The Best Laid Plans


The best-laid schemes o’ mice an’ men gang aft agleyRobert Burns


UPDATE 5/15/17 1924 EDT: New variant of virus has emerged, the fix discovered by registering the domain has been bypassed. Estimated infection rate is roughly 3,600 computers/hour. Symantec and Kaspersky Labs appear to think that it is connected to PRNK. More details here.


The most recent and rather eye-opening news this weekend was the cyber attack by an unknown entity on the majority of the developed world. From ZeroHedge “questions are mounting why code created by the NSA. has i) fallen in the wrong hands and ii) is being used to hold the world hostage. As the NYT notes, the ability of the cyberattack to spread so quickly was partly because of its high level of sophistication.” The laundry list of disabled organizations includes Nissan plants, the UK’s NHS, Deutsche Bahn, Telefonica (Spain telecom giant), FedEx, Renault, and the Russian Interior Ministry. The virus has currently affected about 9M computers in ~200 countries. More competent people than myself in the subject have noted its origin is likely the stolen NSA cyber weapons. The inability and incompetence of both the NSA and CIA to keep their information secure further illustrates why both philosophical and Machiavellian reasons exist to drastically reform the agencies.

3q4fznCurrently about 90% of funding for the federal cyber budget goes to ‘offensive’ operations, or figuring out ways to compromise, destroy or manipulate electronics. The converse is that 10% of the funding, and presumably the commensurate manpower, goes to defending from such attacks. Current operating guidelines indicate the agencies were aware of vulnerabilities, such as flaws in Cisco equipment, and failed to inform the company about its vulnerabilities to exploit it for offensive capabilities. The attitude and actions of both agencies have demonstrated a dangerous naiveté toward other state-level cyberwarfare capabilities and non-state actors. The result is precisely what we have seen this weekend, the intersection of gross incompetence with an all-to-familiar disregard for the taxpayers they work for.

The obvious philosophical arguments aside, this latest development provides an in-your-face example of why these agencies are making the world and America an increasingly dangerous place rather than safer. The recent theft of the NSA’s suite of cyber weapons illustrates their continued inability to keep information secure. Many forgot about the Chinese hack of the OPM’s Form 86s that revealed 14M people’s personal information, contacts and personal history going back a decade or more of everyone with a TS security clearance. Going back more than a decade now the NSA and CIA have left a trail of leaks, all of which have left the taxpayers and private sector as collateral damage. My own family members were impacted by the OPM hack and the public was asked to nod understandingly and simply forget it ever happened. For $1.5B and virtually limitless power over our data and personal information, the results have been…less than satisfactory.

The human experimentation done in places like Holmsburg Prison by the US government, Dow Chemical, and Johnson & Johnson on unwitting prisoners for things like dioxin and chemical torture compounds should disabuse the readers of any notions that compartmentalized and bureaucratic government agencies should be granted any great amount of trust. The primary function seems to be creating weapons and then unwittingly using them on the native population or allowing them to be used in such a manner. Such is the case here, using our tax dollars to not only fail to do their primary responsibility, protect the electronic infrastructure in the US, but also display a stunning level of incompetence in allowing the very weapons they intended to use on dissident citizens and enemies of the US to be co-opted for use by 21st century pirates. Given the last decade, it is a wonder they allow either agency to have computers or sharp objects in the building. Let us not forget the same people not only got caught lying about meta-data collection, but also siphon off ungodly amounts of money to fund their giant data storage facilities. I fear it is too much to ask that my overlords at least be semi-competent when they demand I submit myself to their electronic voyeurism.

1349880413656_321156The current ransomware attack was halted before it reached catastrophic levels by a stroke of luck, and nothing more. A basement-dwelling nerd who was on vacation managed to stumble onto a solution before the US was largely affected. The fragility of our private sector was on full display, whether it be the transportation, medical, financial and media industry. The imbalance of funding and continued insistence on the weaponization and domestic spying of the NSA and CIA, to the detriment of our domestic security, do not bode well for our ability to defend against state and private actors. The mantra of ‘if you don’t hold it and can’t defend it you don’t own it’ bears true. Whether through D.C’s incompetence, malfeasance or another party, this will not end here. The proof of concept has already happened and the return on the investment is immense. Even if you were to pay an individual millions, the damage caused to infrastructure, the economy and potential loss of life far outweigh conventional munitions.

While I’m sure there may be one or two of you who might be devastated if this site was no longer available, or the internet at large for that matter, a smart man will take this warning for what it is. Can your loved ones get to you without access to telecommunications? Does your wife know your PACE comms plan? Do you have any rally points set up and a way to find each other in the event you cannot communicate with each other? Do you have cash on hand in the event you cannot access digital funds? DO YOU HAVE A MAP IN YOUR VEHICLES? A simple way to approach it, assuming your house is in order, is to put a FRAGPLAN or extremely simplified OPORD into an envelope and keep it in the glove box. OPORD’s are excellent ways to flesh out the 5 W’s and organize information in a readily understandable and easily referenced manner. Your wife/kids/you should be able to open it, understand where you need to be, what time you need to be there by and what the other people will do if you aren’t there by then. People panic, people forget and verbal instructions are highly suspect when a person is under a large amount of stress. Write. It. Down. You’re not Jason Bourne and if you are concerned about opsec then come up with a number to easily remember that modifies the time/address written down to the correct one. For instance, use the first or last number on the license plate of the vehicle and it is added to every number written on the document.

Part of being resilient is making your family resilient. The cost for rejecting government interference is personal responsibility for you and your family’s welfare. I guarantee if this ransomware had taken down Verizon, Sprint or AT&T rather than Telefonica, there would be guys in III% hats and ‘muh gunz’ bumper stickers scrambling to find their families and begging the very government they profess to be so independent of for help. Don’t be that guy. If the internet went dark tomorrow I would miss out on the cornucopia of stupid that is YouTube and some news sites. Life would go on in JJLand. Cell phones and the internet are nice, but realize they are niceties and increasingly fragile.  None of what has been discussed is hi-speed ninja operator skills, it really boils down to simple planning and some foresight. It might cost you $20 in maps and a few sheets of paper, so there is absolutely no excuse not to have done this. The industry term is low risk-high yield investment. In other words, it costs you next to nothing and the potential reward is astronomical, much like the hacking that prompted this article. Don’t talk about being independent, be independent.

Jesse James

Advertisements

10 thoughts on “The Best Laid Plans

  1. You are still only asking half the questions in regards to the ransom attack. Consider if you will, of Cisco’s product line how much of it is made or sub-assembled in China? Has anyone done a deep dive into the AllWinner CPU design made in China? Of the electro-garbage we buy from China how much of it is capable of leaving a trail of breadcrumbs that even the seller is unaware of?

    Liked by 1 person

  2. Read somewhere recently that the Rooskies are now fitting out their mil folk with (get this) manual typewriters and having “hard copy” typed up messages delivered via dispatch runner or courier.

    DANG: we’re back at the old WWI commo methods!

    Pigeons, anyone?

    BTW: for every $11 we spend on our “defense,” Russia spends $1–and their stuff actually works!

    Liked by 1 person

    1. There’s a bit more to it than this. The Germans did it as a result of the NSA wiretapping of Merkel & co. The Russians are doing an older style Keyboard-to-Keyboard /Store and Forward RTTY system similar to what we ran in the Korean War era, except with laptops and Linux versus Deuce and a Half Beds full of Signal Corps kit. Think Winlink…if you’re familiar with Winlink.

      I did a post on it over a year ago, I think CA has it bookmarked.

      Liked by 1 person

  3. Three things before I leave. To somewhere south, perhaps.

    First

    John 3,
    8 The wind bloweth where it listeth,
    and thou hearest the sound thereof,
    but canst not tell whence it cometh,
    and whither it goeth:
    so is every one that is born of the Spirit.

    Next,
    Then, Stormy Weather.

    Weathering the storm

    Stormy weather of eagles dare

    Soaring through the air

    Look upon the earth below

    Sees what they do know

    Trees whining in the wind

    Brothers are within

    Soul to me as to him

    forever we will fight the sin

    Sister, mother and father too

    we are all within you

    One is two and two are three

    Family we are to be

    Family from thick to thin

    Sisters are within

    Mother is where we begin

    Fathers not in sin

    Family shield us from the foe

    This where we will go

    Right is right and wrong is wrong

    This will be our family song

    Son of mothers

    of fathers know

    Strong of soul

    of this we know

    Sisters, of this she knows

    Brothers do believe do go

    Teach the right, same as me

    Strong together we will be

    Age of father be taken in

    Mother help me with my sin

    Sons and daughters are my kin

    Always together there within

    Eagles fly where eagles dare

    Bothers sisters of the air

    Fair weather flocks catch the fox

    wiser eagles thin the flock

    Mother fathers morn the loss

    Children’s mothers of their knot

    Fathers see what they fought

    Together still to the end of not

    Stormy weather

    When eagles soar

    Trees whining in the wind that blows

    We are here within, you know

    J.J.J.

    Lastly,

    The Apology, for my occasional rant,

    Plato and I might add, The Cave we are in.

    In which they are most eager, the worst.

    PS,

    Who teaches the teacher?

    Long before our cyber insecurities and crypto currencies,

    in the age of internet there was, and still is,

    the biological computer, which I might add,

    is the invention of digital by the biological,

    which is the inner of the individual,

    that teaches the family, of eagles,

    which are all individuals.

    Like

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s