The new EricMartindale.com is an experiment in data aggregation, and might have a few bugs. Feel free to explore, and then provide feedback directly to @martindale.

search results for war

On the Ongoing Attacks between China, U.S., Russia, Israel, etc.… The latest round of evidence of ongoing...

On the Ongoing Attacks between China, U.S., Russia, Israel, etc.…
The latest round of evidence of ongoing digital warfare between the superpowers is now being reported in the N.Y. Times [1] after an undeniably incriminating 60-page report on the Chinese attacks on the U.S. by security firm Mandiant [2].

“Either they are coming from inside Unit 61398, or the people who run the most-controlled, most-monitored Internet networks in the world are clueless about thousands of people generating attacks from this one neighborhood.”
                                                    — Kevin Mandia

The report goes on to track individual participants in the attack, tracing them back to the headquarters of P.L.A. Unit 61398.

Attacks from the Chinese have been ongoing for many years, notably back to Operation Titan Rain [3] in 2003, in which attackers gained access to military intelligence networks at organizations such as Lockheed Martin, Sandia National Laboratories, Redstone Arsenal, and NASA [4].  Direct military targets were also included in the assault, such as the U.S. Army Information Systems Engineering Command at Fort Huachuca, Arizona, the Defense Information Systems Agency in Arlington, Virginia, the Naval Ocean Systems Center, a Defense Department installation in San Diego, California, and the U.S. Army Space and Strategic Defense installation in Huntsville, Alabama [5]. 

These ongoing attacks are labeled "Advanced Persistent Threats" or "APT" by the American Military, are considered acts of war by both the White House [6] and the Department of Defense [7] as far back as 2011, and are not unique to the Chinese origins.  You may remember the 2007 attacks on Estonia [8], which has been attributed to entities within Russian territory operating with the assistance of the Russian government [9].  These attacks disabled a wide array of Estonian government sites, rendering services in the world's most digitally-connected country unusable.  The attacks also disabled ATM machines, effectively disabling some portion of the Estonian economy.

The United States [and arguably Israel, [10]] have also been actively participating in these attacks [11] with the deploying of FLAME and Stuxnet against Iran, which made international headlines this past year when the coordinated efforts of the tools were used to disable Iranian nuclear centrifuges in an attempt to slow their progress in their nuclear program [12].  These efforts are ongoing, with the latest addition of the Gauss and Duqu malwares [13] continuing to target middle-eastern countries.

“From his first months in office, President Obama secretly ordered increasingly sophisticated attacks on the computer systems that run Iran’s main nuclear enrichment facilities, significantly expanding America’s first sustained use of cyberweapons, according to participants in the program.”
                                                    — +The New York Times

Obama reportedly went on to sign a classified directive last year [14] enabling the government to seize control of private networks, and the 2012 NDAA (National Defense Authorization Act) includes terms [15, section 954] that authorize offensive attacks on foreign threats [16].  The official United States policy already is to deem any cyberattack on the U.S. as an "act of war" [17], and it looks like these types of actions and attacks have already been made legal.

While it may once have been a subject of fiction [18], it's now and has been a harsh reality that we're in the middle of a new era in warfare, and the battles are already well-underway as countries around the world are openly engaging in offensive attacks on one another that are impacting economies on a massive scale.  I don't know what else to call this other than a world war—even the CIA's Center for the Study of Intelligence (CSI) predicted this [19], as have many others even earlier [20].  

Here's a thought; if our constitution gives us the right to bear arms, and the government deems these types of attacks as acts of war, then isn't it our right to keep and bear these arms?  Yet another case for a mass-algorate society [21], which Mr. Obama appears to agree with me on [22], at the very least.

[1]: http://www.nytimes.com/2013/02/19/technology/chinas-army-is-seen-as-tied-to-hacking-against-us.html
[2]: http://intelreport.mandiant.com/
[3]: http://en.wikipedia.org/wiki/Titan_Rain
[4]: http://www.time.com/time/nation/article/0,8599,1098371,00.html
[5]: http://www.zdnet.com/news/security-experts-lift-lid-on-chinese-hack-attacks/145763
[6]: http://www.whitehouse.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf
[7]: http://online.wsj.com/article/SB10001424052702304563104576355623135782718.html
[8]: http://en.wikipedia.org/wiki/2007_cyberattacks_on_Estonia
[9]: http://www.vedomosti.ru/smartmoney/article/2007/05/28/3004
[10]: http://www.zdnet.com/meet-gauss-the-latest-cyber-espionage-tool-7000002405/
[11]: http://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-of-cyberattacks-against-iran.html?pagewanted=all
[12]: http://www.bbc.co.uk/news/technology-11388018
[13]: http://www.zdnet.com/meet-gauss-the-latest-cyber-espionage-tool-7000002405/
[14]: http://endthelie.com/2012/11/15/obama-reportedly-signs-classified-cyberwarfare-policy-directive-with-troubling-implications/#axzz2LMPlf8iA
[15]: http://www.gpo.gov/fdsys/pkg/BILLS-112hr1540enr/pdf/BILLS-112hr1540enr.pdf
[16]: http://endthelie.com/2011/12/17/approval-of-covert-offensive-cyberwar-sneakily-inserted-into-ndaa/
[17]: http://www.forbes.com/sites/reuvencohen/2012/06/05/the-white-house-and-pentagon-deem-cyber-attacks-an-act-of-war/
[18]: http://en.wikipedia.org/wiki/Neuromancer
[19]: https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol48no4/new_face_of_war.html
[20]: http://www.rand.org/content/dam/rand/pubs/reprints/2007/RAND_RP223.pdf
[21]: https://plus.google.com/112353210404102902472/posts/MVQXyw9EJDE
[22]: http://news.cnet.com/8301-17938_105-57569503-1/obama-endorses-required-high-school-coding-classes/

Attachments

China’s Army Is Seen as Tied to Hacking Against U.S.

An overwhelming percentage of the attacks on American companies and government agencies start in a building on the edge of Shanghai, say cybersecurity experts and American intelligence officials.

5 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

On the Ongoing Attacks between China, U.S., Russia, Israel, etc.… The latest round of evidence of ongoing...

On the Ongoing Attacks between China, U.S., Russia, Israel, etc.…
The latest round of evidence of ongoing digital warfare between the superpowers is now being reported in the N.Y. Times [1] after an undeniably incriminating 60-page report on the Chinese attacks on the U.S. by security firm Mandiant [2].

“Either they are coming from inside Unit 61398, or the people who run the most-controlled, most-monitored Internet networks in the world are clueless about thousands of people generating attacks from this one neighborhood.”
                                                    — Kevin Mandia

The report goes on to track individual participants in the attack, tracing them back to the headquarters of P.L.A. Unit 61398.

Attacks from the Chinese have been ongoing for many years, notably back to Operation Titan Rain [3] in 2003, in which attackers gained access to military intelligence networks at organizations such as Lockheed Martin, Sandia National Laboratories, Redstone Arsenal, and NASA [4].  Direct military targets were also included in the assault, such as the U.S. Army Information Systems Engineering Command at Fort Huachuca, Arizona, the Defense Information Systems Agency in Arlington, Virginia, the Naval Ocean Systems Center, a Defense Department installation in San Diego, California, and the U.S. Army Space and Strategic Defense installation in Huntsville, Alabama [5]. 

These ongoing attacks are labeled "Advanced Persistent Threats" or "APT" by the American Military, are considered acts of war by both the White House [6] and the Department of Defense [7] as far back as 2011, and are not unique to the Chinese origins.  You may remember the 2007 attacks on Estonia [8], which has been attributed to entities within Russian territory operating with the assistance of the Russian government [9].  These attacks disabled a wide array of Estonian government sites, rendering services in the world's most digitally-connected country unusable.  The attacks also disabled ATM machines, effectively disabling some portion of the Estonian economy.

The United States [and arguably Israel, [10]] have also been actively participating in these attacks [11] with the deploying of FLAME and Stuxnet against Iran, which made international headlines this past year when the coordinated efforts of the tools were used to disable Iranian nuclear centrifuges in an attempt to slow their progress in their nuclear program [12].  These efforts are ongoing, with the latest addition of the Gauss and Duqu malwares [13] continuing to target middle-eastern countries.

“From his first months in office, President Obama secretly ordered increasingly sophisticated attacks on the computer systems that run Iran’s main nuclear enrichment facilities, significantly expanding America’s first sustained use of cyberweapons, according to participants in the program.”
                                                    — +The New York Times

Obama reportedly went on to sign a classified directive last year [14] enabling the government to seize control of private networks, and the 2012 NDAA (National Defense Authorization Act) includes terms [15, section 954] that authorize offensive attacks on foreign threats [16].  The official United States policy already is to deem any cyberattack on the U.S. as an "act of war" [17], and it looks like these types of actions and attacks have already been made legal.

While it may once have been a subject of fiction [18], it's now and has been a harsh reality that we're in the middle of a new era in warfare, and the battles are already well-underway as countries around the world are openly engaging in offensive attacks on one another that are impacting economies on a massive scale.  I don't know what else to call this other than a world war—even the CIA's Center for the Study of Intelligence (CSI) predicted this [19], as have many others even earlier [20].  

Here's a thought; if our constitution gives us the right to bear arms, and the government deems these types of attacks as acts of war, then isn't it our right to keep and bear these arms?  Yet another case for a mass-algorate society [21], which Mr. Obama appears to agree with me on [22], at the very least.

[1]: http://www.nytimes.com/2013/02/19/technology/chinas-army-is-seen-as-tied-to-hacking-against-us.html
[2]: http://intelreport.mandiant.com/
[3]: http://en.wikipedia.org/wiki/Titan_Rain
[4]: http://www.time.com/time/nation/article/0,8599,1098371,00.html
[5]: http://www.zdnet.com/news/security-experts-lift-lid-on-chinese-hack-attacks/145763
[6]: http://www.whitehouse.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf
[7]: http://online.wsj.com/article/SB10001424052702304563104576355623135782718.html
[8]: http://en.wikipedia.org/wiki/2007_cyberattacks_on_Estonia
[9]: http://www.vedomosti.ru/smartmoney/article/2007/05/28/3004
[10]: http://www.zdnet.com/meet-gauss-the-latest-cyber-espionage-tool-7000002405/
[11]: http://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-of-cyberattacks-against-iran.html?pagewanted=all
[12]: http://www.bbc.co.uk/news/technology-11388018
[13]: http://www.zdnet.com/meet-gauss-the-latest-cyber-espionage-tool-7000002405/
[14]: http://endthelie.com/2012/11/15/obama-reportedly-signs-classified-cyberwarfare-policy-directive-with-troubling-implications/#axzz2LMPlf8iA
[15]: http://www.gpo.gov/fdsys/pkg/BILLS-112hr1540enr/pdf/BILLS-112hr1540enr.pdf
[16]: http://endthelie.com/2011/12/17/approval-of-covert-offensive-cyberwar-sneakily-inserted-into-ndaa/
[17]: http://www.forbes.com/sites/reuvencohen/2012/06/05/the-white-house-and-pentagon-deem-cyber-attacks-an-act-of-war/
[18]: http://en.wikipedia.org/wiki/Neuromancer
[19]: https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol48no4/new_face_of_war.html
[20]: http://www.rand.org/content/dam/rand/pubs/reprints/2007/RAND_RP223.pdf
[21]: https://plus.google.com/112353210404102902472/posts/MVQXyw9EJDE
[22]: http://news.cnet.com/8301-17938_105-57569503-1/obama-endorses-required-high-school-coding-classes/

Attachments

China’s Army Is Seen as Tied to Hacking Against U.S.

An overwhelming percentage of the attacks on American companies and government agencies start in a building on the edge of Shanghai, say cybersecurity experts and American intelligence officials.

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

On the Ongoing Attacks between China, U.S., Russia, Israel, etc.… The latest round of evidence of ongoing...

On the Ongoing Attacks between China, U.S., Russia, Israel, etc.…
The latest round of evidence of ongoing digital warfare between the superpowers is now being reported in the N.Y. Times [1] after an undeniably incriminating 60-page report on the Chinese attacks on the U.S. by security firm Mandiant [2].

“Either they are coming from inside Unit 61398, or the people who run the most-controlled, most-monitored Internet networks in the world are clueless about thousands of people generating attacks from this one neighborhood.”
                                                    — Kevin Mandia

The report goes on to track individual participants in the attack, tracing them back to the headquarters of P.L.A. Unit 61398.

Attacks from the Chinese have been ongoing for many years, notably back to Operation Titan Rain [3] in 2003, in which attackers gained access to military intelligence networks at organizations such as Lockheed Martin, Sandia National Laboratories, Redstone Arsenal, and NASA [4].  Direct military targets were also included in the assault, such as the U.S. Army Information Systems Engineering Command at Fort Huachuca, Arizona, the Defense Information Systems Agency in Arlington, Virginia, the Naval Ocean Systems Center, a Defense Department installation in San Diego, California, and the U.S. Army Space and Strategic Defense installation in Huntsville, Alabama [5]. 

These ongoing attacks are labeled "Advanced Persistent Threats" or "APT" by the American Military, are considered acts of war by both the White House [6] and the Department of Defense [7] as far back as 2011, and are not unique to the Chinese origins.  You may remember the 2007 attacks on Estonia [8], which has been attributed to entities within Russian territory operating with the assistance of the Russian government [9].  These attacks disabled a wide array of Estonian government sites, rendering services in the world's most digitally-connected country unusable.  The attacks also disabled ATM machines, effectively disabling some portion of the Estonian economy.

The United States [and arguably Israel, [10]] have also been actively participating in these attacks [11] with the deploying of FLAME and Stuxnet against Iran, which made international headlines this past year when the coordinated efforts of the tools were used to disable Iranian nuclear centrifuges in an attempt to slow their progress in their nuclear program [12].  These efforts are ongoing, with the latest addition of the Gauss and Duqu malwares [13] continuing to target middle-eastern countries.

“From his first months in office, President Obama secretly ordered increasingly sophisticated attacks on the computer systems that run Iran’s main nuclear enrichment facilities, significantly expanding America’s first sustained use of cyberweapons, according to participants in the program.”
                                                    — +The New York Times

Obama reportedly went on to sign a classified directive last year [14] enabling the government to seize control of private networks, and the 2012 NDAA (National Defense Authorization Act) includes terms [15, section 954] that authorize offensive attacks on foreign threats [16].  The official United States policy already is to deem any cyberattack on the U.S. as an "act of war" [17], and it looks like these types of actions and attacks have already been made legal.

While it may once have been a subject of fiction [18], it's now and has been a harsh reality that we're in the middle of a new era in warfare, and the battles are already well-underway as countries around the world are openly engaging in offensive attacks on one another that are impacting economies on a massive scale.  I don't know what else to call this other than a world war—even the CIA's Center for the Study of Intelligence (CSI) predicted this [19], as have many others even earlier [20].  

Here's a thought; if our constitution gives us the right to bear arms, and the government deems these types of attacks as acts of war, then isn't it our right to keep and bear these arms?  Yet another case for a mass-algorate society [21], which Mr. Obama appears to agree with me on [22], at the very least.

[1]: http://www.nytimes.com/2013/02/19/technology/chinas-army-is-seen-as-tied-to-hacking-against-us.html
[2]: http://intelreport.mandiant.com/
[3]: http://en.wikipedia.org/wiki/Titan_Rain
[4]: http://www.time.com/time/nation/article/0,8599,1098371,00.html
[5]: http://www.zdnet.com/news/security-experts-lift-lid-on-chinese-hack-attacks/145763
[6]: http://www.whitehouse.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf
[7]: http://online.wsj.com/article/SB10001424052702304563104576355623135782718.html
[8]: http://en.wikipedia.org/wiki/2007_cyberattacks_on_Estonia
[9]: http://www.vedomosti.ru/smartmoney/article/2007/05/28/3004
[10]: http://www.zdnet.com/meet-gauss-the-latest-cyber-espionage-tool-7000002405/
[11]: http://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-of-cyberattacks-against-iran.html?pagewanted=all
[12]: http://www.bbc.co.uk/news/technology-11388018
[13]: http://www.zdnet.com/meet-gauss-the-latest-cyber-espionage-tool-7000002405/
[14]: http://endthelie.com/2012/11/15/obama-reportedly-signs-classified-cyberwarfare-policy-directive-with-troubling-implications/#axzz2LMPlf8iA
[15]: http://www.gpo.gov/fdsys/pkg/BILLS-112hr1540enr/pdf/BILLS-112hr1540enr.pdf
[16]: http://endthelie.com/2011/12/17/approval-of-covert-offensive-cyberwar-sneakily-inserted-into-ndaa/
[17]: http://www.forbes.com/sites/reuvencohen/2012/06/05/the-white-house-and-pentagon-deem-cyber-attacks-an-act-of-war/
[18]: http://en.wikipedia.org/wiki/Neuromancer
[19]: https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol48no4/new_face_of_war.html
[20]: http://www.rand.org/content/dam/rand/pubs/reprints/2007/RAND_RP223.pdf
[21]: https://plus.google.com/112353210404102902472/posts/MVQXyw9EJDE
[22]: http://news.cnet.com/8301-17938_105-57569503-1/obama-endorses-required-high-school-coding-classes/

Attachments

China’s Army Is Seen as Tied to Hacking Against U.S.

An overwhelming percentage of the attacks on American companies and government agencies start in a building on the edge of Shanghai, say cybersecurity experts and American intelligence officials.

6 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

On the Ongoing Attacks between China, U.S., Russia, Israel, etc.… The latest round of evidence of ongoing...

On the Ongoing Attacks between China, U.S., Russia, Israel, etc.…
The latest round of evidence of ongoing digital warfare between the superpowers is now being reported in the N.Y. Times [1] after an undeniably incriminating 60-page report on the Chinese attacks on the U.S. by security firm Mandiant [2].

“Either they are coming from inside Unit 61398, or the people who run the most-controlled, most-monitored Internet networks in the world are clueless about thousands of people generating attacks from this one neighborhood.”
                                                    — Kevin Mandia

The report goes on to track individual participants in the attack, tracing them back to the headquarters of P.L.A. Unit 61398.

Attacks from the Chinese have been ongoing for many years, notably back to Operation Titan Rain [3] in 2003, in which attackers gained access to military intelligence networks at organizations such as Lockheed Martin, Sandia National Laboratories, Redstone Arsenal, and NASA [4].  Direct military targets were also included in the assault, such as the U.S. Army Information Systems Engineering Command at Fort Huachuca, Arizona, the Defense Information Systems Agency in Arlington, Virginia, the Naval Ocean Systems Center, a Defense Department installation in San Diego, California, and the U.S. Army Space and Strategic Defense installation in Huntsville, Alabama [5]. 

These ongoing attacks are labeled "Advanced Persistent Threats" or "APT" by the American Military, are considered acts of war by both the White House [6] and the Department of Defense [7] as far back as 2011, and are not unique to the Chinese origins.  You may remember the 2007 attacks on Estonia [8], which has been attributed to entities within Russian territory operating with the assistance of the Russian government [9].  These attacks disabled a wide array of Estonian government sites, rendering services in the world's most digitally-connected country unusable.  The attacks also disabled ATM machines, effectively disabling some portion of the Estonian economy.

The United States [and arguably Israel, [10]] have also been actively participating in these attacks [11] with the deploying of FLAME and Stuxnet against Iran, which made international headlines this past year when the coordinated efforts of the tools were used to disable Iranian nuclear centrifuges in an attempt to slow their progress in their nuclear program [12].  These efforts are ongoing, with the latest addition of the Gauss and Duqu malwares [13] continuing to target middle-eastern countries.

“From his first months in office, President Obama secretly ordered increasingly sophisticated attacks on the computer systems that run Iran’s main nuclear enrichment facilities, significantly expanding America’s first sustained use of cyberweapons, according to participants in the program.”
                                                    — +The New York Times

Obama reportedly went on to sign a classified directive last year [14] enabling the government to seize control of private networks, and the 2012 NDAA (National Defense Authorization Act) includes terms [15, section 954] that authorize offensive attacks on foreign threats [16].  The official United States policy already is to deem any cyberattack on the U.S. as an "act of war" [17], and it looks like these types of actions and attacks have already been made legal.

While it may once have been a subject of fiction [18], it's now and has been a harsh reality that we're in the middle of a new era in warfare, and the battles are already well-underway as countries around the world are openly engaging in offensive attacks on one another that are impacting economies on a massive scale.  I don't know what else to call this other than a world war—even the CIA's Center for the Study of Intelligence (CSI) predicted this [19], as have many others even earlier [20].  

Here's a thought; if our constitution gives us the right to bear arms, and the government deems these types of attacks as acts of war, then isn't it our right to keep and bear these arms?  Yet another case for a mass-algorate society [21], which Mr. Obama appears to agree with me on [22], at the very least.

[1]: http://www.nytimes.com/2013/02/19/technology/chinas-army-is-seen-as-tied-to-hacking-against-us.html
[2]: http://intelreport.mandiant.com/
[3]: http://en.wikipedia.org/wiki/Titan_Rain
[4]: http://www.time.com/time/nation/article/0,8599,1098371,00.html
[5]: http://www.zdnet.com/news/security-experts-lift-lid-on-chinese-hack-attacks/145763
[6]: http://www.whitehouse.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf
[7]: http://online.wsj.com/article/SB10001424052702304563104576355623135782718.html
[8]: http://en.wikipedia.org/wiki/2007_cyberattacks_on_Estonia
[9]: http://www.vedomosti.ru/smartmoney/article/2007/05/28/3004
[10]: http://www.zdnet.com/meet-gauss-the-latest-cyber-espionage-tool-7000002405/
[11]: http://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-of-cyberattacks-against-iran.html?pagewanted=all
[12]: http://www.bbc.co.uk/news/technology-11388018
[13]: http://www.zdnet.com/meet-gauss-the-latest-cyber-espionage-tool-7000002405/
[14]: http://endthelie.com/2012/11/15/obama-reportedly-signs-classified-cyberwarfare-policy-directive-with-troubling-implications/#axzz2LMPlf8iA
[15]: http://www.gpo.gov/fdsys/pkg/BILLS-112hr1540enr/pdf/BILLS-112hr1540enr.pdf
[16]: http://endthelie.com/2011/12/17/approval-of-covert-offensive-cyberwar-sneakily-inserted-into-ndaa/
[17]: http://www.forbes.com/sites/reuvencohen/2012/06/05/the-white-house-and-pentagon-deem-cyber-attacks-an-act-of-war/
[18]: http://en.wikipedia.org/wiki/Neuromancer
[19]: https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol48no4/new_face_of_war.html
[20]: http://www.rand.org/content/dam/rand/pubs/reprints/2007/RAND_RP223.pdf
[21]: https://plus.google.com/112353210404102902472/posts/MVQXyw9EJDE
[22]: http://news.cnet.com/8301-17938_105-57569503-1/obama-endorses-required-high-school-coding-classes/

Attachments

China’s Army Is Seen as Tied to Hacking Against U.S.

An overwhelming percentage of the attacks on American companies and government agencies start in a building on the edge of Shanghai, say cybersecurity experts and American intelligence officials.

5 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Have you not read this? <a href="http://www.guardian.co.uk/world/2012/jun/02/drone-wars-secrecy-barack-obama">http://www.guardian.co.uk/world/2012/jun/02/drone-wars-secrecy-barack-obama</a>... in reply to

Have you not read this? http://www.guardian.co.uk/world/2012/jun/02/drone-wars-secrecy-barack-obama Drone wars and state secrecy – how Barack Obama became a hardliner

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Have you not read this? <a href="http://www.guardian.co.uk/world/2012/jun/02/drone-wars-secrecy-barack-obama">http://www.guardian.co.uk/world/2012/jun/02/drone-wars-secrecy-barack-obama</a>... in reply to

Have you not read this? http://www.guardian.co.uk/world/2012/jun/02/drone-wars-secrecy-barack-obama Drone wars and state secrecy – how Barack Obama became a hardliner

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Have you not read this? <a href="http://www.guardian.co.uk/world/2012/jun/02/drone-wars-secrecy-barack-obama"... in reply to

Have you not read this? http://www.guardian.co.uk/world/2012/jun/02/drone-wars-secrecy-barack-obama Drone wars and state secrecy – how Barack Obama became a hardliner

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Cyber war! You can&#39;t subdue any... in reply to

Cyber war! You can't subdue any one with that. They can learn this too and launch counter attacks tomorrow. The bigger guy with more net based economy will suffer eventually. Expect a future with peace talks on cyber wars. 

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

and the WAR escalates...... in reply to

and the WAR escalates...

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

The fact that this country is... in reply to

The fact that this country is already at War and will be for quite some time and how fast it's escalating is not something that will win any elections that's for sure...

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

I generally stray from politics, but...

I generally stray from politics, but this warrants attention. The United States Cyber Command (USCYBERCOM) is far more capable than they have [until recently] been letting on. Bush ordered these unprecedentedly sophisticated attacks on Iran, and Obama has accelerated them. Stuxnet was a complete and utter masterpiece, and Flame follows closely in its footsteps. The implications of these actions are worrying at best -- escalating a soft war to these measures is pushing the boundaries of the modern legal system and I'm surprised there hasn't been a more formal declaration in light of the official news that the USA and Israel were responsible for the direct attacks on Iran's infrastructure.

Attachments

Obama Ordered Wave of Cyberattacks Against Iran

Even after the Stuxnet computer worm became public, President Obama accelerated cyberattacks against Iran that had begun in the Bush administration, temporarily disabling 1,000 centrifuges.

Obama Ordered Wave of Cyberattacks Against Iran

Even after the Stuxnet computer worm became public, President Obama accelerated cyberattacks against Iran that had begun in the Bush administration, temporarily disabling 1,000 centrifuges.

27 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

I bet blackhats in Russia and... in reply to

I bet blackhats in Russia and China are pissed off that someone else revealed a useful exploit and security is about to be tightened.

More details would be nice. Like what OS are we talking about and why are they "wiping it off the system" and it keeps coming back? Are they not fixing the code that allows it in in the first place? Are they using some OS where one has to be careful what one clicks on lest one get infected with something? If so, how is something that insecure used in the war-fighting infrastructure? Did the NSA get overruled by some powerful senator that needed to repay a campaign favor?

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Yeah, I&#39;m not a fan of... in reply to

Yeah, I'm not a fan of the "real names" policy either, but it is what it is. In the context of this "war" between the established social-networking sites, I'll take G+.

What we need, though, is to escape the tyranny of all of these centrally managed, dictatorially controlled, standalone social-networks... we need to keep pushing for federated, decentralized social-networks where users are in control.

I think that will come eventually. One problem right now, is that so few people care about the deeper issues. <sigh />

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

I generally stray from #politics , but this warrants attention. The United States Cyber Command ( #USCYBERCOM...

I generally stray from #politics , but this warrants attention. The United States Cyber Command ( #USCYBERCOM ) is far more capable than they have [until recently] been letting on. Bush ordered these unprecedentedly sophisticated attacks on #Iran , and Obama has accelerated them. #Stuxnet  was a complete and utter masterpiece, and #Flame  follows closely in its footsteps.

The implications of these actions are worrying at best -- escalating a soft war to these measures is pushing the boundaries of the modern legal system and I'm surprised there hasn't been a more formal declaration in light of the official news that the USA and Israel were responsible for the direct attacks on Iran's infrastructure.

Attachments

Obama Ordered Wave of Cyberattacks Against Iran

Even after the Stuxnet computer worm became public, President Obama accelerated cyberattacks against Iran that had begun in the Bush administration, temporarily disabling 1,000 centrifuges.

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

I generally stray from #politics , but this warrants attention. The United States Cyber Command ( #USCYBERCOM...

I generally stray from #politics , but this warrants attention. The United States Cyber Command ( #USCYBERCOM ) is far more capable than they have [until recently] been letting on. Bush ordered these unprecedentedly sophisticated attacks on #Iran , and Obama has accelerated them. #Stuxnet  was a complete and utter masterpiece, and #Flame  follows closely in its footsteps.

The implications of these actions are worrying at best -- escalating a soft war to these measures is pushing the boundaries of the modern legal system and I'm surprised there hasn't been a more formal declaration in light of the official news that the USA and Israel were responsible for the direct attacks on Iran's infrastructure.

Attachments

Obama Ordered Wave of Cyberattacks Against Iran

Even after the Stuxnet computer worm became public, President Obama accelerated cyberattacks against Iran that had begun in the Bush administration, temporarily disabling 1,000 centrifuges.

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

I generally stray from #politics , but this warrants attention. The United States Cyber Command ( #USCYBERCOM...

I generally stray from #politics , but this warrants attention. The United States Cyber Command ( #USCYBERCOM ) is far more capable than they have [until recently] been letting on. Bush ordered these unprecedentedly sophisticated attacks on #Iran , and Obama has accelerated them. #Stuxnet  was a complete and utter masterpiece, and #Flame  follows closely in its footsteps.

The implications of these actions are worrying at best -- escalating a soft war to these measures is pushing the boundaries of the modern legal system and I'm surprised there hasn't been a more formal declaration in light of the official news that the USA and Israel were responsible for the direct attacks on Iran's infrastructure.

Attachments

Obama Ordered Wave of Cyberattacks Against Iran

Even after the Stuxnet computer worm became public, President Obama accelerated cyberattacks against Iran that had begun in the Bush administration, temporarily disabling 1,000 centrifuges.

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Of Space, War, and Virtual Reality +CCP Games has always been on the right track with their most successful...

Of Space, War, and Virtual Reality
+CCP Games has always been on the right track with their most successful project, the single-server, fully persistent world of +EVE Online.  Having launched +DUST 514 as an extension that exists within the same game world, CCP has raised the bar of innovation already, and continues to carve out territory with the announcement of +EVE: Valkyrie.

Valkyrie is a virtual reality game originally designed for +Oculus VR [1].  If you're not familiar with Oculus, they're the makers of the Oculus Rift. The Rift is a 3D display device that you wear like a pair of glasses, and literally move your head to look around the space.  This interaction makes it feel like you are actually in the virtual space, and represents a huge step forward in immersion.

What interests me most about EVE is the fact that it's a truly alternative reality; a simulated universe, of which only one exists, and to which there will never be a sequel or a "version 2".  CCP has committed to simply improve the game over time rather than ever introduce an "EVE 2", building the universe iteratively over the past 10 years.   This means that the time you invest in the alternative reality has a degree of permanence and importance, rather than the transience and fragmentation of other sharded universes.

Let's hope this integrates directly into the EVE Universe, in the capacity of participating in actual fights, and not just "conquer this asteroid field to make it available to EVE players".  Anything less would be a grave disappointment and moreover, a potentially critical business mistake as the two games, EVE Online and Valkyrie, operate in the same space.

Either way, I'm looking forward to seeing how this pans out.

[1]: EVE-VR: Fanfest Trailer

Attachments

EVE: Valkyrie Announcement Trailer

EVE: Valkyrie (formerly EVE-VR) is a multiplayer dogfighting shooter set in the EVE universe that uses virtual reality to give players the sense of being a r...

3 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Of Space, War, and Virtual Reality +CCP Games has always been on the right track with their most successful...

Of Space, War, and Virtual Reality
+CCP Games has always been on the right track with their most successful project, the single-server, fully persistent world of +EVE Online.  Having launched +DUST 514 as an extension that exists within the same game world, CCP has raised the bar of innovation already, and continues to carve out territory with the announcement of +EVE: Valkyrie.

Valkyrie is a virtual reality game originally designed for +Oculus VR [1].  If you're not familiar with Oculus, they're the makers of the Oculus Rift. The Rift is a 3D display device that you wear like a pair of glasses, and literally move your head to look around the space.  This interaction makes it feel like you are actually in the virtual space, and represents a huge step forward in immersion.

What interests me most about EVE is the fact that it's a truly alternative reality; a simulated universe, of which only one exists, and to which there will never be a sequel or a "version 2".  CCP has committed to simply improve the game over time rather than ever introduce an "EVE 2", building the universe iteratively over the past 10 years.   This means that the time you invest in the alternative reality has a degree of permanence and importance, rather than the transience and fragmentation of other sharded universes.

Let's hope this integrates directly into the EVE Universe, in the capacity of participating in actual fights, and not just "conquer this asteroid field to make it available to EVE players".  Anything less would be a grave disappointment and moreover, a potentially critical business mistake as the two games, EVE Online and Valkyrie, operate in the same space.

Either way, I'm looking forward to seeing how this pans out.

[1]: EVE-VR: Fanfest Trailer

Attachments

EVE: Valkyrie Announcement Trailer

EVE: Valkyrie (formerly EVE-VR) is a multiplayer dogfighting shooter set in the EVE universe that uses virtual reality to give players the sense of being a r...

11 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Of Space, War, and Virtual Reality +CCP Games has always been on the right track with their most successful...

Of Space, War, and Virtual Reality
+CCP Games has always been on the right track with their most successful project, the single-server, fully persistent world of +EVE Online.  Having launched +DUST 514 as an extension that exists within the same game world, CCP has raised the bar of innovation already, and continues to carve out territory with the announcement of +EVE: Valkyrie.

Valkyrie is a virtual reality game originally designed for +Oculus VR [1].  If you're not familiar with Oculus, they're the makers of the Oculus Rift. The Rift is a 3D display device that you wear like a pair of glasses, and literally move your head to look around the space.  This interaction makes it feel like you are actually in the virtual space, and represents a huge step forward in immersion.

What interests me most about EVE is the fact that it's a truly alternative reality; a simulated universe, of which only one exists, and to which there will never be a sequel or a "version 2".  CCP has committed to simply improve the game over time rather than ever introduce an "EVE 2", building the universe iteratively over the past 10 years.   This means that the time you invest in the alternative reality has a degree of permanence and importance, rather than the transience and fragmentation of other sharded universes.

Let's hope this integrates directly into the EVE Universe, in the capacity of participating in actual fights, and not just "conquer this asteroid field to make it available to EVE players".  Anything less would be a grave disappointment and moreover, a potentially critical business mistake as the two games, EVE Online and Valkyrie, operate in the same space.

Either way, I'm looking forward to seeing how this pans out.

[1]: EVE-VR: Fanfest Trailer

Attachments

EVE: Valkyrie Announcement Trailer

EVE: Valkyrie (formerly EVE-VR) is a multiplayer dogfighting shooter set in the EVE universe that uses virtual reality to give players the sense of being a r...

3 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Of Space, War, and Virtual Reality +CCP Games has always been on the right track with their most successful...

Of Space, War, and Virtual Reality
+CCP Games has always been on the right track with their most successful project, the single-server, fully persistent world of +EVE Online.  Having launched +DUST 514 as an extension that exists within the same game world, CCP has raised the bar of innovation already, and continues to carve out territory with the announcement of +EVE: Valkyrie.

Valkyrie is a virtual reality game originally designed for +Oculus VR [1].  If you're not familiar with Oculus, they're the makers of the Oculus Rift. The Rift is a 3D display device that you wear like a pair of glasses, and literally move your head to look around the space.  This interaction makes it feel like you are actually in the virtual space, and represents a huge step forward in immersion.

What interests me most about EVE is the fact that it's a truly alternative reality; a simulated universe, of which only one exists, and to which there will never be a sequel or a "version 2".  CCP has committed to simply improve the game over time rather than ever introduce an "EVE 2", building the universe iteratively over the past 10 years.   This means that the time you invest in the alternative reality has a degree of permanence and importance, rather than the transience and fragmentation of other sharded universes.

Let's hope this integrates directly into the EVE Universe, in the capacity of participating in actual fights, and not just "conquer this asteroid field to make it available to EVE players".  Anything less would be a grave disappointment and moreover, a potentially critical business mistake as the two games, EVE Online and Valkyrie, operate in the same space.

Either way, I'm looking forward to seeing how this pans out.

[1]: EVE-VR: Fanfest Trailer

Attachments

EVE: Valkyrie Announcement Trailer

EVE: Valkyrie (formerly EVE-VR) is a multiplayer dogfighting shooter set in the EVE universe that uses virtual reality to give players the sense of being a r...

3 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

I've just learned of a virus that was launched against the U.S. Drone Fleet. See the attached article...

I've just learned of a virus that was launched against the U.S. Drone Fleet. See the attached article from Wired.

Earlier this year, the Pentagon recently concluded that digital attacks such as this can constitute an act of war [1]. This one doesn't [yet] seem as sophisticated as last year's attack on Iran's nuclear reactors by Stuxnet [2], but it continues to show how important and integral our computer systems are in this rapidly changing world. Security professionals +Alex Levinson, +Jerome Radcliffe, and +Scott Hanselman surely have some great insight here, I highly recommend you go take a look at some of the things they've written.

In 2009, a very sophisticated [and successful] cyber-attack was launched from inside China that targeted the United States through Google and Adobe [3] that caused surprisingly few stirs within our government, especially after NATO was sent in to assist in the defense of Estonia's computer systems during the 2007 attacks [4]. Not long after this, the widely-used and [formerly] explicitly trusted RSA security mechanism, used in a large number major institutions around the world. was completely and entirely broken [5] by an embarrassingly simple hack [6].

Aside: We can look back at some of the things actual software engineers like +Ryan Dahl [7] and +Zack Morris [8] have been saying lately and quickly conclude that there's something fundamentally broken with the whole system. If you've ever worked on or with a large software project, you can see evidence of negligence and ignorance alike embedded at every level. It certainly contributes to if not causes these types of security concerns.

[1]: http://online.wsj.com/article/SB10001424052702304563104576355623135782718.html
[2]: http://www.schneier.com/blog/archives/2010/10/stuxnet.html
[3]: http://www.wired.com/threatlevel/2010/01/operation-aurora/
[4]: http://www.wired.com/politics/security/magazine/15-09/ff_estonia
[5]: http://www.computerworld.com/s/article/9214757/RSA_warns_SecurID_customers_after_company_is_hacked
[6]: http://www.zdnet.co.uk/blogs/mapping-babel-10017967/rsa-hack-targeted-flash-vulnerability-10022143/
[7]: https://plus.google.com/115094562986465477143/posts/Di6RwCNKCrf
[8]: http://zackarymorris.tumblr.com/post/10973087527/the-state-of-the-art-is-terrible

Attachments

» Exclusive: Computer Virus Hits U.S. Drone Fleet

A computer virus has infected the cockpits of America's Predator and Reaper drones, logging pilots' every keystroke as they remotely fly missions over

8 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

I've just learned of a virus that was launched against the U.S. Drone Fleet. See the attached article...

I've just learned of a virus that was launched against the U.S. Drone Fleet. See the attached article from Wired.

Earlier this year, the Pentagon recently concluded that digital attacks such as this can constitute an act of war [1]. This one doesn't [yet] seem as sophisticated as last year's attack on Iran's nuclear reactors by Stuxnet [2], but it continues to show how important and integral our computer systems are in this rapidly changing world. Security professionals +Alex Levinson, +Jerome Radcliffe, and +Scott Hanselman surely have some great insight here, I highly recommend you go take a look at some of the things they've written.

In 2009, a very sophisticated [and successful] cyber-attack was launched from inside China that targeted the United States through Google and Adobe [3] that caused surprisingly few stirs within our government, especially after NATO was sent in to assist in the defense of Estonia's computer systems during the 2007 attacks [4]. Not long after this, the widely-used and [formerly] explicitly trusted RSA security mechanism, used in a large number major institutions around the world. was completely and entirely broken [5] by an embarrassingly simple hack [6].

Aside: We can look back at some of the things actual software engineers like +Ryan Dahl [7] and +Zack Morris [8] have been saying lately and quickly conclude that there's something fundamentally broken with the whole system. If you've ever worked on or with a large software project, you can see evidence of negligence and ignorance alike embedded at every level. It certainly contributes to if not causes these types of security concerns.

[1]: http://online.wsj.com/article/SB10001424052702304563104576355623135782718.html
[2]: http://www.schneier.com/blog/archives/2010/10/stuxnet.html
[3]: http://www.wired.com/threatlevel/2010/01/operation-aurora/
[4]: http://www.wired.com/politics/security/magazine/15-09/ff_estonia
[5]: http://www.computerworld.com/s/article/9214757/RSA_warns_SecurID_customers_after_company_is_hacked
[6]: http://www.zdnet.co.uk/blogs/mapping-babel-10017967/rsa-hack-targeted-flash-vulnerability-10022143/
[7]: https://plus.google.com/115094562986465477143/posts/Di6RwCNKCrf
[8]: http://zackarymorris.tumblr.com/post/10973087527/the-state-of-the-art-is-terrible

Attachments

» Exclusive: Computer Virus Hits U.S. Drone Fleet

A computer virus has infected the cockpits of America's Predator and Reaper drones, logging pilots' every keystroke as they remotely fly missions over

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

I've just learned of a virus that was launched against the U.S. Drone Fleet. See the attached article...

I've just learned of a virus that was launched against the U.S. Drone Fleet. See the attached article from Wired.

Earlier this year, the Pentagon recently concluded that digital attacks such as this can constitute an act of war [1]. This one doesn't [yet] seem as sophisticated as last year's attack on Iran's nuclear reactors by Stuxnet [2], but it continues to show how important and integral our computer systems are in this rapidly changing world. Security professionals +Alex Levinson, +Jerome Radcliffe, and +Scott Hanselman surely have some great insight here, I highly recommend you go take a look at some of the things they've written.

In 2009, a very sophisticated [and successful] cyber-attack was launched from inside China that targeted the United States through Google and Adobe [3] that caused surprisingly few stirs within our government, especially after NATO was sent in to assist in the defense of Estonia's computer systems during the 2007 attacks [4]. Not long after this, the widely-used and [formerly] explicitly trusted RSA security mechanism, used in a large number major institutions around the world. was completely and entirely broken [5] by an embarrassingly simple hack [6].

Aside: We can look back at some of the things actual software engineers like +Ryan Dahl [7] and +Zack Morris [8] have been saying lately and quickly conclude that there's something fundamentally broken with the whole system. If you've ever worked on or with a large software project, you can see evidence of negligence and ignorance alike embedded at every level. It certainly contributes to if not causes these types of security concerns.

[1]: http://online.wsj.com/article/SB10001424052702304563104576355623135782718.html
[2]: http://www.schneier.com/blog/archives/2010/10/stuxnet.html
[3]: http://www.wired.com/threatlevel/2010/01/operation-aurora/
[4]: http://www.wired.com/politics/security/magazine/15-09/ff_estonia
[5]: http://www.computerworld.com/s/article/9214757/RSA_warns_SecurID_customers_after_company_is_hacked
[6]: http://www.zdnet.co.uk/blogs/mapping-babel-10017967/rsa-hack-targeted-flash-vulnerability-10022143/
[7]: https://plus.google.com/115094562986465477143/posts/Di6RwCNKCrf
[8]: http://zackarymorris.tumblr.com/post/10973087527/the-state-of-the-art-is-terrible

Attachments

» Exclusive: Computer Virus Hits U.S. Drone Fleet

A computer virus has infected the cockpits of America's Predator and Reaper drones, logging pilots' every keystroke as they remotely fly missions over

8 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

I've just learned of a virus that was launched against the U.S. Drone Fleet. See the attached article...

I've just learned of a virus that was launched against the U.S. Drone Fleet. See the attached article from Wired.

Earlier this year, the Pentagon recently concluded that digital attacks such as this can constitute an act of war [1]. This one doesn't [yet] seem as sophisticated as last year's attack on Iran's nuclear reactors by Stuxnet [2], but it continues to show how important and integral our computer systems are in this rapidly changing world. Security professionals +Alex Levinson, +Jerome Radcliffe, and +Scott Hanselman surely have some great insight here, I highly recommend you go take a look at some of the things they've written.

In 2009, a very sophisticated [and successful] cyber-attack was launched from inside China that targeted the United States through Google and Adobe [3] that caused surprisingly few stirs within our government, especially after NATO was sent in to assist in the defense of Estonia's computer systems during the 2007 attacks [4]. Not long after this, the widely-used and [formerly] explicitly trusted RSA security mechanism, used in a large number major institutions around the world. was completely and entirely broken [5] by an embarrassingly simple hack [6].

Aside: We can look back at some of the things actual software engineers like +Ryan Dahl [7] and +Zack Morris [8] have been saying lately and quickly conclude that there's something fundamentally broken with the whole system. If you've ever worked on or with a large software project, you can see evidence of negligence and ignorance alike embedded at every level. It certainly contributes to if not causes these types of security concerns.

[1]: http://online.wsj.com/article/SB10001424052702304563104576355623135782718.html
[2]: http://www.schneier.com/blog/archives/2010/10/stuxnet.html
[3]: http://www.wired.com/threatlevel/2010/01/operation-aurora/
[4]: http://www.wired.com/politics/security/magazine/15-09/ff_estonia
[5]: http://www.computerworld.com/s/article/9214757/RSA_warns_SecurID_customers_after_company_is_hacked
[6]: http://www.zdnet.co.uk/blogs/mapping-babel-10017967/rsa-hack-targeted-flash-vulnerability-10022143/
[7]: https://plus.google.com/115094562986465477143/posts/Di6RwCNKCrf
[8]: http://zackarymorris.tumblr.com/post/10973087527/the-state-of-the-art-is-terrible

Attachments

» Exclusive: Computer Virus Hits U.S. Drone Fleet

A computer virus has infected the cockpits of America's Predator and Reaper drones, logging pilots' every keystroke as they remotely fly missions over

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

I am drooling over WolframAlpha Pro: http://www.wolframalpha.com/pro/ [actual announcement attached]...

I am drooling over WolframAlpha Pro: http://www.wolframalpha.com/pro/ [actual announcement attached]

"Computational knowledge engine" WolframAlpha [1] just announced a new offering aiming at power users of their already amazing data science toolkit. I'm very impressed with the features they've chosen to add, including image processing and 3D plot export. Maybe I'm just being a huge nerd, but I think this'll be great for generating assets for presentations and demos. :)

I already use WolframAlpha for quickly plotting relationships in certain algorithms, or referencing certain datasets. It's great for checking on specs like display densities [2], calculating a transfer time (while automatically cross-referencing network specs!) [3] or even looking for obscure computing metrics [4]. It can help you calculate chemical reactions [5], or even plot a protein structure. [6]

My favorite day-to-day application is quick and dirty regression, for visualizing trends in my data [7], but it's still cool to play with n-gram decomposition [8].

Google hasn't even come close to this level of utility, even with innovations like Google Squared [9] (which was sadly shuttered last year... [10]) and the addition of function plotting to their universal search earlier this year [11]. They've been rolling in more and more tidbits like this, but I don't know that a company as large as Google can keep up with the delta, even with again-CEO +Larry Page's war on cruft [12] freeing up resources for projects like this.

It's priced at only $4.99 per month (or $2.99 for students, which I am not -- but I'll happily pay the premium at this price point!), right up my alley as building something comparable for local use (or even acquiring an existing software package) would be prohibitively expensive and moreover, complex.

Have you used WolframAlpha? If so, what for?

[1]: http://www.wolframalpha.com/
[2]: http://www.wolframalpha.com/input/?i=2.5+megapixel+300dpi+display
[3]: http://www.wolframalpha.com/input/?i=data+transfer+time+10GB%2C+802.11n
[4]: http://www.wolframalpha.com/input/?i=How+fast+was+the+processor+on+the+Atari+400%3F
[5]: http://www.wolframalpha.com/input/?i=Al+%2B+O2+-%3E+Al2O3
[6]: http://www.wolframalpha.com/input/?i=myoglobin
[7]: http://www.wolframalpha.com/input/?i=quadratic+fit+%7B10.1%2C1.2%7D%2C%7B12.6%2C+2.8%7D%2C%7B14.8%2C7.6%7D%2C%7B16.0%2C12.8%7D%2C%7B17.5%2C15.1%7D
[8]: http://www.wolframalpha.com/input/?i=n-grams+%22the+google+plus+community+keeps+me+smiling+throughout+the+day%22
[9]: http://news.bbc.co.uk/2/hi/technology/8047076.stm
[10]: http://searchengineland.com/google-squared-news-timeline-get-added-to-googles-chopping-block-90549
[11]: http://googlesystem.blogspot.com/2011/12/googles-graphing-calculator.html
[12]: http://goo.gl/ay4I0

Attachments

Wolfram|Alpha Blog : Announcing Wolfram|Alpha Pro

Today’s introduction of Wolfram|Alpha Pro gives you fundamentally new and remarkable capabilities like: data input, file upload, image input, data download, CDF interactivity, extra computation time, ...

4 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

I am drooling over WolframAlpha Pro: http://www.wolframalpha.com/pro/ [actual announcement attached]...

I am drooling over WolframAlpha Pro: http://www.wolframalpha.com/pro/ [actual announcement attached]

"Computational knowledge engine" WolframAlpha [1] just announced a new offering aiming at power users of their already amazing data science toolkit. I'm very impressed with the features they've chosen to add, including image processing and 3D plot export. Maybe I'm just being a huge nerd, but I think this'll be great for generating assets for presentations and demos. :)

I already use WolframAlpha for quickly plotting relationships in certain algorithms, or referencing certain datasets. It's great for checking on specs like display densities [2], calculating a transfer time (while automatically cross-referencing network specs!) [3] or even looking for obscure computing metrics [4]. It can help you calculate chemical reactions [5], or even plot a protein structure. [6]

My favorite day-to-day application is quick and dirty regression, for visualizing trends in my data [7], but it's still cool to play with n-gram decomposition [8].

Google hasn't even come close to this level of utility, even with innovations like Google Squared [9] (which was sadly shuttered last year... [10]) and the addition of function plotting to their universal search earlier this year [11]. They've been rolling in more and more tidbits like this, but I don't know that a company as large as Google can keep up with the delta, even with again-CEO +Larry Page's war on cruft [12] freeing up resources for projects like this.

It's priced at only $4.99 per month (or $2.99 for students, which I am not -- but I'll happily pay the premium at this price point!), right up my alley as building something comparable for local use (or even acquiring an existing software package) would be prohibitively expensive and moreover, complex.

Have you used WolframAlpha? If so, what for?

[1]: http://www.wolframalpha.com/
[2]: http://www.wolframalpha.com/input/?i=2.5+megapixel+300dpi+display
[3]: http://www.wolframalpha.com/input/?i=data+transfer+time+10GB%2C+802.11n
[4]: http://www.wolframalpha.com/input/?i=How+fast+was+the+processor+on+the+Atari+400%3F
[5]: http://www.wolframalpha.com/input/?i=Al+%2B+O2+-%3E+Al2O3
[6]: http://www.wolframalpha.com/input/?i=myoglobin
[7]: http://www.wolframalpha.com/input/?i=quadratic+fit+%7B10.1%2C1.2%7D%2C%7B12.6%2C+2.8%7D%2C%7B14.8%2C7.6%7D%2C%7B16.0%2C12.8%7D%2C%7B17.5%2C15.1%7D
[8]: http://www.wolframalpha.com/input/?i=n-grams+%22the+google+plus+community+keeps+me+smiling+throughout+the+day%22
[9]: http://news.bbc.co.uk/2/hi/technology/8047076.stm
[10]: http://searchengineland.com/google-squared-news-timeline-get-added-to-googles-chopping-block-90549
[11]: http://googlesystem.blogspot.com/2011/12/googles-graphing-calculator.html
[12]: http://goo.gl/ay4I0

Attachments

Wolfram|Alpha Blog : Announcing Wolfram|Alpha Pro

Today’s introduction of Wolfram|Alpha Pro gives you fundamentally new and remarkable capabilities like: data input, file upload, image input, data download, CDF interactivity, extra computation time, ...

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

I am drooling over WolframAlpha Pro: http://www.wolframalpha.com/pro/ [actual announcement attached]...

I am drooling over WolframAlpha Pro: http://www.wolframalpha.com/pro/ [actual announcement attached]

"Computational knowledge engine" WolframAlpha [1] just announced a new offering aiming at power users of their already amazing data science toolkit. I'm very impressed with the features they've chosen to add, including image processing and 3D plot export. Maybe I'm just being a huge nerd, but I think this'll be great for generating assets for presentations and demos. :)

I already use WolframAlpha for quickly plotting relationships in certain algorithms, or referencing certain datasets. It's great for checking on specs like display densities [2], calculating a transfer time (while automatically cross-referencing network specs!) [3] or even looking for obscure computing metrics [4]. It can help you calculate chemical reactions [5], or even plot a protein structure. [6]

My favorite day-to-day application is quick and dirty regression, for visualizing trends in my data [7], but it's still cool to play with n-gram decomposition [8].

Google hasn't even come close to this level of utility, even with innovations like Google Squared [9] (which was sadly shuttered last year... [10]) and the addition of function plotting to their universal search earlier this year [11]. They've been rolling in more and more tidbits like this, but I don't know that a company as large as Google can keep up with the delta, even with again-CEO +Larry Page's war on cruft [12] freeing up resources for projects like this.

It's priced at only $4.99 per month (or $2.99 for students, which I am not -- but I'll happily pay the premium at this price point!), right up my alley as building something comparable for local use (or even acquiring an existing software package) would be prohibitively expensive and moreover, complex.

Have you used WolframAlpha? If so, what for?

[1]: http://www.wolframalpha.com/
[2]: http://www.wolframalpha.com/input/?i=2.5+megapixel+300dpi+display
[3]: http://www.wolframalpha.com/input/?i=data+transfer+time+10GB%2C+802.11n
[4]: http://www.wolframalpha.com/input/?i=How+fast+was+the+processor+on+the+Atari+400%3F
[5]: http://www.wolframalpha.com/input/?i=Al+%2B+O2+-%3E+Al2O3
[6]: http://www.wolframalpha.com/input/?i=myoglobin
[7]: http://www.wolframalpha.com/input/?i=quadratic+fit+%7B10.1%2C1.2%7D%2C%7B12.6%2C+2.8%7D%2C%7B14.8%2C7.6%7D%2C%7B16.0%2C12.8%7D%2C%7B17.5%2C15.1%7D
[8]: http://www.wolframalpha.com/input/?i=n-grams+%22the+google+plus+community+keeps+me+smiling+throughout+the+day%22
[9]: http://news.bbc.co.uk/2/hi/technology/8047076.stm
[10]: http://searchengineland.com/google-squared-news-timeline-get-added-to-googles-chopping-block-90549
[11]: http://googlesystem.blogspot.com/2011/12/googles-graphing-calculator.html
[12]: http://goo.gl/ay4I0

Attachments

Wolfram|Alpha Blog : Announcing Wolfram|Alpha Pro

Today’s introduction of Wolfram|Alpha Pro gives you fundamentally new and remarkable capabilities like: data input, file upload, image input, data download, CDF interactivity, extra computation time, ...

4 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

I am drooling over WolframAlpha Pro: http://www.wolframalpha.com/pro/ [actual announcement attached]...

I am drooling over WolframAlpha Pro: http://www.wolframalpha.com/pro/ [actual announcement attached]

"Computational knowledge engine" WolframAlpha [1] just announced a new offering aiming at power users of their already amazing data science toolkit. I'm very impressed with the features they've chosen to add, including image processing and 3D plot export. Maybe I'm just being a huge nerd, but I think this'll be great for generating assets for presentations and demos. :)

I already use WolframAlpha for quickly plotting relationships in certain algorithms, or referencing certain datasets. It's great for checking on specs like display densities [2], calculating a transfer time (while automatically cross-referencing network specs!) [3] or even looking for obscure computing metrics [4]. It can help you calculate chemical reactions [5], or even plot a protein structure. [6]

My favorite day-to-day application is quick and dirty regression, for visualizing trends in my data [7], but it's still cool to play with n-gram decomposition [8].

Google hasn't even come close to this level of utility, even with innovations like Google Squared [9] (which was sadly shuttered last year... [10]) and the addition of function plotting to their universal search earlier this year [11]. They've been rolling in more and more tidbits like this, but I don't know that a company as large as Google can keep up with the delta, even with again-CEO +Larry Page's war on cruft [12] freeing up resources for projects like this.

It's priced at only $4.99 per month (or $2.99 for students, which I am not -- but I'll happily pay the premium at this price point!), right up my alley as building something comparable for local use (or even acquiring an existing software package) would be prohibitively expensive and moreover, complex.

Have you used WolframAlpha? If so, what for?

[1]: http://www.wolframalpha.com/
[2]: http://www.wolframalpha.com/input/?i=2.5+megapixel+300dpi+display
[3]: http://www.wolframalpha.com/input/?i=data+transfer+time+10GB%2C+802.11n
[4]: http://www.wolframalpha.com/input/?i=How+fast+was+the+processor+on+the+Atari+400%3F
[5]: http://www.wolframalpha.com/input/?i=Al+%2B+O2+-%3E+Al2O3
[6]: http://www.wolframalpha.com/input/?i=myoglobin
[7]: http://www.wolframalpha.com/input/?i=quadratic+fit+%7B10.1%2C1.2%7D%2C%7B12.6%2C+2.8%7D%2C%7B14.8%2C7.6%7D%2C%7B16.0%2C12.8%7D%2C%7B17.5%2C15.1%7D
[8]: http://www.wolframalpha.com/input/?i=n-grams+%22the+google+plus+community+keeps+me+smiling+throughout+the+day%22
[9]: http://news.bbc.co.uk/2/hi/technology/8047076.stm
[10]: http://searchengineland.com/google-squared-news-timeline-get-added-to-googles-chopping-block-90549
[11]: http://googlesystem.blogspot.com/2011/12/googles-graphing-calculator.html
[12]: http://goo.gl/ay4I0

Attachments

Wolfram|Alpha Blog : Announcing Wolfram|Alpha Pro

Today’s introduction of Wolfram|Alpha Pro gives you fundamentally new and remarkable capabilities like: data input, file upload, image input, data download, CDF interactivity, extra computation time, ...

4 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.