-
Posts
1,775 -
Joined
-
Last visited
-
Days Won
25
Content Type
Profiles
Forums
Gallery
Blogs
Downloads
Wiki
Everything posted by 17D_guy
-
For cyber peeps ADSC was a consideration after a few other factors (shiny penny, training, etc.) but according to my buds at the slaughterhouse it was there. Since our jobs got realigned to more actual Ops...who knows if it's more/less important. But it was part of the vectoring/assignment discussion, sometimes in the shitiest way possible.
-
Write up by the guy who wrote the spiderfoot tool that was so widely hailed as "proof" from the failed Trump Campaign. Guess if he agrees more with COL Cybersecurity Expert, or your lowely, local cyber guy. https://medium.com/@micallst/misusing-osint-to-claim-election-fraud-cfb89c858c3a Relevant quote -
-
Apparently they're asking about Russell's availability. Also, you guys should check out https://old.reddit.com/r/formula1/ It seems to avoid too much stupid drama in the main comments, and has really quick updates. Right now there's a photo of the Haas survival cell on the front page.
-
I love it. You're "just asking questions" with some video of a cybersecurity expert for the disaster that is campaign trump, and I try to figure out if he's actually one because his claims are amazing. I watch the video and tell you it's bullshit, and what he's briefing doesn't make sense. Also, he's presented zero actual proof for what he claims. There's no information online about his expertise, and his background, as he presented it, sounds mad fishy. Spent a hour trying to find information on him, and listening to the video. But I'm just diminishing someone's career. Well played, troll. We're done.
-
As a D, why would you lose seats in the house, and not guarantee at least 50 in the senate? Are they in Ohio? I didn't see any lawsuits there after checking a few "legacy media" sites (and wiki).
-
No, that wasn't my point. I've got my quals/creds in my resume, online in various job search engines, in LinkedIn exactly where I worked and what positions. I've been featured in a magazine for an award or 2, and even a couple of newspapers (gasp...I'm old!). I was known by my community (as fledgling as it was), and could be found in various groups that you can google (or my preferred - duckduckgo). This dude isn't active anymore, and is working for a political campaign, so we can probably assume that he's not still a spook. But nothing of his cred is online, not a PME paper, not a twitter handle, not a FB, not a LinkedIn, not previous work, not where he currently works that would employ him as a cybersecurity expert...and want to highlight that. He apparently doesn't have his own company he's pushing either. He's cited as a cybersecurity expert, but he's not in any of the circles I can turn to in order to evaluate (not prove) expert. I can't even find out when this dude retired, which would inform me if he was slinging bytes or simply signing paperwork approving the next "digital weapon buy" for random-three-letter-agency. His career-progression makes sense, as there's a lot of Army O's the crossed -- my exp has been mostly Artillery O's. But did he cross as a O5? He legit could have crossed as a O6. Would he be smart on cybersec, for sure. Would he be an expert...no. But, I don't know because we're unable to validate anything about him. Look, this is exactly the same as you zipper-suited Sun-Gods bitching about rando general having 69hrs of flight time in a platform and not being qualified to speak on X in platform (Phoenix Program comes to mind). Like everything else about the Trump campaign - lies, disinformation and utter failure at their mission. //BREAK BREAK// I actually just watched the video of the entire testimony from PA, and looked at spiderfoot. Here's a link to spiderfoot overview...it does not appear to do what he claims it does. That's as nicely as I can put it. Yes, their main webpage was connected to the internet on voting day, same as it is now. I will also give him the benefit of the doubt that he's speaking, unsworn, to legislatures...but he called his people, for his unnamed company "white hat hackers." dude is sus. Found his whole testimony here, he claims to have done the following in the last 1/2 of his career: "info warfare as - psychological operations officer, information operations officer, doing computer network operations, electronic warfare and special electronic warfare, deception, counter-deception, OPSEC, and a couple other specialties." Simply...bullshit. "One of our white hat hackers (sus) previously discovered malware that's present on 'the servers.'" - This is a crime. As an "expert" he should know you can't do that in our country without prior approval. Did they have approved access to get on those systems and evaluate them to discover that malware? Which servers, the webservers, the voting servers, development servers, update servers, etc? "No audit trail." Except those paper ballots they hand over, and can you know...audit with. Here's a guy on twitter breaking down the AZ testimony as the utter bullshit it is as well. You can check his quals in his twitter bio, like a real world expert. EDIT - Found out he retired in 2017 as a Col. Assume 3 years for in rank retirement he pinned on in 2014. Looking at some dates, Cyber Mission Force achieved IOC in Oct 2016, and FOC (right before I was there) in 2018. USCC elevated in 2018. I'd put good money on this dude commanding a battalion/brigade that supplied operators that actually did everything he claimed to do to USCC/3LA and being a staffer that pushed to get the CMF stood up. That's it after listening to his testimony in PA. To be clear, he claimed to do all the following jobs the last 1/2 (15 yrs) of his career - 29A MOS, 35G MOS, 30A MOS, 37A MOS, plus whatever job deception/counter-deception are rolled into. Overall, AF Intel manages their officer (and some enlisted) career paths extremely carefully to build expertise within certain areas, build credibility and ensure people have accesses throughout. We hated it as cyber guys for 2 reasons - fucked us for opportunities, fucked us for employing their people the way we wanted. They were especially stringent at O4 and up. My (limited) experience was the same for the Army (outside GO ranks...because they'll put a Infantry officer anywhere they fucking want in command). So...simply, no. TL;DR - This dude was minimum exaggerating his experience, and not credible about what he was briefing.
-
Sounds like politics to me. "Oh, if only we had more time!" Like every single Trump lawsuit. If only the legislature could have done that before the election since they already passed other laws on how their state was going to administrate the elections. Convenient of them to do that after they lost. Also, misleading of you to post it without the context of it not getting heard/passed. I googled this guy, but could find nothing supporting these claims. Go with creds you have, otherwise I'm going to assume he's as credible a cybersecurity expert as Rudy.
-
Romain's update on Insta - https://www.instagram.com/p/CIL-IOZJ7Xm/?igshid=eyhf0s4kdrsu
-
Started retirement in Mar during the first wave of shutdown. Couldn't agree with this statement more. You do not want to be figuring this shit out, TAP'ing, job hunting and dealing with whatever relationship issues you may/may-not have in the mean time.
-
showed my wife the Senna documentary last night, then this happened today. It's amazing how far they've come to protect drivers. A wonderfully engineered miracle.
-
SD? MI? WA? I guess not WA...they had the first round.
-
Oh, we're going with the Hugo Chavez voting system thing still even though it's backed-up with paper ballots? K.
-
Man, if they could only have presented competent cases in court where evidence is actually required.
-
-
Here's Cody Garbrandt's update on why he hasn't been in a fight this late in the year. Meh, healthy young prize fighter, brick for right hand, healthy. Shouldn't have a problem.
-
Is 12% the national average? Where are you getting this number? For UT the last number we have for positivity is 23.6%. Which means, according to the experts, there's a lot of people that aren't getting tested that are positive. Our hospitalization rate is high, also: Percent of all non-ICU Bed Occupied - 53.7% Percent of all ICU Beds Occupied - 87.9% Percent of Referral Center ICU Beds Occupied - 91.9% So I guess the question, for us locally at least, is when do we want to get serious about burning out our healthcare workers and not having to ration care? Of course we've got people trying to break into hospitals to show it's a hoax, and saying germ-theory is a lie while protesting the mask "mandate" also...so. This is exactly what happened to us. Ex-wife is a school teacher, she needs that check (she didn't get any of my retirement..woo) and had to go back to school. Daughter goes over before Ex has symptoms. Boom, 8 days later daughter has COVID. Ex's husband had to do a few days in hospital, and a week later is still on O2 looking really rough and she's had to go back to work but is exhausted at the end of the day. Ex's symptoms were done last week. Are we counting people in their 50's as elderly? That's the median and average age for hospitalizations in our State. Yes, avg deaths is prob the same as everywhere else - 70's. Our state is extremely healthy, and extremely white (minorities are having much worse outcomes). The gov't here, in ND and Republican Gov's across the midwest have been suggesting wearing masks for months. Doc's sure weren't making the policies here because the Gov's ignored their pleas for months for a mask mandate. But the gov's damn near begged people to do it, and asking businesses to enforce it. Why would the Governors change that now to a mandate? Do they suddenly hate common sense, and got a case of the "COVID fear." Might be because North Dakota had 9 ICU beds left in the whole state. UT's had exponential growth and an extremely stressed healthcare system. Plus people throwing Halloween parties in warehouses because "they engaged in plenty of high risk activities that are more likely to cause harm than COVID. Life is to short for us to hide in the house for something that most likely a non factor." But they're young people, they'll not be hit to hard and prob go out with a slight cough. Get someone sick in line at Starbucks who's in Healthcare who just wants a coffee before another long shift at work, or a teacher, or a nursing home worker, or a grocery store worker. Advising doesn't work for the majority of the population, ever. Didn't work for seat belts, smoking indoors, drunk driving, and other "personal liberties" that were eventually legislated against. Which is really too bad. This could have been a moment where we can together as Americans to fight a common foe like many other countries. I'm pretty sure I posted this when it kicked off, but this whole thing is a giant, "It's not about you" test.
-
I gave it a listen. He's very right about what the pandemic has caused. Now, there's a couple of caveats moving forward to remember when thinking about cyber. I also think that we're going to see big change on this within 5 years. 1) Cyber is not currently a "utility" in the US. It's not treated like water or power for individual consumers, or even small/med businesses. It's not a necessity or right. That mindset allows it to be almost an afterthought. There's no big push to get fiber everywhere, to make us competitive across the US like some of our peers are (Japan, SK, Europe). Our costs are expensive in comparison with less to show for it. This is mostly a political and commercial discussion. But this framing is important because we (USA), as a people, don't really think it's that important. (Counter to my point above is mobile access...but you can't do everything on phones, and they're just as susceptible to hackers, if not more in some respects.) 2) Cyber operations, as levied by nation states or very advanced hackers, move in a larger spectrum than just the internet. It's literally across the electromagnetic domain, and that's all I'm comfortable saying on here. There are little/no norms, and the norms we have are poorly formed and based mostly on leadership personalities. Trump's cyber engagement was VERY different that Obama's. I'm not saying here whether one was better than the other, but that for the most part our other norms of military engagement don't change too much from one Pres to the other. So, on one had we have a domain we're actively fighting...kinda. And at the same time it is the baseline for modern society to function, but it's "nerd shit" that doesn't need a second thought until you gotta call the geek squad. Everything is digital now: TV, voice lines; nothing comes to your house that isn't wrapped in a IP packet. Many leaders are of the mindset to either pay it lip service and not fund an adequate amount, or do a checklist approach with a "jobs done" when they meet the bare minimum. There's also a lack of skilled workers, which is a whole other discussion. The pandemic is pushing it forward faster, but I'm worried it's going to take a lot more. We're already seeing the creep and what I believe is a failure to engage correctly. For example, I talked about red lines for voting machine/infrastructure, is crypto-locking up hospitals a red line? I think it should be. I think the Pres should be able to say that is a clear-and-present danger to the US and our way of life and vector the DoD to fix that problem for us. So this dude is right, we all have to figure out the fix together. But we're all fighting across it, and there's no norms. On top of that, as Americans we actively resist the idea of centralized control, which is what is needed in the setup/build phase. I need a fully redundant and resilient power grid -- well the power companies, and states, are going to tell the Fed to pound sand because a myriad of reasons. The Fed, prob DHS, is the exact cross nation organization to lead that effort. I'm rambling, I apologize. I'm still going to post this, but let me know if it made/didn't make sense. I'm very tired.
-
I'm invoking Goodwin's law.
-
How about one about seat belts or drunk driving?
-
I don't know, would the leader of the free world have called it a hoax of the opposition, not a big deal and under control while s/he encouraged people to disregard their local leaders while suggesting injecting "disinfectant" and internal sunlight until it's gone this summer, winter, next year when there's a vaccine? Salk said he wouldn't patent the vaccine because it would be like "patenting the Sun." That's how much fear polio caused. We've been coddled in our lifetimes with no serious epidemics in our country.
-
Before I got out we were all hands on deck for protecting this election in case DHS called for federal help. We did some prelim research into the voting system and figured out it was a fools errand, because each state does it their own way, and we literally couldn't prepare for 50 eventualities with our resources. We could focus on the top 3 producers of voting machines, but they, like state gov'ts, do not want any "help" as is evidenced in the video. So, I don't really have any idea about what types of machines they had in particular. But again we get back to the breadth of the term hackable - everything is. There is a port somewhere on those machines, even if it's just the power cable, the CPU fans, the hard drives spinning up. Ben Gurion University in Israel has been doing amazing research on it. The question is: is this hacking plausible knowing that cyber is a finite resource that can cost a lot of treasure to be done at a professional level? Here is a report from a hacker group attacking a professional malware development company that goes through a lot of what is required. It's getting older now, but a good read. Note, it reads like 1 person did this, but it was probably at least 3, maybe more. I've seen the NBC video before. The work they do at DEFCON its great, it's why we send folks there on the regular. I think at the last one they did some of our satellites and found some of the exact same problems. But this just dropped a few hours ago about hacking the Dominion machines, Steel is the PR dude: "Well, it's physically impossible," Steel said of vote switching. "Look, when a voter votes on a Dominion machine, they fill out a ballot on a touch screen. They are given a printed copy which they then give to a local election official for safekeeping. If any electronic interference had taken place, the tally reported electronically would not match the printed ballots. and in every case where we've looked at -- in Georgia, all across the country -- the printed ballot, the gold standard in election security, has matched the electronic tally." EDIT - Actually, you need to read the article, I think it address all the lies "soon to come evidence" that is being thrown around. But I could be wrong, I'll wait for the evidence that's "Going to explode Georgia." So there is a physical audit for at least the Dominion machines. I'm 99.99999% positive there were also instructions for voters to check their paper ballot to make sure it actually reflected what they wanted. Sidney Powell's claims are just...absurd. I give it a 0% chance that "communist countries" got together to share in the spoils of a hack on the voting infrastructure of the US. Who... Cuba, Venezuela and China? Did I miss anyone? Oh wait, NK - technically communist. I guess Vietnam as well. These renowned "cyber powerhouses" that are so secret and quiet we'd never catch them until after the election was over? I phrased it that way because China is very loud on the wire traditionally. These countries have not been after these types of systems in the past. You can check online for what APT's come out of these countries and see what they target, but TL;DR - Banks, economic espionage, casinos, etc. CN tries to steal for their economic benefit to industry (J-20 anyone) and everyone else is trying to make Bitcoin through various frauds/cryptolockers. Could they have shifted their TTP's to target something else...I mean, technically anything is possible. But I'd think it very, very unlikely. Tooling up for these things takes awhile. Also, they're not culturally aligned for it. It has been amazing to see just how much the culture of each one of these nations (and our own) impact the way we all operate in cyberspace. I don't know if that's reflected in how they fly either. Is it? For the rest of the twitter thread, they disabled the computer and there was security guards doing the rounds. Looks like the report slipped in when they walked away. Humans doing human things.
-
That's fucking cool, sign me up. Also, I had a post here that I guess didn't actually post. But where I'm at, currently our numbers are: Percent of all non-ICU Bed Occupied - 58.2% Percent of all ICU Beds Occupied - 90.8% Percent of Referral Center ICU Beds Occupied - 94.3% So...not good. Articles have already started about rationing care, and not allowing anymore transfers in from outlying hospitals AKA where people say it's not bad because their hospital isn't full. This one stuck out to me though for all the "co-morbidity" folks, for our hospitalizations the percentage with at least 1 pre-existing condition - 49.7%. 4K cases everyday through the weekend so far. Only thing helping us in Utah is the fact that we're a rather young population state, mostly white, and mostly healthy. According to our gov't roll-out plan I won't get the vaccine until about next Jul.
-
Typical non-leader shit. Correct question is, "What am I going to do." I hate it when the GO's came to PME, or anywhere for that matter, and pulled the "what are you going to do to fix the USAF?" Nothing Sir, even if I gave you the answer you wouldn't advocate for it, wouldn't do it, wouldn't give it an honest wag. The only time I saw shit fixed was when the GO's put their foot down on the Col's/Lower-GO's necks and said what was going to happen. Then the Capt/Maj that advocated for that thing got burned in promotion/assignment unless the GO also followed their career. Guess how I know. 🙄 I really enjoyed how he laid out these organizations that changed the standards, not the leaders that put it into effect. Funny, I don't think AETC's LOM said, "AETC lead x, y, z in UPT 2.0 development." I'm pretty sure they used his name. Like this, "Gen Shelton, former AF Space Commander, FUCKED cyber development for years due to petty squabbles with other GO's and an inability to grasp how the world was changing with the new domain of warfare." Edit to say - Thanks for you guys letting me peak into your world and for doing the dangerous jobs.
-
here's another reason ratings are down - https://nflbite.com/ Free football. That's your cyber (or pirate) tip of today. Also, have an add blocker installed. You can do it on mobile as well if you're using Firefox.
-
You do this while flying?