Owl: China Swamps US Across the Board – Made in China Computer Chips Have Back Doors, 45 Other “Ways & Means” Sucking Blood from US

02 China, 10 Security, 11 Society, Civil Society, Commerce, Commercial Intelligence, Corruption, Cultural Intelligence, Government, Idiocy, IO Deeds of War, Military
Who? Who?

Two Ways the Chinese May Take Over the World and the US:

1) Chinese Stuxnet for the Rest of the World

If what this analyst says is true, it paints a truly astonishing in implication and very, very ugly picture of the national security situation in store for most governments – especially in the US:

Hardware Assurance and its importance to National Security

Current issues. UK officials are fearful that China has the capability to shut down businesses, military and critical infrastructure through cyber attacks and spy equipment embedded in computer and telecommunications equipment. The Stuxnet worm is the most famous and best case example of a cyber attack on a network which wreaked devastation having easily compromised conventional software defensive systems. There have been many cases of computer hardware having backdoors, Trojans or other programs to allow an attacker to gain access or transmit confidential data to a third party. Considerable focus and expense has been invested in software computer networks and system defences to detect and eradicate such threats. However, similar technology with antivirus or anti Trojan capability for hardware (silicon chips) is not available. The computer or network hardware underpins and runs all the software defence systems. If the hardware has a vulnerability then all the energy in defending at the software level is redundant. An effort must be made to defend and detect at the hardware level for a more comprehensive strategy.

Our findings. Claims were made by the intelligence agencies around the world, from MI5, NSA and IARPA, that silicon chips could be infected. We developed breakthrough silicon chip scanning technology to investigate these claims.

We chose an American military chip that is highly secure with sophisticated encryption standard, manufactured in China. Our aim was to perform advanced code breaking and to see if there were any unexpected features on the chip.

We scanned the silicon chip in an affordable time and found a previously unknown backdoor inserted by the manufacturer. This backdoor has a key, which we were able to extract. If you use this key you can disable the chip or reprogram it at will, even if locked by the user with their own key. This particular chip is prevalent in many systems from weapons, nuclear power plants to public transport. In other words, this backdoor access could be turned into an advanced Stuxnet weapon to attack potentially millions of systems. The scale and range of possible attacks has huge implications for National Security and public infrastructure.

Read full article.

2) 45 Signs That China Is Colonizing America

Continue reading “Owl: China Swamps US Across the Board – Made in China Computer Chips Have Back Doors, 45 Other “Ways & Means” Sucking Blood from US”

David Swanson: Lies and Consequences Across 15 Wars

04 Inter-State Conflict, 07 Other Atrocities, 10 Security, 11 Society, Corruption, DoD, Government, IO Deeds of War, Media, Military
David Swanson

Lies and Consequences in Our Past 15 Wars

By David Swanson

“Kings had always been involving and impoverishing their peoples in wars, pretending generally, if not always, that the good of the people was their object.  This, our Convention understood to be the most oppressive of all Kingly oppressions; and they resolved to so frame the Constitution that no one man should hold the power of bringing this oppression upon us.”–Abraham Lincoln

Continue reading “David Swanson: Lies and Consequences Across 15 Wars”

John Robb: Automation of Censorship and Extra-Judicial Assassination

07 Other Atrocities, 09 Justice, Corruption, DHS, DoD, Government, IO Deeds of War, Officers Call
John Robb

The Automation of Government Coercion

Posted: 25 May 2012 09:10 AM PDT

I recently did a series of interviews for an international venture investing newsletter called Capitalist Exploits.  Here's a question I got that I thought we be of interest to GG readers.  I've extended the answer a bit from the original in the interview.

Mark: Switching gears just a bit… We've watched the SOPA/PIPA controversy, now its CISPA; the “Stellar Wind” project was featured in Wired last month, and recently an NSA whistleblower, former Director William Binney, came out and said flat out that the government is lying, they intercept and store everything we do, Constitution be damned. It seems the government won't stop until it completely controls the flow of information on the Internet and has the ability to monitor and record everything we say and do online. You're a counter-terrorism expert, how much of this is hype and how much of it is really necessary to safeguard national security, in your opinion. And what about our civil liberties and right to privacy?

John: It’s a mixed bag. There’s certainly lots of concern in regards to how the NSA gathers data on US citizens. Added to what the private sector is gathering, its safe to conclude that we don’t have any privacy.

For example, nearly every new phone sold today has a GPS chip in it. It’s constantly gathering data on where that phone is and sending it to the phone company. All of that phone company data, from all of the phone companies across the world, is aggregated and provided to select governments for use in counter-terrorism. In short, the three billion people that are using cell phones are being tracked in order to help find and kill a couple hundred terrorists (its contribution is probably limited to being the primary source for neutralizing a couple of terrorists a year).

Continue reading “John Robb: Automation of Censorship and Extra-Judicial Assassination”

Mini-Me: Veteran’s Today Warns of False Flag Terror in US End of May — Russians Exercising in US Around NORTHCOM with Mission to Take and Hold Denver Airport…G-8 Moved to Camp David

06 Russia, 07 Other Atrocities, 08 Wild Cards, 09 Justice, 10 Security, 11 Society, Blog Wisdom, Corruption, DHS, Director of National Intelligence et al (IC), DoD, Government, IO Deeds of War, Law Enforcement, Military, Officers Call
Who? Mini-Me?

Huh?

U.S. False Flag Likely May 20-31, 2012

By Captain Eric H. May, Ghost Troop CO

The breaking news from Chicago, ‘NATO 3’ had targeted Obama campaign HQ, Rahm’s house, police stations, prosecutors say, concurs with the analysis below:

The United States is hosting the G8, NATO and the Bilderberg Group in a two-week span, during which elite Russian troops will be occupying key points near Northern Command (NORTHCOM), and it isn’t hard to imagine another 9/11 coming from such a sinister combination of brains and brawn.

Starting with the premise that a false flag attack by the end of May is more likely than not, I’ll present the odds for the top targets and most dangerous days, then evaluate the various entities and individuals likely to be involved.

The top U.S. targets are:

Continue reading “Mini-Me: Veteran's Today Warns of False Flag Terror in US End of May — Russians Exercising in US Around NORTHCOM with Mission to Take and Hold Denver Airport…G-8 Moved to Camp David”

Eagle: Excuse Me, But Israel Has No Right To Exist

07 Other Atrocities, 08 Wild Cards, 09 Justice, 10 Security, 11 Society, Corruption, DoD, Government, IO Deeds of War, Military
300 Million Talons...

Excuse Me, But Israel Has No Right To Exist

Grow a new vocabulary of possibilities – the new state will be the dawn of humanity's great reconciliation. Muslims, Christians and Jews living together in Palestine as they once did.

by Sharmine Narwani

Veterans Today, 17 May 2012

The phrase “right to exist” entered my consciousness in the 1990s just as the concept of the two-state solution became part of our collective lexicon. In any debate at university, when a Zionist was out of arguments, those three magic words were invoked to shut down the conversation with an outraged, “are you saying Israel doesn’t have the right to exist??”

Of course you couldn’t challenge Israel’s right to exist – that was like saying you were negating a fundamental Jewish right to have…rights, with all manner of Holocaust guilt thrown in for effect.

Except of course the Holocaust is not my fault – or that of Palestinians. The cold-blooded program of ethnically cleansing Europe of its Jewish population has been so callously and opportunistically utilized to justify the ethnic cleansing of the Palestinian Arab nation, that it leaves me utterly unmoved. I have even caught myself – shock – rolling my eyes when I hear Holocaust and Israel in the same sentence.

What moves me instead in this post-two-state era, is the sheer audacity of Israel even existing.

Continue reading “Eagle: Excuse Me, But Israel Has No Right To Exist”

Penguin: Cataloging Wounds of War to Help Heal Them — Not Big Data, Not Small Data, But Rather Integrated “Smart” Data

IO Deeds of War, IO Impotency, IO Sense-Making
Who, Me?

Cataloging Wounds of War to Help Heal Them

By

New York Times,  May 17, 2012

FORT CAMPBELL, Ky. — To those unfamiliar with a battlefield’s bleak routine, Col. Michael D. Wirt’s database could be read like a catalog of horrors. In it, more than 500 American soldiers are subjected to characteristic forms of violence of the Afghan war.

Faces are smacked with shrapnel, legs are blasted away near knees, bullets pass through young men’s abdomens. Vehicles roll over, crushing bones. Eardrums rupture. Digits are severed.

Dozens of soldiers die. Hundreds more begin journeys home, sometimes to treatment that will last the rest of their lives.

Each was listed in a small but meticulous computer entry by Colonel Wirt, a doctor intent on documenting how soldiers were wounded or sickened, how they were treated and how they fared. For those seeking to understand war and how best to survive it, the doctor on his own initiative created an evidence-based tool and a possible model.

His database is one part of a vast store of information recorded about the experiences of American combatants. But there are concerns that the potential lessons from such data could be lost, because no one has yet brought the information together and made it fully cohere.

Continue reading “Penguin: Cataloging Wounds of War to Help Heal Them — Not Big Data, Not Small Data, But Rather Integrated “Smart” Data”

Owl: VIDEO – Twelve Year Old Nails Canadian Government & Banks

03 Economy, 08 Wild Cards, 09 Justice, 11 Society, Commerce, Commercial Intelligence, Corruption, Cultural Intelligence, Government, IO Deeds of War, Movies, Officers Call
Who? Who?

WATCH THIS. 12 year old Canadian girl on banksters and debt

This little girl is simply amazing. She must have some pretty awesome parents. In a concise and clear way she explains the problem of national debt in language that anyone can understand.

VIDEO (5:26) from GodLike Productions

Phi Beta Iota:  Going viral, and rightly so.

See Also:

Matt Taibbi: GRIFTOPIA – RECAP