This page has been archived and commenting is disabled.
Meet The Man In Charge Of America's Secret Cyber Army (In Which "Bonesaw" Makes A Mockery Of PRISM)
With his revelations exposing the extent of potential, and actual, pervasive NSA surveillance over the American population, Edward Snowden has done a great service for the public by finally forcing it to answer the question: is having Big Brother peek at every private communication and electronic information, a fair exchange for the alleged benefit of the state's security. Alas, without further action form a population that appears largely numb and apathetic to disclosures that until recently would have sparked mass protests and toppled presidents, the best we can hope for within a political regime that has hijacked the democratic process, is some intense introspection as to what the concept of "America" truly means.
However, and more importantly, what Snowden's revelations have confirmed, is that behind the scenes, America is now actively engaged in a new kind of war: an unprecedented cyber war, where collecting, deciphering, intercepting, and abusing information is the only thing that matters and leads to unprecedented power, and where enemies both foreign and domestic may be targeted without due process based on a lowly analyst's "whim."
It has also put spotlight on the man, who until recently deep in the shadows, has been responsible for building America's secret, absolutely massive cyber army, and which according to a just released Wired profile is "capable of launching devastating cyberattacks. Now it's ready to unleash hell."
Meet General Keith Alexander, "a man few even in Washington would likely recognize", which is troubling because Alexander is now quite possibly the most powerful person in the world, that nobody talks about. Which is just the way he likes it.
This is the partial and incomplete story of the man who may now be empowered with more unchecked power than any person in the history of the US, or for that matter, the world. It comes once again, courtesy of the man who over a year before the Guardian's Snowden bombshell broke the story about the NSA's secret Utah data storage facility, James Bamford, and whose intimate knowledge of the NSA's secrets comes by way of being a consultant for the defense team of one Thomas Drake, one of the original NSA whistleblowers (as we learn from the full Wired article).
But first, by way of background, here is a glimpse of Alexander's ultra-secretive kingdom. From Wired:
Inside Fort Meade, Maryland, a top-secret city bustles. Tens of thousands of people move through more than 50 buildings—the city has its own post office, fire department, and police force. But as if designed by Kafka, it sits among a forest of trees, surrounded by electrified fences and heavily armed guards, protected by antitank barriers, monitored by sensitive motion detectors, and watched by rotating cameras. To block any telltale electromagnetic signals from escaping, the inner walls of the buildings are wrapped in protective copper shielding and the one-way windows are embedded with a fine copper mesh.
This is the undisputed domain of General Keith Alexander, a man few even in Washington would likely recognize. Never before has anyone in America’s intelligence sphere come close to his degree of power, the number of people under his command, the expanse of his rule, the length of his reign, or the depth of his secrecy. A four-star Army general, his authority extends across three domains: He is director of the world’s largest intelligence service, the National Security Agency; chief of the Central Security Service; and commander of the US Cyber Command. As such, he has his own secret military, presiding over the Navy’s 10th Fleet, the 24th Air Force, and the Second Army.
Schematically, Alexander's empire consists of the following: virtually every piece in America's information intelligence arsenal.
As the Snowden scandal has unfurled, some glimpses into the "introspective" capabilities of the NSA, and its sister organizations, have demonstrated just how powerful the full "intelligence" arsenal of the US can be.
However, it is when it is facing outward - as it normally does - that things get really scary. Because contrary to prevailing conventional wisdom, Alexander's intelligence and information-derived power is far from simply defensive. In fact, it is when its offensive potential is exposed that the full destructive power in Alexander's grasp is revealed:
In its tightly controlled public relations, the NSA has focused attention on the threat of cyberattack against the US—the vulnerability of critical infrastructure like power plants and water systems, the susceptibility of the military’s command and control structure, the dependence of the economy on the Internet’s smooth functioning. Defense against these threats was the paramount mission trumpeted by NSA brass at congressional hearings and hashed over at security conferences.
But there is a flip side to this equation that is rarely mentioned: The military has for years been developing offensive capabilities, giving it the power not just to defend the US but to assail its foes. Using so-called cyber-kinetic attacks, Alexander and his forces now have the capability to physically destroy an adversary’s equipment and infrastructure, and potentially even to kill. Alexander—who declined to be interviewed for this article—has concluded that such cyberweapons are as crucial to 21st-century warfare as nuclear arms were in the 20th.
And he and his cyberwarriors have already launched their first attack. The cyberweapon that came to be known as Stuxnet was created and built by the NSA in partnership with the CIA and Israeli intelligence in the mid-2000s. The first known piece of malware designed to destroy physical equipment, Stuxnet was aimed at Iran’s nuclear facility in Natanz. By surreptitiously taking control of an industrial control link known as a Scada (Supervisory Control and Data Acquisition) system, the sophisticated worm was able to damage about a thousand centrifuges used to enrich nuclear material.
The success of this sabotage came to light only in June 2010, when the malware spread to outside computers. It was spotted by independent security researchers, who identified telltale signs that the worm was the work of thousands of hours of professional development. Despite headlines around the globe, officials in Washington have never openly acknowledged that the US was behind the attack. It wasn’t until 2012 that anonymous sources within the Obama administration took credit for it in interviews with The New York Times.
But Stuxnet is only the beginning. Alexander’s agency has recruited thousands of computer experts, hackers, and engineering PhDs to expand US offensive capabilities in the digital realm. The Pentagon has requested $4.7 billion for “cyberspace operations,” even as the budget of the CIA and other intelligence agencies could fall by $4.4 billion. It is pouring millions into cyberdefense contractors. And more attacks may be planned.
Alexander's background is equally as impressive: a classmate of Petraeus and Dempsey, a favorite of Rumsfeld, the General had supreme power written all over his career progression. If reaching the top at all costs meant crushing the fourth amendment and lying to Congress in the process, so be it:
Born in 1951, the third of five children, Alexander was raised in the small upstate New York hamlet of Onondaga Hill, a suburb of Syracuse. He tossed papers for the Syracuse Post-Standard and ran track at Westhill High School while his father, a former Marine private, was involved in local Republican politics. It was 1970, Richard Nixon was president, and most of the country had by then begun to see the war in Vietnam as a disaster. But Alexander had been accepted at West Point, joining a class that included two other future four-star generals, David Petraeus and Martin Dempsey. Alexander would never get the chance to serve in Vietnam. Just as he stepped off the bus at West Point, the ground war finally began winding down.
In April 1974, just before graduation, he married his high school classmate Deborah Lynn Douglas, who grew up two doors away in Onondaga Hill. The fighting in Vietnam was over, but the Cold War was still bubbling, and Alexander focused his career on the solitary, rarefied world of signals intelligence, bouncing from secret NSA base to secret NSA base, mostly in the US and Germany. He proved a competent administrator, carrying out assignments and adapting to the rapidly changing high tech environment. Along the way he picked up masters degrees in electronic warfare, physics, national security strategy, and business administration. As a result, he quickly rose up the military intelligence ranks, where expertise in advanced technology was at a premium.
In 2001, Alexander was a one-star general in charge of the Army Intelligence and Security Command, the military’s worldwide network of 10,700 spies and eavesdroppers. In March of that year he told his hometown Syracuse newspaper that his job was to discover threats to the country. “We have to stay out in front of our adversary,” Alexander said. “It’s a chess game, and you don’t want to lose this one.” But just six months later, Alexander and the rest of the American intelligence community suffered a devastating defeat when they were surprised by the attacks on 9/11. Following the assault, he ordered his Army intercept operators to begin illegally monitoring the phone calls and email of American citizens who had nothing to do with terrorism, including intimate calls between journalists and their spouses. Congress later gave retroactive immunity to the telecoms that assisted the government.
In 2003, Alexander, a favorite of defense secretary Donald Rumsfeld, was named the Army’s deputy chief of staff for intelligence, the service’s most senior intelligence position. Among the units under his command were the military intelligence teams involved in the human rights abuses at Baghdad’s Abu Ghraib prison. Two years later, Rumsfeld appointed Alexander—now a three-star general—director of the NSA, where he oversaw the illegal, warrantless wiretapping program while deceiving members of the House Intelligence Committee. In a publicly released letter to Alexander shortly after The New York Times exposed the program, US representative Rush Holt, a member of the committee, angrily took him to task for not being forthcoming about the wiretapping: “Your responses make a mockery of congressional oversight.”
In short: Emperor Alexander.
Inside the government, the general is regarded with a mixture of respect and fear, not unlike J. Edgar Hoover, another security figure whose tenure spanned multiple presidencies. “We jokingly referred to him as Emperor Alexander—with good cause, because whatever Keith wants, Keith gets,” says one former senior CIA official who agreed to speak on condition of anonymity. “We would sit back literally in awe of what he was able to get from Congress, from the White House, and at the expense of everybody else.”
What happened next in Alexander's career some time in the mid 2000's, was Stuxnet: the story of the crushing virus that nearly destroyed the Iranian nuclear program has been widely documented on these pages and elsewhere, so we won't recount the Wired article's details. However, what was very odd about the Stuxnet attack is that such a brilliantly conceived and delivered virus could ultimately be uncovered and traced back to the NSA and Israel. It was almost too good. Still, what happened after the revelation that Stuxnet could be traced to Fort Meade, is that the middle-east, supposedly, promptly retaliated:
Sure enough, in August 2012 a devastating virus was unleashed on Saudi Aramco, the giant Saudi state-owned energy company. The malware infected 30,000 computers, erasing three-quarters of the company’s stored data, destroying everything from documents to email to spreadsheets and leaving in their place an image of a burning American flag, according to The New York Times. Just days later, another large cyberattack hit RasGas, the giant Qatari natural gas company. Then a series of denial-of-service attacks took America’s largest financial institutions offline. Experts blamed all of this activity on Iran, which had created its own cyber command in the wake of the US-led attacks. James Clapper, US director of national intelligence, for the first time declared cyberthreats the greatest danger facing the nation, bumping terrorism down to second place. In May, the Department of Homeland Security’s Industrial Control Systems Cyber Emergency Response Team issued a vague warning that US energy and infrastructure companies should be on the alert for cyberattacks. It was widely reported that this warning came in response to Iranian cyberprobes of industrial control systems. An Iranian diplomat denied any involvement.
The cat-and-mouse game could escalate. “It’s a trajectory,” says James Lewis, a cybersecurity expert at the Center for Strategic and International Studies. “The general consensus is that a cyber response alone is pretty worthless. And nobody wants a real war.” Under international law, Iran may have the right to self-defense when hit with destructive cyberattacks. William Lynn, deputy secretary of defense, laid claim to the prerogative of self-defense when he outlined the Pentagon’s cyber operations strategy. “The United States reserves the right,” he said, “under the laws of armed conflict, to respond to serious cyberattacks with a proportional and justified military response at the time and place of our choosing.” Leon Panetta, the former CIA chief who had helped launch the Stuxnet offensive, would later point to Iran’s retaliation as a troubling harbinger. “The collective result of these kinds of attacks could be a cyber Pearl Harbor,” he warned in October 2012, toward the end of his tenure as defense secretary, “an attack that would cause physical destruction and the loss of life.”
Almost too good... Because what the so-called hacker "retaliations" originating from Iran, China, Russia, etc, led to such laughable outcomes as DDOS attacks against - to unprecedented media fanfare - the portals of such firms as JPMorgan and Wells Fargo, and as Wired adds, "if Stuxnet was the proof of concept, it also proved that one successful cyberattack begets another. For Alexander, this offered the perfect justification for expanding his empire."
The expansion that took place next for Alexander and his men, all of it under the Obama regime, was simply unprecedented (and that it steamrolled right through the "sequester" was perfectly expected):
[D]ominance has long been their watchword. Alexander’s Navy calls itself the Information Dominance Corps. In 2007, the then secretary of the Air Force pledged to “dominate cyberspace” just as “today, we dominate air and space.” And Alexander’s Army warned, “It is in cyberspace that we must use our strategic vision to dominate the information environment.” The Army is reportedly treating digital weapons as another form of offensive capability, providing frontline troops with the option of requesting “cyber fire support” from Cyber Command in the same way they request air and artillery support.
All these capabilities require a giant expansion of secret facilities. Thousands of hard-hatted construction workers will soon begin erecting cranes, driving backhoes, and emptying cement trucks as they expand the boundaries of NSA’s secret city eastward, increasing its already enormous size by a third. “You could tell that some of the seniors at NSA were truly concerned that cyber was going to engulf them,” says a former senior Cyber Command official, “and I think rightfully so.”
In May, work began on a $3.2 billion facility housed at Fort Meade in Maryland. Known as Site M, the 227-acre complex includes its own 150-megawatt power substation, 14 administrative buildings, 10 parking garages, and chiller and boiler plants. The server building will have 90,000 square feet of raised floor—handy for supercomputers—yet hold only 50 people. Meanwhile, the 531,000-square-foot operations center will house more than 1,300 people. In all, the buildings will have a footprint of 1.8 million square feet. Even more ambitious plans, known as Phase II and III, are on the drawing board. Stretching over the next 16 years, they would quadruple the footprint to 5.8 million square feet, enough for nearly 60 buildings and 40 parking garages, costing $5.2 billion and accommodating 11,000 more cyberwarriors.
In short, despite the sequestration, layoffs, and furloughs in the federal government, it’s a boom time for Alexander. In April, as part of its 2014 budget request, the Pentagon asked Congress for $4.7 billion for increased “cyberspace operations,” nearly $1 billion more than the 2013 allocation. At the same time, budgets for the CIA and other intelligence agencies were cut by almost the same amount, $4.4 billion. A portion of the money going to Alexander will be used to create 13 cyberattack teams.
In the New Normal, the CIA is no longer relevant: all that matters are Alexanders' armies of hackers and computer geeks.
But not only has the public espionage sector been unleashed: the private sector is poised to reap a killing (pardon the pun) too...
What’s good for Alexander is good for the fortunes of the cyber-industrial complex, a burgeoning sector made up of many of the same defense contractors who grew rich supplying the wars in Iraq and Afghanistan. With those conflicts now mostly in the rearview mirror, they are looking to Alexander as a kind of savior. After all, the US spends about $30 billion annually on cybersecurity goods and services.
In the past few years, the contractors have embarked on their own cyber building binge parallel to the construction boom at Fort Meade: General Dynamics opened a 28,000-square-foot facility near the NSA; SAIC cut the ribbon on its new seven-story Cyber Innovation Center; the giant CSC unveiled its Virtual Cyber Security Center. And at consulting firm Booz Allen Hamilton, where former NSA director Mike McConnell was hired to lead the cyber effort, the company announced a “cyber-solutions network” that linked together nine cyber-focused facilities. Not to be outdone, Boeing built a new Cyber Engagement Center. Leaving nothing to chance, it also hired retired Army major general Barbara Fast, an old friend of Alexander’s, to run the operation. (She has since moved on.)
Defense contractors have been eager to prove that they understand Alexander’s worldview. “Our Raytheon cyberwarriors play offense and defense,” says one help-wanted site. Consulting and engineering firms such as Invertix and Parsons are among dozens posting online want ads for “computer network exploitation specialists.” And many other companies, some unidentified, are seeking computer and network attackers. “Firm is seeking computer network attack specialists for long-term government contract in King George County, VA,” one recent ad read. Another, from Sunera, a Tampa, Florida, company, said it was hunting for “attack and penetration consultants.”
It gets better: all those anti-virus programs you have on computer to "make it safe" from backdoors and trojans? Guess what - they are the backdoors and trojans!
One of the most secretive of these contractors is Endgame Systems, a startup backed by VCs including Kleiner Perkins Caufield & Byers, Bessemer Venture Partners, and Paladin Capital Group. Established in Atlanta in 2008, Endgame is transparently antitransparent. “We’ve been very careful not to have a public face on our company,” former vice president John M. Farrell wrote to a business associate in an email that appeared in a WikiLeaks dump. “We don’t ever want to see our name in a press release,” added founder Christopher Rouland. True to form, the company declined Wired’s interview requests.
Perhaps for good reason: According to news reports, Endgame is developing ways to break into Internet-connected devices through chinks in their antivirus armor. Like safecrackers listening to the click of tumblers through a stethoscope, the “vulnerability researchers” use an extensive array of digital tools to search for hidden weaknesses in commonly used programs and systems, such as Windows and Internet Explorer. And since no one else has ever discovered these unseen cracks, the manufacturers have never developed patches for them.
Thus, in the parlance of the trade, these vulnerabilities are known as “zero-day exploits,” because it has been zero days since they have been uncovered and fixed. They are the Achilles’ heel of the security business, says a former senior intelligence official involved with cyberwarfare. Those seeking to break into networks and computers are willing to pay millions of dollars to obtain them.
Such as the US government. But if you thought PRISM was bad you ain't seen nuthin' yet. Because tying it all together is Endgame's appropriately named "Bonesaw" - what it is is practically The Matrix transplanted into the real cyber world.
According to Defense News’ C4ISR Journal and Bloomberg Businessweek, Endgame also offers its intelligence clients—agencies like Cyber Command, the NSA, the CIA, and British intelligence—a unique map showing them exactly where their targets are located. Dubbed Bonesaw, the map displays the geolocation and digital address of basically every device connected to the Internet around the world, providing what’s called network situational awareness. The client locates a region on the password-protected web-based map, then picks a country and city— say, Beijing, China. Next the client types in the name of the target organization, such as the Ministry of Public Security’s No. 3 Research Institute, which is responsible for computer security—or simply enters its address, 6 Zhengyi Road. The map will then display what software is running on the computers inside the facility, what types of malware some may contain, and a menu of custom-designed exploits that can be used to secretly gain entry. It can also pinpoint those devices infected with malware, such as the Conficker worm, as well as networks turned into botnets and zombies— the equivalent of a back door left open.
Bonesaw also contains targeting data on US allies, and it is soon to be upgraded with a new version codenamed Velocity, according to C4ISR Journal. It will allow Endgame’s clients to observe in real time as hardware and software connected to the Internet around the world is added, removed, or changed.
More on Bonesaw:
Marketing documents say “the Bonesaw platform provides a complete environment for intelligence analysts and mission planners to take a holistic approach to target discovery, reducing the time to create actionable intelligence and operational plans from days to minutes.”
“Bonesaw is the ability to map, basically every device connected to the Internet and what hardware and software it is,” says a company official who requested anonymity. The official points out that the firm doesn’t launch offensive cyber ops, it just helps.
Back to Wired:
[S]uch access doesn’t come cheap. One leaked report indicated that annual subscriptions could run as high as $2.5 million for 25 zero-day exploits.
That's ok though, the US government is happy to collect taxpayer money so it can pay these venture capital-backed private firms for the best in espionage technology, allowing it to reach, hack and manipulate every computer system foreign. And domestic.
How ironic: US citizens are funding Big Brother's own unprecedented spying program against themselves!
Not only that, but by allowing the NSA to develop and utilize technology that is leaps ahead of everyone else - utilize it against the US citizens themselves - America is now effectively war against itself... Not to mention every other foreign country that is a intelligence interest:
The buying and using of such a subscription by nation-states could be seen as an act of war. “If you are engaged in reconnaissance on an adversary’s systems, you are laying the electronic battlefield and preparing to use it,” wrote Mike Jacobs, a former NSA director for information assurance, in a McAfee report on cyberwarfare. “In my opinion, these activities constitute acts of war, or at least a prelude to future acts of war.” The question is, who else is on the secretive company’s client list? Because there is as of yet no oversight or regulation of the cyberweapons trade, companies in the cyber-industrial complex are free to sell to whomever they wish. “It should be illegal,” says the former senior intelligence official involved in cyberwarfare. “I knew about Endgame when I was in intelligence. The intelligence community didn’t like it, but they’re the largest consumer of that business.”
And there you have it: US corporations happily cooperating with the US government's own espionage services, however since the only thing that matters in the private sector is the bottom line, the Endgames of the world will gladly sell the same ultra-secret services to everyone else who is willing to pay top dollar: China, Russia, Iran...
in their willingness to pay top dollar for more and better zero-day exploits, the spy agencies are helping drive a lucrative, dangerous, and unregulated cyber arms race, one that has developed its own gray and black markets. The companies trading in this arena can sell their wares to the highest bidder—be they frontmen for criminal hacking groups or terrorist organizations or countries that bankroll terrorists, such as Iran. Ironically, having helped create the market in zero-day exploits and then having launched the world into the era of cyberwar, Alexander now says the possibility of zero-day exploits falling into the wrong hands is his “greatest worry.”
Does Alexander have reason to be worried? Oh yes.
In May, Alexander discovered that four months earlier someone, or some group or nation, had secretly hacked into a restricted US government database known as the National Inventory of Dams. Maintained by the Army Corps of Engineers, it lists the vulnerabilities for the nation’s dams, including an estimate of the number of people who might be killed should one of them fail. Meanwhile, the 2013 “Report Card for America’s Infrastructure” gave the US a D on its maintenance of dams. There are 13,991 dams in the US that are classified as high-hazard, the report said. A high-hazard dam is defined as one whose failure would cause loss of life. “That’s our concern about what’s coming in cyberspace—a destructive element. It is a question of time,” Alexander said in a talk to a group involved in information operations and cyberwarfare, noting that estimates put the time frame of an attack within two to five years. He made his comments in September 2011.
In other words, this massive cyberattack against the US predicted by "Emperor" Alexander, an attack in which as Alexander himself has said cyberweapons represent the 21st century equivalent of nuclear arms (and require in kind retaliation) whether false flag or real, is due... some time right around now.
- 85872 reads
- Printer-friendly version
- Send to friend
- advertisements -




What part?
Be specific.
I ain't got time to read all that text ...
Executive Summary
Everything is fine. There is nothing to worry about.
Yup. A heads up also that the mobile component which we all use was developed from & by military communications contractors.....25 years ago plus your call records & physical location together with the soundtracks was readily available...25 fckg years ago. Gods help us.
No, when they say a nation of laws they're talking pure numbers not how they are applied.
You really cleared things up.
Thanks.
Not a problem, always happy to be of assistance.
Mission Accomplished then sir; still 'clear as mud'.
Looking more like 90 percent.
Yes, when Jones started talking about your new Internet connected refrigerator spying on you I thought he had completely lost the plot. I think I owe him an apology.
95%
.
In 2003, Alexander, a favorite of defense secretary Donald Rumsfeld,
seeing as Rumfeld is a war criminal and has committed crimes against humanity, we should all fear a man like Alexander greatly if he's one of his disciples
Too much sun, son.
Ident
you are a knob of the biggest order, that fact you've made more than clear
so why do you bother comment?? you're a statist troll bought and paid for
Contact Us
For media inquiries, please contact Sara Conneighton at sconneighton@endgame.com.
For all other inquiries, please contact info@endgame.com.
Contact Us News Careers About Us
Inserted from <http://www.endgamesystems.com/#about-us>
Nathaniel Fick, CEO
Nate Fick is CEO of Endgame. He has more than a decade of experience in the security community, and is an operating partner at Bessemer Venture Partners, where he focuses on defense and intelligence technologies. Before joining Endgame, Nate was CEO of the Center for a New American Security, a national security research organization. He served as a Marine Corps infantry officer, including combat tours in Afghanistan and Iraq. His book about that experience, One Bullet Away, was a New York Times bestseller, a Washington Post "Best Book of the Year," and one of the Military Times' "Best Military Books of the Decade." He graduated with high honors in Classics from Dartmouth College and holds an MPA from the Harvard Kennedy School and MBA from the Harvard Business School. Nate serves as a Trustee of Dartmouth and a Director of the Marine Corps Scholarship Foundation, and he is a member of the Council on Foreign Relations.
Niloofar Razi Howe, CSO
Niloo Howe is Chief Strategy Officer of Endgame. She has a quarter century of experience working and investing in technology companies in the security field as well as in healthcare, media and consumer goods and is an operating partner at Paladin Capital Group. Before Endgame, she spent nine years as Managing Director at Paladin, a $1 billion private equity fund focused on investing in the national security sector, where she led the development and implementation of Paladin’s family of funds investment strategies as well as oversight of Paladin’s investment portfolio. Previously she worked at Zone Ventures, an early-stage venture capital firm in Los Angeles, as a consultant with McKinsey & Co., and as a lawyer with O’Melveny & Myers. Niloo graduated cum laude from Harvard Law School and holds a bachelors degree from Columbia College. Her non-profit work includes serving as Chair of Global Rights, an international human rights organization, as a member of the Sibley Memorial Hospital Board of Trustees as Chair of its Investment Committee, and Vice Chair of the Sibley Memorial Hospital Foundation.
Matt Georgy, CTO
Matt is the Chief Technology Officer of Endgame. He joined the company after fourteen years of government service, nearly a decade as a Senior Executive with the US Department of Defense and prior to that as an officer in the Air Force. While at the Defense Department, he supported all aspects of Computer Network Operations supporting mission planning for nation security missions as well as building an incident response and mitigation team supporting victims of cyber intrusions across the federal government. During his career he has deployed numerous times in areas of hostility in support of military operations and the Global War on Terrorism. He has received the Meritorious Unit Citation, the Global War on Terrorism Medal, the Senior Intelligence Community officer pin, the Secretary of Defense’s Operation Enduring Freedom coin and Presidential Meritorious Senior Career Employee Award in 2011. Matt received his BS in Computer Information Systems from the California State Polytechnic University, and his Masters of Science in Information Technology and his MBA from the University of Maryland. He has earned certifications from several organizations including the International Information Systems Security Certification Consortium (CISSP), Cisco Corporation (CCNA), EC-Council (LPT, ECSA, CNDA, CEH), Global Information Assurance Certification (GREM, GCIA, GCIH, GCFA, GSEC), The Computing Technology Industry Association (A+, Network+, Server+, Linux+, Security+, and CASP) and Information Security Institute (CPT, CEPT, CREA).
Mark Snell, CFO
Mark is the Chief Financial Officer at Endgame. He has more than a decade of experience building and managing finance teams at fast-paced, venture-backed and publicly traded technology companies. Prior to joining Endgame, he served as the Corporate Controller for Suniva, a privately-held manufacturer of solar cells, where he arrived pre-revenue and helped to develop the financial infrastructure and systems necessary to support the company’s rapid growth. Prior to Suniva, Mark worked with Servigistics, a privately-held supply chain software vendor, as Corporate Controller. Earlier in his career, he worked as Americas Director of Finance for Internet Security Systems, a publicly traded security software vendor, through its acquisition by IBM in 2006. Mark holds a bachelors degree from the University of Virginia and a Masters in Business Administration from Georgia State University. In addition, he is licensed as a certified public accountant in Georgia.
Pete Hraba, VP of Sales
Pete serves as the Vice President of Sales for Endgame. Prior to joining the Endgame, he was focused on serving the Intelligence Community at Arcsight. Pete’s previous experience includes serving as a Program Manager with Scitor, Director of Product Management with CoreExpress, Program Manager with MCI Worldcom, as well as NSA Representative to the Marine Corps Systems Command. Pete performed over 20 years of service as a Marine Intelligence Officer, formerly a SIGINT officer in both the active and reserve components. Pete holds a Masters in the Management of Information Technology from the University of Virginia.
Rick Hensley, VP of Federal Services
Rick is the Vice President of Federal Services for Endgame and has over 16 years experience with the Department of Defense (DoD) and the United States Intelligence Community. Most recently, Rick led a US Air Force capability development effort to support offensive and defensive cyber operations (OCO/DCO). During his tenure as a US Air Force civilian, Rick was also a Navy Reserve Cryptologic Officer. He activated in the mid-2000s and helped establish one of the first cyber threat operations centers for a major DoD organization’s extended enterprise. Also during this same timeframe, Rick was adjunct faculty at the University of Texas - San Antonio, teaching principles of cyber security. Before serving as an Air Force civilian, Rick was a Naval Supply Corps Officer, where he was stationed as the Supply Officer onboard the USS VINCENNES (CG-49) and as a lead instructor at the Navy Supply Corps School. Rick received his BS in Commerce from the University of Virginia and his MS in Information Security from the University of North Carolina – Charlotte, and has received numerous Joint and DoD military and civilian service medals.
Board of Directors
Chris Darby
Mr. Chris Darby is President and CEO of In-Q-Tel, the independent strategic investment firm that identifies innovative technologies to support the missions of the Central Intelligence Agency and the broader Intelligence Community. He joined In-Q-Tel in September 2006. Mr. Darby was previously Vice President and General Manager at Intel overseeing their Middleware Products Division. At Intel, Mr. Darby had responsibility for the Corporation's Infrastructure Software business including Open Source and Commercial Products. He joined Intel in August 2005 with the acquisition of Sarvega Inc. Mr. Darby had been the president & CEO of Sarvega, a venture backed supplier of XML Networking and Security products.
Prior to Sarvega, Mr. Darby was the Chairman and CEO of @stake, the well-known internet security consulting firm ultimately acquired by Symantec (SYMC). While at @stake, he assembled the world's leading collection of security researchers and built a business that spanned North America and Europe.
Before @stake, Mr. Darby served as President and CEO of Interpath Communications, a facilities-based ASP later acquired by US Internetworking (USIX). Mr. Darby also held several executive positions at Digital Equipment Corporation (now Hewlett-Packard) with responsibility for telecom industry initiatives, corporate strategy, and alliances. He began his career at Northern Telecom (now Nortel Networks) and Bell Northern Research.
Mr. Darby is a graduate of the University of Western Ontario.
David Cowan
David Cowan is a Partner of Bessemer Venture Partners in Menlo Park. David was ranked #6 in the Forbes Midas List, and 20 of his startup investments have gone public, such as Ciena, Hotjobs, Blue Nile and LinkedIn. David co-founded VeriSign and Good Technology, and funded many other cyber security companies including Postini, Cyota and Tripwire. David earned his MBA and his AB in Computer Science and Math from Harvard. David also serves on the boards of Lifelock, Skybox, Nominum, GetInsured, Zoosk, Smule and Reputation.com.
Arun Gupta
Arun joined Columbia Capital in 2000 and focuses on enterprise technology/services and mobile/digital media opportunities. Arun is on the Board of Directors or actively involved with Approva, Avail Media, Brickstream, Daz3D, Devas Multimedia, Intelliworks, Millennial Media, Netuitive, and Webs. Arun was also involved with former Columbia portfolio companies Adjoined Consulting (acquired by Kanbay International, Inc.), Riptech (acquired by Symantec Corporation), and Softek Storage Holdings (acquired by IBM). Prior to joining Columbia Capital, Arun was at Carlyle Venture Partners focused on software and Internet investments. Earlier, Arun held positions in Arthur D. Little's telecom and technology consulting practice and shared responsibility for establishing ADL's operation in India. Arun received a B.S. degree with Distinction in Electrical Engineering and an M.S. degree in Engineering Economic Systems from Stanford University and received his M.B.A. from Harvard Business School.
Lt. Gen. (Ret) Kenneth A. Minihan
Lieutenant General Ken Minihan is a Managing Director at Paladin Capital Group. He retired from the U.S. Air Force after more than 33 years of active commissioned service and served as the 14th Director of the National Security Agency/Central Security Service. As Director, he was the senior uniformed intelligence officer in the Department of Defense. He also served as the Director of the Defense Intelligence Agency and has vast experience in national, defense and military information services, information technology development and diverse customer support services.
While the Director of NSA, Lt. Gen. Minihan helped conceive and provide strategic direction to the National Information Assurance Program. He also created strategic approaches and development concepts for emerging telecommunications technology while redesigning core business skills and efficient operations. He has the unique ability to integrate complex programs and business operations allowing the organization to focus on cost and schedule goals.
Lt. Gen. Minihan is a past president of the Security Affairs Support Association and a founder of the Intelligence and National Security Alliance in Washington, D.C. He is also a member of the Air Force Association and a number of public and private boards. He often serves on government pro bono committees and panels to examine ways to enhance homeland and national security capabilities. Lt. Gen. Minihan has a B.A. from Florida State University, an M.A. from the Naval Postgraduate School, and has completed executive development programs at the University of Illinois and Harvard University. Among his awards and decorations are the National Security Medal, the Defense Distinguished Service Medal, the Bronze Star, and the National Intelligence Distinguished Service Medal.
Thomas E. Noonan
Tom Noonan is an Operating Partner at TechOperators and the CEO of JouleX, a leading innovator in sustainable energy management systems for enterprise customers. Tom is the former chairman, president and chief executive officer of Internet Security Systems, Inc. (NASDAQ: ISSX), which was acquired in 2007 by IBM for $1.5B. Tom Noonan and Chris Klaus launched ISS in 1994 to commercialize and develop a premier network security management company.
Prior to co-founding ISS, Tom held senior management positions at Dun and Bradstreet Software, where he was vice president, worldwide marketing. Before joining D&B Software, he specialized in real-time, automated control systems for computer-integrated manufacturing. Earlier, Tom founded two successful technology companies while residing in Boston: Actuation Electronics, a precision motion-control company and Leapfrog Technologies, a software development company designed for networked applications.
In 2002, President Bush appointed Tom to serve on the National Infrastructure Advisory Council (NIAC), a White House homeland defense initiative that protects information systems critical to the nation's infrastructure. He currently chairs the NIAC Evaluation and Enhancement of Information Sharing and Analysis Working Group.
Tom holds a mechanical engineering degree from Georgia Tech and a business degree from Harvard University.
Ted Schlein
Ted Schlein is a general partner at Kleiner Perkins Caufield & Byers. He joined the firm in 1996 with a focus on early-stage technology companies in the enterprise software and infrastructure markets, including ventures within the networking and consumer security arenas. Ted has led KPCB’s involvement in a number of successful investments, including Jive Software (JIVE), IPO, ArcSight (ARST), IPO, sold to HP; Beijing Venustech (002439:Shenzhen), IPO; Corio (CRIO), sold to IBM; Extensity (EXTN), sold to GEAC; Fortify Software, sold to HP; Internet Security Systems (ISSX), sold to IBM; and Oakley Networks, sold to Raytheon. Ted was the founding CEO of Fortify, a pioneer in the software security market and now an HP company. He serves on the board of directors of 3VR, 41st Parameter, Alien Vault, Chegg, Hara, Inspirato, IronPlanet, Jive Software, Mandiant, Nebula, Reputation.com, Shape Security and Verdiem. He also oversees KPCB’s investments in Endgame, LifeLock and Bit9.
Before joining KPCB, Ted served as vice president, Enterprise Solutions at Symantec. One of Symantec’s early employees, he played an instrumental role in the company’s growth and dominance as a global software leader. Ted led Symantec’s successful move into the software utilities market, as well as the launch of its commercial anti-virus solution, an offering that quickly emerged as the industry gold standard.
Ted is the former chairman of the National Venture Capital Association (NVCA), a national alliance advocating the role of venture investing in job creation, technology innovation and economic development. He is also the former president of the Western Association of Venture Capitalists and serves on the board of overseers of the Engineering School at the University of Pennsylvania. Ted frequently participates as an opinion leader in public, private and government forums, providing perspectives on security technology, related investments and market adoption trends. Ted holds a B.A. degree in economics from the University of Pennsylvania.
Chris Rouland
Chris Rouland is co-founder and founding CEO of Endgame. He has over 20 years of experience in the field of information security. Mr. Rouland previously held the position of CTO and Distinguished Engineer of IBM Internet Security Systems after IBM purchased Internet Security Systems, Inc. in 2006. Prior to the IBM acquisition of ISS, Chris held the position of CTO of ISS where he was responsible for the overall technical direction of the ISS product and services portfolio. Prior to his executive roles at IBM and ISS, Chris was the original Director of the famed X-Force vulnerability research team which was responsible for the discovery of hundreds of security vulnerabilities. He was a Vice President at Lehman Brothers, and is a graduate of the Georgia Institute of Technology.
Talk about yer black sites. The place is spooky... in both senses. The "Endgame" logo moving back and forth is like what happens when your system is being "analyzed". Had to get outta there fast. Yeah, right, like closing the browser window did any good....
That site was the epitome of wanky web 2.0 HN insipid bad design. So bad I thought it was already hacked. There's errors all over it (sloppy).
The careers page is way too long for an established company (far too many openings), and they post a picture IDing most of the team, as well as locations of offices. There's also a work flow chart in the background of one of the pictures, GG.
OPSEC is disappoint.
Endgame, Bonesaw and Nasty Prick...sorry, I mean Nate Fick
C4ISR Page 8
http://www.law.gwu.edu/News/newsstories/Documents/2013_C4ISRJanFeb13.pdf
still waiting for it to open...
still waiting for it to open... and then it did.
thanks.
+1
Thanks
Think we snow'dem General?
Yeah I think that they are all intel gather, no intel verify.
Our objective: To make the lemmings believe we are everywhere, know everything, and are all powerful.
We ARE GOD!
Sir, you forgot to tie your shoelaces.
That's right subordinate private BootLicker. I was testing your powers of observation.
Sir, the name is Corporal LootBicker. You promoted me last time you fell in the shower and I picked you up.
Ah, yes, that's right. Sergeant Smootbacker. Well done.
Now back to intimidating our mental moron minions.
I am not replying to any one person in general, I have been on this ite for more than 3 yrs without a comment.
Why is every one so against America? I am from a 3rd world country.
Do any one commenting on this site know what are the rights we have there ?
Whats the mortality rate there?
People die in these 3rd world countries like bees in usa!
What I think is this is the ONLY PLACE ON GLOBE WHERE U ATLEAST HAVE SOME RIGHTS BELIEVE ME ...
MOST OF THE COMMENTS I SEE ON THIS MY FAV ZH ARE IMMATURE
We are trying to hold onto the "rights" we have. Especially those granted by our Creator.
Immature. I will grant you that. With too much comes stupid...
It's just that many here see things heading in a very bad direction Que Sara...
And while you are correct in stating that most of the inhabitants of rest of the world enjoy far less freedom (and a much lower standard of living) than the US don't ever take it for granted that things will improve for the majority of citizens of the world and the West.
And those American 'rights', 'freedoms' and 'values' that used to shine as a beacon to the rest of the world?...
They are under assault.
And who profits from (and supports) those 3rd world shithole dictatorships the most?
Right.
Troll.....
And to think we pay for Norton and others.
Who really owns the anti virus mob?
Welcome to the Machine...length of video: 9:11
https://www.youtube.com/watch?v=BhASpp_Ons4&list=WL182571F492BB7572
"Snowden's a fraud"
From Tarpley's latest
http://www.youtube.com/watch?v=14PrhRS5AL0
This guy simply has no idea what he is talking about.... anyway time will tell but right now there is a "fire in the hole" back at the NSA and I can't imagine a spook like Alexander would want to crawl out from under that rock his has been hiding under just to answer the questions from the nice people of Congress...
If I remember correctly, Snowden spent several years at another company in .gov. Clearly his former co-worker in the article, the one whom spoke on condition of anonymity, indicates certain budgetary tensions.
Perhaps there are other differences of opinion as well. For example, could no such agency be intercepting company mail? I find the comparision to J Edgar interesting, considering his methods.
For the time being I'm comfortable in believing the message is the message. Mostly because I possess delusional optimistic tendancies at times...
If the messenger becomes the issue we are in a different ball game.
He may well be exactly what he claims (and I would prefer that he were). However, it's important to note at least two statements published (by the Guardian) about his CV.
First, he was employed directly by the company, including a covert foreign assignment.
Second, he was never directly employed by no such agency.
Ever been recuited? Interesting process. Very different from contract positions.
[Edit] It's probably nothing, but I can't shake the image of Dulles and Wisner playing the "mighty wurlitizer".
“Bonesaw is the ability to map, basically every device connected to the Internet and what hardware and software it is,”
Oh, yawn... Nothing critical should ever be connected to the internet. That's been the rule for decades now.
Cyber warfare, lol. Just unplug a cable. All those billions simply represent the latest military industrial complex fraud and waste. Proof is "backwards" Iran was able to hit back easily.
When everything that matters unplugs from the internet, Emperor Alexander and his minions can sit in their bunker and play video games.
We are one with the BORG.
Resistance is futile!
Pull the plug!
Woooooh Jah
+1
.....what's ya gonna do when the lights go out.......
starve the beast
Eh General Alexander : FUCK YOU, YOU TREASONOUS PIECE OF SHIT.
He knows what you did last summer....
and will be doing the next...
"He knows when you are sleeping, he knows when you're awake..."
He's the Anti-Claus.
Satan Claus.
Ich bin ein Elfiners.
He also knows you're on ZH right now talking about him, and has probably already located and bookmarked your house via Bonesaw
He still can go fuck himself.
After reading this article, I went for a piece of black electrical tape to cover the webcam on my computer (which I never knowingly use anyway)...
Then I thought, 'fuck it, having to look at my ugly mug in the morning drinking coffee and scratching my balls is probably causing some NSA goon to have nightmares'
It's the least I can do ;-)
Fuck his "Bonesaw" I've got Spiderman
Fate the Magnificent
"Push the Button, Max"
Good thing I live in a van down by the river!
Just throwing this out there...if we had access to this kind of information, we could determine who is actually running the show. That said, all of these analysts currently have that power. Odds are many will get rich via blackmail. However, all it takes is one with a conscience to bring the whole machine to its knees.
They make very sure no one with a conscience gets to a position that matters.
Dear NSA,
Who is the Beast ?
Who is the top of the Pyramid ?
Who controls all the Banks ?
Who killed Kennedy ?
Who orchestrated 9-11 ?
Who is Obama ?
insert muslims in all dem tings day responsi bull for everyting says my friend jewish rums feld
plus 10000
I wonder how many Operation Paperclip folks and or their relatives are tied into this?
"WHERE'S THE TRIGGER, WHERE IS IT, WHERE'S THE TRIGGER"
Lol;)
I just made a handgun out of a cinnamon pop tart. Bang...
MOAR dsclosures bitchez! Go!
Not so much a disclosure as it is attempted cover-up, and only on a local level, but at least I tried to give you something (even features a 'smoking gun' recording):
<<A Tennessee Department of Environment and Conservation deputy director warned a group of Maury County residents that unfounded complaints about water quality could be considered an “act of terrorism.”
“We take water quality very seriously. Very, very seriously,” said Sherwin Smith, deputy director of TDEC’s Division of Water Resources, according to audio recorded by attendees. “But you need to make sure that when you make water quality complaints you have a basis, because federally, if there’s no water quality issues, that can be considered under Homeland Security an act of terrorism.”
“Can you say that again, please?” an audience member can be heard asking on the audio.
Smith went on in the recording to repeat the claim almost verbatim.
The audio was recorded May 29 by Statewide Organizing for Community eMpowerment, a Knoxville-based civic action group that had been working with Maury County residents to tackle water quality complaints in Mount Pleasant. Residents there have complained to the state for months...>>
http://www.tennessean.com/article/20130621/NEWS02/306210110/Official-Wat...
Either he is "crying wolf" about a pretended threat, or,
The Police State is Everywhere.
He's probably one of the Federal employees getting a nice bonus.
At least Alexander has a certain czar ring to it. All hail!
Hail to the Keith...
I was right reading his name as Kaiser Alexander...
is this guy from macedonia?
Ahh....the invisible hand. Ok. Nice to meet you!
he started out as a pipping tom spying on he's little sister! fucking weirdos!
Operation Bonesmoker. How appropriate.
1/10th of the Belgium GDP on cyber warefare....
8/10ths on child molestation.
1/10th on frites and mayonaise.
nag, there are more children ebing raped in America and France than in Belgium.
the difirence is that we catch them and bring them to justice.
So if I post that General Alexander should be tried and hung for High Treason on the Mall in D.C. televised and podcast Bonesaw can find me out?
Bonesaw?
General?
Yes.
Unless you use someone elses computer (and connection) and place tape over that little web cam looking at you ;-)
/////////////
One of Alexanders anal-cysts is on my case?...ROTFLMAO!!!
http://media.photobucket.com/user/Fartingmonkey/media/middle_finger.jpg.html?filters[term]=middle
Better still place a picture of a hairy scrotum with warts in front of the web cam.
General Alexanders anal-cysts will now note the blackness where there was once, my smiling face on the web cam "feature" of a corporations device that I own.
The person typing (now) may very well not be me. Only someone who knows my habits/markers.
In the age of rapid transportation, it could very well be BaNzAi or LTER sitting at my house.
How, very unfortunate, for them ;-)
hehe. Pull the other one.
Bonesaw like the power tool used to cut open skull bones.
Skull and Cross Bones ?
Yale Bonesmen?
Two First names + Invisible = Member of Tribe ?????
An old and relatively recent Common practice among Scots, Welsh families.
In 2003, Alexander, a favorite of defense secretary Donald Rumsfeld
All you need to know about his character... when you're a favorite of despicable human being, traitor, war crimnal and human rights abuser Rumsfeld, you've GOT to be a piece of shit of the highest caliber.
Remember that great scene when Rumsfield stood up to Cheney and Cheney waved his fingers and shot Rumsfield in the face? Classic.
You Tube Link ?
http://www.youtube.com/watch?v=1zgja26eNeY
Correct, Dickhead Cheney considers Snowden the enemy, while Rumsfeld loves Alexander.
If there is an American alive who still hasn't figured out who the enemy is, that individual should be immediately deported!
And doesn't the US just love the "rebels" in Syria who have sworn their allegience to al Queda?
A few weeks ago a young british soldier was decapitated, mutilated by a terrorist just a few miles from where i live. My government want to arm his kind in Syria and consider me an enemy of the state. If this is their view then yes i am the enemy as i will fight against these terrorists.
Too bad you let yourself be disarmed. You might want to stock up on some fireworks, I guess.
We weren't even born when they took the guns buddy,
And neither my English friend, or myself, have a second Amendment to assist us,
If I get found with an assault rifle, or even a Glock,
10 years, no debate,
So kindly don't be so fckn smug,
We're awake mate,
But what you call a police state,
is everyday life for us here in Europe,
We don't even have freedom of speech for fck sake,
That's your problem. You guys are too polite.
Fck you,
How's that for polite:)
Do you not know how to spell "fuck"? Or are you just being nice?
True that, they could have bought some PVC pipe's and buried them.... like 70% of the Aussie semi-autos that where never returned. However, the Brits just rolled over like some obidient 'wet dog' and did what their so called 'betters' told them to do.
I'm ex-UK and the majority of the so called 'British' have devolved into a mob of powerless eunichs who have let TPTB make them believe that they are their own worse enemy, political corectness is the only world view, white men are evil and that the 'free shit' will always flow. Of course on the other hand the so called PTB then proceed to economically enslave the 'brown' and 'black' ones to keep them in their place and keep em voting. These poor ones get some token trinkets taxed from what is left of the productive middle and subsequently ask for even more free-stuff.
The circle jerk continues.
So Englanders get yourself an AK like all your crims have from the eastern block, some ammo and bury it well in someones 'alotment' or get fucked over when the time comes.... and it is coming.
Your move...
As E Snowden has helped make clear, the Gubmint seeks complete control of J Doe not at gunpoint, but with a surveilled data aggregated into a profile. It does not appear that the citizenry will correctly revolt against this stunning abuse.
Am I the only one feeling very much like abandoning all things digital/electronic/card/web/online/cell/etc. Gubmint WILL NOT own me
You don't need guns to fight Fascism.
Before you Americans get too cocky about your chances ("all those privately owned small arms and ammo"), remember you may well be facing-off against your "Government" - which has a good track record of using NBC weapons against civilians when it was "operationally convenient" to do so.
The US Military has spent a LOT of taxpayers' dollars over the past decades on some very interesting weapons platforms, and stand-alone munitions, all of which are eminently suitable for use in an anti-personnel (i.e. "anti troublesome civilians") role.
Expecting your Military / Militias (a.k.a. "police" forces) to "do the right thing", i.e. act in your interests? They'll be "doing the right thing" allright - looking after THEIR interests - just as has happened every time in past major conflict History.
You're more likely to get truly "beneficial" assistance from Russia or from China, than from those who are "supposed" to be your paid-for "protectors"!
Nearly Monday,
Get ready for work slave, and stop questioning stuff,
Or SO19 are gonna take your door of its hinges.
Hey everybody, look at the Irish guy backing up the English guy,
It's almost like they think that they have an enemy in common????
Thank you, British person, for realizing you, too, are the #1 enemy of your own country, as we are here in the NSDAPUSA.
Jeebus, another American army run on Big Blue from the bowels of the CFR building in NYC.
Ten young people in Greece talking,
6 have no job,
How's that gonna work?
'China-MENA' -- Middle East Northern Africa and the whole-of-the-Mediterranean Pivot?! {[sic] ports in Greece, Italy, Spain and Arab Countries prime real-estate for trade}
Ref: "China discovers the Mediterranean" by Pietro Longo http://www.atimes.com/atimes/China/CHIN-03-210613.html
Egypt's Suez Canal is key for Mursi? Note: a third (1/3) of the world's trade passes through the Mediterranean via [in/out] the Suez Canal up through Gibralta heading any direction the Sextant's `manifest-portcall beckons? www.atimes.com/ while your there please give a friendly 'roving-eye' to Mr. Pepe escobar
Ps. Think of Morocco, Algeria, N/S Sudan etel.
Lolz, only the fucking government.
Billions and billions and billions of dollars of shit, all of which can be easily defeated by simply unplugging a network cable.
The world existed (and actually ran a little better) before the Internet. The world will contniue to exist once essential equipment is once-again unplugged from the network.
Tell me again why the fuck an important HVAC system, for example, NEEDS to be internet connected? Quite simply It doesn't. And in the near future it will not be anymore, and then all the military will be able to "cyber-attack" is some fucking useless facebook page.
The central government is absolutely desperate to justify its existence, by any means necessary.
It's pathetic.
Two quick points:
First - don't buy the propaganda. The US Government is seriously overrated. A bunch of guys in sandals, with ancient weapons, are currently kicking the US Government's ass right out of Afghanistan.
Second - the most powerful individual in Washington is the IRS commissioner. As goes the IRS, so goes the US Government.
Exactly, and, even worse, as they spend all of this endless money on cyber-stuff, moving in new guys with new talents for cyber-stuff and sending the old guys out to pasture, they are losing their skill-set in HUMINT.
Perhaps the HUMINT part of the business is attempting to level the playing field.
Exactly right. Without free print US fiat and gov't appointed sinecurial position nearly all these supposed wunderkinds would be shoulder to shoulder with all the remainder. "What can I do for you in free exchange which would best improve your life?". Without their convoluted and corrupt pyramidal system, they couldn't muster enough know-how and with-all to build a brick shithouse.
Remember, most modern men of the modern nation-state are good at one narrow highly specialized craft. Cut them down to a more primitive existence without their fine ribboned uniforms and they really couldn't prepare enough food to feed themselves. This power they so love to covet has come by the consent and intimidation of those who are real producers. Without their extraction formula based in thin-air fiat and intimidation by arrogant bully power, they cannot exist. It is only by extraction, fraud, and corrupting other's fairplay that they sit at table to partake of daily fare to sustain themselves. Whitened sepulchres full of iniquity and filthiness.
Remove their OZ curtain and strip them of their pyramidal position and they would make poor delivery boys or shoeshiners or undertakers. And starve in a few weeks leaving others to get on with much improved lives.
Certainly, the hominids known as "liberals", in the states united, would have a hard time surviving longer than two months without food stamps and government jobs.
Can you imagine being an analyst? Some poor idiot types something into his PC that raises a red flag, and then this operative has to go through all his boring shit. The real bad guys know better. I think most of the data taken from you and me is used as a trending tool. Important to know how the Prols are feeling in case they get uppity
Dear Mr. General Keith Alexander we do not believe in Santa Claus but we do believe in you. If you are truely capable of blowing more rather than harder would you please reveal to the world the documentation of the criminal activities of 1) Eric Holder. 2) Dick Cheney 3) Lindsey Graham 4) Donald Rumsfeld 5) Diane Feinstein 6) Loyd Blankfein 7) Jamie Dimon 8) Ben Bernanke 9) John McCain 10) Alan Greenspan
If you would do this for us we will give you their worlds or at least a part of them.
Sincerely,
The children of Q99X2
Please add Barry Sotero to the list.
and harrison j bounel
Don't overlook Ovomit the Manchurian candidate & The Disbarred Mooch.
Any friend or associate of Rumsfeld should get the rope for associating with Fascist cock-sucking traitors.
What a crock of shit the leadership of these so-called "programs" are.
Alexander won't say a fucking word because all the military prestege in the world cannot mask the fact that he is an enemy of the people and Constitution.
Accomplishments Widowmaker's ass. These are CRIMES AGAINST THE AMERICAN PEOPLE. THESE FUCKUPS ARE NOT ABOVE THE LAW JUST BECAUSE THEY ARE HIDING IN FASCIST GOVERNMENT INC AND PUSSYFUCK HOLDER WONT LIFT A FINGER FOR THE GOOD OF THE NATION!
How appropriate that "West Point graduates" are the same spineless pussies decimating the United States of America and the free world. That place used to be credible and at the very least trustworthy.
THE WAR ON TERROR IS A WAR ON ANYTHING AND EVERYTHING THAT ISNT FASCISM!
It is destroying every sound institution there ever was in the Federal government, and poisoning the populous.
Pussyfuck Holder was placed in his job...to do exactly what he is doing. I don't enjoy repetition, but I'll try one more time.
We are supposed to be a nation of laws.
But when the law says, a repeat offender for drugs or petty theft carries more jail time than a Jon Corzine stealing "just once", something has seriously gone awry.
When you can be set upon by legalized brigands (traffic cops) for not wearing a seatbelt, texting or talking on a cell phone, something has been lost to something (or someone elses) benefit.
When laws can be crafted, in such a way as to steal from one in order to give to another, without the ones crafting law paying a price as well, something is amiss.
Hey, the wakeup signal was them telling us what fucking kind of light bulb we have to use.
(among others)
You are not alone WM. I am alone right now but I have a loaded gun and my resolve. I also have a four foot section of pipe that I killed something with since my last post. Fucking rodents.
oh, pleeeese. If he was "surprised" at all, it was that something about WTC7 didn't go "as planned."
Man, that's homicide, he's traffic.
What didn't go as planned was that people noticed no plane hit it?
And that all the SEC records were in it?
You would think the "Puzzle Palace" would be able to get a hold of a few school transcripts...
AWWW... F'it, time for some JD Old #7!
j edgar hoover collected and vacuumed skelton bones from the publics' closet--- as for the curator's, mr. alexanders' bonesaw... it's a forensic dinosaur-bone paleontologist blackmailing in[di]visable machine, used only in and through walk-in closet... scrubbing what hoover's vacuum hadn't yet darwin'd?!
"Happy trails to you... until we meet again" http://www.youtube.com/watch?v=XcYsO890YJY
... not one post questioning obama's guilt over this?
wow
his strategy to keep his hands off everything and thus avoid responsibility for anything is working well
jb
I'm beginning to think the only way to derail this whole thing and unseat people like Alexander is a couple of big 'ol EMP's over Fort Meade and Bluffdale. Then the rest of us 99%'ers can rebuild.
I only skimmed the article, but I believe this cat has attended at least one Bilderberg pow-wow.
They hate us for our Free-Dums.
Oh, land of the "free"...blablabla...
We humans are an asset to be strip mined.
and does Santa Clause really live at the North Pole??
“They want to be the agents, not the victims, of history. They identify with God's power and believe they are godlike. That is their basic madness. They are overcome by some archtype; their egos have expanded psychotically so that they cannot tell where they begin and the godhead leaves off. It is not hubris, not pride; it is inflation of the ego to its ultimate — confusion between him who worships and that which is worshipped. Man has not eaten God; God has eaten man.”
All this power, and how broken the country is. He must know how Gorbachev felt, one supposes.
And all for naught if a X-X-X flare sequence hits.
hmmm...
interesting quote from The Man in the High Castle
soon to be made into a 4 hour miniseries
edit:
The I Ching is prominent in The Man in the High Castle; having diffused it as part of their cultural hegemony overlordship of the Pacific Coast U.S., the Japanese—and some American—characters consult it, and then act per its replies to their queries. Specifically, "The Man in the High Castle", Hawthorne Abendsen, himself, used it to write The Grasshopper Lies Heavy, and, at story's end, in his presence, Juliana Frink, queries the I Ching: "Why did it write The Grasshopper Lies Heavy?" and "What is the reader to learn from the novel?" The I Ching replies with Hexagram 61 ([??] zh?ng fú) Chung Fu, "Inner Truth", describing the true state of the world—every character in The Man in the High Castle is living a false reality. By implication, so is everyone in our current 'reality' where Britain declined and the US became supreme. [wiki]
And they call the fringe insecure ...lol
+5 Tylers
So now we can add strategic cyber weapons of mass destruction to financial weapons of mass destruction. Imagine the two being combined in a vicious attack against you one day. You look at your trading screen, but, it’s not the real market you see. It’s a mock vision of a market, fed like a pre-recorded video tape from some secret data base. It lures you and hundreds like you, or perhaps some HFT algo, into making thousands of off-market derivative trades before you realize what is going on. It would be enough to make Knight Capital’s, uh mistake, to look like a one-tic one-trade error. Do you think someone could crash a market with that capability? Do you think someone could make some money with that capability? Do you think someone who once worked in Emperor Alexander’s empire might be able to transfer that technological capability to a sinister HFT operation in the private sector? Do you think that Ed Snowden or Taliban Terrorists in Afghanistan are really the biggest security threat to America today?
^ that would make a cool movie!!
Coming soon, to a stock market near you! Quantam Dawn II: The Takedown!
Best thing you can do is dump microsoft and apple pronto and move to an open source OS like linux because anythingf fostered by government will have back doors. After that the only real thing that can be achieved if you block the lot is a DOS attack.
Any encrption you must implement yourself, relying on a encrpytion model creaed by others will be decoded easily.
"He is director of the world’s largest intelligence service, the National Security Agency; chief of the Central Security Service; and commander of the US Cyber Command. As such, he has his own secret military, presiding over the Navy’s 10th Fleet, the 24th Air Force, and the Second Army."
and....
" Along the way he picked up masters degrees in electronic warfare, physics, national security strategy, and business administration."
and....
911
"But just six months later, Alexander and the rest of the American intelligence community suffered a devastating defeat when they were surprised by the attacks on 9/11."
Surprised?
REALLY
Fukken REALLY?
Ok, am I stuck on stoopid here? Fukker should have been fired.
Pretty much no point in wasting more time reading the rest of this dribble....
Seems like either Golden Boi was either complicit or off gluing the eyes shut on his hot secretary with man spackle.
As the only real rationale for the growth of government is to remedy its failures, why would you fire anyone who fails? The cancer ultimately destroys its host. Afterall what choice does it have?
UNLESS they WANTED 911 to happen. Pretext!!!!
Or UNLESS he was in on PLANNING it (and ATTEMPTING to cover it up). Complicity!!!!
BTW, there's a big Cyber Warfare DRILL on June 28. Let's hope the trrrrsts don't hear about it and, errr, concidentally join in....
GreatUncle wrote
"Best thing you can do is dump microsoft and apple pronto and move to an open source OS like linux because anythingf fostered by government will have back doors. After that the only real thing that can be achieved if you block the lot is a DOS attack."
Yup, LINUX and fuck facebook....
https://www.pidder.com/en/index.html
Why would I want to put my data there (Pidder)? Personally, I prefer physical control of my storage media.
This is the kind of shit you get when government goes completely overboard with access to unlimited funds and no oversight, nor compliance with laws, and no respect for our rights. If the government were the public servant it claims to be, government would be getting smaller and our tax burden would be decreasing. What we have is a collection of socio and psychopaths who are allowed to play games without rules nor regard to costs and repercussions. Remember, America is the land of the free where the nutjobs are free to fuck us over in any way, manner or form they please - totally disgusting.....
HelluvaEngineer wrote "So sorry, left this out of my original post. Perhaps inferred by the article but not explicit, all of the commercial OS manufacturers (think MS, Apple) have almost assuredly put backdoors into all of these systems. In other words, determine that the target is running Win7, then attack the intentional exploits of the system. Ain't Corporatocracy grand?"
Well, just the software currently available to City / State level LEO to crack open Windoze would astionish most sheeple....
Looks like it's time to unplug folks.
Just go fishin'
Ha.
Oh I almost forgot..... "vote" 'cause it's the patriotic "murican" thing to do.
Just go shopping....and all that.........
The catfish have RFID chips in their whiskers now.
Long as you vote to revoke your consent to be governed by these bastards.
I am starting to think that it might be time to find some 3rd world location to retire, watch bamboo grow and wait upon the Lord's return.
If the lord did return we would likely never hear of it. He would be "disappeared" before he had a chance to be seen or heard. Besides, no one would want to hear what he had to say anyway. Thats why Americans vote democratic.
Amen to that man!! Add in some fishing and a nice Local girl and a bucket of of cold beers....., that's got the good old spy-vs-spy world beat hand down!!
Interesting NSA sidelined Petraeus - for resisting???????
For exercising poor judgment and taste in the performance of his Johnson? Doubtful we will ever know the real reason. But to me it is like one of those Frankenstein Meets the Wolfman films. I can't get emotionally invested in the outcome.
............BEWARE of MICROSOFT...........IE Contains Spyware...........
Current versions of the Internet Explorer Browser have a feature called SmartScreen. I dunno what it's for because I don't use IE. But SmartScreen contains Spyware. I'm not referring simply to "calling home" with innocuous data which Microsoft are well known for. I mean real Spyware.
This is an irrefutable fact which I discovered a coupla days ago when I sent a URL link to someone in an e-mail to download a file from my private fileserver. I spotted that within one hour of that person downloading the file, I had five further accessess/downloads from different IP Addresses. Some investigation revealed these IP Addresses belong to shady parts of Microsoft and that it is spyware installed by Microsoft in their current IE browser. Imagine that.
http://www.linux.org/
The publicizing of these programs will do nothing to curb their power but do everything to enhance their effectiveness. This effectiveness is not about their ability to surveil us. It is about intimidation. It is about making us fearful to speak publicly. It has been working beautifully as this site is testimate to. We feel free to speak here as long as we think our identity is relatively protected. The IRS profiling is doing the same. Its not about being denied some tax status. It is about being afraid to ask, for fear of some back handed or in your face retribution. They need for the public to see them as somewhat benign yet still a potential threat. Kind of like a parent who is perceived as lovingbut more than capable of punishing bad behavior. As far as actually using the data they are collecting it will more likely be used to track our finances than our political speech. They can control us through implied threats but they need to know where the money is buried and when you have systems that can connect phone calls with money transfers, credit card transactions and GPS, all stored in data centers, if they want to know what you have been doing with your money, be it buying gold, ammo, guns or porn, they have your name, they have your number. They need to control our behavior and have access to our wealth. Its for the good of the country....