Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

China's Conquest of Internet, ICANN + Quantum Encryption
FR research, please share w. others | Arthur March

Posted on 09/24/2016 9:40:29 AM PDT by Arthur Wildfire! March

click here to read article


Navigation: use the links below to view more comments.
first previous 1-20 ... 41-6061-8081-100101-118 last
To: The Westerner; bushwon

‘Do You Have 3 Minutes at Lunchtime to Save the Internet?’

That would be an excellent headline for tomorrow if there’s still time.

Only question is: ‘which sidebar’?

Breaking news is for updates on something not fully understood yet — such as a recent call from a congressional staffer.

But I’m backing you up, bushwon, because you are speaking from that perspective. But it is understandable that people got mad.

God BLESS you!


101 posted on 09/28/2016 3:58:48 AM PDT by Arthur Wildfire! March (ICANN giveaway complete any day now. Call Congress. Yes to SB3031 HR5418)
[ Post Reply | Private Reply | To 97 | View Replies]

To: The Westerner; bushwon

BBC experiments with holographic TV...
http://www.mirror.co.uk/news/uk-news/could-holographic-televisions-next-big-8897419

The brain drain already begins to shift out of the USA.

I suspect one of the reasons might be this: why bring cutting edge tech to the US when we keep getting hacked? It’s too hazardous for innovators.

But if we can keep ICANN a little longer, Trump can shore up our encyrption and take measures against China’s plan.


102 posted on 09/28/2016 4:15:55 AM PDT by Arthur Wildfire! March (ICANN giveaway complete any day now. Call Congress. Yes to SB3031 HR5418)
[ Post Reply | Private Reply | To 98 | View Replies]

To: Arthur Wildfire! March

BUMP!!!


103 posted on 09/28/2016 5:25:29 AM PDT by Freedom56v2 (Call Congress today to support the PROTECTING INTERNET FREEDOM ACT SB3034 HR5418)
[ Post Reply | Private Reply | To 102 | View Replies]

To: palmer; CodeToad; old-ager

old-ager wrote:

Here’s a tasty tidbit for y’all. Anyone running the “root” “name servers” for the “Internet” can hijack ANY domain at ANY time. So, they can make your email and web traffic go someplace else. Have you ever reset a password via a link sent in email? What if your email went to someone else due to a DNS hijack?

[unquote]


104 posted on 10/01/2016 11:40:22 AM PDT by Arthur Wildfire! March
[ Post Reply | Private Reply | To 53 | View Replies]

To: Arthur Wildfire! March; old-ager
Anyone running the “root” “name servers” for the “Internet” can hijack ANY domain at ANY time.

They've had 20 years to do so and have not so far (except by accident). The 12 organizations running the root servers report to a committee and the committee reports to both ICANN and the US Dept of Commerce. Nothing will really change in that kind of plumbing and if someone changed it, it would be quickly reverted or bypassed.

105 posted on 10/01/2016 12:08:29 PM PDT by palmer (turn into nonpaper w no identifying heading and send nonsecure)
[ Post Reply | Private Reply | To 104 | View Replies]

To: palmer

“Nothing will really change in that kind of plumbing and if someone changed it, it would be quickly reverted or bypassed.”

Then why is ICANN changing at all then? Of course someone seeks to make changes.


106 posted on 10/01/2016 2:00:40 PM PDT by CodeToad
[ Post Reply | Private Reply | To 105 | View Replies]

To: CodeToad

ICANN can do plenty of damage in plenty of ways once under foreign control, but I don’t think screwing up the root servers would be their line of attack. If they took that authority away from the 12 current organizations and gave it to 12 authoritarian governments then I would worry.


107 posted on 10/01/2016 2:12:06 PM PDT by palmer (turn into nonpaper w no identifying heading and send nonsecure)
[ Post Reply | Private Reply | To 106 | View Replies]

To: palmer; old-ager; Myrddin; CodeToad

Myrddin wrote:

OLSR
http://www.olsr.org/mediawiki/index.php/Projects

Freifunk
https://freifunk.net//en

The two links above take you to software packages that implement distributed mesh networks that can operate off your standard Windows/Linux machines to establish city wide networks using WiFi. A little extra effort is required to link mesh networks together. You may have to construct a local DNS from the standard “bind” software found on Linux or hack together something on Windows using ActiveDirectory to support your DHCP and LDAP databases to re-integrate your local area. If an EMP, war or financial collapse take down the internet on a world-wide basis, you can cobble up sufficient infrastructure with Linux and these mesh networks to re-establish some level of “normal” in your city or region.

I used OLSR to create a rolling mesh network with 802.11b devices on each railcar. A train wrapped around a mountain that lacks line of sight from car to car will have a good mesh path using OLSR. I chose OLSR because it constantly updates routes and minimizes latency to transmit a data packet. That was crucial to my system design. The alternative AODV using by Freifunk minimizes transmitter on time by performing route discovery only when it is time to move a packet. That introduces latency for route discovery, but reduces power consumed and over the air bandwidth required to continually update the connectivity maps.

I stopped doing daily work with OLSR in 2009 when Obama’s arrival trashed my program finances. The OLSR2 work started after that point in time, so I don’t have much “hand’s on” with that one.

[unquote]


108 posted on 10/04/2016 5:15:28 AM PDT by Arthur Wildfire! March
[ Post Reply | Private Reply | To 105 | View Replies]

To: palmer; old-ager; Myrddin; CodeToad; The Westerner; bushwon

Cyber-security remains a vital issue although not as urgent as the election.

And Trump takes this seriously. Our work was helpful in forming an information nerve-center.

I found the transcript of Trump’s speech and will post it to ‘all’ [so as not to clog your pings]:

https://www.donaldjtrump.com/press-releases/donald-j.-trump-remarks-on-cybersecurity


109 posted on 10/04/2016 5:32:44 AM PDT by Arthur Wildfire! March
[ Post Reply | Private Reply | To 105 | View Replies]

To: All

After losing ICANN, cyber-security’s urgency has plummeted for the moment but might well be the top issue for a President Trump to address. It affects:

1. Counter-terror
2. The Brain Drain
3. US technology [who wants to manage innovation with poor encryption?]

4. National Security.
5. The economy.
6. US prestige. [which also affects the brain drain and US tech]

~~~~~~~~~~~~~~~~~~~~~

DONALD J. TRUMP PROMISES IMMEDIATE ACTION ON CYBERSECURITY IN HIS ADMINISTRATION

https://www.donaldjtrump.com/press-releases/donald-j.-trump-remarks-on-cybersecurity

It is a privilege to be here this morning with so many distinguished members of our armed services.

Before we get started with our Q & A, I’d like to address one of the most important aspects of America’s national security, and that’s cybersecurity.

To truly make America safe, we must make cybersecurity a major priority for both the government and the private sector.

Cyber theft is the fastest growing crime in the United States.

As President, improving cybersecurity will be an immediate and top priority for my Administration.

One of the very first things I will do is to order a thorough review of our cyber defenses and weaknesses, including all vital infrastructure.

Cyber-attacks from foreign governments, especially China, Russia, and North Korea along with non-state terrorist actors and organized criminal groups, constitute one of our most critical national security concerns.

Hillary Clinton’s only experience in cybersecurity involves her criminal scheme to violate federal law, engineering a massive cover-up, and putting the entire nation in harm’s way. The fact that a former Senator and Secretary of State claimed not to know what the letter “C” means is just one more example of why she’s unfit to hold public office.

The scope of our cybersecurity problem is enormous. Our government, our businesses, our trade secrets, and our citizens’ most sensitive information are all facing constant cyber attacks.

Just consider some of these recent hacks:

JP Morgan Chase had 73 million emails stolen.

E-Bay was invaded and gave up 150 million passwords.

Target was attacked and gave up 40 million credit card numbers.

Attacks like these are happening on a regular basis both in the United States and around the world, and the costs in our privacy, our security and on our financial sector are extraordinary.

Identify theft, financial laundering, as well as ransom ware – involving the extortion of a hacked institution – are all becoming increasingly common.

Incredibly, hackers were able to obtain at least 20 million identities of people who underwent FBI background investigations.

The information hacked contains facts discovered by the FBI in doing background checks for people seeking positions with the Federal Government. It is a treasure trove which can be easily used for blackmail.

The fact that this highly classified information was so poorly protected demonstrates that cybersecurity is just one more area where the Obama Administration has failed.

We should not let this be like the history of the Mafia which was allowed to grow into a nation-wide organization which infiltrated and corrupted so many areas of society for such a long time.

We can learn from this history that when the Department of Justice, the FBI, the DEA and state and local police and prosecutors were combined in Task Forces directed at the Mafia, they were able to have great success in prosecuting them, seizing their business interests and removing their infiltration from legitimate areas of society.

As President, I will instruct the Department of Justice to create Joint Task Forces throughout the United States to work together with Federal, State, and local law enforcement authorities and international law enforcement to crush this still-developing area of crime.

I will make certain that our military is the best in the world in both cyber offense and defense. I will also ask my Secretary of Defense and Joint Chiefs to present recommendations for strengthening and augmenting our Cyber Command.

As a deterrent against attacks on our critical resources, the United States must possess the unquestioned capacity to launch crippling cyber counter-attacks. This is the warfare of the future, America’s dominance in this arena must be unquestioned.

Cybersecurity is not only a question of developing defensive technologies but offensive technologies as well.

For non-state terror actors, the United States must develop the ability – no matter how difficult – to track down and incapacitate those responsible. We should turn cyber warfare into one of our greatest weapons against the terrorists.

To enhance the defense of the other agencies of government, including our law enforcement agencies, we will put together a team of the best military, civilian and private sector cybersecurity experts to comprehensively review all of our cybersecurity systems and technology.

The Cyber Review Team will proceed with the most sensitive systems first, but ultimately all systems will be analyzed and made as secure as modern technology permits.

I will also require that follow-up reviews take place on a regular basis determined by the sensitive nature of the security involved.

The review will include providing exact recommendations for the best combination of defensive technologies tailored to specific agencies.

This will include the various methods of internal monitoring, attack and penetration, investigation of suspected hackers or rogue employees, and identity protection for government employees.

The review team will also remain current on the constantly-evolving new methods of attack, and will attempt to anticipate them and develop defenses as often as possible before major breaches occur.

This group of experts will set up protocols for each agency and government officials, requiring them to follow best practices.

They will also establish a training program for all government employees to make certain they understand what defenses are available and utilize them, along with a continuing education program so everyone is aware of the newest methods of both attack and defense.

Those who violate classification rules will be held responsible to the fullest extent of the law. I will appoint an Attorney General who will reform the Department of Justice like it was necessary after Watergate. My Attorney General will restore the integrity of the Department of Justice.

Today is just the beginning of a long and overdue national discussion of how to protect ourselves from modern cyber-crime and evolving national security threats, and how to develop the cyber offense strategies necessary to gain a critical security edge in the 21st century.

Thank you again for being here, and now let’s begin our discussion.

— Donald Trump

[unquote]


110 posted on 10/04/2016 5:38:20 AM PDT by Arthur Wildfire! March
[ Post Reply | Private Reply | To 109 | View Replies]

A better summary:

Cyber-security is not be a top campaign issue, but it might well be the most urgent prolbem for a President Trump to solve. It affects:

1. Counter-terror
2. The Brain Drain
3. US technology [who wants to manage innovation with poor encryption?]

4. Nuclear and conventional military effectiveness.
5. Missile defense.
6. The economy.
7. US prestige. [which also affects the brain drain and US tech]


111 posted on 10/04/2016 5:47:56 AM PDT by Arthur Wildfire! March
[ Post Reply | Private Reply | To 110 | View Replies]

To: Democrat_media; palmer

Democrat Media, I’m reposting you here because this is where most of the technical posting is concentrated ...

[repost of Democrat_media]

[quote]

I’m a coder with years of experience and I’m definitely going to try to create a new
alternate Internet based on mesh networks , or die trying. I’ll keep you posted on any breakthroughs and or when we can port to the new Internet. I’ll start with these 2 links.
Seems like there might be a market for apps that link to other apps on other smartphones or pcs peer to peer like creating a distributed mesh internetwork. Im going to use erlang, websockets a lot of the whatsapp architecture

https://techcrunch.com/2016/03/13/building-a-brand-new-internet/

https://www.popularresistance.org/creating-an-alternative-internet-to-keep-the-nsa-out/

https://techcrunch.com/2016/03/13/building-a-brand-new-internet/

[— democrat_media, unquote]


112 posted on 10/04/2016 6:00:58 AM PDT by Arthur Wildfire! March
[ Post Reply | Private Reply | To 111 | View Replies]

To: Arthur Wildfire! March

Was wondering how you fared this weekend? You must have been wrung out. Good to get an optimistic ping from you. Thank you for shouting to us and waking us up. Perhaps the upside will be an aggressive movement among software developers to create a viable alternative?


113 posted on 10/04/2016 11:33:25 AM PDT by The Westerner ("Giving Away the Internet or Any Part of It Is Sheer Lunacy" Jim Robinson)
[ Post Reply | Private Reply | To 109 | View Replies]

To: The Westerner

Thank you for all of your support and encouragement. People may be ‘gun shy’ about ICANN now. They got their transition and so far the other shoe hasn’t dropped.

It will drop in due time. They have better negotiation leverage now that they passed the final hurdle. ICANN will sell out — that is their history.


114 posted on 10/05/2016 5:26:53 AM PDT by Arthur Wildfire! March
[ Post Reply | Private Reply | To 113 | View Replies]

China’s Hostile Cyber and Trade War: It’s Threat To National Security

http://www.freerepublic.com/focus/f-news/3477677/posts

As we witness the home stretch of the presidential election with candidate debates, campaign stops, and political ads, both parties have an opportunity to talk substantively about a serious trade issue – ongoing efforts by China to hack and steal intellectual property from U.S. companies and using stolen U.S. trade secrets to manufacture their own cut rate products. One assistant attorney for U.S. National Security describes the Chinese hacking campaign against the United States a true, “national security emergency.”

China has created what some describe as an army of hackers – numbering in the thousands – high tech soldiers that work to identify and steal intellectual property from various industrial, tech or defense related companies. China then uses the stolen intellectual property to produce nearly identical products with the information it hacks. Even worse, China then dumps these products into the United States or floods other countries’ markets with products at prices no nation can compete against.

[snip]

The recent U. S. Steel case is a classic example of what the Chinese are up to these days and how they must be stopped. U. S. Steel Corporation invested millions into the research and development of innovative, lighter and stronger steel products.

[snip]

It’s not just the steel industry that is fending off a massive Chinese cyber war and flagrant trade violations. CNN recently reported how the Chinese allegedly hacked into the heart of our banking industry, the FDIC. Westinghouse Electric, Allegheny Technologies and SolarWorld have reportedly been hacked and pilfered. Companies in engineering, manufacturing, chip design, telecommunication and pharmaceuticals are also dealing with cyber-attack and theft.

The US Justice Department describes China’s hacking campaign as the, “Great Brain Robbery” and a recent USITC report citied potential losses to US companies at more than $300 billion. That figure doesn’t take into account millions more many companies have lost in terms of brand value and increased costs for IP security.

American technology is especially crucial to our national defense, but Chinese intellectual property theft may one day force our own military to rely on Chinese technology or even worse, one day see our own technology used against us.

[snip]


115 posted on 10/07/2016 7:18:20 AM PDT by Arthur Wildfire! March (Hillary believes in a Trickle Up policy. Rob Haiti relief. Water down medicine.)
[ Post Reply | Private Reply | To 109 | View Replies]

Be prepared! How do we prepare for a possible Clinton presidency?

http://www.freerepublic.com/focus/f-chat/3481858/posts


116 posted on 10/18/2016 8:28:25 AM PDT by Arthur Wildfire! March (Hillary's Trickle Up policy: take bribes, sell sleazy pardons, water down AIDS medicine.)
[ Post Reply | Private Reply | To 115 | View Replies]

[quoting palmer]

I wrote: “Unfortunately, the NSA was hacked over the summer, and the US government demands that all encryption algorithms of US companies be stored there.”

Now for someone who knows something ...

[quote]

I had that argument with another freeper. He claimed there are secret encryption algorithms. I stated that there are no secret encryption algorithms. Of course I have no way of knowing that. However the NSA along with NIST have developed several public encryption algorithms that were reviewed and critiqued by top worldwide encryption experts. Those algorithms are in fact used by the government and most US companies. It would go against all accepted practice to use a secret algorithm.

A company that invents and uses its own algorithm is not doing itself any favors. The secrecy must be in the key and the key alone in order to assure that the a cyber loss is not a catastrophe. If you lose a key in a cyber attack you have lost one key and life goes on. If you lose an algorithm which, being code, is harder to protect than a key which is data, that is a catastrophe.

Thus I would end any speculation about secret encryption algorithms. I speak strictly as an applied crypto expert with two decades of experience, not as an insider or anything like that.

— palmer


117 posted on 10/22/2016 5:17:28 AM PDT by Arthur Wildfire! March (Hillary's Trickle Up policy: take bribes, sell sleazy pardons, water down AIDS medicine.)
[ Post Reply | Private Reply | To 116 | View Replies]

To: palmer

I archived your post here.

Thank you, FRiend.


118 posted on 10/22/2016 5:19:33 AM PDT by Arthur Wildfire! March (Hillary's Trickle Up policy: take bribes, sell sleazy pardons, water down AIDS medicine.)
[ Post Reply | Private Reply | To 117 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-20 ... 41-6061-8081-100101-118 last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson