Skip to main content

Guesswork

Dear Mr. Perez, the CIA does not engage in "guesswork." To say on national news (CNN 12/12/2016, 12:02PM Pacific, COX channel 1031) that the CIA used "guesswork" to conclude that "Russians" were engaged in cyber-espionage to influence our electoral process is insulting to an army of people who have dedicated their lives protecting your right to say that they are engaged in "guesswork."

This national concern with the FBI and CIA and their "counter" analysis of the cyber activity around the DNC/RNC "hacking," is a clear show of how the American public has lost trust in its intelligence community. I wonder when the mistrust of these organizations started. Could it be the way in which Hollywood has depicted them? I can't remember the last movie I saw where FBI cyber operations was portrayed in a positive manner.

The FBI investigates crime. For crime to happen there has to be a victim. You could argue "liberty" and "freedom" being the victims in the DNC hack. Yet, that's not what FBI is investigating. It appears they are approaching this from a "Clinton Campaign" as the victim of a retaliation attack. [1][3][5]

On the CIA side, investigations are centered around influence and misrepresentation. For them to conclude anything there has to be a case of broken trust and influence. That is why they appear to be focused on the "Trump Campaign" as a victim. [2][5]

In both analysis, though, the same intelligence is at work. The same analysis has happened. An unauthorized entity, with high likelihood of connection to Russian interests, has engaged in felony cyberterrorism against a private political entity with national level influence. While a private entity hack, it is still a great concern and should be dignified with a similar level of outrage by our governing representatives.[7]

Yet, I can't be me without the conspiracy theory, right? So there is a conspiracy angle to this, and that's the IC is the source of the DNC/RNC hack, and the RNC hack was likely just a me-too. [4] You told me "your government is not trying to deceive you," and I believe you. Yet, the greatest tool of deception is plain sight.

As for those electorates who think they are entitled to see classified intelligence reports? I have to wonder about their motivations. Maybe they are trying to smoke out CI's? You need to trust the IC when it tells you it has conclusive evidence. Intelligence reports are hundreds of pages of back story and interrogations. You don't have the IQ to ingest that data and make use of it in a productive manner.

[1] http://www.redstate.com/absentee/2016/12/12/trump-cia-fbi-russia-dnc-rnc/
[2] https://www.washingtonpost.com/world/national-security/obama-orders-review-of-russian-hacking-during-presidential-campaign/2016/12/09/31d6b300-be2a-11e6-94ac-3d324840106c_story.html
[3] http://www.politico.com/story/2016/07/clinton-putin-226153
[4] http://www.zerohedge.com/news/2016-10-22/nsa-whistleblower-us-intelligence-worker-likely-behind-dnc-leaks-not-russia
[5] https://www.washingtonpost.com/business/economy/russian-propaganda-effort-helped-spread-fake-news-during-election-experts-say/2016/11/24/793903b6-8a40-4ca9-b712-716af66098fe_story.html
[6] http://www.usatoday.com/story/opinion/2016/10/24/russian-hacking-dnc-podesta-clinton-passwords-column/92647858/
[7] http://chicagoist.com/2016/12/12/joe_walsh_donald_trump_third_grader.php

Merry Christmas you guys. Maybe we'll see each other at Islands again.

Popular posts from this blog

DNS Custom Logs and selinux

If you google "named custom logs selinux" you will find quite a bit of chatter about setting up custom logs outside of /var/log for DNS (named). These posts are interesting, but they tend to be run on posts about learning selinux and becoming an expert on named. What you need to know? If you have setup custom logging locations in your /etc/named.conf file, such as:     channel default_file {         file "/var/log/named/default.log" versions 3 size 5m;         severity dynamic;         print-time yes;     }; Then you will likely see errors like this in /var/log/messages: Oct 26 11:41:13 namedsvr setroubleshoot: SELinux is preventing /usr/sbin/named from write access on the directory /var/named/chroot/var/log/named. For complete SELinux messages. run sealert -l 6eab4aaf-e615-4ade-9e88-4efdc789eaf2 Then you run the sealert command as suggested by the very friendly selinux audit log and you are told: #============= named_t ============== #!

THE RISE OF FASCIST SOCIAL MEDIA

The Merriam-Webster dictionary defines fascism as: a tendency toward or actual exercise of strong autocratic or dictatorial control .  The phrase "dictatorial control" is important for the case that I am going to make about fascism in social media. The word "dictatorial" means "of or relating to a dictator," and a dictator is "one ruling in an absolute and often oppressive way." In 2020, social media has seen a rise in the number of autocratic events of censorship. The two social media outlets that I am going to focus on are Facebook and Twitter.  Background Facebook is a semi-private curated blogging platform where you, the user, share information at your leisure. The public part of Facebook is in Facebook Groups. With a group, outside people who are not privy to your "Facebook Wall" will join your group and establish a communal discourse. This can be private, by invitation only, or public. The Facebook is auth-walled so that you must

Outlook Configuration

To read all email in text and be able to extract the mail using mail headers: > regedit HCU/Software/Microsoft/Office/16.0/Outlook/Options/Mail   MinimalHeaderOn = 0 (dword)   ReadAsPlain = 1 (dword)   SaveAllMIMENotJustHeaders = 1 (dword) restart Outlook afterwards, maybe even reboot just for good measure. Now you get to see all of those phishy urls in the emails and you can get all of those embedded image attachments as raw encoded binary when you get the header details on the message. Put the Message Options button in the hot button task bar so you can quickly get this info. No more phishy phish from the numbskulls. I take payment in coffee. It's been a long time since I've had Jamaica Blue Mountain. Just saying. If you know how to disable the jpeg thumbnail render of attachments, please share on twitter. That's an obvious vector.