Archive for the ‘CyberChaos’ Category

Energy firm cyber-defence is ‘too weak’, insurers say

Monday, March 3rd, 2014

technology11– I’m not surprised about this development.  Why it has taken this long to bubble up to where it is considered a ‘serious’ threat is beyond me.  

– To see why I say this, check out this article from April of 2009 on Samadhisoft.

– And, if you are wondering how far and how wide these sorts of threats go, then simply click here on the ‘cyber-chaos’ category here on samadhisoft to see all the stories we’ve published on this subject.  

– And we have, I assure you, only touched the tip of the iceberg.

– dennis

= = = = = = = = = = = = = = = = = = =

Power companies are being refused insurance cover for cyber-attacks because their defences are perceived as weak, the BBC has learned.

Underwriters at Lloyd’s of London say they have seen a “huge increase” in demand for cover from energy firms.

But surveyor assessments of the cyber-defences in place concluded that protections were inadequate.

Energy industry veterans said they were “not surprised” the companies were being refused cover.

“In the last year or so we have seen a huge increase in demand from energy and utility companies,” said Laila Khudari, an underwriter at the Kiln Syndicate, which offers cover via Lloyd’s of London.

The market is one of few places in the world where businesses can come to insure such things as container ships, oil tankers, and large development projects and to secure cash that would help them recover after disasters.

‘Worried’

For years, said Ms Khudari, Kiln and many other syndicates had offered cover for data breaches, to help companies recover if attackers penetrated networks and stole customer information.

Now, she said, the same firms were seeking multi-million pound policies to help them rebuild if their computers and power-generation networks were damaged in a cyber-attack.

“They are all worried about their reliance on computer systems and how they can offset that with insurance,” she said.

Any company that applies for cover has to let experts employed by Kiln and other underwriters look over their systems to see if they are doing enough to keep intruders out.

Assessors look at the steps firms take to keep attackers away, how they ensure software is kept up to date and how they oversee networks of hardware that can span regions or entire countries.

Unfortunately, said Ms Khudari, after such checks were carried out, the majority of applicants were turned away because their cyber-defences were lacking.

– More…

 

 

 

Cicada 3301

Monday, December 23rd, 2013

– I’ve been a programmer and systems analyst most of my life.  I started with computers the year before I graduated from university (1976) and I’ve loved the work ever since.   Indeed, I threw over the career that my degree in Microbiology qualified me for to pursue the new (then) world of computers.

– I’ve been all around the block with this career, as you might expect, given the years I’ve spent in it.   And I was lucky (or brash enough) to have found my self in widely disparate areas of the field ranging from applications, web-based and database work to the lowest levels of operating systems written in assembly language.   

– But, no matter how much you’ve seen and how far down the rabbit hole you’ve wandered, there’s always more.  The following article brought that home to me clearly.  

– The Internet that we know is not the Internet that actually exists.  Beyond what most of us have seen as either users or programmers, there’s still another entire world out there.

– Digital spelunking, anyone?   I’ve posted links to two articles you may enjoy, below.

– dennis

= = = = = = = = = = = = = = = = = = = = = =

tunnelsWikipedia’s take

A first hand account

‘Uncomfortable’ climates to devastate cities within a decade, study says

Monday, November 4th, 2013

– This is what John Roach of NBC News has to say on October 9th, 2013

– But this has all been coming, writ large, for a long time.  

-It’s been coming since:

Lyndon Johnson discussed the CO2 we were putting into the atmosphere in 1965.

Since the Club of Rome discussions and their paper on “The Limits to Growth” in 1972.

Since the World Scientists issued their warning to Humanity in 1992.

– But it is only just now beginning to reach the evening news as plausible news.  

– We have just a few greedy, self-centered people and corporations to thank for the fact that their misinformation has been instrumental in delaying humanities waking up on these threats until it is virtually too late.  

Most recently, Naomi Oreskes showed us this in her book, Merchants of Doubt: How a Handful of Scientists Obscured the Truth on Issues from Tobacco Smoke to Global Warming

– Some of us remember how Mussolini ended up.   I wonder, when the damages are finally appreciated, if these folks may fare the same.   I won’t cry any crocodile tears for them; that’s for sure.  

-By their actions many, many millions will die, cities and nations will fall, species innumerable will go extinct and most of our descendants will have less than optimal lives to look forward to; if they manage to live through the changes that are coming.

– dennis

= = = = = = = = = = = = = = = = = = = =

Lesser daysThe world is hurtling toward a stark future where the web of life unravels, human cultures are uprooted, and millions of species go extinct, according to a new study. This doomsday scenario isn’t far off, either: It may start within a decade in parts of Indonesia, and begin playing out over most of the world — including cities across the United States — by mid-century.

What’s more, even a serious effort to stabilize spiraling greenhouse gas emissions will only stave off these changes until around 2069, notes the study from the University of Hawaii, Manoa, published online Wednesday in the journal Nature. The authors warn that the time is now to prepare for a world where even the coldest of years will be warmer than the hottest years of the past century and a half.

“We are used to the climate that we live in. With this climate change, what is going to happen is we’re going to be moving outside this comfort zone,” biologist Camilo Mora, the study’s lead author, told NBC News. “It is going to be uncomfortable for us as humans and it will be very uncomfortable for species as well.”

– To Read More of this article:  

– Still with the doubts, Sweetpea?   Then please read this:

 

Tiles, the NSA and your iPhone – it’s a changing world

Monday, September 16th, 2013

“The agency, according to the documents and interviews with industry officials, deployed custom-built, superfast computers to break codes, and began collaborating with technology companies in the United States and abroad to build entry points into their products. The documents do not identify which companies have participated.”  from ProPublica

– dennis

= = = = = = = = = = = = = = = = = = =

As someone who thinks of himself as a futurist, I tend to keep my eyes peeled for patterns and connections which can, possibly, indicate something about our future.

There are two things going on now which I think are going to conjunct and increase the penetration into our personal lives of the nascent police states that most western democracies are steadily becoming.

The first thing

Is already visibly in motion.  That is the efforts of the American NSA to penetrate everyone and everything in the name of national security; as revealed by Edward Snowden’s documents.

It is now open knowledge that the NSA has broken most of the cryptology that we’ve depended on to keep our personal information safe from prying eyes.

This would include your computer passwords.

NSA

And any files you store in encrypted form.  And any files you send.  And any files you receive in encrypted form.

And, if they have access to your computer passwords, then they have full access to all your files and all your stored e-mail.

If they have all of that, then what do you have?

Bupkis – you don’t have much that’s yours, if they want it.

The criminal hackers of the world would be overjoyed to have that sort of access.   If they did, your computers would be full of malware, trojans and key loggers before you could blink.

I suppose we can just hope that the folks in the NSA that have access to this sort of power are using it exclusively for the public good.

The second thing

Has only just recently come into play.   These are the little devices called “Tilesthat you may have seen advertised.  They’ve been sold on-line now for a few months and the first deliveries are scheduled for winter 2013/2014.  I bought one recently for $18.95 USD out of curiosity.

Tile

Tiles help you find things.  They are about an inch square, made of white plastic, about 1/8 of an inch thick and they have a small hole on one corner so you can tie or attach them to things.  You can also stick them onto things with two-sided adhesive.

They have a non-replaceable battery in them that runs for about a year and they communicate back and forth via the Bluetooth short-range radio.   They come with an application program that runs on your iPhone and the program can help you find  one of your Tiles if you’ve lost it and whatever it is attached to like your keys, or your backpack or whatever.

If, for example, you’ve lost your keys, you fire up the Tile application program and ask it to locate the Tile attached to your keys.

If you are within about 50 to 150 feet or so of your keys (the range varies with terrain), the application program will show you on your iPhone where the Tile (and your keys) are … out in the garage.

Ah!  And then you remember that you laid them down on the work bench when your phone rang as you were getting the groceries out of your car.

One more thing about Tiles.  If you really lose something, like your motorcycle is missing through theft, and you were thoughtful enough to have had a Tile attached to it, you can contact the Tile people and they will put out an alert on that Tile.

Once a Tile has an alert on it, any iPhone in the world running the Tile application program that passes with 50 to 150 feet or so of your sought-after Tile, will silently send a message to the Tile people indicating that it ‘saw’ your Tile and provide the GPS location where it was.

The person carrying the iPhone running the Tile application program that located your Tile won’t even know any of this happened.

So, where ever folks are wandering around with the Tile application program on their iPhones, a quiet and constant search is being made all the time for lost Tiles (and whatever’s attached to them).

So, how does this link to the NSA and future developments?

Well, it goes like this.

The first thing to realize is that the NSA folks are certainly smarter than the average bear.  They could, and probably already have, made something very much like the Tile.  Something that’s a lot smaller, harder to detect, has better range, longer battery life and etc.  Let’s call these special NSA versions NSATiles.

The second thing to recognize is that the NSA already has the technology to break and enter into virtually any computer they want to; including our iPhones.

So, if they wish to, they can populate most of the world’s iPhones with a sweet little bit of hidden software that none of us would know about that does just what the Tile application program does; except for NSA’s purposes.

Mmm. Perhaps, I’m not thinking this through clearly?

Why should they need to insert new clandestine software into our iPhones from the outside?

The recent news from Edward Snowden has also revealed that the NSA has, under national security laws, forced some of the major software companies in the US to install ‘backdoors‘ into their software so the NSA can go in and look at what it wants to even while users of that software think their privacy is secure.   Moreover, the NSA has enjoined these companies to say nothing of this; again under the threat of national security laws.

So, why couldn’t the NSA have pressured Apple to add NSATile detection and reporting software?  They’ve done a lot of this sort of thing already.  And, Apple couldn’t warn us without breaking the law.

In short, there’s no reason why the NSA cannot use our millions iPhone devices to clandestinely scan the world for NSATiles that the NSA is interested in tracking.

And, when your iPhone sees such an NSATile, it will silently “phone home”  to the NSA and report it along with its GPS coordinates.  Nice, eh?

So, we will be an entire world of folks wandering around with iPhones doing the NSA’s bidding and looking for anyone or anything that the NSA wants to track geographically.  Terrorists, demonstrators, spies, packages, books, animals, us … you name it.

And all of us doing NSA’s bidding unknowingly.

Will this happen?

The real question, I think, given that capabilities described already exist, is why wouldn’t it be happening now?   After all, knowledge is power and this is government we’re talking here.

In a related development

There’s a parallel development involving very similar technology, see this article which I just encountered today by coincidence.

It is about something called iBeacon which is part of Apple’s newly released iOS 7 software.

This new iBeacon technology will be coming to a shopping center near you soon and it’s going to be talking to your iPhone as you walk by the stores.  It’s going to be trying to sell  you things.

Hackers ‘raid US weapons’

Wednesday, May 29th, 2013

Cultural Revolution

– If China doesn’t implode from its own internal pressures (the failure of the Mandate of Heaven concept), then it is likely that we’re all going to be living in a Chinese dominated world.

– Most of the rest of us are living in debt ridden societies with few realistic ideas of how to break the debt cycles. (Oh, yeah, let’s have another WalMart or Warehouse store so we can buy really cheap shit – that’ll sort things out).

– So here, the Chinese, apparently, have stolen the heart of America’s weapon system designs. They’ve denied it?   Well, what would you expect them to say?

– Clearly, they are winning the game against the west and they’ve used our own Capitalistic Systems and greed against us, brilliantly.

– All we can hope for is that their own greed, corruption, and their failure to understand that they too are subject to the consequences of pollution, climate change and global overshoot, is going to pull their system apart before they can take over ours.  

– Then, at least, we can all live equally in a ruined world rather than having to be serfs in a ruined world that they dominate.

– Do you think after reading this that I am prejudiced against the Chinese?  

– No, I’m not.  I differentiate between the people and their culture.   I know and value a number of excellent friends among the Chinese.  

– But their culture is another thing.  These are, after all, the same people that gave the world the spectacle of The Cultural Revolution just a few decades ago.  These same folks drive the Shark Fin markets, the Bear Gall Bladder Markets, the Ivory Markets, and etc.  

– They don’t seem to mind poisoning each other, and other nationalities, in their pursuits of profit.  (Granted, we’ve not been much better).  And, like other cultures before them (and here I very much include ours), they think they are superior, that they are right and that it is their mandate to rule.

– In the end, I think I’d prefer our own assholes to theirs.

– dennis

= = = = = = = = = = = = = = = = = = = = =

Some of America’s key defence items compromised but the culprits are not known.

Designs for some of America’s most important and sensitive weapons systems have been compromised by Chinese hackers, according to a confidential report.

More than two dozen key weapons systems had been affected, including missile defences, fighter jets, helicopters and navy vessels, the report said.

Among those listed are the advanced Patriot missile system, or PAC-3, the F/A-18 fighter jet, the Black Hawk helicopter and the V-22 Osprey, which is able to land and take off vertically.

It was not clear from the report, extracts of which were published by theWashington Post, when or how the designs had been compromised.

Its authors _ the Defence Science Board, an influential advisory body _ stopped short of accusing the Chinese Government of attempting to steal the information.

But senior military sources pointed the finger directly at Beijing, saying the security breaches were part of a “widening Chinese campaign of espionage against US defence contractors and government agencies”.

– More…

– Thanks to Kierin M for the Mandate of Heaven concept.

Anonymous Hacks US Government Site, Threatens Supreme ‘Warheads’

Tuesday, February 12th, 2013

– This YouTube video makes for interesting viewing and it sets out a number of  grievances Anonymous has with the U.S. government’s escalating abuses of the rights of U.S. citizens.   It’s well worth a watch.

– Will it cause the U.S. government to change its ways?   I doubt it.  Most of the people involved on the U.S. government side are simple people doing their jobs who haven’t the courage or the imagination to see that the jobs they are increasingly doing are not in defense of the principles upon which the U.S. was founded but rather in defense of those powerful forces who are in the processing of capturing the U.S. system for their own gains.

– dennis

= = = = = = = = = = = = = = = = = = = = = = = = =

The hacktivist group Anonymous hacked the U.S. federal sentencing website early Saturday, [January 26th, 2013] using the page to make a brazen and boisterous declaration of “war” on the U.S. government.

The group claims mysterious code-based “warheads,” named for each of the Supreme Court Justices, are about to be deployed.

As of midnight Pacific time, the front page of Ussc.gov — the Federal agency that establishes sentencing policies and practices for the Federal courts — is filled with a long screed in green on black, together with this YouTube video:  ➡

 – research thanks to Mashable

$1.6b cyber attack tip of iceberg, says top official

Tuesday, June 26th, 2012

Cyber attacks by a foreign state resulted in a British company losing £800 million ($1.58 billion) in revenue, the head of MI5 revealed yesterday.

This “was not just through intellectual property loss but also from commercial disadvantage in contractual negotiations”, said Jonathan Evans.

“They will not be the only corporate victims. The extent of what is going on is astonishing, with industrial-scale processes involving thousands of people lying behind both state-sponsored cyber espionage and organised cyber crime.”

Most state-organised cyber attacks in Britain are believed to be carried out by China and Russia, with an array of targets ranging from weapons manufacturers to petroleum producers.

The director general said the Security Service was involved in the investigation of “cyber-compromises in over a dozen companies and is working with many others that are potential future targets of hostile state activity. But this is only a tiny proportion of those affected.”

– More…

 

End of an Era

Tuesday, June 26th, 2012

– Parents, it is time to think about where your children are going to be when the sh** hits the fan.  I don’t think we’re going to avoid this mess but you could shift them to a place where another generation or two might have reasonable lives.   If you think that might be in a big city in the U.S., I think you are missing the point.

– Dennis

– – – – – – – – – – – – – – – –

By George Monbiot, published in the Guardian 25th June 2012

It is, perhaps, the greatest failure of collective leadership since the first world war. The Earth’s living systems are collapsing, and the leaders of some of the most powerful nations – the US, the UK, Germany, Russia – could not even be bothered to turn up and discuss it. Those who did attend the Earth summit last week solemnly agreed to keep stoking the destructive fires: sixteen times in their text they pledged to pursue “sustained growth”, the primary cause of the biosphere’s losses(1).

The future

The efforts of governments are concentrated not on defending the living Earth from destruction, but on defending the machine that is destroying it. Whenever consumer capitalism becomes snarled up by its own contradictions, governments scramble to mend the machine, to ensure – though it consumes the conditions that sustain our lives – that it runs faster than ever before.

The thought that it might be the wrong machine, pursuing the wrong task, cannot even be voiced in mainstream politics. The machine greatly enriches the economic elite, while insulating the political elite from the mass movements it might otherwise confront. We have our bread; now we are wandering, in spellbound reverie, among the circuses.

We have used our unprecedented freedoms, secured at such cost by our forebears, not to agitate for justice, for redistribution, for the defence of our common interests, but to pursue the dopamine hits triggered by the purchase of products we do not need. The world’s most inventive minds are deployed not to improve the lot of humankind but to devise ever more effective means of stimulation, to counteract the diminishing satisfactions of consumption. The mutual dependencies of consumer capitalism ensure that we all unwittingly conspire in the trashing of what may be the only living planet. The failure at Rio de Janeiro belongs to us all.

– More…

US government learning how to hack video game consoles

Sunday, April 29th, 2012

The US Department of Homeland Security is out to hack video game consoles, such as Xboxes, Wiis and PlayStations.

According to Foreign Policy, the US Navy has just awarded a $177,237 sole-source research contract to Obscure Technologies, a computer forensics company, to figure out how to hack the encryption that protects personal data on the consoles.

What the feds want from the deal, according tothe contract with the US Navy: “hardware and software tools that can be used for extracting data from video game systems” and “a collection of data (disk images; flash memory dumps; configuration settings) extracted from new video game systems and used game systems purchased on the secondary market.”

– More…

 

Corrupt call center workers selling your private information for pennies

Thursday, March 22nd, 2012

– Could it be another excellent reason to reconsider the rush to offshore everything?    Or is the profit gained by off shoring simply outweigh any of the negatives that accrue to your customers?

– Dennis

= = = = = = = = = = = = = = =

According to the Daily Mail an undercover investigation in India has uncovered that some call center workers have been selling confidential information on nearly 500,000 Britons.

Undercover reporters from The Sunday Times met with two IT workers who claimed to be IT workers who offered to provide them with 45 different types of data gathered from the victims.

Information offered up included names, addresses, phone numbers and credit card details (including CCV/CVV codes and expiration dates).

The reporters allege they could purchase the records for as little as 2 pence apiece ($0.03 USD). One of the IT workersthieves bragged:

"These [pieces of data] are ones that have been sold to somebody already. This is Barclays, this is Halifax, this is Lloyds TSB. We’ve been dealing so long we can tell the bank by just the card number."

They claimed to information on mortgages, loans, insurance policies, mobile phone contracts and television subscriptions. Much of the information was “fresh”, or less than 72 hours old.

– More…