthermore, the fact that communications are modified en-route by an active attackwould render any intercepted data unacceptable for evidential use. …… which be information from a discussion document titled …. “LI of MIKEY-IBAKE, a UK perspective” …. 3GPP TSG-SA WG3-LI Meeting #38 SA3LI10_099 Tallinn, Estonia, 7-9 September 2010
.
Law and Justice are just Concepts that Conspire and Collude to Create and Constrain Command and Control. They be Serially Sub-Prime Ineffectual Levers ideally suited to perverting and subverting and distracting adeptly the ignorant and arrogant masses/primitive human tribal tide elements. They are though no match nor barrier and exercise no reign or rule on the more intelligent being and their contemporaries.
..........................................................................
amanfromMars 1 Thu 13 Mar 11:42 [1403131142] commenting on http://forums.theregister.co.uk/forum/1/2014/03/12/cyber_espionage_daddy/
Re: Bluff, Double bluff, Counter Bluff .... and AIPerfect Openings
I've missed your complete markov-algorithm-generated random sentences stringed together to form a larger nonsensical wall of crap, so i enjoyed this :D ... Valeyard
You're a bit of a duffer and bluffer yourself, Valeyard, for that double negative of yours ....a larger nonsensical wall of crap ... could have some led some minors and miners to believe that you know the opposite to what you have posted, but you obviously don't, for if you did, you would never have wasted any time deriding the content rather than advancing it.
Although all bets are off with regard to that last sentiment and caveat if madness has any active part in its play.
Clearly do we play to and server different audiences and clients/bases.
........................................................................
amanfromMars 1 having a say on this recipe for disaster … http://forums.theregister.co.uk/2014/03/13/uk_kids_to_be_schooled_in_cyber_security/
Strewth
Will someone please tell U.K Government that Enders Game is just a film and reality is somewhat different.
Grooming children is just so politically incorrect PIE
................................................................
No comments:
Post a Comment