How Coverage of the NSA Scandals Ignores the (Obedient) CIA

Counterpunch, Weekend Edition, April 4-6, 2014
An essay that examines the CIA's role in global mass interception and the underlying forces that drive the agency.

Deep State Infographic

Below Gotham, February 27, 2014
With homage to Peter Dale Scott, political observers in Turkey, and a recent essay posted at Bill Moyers, I've created a diagram that depicts where power lies in modern American politics. As John Dewey concluded, it resides in the private sector. The Deep State is the political membrane, the structural layer, through which elite decisions are imposed.

Behold a Pale Farce

Cyberwar, Threat Inflation, and the Malware-Industrial Complex

280 pages, Trine Day, April 2014, ISBN-13: 978-1937584801

Behold a cavalcade of legislators, government officials, and think tank fellows. They claim that the United States waivers perilously at the brink of catastrophe, that foreign powers are poised to cripple the U.S. power grid and decimate the banking system. They warn that if we fail to implement the measures which they endorse, we risk a Cyber Armageddon.

Yet this End Times narrative is a farce, and a pale one at that. These doomsday scenarios serve only to benefit the military-industrial complex. Cyberwar propaganda is an instance of threat inflation. Much like during the run-up to the disastrous global War on Terror. The message of cyberwar elicits a crisis mentality. The end result is an anxious public that's susceptible to ill-conceived, but highly profitable, solutions.

Once more, while the apparatchiks sound the alarm about external threats, there are genuine threats emanating from within. America's Deep State is busy executing campaigns of espionage and sabotage in foreign networks. U.S. intelligence agencies are embroiled in covert operations at home and abroad which have been instrumental in the emergence of a sprawling underground industry that develops weaponized malware and Orwellian mass interception tools. Proponents explain that these developments are necessary to ensure our 'national security.' The reality is that this decidedly offensive approach is seriously undermining our collective security.

In these pages you'll see who is stirring the cyberwar pot, the real threats that we're being distracted from, and the often unacknowledged root causes of our growing cyber insecurity.

Author Note: The original publisher of this book got cold feet and backed off. The chief editor in particular voiced deep concern about "push back," coverage of former DNI Mike McConnell, and the onset of the 2012 Presidential election. Kris Millegan at TrineDay has proven that he's not so easily bullied.

The book's front material (Title page, Dedication, Opening Quote, Table of Contents, Prologue and Preface) can be viewed here.

TransEvolution Infographic

Below Gotham, January 16, 2014
Technology empowers, but it can also enslave. In TransEvolution author Daniel Estulin focuses on the latter, a sort of Ray Kurzweil meets Karl Marx affair. The moneyed elite wish to "end history" as Emmanuel Goldstein described in 1984 using scientific innovation to amplify their control. In an effort to organize my thoughts while I processed the book I've created an infographic that hits most of the major ideas.

General Alexander at Black Hat USA, The Deep State's Talking Points

Counterpunch, Weekend Edition, August 2-4, 2013
A formal response to Keith Alexander's keynote speech at Black Hat USA 2013.

Stuxnet Unbound

Counterpunch, Weekend Edition, June 8-10, 2012
Commentary on state-sponsored malware and American foreign policy.

The Rootkit Arsenal, 2nd Edition

800 pages, Jones & Bartlett, February 2012, ISBN-13: 9781449626365

The Lost Chapter

Below Gotham Labs, December 2011
This is content originally intended for the 2nd edition of the Rootkit Arsenal.

Cyberwar: Hyperbole and Reality - Slides

Below Gotham Labs, October 2010
These are materials that I'll present at SFSU's National Cybersecurity Awareness Event. It's an updated rendition of my Lockdown 2010 slide deck.

Manufacturing Consent and Cyberwar - White Paper

Manufacturing Consent and Cyberwar - Slides

Below Gotham Labs, July 2010
These are materials that I presented at the University of Wisconsin-Madison's Lockdown 2010 Event.

An Uninvited Guest (Who Won't Go Home) - White Paper

An Uninvited Guest (Who Won't Go Home) - Slides

Below Gotham Labs, February 2010
These are materials that I presented at Black Hat DC 2010.

Anti-Forensics: The Rootkit Connection (Paper)

Anti-Forensics: The Rootkit Connection (Slides)

Below Gotham Labs, July 2009
These are materials that I presented at Black Hat USA 2009.

The Rootkit Primer

Below Gotham Labs, April 2009
These are slides from a presentation that I gave at Sonoma State University.

The Rootkit Arsenal

916 pages, Wordware Publishing, April 2009, ISBN-10: 1598220616

"One of the first things I noticed while flipping through this hefty book is the sheer number of topics covered. Perhaps this is a necessity. As the author puts it, rootkits lie 'at the intersection of several related disciplines: computer security, forensics, reverse-engineering, system internals, and device drivers.' Upon closer inspection, it becomes clear that great pains have been taken to cover each subject in sufficient depth and to present ideas in a manner that's both articulate and well organized" -- Nicola Hahn, Slashdot Review

For more information (overview and table of contents) see this page

Cube Farm

176 pages, Apress, August 2004, ISBN-10: 1590594037

Bill Blunden recounts his three years in Minnesota, performing research and development for Lawson Software. Riddled with intrigue, duplicity and collusion, this story offers a trench-level view of a company in the throes of internal rivalry and suffering from a string of failed projects.

"Cube Farm should be required reading for young people considering careers as computer programmers." -- Philip Greenspun, MIT Computer Science Researcher

Offshoring IT: The Good, the Bad, and the Ugly

152 pages, Apress, July 2004, ISBN-10: 1590593960

In addition to presenting the pro-globalization stance of Corporate America, this book gives voice to dissenting opinions that have largely been ignored by the media. The author offers an enlightening, detailed analysis of the offshore outsourcing phenomenon, and exposes the underlying core values of America's economic and political system. Ultimately, the trend of knowledge jobs heading overseas is a dangerous one. The United States is setting themselves up for long-term pain when we don't have the skills to lead the world's economy any more. It doesn't matter how much a multinational company saves with cheap labor if the US job market is made up of low wage jobs that can't buy anything but the essentials.

"Offshoring IT is compelling and technologically well-informed. It's well-researched, and heavily annotated with tons of third-party references and government data." -- Bruce Hadley, softwareCEO.com

Software Exorcism

376 pages, Apress, September 2003, ISBN-10: 1590592344

Takes an unflinching, no bullsh*t look at behavioral problems in the software engineering industry, shedding much-needed light on the social forces that make it difficult for programmers to do their job. Do you have a co-worker who perpetually writes bad code that you are forced to clean up? This is your book. While there are plenty of books on the market that cover debugging and short-term workarounds for bad code, Reverend Bill Blunden takes a revolutionary step beyond them by bringing our attention to the underlying illnesses that plague the software industry as a whole.

"I think the following quote from the introduction sums up the tone of the book nicely: 'Rather than shield your eyes from the sordid realities of the software industry, I am going to dust off my old 8mm films and let you take a good look at the uncensored truth for yourself. You may want to keep a paper bag handy in case you get sick.'" -- Mark Burroughs, Slashdot Review

Message Passing Server Internals

368 pages, McGraw-Hill Professional, May 2003, ISBN-10: 0071416382

With short, step-by-step tutorials, this book moves smoothly from explaining basic theory to designing and implementing high-level subsystems. Background material is presented in a way that will appeal to novice engineers, but the sophisticated approach will make advanced developers feel right at home. The companion CD contains source code for original implementation, in addition to system management utilities.

Memory Management: Algorithms and Implementations

360 pages, Wordware Publishing, October 2002, ISBN-10: 1556223471

Presents several concrete implementations of garbage collection and explicit memory management algorithms. Every implementation is complemented by an in-depth presentation of theory, followed by benchmark tests, a complete listing of C/C++ source code, and a discussion of each implementation's trade-offs.

Virtual Machine Design and Implementation

668 pages, Wordware Publishing, February 2002, ISBN-10: 1556229038

The book begins with a discussion of the theoretical underpinnings of the author's HEC virtual machine and its fundamental design goals, and continues with a section on the implementation of the virtual machine and its debugger. The final section focuses on the HEC assembler, including its interface to the native operating system, interrupts, the assembly language, and how to implement object-oriented constructs. There is also an extended discussion of porting the HEC virtual machine to other platforms. To assist in accomplishing this goal, the author offers a critical path analysis of the development process so that readers can build both their own virtual machine.