Pandora’s Box

By 9 March 2017KEY ARTICLES
Pandora's Box

Pandora's Box

Published on 9th March 2017
Pandoras-Box-200x200

Joseph S R de Saram CISSP FBCS MIEEE MIScT MINCOSE MACS Snr CP

Information Security Architect / Intelligence Analyst / Computer Scientist / Human Rights Activist / COMSEC / SIGINT / TSCM
698

Joseph S R de Saram CISSP provides thought-provoking insights into Military Intelligence and Law Enforcement, how they operate beyond (as opposed to above) the law, and how their various antics foreseeably lead to the destruction of Fundamental Human Rights. Updates are in progress so check back regularly – verified articles end with . Please feel free to LIKE and SHARE

I read an article in the UK Guardian today entitled ‘WikiLeaks publishes ‘biggest ever leak of secret CIA documents‘. As usual journalists are glamorizing that which has occurred and making up terms such as ‘sensitive compartmentalised information’ – the word is compartmented.

I know about the Center for Cyber Intelligence but it is not my place to speculate about Wikileaks’ ‘Vault 7’. However that which I would say is this:-

The smartest minds in the US and UK are responsible for the tools, and this is not a matter for public discussion.

Weaponised Software and Contractors

A pparently Contractors are responsible for the leak, and that would seem possible in one sense. I actually wrote about how the defense world really is on 10 October 2016:-

‘IT/Management Consulting’

This post is about an excellent article At Booz Allen, a Vast U.S. Spy Operation, Run for Private Profit written by Matthew Rosenberg which appeared in the New York Times on 07 October 2016. I have been ‘working at the carwash’ since 1993, and Matthew’s article is the most accurate that I have ever seen.

And as I wrote before the CIA leaks (italicized) :-

But as the two thefts have made clear, employing large numbers of contractors brings security risks, though experts point out that there have been many leaks in recent years that came from government employees, as well.

“THAT IS THE SAD PART – YOU HAVE INDIVIDUALS WHO ARE GREEDY AND MESS UP THE WHOLE THING BY STEALING STUFF. CAN’T PEOPLE JUST ENJOY THE MONEY AND KEEP THEIR MOUTHS SHUT?”

As it happens I am somewhat at a loss to figure out how this leak could have occurred because of the acres of firewalls and physical security in place. The CIA is utterly ruthless and will go after anyone and everyone who gets in their way.

Stealing data and then circulating it to all and sundry is not an insurance policy, and as I wrote in this article, also published before the CIA leak:-

The Importance of Immunisation

This post is about the Government Contractor Defense (“GCD”) and how various adversaries of mine have failed to recognise the fact it covers the type of work I perform and the clients I associate with, from issues arising from product liability as well as a more limited application to service contracts.

‘As an architect I absolutely hate it when people copy and/or steal any of ‘my stuff’. Edward Snowden may have had balls but he still broke the law – 18 U.S.C. 541/793 is crystal clear.’

A Julian 'Assangination' on the Cards?

As such I am wondering whether the leak was deliberate, and a ‘terribly’ convenient (literally) way to deal with Julian Assange since it was obvious he would publish it and he is ‘handling stolen goods’ however it is considered, regardless of 18 USC. MI6 would not let him get the better of them and perhaps Julian has forgotten that his ‘London Home’ is actually in London?

20130626

Grotesquely Stupid Conversations Designed for Entrapment:-

A Sri Lankan Mutt named Chamaree Silva is who I am speaking to. Thanks to the subornation of perjury from Simon Thompson she also writes affidavits for the Melbourne Fraudsters – they are equally inspiring. After a while I thought it was easier just to agree with the fools who had taken up residence in my house. Hence my disinformation, and telling them what they were expecting is how I exposed the Melbourne Fraudsters! But they could not identify that I was onto them and thought I had a problem.

So I told Chamaree that I had an ALIAS of C-3PO and worked with a woman called Sidney Bristow. I told her that C-3PO was like 007 🙂

and a guy called Michael Vaughan:-

no, not that Michael Vaughan, this one:-

and that there was a nasty man called Sloane too, who we couldn’t trust:-

If that was not laughable, an Australian Attorney named Katarina Klaric was wasting my time with more Dumb Questions about the CIA. I can understand why because ASIO operates at a low level too so Katarina must have been an agent!

In any event law enforcement is nothing close to military intelligence in terms of competence!

Seriously, there should be a game show called ‘I’m a CIA Agent, get me out of here!’ in which the contestants gets dumped in the middle of nowhere (at night), do not know where the RV point is, and have no idea when the extraction team is going to come 🙂

And I really want to know who is behind all these allegations that I am a CIA Agent.

Clearly someone is pushing this stupid accusation. I don’t know whether it arose when I spoke about the CIA triad in Information Security but if so that is utterly pathetic.

People accuse me of being a spy and when I politely tell them that I am not they think I am lying (thanks to the Melbourne Fraudsters) and then treat me like I am selling secrets. I don’t know what is going on in Sri Lanka…

Actually I have been having heart problems for 6yrs and have better things to do with my time such as ‘trying to get better’ as well as legal cases against the Melbourne Fraudsters, than say ‘vodka martini, shaken not stirred’ 🙂

Conclusion

Unless a person is actually in this field, they have absolutely no clue. As can be seen both the retards above are asking me questions that someone has asked them to ask me.

Information that Wikileaks has is not another set of Podesta e-mails.

Yesterday I warned the good folks at the Serious Fraud Office not to investigate Halliburton.

Today I warn good folks everywhere to leave weaponised software well alone.

NOTHING TO SEE HERE, MOVE ALONG…

Alternative Pandora’s Box – safe to open

Pandoras-Box-200x200

Joseph S R de Saram CISSP FBCS MIEEE MIScT MINCOSE MACS Snr CP

Information Security Architect / Intelligence Analyst / Computer Scientist / Human Rights Activist / COMSEC / SIGINT / TSCM
RHODIUM GROUP
© 2017-2019 JSR DE SARAM