- They play by the rules and turn everything over the the justice department.
- They claim the files were professional wiped clean and that their recovery efforts didn't yield any fruit.
- They doctor the files that need doctored in order to prevent criminal charges to Hillary Clinton or embarrassment to the administration.
Sunday, September 20, 2015
The FBI has Hillary Clinton's email server. Chances are it wasn't thoroughly wiped, or at least professionally wiped. The question is, how do they handle the data they recover? Three possibilities:
They probably won'd do #3, because several foreign governments can almost certainly contradict their efforts. And they probably won'g do #1 for all the reasons they might have tried #3. Hence, my prediction is that they'll do #2…all over the place. And then wait for one or more foreign governments to extort the US.
Posted by Destroying Angel at 9/20/2015 09:47:00 AM
Friday, August 28, 2015
read it here), fully 25% of all companies have no plans to invest in a "Threat intelligence Service" (see p. 12). My guess is that 100% of the market would make such an investment if approached with the following communication:
Attached is our documentation of a ZERO-DAY security hole in your computer infrastructure. Also included is a patch we generated to nullify this vulnerability, including source code. A certified hard copy of this information has been delivered to your IT department, along with an offer to license the use of this patch as well as the opportunity for site licensing our automated Threat Intelligence and Patching A.I. technology. Sincerely yours, Israeli Mossad Threat Remediation Services.
So what do you think? Would your company take more than 24 hours to commit to this kind of threat intelligency service?
Posted by Destroying Angel at 8/28/2015 11:44:00 AM
Thursday, August 13, 2015
I've been harping on this subject since 2011. Just type "supply chain" into the search box on the left and you'll get the picture.
Yesterday's U.K. Register verified why the U.S. Government (and several others around the world) prohibit their departments from buying computers made in China (read the story here). Turns out, they hide their "crapware" in Windos laptops' BIOS. This is called "roaching the supply chain," a subject on which I waxed poetic in February (see the story here).
Ahem. Is it true that Cisco routers are built and provisioned with software in China?
Posted by Destroying Angel at 8/13/2015 07:38:00 AM
Wednesday, August 12, 2015
My Bet on Which Foreign Government Will Release Hillary's Emails: China, Russia, Israel, or North Korea?
The first foreign government to release them in their entirety wins a massive PR prize. So who will it be. Or, playing on my "Hu's on first" routine (see it here), Hu will be it.
Posted by Destroying Angel at 8/12/2015 11:47:00 AM
Friday, August 7, 2015
Who would have thought that just one day after I predicted Russia was up to something, based upon simple data exhaust on my blog viewership, that those pesky scamps would make headlines for their attack on the Joint Chiefs of Staff emails (see the Computerworld story here)?
Posted by Destroying Angel at 8/07/2015 08:05:00 AM