This page has been archived and commenting is disabled.

Meet The Man In Charge Of America's Secret Cyber Army (In Which "Bonesaw" Makes A Mockery Of PRISM)

Tyler Durden's picture





 

With his revelations exposing the extent of potential, and actual, pervasive NSA surveillance over the American population, Edward Snowden has done a great service for the public by finally forcing it to answer the question: is having Big Brother peek at every private communication and electronic information, a fair exchange for the alleged benefit of the state's security. Alas, without further action form a population that appears largely numb and apathetic to disclosures that until recently would have sparked mass protests and toppled presidents, the best we can hope for within a political regime that has hijacked the democratic process, is some intense introspection as to what the concept of "America" truly means.

However, and more importantly, what Snowden's revelations have confirmed, is that behind the scenes, America is now actively engaged in a new kind of war: an unprecedented cyber war, where collecting, deciphering, intercepting, and abusing information is the only thing that matters and leads to unprecedented power, and where enemies both foreign and domestic may be targeted without due process based on a lowly analyst's "whim."

It has also put spotlight on the man, who until recently deep in the shadows, has been responsible for building America's secret, absolutely massive cyber army, and which according to a just released Wired profile is "capable of launching devastating cyberattacks. Now it's ready to unleash hell."

Meet General Keith Alexander, "a man few even in Washington would likely recognize", which is troubling because Alexander is now quite possibly the most powerful person in the world, that nobody talks about. Which is just the way he likes it.

This is the partial and incomplete story of the man who may now be empowered with more unchecked power than any person in the history of the US, or for that matter, the world. It comes once again, courtesy of the man who over a year before the Guardian's Snowden bombshell broke the story about the NSA's secret Utah data storage facility, James Bamford, and whose intimate knowledge of the NSA's secrets comes by way of being a consultant for the defense team of one Thomas Drake, one of the original NSA whistleblowers (as we learn from the full Wired article).

But first, by way of background, here is a glimpse of Alexander's ultra-secretive kingdom. From Wired:

Inside Fort Meade, Maryland, a top-secret city bustles. Tens of thousands of people move through more than 50 buildings—the city has its own post office, fire department, and police force. But as if designed by Kafka, it sits among a forest of trees, surrounded by electrified fences and heavily armed guards, protected by antitank barriers, monitored by sensitive motion detectors, and watched by rotating cameras. To block any telltale electromagnetic signals from escaping, the inner walls of the buildings are wrapped in protective copper shielding and the one-way windows are embedded with a fine copper mesh. 

 

This is the undisputed domain of General Keith Alexander, a man few even in Washington would likely recognize. Never before has anyone in America’s intelligence sphere come close to his degree of power, the number of people under his command, the expanse of his rule, the length of his reign, or the depth of his secrecy. A four-star Army general, his authority extends across three domains: He is director of the world’s largest intelligence service, the National Security Agency; chief of the Central Security Service; and commander of the US Cyber Command. As such, he has his own secret military, presiding over the Navy’s 10th Fleet, the 24th Air Force, and the Second Army.

Schematically, Alexander's empire consists of the following: virtually every piece in America's information intelligence arsenal.

As the Snowden scandal has unfurled, some glimpses into the "introspective" capabilities of the NSA, and its sister organizations, have demonstrated just how powerful the full "intelligence" arsenal of the US can be.

However, it is when it is facing outward - as it normally does - that things get really scary. Because contrary to prevailing conventional wisdom, Alexander's intelligence and information-derived power is far from simply defensive. In fact, it is when its offensive potential is exposed that the full destructive power in Alexander's grasp is revealed:

In its tightly controlled public relations, the NSA has focused attention on the threat of cyberattack against the US—the vulnerability of critical infrastructure like power plants and water systems, the susceptibility of the military’s command and control structure, the dependence of the economy on the Internet’s smooth functioning. Defense against these threats was the paramount mission trumpeted by NSA brass at congressional hearings and hashed over at security conferences.

 

But there is a flip side to this equation that is rarely mentioned: The military has for years been developing offensive capabilities, giving it the power not just to defend the US but to assail its foes. Using so-called cyber-kinetic attacks, Alexander and his forces now have the capability to physically destroy an adversary’s equipment and infrastructure, and potentially even to kill. Alexander—who declined to be interviewed for this article—has concluded that such cyberweapons are as crucial to 21st-century warfare as nuclear arms were in the 20th.

 

And he and his cyberwarriors have already launched their first attack. The cyberweapon that came to be known as Stuxnet was created and built by the NSA in partnership with the CIA and Israeli intelligence in the mid-2000s. The first known piece of malware designed to destroy physical equipment, Stuxnet was aimed at Iran’s nuclear facility in Natanz. By surreptitiously taking control of an industrial control link known as a Scada (Supervisory Control and Data Acquisition) system, the sophisticated worm was able to damage about a thousand centrifuges used to enrich nuclear material.

 

The success of this sabotage came to light only in June 2010, when the malware spread to outside computers. It was spotted by independent security researchers, who identified telltale signs that the worm was the work of thousands of hours of professional development. Despite headlines around the globe, officials in Washington have never openly acknowledged that the US was behind the attack. It wasn’t until 2012 that anonymous sources within the Obama administration took credit for it in interviews with The New York Times.

 

But Stuxnet is only the beginning. Alexander’s agency has recruited thousands of computer experts, hackers, and engineering PhDs to expand US offensive capabilities in the digital realm. The Pentagon has requested $4.7 billion for “cyberspace operations,” even as the budget of the CIA and other intelligence agencies could fall by $4.4 billion. It is pouring millions into cyberdefense contractors. And more attacks may be planned.

Alexander's background is equally as impressive: a classmate of Petraeus and Dempsey, a favorite of Rumsfeld, the General had supreme power written all over his career progression. If reaching the top at all costs meant crushing the fourth amendment and lying to Congress in the process, so be it:

Born in 1951, the third of five children, Alexander was raised in the small upstate New York hamlet of Onondaga Hill, a suburb of Syracuse. He tossed papers for the Syracuse Post-Standard and ran track at Westhill High School while his father, a former Marine private, was involved in local Republican politics. It was 1970, Richard Nixon was president, and most of the country had by then begun to see the war in Vietnam as a disaster. But Alexander had been accepted at West Point, joining a class that included two other future four-star generals, David Petraeus and Martin Dempsey. Alexander would never get the chance to serve in Vietnam. Just as he stepped off the bus at West Point, the ground war finally began winding down.

 

In April 1974, just before graduation, he married his high school classmate Deborah Lynn Douglas, who grew up two doors away in Onondaga Hill. The fighting in Vietnam was over, but the Cold War was still bubbling, and Alexander focused his career on the solitary, rarefied world of signals intelligence, bouncing from secret NSA base to secret NSA base, mostly in the US and Germany. He proved a competent administrator, carrying out assignments and adapting to the rapidly changing high tech environment. Along the way he picked up masters degrees in electronic warfare, physics, national security strategy, and business administration. As a result, he quickly rose up the military intelligence ranks, where expertise in advanced technology was at a premium.

 

In 2001, Alexander was a one-star general in charge of the Army Intelligence and Security Command, the military’s worldwide network of 10,700 spies and eavesdroppers. In March of that year he told his hometown Syracuse newspaper that his job was to discover threats to the country. “We have to stay out in front of our adversary,” Alexander said. “It’s a chess game, and you don’t want to lose this one.” But just six months later, Alexander and the rest of the American intelligence community suffered a devastating defeat when they were surprised by the attacks on 9/11. Following the assault, he ordered his Army intercept operators to begin illegally monitoring the phone calls and email of American citizens who had nothing to do with terrorism, including intimate calls between journalists and their spouses. Congress later gave retroactive immunity to the telecoms that assisted the government.

 

In 2003, Alexander, a favorite of defense secretary Donald Rumsfeld, was named the Army’s deputy chief of staff for intelligence, the service’s most senior intelligence position. Among the units under his command were the military intelligence teams involved in the human rights abuses at Baghdad’s Abu Ghraib prison. Two years later, Rumsfeld appointed Alexander—now a three-star general—director of the NSA, where he oversaw the illegal, warrantless wiretapping program while deceiving members of the House Intelligence Committee. In a publicly released letter to Alexander shortly after The New York Times exposed the program, US representative Rush Holt, a member of the committee, angrily took him to task for not being forthcoming about the wiretapping: “Your responses make a mockery of congressional oversight.”

In short: Emperor Alexander.

Inside the government, the general is regarded with a mixture of respect and fear, not unlike J. Edgar Hoover, another security figure whose tenure spanned multiple presidencies. “We jokingly referred to him as Emperor Alexander—with good cause, because whatever Keith wants, Keith gets,” says one former senior CIA official who agreed to speak on condition of anonymity. “We would sit back literally in awe of what he was able to get from Congress, from the White House, and at the expense of everybody else.”

What happened next in Alexander's career some time in the mid 2000's, was Stuxnet: the story of the crushing virus that nearly destroyed the Iranian nuclear program has been widely documented on these pages and elsewhere, so we won't recount the Wired article's details. However, what was very odd about the Stuxnet attack is that such a brilliantly conceived and delivered virus could ultimately be uncovered and traced back to the NSA and Israel. It was almost too good. Still, what happened after the revelation that Stuxnet could be traced to Fort Meade, is that the middle-east, supposedly, promptly retaliated:

Sure enough, in August 2012 a devastating virus was unleashed on Saudi Aramco, the giant Saudi state-owned energy company. The malware infected 30,000 computers, erasing three-quarters of the company’s stored data, destroying everything from documents to email to spreadsheets and leaving in their place an image of a burning American flag, according to The New York Times. Just days later, another large cyberattack hit RasGas, the giant Qatari natural gas company. Then a series of denial-of-service attacks took America’s largest financial institutions offline. Experts blamed all of this activity on Iran, which had created its own cyber command in the wake of the US-led attacks. James Clapper, US director of national intelligence, for the first time declared cyberthreats the greatest danger facing the nation, bumping terrorism down to second place. In May, the Department of Homeland Security’s Industrial Control Systems Cyber Emergency Response Team issued a vague warning that US energy and infrastructure companies should be on the alert for cyberattacks. It was widely reported that this warning came in response to Iranian cyberprobes of industrial control systems. An Iranian diplomat denied any involvement.

 

The cat-and-mouse game could escalate. “It’s a trajectory,” says James Lewis, a cyber­security expert at the Center for Strategic and International Studies. “The general consensus is that a cyber response alone is pretty worthless. And nobody wants a real war.” Under international law, Iran may have the right to self-defense when hit with destructive cyberattacks. William Lynn, deputy secretary of defense, laid claim to the prerogative of self-defense when he outlined the Pentagon’s cyber operations strategy. “The United States reserves the right,” he said, “under the laws of armed conflict, to respond to serious cyberattacks with a proportional and justified military response at the time and place of our choosing.” Leon Panetta, the former CIA chief who had helped launch the Stuxnet offensive, would later point to Iran’s retaliation as a troubling harbinger. “The collective result of these kinds of attacks could be a cyber Pearl Harbor,” he warned in October 2012, toward the end of his tenure as defense secretary, “an attack that would cause physical destruction and the loss of life.”

Almost too good... Because what the so-called hacker "retaliations" originating from Iran, China, Russia, etc, led to such laughable outcomes as DDOS attacks against - to unprecedented media fanfare - the portals of such firms as JPMorgan and Wells Fargo, and as Wired adds, "if Stuxnet was the proof of concept, it also proved that one successful cyberattack begets another. For Alexander, this offered the perfect justification for expanding his empire."

The expansion that took place next for Alexander and his men, all of it under the Obama regime, was simply unprecedented (and that it steamrolled right through the "sequester" was perfectly expected):

[D]ominance has long been their watchword. Alexander’s Navy calls itself the Information Dominance Corps. In 2007, the then secretary of the Air Force pledged to “dominate cyberspace” just as “today, we dominate air and space.” And Alexander’s Army warned, “It is in cyberspace that we must use our strategic vision to dominate the information environment.” The Army is reportedly treating digital weapons as another form of offensive capability, providing frontline troops with the option of requesting “cyber fire support” from Cyber Command in the same way they request air and artillery support.

 

All these capabilities require a giant expansion of secret facilities. Thousands of hard-hatted construction workers will soon begin erecting cranes, driving backhoes, and emptying cement trucks as they expand the boundaries of NSA’s secret city eastward, increasing its already enormous size by a third. “You could tell that some of the seniors at NSA were truly concerned that cyber was going to engulf them,” says a former senior Cyber Command official, “and I think rightfully so.”

 

In May, work began on a $3.2 billion facility housed at Fort Meade in Maryland. Known as Site M, the 227-acre complex includes its own 150-megawatt power substation, 14 administrative buildings, 10 parking garages, and chiller and boiler plants. The server building will have 90,000 square feet of raised floor—handy for supercomputers—yet hold only 50 people. Meanwhile, the 531,000-square-foot operations center will house more than 1,300 people. In all, the buildings will have a footprint of 1.8 million square feet. Even more ambitious plans, known as Phase II and III, are on the drawing board. Stretching over the next 16 years, they would quadruple the footprint to 5.8 million square feet, enough for nearly 60 buildings and 40 parking garages, costing $5.2 billion and accommodating 11,000 more cyberwarriors.

 

In short, despite the sequestration, layoffs, and furloughs in the federal government, it’s a boom time for Alexander. In April, as part of its 2014 budget request, the Pentagon asked Congress for $4.7 billion for increased “cyberspace operations,” nearly $1 billion more than the 2013 allocation. At the same time, budgets for the CIA and other intelligence agencies were cut by almost the same amount, $4.4 billion. A portion of the money going to Alexander will be used to create 13 cyberattack teams.

In the New Normal, the CIA is no longer relevant: all that matters are Alexanders' armies of hackers and computer geeks.

But not only has the public espionage sector been unleashed: the private sector is poised to reap a killing (pardon the pun) too...

What’s good for Alexander is good for the fortunes of the cyber-industrial complex, a burgeoning sector made up of many of the same defense contractors who grew rich supplying the wars in Iraq and Afghanistan. With those conflicts now mostly in the rearview mirror, they are looking to Alexander as a kind of savior. After all, the US spends about $30 billion annually on cybersecurity goods and services.

 

In the past few years, the contractors have embarked on their own cyber building binge parallel to the construction boom at Fort Meade: General Dynamics opened a 28,000-square-foot facility near the NSA; SAIC cut the ribbon on its new seven-story Cyber Innovation Center; the giant CSC unveiled its Virtual Cyber Security Center. And at consulting firm Booz Allen Hamilton, where former NSA director Mike McConnell was hired to lead the cyber effort, the company announced a “cyber-solutions network” that linked together nine cyber-focused facilities. Not to be outdone, Boeing built a new Cyber Engagement Center. Leaving nothing to chance, it also hired retired Army major general Barbara Fast, an old friend of Alexander’s, to run the operation. (She has since moved on.)

 

Defense contractors have been eager to prove that they understand Alexander’s worldview. “Our Raytheon cyberwarriors play offense and defense,” says one help-wanted site. Consulting and engineering firms such as Invertix and Parsons are among dozens posting online want ads for “computer network exploitation specialists.” And many other companies, some unidentified, are seeking computer and network attackers. “Firm is seeking computer network attack specialists for long-term government contract in King George County, VA,” one recent ad read. Another, from Sunera, a Tampa, Florida, company, said it was hunting for “attack and penetration consultants.”

It gets better: all those anti-virus programs you have on computer to "make it safe" from backdoors and trojans? Guess what - they are the backdoors and trojans!

One of the most secretive of these contractors is Endgame Systems, a startup backed by VCs including Kleiner Perkins Caufield & Byers, Bessemer Venture Partners, and Paladin Capital Group. Established in Atlanta in 2008, Endgame is transparently antitransparent. “We’ve been very careful not to have a public face on our company,” former vice president John M. Farrell wrote to a business associate in an email that appeared in a WikiLeaks dump. “We don’t ever want to see our name in a press release,” added founder Christopher Rouland. True to form, the company declined Wired’s interview requests.

 

Perhaps for good reason: According to news reports, Endgame is developing ways to break into Internet-connected devices through chinks in their antivirus armor. Like safecrackers listening to the click of tumblers through a stethoscope, the “vulnerability researchers” use an extensive array of digital tools to search for hidden weaknesses in commonly used programs and systems, such as Windows and Internet Explorer. And since no one else has ever discovered these unseen cracks, the manufacturers have never developed patches for them.

 

Thus, in the parlance of the trade, these vulnerabilities are known as “zero-day exploits,” because it has been zero days since they have been uncovered and fixed. They are the Achilles’ heel of the security business, says a former senior intelligence official involved with cyberwarfare. Those seeking to break into networks and computers are willing to pay millions of dollars to obtain them.

Such as the US government. But if you thought PRISM was bad you ain't seen nuthin' yet. Because tying it all together is Endgame's appropriately named "Bonesaw" - what it is is practically The Matrix transplanted into the real cyber world.

According to Defense News’ C4ISR Journal and Bloomberg Businessweek, Endgame also offers its intelligence clients—agencies like Cyber Command, the NSA, the CIA, and British intelligence—a unique map showing them exactly where their targets are located. Dubbed Bonesaw, the map displays the geolocation and digital address of basically every device connected to the Internet around the world, providing what’s called network situational awareness. The client locates a region on the password-protected web-based map, then picks a country and city— say, Beijing, China. Next the client types in the name of the target organization, such as the Ministry of Public Security’s No. 3 Research Institute, which is responsible for computer security—or simply enters its address, 6 Zhengyi Road. The map will then display what software is running on the computers inside the facility, what types of malware some may contain, and a menu of custom-designed exploits that can be used to secretly gain entry. It can also pinpoint those devices infected with malware, such as the Conficker worm, as well as networks turned into botnets and zombies— the equivalent of a back door left open.

 

Bonesaw also contains targeting data on US allies, and it is soon to be upgraded with a new version codenamed Velocity, according to C4ISR Journal. It will allow Endgame’s clients to observe in real time as hardware and software connected to the Internet around the world is added, removed, or changed.

More on Bonesaw:

Marketing documents say “the Bonesaw platform provides a complete environment for intelligence analysts and mission planners to take a holistic approach to target discovery, reducing the time to create actionable intelligence and operational plans from days to minutes.”

 

Bonesaw is the ability to map, basically every device connected to the Internet and what hardware and software it is,” says a company official who requested anonymity. The official points out that the firm doesn’t launch offensive cyber ops, it just helps.

Back to Wired:

[S]uch access doesn’t come cheap. One leaked report indicated that annual subscriptions could run as high as $2.5 million for 25 zero-day exploits.

That's ok though, the US government is happy to collect taxpayer money so it can pay these venture capital-backed private firms for the best in espionage technology, allowing it to reach, hack and manipulate every computer system foreign. And domestic.

How ironic: US citizens are funding Big Brother's own unprecedented spying program against themselves!

Not only that, but by allowing the NSA to develop and utilize technology that is leaps ahead of everyone else  - utilize it against the US citizens themselves - America is now effectively war against itself... Not to mention every other foreign country that is a intelligence interest:

The buying and using of such a subscription by nation-states could be seen as an act of war. “If you are engaged in reconnaissance on an adversary’s systems, you are laying the electronic battlefield and preparing to use it,” wrote Mike Jacobs, a former NSA director for information assurance, in a McAfee report on cyberwarfare. “In my opinion, these activities constitute acts of war, or at least a prelude to future acts of war.” The question is, who else is on the secretive company’s client list? Because there is as of yet no oversight or regulation of the cyberweapons trade, companies in the cyber-industrial complex are free to sell to whomever they wish. “It should be illegal,” says the former senior intelligence official involved in cyber­warfare. “I knew about Endgame when I was in intelligence. The intelligence community didn’t like it, but they’re the largest consumer of that business.”

And there you have it: US corporations happily cooperating with the US government's own espionage services, however since the only thing that matters in the private sector is the bottom line, the Endgames of the world will gladly sell the same ultra-secret services to everyone else who is willing to pay top dollar: China, Russia, Iran...

in their willingness to pay top dollar for more and better zero-day exploits, the spy agencies are helping drive a lucrative, dangerous, and unregulated cyber arms race, one that has developed its own gray and black markets. The companies trading in this arena can sell their wares to the highest bidder—be they frontmen for criminal hacking groups or terrorist organizations or countries that bankroll terrorists, such as Iran. Ironically, having helped create the market in zero-day exploits and then having launched the world into the era of cyberwar, Alexander now says the possibility of zero-day exploits falling into the wrong hands is his “greatest worry.”

Does Alexander have reason to be worried? Oh yes.

In May, Alexander discovered that four months earlier someone, or some group or nation, had secretly hacked into a restricted US government database known as the National Inventory of Dams. Maintained by the Army Corps of Engineers, it lists the vulnerabilities for the nation’s dams, including an estimate of the number of people who might be killed should one of them fail. Meanwhile, the 2013 “Report Card for America’s Infrastructure” gave the US a D on its maintenance of dams. There are 13,991 dams in the US that are classified as high-hazard, the report said. A high-hazard dam is defined as one whose failure would cause loss of life. “That’s our concern about what’s coming in cyberspace—a destructive element. It is a question of time,” Alexander said in a talk to a group involved in information operations and cyberwarfare, noting that estimates put the time frame of an attack within two to five years. He made his comments in September 2011.

In other words, this massive cyberattack against the US predicted by "Emperor" Alexander, an attack in which as Alexander himself has said cyberweapons represent the 21st century equivalent of nuclear arms (and require in kind retaliation) whether false flag or real, is due... some time right around now.

 


- advertisements -

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.
Sat, 06/22/2013 - 18:17 | Link to Comment illyia
illyia's picture

Wow. Thanks, ZH.

++

Sat, 06/22/2013 - 18:30 | Link to Comment HelluvaEngineer
HelluvaEngineer's picture

So, I used to think that about 60% of what Alex Jones says is true.  I'm currently reconsidering that percentage.

Sat, 06/22/2013 - 18:33 | Link to Comment Stackers
Stackers's picture

Cyber attack on a power plant

 

https://www.youtube.com/watch?v=fJyWngDco3g

nuts

Sat, 06/22/2013 - 18:37 | Link to Comment ACP
ACP's picture

This article forgot to mention the inevitable (additional) government waste. Every Friday in a secure location like this is poker day. Poker and JD, on the rocks.

Sat, 06/22/2013 - 18:50 | Link to Comment LetThemEatRand
LetThemEatRand's picture

They prefer Crown Royal.  

Sat, 06/22/2013 - 19:14 | Link to Comment El Oregonian
El Oregonian's picture

"Meet General Keith Alexander, "a man few even in Washington would likely recognize"

I think this cretin should be called General K. Hackenzander.

Sat, 06/22/2013 - 19:57 | Link to Comment AldousHuxley
AldousHuxley's picture

"Secret"?

 

with the nazis it was a nuclear war (dominate bombs, dominate anything sitting on land)...steal german atomic scientists to make nukes

with the ruskies it was space war (dominate space, dominate skies which missiles travel)...beat sputnik with NASA

with chinese it is cyber war (dominate computers, dominate war machines and mass media)

 

your National Science Foundation (NSF) and National INstitute of Health (NIH) are offshoots of US military's

Office of Scientific Research and Development
Sat, 06/22/2013 - 20:00 | Link to Comment DaddyO
DaddyO's picture

SKYNET, Bitches...

So who is gonna step up and be the modern John Connor? Is it Ed Snowden or some 13yr old hacker yet in his mother's basement?

DaddyO

Sat, 06/22/2013 - 20:12 | Link to Comment BoNeSxxx
BoNeSxxx's picture

So I guess this means that the US won't be using EMPs on its enemies any time soon?

Disable the computers/switches/routers/power of the citizen 'net and his entire infrastructure is just an expensive bunker.

Sat, 06/22/2013 - 20:17 | Link to Comment DaddyO
DaddyO's picture

Ala Starfish Prime?

It would seem that some hardening had to go into the structures of Alexander's empire, the copper gradient in the windows and other such stuff effectively creates a Faraday apparatus that ensures EMP won't blow its mind.

DaddyO

Sat, 06/22/2013 - 20:30 | Link to Comment BoNeSxxx
BoNeSxxx's picture

I am sure he is shielded.  The point is that if the rest of our shite gets 'bricked' he has nothing to spy on us through.  Our PCs are gateways into our privacy.

We were 'given' this technology for precisely this purpose. Therefore, they will never EMP us... Our personal data is there for the taking at any time - and they wouldn't have it any other way.

Sat, 06/22/2013 - 20:38 | Link to Comment AldousHuxley
AldousHuxley's picture

http://www.youtube.com/watch?v=tz0ejKersnM

 

General speaking at DEFCON...

 

no $$$ for his cyberarmy, so he is doing the "ask not what your army can hack for you, but what you can hack for your country" speech at DEFCON hackers.

Sat, 06/22/2013 - 21:15 | Link to Comment SMG
SMG's picture

General Keith Alexander is a traitor to the constitution and a criminal.  He should be sitting in jail or worse.  Arrest him now!

Sat, 06/22/2013 - 21:30 | Link to Comment SafelyGraze
SafelyGraze's picture

"who is gonna step up and be the modern John Connor? Is it Ed Snowden or some 13yr old hacker not yet in his mother's womb?"

the latter

which is why zh readers must go out there and Get Busy

very very busy

Sat, 06/22/2013 - 22:58 | Link to Comment cifo
cifo's picture

This time WB7 forgot to sign the first image....

Sat, 06/22/2013 - 23:54 | Link to Comment erg
erg's picture

Our learning curve is out-stripping their obfiscations at an increasing rate.

At some point they will have no choice but to 'up the ante' and call a pox on us all.

Some nasty strain of something.

 

Sun, 06/23/2013 - 07:54 | Link to Comment francis_sawyer
francis_sawyer's picture

Careful SMG... The "Traitor to the Constitution", & "Criminal Anti-Defamation Leagues" will have your ass for tossing out verdicts without due process...

Sun, 06/23/2013 - 08:23 | Link to Comment GetZeeGold
GetZeeGold's picture

 

 

 

 

Everything means everything....bitchez!

 

Sun, 06/23/2013 - 08:35 | Link to Comment clymer
clymer's picture

just more bullshit govt. waste. Anyone can go to any number of web sites hosted in numerous unnamed Eastern European countries and purchase custom written zero-day exploit code for under $400.

 

When the govt. hires a crony front company to do it, they just happen to pay 2.5 mil.

 

Same profiteering shit, different industry.

 

Sun, 06/23/2013 - 00:09 | Link to Comment JPM Hater001
JPM Hater001's picture

"General Keith Alexander is a traitor to the constitution and a criminal.  He should be sitting in jail or worse.  Arrest him now!"

 

I'll be in FEMA camp 7...which one will you be visiting in 5....4....3....2

Sun, 06/23/2013 - 12:11 | Link to Comment DoChenRollingBearing
DoChenRollingBearing's picture

If you are ever sent down to south, try and join some of us at FEMA Camp!  Lots of fun!  Here's our address:

 

Building 16, Compound 3, FEMA Camp 116 (Belle Glade) 33213

We'll try to say you a bunk with a view of the swamp!

Sun, 06/23/2013 - 06:46 | Link to Comment Go Tribe
Go Tribe's picture

We need to defund this bastard government and put away its monsters,

Sun, 06/23/2013 - 14:16 | Link to Comment MarcusLCrassus
MarcusLCrassus's picture

That is the key: starve the beast.

 

We should have congress start slashing the NSA budget every year.  For example, have them slash the NSA budget by 50% for next year.  Cut it by another 50% the next year.  Etc etc so that in a few years the only thing they will be able to do is hire 5 guys who have to share one laptop between them.

 

Too bad congress is also completely compromised. 

Sat, 06/22/2013 - 21:56 | Link to Comment Lost Word
Lost Word's picture

Funny how the Law-Breaking Government anonymous Spies are hiring the "Law-Breaking" anonymous Hackers.

Sat, 06/22/2013 - 22:11 | Link to Comment CH1
CH1's picture

And sick that a thousand engineers are building all of this, then pretending that they bear no responsibility.

Sat, 06/22/2013 - 23:13 | Link to Comment Skateboarder
Skateboarder's picture

Takes a sick mind to have gained enough intelligence to be able to engineer such systems yet have absolutely no moral regard for the consequences of their existence.

"What do you do for a living?"

"I build your overlord."

Sun, 06/23/2013 - 03:01 | Link to Comment Prometheus418
Prometheus418's picture

Thanks for both.

Never ran across the comic before, and it's a fun one- welcome after a long week full of corporate restructuring.

Also glad to see that someone knows that we do have consciences.  I've never known an engineer to intentionally act in the service of evil, but at the same time, I've heard a whole pile of rationalizations that stretch a long way without quite making it.  Smart guys can build remarkable card houses that keep them from being killed by dumb guys wielding the guns they designed.

At the end of the day, an engineer is like a fireman in Farenheit 451- politics matter, but they're nothing compared to the fact that it was a pleasure to burn.  [see also: King's "breakers" in the Dark Tower series]

I'm not just saying that, I know it myself.  I'm an engineer, and find it impossible to speak to or relate with those who are not in anything but a superficial way.  It's a deep rabbit hole.  It sucks to do things that hurt others, but sometimes there is no other way to survive.  You can hate me for that, and that's ok- I hated myself long before you ever could. About 80% of what I do helps us all, but about 20% of it kills innocents.  The only proof that I can show is a failing liver and a corrosive self-hatred- trade ya straight-up, if you think that engineers are soulless, and you can carry that cross a bit.

But at the end of the day, it's all I can do.  "Big Bang Theory" aside, people hate people who are able to think, and push us into these roles.  When every facet of life is designed to first marginalize, and then kill you, you go to the place where you are safe.  That means killing innocents because the military wants your brain, and the only choice presented is to die right now, or die slowly later.  

If you have children to support, it changes what the noble choice is.  Sometimes it's better to die slow and educate them so that they can avoid that trap.

Oh yeah- and fuck everyone else, too.  I would have gladly stood on a barricade, gun in hand and tactics in head with my brothers- if I had any.  But when I looked, and looked hard for Liberty's sons, it turned out that they were absent.  So I'm not the only one who deserves what is coming.

 

Sun, 06/23/2013 - 07:59 | Link to Comment francis_sawyer
francis_sawyer's picture

So let me synthesize that...

~~~

"Do it for the kids, [mine]"...

~~~

Let that be a lesson to everyone... If you do stuff you'll hate yourself for down the line & bank wads & wads of dough in the process... Have yourself some kids so you can justify keeping on doing it... You won't have to even wait for your deathbed to make a confession...

Sun, 06/23/2013 - 13:21 | Link to Comment GoinFawr
GoinFawr's picture

"When you do things right, people won't be sure you've done anything at all."- Ghod

Sun, 06/23/2013 - 19:22 | Link to Comment Al Gorerhythm
Al Gorerhythm's picture

I've not been affected by a post on ZH or any other site, as I have been by yours. My only response is one of humbleness and encouragement. You are not the only soul with conflicting stimuli that are driven by passions. Do you choose family over country? How do you protect your family's safety whilst living in a world of lawlessness, corruption, greed and apathy? 

No, you can't fight this avalanche alone. A soldier of one can't physically fight an army and expect a victorius outcome. You are right to lay low. You are right to wait for reinforcements. You have been trapped in the dichotomy of being a good guy but find yourseelf working for a veiled, criminal government which uses the morality of your Republican Constitution's foundations to advance their evil agenda. This sounds like a kid espousing some emotional dogma but I'm well past that. I feel your pain and as a word of encouragement let me ask that you stick with it. You are just ahead of the curve and your time will come and you will be needed. This will unwind as you are well aware. Stand proud for your family and country as you understand it to be. It may have been taken over but the time will come when good people wrest it from their hands. We won't be many, so don't wait for the majority to support you. They want to be led.

Mon, 06/24/2013 - 21:15 | Link to Comment Pygar
Pygar's picture

I honestly mean no offense and I wish you the best, but I have to respond to this. As an engineer, I'm well aware that it can be hard to find employment that does not involve working for the military-industrial-government complex making weapons of mass effect for use by elected sociopaths. But "hard" is not "impossible." We all have choices. I'm working as an engineer for a good company that makes products people want and need, not products that break things and kill people. No, I don't make a lot of money. Yes, I passed up more lucrative opportunities with various government-supported merchants of death and went through several periods of un- or under-employment, but I made that choice because I knew what my priorities were.

Selling out is the easiest thing in the world to rationalize beforehand but the hardest thing in the world to live with afterwards. Somehow I don't get the feeling pretending you didn't have any choice makes it any easier.

I truly hope you find some peace of mind, but moreso I hope that anyone who actually thinks that they "don't have a choice" reconsiders that belief.

Sun, 06/23/2013 - 01:03 | Link to Comment LetThemEatRand
LetThemEatRand's picture

And sick that a thousand engineers are building all of this, then pretending that they bear no responsibility.

Good fucking point.  

Sun, 06/23/2013 - 02:20 | Link to Comment Prometheus418
Prometheus418's picture

See above, Rand.

I'd rather make shoes, or better potato peelers, or just about anything else.  Hell, I've got a fine idea for a toaster that will butter your breakfast for you, if you want to put up some seed capital.

That's not what this world wants, though.  I had a position like that about six years ago, and was driven deep between a rock and a hard place.  The move that had to be made was to sell my soul to survive.  I fought it, and am continuing to do so- but without everyone pitching in, we can't change a damn thing.

Right now, essentially no one is pitching in.  You want a shitty statistic?  I'm a .3%'er.  One of 256 guys who had the grit to say they didn't want to kill foreigners on the record.  That's not a significant number- it's just enough to make sure that my life becomes worse because I was the stupid stubborn fuck who wouldn't hoist the starz n' barz and sing the anthem in time with all the other patriots.

I really didn't need my life to become worse.  At this point, the whole of the game is just to postpone death until my children can fend for themselves.  I assure you that I assume the responsibilty for every thing I have done, and that will be the richly deserved death of me.  If you don't want it to be the death of you as well, man up and start making changes- I'll back you with tech, blood and tactics if you do- that can't wash the stain from me, but it's better than nothing.

Until then, it's nothing but this:
http://www.youtube.com/watch?v=UUXBCdt5IPg

Sun, 06/23/2013 - 13:20 | Link to Comment centerline
centerline's picture

100% with ya on those feelings about being an engineer these days.  My eyes are always on the exit - but haven't found the exit yet.  Shitty profession is a lose-lose scenerio, but pays okay - is like a trap.  Might as well speak for what is right though.  I simply can't help myself - lol.  Pissing people off seems to have become one of my specialties.

 

Sun, 06/23/2013 - 14:04 | Link to Comment Herd Redirectio...
Herd Redirection Committee's picture

"That's not what this world wants, though."

Are you shitting me?  You are getting paid in corporate scrip.  Its not the world that wants what you are doing, merely the creators of the corporate scrip/the banksters.

You are right that everyone has to do their part.  Thats why this information war is so important.

Sun, 06/23/2013 - 06:46 | Link to Comment Go Tribe
Go Tribe's picture

You obviously don't work with engineers. They do what they're told, at least in my experience.

Sun, 06/23/2013 - 11:34 | Link to Comment GoinFawr
GoinFawr's picture

are you suggesting that "I was just following orders" is a valid defense?

Sun, 06/23/2013 - 13:08 | Link to Comment centerline
centerline's picture

Many do.  Not all of us though.  And we pay for having a conscience.  We pay dearly.

Sun, 06/23/2013 - 12:55 | Link to Comment yellowsub
yellowsub's picture

The evil ones are the masterminds (leaders) coming up with the idealology and carrying out their plan...

The engineers are like soidiers and just the pawns in the same game, keyboards is their weapons and their battle field can't be seen.

 

 

 

Sat, 06/22/2013 - 20:41 | Link to Comment DaddyO
DaddyO's picture

Yes but what's to keep one of our friends like the Ruskies or Chicoms from launching a small low yield device into our skies, say over Topeka or some such.

They could blame it on Iran, NK or other enemy of state and ouila my computer, she no work.

Then all the bonesaw, prism shynet type Shite is useless.

It ain't gonna happen though because TPTB are large and incharge of these types of things from and economic standpoint.

Unless someone in on of those countries goes Snowden or something.

DaddyO

Sat, 06/22/2013 - 21:35 | Link to Comment 20834A
20834A's picture

Three ten megaton dirty bombs exploded at a high altitude (400-500km) in a roughly triangular vector over the USA would knock out virtually the whole country. (Just one exploded over Kansas would do most of the U.S., but if a foreign nation was going to use this attack they'd go wide) Planes would fall out of the sky, cars built after the mid '70's would be disabled, electricity out, phones and computers dark, etc. We would be back in the dark ages... 

Scary, eh?

Sat, 06/22/2013 - 22:29 | Link to Comment SimMaker
SimMaker's picture

Not to worry, the NSA has a full back up of your hard drive.

Sat, 06/22/2013 - 23:10 | Link to Comment logically possible
logically possible's picture

Can you imagine, having to to deal with some government agency to try to get a backup of your hard drive?

Sun, 06/23/2013 - 07:41 | Link to Comment awakening
awakening's picture

Imagine? No. Experience (not personally); park your crap on "the cloud" and go through the painful recovery process when your hardware shits itself.

Want to avoid that experience? Learn how to and then build your own NAS (and I mean "build"; don't use off the shelf shit with whatever custom bloatware parked on them cause it might as well be on the cloud with regards to privacy and information security).

 

Sun, 06/23/2013 - 08:18 | Link to Comment francis_sawyer
francis_sawyer's picture

Look people... It's all bullshit anyway...

~~~

If they can supposedly 'hack' every computer on the planet, then presumably they can plant anything ONTO your hard drive that they want...

- Gee ~ you thought you were downloading the latest JAVA... [Nope ~ you were downloading Barry O buttfucking Captain Kangaroo]...

- How come you made all those purchases at Head Shops?

- Why, everytime your kid clicked on the Disney Channel, did the packet pass lickety split through 'Elvira's House of Pain'

~~~

Either they're out to get your ass, or they don't give a fuck about you [probably both]... But if they want to 'posterize' you, they will... Sure ~ you can make a game out of it, but they have unlimited funds to do so [because YOU'RE getting handed the check for that]...

OR

This is all a scam, [to make you believe they have these types of capabilities & scare you into compliance]...

Sun, 06/23/2013 - 02:10 | Link to Comment Boop
Boop's picture

...especially the part about the triangular vector, and the ten megaton dirty bombs...  neither of which exist.

But we get your point.

 

Sun, 06/23/2013 - 02:34 | Link to Comment Prometheus418
Prometheus418's picture

http://www.amazon.com/dp/0765356864

I belive this is what you're referencing.  Doom porn at it's finest.

The tally at the end is 50% death in the midwest, and 80% everywhere else, IIRC.

If you'd rather be optimistic, take this blue pill-

http://www.amazon.com/World-Set-Free-G-Wells/dp/1421839601/ref=sr_1_1?s=books&ie=UTF8&qid=1371969180&sr=1-1&keywords=hg+wells+world+set+free

If I had a vote, I'd take the second, but no one cares much about what I think.

Sun, 06/23/2013 - 02:53 | Link to Comment Spanky
Spanky's picture

+1

no one cares much about what I think -- Prometheus418

Smart man. You don't lie to yourself. Report for re-conditioning.

Sun, 06/23/2013 - 03:09 | Link to Comment Prometheus418
Prometheus418's picture

No worries there.

I wrote a rule at work,

"No doubleplusungood duckspeak allowed.

Violators will report to Miniluv for unthink thoughtcrime."

It's been on a chalkboard for months now- when anyone asks what it means, I just tell them that ignorance of the law is no excuse.

So far, everyone has apparently been afraid to erase it- or they just think it's fun puzzle to decipher.  I have no idea which it is- but I am fairly certain that someone will strap a cage full of starving rats to my face sooner or later.

Sun, 06/23/2013 - 04:22 | Link to Comment Spanky
Spanky's picture

I tell myself much the same every morning.

There is much political talk here, but little in the way of creative destruction. 

When discussing the ballot box as a Constitutional means to de-legitimize the ruling parties, I'm often met by wags insisting that the ONLY thing we cannot do is vote. Same at Occupy. Just drop out.

Almost as if orchestrated. If I were a conspriacy theorist, I'd be concerned the NSA was spying on us and CIA managing our ideas about what we should do about all this...

Sit back and wait for it? Are we nuts?

But there I go again, thinking any ideas I might contribute would prove useful...

Sun, 06/23/2013 - 14:39 | Link to Comment Dave Thomas
Dave Thomas's picture

I becha if Richard Burton walked into your office you'd shit your pants!

Sun, 06/23/2013 - 06:06 | Link to Comment StychoKiller
StychoKiller's picture

Even so, the NSA cannot stop me from unplugging my ethernet cable.

Sun, 06/23/2013 - 06:56 | Link to Comment Go Tribe
Go Tribe's picture

That will be the only solution. Every man woman and child unplugging, refusing to engage in online activity, transactions, jobs. That will be the moment of freedom. Right now it's one hand clapping. Problem is that for critical mass to be hit, people must become aware of the unpluggings, and without the interweb how will they? Perhaps community rallies and flyers.

Sat, 06/22/2013 - 20:34 | Link to Comment Fukushima Sam
Fukushima Sam's picture

Virtual war, now. Like a virtual economy.

It's all fun and games until the going gets real.  And it always gets real at some point.

Sat, 06/22/2013 - 23:19 | Link to Comment Spanky
Spanky's picture

+1 Good point.

And it always gets real at some point. -- Fukushima Sam

Just thinking aloud, but... anyone consider the "opportunty" Quantum Dawn II poses?

 

Tue, 06/25/2013 - 14:49 | Link to Comment TheMayor
TheMayor's picture

That was not an EMP, that was caused by a solar flare.

;-)

Sun, 06/23/2013 - 07:16 | Link to Comment onthesquare
onthesquare's picture

Imagine a teenage geek, living with his parents, and out of work just made his own backdoor and caught the eye of the gatekeepers.

Black SUV's arrive at his curb, military and SS men surround the his house, in a quiet community.  They gain access and offer him a $200,000 per year job with benefits.

The parents are so proud that their boy is now employed and making bit bucks. 

They are living the American Dream 21st century.  Don't bore me with any details.

Sat, 06/22/2013 - 20:04 | Link to Comment AldousHuxley
AldousHuxley's picture

oh and let's not forget ....

 

1994 
NSF, together with DARPA and NASA, launches the Digital Library Initiative. One of the first six grants goes to Stanford University, where two graduate students, Larry Page and Sergey Brin, begin to develop a search engine that uses the links between Web pages as a ranking method. They will later commercialize their search engine under the name Google.
Sat, 06/22/2013 - 21:00 | Link to Comment Dewey Cheatum Howe
Dewey Cheatum Howe's picture

And the Chinese know what is up and are countering this as we speak. Now you know why they are establishing a national operating system for government computers and to be bundled with all machines in China that is linux based, opensource and being developed in partnership with Ubuntu. Open source protects against zero day exploits and back doors when anyone can examine the code. Level playing field bitchez between white and black hats.

Sat, 06/22/2013 - 21:48 | Link to Comment Matt
Matt's picture

Meanwhile, most of the chipsets, from computer motherboards to the chips in UAV / RPV are built in China, where they may or may not be installing their own backdoors.

Sat, 06/22/2013 - 22:27 | Link to Comment fudge
fudge's picture

Good thing I've kept ( and bought a several for spares ) my faithful old Amiga(s) ;-)

A flip of the bird in the direction of the dimwits in the article.

Raspberry Pi fan

Sun, 06/23/2013 - 01:01 | Link to Comment Sabibaby
Sabibaby's picture

"Damn this virus just won't go away!" says the Airforce General commanding America's drone fleet.

Sun, 06/23/2013 - 02:46 | Link to Comment Prometheus418
Prometheus418's picture

Not sure what color my hat is these days, but 5 of my 8 computers run 64-bit Opensuse, and they can beat Ubuntu like a redheaded stepchild.  The other three run Windows, because they need to have CAD that matches my workplace.

Truth be told, I usually use the big bad windows machine to post here, because this forum is kind of cartoonish.  Good thoughts sometimes, but it's like getting rowdy in a bar- it might be technically against the rules, but everyone expects it and lets it blow by.

That being said, supporting Ubuntu is a great idea.  It's neither the most stable nor the most efficient, but they do have an excellent app store, which makes them a real contender when it comes to killing King Microsoft.  They're good folks.

Sat, 06/22/2013 - 23:21 | Link to Comment Spanky
Spanky's picture

+1

Point well made.. thank you. Ahh, the heady days of ARPA.NET.

Sun, 06/23/2013 - 01:56 | Link to Comment OutLookingIn
OutLookingIn's picture

Let us not forget that the "Internet" started out it's life as a highly secured military communications system. As the years passed this 'milcomsnet' was added to and refined, to include its scope as global in reach. Eventually including electronic/computer research facilities at universities.

Its but a small step from there, to turn this massive global "party line" loose on the unsuspecting public. With the plan being all along to eavestrough and sift all data on the system. The only thing that crimped their style was the depth of software and amount of memory in use at the time. That is no longer a concern. 

George Orwell would be proud. Welcome to 1984. Remember that old Apple commercial?

london bridge is falling down... falling down...  

Sat, 06/22/2013 - 20:04 | Link to Comment James_Cole
James_Cole's picture

To put bonesaw, prism etc. into perspective (not to mention the whole NSA + friends) they were beaten by a guy with a bomb in his underwear, a guy who locked his keys in his getaway car and two guys with a pressure cooker. 

Lot of money, questionable ROI

Just saying...

Sat, 06/22/2013 - 20:30 | Link to Comment DaddyO
DaddyO's picture

So it would seem that the higher tech they go in an effort to undermine and control, the lower tech the response should be, right?

DaddyO

Sat, 06/22/2013 - 20:54 | Link to Comment nmewn
nmewn's picture

That would be correct in my estimation.

All they know is I used a credit card for a hotel on Jax Beach, I could show up there tomorrow and drive to Augusta and back (in a rental under an assumed or accomplice name) and they're sittin around with their thumb in their ass watching my door on the hall camera.

Or...the hotel could be a target.

Gosh, I really hate DICTATING to the governments "resources" like this but if you're going to target me, you better pack a lunch.

Sat, 06/22/2013 - 21:29 | Link to Comment GoinFawr
GoinFawr's picture

YOu ain't 'skeered' though... 'cuz bravery, or something. lol

Sun, 06/23/2013 - 04:13 | Link to Comment Prometheus418
Prometheus418's picture

Let me take this one, nmewn, if I may-

At this point, "bravery" is depreciated and irrelevant.  The concept has been broadened to the point where it no longer has any meaning.  The same can be said of the concepts of heroism and patriotism.  All three words can be unironicallty applied to a person who has contracted a disease, lost the genetic lottery, or has been hit in the head with a hammer at this point.

I think know nmewn's stance, and stand next to him.  I'm brave-ish, sometimes, and I believe that actions tell the real tale that words can't.  I also speak truth, and refuse to nobly tilt at windmills that will kill me out of some misguided sense of justice.

What I do, and what I believe, is not born of some misguided sense of machismo, and if I may, I would include nmewn in this.  What I offer is a brutal and unvarnished truth in a place that may or may not reach the ears of the king we are not allowed to identify.  I honestly don't know where else to post it- it's just a silent scream into an infinite and deaf void.

I don't want "the man" to send his lackeys to kill me and mine- but they're doing it already through inflation and asset depreciation in a way that is virtually impossible to counter.  When I scream, it is both a maneuver and not a maneuver- it is an earnest plea for mercy from those who try so hard to kill us, as well as a warning.  I am clearly and unequivocally stating that their actions have broken the rule of law, and I feel no obligation to continue to abide by the set of standards that I was raised to observe.

I don't say what I do from a place of bravery.  I say what I say from a place of real desperation, and an honest wish to see either resolution or death.  Let me go on record as the man who said that if this is the new world order, then I am not on-board, and I would rather die.

Do you hear me, masters?  I have, clearly, publicly and unequivocally stated that I offering you the right to try to end my life.  If what we have now is a preview of what is to come, I would much rather die than produce, so do not ask it of me.  That's not bravery- I will not maintain a stiff upper lip as I Keep Calm and Carry On. I'm spent, and if you want more, you can make it for yourselves.  There is no place at your table for me and mine, and the places outside your banquet halls have been made desolate.

Understand that I am a member of the second-tier.  The men who actually turned your cranks and pressed your buttons in the fourth and fifth tiers left you ages ago.  They had neither chance nor hope, and knew it.  Men like me built trust and kept them coming back, but those days are ending.  In this new order, we encourage those men to leave us and be free.

There is no nobility or bravery in letting the world end, but it needs a reset.  What I know, and what I believe nmewn knows, is that that reset is inevitable.  Bravery does not force you to grasp the seats of a sinking boat, instinct does.  The realisation that your death-grip changes nothing frees a man in a way that no edict ever could.

I can't claim bravery.  All I can say is that my murder has freed me.  Why be scared when you are already dead?

Sun, 06/23/2013 - 07:04 | Link to Comment nmewn
nmewn's picture

Thats right. They prey on everyones fears.

“A coward dies a thousand times before his death, but the valiant taste of death but once."

Fear of sickness, fear of death, fear of hunger, of being poor, of being homeless, of being attacked. It was once enough just to say leave me be, I'm injuring no one by living my life...and they understood what you meant and slunk away, back into the shadows.

Now we must demand it.

Sun, 06/23/2013 - 11:16 | Link to Comment GoinFawr
GoinFawr's picture

oh you sweet talkers always make me go a big rubbery one.

Sat, 06/22/2013 - 21:15 | Link to Comment Dewey Cheatum Howe
Dewey Cheatum Howe's picture

There is always blind spots in any surveillance system. There are too many hands in the cookie jar also so to speak, plenty of opportunities for the ball to be dropped and plenty of snake oil be peddled by contractors that government employees running said contracts have no background in the tech end of the stuff be peddled as gold but is really snake oil. You can procedure things to death but you are only as good as your weakest links and there are plenty of them in a large bloated entity. There is a difference between being able to calculate Pi to 10^105 decimal place and knowing if calculating it to the 10^105 has any real practical application towards the mission. No shortage of wasted man power and money on these sort of things.

Sun, 06/23/2013 - 01:01 | Link to Comment Bringin It
Bringin It's picture

Dewey - consider the lens they're using.  First they find you, for one unpleasant [for them] reason or another, then they turn on the prism so to speak and see who analysis of your accumulated electronic footprints indicate you are.  Why do you think they have people click all day what they like and don't like?

In the case of whistle blower Mordecai Vanunu, In London, waiting to meet with more newspaper reporters, something like his perfect dream date showed up and he could not turn the opportunity down. 

Next thing he new, he was being bundled into a plane in Rome.

Sun, 06/23/2013 - 14:17 | Link to Comment Herd Redirectio...
Herd Redirection Committee's picture

What do I like?   Blondes, brunettes, Latinas, skinny, not so skinny, Persian, Italian, Brazilian, Swedish...

Sat, 06/22/2013 - 21:22 | Link to Comment booboo
booboo's picture

God laughs at them, he knows the number of hairs on the Generals ass, beat that one ya four star ass clown.

Sat, 06/22/2013 - 23:24 | Link to Comment Spanky
Spanky's picture

+1

Way to go, DaddyO. Cut the power, then what?

Sat, 06/22/2013 - 21:22 | Link to Comment spankfish
spankfish's picture

JC says: To put bonesaw, prism etc. into perspective (not to mention the whole NSA + friends) they were beaten by a guy with a bomb in his underwear, a guy who locked his keys in his getaway car and two guys with a pressure cooker. 

Lot of money, questionable ROI

I would say priceless for the enslavement of free people everywhere by TPTB.

Sat, 06/22/2013 - 21:59 | Link to Comment Lost Word
Lost Word's picture

False Flag, Inside Job, no need to report it to the Police authorities.

Sat, 06/22/2013 - 23:36 | Link to Comment Go Tribe
Go Tribe's picture

They are likely no better at their game than Bernanke is at his. There must be a lot of dissonance around this supposed capability. It is awesome in scale but just how effective in practice?

Sun, 06/23/2013 - 00:44 | Link to Comment Bringin It
Bringin It's picture

It's working great.

consider the true purpose.

Sun, 06/23/2013 - 00:43 | Link to Comment Bringin It
Bringin It's picture

Right.  Now consider the true purpose.

The true purpose is control.

Sun, 06/23/2013 - 02:23 | Link to Comment Ocean22
Ocean22's picture

Unless they wanted those things to occur.

Sat, 06/22/2013 - 22:15 | Link to Comment Freebird
Freebird's picture

it has to be said to this scary shit...Bonesaw Bitchez

Sat, 06/22/2013 - 20:00 | Link to Comment SafelyGraze
SafelyGraze's picture

not to forget the cyberattacks on the medical complex

all those networked computer-controlled hospitals and robotic surgery devices and patient monitoring systems

it would be a pity of you were sharing a suite with one of the bad guys

Mon, 06/24/2013 - 01:52 | Link to Comment faroffthunder
faroffthunder's picture

Or maybe Pervert Supreme.

Sat, 06/22/2013 - 19:09 | Link to Comment tnquake
tnquake's picture

Back in the day we played Tonk

Probably don't want to let that secret out!

Sat, 06/22/2013 - 20:06 | Link to Comment Mr. Mandelbrot
Mr. Mandelbrot's picture

ZH, I love you.  I've got gold, cash, property, and most of all awareness, BUT this article disturbs me to the core.  I'm thinking about laying off of you for my emotional well-being . . .

Sat, 06/22/2013 - 20:32 | Link to Comment DaddyO
DaddyO's picture

The mere fact that you wrote it out means the intelligence apparatus predicted you would do so 8 months, 12 days and 4 hours ago.

They've been waiting on you for a while now...

DaddyO

 

Sat, 06/22/2013 - 23:23 | Link to Comment logically possible
logically possible's picture

Really, gets aggravating, when you feel you don't have any freedom of speech anymore, I also may have to go back grazing with the sheeple.

Sun, 06/23/2013 - 00:29 | Link to Comment BoNeSxxx
BoNeSxxx's picture

I know how you feel.  I went to go see World War Z tonight and there was a scene where they showed a bunch of military guys carting the Constitution out of D.C. (ostenibly to save and preserve it as D.C. fell to the zombies).

My initial thought was, 'why bother? - it's not like we're using it anymore'

Sun, 06/23/2013 - 07:05 | Link to Comment Go Tribe
Go Tribe's picture

Son came back from his 8th grade trip to DC and reported that the Declaration of Independence is hardly legible anymore,it's so faded. I guess now the gov can delete all copies of the Declaration and at some point no one will know what it was.

Sun, 06/23/2013 - 15:46 | Link to Comment Al Gorerhythm
Al Gorerhythm's picture

That observation is straight out of the kids movie; "Never Ending Story". The vanishment of knowledge through lack of reading; the accelerating encroachment of darkness.

Sun, 06/23/2013 - 03:23 | Link to Comment G-R-U-N-T
G-R-U-N-T's picture

"However, and more importantly, what Snowden's revelations have confirmed, is that behind the scenes, America is now actively engaged in a new kind of war:"

Not a new kind of war (save technological advances), this war has been waged from days of old many times before, a war of Statism as socialism collapses (AGAIN) before the worlds eyes and the final stand and historical eventual outcome so testifies is war declared on their own people! Simply put the political establishment ingratiates itself on power and control and the unwillingness to give it up to effect change. They will, indeed burn the village in their attempts to save it sacrificing every Constitutional tenant that our brave Forefathers and our warriors fought so valiantly and heroically to preserve!

You see they think that we are their property willing to sacrifice us, their own fellow countrymen freedoms and liberties under the guise of terrorism, but in reality they need the data to hunt down revenue:  http://www.globalpost.com/dispatch/news/regions/europe/united-kingdom/13... because they need to feed their sick ass anti-economically dense bureaucratic beast they know they can't sustain.

Civil unrest is bubbling up all over the world because of the once again failure of idiotic socialist (Statist) policy and the residue is always dictatorship and destruction, soon to be coming to American shores.

 

 

Sun, 06/23/2013 - 04:27 | Link to Comment SHRAGS
SHRAGS's picture

PRISM has already pulled your globalpost link, its OK, google webcache is still your friend globalpost.com: G8 leaders agree to clamp down on money laundering and tax evasion

Sun, 06/23/2013 - 09:15 | Link to Comment G-R-U-N-T
G-R-U-N-T's picture

Indeed, Shrags, they're into everything, very disturbing! Thanks again for the heads up!

Sun, 06/23/2013 - 10:49 | Link to Comment Wile-E-Coyote
Wile-E-Coyote's picture

So the NSA can kill our computers any time and blame it on someone else, a great way to start a war.

Sat, 06/22/2013 - 18:50 | Link to Comment HelluvaEngineer
HelluvaEngineer's picture

So sorry, left this out of my original post.  Perhaps inferred by the article but not explicit, all of the commercial OS manufacturers (think MS, Apple) have almost assuredly put backdoors into all of these systems.  In other words, determine that the target is running Win7, then attack the intentional exploits of the system.  Ain't Corporatocracy grand?

It's hacking with zero effort.  On that note, "Carnivore" and other stories are likely pure fiction.

Sat, 06/22/2013 - 19:26 | Link to Comment geekgrrl
geekgrrl's picture

They could not do all these things in software alone. There are only a few companies that supply the vast majority of processors and network devices. How many people have access to the masks used to make the integrated circuits, and how many people would be able to reverse-engineer them to deduce what's actually there? I'm aware of research that was focused on getting data out of processors using very unconventional methods that would be impossible to detect by software, and was of the impression that this was ID kind of information. Even if conventional methods are used, it would be super easy to add all sorts of doors that would be impossible to remove. It might be possible to trap certain conditions in software if the public was made aware, but this kind of secret would be so valuable that only a select few would even know about it, and it would be classified well-above top secret. 

 

Sat, 06/22/2013 - 19:51 | Link to Comment LetThemEatRand
LetThemEatRand's picture

Is there a processor in existence in a machine post-2005 that does not have mainland China components?  How Giddy is Mao now?

Sat, 06/22/2013 - 20:06 | Link to Comment geekgrrl
geekgrrl's picture

https://en.wikipedia.org/wiki/List_of_Intel_manufacturing_sites

One Intel fab in China as of 2010. I am almost certain that samples are taken from every lot, the plastic case is dissolved, and the chips are examined under high power microscopes to ensure no extra goodies have been added.

Also interesting is that Israel has a fab. Want to bet those parts go to the middle east?

Sat, 06/22/2013 - 20:12 | Link to Comment LetThemEatRand
LetThemEatRand's picture

I will preface this with "I don't know just asking."

Is this like how my lawnmower is made in the USA?  It may be assembled here, but critical components are made elsewhere.  Any source other than WikiCIA?

Sat, 06/22/2013 - 20:28 | Link to Comment James_Cole
James_Cole's picture

No, processors are only made by a few companies and then only a couple real competitors - intel and amd. The only components that really matter are all made in the fabs and can't be done elsewhere. 

Also, the China plant makes the older chips. 

Sat, 06/22/2013 - 20:44 | Link to Comment geekgrrl
geekgrrl's picture

Exactly. Intel and AMD.

I wasn't aware China made the older chips, but it doesn't matter. Every lot is still examined. It's not that hard to do for major corporations. The place I'm working currently has these capabilities, and there is no doubt that any corp with a fab can do so as well. Just need some nitric acid and a high power microscope. The comparison can be done using image comparison techniques that have been around for 20 years.

And yea, the rest of the components don't matter, but I suspect similar techniques are used in network ICs. MAC addresses of ethernet devices are already hardware programmed, so every internet device has a unique code programmed into it by design.

Sat, 06/22/2013 - 21:14 | Link to Comment James_Cole
James_Cole's picture

If intel was involved it would be possible, but totally impossible without their compelete co-operation and partnership. 

And considering every country uses intel chips I'd think it unlikely..

Would be great for the NSA if they were running Intel lol

All your computer systems are belong to us. 

Sat, 06/22/2013 - 21:33 | Link to Comment geekgrrl
geekgrrl's picture

"And considering every country uses intel chips I'd think it unlikely.."

Would you? I'd think it to be by-design.

Sat, 06/22/2013 - 21:44 | Link to Comment James_Cole
James_Cole's picture

I'm sure they'd love to, but logic suggests that if they had that sort of ubiquitous control over the vast majority of computer systems in the world you'd see a much different online landscape. 

And that kind of secret would get out. If not to the public definitely to a superpower like China.  

Sat, 06/22/2013 - 21:55 | Link to Comment geekgrrl
geekgrrl's picture

The truth about 9/11 has not yet got out, so I am less than sanguine about the possibilty that something much less in-your-face would ever be recognized unless a whistleblower came forward.

But the reality is that I can block them from knowing all sorts of things about me through the use of software. What this story tells me is that they have a deeper, more fundamental means of accessing our computers and communications, and it's fairly obvious that the only way to accomplish this would be via hardware methods.

Sun, 06/23/2013 - 07:02 | Link to Comment mvsjcl
mvsjcl's picture

The truth is out, but it's hard to get people with fingers in their ears to listen to it.

Tue, 06/25/2013 - 07:03 | Link to Comment geekgrrl
geekgrrl's picture

Skeletor speaks.

Sat, 06/22/2013 - 21:55 | Link to Comment Matt
Matt's picture

The backdoors do not need to be in the CPU. There are lots of little chipsets on a motherboard, the GPU, in the hard drive controller, heck even inside the mouse and keyboard, since most devices are USB and store a copy of the drivers on the device itself, to make Plug'N'Play convenient. 

FoxConn makes a large portion of all kinds of devices.

Sat, 06/22/2013 - 22:02 | Link to Comment Ident 7777 economy
Ident 7777 economy's picture

 

 

" There are lots of little chipsets on a motherboard, "

 

HANDLING SUPPORT functions, not decision or compare functions ... they cannot initiate a task in the processor exc to some pre-programmed exception upon completion of an assigned funciton (e.g. the numeric coproprocessor used to do)

 

What does "CPU" stand for again?

 


Sat, 06/22/2013 - 22:19 | Link to Comment geekgrrl
geekgrrl's picture

True enough, but I can easily imagine things like programmable self-destruct, etc.

Sun, 06/23/2013 - 00:53 | Link to Comment Matt
Matt's picture

The CPU processes. it does not store any programs when you turn the machine off*

* in general

Every little thing on your computer, smartphone, etc has drivers that get loaded into the operating system. Hard Drives, as an ultra competitive field, have been purely proprietary for a long time; information on how a hard drive works is based off old washing machine sized drives from way back. Plenty of opportunity to bury all kinds of things in there.

The internet was built by DARPA, and they made functions like Finger, Whois, etc. Just because those functions have been removed / blocked to prevent everyone else from using them, does not mean the US military / NSA does not have the ability to use those functions.

Remember, from the article, all we are talking about using using IP to determine physical location, and then determining what processes are running, what versions of software are installed, and checking for vulnerabilities and any known malware present.

Sat, 06/22/2013 - 22:05 | Link to Comment geekgrrl
geekgrrl's picture

No argument here. I'm sure there are many other "bugs" that permit backdoor entrance. But if you want to be able to do what the NSA claims they can do, then the easiest way to do that is to create doors in the hardware that everyone uses.

Sat, 06/22/2013 - 23:18 | Link to Comment Skateboarder
Skateboarder's picture

Not much you can do if your CPU physically comes with a 'call home' function that's always on.

Sat, 06/22/2013 - 21:13 | Link to Comment LetThemEatRand
LetThemEatRand's picture

Thanks James and Geekgrrl for the response.

Sat, 06/22/2013 - 21:50 | Link to Comment Ident 7777 economy
Ident 7777 economy's picture

 

" I wasn't aware China made the older chips, but it doesn't matter. Every lot is still examined.  "

 

Probably an automated optical compare as part of the manufacturing prrocess; EVERY die gets a quick, but thorough visual comparing against the top-level mask before routing to electrical test (which takes a lot more time, and maybe even mounting the die and bond out to the usual IC package used) 

Sat, 06/22/2013 - 20:44 | Link to Comment DaddyO
DaddyO's picture

And all the backdoors are already in place so the snoopng can continue.

Jacob Applebaum spoke somewhere and asked the people who had input in the designing of these things to stop with the backdoors already..

Daddyo

Sat, 06/22/2013 - 21:18 | Link to Comment geekgrrl
geekgrrl's picture

Let me put it this way. I don't have the statistics handy, but the vast majority of fabs are not in the US. There are a lot of experimental labs in the US, but for production facilities, there are many more in Asia. They make all sorts of commodity chips. Things like interface ICs, memory, analog, digital logic, etc. None of these are particularly special, and few lend themselves to this sort of ID fetish.

But processors and network ICs are special. They are the "brains" and the "means of communication" of the computer network, and as such, are key if one is interested in control. These are devices that permit the government (and BTW, anyone else who can get access) to identify you uniquely, read the contents of your drives, and take over your machine if they so desire.

To me, it raises the question of why so many Intel fabs are in the US. Could it be because the US government has a vested military interest in keeping control of hardware, granting them direct access to any machine in the world?

Sat, 06/22/2013 - 21:36 | Link to Comment James_Cole
James_Cole's picture

To me, it raises the question of why so many Intel fabs are in the US. Could it be because the US government has a vested military interest in keeping control of hardware, granting them direct access to any machine in the world?

My guess would be because it's highly specialized advanced research involving big teams. Not very easy to move that around and remain constantly releasing new chips on an exponential scale. 

The other chips, sure those could be manufactured anywhere. 

Sat, 06/22/2013 - 21:47 | Link to Comment geekgrrl
geekgrrl's picture

Please James, spare me.

It is commonplace for chips to be designed in the US and manufactured half a world away. I myself worked on a chip that was manufactured in Austria, and there was no difficulty with that arrangement. I even went there once. Very nice place.

The question is: why are the fabs in the US, not the design teams. Surely it would be cheaper to send all the lines to China, would it not?

Sat, 06/22/2013 - 21:58 | Link to Comment Ident 7777 economy
Ident 7777 economy's picture

 

 

 

" The question is: why are the fabs in the US, not the design teams ..."

 

You have things reversed, except for perhaps commodity chips ...

Sat, 06/22/2013 - 21:58 | Link to Comment Matt
Matt's picture

As more and more is built by machines, cheaper labor becomes a less important factor. I remember a discussion about this a few years ago, and one of the big companies, maybe even Intel, said that the environmental regulations in America would add billions to the cost of building a fab here, so that's why they had to go overseas.

If you get a waiver on those regulatory compliance costs, suddenly it becomes pretty competitive to make chips here. 

Sat, 06/22/2013 - 22:08 | Link to Comment James_Cole
James_Cole's picture

Yeah, not 22nm chips I'm guessing, that's a select group. 

Surely it would be cheaper to send all the lines to China, would it not?

Not currently it doesn't seem, Intel USA 22nm microprocessors are still unparralleled in the world I believe. 

My sibiling is doing research on quantum optics for this type of application in Europe, one of (literally) a handful of people in the world in that field more or less building the tech fresh. Can't just come up with a 14nm chip and and run over to china get a million built.

Sat, 06/22/2013 - 22:30 | Link to Comment geekgrrl
geekgrrl's picture

Most of the Intel fabs are not doing state-of-the-art stuff, so this again deflects from the question, which is why are so many Intel fabs in the US? Again, I think it's fair to suggest that there is military significance.

As it is, many commercial off the shelf (COTS) components from China are counterfeit, and since DOD uses COTS parts, this means bogus parts are probably going into military systems. There is little doubt in my mind that a high-level strategic decision was made to keep the majority of processor tech and fab in-house, and leverage that by building-in NSA back doors. There has been talk about Intel and the NSA in the past, so I really don't think this is such a controversial idea.

Sat, 06/22/2013 - 22:39 | Link to Comment James_Cole
James_Cole's picture

Most of the Intel fabs are not doing state-of-the-art stuff, so this again deflects from the question, which is why are so many Intel fabs in the US?

They are initially, doesn't make sense to close them down a year or two later when the big costs are upfront. 

As it is, many commercial off the shelf (COTS) components from China are counterfeit, and since DOD uses COTS parts, this means bogus parts are probably going into military systems.

That's not a question it's already proven, so you're right on that one!

There is little doubt in my mind that a high-level strategic decision was made to keep the majority of processor tech and fab in-house, and leverage that by building-in NSA back doors. 

I'm sure that's a consideration when Intel is looking for subsidies and other reasons, but it's a big stretch to go from that to NSA is calling the shots at Intel. Not in the sense that they're compliant but NSA would literally have to be involved with every step of the design / manufacture. Bridge too far for me for many reasons. 

Extraordinary claims require extraordinary evidence!

Sat, 06/22/2013 - 22:53 | Link to Comment geekgrrl
geekgrrl's picture

Na, the mask changes would be minimal. Very easy to do. Of course, I don't have direct evidence, but circumstantially, I again contend that if the NSA can do what they claim, it can only be done via hardware methods.

Really, this idea just popped into my head after reading this article, a sort of aha! moment. Take it for what it's worth. We did, however, recently learn that Alexander has some difficulty discerning the difference between the ability to do something and being authorized to do it. All indications are that after 9/11 the gloves came off, and they've been running roughshod over the Constitution ever since.

Sat, 06/22/2013 - 23:04 | Link to Comment James_Cole
James_Cole's picture

Well there's a few obvious holes, why are they asking for backdoor access from all these compnanies like facebook? 

And the amount of evil brilliance that it would take to perpetuate this conspiracy for so long, tough to imagine. Thinking of that AT&T incidence where they had that locked room with all the wiring going into it, it was hilarious. The guy working there immediately suspected something and then they left top secret PHYSICAL documents all over the place saying exactly what they were up to. 

They seem to have more in common with the keystone cops than Ozymandias. 

Sat, 06/22/2013 - 23:43 | Link to Comment geekgrrl
geekgrrl's picture

That's a good counter-argument. On the other hand, there have long been stories of companies like Cisco and questions of hardware and firmware backdoors, secret accounts that once you know them, you can access any similar device. Same with Linksys.

One possible reason for the governement requests is that the big corps are already aware of the security holes and they have closed them - as would anyone if they were privy to that knowledge. As we have seen, corporations can buy access to the same security vulnerabilities that governments do. That doesn't protect you and me, but it does mean the government has to ask for access, creating a quid pro quo where corporations are able to apply pressure to further their corporate aims. You know, one of those public-private partnerships where they team up to fuck the public.

Sun, 06/23/2013 - 14:59 | Link to Comment geekgrrl
geekgrrl's picture

A very brief search turned up this interesting tidbit. Dated April 15 2013, it explicitly states major corporations, including Intel, are now formally partnered with the US government on issues regarding cybersecurity.

"In recognition of the critical need to protect private-sector intellectual property and other valuable business data from a growing number of cyber threats 11 major companies have formally established partnerships with the National Cybersecurity Center of Excellence (NCCoE). U.S. Senator Barbara Mikulski, U.S. Cyber Command Commander/National Security Agency (NSA) Director General Keith B. Alexander, Maryland Governor Martin O’Malley, Montgomery County Chief Executive Isiah Leggett and Under Secretary of Commerce for Standards and Technology and NIST Director Patrick Gallagher joined the new partners for a signing ceremony today at the NCCOE’s facilities in Rockville, Md.

The center, a public-private partnership hosted by the U.S. Commerce Department’s National Institute of Standards and Technology (NIST), works with industry, academic and government experts to find practical solutions for businesses’ most pressing cybersecurity needs. The NCCoE was formed through a Memorandum of Understanding between the state of Maryland, Montgomery County and NIST.

At the ceremony, representatives from the new partner companies – Cisco Systems Inc., Hewlett-Packard, HyTrust Inc., Intel Corp., McAfee Inc., Microsoft Federal Civilian Services, RSA, Splunk Inc., Symantec Corp., Vanguard Integrity Professionals and Venafi Inc. – pledged to contribute hardware and software components and share best practices and personnel with the center.

“Cybersecurity is one of the toughest technical challenges facing the nation today,” said Under Secretary Gallagher. “NIST looks forward to working with these top private-sector companies and our state and federal partners in Maryland to help the National Cybersecurity Center of Excellence jumpstart its work to better protect our vital IT infrastructure and business information.”

 

Sat, 06/22/2013 - 21:55 | Link to Comment Ident 7777 economy
Ident 7777 economy's picture

 

 

" and network ICs are ..."

 

Do you know what a "protocol stack" is?

 

You are portending to know more than you do ...

 

 

Sat, 06/22/2013 - 21:47 | Link to Comment Ident 7777 economy
Ident 7777 economy's picture

 

 

 

They could not do all these things in software alone. "

 

And why not (before I call BS)?

 

ANYTHING can be done at low-level (assembly language) programming where you are not making pre-canned OS API calls ...

 


Sat, 06/22/2013 - 22:01 | Link to Comment geekgrrl
geekgrrl's picture

Hardware trumps software. You can only invoke opcodes you know about, yes?

Sat, 06/22/2013 - 22:13 | Link to Comment Ident 7777 economy
Ident 7777 economy's picture

 

 

You don't know what the hell you are talking about.

 

YOUR whole premise is that some foreign fab is going to hand code additional IC silicon or (Si-Ge) for a back door ... like the ppl doing this have all the raw LOGIC equations that define that chip!

 

Got news for ya, all you need to make chips is MASKWORK (masks, various level masks for etch and ion implantation and such.) They aren't going to have info about what part is Bus A or opcode decoder lookahead function B ...

 

They aren't building your Dad's Z80A these days ...

 

 

Sat, 06/22/2013 - 22:14 | Link to Comment geekgrrl
geekgrrl's picture

That wasn't my premise. My premise is that IF the NSA can do what this article suggests, then it cannot be done through software methods alone. There are a number of ways to spoof hardware and software, but again, this article seems to suggest a method that bypasses all the normal methods, and to my mind, that says secret hardware methods.

I'm sorry this idea is disturbing to you, but I think it is a reasonable question. Maybe you should have a drink and relax a bit?

Sat, 06/22/2013 - 22:22 | Link to Comment Ident 7777 economy
Ident 7777 economy's picture

 

Again, this ain't your Dad's Z80 or a Microchip 16F800 (or follow-on) series with the 'lock' bit set ... trivial H/W cracks to get into those.

 

At this point, you're just throwing 'ink at the wall' ...

Sat, 06/22/2013 - 22:28 | Link to Comment James_Cole
James_Cole's picture

That's not what she's saying though, she's saying NSA has co-opted Intel. 

The evidence being that all the important FABs are in the US.

Not agreeing with her, just pointing it out.  

Also, funny to see such a nerdy argument on zh.

Sat, 06/22/2013 - 22:47 | Link to Comment giddy
giddy's picture

..ummmm...you guys lost the crowd about 20 comments back... interesting though...thanks...

Sat, 06/22/2013 - 23:10 | Link to Comment geekgrrl
geekgrrl's picture

Co-opted? No. They're the best of buds.

You are practically asking us to believe Intel and NSA don't even know each other. That's beyond naive.

I am familiar with the history of fabs in the US, and know that for many years, companies like TRW were producing solely for the military. They were considered companies with national security significance. Since most of the world uses Intel, all it would take is a single door. That is just way too tempting for me to believe it has not already been done.

Sat, 06/22/2013 - 21:28 | Link to Comment spankfish
spankfish's picture

Think Hacking Team and their software.  Totally undetectable when installed on the target machine... which is easy to do.

Sat, 06/22/2013 - 22:42 | Link to Comment dark pools of soros
dark pools of soros's picture

I just put endless porn on my machine so whoever is snooping will forget about what they were looking for

 

Sat, 06/22/2013 - 23:21 | Link to Comment Skateboarder
Skateboarder's picture

You are a gentleman and a scholar.

Sat, 06/22/2013 - 18:51 | Link to Comment sgt_doom
sgt_doom's picture

The Law of the Land

The US government has officially invoked the Espionage Act in response to whistleblower Edward Snowden’s leaks of the massive and continuing violation by the NSA of the National Security Act, plus federal court rulings over the last few years, as well as portions of the onerous USA PATRIOT Act.

We are constantly bombarded with the disingenuous drivel about our country being “a nation of laws,” yet consistently we see that the laws are selectively applied against the enemies of the plutocrats or overclass!

Under existing laws, and after both the public admissions and public lies uttered by the Director of National Intelligence, Gen. James Clapper and the NSA Director Gen. Alexander, the immediate arrests of these two culprits should be undertaken.

Not to arrest Clapper and Alexander is in complete contradistinction of existing law.

To fully uphold the aforementioned laws, impeachment proceedings should commence against President Obama, Vice President Biden and Attorney General Holder, along with the arrests of previous federal lawbreakers, Donald Rumsfeld, George W. Bush, Dick Cheney and Roberto Gonsales.

Obviously, as these actions aren’t underway, America is not a nation of laws, and any such proclamation is blatantly fictional!

Just as President Obama has repeatedly stood before the American people and brazenly and falsely proclaimed that the banksters broke no laws (perhaps one should say his banksters, since he is in their pocket?), his administration once again flaunts those very laws he has sworn an oath to uphold (and claims to understand).

Lawlessness rules across America, with the overclass making the rules.

Since the passage of the national defense legislation in 2006, during the Bush administration, which exempted the Department of Defense (Pentagon) from Freedom of Information Requests (FOIA), and the NSA comes under the purview and provenance of the DoD, the only possible way to ascertain when the NSA is breaking federal laws is when a whistleblower, such as Mr. Snowden, comes forward.

Obama’s holy war on whistleblowers continues unabated!

Sat, 06/22/2013 - 19:08 | Link to Comment JoeSexPack
JoeSexPack's picture

Well done.

Sat, 06/22/2013 - 22:41 | Link to Comment Freebird
Freebird's picture

yes...nice

Sat, 06/22/2013 - 19:35 | Link to Comment smlbizman
smlbizman's picture

The declared National Emergency of March 9, 1933 amended the War Powers Act to include the American People as enemies:

"In Title 1, Section 1 it says: The actions, regulations, rules, licenses, orders and proclamations heretofore or hereafter taken, promulgated, made, or issued by the President of the United States or the Secretary of the Treasury since March 4, 1933, pursuant to the authority conferred by subdivision (b) of section 5 of the Act of October 6, 1917, as amended, are hereby approved and confirmed." "Section 2. Subdivision (b) of section 5 of the Act of October 6, 1917, (40 Stat. L. 411), as amended, is hereby amended to read as follows: emergency declared by the President, the President may, through any agency that he may designate, or otherwise, investigate, regulate, or prohibit, under such rules and regulations as he may prescribe, by means of licenses or otherwise, any transactions in foreign exchange, transfers of credit between or payments by banking institutions as defined by the President, and export, hoarding, melting, or earmarking of gold or silver coin or bullion or currency, BY ANY PERSON WITHIN THE UNITED STATES OR ANY PLACE SUBJECT TO THE JURISDICTION THEREOF.

 


Do NOT follow this link or you will be banned from the site!