Stealing The U.S. Election

Media POW.jpeg

So I’ve never seen anything quite like this before.


The liberal media is completely trying to destroy Trump, and this is a true crisis of democracy.


They are jumping on him like a gang of bandits, ruthlessly punching and kicking him into the pavement, while reveling in the ascendancy of their absolutely do no wrong Queen of the 2nd Impeached President of The United States of America.


The saying that all publicity is good publicity, has now been proved totally false!


Sure, does Trump have a big mouth and say stupid and offensive things, absolutely.


Is it possible that the guy is flawed, but really doesn’t mean it the way it comes out, as awful as it does?


Never-the-less, the power elite behind the Hillary machine have seized on these things to label him a fascist, racist, Nazi, demagogue, black soul, evil, and even today in the respected Wall Street Journal, a sociopath


(Hopefully the stupidity of the people saying these wild-a*s things is forgiven, so G-d forbid one day we shouldn’t have a candidate who really is like that!)


On Sunday, in the New York Times Review Section, it is not uncommon to find 3 articles on a single page dumping on Trump and almost the entire section dedicated to his downfall. 


And of course, this treatment of one candidate, Trump, is not over-the-top at all, and completely fair and balanced thinking and coverage (sarcastic), as we wholly forgive Hillary for (alleged) lying, collusion, corruption, foundation money laundering voter rigging, and year after year of failed global policies (anyone out there been following that 80% of the people are dissatisfied with the direction of this magnificient nation). 


Add to that the murder-suicides of dozens of people associated with the Clinton’s from Vince Foster in the Whitewater scandal to the killing of DNC staffer, Seth Rich, out of the blue just last month in DC. 


Now let me say right out that I am the first one to condemn Trump’s outrageous and off-the-cuff statements about a disabled reporter, a POW Senator, and the the Muslim parents of a fallen soldier–yes, these are truly despicable and stupid things. 


But yet, when I watch the tapes and hear the guy speak, I think that very possibly he is just a huge, nutty-type of eccentric, like these very rich people, under the covers, tend to be. 


I think his mouth gets away from his brain, and yes while this is obviously not a good thing for an ostentatious Presidential candidate, why has the opposition been so successful at completely demonizing the guy (and don’t just say that he did it to himself) and giving a bright shiny nickle to the other candidate?


Is saying stupid things (even very stupid and grossly offensive things) really the equivalent of being a Nazi and sociopath–and is he truly worse than someone involved in lying, collusion, corruption, and global leadership failures that literally can threaten our nation’s security and take us down a path of true global disorder (how’s that relationship with the powerful Russians, Chinese, Iranians, and North Korea as well as the state of unabated worldwide terrorism doing these days)?


The left, including many prominent media outlets, have jumped on the band-wagon to label the opposition and they have been unrelenting and ruthless at destroying only one of the candidates, Trump, while they continue to give Hillary more or less of a free pass–does anyone wonder about this? 


Rather than a fascist candidate, maybe what we really have is an an outrageous attempt at a fascist election system!


I wonder whether the people supporting this ones-sided narrative and single party election will come to regret their boundless political wisdom, hard and fast professional assessments, and vicious character assassinations, once we are well into the next term of President. 


What will the pundits and media say when the economic bubble tears, when major terrorism strikes big and bad, when global upheaval dangerously spreads, and all we get is more spin, deception, inaction, and leadership from behind–are you so sure that is better than a candidate with a big mouth, but also who can build big skyscrapers and skylines over a new horizon for this country? 


Will the pundits, media echo chamber, and the elites absolutely forcing Hillary to the top have a reckoning of thinking and conscience, with their air of puffery knocked out of them–will they have the presence of mind to question for a moment their choice of a candidate with a life-filled of scandal over a big-mouth, clumsy New York billionaire builder. 


Finally, when one thinks of insane and evil, aren’t the activities that Hillary is accused of exactly those. 


Perhaps this is truly the crooked pot calling the big mouth kettle black, and the biggest election coup and voter fraud taking place right under your mightily socially engineered noses. 


(Source Photo: Andy Blumenthal)

What The Pope Knows That Our Leadership Doesn’t

Crushed Trophy.jpeg

In response to the deluge of terrorist attacks across Europe, but also all around the world, culminating this week in the murder of an 85-year old Christian priest in France (his throat was slit in church by ISIS), the pope said the following:

The world is at war, because we have lost the peace.”

But at the same time, our leader is self-congratulating himself, declaring his next in line for the Pennsylvania Avenue throne, and mocking the daily terror threats we face, calling ISIS the “JV [junior varsity] team” declaring them “not an existential threat, and insisting “no boots on the ground.” 

From the attacks on 9/11 to Orlando and Fort Hood, from the attacks on Charlie Hebdo to Paris and Nice, from the multiple attacks on Germany this past week to those in Belgium in March, from the Madrid train bombing in 2004 to the London bombing in 2005, to the daily terrorist attacks throughout the Holy Land of Israel, and the non-stop violent killing of  millions around the Arab countries of the Middle East, North Africa, Asia and beyond, I ask:

Why is the Pope better informed than our leadership, and who will fight for us? 😉

(Source Photo: Andy Blumenthal)

{{{Democracy BERNS}}}

Fire Extinguishers

There is a fire that even these many fire extinguishers cannot put out, because it is our very democracy that is under attack and aflame. 


If secrecy, lies, perjury, corruption, and end-runs around the law weren’t enough…now, we have the ultimate in democratic corruption.


Hacked emails from the Democratic Party show election rigging, collusion, and corruption at the highest levels


Emails document how DNC party officials questioned about:


“Whether they should raise doubts about the Sanders campaign.”


One senior official says:

“Wonder if there’s a good Bernie narrative for a story, which is that Bernie never had his act together, that his campaign is a mess.”


Another official stated:


“Does he believe in a G-d. He had skated as saying that he has a Jewish heritage. I think I read he is an atheist. This could make several points difference with my peeps [people].”


Even Sanders’ campaign manager said that the emails showed that party officials were:


“Planting negative stories about him with religious leaders in various states [to rig the election towards the former First Lady].”


This is a clear case of conspiracy–and I do not use this word lightly–where the election was being steered by a corruption-infected system towards a certain candidate denying the actual will of the people and their rightful candidate choice.


Ah, so much for a fair and just democracy.


The Democratic National Convention starts on Monday, and it looks like they will be celebrating their corruption not only in terms of a system rigged with superdelegates, but where collusion and political narrative thrive and the political opposition, Bernie Sanders, never even had any chance, let alone a fair and democratic one. 


Where is the accountability of these officials–are they too above the law as is their candidate.


No candidate for election should have a tacit nod of consent and support from officials and definitely should not be put in place when not in line with the will of the people!


We do not live in a dictatorship, in totalitarianism, in fascism–or perhaps, we most sadly do. 


It is incredible hypocrisy that we send election monitors around the globe to police and ensure fair elections, but here at home, we can’t seem to effectively police our own system for fairness. 


The election for president in the exemplary democracy of the world, the U.S.A, should not have the powerful, the elites, the 1%, control who is elected to office.


The situation has gone from bad to worse with serious allegations of:

– Vanishing global moral “red lines” 

– Shady deals with our sworn “Death To America” enemies

– Laughter at murderous terrorist attacks

– Shutting of the eyes at the killing of police officers

– Money-laundering from private foundations

– Private servers exposing state secrets

– Election rigging


These are a treachery and a desertion of our very democracy, and unfortunately the fire of corruption is still burning in our beloved America while the convention just begins. 😉


(Source Photo: Andy Blumenthal)

A Winning Letter

Winner

So everyone with management responsibility whether in business or government gets their share of sales calls. 


People are competing to get their “foot in the door” and at the same time not get the “door in the face” to do business and of course make money–it’s called capitalism and “it’s the American way!”


Most of the time, managers don’t have time to respond to all the calls they get. 


But this week, I received the most brilliant introductory letter from a 26-year old in technology services. 


I think it’s important to share from this, because it’s really the best I ever received from anyone looking to make a contact. 


First, the letter is handwritten, which right away made it more personal and so got my attention in the first place to even read it. 


Second, the person mentions some things that they know and like about me–demonstrating that they did their homework and was also subtly ingratiating about it, but not seemingly in a b.s. or over the top way.


Third, the person shows flexibility to any venue to get an opportunity to touch base (along with a sense of humor throughout), “over lunch, coffee, water, a warm glass of milk, etc.”


Fourth, the specifics of what he’s looking for…”I want to ensure I stay ahead of the curve. I am thinking you can provide some great knowledge.” Elaborating later in his letter, he says, “what keeps you up at night, what will keep you up tomorrow and how will you overcome it.”


Fifth, he tries to make it a win-win for a meeting and says what he can bring to the table…”Well, I can tell funny stories from my weekend, my budget to buy a Tesla one day or my engagements with other gov’t agencies. You pick!”


Sixth, he provides a form of disclosure with a sense of trustworthiness saying, “I am in sales. However that is not my objective with you so I promise not to sell sh*t.”  


Seventh, he works to connect to me personally again by referencing a funny blog I wrote about ties, and he says, “I promise not to wear a tie–I hate them too.”


Eighth, he frames this cold call as completely casual, offering again to “steal some time…[or] if not I understand.”


Ninth, leaving it open to get back with him, he writes, “Feel free to email, call, tweet, or carrier pigeon me.”


Tenth, he wishes me well, “Take care Andy”, and he signs it and includes his business card. 


My reaction is that this is either a young and brilliant salesperson seeking legitimately to network, learn, and make some possible future opportunity inroads unknown.  


OR


Of course, if I think more from a operational security (OpSec) and security awareness training perspective, I could be concerned about some smart “social engineering” going on here, but that wasn’t the feeling I got from this. 


My gut thinks this is one highly motivated and intelligent young man creatively getting into his profession, and I must say, it was impressively done. 😉


(Source Photo: Andy Blumenthal)

We’re Giving It All Away

Nice little video from Mandiant on “The anatomy of a cyber attack.”

Despite the typical firewalls, antivirus, and intrusion detection system, cyber attacks can and do penetrate your systems.

This happens through social engineering (including phishing attempts), automated spam, and zero-day exploits.

Once inside your network, the cyber attacker takes command and control of your computers, surveys your assets, steals user names and passwords, hijacks programs, and accesses valuable intellectual property.

Mandiant performs security incident response management (detecting breaches, containing it, and helping recovery efforts), and they are known for their report “APT1” (2013) exposing an alleged significant government-sponsored cyber espionage group that they state “has systematically stolen hundreds of terabytes of data from at least 141 organizations.”

Another fascinating report on a similar topic of advanced persistent threats was done by McAfee on Operation Shady Rat (2011) that reveals over 70 organizations (governments, commercial entities, and more) that were targeted over 5 years and had terabytes of information siphoned off.

The overall risk from cyber espionage is high and the McAfee report states:

– “Every company in every conceivable industry with significant size and valuable intellectual property and trade secrets has been compromised (or will be shortly), with the great majority of the victims rarely discovering the intrusion or its impact.”

– “What we have witnessed…has been nothing short of a historically unprecedented transfer of [intellectual] wealth – closely guarded national secrets…disappeared in the ever-growing electronic archived of dogged adversaries.”

In short we can’t keep a secret–we’re putting endless gobs and gobs of our information online and are not adequately protecting it in cyberspace, with the result that our adversaries are able to access, exfiltrate, disclose, modify, or destroy it.

In short, we’re giving it all away – why?

Remodulate The Shields For Cyber Security

I really like the concept for Cyber Security by Shape Security.

They have an appliance called a ShapeShifter that uses polymorphism to constantly change a website’s code in order to prevent scripted botnet attacks–even as the web pages themselves maintain their look and feel.

In essence they make the site a moving target, rather than a sitting duck.

This is like Star Trek’s modulating shield frequencies that would prevent enemies from obtaining the frequency of the shield emitters so they could then modify their weapons to bypass the shield and get in a deadly attack.

In real life, as hackers readily change their malware, attack vectors, and social engineering tactics, we need to be agile and adapt faster than the enemy to thwart them.

Changing defense tactics has also been used by agencies like Homeland Security to alter screening methods and throw potential terrorists off from a routine that could be more easily overcome.

I think the future of IT Security really lies in the shapeshifter strategy, where the enemy can’t easily penetrate our defenses, because we’re moving so fast that they can’t even find our vulnerabilities and design an effective attack before we change it and up our game again.

And hence, the evil Borg will be vanquished… 😉

Learning IT Security By Consequences

This is a brilliant little video on IT Security.

What I like about it is that it doesn’t just tell you what not to do to stay safe, but rather it shows you the consequences of not doing the right things.

Whether you are letting someone into your office, allowing them borrow your badge, leaving your computer unsecured, posting your passwords, and more–this short animated video shows you how these vulnerabilities will be exploited.

It is also effective how they show “Larry” doing these security no-no’s with signs everywhere saying don’t do this.

Finally, the video does a nice job summing up key points at the end to reinforce what you learned.

I think that while this is simpler than many longer and more detailed security videos that I have seen, in a way it is more successful in delivering the message in a practical, down-to-earth approach that anyone can quickly learn core basic practices from.

Moreover, this video could be expanded to teach additional useful IT security tips, such as password strengthening, social engineering, and much more.

I believe that even Larry, the unsuspecting office guy, can learn his lesson here. 😉

(Note: This is not an endorsement of any product or service.)