(Greek: κρυπτεία / krupteía, from κρυπτός / kruptós, “hidden, secret things”)

Archive for March 19th, 2009

The Second American Revolution

leave a comment »

Dude, you had me until you went all Xenophobic.

These videos are making the rounds in the bloggosphere and I have to say, some of what he says I can get behind. Term limits on senators, the criminality of what has been passing for governance, but then he gets all whack about illegal aliens and languages other than English. Look, the big copper girl in the harbor that stands for our shining city on the hill says this;

Not like the brazen giant of Greek fame,
With conquering limbs astride from land to land;
Here at our sea-washed, sunset gates shall stand
A mighty woman with a torch, whose flame
Is the imprisoned lightning, and her name
Mother of Exiles. From her beacon-hand
Glows world-wide welcome; her mild eyes command
The air-bridged harbor that twin cities frame.
“Keep, ancient lands, your storied pomp!” cries she
With silent lips. “Give me your tired, your poor,
Your huddled masses yearning to breathe free,
The wretched refuse of your teeming shore.
Send these, the homeless, tempest-tossed to me,
I lift my lamp beside the golden door!”

So, yeah, uh, if we are to keep her in the harbor and tout her being there, then we should consider that we are a “Melting Pot” and that our diversity is our strength. Perhaps your whig is on a little too tight? Maybe the powder is itchy and has you all cranky? I dunno, but, I do know that some of your yammering kinda reminds me of a certain other guy… Hmmm who might that be…
Oh yeah…

Nazi’s, I hate these guys…

I agree, we all may need guns, but I think it more likely that I will need the gun to fend off the likes of you and your rabble..

Written by Krypt3ia

2009/03/19 at 23:50

Cyberchange We Can All Believe In?

leave a comment »

I would instead say “China’s Master Plan to Subjugate America”

In 1999, two Chinese colonels of the People’s Liberation Army wrote Warfare beyond Bounds, a 228-page analysis of the transformation of modern warfare. More specifically, the book critiques how the US military apparatus has conducted battle in the past and suggests various means of exploiting the weaknesses of a “technologically superior opponent” that “views revolution in military thought solely in terms of technology.”

Of several areas that could potentially be exploited, “information warfare” is mentioned as a “semi-warfare, quasi-warfare, and sub-warfare, […] the embryonic form of another kind of warfare.” The book states that network attacks and infiltration are more cost and labor efficient in comparison to traditional means of warfare, potentially having the ability to affect not only electronic government systems, but utility grids, bank transfers and civilian communications. In the same year the book was published, NATO computers were attacked during the Kosovo conflict, and after the Chinese Embassy in Belgrade had been bombed, it was reported that Chinese hackers posted threats such as ‘We won’t stop attacking until the war stops!’ on US government sites.

While the US military refers to cyber- and information warfare as specifically dealing with the online exploitation of critical military and state infrastructure assets, it is distinguished from what senior analysts at NATO have dubbed “iWar,” which consists of “attacks carried out over the internet that target the consumer internet infrastructure.” The definition explains, “While nation states can engage in ‘cyber’ and ‘informationalized’ warfare, iWar can be waged by individuals, corporations, and communities.”

Essentially this type of warfare comes in the form of distributed denial of service attacks (DDOS) which “clogs up” network access and often makes vital websites and other data inaccessible. The cyberattacks on Estonia in May 2007 and Georgia and Azerbaijan in the 2008 South Ossetia conflict are often used as examples of cyberwarfare posing serious threats to both state and commercial institutions.

From US Cybersecurity Woes

I just thought that you all should get a gander at the 228 pages of planning that our Chinese Overlords began in 1999. Seems to me that we are WAY behind the curve here… Anyone else think so? Hell, we had enough trouble conceiving that Iraq was going to turn into a counterinsurgency… No, there will be no counterinsurgents! We will be greeted as liberators!


Written by Krypt3ia

2009/03/19 at 21:42

CSC to help combat cyber warfare

leave a comment »

Published 18 March 2009

Cyberattacks pose a major threat to the welfare and security of developing countries; developing protection against that threat offers business opportunities

Cyber attacks are emerging as a major threat to the welfare and security of developing countries (see, for example, “FBI: U.S. Facing ‘Cybergeddon’,” 7 January 2009 HS Daily Wire). This means, among other things, that there are business opportunities in providing protection against this threat. Falls Church, Virginia-based Computer Sciences Corp. (NYSE: SC) has established a new virtual cybersecurity center in a move to help counter cyber warfare threats for clients. CSC said the center — which will include the company’s Innovation Laboratory, Infrastructure Laboratory and Service Oriented Architecture Center of Excellence — will simulate cyber threats and potential security solutions.

Company officials said the security center would support security infrastructure, information assurance and identity management through understanding of information technology vulnerabilities. “Cyber warfare is one of the biggest threats to America, and CSC is applying our proven expertise and global capabilities to help government and commercial customers protect their networks,” James Sheaffer, CSC North American public-sector line of business president, said in a statement. “This new virtual facility will allow our customers to witness threats and see how effectively our programs engage to block potentially devastating intrusions.”


I work with these clowns as a company for support… I seriously doubt they are capable.

Written by Krypt3ia

2009/03/19 at 21:24