Wednesday 13 December 2023

231213

amanfromMars 1 Wed 13 dec 08:13 [2312130813] ...... shares on https://forums.theregister.com/forum/1/2023/12/12/us_air_force_discord_leaker/

The Greater IntelAIgent Game View for All to See, Hear and Experience

The much bigger spooky picture nowadays to recognise and accept <s>may</s> be exceptionally problematical, both physically and virtually practically impossible to prevent not being an alien existential threat event and a permanent persistent difficulty able to enable the presentation of a vast, resultantly negatively impacting global geo-political incident, or incidents as the case is most likely to be with a continuous series of such situations being the future norm, rather than not, is ...... the public release and private sharing of sensitive compartment information and top secret intelligence not yet known and classified, and presumed/assumed the exclusive proprietary intellectual property of an insecure national security apparatus.

And these quotes from a time before, and attributed to Donald Rumsfeld, Former US Secretary of Defense, are both an APT* and appropriate reminder of what's at stake here.

"Reports that say that something hasn't happened are always interesting to me, because as we know, there are known knowns; there are things we know we know. We also know there are known unknowns; that is to say we know there are some things we do not know. But there are also unknown unknowns -- the ones we don't know we don't know." ..... "There's another way to phrase that and that is that the absence of evidence is not the evidence of absence. It is basically saying the same thing in a different way. Simply because you do not have evidence that something does exist does not mean that you have evidence that it doesn't exist."

And the cheapest way to deal with those situations/incidents/threats, which one does well to accept and realise may well be notoriously expensive to ensure are not catastrophically, irreversibly destructive to all major extant status quo global operations and their responsible and accountable operators/personified leaderships, is pay Unknown Sensitive Secret Resources such exceptional sums as be necessary to withhold/hold off for now any releasing of devastating disruptive secrets ..... thus allowing and providing time for changes to be made and put in place by status quo systems to render the public release and private sharing of sensitive compartment information and top secret intelligence not yet known and classified, a mutually beneficial, positively reinforcing creative and constructive Future ACT ..... Advanced Cyber Treat.

APT* ...... Advanced and Advancing Persistent Threat or Treat

----

amanfromMars 1 Wed 13 dec 12:30 [2312131230] .... adds on https://forums.theregister.com/forum/1/2023/12/12/us_air_force_discord_leaker/

Re: JWICS: protected secure terminals ?

Your answers, ChoHag, to questions surely well asked of consistent and constantly incrementally improving repeated security breakdowns/breakthroughs, suggest a endemic human weakness and systemic administrative failure easily enough rectified by intelligent machines.

Methinks for now that’s too much of an ask and present step and quantum leap still too far for current leaderships in all of their many disguises to make/take ........ to play human second fiddle in the orchestra pit whilst the maestro conducts the full awesome audience machine front and centre from the podium of an elevated stage position ..... and thus do they condemn themselves to stagnate and fester, both too petrified and too terrified to save themselves with anything newly uncovered/discovered and offered ‽

For example :-) ...

In Novel Noble Times and NEUKlearer HyperRadioProACTivated IT Spaces of War, Nation shall Speak Peace unto Nation and Dutifully Await for the Brain Dead to Reply ‽ .

It is cyberspace and war in it about which I speak. On October 1, 2009, a general took charge of the new U.S. Cyber Command, a military organization with the mission to use information technology and the Internet as a weapon. Similar commands exist in Russia, China, and a score of other nations. These military and intelligence organizations are preparing the cyber battlefield with things called “logic bombs” and “trapdoors,” placing virtual explosives in other countries in peacetime. Given the unique nature of cyber war, there may be incentives to go first. The most likely targets are civilian in nature. The speed at which thousands of targets can be hit, almost anywhere in the world, brings with it the prospect of highly volatile crises. The force that prevented nuclear war, deterrence, does not work well in cyber war. The entire phenomenon of cyber war is shrouded in such government secrecy that it makes the Cold War look like a time of openness and transparency. The biggest secret in the world about cyber war may be that at the very same time the U.S. prepares for offensive cyber war, it is continuing policies that make it impossible to defend the nation effectively from cyber attack. ……… Cyber War/ The Next Threat to National Security and What to Do About It …… Richard A. Clarke and Robert K. Knake

Cyber war is not some victimless, clean, new kind of war that we should embrace. Nor is it some kind of secret weapon that we need to keep hidden from the daylight and from the public. For it is the public, the civilian population of the United States and the publicly owned corporations that run our key national systems, that are likely to suffer in a cyber war.

While it may appear to give America some sort of advantage, in fact cyber war places this country at greater jeopardy than it does any other nation. Nor is this new kind of war a game or a figment of our imaginations. Far from being an alternative to conventional war, cyber war may actually increase the likelihood of the more traditional combat with explosives, bullets, and missiles. If we could put this genie back in the bottle, we should, but we can’t. Therefore, we need to embark on a complex series of tasks: to understand what cyber war is, to learn how and why it works, to analyze its risks, to prepare for it, and to think about how to control it.

Just those three paragraphs from the Introduction “ in “Cyber War/ The Next Threat to National Security and What to Do About It “…… by Richard A. Clarke and Robert K. Knake, tell you more than just enough about all of your problems and difficulties today and your future needs and their seeds to be fed tomorrow before the days after are evidenced with your being far too late to the party again and are now to suffer the consequences of your absence and ignorance of private secret party matters played out there to reverse and prevent any repetition of the past and the troubles with its so many pathetic recurrent mistakes.

.........................................

amanfromMars December 13, 2023 at 11:10 [2312131110] ...... opens up a window in a smoke filled room on https://www.craigmurray.org.uk/archives/2023/12/attacking-journalists-as-terrorists/comment-page-1/

Apparently, TW, or so it be told, God’s chosen people is their mantra leading believers to hell’s damnation and collective responsibility ruin.

And who needs hostile foreign enemies whenever such as are presumed to be close friends can be or are a major source of all one's present bankrupting problems.

“Oy vey ‽ What a tangled web we weave, when first we practice to deceive” 

...................................

 

No comments: