Monday 27 October 2014

141027

amanfromMars 1 Sun 26 Oct 18:04 [1410261804] saying a bit more on http://forums.theregister.co.uk/forum/1/2014/10/24/pssst_want_to_buy_a_timeshare_in_the_clouds/
Knock, Knock, Blighty Intel ...... Is there anybody able-bodied and smart in there, for out there
And that all puts the likes of a Google or Bing or Baidu or Yandex in direct competition and/or indirect opposition to Departments of Defense and Departments of Commerce because of the following …….
I begin this unusual story by presenting the actions taken by the NSA to secure private- sector communications infrastructure over the last two decades. Next I examine the rationale behind NSA’s efforts. I conclude by examining whether the efforts of the recent past can serve as a model for securing telecommunications infrastructure, or if some other policy solution will be needed.
Understanding the significance of NSA’s actions requires understanding, at least at a rudimentary level, of telecommunications technology. Putting the NSA actions in context also requires some background in the conflict between the Department of Defense (DoD) and the Department of Commerce (DoC) for control of communications security, which I briefly discuss here. I begin with a discussion on communications technology, then follow with a brief history reprising the NSA’s role in securing private- sector communications. This falls naturally into three parts: the 1960s and 1970s, in which the NSA began playing a role in securing private-sector communications; the 1980s through the mid-1990s, when NSA sought control of private-sector communications security, and then the 1990s export-control battles over cryptography. With this history in place, I show how NSA has worked to secure private-sector communications infrastructure. I then discuss the rationale for this effort. .... http://jnslp.com/wp-content/uploads/2014/09/NSA’s-Efforts-to-Secure-Private-Sector-Telecommunications-Infrastructure.pdf
What do you imagine BT and GCHQ have managed to secure in order to lead everyone with communication in their chosen fields of play? Methinks diddly squat is a deadly accurate summation, and that is the result of an obvious lack of distinct leadership and advanced intelligence right at the very top of Creative Cyber Commands and Virtual Remote Control Supply Chains.
.........................................................................

Re: Cloudy depression and stealthy opportunities
Yes, but whenever they are able to know so much and do so very little to change things for the better except for the very few, is it obvious that intelligence is missing and systems be vulnerable to smart machine exploitation and virtually remote takeover and makeover, Mage.
The future is brighter whenever legacy systems are removed and replaced with something/anything different and not exclusive executive administrative corrupted and perverted?!.
........................................................................

No comments: