• About
  • Blog (Ext.)
  • Books
  • Contact
  • Education Resources
  • News Links

PERRIN LOVETT

~ Deo Vindice

PERRIN LOVETT

Tag Archives: computers

Cometh the Lobotomy Bots

26 Wednesday Apr 2017

Posted by perrinlovett in News and Notes

≈ Comments Off on Cometh the Lobotomy Bots

Tags

computers, future, stupid

A near future generation of super-duper computers may (will) have the ability to not only read your thoughts and memories, but potentially delete them.

However, such devices are open to abuse on a frightening degree, as the academics made clear.

They warned that “malicious brain-hacking” and “hazardous uses of medical neurotechnology” could require a redefinition of the idea of mental integrity.

This technology represents a whole new level of “right think”. And it could have horrifying potential as a WMD, potential “wiping” brains clean like hard drives. No thoughts at all. The good news is that scientists figure most modern Americans literally have nothing to lose…

the-idiot-box-how-tv-is-turning-us-all-into-zombies

Blog Day Afternoon.

It’s Not Just the CIA Spying Everywhere

12 Sunday Mar 2017

Posted by perrinlovett in Legal/Political Columns

≈ Comments Off on It’s Not Just the CIA Spying Everywhere

Tags

computers, Constitution, FBI, Geek Squad, spying

There’s nothing like a Big Box in bed with the police state.

Recently unsealed records reveal a much more extensive secret relationship than previously known between the FBI and Best Buy’s Geek Squad, including evidence the agency trained company technicians on law-enforcement operational tactics, shared lists of targeted citizens and, to covertly increase surveillance of the public, encouraged searches of computers even when unrelated to a customer’s request for repairs.

To sidestep the U.S. Constitution’s prohibition against warrantless invasions of private property, federal prosecutors and FBI officials have argued that Geek Squad employees accidentally find and report, for example, potential child pornography on customers’ computers without any prodding by the government. Assistant United States Attorney M. Anthony Brown last year labeled allegations of a hidden partnership as “wild speculation.” But more than a dozen summaries of FBI memoranda filed inside Orange County’s Ronald Reagan Federal Courthouse this month in USA v. Mark Rettenmaier contradict the official line.

…

But evidence demonstrates company employees routinely snooped for the agency, contemplated “writing a software program” specifically to aid the FBI in rifling through its customers’ computers without probable cause for any crime that had been committed, and were “under the direction and control of the FBI.”

A $500 incentive to rifle through customer files. No PC. No warrant. No suspicion of a crime. Probably no need to look at data files either in most cases.

Given the cash promised, and the abandonment of the Constitution and the rule of law, who’s to say Geek Squad didn’t plant some evidence where and when they couldn’t find it.

Corrupt-FBI-Geek-Squad-Illegal-Warrantless-Searches-Customer-Computers.png

US Backlash.

Under no circumstances should one take a device to these Stasi hacks. Probably best not to do business with Best Buy at all. The Big Box of Entrapment.

Secrets of the Secret Squirrels: Hacking, Tracking, Spying, Plotting, and Planning

07 Tuesday Mar 2017

Posted by perrinlovett in Legal/Political Columns, News and Notes

≈ 2 Comments

Tags

America, CIA, computers, government, spying, technology, Wikileaks

Wikileaks dropped a Daisy Cutter on U.S. Intelligence today with the release of “Vault 7” – thousands of documents on and from the CIA.

Read more at:

The Independent; and

The Mirror.

logo

Wiki / CIA.

CLICK HERE TO ENTER VAULT 7

The amount of material is vast. Here is some of Wiki’s analysis:

CIA malware targets iPhone, Android, smart TVs
CIA malware and hacking tools are built by EDG (Engineering Development Group), a software development group within CCI (Center for Cyber Intelligence), a department belonging to the CIA’s DDI (Directorate for Digital Innovation). The DDI is one of the five major directorates of the CIA (see this organizational chart of the CIA for more details).

The EDG is responsible for the development, testing and operational support of all backdoors, exploits, malicious payloads, trojans, viruses and any other kind of malware used by the CIA in its covert operations world-wide.

The increasing sophistication of surveillance techniques has drawn comparisons with George Orwell’s 1984, but “Weeping Angel”, developed by the CIA’s Embedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones, is surely its most emblematic realization.

The attack against Samsung smart TVs was developed in cooperation with the United Kingdom’s MI5/BTSS. After infestation, Weeping Angel places the target TV in a ‘Fake-Off’ mode, so that the owner falsely believes the TV is off when it is on. In ‘Fake-Off’ mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server.

This is worse than 1984 because it is real and because Orwell’s world didn’t have smartphones. Use of these devices guarantees some level (usually high) of tracking, prying, and manipulation. And this is what Wiki has disclosed upfront and what they know about. More and more consumer devices – from TVs to HVACs to garage remotes to security systems to refrigerators to watches – are connected and, thus, open to hacking. Wiki goes on:

As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks. The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.

Your smart, bescreened, talking, sensing, feeling, modern car with the touchscreen, navigation, wi-fi, Bluetooth, cameras, little birds flying around, and all that other garbage that has nothing to do with driving. All of it is vulnerable. And this is nothing new. Shortly after October 2014 I started sounding that alarm.

Actually none of this is new. People have been tapping in and spying since the days of the telegraph. The public was aware (or should have been aware) of the government’s massive, global electronic surveillance apparatus back in the 1990s. Technology has grown since then. The system has grown with it. Assume that any and all electronic browsing, communicating, or other work you do is being monitored and recorded. Odds are, it is.

The CIA has also:

  • Targeted all operating systems;
  • Exploited all known vulnerabilities;
  • Worked with the communications/electronics/computer industry to stay one step ahead of everything;
  • Weaponized everything;
  • Opened the weaponization to mass international proliferation (by nations, companies, and hackers);
  • Spied on just about everyone; and
  • Developed systems to evade most forensics and anti-malware programs.

Much of the recent news about this stuff has centered on the NSA and the FBI, dire and grim outfits to be sure. But the CIA is different. They collect information like no one else. And they act on it. Sometimes lethally. Usually clandestinely. And almost always with deniability or immunity. No one, even in Congress, knows exactly what they do nor how much money they spend. America’s secret police and perhaps her most dangerous agency.

Now, just as the FBI is the big domestic intel agency, the CIA is generally for foreign affairs. By law and operation they are not supposed to target Americans in America (outside the borders, you’re on your own). Not supposed to. Just like you were supposed to keep your doctor you liked under the ACA, with the low prices too. Saddam was supposed to have WMD. Income tax withholding is supposed to go away once Hitler surrenders. Supposed to. Got that?

Just for fun, Google “MK Ultra”. Loads of fun – and still bearing fruit.

Supposed to.

We’re also supposed to have a curious press and diligent academics to look into things like these leaks. Wiki actively encourages that:

WikiLeaks has intentionally not written up hundreds of impactful stories to encourage others to find them and so create expertise in the area for subsequent parts in the series. They’re there. Look. Those who demonstrate journalistic excellence may be considered for early access to future parts.

…

There are very considerably more stories than there are journalists or academics who are in a position to write them.

So start digging and researching. You might get famous for it. You might also want to unplug the TV and remove it from the house.

More Computer Problems

28 Tuesday Feb 2017

Posted by perrinlovett in Other Columns

≈ 1 Comment

Tags

computers, evil

Computers are the problem.

I long ago came to the conclusion that computers and related machines are evil beings sent from Hell to annoy us. And I say: “back to Hell with them!” All of it sucks – Apple, Chrome, IBM – all of it. Slow, weak, worthless. It all fails reliably on a daily basis (the only reliability). A 100-year-old typewriter runs rings around this “modern technology”.

Today’s affirmation comes courtesy of ScriveCast, the iOS app development app: pure, unadulterated, useless shit.

Thank you for indulging this luddite’s rant. Where’s my framing hammer?

0421031-23

Computer Problems

27 Monday Feb 2017

Posted by perrinlovett in News and Notes

≈ Comments Off on Computer Problems

Tags

blog, computers, writing

Writing for a living means computer use, like it or not. (I really do not..).

Today we upgraded the server service at FP.com – faster and more reliable! Just as soon as the bugs are worked out… One doesn’t find the bugs until after the fact. Aggravating to say the least. The site has plowed through the rankings – doubling traffic in less than six months. There’s that.

Maybe it’s just me but the old internet seems to be running painfully slow lately. Al Gore needs to upgrade his invention.

Then there’s my little laptop. She’s closing in on a year old and maybe starting to show her age. Some of the keys stick and the mouse control ain’t what it was. Could be cigar smoke residue or pollen (early spring). Hmm.

Finally there’s the fact that the machines are getting smarter by the day, approaching the point of consciousness. Fun for all, that will be.

I’m trying to think of some solutions. Here’s what I’ve got so far:

0421031-23

Georgia / DHS Hack Attack: Could Have Been Br’er Fox

10 Saturday Dec 2016

Posted by perrinlovett in Legal/Political Columns

≈ 1 Comment

Tags

computers, crime, DHS, Georgia, Ron Paul, terrorism

The news snuck up and bit me whilst I Christmas shopped.

The other day I mentioned the DHS attempted breach of the Georgia Secretary of State’s computer system. I said it was interesting. And the interest grows.

DHS, I read somewhere, initially issued a blanket denial. There were some potentially plausible explanations for the intrusion. But the denial didn’t really set off any alarms. Agencies blanket deny just about everything up front. If it goes away, good for them. If not, then they come up with some line of reasoning. Here’s the interesting part:

The feds have come up with two plausible explanations and they have done so rapidly. One is that some nefarious third-party hacker “mirrored” their IP address to launch a covert attack. I’ve heard of things like that. It makes sense.

However, they seem to put more emphasis on the second theory: hacking by a rogue DHS agent. That they’ve admitted this is even a possibility means they either knew something beforehand or they were concerned about a mole. Who could this rogue be?

I know government employees get bored. But no-one will be so bored as to resort to trying to break into another government computer system. There’s gambling, and porn, and Facebook if things get that bad. Only a lunatic would want to sneak a peek at any SOS site. That, or someone with a criminal agenda – and really good cover. Again, who?

CNN, the WaPo, and the DNC are blaming the Russians for everything under the sun right now. Could it have been Moscow? Maybe. But not likely. I would first suspect corporate espionage before the Russians. Brian Kemp’s site has a lot of company and professional data as he mentioned in his letter to Jeh Johnson. Still, that doesn’t seem plausible either.

More so than business information, the site hosts tons of personal citizen data. I would lean towards an attempted identity theft ring. Those things are out there and they sometimes pay odd people – even trusted government security types – to steal raw data for them. It’s possible. Yet, something else keeps hinting away in my brain. Who else would want a lot of private information about where Georgians live and so forth?

Br’er Mohamed? The jihadis are working overtime trying to attack the West. And they seem to specialize in new and innovative approaches. Often, 7th century slander aside, they go the sophisticated, high-tech route. We know they’ve done data mining before. They’ve published “hit lists” of thousands of names, backed up by detailed information.

A computer screenshot shows the U.S. Central Command Twitter feed after it was apparently hacked by people claiming to be Islamic State sympathizers

They’ve done major government site hacking before. Newsweek / ISIS / Twitter.

A successful breach – and this one failed (as far as we’re told) – would have yielded over 6 million identities. That’s a lot to work through. But, whatever else the terrorists are, they are industrious. They could have started building a super list. Maybe a list for targeted assassinations? Who knows. It might not even be them.

DHS and Georgia are both investigating. If it was indeed a third-party, we will likely never know the identity. Hackers are superb at hiding. If it was a rogue, they’ll find him. Unless he flees the country. And, then, where he flees might shed light on his motives. Saudi Arabia? Yemen? Pakistan?

All of this is developing, of course. Perhaps the most alarming aspect is that, whatever this was and however it happened, it came from the very federal agency which was allegedly custom crafted a few years ago to fight just this sort of activity. Fight it, not foment it. There was a reason Ron Paul called publicly for abolishing DHS. Remember that?

Ah, well – a mystery…

Br’re Bear vs. Br’er Wolf

09 Friday Dec 2016

Posted by perrinlovett in Legal/Political Columns

≈ 1 Comment

Tags

America, computers, crime, Georgia, government

Just after last month’s election the State of Georgia detected a cyber-attack on the Secretary of State’s computer system. This is the same system that maintains voter records and corporate information.

The attack came from the criminal organization known as the federal Department of Homeland Security.

Brian Kemp, Georgia’s Secretary of State sent a letter to Jeh Johnson of DHS demanding to know why the feds attempted the break in. He also pointed out that this attempt amounts to a felony under 18 U.S.C. 1030. Or, it would if attempted by anyone else.

nimbus-image-1481303768813

It’s interesting that the department nominally created to protect the homeland instead chooses to attack individual states. By the way, their attempted penetration failed – thus confirming this was a government operation.

The Devil’s In The Details: Pokemon Craze

30 Saturday Jul 2016

Posted by perrinlovett in News and Notes, Other Columns

≈ 2 Comments

Tags

business, computers, Pokemon, security, software

Yesterday I had the opportunity to sit in for a little while and attend an e-conference on cyber-security and Pokemon. This was put on for the benefit of large businesses and organizations which have something to lose to the game – many things actually. I was astounded.

I see people playing the game everywhere. To think it just got started a week or so back. People are having fun but there is cause for concern. Many businesses are using their exposure to the game (unwittingly hosting Pokestops) as free advertising. Outwardly they welcome players and tout themselves as hip. Inwardly, many of these exact same companies are worried. They have good cause.

hacker-cartoon

blackappleintl.com.

Pokemon Go was designed to work very well on both Apple and Android devices. Part of its universal success is the way it utilizes most of a phone’s features. Depending on one’s device, the game and its makers may have root access to up to 60-70% of the device’s systems. Root access means the game can, theoretically, manipulate and control most of the phone. It probably has easy backdoor access to the rest.

The odds are those who made the game are not interested in maliciously accessing or misusing a player’s phone – that would be very bad for business. When it was pointed out to them that they had such unprecedented control, they admitted to overkill in their software design. They wanted the game to run smoothly and it does because it is so powerful as an app. Players give them the right to that access and potential control – it’s in the terms in the app agreement people click without reading. People willingly give Pokemon a level of access to their digital lives that the FBI has been unable to obtain with Court orders.

This presents several problems for businesses. First, people are using company phones and devices to play the game. That means they are signing over access to and control of cloud information which might otherwise be privileged. It also means they are probably playing on company time.

Remember, Pokemon itself is not likely to misuse the information it is privy to. However, this breach of security is a hacker’s dream. Experts suggest it would be very easy to hack the app and upload a variety of malware or ransom-ware or to simply clone the device or steal information.

Big business is now spending big money to combat this threat that didn’t even exist a month ago. They are also concerned that a host of similar knock-off apps are coming to ride the wave of Poke-success. A Harry Potter app is likely in the works right now. Success upon success.

Ordinary people would be wise to assess how all of them might affect them. A hacker could backdoor his way into one’s iPhone and essentially lock down the best features until the owner paid a fee for restoration.

There are other and more common problems with the game too. It has already been reported that people are trespassing while in search of the little … whatever they ares. People are winding up in places, some of them sensitive (power grid, etc.) where they probably don’t need to be. People are getting lost. They falling and injuring themselves. They are causing traffic accidents.

All of these things should be cause for second-guessing the utility of the game. I would suggest playing (if one must) on a throw-away device – a Trackfone or something similar – something disconnected entirely from one’s other accounts and business. Pokemon spotters might be a good idea to keep players from falling down old wells. People probably shouldn’t play on company time or while driving automobiles. As with most things, a little common sense goes a long way.

Hack Attack

26 Sunday Jul 2015

Posted by perrinlovett in News and Notes

≈ Comments Off on Hack Attack

Tags

cars, computers, hacking, Jeep

You love your new car. Navigation, Bluetooth, satellite radio – its the best of everything on wheels. It’s also wide open for remote hacking. I’ve warned about this all year.

The issue is back in the news following a deliberate hacking and takeover of a new Jeep – here and here.

IMG_0724-582x437

Wired.

No one warns like the automotive master, Eric Peters: Eric on the Jeep hack.

First they hacked the Google car. Now, it appears, they – “they” being hackers – could, in principle at least, take over half-a-million Jeeps (and other Fiat-Chrysler vehicles) equipped with in-car WiFi.

They’ve already done so in fact with one.

Chrysler says they have a fix and have issued a recall notice. Don’t drive a Jeep? Happy motoring.

Flyin’ N Spyin’

17 Sunday May 2015

Posted by perrinlovett in News and Notes

≈ Comments Off on Flyin’ N Spyin’

Tags

911, airliners, cars, computers, government, hacking, nerds, terror, TSA

A little while back I did a popular series on the electronic dangers lurking inside your new automobile.  I started with a post on a 60 Minutes segment on auto computers and their susceptibility to hacking.  I expounded thereon once Senator Ed Markey of Massachusetts released a damning report on the vulnerability and the complete lack of defense provided by auto manufacturers.  The Markey Report is worth a read.

Next I sounded the alarm on the Federal government’s efforts to track you via computers – even in your car.  I noted some might welcome the intrusion – for the children and such.  If these nuts fly commercial in addition to driving, then they will be further elated.  News comes that a disgruntled techie was able to hack into the controls of an airliner and temporarily take over the flight.

The malicious nerd:

hacked the in-flight entertainment system, or IFE, on an airplane and overwrote code on the plane’s Thrust Management Computer while aboard the flight. He was able to issue a climb command and make the plane briefly change course, the document states.

“He stated that he thereby caused one of the airplane engines to climb resulting in a lateral or sideways movement of the plane during one of these flights…

Just so you know, you are now at risk on the road and in the sky.  I’m sure the TSA is hard at work on a remedy.  Maybe passengers will be barred from bringing any electronic devices aboard.  Maybe they’ll have to fly naked.  At any rate, the problem will still exist, but with a host of new issues to accompany.

Things are out of hand.  In the good old days it took a couple of thugs armed with box-cutters to destroy an airplane.  Now, any dork with a smart phone can do the job.

← Older posts
Newer posts →

Perrin Lovett

From Green Altar Books, an imprint of Shotwell Publishing

From Green Altar Books, an imprint of Shotwell Publishing

Perrin Lovett at:

Perrin on Geopolitical Affairs:

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • June 2017
  • May 2017
  • April 2017
  • March 2017
  • February 2017
  • January 2017
  • December 2016
  • November 2016
  • October 2016
  • September 2016
  • August 2016
  • July 2016
  • June 2016
  • May 2016
  • April 2016
  • March 2016
  • February 2016
  • January 2016
  • December 2015
  • November 2015
  • October 2015
  • September 2015
  • August 2015
  • July 2015
  • June 2015
  • May 2015
  • April 2015
  • March 2015
  • February 2015
  • January 2015
  • July 2014
  • June 2014
  • September 2013
  • August 2013
  • July 2013
  • June 2013
  • May 2013
  • April 2013
  • March 2013
  • February 2013
  • June 2012

Prepper Post News Podcast by Freedom Prepper (sadly concluded, but still archived!)

Blog at WordPress.com.

  • Subscribe Subscribed
    • PERRIN LOVETT
    • Join 42 other subscribers
    • Already have a WordPress.com account? Log in now.
    • PERRIN LOVETT
    • Subscribe Subscribed
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar
 

Loading Comments...
 

You must be logged in to post a comment.