New World Hackers

8fg2van

Check this story out from CBS. This occurred last week. It would explain what I communicated at James Howard Kunstler’s blog, Clusterfuck Nation. Views at this blog dropped precipitously last week as did comments at Kunstler’s blog. The only views I had were related to specific url searches for the Maura Murray blog posts I made “Private” as I discussed in my last blog post.

Here’s the thing, volodya. Everyone who isn’t connected and an Elite is a Deplorable to Hillary & The Establishment. Remember I said in my last blog post or one of my latest blog posts that The Establishment is shitting & pissing on we The Little People? Well, I meant it both literally and figuratively. Take a gander at this — I’d call this, quite literally, shitting & pissing on The Little People. Also of note, that area of town is heavily populated by poor people, many of them Hispanic Immigrants. The Irony Boss, The Irony. Am I right? Or am I right?

Hillary’s Bus Dumps Sewage All Over the Street !!!

FYI, after my latest blog posts my blog stats have been reduced to zero with the exception of Maura Murray searches. Hardly anyone after the first day clicked on the links to the two blog posts I provided early in the commentary the first day of Jim’s blog post & the comments for Jim’s weekly missive are diminutive this week compared to the last several weeks. Something’s awry. That hasn’t been the pattern, so it appears some intervention has taken place to enable the anomaly or to disrupt. There is an Odor of Desperation in the air. Do you smell it? I do, and what that Campaign Bus was dumping is just a drop in the tsunami that’s about to wash over us. Get your Dive Suits ready, or else be swallowed up and consumed by the Tidal Wave of Putrefaction coming our way.

Here’s the CBS article.

New World Hackers Group Claims Responsibility For Internet Disruption

Withering cyberattacks on server farms of a key internet firm repeatedly disrupted access to major websites and online services including Twitter, Netflix and PayPal across the United States on Friday. The White House called the disruption malicious and a hacker group claimed responsibility, though its assertion couldn’t be verified.

Manchester, New Hampshire-based Dyn Inc. said its data centers were hit by three waves of distributed denial-of-service attacks, which overwhelm targeted machines with junk data traffic. The attacks, shifting geographically, had knock-on effects for users trying to access popular websites across the U.S. even in Europe.

“The complexity of the attacks is what is making it so difficult for us,” said Kyle York, the company’s chief strategy officer. “What they are actually doing is moving around the world with each attack.” He said an East Coast data center was hit first; attacks on an offshore target followed later.

CBS News homeland security consultant Fran Townsend pointed to Russia as a possible instigator.

“Is this sort of a brushback pitch from the Russians sending us a message that we should be pretty careful about engaging in this sort of cyberactivity with them because they are very capable,” she said.

The FBI and the Department of Homeland Security told CBS News they were investigating “all potential causes,” but they have not gone as far as to say that this was a state-sponsored attack.

The data flood came from tens of millions of different Internet-connected machines – including increasingly popular but highly insecure household devices such as web-connected cameras. It was an onslaught whose global shifts suggested a sophisticated attacker, though Dyn said it had neither suspect nor motive.

The level of disruption was difficult to gauge, but Dyn serves some of the biggest names on the web, providing the domain name services that translate the numerical internet addresses into human-readable destinations such as “twitter.com.”

Steve Grobman, chief technology officer at Intel Security, compared an outage at a domain name services company to tearing up a map or turning off GPS before driving to the department store. “It doesn’t matter that the store is fully open or operational if you have no idea how to get there,” he said in a telephone interview.

Jason Read, founder of the internet performance monitoring firm CloudHarmony, owned by Gartner Inc., said his company tracked a half-hour-long disruption early Friday in which roughly one in two end users would have found it impossible to access various websites from the East Coast.

“We’ve been monitoring Dyn for years and this is by far the worst outage event that we’ve observed,” said Read.

Dyn provides services to some 6 percent of America’s Fortune 500 companies, he said. A full list of affected companies wasn’t immediately available but Twitter, Netflix, PayPal and the coder hangout Github said they experienced problems.

Members of a shadowy collective that calls itself New World Hackers claimed responsibility for the attack via Twitter. They said they organized networks of connected “zombie” computers called botnets that threw a staggering 1.2 terabits per second of data at the Dyn-managed servers.

“We didn’t do this to attract federal agents, only test power,” two collective members who identified themselves as “Prophet” and “Zain” told an AP reporter via Twitter direct message exchange. They said more than 10 members participated in the attack. It was not immediately possible to verify the claim.

Dyn officials said they have received no claim of responsibility, but are working with law enforcement.

The collective, NewWorldHacking on Twitter, has in the past claimed responsibility for similar attacks against sites including ESPN.com in September and the BBC on Dec. 31. The attack on the BBC marshaled half the computing power of Friday’s onslaught.

The collective has also claimed responsibility for cyberattacks against the Islamic State of Iraq and Syria, or ISIS. The two said about 30 people have access to the NewWorkdHacking Twitter account. They claim 20 are in Russia and 10 in China. “Prophet” said he is in India. “Zain” said he is in China. The two claimed to their actions were “good,” presumably because they highlighted internet security problems.

Another collective member the AP previously communicated with via direct message called himself “Ownz” and identified himself as a 19-year-old in London. He told the AP that the group – or at least he – sought only to expose security vulnerabilities.

During the attack on the ESPN site, “Ownz” was asked if the collective made any demands on sites it attacked, such as demanding blackmail money. “We will make one demand actually. Secure your website and get better servers, otherwise be attacked again,” he said.

For James Norton, the former deputy secretary at the Department of Homeland Security who now teaches on cybersecurity policy at Johns Hopkins University, the incident was an example of how attacks on key junctures in the network can yield massive disruption.

“I think you can see how fragile the internet network actually is,” he said.

Dyn officials said attacks stemmed from tens of millions of devices connected to the internet – closed-circuit video cameras, digital video recorders and even thermostats – that were infected with malware.

“The Internet of Things sort of ran way ahead of how the Internet was architected,” Dyn’s York said on a call with reporters. He said there are between 10-15 billion such devices online.

Dyn first became aware of an attack around 7 a.m. local time, focused on data centers on the East Coast of the U.S. Services were restored about two hours later. But then attackers shifted to offshore data centers, and problems continue.

“It is a very smart attack. As we start to mitigate they react and start to throw something that’s over the top,” York said on a call with reporters.

The second attack broadened its net, affecting the U.S. West Coast. “Prophet” of New World Hackers said hacktivists of the broad, more amorphous Anonymous collective piled on in the third wave on Friday afternoon.

“We’ve stopped all our attacks,” he said at midafternoon. The U.S. Department of Homeland Security was monitoring the situation, White House spokesman Josh Earnest told reporters Friday. He said he had no information about who may be behind the disruption.

Security experts have recently expressed concern over increasing power of denial-of-service attacks following high-profile electronic assaults against investigative journalist Brian Krebs and French internet service provider OVH.

In a widely shared essay titled “Someone Is Learning How to Take Down the Internet,” respected security expert Bruce Schneier said last month that major internet infrastructure companies were seeing a series of worrying denial-of-service attacks.

“Someone is extensively testing the core defensive capabilities of the companies that provide critical internet services,” he said.

This stinks to High Heaven. Who benefits? Cui bono? Cyber Security Firms, that’s who. And who or what comprises the Cyber Security Firms? Former employees of the NSA’s Cyber Warfare Intelligence Group called Tailored Access Operations (TAO), that’s who.

FYI, I went to school with the guy highlighted in the article below. I didn’t like him then and I don’t like him now. I have no more trust for him & in him and his now former “employees” who are nothing more than rationalized, glorified Hackers (they are Terrorists as far as I’m concerned) than I do for Inner City Ghetto Thugs. In fact, I have less respect for them than Inner City Ghetto Thugs because Ghetto Thugs are born into their malevolent environment, so they really have little to no choice in what they become, but not so with these privileged, opportunistic Pricks. They have too many options in comparison to Ghetto Thugs as to what they can become, and they choose subterfuge and malevolence, in my opinion. I have no doubt whatsoever, that some of these Pricks have fucked with me and this blog over the years for shits & giggles. They’re bullies & cowards as well as opportunists.

iSight Banking Off Boom In Cyber Security Market

Standing at just about 6 feet tall and sporting a bright blue Hawaiian shirt and cowboy boots, John Watters doesn’t resemble the stone-faced image often associated with high-tech security.

But the CEO of iSight Partners — an investor turned cybersecurity executive — is a pioneer in the cyber intelligence industry.

And he’s leveraging his knowledge and experience to help his Plano-based company take a chunk out of what is expected to be multi-billion sector by 2020. Watters is also weighing whether to take iSight public.

“We are laser-focused on growing the business,” said Watters, adding that additional capital could support organic growth or other opportunities. “By no means are we locked on an IPO or focused on it at this stage of the company.”

Regardless, the company is setting itself up to function as a public company — IPO or not — by the end of next year, he said.

Watters, who founded iSight in 2006 after discovering his passion for what was an early-stage market at the time, has grown the company at a rapid pace. Serving corporate and government clients around the world, iSight employs more than 300 people and the firm has increased revenue 91 percent in the last year. The company has also raised millions of dollars in funding, along with making a key acquisition that positions it to take even greater market share in the fast-growing cybersecurity sector.

That growth continues to gain momentum in a market segment that’s expanding faster than the overall industry.

“Think of us as a commercialized NSA,” said Watters, adding that the company’s goal is to provide customers with the intelligence they need to protect themselves. “We want to give the balance of power back to the good guys.”

The company couldn’t be in the sector at a better time. With publicized breaches regularly stealing headlines, companies are gearing up to win the battle to protect private data.

Watters, who previously revived and sold cybersecurity firm iDefense, could have an advantage as he leverages a scalable business. But to be a market leader in the research and analysis of the darkweb, threats and cyber criminals, iSight will have to stay ahead of the game.

By providing intelligence rather than products that lack depth in terms of identifying a threat, iSight has a headstart on the competition. “They’re in a much better position than others jumping on the bandwagon,” said Rick Holland, a Forrester Research security and risk analyst based in North Texas. “I don’t really consider them not being successful.”

But an oversight in business strategy could leave iSight hidden among a growing mix of competitors.

Competing in Cyberspace

iSight could soon have to go head-to-head with companies such as IBM, which wields its growing X-Force Threat Intelligence offering, and Dell, which is reportedly considering spinning out its SecureWorks business with an IPO. iSight already competes with similar cybersecurity firms such as 4-year-old California-based CrowdStrike, which recently raised $100 million from Google Capital. Then there’s iDefense, with which Watters is intimately familiar.

“By 2020, we’re looking at that (intelligence) market doubling,” said Steve Morgan, founder of market research firm Cybersecurity Ventures, adding that projections suggest that in five years intelligence could be a $6 billion sector. “You’re looking at the sector that’s growing twice as fast as the market.”

Beyond staying steps ahead of increasingly intelligent cyber criminals, iSight has to continue to attract top talent and fight off some of the biggest names in technology to grab and maintain top market share. Doing so could land the company in any number of ideal situations: a successful IPO, a sale to one of the tech giants or growth that solidifies the company’s legacy in cybersecurity history.

To get there, iSight has a couple of advantages that could give it the edge it needs.

For starters, it has Watters, who is well-known in the cybersecurity industry, given his track record and success with former companies.

Watters was first introduced to the industry in 1999, when he started his own investment firm , Dorset Capital in Dallas. He made his first investment in cybersecurity in 2002, when he spent less than he spends on his favorite quick lunch at Jimmy Johns to buy bankrupt iDefense of Chantilly, Virginia. The $10 purchase led to him becoming chairman of the company.

“My hunch was validated when Symantec bought three companies,” he said, referring to the acquisitions that were announced the same year he bought iDefense. “The big guys stepped in and said, ‘OK, it’s time to accelerate our investment in the industry.’ ”

Watters became CEO of iDefense in 2003 and two years later sold the company, which was generating $10 million in revenue, to Virginia Internet company VeriSign for $40 million.

For Watters, the turnaround seemed quite simple. All he had to do was apply business logic to an industry heavily loaded with technical expertise but very little business insight. This meant revamping the price structure to create a level playing field for its customers, investing resources into the product and customer service and even firing customers that weren’t willing to pay for the new pricing.

“We fired one for $27,000 a year and won them back at $455,000,” Watters said, adding that it took about a year to attract customers back at a higher dollar. “We also fired a government agency for $25,000 and won it back at $1.5 million a year.”

His strategies and $7 million investment doubled iDefense’s revenue in the first year and again in the second year.

He also invested in cybersecurity companies TippingPoint Technologies of Austin and Archer Technologies of Kansas City, which were later acquired by 3Com and RSA, respectively.

“I look at the track record of CEOs,” said Holland, the Forrester analyst. “John Watters sold iDefense and was very successful at rebuilding it. Then he rinsed and repeated with iSight.”

iSight also has a scalable business model that focuses its resources on the existing and developing threats, then feeds that through a system that prepares digestible forms of intelligence for its clients. As such, the business can stay the course regardless of the size of its client base. Resources are used to collect threat intelligence a client can apply to its needs rather than iSight addressing the client’s needs and trying to seek out intelligence that applies.

“We say, ‘Here’s how they targeted you, why and this is the strategic adversary,’ ” said Watters, adding that the intelligence gives customers a strategic advantage that allows them to modify their infrastructure. “We marry the knowledge of the vulnerability with our research and help them better prioritize where to spend their time.”

A client’s knowledge of threats is often coupled with solutions that could come in the form of alert systems, firewalls and other security software. The company tracks 22,000 products and looks at the vulnerabilities among them.

iSight’s added intelligence — culled from analysts and researchers spread throughout the world and trained in different languages — gives companies the ability to focus on specific threats and their level of significance. iSight’s analyst team makes up about two-thirds of its workforce.

“We have people that come out of law, military intelligence, national intelligence,” said John Miller, manager of iSight’s cyber crime team, adding that a majority of analysts are based in Virginia. “As a whole there are six threatscapes that we monitor … and we’re out there doing our own research and analysis on any one of them.”

The team is a source of pride for iSight. After all, they were credited for providing the information that linked the Target data breach to Russian malware, which affected 40 million credit and debit card accounts.

“They have more analysts probably than anyone else in the state and the most widespread language support as well,” said Holland, adding that iSight offers threat intelligence versus threat data, a key competitive advantage. “It’s relevancy and context that’s more important than just a technical indicator.”

Cashing In On Crime

It also helps that iSight has solid funding and acquired a key company in recent months as it continues to shows signs of growth.

iSight raised $30 million, led by Bessemer Venture Partners in a Series C round of funding, to help expand its intelligence capabilities and develop new partnerships to increase revenue. The round was the second time the company involved an institutional partner. It raised most of its funding from wealthy individuals until 2013, when it brought in its first institutional investor, Blackstone.

But some of its top investors are successful Dallas business leaders.

“I really bet on people,” said real estate broker and former Dallas Cowboys quarterback Roger Staubach, who first invested with Watters in iDefense. “I don’t know how successful the business will be, but I know we’re in the right arena, and I know John is someone who’s very … able to build a business.”

Staubach said his first investment in iDefense was extremely successful, so when Watters presented him with iSight, he knew he wanted to be involved. He invested in iSight’s first raise and in a second round. His investment to date is well into the seven figures, Staubach said.

Mike Terry, president of investment firm M. Terry Enterprises and CEO of The Mike and Mary Terry Family Foundation, had a similar experience – enjoying a successful investment round with iDefense, which led him to iSight.

“If you visit with John, you pick up his passion for the industry and his profession,” said Terry, adding that this is his only cybersecurity investment in a portfolio that is made up mostly of real estate, oil and gas. “There’s not been one thing John’s done that hasn’t been successful.

“That’s pretty hard to beat.”

Three months after its $30 million raise, iSight purchased Idaho-based Critical Intelligence for an undisclosed price. The acquisition bolstered iSight’s capabilities and client-base, as Critical Intelligence’s clients included three of the largest utilities in the world as well as Fortune 500 companies.

iSight aims to maintain its high customer-retention rates, currently at 95 percent, while continuing to increase revenue beyond its current annual growth rate of 50 percent.

“We’re the market share leader,” he said. “By virtue of being able to retain our people and our customer, the success will remain on the heels of that.”

Did you catch the quote in bold? Watters says, “think of us as a commercialized NSA.” Oh, I do, John, I do. And take special note that Mr. All-American, Roger Staubach, is making huge returns off his investments with Watters. FYI, Watters sold iSight in 2016 for $200 million — a HUGE return on his investment. And yet, the attacks noted in the CBS article above continue unabated and are increasing in frequency thus necessitating the need for more start-up Cyber Security Firms. Anyone want to start one with me? I’m serious. Please let me know. It’s like Wildcatting in Texas when oil was first discovered there. This is going to be a Booming Industry where you can make your own oil for next to nothing and sell it at exorbitant prices because you’re one of the few players in town who knows how to talk the lingo. Your customers are, quite literally, captive. You have them over a barrel. What’s not to like? Don’t you just love the smell of Money in the morning? I know I do, even though I have none. But I can always dream, right? For now, I can — dream. But even that too will cost us in our Dystopian Future. Dreams will no longer be free. Nothing will — not air, not water, not respiration, not dreams or aspirations — there will be not just a figurative price for everything, but also a literal price. I can’t wait. How about you?

Roger The Dodger In His Early Days
Roger The Dodger In His Early Days. Note The Date — Seven Days After JHK Was Assassinated & Nothing About It On The Front Cover. Hmmm….

YeeHaw!!! It’s Pay Day!! It’s what it’s all about! Am I right? Or am I right?

FireEye Adds To Biggest Bet, Spends $200 Million On iSight Partners

On the day its stock fell to a new low, FireEye Inc. doubled down on its biggest bet with a $200 million cash acquisition.

The next-generation security company purchased privately held iSight Partners, a threat-intelligence firm that focuses on online threat sources worldwide and recently received notoriety for quickly detailing the group behind a cyberattack that blacked out parts of Ukraine. In addition to using more than 17% of its $1.17 billion in cash on hand for the deal, FireEye FEYE, -2.11% added $75 million in future inducements based on performance.

In an interview ahead of the official announcement Wednesday, FireEye Chief Financial Officer Michael Berry said that nine-year-old iSight had $40 million in revenue and $50 million in billings in 2015. Chief Executive David DeWalt said that iSight brings a complementary offering to Mandiant, a similar company that FireEye purchased for $1 billion not long after its 2013 initial public offering, by focusing on understanding attackers instead of victims.

Note the part in bold. “It takes one to know one,” comes to mind.

prs_01

From the CBS article above, the Hacker who refers to ITSELF as “Ownz” gives the “problem” away. Now comes the “reaction” and the “solution” per the tried & true Diocletian Formula of Success.

Another collective member the AP previously communicated with via direct message called himself “Ownz” and identified himself as a 19-year-old in London. He told the AP that the group – or at least he – sought only to expose security vulnerabilities.

That is the TELL. Hey Naomi Klein, are you reading this or are you keeping up with this story? I know, I know, there are so many examples of your Disaster Capitalism thesis in play, it’s difficult to track all of them, but this one is sooooo Cutting Edge, you have to admit.

That’s it for now. Remember, folks, if you don’t already know by now you should, It’s All Lies. And yes, of course, Donald Trump is a Trojan Horse in the Kabuki Theater Play that is the 2016 American Presidential Election, whether he knows it or not. He’s been played and he doesn’t even know it and even if he did know it he wouldn’t care so long as he gets the attention he believes he deserves and he gets his own television network, Trump TV, Inc.. The REAL Marks are YOU and YOU and YOU and YOU if you still believe the elections and electoral process are legitimate. Grow Up!!!!! There really is NO Santa Claus. Really.

trojanhorse

I came across the following comment at Moon of Alabama blog. It underscores what I just mentioned about Trump being a Trojan Horse. This is what little regard The Elite have for YOU, The Little People. They piss on YOU, they shit on YOU and they fuck with YOU. They use YOU and abuse YOU and bat you around like a cat does a mouse when it’s captured it, or, they train you like a master trains its poodle. Whatever they want to do to YOU and with YOU, it’s all easy pickings as far as these cynical, sadistic PRICKS are concerned. Prior to the screen-printed comment is a link to the article from the Observer it references.

WikiLeaks Reveals DNC Elevated Trump to Help Clinton

screen-shot-2016-10-26-at-12-43-41-pm

screen-shot-2016-10-27-at-6-46-21-am

screen-shot-2016-10-27-at-6-46-44-am

screen-shot-2016-10-31-at-3-25-34-pm

article-2273336-1757c25d000005dc-990_634x612

Advertisements

3 thoughts on “New World Hackers

  1. I’m not a Fan of this guy because I don’t do the Fan thing, but this is pretty funny — and disturbing. This is America, folks. All this Social Media and NO ONE is informed. They’re Misinformed & Malformed. The Mainstream Media is about Misinforming the Malformed. The Educational System in America has insured their Malformation. Can you believe these people have money? Can you believe America has enough Nukes to destroy the entire planet a hundred times over?

  2. Michael Moore, like Trump, says it like it is, but then leads his audience/followers to The Cliff and tells them to jump. And they do. They jump. Moore thinks Trump will be “elected” even though he (Moore) supports The NAFTAs Clintons. Moore’s assessment is much more sincere than Trump’s, but his conclusion is wrong — The Clintons & The Democrats are not the answer just as surely as The Trumps and The Republicans are not the answer. Your vote doesn’t count. The System was set up from the very beginning to ensure you never had a say or a choice in the matter. That’s what The Electoral College is for — nowadays, and maybe always. That’s what The Senate is for and that’s what Executive Orders are for — to circumvent the appearance of Democracy in favor of Oligarchy. So, go ahead and pretend — AGAIN — like you do every four years — that THIS TIME will make a difference. It won’t, but you’ll ALWAYS believe it will because you cannot face The Truth. Because you cannot handle The Truth. Carlin’s video follows Moore’s little vignette and it accomplishes what Moore’s doesn’t. Until you realize that what Carlin is saying in that video is the closest thing you’re ever going to get to The Truth, you will get nothing but more of the same in greater, and more powerful, doses. Fucking Rubes.

Comments are closed.