Welcome to DU! The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards. Join the community: Create a free account Support DU (and get rid of ads!): Become a Star Member Latest Breaking News General Discussion The DU Lounge All Forums Issue Forums Culture Forums Alliance Forums Region Forums Support Forums Help & Search

Cliff Arnebeck

(305 posts)
Fri Jun 28, 2013, 08:01 AM Jun 2013

How global corporations can hack anyone's computers for $2.5 million

Last edited Sat Jun 29, 2013, 12:50 PM - Edit history (1)

Yesterday, FreePress.org published a virtual treatise on how the USA became the base for computer hacking around the world--with the blessings, financial help, and even subscription of some elements of the U.S. Government. The principal author of the treatise, Jill Simpson, has been described by former Alabama Governor Don Siegelman as a modern Joan of Arc, for having successfully taken on Karl Rove at the pinnacle of his power in 2007.

It would seem from Ms. Simpson's article that hacking by government and global corporations is OK, but hacking by individuals, not among the elite 1% who can afford the $2.5 million access fee to "Endgame," is not. However, when the general public--the 99%--finds out about this situation with the help of the road map and pictures Ms. Simpson and her colleague have provided @ http://www.freepress.org/departments/display/20/2013/5044, the judgment of history on this matter may be at hand.

Update June 29, 2013: I just posted a diary at Daily Kos focusing upon Jill Simpson's call for President Obama to appoint a special prosecutor and for the U.S. Senate to launch an investigation of "Endgame." http://www.dailykos.com/story/2013/06/29/1219917/-Public-Integrity-Champion-Jill-Simpson-calls-for-Investigation-of-Endgame
This was from the conclusion of her article cited here.

32 replies = new reply since forum marked as read
Highlight: NoneDon't highlight anything 5 newestHighlight 5 most recent replies
How global corporations can hack anyone's computers for $2.5 million (Original Post) Cliff Arnebeck Jun 2013 OP
Link Blocked cantbeserious Jun 2013 #1
Works for me n/t Junkdrawer Jun 2013 #2
Flagged As Pornography On My Tablet cantbeserious Jun 2013 #3
I got through. lpbk2713 Jun 2013 #4
Possible interference with the story getting out Cliff Arnebeck Jun 2013 #9
I tried looking up 'freepress.org' on Google muriel_volestrangler Jun 2013 #24
Here's a direct link to March's video starroute Jun 2013 #20
Thanks for posting this & see more of Simpson's work @ ElectionProtectionAction.org Cliff Arnebeck Jun 2013 #23
Hi Cliff. Related Question: The amended FISA Act contains penalties for using NSA data.... Junkdrawer Jun 2013 #5
White hats and black hats Cliff Arnebeck Jun 2013 #7
Thanks. I believe that answers my question. Just to be sure... Junkdrawer Jun 2013 #10
Direct link to the .pdf here PoliticAverse Jun 2013 #6
No, they really can't Recursion Jun 2013 #8
Endgame's President, as a youth, hacked into the Pentagon's computers Cliff Arnebeck Jun 2013 #11
That was back when wardialers still connected directly to servers Recursion Jun 2013 #12
Endgame advises and the market pays handsomely for their advice Cliff Arnebeck Jun 2013 #15
Arthur Anderson was quite prosperous because of their advice too Recursion Jun 2013 #16
Agreement Cliff Arnebeck Jun 2013 #17
More seriously, as a computer security guy, I can think of a dozen companies like this Recursion Jun 2013 #18
I could totally envision some goobers with defense money to burn Romulus Quirinus Jun 2013 #19
You cannot hack a computer with no open ports, if it is not listening, or connected. bemildred Jun 2013 #13
Back doors built in to digital devices to permit surveillance and manipulation Cliff Arnebeck Jun 2013 #30
Back doors REQUIRE open ports. nt bemildred Jun 2013 #32
Thank you, Cliff Arnebeck! Octafish Jun 2013 #14
Thanks to you, Octafish! Cliff Arnebeck Jun 2013 #27
There seem to be some strange and powerful connections there starroute Jun 2013 #21
Yes, it's the intellectual Mecca for computer and election hacking Cliff Arnebeck Jun 2013 #22
Is the election fraud stuff converging with the surveillance stuff? starroute Jun 2013 #25
They are dead serious and want total information awareness as a means of achieving total control Cliff Arnebeck Jun 2013 #26
I believe the US Attorney scandal was about election manipulation. OnyxCollie Jun 2013 #31
Thanks, Cliff. elleng Jun 2013 #28
I have posted a diary @ Daily Kos of Jill's call for appointment by POTUS of Special Prosecutor Cliff Arnebeck Jun 2013 #29

Cliff Arnebeck

(305 posts)
9. Possible interference with the story getting out
Fri Jun 28, 2013, 09:31 AM
Jun 2013

Last edited Fri Jun 28, 2013, 10:20 AM - Edit history (1)

When Jim March was confronted by three or four Endgame security personnel outside the door of their Atlanta headquarters, he identified himself as a stringer for the Free Press that was doing a story on Endgame. It is quite possible there will be efforts to suppress this story, and Endgame has had several days to prepare such efforts. Endgame is on record as believing that they would be dead if the general public knew about them.

If this story goes viral, it would prove the the incredible power of the Internet!

muriel_volestrangler

(101,321 posts)
24. I tried looking up 'freepress.org' on Google
Fri Jun 28, 2013, 12:58 PM
Jun 2013

I get an expected 'top result' for the site, which looks normal:

The Free Press -- Independent News Media
www.freepress.org/?
Offers investigative news stories, commentary on social and political issues, an activist calendar, and links to more in-depth information.


But some of the subheadings under it look strange:

buying viagra in uk
In 2010, David Petraeus's four stars were ascendant. On his ...

India tadalafil
The Columbus Free Press is a progressive newspaper and ...


which might mean they've got problems keeping their site secure, and spammers have infiltrated it.

starroute

(12,977 posts)
20. Here's a direct link to March's video
Fri Jun 28, 2013, 10:58 AM
Jun 2013

I watched it last night by way of a link at reddit, but I didn't know the background story. This is fascinating -- and it's particularly interesting that Jill Simpson is surfacing again.



Cliff Arnebeck

(305 posts)
23. Thanks for posting this & see more of Simpson's work @ ElectionProtectionAction.org
Fri Jun 28, 2013, 12:52 PM
Jun 2013

Thanks for posting this. There is a lot of information in this video taken from outside the entryway to this secretive organization.

Jill Simpson is the top public integrity researcher in the world, in my opinion. You can see some of her other work at the ElectionProtectionAction.org WebSite.

Junkdrawer

(27,993 posts)
5. Hi Cliff. Related Question: The amended FISA Act contains penalties for using NSA data....
Fri Jun 28, 2013, 08:12 AM
Jun 2013

without a warrant, but, it seems, only "under color of law".

Is it then true that private entities may violate the law by accessing the data, but there are no penalties for doing so?

Cliff Arnebeck

(305 posts)
7. White hats and black hats
Fri Jun 28, 2013, 09:06 AM
Jun 2013

Endgame provides information about a target's computers and its points of vulnerability to hacking. The hacking, which is illegal unless done by the government pursuant to a warrant or extraordinary powers granted by the Patriot Act, is done by the subscriber to Endgame's services. It's illegal and punishable as a crime.

I think the "illegality" of a private person using NSA data relates to the the violation of that person's employment agreement or the subsequent use of that data with knowledge that it was illegally obtained.

When government is acting illegally, is it a crime for a government employee to disclose it and for a news organization to report it to the public? If done for the purpose of exposing criminality, then it would seem to be in the nature of civil disobedience for the sake of the public interest and investigative journalism under the protection of the First Amendment's guarantee of Freedom of the Press.

Junkdrawer

(27,993 posts)
10. Thanks. I believe that answers my question. Just to be sure...
Fri Jun 28, 2013, 09:51 AM
Jun 2013

An entity such as Booz Allen Hamilton may not be subject to the 'color of law' aspect of the Act, but would be criminally liable if they disclosed the information with knowledge that it was illegally obtained.

Remedies for violations

Both the subchapters covering physical searches and electronic surveillance provide for criminal and civil liability for violations of FISA.

Criminal sanctions follows violations of electronic surveillance by intentionally engaging in electronic surveillance under the color of law or through disclosing information known to have been obtained through unauthorized surveillance. The penalties for either act are fines up to US$10,000, up to five years in jail, or both.

In addition, the statute creates a cause of action for private individuals whose communications were unlawfully monitored. The statute permits actual damages of not less than $1,000 or $100 per day. In addition, that statute authorizes punitive damages and an award of attorney's fees.[18] Similar liability is found under the subchapter pertaining to physical searches. In both cases, the statute creates an affirmative defense for a law enforcement agent acting within their official duties and pursuant to a valid court order. Presumably, such a defense is not available to those operating exclusively under presidential authorization.

...

http://en.wikipedia.org/wiki/Foreign_Intelligence_Surveillance_Act


I guess the only wiggle room would be if the data were 'legally obtained'.

Recursion

(56,582 posts)
8. No, they really can't
Fri Jun 28, 2013, 09:15 AM
Jun 2013

And you can download the software they use for free.

http://www.metasploit.org
http://www.nmap.org

Two weeks ago I was hoping for rational discussion on DU about the limits of surveillance; at this point I'll be happy with basic fact-based acceptance of what is and isn't actually physically possible.

Cliff Arnebeck

(305 posts)
11. Endgame's President, as a youth, hacked into the Pentagon's computers
Fri Jun 28, 2013, 09:54 AM
Jun 2013

Endgame is run by the guy who initially came to the attention of the Pentagon by hacking into their computers.

I suggest you read the article before asserting that he cannot now advise how to hack other governments and people around the world.

Recursion

(56,582 posts)
12. That was back when wardialers still connected directly to servers
Fri Jun 28, 2013, 09:58 AM
Jun 2013

Even then, he couldn't "hack anyone's computer". All the less so today.

You asserted Endgame can "hack anyone's computer".

That is not just false, but laughably stupid. Maybe an edit to the title, so we can all be in the fact-based world again?

This sounds like a shady company that makes a lot of money by attacking computers. Why not let the actual bad be the story, rather than making up stuff that makes the entire thread ridiculous?

Cliff Arnebeck

(305 posts)
15. Endgame advises and the market pays handsomely for their advice
Fri Jun 28, 2013, 10:10 AM
Jun 2013

No, Endgame advises others, for a fee, how it can be done.

They are quite prosperous, so the market would suggest they give competent technical advice.

Recursion

(56,582 posts)
16. Arthur Anderson was quite prosperous because of their advice too
Fri Jun 28, 2013, 10:12 AM
Jun 2013

The 1% aren't exactly known for making smart decisions with their money.

Recursion

(56,582 posts)
18. More seriously, as a computer security guy, I can think of a dozen companies like this
Fri Jun 28, 2013, 10:24 AM
Jun 2013

They promise really big, and can from time to time compromise a given computer in a given network (but then again so can I, so can you with the software I mentioned upthread and a few weeks' prep time, and so can a few thousand fifteen year olds in their basements), but it's rarely wise to rely on what a business says about itself.

Romulus Quirinus

(524 posts)
19. I could totally envision some goobers with defense money to burn
Fri Jun 28, 2013, 10:37 AM
Jun 2013

paying 2.5 million for a reskinned/GUI-fied copy of metasploit. lol

bemildred

(90,061 posts)
13. You cannot hack a computer with no open ports, if it is not listening, or connected.
Fri Jun 28, 2013, 10:00 AM
Jun 2013

Or if the software that opens a port has no useable flaws. That is possible (unless it's Windows).

Cliff Arnebeck

(305 posts)
30. Back doors built in to digital devices to permit surveillance and manipulation
Sat Jun 29, 2013, 02:15 PM
Jun 2013

Please see Ms. Simpson's discussion of back doors created in the operating systems of digital devices to facilitate surveillance activity unbeknownst to users.

Cliff Arnebeck

(305 posts)
27. Thanks to you, Octafish!
Fri Jun 28, 2013, 05:52 PM
Jun 2013

Last edited Sat Jun 29, 2013, 05:02 AM - Edit history (1)

Thank you, Octafish, for your continued support.

I have passed this thread on to Bob Fitrakis and I can assure you we both appreciate your support, now and in the past.

Cliff

starroute

(12,977 posts)
21. There seem to be some strange and powerful connections there
Fri Jun 28, 2013, 11:31 AM
Jun 2013

Last edited Fri Jun 28, 2013, 12:44 PM - Edit history (1)

I'm reading through the pdf and got up to where it says of Endgame, "This company is a private spin-off from the major intelligence source X-Force that was founded originally by Chris Klaus whose career dates to at least 1994 when he founded Internet Security Systems, a private “white hat” counter-hacker group."

So i looked into Klaus a bit and found Wikipedia saying, "In recent years Klaus has become one of Georgia Tech's most visible contributors, giving a $15M naming gift to build the College of Computing's new home, the Klaus Advanced Computing Building. Klaus's wife, Crissy, is also a prominent figure through fifteen years of work in local marketing and real estate, as well as extensive work with non-profit organizations."

That really struck me because I'd just posted at another thread here -- one about Occupy trying to build a database of the real power relationships in the US -- to say that the people with the most actual power often stay out of politics and avoid publicity but you can sometimes identify them because they appear as local philanthropists who "are always endowing concert halls or getting college buildings named after them."

Klaus seems like an example of precisely that -- and it makes me wonder whether Georgia Tech and its College of Computing are playing a role in any of this.

Cliff Arnebeck

(305 posts)
22. Yes, it's the intellectual Mecca for computer and election hacking
Fri Jun 28, 2013, 12:39 PM
Jun 2013

Yes, Georgia Tech is the academic center for the study of election and computer hacking, as well the education of election professionals by Doug Lewis under the sponsorship of the electronic voting machine industry. SMARTech is based there, for which SmarTech of Chattanooga, TN is named. The later group is the computer and communications center for all of the Republican campaigns that rise to the level of being of interest to Karl Rove.

starroute

(12,977 posts)
25. Is the election fraud stuff converging with the surveillance stuff?
Fri Jun 28, 2013, 01:14 PM
Jun 2013

You're a long-time election integrity guy. Jill Simpson's name is most familiar from her allegations of election theft -- and SmarTech is part of that pattern as well. But this Endgame stuff seems more related to surveillance, the NSA, and the CIA. Do you see it as having implications for elections, as well, or are the connections on a deeper level?

The further I read in this pdf about Endgame, the more thoroughly spooked-up it seems. In-Q-Tel has been described as funding "startup companies whose technologies the CIA might someday want to buy." Or as it says on an old (and no longer available) In-Q-Tel "About" page, "Chartered in 1999 as a private, independent, nonprofit corporation, In-Q-Tel is an evolving blend of corporate strategic venture capital, business, nonprofit and government R&D models. To achieve its mission of identifying and delivering new technologies to the CIA and Intelligence Community (IC), In-Q-Tel borrows key elements from each model that enable it to link the IC to innovation in the commercial market, and back again."

Or this, from a 2005 Washington Post article (http://www.washingtonpost.com/wp-dyn/content/article/2005/08/14/AR2005081401108.html): "In the five years since it began active operations as the "venture capital arm" of the CIA, In-Q-Tel's reach and activities have become vast for so small an operation. It has invested in more than 75 companies and delivered more than 100 technologies to the CIA, most of which otherwise would never have been considered by the intelligence agency. Virtually any U.S. entrepreneur, inventor or research scientist working on ways to analyze data has probably received a phone call from In-Q-Tel or at least been Googled by its staff of technology-watchers."

And Ken Minihan, who's on the Endgame board, succeeded Mike McConnell as NSA director in the middle 90's, at exactly the point when the NSA was first getting into domestic telecom and internet surveillance. He later became partners with former CIA director James Woolsey in Paladin Capital Group -- a private equity investment firm which formed the Paladin Capital Homeland Security Fund.three months after 9/11 to invest in homeland security firms.

So Endgame may or may not be exactly what it claims to be -- but it's certainly no fly-by-night boondoggle. It sounds dead serious. Is the real "endgame" to know everything about everybody and have complete access to it at all times?

Cliff Arnebeck

(305 posts)
26. They are dead serious and want total information awareness as a means of achieving total control
Fri Jun 28, 2013, 04:29 PM
Jun 2013

These are my views. I would carefully consider Jill Simpson's take on these matters to whatever extent her research, experience and judgment would differ from mine.

After the 1988 Iowa Republican primary in which GHW Bush came in third behind Bob Dole and Pat Robertson, Rove brought technology and Evangelicals to his candidate's side as no mainstream major party candidate had ever done before. The hacking of election technology--including electronic voting machines, began in earnest in the U.S. in 1988. Some of this technology had been developed and used covertly overseas before that time.

After the 2000 New Hampshire Republican primary in which GW Bush came in way behind John McCain, Rove brought big business to his candidate's side as no mainstream major party had done since Mark Hanna got McKinley elected President. Surveillance/total awareness technology is an instrument of control and the enabling of business to get everything they want, which was the commitment Karl Rove made to Tom Donohue, then President of the U.S. Chamber of Commerce. Much of this work, when done on behalf of the government, is contracted out as another set of profit centers for the practitioners. That also makes such work available to private corporations to be used to exploit customers and competitors alike.

I think their "end game" is total control by a corporate elite. Covert election manipulation, surveillance and the fusion of information from all sources, and covert strategic political and business assassinations as well as broad scale population control through war, insurrection, poverty, toxic food and water would be the methods of achieving control. At some point, their end game would envision the replacement of the pretense of democracy with appointment of all political leaders by their corporate superiors and the world being run like a corporation. “JFK and the Unspeakable,” by James Douglass and “The New Jim Crow,” by Michelle Alexander provide excellent documentation and argument in support of this characterization of those who did not then, and do not now, share the vision of ending war and poverty that was shared by JFK, MLK, and RFK, for which they were unceremoniously assassinated.



 

OnyxCollie

(9,958 posts)
31. I believe the US Attorney scandal was about election manipulation.
Sun Jun 30, 2013, 01:18 AM
Jun 2013

In spite of the long-accepted, constitutionally sound, independence-preserving method of appointing interim U.S. Attorneys, the appointment process was radically changed with the reauthorization of the USA PATRIOT Act in 2006. Removed was the interbranch appointment from the district court; the Attorney General could now make interim U.S. Attorney appointments. Also eliminated was the 120 day period that interim U.S. Attorneys could stay in office before a district court could appoint an interim U.S. Attorney to fill the vacancy. Interim U.S. Attorneys could now remain in office indefinitely, or until the President appointed a U.S. Attorney to the district. Interim U.S. Attorney appointments bypassed Senate confirmation, leaving the determination of qualification to the Justice Department.

When there was a close election, feds would launch an investigation against the (Democratic) challenger. The study conducted by Shields and Cragan in 2007 found that Democrats were prosecuted over Republicans, 86% to 12%.

Couple this with the GSA violating the Hatch Act (and Scott Bloch destroying the evidence.)

Cliff Arnebeck

(305 posts)
29. I have posted a diary @ Daily Kos of Jill's call for appointment by POTUS of Special Prosecutor
Sat Jun 29, 2013, 12:52 PM
Jun 2013

Update June 29, 2013: I just posted a diary at Daily Kos focusing upon Jill Simpson's call for President Obama to appoint a special prosecutor and for the U.S. Senate to launch an investigation of "Endgame." http://www.dailykos.com/story/2013/06/29/1219917/-Public-Integrity-Champion-Jill-Simpson-calls-for-Investigation-of-Endgame
This was from the conclusion of her article cited here.

Latest Discussions»General Discussion»How global corporations c...