The new EricMartindale.com is an experiment in data aggregation, and might have a few bugs. Feel free to explore, and then provide feedback directly to @martindale.

search results for activity

Importing StackOverflow (...et al) into Chryp Using Aggregates

StackOverflow LogoAs I have mentioned before, I'm in a love affair with Chyrp, which is an up-and-coming platform meant to replace WordPress and work a bit like Tumblr, as a microblogging and lifestreaming service.

One of Chyrp's major draws for me is the Aggregator module, which is included in Chryp 2.0 by default. Mike Crittenden of MergeWeb Fame has covered the use of Chyrp's Aggregator previously, but I figured I'd dive in a bit further and help others in configuring their feeds.

You may also be familiar with StackOverflow, a crowd-sourcing social-media head-bashing awesome site that enables users to ask tech-related questions and get awesome community-approved answers. The same group runs several other sites using the same model, including SuperUser and ServerFault, and they are even releasing their codebase as free and open source as the <a href="http://stackexchange.com/>StackExchange project.

But, onward into the goodies: syndicating your activity on StackOverflow (and the other sites) using Chryp.

The first you'll need is your Activity Feed. To acquire this, visit the "Recent" tab of your user profile and look in the bottom right hand corner: you'll see a link to "user recent activity feed". This is the URL for your activity feed, grab that and let's move on to Chyrp.

In Chyrp, you'll want to add a new aggregate in your Admin panel. Paste your Activity Feed into the "Source URL" box, then configure the remaining settings as follows:

Feather: Link Post Attributes: name: "feed[title]" source: "feed[id]" description: "feed[description]"

Now, assign a "Name" and make sure the correct Author is selected, and click "Update". You're all done! You'll see new content from your feed the next time your aggregates update.

Questions? Comments? Lemme have 'em.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

RPGChat Forum Review

RPGChat is one of the other large roleplaying forums out there, and they've been around since about May, 2001. Since then, RPGChat has gone through many evolutions, and has expanded rapidly - they started with a forum, grew into a decent sized roleplaying chat, and finally removed the chat and went back to forums.

RPGChat\'s Forum Index You'll immediately notice the large number of forums, which for most boards isn't an issue. In today's roleplaying world, RPGChat's index fits right in.

They've got four basic navigation options at the top of the page, which are images instead of text, which isn't very good for SEO. The four menu options are Home, Forums, Chat, and Rules. I gave each of them a shot, but it looks like only the "Home" and "Rules" link work.

I'm going to take a look at their code, because using images for links isn't horrible if you specify the right attributes. Let's have a glance:

<a href="http://forums.rpgchat.com/index.php"> <img src="header/but_home.jpg" border="0"> </a>

Yikes! Not only does the anchor not have a title attribute, but the image doesn't have an alt attribute! Search engines won't be able to understand the context of these links, and the flow of link juice to the two working links won't be very beneficial.

I participated on these forums for a few months as the username Alighieri, for that period, I became the single most active user in their welcome forum. I posted in several other topics, but got pretty frustrated with the limitation on the length of a post (20,000 characters).

When attempting to post a profile for one of my characters, I was immediately snubbed by the limitation. This makes well-researched posts difficult to make, specifically with the citations that must be put in place for accurate references. Ultimately, I was forced to cut out portions of my character's history to fit it into the post.

After posting for a few weeks nonstop in the Welcome Forum, I headed off to the The Arena area, where turn-based fighting is largely popular. I opened a topic with a list of the top turn based fighters, placed into a neat little image and posted right into the topic. It took a few days to get any response at all, (save for a few people who contacted me over AIM) and when I did get a response, I logged in to RPGChat to find that I had been banned for "advertising on multiple occasions", much to my surprise.

However, while my visit was cut short, I met some good friends, and had some great discussions. Unfortunately, the forum does not allow any links to external sites of any kind, and also does not allow signatures, which makes it very difficult to spread the word about the topics you start there. This isn't very good for encouraging member interaction, and makes it very difficult for momentum of any sort to be gained within the community.

RPGChat\'s LogoAfter speaking with someone who had messaged me on AIM prior to my banning, I confirmed my worst fears - RPGChat is a closed community, and is not very open to outside communities or positive interaction with those communities. This is the number one concern mentioned to me about RPGChat and their future, and there is ongoing fear of the community continuing to stagnate without any growth other than direct referral.

I sent a request via the site's contact form, as listed at the bottom every page, which merely opened a new email to their support address, forums@rpgchat.com - I sent a couple questions in my email, and I identified who I was, but I haven't yet received a response. It'd be great if we could get an interview with an admin from RPGChat on the history of the site!

In terms of organic visitors, a search for pages on RPGChat has about 16,200 results. When digging through the pages, I noticed that only 477 pages were in the primary index, with the remainder in the supplemental index. That's scary!

Let's take a look at their search results: Running a Google search on RPGChat

As you can see from the above search, we can confirm that there is some duplicate content problems. However, from what we've seen - most of RPGChat's traffic is a result of direct referral. We can identify with the importance of defensible traffic, but organic traffic is also a high-quality method of driving laser-targeted traffic to your site, and it looks like RPGChat is seriously missing out on this.

RPGChat has a relatively active forum; 63,708 threads, 1,925,709 posts, and 59,352 "active" members. While that's only an average of about 30 posts per thread and only about 32 posts per user, they do have some great quality and style elements in their posts that you simply don't see in many other places in roleplaying forums these days. I think it would be a great move for them to deactivate a lot of their older and inactive members, and send out reminders to these users to come back and join in on the fun.

It also seemed like a consensus that the single best area on RPGChat was the Clans & Guilds forum, which most users simply called "C/G" for short. It looks like most other forums' version of a multiverse, where roleplay is freeform, and most action is player-driven with rules being defined by the status quo.

Lack of availability aside, RPGChat leaves a pretty strong impression, and if you're careful to follow their 500 word list of rules, you can likely make some friends and enjoy some great high-quality roleplay. The administration needs to do some overhauling if they're going to keep the community healthy, but for the time being - RPGChat makes for a great roleplaying destination.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

CommunitySpark: Online Community Building

One of my favorite blogs is run by Martin Reed, and it's about online community building. He's really onto something here, and it's a shame there aren't more blogs out there on the topic (ahem, nudge nudge, wink wink). His content is top notch, and it relates directly to what it is that I do with my sites, particularly RolePlayGateway.

Just today he posted an article on active forum members and their value, and I'll be damned if I didn't forward that article to two teams on RolePlayGateway. And then I submitted it to StumbleUpon for good measure! Keep up the good work, Martin!

Does anyone know of any blogs about online community building? Please, share!

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

On the True Nature of Christianity

In liturgical Islam texts, we are called Masihi (مسيحي), or "Followers of the Messiah". In Chinese, we are 基督徒 - a literal "Christ follower". Regardless of what you call us, I feel that who is defined as a "Christian" has deviated far from what has been laid out by Christ and his closest disciples.

On a daily basis, I am faced with the bitter disgust incited by the dogma surrounding the "Christian" faith. A growing number of intellectuals shun Christianity as a result of its hypocrisy; all too common is the known Christian who is seen lying, cheating, stealing, or otherwise sinning--directly in opposition to the perception of the Church to be wholly condescending upon sinners and their deeds. The view of Christian doctrine that enforces a "fire and brimstone" doom upon those who do not repent from their sinful ways is one that is misunderstood and misinterpreted, turning people away from the true nature of Christianity before a full understanding is given.

In 1st John, John writes (and I promise to keep my number of Bible references to a minimum):

If we claim to be without sin, we deceive ourselves and the truth is not in us. 1st John 1:8

It is the very nature of the Christian faith to recognize that we sin: this is the whole premise of following the figure that our faith is named after. We are sinners, and we do participate in activities and perform activities that are duly defiant of the damnation that is preached from some pulpits. It is our aspiration to emulate the figurehead by admitting our sins and providing unconditional love to everyone and everything we come into contact with that is supposed to set us apart from nonbelievers.

However, it is unfortunate that most "Christians" have lost sight of our true nature (that is, to love and care for all of God's creation) and are not the loving and caring role models that our faith demands. John continues in chapter 4:

7Dear friends, let us love one another, for love comes from God. Everyone who loves has been born of God and knows God. 8Whoever does not love does not know God, because God is love. 9This is how God showed his love among us: He sent his one and only Son into the world that we might live through him. 10This is love: not that we loved God, but that he loved us and sent his Son as an atoning sacrifice for our sins. 11Dear friends, since God so loved us, we also ought to love one another. 12No one has ever seen God; but if we love one another, God lives in us and his love is made complete in us. 1st John 4:7-12

As the passage exemplifies, God is embodied in our capacity to love; it is the command of love that we must maintain first and foremost. If we do not have love, we have nothing. (See "All You Need Is Love")

I fully agree with the perception that Christians today are too righteous: we are commanded to be humble. It is for this reason, among others, that I most frequently choose to be called (...) a "follower of Christ" as opposed to a "Christian" (which ironically enough, was used as a condemning phrase). Christians have no right to tout their holiness as a indicator of superiority over anyone.

We must love everyone; Muslims, Jews, the poor, the sick, the needy... people of all races, faiths, nationalities and conditions; all are included in the Christian's domain of unconditional love and tolerance, no matter what their actions. As the great Dr. Martin Luther King, Jr. once said:

Let freedom ring. And when this happens, and when we allow freedom ring—when we let it ring from every village and every hamlet, from every state and every city, we will be able to speed up that day when all of God's children—black men and white men, Jews and Gentiles, Protestants and Catholics—will be able to join hands and sing in the words of the old Negro spiritual: "Free at last! Free at last! Thank God Almighty, we are free at last!"

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Why I Don't Use Skype (and why you shouldn't, either)

I often get asked for my Skype address, sometimes in relation to business or casual conversation. I politely decline with some degree of hand-waving about my reasons, and suggest an alternative form of communication (typically either Google Talk or Google Hangouts, depending on the context—both are built right in to Gmail!). I'd like to outline some of the reasons why I've made the decision to avoid Skype, primarily so I have something to link to when someone asks me about it.

First and foremost, we don't really know what Skype actually does. The binary (the actual program you run on your computer) is obfuscated, so attempts at disassembling it [PDF] to verify some of its strange behavior and the information it is transmitting have so far come up with very little. This is an issue, because Skype produces encrypted traffic even when you are not actively using Skype. This means we can only speculate on what information Skype is collecting about you after you've so graciously chosen to install it, and perhaps more importantly who it is sending that information to.

Quoting Salman Baset:

When a Skype client is not in a call and is running on a machine with public IP address, it has on the average 4-8 active TCP connections and atleast one UDP connection.

While connecting to external IP addresses is normal for a server/client architecture and necessary for receiving notifications, the volume of traffic and number of connections is concerning, considering the compounding issues between Skype's peer-to-peer architecture [PDF] and the "reasonable level of detection accuracy" in snooping on voice calls in Skype [PDF], despite the [purportedly] encrypted nature of the Skype protocol.

Speaking in general terms, Skype is "black box" software which has undergone no public review despite very concerning observed behavior. When new Skype malware (like Skype IMBot, of which an analysis is available, or the more recent Skype account hijacking) is released, there are very few options to protect ourselves if we've got Skype installed. On Linux, tools like AppArmor and TOMOYO exist, but without the ability to easily view the source and understand the attack (per perhaps even fix it proactively, before it occurs) we are at the mercy of Skype's new maintainers to provide a timely resolution in a reactive approach.

If you use a proprietary program or somebody else's web server, you're defenceless. You're putty in the hands of whoever developed that software.
— Richard Stallman
In conclusion, while Skype may be convenient, it presents a series of questions that must be asked and implications to be considered before choosing it over other chat, VoIP, and video chat solutions. I can only hope that more people consider these things before doing so.

Asides

Some of the other things I found interesting, more recently than the research I've linked in this post, include Skype's role in the Syrian conflict, in which a claim was made as follows:
A media activist in Idlib named Mohamed said a rebel informant working for the government was killed in Damascus six months ago after sending warnings to the Free Syrian Army on Skype. “I saw this incident right in front of my eyes,” Mohamed said. “We put his info on Skype so he was arrested and killed.”

Skype (Microsoft) has also made other concerning statements after accusations of helping the U.S. Government spy on its own citizens.

Wikipedia also lists a large number of known flaws in Skype, which I've chosen to avoid duplicating in this post.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

&quot;... if you still have your... in reply to

"... if you still have your account active over there." LOL

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Facebook's released "Timeline". Here's the link to get it working, if you still have your account active...

Facebook's released "Timeline". Here's the link to get it working, if you still have your account active over there.

Attachments

Introducing New Profile

Tell your life story with a new kind of profile.

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Facebook's released "Timeline". Here's the link to get it working, if you still have your account active...

Facebook's released "Timeline". Here's the link to get it working, if you still have your account active over there.

Attachments

Introducing New Profile

Tell your life story with a new kind of profile.

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Facebook's released "Timeline". Here's the link to get it working, if you still have your account active...

Facebook's released "Timeline". Here's the link to get it working, if you still have your account active over there.

Attachments

Introducing New Profile

Tell your life story with a new kind of profile.

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Facebook's released "Timeline". Here's the link to get it working, if you still have your account active...

Facebook's released "Timeline". Here's the link to get it working, if you still have your account active over there.

Attachments

Introducing New Profile

Tell your life story with a new kind of profile.

17 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Listening positions:<br />- active vs. passive<br... in reply to

Listening positions:
- active vs. passive
- reductive vs. expansive
- critical vs. empathetic.

Good stuff

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

This event represent clear evidence of... in reply to

This event represent clear evidence of the value proposition bitcoin represents to the world as supported by the effort of the U.S. Marshalls. Join Texas Coinitiative and participate in educational activities at the Texas Bitcoin Embassy in Houston Texas

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

<span class="proflinkWrapper"><span class="proflinkPrefix">+</span><a class="proflink" href="https://plus.google.com/104588753688500897402" oid="104588753688500897402">Rob... in reply to

+Rob Colbert Popularity has nothing to do with this. Your opinion is important. :) Hackaton is usually a team activity. It's an excellent opportunity to see other people in certain situations. Pressure brings out the good and the worst in some folks which provides a glimpse of whether you'd want to work (long term) with that individual or not.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Early Resolution

Tomorrow I'm a new person. I'm going to wake up at 6:00, I'm going to go see Amber, and then I'm going to run an undetermined amount that is greater than 1 mile. I'm going to do ten pushups every hour at work, as well as ten crunches. I'm going to watch my diet, and not take seconds. I'm going to beat my ass into shape.

I'm going to start actively job hunting a little more, and I'm going to strive to save my money. I'm going to explode into studying, I'm going to start looking more seriously at my education options, and how I'm going to get to that point. I'm going to start looking at my potential.

I'm going to become a better listener, a better friend. I'm going to be more understanding, caring, and loving. I'm going to become a better lover.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Extravagant Self Gratuity

I just invested in $500 worth of targeted advertising for GWing Roleplay. So, what's the total impact upon my wallet?

A grand $5 in activation fees.

Big shoutouts to Computers.net for pointing this out. I was thinking of organizing a group of friends to throw multiple instances of these offers into advertising for GWing, but I realized that it would be difficult to target the advertising properly, as I found it rather complicated to create my own template of keywords and negative keywords to match the optimal result for what we desire in our community. If you sign up for these offers, be sure to carefully monitor your expenses! The billing is most likely set to recurring, and will continue to charge your credit card after your account balance has been used.

Alternately, I woke this morning to find DoesMyGeek's New Podcast, and was greeted by a shoutout and a link over the air to yours truly, and GWing Roleplay. What an amazing podcast, talking about the classic combination, roleplay and beer. Here's to you guys. ;)

One more - I just got linked to Michael Robertson's Evaluation of a College Degree, and found the article particularly interesting in this time. And now: back to work.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Prediction: Global Riots One Year Away? In 2011, researchers at the Complex Systems Institute (CSI)...

Prediction: Global Riots One Year Away?

In 2011, researchers at the Complex Systems Institute (CSI) released a paper [1] presenting a model for understanding (and ultimately predicting) the social unrest that rocked countries such as Tunisia, Libya, and Egypt [2].  Of the data analyzed, the principal factor influencing said unrest was determined to be the food price index.

That's a pretty simple concept.  If one of your most basic needs was threatened, what would you do?  To quote the MIT Technology Review's explanation of the paper [3], “This isn't rocket science. It stands to reason that people become desperate when food is unobtainable. It's often said that any society is three square meals from anarchy.”

These models have other complex implications around the world, such as in the financial markets.  Another paper from 2010, titled “Predicting economic market crises using measures of collective panic” [4], shows that the economic crisis (and other singe-day panics in the market) in the United States were predictable events that relied on the relatively volatile sociological phenomenon of uncertainty and nervousness -- which makes some of the original paper's assertions even more interesting.  Most notably:

“Both factors in food prices can be linked directly to recent US governmental actions. Speculator activity has been enhanced by deregulation of the commodities markets that exempted dealers from trading limits, and subsidies and other policies have been central to the growth of ethanol conversion.”

Food for thought.

[1]: http://arxiv.org/pdf/1108.2455v1.pdf
[2]: http://www.globalissues.org/article/792/mideast-north-africa-unrest
[3]: http://www.technologyreview.com/view/425019/the-cause-of-riots-and-the-price-of-food/
[4]: http://arxiv.org/pdf/1102.2620v1.pdf

Attachments

We Are Now One Year Away From Global Riots, Complex Systems Theorists Say | Motherboard

What’s the number one reason we riot? The plausible and justifiable motivations of trampled-upon humanfolk are many—poverty, oppression, disenfranchisement, etc—but the big one is more primal than any...

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Prediction: Global Riots One Year Away? In 2011, researchers at the Complex Systems Institute (CSI)...

Prediction: Global Riots One Year Away?

In 2011, researchers at the Complex Systems Institute (CSI) released a paper [1] presenting a model for understanding (and ultimately predicting) the social unrest that rocked countries such as Tunisia, Libya, and Egypt [2].  Of the data analyzed, the principal factor influencing said unrest was determined to be the food price index.

That's a pretty simple concept.  If one of your most basic needs was threatened, what would you do?  To quote the MIT Technology Review's explanation of the paper [3], “This isn't rocket science. It stands to reason that people become desperate when food is unobtainable. It's often said that any society is three square meals from anarchy.”

These models have other complex implications around the world, such as in the financial markets.  Another paper from 2010, titled “Predicting economic market crises using measures of collective panic” [4], shows that the economic crisis (and other singe-day panics in the market) in the United States were predictable events that relied on the relatively volatile sociological phenomenon of uncertainty and nervousness -- which makes some of the original paper's assertions even more interesting.  Most notably:

“Both factors in food prices can be linked directly to recent US governmental actions. Speculator activity has been enhanced by deregulation of the commodities markets that exempted dealers from trading limits, and subsidies and other policies have been central to the growth of ethanol conversion.”

Food for thought.

[1]: http://arxiv.org/pdf/1108.2455v1.pdf
[2]: http://www.globalissues.org/article/792/mideast-north-africa-unrest
[3]: http://www.technologyreview.com/view/425019/the-cause-of-riots-and-the-price-of-food/
[4]: http://arxiv.org/pdf/1102.2620v1.pdf

Attachments

We Are Now One Year Away From Global Riots, Complex Systems Theorists Say | Motherboard

What’s the number one reason we riot? The plausible and justifiable motivations of trampled-upon humanfolk are many—poverty, oppression, disenfranchisement, etc—but the big one is more primal than any...

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Prediction: Global Riots One Year Away? In 2011, researchers at the Complex Systems Institute (CSI)...

Prediction: Global Riots One Year Away?

In 2011, researchers at the Complex Systems Institute (CSI) released a paper [1] presenting a model for understanding (and ultimately predicting) the social unrest that rocked countries such as Tunisia, Libya, and Egypt [2].  Of the data analyzed, the principal factor influencing said unrest was determined to be the food price index.

That's a pretty simple concept.  If one of your most basic needs was threatened, what would you do?  To quote the MIT Technology Review's explanation of the paper [3], “This isn't rocket science. It stands to reason that people become desperate when food is unobtainable. It's often said that any society is three square meals from anarchy.”

These models have other complex implications around the world, such as in the financial markets.  Another paper from 2010, titled “Predicting economic market crises using measures of collective panic” [4], shows that the economic crisis (and other singe-day panics in the market) in the United States were predictable events that relied on the relatively volatile sociological phenomenon of uncertainty and nervousness -- which makes some of the original paper's assertions even more interesting.  Most notably:

“Both factors in food prices can be linked directly to recent US governmental actions. Speculator activity has been enhanced by deregulation of the commodities markets that exempted dealers from trading limits, and subsidies and other policies have been central to the growth of ethanol conversion.”

Food for thought.

[1]: http://arxiv.org/pdf/1108.2455v1.pdf
[2]: http://www.globalissues.org/article/792/mideast-north-africa-unrest
[3]: http://www.technologyreview.com/view/425019/the-cause-of-riots-and-the-price-of-food/
[4]: http://arxiv.org/pdf/1102.2620v1.pdf

Attachments

We Are Now One Year Away From Global Riots, Complex Systems Theorists Say | Motherboard

What’s the number one reason we riot? The plausible and justifiable motivations of trampled-upon humanfolk are many—poverty, oppression, disenfranchisement, etc—but the big one is more primal than any...

8 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Prediction: Global Riots One Year Away? In 2011, researchers at the Complex Systems Institute (CSI)...

Prediction: Global Riots One Year Away?

In 2011, researchers at the Complex Systems Institute (CSI) released a paper [1] presenting a model for understanding (and ultimately predicting) the social unrest that rocked countries such as Tunisia, Libya, and Egypt [2].  Of the data analyzed, the principal factor influencing said unrest was determined to be the food price index.

That's a pretty simple concept.  If one of your most basic needs was threatened, what would you do?  To quote the MIT Technology Review's explanation of the paper [3], “This isn't rocket science. It stands to reason that people become desperate when food is unobtainable. It's often said that any society is three square meals from anarchy.”

These models have other complex implications around the world, such as in the financial markets.  Another paper from 2010, titled “Predicting economic market crises using measures of collective panic” [4], shows that the economic crisis (and other singe-day panics in the market) in the United States were predictable events that relied on the relatively volatile sociological phenomenon of uncertainty and nervousness -- which makes some of the original paper's assertions even more interesting.  Most notably:

“Both factors in food prices can be linked directly to recent US governmental actions. Speculator activity has been enhanced by deregulation of the commodities markets that exempted dealers from trading limits, and subsidies and other policies have been central to the growth of ethanol conversion.”

Food for thought.

[1]: http://arxiv.org/pdf/1108.2455v1.pdf
[2]: http://www.globalissues.org/article/792/mideast-north-africa-unrest
[3]: http://www.technologyreview.com/view/425019/the-cause-of-riots-and-the-price-of-food/
[4]: http://arxiv.org/pdf/1102.2620v1.pdf

Attachments

We Are Now One Year Away From Global Riots, Complex Systems Theorists Say | Motherboard

What’s the number one reason we riot? The plausible and justifiable motivations of trampled-upon humanfolk are many—poverty, oppression, disenfranchisement, etc—but the big one is more primal than any...

8 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

How To Behave On An Internet Forum

So, entirely not in light of any recent events, I was integrating the chat rules that Vexar wrote into RolePlayGateway's Rules, and I was looking for some examples of forum etiquette that other forums use. In searching, I found this perfectly humorous video:

(I found it on Neil Boortz's website, but since headed over to videojug to get the original. PS, Neil? You're awesome.)

That was probably the best one I found, above and beyond the video I came across that seemed geared towards the Steam forum community, which was a bit too NSFW to actually embed here on my blog. If you'd like, you can go check out posting a new thread on AlbinoBlackSheep.

I'm admin on several online forums, and I'm a moderator on many more; not counting the countless other communities where I'm an active member. I was pretty proud of the rules I put together on Gateway, and I think they're clean, simple, and easy to follow. No one likes being bombarded and tacked down by rules, so I try to keep them as simple as possible. What do you think of them?

How do you manage forum users and set rules? I know Martin Reed has some good tips on forum rules, and there are many others out there that learned a lot from running forums. The best thing that we can do is learn from others, and gather experience on how to handle these issues. What is your approach to forum etiquette?

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

RSS is back, or "a brief history of EricMartindale.com"

Hello there, adoring internet-stalkers! (I'm kidding. ~_~) You may have noticed (if you were loyal, that is ;)) that my Feedburner-powered RSS Feed has been lacking in activity lately. There's a reason for that.

Recently, I got rid of WordPress and Sweetcron in favor of a new CMS platform, Chyrp. I had been running Wordpress for a long time, using it to share my thoughts with the general internet populace. However, it had become a bit of a chore to maintain, and it really felt like duplicate work on top of all the other content-generation I was already performing (i.e., forum posts, blog comments, Last.fm "Loved" Tracks, Google Reader shared items, etc.), so I began to look for a way to aggregate this content into a central place.

For a while, FriendFeed served this purpose well, but I didn't like the lack of control I had over the source. Facebook also filled part of this gap (and it still does, to a point), and they've even purchased FriendFeed, but I was looking for something quite a bit more customizable and self-hosted. Through various referrals, I came across Yongfook's Sweetcron project which was a new platform designed specifically for this new thing they called, le gasp, "Lifestreaming".

However, after fighting with Sweetcron and its aggregation methods, particularly its lack of support for various service feed formats; I decided to look into something else. Initial searches landed me upon Tumblr, who had conveniently announced a feature that syncs comments across multiple services (or aggregates). Sadly, I didn't want to get back into a world where all my code was hosted by someone else, and I had no control over it. I kept Sweetcron running on my site under lifestream/, but I continued searching for a better solution.

I then stumbled across Bazooka, which was billed as "the first free PHP tumblelog engine". Thanks to Bazooka developer Evan Walsh, who alerted me to a more up-to-date and current replacement called Chyrp. And I was sold. I immediately spent a few hours converting my existing content from WordPress and SweetCron over to a test installation of Chyrp, and then took the next night changing my site structure and 301'd all my old links to the new URLs.

That's where EricMartindale.com stands today. I've spent a few weeks getting my stream set up the way I want it, and I'm turning the RSS feed back on. Posts should begin flowing into your RSS reader very shortly. Post comments, feedback, and questions here!

Edit 10:13 PM EST: It looks like Feedburner is having some trouble parsing my new RSS content. You can subscribe to my direct feed and it will always work.

Edit 10:58 PM EST: I've fixed the problem and committed the patch to GitHub.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

DMOZ In Danger? Not So Much, Says DMOZ Editor

DMOZ: Open DirectoryThere's been a lot of active discussion about the state of AOL's directory project, DMOZ. There have been many attempts to unseat the directory project from its position as the most authoritative listing resource, such as the Yahoo Directory. Many of these attempts have fallen by the wayside, as Rand Fiskin points out, but none have remained more controversial than DMOZ. More recently, Chris Crum's post on WebProNews about his lack of respect for DMOZ has stirred up a hornet's nest of DMOZ criticism, including a particular post claiming DMOZ is a waste of time.

I forwarded a lot of this on to Philip Nicolcev, known by username as "frug", who is the editor of several roleplay-oriented categories on DMOZ. He responded to me directly with a highly insightful email, and I was fortunate enough to receive his permission to share its contents.

I've been editing the pbp category at DMOZ for what... 4 years now? About that. This article is a big whiny complaint which misses the mark. They are both correct and sadly mistaken. Yes, dmoz is outdated and yes, it fails because of attitude problems, but not silly allegations of 'corruption' or people who are bitter because they didn't get listed. We don't list everything, I don't list even half of the submissions I get, and anyone who has been an administrator or an editor for a similar type of project knows better than to take these kinds of complaints seriously. One thing they say is definitely correct: Apply once carefully following their rules if you wish and then, as Will suggested, forget about them.

This is exactly the approach that should be modeled for any directory, regardless of its state or condition. When you are submitting a link to a directory, you are being offered the privilege to be listed as a resource by the owners and management of that directory. They are not obligated to list your link, let alone review it in a timely fashion--but this would be genuinely appreciated and would reflect on the directory's position as a "good" resource.

DMOZ is the primary source for Google's Directory, and you must respect the opinion of such a large and successful company. It's obvious that the idea behind an open directory like DMOZ is good, but where they fail is in execution. More on that later.

He continues:

That is what you should do. Apply once and forget about it, don't claim anybody is corrupt because whether you believe my opinion or not, there's no corruption. Nobody cares enough about dmoz anymore for it to be valuable for extortion. Don't be ridiculous. Furthermore if you were to speak to some of the senior editors you'd discover that they are pretty damn uptight, even obsessive. The problems with dmoz are, in my opinion, twofold. First off, you have the dated trashy look of the website which is a relic of the 1990's. It's not user friendly, it doesn't entice anyone to go browsing, and it hasn't adapted or added features that would help people understand the structure of the directory or find what they're looking for. The editor forums still use phpBB2, and you should see the editing panel. You wouldn't believe how dated this stuff is. Frankly it has needed an overhaul for years now.

I largely agree with him. The phpBB team deprecated the phpBB2 branch at the beginning of this year, ending support for the outdated platform. AOL would do well to do a complete overhaul of the site's design now that "Web 2.0" has come and gone (and I could reference posts all day on that) - and AOL has completely missed their opportunity to latch on and ride the wave.

Philip finishes his correspondance with the frightening truth that has been plaguing many post-Web2.0 sites and services:

The second problem, attitude, is partially the cause of the first problem. It's a stagnant atmosphere where nothing gets done and nobody gets listened to. They would rather leave a directory as a cluttered mess of garbage than risk breaking its structure by overhauling it. Fixing my category took me about two years before I had approval to restructure it, and I'm in a small niche category nobody pays much attention to. Since becoming an editor I have deleted about 60% of the outdated links listed. Had I not joined, they'd still be there cluttering things up with linkspam geocities pages from 10 years ago. So yeah, dmoz is failing, but not because of corruption or because some guy didn't get what he wanted. And, honestly, if the author of this article was applying to dmoz just to 'test how fair it was' then I'm glad they rejected him. Somehow they made the right decision because he's wasting their time.

And that's the exact problem - the DMOZ community has completely stagnated, which has resulted in the puddle of goop that the directory has become. In my personal opinion, I think that AOL could do a lot better job at community management (all reputation management aside) by setting up a more rigid structure of responsibility. The editors need to be held responsible for a timely review specified by their superiors, and there needs to be cross-checking of the editor's work by other qualified editors.

Is this another example of AOL's purchases being mismanaged and ultimately being forgotten, such as what many people claim is the case with ex-Nullsoft product WinAmp? Perhaps, but I think that remains to be seen. After all, even our favored Google took a questionable amount of time to convert phone-consolidation service GrandCentral to the new Google Voice after its 2007 acquisition. DMOZ was in fact originally a Netscape project, which then-strong AOL acquired in 1998. Since that acquisition, little has changed.

All said and done, DMOZ needs some love if it's going to survive as anything more than a relic of trust and authority in the Web 2.0 bubble. As Philip points out, it has both good and bad traits and deserves further attention, but it needs to be attention in (and from) the right direction. The questions remain; where has AOL been? What can be done about the editors (or lack thereof)? How can DMOZ be improved?

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

On the Ongoing Attacks between China, U.S., Russia, Israel, etc.… The latest round of evidence of ongoing...

On the Ongoing Attacks between China, U.S., Russia, Israel, etc.…
The latest round of evidence of ongoing digital warfare between the superpowers is now being reported in the N.Y. Times [1] after an undeniably incriminating 60-page report on the Chinese attacks on the U.S. by security firm Mandiant [2].

“Either they are coming from inside Unit 61398, or the people who run the most-controlled, most-monitored Internet networks in the world are clueless about thousands of people generating attacks from this one neighborhood.”
                                                    — Kevin Mandia

The report goes on to track individual participants in the attack, tracing them back to the headquarters of P.L.A. Unit 61398.

Attacks from the Chinese have been ongoing for many years, notably back to Operation Titan Rain [3] in 2003, in which attackers gained access to military intelligence networks at organizations such as Lockheed Martin, Sandia National Laboratories, Redstone Arsenal, and NASA [4].  Direct military targets were also included in the assault, such as the U.S. Army Information Systems Engineering Command at Fort Huachuca, Arizona, the Defense Information Systems Agency in Arlington, Virginia, the Naval Ocean Systems Center, a Defense Department installation in San Diego, California, and the U.S. Army Space and Strategic Defense installation in Huntsville, Alabama [5]. 

These ongoing attacks are labeled "Advanced Persistent Threats" or "APT" by the American Military, are considered acts of war by both the White House [6] and the Department of Defense [7] as far back as 2011, and are not unique to the Chinese origins.  You may remember the 2007 attacks on Estonia [8], which has been attributed to entities within Russian territory operating with the assistance of the Russian government [9].  These attacks disabled a wide array of Estonian government sites, rendering services in the world's most digitally-connected country unusable.  The attacks also disabled ATM machines, effectively disabling some portion of the Estonian economy.

The United States [and arguably Israel, [10]] have also been actively participating in these attacks [11] with the deploying of FLAME and Stuxnet against Iran, which made international headlines this past year when the coordinated efforts of the tools were used to disable Iranian nuclear centrifuges in an attempt to slow their progress in their nuclear program [12].  These efforts are ongoing, with the latest addition of the Gauss and Duqu malwares [13] continuing to target middle-eastern countries.

“From his first months in office, President Obama secretly ordered increasingly sophisticated attacks on the computer systems that run Iran’s main nuclear enrichment facilities, significantly expanding America’s first sustained use of cyberweapons, according to participants in the program.”
                                                    — +The New York Times

Obama reportedly went on to sign a classified directive last year [14] enabling the government to seize control of private networks, and the 2012 NDAA (National Defense Authorization Act) includes terms [15, section 954] that authorize offensive attacks on foreign threats [16].  The official United States policy already is to deem any cyberattack on the U.S. as an "act of war" [17], and it looks like these types of actions and attacks have already been made legal.

While it may once have been a subject of fiction [18], it's now and has been a harsh reality that we're in the middle of a new era in warfare, and the battles are already well-underway as countries around the world are openly engaging in offensive attacks on one another that are impacting economies on a massive scale.  I don't know what else to call this other than a world war—even the CIA's Center for the Study of Intelligence (CSI) predicted this [19], as have many others even earlier [20].  

Here's a thought; if our constitution gives us the right to bear arms, and the government deems these types of attacks as acts of war, then isn't it our right to keep and bear these arms?  Yet another case for a mass-algorate society [21], which Mr. Obama appears to agree with me on [22], at the very least.

[1]: http://www.nytimes.com/2013/02/19/technology/chinas-army-is-seen-as-tied-to-hacking-against-us.html
[2]: http://intelreport.mandiant.com/
[3]: http://en.wikipedia.org/wiki/Titan_Rain
[4]: http://www.time.com/time/nation/article/0,8599,1098371,00.html
[5]: http://www.zdnet.com/news/security-experts-lift-lid-on-chinese-hack-attacks/145763
[6]: http://www.whitehouse.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf
[7]: http://online.wsj.com/article/SB10001424052702304563104576355623135782718.html
[8]: http://en.wikipedia.org/wiki/2007_cyberattacks_on_Estonia
[9]: http://www.vedomosti.ru/smartmoney/article/2007/05/28/3004
[10]: http://www.zdnet.com/meet-gauss-the-latest-cyber-espionage-tool-7000002405/
[11]: http://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-of-cyberattacks-against-iran.html?pagewanted=all
[12]: http://www.bbc.co.uk/news/technology-11388018
[13]: http://www.zdnet.com/meet-gauss-the-latest-cyber-espionage-tool-7000002405/
[14]: http://endthelie.com/2012/11/15/obama-reportedly-signs-classified-cyberwarfare-policy-directive-with-troubling-implications/#axzz2LMPlf8iA
[15]: http://www.gpo.gov/fdsys/pkg/BILLS-112hr1540enr/pdf/BILLS-112hr1540enr.pdf
[16]: http://endthelie.com/2011/12/17/approval-of-covert-offensive-cyberwar-sneakily-inserted-into-ndaa/
[17]: http://www.forbes.com/sites/reuvencohen/2012/06/05/the-white-house-and-pentagon-deem-cyber-attacks-an-act-of-war/
[18]: http://en.wikipedia.org/wiki/Neuromancer
[19]: https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol48no4/new_face_of_war.html
[20]: http://www.rand.org/content/dam/rand/pubs/reprints/2007/RAND_RP223.pdf
[21]: https://plus.google.com/112353210404102902472/posts/MVQXyw9EJDE
[22]: http://news.cnet.com/8301-17938_105-57569503-1/obama-endorses-required-high-school-coding-classes/

Attachments

China’s Army Is Seen as Tied to Hacking Against U.S.

An overwhelming percentage of the attacks on American companies and government agencies start in a building on the edge of Shanghai, say cybersecurity experts and American intelligence officials.

5 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

On the Ongoing Attacks between China, U.S., Russia, Israel, etc.… The latest round of evidence of ongoing...

On the Ongoing Attacks between China, U.S., Russia, Israel, etc.…
The latest round of evidence of ongoing digital warfare between the superpowers is now being reported in the N.Y. Times [1] after an undeniably incriminating 60-page report on the Chinese attacks on the U.S. by security firm Mandiant [2].

“Either they are coming from inside Unit 61398, or the people who run the most-controlled, most-monitored Internet networks in the world are clueless about thousands of people generating attacks from this one neighborhood.”
                                                    — Kevin Mandia

The report goes on to track individual participants in the attack, tracing them back to the headquarters of P.L.A. Unit 61398.

Attacks from the Chinese have been ongoing for many years, notably back to Operation Titan Rain [3] in 2003, in which attackers gained access to military intelligence networks at organizations such as Lockheed Martin, Sandia National Laboratories, Redstone Arsenal, and NASA [4].  Direct military targets were also included in the assault, such as the U.S. Army Information Systems Engineering Command at Fort Huachuca, Arizona, the Defense Information Systems Agency in Arlington, Virginia, the Naval Ocean Systems Center, a Defense Department installation in San Diego, California, and the U.S. Army Space and Strategic Defense installation in Huntsville, Alabama [5]. 

These ongoing attacks are labeled "Advanced Persistent Threats" or "APT" by the American Military, are considered acts of war by both the White House [6] and the Department of Defense [7] as far back as 2011, and are not unique to the Chinese origins.  You may remember the 2007 attacks on Estonia [8], which has been attributed to entities within Russian territory operating with the assistance of the Russian government [9].  These attacks disabled a wide array of Estonian government sites, rendering services in the world's most digitally-connected country unusable.  The attacks also disabled ATM machines, effectively disabling some portion of the Estonian economy.

The United States [and arguably Israel, [10]] have also been actively participating in these attacks [11] with the deploying of FLAME and Stuxnet against Iran, which made international headlines this past year when the coordinated efforts of the tools were used to disable Iranian nuclear centrifuges in an attempt to slow their progress in their nuclear program [12].  These efforts are ongoing, with the latest addition of the Gauss and Duqu malwares [13] continuing to target middle-eastern countries.

“From his first months in office, President Obama secretly ordered increasingly sophisticated attacks on the computer systems that run Iran’s main nuclear enrichment facilities, significantly expanding America’s first sustained use of cyberweapons, according to participants in the program.”
                                                    — +The New York Times

Obama reportedly went on to sign a classified directive last year [14] enabling the government to seize control of private networks, and the 2012 NDAA (National Defense Authorization Act) includes terms [15, section 954] that authorize offensive attacks on foreign threats [16].  The official United States policy already is to deem any cyberattack on the U.S. as an "act of war" [17], and it looks like these types of actions and attacks have already been made legal.

While it may once have been a subject of fiction [18], it's now and has been a harsh reality that we're in the middle of a new era in warfare, and the battles are already well-underway as countries around the world are openly engaging in offensive attacks on one another that are impacting economies on a massive scale.  I don't know what else to call this other than a world war—even the CIA's Center for the Study of Intelligence (CSI) predicted this [19], as have many others even earlier [20].  

Here's a thought; if our constitution gives us the right to bear arms, and the government deems these types of attacks as acts of war, then isn't it our right to keep and bear these arms?  Yet another case for a mass-algorate society [21], which Mr. Obama appears to agree with me on [22], at the very least.

[1]: http://www.nytimes.com/2013/02/19/technology/chinas-army-is-seen-as-tied-to-hacking-against-us.html
[2]: http://intelreport.mandiant.com/
[3]: http://en.wikipedia.org/wiki/Titan_Rain
[4]: http://www.time.com/time/nation/article/0,8599,1098371,00.html
[5]: http://www.zdnet.com/news/security-experts-lift-lid-on-chinese-hack-attacks/145763
[6]: http://www.whitehouse.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf
[7]: http://online.wsj.com/article/SB10001424052702304563104576355623135782718.html
[8]: http://en.wikipedia.org/wiki/2007_cyberattacks_on_Estonia
[9]: http://www.vedomosti.ru/smartmoney/article/2007/05/28/3004
[10]: http://www.zdnet.com/meet-gauss-the-latest-cyber-espionage-tool-7000002405/
[11]: http://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-of-cyberattacks-against-iran.html?pagewanted=all
[12]: http://www.bbc.co.uk/news/technology-11388018
[13]: http://www.zdnet.com/meet-gauss-the-latest-cyber-espionage-tool-7000002405/
[14]: http://endthelie.com/2012/11/15/obama-reportedly-signs-classified-cyberwarfare-policy-directive-with-troubling-implications/#axzz2LMPlf8iA
[15]: http://www.gpo.gov/fdsys/pkg/BILLS-112hr1540enr/pdf/BILLS-112hr1540enr.pdf
[16]: http://endthelie.com/2011/12/17/approval-of-covert-offensive-cyberwar-sneakily-inserted-into-ndaa/
[17]: http://www.forbes.com/sites/reuvencohen/2012/06/05/the-white-house-and-pentagon-deem-cyber-attacks-an-act-of-war/
[18]: http://en.wikipedia.org/wiki/Neuromancer
[19]: https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol48no4/new_face_of_war.html
[20]: http://www.rand.org/content/dam/rand/pubs/reprints/2007/RAND_RP223.pdf
[21]: https://plus.google.com/112353210404102902472/posts/MVQXyw9EJDE
[22]: http://news.cnet.com/8301-17938_105-57569503-1/obama-endorses-required-high-school-coding-classes/

Attachments

China’s Army Is Seen as Tied to Hacking Against U.S.

An overwhelming percentage of the attacks on American companies and government agencies start in a building on the edge of Shanghai, say cybersecurity experts and American intelligence officials.

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

On the Ongoing Attacks between China, U.S., Russia, Israel, etc.… The latest round of evidence of ongoing...

On the Ongoing Attacks between China, U.S., Russia, Israel, etc.…
The latest round of evidence of ongoing digital warfare between the superpowers is now being reported in the N.Y. Times [1] after an undeniably incriminating 60-page report on the Chinese attacks on the U.S. by security firm Mandiant [2].

“Either they are coming from inside Unit 61398, or the people who run the most-controlled, most-monitored Internet networks in the world are clueless about thousands of people generating attacks from this one neighborhood.”
                                                    — Kevin Mandia

The report goes on to track individual participants in the attack, tracing them back to the headquarters of P.L.A. Unit 61398.

Attacks from the Chinese have been ongoing for many years, notably back to Operation Titan Rain [3] in 2003, in which attackers gained access to military intelligence networks at organizations such as Lockheed Martin, Sandia National Laboratories, Redstone Arsenal, and NASA [4].  Direct military targets were also included in the assault, such as the U.S. Army Information Systems Engineering Command at Fort Huachuca, Arizona, the Defense Information Systems Agency in Arlington, Virginia, the Naval Ocean Systems Center, a Defense Department installation in San Diego, California, and the U.S. Army Space and Strategic Defense installation in Huntsville, Alabama [5]. 

These ongoing attacks are labeled "Advanced Persistent Threats" or "APT" by the American Military, are considered acts of war by both the White House [6] and the Department of Defense [7] as far back as 2011, and are not unique to the Chinese origins.  You may remember the 2007 attacks on Estonia [8], which has been attributed to entities within Russian territory operating with the assistance of the Russian government [9].  These attacks disabled a wide array of Estonian government sites, rendering services in the world's most digitally-connected country unusable.  The attacks also disabled ATM machines, effectively disabling some portion of the Estonian economy.

The United States [and arguably Israel, [10]] have also been actively participating in these attacks [11] with the deploying of FLAME and Stuxnet against Iran, which made international headlines this past year when the coordinated efforts of the tools were used to disable Iranian nuclear centrifuges in an attempt to slow their progress in their nuclear program [12].  These efforts are ongoing, with the latest addition of the Gauss and Duqu malwares [13] continuing to target middle-eastern countries.

“From his first months in office, President Obama secretly ordered increasingly sophisticated attacks on the computer systems that run Iran’s main nuclear enrichment facilities, significantly expanding America’s first sustained use of cyberweapons, according to participants in the program.”
                                                    — +The New York Times

Obama reportedly went on to sign a classified directive last year [14] enabling the government to seize control of private networks, and the 2012 NDAA (National Defense Authorization Act) includes terms [15, section 954] that authorize offensive attacks on foreign threats [16].  The official United States policy already is to deem any cyberattack on the U.S. as an "act of war" [17], and it looks like these types of actions and attacks have already been made legal.

While it may once have been a subject of fiction [18], it's now and has been a harsh reality that we're in the middle of a new era in warfare, and the battles are already well-underway as countries around the world are openly engaging in offensive attacks on one another that are impacting economies on a massive scale.  I don't know what else to call this other than a world war—even the CIA's Center for the Study of Intelligence (CSI) predicted this [19], as have many others even earlier [20].  

Here's a thought; if our constitution gives us the right to bear arms, and the government deems these types of attacks as acts of war, then isn't it our right to keep and bear these arms?  Yet another case for a mass-algorate society [21], which Mr. Obama appears to agree with me on [22], at the very least.

[1]: http://www.nytimes.com/2013/02/19/technology/chinas-army-is-seen-as-tied-to-hacking-against-us.html
[2]: http://intelreport.mandiant.com/
[3]: http://en.wikipedia.org/wiki/Titan_Rain
[4]: http://www.time.com/time/nation/article/0,8599,1098371,00.html
[5]: http://www.zdnet.com/news/security-experts-lift-lid-on-chinese-hack-attacks/145763
[6]: http://www.whitehouse.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf
[7]: http://online.wsj.com/article/SB10001424052702304563104576355623135782718.html
[8]: http://en.wikipedia.org/wiki/2007_cyberattacks_on_Estonia
[9]: http://www.vedomosti.ru/smartmoney/article/2007/05/28/3004
[10]: http://www.zdnet.com/meet-gauss-the-latest-cyber-espionage-tool-7000002405/
[11]: http://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-of-cyberattacks-against-iran.html?pagewanted=all
[12]: http://www.bbc.co.uk/news/technology-11388018
[13]: http://www.zdnet.com/meet-gauss-the-latest-cyber-espionage-tool-7000002405/
[14]: http://endthelie.com/2012/11/15/obama-reportedly-signs-classified-cyberwarfare-policy-directive-with-troubling-implications/#axzz2LMPlf8iA
[15]: http://www.gpo.gov/fdsys/pkg/BILLS-112hr1540enr/pdf/BILLS-112hr1540enr.pdf
[16]: http://endthelie.com/2011/12/17/approval-of-covert-offensive-cyberwar-sneakily-inserted-into-ndaa/
[17]: http://www.forbes.com/sites/reuvencohen/2012/06/05/the-white-house-and-pentagon-deem-cyber-attacks-an-act-of-war/
[18]: http://en.wikipedia.org/wiki/Neuromancer
[19]: https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol48no4/new_face_of_war.html
[20]: http://www.rand.org/content/dam/rand/pubs/reprints/2007/RAND_RP223.pdf
[21]: https://plus.google.com/112353210404102902472/posts/MVQXyw9EJDE
[22]: http://news.cnet.com/8301-17938_105-57569503-1/obama-endorses-required-high-school-coding-classes/

Attachments

China’s Army Is Seen as Tied to Hacking Against U.S.

An overwhelming percentage of the attacks on American companies and government agencies start in a building on the edge of Shanghai, say cybersecurity experts and American intelligence officials.

6 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

On the Ongoing Attacks between China, U.S., Russia, Israel, etc.… The latest round of evidence of ongoing...

On the Ongoing Attacks between China, U.S., Russia, Israel, etc.…
The latest round of evidence of ongoing digital warfare between the superpowers is now being reported in the N.Y. Times [1] after an undeniably incriminating 60-page report on the Chinese attacks on the U.S. by security firm Mandiant [2].

“Either they are coming from inside Unit 61398, or the people who run the most-controlled, most-monitored Internet networks in the world are clueless about thousands of people generating attacks from this one neighborhood.”
                                                    — Kevin Mandia

The report goes on to track individual participants in the attack, tracing them back to the headquarters of P.L.A. Unit 61398.

Attacks from the Chinese have been ongoing for many years, notably back to Operation Titan Rain [3] in 2003, in which attackers gained access to military intelligence networks at organizations such as Lockheed Martin, Sandia National Laboratories, Redstone Arsenal, and NASA [4].  Direct military targets were also included in the assault, such as the U.S. Army Information Systems Engineering Command at Fort Huachuca, Arizona, the Defense Information Systems Agency in Arlington, Virginia, the Naval Ocean Systems Center, a Defense Department installation in San Diego, California, and the U.S. Army Space and Strategic Defense installation in Huntsville, Alabama [5]. 

These ongoing attacks are labeled "Advanced Persistent Threats" or "APT" by the American Military, are considered acts of war by both the White House [6] and the Department of Defense [7] as far back as 2011, and are not unique to the Chinese origins.  You may remember the 2007 attacks on Estonia [8], which has been attributed to entities within Russian territory operating with the assistance of the Russian government [9].  These attacks disabled a wide array of Estonian government sites, rendering services in the world's most digitally-connected country unusable.  The attacks also disabled ATM machines, effectively disabling some portion of the Estonian economy.

The United States [and arguably Israel, [10]] have also been actively participating in these attacks [11] with the deploying of FLAME and Stuxnet against Iran, which made international headlines this past year when the coordinated efforts of the tools were used to disable Iranian nuclear centrifuges in an attempt to slow their progress in their nuclear program [12].  These efforts are ongoing, with the latest addition of the Gauss and Duqu malwares [13] continuing to target middle-eastern countries.

“From his first months in office, President Obama secretly ordered increasingly sophisticated attacks on the computer systems that run Iran’s main nuclear enrichment facilities, significantly expanding America’s first sustained use of cyberweapons, according to participants in the program.”
                                                    — +The New York Times

Obama reportedly went on to sign a classified directive last year [14] enabling the government to seize control of private networks, and the 2012 NDAA (National Defense Authorization Act) includes terms [15, section 954] that authorize offensive attacks on foreign threats [16].  The official United States policy already is to deem any cyberattack on the U.S. as an "act of war" [17], and it looks like these types of actions and attacks have already been made legal.

While it may once have been a subject of fiction [18], it's now and has been a harsh reality that we're in the middle of a new era in warfare, and the battles are already well-underway as countries around the world are openly engaging in offensive attacks on one another that are impacting economies on a massive scale.  I don't know what else to call this other than a world war—even the CIA's Center for the Study of Intelligence (CSI) predicted this [19], as have many others even earlier [20].  

Here's a thought; if our constitution gives us the right to bear arms, and the government deems these types of attacks as acts of war, then isn't it our right to keep and bear these arms?  Yet another case for a mass-algorate society [21], which Mr. Obama appears to agree with me on [22], at the very least.

[1]: http://www.nytimes.com/2013/02/19/technology/chinas-army-is-seen-as-tied-to-hacking-against-us.html
[2]: http://intelreport.mandiant.com/
[3]: http://en.wikipedia.org/wiki/Titan_Rain
[4]: http://www.time.com/time/nation/article/0,8599,1098371,00.html
[5]: http://www.zdnet.com/news/security-experts-lift-lid-on-chinese-hack-attacks/145763
[6]: http://www.whitehouse.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf
[7]: http://online.wsj.com/article/SB10001424052702304563104576355623135782718.html
[8]: http://en.wikipedia.org/wiki/2007_cyberattacks_on_Estonia
[9]: http://www.vedomosti.ru/smartmoney/article/2007/05/28/3004
[10]: http://www.zdnet.com/meet-gauss-the-latest-cyber-espionage-tool-7000002405/
[11]: http://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-of-cyberattacks-against-iran.html?pagewanted=all
[12]: http://www.bbc.co.uk/news/technology-11388018
[13]: http://www.zdnet.com/meet-gauss-the-latest-cyber-espionage-tool-7000002405/
[14]: http://endthelie.com/2012/11/15/obama-reportedly-signs-classified-cyberwarfare-policy-directive-with-troubling-implications/#axzz2LMPlf8iA
[15]: http://www.gpo.gov/fdsys/pkg/BILLS-112hr1540enr/pdf/BILLS-112hr1540enr.pdf
[16]: http://endthelie.com/2011/12/17/approval-of-covert-offensive-cyberwar-sneakily-inserted-into-ndaa/
[17]: http://www.forbes.com/sites/reuvencohen/2012/06/05/the-white-house-and-pentagon-deem-cyber-attacks-an-act-of-war/
[18]: http://en.wikipedia.org/wiki/Neuromancer
[19]: https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol48no4/new_face_of_war.html
[20]: http://www.rand.org/content/dam/rand/pubs/reprints/2007/RAND_RP223.pdf
[21]: https://plus.google.com/112353210404102902472/posts/MVQXyw9EJDE
[22]: http://news.cnet.com/8301-17938_105-57569503-1/obama-endorses-required-high-school-coding-classes/

Attachments

China’s Army Is Seen as Tied to Hacking Against U.S.

An overwhelming percentage of the attacks on American companies and government agencies start in a building on the edge of Shanghai, say cybersecurity experts and American intelligence officials.

5 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.