Megaupload founder Kim Dotcom says he has information that MPAA industry shill Chris Dodd asked his best friend and vice president Joe Biden to sic the DoJ on his company. Circumstantial evidence, White House visitor logs, show meetings between industry CEOs, Dodd, Biden and an extradition expert. So far Dotcom has prevailed in court as a judge ruled that the warrant used by police to raid Megaupload was illegal.
Here's the administration's strategic plan on intellectual property issues, especially its love for the now hopefully dead ACTA.
McAfee recently announced the discovery of "a highly sophisticated, global financial services fraud campaign [called High Roller] that has reached the American banking system." The scheme is fully automated, meaning minimal human involvement, and targets wealthy clients and corporations. Estimates of potential losses run into the billions.
That's peanuts compared to this scheme, in which Fed Bankers gave themselves over $4 trillion in low-interest loans to offset losses, caused by greed, incurred in the financial meltdown.
What kind of expert has opaque credentials, vociferous opinions based on said expertise, and who is dead wrong on a recent incident that falls squarely within his area of expertise? You guessed it, the kind that consults for the US government. Meet Jeffrey Carr, a so called expert on cybersecurity, a consultant to US government agencies, who claimed, many times, at length, and based on his expert knowledge that Stuxnet was a Chinese product.
The new book by David Sanger, Conceal and Confront, has put a stake in the heart of Jeffrey Carr's contentions. But never fear, when anyone in the US government calls you, considers you, or invents you as an expert, you're golden. Jeffrey Carr is quoted by Tom Gjelten in a recent NPR story as a credible expert, this when very recent reporting reveals that he doesn't know whereof he speaks on the biggest story in his area of expertise.
Gjelten, using Carr as his guide, missed the real meat of the story. Carr's insistence that Flame is an espionage tool, not a cyberweapon as some researches are saying, clearly misses a larger point. Flame was able to bypass all known antivirus programs, even those fully up to date. This exploit isn't mutually exclusive; espionage or cyberweapon, it got in undetected. But you won't find this information in Gjelten's story or in Carr's narrative.
This highlights the media fail on the cybersecurity issue in general. Carr's credibility should be questioned because he's wrong on issues on which he claims some expertise, and is batshit crazy to boot. But because he has consulted government agencies on cyber security issues he remains a media go-to pundit. This article mentions Flame as a US product, a direct contradiction of Carr's thesis. Yet there he is quoted as an expert in the same article, which never mentions Carr's mistaken attribution of Flame as a Chinese production.
Eugene Kaspersky, who's lab discovered the newest US cyberweapon Flame, believes the new program portends the end of the world as we know it. Flame, an update on Stuxnet, is too sophisticated and took too much time and money and too many human resources to be anything other than the product of a nation state. Flame can turn on a targeted computers audio and camera, and activate the computer as a spy trap against anyone in contact with the host computer.
As people like Kaspersky, who actually know what they are talking about, are 'scared' about the implications of these cyberattacks, DHS head Janet Napolitano believes Al Queda, and their crack team of software programmers, engineers, hackers and script kiddies are a serious threat to the US. She believes, "that malicious computer code generated by groups like al Qaeda are just as big a threat to the security and stability of the nation [as flying planes into buildings]." Many in Washington want her to head up US cybersecurity functions.
Read this story as an object lesson in the media's dismal failure on all matters cybersecurity, cyberterrorism, cybercrime, whatever they are calling it these days. The writer quotes a "a former military intelligence officer and now a communication and public diplomacy information operations expert and consultant" who opines that the leaks about Olympic Games (code name for the US cyberwar program against Iran) have caused a perception management problem for the US around the world. The problem, he says, is that everyone now knows it was the US, not that Obama is committing acts of war by executive fiat against other countries.
End of the world, end of common sense, end of intelligent debate.
Google announced that it will provide alerts when it discovers governments are spying on the company's users. How does it know? Trust them, they say, they know. Does this apply to the US government, who, according to critics, Google has cozied up to in the past? They aren't saying.