Saturday, February 22, 2020

Global Perspective on AI

21-12-2 Global Perspective on AI With Eric Schmidt - Scale AI > .
24-4-15 AI Deception: How Tech Companies Are [Scamming Investors] - ColdF > .
24-2-19 AI Played Wargames - Result Not Reassuring - Sabine > .
23-8-18 AI Origins to Catastrophism vs Optimism - gtbt > .
23-5-6 Artificial Intelligence: What's next? - Sabine Hossenfelder > .
23-5-5 [AI / Demographics / Producers / Consumers] - EcEx > . skip > .
23-3-3 Generative AI, ChatGPT, CG Art: Future of Work - Patrick Boyle > . skip > .
22-9-29 Is Your Laptop's Microphone Spying On You? - Seytonic > .
22-9-29 Pegasus: The Most Dangerous Virus In The World - Tech > .
22-8-6 Pegasus Spyware Leaks - Seytonic > .
22-6-21 Understanding R-U War (16) - Technology c Lucia Velasco > .
22-4-19 How Cyberwarfare Actually Works (Stuxnet +) - Wendover > .

Monday, February 17, 2020

Liminal Warfare

23-3-8 Nord Stream: Ukraine denies role in explosions | DW > .22-9-30 Who Sabotaged the (Nord Stream) Russian-German Pipeline? - Spaniel > .
> PLA > 
P00paganda, Krumblin Ruscism - Alētheiai >> .

0:00 Intro Kilcullen's theory
0:39 What is hybrid warfare?
2:01 Not only about Russia
2:26 Just a buzz word?
4:45 Kilcullen's theory about liminal maneuver
5:22 The three thresholds
7:02 The temporal dimension to liminal maneuver
8:57 The liminal zone
9:23 The thresholds are not static
10:36 Five processes in responding to hybrid attack

David Kilcullen's article "The Evolution of Unconventional Warfare" in Scandinavian Journal of Military Studies

0:00 Intro Nord Stream sabotage
1:02 Model for hybrid warfare
1:51 Operational design of Nord Stream sabotage
3:05 Consequences of the attack
4:59 US, Poland and Ukraine
6:56 NGOs and climate activists
7:25 Russia
8:17 Who would take the risk?
8:42 Prospect theory
9:33 Russia likely to take risks
10:16 Blow up their own pipeline?
11:30 Hybrid war on Europe

⧫ Hybrid Warfare ..

Saturday, February 15, 2020

NCF - National Cyber Force

.
National Cyber Force | Protecting Defence’s Most Contested Domain - Forces > .
23-8-23 MI6 - History; (Vauxhall Pleasure Gardens) SIS Building - B1M > .
Security 


23-8-31 Infamous Chisel . MoD .

The National Cyber Force (NCF) is a result of the consolidation of offensive cyber activity in the United Kingdom, dedicated to offensive action to combat security threats, hostile states, terror groups, extremism, hackers, disinformation and election interference. The specialist unit is a joint initiative between the Ministry of Defence (MOD) and GCHQ, the British intelligence agency, due to launch in spring 2020. Its headquarters will be based in an as-yet determined location in the North-West of England as part of a new 'cyber corridor'.

The NCF draws together personnel from intelligence, cyber and security agency GCHQ, the MoD, the Secret Intelligence Service (MI6) and the Defence Science and Technology Laboratory (DSTL) under one unified command for the first time. Alongside MoD’s operational expertise, DSTL’s scientific and technical capabilities and GCHQ’s global intelligence, SIS (MI6) provides its expertise in recruiting and running agents alongside its unique ability to deliver clandestine operational technology.

Used alongside diplomatic, economic, political and military capabilities, examples of cyber operations could include:
  • interfering with a mobile phone to prevent a terrorist from being able to communicate with their contacts;
  • helping to prevent the internet from being used as a global platform for serious crimes, including sexual abuse of children and fraud; and
  • keeping UK military aircraft safe from targeting by hostile weapons systems.
Government Communications Headquarters, commonly known as GCHQ, is an intelligence and security organisation responsible for providing signals intelligence (SIGINT) and information assurance to the government and armed forces of the United Kingdom. Based in "The Doughnut" in the suburbs of Cheltenham, GCHQ is the responsibility of the country's Secretary of State for Foreign and Commonwealth Affairs, but it is not a part of the Foreign Office and its Director ranks as a Permanent Secretary.

GCHQ was originally established after the WW1 as the Government Code and Cypher School (GC&CS) and was known under that name until 1946. During WW2 it was located at Bletchley Park, where it was responsible for breaking the German Enigma codes. There are two main components of the GCHQ, the Composite Signals Organisation (CSO), which is responsible for gathering information, and the National Cyber Security Centre (NCSC), which is responsible for securing the UK's own communications. The Joint Technical Language Service (JTLS) is a small department and cross-government resource responsible for mainly technical language support and translation and interpreting services across government departments. It is co-located with GCHQ for administrative purposes.

The National Cyber Security Centre (NCSC) is an organisation of the United Kingdom Government that provides advice and support for the public and private sector in how to avoid computer security threats. Based in London, it became operational in October 2016, and its parent organisation is GCHQ

The NCSC absorbed and replaced CESG (the information security arm of GCHQ), the Centre for Cyber Assessment (CCA), Computer Emergency Response Team UK (CERT UK) and the cyber-related responsibilities of the Centre for the Protection of National Infrastructure (CPNI). It built on earlier efforts of these organisations and the Cabinet Office to provide guidance on Information Assurance to the UK's wider private sector, such as the "10 Steps" guidance released in January 2015. In pre-launch announcements, the UK government stated that the NCSC would first work with the Bank of England to advise financial institutions on how to bolster online defences. The centre was first announced in November 2015 by the Chancellor of the Exchequer, George Osborne. The existing Director General Cyber of GCHQ, Ciaran Martin, leads the new centre, and GCHQ's current Technical Director of Cyber Security, Dr Ian Levy, assumed the same role at the NCSC. ... In April 2016, the Ministry of Defence announced that a Cyber Security Operations Centre (CSOC) "to protect the MOD's cyberspace from malicious actors" with a budget of over £40 million will contribute to this initiative. It is located at MoD Corsham.

GCHQ Bude, also known as GCHQ Composite Signals Organisation Station Morwenstow, abbreviated to GCHQ CSO Morwenstow, is a UK Government satellite ground station and eavesdropping centre located on the north Cornwall coast at Cleave Camp, between the small villages of Morwenstow and Coombe. It is operated by the British signals intelligence service, officially known as the Government Communications Headquarters, commonly abbreviated GCHQ. It is located on part of the site of the former WW2 airfield, RAF Cleave.

Around £76m will be invested in the NCF in its first year. It will operate alongside the National Cyber Security Centre (NCSC), which primarily concentrates on defensive cyber activities to protect government departments, strategic infrastructure and industry.

An April 2021 report produced by academics from King's College London and the Offensive Cyber Working Group has produced a set of recommendations for the NCF, with an aim to increase public debate on offensive cyber in the UK.

Plans for the unit were reported in the media in September 2018. It has since been reported to have been delayed because of "distractions caused by uncertainties over Brexit and frequent changes of ministers and secretaries of state in the MoD" and turf wars between the MOD and GCHQ.

In 2013, GCHQ received considerable media attention when the former National Security Agency contractor Edward Snowden revealed that the agency was in the process of collecting all online and telephone data in the UK via the Tempora programme. Tempora is the codeword for a formerly-secret computer system that is used by the British Government Communications Headquarters (GCHQ). This system is used to buffer most Internet communications that are extracted from fibre-optic cables, so these can be processed and searched at a later time. It was tested since 2008 and became operational in late 2011.

Tempora uses intercepts on the fibre-optic cables that serve as the backbone of the Internet to gain access to large amounts of Internet users' personal data, without any individual suspicion or targeting. The intercepts are placed in the United Kingdom and overseas, with the knowledge of companies owning either the cables or landing stations.

The existence of Tempora was revealed by Edward Snowden, a former American intelligence contractor who leaked information about the program to former Guardian journalist Glenn Greenwald in May 2013 as part of his revelations of government-sponsored mass surveillance programs. Documents Snowden acquired showed that data collected by the Tempora program is shared with the National Security Agency of the United States.

Snowden's revelations began a spate of ongoing disclosures of global surveillance. The Guardian newspaper was then forced to destroy all incriminating files given to them by Snowden because of the threats of lawsuits from the UK Government.

USA

United States Cyber Command (USCYBERCOM) is one of the eleven unified combatant commands of the United States Department of Defense (DoD). It unifies the direction of cyberspace operations, strengthens DoD cyberspace capabilities, and integrates and bolsters DoD's cyber expertise.

USCYBERCOM was created in mid-2009 at the National Security Agency (NSA) headquarters in Fort George G. Meade, Maryland. It cooperates with NSA networks and has been concurrently headed by the director of the National Security Agency since its inception. While originally created with a defensive mission in mind, it has increasingly been viewed as an offensive force. On 18 August 2017, it was announced that USCYBERCOM would be elevated to the status of a full and independent unified combatant command. This elevation occurred on 4 May 2018.

The US and UK are joining forces to "impose consequences" on their shared adversaries who conduct malicious cyber-activities. The combined action would address "evolving threats with a full range of capabilities", they said. The shared adversaries were not named but the announcement follows increasing concern over Russia-based ransomware. The plan was discussed last week at an annual meeting of intelligence chiefs, in the US.

Gen Sir Patrick Sanders and Government Communications Headquarters (GCHQ) director Sir Jeremy Fleming and US Cyber Command head Gen Paul Nakasone "reaffirmed" their commitment to jointly disrupt and deter new and emerging cyber-threats.

As democratic nations, the two countries were committed to carrying out proportionate and necessary operations within the law. The US and UK are stepping up efforts to strike back in cyber-space - or at least they are becoming more public about it. They are also making clear the long-standing intelligence partnership is translated into offensive operations online. The US strategy of "persistent engagement" means contesting foreign adversaries day-to-day in cyber-space to try to make it harder for them to operate.

The UK does not use the same language but, with the launch of the National Cyber Force, it has signalled it is doing the same - trying to knock out ransomware groups' infrastructure, for example, or make it harder for foreign intelligence agencies to carry out espionage or more destructive attacks. 

The talk is of "imposing consequences" - but there are still big questions about whether these actions are having a significant effect on opponents who play by different rules or deterring those adversaries from continuing their actions.

NK Hackers

2021 Why Is North Korea Training 8,000 Hackers? - Thoughty2 > .
24-2-10 KOREA | A Final Separation? - Prof J K-L > .
24-1-6 North Korea's Invasion Plan [against South Korea] - Would It Succeed? - mfp > .
23-11-15 XIR - True Strength of DPRK's KPA - Covert Cabal > .
23-9-20 UNC DMZ NK-SK British Army commander - Forces > .
22-9-29 Is Your Laptop's Microphone Spying On You? - Seytonic > .
22-9-29 Pegasus: The Most Dangerous Virus In The World - Tech > .
22-4-19 How Cyberwarfare Actually Works (Stuxnet +) - Wendover > .

NSO - Pegasus

2021 Invisible surveillance: How spyware is secretly hacking smartphones - WaPo > .
23-9-14 Kill or capture? Morality of assassination in war | DiD - Tele > .
23-9-5 Israel's Everlasting [Internal & External] War - gtbt > .
23-1-10 Global Spyware Scandal: Exposing Pegasus 2/2 (doc) | PBS > .
22-9-29 Is Your Laptop's Microphone Spying On You? - Seytonic > .
22-9-29 Pegasus: The Most Dangerous Virus In The World - Tech > .
22-8-6 Pegasus Spyware Leaks - Seytonic > .
22-6-21 Understanding R-U War (16) - Technology c Lucia Velasco > .
22-4-25 Ronan Farrow: How Democracies Spy on their Citizens | A&Co > .
22-4-19 How Cyberwarfare Actually Works (Stuxnet +) - Wendover > .

A consortium of news outlets from around the world, including Frontline, has been investigating the use of the spyware called Pegasus and the Israeli company, NSO Group, that sells it to foreign governments. Pegasus has been used by NSO clients to spy on journalists, human rights activists and others. One target: Jamal Khashoggi’s fiancée.

NSO Group Technologies (NSO standing for Niv, Shalev and Omri, the names of the company's founders) is an Israeli technology firm whose spyware called Pegasus enables the remote surveillance of smartphonesPegasus spyware can be installed on devices running some versions of iOS, Apple's mobile operating system, and Android

The Israeli cyberarms firm NSO Group was founded in 2010 by Niv Carmi, Omri Lavie, and Shalev Hulio. NSO's founders are ex-members of Unit 8200, the Israeli Intelligence Corps unit responsible for collecting signals intelligence. The company's start-up funding came from a group of investors headed by Eddy Shalev, a partner in venture capital fund Genesis Partners. The group invested a total of $1.8 million for a 30% stake. NSO employed almost 500 people as of 2017, and is based in Herzliya, near Tel Aviv, Israel.

NSO claims that it provides authorized governments with technology that helps them combat terror and crime. According to several reports, software created by NSO Group was used in targeted attacks against human rights activists and journalists in various countries, was used in state espionage against Pakistan, and played a role in the murder of Saudi dissident Jamal Kashoggi by agents of the Saudi government. In October 2019, instant messaging company WhatsApp and its parent company Facebook sued NSO under the US Computer Fraud and Abuse Act (CFAA).

The Pegasus spyware is classified as a weapon by Israel and any export of the technology must be approved by the government.

Annual revenues were around US$40 million in 2013 and $150 million in 2015. In June 2017, the company was put up for sale for $1 billion by Francisco Partners. Founders Lavie and Hulio, partnering with European private equity fund Novalpina Capital, purchased a majority stake in NSO in February 2019.

21-12-16 Facebook has banned seven “surveillance-for-hire” companies from its platforms and will send warning notices to 48,000 people who the company believes were targeted by malicious activity, following a months-long investigation into the “cyber mercenary” industry.
  • Black Cube, an Israeli company that gained notoriety after it emerged that the disgraced media mogul and convicted sex offender Harvey Weinstein had hired them to target women who had accused him of abuse. Black Cube rejected Facebook’s claims about its activities.
  • Cobwebs, another Israeli company that Facebook said enabled its clients to use public websites and dark web sites to trick targets into revealing personal information. The company also reportedly works for US clients, including a local police department in Hartford, Connecticut.
  • Cytrox (Predator spyware), a North Macedonian company that Facebook said enabled its clients to infect targets with malware following phishing campaigns. Cytrox is reportedly part of Intellexa, the “Star Alliance” of spyware which was formed to compete with NSO and describes itself on its website as being EU-based and regulated. Intellexa did not respond to a request for comment.
  • Other entities banned by Facebook include: Cognyte, Bluehawk CI, BellTroX and what was described as an “unknown entity” in China, which it said was responsible for malicious targeting and appears to have been used for domestic law enforcement in China. The malware deployed by the group was used against minority groups in Xinjiang, Myanmar and Hong Kong.
Facebook is facing intense scrutiny in Washington and around the world following accusations by a whistleblower, Frances Haugen, that it enabled the spread of hate speech and disinformation.

This Facebook investigation is significant, however, because it reveals new details about the way parts of the surveillance industry use social media – from Facebook to Instagram – to create fake accounts to deceive their targets and conceal their own activities. While many of the companies claim that they are hired to target criminals and terrorists, Facebook said the industry “regularly” enabled its clients to target journalists, dissidents, critics of authoritarian regimes and human rights activists and their families.

It also pointed to recent and intense media focus on NSO Group, the Israeli spyware maker that was at the heart of the Pegasus Project, an investigation by the Guardian and other media outlets, and was recently blacklisted by the Biden administration. WhatsApp, which is owned by Facebook’s parent company, Meta, sued NSO in 2019 and has been a leading critic of the company. NSO is not among the companies banned on Thursday.

As Facebook announced its investigation, leading researchers at Citizen Lab at the University of Toronto released a new report that zeroed in on one entity – Cytrox – whose spyware, called Predator, is alleged to have been used by an unknown client to hack the devices of two individuals.

sī vīs pācem, parā bellum

igitur quī dēsīderat pācem praeparet bellum    therefore, he who desires peace, let him prepare for war sī vīs pācem, parā bellum if you wan...