SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Strategies & Market Trends : The Residential Real Estate Post-Crash Index-Moderated -- Ignore unavailable to you. Want to Upgrade?


To: Jim McMannis who wrote (85492)2/13/2013 9:53:36 AM
From: Pogeu Mahone  Respond to of 119360
 
    Welcome to the Malware-Industrial Complex
The U.S. government is developing new computer weapons and driving a black market in “zero-day” bugs. The result could be a more dangerous Web for everyone.

  • By Tom Simonite on February 13, 2013


  • Why It Matters Governments, contractors, and researchers are developing cyber-weapons that could put businesses and ordinary Internet users at risk.

    Every summer, computer security experts get together in Las Vegas for Black Hat and DEFCON, conferences that have earned notoriety for presentations demonstrating critical security holes discovered in widely used software. But while the conferences continue to draw big crowds, regular attendees say the bugs unveiled haven’t been quite so dramatic in recent years.

    One reason is that a freshly discovered weakness in a popular piece of software, known in the trade as a “zero-day” vulnerability, can be cashed in for much more than a reputation boost and some free drinks at the bar. Information about such flaws can command prices in the hundreds of thousands of dollars from defense contractors, security agencies and governments.

    This trade in zero-day exploits is poorly documented, but it is perhaps the most visible part of a new industry that in the years to come is likely to swallow growing portions of the U.S. national defense budget, reshape international relations, and perhaps make the Web less safe for everyone.

    Zero-day exploits are valuable because they can be used to sneak software onto a computer system without detection by conventional computer security measures, such as antivirus packages or firewalls. Criminals might do that to intercept credit card numbers. An intelligence agency or military force might steal diplomatic communications or even shut down a power plant.

    It became clear that this type of assault would define a new era in warfare in 2010, when security researchers discovered a piece of malicious software, or malware, known as Stuxnet. Now widely believed to have been a project of U.S. and Israeli intelligence (U.S. officials have yet to publicly acknowledge a role but have done so anonymously to the New York Times and NPR), Stuxnet was carefully designed to infect multiple systems needed to access and control industrial equipment used in Iran’s nuclear program. The payload was clearly the work of a group with access to government-scale resources and intelligence, but it was made possible by four zero-day exploits for Windows that allowed it to silently infect target computers. That so many precious zero-days were used at once was just one of Stuxnet’s many striking features.

    Since then, more Stuxnet-like malware has been uncovered, and it’s involved even more complex techniques (see “ The Antivirus Era Is Over”). It is likely that even more have been deployed but escaped public notice. Meanwhile, governments and companies in the United States and around the world have begun paying more and more for the exploits needed to make such weapons work, says Christopher Soghoian, a principal technologist at the American Civil Liberties Union.

    “On the one hand the government is freaking out about cyber-security, and on the other the U.S. is participating in a global market in vulnerabilities and pushing up the prices,” says Soghoian, who says he has spoken with people involved in the trade and that prices range from the thousands to the hundreds of thousands. Even civilian law-enforcement agencies pay for zero-days, Soghoian says, in order to sneak spy software onto suspects’ computers or mobile phones.

    Exploits for mobile operating systems are particularly valued, says Soghoian, because unlike desktop computers, mobile systems are rarely updated. Apple sends updates to iPhone software a few times a year, meaning that a given flaw could be exploited for a long time. Sometimes the discoverer of a zero day vulnerability receives a monthly payment as long as a flaw remains undiscovered. “As long as Apple or Microsoft has not fixed it you get paid,” says Soghioan.

    No law directly regulates the sale of zero-days in the United States or elsewhere, so some traders pursue it quite openly. A Bangkok-based security researcher who goes by the name The Grugq tweets about acting as a middleman and has spoken to the press about negotiating deals worth hundreds of thousands of dollars with government buyers from the United States and western Europe. In an argument on Twitter last month, he denied that his business is equivalent to arms dealing, as critics within and outside the computer security community have charged. “An exploit is a component of a toolchain,” he tweeted. “The team that produces & maintains the toolchain is the weapon.”

    Some small companies are similarly up-front about their involvement in the trade. The French security company VUPEN states on its website that it “provides government-grade exploits specifically designed for the Intelligence community and national security agencies to help them achieve their offensive cyber security and lawful intercept missions.” Last year, employees of the company publicly demonstrated a zero-day flaw that compromised Google’s Chrome browser, but they turned down Google’s offer of a $60,000 reward if they would share how it worked. What happened to the exploit is unknown.

    No U.S. government agency has gone on the record as saying that it buys zero-days. But U.S. defense agencies and companies have begun to publicly acknowledge that they intend to launch as well as defend against cyberattacks, a stance that will require new ways to penetrate enemy computers.

    General Keith Alexander, director of the National Security Agency and commander of the U.S. Cyber Command, told a symposium in Washington last October that the United States is prepared to do more than just block computer attacks. “Part of our defense has to consider offensive measures,” he said, making him one of the most senior officials to admit that the government will make use of malware. Earlier in 2012 the U.S. Air Force invited proposals for developing “Cyberspace Warfare Attack capabilities” that could “destroy, deny, degrade, disrupt, deceive, corrupt, or usurp the adversaries [sic] ability to use the cyberspace domain for his advantage.” And in November, Regina Dugan, the head of the Defense Advanced Research Projects Agency, delivered another clear signal about the direction U.S. defense technology is heading. “In the coming years we will focus an increasing portion of our cyber research on the investigation of offensive capabilities to address military-specific needs,” she said, announcing that the agency expected to expand cyber-security research from 8 percent of its budget to 12 percent.

    Defense analysts say one reason for the shift is that talking about offense introduces an element of deterrence, an established strategy for nuclear and conventional conflicts. Up to now, U.S. politicians and defense chiefs have talked mostly about the country’s vulnerability to digital attacks. Last fall, for example, Defense Secretary Leon Panetta warned frankly that U.S. infrastructure was being targeted by overseas attackers and that a “digital Pearl Harbor” could result (see “ U.S. Power Grids, Water Plants a Hacking Target”).

    Major defense contractors are less forthcoming about their role in making software to attack enemies of the U.S. government, but they are evidently rushing to embrace the opportunity. “It’s a growing area of the defense business at the same time that the rest of the defense business is shrinking,” says Peter Singer, director of the 21st Century Defense Initiative at the Brookings Institution, a Washington think tank. “They’ve identified two growth areas: drones and cyber.”

    Large contractors are hiring many people with computer security skills, and some job openings make it clear there are opportunities to play more than just defense. Last year, Northrop Grumman posted ads seeking people to “plan, execute and assess an Offensive Cyberspace Operation (OCO) mission,” and many current positions at Northrop ask for “hands-on experience of offensive cyber operations.” Raytheon prefaces its ads for security-related jobs with language designed to appeal to stereotypical computer hackers: “Surfboards, pirate flags, and DEFCON black badges decorate our offices, and our Nerf collection dwarfs that of most toy stores. Our research and development projects cover the spectrum of offensive and defensive security technologies.”

    The new focus of America’s military and defense contractors may concern some taxpayers. As more public dollars are spent researching new ways to attack computer systems, some of that money will go to people like The Grugq to discover fresh zero-day vulnerabilities. And an escalating cycle of competition between U.S and overseas government agencies and contractors could make the world more dangerous for computer users everywhere.

    “Every country makes weapons: unfortunately, cyberspace is like that too,” says Sujeet Shenoi, who leads the U.S.-government-sponsored Cyber Corps Program at the University of Tulsa. His program trains students for government jobs defending against attacks, but he fears that defense contractors, also eager to recruit these students, are pushing the idea of offense too hard. Developing powerful malware introduces the dangerous temptation to use it, says Shenoi, who fears the consequences of active strikes against infrastructure. “I think maybe the civilian courts ought to get together and bar these kinds of attacks,” he says.

    The ease with which perpetrators of a computer attack can hide their tracks also raises the risk that such weapons will be used, Shenoi points out. Worse, even if an attack using malware is unsuccessful, there’s a strong chance that a copy will remain somewhere on the victim’s system—by accident or design—or accidentally find its way onto computer systems not targeted at all, as Stuxnet did. Some security firms have already identified criminal malware that uses methods first seen in Stuxnet (see “ Stuxnet Tricks Copied by Criminals”).

    “The parallel is dropping the atomic bomb but also leaflets with the design of it,” says Singer. He estimates that around 100 countries already have cyber-war units of some kind, and around 20 have formidable capabilities: “There’s a lot of people playing this game.”





    To: Jim McMannis who wrote (85492)2/13/2013 12:07:42 PM
    From: Broken_Clock2 Recommendations  Respond to of 119360
     
    I've pretty much given up trying to educate my agents. What's the point? The sheeple are in greed mode again and nothing will dissuade them.
    ++++++++

    FEBRUARY 11, 2013

    Rampant Speculation Drives Prices Higher
    Housing Hijinx
    by MIKE WHITNEY
    “Experts do not seem to think that we are going back to the same boom. There might be ‘cheap talk’ that housing is ‘off to the races again,’ but the people who think about it seriously, doubt it.”

    – Robert Schiller, co-founder of Standard & Poor’s/Case-Shiller home price index

    There’s a lot confusion about the recent uptick in housing prices, which–according to CoreLogic– have gone up 7.4 percent year-over-year. Many analysts think that that the “bottom is in” and the market is about to roar back to its bubble-era highs. Nothing could be further from the truth. Housing prices are likely to remain flat for years due to persistent high unemployment, negative wage growth, crippling student loan debt, and changing attitudes about home ownership. The reason prices have been going up can be explained in one word: speculation. Here’s how CNBC’s Diana Olick sums it up in a blogpost titled “Housing Market Already Shows Signs of a New Bubble”:

    “Investors have cleaned out the (distressed) inventory so much that they are now bidding up prices higher than any expectations….markets that saw the most distress during the housing crash, like Phoenix, Las Vegas, and much of California, have also seen so much investor demand, that prices are up by double digits from a year ago…..

    In St. Louis, Chicago, Charlotte and Dallas, distressed properties are making up about one third of the market, often higher than markets out West, but home prices are either flat or down annually, a far cry from the jumps out West. That is because investors are not as interested in these markets. As banks now begin to ramp up foreclosures, not just in Florida, but especially in states like New York and New Jersey where judges had been holding up the process as well, more distressed inventory will come on the market with fewer potential buyers. That will push prices there down.” (“Housing Market Already Shows Signs of a New Bubble”, Realty Check)

    This sounds more confusing than it really is. What Olick is pointing out, is that housing prices are going up where speculators are buying everything they can get their hands on, but going down in markets where investor interest is weak. In other words, what’s driving the market is not firsttime homebuyers, move-up buyers, organic growth, higher wages, lower unemployment, or a stronger economy. It’s speculation, pure and simple.

    And there’s something else that’s interesting in Olick’s article, too, that is, it shows that the Fed’s historic low interest rates are not driving sales. Keep in mind, that 30-year fixed rates are just as cheap in locations where prices are flat (ie–St. Louis, Chicago, Charlotte and Dallas) as they are in booming Phoenix, Las Vegas or California. That means the difference isn’t rates, it’s investor interest. (speculation) That’s what’s pushing prices higher.

    This is why housing guru Robert Shiller hasn’t been caught up in the “housing is recovering” baloney and why he continues to maintain that housing is a “risky investment” and that prices “could go down”.

    There’s an interesting article on Alternet that details the impact speculation is having on prices. Here’s a clip from “The Ugly Truth About America’s Housing “Recovery”:

    “… the housing “recovery”….. is fueled almost entirely by Wall Street private equity firms, hedge funds and the Fed’s unwavering support. After creating a massive bubble in home prices that eventually burst and caused our economy to go into a tailspin, these guys have decided to come back for more, and figured out a way to profit off their destruction….

    The Blackstone group, the biggest player in the new REO to rental market, has spent $2.5 billion in the last year purchasing 16,000 homes, a number that amounts to over $100 million per week.” (Alternet)

    So, the big boys are throwing their money around right and left, pushing prices higher and reducing margins. When profits shrink to the point that it’s no longer worth their while to invest, they’ll pack it in and chase yield somewhere else. That’s when prices will start to retreat. The former director of the Office of Management and Budget in the Reagan Administration, David Stockman, makes the same point in a recent interview on The Daily Ticker. Here’s what Stockman said:

    “I would say we have a housing bubble…again…..It’s happening in the most speculative sub-prime markets, where massive amounts of ‘fast money’ is rolling in to buy, to rent, on a speculative basis for a quick trade…..And as soon as they (professional investors like hedge funds and private equity firms) conclude prices have moved enough, they’ll be gone as fast as they came.”…

    We don’t have a real organic sustainable recovery because in a world of medicated money by the central bank, things aren’t what they appear to be,” ….Stockman argues the problem in housing is the two forces needed for a recovery, first-time buyers and trade-up buyers, are missing.(The Daily Ticker)

    Everything about the US housing market is fake; the rates, the inventory, the prices, and the sales data. All fake, which is why buyers need to crosscheck their information to make sure they’re not getting bamboozled by a system that exists merely to rip them off.

    For example, just take a look at inventory. Everyone knows that inventory is unusually low which is another reason why prices are going up. But how accurate is the inventory data? Check out this clip from an article by George Feiger at Contango Capital Advisors:

    “….there remains a large “potential supply” of single family homes for sale. According to BCA Research, if one adds existing homes for sale, single family homes for rent and homes held off the market for other reasons, there remain over 10 million vacant housing units or something well over 7% of the single family housing stock. Foreclosures have slowed down but still run around 1.5 million at an annual rate and delinquent mortgages have fallen but remain around 7% of all mortgages outstanding.

    There is another “shadow supply”. Somewhere between 25 and 30% of all house sales in 2011 were cash sales to speculators rather than to potential “final residents”. In all likelihood in the Western states hardest hit by the collapse of house prices the percentage of sales to speculators was even higher.” (“Reflections on the Current Belief That Housing Will Come Roaring Back”, George Feiger, naked capitalism)

    Repeat: “There remain over 10 million vacant housing units” and that does not include the “shadow supply”. It’s worth noting that 10 million is slightly more than the 2.14 million existing homes reported in the National Association of Realtors (NAR) October report. Indeed, some would claim that that is more than just a “rounding error”. Of course, the MSM sees the massive manipulation of inventory as a positive sign since it helps to keep prices artificially high which trims the losses on the banks’ stockpile of garbage mortgages and non performing loans. (which is what this shellgame is really all about.)

    More and more people are beginning to see what a sick and twisted game this is and how the Fed’s collusion with the criminal bank cartel has created epic distortions that exponentially increase the risks of buying a house. But, if that’s the case, then who are the people buying houses in this upside-down market? For that, we turn to Dr. Housing Bubble. Here’s a blurb from a recent post titled “The broke vs the all-cash buyer”:

    “As I dig through the monthly data on home sales, one trend continues to intrigue me when it comes to California housing. Call it the broke versus the big cash buyer. For example, over 23.2 percent of Southern California home buyers used FHA insured loans last month. These loans are no longer good deals even though they require only a paltry 3.5 percent down payment. Yet they are popular for those chasing the middle class dream in a state where it is becoming much more difficult to follow a middle class lifestyle. On the other side of the spectrum, we have the all cash buyers. A record 33.8 percent of all sales last month came from those with all cash in SoCal. In total, over 56 percent of SoCal buyers are diving in with 30x leverage loans or are investors going in with all cash.” (“The broke vs the all-cash buyer”, Dr Housing Bubble)

    Think about that for a minute: All-cash buyers (mostly investors) and maxed out borrowers (Borrowers who have nearly- zero equity in their homes) account for more than half of all buyers in the booming California housing market. Is it any wonder why prices have more than doubled in parts of Southern California in the last year? And, don’t kid yourself, if Bernanke could inflate other flagging markets the same way he has “The Golden State”, he’d do so in-a-heartbeat.

    Anyone who’s thinking about buying a house in the next year or so, should seriously consider what will happen when the speculators –who presently make up over 30 percent of the market—pull up stakes and vamoose. That’s going to send prices into a nosedive wiping out a good portion of your investment and leaving you shackled to an asset that’s worth less than what you paid. It’s worth mulling over.