Friday, February 14, 2014

Cyber War: Next Step - New World Order?

Will Cyber Wars Justify the New World Order?                  [  Cyber Warrior by cwbluesky]

Click here for related article [Wired]

It appears there's a solution to avoiding NSA and our government spying on us.
And the solution, oddly enough, is a Russian cyber sleuth who delights in tracking, outing, and zapping malicious malware created by -- you guessed it, government sponsored hackers trying to spy on John Q. Citizen.

NSA Nemisis Kapersky   []

The counter-hacker is Eugene Kaspersky, a Russian whose company created and sells anti-virus software which has become so popular that it's sales almost match the combined sales of Symantec and McAfee, with about 50 million direct users, and 300 million indirect users via embedded code in Microsoft, Cisco, and Juniper networks.

His company's singular accomplishments were the detection, analysis, and outing of the Stuxnet and Flame viruses which were reportedly created through a joint US-Israeli effort to attack Iran's nuclear development IT systems [which ended badly when the virus escaped the closed circuit and went viral, attacking Israel's computer systems, and countless others world-wide].  We discussed Flame and Stuxnet in an earlier post

We might hail Kapersky as a savior, except that earlier in his life he trained as a KGB officer and was a functionary in Vladimir Putin's administration.  He continues a relationship with the Russian FSB [Federal Security Service] -- the successor to the KGB. 

On the one hand, he creates anti-virus software that protects our computers [effectively] from hackers -- and NSA monitoring. 

On the other hand, his version of Internet security requires "strictly monitored digital passports for some on-line activities and enabling government regulation of social networks to thwart protest movements.

His firm cooperates with the Siloviki, a Putin-led network of military, security, law enforcement and KGB veterans.  The reach of the Siloviki extends well beyond computer security and into politics and econonomics -- to include re-nationalization of the Russian oil sector. 

The eventual goal is "authoritarian capitalism" via state controlled mega-corporations to dominate key sectors of the economy [not unlike the centralization of the US internet providers -- which is gradually amalgamating under Comcast; did we mention that David Cohen, the Executive Vice President of Comcast Cable, is a "close confidant of the Chairman of the Democratic National Committee"? -- so that merger with Time-Warner will likely not be challenged by the FCC. 

If Internet providers are all consolidated under one monopoly -- the course on which we are headed, it is just one step away from full government control of the Internet -- and the end of free speech. 

One powerful weapon, which we're seeing employed now in Europe and in the US, is "currency restriction" which can cripple firms domestically and internationally.  Recent requirements in both US and European banks include filling out a new "bank form" to disclose the purpose of large cash withdrawals [e.g., $1,000 or more].  Are we headed for international controls on private bank assets -- over and above that already imposed by money-laundering regulations?  Will existing currencies be replaced overnight by new bank notes - worth a fraction of the currencies they replaced?
[We'll discuss that in a separate blog post.]

As Kapersky notes: 
"It's too much freedom out there; freedom is good, but the bad guys -- they can abuse this freedom to manipulate public opinion.

But, Kapersky tempers our fears by advising that the FSB has never made a request to tamper with his software or attempted to insert its agents into his company.
[But, why should it?  The FSB merely needs to request/demand the data in which it is interested.]

His software is effective since it scans every app, file, and email on the host computer, seeking and deleting known malware.  New and undocumented malware is isolated, encrypted and matched against a database of 94 million known malicious objects; if it is unknwn. it is analyzed to determine if it is making unauthorized changes in the operating system, or if it is pinging -- or communicating with another IP address data from your computer.  If that's the case, Kapersky's analysts examine it to determine its structure and the scope of its activity.

Kapersky also created a special cyber-security threat lab called GREAT [Global Research and Expert Analysis Team] which targets and tracks cyber-criminals [or in the US, "enemies of the State"].  This was the team that was tasked by the UN's International Telecommunication Union [ITU] which promotes the development of the Internet.  The ITU disclosed that a virus was deletign data on Iran's oil and gas ministry computers -- two years after the discovery of the Stuxnet worm.

The team found a file ~DEB93D.tmp and used it to track 20 modules of the new malicious code, the primary functions of which included:
1) Surreptitious activation of a system microphone
2) Collection of files -- particularly design and architecture drawings
3) Uploading of captured data to anonymous command and control servers

One module, called Flame [aka: Flamer, sKyWIper, and Skywiper], infected other computers and was clearly created by professional hackers under government direction.  It targets Microsoft Windows OS and records audio [and Skype conversations], screenshots, keyboard activity, and network traffic; as an added bonus, infected computers become Bluetooth beacons downloading data from nearby Bluetooth enabled devices.

The program sends the data to remote command and control servers, and awaits specific tasking from the servers.  Flame also has a "kill" command which wipes all traces of it from a computer once it's discovered.  The bulk of the computers attacked were in the Middle East, but accidentally spread to Europe and North America, penetrating business and financial systems.

Kapersky's response has been to create a firewall structure to block Flame and Stuxnet style viruses from attacking power grids, nuclear plants, sewage plants, and prisons which operate from central control systems.

What's his bottom line:
"By protecting our right to freedom, we actually sacrifice it! We sacrifice the right to safe Internet surfing and to not get infected by some nasty piece of malware at every step."

Is he a savior?  or a wolf in sheep's clothing, ready to sucker us into giving away our last bastion of independent thought and communication in exchange for "security" 
-- the predator, ironically, being the Government!

He would have the ITU established as the global authority of the Internet, displacing national governance bodies, and likely ICANN [Internet Corporation for Assigned Names and Numbers] which oversees the name and number systems of the Internet, while the IANA [Internet Assigned Numbers Authority] assigns IP addresses.  Now, we've seen how well the UN has handled world crises, so, we're not sure we'd like to see a bunch of UN fops prancing around and creating arbitrary bureaucracies to govern.  US businesses won't roll over easily for this concept, and the IT leadership will likely bellow rather loudly.  We'll more than likely hear the axiom bantered about boardrooms and the halls of Congress: 
These systems work!  If it ain't broke, don't fix it. 

But, we can guarantee you that Mr Obama will seek to turn over all authority to the United Nations as the New World Order, as he has attempted to do with gun control.