NIGHTWATCH: Brazil Unravels — Is this an Opportunity for NATO?

01 Brazil, Advanced Cyber/IO, Cultural Intelligence, Ethics

Click on Image to Enlarge
Click on Image to Enlarge

Brazil: The largest anti-government demonstrations in 20 years, according to news analysts, have continued for five days in Sao Paulo, Brasilia, Rio de Janeiro and eight other cities. News reports said 65,000 people demonstrated in Sao Paulo and over 100,000 marched in Rio. Social networking enabled coordinated marches in Sao Paulo, Rio and Belo Horizonte. Most of the demonstrations have been peaceful.

President Dilma Rousseff said in a brief statement, “Peaceful demonstrations are legitimate and part of democracy. It is natural for young people to demonstrate.”

No deaths have been reported. About 200 people have been injured around the country.

Comment: An increase in the cost of public transportation in Sao Paulo sparked the first demonstrations, which flash mob tactics swelled. As the demonstrations spread, demonstrators said they were protesting government corruption, poor economic conditions, criminal violence and lack of public safety, official spending for the Olympics in 2016 and the World Cup in 2014 and rising prices.

The government response has been much more restrained than that of the Turkish government and the violence has been much less. Nevertheless, the phenomenology looks very similar.

The police said they would not intervene to stop the demonstrations provided they did not result in property destructions. A small group of protestors in Rio set a car on fire. The car fire prompted the clash with police, which dominated international media coverage and misrepresented the peaceful nature of the demonstrations.

Continue reading “NIGHTWATCH: Brazil Unravels — Is this an Opportunity for NATO?”

Jean Lievens: Nick Ilyadis Wants Intelligent Networks to Make Use of Internet of Things Data — Could This Include Embedded True Cost Data?

Advanced Cyber/IO
Jean Lievens
Jean Lievens

We Need Intelligent Networks to Make Use of Internet of Things Data, says Broadcom’s Nick Ilyadis

Nick Ilyadis, CTO of Broadcom, discussed his company’s long lasting relationship with HP, security trends, and the big trend of  Internet of Things with theCube co-hosts John Furrier and Dave Vellante, live at the HP Discover 2013 conference.

“We’re on our 13th generation of Ethernet controllers and HP has been a customer of ours for most of those generations,” Ilyadis said, adding that the quality of the software Broadcom provided was key to the relationship. Asked to detail the quality of the controller they provide, Ilyadis said that “quality has many facets”, and one key point is hardening – the software is field tested over several generations, it is feature rich, and features are incorporated based on feedback from customers. “We’re very responsive to go out and fix” issues, he added. “The fact that they are using it as a default adapter speaks of that.”

Broadcom was also named partner of the year for security by HP. Ilyadis said that the “controller products don’t really have a security aspect, but in broader Broadcom portfolio, we have encryption /crypto capabilities that are best in class.” Broadcom has recently announced a a multi-core processor that provide a hundred gigabytes of crypto in line. What that means it has the ability to encrypt multiple enterprises in terms of their traffic – such as banks – “without breaking a sweat.” The product is “the highest performing multi-core processor in the industry.”

Continue reading “Jean Lievens: Nick Ilyadis Wants Intelligent Networks to Make Use of Internet of Things Data — Could This Include Embedded True Cost Data?”

Neal Rauhauser: Cyber-Security Global Knowledge Network

Advanced Cyber/IO
Neal Rauhauser
Neal Rauhauser

Worth a look.

ICS-ISAC and the Global Knowledge Sharing Network

ICS-ISAC and the Global Knowledge Sharing Network

The Industrial Control System Information Sharing and Analysis Center (ICS-ISAC) is part of the Global Knowledge Network (GKN). The Global Knowledge Network has been evolving for a number of years and is today undergoing a rapid expansion and refinement process. Public and private sector centers for creating and sharing cybersecurity knowledge have arisen around the world at an increasing rate in recent years and have established various working models for knowledge sharing.

The following describes the basic form of the Global Knowledge Network and how it is generally implemented at national and regional scales.

Continue reading “Neal Rauhauser: Cyber-Security Global Knowledge Network”

Eagle: Using Metadata to Find Paul Revere

Advanced Cyber/IO, Corruption, Government, Law Enforcement
300 Million Talons...
300 Million Talons…

Using Metadata to Find Paul Revere

KieranHealy.org, Jun 9th, 2013

London, 1772.

I have been asked by my superiors to give a brief demonstration of the surprising effectiveness of even the simplest techniques of the new-fangled Social Networke Analysis in the pursuit of those who would seek to undermine the liberty enjoyed by His Majesty’s subjects. This is in connection with the discussion of the role of “metadata” in certain recent events and the assurances of various respectable parties that the government was merely “sifting through this so-called metadata” and that the “information acquired does not include the content of any communications”. I will show how we can use this “metadata” to find key persons involved in terrorist groups operating within the Colonies at the present time. I shall also endeavour to show how these methods work in what might be called a relational manner.

Continue reading “Eagle: Using Metadata to Find Paul Revere”

Berto Jongman: Top Three Government Spyware Tools – PRISM, FinSpy, BlueCoat

Advanced Cyber/IO, Government, Law Enforcement
Berto Jongman
Berto Jongman

TOP 3 Government Spyware tools: PRISM, FinSpy and BlueCoat

EXTRACT

FinFisher, also known as FinSpy, is surveillance software marketed by Gamma International, a software firm with a UK-based branch Gamma International Ltd in AndoverUnited Kingdom, and a Germany-based branch Gamma International GmbH in Munich[2][3] which markets the spyware through law enforcement channels.[1] Gamma International is a subsidiary of the Gamma Group, specializing in surveillance and monitoring, including equipment, software and training services, reportedly owned by William Louthean Nelson through a shell corporation in the British Virgin Islands.

Blue Coat got in the news when the Hacktivist cluster Telecomix released a 54GB censorship log that had been found on the Syrian domain.  The data was collected from seven of 15 Bluecoat SG-9000 HTTP proxies used by Syrian government telco and ISP STE in #opSyria. This is not the first time that government tools end up in environments where the regime has the last word.

Citizinlab had a nice research done about the Blue Coat software that you can find here.

Read full article.

Berto Jongman: Overview of How NSA Can Socially Graph Anyone Into Virtual Nakedness — Always

Advanced Cyber/IO, Government, Military
Berto Jongman
Berto Jongman

How to Build a Secret Facebook

By Alex Pasternack

Motherboard, 10 June 2013

Since retiring from a three-decade career at the NSA in 2001, a mathematician named William Binney has been telling anyone who will listen about a vast data-gathering operation being conducted by his former employers. “Here’s the grand design,” he told filmmaker Laura Poitras last year. “You build social networks for everybody. That then turns into the graph, and then you index all that data to that graph, which means you can pull out a community. That gives you an outline of everybody in that community. And if you carry that out from 2001 up, you have 10 years of their life that you can then lay out in a timeline that involves anybody in the country. Even Senators and Representatives—all of them.”

Continue reading “Berto Jongman: Overview of How NSA Can Socially Graph Anyone Into Virtual Nakedness — Always”

Stephen E. Arnold: SRCH2 Poised to Take Industry by Storm

Advanced Cyber/IO
Stephen E. Arnold
Stephen E. Arnold

SRCH2 Poised to Take Industry by Storm

Posted: 10 Jun 2013 05:31 PM PDT

We came across a recent press release that posed an interesting question. At this point, can any vendor in the enterprise realm produce a search solution disruptive to Google? SRCH2 might be an outfit to keep an eye on, according to the information we learned from an interview with Dr. Chen Li in the Arnold Information Technology Search Wizards Speak series.

SRCH2’s niche in the landscape of search options is geared towards corporate sites and apps. Their plan is to build “Google style” solutions.

The press release offers a summary of what Chen said in the interview in regards to the problem that SRCH2 wants to solve:

“‘SRCH2 offers clear differentiation when you also consider complexity and time to market. When you add in-memory performance to this, SRCH2 offers a killer combination for these use cases.’ A key innovation in the SRCH2 method concerns the speed with which content can be processed and then accessed to generate a response to a user’s or subsystem’s query. Speed, particularly in mobile applications, is essential. Latency can drag down response time. SRCH2, like Google, knows that speed is often more important than some other considerations.”

Apparently, SRCH2’s clients are using their technology in a number of different contexts and for a variety of devices. If there is even a major global handset manufacturer porting it to the kernel across millions of handsets, what other uses will be found? Only time will tell.

Megan Feil, June 11, 2013

Sponsored by ArnoldIT.com, developer of Beyond Search

noble gold