Articles, Page 13 of 205
The Chinese are the pre-eminent adversary in the minds of most cyber threat alarmists. In the past six months, they’ve been called out for industrial espionage and accused of embedding backdoors into commercial routers. Now, in a report by Northrup Grumman (pdf) for the U.S.-China Economic and Security Review Commission, several scenarios are spelled out explicitly detailing how known and suspected Chinese accesses into United States infrastructure will be used in what is called “paralysis warfare”. Looking only from a military lens, the ability to stymie logistical trains utilizing unclassified infrastructure will cripple nearly all long term military operations. The impact on non-combatants remains unclear but bleak.
Anybody remember MySpace? Despite the growing number of chirping crickets in MySpace’s corner of the Internet, they’re still drawing more traffic than Google+. Several months ago, Google+ had already hemorrhaged more than half of it’s userbase. Google’s executives may tout the more than 90 million registered Google+ users, but one must consider simply having a Google account can equate to having a Google+ profile. A large number of developers, to include the much hated but endlessly popular Zynga, indicate quite simply that Google+ doesn’t have the activity base to be worth their development time.
Despite each driver individually thinking they personally have it under control, distracted driving continues to be a problem. Studies have shown the awareness impact of cell phone use while driving can be as significant (and sometimes more so) than driving drunk. The NTSB has harped about the problem for years with their message culminating in a request to ban all electronic devices from cars. While the probable course of action has not gone down that route, the government is proposing the free market correct itself with voluntary measures to disable devices or advanced features within range of the driver.
The skies over America will soon be buzzing with corporate drones. The Senate recently approved a bill pulling back FAA restrictions on commerical drones. Previously only hobbyists and law enforcement were allowed to fly the vehicles. Its easy to think of utility drone use by commercial entitites – disaster relief, emergency response, search and rescue or infrastructure monitoring. But privacy pundits are waving flags regarding the paparazzi’s use of drones or company’s tracking people for data collection purposes.
A short while ago, the National Geographic Channel aired a one hour special on the NSA, the first time cameras had been allowed into the facility since 9/11. At the end of the program, historians at the NSA’s Cryptologic Museum declassified 60 year old letters from John Nash to the agency. Average people will recognize that name as the subject of A Beautiful Mind. The letters themselves go into detail about cipher systems based on computational complexity as the key to future cryptography. His theories essentially predate most published concepts on such cryptographic systems by nearly two decades.
Most people seem to think of street performers as poor artists trying to eek out a living. In 2008, the Washington Post set out to prove just how little people really paid attention to public performances by enlisting the help of Joshua Bell, one of the world’s top violinists. Armed with a multi-million dollar Stradivarius from 1713, Bell performed in the L’Enfant Plaza subway station and played a variety of pieces for 43 minutes to include Johann Sebastian Bach’s Chaconne. As one of the world’s foremost musicians playing one of the most challenging pieces on a priceless instrument … he made $32.17 while passed by nearly everyone at rush hour. The experiment eventually won a Pulitzer Prize for its exposure of our collective, artistic ignorance.
Apple’s next iteration of OS X is named Mountain Lion and developer releases show a convergence of the mobile iOS platform and the legacy desktop edition. As per usual, a number of APIs are added and applications updated though Mountain Lion introduces a new security tool called Gatekeeper allowing users to enforce execution rights based on an application’s origin. Additionally, Apple continued with its typical policy of abandoning older hardware where only the following platforms are expected to run Mountain Lion:
RSA’s public key algorithms (pdf) pretty much runs the Internet’s security and is found everywhere from SSL to SSH. The strength of the system relies upon the computational improbability of an attacker being able to factor down to two large primes. Consumer grade devices, unfortunately, lack the appropriate levels of entropy from which to seed random number generation resulting in number duplication. In a brute force study where researchers scraped literally every public IP on the Internet to grab all discoverable public keys whereupon they “manually verified that 59,000 duplicate keys were repeated due to entropy problems, representing 1% of all certificates, or 2.6% of self-signed certificates” and “also found that 585,000 certificates, or 4.6% of all devices used the default certificates pre-installed on embedded devices.” The full study itself (pdf) goes into mathematical detail on their process for analyzing weak key generation sequences and factoring predictable sequences to derive private keys.
Americans are always whining about net neutrality or other “infringments” they believe are levied against their Internet experience. It’s a good thing they’re not Iranian. According to Internet publishers and blogs, the Iranians have recently begun to block all forms of encrypted Internet traffic? presumably in an effort to permit network censors to monitor all indigenous traffic. When users attempt to access webpages over SSL, they’re redirected to a page loosely warning them that “according to computer crime regulations, access to this Web site is denied.” Such measures seem focused on allowing the government to monitor network traffic such that social uprisings can be pinpointed on various, insidious individuals and suppressed quickly.
Most Americans believe that the Pacific War started when the Japanese attacked Pearl Harbour, and that it ended because the USA hit Hiroshima and Nagasaki with Atomic bombs. They believe that the bombings were a sad necessity to save American lives that would be lost in a bloody invasion of the Japanese home islands.
I beleive that a factual analysis can show that neither of these beliefs are accurate.
The Japanese air attacks on the British in Malaya began at 2 a m on 8 December 1941 which was 9 and a half hours before the bombs began falling on Pearl Harbour. Hong Kong was also hit before Hawaii. This makes the surprise of the American command in Hawaii much harder to excuse.
In The Matrix, the machine apocalypse powered itself off electricity generated from humans. Mankind is bringing the end closer yet again with more science. Researchers have figured out how to harness 50 microamps of power from the body of a cockroach. Their gross little bodies break down sugars which release electrons in the process. If only there was a larger organic mass to power our future, robotic overlords ….
Despite the impressions of America’s glass-half-empty types, our society tries to pride itself on the precept of “innocent until proven guilty.” That concept is Constitutionally protected through the Fifth Amendment, generally interpretted as protecting the accused from having to incriminate themselves.
No person shall be held to answer for a capital, or otherwise infamous crime, unless on a presentment or indictment of a Grand Jury, except in cases arising in the land or naval forces, or in the Militia, when in actual service in time of War or public danger; nor shall any person be subject for the same offense to be twice put in jeopardy of life or limb; nor shall be compelled in any criminal case to be a witness against himself, nor be deprived of life, liberty, or property, without due process of law; nor shall private property be taken for public use, without just compensation.
Syria has been discussed on OmniNerd before … mostly me calling out the Europeans on their hypocrisy for being involved in Libya but not elsewhere. Nevertheless, violence continues unabated. The most recent outbreak has resulted in the Arab League withdrawing their monitors from Syria citing it was now too dangerous. Observers will remain in order to report on the violence, but the monitors checking on the Damascus plan to end bloodshed is coming to a close. Naturally, the Syrians are citing the Arab League’s actions as a ploy to draw more attention from the UN for external intervention.
Star Wars is certainly a movie that has enamoured its fans for the past thirty years. Between arguments of who shot first at Mos Eisley or the merits of the remastered editions, the movie continues to endure. Now it lives on in yet another edition, one compiled from segments re-created/enacted by fans known as Star Wars Uncut. Prepare yourself for two hours of conjoined clips held together loosely by The Force.