You thought the week couldn't get any more mind-blowing? Just wait. Today: turbo cancer, cancerous computer companies, and hyper-ironic roosting deep-state chickens.
Had to pause reading through the opening to come down and write how grateful we are that you take the time to try and summarize history for us. It has been like drinking from a firehose for years now, and it doesn't look like it's slowing down anytime soon. So thank you, you make it easier to keep track of what's happening :) Bless you!
When I was twelve years old my father was teaching me how to rebuild ford and chevy engines in our shop. High tech was a cylinder grinder and learning to read a micrometer to 10,000th of an inch.
When I heard Crowdstrike, I knew I heard that name before in the context of all the impeachment hoaxes. Thanks for saving me some research time.
And could the old Fox and Friends crew of 2019 have looked more skeptical of what President Trump was telling them? They were all but calling him a liar.
Fox is just another “owned” media outlet set up to temporarily appease a side they’ve created. I know no one who isn’t on a “side”. They’ve succeeded wildly.
My wife is a diehard Mac person. She was the very last person allowed to use a Mac as her work computer at a Fortune 10 company. My sorry claim to being the last is two fold. The last to hang a girlie calendar in his office. And the last person to walk out the door after blowing up our department and moving our International operations to Switzerland.
It’s easy to make mistakes when hand writing code, but there are a lot of programs now that can easily check that code. When you’re about to upload an update that could affect a good portion of the world, you check the code on a separate machine that’s not connected to anything.
In honor of the late great Rush Limbaugh, mega dittoes to this comment! This news round up is a breath of fresh air and saves me a lot of time and stress wandering in the news wilderness to stay up to date.
Yes! I believe the sentiment "for such a time as this" applies to you, too, Jeff Childers! Thank you for sharing your incredible insights and experience with the C&C army each and every day! You are helping us keep hope alive!
Jeff is like those reporters and/or photographers who go out on the front lines of the war to make sure the historic documentation is made for those to come. His sacrifice does not go un-noticed in my house and the sacrifice made by his family and his staff. I will never criticize or correct him for a spelling error or a small gaffe and continue to be very thankful that he picked up his pen (typewriter/laptop/whatever) and decided to give us the Covid stats (since 2020) day by day and month by month and eventually adding bits and pieces of news for us. For 4 years Jeff has done this on a daily basis and all of the critics can go to ...... well.....somewhere else that is very hot. Jeff, you are my hero!!!
Crowdstrike falsified logs that the DNC servers were hacked by Russia. These logs were the whole premise for the Russia scam against Trump. Their CEO and board were big donators to Hillary in '16 and Biden in '20.
Crowdstrike was one of two companies (the other being Barisma) mentioned by Trump in the transcript of his "perfect phone call" to Ukrainian president Zelensky for which he was impeached.
They had to retract their claims under oath after it was proven to be an in person leak. RIP Seth Rich.
The CrowdStrike crash caused by a rookie mistake that modern code analysis tools can detect. I've thought about his more and something doesn't seem right. The Co-Founder and CEO of CrowdStrike, George Kurtz, was the CTO of McAfee in 2010 when they published a bad update that bricked Windows computers worldwide. He is a smart guy and I remember speaking with him at security conferences back then. That was a major event for McAfee and I would assume that George would ensure that nothing similar could happen at CrowdStrike. Microsoft patch Tuesday was last week on July 9th and their DevOps team should have updated their CI systems well before pushing out the update early this morning.
Security companies push out updates to their software on a regular basis. Mostly these are rules that are constantly being updated. The rules are used by the software to detect new strains of malware and variations thereof. The CrowdStrike update file was a Windows kernel driver. It takes years of experience to become proficient writing drivers for Windows, Linux, or Mac systems. Most of the Windows's kernel is written in C - just like the Linux kernel. We're always checking arguments for NULL pointers and the current code analysis tools do a good job detecting issues. CrowdStrike made a poor design decision to push out a kernel driver as a supplement - they were asking for trouble.
That is one of the reasons that makes this so suspicious! I've been writing security software for 35 years and Windows drivers for over 20 years. I regularly attend the Microsoft developer's conference for kernel interoperability testing and my company is a senior Microsoft partner. We know how easy it is to brick a system and we go to great lengths to avoid it. We thoroughly test our software and slow roll it out to customers. Our customers get new kernel drivers only after they have been running on our own internal systems for months.
However, I can look at this from an Information Warfare perspective. I was one of the first US Air Force IW officers in the early 90's when the field was brand new. CrowdStrike is installed on a lot of very important systems worldwide. If I can subvert their systems, I can force them to push out an update with "special" capabilities. This is what happened in 2020 with Solar Winds. A foreign adversary infiltrated the company and was able to introduce a backdoor in their management software undetected. US Government customers installed the official Solar Winds update and had the backdoor put into place.
Most IW capabilities are embedded to be used in case of war. Bricking computers like the CrowdStrike debacle shouldn't be done yet. Most nations want the capability to brick a billion computers on demand - not do it after the RNC. For example, look at the efforts to block China infiltrating our power infrastructure: https://www.bbc.com/news/world-asia-68163172
Modern IW activities resemble the cold war. For more than 40 years, US and Soviet subs played a dangerous game that was hardly ever reported. Every day, IT professionals are on the front line deterring ever sophisticated attacks. CrowdStrike just shot everyone in the foot.
WOW--I just 'followed' you, Daniel. This is one of the aspects of being a loyal C & C 'army' member that I am thrilled about. Meeting people who are involved in the intricacies of technology and also so many 'right thinking' members of society. HURAH!!! Thanks for sharing just a snippet of the 'tech warfare' knowledge that you have gleaned in your long IT career!
I realize there are many teachings out there today. But God giving us the news before the news? Preparing us for what is to come? Awesome. JGMinternational.org and put in news key words from today...Microsoft, servers, magna carta and check the dates.
OK, total layperson here. Are you saying some foreign operator managed to find the back door to CS software and trigger the crash? Or that by a level of incompetence that would put a kindergartner to shame they revealed their back door to the world at large? Or just revealed the deep dark secret that these capabilities exist?
It could be incompetence or CrowdStrike could be the patsy. It is not a deep dark secret for those in the industry. Every month Microsoft, Apple, Adobe, and other companies push out updates to fix security issues. Some of these "bugs" have been in place for years. Questions to ask are:
- Was the bug a design flaw in the protocol or implementation?
- Was the bug a mistake by a software developer and not detected?
- Was the bug intentionally put into place?
Attribution is extremely hard in cyberspace. Professionals are not going to directly attack a company from their own Internet connection - they are going to route it through multiple hops using subverted cloud instances, home routers, personal computers, etc. When you mix physical attacks and insider threats with cyber, you can get a very potent capability.
You indicated that usually before something is pushed out to customers it has been running on a test system for quite some time. That is also my experience as someone who was in charge of a system on the user side. Any software updates were always run in a test environment before updating the production system. Wouldn’t that be best practices and, if so how could this be just a case of incompetence? Someone added a line of code just before sending it out to users? In our system it would have been very few individuals with that kind of access. Are these kind of updates not usually tested by the end user before deploying the updates to their production system? As I recall we never pushed updates directly to our production environment, we always did a “clone” of production and ran them there first. I realize for small businesses without IT divisions that would not be the case, but it seems like the giant corporations, banks, etc wouldn’t just allow that to happen given how massively it would affect their customers, but apparently they just trust the updates?
I don't know jack about which you ar speaking, but thanks for all of the detailed information. What I do know is to ask myself "cui bono? " to every such event. Smells like a White Hat operation to me.
Thanks for all of your thoughts. I'm curious if you have an opinion/info as to how planned obsolescence may play into all of this? Maybe it doesn't?? I'm not a techie....
I agree, something is off here. First thing I thought is why the heck didn't they find that bug when they ran the updates internally because I knew they would do that first. As I said yesterday, IDK what's going on but if the error was that much of a rookie mistake, someone nefarious is up to something either inside or not.
Thank you, I learned alot from how you've laid it out. It is the height of irony that before I read any of this, I was over at the WSJ commenting after learning that the shooter was able to fly a drone over the rally site an hour before Trump's appearance, that officers spotted him at that time but then couldn't locate him, and on and on. I said that at this point it's easier to believe in a conspiracy theory than it is to come to grips with the notion that much incompetence exists in our world. Except that everything has become so complex and coupled together, that CLEARLY humans can't really manage it. The sheer scale of possible ramifications so great that it's truly for want of a nail, the shoe was lost, etc etc Trump and Crowdstrike are serious serious things but it only adds to the dread I feel that something REALLY serious can and will happen. OK, bye. Gotta go can some vegetables and feed my chickens.
Exactly! You do it internally for a long time, then you try a few customers, then a few more, for a long time, etc. I haven't done that type of software, I work with medical equipment but since that is under FDA, updates don't get pushed that often because then the device has to be recertified by FDA. So, yea, it goes thru lots of testing, too and the code is locked down which also begs the question of what type of configuration control they are using. I'm thinking it was intentional at this point. And the fact that it affected computers in medical facilities also begs the question of why in the world those computers are allowed to accept uncontrolled automatic updates. IDK, maybe it was only the scheduling software in the medical offices and not the FDA approved devices but I bet medical facilities are turning off automatic updates now!
Daniel, I read everything you wrote and it was all very logical, I didn’t even run away screaming and covering my ears, with my eyes rolling around and my tongue hanging out. I normally freak out when I have to google how to do something technical on my Mac, I freeze up and can’t think. How you got through to me I’ll never know 🤣🤪😱
Crowdstrike Falcon always seemed like a foolish thing to allow onto billions of computers. It would hog CPU and bog down everything. Attempts to kill it would get me reported to the security department for re-education. I wondered how embedded it was with the OS and by extension, how trusting anyone could be in such a 3rd party tyrannical overlay that would lock you out of your computer, or in this case, crash the OS, a result complicated by BitLocker drives that made recovery a bit more annoying.
I'm very happy this crash happened, forcing the ugly truth out into the open.
Everyone's experience is not the same, though. I worked for a company that was absorbed by the Microsoft collective. Microsoft was "We deploy on schedule and fix it later". End of statement. My current experience in my new company is the the "Senior" person doing code review doesn't even know what our code does, he just got hired a few months ago. QA has fallen by the wayside for UAT. Those two are NOT interchangeable. People don't even know what the error being spit out means, because it's not always the true error.
I used to wait to install updates for a week after updates bricked so many computers, then Microsoft made it impossible to do so at work. Fortunately, we decided against Crowdstrike.
The SDLC (software development life cycle) has deteriorated to "Do it fast, release on time, don't bother checking on various configurations, let the user tell us where we screwed up". IMO.
Conspiracyception: Someone got wind that Crowdstrike was under the control of a global conspiracy, and deliberately bugged the crowdstrike update to draw attention to a global vulnerability before it could be used in anger.
... I don't actually believe that, but I'd write it into a movie script.
No - but it uses the same definition. Kernel defines the edible part of a seed or grain, or the most essential part of a seed or experience. All modern operating systems, Windows, MacOS, Linux, etc., have a core part called the kernel. It provides the interface between programs like a web browser and the device hardware.
Microsoft laid off most of the Windows test group years ago. Updates can and do cause issues and Microsoft does pull updates that cause issues. They usually detect when an update is causing crashes and pull the update before it is widespread. Most PCs will load the new update in 24-48 hours after release.
I patch a lot of test systems on my home development network. I usually start with a couple to see how stable it is and then rapidly move on to the rest. I would prefer to identify the issue quickly. The company I am currently working for is a Microsoft partner and we can quickly notify them when an issue arises.
My recommendation is to wait a day for patching a home system. The key point is to back up your data and applications. I work on the assumption that the Internet can go down at any time, the hardware may fail, or a massive cyberattack could occur.
I’m a non Geek too. Somehow to me this seems similar to people getting ill from an unknown virus and pharmaceutical companies rushing to develop a safe and effective vaccine. What makes it more intriguing is the primary mover behind Microsoft just happens to be the same person pushing vaccine development.
Daniel Teal, a developer friend is guiding a new hire 'developer' in his company, who doesn't really know his job, but he's not an American and may not command a salary equivalent to my friend's. My friend says that in essence the good developers are training their less-qualified replacements. Could that have happened here, a bone-headed mistake by a less qualified but less expensive employee?
The read address in the crash dump is non-zero - which is commonly caused by adding a structure offset to a provided address. If the address is NULL (i.e. zero), then the read address displayed is only offset. This is why kernel developers ALWAYS check arguments to functions - even when it is only used internally to the driver.
Right I get it, I’ve written drivers too. Zack ran one command in windbg and concluded in his “analysis” that it was a null pointer (which it technically is not). It may be or it may not be true. Maybe you consider that a “good job”, I don’t. This credentialed showmanship does nothing toward getting closer to the truth.
So, technically it was not a dereference of an actual null pointer, it was a dereference of an OFFSET from a null pointer (or so the threads seem to suggest). Very much the same result, in practice.
... is "technically correct" still the best kind of correct? ;)
In this case, yes ;) I do not have access to the CrowdStrike Falcon software, update files, or crash dumps. I'm sure we'll found out more technical details on what exactly occurred, and it will reflect poorly on CrowdStrike.
I agree that there are many other ways to get a corrupt address in the kernel. That said, the crash was pretty reliable since it took out so many systems. Null pointers are very reliable at crashing vulnerable code. Whatever the core issue, CrowdStrike should have had a system in place to mitigate the impact of a bad update.
Based Florida Man: you mentioned‘shooter kid’. Don’t you find it strange that the “shooter” is not referred to as “alleged shooter”? Even Trump’s assassination attempt was referred to as “alleged assassination attempt” until the FBI acknowledged the obvious. No ballistic test have been provided, the SS is radio silence except for a 2 minute interview justification for not securing the rooftop... yet he is the Shooter.
Yes, WHY was the botched HIT JOB so uniformly downplayed by the corrupt Fake Media???? Who was initiating that wholesale whitewash of the WORLD's biggest news event since Reagan was nearly done in by similar means? The successful Trump is dead narrative would've in like manner been handled by a giddy media army of Humanity-Haters showcasing it all in-depth and with deep concern but glee;
but the surprising screw-up of the inside job was itself so very tidily dealt with from the initial Misinformation of popping noises and falling on stage to this very day of normalizing it and poo-pooing the attack, and saying that "both sides" need to tone it down. This lockstep disinformation industry has NO whistleblowers or gutsy journalists willing to spill the beans on their depraved evil masters, unFKing-Real ??? Cult-controlled to an extent that is implausible....
It's been less than a week, and the pressure on the narrative is steadily building. The first serious attempts at acoustical gunshot analysis came out in the last two days, and the crowdsourcing of videos will make that a lot more certain and unshakable. (By Chris Martenson and Mike Adams)
I'd like to hear witnesses discussing activity near the watertower or other areas as well...seems like a poor position to hit the podium with flags and speakers, etc, but maybe they had a backup failsafe shooter or spotter there. I assume the County sheriff was immediately shooed away and all evidence swept up by the FBI
I hope that no one bought into the request for videos from the crowd by the investigating agency. Known, as we’ve seen over & over, for destroying evidence. Question for all of you are so much more knowledgeable: is it possible for a 3 letter agency to erase targeted information from the cloud?
Here I will insert my plea to stop using the word 'shooter' for murderers and assassins. I'm a shooter; many people reading this are shooters; we are all law-abiding, Constitution-loving citizens. Don't let them own the language and change what people think without even realizing it's happening.
Same thing I am seeing. At least 3 different shooters. And never forget. EVERYTHING we have ever been told officially about anything of import is a lie. I'm still looking to find my first exception.
Fk Yeah, the shots' audio can be isolated and a few appeared to be still coming as Trump and security left the stage (thank God his ground team weren't part of the conspiracy), the slugs that hit everywhere can be found; all we need NOW is a veteran Butler County Cop to come forward and say that they were told that a Secret Service hired contractor was going to be securing the barely sloped roof. Of course he'd immediately have a heart attack or commit suicide. BEST CASE is that the alleged "lone" shooter was allowed to fire 5-8 shots before he was at last executed without a trial.
The official narrative is still that all these assassins acted alone. We may not believe it, but I don’t think the government’s story has changed on any of them and there are varying contrasting narratives that also differ.
Many armchair Sherlock’s, of which Jimmy Dore believes he is a major one. He’s a little too out there and full of himself for me.
Willing Spirit: armchair Sherlocks spring up because the government keeps important elements away from the public. Currently, what we know about the “lone gunman”.
He failed on the JV gun team in HS.
He brought in a ladder, range finder, and cell phone.
Kids picked on him in HS.
He shot at Trump.
He pointed his weapon at a policeman.
There were bomb making materials in his vehicle.
He is a registered Republican, donated $15 to some progressive outfit and looked up porn as his last Internet search.
... it has been 7 days since the shooting and we don’t even know what calibre of bullet was used.
I’m a fan of armchair Sherlock’s, being something of one myself. But I wouldn’t want anyone to bet on my conclusions. Of course, I’m not particularly knowledgeable.
The public never has access to information that would allow the public to make an informed decision. Such as Voting fraud investigation is always carried out by compromised companies... just like Independent counsels hired by the DOJ... most people don’t bite the hand that feeds them because they won’t receive follow-on business.
Why did only ONE of the countersnipers sighting in gunman patsy #1 shoot? And we know that 3-8 shots were taken before the fatal strike on the alleged main gunperson, what are the "popping" noises i hear as the security detail surrounds Trump and they take 2+ minutes to get him from the stage into the SUV (that for some reason didn't bother to back up closer)? No presidential armored ambulance on scene? The filthy Left has NO CONCERN if Trump and 20+ congresspersons are killed in broad daylight... they could care less about Old Sick Joe or his Hyena in Heels VP CowMala. The Revolution can eat everything it wants, that's how it Progresses at the most effective rate.
How many of his friends and family have been talking? Who amongst his teachers, employers (BlackRot), etc have Security State ties? How many other Rally sites have been scouted by killers, or this individual himself? How is it that the security coverage "lapse" occurred only exactly where this puke was interested in shooting from? He is registered Rep. that's great cover for an AR15 shooter...no matter which politician he's directed to take from 3-8 shots at and perhaps detonate his car to help cause crowd casualties and confusion immediately afterward. It was a setup and inside job, a 9-11, Kennedy kill job that was nearly perfect and would easily have been excused and swept under the rug and KOOK-Big Lie Believer labels and censorship to have been used (again) extensively and derisively by the Killers-Media.... DO NOT ALLOW THAT. They may be offing Old Sick Joe with a pillow next...or another FAKE MAGA assassin.
Except we who use Audacity audio workflow software can (and have) run a frequency spectrum analysis on the sets of gunshots, and have noted that the sound signatures are as different as Biden is from a rutabaga.
Had to pause reading through the opening to come down and write how grateful we are that you take the time to try and summarize history for us. It has been like drinking from a firehose for years now, and it doesn't look like it's slowing down anytime soon. So thank you, you make it easier to keep track of what's happening :) Bless you!
Amen! May God bless Jeff Childers and Coffee & Covid!!
Yes! Thank you, thank you. This column is such a blessing and ……so much fun!!
Agree!! A blessing, informative and fun—what could be better??
For sure. I know next to nothing about all of this tech stuff, so the info about Crowdstrike is especially helpful.
When I was twelve years old my father was teaching me how to rebuild ford and chevy engines in our shop. High tech was a cylinder grinder and learning to read a micrometer to 10,000th of an inch.
I'm sure you have used that 'mechanical skill' many, many times in your life--good for you!!
I notice your dad did not subject you to Dodge!
lol
Joseph, kind of like when I learned to use a slide rule in college in the 70's.
When I heard Crowdstrike, I knew I heard that name before in the context of all the impeachment hoaxes. Thanks for saving me some research time.
And could the old Fox and Friends crew of 2019 have looked more skeptical of what President Trump was telling them? They were all but calling him a liar.
Fox is not pro-Trump; mixed bag at best.
Noticed that too
Fox is just another “owned” media outlet set up to temporarily appease a side they’ve created. I know no one who isn’t on a “side”. They’ve succeeded wildly.
I'm with you. No knowledge of Crowdstrike, but it came to my mind yesterday morning, "Is this related to Russia and Ukraine?"
Same here. And I’m glad I have a Mac!
My wife is a diehard Mac person. She was the very last person allowed to use a Mac as her work computer at a Fortune 10 company. My sorry claim to being the last is two fold. The last to hang a girlie calendar in his office. And the last person to walk out the door after blowing up our department and moving our International operations to Switzerland.
Wise decision!
I totally agree.
It’s easy to make mistakes when hand writing code, but there are a lot of programs now that can easily check that code. When you’re about to upload an update that could affect a good portion of the world, you check the code on a separate machine that’s not connected to anything.
Yes!!
And President Starfruit!!! We’re on to fruits now! 🤣🤣🤣 You’re killin’ me Smalls!
I love your C&C newspaper. All the headlines necessary to hear. You save me so much time. Thank you for your devoted service. ❤️
LOL. Maybe next week we can explore the realm of nuts- Resident Walnut? President Pistachio?
He thinks he’s a special Marcona almond but he’s just a bag of stale mixed nuts from Costco.
HAAA! Good one!
😆😆😆
Standing by for President Acai . . . Nobody even knows how to say it.
I call him Joseph Raisinette Biden 😊
But I love that blueberry/açaí dark chocolate candy!
That's incorrect, but it works better that way!
In honor of the late great Rush Limbaugh, mega dittoes to this comment! This news round up is a breath of fresh air and saves me a lot of time and stress wandering in the news wilderness to stay up to date.
I would love to hear what Rush would say about all of this.
I often think this! His voice (literally) and insights are so missed.
But I also am so thankful for him that he got to be released from suffering on earth and welcomed home to his Savior.
Yes! I believe the sentiment "for such a time as this" applies to you, too, Jeff Childers! Thank you for sharing your incredible insights and experience with the C&C army each and every day! You are helping us keep hope alive!
I do agree! Thank you a million times over! Xxoo
LOL that is what I wrote on my forwarding to my friends, history being clarified. Thank you Jeff!
As Rush would have said, Jeff is disgronifying history for us.
Indeed...many thanks...
my most re-stacked writer.Thanks, Jeff!!
Jeff is like those reporters and/or photographers who go out on the front lines of the war to make sure the historic documentation is made for those to come. His sacrifice does not go un-noticed in my house and the sacrifice made by his family and his staff. I will never criticize or correct him for a spelling error or a small gaffe and continue to be very thankful that he picked up his pen (typewriter/laptop/whatever) and decided to give us the Covid stats (since 2020) day by day and month by month and eventually adding bits and pieces of news for us. For 4 years Jeff has done this on a daily basis and all of the critics can go to ...... well.....somewhere else that is very hot. Jeff, you are my hero!!!
Very well said. Thank you 🙏
Great writeup on the Crowdstrike debacle!
Crowdstrike falsified logs that the DNC servers were hacked by Russia. These logs were the whole premise for the Russia scam against Trump. Their CEO and board were big donators to Hillary in '16 and Biden in '20.
Crowdstrike was one of two companies (the other being Barisma) mentioned by Trump in the transcript of his "perfect phone call" to Ukrainian president Zelensky for which he was impeached.
They had to retract their claims under oath after it was proven to be an in person leak. RIP Seth Rich.
https://itwire.com/business-it-news/security/crowdstrike-chief-admits-no-proof-that-russia-exfiltrated-dnc-emails.html
Also BlackRock owns a $5.6Billion stake in Crowdstrike. (Recall the BlackRock ad with the 'shooter' kid...)
The CrowdStrike crash caused by a rookie mistake that modern code analysis tools can detect. I've thought about his more and something doesn't seem right. The Co-Founder and CEO of CrowdStrike, George Kurtz, was the CTO of McAfee in 2010 when they published a bad update that bricked Windows computers worldwide. He is a smart guy and I remember speaking with him at security conferences back then. That was a major event for McAfee and I would assume that George would ensure that nothing similar could happen at CrowdStrike. Microsoft patch Tuesday was last week on July 9th and their DevOps team should have updated their CI systems well before pushing out the update early this morning.
Security companies push out updates to their software on a regular basis. Mostly these are rules that are constantly being updated. The rules are used by the software to detect new strains of malware and variations thereof. The CrowdStrike update file was a Windows kernel driver. It takes years of experience to become proficient writing drivers for Windows, Linux, or Mac systems. Most of the Windows's kernel is written in C - just like the Linux kernel. We're always checking arguments for NULL pointers and the current code analysis tools do a good job detecting issues. CrowdStrike made a poor design decision to push out a kernel driver as a supplement - they were asking for trouble.
How did this get through without major testing? Errors in business programming are bad enough, but a kernel driver?
That is one of the reasons that makes this so suspicious! I've been writing security software for 35 years and Windows drivers for over 20 years. I regularly attend the Microsoft developer's conference for kernel interoperability testing and my company is a senior Microsoft partner. We know how easy it is to brick a system and we go to great lengths to avoid it. We thoroughly test our software and slow roll it out to customers. Our customers get new kernel drivers only after they have been running on our own internal systems for months.
However, I can look at this from an Information Warfare perspective. I was one of the first US Air Force IW officers in the early 90's when the field was brand new. CrowdStrike is installed on a lot of very important systems worldwide. If I can subvert their systems, I can force them to push out an update with "special" capabilities. This is what happened in 2020 with Solar Winds. A foreign adversary infiltrated the company and was able to introduce a backdoor in their management software undetected. US Government customers installed the official Solar Winds update and had the backdoor put into place.
Most IW capabilities are embedded to be used in case of war. Bricking computers like the CrowdStrike debacle shouldn't be done yet. Most nations want the capability to brick a billion computers on demand - not do it after the RNC. For example, look at the efforts to block China infiltrating our power infrastructure: https://www.bbc.com/news/world-asia-68163172
Modern IW activities resemble the cold war. For more than 40 years, US and Soviet subs played a dangerous game that was hardly ever reported. Every day, IT professionals are on the front line deterring ever sophisticated attacks. CrowdStrike just shot everyone in the foot.
WOW--I just 'followed' you, Daniel. This is one of the aspects of being a loyal C & C 'army' member that I am thrilled about. Meeting people who are involved in the intricacies of technology and also so many 'right thinking' members of society. HURAH!!! Thanks for sharing just a snippet of the 'tech warfare' knowledge that you have gleaned in your long IT career!
Thanks. I've also been impressed with the C & C army and the amount of hard work Jeff Childers puts in every day.
We are all REALLY BLESSED to have found J. C. and EACH OTHER!!
SHALOM!!
Yes I love the broad variety of experience and expertise here in the C&C comments!
I realize there are many teachings out there today. But God giving us the news before the news? Preparing us for what is to come? Awesome. JGMinternational.org and put in news key words from today...Microsoft, servers, magna carta and check the dates.
Also on Rumble, live on weekdays.
Me too! On X
OK, total layperson here. Are you saying some foreign operator managed to find the back door to CS software and trigger the crash? Or that by a level of incompetence that would put a kindergartner to shame they revealed their back door to the world at large? Or just revealed the deep dark secret that these capabilities exist?
It could be incompetence or CrowdStrike could be the patsy. It is not a deep dark secret for those in the industry. Every month Microsoft, Apple, Adobe, and other companies push out updates to fix security issues. Some of these "bugs" have been in place for years. Questions to ask are:
- Was the bug a design flaw in the protocol or implementation?
- Was the bug a mistake by a software developer and not detected?
- Was the bug intentionally put into place?
Attribution is extremely hard in cyberspace. Professionals are not going to directly attack a company from their own Internet connection - they are going to route it through multiple hops using subverted cloud instances, home routers, personal computers, etc. When you mix physical attacks and insider threats with cyber, you can get a very potent capability.
We have been TOLD there would be a "cyber-pandemic."
Now we have been SHOWN that there will be a "cyber-pandemic."
By the same arsonists that started the COVID fire.
You indicated that usually before something is pushed out to customers it has been running on a test system for quite some time. That is also my experience as someone who was in charge of a system on the user side. Any software updates were always run in a test environment before updating the production system. Wouldn’t that be best practices and, if so how could this be just a case of incompetence? Someone added a line of code just before sending it out to users? In our system it would have been very few individuals with that kind of access. Are these kind of updates not usually tested by the end user before deploying the updates to their production system? As I recall we never pushed updates directly to our production environment, we always did a “clone” of production and ran them there first. I realize for small businesses without IT divisions that would not be the case, but it seems like the giant corporations, banks, etc wouldn’t just allow that to happen given how massively it would affect their customers, but apparently they just trust the updates?
Maybe these software bugs are really features.
I don't know jack about which you ar speaking, but thanks for all of the detailed information. What I do know is to ask myself "cui bono? " to every such event. Smells like a White Hat operation to me.
Thanks for all of your thoughts. I'm curious if you have an opinion/info as to how planned obsolescence may play into all of this? Maybe it doesn't?? I'm not a techie....
I agree, something is off here. First thing I thought is why the heck didn't they find that bug when they ran the updates internally because I knew they would do that first. As I said yesterday, IDK what's going on but if the error was that much of a rookie mistake, someone nefarious is up to something either inside or not.
Pushing out a new kernel driver to the entire customer base without proper internal testing is a bad idea.
- If it was poor testing. CrowdStrike will pay the price in the marketplace.
- If it was an external threat, CrowdStrike needs to own up to it. No company is immune to nation state IW capabilities.
I'm sure CrowdStrike is going through all of their logs to determine exactly how the change was made. They may not know the exact cause yet.
Thank you, I learned alot from how you've laid it out. It is the height of irony that before I read any of this, I was over at the WSJ commenting after learning that the shooter was able to fly a drone over the rally site an hour before Trump's appearance, that officers spotted him at that time but then couldn't locate him, and on and on. I said that at this point it's easier to believe in a conspiracy theory than it is to come to grips with the notion that much incompetence exists in our world. Except that everything has become so complex and coupled together, that CLEARLY humans can't really manage it. The sheer scale of possible ramifications so great that it's truly for want of a nail, the shoe was lost, etc etc Trump and Crowdstrike are serious serious things but it only adds to the dread I feel that something REALLY serious can and will happen. OK, bye. Gotta go can some vegetables and feed my chickens.
Exactly! You do it internally for a long time, then you try a few customers, then a few more, for a long time, etc. I haven't done that type of software, I work with medical equipment but since that is under FDA, updates don't get pushed that often because then the device has to be recertified by FDA. So, yea, it goes thru lots of testing, too and the code is locked down which also begs the question of what type of configuration control they are using. I'm thinking it was intentional at this point. And the fact that it affected computers in medical facilities also begs the question of why in the world those computers are allowed to accept uncontrolled automatic updates. IDK, maybe it was only the scheduling software in the medical offices and not the FDA approved devices but I bet medical facilities are turning off automatic updates now!
Daniel, I read everything you wrote and it was all very logical, I didn’t even run away screaming and covering my ears, with my eyes rolling around and my tongue hanging out. I normally freak out when I have to google how to do something technical on my Mac, I freeze up and can’t think. How you got through to me I’ll never know 🤣🤪😱
Crowdstrike Falcon always seemed like a foolish thing to allow onto billions of computers. It would hog CPU and bog down everything. Attempts to kill it would get me reported to the security department for re-education. I wondered how embedded it was with the OS and by extension, how trusting anyone could be in such a 3rd party tyrannical overlay that would lock you out of your computer, or in this case, crash the OS, a result complicated by BitLocker drives that made recovery a bit more annoying.
I'm very happy this crash happened, forcing the ugly truth out into the open.
Thank you for this clear explanation to us non-techies! Much appreciated.
Everyone's experience is not the same, though. I worked for a company that was absorbed by the Microsoft collective. Microsoft was "We deploy on schedule and fix it later". End of statement. My current experience in my new company is the the "Senior" person doing code review doesn't even know what our code does, he just got hired a few months ago. QA has fallen by the wayside for UAT. Those two are NOT interchangeable. People don't even know what the error being spit out means, because it's not always the true error.
I used to wait to install updates for a week after updates bricked so many computers, then Microsoft made it impossible to do so at work. Fortunately, we decided against Crowdstrike.
The SDLC (software development life cycle) has deteriorated to "Do it fast, release on time, don't bother checking on various configurations, let the user tell us where we screwed up". IMO.
Maybe. But sometimes dumb things happen. I remember when a Russian space probe was permanently shut down by alphanumeric data.
Conspiracyception: Someone got wind that Crowdstrike was under the control of a global conspiracy, and deliberately bugged the crowdstrike update to draw attention to a global vulnerability before it could be used in anger.
... I don't actually believe that, but I'd write it into a movie script.
Thank you Daniel!
Very interesting!
Probably similar to corporate capture in the “ healthcare” agencies. Which we know are truly sick care agencies.
It doesn't.
So for us non-gekes, does this have anything to do with corn?
No - but it uses the same definition. Kernel defines the edible part of a seed or grain, or the most essential part of a seed or experience. All modern operating systems, Windows, MacOS, Linux, etc., have a core part called the kernel. It provides the interface between programs like a web browser and the device hardware.
Also for us non-geeks, what does this mean for our home PCs? I use Windows on my personal laptop. No Crowdstrike that I'm aware of?
Am I safe to keep accepting Windows updates?
This all is such a joke of a mess. I don't even have words. The powers that are bent on disrupting our lives.
Microsoft laid off most of the Windows test group years ago. Updates can and do cause issues and Microsoft does pull updates that cause issues. They usually detect when an update is causing crashes and pull the update before it is widespread. Most PCs will load the new update in 24-48 hours after release.
I patch a lot of test systems on my home development network. I usually start with a couple to see how stable it is and then rapidly move on to the rest. I would prefer to identify the issue quickly. The company I am currently working for is a Microsoft partner and we can quickly notify them when an issue arises.
My recommendation is to wait a day for patching a home system. The key point is to back up your data and applications. I work on the assumption that the Internet can go down at any time, the hardware may fail, or a massive cyberattack could occur.
I’m a non Geek too. Somehow to me this seems similar to people getting ill from an unknown virus and pharmaceutical companies rushing to develop a safe and effective vaccine. What makes it more intriguing is the primary mover behind Microsoft just happens to be the same person pushing vaccine development.
My BIL pulled the file that caused the problem. It was 25 lines of code...of all "0"s.
Kudos to you for understanding all of this. My brain likes English and History. Trying to understand all of this makes my head hurt.
Daniel Teal, a developer friend is guiding a new hire 'developer' in his company, who doesn't really know his job, but he's not an American and may not command a salary equivalent to my friend's. My friend says that in essence the good developers are training their less-qualified replacements. Could that have happened here, a bone-headed mistake by a less qualified but less expensive employee?
That could be the case. If so, company management should pay the price because it is a poor decision.
I got the notice of the need to update in the middle of the RNC. I was watching it live on-line. Weird...
Look at the read address, it was not a null pointer
Zach Vorhies did a good job explaining the crash: https://x.com/Perpetualmaniac/status/1814376668095754753
The read address in the crash dump is non-zero - which is commonly caused by adding a structure offset to a provided address. If the address is NULL (i.e. zero), then the read address displayed is only offset. This is why kernel developers ALWAYS check arguments to functions - even when it is only used internally to the driver.
Right I get it, I’ve written drivers too. Zack ran one command in windbg and concluded in his “analysis” that it was a null pointer (which it technically is not). It may be or it may not be true. Maybe you consider that a “good job”, I don’t. This credentialed showmanship does nothing toward getting closer to the truth.
So, technically it was not a dereference of an actual null pointer, it was a dereference of an OFFSET from a null pointer (or so the threads seem to suggest). Very much the same result, in practice.
... is "technically correct" still the best kind of correct? ;)
In this case, yes ;) I do not have access to the CrowdStrike Falcon software, update files, or crash dumps. I'm sure we'll found out more technical details on what exactly occurred, and it will reflect poorly on CrowdStrike.
I agree that there are many other ways to get a corrupt address in the kernel. That said, the crash was pretty reliable since it took out so many systems. Null pointers are very reliable at crashing vulnerable code. Whatever the core issue, CrowdStrike should have had a system in place to mitigate the impact of a bad update.
Based Florida Man: you mentioned‘shooter kid’. Don’t you find it strange that the “shooter” is not referred to as “alleged shooter”? Even Trump’s assassination attempt was referred to as “alleged assassination attempt” until the FBI acknowledged the obvious. No ballistic test have been provided, the SS is radio silence except for a 2 minute interview justification for not securing the rooftop... yet he is the Shooter.
Things that make you go hmmm!
Yes, WHY was the botched HIT JOB so uniformly downplayed by the corrupt Fake Media???? Who was initiating that wholesale whitewash of the WORLD's biggest news event since Reagan was nearly done in by similar means? The successful Trump is dead narrative would've in like manner been handled by a giddy media army of Humanity-Haters showcasing it all in-depth and with deep concern but glee;
but the surprising screw-up of the inside job was itself so very tidily dealt with from the initial Misinformation of popping noises and falling on stage to this very day of normalizing it and poo-pooing the attack, and saying that "both sides" need to tone it down. This lockstep disinformation industry has NO whistleblowers or gutsy journalists willing to spill the beans on their depraved evil masters, unFKing-Real ??? Cult-controlled to an extent that is implausible....
It's been less than a week, and the pressure on the narrative is steadily building. The first serious attempts at acoustical gunshot analysis came out in the last two days, and the crowdsourcing of videos will make that a lot more certain and unshakable. (By Chris Martenson and Mike Adams)
I'd like to hear witnesses discussing activity near the watertower or other areas as well...seems like a poor position to hit the podium with flags and speakers, etc, but maybe they had a backup failsafe shooter or spotter there. I assume the County sheriff was immediately shooed away and all evidence swept up by the FBI
Chris Martenson (Peak Prosperity) is talking about the need for a citizen's investigation. "Crooks Unbelievable Path to the Roof"
https://www.youtube.com/watch?v=q9F7EweGE8I 45 minute video
I hope that no one bought into the request for videos from the crowd by the investigating agency. Known, as we’ve seen over & over, for destroying evidence. Question for all of you are so much more knowledgeable: is it possible for a 3 letter agency to erase targeted information from the cloud?
Here I will insert my plea to stop using the word 'shooter' for murderers and assassins. I'm a shooter; many people reading this are shooters; we are all law-abiding, Constitution-loving citizens. Don't let them own the language and change what people think without even realizing it's happening.
Good point!
This is very interesting.
https://x.com/vigilantfox/status/1814420611776819214?s=61
this is in the comments on your post: https://x.com/PatriotVoice24/status/1814512719355166725
Holy cow.
grassy knoll killers-- hirelings of FBI/CIA Domestic Assassination Division
Your comment gave me chills. This is too similar to the JFK setup.
Bet she’s not the only one, either.
Yes very interesting. I watched it last night. Definitely can hear at least 2 different weapons
Same thing I am seeing. At least 3 different shooters. And never forget. EVERYTHING we have ever been told officially about anything of import is a lie. I'm still looking to find my first exception.
Fk Yeah, the shots' audio can be isolated and a few appeared to be still coming as Trump and security left the stage (thank God his ground team weren't part of the conspiracy), the slugs that hit everywhere can be found; all we need NOW is a veteran Butler County Cop to come forward and say that they were told that a Secret Service hired contractor was going to be securing the barely sloped roof. Of course he'd immediately have a heart attack or commit suicide. BEST CASE is that the alleged "lone" shooter was allowed to fire 5-8 shots before he was at last executed without a trial.
Mike Adams does very detailed mathematical analysis of each of the 7 shots, including approximate distances.
https://www.brighteon.com/96421c5f-2175-4737-aee3-b8dbac111b66
The official narrative is still that all these assassins acted alone. We may not believe it, but I don’t think the government’s story has changed on any of them and there are varying contrasting narratives that also differ.
Many armchair Sherlock’s, of which Jimmy Dore believes he is a major one. He’s a little too out there and full of himself for me.
Willing Spirit: armchair Sherlocks spring up because the government keeps important elements away from the public. Currently, what we know about the “lone gunman”.
He failed on the JV gun team in HS.
He brought in a ladder, range finder, and cell phone.
Kids picked on him in HS.
He shot at Trump.
He pointed his weapon at a policeman.
There were bomb making materials in his vehicle.
He is a registered Republican, donated $15 to some progressive outfit and looked up porn as his last Internet search.
... it has been 7 days since the shooting and we don’t even know what calibre of bullet was used.
So much to consider.
This sounded logical to me.
https://www.armstrongeconomics.com/uncategorized/cnns-report-3-guns-fired/?utm_source=Newsletter&utm_medium=Email&utm_campaign=RSS
I’m a fan of armchair Sherlock’s, being something of one myself. But I wouldn’t want anyone to bet on my conclusions. Of course, I’m not particularly knowledgeable.
The public never has access to information that would allow the public to make an informed decision. Such as Voting fraud investigation is always carried out by compromised companies... just like Independent counsels hired by the DOJ... most people don’t bite the hand that feeds them because they won’t receive follow-on business.
Why did only ONE of the countersnipers sighting in gunman patsy #1 shoot? And we know that 3-8 shots were taken before the fatal strike on the alleged main gunperson, what are the "popping" noises i hear as the security detail surrounds Trump and they take 2+ minutes to get him from the stage into the SUV (that for some reason didn't bother to back up closer)? No presidential armored ambulance on scene? The filthy Left has NO CONCERN if Trump and 20+ congresspersons are killed in broad daylight... they could care less about Old Sick Joe or his Hyena in Heels VP CowMala. The Revolution can eat everything it wants, that's how it Progresses at the most effective rate.
Right and why haven’t we seen the gun blasted all over the news? Gee what a great use case to push the gun control agenda. Crickets.
How many of his friends and family have been talking? Who amongst his teachers, employers (BlackRot), etc have Security State ties? How many other Rally sites have been scouted by killers, or this individual himself? How is it that the security coverage "lapse" occurred only exactly where this puke was interested in shooting from? He is registered Rep. that's great cover for an AR15 shooter...no matter which politician he's directed to take from 3-8 shots at and perhaps detonate his car to help cause crowd casualties and confusion immediately afterward. It was a setup and inside job, a 9-11, Kennedy kill job that was nearly perfect and would easily have been excused and swept under the rug and KOOK-Big Lie Believer labels and censorship to have been used (again) extensively and derisively by the Killers-Media.... DO NOT ALLOW THAT. They may be offing Old Sick Joe with a pillow next...or another FAKE MAGA assassin.
Of which in my experience Chris Martenson is one.
Except we who use Audacity audio workflow software can (and have) run a frequency spectrum analysis on the sets of gunshots, and have noted that the sound signatures are as different as Biden is from a rutabaga.
Glad to hear it - I mean, that someone besides Chris says it. :)
I’m not saying they’re necessarily wrong all the time. They just need sensationalism to stay alive and therefore need some scrutiny.
Just wondering: How different is Biden from a rutabaga? Are the differences noticeable?