Wednesday, September 23, 2015

Ashley, Jared, OPM and Blackmail

Ashley, Jared and OPM how many people have data that can be used to blackmail them?  The answer is probably a lot higher then we would like to think.  From marriage infidelities to criminal activities online there is a significant amount of material that could cost someone their job or their marriage or even as with Jared their freedom.  This allows those people to be extorted by criminals and eventually leaves them open to blackmail by any police state with a sophisticated monitoring system.

Communist China has that monitoring capability and a massive data base that allows them to make connections between any number of people.  It is therefore in a position to covertly manipulate people and get them to act in a way that is advantages for their police state.   From getting factories sent to their country to preventing sanctions for their hacking any number of decisions can be manipulated to China's advantage with almost no way of detecting their influence.

The combination of a blackmail database with total monitoring capabilities on smart phones is a disaster.  http://www.theepochtimes.com/n3/1471152-china-is-building-a-database-on-americans-using-its-domestic-spy-program/

http://www.v3.co.uk/v3-uk/news/2427186/chinese-firm-attacks-android-phones-via-malware-laced-apps


Communist China is engaged in Hybrid warfare against US

This article from the diplomat discusses the Communists China's use of hybrid warfare against the United States.  http://thediplomat.com/2015/09/hybrid-warfare-with-chinese-characteristics/

The basic concept is to use all possible methods to attack your enemies.  This would include cyber attacks as well economic warfare to undermine the enemies capability to resist.  Using criminals and terrorists as proxy's to physically attack the enemy with no cost to the aggressor.  Most importantly it has a large amount of psychological warfare to destroy the targets will to resist.

Communist China refers to this type of conflict as unrestricted warfare and two Colonels from the PLA wrote an extensive paper on it titled Unrestricted Warfare that mentions Osama Bin Ladin and the world trade center. 

"whether it be intrusions of hackers, a major explosion at the World Trade Center, or a bombing attack by bin Laden, all of these greatly exceed the frequency bandwidth understood by the American military... This is because they have never taken into consideration and have even refused to consider means that are contrary to tradition and to select measures of operation other than military means"
 

Tuesday, September 1, 2015

Stop fluffy bunny

Rocket kitten continues to attack individuals in Israel and Europe and it even uses their home systems to launch attacks on the corporate networks.  Which means the bad guys have a lot of information about everyone and you are not safe anywhere. 

The second issue is we have to stop giving these groups cute names like kitten and Panda.  These are police state controlled organizations.  There actions,  hacking into our infrastructure and stealing intellectual  property, threaten our lives and livelihoods.  Fluffy bunny type names do not reflect the massive threat their hacking is to us.  They could take down our power grid just like a nookie wookie could.

http://www.scmagazine.com/trend-micro-publishes-new-state-sponsored-report/article/436033/

"The Advanced Persistent Threat (APT) campaign also had its perpetrators targeting personal accounts, versus corporate ones, which allows them to seamlessly move from a less secure home network to an individual's corporate accounts and network."