Can’t take it anymore…

IBM PC XT

I’ve been pointedly ignoring all the bullshit about Trump, the billion or so goofball Republican candidates, Megan Kelly (Who the hell is she?) And Hillary freakin Clinton.

I can’t remain silent anymore.

Hillary Clinton should be in Leavenworth, in a deep dark hole of a cell, shackled and awaiting trial. The FBI should have picked her happy ass up wherever the hell she was on the campaign trail the moment it was discovered that she had sent classified material over her private little server.

Hillarys Email Server

I’m not talking about material that has since been classified, or material that has been declassified, because there is no distinction. The business of the State department of the United States of America, should by default be considered Confidential if not Classified from the get-go. That’s why the United States has a whole bunch of Operational Security specialists, and requires employees and contractors to be re-certified in Operational Security every six months to a year, (Depending on the materials employees are handling,) just to keep it straight. And the rule of thumb is ASSUME a document is Classified and you’ll never go wrong. 

Classified

Which means this private email server should never have been allowed to exist. Innumerable agencies within the government who are charged with maintaining the security of the United States had to know about this server, its location, and its security status. They were told to “ignore it” because… why?

If I’d done what Hillary did… I’d be lucky to be sitting in Leavenworth. I think it’s more likely I’d have been sent someplace really nasty, provided the government didn’t put me on trial for treason then shoot me.

Leavenworth Penitentiary

I don’t think treason can be proven but the government tends to “over charge” in this kind of litigation because they want to make sure you don’t get off on a technicality.

One only has to look at the case of Aaron Swartz as example.  

Aaron Swartz

Swartz was simply making academic articles available via a P2P network from JSTOR and the issue had been settled between JSTOR and Swartz when the Federal Government stepped in.  Once involved, the Feds slapped Swartz with 13 criminal charges carrying a potential 35 years in prison and 1 million in fines. The case was pending when Swartz killed himself. By the way, most if not all, of the information Swartz distributed, was free, and still is today. I think the majority of Swartz’s crime was that he used the P2P distribution system to bypass JSTOR’s requirement for you to be a registered subscriber. I’m not clear on if he was costing JSTOR money.

So here we have a guy who’s maybe costing someone a little cash.

Hillary Clinton

Then we have Hillary who, for her own convenience hired a company that appears to have been unvetted by the US government, whose employees were apparently not subject to background security checks, to set up a server outside the control of the US government, handling Classified material and emails from one of the highest levels of the US government.

As the onion got peeled Hillary denied that classified emails were on the server. (Turns out there were classified emails on the server.) Hillary then said SHE decided what was important to turn over to the government, and deleted the rest of the information. Uhh that’s not how this works ma’am.  Now we’re finding out that the security of the server is in question. (Was there encryption? Who had physical access to the machine?)

Hillary Clinton

Hummm. IS IT JUST ME?

I thought rules and the law were supposed to apply equally to everyone. Yet here we have a clear example of someone who is not only above the law and social constructs, but they are still running a campaign to become President!

For God’s sake people, we’ve burned other politicians down for far less.

It’s well past time to force Hillary out of the Presidential Race.

This is not the kind of elitism we need in our government. We don’t need another liar in the White House. We don’t need yet another person in office who doesn’t understand and obey the rules.

I admit, I look forward to Hillary’s arrest for Contempt of Congress. That will be a day to be watching CSPAN.

 

Thrilling! Thank you OPM!

OPMI kept hearing about the data breach at the OPM. I thought to myself, “no big deal,” because I’ve never been a government employee. But then one of the articles I read spoke about a particular form. The form number seemed familiar.

Out of curiosity I checked my encrypted drive.

AHHHH SHIT!!!!

Yep, that’s a form I filled out while I was working for a government contractor.

DAMN! Checking some of the other forms and sure enough! There’s a TON of information that I provided to my employer. I’m sure that that information got sent at some point to the OPM, and is now in the hands of the Chinese.

I’m sitting here looking at my encrypted volume that contains this information thinking a couple of things.

CybersecurityFirst, I’m wondering why I take the security of this information so seriously? Why is it that I’ve spent the money to secure my data and theirs (some of the information contained in the forms I filled out for them also contains information that relates directly to THEIR projects) and am mindful of what data I have “live” on my system and what data I keep in cold storage? Cold storage in my life is something (like a drive) that is archival, MUST be turned on or attached directly to my computer and is encrypted.

Second, If I can secure my data with COTS (Commercial Off The Shelf) software why can’t our government?

Third, Why is the United States Government data vulnerable in the first place? We KNOW the safest computers are computers which are not connected to a network. Granted, that’s impractical because the government must share data.

Hearings

BUT  it is possible to isolate critical subsystems. One way to do that, don’t allow employees to transport any data offsite. No USB memory sticks or other media, and laptops are available only to those employees who absolutely need mobility. Employees using those laptops have VPN access to the corporate systems and for the most part those laptops when connected to the corporate VPN are Terminals in the old school meaning of terminals. ie dumb as a rock.

The point I’m making here is that the need for computer & network security isn’t new.  So why the hell hasn’t our government kept up with the needs for security?

Having seen the way government contracts work, I have a guess.

redtape

Imagine a situation where a bunch of cooks get in the soup and specify all manner of equipment down to the smallest detail. Once finished,  the specification goes from committee to committee and after a year or two the spec is approved, money is appropriated and the funds become available.

Our happy IT guys call a government approved vendor of equipment, and are told that equipment isn’t available anymore. Or worse yet, the equipment or software can be purchased but now it’s a custom build and will be 50% more expensive than the original product and by the way have significantly fewer capabilities than current off the shelf products costing significantly less than the originally specified equipment or software originally sold for.

Old terminal

So in the one case the specification process starts over again. In the other case the “approved equipment” is less capable,  yet more expensive, than the machine a hacker in China purchased on the internet yesterday.

Rather than the committees addressing the fundamental problem in terms of appropriations and approvals they’re content to keep failing. Meanwhile the security of government systems continues to fall further and further behind.

This isn’t a partisan issue. Regardless of what the administration might say. This is an epic systemic failure on the part of an entity that has access to all of our private data. A.K.A The United States Government.

UNIVAC

How do you solve this problem?

The simplest way is to allow the IT people, The REAL IT people, not the morons that built the healthcare.gov site, say “we need a router and after figuring out which is the best unit for the money… They BUY IT!

That should go for a single router or a RACK of routers.

Does Dianne Freakin Feinstein have a clue about the difference between a CISCO and a Barracuda? NO!

So why are people like Feinstein reviewing and voting on these appropriations bills or worse yet wasting time and money having hearings about shit they’ll never understand, when they should be letting the professionals do the job? You can tell pretty darn fast if an IT dept. is pissing money away and a quarterly budget review (again by IT pros who know what’s needed and what it costs) would keep the expenditures in check and at the same time maintain security.

I’ve got another dose of BAD news for you dear reader…

JihadiHacker

The longer our leaders put off fixing the government IT infrastructure, the more expensive it’s going to be.

Think about putting off having your brakes fixed on your car.

Brake pads cost $45 a wheel, Brake ROTORS cost $1000 a wheel. Most of us average folks learn the hard lesson, it’s always better to spend the $180 rather than spending the $1180. We all learn it once!

We never make that mistake again unless we’re wealthy, elitist,  over-educated, dumbasses.

Unfortunately, most of our politicians are the latter kind of people not the former.


Update 2015 06 19

As more comes out about this breach, I think it’s clear that the government IT people are not up to the challenge.

Here is a line to an ars Technica article titled Encryption “would not have helped at OPM says DHS official”

Below is the article minus the video.


Encryption “would not have helped” at OPM, says DHS official

archuleta-opm-640x359

Office of Personnel Management Director Katherine Archuleta would be happy to discuss the particulars of the OPM brief with Congress—in a classified briefing.

CSPAN

During testimony today in a grueling two-hour hearing before the House Oversight and Government Reform Committee, Office of Personnel Management (OPM) Director Katherine Archuleta claimed that she had recognized huge problems with the agency’s computer security when she assumed her post 18 months ago. But when pressed on why systems had not been protected with encryption prior to the recent discovery of an intrusion that gave attackers access to sensitive data on millions of government employees and government contractors, she said, “It is not feasible to implement on networks that are too old.” She added that the agency is now working to encrypt data within its networks.

But even if the systems had been encrypted, it likely wouldn’t have mattered. Department of Homeland Security Assistant Secretary for Cybersecurity Dr. Andy Ozment testified that encryption would “not have helped in this case” because the attackers had gained valid user credentials to the systems that they attacked—likely through social engineering. And because of the lack of multifactor authentication on these systems, the attackers would have been able to use those credentials at will to access systems from within and potentially even from outside the network.

House Oversight Chairman Jason Chaffetz (R-Utah) told Archuleta and OPM Chief Information Officer Donna Seymour, “You failed utterly and totally.” He referred to OPM’s own inspector general reports and hammered Seymour in particular for the 11 major systems out of 47 that had not been properly certified as secure—which were not contractor systems but systems operated by OPM’s own IT department. “They were in your office, which is a horrible example to be setting,” Chaffetz told Seymour. In total, 65 percent of OPM’s data was stored on those uncertified systems.

Chaffetz pointed out in his opening statement that for the past eight years, according to OPM’s own Inspector General reports, “OPM’s data security posture was akin to leaving all your doors and windows unlocked and hoping nobody would walk in and take the information.”

When Chaffetz asked Archuleta directly about the number of people who had been affected by the breach of OPM’s systems and whether it included contractor information as well as that of federal employees, Archuleta replied repeatedly, “I would be glad to discuss that in a classified setting.” That was Archuleta’s response to nearly all of the committee members’ questions over the course of the hearing this morning.

At least we found it

Archuleta told the committee that the breach was found only because she had been pushing forward with an aggressive plan to update OPM’s security, centralizing the oversight of IT security under the chief information officer and implementing “numerous tools and capabilities.” She claimed that it was during the process of updating tools that the breach was discovered. “But for the fact that OPM implemented new, more stringent security tools in its environment, we would have never known that malicious activity had previously existed on the network and would not have been able to share that information for the protection of the rest of the federal government,” she read from her prepared statement.

Dr. Ozment reiterated that when the malware activity behind the breach was discovered, “we loaded that information into Einstein (DHS’ government-wide intrusion detection system) immediately. We also put it into Einstein 3 (the intrusion prevention system currently being rolled out) so that agencies protected by it would be protected from it going forward.”

But nearly every question of substance about the breach—which systems were affected, how many individuals’ data was exposed, what type of data was accessed, and the potential security implications of that data—was deferred by Archuleta on the grounds that the information was classified. What wasn’t classified was OPM’s horrible track record on security, which dates back at least to the George W. Bush administration—if not further.

A history of neglect

During his opening statement, Chaffetz read verbatim from a 2009 OPM inspector general report that noted, “The continuing weakness in OPM information security program results directly from inadequate governance. Most if not all of the [information security] exceptions we noted this year result from a lack of leadership, policy, and guidance.” Similar statements were read from 2010 and 2012 reports, each more dire than the last. The OPM Office of the Inspector General only began upgrading its assessment of the agency’s security posture in its fiscal year 2014 report—filed just before news of a breach at a second OPM background investigation contractor surfaced.

Rep. Will Hurd (R-Texas), a freshman member of Congress, told the OPM executives and the other witnesses—DHS’ Ozment, Interior Department CIO Sylvia Burns, the new US CIO Tony Scott, and OPM Assistant Inspector General Michael Esser— that “the execution on security has been horrific. Good intentions are not good enough.” He asked Seymour pointedly about the legacy systems that had not been adequately protected or upgraded. Seymour replied that some of them were over 20 years old and written in COBOL, and they could not easily be upgraded or replaced. These systems would be difficult to update to include encryption or multi-factor authentication because of their aging code base, and they would require a full rewrite.

seymour-opm-640x359

Enlarge / OPM CIO Donna Seymour said that systems couldn’t simply have encryption added because some of them were over 20 years old and written in COBOL.

Personnel systems have often been treated with less sensitivity about security by government agencies. Even health systems have had issues, such as the Department of Veterans’ Affairs national telehealth program, which was breached in December of 2014. And there have been two previous breaches of OPM background investigation data through contractors—first the now-defunct USIS in August of last year, and then KeyPoint Government Solutions less than four months later. Those breaches included data about both government employees and contractors working for the government.

But some of the security issues at OPM fall on Congress’ shoulders—the breaches of contractors in particular. Until recently, federal agents carried out background investigations for OPM. Then Congress cut the budget for investigations, and they were outsourced to USIS, which, as one person familiar with OPM’s investigation process told Ars, was essentially a company made up of “some OPM people who quit the agency and started up USIS on a shoestring.” When USIS was breached and most of its data (if not all of it) was stolen, the company lost its government contracts and was replaced by KeyPoint—”a bunch of people on an even thinner shoestring. Now if you get investigated, it’s by a person with a personal Gmail account because the company that does the investigation literally has no IT infrastructure. And this Gmail account is not one of those where a company contracts with Google for business services. It is a personal Gmail account.”

Some of the contractors that have helped OPM with managing internal data have had security issues of their own—including potentially giving foreign governments direct access to data long before the recent reported breaches. A consultant who did some work with a company contracted by OPM to manage personnel records for a number of agencies told Ars that he found the Unix systems administrator for the project “was in Argentina and his co-worker was physically located in the [People’s Republic of China]. Both had direct access to every row of data in every database: they were root. Another team that worked with these databases had at its head two team members with PRC passports. I know that because I challenged them personally and revoked their privileges. From my perspective, OPM compromised this information more than three years ago and my take on the current breach is ‘so what’s new?'”

Given the scope and duration of the data breaches, it may be impossible for the US government to get a handle on the exact extent of the damage done just by the latest attack on OPM’s systems. If anything is clear, it is that the aging infrastructure of many civilian agencies in Washington magnify the problems the government faces in securing its networks, and OPM’s data breach may just be the biggest one that the government knows about to date.


<END>

KILL ALL HUMANS!

BenderKillallhumans

After careful consideration and study.

The inevitable conclusion is, to solve climate change we must kill all humans!

After all, the California Delta Smelt, The Wyoming Sage Grouse, The Spotted Owl, and innumerable other species deserve to live in peace with their habitats intact.

As I’m sure you’ll all agree, the only viable solution is we must all die.

To that end, extermination booths will be set up in your neighborhood. When you see the booths, be the first of your friends to step in and die with dignity. It’s quick, painless, and fun!

StarTrekATasteofArmageddon

Persons not stepping into the booths voluntarily, will be hunted down and shot.

Do Mother Earth a favor, kill yourself!


That’s what goes through my mind every single time I read about another EPA or BLM report describing the plight of some creature, in an attempt to guilt us into … WHAT?

Accepting Climate change is real? Irrelevant

Paying some stupid ass carbon tax? Pointless!

Turning over yet more control of our daily lives to a bunch of bureaucrats? There it is! That’s the reason for the guilt ridden landfills full of newsprint.

bueaucrats

I get pissed off.

Species come and go all the time on this planet. They have done since before we came down from the trees, and they’ll no doubt continue to do so long after our bones and our civilization is dust.

Stop guilting us!

If we all resolve to live taking actions daily that minimize our impact on the planet, things will get better.

Stop pumping out children that you simply throw away!

forest

That goes for you Catholics, and you folks in India too.

Stop rushing out to buy the newest latest and greatest of whatever widget is out this month to replace the widget from last month. Come on folks, how much packaging do we really need to fill our landfills?

If you’re so damn worried about carbon emissions… Allow next generation reactors to be built. Take a look at a documentary called Pandora’s Promise. I’m not saying base all public policy on one documentary, but stop dismissing a viable energy source out of hysteria not facts.

Here’s an idea, plant landscaping that is appropriate for your environment. Cacti are adapted to grow in the Southwest for a reason, your weeping willow and Kentucky bluegrass is not!

earthafterhumans

My point here is that we should all be less wasteful, not because it’s mandated, or because we’re terrified, or guilty, but because it simply makes good sense.

If you’re less wasteful, and adapt your habits to the natural world instead of trying to make the natural world adapt to you, things are likely to work a lot more smoothly. 

An additional perk is that climate change becomes part a natural cycle and it no longer has to be terrifying. It no longer matters if its man made or not, because we’re all by choice, making decisions that minimize our impact.

The alternative is…

For the good of the planet…

KILL YOURSELVES!


Update 6/10/2015

And once again I’m ahead of the curve.

I can’t believe that there’s actually a “Voluntary Human Extinction Movement”.


http://www.breitbart.com/london/2015/06/10/wipe-out-humans-to-save-the-earth-group-says/

WIPE OUT HUMANS TO SAVE THE EARTH, GROUP SAYS

Crowd

 

Human beings urgently need to wipe themselves out to avoid ecological catastrophe, the leader of the Voluntary Human Extinction Movement has claimed.

In an interview with the Big Issue magazine, Les U Knight (pseudonym assumed) said that the extinction of humanity would be a good thing for the planet and that humans need to reduce their numbers before they run out of resources.

Mr Knight, who in his day job is a substitute teacher in Portland, Oregon, said that his main motivation for wanting to see the extinction of his own species was “preservation of Earth’s biosphere”.

“Diversity is the strength of the biosphere and the fewer species there are, the weaker it becomes. We’re pulling strands from the web of life and at the same time putting more pressure on it due to our increased consumption.”

He added that increased human population was making it harder to feed the poor around the world.

“People are not doing too well. Two billion people don’t have potable water, almost a billion are experiencing food insecurity – we used to call it hunger – it’s not a pretty world for half the people on the planet and it won’t be easy to improve their lot as long as the progress is gobbled up by our increased numbers.”

One solution, Knight said, could be for the West to introduce a “one child policy” banning couples from having two or more children, as China does, although even this may not be enough.

“One is twice as good as two as far as procreation goes but our population momentum would take a while to start decreasing. In terms of energy consumption, when a North American couple stops at two, it’s about the same as an average Indian couple stopping at 30 or a Bangladeshi couple stopping at 97. At least China has done a lot to control their increase. There would be 400 million more of them today if they hadn’t instituted their policy.”

Knight followed his own logic at the age of 25 when he underwent a vasectomy. He claims he “never regretted it for a moment” and “I only wish I’d done it earlier.”

“It’s dangerous having those wigglers,” he added.

If humanity does not voluntarily wipe itself out, Knight warned, it will face “involuntary extinction”, either through ecological catastrophe or nuclear Armageddon:

“The end of humanity would be good for humanity. That seems contradictory but as we phase ourselves out, the lives of those left behind would steadily improve. And those of us who don’t exist won’t know the difference.”

Not everyone is convinced, however. Dr Kristian Niemietz of the Institute of Economic Affairs told Breitbart London: “Apparently, Les U Knight believes that his statement is incredibly profound and thought-provoking, but it is really just a slightly more extreme version of the lame old eco-miserabilism which has been the conventional wisdom among Western ‘intellectuals’ for more than a generation. Fretting about overpopulation and overconsumption will guarantee you approving nods at every dinner party, but fashionable though those run-of-the-mill greenish views may be, they are theoretically and empirically wrong.

“Over the past three decades, we have seen a spectacular decline in global poverty. If you use the World Bank’s definition of extreme poverty – having less than the equivalent of $1.25 per person per day – then as recently as in the early 1980s, over half of the world’s population were extremely poor. Today, that share has dropped to just below one fifth.

“Poverty is not ‘caused’ by overpopulation. Poverty is the natural state of mankind. Up until about two hundred years ago, virtually everybody in the world would have been poor by the World Bank’s standard. It was only then that we began to grow out of poverty; initially only in what we now call the industrialised West, and over time, more and more countries joined in.

“Malthusians like Knight have an unrealistic view of economic activity. They see human beings as akin to locusts, but human beings are not just passive consumers of whatever they happen to stumble across. We are active problem-solvers, we are innovators, and we are producers.

“For example, the reason why the world can sustain a much larger population than ever before today is that agricultural productivity has improved so massively. It could improve much further still if we dropped our childish paranoia about innovative farming techniques like GMO, and if we moved towards untrammelled worldwide free trade in agriculture.

“Population growth is irrelevant. What matters is institutions and economic incentives. Countries move out of poverty to the extent to which they adopt the basics of a functioning modern economy: the rule of law, impartial courts, and secure property rights. They also need to allow the free formation of market prices, so that prices can act as signals of scarcity, providing incentives to overcome that very scarcity. With rising prosperity, we also grow more resilient to natural disasters, and we can afford to adopt production techniques that go easier on the environment.

“If we continue on anything like the current trend, we may well come close to the eradication of poverty within our lifetime, although doomsayers like Knight will no doubt find some other ‘impending catastrophe’ to moan about.”

Follow Nick Hallett on Twitter:  or e-mail to: nhallett@breitbart.com