Wednesday, September 23, 2015

Ashley, Jared, OPM and Blackmail

Ashley, Jared and OPM how many people have data that can be used to blackmail them?  The answer is probably a lot higher then we would like to think.  From marriage infidelities to criminal activities online there is a significant amount of material that could cost someone their job or their marriage or even as with Jared their freedom.  This allows those people to be extorted by criminals and eventually leaves them open to blackmail by any police state with a sophisticated monitoring system.

Communist China has that monitoring capability and a massive data base that allows them to make connections between any number of people.  It is therefore in a position to covertly manipulate people and get them to act in a way that is advantages for their police state.   From getting factories sent to their country to preventing sanctions for their hacking any number of decisions can be manipulated to China's advantage with almost no way of detecting their influence.

The combination of a blackmail database with total monitoring capabilities on smart phones is a disaster.  http://www.theepochtimes.com/n3/1471152-china-is-building-a-database-on-americans-using-its-domestic-spy-program/

http://www.v3.co.uk/v3-uk/news/2427186/chinese-firm-attacks-android-phones-via-malware-laced-apps


Communist China is engaged in Hybrid warfare against US

This article from the diplomat discusses the Communists China's use of hybrid warfare against the United States.  http://thediplomat.com/2015/09/hybrid-warfare-with-chinese-characteristics/

The basic concept is to use all possible methods to attack your enemies.  This would include cyber attacks as well economic warfare to undermine the enemies capability to resist.  Using criminals and terrorists as proxy's to physically attack the enemy with no cost to the aggressor.  Most importantly it has a large amount of psychological warfare to destroy the targets will to resist.

Communist China refers to this type of conflict as unrestricted warfare and two Colonels from the PLA wrote an extensive paper on it titled Unrestricted Warfare that mentions Osama Bin Ladin and the world trade center. 

"whether it be intrusions of hackers, a major explosion at the World Trade Center, or a bombing attack by bin Laden, all of these greatly exceed the frequency bandwidth understood by the American military... This is because they have never taken into consideration and have even refused to consider means that are contrary to tradition and to select measures of operation other than military means"
 

Tuesday, September 1, 2015

Stop fluffy bunny

Rocket kitten continues to attack individuals in Israel and Europe and it even uses their home systems to launch attacks on the corporate networks.  Which means the bad guys have a lot of information about everyone and you are not safe anywhere. 

The second issue is we have to stop giving these groups cute names like kitten and Panda.  These are police state controlled organizations.  There actions,  hacking into our infrastructure and stealing intellectual  property, threaten our lives and livelihoods.  Fluffy bunny type names do not reflect the massive threat their hacking is to us.  They could take down our power grid just like a nookie wookie could.

http://www.scmagazine.com/trend-micro-publishes-new-state-sponsored-report/article/436033/

"The Advanced Persistent Threat (APT) campaign also had its perpetrators targeting personal accounts, versus corporate ones, which allows them to seamlessly move from a less secure home network to an individual's corporate accounts and network."

Wednesday, August 26, 2015

Chinese hacker group hammers Indian networks

Chinese hacker group hammers Indian networks 

and target journalists as well.  From the article.



"Reporters targeted by APT30 wrote on a small set of issues that FireEye
identified. They included the Chinese economy; corruption and human
rights issues in China;" etc

Wednesday, July 1, 2015

Saturday, June 13, 2015

The Internet is a bad Neighborhood


The Internet has become a cesspool of theft, blackmail and extortion. The complete lack of
security means that anyone can be a victim from a teenage girl all the way up to government
institutions like OPM.

More then a decade ago I gave a security presentation at the NNSA. I compared the Internet to a vast neighborhood where anyone could throw a rock through your window, not just the delinquent down the block . Since that time it has only gotten dramatically worse with predators and police states able to collect peoples most private data.   Hackers can now throw "rocks" that can damage or destroy medical equipment or nuclear power plants.

#OPM

Friday, June 12, 2015


I have decided to rename this blog Guarding Wisdom in Cyberspace and to start posting more

consistently. I had always planned on talking about information security, but with all the lies,

noise and disinformation on the Internet I have decided to expand the scope. We need to protect

the data on the computers of individuals, corporations and clearly our government. We also need

to protect information on the Internet that is true and useful even if powerful belligerents want to

blow that data off of cyberspace.

Saturday, May 23, 2015



I have worked in IT for most of my life.  I specialized in security for most of that time.  Until quite recently it seemed to me that cyber security was not taken seriously enough.  The recent attacks on Sony and various medical sites seems to have changed this situation.  I have created this blog to discuss cyber security issues and provide information to help individuals and small entities to protect themselves from cyber attacks.