• Gold Money
    05/03/2016 - 11:35
    Crude oil time-spreads have completely dislocated from inventories. Historically, such dislocations have proved to be short lived. We expect that either spot prices will sell-off again or the back...

Meet The Man In Charge Of America's Secret Cyber Army (In Which "Bonesaw" Makes A Mockery Of PRISM)

Tyler Durden's picture




 

With his revelations exposing the extent of potential, and actual, pervasive NSA surveillance over the American population, Edward Snowden has done a great service for the public by finally forcing it to answer the question: is having Big Brother peek at every private communication and electronic information, a fair exchange for the alleged benefit of the state's security. Alas, without further action form a population that appears largely numb and apathetic to disclosures that until recently would have sparked mass protests and toppled presidents, the best we can hope for within a political regime that has hijacked the democratic process, is some intense introspection as to what the concept of "America" truly means.

However, and more importantly, what Snowden's revelations have confirmed, is that behind the scenes, America is now actively engaged in a new kind of war: an unprecedented cyber war, where collecting, deciphering, intercepting, and abusing information is the only thing that matters and leads to unprecedented power, and where enemies both foreign and domestic may be targeted without due process based on a lowly analyst's "whim."

It has also put spotlight on the man, who until recently deep in the shadows, has been responsible for building America's secret, absolutely massive cyber army, and which according to a just released Wired profile is "capable of launching devastating cyberattacks. Now it's ready to unleash hell."

Meet General Keith Alexander, "a man few even in Washington would likely recognize", which is troubling because Alexander is now quite possibly the most powerful person in the world, that nobody talks about. Which is just the way he likes it.

This is the partial and incomplete story of the man who may now be empowered with more unchecked power than any person in the history of the US, or for that matter, the world. It comes once again, courtesy of the man who over a year before the Guardian's Snowden bombshell broke the story about the NSA's secret Utah data storage facility, James Bamford, and whose intimate knowledge of the NSA's secrets comes by way of being a consultant for the defense team of one Thomas Drake, one of the original NSA whistleblowers (as we learn from the full Wired article).

But first, by way of background, here is a glimpse of Alexander's ultra-secretive kingdom. From Wired:

Inside Fort Meade, Maryland, a top-secret city bustles. Tens of thousands of people move through more than 50 buildings—the city has its own post office, fire department, and police force. But as if designed by Kafka, it sits among a forest of trees, surrounded by electrified fences and heavily armed guards, protected by antitank barriers, monitored by sensitive motion detectors, and watched by rotating cameras. To block any telltale electromagnetic signals from escaping, the inner walls of the buildings are wrapped in protective copper shielding and the one-way windows are embedded with a fine copper mesh. 

 

This is the undisputed domain of General Keith Alexander, a man few even in Washington would likely recognize. Never before has anyone in America’s intelligence sphere come close to his degree of power, the number of people under his command, the expanse of his rule, the length of his reign, or the depth of his secrecy. A four-star Army general, his authority extends across three domains: He is director of the world’s largest intelligence service, the National Security Agency; chief of the Central Security Service; and commander of the US Cyber Command. As such, he has his own secret military, presiding over the Navy’s 10th Fleet, the 24th Air Force, and the Second Army.

Schematically, Alexander's empire consists of the following: virtually every piece in America's information intelligence arsenal.

As the Snowden scandal has unfurled, some glimpses into the "introspective" capabilities of the NSA, and its sister organizations, have demonstrated just how powerful the full "intelligence" arsenal of the US can be.

However, it is when it is facing outward - as it normally does - that things get really scary. Because contrary to prevailing conventional wisdom, Alexander's intelligence and information-derived power is far from simply defensive. In fact, it is when its offensive potential is exposed that the full destructive power in Alexander's grasp is revealed:

In its tightly controlled public relations, the NSA has focused attention on the threat of cyberattack against the US—the vulnerability of critical infrastructure like power plants and water systems, the susceptibility of the military’s command and control structure, the dependence of the economy on the Internet’s smooth functioning. Defense against these threats was the paramount mission trumpeted by NSA brass at congressional hearings and hashed over at security conferences.

 

But there is a flip side to this equation that is rarely mentioned: The military has for years been developing offensive capabilities, giving it the power not just to defend the US but to assail its foes. Using so-called cyber-kinetic attacks, Alexander and his forces now have the capability to physically destroy an adversary’s equipment and infrastructure, and potentially even to kill. Alexander—who declined to be interviewed for this article—has concluded that such cyberweapons are as crucial to 21st-century warfare as nuclear arms were in the 20th.

 

And he and his cyberwarriors have already launched their first attack. The cyberweapon that came to be known as Stuxnet was created and built by the NSA in partnership with the CIA and Israeli intelligence in the mid-2000s. The first known piece of malware designed to destroy physical equipment, Stuxnet was aimed at Iran’s nuclear facility in Natanz. By surreptitiously taking control of an industrial control link known as a Scada (Supervisory Control and Data Acquisition) system, the sophisticated worm was able to damage about a thousand centrifuges used to enrich nuclear material.

 

The success of this sabotage came to light only in June 2010, when the malware spread to outside computers. It was spotted by independent security researchers, who identified telltale signs that the worm was the work of thousands of hours of professional development. Despite headlines around the globe, officials in Washington have never openly acknowledged that the US was behind the attack. It wasn’t until 2012 that anonymous sources within the Obama administration took credit for it in interviews with The New York Times.

 

But Stuxnet is only the beginning. Alexander’s agency has recruited thousands of computer experts, hackers, and engineering PhDs to expand US offensive capabilities in the digital realm. The Pentagon has requested $4.7 billion for “cyberspace operations,” even as the budget of the CIA and other intelligence agencies could fall by $4.4 billion. It is pouring millions into cyberdefense contractors. And more attacks may be planned.

Alexander's background is equally as impressive: a classmate of Petraeus and Dempsey, a favorite of Rumsfeld, the General had supreme power written all over his career progression. If reaching the top at all costs meant crushing the fourth amendment and lying to Congress in the process, so be it:

Born in 1951, the third of five children, Alexander was raised in the small upstate New York hamlet of Onondaga Hill, a suburb of Syracuse. He tossed papers for the Syracuse Post-Standard and ran track at Westhill High School while his father, a former Marine private, was involved in local Republican politics. It was 1970, Richard Nixon was president, and most of the country had by then begun to see the war in Vietnam as a disaster. But Alexander had been accepted at West Point, joining a class that included two other future four-star generals, David Petraeus and Martin Dempsey. Alexander would never get the chance to serve in Vietnam. Just as he stepped off the bus at West Point, the ground war finally began winding down.

 

In April 1974, just before graduation, he married his high school classmate Deborah Lynn Douglas, who grew up two doors away in Onondaga Hill. The fighting in Vietnam was over, but the Cold War was still bubbling, and Alexander focused his career on the solitary, rarefied world of signals intelligence, bouncing from secret NSA base to secret NSA base, mostly in the US and Germany. He proved a competent administrator, carrying out assignments and adapting to the rapidly changing high tech environment. Along the way he picked up masters degrees in electronic warfare, physics, national security strategy, and business administration. As a result, he quickly rose up the military intelligence ranks, where expertise in advanced technology was at a premium.

 

In 2001, Alexander was a one-star general in charge of the Army Intelligence and Security Command, the military’s worldwide network of 10,700 spies and eavesdroppers. In March of that year he told his hometown Syracuse newspaper that his job was to discover threats to the country. “We have to stay out in front of our adversary,” Alexander said. “It’s a chess game, and you don’t want to lose this one.” But just six months later, Alexander and the rest of the American intelligence community suffered a devastating defeat when they were surprised by the attacks on 9/11. Following the assault, he ordered his Army intercept operators to begin illegally monitoring the phone calls and email of American citizens who had nothing to do with terrorism, including intimate calls between journalists and their spouses. Congress later gave retroactive immunity to the telecoms that assisted the government.

 

In 2003, Alexander, a favorite of defense secretary Donald Rumsfeld, was named the Army’s deputy chief of staff for intelligence, the service’s most senior intelligence position. Among the units under his command were the military intelligence teams involved in the human rights abuses at Baghdad’s Abu Ghraib prison. Two years later, Rumsfeld appointed Alexander—now a three-star general—director of the NSA, where he oversaw the illegal, warrantless wiretapping program while deceiving members of the House Intelligence Committee. In a publicly released letter to Alexander shortly after The New York Times exposed the program, US representative Rush Holt, a member of the committee, angrily took him to task for not being forthcoming about the wiretapping: “Your responses make a mockery of congressional oversight.”

In short: Emperor Alexander.

Inside the government, the general is regarded with a mixture of respect and fear, not unlike J. Edgar Hoover, another security figure whose tenure spanned multiple presidencies. “We jokingly referred to him as Emperor Alexander—with good cause, because whatever Keith wants, Keith gets,” says one former senior CIA official who agreed to speak on condition of anonymity. “We would sit back literally in awe of what he was able to get from Congress, from the White House, and at the expense of everybody else.”

What happened next in Alexander's career some time in the mid 2000's, was Stuxnet: the story of the crushing virus that nearly destroyed the Iranian nuclear program has been widely documented on these pages and elsewhere, so we won't recount the Wired article's details. However, what was very odd about the Stuxnet attack is that such a brilliantly conceived and delivered virus could ultimately be uncovered and traced back to the NSA and Israel. It was almost too good. Still, what happened after the revelation that Stuxnet could be traced to Fort Meade, is that the middle-east, supposedly, promptly retaliated:

Sure enough, in August 2012 a devastating virus was unleashed on Saudi Aramco, the giant Saudi state-owned energy company. The malware infected 30,000 computers, erasing three-quarters of the company’s stored data, destroying everything from documents to email to spreadsheets and leaving in their place an image of a burning American flag, according to The New York Times. Just days later, another large cyberattack hit RasGas, the giant Qatari natural gas company. Then a series of denial-of-service attacks took America’s largest financial institutions offline. Experts blamed all of this activity on Iran, which had created its own cyber command in the wake of the US-led attacks. James Clapper, US director of national intelligence, for the first time declared cyberthreats the greatest danger facing the nation, bumping terrorism down to second place. In May, the Department of Homeland Security’s Industrial Control Systems Cyber Emergency Response Team issued a vague warning that US energy and infrastructure companies should be on the alert for cyberattacks. It was widely reported that this warning came in response to Iranian cyberprobes of industrial control systems. An Iranian diplomat denied any involvement.

 

The cat-and-mouse game could escalate. “It’s a trajectory,” says James Lewis, a cyber­security expert at the Center for Strategic and International Studies. “The general consensus is that a cyber response alone is pretty worthless. And nobody wants a real war.” Under international law, Iran may have the right to self-defense when hit with destructive cyberattacks. William Lynn, deputy secretary of defense, laid claim to the prerogative of self-defense when he outlined the Pentagon’s cyber operations strategy. “The United States reserves the right,” he said, “under the laws of armed conflict, to respond to serious cyberattacks with a proportional and justified military response at the time and place of our choosing.” Leon Panetta, the former CIA chief who had helped launch the Stuxnet offensive, would later point to Iran’s retaliation as a troubling harbinger. “The collective result of these kinds of attacks could be a cyber Pearl Harbor,” he warned in October 2012, toward the end of his tenure as defense secretary, “an attack that would cause physical destruction and the loss of life.”

Almost too good... Because what the so-called hacker "retaliations" originating from Iran, China, Russia, etc, led to such laughable outcomes as DDOS attacks against - to unprecedented media fanfare - the portals of such firms as JPMorgan and Wells Fargo, and as Wired adds, "if Stuxnet was the proof of concept, it also proved that one successful cyberattack begets another. For Alexander, this offered the perfect justification for expanding his empire."

The expansion that took place next for Alexander and his men, all of it under the Obama regime, was simply unprecedented (and that it steamrolled right through the "sequester" was perfectly expected):

[D]ominance has long been their watchword. Alexander’s Navy calls itself the Information Dominance Corps. In 2007, the then secretary of the Air Force pledged to “dominate cyberspace” just as “today, we dominate air and space.” And Alexander’s Army warned, “It is in cyberspace that we must use our strategic vision to dominate the information environment.” The Army is reportedly treating digital weapons as another form of offensive capability, providing frontline troops with the option of requesting “cyber fire support” from Cyber Command in the same way they request air and artillery support.

 

All these capabilities require a giant expansion of secret facilities. Thousands of hard-hatted construction workers will soon begin erecting cranes, driving backhoes, and emptying cement trucks as they expand the boundaries of NSA’s secret city eastward, increasing its already enormous size by a third. “You could tell that some of the seniors at NSA were truly concerned that cyber was going to engulf them,” says a former senior Cyber Command official, “and I think rightfully so.”

 

In May, work began on a $3.2 billion facility housed at Fort Meade in Maryland. Known as Site M, the 227-acre complex includes its own 150-megawatt power substation, 14 administrative buildings, 10 parking garages, and chiller and boiler plants. The server building will have 90,000 square feet of raised floor—handy for supercomputers—yet hold only 50 people. Meanwhile, the 531,000-square-foot operations center will house more than 1,300 people. In all, the buildings will have a footprint of 1.8 million square feet. Even more ambitious plans, known as Phase II and III, are on the drawing board. Stretching over the next 16 years, they would quadruple the footprint to 5.8 million square feet, enough for nearly 60 buildings and 40 parking garages, costing $5.2 billion and accommodating 11,000 more cyberwarriors.

 

In short, despite the sequestration, layoffs, and furloughs in the federal government, it’s a boom time for Alexander. In April, as part of its 2014 budget request, the Pentagon asked Congress for $4.7 billion for increased “cyberspace operations,” nearly $1 billion more than the 2013 allocation. At the same time, budgets for the CIA and other intelligence agencies were cut by almost the same amount, $4.4 billion. A portion of the money going to Alexander will be used to create 13 cyberattack teams.

In the New Normal, the CIA is no longer relevant: all that matters are Alexanders' armies of hackers and computer geeks.

But not only has the public espionage sector been unleashed: the private sector is poised to reap a killing (pardon the pun) too...

What’s good for Alexander is good for the fortunes of the cyber-industrial complex, a burgeoning sector made up of many of the same defense contractors who grew rich supplying the wars in Iraq and Afghanistan. With those conflicts now mostly in the rearview mirror, they are looking to Alexander as a kind of savior. After all, the US spends about $30 billion annually on cybersecurity goods and services.

 

In the past few years, the contractors have embarked on their own cyber building binge parallel to the construction boom at Fort Meade: General Dynamics opened a 28,000-square-foot facility near the NSA; SAIC cut the ribbon on its new seven-story Cyber Innovation Center; the giant CSC unveiled its Virtual Cyber Security Center. And at consulting firm Booz Allen Hamilton, where former NSA director Mike McConnell was hired to lead the cyber effort, the company announced a “cyber-solutions network” that linked together nine cyber-focused facilities. Not to be outdone, Boeing built a new Cyber Engagement Center. Leaving nothing to chance, it also hired retired Army major general Barbara Fast, an old friend of Alexander’s, to run the operation. (She has since moved on.)

 

Defense contractors have been eager to prove that they understand Alexander’s worldview. “Our Raytheon cyberwarriors play offense and defense,” says one help-wanted site. Consulting and engineering firms such as Invertix and Parsons are among dozens posting online want ads for “computer network exploitation specialists.” And many other companies, some unidentified, are seeking computer and network attackers. “Firm is seeking computer network attack specialists for long-term government contract in King George County, VA,” one recent ad read. Another, from Sunera, a Tampa, Florida, company, said it was hunting for “attack and penetration consultants.”

It gets better: all those anti-virus programs you have on computer to "make it safe" from backdoors and trojans? Guess what - they are the backdoors and trojans!

One of the most secretive of these contractors is Endgame Systems, a startup backed by VCs including Kleiner Perkins Caufield & Byers, Bessemer Venture Partners, and Paladin Capital Group. Established in Atlanta in 2008, Endgame is transparently antitransparent. “We’ve been very careful not to have a public face on our company,” former vice president John M. Farrell wrote to a business associate in an email that appeared in a WikiLeaks dump. “We don’t ever want to see our name in a press release,” added founder Christopher Rouland. True to form, the company declined Wired’s interview requests.

 

Perhaps for good reason: According to news reports, Endgame is developing ways to break into Internet-connected devices through chinks in their antivirus armor. Like safecrackers listening to the click of tumblers through a stethoscope, the “vulnerability researchers” use an extensive array of digital tools to search for hidden weaknesses in commonly used programs and systems, such as Windows and Internet Explorer. And since no one else has ever discovered these unseen cracks, the manufacturers have never developed patches for them.

 

Thus, in the parlance of the trade, these vulnerabilities are known as “zero-day exploits,” because it has been zero days since they have been uncovered and fixed. They are the Achilles’ heel of the security business, says a former senior intelligence official involved with cyberwarfare. Those seeking to break into networks and computers are willing to pay millions of dollars to obtain them.

Such as the US government. But if you thought PRISM was bad you ain't seen nuthin' yet. Because tying it all together is Endgame's appropriately named "Bonesaw" - what it is is practically The Matrix transplanted into the real cyber world.

According to Defense News’ C4ISR Journal and Bloomberg Businessweek, Endgame also offers its intelligence clients—agencies like Cyber Command, the NSA, the CIA, and British intelligence—a unique map showing them exactly where their targets are located. Dubbed Bonesaw, the map displays the geolocation and digital address of basically every device connected to the Internet around the world, providing what’s called network situational awareness. The client locates a region on the password-protected web-based map, then picks a country and city— say, Beijing, China. Next the client types in the name of the target organization, such as the Ministry of Public Security’s No. 3 Research Institute, which is responsible for computer security—or simply enters its address, 6 Zhengyi Road. The map will then display what software is running on the computers inside the facility, what types of malware some may contain, and a menu of custom-designed exploits that can be used to secretly gain entry. It can also pinpoint those devices infected with malware, such as the Conficker worm, as well as networks turned into botnets and zombies— the equivalent of a back door left open.

 

Bonesaw also contains targeting data on US allies, and it is soon to be upgraded with a new version codenamed Velocity, according to C4ISR Journal. It will allow Endgame’s clients to observe in real time as hardware and software connected to the Internet around the world is added, removed, or changed.

More on Bonesaw:

Marketing documents say “the Bonesaw platform provides a complete environment for intelligence analysts and mission planners to take a holistic approach to target discovery, reducing the time to create actionable intelligence and operational plans from days to minutes.”

 

Bonesaw is the ability to map, basically every device connected to the Internet and what hardware and software it is,” says a company official who requested anonymity. The official points out that the firm doesn’t launch offensive cyber ops, it just helps.

Back to Wired:

[S]uch access doesn’t come cheap. One leaked report indicated that annual subscriptions could run as high as $2.5 million for 25 zero-day exploits.

That's ok though, the US government is happy to collect taxpayer money so it can pay these venture capital-backed private firms for the best in espionage technology, allowing it to reach, hack and manipulate every computer system foreign. And domestic.

How ironic: US citizens are funding Big Brother's own unprecedented spying program against themselves!

Not only that, but by allowing the NSA to develop and utilize technology that is leaps ahead of everyone else  - utilize it against the US citizens themselves - America is now effectively war against itself... Not to mention every other foreign country that is a intelligence interest:

The buying and using of such a subscription by nation-states could be seen as an act of war. “If you are engaged in reconnaissance on an adversary’s systems, you are laying the electronic battlefield and preparing to use it,” wrote Mike Jacobs, a former NSA director for information assurance, in a McAfee report on cyberwarfare. “In my opinion, these activities constitute acts of war, or at least a prelude to future acts of war.” The question is, who else is on the secretive company’s client list? Because there is as of yet no oversight or regulation of the cyberweapons trade, companies in the cyber-industrial complex are free to sell to whomever they wish. “It should be illegal,” says the former senior intelligence official involved in cyber­warfare. “I knew about Endgame when I was in intelligence. The intelligence community didn’t like it, but they’re the largest consumer of that business.”

And there you have it: US corporations happily cooperating with the US government's own espionage services, however since the only thing that matters in the private sector is the bottom line, the Endgames of the world will gladly sell the same ultra-secret services to everyone else who is willing to pay top dollar: China, Russia, Iran...

in their willingness to pay top dollar for more and better zero-day exploits, the spy agencies are helping drive a lucrative, dangerous, and unregulated cyber arms race, one that has developed its own gray and black markets. The companies trading in this arena can sell their wares to the highest bidder—be they frontmen for criminal hacking groups or terrorist organizations or countries that bankroll terrorists, such as Iran. Ironically, having helped create the market in zero-day exploits and then having launched the world into the era of cyberwar, Alexander now says the possibility of zero-day exploits falling into the wrong hands is his “greatest worry.”

Does Alexander have reason to be worried? Oh yes.

In May, Alexander discovered that four months earlier someone, or some group or nation, had secretly hacked into a restricted US government database known as the National Inventory of Dams. Maintained by the Army Corps of Engineers, it lists the vulnerabilities for the nation’s dams, including an estimate of the number of people who might be killed should one of them fail. Meanwhile, the 2013 “Report Card for America’s Infrastructure” gave the US a D on its maintenance of dams. There are 13,991 dams in the US that are classified as high-hazard, the report said. A high-hazard dam is defined as one whose failure would cause loss of life. “That’s our concern about what’s coming in cyberspace—a destructive element. It is a question of time,” Alexander said in a talk to a group involved in information operations and cyberwarfare, noting that estimates put the time frame of an attack within two to five years. He made his comments in September 2011.

In other words, this massive cyberattack against the US predicted by "Emperor" Alexander, an attack in which as Alexander himself has said cyberweapons represent the 21st century equivalent of nuclear arms (and require in kind retaliation) whether false flag or real, is due... some time right around now.

0
Your rating: None
 

- advertisements -

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.
Sat, 06/22/2013 - 18:17 | 3682533 illyia
illyia's picture

Wow. Thanks, ZH.

++

Sat, 06/22/2013 - 18:30 | 3682568 HelluvaEngineer
HelluvaEngineer's picture

So, I used to think that about 60% of what Alex Jones says is true.  I'm currently reconsidering that percentage.

Sat, 06/22/2013 - 18:33 | 3682578 Stackers
Stackers's picture

Cyber attack on a power plant

 

https://www.youtube.com/watch?v=fJyWngDco3g

nuts

Sat, 06/22/2013 - 18:37 | 3682588 ACP
ACP's picture

This article forgot to mention the inevitable (additional) government waste. Every Friday in a secure location like this is poker day. Poker and JD, on the rocks.

Sat, 06/22/2013 - 18:50 | 3682605 LetThemEatRand
LetThemEatRand's picture

They prefer Crown Royal.  

Sat, 06/22/2013 - 19:14 | 3682650 El Oregonian
El Oregonian's picture

"Meet General Keith Alexander, "a man few even in Washington would likely recognize"

I think this cretin should be called General K. Hackenzander.

Sat, 06/22/2013 - 19:57 | 3682723 AldousHuxley
AldousHuxley's picture

"Secret"?

 

with the nazis it was a nuclear war (dominate bombs, dominate anything sitting on land)...steal german atomic scientists to make nukes

with the ruskies it was space war (dominate space, dominate skies which missiles travel)...beat sputnik with NASA

with chinese it is cyber war (dominate computers, dominate war machines and mass media)

 

your National Science Foundation (NSF) and National INstitute of Health (NIH) are offshoots of US military's

Office of Scientific Research and Development
Sat, 06/22/2013 - 20:00 | 3682730 DaddyO
DaddyO's picture

SKYNET, Bitches...

So who is gonna step up and be the modern John Connor? Is it Ed Snowden or some 13yr old hacker yet in his mother's basement?

DaddyO

Sat, 06/22/2013 - 20:12 | 3682749 BoNeSxxx
BoNeSxxx's picture

So I guess this means that the US won't be using EMPs on its enemies any time soon?

Disable the computers/switches/routers/power of the citizen 'net and his entire infrastructure is just an expensive bunker.

Sat, 06/22/2013 - 20:17 | 3682757 DaddyO
DaddyO's picture

Ala Starfish Prime?

It would seem that some hardening had to go into the structures of Alexander's empire, the copper gradient in the windows and other such stuff effectively creates a Faraday apparatus that ensures EMP won't blow its mind.

DaddyO

Sat, 06/22/2013 - 20:30 | 3682772 BoNeSxxx
BoNeSxxx's picture

I am sure he is shielded.  The point is that if the rest of our shite gets 'bricked' he has nothing to spy on us through.  Our PCs are gateways into our privacy.

We were 'given' this technology for precisely this purpose. Therefore, they will never EMP us... Our personal data is there for the taking at any time - and they wouldn't have it any other way.

Sat, 06/22/2013 - 20:38 | 3682788 AldousHuxley
AldousHuxley's picture

http://www.youtube.com/watch?v=tz0ejKersnM

 

General speaking at DEFCON...

 

no $$$ for his cyberarmy, so he is doing the "ask not what your army can hack for you, but what you can hack for your country" speech at DEFCON hackers.

Sat, 06/22/2013 - 21:15 | 3682829 SMG
SMG's picture

General Keith Alexander is a traitor to the constitution and a criminal.  He should be sitting in jail or worse.  Arrest him now!

Sat, 06/22/2013 - 21:30 | 3682846 SafelyGraze
SafelyGraze's picture

"who is gonna step up and be the modern John Connor? Is it Ed Snowden or some 13yr old hacker not yet in his mother's womb?"

the latter

which is why zh readers must go out there and Get Busy

very very busy

Sat, 06/22/2013 - 22:58 | 3682973 cifo
cifo's picture

This time WB7 forgot to sign the first image....

Sat, 06/22/2013 - 23:54 | 3683029 erg
erg's picture

Our learning curve is out-stripping their obfiscations at an increasing rate.

At some point they will have no choice but to 'up the ante' and call a pox on us all.

Some nasty strain of something.

 

Sun, 06/23/2013 - 07:54 | 3683368 francis_sawyer
francis_sawyer's picture

Careful SMG... The "Traitor to the Constitution", & "Criminal Anti-Defamation Leagues" will have your ass for tossing out verdicts without due process...

Sun, 06/23/2013 - 08:23 | 3683426 GetZeeGold
GetZeeGold's picture

 

 

 

 

Everything means everything....bitchez!

 

Sun, 06/23/2013 - 08:35 | 3683442 clymer
clymer's picture

just more bullshit govt. waste. Anyone can go to any number of web sites hosted in numerous unnamed Eastern European countries and purchase custom written zero-day exploit code for under $400.

 

When the govt. hires a crony front company to do it, they just happen to pay 2.5 mil.

 

Same profiteering shit, different industry.

 

Sun, 06/23/2013 - 00:09 | 3683044 JPM Hater001
JPM Hater001's picture

"General Keith Alexander is a traitor to the constitution and a criminal.  He should be sitting in jail or worse.  Arrest him now!"

 

I'll be in FEMA camp 7...which one will you be visiting in 5....4....3....2

Sun, 06/23/2013 - 12:11 | 3683931 DoChenRollingBearing
DoChenRollingBearing's picture

If you are ever sent down to south, try and join some of us at FEMA Camp!  Lots of fun!  Here's our address:

 

Building 16, Compound 3, FEMA Camp 116 (Belle Glade) 33213

We'll try to say you a bunk with a view of the swamp!

Sun, 06/23/2013 - 06:46 | 3683275 Go Tribe
Go Tribe's picture

We need to defund this bastard government and put away its monsters,

Sun, 06/23/2013 - 14:16 | 3684235 MarcusLCrassus
MarcusLCrassus's picture

That is the key: starve the beast.

 

We should have congress start slashing the NSA budget every year.  For example, have them slash the NSA budget by 50% for next year.  Cut it by another 50% the next year.  Etc etc so that in a few years the only thing they will be able to do is hire 5 guys who have to share one laptop between them.

 

Too bad congress is also completely compromised. 

Sat, 06/22/2013 - 21:56 | 3682890 Lost Word
Lost Word's picture

Funny how the Law-Breaking Government anonymous Spies are hiring the "Law-Breaking" anonymous Hackers.

Sat, 06/22/2013 - 22:11 | 3682916 CH1
CH1's picture

And sick that a thousand engineers are building all of this, then pretending that they bear no responsibility.

Sat, 06/22/2013 - 23:13 | 3682988 Skateboarder
Skateboarder's picture

Takes a sick mind to have gained enough intelligence to be able to engineer such systems yet have absolutely no moral regard for the consequences of their existence.

"What do you do for a living?"

"I build your overlord."

Sun, 06/23/2013 - 03:01 | 3683113 Prometheus418
Prometheus418's picture

Thanks for both.

Never ran across the comic before, and it's a fun one- welcome after a long week full of corporate restructuring.

Also glad to see that someone knows that we do have consciences.  I've never known an engineer to intentionally act in the service of evil, but at the same time, I've heard a whole pile of rationalizations that stretch a long way without quite making it.  Smart guys can build remarkable card houses that keep them from being killed by dumb guys wielding the guns they designed.

At the end of the day, an engineer is like a fireman in Farenheit 451- politics matter, but they're nothing compared to the fact that it was a pleasure to burn.  [see also: King's "breakers" in the Dark Tower series]

I'm not just saying that, I know it myself.  I'm an engineer, and find it impossible to speak to or relate with those who are not in anything but a superficial way.  It's a deep rabbit hole.  It sucks to do things that hurt others, but sometimes there is no other way to survive.  You can hate me for that, and that's ok- I hated myself long before you ever could. About 80% of what I do helps us all, but about 20% of it kills innocents.  The only proof that I can show is a failing liver and a corrosive self-hatred- trade ya straight-up, if you think that engineers are soulless, and you can carry that cross a bit.

But at the end of the day, it's all I can do.  "Big Bang Theory" aside, people hate people who are able to think, and push us into these roles.  When every facet of life is designed to first marginalize, and then kill you, you go to the place where you are safe.  That means killing innocents because the military wants your brain, and the only choice presented is to die right now, or die slowly later.  

If you have children to support, it changes what the noble choice is.  Sometimes it's better to die slow and educate them so that they can avoid that trap.

Oh yeah- and fuck everyone else, too.  I would have gladly stood on a barricade, gun in hand and tactics in head with my brothers- if I had any.  But when I looked, and looked hard for Liberty's sons, it turned out that they were absent.  So I'm not the only one who deserves what is coming.

 

Sun, 06/23/2013 - 07:59 | 3683374 francis_sawyer
francis_sawyer's picture

So let me synthesize that...

~~~

"Do it for the kids, [mine]"...

~~~

Let that be a lesson to everyone... If you do stuff you'll hate yourself for down the line & bank wads & wads of dough in the process... Have yourself some kids so you can justify keeping on doing it... You won't have to even wait for your deathbed to make a confession...

Sun, 06/23/2013 - 13:21 | 3683849 GoinFawr
GoinFawr's picture

"When you do things right, people won't be sure you've done anything at all."- Ghod

Sun, 06/23/2013 - 19:22 | 3684984 Al Gorerhythm
Al Gorerhythm's picture

I've not been affected by a post on ZH or any other site, as I have been by yours. My only response is one of humbleness and encouragement. You are not the only soul with conflicting stimuli that are driven by passions. Do you choose family over country? How do you protect your family's safety whilst living in a world of lawlessness, corruption, greed and apathy? 

No, you can't fight this avalanche alone. A soldier of one can't physically fight an army and expect a victorius outcome. You are right to lay low. You are right to wait for reinforcements. You have been trapped in the dichotomy of being a good guy but find yourseelf working for a veiled, criminal government which uses the morality of your Republican Constitution's foundations to advance their evil agenda. This sounds like a kid espousing some emotional dogma but I'm well past that. I feel your pain and as a word of encouragement let me ask that you stick with it. You are just ahead of the curve and your time will come and you will be needed. This will unwind as you are well aware. Stand proud for your family and country as you understand it to be. It may have been taken over but the time will come when good people wrest it from their hands. We won't be many, so don't wait for the majority to support you. They want to be led.

Mon, 06/24/2013 - 21:15 | 3689405 Pygar
Pygar's picture

I honestly mean no offense and I wish you the best, but I have to respond to this. As an engineer, I'm well aware that it can be hard to find employment that does not involve working for the military-industrial-government complex making weapons of mass effect for use by elected sociopaths. But "hard" is not "impossible." We all have choices. I'm working as an engineer for a good company that makes products people want and need, not products that break things and kill people. No, I don't make a lot of money. Yes, I passed up more lucrative opportunities with various government-supported merchants of death and went through several periods of un- or under-employment, but I made that choice because I knew what my priorities were.

Selling out is the easiest thing in the world to rationalize beforehand but the hardest thing in the world to live with afterwards. Somehow I don't get the feeling pretending you didn't have any choice makes it any easier.

I truly hope you find some peace of mind, but moreso I hope that anyone who actually thinks that they "don't have a choice" reconsiders that belief.

Sun, 06/23/2013 - 01:03 | 3683086 LetThemEatRand
LetThemEatRand's picture

And sick that a thousand engineers are building all of this, then pretending that they bear no responsibility.

Good fucking point.  

Sun, 06/23/2013 - 02:20 | 3683139 Prometheus418
Prometheus418's picture

See above, Rand.

I'd rather make shoes, or better potato peelers, or just about anything else.  Hell, I've got a fine idea for a toaster that will butter your breakfast for you, if you want to put up some seed capital.

That's not what this world wants, though.  I had a position like that about six years ago, and was driven deep between a rock and a hard place.  The move that had to be made was to sell my soul to survive.  I fought it, and am continuing to do so- but without everyone pitching in, we can't change a damn thing.

Right now, essentially no one is pitching in.  You want a shitty statistic?  I'm a .3%'er.  One of 256 guys who had the grit to say they didn't want to kill foreigners on the record.  That's not a significant number- it's just enough to make sure that my life becomes worse because I was the stupid stubborn fuck who wouldn't hoist the starz n' barz and sing the anthem in time with all the other patriots.

I really didn't need my life to become worse.  At this point, the whole of the game is just to postpone death until my children can fend for themselves.  I assure you that I assume the responsibilty for every thing I have done, and that will be the richly deserved death of me.  If you don't want it to be the death of you as well, man up and start making changes- I'll back you with tech, blood and tactics if you do- that can't wash the stain from me, but it's better than nothing.

Until then, it's nothing but this:
http://www.youtube.com/watch?v=UUXBCdt5IPg

Sun, 06/23/2013 - 13:20 | 3684112 centerline
centerline's picture

100% with ya on those feelings about being an engineer these days.  My eyes are always on the exit - but haven't found the exit yet.  Shitty profession is a lose-lose scenerio, but pays okay - is like a trap.  Might as well speak for what is right though.  I simply can't help myself - lol.  Pissing people off seems to have become one of my specialties.

 

Sun, 06/23/2013 - 14:04 | 3684209 Herd Redirectio...
Herd Redirection Committee's picture

"That's not what this world wants, though."

Are you shitting me?  You are getting paid in corporate scrip.  Its not the world that wants what you are doing, merely the creators of the corporate scrip/the banksters.

You are right that everyone has to do their part.  Thats why this information war is so important.

Sun, 06/23/2013 - 06:46 | 3683276 Go Tribe
Go Tribe's picture

You obviously don't work with engineers. They do what they're told, at least in my experience.

Sun, 06/23/2013 - 11:34 | 3683834 GoinFawr
GoinFawr's picture

are you suggesting that "I was just following orders" is a valid defense?

Sun, 06/23/2013 - 13:08 | 3684082 centerline
centerline's picture

Many do.  Not all of us though.  And we pay for having a conscience.  We pay dearly.

Sun, 06/23/2013 - 12:55 | 3684048 yellowsub
yellowsub's picture

The evil ones are the masterminds (leaders) coming up with the idealology and carrying out their plan...

The engineers are like soidiers and just the pawns in the same game, keyboards is their weapons and their battle field can't be seen.

 

 

 

Sat, 06/22/2013 - 20:41 | 3682790 DaddyO
DaddyO's picture

Yes but what's to keep one of our friends like the Ruskies or Chicoms from launching a small low yield device into our skies, say over Topeka or some such.

They could blame it on Iran, NK or other enemy of state and ouila my computer, she no work.

Then all the bonesaw, prism shynet type Shite is useless.

It ain't gonna happen though because TPTB are large and incharge of these types of things from and economic standpoint.

Unless someone in on of those countries goes Snowden or something.

DaddyO

Sat, 06/22/2013 - 21:35 | 3682859 20834A
20834A's picture

Three ten megaton dirty bombs exploded at a high altitude (400-500km) in a roughly triangular vector over the USA would knock out virtually the whole country. (Just one exploded over Kansas would do most of the U.S., but if a foreign nation was going to use this attack they'd go wide) Planes would fall out of the sky, cars built after the mid '70's would be disabled, electricity out, phones and computers dark, etc. We would be back in the dark ages... 

Scary, eh?

Sat, 06/22/2013 - 22:29 | 3682938 SimMaker
SimMaker's picture

Not to worry, the NSA has a full back up of your hard drive.

Sat, 06/22/2013 - 23:10 | 3682985 logically possible
logically possible's picture

Can you imagine, having to to deal with some government agency to try to get a backup of your hard drive?

Sun, 06/23/2013 - 07:41 | 3683346 awakening
awakening's picture

Imagine? No. Experience (not personally); park your crap on "the cloud" and go through the painful recovery process when your hardware shits itself.

Want to avoid that experience? Learn how to and then build your own NAS (and I mean "build"; don't use off the shelf shit with whatever custom bloatware parked on them cause it might as well be on the cloud with regards to privacy and information security).

 

Sun, 06/23/2013 - 08:18 | 3683417 francis_sawyer
francis_sawyer's picture

Look people... It's all bullshit anyway...

~~~

If they can supposedly 'hack' every computer on the planet, then presumably they can plant anything ONTO your hard drive that they want...

- Gee ~ you thought you were downloading the latest JAVA... [Nope ~ you were downloading Barry O buttfucking Captain Kangaroo]...

- How come you made all those purchases at Head Shops?

- Why, everytime your kid clicked on the Disney Channel, did the packet pass lickety split through 'Elvira's House of Pain'

~~~

Either they're out to get your ass, or they don't give a fuck about you [probably both]... But if they want to 'posterize' you, they will... Sure ~ you can make a game out of it, but they have unlimited funds to do so [because YOU'RE getting handed the check for that]...

OR

This is all a scam, [to make you believe they have these types of capabilities & scare you into compliance]...

Sun, 06/23/2013 - 02:10 | 3683134 Boop
Boop's picture

...especially the part about the triangular vector, and the ten megaton dirty bombs...  neither of which exist.

But we get your point.

 

Sun, 06/23/2013 - 02:34 | 3683144 Prometheus418
Prometheus418's picture

http://www.amazon.com/dp/0765356864

I belive this is what you're referencing.  Doom porn at it's finest.

The tally at the end is 50% death in the midwest, and 80% everywhere else, IIRC.

If you'd rather be optimistic, take this blue pill-

http://www.amazon.com/World-Set-Free-G-Wells/dp/1421839601/ref=sr_1_1?s=books&ie=UTF8&qid=1371969180&sr=1-1&keywords=hg+wells+world+set+free

If I had a vote, I'd take the second, but no one cares much about what I think.

Sun, 06/23/2013 - 02:53 | 3683152 Spanky
Spanky's picture

+1

no one cares much about what I think -- Prometheus418

Smart man. You don't lie to yourself. Report for re-conditioning.

Do NOT follow this link or you will be banned from the site!