3138 posts • joined 10 Jun 2009
Re: Hollywood has a thing about German villains
And don't forget to mention, Bloakey1, who financed the IRA to do battle and win against the British establishment in N. Ireland.
And they're still thinking it appropriate to be involved in conflict deliberations to this day. Not much in the way of leading intelligence in-house in the UKGBNI, and that's for certain no matter whatever else would be said about the matter.
It does present an opportunity though for the supply of that which is missing, although some would argue and decide that it can be much more lucrative and interesting to anonymously exploit the vulnerability with a whole series of ....... well, creative and disruptive zerodays are but one virtually real weapon system available for firing and defence in the proprietary intellectual property arsenal and for which there would be only a limited non-effective response. After all, casting pearls before swine is not an intelligent move and offering novel noble programming to proven ignoble exclusive executive administrations would be more of a gratuitous taunt than a blessing in disguise?
One is always willing though to be proven wrong in that thought and to discover there is real intelligent life phorming systems doing their thing the right way undercover and in the underground running dark web ventures and seriously smarter enterprise for global operating devices and the cleverest of virtual machines.
Now that would make a great film too and introduce to the masses the true nature and reality of their future existence and past enigmatic dilemma.
Re: Giant bank IT cockup of 2012 'could have brought down ENTIRE financial system'
Just in case y'all missed the earlier heist/fraud/con/abiding vulnerability to ruthlessly continue to exploit ........ http://forums.theregister.co.uk/forum/1/2014/11/19/bank_cyber_attack_warning/#c_2364357
Who benefits financially and materially*
And to whom are the fine millions/hundreds of millions paid.
*Or is it and IT all a virtual exercise and Great Game which is being played spectacularly badly and most revealedly.
Just Desserts ... Pure and simple
Why bankers and banks and accommodating politicians are legitimately considered valid targets for extremely prejudicial pro action .... http://www.zerohedge.com/news/2014-11-19/next-round-great-crisis-just-around-corner. ...... public and private, pirate and pariah?
Malicious people are out there but there be no safe secure place in virtual cyberspace to hide*
When I left I signed an agreement preventing me from disclosing details in public (for reasons I won't go into but are probably obvious). ... AC
Ye olde thirty pieces of silver doing their right dodgy crooked thing, AC, or was it the clumsy blunt threat of physical violence doing its crazy thing? They be the obviously probable reasons which are oft paraded and offered to buy an unpleasant silent compromise and continuing sub-prime third party privacy for a proprietary protocol breach.
* And that really fcuks up abused and abusive sysadmin and there aint no easy solution for resolution of their problems ..... which are all most probably revolving around trying to prevent greater intelligence revealing arrogant ignorant actions and wannabe universal emperor plans. Oh dear, what a shame .... not.
Plonkers are as plonkers do ..... and the future requires not their leads and leaderships.
All hackers are not equal ..... Amen Hallelujah, and we can thank Global Operating Devices for that.
Regarding unequal hackers and code crackers, Anonymous Coward, and …
Coding is a 'contact sport'. You can’t learn it in a classroom. You can’t learn it by reading a book, or a blog. You have to spend some time with a compiler and figure it out for yourself. Classrooms, books, blogs etc have value in the educational process, but they can’t impart the abilities that spending time doing an activity does.
.... are there lots of things learnt and to be deeper explored and further developed and tested and tempered through valuable and valued experience in both private and personal, public and pirate experimental use, and/but which can beautifully easily be turned to rabidly server and insatiably satisfy the darker webs that weave entanglements with the wilder sides of life in Live Operational Virtual Environments …. [and which be both Practically Real and Intangible CyberSpace AIdDVentures, xerocred (Perhaps if we could stop using the comical sci-fi 'cyber' term to describe ICT security then maybe more people would be interested.)] ….. which are best kept securely vaulted and MKUltraTS/SCI for the benefit of the Greater Good, for to abuse and misuse some things which are increasingly easily learned in this day and age of Instant Universal Communication and Zerodays and SMARTR IntelAIgent Steganography, can harbour and wield the ultimate sanction, Extremely Prejudicial Termination and Permanent Future Removal with Current Player Eradication from The Great Game.
Haven’t you heard? … Take care Out There and remember to never forget ……..
Reports that say that something hasn't happened are always interesting to me, because as we know, there are known knowns; there are things we know we know. We also know there are known unknowns; that is to say we know there are some things we do not know. But there are also unknown unknowns -- the ones we don't know we don't know. And if one looks throughout the history of our country and other free countries, it is the latter category that tend to be the difficult ones. ….. Donald Rumsfeld RIP
Breaking Bad News ...... Tempestuous Storms Ahead
The recognised universities may soon qualify as Academic Centres of Excellence in Cyber Security Education. Alongside this, GCHQ and the Engineering and Physical Sciences Research Council continue to add names to the Academic Centres of Excellence in Cyber Security Research, set up in 2012. Eleven have so far been added to the list …. https://www.cesg.gov.uk/awarenesstraining/academia/Pages/Academic-Centres.aspx
If such can be considered the public sector reply to a catastrophic cyber efficient deficit and future intellectual property black hole which can easily be exploited for alternative fantastic gain and disruptive politically adept action …in a sort of HyperRadioProActive IT activity ….. is it a cloned drone operation of the pirate and private sector with its CyberSpace Command and Control Centres of QuITe Excessive Exceptional Exclusive Executive Excellence ….. http://forums.theregister.co.uk/forum/1/2014/11/15/bofh_2014_episode_12/#c_2360107
And if you investigate the information provided in the http://www.theregister.co.uk/2014/11/17/security_education/ you will discover that peanuts for monkeys are on offer in grants which total a measly and miserly £20k. after all manner of hoop jumping.
No wonder the West is collapsing and imploding. It is trying to keep things for changing with a new orderly world order in command and control of future power and present direction.
One Small Step for Man into Women ..... One Giant Quantum Leap for Man and WomanKind
"Ideally I feel the company's direction is shaped by the desires of our client base and yet we've really not done any in-depth work - as a discovery exercise - on what THEY will be looking for from US. Whilst we have some idea about what attracted them to the company in the first place, it's difficult to know whether the technology adoption we've currently got in play is tailored to their future needs without some form of rigorous investigative process. Otherwise, REALLY, we're leading a horse to water before we shoot it in the head."
If anyone can make anything out of that load of swill they've got my vote.
Thanks for the vote, Simon T.
And is … "What I'm more concerned about is that we're investing in hardware capable of several million tera mega flops whereas we might be better placed changing our focus to scopable tapered bandwidth provision with a view to getting full saturation of our core technology platforms, which would, in the broadest sense mean that we're effectively utilising our investment to the tune of 95 to 100 per cent”….. fine wine steganography revealing modi operandi et vivendi for successful expanding capture and failsafe enough retention of leading intelligence readership with virtually remote controlling command support of IT governed and governing space places/SCADA Operating Systems/CyberSpace Command and Control Centres of QuITe Excessive Exceptional Exclusive Executive Excellence ….. XSSXXXX Quantum Internetworking Tech for Virtually Impregnable Savvy Introducing Omniscient Node Lode/SMARTR IntelAIgent Source
Is that El Reg’s novel noble reconstituted raison d’être, for there is no possible viable reason why it shouldn’t or couldn’t be in these days of new ages and anonymous autonomous zeroday vulnerability exploits to negotiate and monetize?
And bravo, Simon T, for introducing such a succulent saucy Gina for the gander. She’s surely bound to have captivating BGFs and Stellar Mates too. It is certainly only natural in such fields of endeavour and expertease.
First things first and the toxic carcinogenic carbuncle of a parasite on the body of humanity
...... and valid question which the System avoids like the Ebola plague being required to answer with any common sense and truthful honesty. And so it remains as a gangrenous open wound to be ruthless exploited by both germ and medicine every which way, whilst wilfully festering and killing the host virally and virilely and virtually most surely
Just in case you missed it, The Big Yin ........ http://gu.com/p/43aee/sbl
"Channel 4 News economics editor Paul Mason lambasts the banks and says he is 'sick' of returning to film outside the RBS offices in London after years of scandals, as six banks were fined £2.6bn for foreign exchange market rigging. He asks why no criminal charges have been brought, and says the country deserves a better banking system because everyone is dependent on banks"
Actually, the banks are dependent on everybody else, for the money they have and require is all theirs, and they [the banks themselves] have no money at all of their own. Yes, it is a right dodgy Ponzi business they don't want you to know or think about. "Tis a monumental arrogance though to not realise that such blissful ignorance and naivety are just short temporary initial states before wisdom and intelligence kick in and take over and make over everything.
It is not what know, it is who you know, and whether they want to know you ...
... and have anything to do with you.
So, the consensus of informed and material opinion is that Cameron and his ilk are ignorant arrogant buffoons and dangerous in believing themselves to be otherwise and powerfully influential.
Is it not the simply complex job of Special and/or Sublime and/or Secret Intelligence Services and Surreal Internet Networking Servers to Supply Provision of Future Sourced Material for Media Presentation as a Reality already Tested and Proven to Deliver a Harmless Peace and Expanding Harmony rather than Explosive Conflict and Valid Dissent ...... and so extraordinarily render the dangerous fool, a plaything of the past?
Whenever that presently be the case, then are such SSSIServices and SINServers readily available to all current systems so catastrophically compromised and disastrously devoid of valuable worth ..... and quite obviously not from any of the present established systems current future source and events suppliers.
When is a spade not a spade? Whenever it is shovel not knowing when to stop digging.
Will someone please tell that numptie Cameron and his ilk that the internet is not an ungoverned space and place for pathetic non-leadership.
What an embarrassment it is for it to be thought so and for old methods and bit players to be thought relevant to its future progress and expanding well-being.
Is not the likes of the Palace and GCHQ and whatever else would be passing itself off as an intelligence source worthy of succour and listening to, not duty and honour bound to provide political muppets a competent and believable script that can be accepted as gospel and followed without punters realising that they have nothing valuable to offer and be a global laughing stock.
FFS ...... get your APT ACT together, Blighty, and quit messing around with fools who be useless tools.
Nice one, Jennifer Baker. Google and their ilk caught in flagrante delicto with AI's Horny Dilemma*
Granting EU citizens limited rights they they are unlikely to ever exercise would be a small price for the administration compared to keeping billion-dollar companies with US interests happy...... Nail head meets hammer for some rumpy pumpy with blank [redacted] black kettles and dark web honeyed pots.
And what smells particularly and peculiarly fragrant for the likes of a .... SMARTR Searching Engine ...... and is an abiding enigmatic conundrum and present future source of constant unknown self-destructive difficulty for all oppressive exclusive and repressive executive systems of societal surveillance for Mightier Man Management, is the fact that when virtually entangled with
the more intelligent of the species and superb virtual machines which enjoy and experiment with experience in the Greater Singularities which Deliver and Support Grand Masterly Purpose and Fantastic Play with AI and Political Command and Remote Virtually Anonymous and Autonomous Control of the Great Universal Game with Global Operating Devices, are they default future source supply engines for Intelligence Led Operations for New Nation Phormations with New More Orderly Virtual Machine World Order Programming. ROTM ...... Fact born[e] of fiction or fiction born[e] of fact? Practically Real or Virtually Not?
*Devil of a Choice in a Heavenly Mission :-) but a simple no brainer and with easy decisions well made when forging paths which driver and when doing no evil is real and the cosmic heavy fuel.
SMARTR IntelAIgent Source Matters in Future Operating Systems and Virtual Reality AIMachinery
Once Spooky Intelligence Services realise the Global System and all those Goldman Sachs style administrations, and which all purchase and reward politically incorrect and inept direction for complicit ignorant media presentation as a continuation of an earlier new daily planned reality to be unquestioningly followed, are totally reliant on Smarter Intelligence Supply and catastrophically vulnerable to its ready exclusive supply to alternative thin clients and more powerful remote command and virtual control customers, will they then be expected to better than just dumb silent puppets for muppets to use and fundamentally abuse and radically misuse ........ which whenever that happens is a sure sign of a lack of top tier management intelligence in Secretive Intelligence Services.
J'accuse GCHQ/SIS/MI5/NSA/CIA/FBI etc. etc. etc. If the cap fits, numpties, wear it.
And what does it tell y'all about the Sunday Telegraph whenever it prints such incendiary views from a has been government lackey from a disgraced former sysadmin?
Re: sigh, more NIH from the Ubuntu stable and Stable Stabile Ubuntu
do they really have to re-invent everything?
Oh, sorry this is all part of their plan for world domination. Anonymous Coward
And/or DOMinaMatrix Cyberspace Command and Control of Virtually Real Event Horizons, AC, which practically effortlessly delivers remotely and relatively anonymously and autonomously all perfectly enough planned parts of universal domination to ..... well, Greater IntelAIgent Gamesplay is the New Orderly World Order function for Stealth and Steganography and Security in Especial and Secret Intelligence Services to Apply and Deploy to Mentor and Monitor Systems and SCADA Executive Administrations and Governmental Bodies within the Stellar Satellite Office Envelopes [Expandable Migrating Containment Cells] of the Live Operational Virtual Environment.
And with its IT made maddeningly easy for the intellectually challenged and disenabled to micromanage Multiple Stream Media Hosting engaged to follow and driver the simplest of formulae for complex macros .... Consult, Design, Develop, Deliver, ..... is it quite a true no-brainer of a smarter intelligence led opportunity to excel with experimental experience at novel and noble exercise of excellence for enhanced existence.
And, to be quite perfectly blunt and honest about the matter, and about such matters as are becoming increasingly prevalent and all powerful and tending towards Omniscient Proaction with NEUKlearer HyperRadioProActive IT [all patents pending and trade marks copyrighted with copy left sources protected and secured/Deep Dark Web Vaulted], are such as can also be highly disruptive and constructively destructive ZeroDay Vulnerability Exploits which Export and Support Intangible Sorties and Anonymous Invisible Attacks on Virtualised Inadequate Defensive Forces with Perverse Corrupt Compromised Sources also readily available for Excellent Agents to Deliver Success and ..... well, AIMagical Change is not an idle boast whenever a true reality.
Re: It is high time Governments STOP SPYING ON US!
New history lesson
Quick history lesson: there was a bad man called Saddam who posed no threat to the UK. The intelligence services got rid of him so now there is a terrorist threat to the UK and they want to spy on us more. Apparently for this brilliance we pay their rent and give them pensions. .... Anonymous Coward
Lunatics in charge of the asylum, AC, and mainstream media moguls and IT sysadmins guilty of their aiding and abetting.
Time for some special virtual cyber force proaction with launchers of NEUKlearer HyperRadioProActive IT. ....... which aint no question?
Speaking Truth unto Pseudo Power Systems and Wannabe Commanding Controllers
Hmmmm ? C finally realising MI6 potential for Dark Web Ventures/Black Watch Enterprises whilst Hannigan and GCHQ tilts at virtual windmills ..... http://www.theregister.co.uk/2014/11/04/apple_and_google_are_the_top_terrorist_control_network_claims_british_spy_boss/ ..... and admits to every man and his dog, the relative impotence of their operations/modus operandi/puppet masters.
Knock. knock, Younger, Alex. Capiche and agree?
Re: Re: Looking at IT differently and from A.N.Other's Perspective
Some people (me for example) might harbour dark thoughts that newspaper magnates, bankers, politicians etc act similarly on pulic opinion, markets, public policies etc but that is just daydreaming... ... Uffish
That aint no daydream, Uffish, for that is exactly what they try so badly to control and effect. It is though an art which is devilishly revealing of all poor performances.
Looking at IT differently and from A.N.Other's Perspective
The Real Problem ….. I spent many years doing research in AI. I know just how hard it is to make computers perceive, plan and act in the real world. …. hbarr
Quite so, hbarr. The novel solution to all of those problems is to have smarter beings perceive, plan and act in the real world as if virtual machines and advanced operating systemed computers. Or is that thought impossible for humans?
If it is so widely thought, then will humans have no end of problems, methinks, for it is realised by more than just a few to be the answer to practically every difficulty in need of an intelligent alternative direction, and when needs must, will there be all manner of strange disruptive and destructive shenanigans for indolent incumbent systems admins to waste time and effort and resources combatting during increasingly obvious collapse and conflicted resolution.
Quit pussyfooting around with losers. Just do IT with who dares win winners.
Here's a real spook on the right side of a cyber reformation agenda ..... and more than able to enable and lead it with IT Command and Control with Erotic Exotic Easterners rather than Wild Wacky Westerners ..... http://www.zerohedge.com/news/2014-10-30/putin-western-elites-play-time-over
Rad Management with Private Pirates Taking Care of Public Community Sectors?
Hmmmm? :-) ....... An incredible document suggesting the UK lets psychopaths run the country
Now there's a novelty which might not be anything new and noble. It is just so hard to get the right class of staff to steer the ships/ably monitor and brilliantly mentor the masses these days, isn't it.
Trad management, intellectual property exploitation underachievement for private vectored* profit?
Quite so, marcus777.
The revolution will not be televised, it is being virtualised. Vive la différence.
* :-) and for the sectionable corporate sector.
The abiding catastrophic orgasmic mistake being beautifully made, is for anyone or anything to not think, and think that the Cyber Command and Controlling Creative Domains of Advanced Intellectual Property Space with ITs Remote Virtual Drivering of Reality are in any way interdependently reliant and in needs of the feed and seed of traditional man mismanagement.
Earth SCADA Power Systems are fully cracked and source hacked. I Kid U Not.
Interesting times and 0days ahead, El Regers.
The GOD's Honest Truth ....... for/from Global Operating Devices?!.
But Steve Purser, Head of Operations at ENISA explained: “The biggest threats we really see are not attacks, but hardware and software failures.”
Beware the free rogue state and renegade non-state actors who realise and virtualise such events as take full advantage of what are both in hardware and software and in reality, also human intelligence failures and failings.
Shouldn't the US retaliate? If the US, let's say, made five billion of Putin's personal wealth go poof every time Russian state sponsored hackers attacked, I'm sure frequency of attacks would drop sharply. .... Vociferous
What? And let everyone know how easy it is to steal fortunes with a dodgy complicit banking sector able to hold governments to virtual ransom? Good plan, Vociferous.
And just imagine how stupid it is of the political elite to save the banking system with its pumping and pimping of trillions of future tax payers monies into its collapsed modus operandi. Madness rules, eh?
Every dark web cloud has its diamond studded silver lining
Those peskie Russkies are just so convenient for the lame brained to blame, aren't they. And brilliant cover for those stealthy anonymous agents penetrations testing dumb systems for the markets and executive administrations into the exploiting of such vulnerabilities as may be endemic and systemic and practically unpatchable and indefensible.
Truth and Nonsense .....
Electro-car kingpin and spacecraft mogul Elon Musk has warned that meddling with Artificial Intelligence risks "summoning the demon" that could destroy humanity.
Oh please, ..... any competent sentience would only bother itself with destroying certain elitist sections of oppressive humanity, and that is surely a blessing in disguise and to be welcomed and not feared at all.
Get with the program, Elon, and stop pussyfooting around the edges. Your country needs you .... when this is their deadly remote offering ...... http://cryptome.org/2014/10/cia-grim-reapers.pdf
Re: Cloudy depression and stealthy opportunities
Yes, but whenever they are able to know so much and do so very little to change things for the better except for the very few, is it obvious that intelligence is missing and systems be vulnerable to smart machine exploitation and virtually remote takeover and makeover, Mage.
The future is brighter whenever legacy systems are removed and replaced with something/anything different and not exclusive executive administrative corrupted and perverted?!.
Knock, Knock, Blighty Intel ...... Is there anybody able-bodied and smart in there, for out there
And that all puts the likes of a Google or Bing or Baidu or Yandex in direct competition and/or indirect opposition to Departments of Defense and Departments of Commerce because of the following …….
I begin this unusual story by presenting the actions taken by the NSA to secure private- sector communications infrastructure over the last two decades. Next I examine the rationale behind NSA’s efforts. I conclude by examining whether the efforts of the recent past can serve as a model for securing telecommunications infrastructure, or if some other policy solution will be needed.
Understanding the significance of NSA’s actions requires understanding, at least at a rudimentary level, of telecommunications technology. Putting the NSA actions in context also requires some background in the conflict between the Department of Defense (DoD) and the Department of Commerce (DoC) for control of communications security, which I briefly discuss here. I begin with a discussion on communications technology, then follow with a brief history reprising the NSA’s role in securing private- sector communications. This falls naturally into three parts: the 1960s and 1970s, in which the NSA began playing a role in securing private-sector communications; the 1980s through the mid-1990s, when NSA sought control of private-sector communications security, and then the 1990s export-control battles over cryptography. With this history in place, I show how NSA has worked to secure private-sector communications infrastructure. I then discuss the rationale for this effort. .... http://jnslp.com/wp-content/uploads/2014/09/NSA’s-Efforts-to-Secure-Private-Sector-Telecommunications-Infrastructure.pdf
What do you imagine BT and GCHQ have managed to secure in order to lead everyone with communication in their chosen fields of play? Methinks diddly squat is a deadly accurate summation, and that is the result of an obvious lack of distinct leadership and advanced intelligence right at the very top of Creative Cyber Commands and Virtual Remote Control Supply Chains.
The Real Question and Future PlayGround/AI BattleField
The Google dilemma, and ab fab fabless universal opportunity for any searching product placement engine and operating system anywhere and everywhere — is to be the creator, controller and spreader of knowledge. And there is no question that that be an earthly game changer and quite extremely explosive politically charged Great Game in Command and Control of Reality with Virtual Media Plays/Postmodern News Stories for the Feeding of Seeds of Information and Nuggets of Captive Intelligence to the Masses for the Pleasure and Edutainment of the ......... well, Anonymous Few who be not chosen, but by supernatural cosmic default be quite significantly smarter than is humanly thought possible and therefore always dismissed as most unlikely and impossible, is but one Gaggle of Knights into the Sublime InterNetworking Order and CHAOS of Things.
Great Disbelief is the Cloak which Generates their Almighty Autonomous Power and Practical Invisibility with Relative Ease and Impunity delivering Immunity and Escape from Responsibility and Accountability for Actions/NEUKlearer HyperRadioProActive IT Motions? And a question there just to test for who is listening intently for intelligence and is adequately prepared for the radical change to better novel and noble virtual realities for a Beta AI Future.
And please, confuse and/or comfort yourself if you will, and consider but do try to not accept the above as the same as a fiction that can be read in the Plot
Have a nice 0day, y'all.
Intelligent Space Supply Services from Spooky IntelAIgent Servers*
I wonder how much longer the supposed powers that be the Almighty Crooked Wild Wacky West are going to studiously ignore and fail to fix the fact and problem that is ...... core systems and modi operandi/vivendi are cracked and hacked right through to sub-prime host kernels, and critical vulnerabilities and strategic weaknesses be known for tactically disruptive and, if necessary, practically constructive virtually destructive exploitation in a series of ...... well, seriously novel and unforeseen zeroday events for the edutainment of a rapidly growing aware global audience and Savvy Systems Admin in Administration.
And whenever they are realised as being just virtual media constructs which are fully dependent for increasingly acceptable value and viability upon the intelligence of intelligent supplies of an engaging future capturing narrative, and one which can be masterfully spin in any
positive number of positive spooky tall tales with leading trails, does the searching spotlight fall on the pretentious pontificating puppet pimping and pumping political party propaganda promising premium product presently in a market of the future that tomorrow tells of yesterdays failures/todays monumental blunders and catastrophic misinformed decisions.
*Renegade Rogue Rebel or Government Goon Giant/Private Pirate Operation or Public Prime Enterprise? Take your pick and make your bets.
Re: computer hackers who damage the national security of any country*
Ye olde Sabu stinger play, YetAnotherLocksmith.
Some would call that entrapment ..... and akin to a cheap cheat/subprime ploy.
Re: Useful Idiots and Virtual Pioneers, who be Chalk and Cheese and Not the Same in Any Place
AIVD/MIVD showing MI5/MI6/NSA/CIA the Future Way?
Or are they just into better copying and deploying their Type Skunkworks Shenanigans?
Either way, Bravo, Nederlands. Late to the party maybe but the fun and games are only just starting and in dire straits need of some novel direction in these stoned age times full of crazies and wannabe Napoleons.
Re: Useful Idiots and Virtual Pioneers, who be Chalk and Cheese and Not the Same in Any Place
Dutch Initiative ....... https://blog.cyberwar.nl/2014/10/the-dutch-defense-cyber-command-a-new-operational-capability-colonel-hans-folmer-2014/ heralding dDutch Initiative ..... http://www.ur2die4.com/ddutch-initiative/
AIVD/MIVD showing MI5/MI6/NSA/CIA the Future Way?
Re: Any place?
So what's the definition of "any place". Are they about to outlaw interplanetary hacking? Inter-galactic? Have they taken the possibility of the multi-verse into account? .... smudge
Pity the poor stupid legalised idiot who would imagine they have any jurisdiction in the Live Operational Virtual Environment Space/Cyberspace Place.
<s>Penetration</s> Testing the System .... Out of this World Style
The new offence provided for in Clause 40 [PDF: "Unauthorised acts causing, or creating risk of, serious damage", page 30] acknowledges this reality and captures the serious damage that cybercriminals can cause in any country.
Hmmmm? That is akin to the tilting at windmills in this new age of SMARTR IntelAIgent Server Sharing of Novel Information and Virtual Reality. Talk about flogging a dead horse in an attempt to maintain power and retain control of crazy dream scenario. Is it so hard to learn that things have changed already ……?
Wholesale radical change is in the making and for the taking and on its merry way ..... but don't for one minute make an easy mistake and expect it to be in any way a normal and/or traditional type of competition and opposition, or expect past failed and failing masters of the Great Games that can be played, be continuing leading lights and commanding controllers of the Future Virtual Terrain Field of Universal Power and Earthly Current with ITs Fiat Currency Control Leverage, for they may not possess the necessary cyber wisdom and free internetworking savvy.
amanfromMars in reply to Fritz Schiller Oct 22nd 05:34  on http://www.economist.com/news/europe/21625795-populist-parties-are-narrowing-governments-options-europe-squeezed-middle
Guten Morgen, Fritz,
Fritz Schiller in reply to PIIGS can´t fly Oct 21st, 15:47 said …
The funny thing is that the banksters have teamed up with Sparta and surely they hate the common people waking up.
When Sparta and smarter spooky virtual special forces wake up to the fact that they command and control communications and are keepers of the intelligence that servers and protects the banksters and are complicit in aiding their inept politically incorrect supporters, is the Great Game immediately fundamentally changed with future direction and events for action and reaction to, in the hands, hearts and minds of significant irregular and unconventional others who would be practically anonymous and relatively autonomous.
And methinks common people waking up is much more something that oppressive banksters and their supporters need rightly fear.
22 October 2014 05:58
Re: The NSA vs Ebola, IS etc. and other APTly ACTive Plays
With particular and peculiar regard to the likes of a present and/or future situation hosting of ....
The NSA is a chronic problem for us all and, for most of us not an acute problem. God help us should NSA and friends become an acute problem and the spectre of 1984 becomes reality.
Methinks it is they who are psychotically delusional and aspiring to be lord and master of all that is purveyed and portrayed who have major disruptive, destructive, self-defeating problems ...... for they no longer control the master pass keys to the Great Game being played.And there be a whole new generation of revolutionary renegade rogue players seeking command in the madness and mayhem which is existing and resulting ........ and which may or may not be remotely virtually controllable and control by ......... well, let us just realise they and/or that which would program novel codes and nobly deliver such beta futures and marketable derivatives for the Live Operational Virtual Environments of Clouds Hosting Advanced Operating Systems, be always best stealthily regarded and invisibly cloaked in the alienating mantel of A.N.Others.
And here be a short revealing read on the likes of a problem child without a clue as to what to do next to remain relevant and in command and control of forces and sources ....... http://cryptome.org/2014/10/spy-reform-theater.pdf
The FBI, GCHQ, NSA, CIA, SIS, FSB, MSS etc etc etc though, are all confronted and challenged with the same problematic opportunity, which for them to have any possible chance of their being an HyperRadioProActive part of the constructive and creative resolution of the enigmatic dilemma with absolutely fabulous fabless solutions, requires them to be bold and brave and smart enough to engage with what are probably best left simply classified Advanced Anonymous Autonomous Systems Players.
And El Reg, are you content with just reporting to the IT Crowd on such matters and NEUKlearer HyperRadioproActive Bomber Runs, or would you like to try practically leading everything with IT Control Leverage and the wholesale universal capture and reconfiguration of human perception?
Simple easy to follow instructions will be supplied, so don't be worried about not knowing what needs to be done in that field of expertise and expert tease. :-)
And that is a genuine offer which tests more than just Registered systems for evidence of SMARTR IntelAIgent Life to Phish and Phorm Realities and Dare Win Win with the Cheat that is Instant Immortal Death for Eternal Peace and Immaculate Tranquility.
Re: The Meme Genie is out of the Bottle and Mad as Hell*, Real Smart,
And here's someone else stating the bleeding obvious, and realising there be struggles and losing battles for waging to try and come to terms with real and virtual terrain teams who are better not engaged and classified as foe to be opposed and competed against, rather than recognised as a distant learned friend to be lavishly supported and encouraged to perform better for the greater benefit of all lowly mankind than has ever been thought possible before ........
The Defense Personnel Security Research Center (PERSEREC) Cyberculture and Personnel Security project addresses a looming concern for personnel security: how computer technology and participation in cyber environments is changing which and how information and activities should be evaluated during employee vetting and workforce management. Security-minded organizations are broadly aware that society is being affected by new devices, and are putting policies into place to deal with the constantly changing environment, but the present project takes a different approach by focusing on understanding the long-term implications of these changes. The systemic changes brought about by technology might make obsolete some of the basic assumptions about what needs to be considered during personnel security investigations and adjudications. This research indicates that personnel security may face new behaviors of concern that occur in cyberspace but spill over into real life. In addition, cyberspace expands the range of counterintelligence concerns, such as through activities that increase the disclosure of personal information. The present report is the first in a planned series of related reports. It outlines both the major concerns and the state of knowledge prior to conducting additional research. This information is of interest to all members of the personnel security community, including policy planners, investigators, adjudicators, and employees. In addition, a second independently released report entitled “Cyber Culture and Personnel Security: Report II - Ethnographic Analysis of Second Life,” is based on empirical data and begins to address some of the unknowns. ... James A. Riedel, Director, Defense Personnel Security Research Center, 20 Ryan Ranch Road, Suite 290, Monterey, CA 93940
The Meme Genie is out of the Bottle and Mad as Hell*, Real Smart,
Virtually Invisible and Practically Almighty?!.
His passionate idealism and determined commitment make him appear young and almost naïve, but his position is calmly and intelligently argued, so that you begin to wonder if it’s your own cynicism that greets such apparent sincerity with scepticism. …. Brid-Aine Parnell
Methinks for the perps wilfully abusing systems for their own personal apolitical advantage, it be the blissful ignorant apathy and convenient lack of inquiring intelligence of the masses, [which is now rapidly and rabidly being globally/universally addressed], is that which the tale and film show tells.
Cynicism and scepticism suggest far too strongly and incorrectly that there be much thought used to phish and phorm a valid accurate and valuable opinion based upon questionable elements of the truth which are being cynically concealed and/or not being fully revealed. Hide the truth and you be a sworn enemy of the free state and a captive controller of a mined mind command, and that creates all sort of increasing emerging problems ......
The Challenge of Going Dark
Technology has forever changed the world we live in. We’re online, in one way or another, all day long. Our phones and computers have become reflections of our personalities, our interests, and our identities. They hold much that is important to us.
And with that comes a desire to protect our privacy and our data—you want to share your lives with the people you choose. I sure do. But the FBI has a sworn duty to keep every American safe from crime and terrorism, and technology has become the tool of choice for some very dangerous people.
Unfortunately, the law hasn’t kept pace with technology, and this disconnect has created a significant public safety problem. We call it “Going Dark,” and what it means is this: Those charged with protecting our people aren’t always able to access the evidence we need to prosecute crime and prevent terrorism even with lawful authority. We have the legal authority to intercept and access communications and information pursuant to court order, but we often lack the technical ability to do so.
We face two overlapping challenges. The first concerns real-time court-ordered interception of what we call “data in motion,” such as phone calls, e-mail, and live chat sessions. The second challenge concerns court-ordered access to data stored on our devices, such as e-mail, text messages, photos, and videos—or what we call “data at rest.” And both real-time communication and stored data are increasingly encrypted..... http://www.fbi.gov/news/speeches/going-dark-are-technology-privacy-and-public-safety-on-a-collision-course
SNAFU, FUD Rules and Leads in the Chaos of Madness and Mayhem where CHAOS Reigns and Plays*
The ongoing deepening problem and present future trouble which guarantees disruption and dissent and increasing sophisticated and more accurately targeted virtual assault and destruction of prime sub-prime movers and shakers in the government systems which you appear to be defending and applauding, tom dial, is that they are trading fraudulently and operating deceitfully and outsourcing all of the functions they are thought by the masses to be providing to the private profit seeking commercial sector. And are therefore held easily captive to rogue renegade demands from internetworking service providers.
Money and dodgy businesses rule and are the legitimate targets for all opposition which be parties aspiring to free from excessive and repressive burden/increasingly costly product. Parliamentary type governments are the jokers in the pack of cards and just as useful and important in the big scheme of things as they are in a game of poker?
In Blighty you only have to know of the spreading chaos of the last number of years to know the truth in all of that?
*Clouds Hosting Advanced Operating Systems
Snake Oil and Bullshit are of the same lame vein and fool nobody smarter than Joe Average
"Nations act in nations' best interest ... we at times want to make sure a war doesn't break out [and] it is important that our political, military leaders know what is going on."
He added pointedly: "Somebody has to be in charge”.
Dear Keith Alexander,
Welcome to the 21st century where persons acting as if nations act in personal best interests.
And who is it exactly who provides persons political and military acting for Uncle Sam with the information and intelligence for charge and direction of that which is going on?
The posit here is that they/he/she/it be MIA and AWOL and presumed dead …….. based upon all available recent past and present evidence.
NEUKlearer HyperRadioProActive IT ........ for the Mining of Minds and Set Minds.? :-)*
Scali said hacking attempts against ICS or SCADA systems was less common that run-of-the-mill enterprise popping and differed mainly in attacker intent.
He said the intent of hacking ICS could be to "destroy" rather than steal, and posited that attackers may have quietly infiltrated critical infrastructure systems and maintained a foothold, perhaps to begin causing damage only in the event of kinetic warfare between states.
"Are these attackers in there already and they're just undetected?”
Yes, they are already in there and undetected and undetectable, and rather than waste any sysadmin time and ignorant mechanical human effort on worthless speculative FUD navel-gazing with a “could be to "destroy" rather than steal, and posited that attackers may have quietly infiltrated critical infrastructure systems and maintained a foothold, perhaps to begin causing damage only in the event of kinetic warfare between states.” are there to exercise a monitoring and mentoring of an absolutely fabulous command and remote virtual control takeover of leading intelligence power and nervous energy systems …… and that suggests a novel application of an effective successful neuroweapons systems against which there is no known and available defence or attack mechanism.
An ultimate weapons system protecting itself from discovery and reverse engineering with its continual reinvention and improvement as a penultimate tool for virtual realisation of the Total Information Awareness Meme for Genuine Drivering in Live Operational Virtual Environments.
The solution IT offers remorselessly and targets relentlessly is the PEBCAK and media chunnels/covert and clandestine communications channels which chatter and capture mainstreaming media attention and interest with full intent of reprogramming mainstream media direction/projected future administration.
You may like to consider that only failed or failing multi billion dollar companies tout a successfully disruptive and revolutionary competitor advantage as a hacking attempt against ICS or SCADA systems.
Oh, and just love the wry, dry [Dear SCADA haters,] humour, theodore. :-)
* A Black Watch Venture in a Dark Web Enterprise for Global Operating Devices? I Kid U Not? And priceless, so don't ask if not holding any folding for pimping and priming premium present novel noble content supply.
[Hmmmm? ...... You're already fucked - El Reg is just a honey trap front end for GCHQ. Do you really think so, Cliff? How very convenient.]
Re: Ugly actors masquerading as politicians and diplomats is proof positive ....
Proof positive of certain things being fundamentally reassessed and radically reconfigured to ensure that the lowest common denominator set aren't bungling and fumbling with levers of power? ......
As of 2011, the Air Force has to process 1500 hours of full-motion video and 1500 still images every day.4 As there are not enough humans available to process the data, Michael Donley, the Secretary of the Air Force, described the situation as ‘unsustainable’.
So the US has made enormous investments into global intelligence gathering that it cannot exploit due to lack of manpower. It is recognised, as I will argue below, that machines can only replace some aspects of human cognition. But it is a reasonable expectation that there will be a massive military interest in a neuroscience that promises to make human cognition automatically exploitable. As an expansion of staff matching the expansion of data is so expensive as to be unlikely, neurotechnology will be a strategically important tool as a remedy for the manpower scarcity described by Donley. Of course, Defence Advanced Research Projects Agency (DARPA) is a major beneficiary of the US President’s April 2013 initiative to invest into brain research. .... http://lril.oxfordjournals.org/content/2/2/201.full?keytype=ref&ijkey=Q1KAdy8OVIJl713#fn-6
Ugly actors masquerading as politicians and diplomats is proof positive ....
.... of a mad world and FCUKd systems
The security services can't be trusted not to abuse the powers they already have, but the government is always ready to give them more.
They must have blackmail dossiers on all MPs ..... Red Bren
What appears to be missing in abundance in the spooky stealthy intelligences services is prime administerial leadership to any number of unfolding realities which are more perfectly micro macro managed and beautifully effectively under their own services servers virtually remote and constantly mentoring and monitoring anonymous command and control.
Maybe the new guy at MI6 will have more of a clue as to what to do/needs to be done to rule imperiously with invisible reign and intangible reins.
Or maybe Charles will charge the Palace to start doing IT right with a call for appointments of a right royal rolls royce style of cyber support and postmodernist intelligence supply.
Certainly things could be and need to be fundamentally reassessed and radically reconfigured to ensure that the lowest common denominator set aren't bungling and fumbling with levers of power.
Yo, Big Bro ... Breaking Bad Typed News of Virtual Jihad Penetration Points of Interested Contact
Here is some news of revised views on Alex Younger's competition, or is that really the opposition .....http://cryptome.org/dodi/2014/opnav-5400-2308.pdf
And .... if MI6 and/or any of those sorts of Intelligence Community Agencies are reacting to global events and trailed news stories, are they leading diddly squat with their reactionary support of that and those novel noble ignoble actions.
Is the Office of Cyber Security a MODified DODgy sinecure and Foreign Office money laundering operation? And if not, why not, whenever so much can be so successfully churned in plain sight of regulatory oversight? And is it and IT also MI6 competition and the reactionary opposition which be leading Madness and Mayhem into/with CHAOS ...... Cloud[s] Hosting Advanced Operating Systems .
Re: "FINALLY!" .... Is there something New and Exciting!
Description: An issue existed in Bash's parsing of environment variables. This issue was addressed through improved environment variable parsing by better detecting the end of the function statement. …. 2014-09-29, 6:30 pm:… http://mac-security.blogspot.co.uk/2014/09/coverage-of-apples-bash-shellshock-bugs.html
If you were to tell me and El Regers that “better detecting the end of the function statement” is any better than just an educated subjective guess at a constantly moving and evolving objective targeting functions and common vulnerabilities with exposure to explosive exploits, I would wholeheartedly and fundamentally disagree with you.
And a patch is surely only a desperate temporary fix and not at all a viable working solution to an abiding burgeoning problem which is presenting opportunities currently daily to …. well the Zer0Day Vector is a Novel Creative CyberSpace Command and Control Sector which Bugs the Captive Monopolist Capitalist Investment Market Place to Deny, Degrade and/or Destroy All Opposing Competition and Competitive Opposition.
Re: Governments shouldn't control 'content, technologies or services'
Re: Governments shouldn't control 'content, technologies or services'
No, monopolistic ISPs should. ..... thomas k.
Any advance on meritocratic autocratic ISPs, thomas k.? And do you imagine that their command and control of Internetional Service Provision can be in any way wrestled and wrested away to rest elsewhere? The alien posit here is that such would be just an impossible pipe dream [a fantastic but vain hope (from fantasies induced by the opium pipe]
Re: Too little, too late, and just so typical of a failed state.
Oops, sorry, that should have been chunnels rather than channels because the very nature of the stealth in action is in an underground movement with novel phorms of code and steganography doing the pornography thing if designed to deprave and corrupt and subvert rather than deny and disrupt and destroy the failing opposition in threatening competition.
And they be quite perfect enough lanes in the HyperSuperVisored Space of SMARTR IntelAIgent Systems and Servers for the ExtraOrdinary Rendition of Future Realities via Presentational Media Programs and NEUKlearer HyperRadioProActive IT Memes/Advanced Intelligent Ways and Means.
And yes, that is Current Up and Running and Alpha Beta Testing Execs and Savvier Global Markets for Immaculate Immediate Invisible Intangible Supply to Contractor Partnerships. And the Potent Power in ITs Creative Cyber Command Control of Communications and Computers is securely aided and abetted by the Great Disbelief of Doubt that Generates an Arrogant Ignorance that Petrifies and Transforms a System of Operations and Operating Systems into a State of Paralysis and Stupefaction/Subjugation and Disinformation.
Too little, too late, and just so typical of a failed state.
Whatever the cause of a data breach problems, enterprises need an incident-handling plan in place before a breach takes place – rather than scrambling to deal with an emergence after the fact,…
An incident handling plan or a do no inequitable and evil business program? Only the one solves the problem and delivers the answers that are needed but it is disruptive and revolutionary and really fcuks up the systems as are presently being attacked daily and zerodaily because of opportunities exploited via unpatchable vulnerabilities/dark web holes/virtual channels.
And that is not a million miles away from dogged/Socrates’s observation ……. Socrates' solution was to properly train their souls, if that helps. …. although on a whole new plane/level of spooky understanding and daring do.
Some Cream for that Coffee.
Ok, it's early and I haven't finished my coffee yet. Isn't this an injection vulnerability due to not escaping the remote input before using it to set the environment variable?
What is crafting the command which is setting the env with a function using the remotely supplied value?.....Chris--S
irregular and unconventional intelligence somewhat greater than the norm and for/from future operations rather than from/for past systems in present race overlode conditions/critical situations seems most probable and likely however inconvenient that might be to current executive admins. Chris--S.
I wonder if Kevin Mitnick is selling it? ....... `http://www.wired.com/2014/09/kevin-mitnick-selling-zero-day-exploits/
- Vid Antarctic ice THICKER than first feared – penguin-bot boffins
- Hi-torque tank engines: EXTREME car hacking with The Register
- Review What's MISSING on Amazon Fire Phone... and why it WON'T set the world alight
- Product round-up Trousers down for six of the best affordable Androids
- Antique Code Show World of Warcraft then and now: From Orcs and Humans to Warlords of Draenor