Another Softwar revelation!

Occasionally, I’ll post something exactly from Softwar.net, because it’s critical information, and everyone should wake up about encryption.

——————————

ALT SHIFT KILL

 

A MESSAGE FROM OUR FOUNDER AND CEO –

The Wikileaks disclosure of CIA espionage software is supposed to be about Big Brother. They are defensive in nature designed to monitor and tap into our computers and communications. However, these programs have more than just a passive surveillance function. They also can kill.

Quietly embedded in the latest Wikileaks disclosure of CIA exploits is a cute little program called NightSkies. NightSkies is one in a series of Apple malware programs under a project called Triton. These programs are designed to monitor and “beacon” back information stolen from infected Apple computers. NightSkies has one nice little feature in its arsenal of functions… it can also execute any other program downloaded secretly from a remote CIA “Listening Post”.

<click image to see Wikileaks document>

At first, this feature seems logical and more or less harmless. It is not. It is this feature that murder by software is enabled.

If the infected computer is used in an industrial, internet of things, military or medical application it can be turned into an assassination machine. While Apple computers are not often used in the military, industrial or Internet of Things fields, they are frequently found inside hospitals and they communicate with other critical systems as well – all of which can be the difference between life and death for a patient.

Clearly, the NightSkies design is not the only such program in the CIA arsenal. Similar features will be found embedded within other CIA exploit programs designed for the other major operating systems such as Android, Windows and Linux.

For example, a computer monitoring the condition of a patient can be told to ignore signs of a heart attack and not alert the staff. Other medical computers control more than just monitoring a patient, for example computers often control blood filtering for kidney dialysis. In fact the medical industry is filled with computers that perform a wide variety of life critical functions, diagnosis of brain tissues, X-ray controls, chemotherapy control, and delivery of intravenous medicines.

It is this remote code execution feature and payload delivery of the CIA NightSkies design that is of greatest concern. It could range from a subtle change in the dosage of medicine that becomes lethal, deliver a series of lethal X-Ray or radiation therapy treatments, or perform miss-diagnosis of a condition so that medical staff delivers lethal treatment. The computers involved could show the operators that they are performing flawlessly while at the same time dosing a patient with a massive amount of radiation.

NightSkies design also combines itself with embedded clock timers, to install itself and execute at a specific data/time and then de-install and delete itself at another pre-designated time. Thus, making it possible for the program to execute its prime function, kill and then delete itself, leaving no evidence behind. In addition, the NightSkies design exploits are built to be ignored and accepted by Anti-Virus programs; therefore they are almost invisible to current defenses. Finally, the NightSkies design programs communicate with their host Listening Post (LP) using encrypted communications so when they do “beacon” the data transmission is undecipherable. All these features combine to make NightSkies designs the perfect assassination tool.

The myriad of devices that we rely on for critical life functions that use any of the major operating systems are vulnerable to this kind of attack. These operating systems function aboard airliners, automobiles, in water plants, sewage facilities, oil pipelines, traffic control, police, fire, and rescue and are even present inside the controls for nuclear weapon systems. For example, the British force of nuclear tipped Trident submarines run a variant of Windows XP.

It is now clear exactly how dangerous the CIA exploits are. They are not simple defensive surveillance tools if they can download other programs unseen and then execute them. They become offensive weapons designed to kill.

CHARLES R. SMITH

CEO FOUNDER OF

SOFTWAR INC.

Contact Us:

What’s new is old, and vice versa, again

The hearings on the hill yesterday, to investigate the issue of Russian interference and possible collusion in the election of President Donald Trump are as usual, pumped up with hype, hyperbole, and angst, with each questioner grandstanding long enough for him/her to feel satisfied he”s putting on a good show for his constituency.  In other words, bloviating long past the need.

While it”s true there was some sharp questioning, it seems strange that so many questions were not asked.  So many people were not called to testify.  So much was left out.  The upshot of the entire affair is Dir. Comey gets to state on the record, under oath, that President Trump has no evidence of “wiretapping” of him or his administration before the election, but that the Trump Administration is under investigation.

Media just takes that as fact.

Not I.  I”m old enough to have lived through and sat through the entire hearing for impeachment of President Clinton,  I saw all the old tactics, still being used today, to obfuscate, to deceive.  All the questions that weren’t asked.  All the documentation not presented, no called into question.  I remember all the Foster death cover up scandal, and how that was dealt with during these crucial most important hearings, and I know media aided the Clinton administration in a massive cover up.  Media now claims their conclusions are facts.

I saw how the Senate handled the impeachment trial.  I saw how not a single senator went into the room where there were boxes and boxes of thousands of pages of evidence, and never once looked at any of it.

I saw how they refused to look at the evidence, their minds made up in advance.  A travesty of justice, right there.

The games they play in the capital are serious.  No matter how excited we get over the facts, the evidence, the testimony, the cover up, media will side with the leftists in power, and claim the results of their posturing, their deceit are the facts.\r\n\r\nI have no faith in government.  It”s usually working on solving problems it created in the first place, and chest beating about how great a job they are doing getting to the bottom of this or that scandal.  There”s so much under the rug, you can”t walk on it anymore.

Cynical, I know.  But there you have it.  I’ll believe Judge Nap over Comey any day.

Having to start again.

Upgrades sometimes are downgrades…. I wish sometimes I were still using XP, and never upgraded.  Seems each time a tech upgrade comes out, and I read about it, it either kills my system, or kills my websites.  This time, I think I can restore some the articles I had posted.  But there is so much stuff coming right now, and so much to discuss, I may not bother with much of the old.  New Days, folks!

Medusa Must Die, a Softwar.net Article

I always get good material from Softwar.net.  I plan to do an interview with the CEO sometime soon.  I have lots of questions I”d like to ask.


It is time to slay the monster. The “Deep State”, “Shadow Government”, “Surveillance State” or whatever its name is today has to be destroyed. The drama currently unfolding in America has shown the vast intelligence apparatus erected to protect our nation has gotten out of control and has turned upon us.

Over 250 million internet communications were swept up under Section 702 of FISA in 2011 alone. No warrant. No court. The FISA investigation is not a “law-enforcement matter” or “case”, it is an intelligence matter.

Yet, the FISA has suffered from political abuse with allies such as Germany, France and Israel being cited as targets simply because their governments may have opposing views damaging to the local politics of the ruling party in DC. The recent abuse carried with it the detailed connections to elected officials inside America who communicated with their foreign counter parts in Berlin, Paris and Tel Aviv. Thus, scooped up in a single fell swoop, communications of US citizens were lumped in with details of why Berlin or Paris support economic pacts or why Tel Aviv does not support deals with a nuclear armed Iran.

In fact, in these particular circumstances, a FISA court was never used. The president has constitutional authority under Article II to direct surveillance without judicial authorization and Obama exercised that authority. Obama approved surveillance on Germany and Israel. The so-called “it was carried out by professionals” excuse translates into the familiar “we were following orders”.

Those orders came from the top and no amount of legal chaff can hide that fact.

The information gathered was ripe for abuse. The Obama administration unleashed a paid campaign to oust Israeli Prime Minister Benjamin Netanyahu immediately after tapping Israel. The furious effort by the Obama administration to subvert the democracy of an ally and silence the government of Israel also carried with it a furious effort to silence its supporters inside the US.

Today, we face a different problem altogether. The surveillance of a presidential candidate and of members of Congress for political purposes. The data revealed so far by the rapidly leaking ship of “Deep State” shows vast surveillance of the Trump campaign and even supporters in Congress, such as Senator Sessions, was under-way inside the Obama administration. This effort makes Water-Gate seem like an amateur game of tag in comparison.

The first question left unanswered is: How many members of Congress were tapped?

In addition, there is also the question of access and leaks. We already know that the Clinton campaign had members of the Obama government who leaked information to them. Peter Kadzik inside the Obama Department of Justice gave the Clinton campaign a “heads up” regarding investigations into Hillary”s emails. Who else had access to the sensitive FISA materials and were they too leaked to Clinton?

The fact is that the “Surveillance State” has so much information on all of us those un-seen bureaucrats can pick and choose who is to be targeted, who are to be promoted, and who are to be discredited. This is not a democracy but something out of an Orwellian nightmare.

It is time for Congress to act and act swiftly if they intend that there is to be a Congress in the future. The “Surveillance State” must be dismantled. The three sisters, the FBI, CIA and NSA have to be opened, re-organized and re-tasked back on their original missions. The bureaucrats so deeply entrenched in these agencies must be re-assigned, re-evaluated, let-go and the data files on millions of Americans must be destroyed.

Yes, you read me right, “destroyed”.

Why? To show America and the whole world how out of control and damaging the accumulation of data on millions of free citizens can be. There must be no more secret societies that hold detailed information on our citizenry. Those that amassed that information must be exposed to the light of day and if need be prosecuted. The data they amassed is vile and not for national security but for power accumulation and control. It too must be sent into the abyss along with the horrid creature we created. Either it must die or we will.

CHARLES R. SMITH

CEO FOUNDER OF SOFTWAR INC.

%d bloggers like this: