Archive for Conspiracy & Espionage

“God Mode” Backdoor

Some x86 CPUs have hidden backdoors that let you seize root by sending a command to an undocumented RISC core that manages the main CPU, security researcher Christopher Domas told the Black Hat conference here Thursday (Aug. 9).

The command — “.byte 0x0f, 0x3f” in Linux — “isn’t supposed to exist, doesn’t have a name, and gives you root right away,” Domas said, adding that he calls it “God Mode.”

The backdoor completely breaks the protection-ring model of operating-system security, in which the OS kernel runs in ring 0, device drivers run in rings 1 and 2, and user applications and interfaces (“userland”) run in ring 3, furthest from the kernel and with the least privileges. To put it simply, Domas’ God Mode takes you from the outermost to the innermost ring in four bytes.

“We have direct ring 3 to ring 0 hardware privilege escalation,” Domas said. “This has never been done.”

That’s because of the hidden RISC chip, which lives so far down on the bare metal that Domas half-joked that it ought to be thought of as a new, deeper ring of privilege, following the theory that hypervisors and chip-management systems can be considered ring -1 or ring -2.

“This is really ring -4,” he said. “It’s a secret, co-located core buried alongside the x86 chip. It has unrestricted access to the x86.”

The good news is that, as far as Domas knows, this backdoor exists only on VIA C3 Nehemiah chips made in 2003 and used in embedded systems and thin clients. The bad news is that it’s entirely possible that such hidden backdoors exist on many other chipsets.

Full read here.

https://github.com/xoreaxeaxeax/rosenbridge

More fuzzing:

https://github.com/xoreaxeaxeax/sandsifter

Breaking the x86 ISA

Fuzzing on Edison

Notes on Intel microcode

Drones, drones, drones. Our new overlords?

NASA is pursuing a program that integrates unmanned aircraft systems (UAS) into the National Airspace System, or UAS-NAS. This involves identifying, developing, and testing the technologies and procedures that will make it possible for UAS to have routine access to airspace occupied by human-piloted aircraft.

Four NASA centers support the UAS-NAS project: NASA’s Ames Research Center and Armstrong Flight Research Center in California, Langley Research Center in Virginia, and Glenn Research Center in Ohio.

The UAS-NAS project is within the Integrated Aviation Systems Research Program, managed by NASA’s Aeronautics Research Mission Directorate at NASA Headquarters in Washington, D.C.

The project uses modeling, simulations, and flight tests to develop and test technologies that provide safe, effective, secure capabilities including detect and avoid (DAA) and command and control (C2).

Read further here.

ADELPHI, Md. – U.S. Army unmanned weapons experts are negotiating with Lockheed Martin Corp. to develop high-power microwave (HPM) weapons payloads to enable new generations of unmanned aerial vehicles (UAVs) to destroy or disable enemy drones.

Officials of the Adelphi contracting division of the Army Contracting Command at Aberdeen Proving Ground, Md., announced plans Friday to negotiate sole-source with the Lockheed Martin Missiles and Fire Control division in Grand Prairie, Texas, on an HPM UAV weapons project.

Lockheed Martin engineers will develop high-powered-microwave airborne counter unmanned aircraft systems (CUAS), including the necessary development, integration, and support necessary to field HPM weapons-equipped UAVs.

Specifically, Army leaders want Lockheed Martin to develop HPM weapons and other kinds of UAV payloads able to disable or destroy adversary UAVs. Weapons payloads for UAVs that are under consideration include explosives, nets, entanglers, streamers, and high-powered-microwave systems.

High-power microwaves represent a class of non-lethal weapons designed to destroy or disable enemy electronic systems with jolts of powerful electrical energy. It can fry electronics in much the same way as the electromagnetic pulse (EMP) from a nuclear detonation can disrupt electronics.

Full article here.

WASHINGTON – Some of the most iconic weapons of the past 17 years of war are quickly becoming a relic of the past, top Air Force officials say. Breaking Defense reports. Continue reading original article

The Military & Aerospace Electronics take:

6 Aug. 2018 — The Air Force is rushing toward a mix of almost-ready and yet-to-be-developed technologies, including artificial intelligence (AI), cloud computing, hypersonics, drone swarms, and clouds of tiny cubesats capable of sucking up data and beaming it back down to operators the ground in real time.

After running red team exercises looking at what some of the biggest future challenges might be for the Air Force, leaders concluded that the Predator and Global Hawk unmanned aerial vehicles (UAVs) of today are not far away from becoming mere museum pieces.

Not only does the Air Force want to get its people away from staring at computer screens to recognize, interpret, and identify what they’re seeing, but also seeks to develop processing and exploitation at the sensor. [from M&AE]

‘The nail in the coffin’: Russia’s top cyber-firm may have made a ‘catastrophic’ mistake

Investigators believe that software from Russia’s top cybersecurity firm, Kaspersky Lab, was involved in a theft of top secret National Security Agency intelligence outlining how the US hacks its adversaries, The Wall Street Journal reported Thursday.

And depending on what was stolen, the breach could spell catastrophe for the company.

According to the Journal, an NSA contractor stole and downloaded onto his personal computer highly classified details about how the US penetrates foreign computer networks and defends itself against cyberattacks. (The Washington Post reported the person was not a contractor, but an employee working for the NSA’s elite hacking division known as Tailored Access Operations.)

Russian hackers then stole that intelligence by exploiting the Kaspersky antivirus software the contractor had been running on his computer.

The breach wasn’t discovered until spring 2016, according to the Journal and The Washington Post — nearly one year after the hackers are believed to have gained access to the intelligence.

Kaspersky has denied any involvement in the theft, and it is unclear whether the hackers stole code or documents from the contractor. The latter would prove far more damning for Kaspersky, experts say, especially as it stands accused by the US government of being a tool of the Kremlin.

“Ultimately, this will come down to what was stolen from the computer,” said David Kennedy, a former NSA intelligence analyst who founded the cybersecurity firm TrustedSec.

Source: http://www.msn.com/en-us/money/companies/the-nail-in-the-coffin-russias-top-cyber-firm-may-have-made-a-catastrophic-mistake/ar-AAsZZZY

The wizard war in orbit: Early American signals intelligence satellites

Tales of espionage are filled with lanky men in trenchcoats walking through cold Berlin streets at the height of the Cold War. But the most important intelligence—in terms of volume and reliability—was gathered by reconnaissance satellites far overhead. These satellites were precise, they collected vast amounts of information, and unlike spies, they did not forget, embellish, lie, or go rogue. Photographic reconnaissance satellites like CORONA, GAMBIT, HEXAGON, and KENNEN were in many ways the most prolific spooks. But they were also accompanied by other satellites, signals intelligence, or SIGINT, satellites that listened for the electronic whispers of radars and radios, engaged in a high-tech war of electrons against an enemy that could vanish and emerge at will.

During the Cold War the United States intelligence community gathered signals intelligence from the Soviet Union via a variety of means. These included ground stations, cable-tapping and bugging operations, airborne platforms such as the RC-135 Rivet Joint and RB-47 Stratojet, and signals intelligence satellites. Any history of SIGINT satellite operations during the Cold War is going to be limited in scope because much of the story remains classified, and unlike the reconnaissance photographs, signals intelligence is an arcane and esoteric subject.

Read in full: The Space Review: The wizard war in orbit (part 1): Early American signals intelligence satellites

Also:

The wizard war in orbit (part 2): Black black boxes

The wizard war in orbit (part 3): SIGINT satellites go to war

The wizard war in orbit (part 4): P-11, FARRAH, RAQUEL, DRACULA, and KAL-007

US military’s mysterious X-37B space plane passes 500 days in orbit, but what is its mission objective?

For just over 500 days, the US Air Force’s mysterious X-37B OTV-3 robotic space plane has been casually orbiting the Earth. X-37B looks like the Space Shuttle, and launches into space on the back of a rocket like the Shuttle, but it’s actually fairly small at just under nine meters (30 feet) in length. What’s truly weird, though, is that I’ve now told you everything that we officially know about the X-37B — its payload, current mission, and combat capabilities are completely unknown. X-37B OTV-3, one of the world’s largest artificial satellites, has been up there for 500 days, shows no sign of coming down any time soon, and we have no idea what it’s doing or what it can do.

The X-37 started life way back in 1999 when NASA asked Boeing’s Phantom Works division to develop an orbital test vehicle (OTV). The X-37 was originally conceived as an unmanned, robotic spacecraft that would rendezvous with satellites to refuel or repair them — but in 2004 the project was transferred to DARPA and it has been highly classified ever since. Starting in 2010, the US Air Force has launched two X-37B spacecraft on three missions (OTV-1, OTV-2, and OTV-3), perched atop an Atlas V rocket. The photo above, of OTV-2′s landing in 2012, is one of only a handful of photos that are publicly available of the vehicle. All three missions have spent a long time in space (220+ days), with OTV-3 now having spent over 500 days in low-Earth orbit (LEO).

via US military’s mysterious X-37B space plane passes 500 days in orbit, but we still have no clue what it’s actually doing up there | ExtremeTech.

World Bank Revolving Door of Corruption

World Bank conspiracies of massive corruption are discussed with under-fire whistleblower Karen Hudes. She discusses how she has been charged with trespassing from Eric Holder, and how the executive directors of the World Bank were blackmailed in a prostitution scandal from the same bordello Eliot Spitzer frequented.

via World Bank Revolving Door of Corruption | The Daily Sheeple.

BLACK PROJECTS : FOLLOW THE MONEY

The Truth Behind the Matrix

Note: the following report was written to accompany White Hat Report #48 which has as of this date been delayed and may possibly never see the light of day due to either quiet coercion behind the scenes or outright threats to the life of certain members of the group known as “The White Hats” who publish reports on a fairly regular basis revealing financial corruption at the highest levels of government specifically in the U.S. but also involving other world powers and players. I have therefore decided to release my portion of the report without #48 so that the truth may at least be told with regard to what lies behind that report. For more information about #48 please see (the recent update from the White Hats) and the following transcript and audio from my recent radio show conversation with “Tman of the White Hats” concerning this report.

***Update:

http://tdarkcabal.blogspot.com/2012/11/november-6-2012-white-hats-statement.html

On Tuesday, November 6, 2012 The White Hats released the above statement (see link above)…

****

Project Camelot and many other individuals and researchers have been investigating the range and depth of this vast conspiracy underground, beneath the perception of the masses i.e. the reality beneath the Matrix for many years. As most readers will know, the concept of the Matrix (the surface fabrication of our reality) is known and was popularized by the movie of the same name. This, now, is common knowledge. Taking the red pill or the blue pill is ultimately what you do when you read this report or should you decide you aren’t interested in waking up to the reality of what is going on under your feet (literally) and prefer to go back to sleep. So this is the choice you have.

The Secret Space Program

The trail of the Octopus, also known as the Shadow Government can be detected by following the money. PUREHEART INVESTMENTS is the top tier of a network of front companies and trading programs that result in vast sums of money being earned. Money earned on money. The White Hats have followed the money and that rabbit hole ultimately leads to BLACK PROJECTS. Black Projects are called “black” because they are hidden, that is, in the dark. These projects are part of a clandestine network run by the Shadow Government also known as The Secret Space Program.

As a recent Project Camelot witness, physicist and author, Richard Alan Miller, said so succinctly to the audience at his latest workshop, “There are two human civilizations on Earth. One that has space travel and one that does not.” The ones that do, are part of a vast network going off-world and into Space called for simplicity’s sake “the secret space program”.

Rhodes scholar finalist and historian Rich Dolan calls this a “rogue civilization” and in fact that is exactly what it is, what it has become. Regardless of how it started out. In Volume II of his highly regarded and substantial history UFOs AND THE NATIONAL SECURITY STATE, Rich writes, …”Six decades of classified expenditures (and other forms of secret spending) have provided ample resources to apply principles and technologies that have remained sealed off from the rest of humanity. This development alone is enough to justify the greatest secrecy.”

What has become evident is that The Secret or Shadow Government established the Secret Space Program and Black Projects by virtue of having access primarily to two important advantages, backed by the might of the military industrial complex: money and ET technology.

A Word About the History of ET Technology Acquisition

It is known that Tesla was himself, was aware that he was ‘in contact’ with an unknown race of off-planet beings who downloaded to him the key concepts behind certain technology. In describing the history of our interaction with off-world (and inter/intra dimensional races and the acquisition of special technologies, you can, for example, go back to the days of Eisenhower and his famed meeting with at least 2 groups of ETs (Greys and Nordics) at Muroch Air Force Base (now known as Edwards Air Force Base). However, that is just one of many places to start. From all indications, …”we are not alone and we have never been alone”, to quote Command Sergeant Robert O. Dean, a whistleblower who violated his security oath in order to inform the people regarding the truth behind the reality of ET visitation.

Another logical place (well documented by scholars and researchers such as Jim Marrs (THE FOURTH REICH) and Joseph Farrell, (author of SAUCERS, SWASTIKAS AND PSYOPS: A History of A Breakaway Civilization: Hidden Aerospace Technologies and Psychological Operations), is to go back to the days of the Nazis and the establishment of the German high command. They made contact with a race of ETs through the Vril Society (a small group of women who were “channeling”). The Nazis are also said to have conducted careful research into the flying saucers of India called Vimanas (chronicled in the great writings such as the Upanishads etc). They are also known to have confiscated and horded hidden archeological records and relics of inestimable value for scientific study… Because of this, Nazis made huge leaps forward into technologies involving space and time travel. (see the Nazi Bell and Camelot interview with Igor Witkowsky).

via BLACK PROJECTS : FOLLOW THE MONEY – Project Camelot.

Who Killed Aaron Swartz?

On January 11, 2013, according to indoctrination organs of the criminal Syndicate calling itself the US government (a Syndicate comprised, for the most part, of big bankers, generals, spooks and, below them, their puppets in the White House and gubernatorial mansions, Congress and state legislatures, and almost the entire judiciary), Aaron Swartz, aged 26, killed himself.

Many on the internet have already traced Aaron’s tragic and untimely death directly to the Syndicate. I wish to add my voice to this growing chorus, placing this recent event in a somewhat larger context of historical scholarship.

In relating this story, the Syndicate’s propaganda organs conveniently forgot four crucial points:

1. The Syndicate had excellent reasons to wish Aaron dead.

2. As in most cases of covert Syndicate assassinations (e.g., Fred Hampton, Richard Wright, Ernest Hemingway), Aaron’s death was preceded by a vicious, totally unjustified, campaign of surveillance, harassment, vilification, and intimidation.

3. The Central Institute of Assassinations (CIA) and the Federal Bureau of Intimidations (FBI) can and do kill people while making the murder look like suicide.

4. In America, England, and most other countries, painstaking research by people like Kevin Barett, Jim Douglass, Jim Fetzer, Jim Garrison, David Helvarg, and William F. Pepper discloses an unmistakable pattern: influential friends of the people (and hence, enemies of the Syndicate) tend to die before they reach old age, often under bizarre circumstances. This pattern has an obvious corollary: when friends of the Syndicate dies prematurely, we can reasonably assume, with a high degree of probability, that the Syndicate killed them.

1. The Syndicate had excellent reasons to kill Aaron Swartz

In an online “manifesto” dated 2008, Aaron wrote: Information is power. But like all power, there are those who want to keep it for themselves.” He dedicated his life precisely to the goal of depriving the Syndicate of this power.

According to Wikipedia,

Swartz co-authored the “RSS 1.0″ specification of RSS, and built the website framework web.py and the architecture for the Open Library. Swartz also focused on sociology, civic awareness and activism.

“Swartz’s Web savvy took him from Internet entrepreneur to online activist, co-founding Demand Progress, a group that campaigns for progressive public policy — in particular fighting against Internet censorship. His crusades boosted his status as something of a folk hero.” Demand Progress had over one million members.

This figure of 1,000,000 is extremely important, for it shows, beyond all doubt, that, like John Lennon and President Kennedy, Aaron posed a real threat to the status quo. This threat is acknowledged by the Syndicate’s own indoctrination organs. For instance, National Propaganda Radio put it thus:

“Swartz had an enormous following in the technology world” and was one of the “most influential figures in talking about technology’s social, cultural and political effect.” The independent Electronic Frontier Foundation concurs: Swartz “did more than almost anyone to make the internet a thriving ecosystem for open knowledge, and to keep it that way.”

As well, Aaron spoke against US President Barack Obama’s “kill list” and cyber attacks against Iran.

Aaron was “a frequent television commentator and the author of numerous articles on a variety of topics, especially the corrupting influence of big money on institutions including nonprofits, the media, politics, and public opinion. From 2010-11, he researched these topics as a Fellow at the Harvard Ethics Center Lab on Institutional Corruption. He also served on the board of Change Congress, a good government nonprofit.”

More: http://redicecreations.com/article.php?id=23349

Boots on the ground: Obama’s cybersecurity directive could allow military deployment within the US

Boots on the ground: Obama’s cybersecurity directive could allow military deployment within the US — RT

Lawyers with the Electronic Privacy Information Center EPIC have filed a Freedom of Information Act FOIA request with the office of US President Barack Obama in hopes if hearing more about an elusive order signed in secrecy in mid-October but only made public in an article published this week in the Washington Post.

According to persons close to the White House who have seen the order and spoke with the Post, Presidential Policy Directive 20 PP20 aims to “finalize new rules of engagement that would guide commanders when and how the military can go outside government networks to prevent a cyberattack that could cause significant destruction or casualties.” Attorneys with EPIC are now demanding that they see this secret order to find out what exactly that could mean, citing the possibility of putting boots on the ground in the United States if the government argues it’s imperative for cybersecurity.

In the FOIA request, EPIC attorneys Amie Stepanovich and Ginger McCall ask to see information about PP20 because they fear it may enable “military deployment within the United States” by way of a “secret law” that lets the National Security Agency and Pentagon put armed forces in charge of protecting America’s cyberinfrastructure and crucial routes of communications.

“We don’t know what’s in this policy directive and we feel the American public has the right to know,” McCall tells Raw Story this week.

On her part, Stepanovich adds that getting to the truth of the matter could be a nightmare given the NSA’s tendency to keep these sorts of things secret.

“The NSA’s cyber security operations have been kept very, very secret, and because of that it has been impossible for the public to react to them,” Stepanovich adds. “ That makes it very difficult, we believe, for Congress to legislate in this area. It’s in the public’s best interest, from a knowledge perspective and from a legislative perspective, to be made aware of what authority the NSA is being given.”

The potential of martial law became a topic actually discussed by Congress last year when lawmakers first considered provisions for this year’s National Defense Authorization Act, or NDAA. Before the House and Senate agreed on including a section to the law letting the White House arrest and detain any US citizen indefinitely without trial or charge, another provision was almost put on the books that would have essentially allowed for military rule during some situations.

The NDAA’s S. 1867 would “basically say in law for the first time that the homeland is part of the battlefield” Sen. Lindsey Graham R-S.C. , a supporter of the bill, said last year.

via Boots on the ground: Obama’s cybersecurity directive could allow military deployment within the US — RT.