Monday, September 24, 2012

Marine Links al-Qaeda in the Cloud Attacks to Pawlenty’s Wizmo Drones

United States Marine Field McConnell has linked al-Qaeda in the cloud attacks to former Vice President of Wizmo, Tim Pawlenty, who allegedly authorized his Software as a service (SaaS) experts to hack Macdonald Dettwiler and Associates' IAP networks and convert hijacked aircraft into drones on 9/11.

To be marked attention Tim Pawlenty, McConnell is copying this post to Anne Wallace (anne@fsround.org), the senior director for consumer financial services, The Financial Services Roundtable, and the president of the Identity Theft Assistance Corporation.

 Prequel 1:
 KPMG - MacDonald, Dettwiler and Associates - Reconfigured Federal Bridge Certification Authority - Phony COG - BBC Pension Trust - Bain Capital
Al-Qaeda in the cloud attack staged during Global Guardian


“Tim Pawlenty - A Time for Truth”

“Romney's National Co-Chair Steps Down”

“9/11 (1-10) Abel Danger Resolution Trilogy Volume I - Pattern of the Crimes 1-3”

“MDA Wins Key U.S. Aviation Contract Source: MacDonald, Dettwiler and Associates Ltd. Posted Thursday, May 3, 2001 Richmond, B.C. - MacDonald, Dettwiler and Associates Ltd. (TSE: MDA) announced today the company has been awarded a contract by the United States Air Force to develop a system to be used by specialists at Air Force bases to design Instrument Approach Procedures (IAPs). IAPs are published instructions to pilots specifying a series of aircraft maneuvers that must be executed for the aircraft to transition safely from an en route airway to a runway final approach when flying by instruments. MDA's system ingests digital terrain and elevation data, air navigation data (such as the locations of navigation aids, runways, buildings and towers) to build and display a virtual model of the physical environment surrounding an airport. It then develops the complex surfaces that define a safe approach corridor for any of the dozens of IAP variants, and determines whether any of the defined surfaces are penetrated by terrain or man-made obstacles. It flags these incursions to the operator, who can quickly modify the approach procedure through a drag-and-drop user interface. This initial award, valued at $2.9 million (CDN), consists of a fixed price element to develop, integrate, and test the system. The next phase will include installation, government testing, and operator training. The contract includes an option for the U.S. Federal Aviation Administration (FAA) to adapt the system for their needs. The U.S. Air Force also has options to field the successful system at up to 108 air bases around the world, and to award T&M support contracts for up to 8 years. MDA plans to team up with Air Navigation Data (AND) of Ottawa to offer a custom solution, based on AND's "Final Approach" product. MDA President and CEO Daniel Friedmann said: "This is a significant project for MDA that has the potential to improve the safety of air transportation for many other air forces and civil aviation authorities world wide."

“Wizmo is a pioneer in cloud computing and Software-as-a-Service (SaaS) delivery. In 2001, Wizmo deployed its first Cloud application architecture for a Fortune 500 company [Cisco with Macdonald Dettwiler and Associates as sub-contractor for decoy and drone maneuver software] , becoming one of the pioneers of cloud computing. Today, our deep technical and business expertise help software companies take their user base and business to the cloud improving customer satisfaction and financial performance. Wizmo is a Microsoft Gold Certified Partner Specialties Software-as-a-Service Hosting/SaaS Technology Enablement/Cloud Computing Hosting”

“Software as a service sometimes referred to as "on-demand software", is a software delivery model in which software and associated data are centrally hosted on the cloud. SaaS is typically accessed by users using a thin client via a web browser. … Some limitations slow down the acceptance of SaaS and prohibit it from being used in some cases: Since data are being stored on the vendor’s servers, data security becomes an issue. SaaS applications are hosted in the cloud, far away from the application users. This introduces latency into the environment; so, for example, the SaaS model is not suitable for applications that demand response times in the milliseconds. Multi-tenant architectures, which drive cost efficiency for SaaS solution providers, does not allow true customization of applications for large clients, prohibiting such applications from being used in scenarios (applicable mostly to large enterprises) for which such customization is necessary. Some business applications require access to or integration with customer's current data. When such data are large in volume or sensitive (e.g., end users' personal information), integrating them with remotely hosted software is costly and/or risky. Constitutional search/seizure warrant laws do not protect all forms of SaaS dynamically stored data. The end result is that a link is added to the chain of security where access to the data, and by extension misuse of that data, are limited only by the assumed honesty of 3rd parties or government agencies able to access the data on their own recognizance. Switching SaaS vendors may involve the slow and difficult task of transferring very large data files over the Internet. Organizations that adopt Saas may find they are forced into adopting new versions, which might result in unforeseen training costs or an increase in probability that a user might make an error. Relying on an Internet connection means that data is transferred to and from a SaaS firm at Internet speeds, rather than the potentially higher speeds of a firm’s internal network. The standard model also has limitations: Compatibility with hardware, other software, and operating systems. Licensing and compliance problems (unauthorized copies with the software program boating the organization). Maintenance, support, and patch revision processes. Data escrow Software as a service data escrow is the process of keeping a copy of critical software-as-a-service application data with an independent third party. Similar to source code escrow, where critical software source code is stored with an independent third party, SaaS data escrow is the same logic applied to data within a SaaS application. It allows companies to protect and insure all the data that resides within SaaS applications, protecting against data loss.”

More to follow.

 

Presidential Mandate

Abel Danger

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.

Looking into our circumstances...