This Is What I Think.
Sunday, June 21, 2015
"Remarks Before the Indian Parliament"
http://www.britannica.com/biography/Jeane-L-Pinckert-Dixon
Encyclopædia Britannica
Jeane L. Pinckert Dixon
(b. Jan. 5, 1918--d. Jan. 25, 1997)
http://www.nytimes.com/2015/06/21/us/attack-gave-chinese-hackers-privileged-access-to-us-systems.html?partner=EXCITE&ei=5043&_r=0
The New York Times
Attack Gave Chinese Hackers Privileged Access to U.S. Systems
By DAVID E. SANGER, NICOLE PERLROTH and MICHAEL D. SHEAR JUNE 20, 2015
WASHINGTON — For more than five years, American intelligence agencies followed several groups of Chinese hackers who were systematically draining information from defense contractors, energy firms and electronics makers, their targets shifting to fit Beijing’s latest economic priorities.
But last summer, officials lost the trail as some of the hackers changed focus again, burrowing deep into United States government computer systems that contain vast troves of personnel data, according to American officials briefed on a federal investigation into the attack and private security experts.
Undetected for nearly a year, the Chinese intruders executed a sophisticated attack that gave them “administrator privileges” into the computer networks at the Office of Personnel Management, mimicking the credentials of people who run the agency’s systems, two senior administration officials said. The hackers began siphoning out a rush of data after constructing what amounted to an electronic pipeline that led back to China, investigators told Congress last week in classified briefings.
Much of the personnel data had been stored in the lightly protected systems of the Department of the Interior, because it had cheap, available space for digital data storage. The hackers’ ultimate target: the one million or so federal employees and contractors who have filled out a form known as SF 86, which is stored in a different computer bank and details personal, financial and medical histories for anyone seeking a security clearance.
“This was classic espionage, just on a scale we’ve never seen before from a traditional adversary,” one senior administration official said. “And it’s not a satisfactory answer to say, ‘We found it and stopped it,’ when we should have seen it coming years ago.”
The administration is urgently working to determine what other agencies are storing similarly sensitive information with weak protections. Officials would not identify their top concerns, but an audit issued early last year, before the Chinese attacks, harshly criticized lax security at the Internal Revenue Service, the Nuclear Regulatory Commission, the Energy Department, the Securities and Exchange Commission — and the Department of Homeland Security, which has responsibility for securing the nation’s critical networks.
At the Nuclear Regulatory Commission, which regulates nuclear facilities, information about crucial components was left on unsecured network drives, and the agency lost track of laptops with critical data.
Computers at the I.R.S. allowed employees to use weak passwords like “password.” One report detailed 7,329 “potential vulnerabilities” because software patches had not been installed. Auditors at the Department of Education, which stores information from millions of student loan applicants, were able to connect “rogue” computers and hardware to the network without being noticed. And at the Securities and Exchange Commission, part of the network had no firewall or intrusion protection for months.
“We are not where we need to be in terms of federal cybersecurity,” said Lisa Monaco, President Obama’s homeland security adviser. At an Aspen Institute conference in Washington on Tuesday, she blamed outofdate “legacy systems” that have not been updated for a modern, networked world where remote access is routine. The systems are not continuously monitored to know who is online, and what kind of data they are shipping out.
In congressional testimony and in interviews, officials investigating the breach at the personnel office have struggled to explain why the defenses were so poor for so long. Last week, the office’s director, Katherine Archuleta, stumbled through a twohour congressional hearing. She was unable to say why the agency did not follow through on inspector general reports, dating back to 2010, that found severe security lapses and recommended shutting down systems with security clearance data.
When she failed to explain why much of the information in the system was not encrypted — something that is standard today on iPhones, for example — Representative Stephen F. Lynch, a Massachusetts Democrat who usually supports Mr. Obama’s initiatives, snapped at her. “I wish that you were as strenuous and hardworking at keeping information out of the hands of hackers,” he said, “as you are keeping information out of the hands of Congress and federal employees.”
Her performance in classified briefings also frustrated several lawmakers. “I don’t get the sense at all they understand the problem,” said Representative Jim Langevin, a Rhode Island Democrat, who called for Ms. Archuleta’s resignation. “They seem like deer in the headlights.”
Josh Earnest, the White House spokesman, said on Wednesday that Mr. Obama remained confident that Ms. Archuleta “is the right person for the job.” Ms. Archuleta, who took office in November 2013, did not respond to a request for an interview.
But even some White House aides say a lack of focus by managers contributed to the security problems. It was not until early last year, as computer attacks began on United States Investigations Services, a private contractor that conducts security clearance interviews for the personnel office, that serious efforts to develop a strategic plan to seal up the agency’s many vulnerabilities started.
The attacks on the contractor “should have been a huge red flag,” said one senior military official who has reviewed the evidence of China’s involvement. “But it didn’t set off the alarms it should have.”
Federal and private investigators piecing together the attacks now say they believe the same groups responsible for the attacks on the personnel office and the contractor had previously intruded on computer networks at health insurance companies, notably Anthem Inc. and Premera Blue Cross.
What those attacks had in common was the theft of millions of pieces of valuable personal data — including Social Security numbers — that have never shown up on black markets, where such information can fetch a high price. That could be an indicator of state sponsorship, according to James A. Lewis, a cybersecurity expert at the Center for Strategic and International Studies.
But federal investigators, who like other officials would not speak on the record about a continuing inquiry, said the exact affiliation between the hackers and the Chinese government was not fully understood. Their tools and techniques, though, were easily identifiable to intelligence analysts and the security researchers who have been analyzing the breaches at the insurers and the Office of Personnel Management. Federal officials believe several groups were involved, though some security experts only detected one.
“Since mid2014, we have observed a threat group target valuable ‘personally identifiable information’ from multiple organizations in the health care insurance and travel industries,” said Mike Oppenheim, the manager of threat intelligence at FireEye, a cybersecurity company. “We believe this group is behind the O.P.M. breach and have tracked this group’s activities since early 2013.”
But he argued that “unlike other actors operating from China who conduct industrial espionage, take intellectual property or steal defense technology, this group has primarily targeted information that would enable it to build a database of Americans, with a likely focus on diplomats, intelligence operatives and those with business in China.”
While Mr. Obama publicly named North Korea as the country that attacked Sony Pictures Entertainment last year, he and his aides have described the Chinese hackers in the government records case only to members of Congress in classified hearings. Blaming the Chinese in public could affect cooperation on limiting the Iranian nuclear program and tensions with China’s Asian neighbors. But the subject is bound to come up this week when senior Chinese officials meet in Washington for an annual strategic and economic dialogue.
Though their targets have changed over time, the hackers’ digital fingerprints stayed much the same. That allowed analysts at the National Security Agency and the F.B.I. to periodically catch glimpses of their movements as they breached an ever more diverse array of computer networks.
Yet there is no indication that the personnel office realized that it had become a Chinese target for almost a year. Donna K. Seymour, the chief information officer, said the agency put together last year “a very progressive, proactive plan that allowed us to see the adversarial activity,” and argued that “had we not been on that path, we may never have seen anything” this spring. She cautioned, “There is no one security tool that is a panacea.”
A congressional report issued in February 2014 by the Republican staff of the Senate Homeland Security Committee, concluded that multiple federal agencies with responsibility for critical infrastructure and holding vast amounts of information “continue to leave themselves vulnerable, often by failing to take the most basic steps towards securing their systems and information.”
The report reserves its harshest criticism for the repeated failures of agency officials to take steps — some of them very basic — that would help thwart cyberattacks.
Computers at the Department of Homeland Security, which is charged with protecting the nation’s public infrastructure, contained hundreds of vulnerabilities as recently as 2010, according to authors of the report. They said computer security failures remained across agencies even though the government has spent “at least $65 billion” since 2006 on protective measures.
At the personnel office, a set of new intrusion tools used on the system set off an alarm in March, Ms. Seymour said. The F.B.I. and the United States Computer Emergency Response Team, which works on network intrusions, found evidence that the hackers had obtained the credentials used by people who run the computer systems. Ms. Seymour would say only that the hackers got “privileged user access.” The administration is still trying to determine how many of the SF86 national security forms — which include information that could be useful for anyone seeking to identify or recruit an American intelligence agent, nuclear weapons engineer or vulnerable diplomat — had been stolen.
“They are casting a very wide net,” John Hultquist, a senior manager of cyberespionage threat intelligence at iSight Partners, said of the hackers targeting of Americans’ personal data. “We’re in a new space here and we don’t entirely know what they’re trying to do with it.”
https://en.wikipedia.org/wiki/James_A._Winnefeld,_Jr.
James A. Winnefeld, Jr.
From Wikipedia, the free encyclopedia
James Alexander "Sandy" Winnefeld, Jr. (born April 24, 1956) is a United States Navy Admiral who currently serves as the ninth Vice Chairman of the Joint Chiefs of Staff.
September 11 attacks
Winnefeld was the commanding officer of the USS Enterprise during the September 11 attacks. The USS Enterprise was headed to Cape Town, South Africa, for one last port call before returning home after a six-month deployment near the Persian Gulf. The crew was watching television at sea on September 11th and watched the hijacked United Airlines Flight 175 airliner strike the south tower of the World Trade Center. Acting without authorization from the National Command Authority, then-Captain Winnefeld gave the order to put the ship's rudder over (180° degree turn) to take station in the Arabian Sea.
http://www.stripes.com/polopoly_fs/1.33031.1273614760!/image/3611888725.jpg_gen/derivatives/landscape_804/3611888725.jpg
From 12/25/1971 ( George Walker Bush the purveyor of illegal drugs strictly for his personal profit including the trafficking of massive amounts of cocaine into the United States confined to federal prison in Mexico for illegally smuggling narcotics in Mexico ) To 3/19/2003 is 11407 days
From 11/2/1965 ( my birth date in Antlers Oklahoma USA and my birthdate as the known official United States Marshal Kerry Wayne Burgess and active duty United States Marine Corps officer ) To 1/25/1997 ( Jeane Dixon deceased ) is 11407 days
From 1/17/1991 ( the date of record of my United States Navy Medal of Honor as Kerry Wayne Burgess chief warrant officer United States Marine Corps circa 1991 also known as Matthew Kline for official duty and also known as Wayne Newman for official duty ) To 3/19/2003 is 4444 days
From 11/2/1965 ( my birth date in Antlers Oklahoma USA and my birthdate as the known official United States Marshal Kerry Wayne Burgess and active duty United States Marine Corps officer ) To 1/2/1978 ( Jimmy Carter - New Delhi, India Remarks Before the Indian Parliament ) is 4444 days
From 1/17/1991 ( RACKETEER INFLUENCED AND CORRUPT ORGANIZATIONS US Title 18 - the Persian Gulf War begins as scheduled severe criminal activity against the United States of America ) To 3/19/2003 is 4444 days
From 11/2/1965 ( my birth date in Antlers Oklahoma USA and my birthdate as the known official United States Marshal Kerry Wayne Burgess and active duty United States Marine Corps officer ) To 1/2/1978 ( Jimmy Carter - New Delhi, India Remarks Before the Indian Parliament ) is 4444 days
From 5/14/1992 ( as Kerry Wayne Burgess the United States Marine Corps chief warrant officer circa 1992 and United States chief test pilot I performed the first flight of the US Army and Boeing AH-64D Apache Longbow ) To 3/19/2003 is 3961 days
From 11/2/1965 ( my birth date in Antlers Oklahoma USA and my birthdate as the known official United States Marshal Kerry Wayne Burgess and active duty United States Marine Corps officer ) To 9/6/1976 ( Viktor Belenko of the Soviet Union defects to the West landing in Japan with the Soviet Union MiG-25 FoxBat he was flying as pilot ) is 3961 days
http://archives.seattletimes.nwsource.com/cgi-bin/texis.cgi/web/vortex/display?slug=kay20&date=20030320&query=iraq+explosions
Local News: Thursday, March 20, 2003
Kay McFadden / Times staff columnist
The media got it fast, got it right
It may not have been the "shock-and-awe" show promised by United States forces poised to invade Iraq.
But to anyone watching television, the swiftness with which yesterday's airstrike in Baghdad was executed, disseminated and explained was a heck of a dress rehearsal.
The White House and news organizations worked in well-oiled tandem. The time elapsed from when the bombing run took place to when anchors were correctly summarizing it — barely a half-hour — gave new meaning to the concept of a fast news cycle.
News that air-raid sirens were sounding over Baghdad broke at 6:37 p.m. Pacific Standard Time and 5:37 a.m. in Iraq.
http://articles.latimes.com/2003/mar/20/news/war-iraq20A
Los Angeles Times
War with Iraq / Initial Assault
US Attacks Iraq
War to Oust Hussein Begins With Airstrikes
March 20, 2003 John Daniszewski and Edwin Chen Times Staff Writers
The United States launched a thundering bomb and missile attack on Baghdad at dawn today, targeting senior government leaders in what could become all-out war to drive Saddam Hussein from power and disarm Iraq.
Air raid sirens blared, and yellow-and-white tracers from Iraqi antiaircraft fire streaked across the city. Several large explosions rocked the capital, and a ball of fire flared in the southern sky. As the sun rose higher, street lights flickered out and the city fell into a ghostly silence.
"The opening stages of the disarmament of the Iraqi regime have begun," White House spokesman Ari Fleischer declared shortly after 9:30 p.m. Wednesday in Washington, or 5:30 a.m. in Baghdad. Forty-five minutes later, President Bush told the American people that he had ordered coalition forces to strike "selected targets of military importance" in Iraq.
http://www.presidency.ucsb.edu/ws/index.php?pid=63368
The American Presidency Project
George W. Bush [ RACKETEER INFLUENCED AND CORRUPT ORGANIZATIONS US Title 18 ]
XLIII President of the United States: 2001 - 2009 [ RACKETEER INFLUENCED AND CORRUPT ORGANIZATIONS US Title 18 ]
Address to the Nation on Iraq [ RACKETEER INFLUENCED AND CORRUPT ORGANIZATIONS US Title 18 ]
March 19, 2003
My fellow citizens, at this hour, American and coalition forces are in the early stages of military operations to disarm Iraq, to free its people, and to defend the world from grave danger.
On my orders, coalition forces have begun striking selected targets of military importance to undermine Saddam Hussein's ability to wage war. These are opening stages of what will be a broad and concerted campaign. More than 35 countries are giving crucial support, from the use of naval and air bases, to help with intelligence and logistics, to the deployment of combat units. Every nation in this coalition has chosen to bear the duty and share the honor of serving in our common defense.
To all the men and women of the United States Armed Forces now in the Middle East, the peace of a troubled world and the hopes of an oppressed people now depend on you.
http://www.presidency.ucsb.edu/ws/index.php?pid=30623
The American Presidency Project
Jimmy Carter
XXXIX President of the United States: 1977 - 1981
New Delhi, India Remarks Before the Indian Parliament.
January 2, 1978
http://www.washingtonpost.com/wp-dyn/articles/A32281-2005Mar13.html
Monday, March 14, 2005; Page C01
At a town meeting in Little Rock last month, Bush was joined onstage by Gloria Bennett, a part-time food inspector.
"I'm from De Queen, Arkansas," she told the president.
"That," Bush replied, nodding, "is right next to De King."
http://www.azlyrics.com/lyrics/greenday/americanidiot.html
AZ
GREEN DAY
"American Idiot"
Don't wanna be an American idiot.
Don't want a nation under the new mania
And can you hear the sound of hysteria?
The subliminal mind fuck America.
Welcome to a new kind of tension.
All across the alienation.
Where everything isn't meant to be okay.
Television dreams of tomorrow.
We're not the ones who're meant to follow.
For that's enough to argue.
Well maybe I'm the faggot America.
I'm not a part of a redneck agenda.
Now everybody do the propaganda.
And sing along to the age of paranoia.
Welcome to a new kind of tension.
All across the alienation.
Where everything isn't meant to be okay.
Television dreams of tomorrow.
We're not the ones who're meant to follow.
For that's enough to argue.
Don't want to be an American idiot.
One nation controlled by the media.
Information age of hysteria.
It's calling out to idiot America.
Welcome to a new kind of tension.
All across the alienation.
Where everything isn't meant to be okay.
Television dreams of tomorrow.
We're not the ones who're meant to follow.
For that's enough to argue.
http://archives.seattletimes.nwsource.com/cgi-bin/texis.cgi/web/vortex/display?slug=webrumsfeld08&date=20061108&query=rumsfeld
Nation & World: Wednesday, November 08, 2006
By The Associated Press
Bush seemed stoic about the election, proclaiming: "This isn't my first rodeo."
http://www.imdb.com/title/tt0059309/quotes
IMDb
In Harm's Way (1965)
Quotes
Admiral Kimmel: It is my duty to inform you that you have been relieved of your command, pending the findings of a court of inquiry.
Captain Torrey: I don't understand, sir.
Admiral Kimmel: You weren't zig-zagging when you took the two torpedoes.
Captain Torrey: I was stretching my fuel, sir.
Admiral Kimmel: If you didn't have fuel to complete your mission, why didn't you turn back for Pearl?
Captain Torrey: My mission was to intercept and engage an enemy of greatly superior strength, sir. I could only take that one way: that my group was expendable.
Admiral Kimmel: I doubt if a court of inquiry will accept that. Captain, you're about to be caught in a vacuum between a peacetime Navy and a wartime Navy. Six months from now, they'll be making admirals out of captains who exhibit some guts. But right now, they're only reacting to the Pearl Harbor disaster, and punishment is order-of-the-day. Of course, you don't have to abide by what a court of inquiry decides. You can ask for general court-martial, get yourself a couple of crack sea lawyers, and make a fight of it.
Captain Torrey: I wouldn't care to do that, sir.
Admiral Kimmel: Why not?
Captain Torrey: Second-generation Navy, Admiral.
Admiral Kimmel: I see. I don't plan to ask for court-martial either, Captain, and I've lost a fleet. So I expect we'll both just take what they give us, and trust it will be a useful job somewhere.
- posted by H.V.O.M - Kerry Wayne Burgess 1:37 PM Pacific Time Spokane Valley Washington USA Sunday 21 June 2015