Climate Alarmism Kills

Massachusetts has been hit by a series of natural gas explosions. The main cause of this disaster is aging and deteriorating infrastructure, natural gas pipelines in this case.  Massachusetts (and New York, California, and few other deep blue states) diverted necessary funds from maintaining and upgrading infrastructure to climate change propaganda as well as subsidies to cronies in “renewable energy” and “carbon free” financing. Massachusetts Democrats were so prejudiced against pipelines that the state elected to import LNG from Russia. Continue reading Climate Alarmism Kills

Voodoo Attributions in Cyber Security

The Official Attribution of Network Breaches is Based on Conspiracy Theories

The DNC has not been hacked by the Russian hacking groups Fancy Bear (APT28) or Cozy Bear (APT29) for one simple reason: neither of these groups exists or existed at any time.

APT (Advanced Persistent Threat) was a code name for Chinese Espionage. There were attempts to detect specific groups under the broad umbrella of the APT. Then Mandiant (later acquired by FireEye) attempted to generalize the definition to include putative state-sponsored hacker groups from other countries. But such generalization cannot work. The attribution of cyber-security incidents to state backed sophisticated hacker groups worked only for China because it was a cyber-fortress surrounded by the Great Firewall of China. Continue reading Voodoo Attributions in Cyber Security

What is the ‘Advanced Persistent Threat’?

APT [Advanced Persistent Threat] is a term to refer to Chinese espionage
without saying Chinese espionage. Full stop.
Scott J Roberts
, APT is a Who not a What …

(disappeared; available as APT is a Who not a What… And Why it doesnt Matter – Scott J Roberts – Medium)

The full quote:

“This classified intelligence was a problem. … These DoD/IC teams wanted to help, but couldn’t disclose classified information. They came up with a compromise: sharing indicators and information without disclosing the actual actor behind it. Specifically APT, supposedly coined by Colonel Greg Rattray, was a couple groups of actors primarily operating out of mainland China and believed to be members of the People’s Liberation Army. We now know these groups today as APT1Anchor Panda, and Elderwood, as well as other private designations.

APT is a term to refer to Chinese espionage without saying Chinese espionage. Full stop.”

Continue reading What is the ‘Advanced Persistent Threat’?

Mastercard, Jihad, and Fentanyl

2019-08-23 update

  1. When checked in December 2018, Google Adwords prohibited bidding on the word ‘rifle’, but allowed bidding on the word ‘fentanyl’
  2. Notice that fentanyl deaths skyrocketed under comrade James Comey as FBI Director

There were more than 70,000 deaths from drug overdose in the U.S. in 2017. About 30,000 of them involved fentanyl or similar synthetic opioids many times stronger than heroin. Most illegally purchased synthetic opiods are manufactured in China. Online shops in China used to receive payments from Americans through Mastercard and Visa to ship these deadly drugs by mail. The number of overdose deaths involving synthetic opioids skyrocketed 10x since 2013:  Continue reading Mastercard, Jihad, and Fentanyl

Notes on the Fake News Media

Robert Graham: That [2014/02/05] NBC story 100% fraudulent

“On February 4th, NBC News ran a story claiming that if you bring your mobile phone or laptop to the Sochi Olympics, it’ll immediately be hacked the moment you turn it on. The story was fabricated. The technical details relate to going to the Olympics in cyberspace (visiting websites), not going to there in person and using their local WiFi.”

“By the way, the easy way to figure out where journalists commit fraud is by watching for ‘passive voice’. Journalists normally avoid passive voice, preferring stronger language. But, when they need to hide things, they passive voice to cover up details.”

This advice seems obsolete now. Just watch their lips. When the lips are moving, the MSM journalist is lying.

Russian Bears with Donkey Ears

The “assessment” that the Russian government hacked the DNC and leaked its emails was wrong. It’s almost impossible to attribute a network breach to a sophisticated hackers group.

When #CrowdStrike and FireEye started making the fraudulent attribution on cyber security events, many other companies followed. The Obama regime has corrupted and dumbed down the DHS, DNI, and FBI. They bought this fraud, and then added some.

In 2016, Hillary and the DNC were deceived by CrowdStrike into believing that Russia was behind the leaks of their emails that shouldn’t have been written in the first place. Together with Obama they forced that deception on the FBI and intelligence. Then they blamed Russia for their election defeat!

Most successful network security breaches are conducted by criminal hackers, many of whom are based or originate from Russia and Eastern Europe. Most unsuccessful attempts are conducted by amateurs. Organizations should protect their networks, rather than blame nation states.

Read Jeffrey Carr, FBI/DHS Joint Analysis Report: A Fatally Flawed Effort or Robert Graham, Dear Obama, From Infosec – both are (or were) anti-Trump.

All “Evidence” of “Russian Meddling” Came from the DNC

What a tangled web we weave …

Continues Origin of Operation “Crossfire Hurricane”

Update: Steele might have learnt what the DNC wanted him to write about Trump directly from the DNC, rather than indirectly through MSM. DOJ official Bruce Ohr reportedly communicated with Steele in the time when his wife Nellie Ohr worked for Fusion GPS that hired and worked with Steele.

The leaked “opposition research” (mostly smear) on Trump consisted of 230 pages. Only one short paragraph was devoted to allegations about Trump’s relations and attitudes towards Russia. Thus, neither the DNC nor Hillary campaign believed around May 2016 that there was even a small impropriety in Trump’s connections with Russia.  The opposition research file was apparently dated December 2015, but the DNC allowed it to leak between late April to early June of 2016 (likely on June 12-14), then advertised it in the WaPo article on June 14, 2016.

The liberal media attitude toward Putin changed from lukewarm to hostile almost overnight between July 16 and July 21, simultaneously with the creation and adoption of the Trump-Putin conspiracy theory as a major part of the Democratic Party line. Continue reading All “Evidence” of “Russian Meddling” Came from the DNC

Crimes of DNC Loyalists in DOJ and Intelligence

Even the New York Times admitted that Obama holdovers had committed crimes, probably including espionage, sedition, sabotage, obstruction of justice, and/or subornation of perjury in the transitional period. From the NYT March 1, 2017:

As Inauguration Day approached, Obama White House officials grew convinced that the intelligence was damning and that they needed to ensure that as many people as possible inside government could see it, even if people without security clearances could not. Some officials began asking specific questions at intelligence briefings, knowing the answers would be archived and could be easily unearthed by investigators — including the Senate Intelligence Committee, which in early January announced an inquiry into Russian efforts to influence the election.

At intelligence agencies, there was a push to process as much raw intelligence as possible into analyses, and to keep the reports at a relatively low classification level to ensure as wide a readership as possible across the government — and, in some cases, among European allies. Continue reading Crimes of DNC Loyalists in DOJ and Intelligence