Review (Publisher): Corporate Crime and Punishment: The Crisis of Underenforcement

In the early 2000s, federal enforcement efforts sent white collar criminals at Enron and WorldCom to prison. But since the 2008 financial collapse, this famously hasn’t happened. Corporations have been permitted to enter into deferred prosecution agreements and avoid criminal convictions, in part due to a mistaken assumption that leniency would encourage cooperation and because …

Review: In Search of Gold – Recovery of Yamashita”s Gold [in the Philippines]

5 Star – Riveting First Person Account I know the author personally, and was introduced to him by Sterling Seagrave (RIP), whom I also knew personally. Sterling was for me the top chronicler of Asian history both sordid and splendid. One of his books (linked below) that comes with three CDs of maps, photos, and …

Review: Capitol Hill’s Criminal Underground – The Most Thorough Exploration of Government Corruption Ever Put in Writing – Trillions of Dollars Stolen

5 Star – A Single Businessman Documents A Single Case This is not a typical book by a  typical author. This is a briefing by one very skilled businessman focused on one very specific case that indicts the Puerto Rican government and energy company, the FBI and DOJ, and the US Congress as well as …

Joachim Hagopian: Print Edition of Pedophilia & Empire Book 1 Now on Sale

The Print Edition in Five Volumes Each volume is 8.5 x 11 full page size, with the footnotes displayed on the pages rather than as endnotes. Each book has its own index. This is a PhD-level reference work highly relevant to the campaign to take down  the Deep State and the Satanists, Pedophiles, & Secret …

Review (Guest): Google Archipelago – The Digital Gulag and the Simulation of Freedom

5 Star – Deep Look at New Form of Tyranny

Google Archipelago: The Digital Gulag and the Simulation of Freedom begins with familiar cultural politics as points of entry to the book’s theme regarding the reach, penetration, and soon the ubiquity of the digital world. In a book about enormous sea changes brought about by digital technology, Google Archipelago begins and ends with the political, in particular with the objectives of the Big Digi­tal conglomerates as global corporate monopoly capitalists or would-be-monopolies.

Google Archipelago argues that Big Digital technologies and their principals represent not only economic powerhouses but also new forms of governmental power. The technologies of Big Digital not only amplify, extend, and lend precision to the powers of the state, they may represent elements of a new corporate state power.

In contrast to academics who study digital media and bemoan such supposed horrors as digital exploitation, in Google Archipelago, Michael Rectenwald argues that the real danger posed by Big Digital is not digital capitalism as such, but leftist authoritarianism, a political outlook shared by academic leftists, who thus cannot recognize it in their object of study. Thus, while imagining that they are radical critics of Big Digital, academic digital media scholars (whom Rectenwald terms the digitalistas ) actually serve as ideological smokescreens that obscure its real character.

Two chapters interrupt the book’s genre as non-fiction prose. Part historical science fiction and part memoir, these chapters render the story of a Soviet Gu­lag survivor and defector, and the author’s earlier digital self. Google Archipelago intentionally blurs the lines between argument and story, fact and artifact, the real and the imaginary. This is necessary, Rectenwald argues, because one cannot pretend to describe the Google Archipelago as if from without, as something apart from experience. In any case, soon one will no longer go on the Internet. The Internet and cyberspace will be everywhere, while humans and other agents will be digital artifacts within it.

The Google Archipelago represents the coextension of digitization and physical social space, the conversion of social space and its inhabitants into digital artifacts, and the potential to control populations to degrees unimagined by the likes of Stalin, Hitler, or Mao.

Review: The Trigger – The Lie That Changed the World – Who Really Did It and Why

Amazon Page

5 Stars – Three Books in One — 9/11 Disclosure; Zionist Threat in Detail; and Role of Satanic Pedophilia as a Control Element

I cannot do this book justice in the way of a summary review as I did his most recent other book but as someone who has also published on 9/11 and taken a strong interest in the Zionist threat to the USA specifically and the world generally, I can certainly recommend this book most strongly after having gone through every page but not read every word.

At one level this is the most detailed book I have found that covers not just 9/11, but a variety of false flag operations and false narratives including the Oklahoma bombing and Waco. The criminality by the FBI and the Department of Justice that is detailed in this book could be used to bring indictments against a hundred or more serving or retired officers.

At a second level this is the most detailed book OTHER THAN the books by Kevin MacDonald, of how the Zionist threat to humanity actually grew and became the blob that ate the world.

At a third level this book does a good job but not as detailed a job on how the Zionists and the Deep State of which they are a part use pedophilia and blackmail as well as Satanic Ritual Abuse (SRA) inclusive of  torture (to get adrenochrome into the child’s blood before drinking it), blood drinking, and fetus and organ feasting.

The book is, if anything, too long at 897 pages, and its index is not as complete as it should be.  The author also missed most of the authoritative commentators on  9/11 that I included in my own volume, but in his favor, he has vastly more detail than our summary book for President Donald Trump, and a great deal of detail that I myself was NOT familiar with.

David Icke may be the single greatest truth-teller on the planet.  Certainly he is the most prolific, and I urge readers to visit my links below, in my 40-page summary review of his last book at 741 pages, I finish by linking to all of his books and videos.  If the Zionists are Goliath, this is one David that can take them down and should not be underestimated.

My regard for his mind and his patriotic commitment to the truth at any cost is deep and permanent.

See Especially:

Memoranda for the President on 9/11: Time for the Truth — False Flag Deep State Truth! UPDATE 17: Israel Did It

Review: Everything You Need to Know But Have Never Been Told by David Icke

See Also:

9/11 @ Phi Beta Iota

48 Zionist Strikes (Zionism is Not Judaism)

Review: Licensed to Lie – Exposing Corruption in the Department of Justice by Sidney Powell (Trump Revolution Book 41) with Mike Flynn As Current Victim of Unethical Prosecutors

Review: Analogue Network Security by Winn Schwartau

Amazon Page

Winn Schwartau

6 Stars – Foundation for IT & Web 3.0 Security

This is a Nobel-level piece of work that provides everything that Vint Cerf and Tim Berner-Lee failed to plan for. It exposes the IT industry for the insecure naked posturing ponzi scheme that it is. Winn recommends, and I agree, Norbert Weiner’s Cybernetics as his own inspiration.  I would rate Winn’s contribution at this time as the equal of Weiner’s radical break-out book but would add Peter Corning’s 2009 book on Holistic Darwinism, and others that can be found at the link for Cybernetics @ Phi Beta Iota. Winn’s focus is on improving the security of online information, not on improving the collection, processing, and sharing of substantive intelligence (decision-support) across all subject matter domains.

I have known Winn Schwartau since we co-founded InfoWarCon under his leadership — I  dropped out early to focus on my own event focused on Open Source Intelligence (OSINT) — and have always been delighted that Winn was one of the three co-authors with me of the first warning letter to the White House in 1994 on cyber-vulnerabilities (afterhis  being the first to brief Congress on the inevitable “electronic Pearl Harbor”).

Steele, Robert with James Anderson, William Caelli, and Winn Schwartau, “Correspondence, Sounding the Alarm on Cyber Security,” McLean, VA: Open Source Solutions, Inc., August 23, 1994.

Winn — who gives credit in this book to Bob Ayers on one end (1995) and Mark Carney (the math, 2018) on the other end– is the Top Gun on this topic, and has the patents in hand to execute. What is NEW is that his ideas are fully documented with mathematical proofs of viability and value,  and the book is a work of art with images and graphics and overall composition worthy of being placed in the Smithsonian just as Winn himself should one day be featured at Madame Tussauds (the wax museum not the whorehouse).

I recommend this book for corporate leaders who need to know just how vulnerable they are not being told they are; for IT managers that might wish to get it right; for insurance companies that might wish to radically improve their odds of avoiding catastrophic losses because their definition of “due diligence” is retarded; and for faculty, students, and wonks, who would like to avoid a total meltdown of the 21st Century’s infosphere. The hackers and crackers already get all this — they get in and out in seconds, hours, days, while IT “security” focuses on ineffective protection and leaves detection and reaction to days, weeks, and months. Time is not only a strategic variable (it cannot be bought nor replaced) it is a tactical variable — if  the attacker works in seconds and you work in any longer span, you are lost and will remain lost.

The book can be read in an afternoon but will reward subsequent readings. This review is an executive summary, but no substitute for most extraordinary composition I have read in this field since I was a co-founder of CIA’s Artificial Intelligence Staff in 1986, and then the Marine Corps Intelligence Activity (MCIA) and the modern discipline of Open Source Intelligence (OSINT) in 1988. Paul Strassman in Information PayOff spoke to the failure of digital delivery in relation to books when considering hand-eye coordination and the physical manifestation of the knowledge.

This is three books in one — the core common sense ideas that are indiputably an indictment of the IT industry today as well as all corporate CEOs tolerating a retarded ineffective security paradigm; an extraordinary museum-quality integration of graphics and photographs and design that is out of this world; and mathematical formulas and charts that leave me cold but will impress the geeks.  All that matters for me is that I trust Winn to be right, 100%.

I learn in passing that he grew up with Richard Stallman, one of my other heroes and the founder of the Free/Libre/Open Source Software (FLOSS), movement, Richard and I have come up together, I founded OSINT at the same time that he was pioneering GNU and founding the Free Software Foundation.

Let me start by honoring Robert Garigue, whom Winn and I both admired deeply and whose work continues to be fundamental despite his early demise. Robert and I created the below graphic in 1997 and could never get our respective governments to understand  that they were doing it all wrong and needed to kill centralized security, what Winn calls “root” and completely redesign how we embed security in the actual data.

Click on Image to Enlarge

Note especially Access based on Role, Tribe, TIME, & Place. Security is contextual.  Winn gets this, I get this, most people do NOT get this because they are lazy and are not held accountable for real-time and near-real-time digital security including monitoring of the human gatekeepers that are too easily social engineered.  Side note: when Winn and I spoke at Hackers on Planet Earth (HOPE) in 1994, a hacker on an open speaker phone social engineered the phone company’s technical support element into giving them root access, in front of a plenary standing room only crowd with the phone company vice president in the front row. The hacker introduced himself to the phone company data tech as Dave from the Department of Social Engineering.  Nothing has changed in all these years.

Core Point: Everyone is building Maginot Line fixed defenses and not focusing on the need to do real-time and near-real-time detection and reaction. The industry standard is still in the daily to weekly audit trail review. The harm that can be done in a fraction of the time before stakeholders notice the break and entry is colossal.

Core Point: Two-Man Rule over root changes (before we can get rid of root) radically increases security.  However, trust is contextual, changes at the individual level depending on task and timing, and the more people have any kind of root admin authority, the more likely the  system is to collapse.

Core Point: security companies are not guaranteeing their products; are not providing time-based efficacy certifications; and even at the accepted failure rate, are allowing thousands of forbidden accesses and dangerous phishing links into every major system every single day.

Core Point: security evolves much more slowly than the hardware and software it is supposed to be protecting.

QUOTE (12): For all practical purposes our approach to computer and network security has been static and limiting.

To which I would add, and not in the least bit accountable.

Winn identifies nine qualities of effective network security on pages 18-19: simplicity, utlity, scalable, measurable, quantifiable, provable, supports management, brings risk to the  table, adds value.

Core Point: each aspect of security done in depth and breadth BUYS TIME to DETECT and REACT.

QUOTE (38): if the measured time afforded to me by a protection device is greater than the amount of time it takes to direct and respond to (repair, halt) an attack, then I have a secure environment.

Core Point that I remember discussing in the 1990’s: it is insanely expensive and ineffective to apply security measures for the highest level of protection (e.g. TS/SCI) to ALL of the information (e.g unclassified).  At some point there needs to be a triage that sharply limits in an isolated separate network, that which is most sensitive.

To this I would add that almost everything that is TS/SCI is overly classified and largely worthless.  I still remember shredding all TS/SCI every morning as the S-1 Adjutant of Battalion Landing Team 3/4 (1976-1977) because there was nothing there of value to our battalion in that time and place. When I co-created the Marine Corps Intelligence Activity (MCIA) in 1988, same thing. The entire $100B US secret intelligence community could not provide what the Marine Corps needed in the way of strategic, operational, tactical, and technical intelligence (decision-support)  because a) they don’t cover the Third World shit holes where the Marines usually go and b) they could care less about defilade, 1:50K combat charts, and other essentials at the tactical level. As General Bob Scales has documented so ably in Firepower in Limited War, national and theater intelligence stink at supporting tactical fire and movement (and we will all remember Marty Hurwitz gutting tactical intelligence including collection assets to support his vision of centralized bureaucraticized theater intelligence).

Core Point: Automated responses only  work if you have pre-configured signatures.  The detection of new anomalies is a challenge.

Core Point:  Humans are not binary, computers should not be.  Trust and access and security are relative — contextual.

Core Point: Feedback matters.  Feedback can also perpetuate self-actualizing cognitive bias (e.g. fake news going viral).

QUOTE (125) : Feedback should be built-in as an architectural requirement in any dynamic system, such as data and control networks.  But it’s not.

Core Point: until you understand how much impact a single order of magnitude change in  time has, you cannot be effective in designing network security.

Core Point: Memristors will change everything.  Pages 136-137 are radical.

I have a note to myself, as the creator of the #UNRIG electoral reform project, that all of Winn’s thinking will be helpful to the creation of Instant Run-Off and National Polling applications that are desperately needed (they could also reinforce Thin Thread as created by  Bill Binney and associates).

QUOTE (142): The time-based approval and revocation model might bring measurable degrees of stability and equilibrium to code, networks, and security, as never before.

Core point: Trust can be measured, variations in trust matter, and trust can be managed. TIME & place and CONTEXT are essential trust variables.

If there is a flaw in this book it is the tacit assumption throughout that businesses are successful because they are optimizing information. In fact they are not. They are simply not being held accountable for integrating holistic analytics and true cost economics, which means they can pass on to the consumer — and future generations — the costs of all of their mistakes including climate change and water contamination.

Core Point: TCP/IP cannot be secured — it moves both control and data over the same line and is fragile to a fault. The author proposes a satellite based out of band control overlay, and accepts TCP/IP for all its flaws, as a given going forward.

QUOTE (185): Implementing ANS Out-of-bank (OOB) signaling and contrl paths that are isolated from each other does not require any modification to TCP/IP, or face the impossible task of replacing it.

Core Point: Ass detection processes should be continuously tested over time, not weekly, monthly, quarterly, or annually as now appears to be the case with most networks.

QUOTE (217): At the core of Analogue Network Security is measurement. As history has shown us, cybersecurity without metrics is a fool’s errand.

Core Point: Six Sigma sucks.  Not even close.

QUOTE (221): We are looking for efficacy that exceed Six Sigma Measure, Analyze, Design, Verify, OODA approach used so successfully by ICS-SCADA vendors such as GE, sometimes by a factor of 106, or more.

Core Point: Most networks have such a kludge of security applications at multiple levels that they have no idea how much capacity is being consumed. When new implementations fail, it is often because security has consumed more of the capacity than anyone realized, and the bandwidth simply is not there.

Core Point: Most organizations are not organized to respond in a  timely fashion to a detection.  This is particularly true after hours.

Core Point: All links, all attachments, without exception, need to be scrubbed for phishing hazards. An organization is inevitably going to ingest thousands of phishing links, and is as vulnerable as its stupidest or least attentive employee.

The author is too kind to  Facebook in his discussion of Fake News, and of course makes no mention of Facebook as a primary sponsor of censorship intended to deplatform those telling the truth or challenging official narratives. I continue to believe we need a national Computational Authority that can examine and certify all algorithms and block the manipulation of polls and searches that are so common under the pay to play system (Google search shows you want someone else has paid for you to see, not what is the best or most relevant result) and the Zionist censorship system managed by the Anti-Defamation League (ADL) for the Deep State.

QUOTE (243): Citing Dr. Gene Spafford: “TCP/IP was designed to be resilient under failure, not under attack.”

Core Point: We are forgetting that cyber is not an autonomous cloud — it depends very heavily on very specific undersea cables and routing centers — it depends heavily on physical wire.

Core Point: So many consumer devices — and their local ISPs — are being coopted for malware that a Big Fix is needed — something that integrates real-time testing and metrics as well as the real-time out of band information exchange that allows all ISPs to police one another and help one another contain the threat.

The conclusion of the book comes in several truly lovely bits and pieces that include a note from Dennis Groves of Open Web Application Security Project (OWASP);  a deep very special never before look at the mathematics of time-based security by Mark Carney; a security management porn primer (really); a nudge toward the policy-makers that are clueless; a short section on Speed of Signal; a detailed slam on Six Sigma; and a lovely reflection on the three domains of integrated security: physical, cyber, and human.  Short pieces on Artificial Intelligence, Hiring the Unhireable, and an ANS Design Tools Cheat Sheet complete the book. The latter is provided by the author for sharing PDF (8 Pages): Analogue Network Security Cheat Sheet.

This book is a collector’s item as well as an art & science object,  Paul’s Business Value of Computers is in some ways an extraordinary complement to this book when one keeps in mind that we are still all very retarded: we process 1% of what we collect, we collect 1% of what is published which is 1% of what is written which is 1% of what is known.  All this money we are spending on IT is mis-managed and not making much sense of 1% of 1% of 1% of 1% of 1%.  Duh.

Now imagine if we actually wanted to share multi-lingual, multi-media information across all boundaries, and particularly among China, Russia, and the USA? Imagine if we actually wanted to create a World Brain that respected individual, organizational, and national boundaries (i.e. China can censor what it wants but we do not let the Zionists censor anything)?  This is what that would look like, with all information in all languages being available ( within agreed upon anonymity, identity, privacy, and security parameters):

Click on Image to Enlarge

Core Point: the scale of comprehensive data digitization and sharing is EQUAL to the scale of time-based security as proposed by Winn.  Web 3.0 must be a double order of magnitude improvement over the TCP/IP Balkanization we have now.

Steele, Robert. “Augmented Intelligence with Human-Machine Integrity: Future-Oriented Hybrid Governance Integrating Holistic Analytics, True Cost Economics, and Open Source Everything Engineering (OSEE),” in Daniel Araya. Augmented Intelligence: Smart Systems and the Future of Work and Learning. Bern, CH: Peter Lang Publishing., 2018.

Steele, Robert. “Foreword,” in Stephen E. Arnold, CyberOSINT: Next Generation Information Access, Harrods Creek, KY: Arnold Information Technology, 2015.

I have known Winn since about 1992 when I first tried to force feed the US Government the concept of OSINT (“dont’ send a spy where a schoolboy can go”), only to be shut down by the CIA and marginalized for 30 years because my ideas — like Winn’s ideas — are threatening to the established mandarins who have gotten away with being ignorant and incompetent for decades. It is a comfort to me that time-based security has been refused for all these years just as OSINT has been refused, just as Bill Binney’s Thin Thread architecture for meta data pattern analysis has been refused by NSA, and it is most exciting to me that at this point in time multiple minds are converging to create Web 3.0: Binney, Schwartau, Steele, Stallman, and one of the most able crypto pioneers whose name I cannot share at this time. Below is the short version of what I want to build, ideally in support of President Donald Trump using the Open Source Agency (OSA) as home base.

  • protected valuations (coin, savings, deeds, trust, etc)
  • protected tools (cannot be programmed to lie)
  • protected data (cannot be erased or manipulated)
  • protected communities (competition of ideas, no one can be censored)

Additional references relevant to the post-Western economy and Internet that must certainly integrate time-based security (while eliminating Amazon, Facebook, Google, MeetUp, Microsoft, Twitter, and YouTube, among others) can be viewed on the landing page for and across my many publications. WInn has delivered a manifesto that should hit every government and every corporation and every insurance company, like a solar storm. Pay attention or be fried.

See Especially:

Review: WORM – The First Digital World War

See Also:

Review: Terminal Compromise

Review: INFORMATION WARFARE–Chaos on the Electronic Superhighway

Review: Pearl Harbor Dot Com