The Anatomy of Public Corruption

Showing posts with label Cyberterrorism. Show all posts
Showing posts with label Cyberterrorism. Show all posts

The Bodies of Walnut Creek

Connecting Success Factors to Bennett

The Dubious Phone Call and Time Wasting Project
The folks at TPG will have to answer to my Whistleblower Complaints on the truly odd collection of RFPs emanating from companies connected to Ric
A HOMELESS MAN IN WALNUT CREEK
Partially Disabled, Beaten by Homeless or
Parties Known and Unknown

THEY BLEW THE HEADS OF HIS FRIENDS

FORMER MAYOR CARLSON

Bennett and Carlson knew Jared Tucker
AMERCIAN KILLED IN BARCELONA
DONNA COLUMBO
DIRECTOR OF TRINITY CENTER

BANNED FROM TRINITY CENTER
RELATIVES MURDERED
BEATEN,ARRESTED AND JAILED



hard Blum, William McGlashan, CBRE, Regency Centers, Trammell Crow, Lennar, Catellus, Hercules Capital, Willkie and Senator Feinstein's connection or failed connection to Jim Jones.

The

My story is about witness murders, private equity, mergers and acquisitions linked back to the Matter of Bennett v. Southern Pacific lost in 1989.  It was a winnable case as long the witnesses testified.


Share:

Caveat Emptor: Thoma Bravo McAfee has AT&T Contract -NIMDA the 9/11 Chaser

Connecting AT&T, McAfee to the 9/11 Virus 

The Dubious Phone Call and Time Wasting Project
The folks at TPG will have to answer to my Whistleblower Complaints on the truly odd collection of RFPs emanating from companies connected to Richard Blum, William McGlashan, CBRE, Regency Centers, Trammell Crow, Lennar, Catellus, McAfee, AT&T, Bank of America, Wells Fargo, Symantec,

My story is about witness murders, real murders, murders of employees, private equity, mergers and acquisitions where parties, assets, deals, incidents fall back to the 1987 Matter of Bennett v. Southern Pacific.  The winnable case was lost when the witnesses vanished.





Southern Pacific was merged with Santa Fe Industries into a new entity called Santa Fe Southern Pacific. The witness didn't disappear he was murdered, the Judge moved to Montana to ALTARANCH.com



Intel, TPG in talks to sell McAfee to Thoma Bravo - CNBC.com

Dec 14, 2018 - Thoma Bravo has approached TPG to buy its stake in McAfee. ... Thoma Bravo isn't likely to pursue a deal for Symantec if it acquires McAfee, ...
Dec 14, 2018 - McAfee, SymantecTPG and Intel all declined to comment for this story. Thoma Bravo didn't immediately respond to requests for comment.
Dec 17, 2018 - Shares of Mountain View-based Symantec have dropped after a report Friday that a rumored buyout by private equity firm Thoma Bravo may ...
Dec 14, 2018 - Intel and TPG declined to comment, while Thoma Bravo did not ... that Thoma Bravo had approached Symantec Corp with a takeover offer.
Dec 17, 2018 - None of the principal actors—McAfee, SymantecTPG, and Intel—has given a direct statement on the potential deal. Thoma Bravo did not ...

Feb 23, 2018 - Chris Young convinced Intel to sell 51% of McAfee to TPG -- valuing ... But Symantechas been shrinking at a 9.8% annual rate over the last five ...
Dec 14, 2018 - Intel ([[INTC]] -0.7%) and TPG are in early talks to sell McAfee to private equity ... it will back away from a Symantec (NASDAQ:SYMC) purchase.
Dec 17, 2018 - Intel, TPG in talks to sell off McAfee to Thoma Bravo - reports ... Shares in Symantec fell 2.5 per cent to $21.57 per share, when news of the ...
Dec 17, 2018 - Intel and TPG Capital might be looking to sell McAfee to private equity firm Thoma Bravo, which last month reportedly approached Symantec ...Bennett v. Southern Pacific lost in 1989.  It was a winnable case as long the witnesses testified.  
Share:

Contra Costa County Suicide Conundrum



Contra Costa County Suicide Conundrum

Just how many suicides are there?

Via personal observation there were too many suicides, too many bodies in local creeks, too many victims along with a slew of dubious offical conclusions by Pete Bennett.
Pete Bennett was enduring being evicted after he was nearly beaten to death by Danville Building Inspector Gary Vinson Collins

Dead Witnesses 

During Bennett v. Southern Pacific Contra Costa Superior Court (1987) the above FBI agent arrived at Mainframe Designs Cabinets and Fixtures.

The Driscoll Murders and Kinder Morgan

For over ten years the connection between Pete Bennett, Kinder Morgan and the Contra Costa District Attorney was a well kept secret.   During August 2004 Pete Bennett was under attack, his truck explodes into a ball of fire NB 680, then he's attacked, ticketed and the day of the deadly Kinder Morgan explosion he's in court just north the explosion.  
Bennett appears in front of Contra Costa Superior Court Judge Joel Golub.
View details »

The 1993 World Trade Center Bombing

Donec id elit non mi porta gravida at eget metus. Fusce dapibus, tellus ac cursus commodo, tortor mauris condimentum nibh, ut fermentum massa justo sit amet risus. Etiam porta sem malesuada magna mollis euismod. Donec sed odio dui. View details »
Share:

2003/10/30 - NIMDA / ANTHRAX / July 2003 the B of A Programmer Suicide

SECSYM: Security Symposium I



Most of the security vulnerabilities that have been found in Windows over the last
couple of years have not related to security features. For that reason, it's important
that every developer understands how to build secure code. Yet it's not something
that most people have had training on - it's not taught as part of most CS undergraduate
courses, for instance. At Microsoft, it's been a long road over the last couple of
years during which every developer has undertaken specific training on writing secure
code.
Security is becoming more challenging: the time-to-exploit has been decreasing (from
331 days for Nimda to 25 days to Blaster). There is no silver bullet to ensuring security
within a code base, it's something that takes a pervasive effort.
The Microsoft security framework comprises three key concepts: secure by design, secure
by default and secure in deployment - known as SD3. Secure by design means security-aware
features, and deliberate design to reduce vulnerabilities. Secure by default means
switching off unneeded features - unless 90% of users require a feature, the goal
in Windows is to switch that feature off on a clean installation. Finally, secure
by deployment means creating processes and guidance to deploy secure systems, along
with tools in the products to defend and update against vulnerabilities.
The SD3 approach includes a "Top 10" checklist:
  1. Build threat models: ensuring the design models potential attacks.
  2. Removing security flaws in source code: reviewing each line (against buffer overruns,
    for instance).
  3. Avoid new security flaws: for new code, being extra careful to prevent against flaws
    being introduced.
  4. Use managed code today: because it provides many intrinsic protections that can help
    reduce vulnerabilities.
  5. Use tools and checklists: books including Writing
    Secure Code
    , along with other patterns and practices (1 2).
  6. Turn features off: reducing attack surface by removing unneeded features that could
    be used in an exploit.
  7. Require minimum privilege: ensuring that even a successful exploit has limited value
    for compromising the machine.
  8. Add extra defensive layers: specific technologies to insulate an exploit from getting
    at the underlying system, as implemented in "Springboard" (see below).
  9. Be firewall and antivirus friendly: make sure that applications co-operate well with
    such environments.
  10. Create security guidance and documentation: giving the end-customer guidance on how
    to make their system more secure.
These approaches have been effective with recently released products. Subsequent to
the launch of the Trustworthy
Computing
 initiative, many products have completed full security reviews, checking
each line of code for potential vulnerabilities. For instance, Windows Server 2003
had 6 vulnerabilities in the first 180 days, compared to 21 vulnerabilities over the
first 180 days after the launch of Windows 2000 Server.
The aim too is to reduce the hassle of installing patches:
  • Reducing complexity: one patch experience
  • Reducing risk: better quality patches and a rollback capability for all patches
  • Reducing size: delta patching, enabling far smaller patches to download
  • Reducing downtime: doing everything possible to create patches that don't require
    reboots
  • Extending automation: making it easier to deploy patches using tools like Software
    Update Services
     and SMS
    2003
    .
Windows XP SP2 and Windows Server 2003 SP1 will include some new technologies (codenamed
"Springboard")
to add extra defensive mechanisms - inspecting packets, enabling the NX feature in
newer processors to create non-execute data pages, and to enable protection technologies
by default (such as ICF).
Windows XP SP2 will be in beta by the end of this year and released in the first half
of 2004; Windows Server 2003 SP1 will be in beta in the first half of 2004 and released
in the second half of 2004.
Share:

Who needs malware? IBM says most hackers just PowerShell through boxes now, leaving little in the way of footprints

Who needs malware? IBM says most hackers just PowerShell through boxes now, leaving little in the way of footprints

Direct-to-memory attacks now account for 57 per cent of hacks, apparently

powershell
A company's internal network, once compromised, is now more likely to be ransacked by automated scripts than a piece of malware.
This according to researchers with IBM's X-Force, who found that in 2018 just 43 per cent of the attacks it analyzed utilized any sort of locally installed files. Rather, the hackers utilized PowerShell scripts to execute their dirty deeds in memory without significantly touching file systems, if at all.
This finding is important because it is another reminder that admins can no longer solely rely on specific file signatures or similar as evidence of a cyber-intrusion. As with local malware infections, the attacker first needs to get the ability to run malicious commands. What differs is the next step, as the miscreant does not direct the infected Windows machine to download, save, and execute a trojan payload.
Rather, the attack runs entirely as commands using PowerShell, where Microsoft's powerful scripting language can be used to do anything from harvest and steal passwords to mine cryptocurrency.
"PowerShell is useful in data collection and analysis, but it is also favored by malicious actors who use it to forego the file system and inject malicious code directly into memory, thus enhancing obfuscation, and often evading security controls designed to detect malware deployments," the IBM report reads.
Failure

Windows 10 security question: How do miscreants use these for post-hack persistence?

READ MORE
"Threat actors of all skill levels have expanded their capabilities using PowerShell over the last few years. IBM X-Force IRIS has seen cases wherein complete malicious toolkits were contained within PowerShell scripts."
In some cases, crooks wouldn't even need to run a super-leet exploit to steal corporate data. The X-Force report notes that misconfiguration incidents – instances where databases and storage buckets were left exposed to the public-facing internet – were also up 20 per cent from last year and accounted for 43 per cent of all of the exposed records X-Force tracked last year.
In addition to the exposed files and records themselves, misconfigurations could also indirectly lead to other attacks when things like passwords and email addresses are involved and used to login to other accounts on other services to carry out further mischief.
Finally, the report found, the tried and true social engineering attack remains as effective as it has ever been.
Last year, IBM found that 29 per cent of the attacks it analyzed were phishing attacks, and 45 per cent of those were targeted attacks on specific employees, something X-Force terms the business email compromise.
"When it comes to the most lucrative types of social engineering scams, BEC has been a growing tide for several years spanning all industries and geographies," notes X-Force.
It seems that, despite the various methods for sophisticated attacks, a bogus "CEO" email demanding a wire transfer is still a foolproof way to con a company out of cash. ®
Share:

NIMDA The Untold Virus Story - The Heist of the Century


NIMDA The Untold Virus Story


Summer 2004 One day my truck exploded just a few years after 9/11
Sometime in 2002 The New Yorker Magazine article quoting Fremont Group General Counsel Rick Kopf in regards to a Patriot Act filing connected to the 10 Million Dollar investment by Bin Laden family. That was not from the Mr. Bin Laden himself but in reality it was from the Saudi's.







Share:

Anchor links for post titles

Popular Posts

Blog Archive

Labels

Recent Posts

Popular Posts

Labels

Recent Posts

Pages

Labels

Blog Archive

Recent Posts