People can be persuaded to believe anything provided they understand that this is what they are expected to believe
That took years to formulate, but the comforting part is that very few of the mass will ever believe it.
Anyway, it can be tied into a Russian fable quoted later. In the mean time, the instability of server 'Amp' appears to have perhaps stopped, and Serene Falcon is back to it's previous quiet efficiency: however the sloth of page-opening is also part of that normal state, so sooner or later it will be moved to the fastest servers in the west, Teksapiens, whom I found on the faintest of hints from this source.
Still, however unlikely, the Internal Security Division of Serene Falcon had to look for any evidence of hacking; which was not found: to the easily awestruck 'hacking' appears like some rough magic by which the threatening deliver some arcane spell at a site like a videogame wizard easily manipulating all though a mysterious and unnameable exploit which vanishes when suspected. In prosaic real life traces are always left, and for php even the powerful c99madshell needs to have been uploaded via FTP or through allowed uploads for the attacker to work; simply doing a date search for the most recent files will show if any of those was compromised... Should one find evidence in Wordpress, there are the options of looking for backdoors and eliminating them or cleaning the install.
To some others, including alas, state authorities, hacking is childsplay. Literally.
A new survey has revealed that while 78 percent of them agree that it is wrong, a quarter of the kids asked admitted that hacking really is child's play.
The survey of more than 1000 children discovered that the boy hacker stereotype no longer holds true, with 47 percent of those who put their hands up to hacking activity being girls.
The most common scene of the crime would appear to be the relatively safe haven of the bedroom with 27 percent saying this was where they hacked from, while 22 percent were hacking in an Internet Cafe, 21 percent using the ICT suite at school and 19 percent a mate's machine.
Cumbria Constabulary’s Deputy Chief Constable Stuart Hyde ACPO lead on E-Crime Prevention and President of the Society for the Policing of Cyberspace (POLCYB) says "what this survey starkly highlights is that hacking into personal online accounts whether email or Facebook can be child’s play if users do not protect their own passwords. It illustrates the importance of keeping your passwords strong, secure and changing them regularly to help protect your accounts from unscrupulous people of all ages. We live in a world where social networking, email and the internet are embedded into our every day lives from a far younger age so early education is essential to ensure young people know the devastating consequences this activity can have...."
Whilst offering some reluctant admiration for whoever came up with 'Policing of Cyberspace', and much less admiration for the feeble attempt to emphasize the tenuous reach for supposed feminist equality in the hackosphere, it is unnerving to realise that police consider breaking into a friend's Facebook account by guessing their password as expert hacking or cracking.
Over in Africa they are a little more sophisticated --- which is not something said very often, considering that in South Africa setting people on fire is a pastime and up in Somalia they drive a truckload of stones into a stadium to punish a 13-yr-old girl for reporting her rape ( a few of the 1000 strong spectators protested ): a touch of modernity was provided by having nurses discover whether she was dead yet, and finding this not so, reburying her for the next volley of stones. A touch of multiculturalism makes the whole world kin --- and if this is what may be expected from there, still more ingenious efforts will be forthcoming from Russia and China as they and we spiral downwards.
Imagine a network of virus-driven computers so infectious that it could bring down the world's top 10 leading economies with just a few strokes. It would require about 100 million computers working together as one, a "botnet" — the cybersecurity world's version of a WMD. But unlike its conventional weapons equivalent, this threat is the subject of no geopolitical row or diplomatic initiative. That's because no one sees it coming — straight out of Africa.
Cybercrime is growing at a faster rate in Africa than on any other continent in the world, according to statistics presented at a conference on the matter in Cote D'Ivoire in 2008. Cybersecurity experts estimate that 80 percent of PCs on the African continent are already infected with viruses and other malicious software. And while that may not have been too worrisome for the international economy a few years ago (just like the continuing war in the Democratic Republic of the Congo does not affect our daily lives), the arrival of broadband service to Africa means that is about to change. The new undersea broadband Internet cables being installed today will make Africa no further away from New York than, say, Boston, in the virtual world.
Broadband Internet access will allow Africa's virus and malware problems to go global. With more users able to access the Internet (and faster), larger amounts of data can be transferred both out and inward. More spam messages in your inbox from Africa's email fraudsters will be only the beginning.
At least the admirable Dancho Danchev's Blog - Mind Streams of Information Security Knowledge helps maintain some record of current threats. But apart from the superstrikes of the future being far more intense, there are still more pressing dangers than common criminals or the purely spiteful.
From Dark Reading, Mr. Gadi Evron reports:
Today I'd like to introduce you to one of the main thinkers on information warfare, who most of you never heard of. S.P. Rastorguev (Расторгуев C.П.). He is a Russian strategist who unfortunately, as far as I can find, hasn't been translated.
He wrote several books, but the one I will be speaking of is called literally Information Warfare ( Informatsionnaya voina -- Информационная война ). In it, he discusses the human animal and how viruses of the mind can work just as well as viruses in computer systems, exploring many models of exploitation.
While he covers many concepts, the one I was introduced to originally is the story of the fox and the turtle.
Here is a slightly altered, and shortened, version ( full and accurate version below ):
A turtle walks through the forest, enjoying the view. She runs into a fox, who says: "Turtle, turtle, get out of your shell and you can fly."
The turtle stares skeptically at the fox, and keeps on walking.
Eventually, traveling through the forest the turtle comes across a television set. She watches as hundreds of turtles get out of their shells, and fly.
She gets out of her shell, and she flies.
I'm gonna say I found this as clear as crystal, as I suspect really did the writer, who goes on,
When I first heard this story, I was confused. What was the moral of the story ? Deception ? Perhaps strategy ?
A friend of mine explained it as Sergei Rastorguev did at the end of the story: "The turtle didn't know and never will, that information warfare --- it is the purposeful training of an enemy on how to remove its own shell."
The following translation of the fox and turtle story was done by Ilya Konstantinov, as a favor to me. As to why the fox is female, you better ask a Russian literary expert, as that's just how it is in Russian fables.
There used to be an ordinary turtle who constantly carried a heavy shell on its back. The shell pressed her to the ground and every step she took was hard effort for her. That's why her life, measured by the number of those uneasy steps, was also hard.
On the other hand, when a hungry fox came running from a nearby forest, the turtle hid her head inside the shell and patiently awaited until the danger was over. The fox kept hopping around, trying to bite at the shell, trying to turn her upside down; all in all, trying all the steps typical of an aggressor, and yet the turtle prevailed.
Once upon a time, the fox got a big wallet, brought in a lawyer and, sitting across the turtle, proposed a buyout offer for the shell. The turtle considered it throughly, but due to her limited imagination, she had to refuse. And yet again, the fox left with nothing.
Time passed, the world changed, new means of telecommunication have entered the forest. One day, coming out of her house, the turtle saw a TV screen hanging off a tree, showing films of flying turtles, shell-less. Breathless with excitement, the woodpecker-announcer spoke of their flight: "Such a lightness ! What a speed ! How beautiful ! Such an elegance !". The turtle watched the show that day, and the next day, and the day after...
And then a thought arose in her little mind, about how stupid she is to carry around that weight - the shell. Wouldn't she be better getting it off? Life would be much easier. Scarier ? Yeah, a bit scarier, but the news anchor-owl announced that the fox has turned to the Krishnas and became vegetarian.
The world is changing. The forest is also completely different; there are less and less trees and distinctive animals, and more and more indistinguishable stray dogs and jackals.
"And really, why shouldn't I fly ? The skies --- they're so big and wonderful!"
"If only I gave up the shell, and --- right away - - life would be easier !" --- thought the turtle
"If only she gave up the shell, and --- right away --- she'd be easier to eat" -- thought the fox, signing on the bill for yet another advertisement of flying turtles
And one beautiful morning, when the skies seemed larger than ever, the turtle has made her first and last step towards freedom of her protection system.
The turtle didn't know and never will, that information warfare -- it is the purposeful training of an enemy on how to remove its own shell.
Thanks to the useful idiots of liberalism --- which includes every ideology since the 17th century, the Decline of the West is assured.