1296 posts • joined 7 Dec 2012
What is a rocket, exactly?
Take a great big bloody bomb.
Make it explode in one direction, at a slower than immediate rate, make it continue to do so until one is at one's destination point or needs to replace that one direction bomb.
As a practical example, I know of one intermediate range tactical missile that uses thermate as its propellent, with some modifying binders mixed in.
A second example would be all manned NASA rockets, which use hydrogen and oxygen.
Now, take that bomb, assemble it with loads of moving parts and electrical circuits, well, it gets complicated.
Rocket science isn't as much science as it's partially an art.
An example from early and even current rocketry, liquid fueled engines can suffer from pogo oscillation, due to structural components moving due to acceleration. That results in slowing fuel/oxidizer rates, then normal rates. That has destroyed quite a few rockets.
Now, who wants to design a rocket to personally fly up into space?
If I'm using a public access point, I really don't care about sniffing seeing what I'm looking at. I don't Conduct sensitive transactions over an open wireless network.
If I were to read my e-mail, it'd either be over SSL or IMAP, with TLS carrying the encryption.
My company e-mail is via a VPN connection, so again, not a problem.
Sorry, as one that uses Linux to death, Windows when forced and all...
I'll stick with my MacBook Pro, due to its hardware capabilities.
*Each* OS has its strengths and weaknesses, depending upon usage.
Windows is, essentially, king, due to ease of use/misuse by the average village idiot and regrettably, all to often maintained by other village idiots.
*BSD is nice, but it is a lot stodgy in admitting to new interfaces/technology. As in taking two years to admit a beta USB system and three years to get the damned thing to actually work properly.
Linux is nice, if you like rough edges. I use it daily at home and frequently at work.
Linux is nice, but it's unpolished in may areas, when compared on a desktop level with Windows or OS X.
From that standpoint, I've eliminated all Windows desktops at home. I still maintain a Windows server, due to certain commonalities issues.
All desktops are Linux, my singular exception is this MacBook Pro, where I am typing from now.
Now, from a security standpoint, I condemn all.
Linux for partially adopting SELinux, *BSD for not bothering to seek NSA input in a far more merciful time, Microsoft was totally out of that program. Said program was to teach how to build a Trusted Operating System.
Still leaving Solaris, in certain special configurations, as the *only* trusted operating system for the US.
"Doesn't everyone get that girl from BumBay Microsoft Support "
Nope. Not since that NSA crack.
Though, my calls were from "Microsoft Office", which is as bogus as can be. *Everyone* knows that Microsoft Office is supported by a shitty paperclip character. ;)
Re: Think i am due a phone call soon
I kept them going for about a half hour.
They *eventually* caught on and disconnected.
They didn't catch on when I said that one of my systems is a Sun Microsystems machine and does not have windows on it (well, that is true on both counts) and my other computer is a Cray.
They didn't even catch on when I mentioned Unix.
I think that they caught on when I mentioned that "our security systems at the National Security Agency are the best in the world".*
*No, I don't work for the NSA. I know a handful of people who do, but we don't talk about work.
Though, I'm fairly certain that they already know what kind of day I had at work.
Largely because we do the same general job, information assurance.
Re: "hints that there are probably thousands of dinosaurs that we still do not know about"
Not at all surprising. Keep looking and the darnedest things come up.
Frankly, I've thought of flogging a book on a dinosaur culture that was similar to ours, but died off and the concrete, steel and even plastics broke down and left the cemeteries dissolved over the millions of years since their passing.
If anyone wishes to take that notion up, good luck. Do badly, I'll cite this as copyright and institute legal action that leaves you homeless. Do a grand job, I'll be eternally thankful and own you a major favor.
The favor system has worked out quite well for me and participants of said system.
I just get a lot vindictive over those who turns a sows ear into a pigs breakfast.
Re: Profit motive
Well, there is financial profit, then there is intelligence profit.
This is orders of magnitude lower in both human effort hours an computing hours.
Right now, it's mined and stored at various locations.
Sign up for *any* mainstream media applications.
They want your contacts, online account details, friend lists, e-mail contact lists, files, camera, microphone, *all files* on your system access, one even wanted me to register my scrotum print.
OK, I made the last one up for levity's sake.
We'll suffice it to say, that app was not installed, but we consider the device still possibly contaminated.
That is *my* level of faith in any crApp store, be it Apple or otherwise.
Re: Call this bloke a Waaaambulance!
Sure it did. After his departure, his former victims, those pretending to lead the nation, decided to proclaim in quiet whispers, how cross dressing.
Something strangely absent from the real history, but is still repeated in public venues by the ill informed.
Hoover also had the first "legal" house of prostitution build in Washington, D. C.. Interestingly enough, the classified files mention all manner of state of the art recording devices. Granted, at the earliest times, it was all vacuum tube stuff, but cameras, microphones and whatever recording media that was reliable was built in or added onto the system.
Can't figure out *how* he escaped the wrath of a nation after the collapse of McCarthy.
Hoover had two interests. Building his surveillance capabilities and protecting that former requirement.
As one who does actually trust my own government a bit, which is far more than far too many do, I offer a counter-offer.
I'll give you my root keys if you give me the root keys of the *entire* US Government. I have a rather thick jacket, so it's well established that I can be trusted. A *lot* of people trust me.
I'll also not divulge unless lawful acts do occur, which will be vetted by *my* cleared attorney.
Otherwise, sod off. The Founding Fathers are spinning around in their graves and may erupt at any moment to provide a *real* zombie uprising against you pencil necked idiots.
Me, "The Wizard", later, "Wizard One Actual". The latter not being a sign that I was a Commissioned Officer, but a adulation of an occasional habit of overruling a Commissioned Officer's orders in favor of something that both accomplished the mission and we also managed to survive.
As it always worked, it was swept under the rug.
I'm retired, but do retain my clearance. I'm also tagged RED. So, if we meet, *please* do not pull my finger. ;)
And yeah, that all is true and more. But, if I told you, I'd have to kill you and eat you or something.
The *real* secret is one that is really well known, but, Intelligence isn't noted for being exceptionally bright at times.
*Do not pull my finger*.
I'm an WMD in that manner. ;)
I know the feeling all too well.
Patch *that* and you're good.
Hey, thanks for patching *that*, now you need to patch **this** to protect against attacks that are now permitted from the patch to *that*.
Rinse and repeat.
*Whereinhell* are my sharks?! I need them for my moat around my office, I already have the lasers ready for attachment.
Oh well, at least I still have my primary method, the elevator that "mistakenly" drops off its occupants to the incinerator... :)
As well as the land mines along the corridor to my office.
And the electrified telephones.
And I'm no longer a BOFH, I'm now an Information Assurance guy.
Which means I have a bit larger budget, in some areas. Physical security was paramount, so I included a gamma ray fountain about two meters from my door.
Which, for anti-terrorism purposes is both bullet proof, anti-armor missile resistant and has a lead "deadening zone" to absorb the impact energies (suggested by myself, while a cute white cat was perched upon my lap).
Those were stop-gap measures, largely due to a lack of Daleks to help secure the premises. Bloody damned time war shortages, when will they end?
Re: To the skeptics...
Lockheed-Martin hasn't asked for external finances since the Almighty was young.
That is already a warning.
A second warning is their diagram, where anything that does not fuse ends up slamming into the containment vessel.
A third warning was no mention of mitigation neutron embrittlement.
Finally, they're talking magic. Useful energy from something the size of a jet engine. OK, nice source, the collateral equipment necessary to make the damned thing work *and* cool and make work is a hell of a lot bigger.
Now, add in the fact that deuterium isn't cheap by far and tritium is royally expensive...
Finally, despite what our intrepid author has said, fusion is trivial to achieve. People all over this planet, even on Old Blighty have produced fusion devices. Neutron generators are available for sale, the more hazardous requiring various regulatory hurdles to overcome. The overwhelming majority of those are fusion units. Every hydrogen bomb on the planet and most fission bombs today have a neutron source that is a fusion unit.
But, for those, energy input is much higher than the output.
The former examples are curiosities, the latter, neutron sources.
Sorry folks, I call bullshit.
If asked to invest, I'd invest in cold fusion. Just for the comedic results.*
*I have many other objections, some are based upon things covered under various NDA's, some of which could put me in prison. So, no. I'll not discuss some other objections. Anyone who knows collegiate physics will know where I'm thinking, mostly.
Re: Over 100 compromised devices?
"From the news attention on that you'd think it was the Spanish Flu pandemic all over again!"
But, it is!
When viewed through the wrong end of the telescope.
Re: Who's more evil - the hackers or these analysts?
Well, one of two things will happen.
Either their prediction will be true and nothing will be done to improve the coding, which is likely. After all, don't fix it if it's working and hence, isn't broken.
Or, they'll be listened to by the APT leadership and efforts will be down for some time as the coders learn how to properly code. Then, the folks analyzing the code will be commanding even more of a premium in their pay and hence, to company profits in elevated pricing, just to compensate for the increased quality.
From my own personal experience with APT's, I suspect it'll be the former.
Let's put it this way
When LED bulbs became available for US $8.00, I snapped a few up to test them out.
I've since bought a bag of them an replace my aging incandescent bulbs with them, as well as my CFL bulbs.
While the energy savings seems a pittance of 10 watts vs 18 watts, the light is whiter, appears brighter and is a *lot* cooler running than the CFL bulbs. That heat adds up in my house, as I need more light now than I did in my younger days.
-There is one thing that sucks more than getting older. Not living long enough to be getting older.
Re: CTRL-C in Healthcare computing
Leave it to Microsoft to design an operating system so dense and uncontrollable that one has to issue a non-maskable interrupt to get its attention.
As for the clear your cache, that gets me every time. For heaven's sake, the bloody proxy doesn't need to have its cache cleared each and every time, the browser and especially, the damnable chimpanzee of a coder should have it coded in.
meta has been around for a rather long time now.
Like <meta http-equiv="Expires" content="-1" /> or <meta http-equiv="cache-control" content="no-cache" />.
I keep getting the "clear your cache" when dealing with shitrix.
Re: De Bios, she is incompatible..
Yeah, I've had similar ones to that. I typically can find the excrement in the statement and gladly shovel it back, reminding the idiot that not supporting a paid support product is a fundamental breach of contract.
I've worked my way around the industry, from humping cables like the best cabling monkeys around (trust me, one has to have monkey capabilities in some industrial office ceilings), to desktop support, application support, some development, SA, NA, BOFH and now IA.
I've had snake oil salesmen aplenty come to call, I have plenty more room in the local bog, should any more come to call. ;)
Re: If in doubt, right-click.
That's twice better than an operating system that was originally developed with only one mouse button.
Yet, amazingly, it became rather popular.
Re: A splinter group...
I gladly make eye contact with them. If they desire to discuss the matter in depth, they must meet me later in my office.
Which is surrounded by a moat with laser wielding sharks.
Assuming that they don't use the elevator, which was coded to deliver them straight into the furnace.
Palpitations are not uncommon with heavy caffeine consumption.
I slightly disagree.
The adverts should either be fully truthful and verifiable or so outlandish (such as the camel hump day commercial) as to only be believed by the village idiot.
Re: Red Bull gives you ISIS
This American, actually, citizen of the United States of America, as I don't desire to offer guilt by association of the same continent to Mexico and Canada, of our idiocy think that he's seen even more energy drinks used in network operation centers.
After all, it's a well established fact of nature that networks to not actually operate by electrons, they operate by caffeine. Network performance is logarithmically related to the caffeine consumption of the engineering staff, hence my network security operations center has its own Starbucks machine and K-cup machines (I use a better brand of coffee, as I rather despise Starbucks rubbish).
The simple reality of it is, in the US, anyone can sue over damned near anything whatsoever. It can be a weighty matter, but most frequently, it's a frivolous legal action that costs more to defend against than simply paying out a few million.
Many years ago, I was on a jury in a civil case. A widow was continuing the legal action on behalf of her decedent husband, who had died of lung cancer.
He was a three pack a day smoker, the jury was selected with quite a few smokers, including myself.
After a week of testimony, with suppression of emphysema being excluded because one physician called it the more generic COPD in his report, his chest x-rays were presented. Yeah, it was emphysema, secondary to smoking.
But of course, several women in the jury wanted to take care of the widow and one waitress insisted that the product companies that were claimed to have caused his lung cancer knew about the risk of their product causing cancer 150 years ago.
The product was asbestos.
So, I told a very, very nasty story about the sexual exploits of soldiers on leave, which drove the jury to find quickly, just to depart.
So, the final settlement was $5 million dollars, with 60000 for the husband and the rest for his widow.
When unofficially polled as to why that number was tendered, I explained how I arrived at the number that the jury, erm, accepted. I figured it was less than you were being paid to defend this case.
One attorney for the defense broke into open laughter and agreed.
Meanwhile, the widow's attorney received 40%, with the attorney getting 60%.
That was a long, lousy pay week. Didn't make enough in jury pay to cover the trolley (tram for you, as I recall) and lunch. Fortunately, the company I worked for made up the difference between the laughable insult of jury duty pay and my true pay. That was good, as I made more per hour than the jury pay was for an entire day by a great deal.
Or ice melting and re-freezing pushed it to the surface, just as stones do in farmers fields.
Re: A large rock that hit the comet - not.
Accretion didn't have to end 4.5 billion years ago. Stray rocks in a similar orbit could come in at low V enough to spiral in.
The ironic part is, he said this while introducing a new product.
One that an FNG (F**ing New Guy) can fardle into the vastness of imagination.
Meanwhile, I've said the very same thing, for the past 20+ years.
An Advanced Persistent Threat (APT) can and *will* enter any enterprise that it desires to enter.
Which is why governments have segregated networks for various security levels.
They're well funded, experienced and know the various platforms and software platforms. It's their job to do so.
One can only hope to delay the intrusion before information is exfiltrated.
The real problem is, it's expensive to do so.
Expensive enough in terms of inconvenience to operations, as well as financial considerations.
Find a solution to that problem, you'll be rich beyond royalty wealth. Good luck finding that magical balance. I haven't, Bruce hasn't. Even smarter people haven't.
So, it's all down to delaying the SOB and noticing entry, then cutting the link and remediating.
Nah, you forget, different agencies in the US government don't talk to each other about their activities.
Hell, the DoD had a rather protracted battle against stuxnet infections a few years back. Malware developed by part of the DoD.
Besides, any participating partner would be unintended side-catch, hence be swamping the data mine a bit too much.
Re: state-sponsored malware
Sure it would.
Just as the DoD was kind enough to detect stuxnet infections within its own network quickly.
Yes, I'm serious.
That aside, why not? The US DoD and US DHS both do the same, for approved vendors.
Re: Not available
Wow! Thanks for reminding me, I had put off updating macports last night, after a disconnect at an inopportune time borked the install.
Re: Not available
Didn't show up in my crApp store either, had to manually go to Apple and download it.
Not that I needed it, despite a few CGI scripts I happen to run, I had already downloaded bash, compiled and installed the debugged one.
Another is, we've never had a science war over differences in science.
Only religion holds that dubious distinction.
Re: and best of all ...
"Somebody screwed up and didn't get this classified quick enough."
Do you mean something like, the NSA and GCHQ has ordered 15 billion "demonstration units" with specific modifications installed?
Re: Swiss cheese?
True, but when one has *standards*, one has to have a gauge against those standards.
The problem comes when someone takes the scan results at face value, rather than what was verified as a false positive and documented as such, then runs with it to the press.
What goes unremarked is, are these systems network isolated, hence the common vulnerabilities would be non-exploitable? Are these systems on an isolated VLAN, where they can only access their peers and reporting servers?
Then, there are a thousand other questions along similar lines, any of which turns the report into bird cage liner.
Re: You see, this is the kind of stuff that discredits government-led initiatives...
What the story does not bother with, nor did the report bother with is, there are times that one is using highly specialized software, where a software patch breaks the piss out of the entire system.
I'm an IA guy by trade, that is Information Assurance. Much of my work is and has been government related.
I've had systems that drove me over the edge, as they *always* popped on vulnerability scans and I had to explain that fact in my reports.
The NA/SA in me sought more data, to find to my horror, patches frequently broke those specialized systems. Things had to be tuned and some vulnerabilities left alone.
Which lead me to see to it that those systems were placed onto a heavily protected VLAN.
Now, you may still object, the reality of it is, it very well is likely that patching those vulnerabilities would create an inoperable control system.
If it's all the same to you, I'd rather have operators able to control those rather expensive satellites.
One can only hope that their IA guy or girl saw to it that said sensitive and vulnerable systems are protected by isolation from the big, bad network.
Because, for such specialized systems, that isn't really that difficult.
I remember trying to install a banking app from my bank, on Google's store.
Bloody thing wanted access to my phone memory, contacts, camera, microphone and a DNA sample from my testicle.
Needless to say, the DNA thing would be acceptable, the rest, nope. I do without their app that desired greater access than GCHQ or the NSA to my information.
Re: George Osborne is the saviour of the Universe
Hawking: "...unlikely to be funded in the present economic climate."
Fortunately, said funding has already been provided, courtesy of many millions of neutron stars and those pesky supernovae.
I stand here, before you now, truthfully unafraid. Why? Because I believe something you do not? No, I stand here without fear because I remember. I remember that I am here not because of the path that lies before me but because of the path that lies behind me. I remember that for 13 billion years we have fought these machines, errr, survived such energetic events. And after Hawking's pronouncement, I remember that which matters most... We are still here!*
*Liberally mutilated from a stolen passage from the Matrix Reloaded.
Re: "If this happened anywhere other than HealthCare.gov, it wouldn't be news"
Heh, in short, they accidentally installed a honeypot.
Meanwhile, the media ignores the hell out of numerous DoD compromises, every government agency having compromises and focuses on a code testing machine that was compromised.
Oh well, any hyperbole to try to kill a first, faltering, half step toward universal health care in the only industrialized nation in the world to not have universal health care.
Of course, the right wing media spout off how universal health care is communism and all of Europe is socialist-communist (they typically cannot ascertain the difference between the two systems) and ignores monarchies that most assuredly not be socialist by definition.
@John Savard, erm, it's a *bit* more complicated than that.
First, you confuse network centric warfare with electronic warfare, which are two entirely different things, that *may* coincide in some operations.
Second, you manage to ignore the hell out of global history in not noticing North Korea *is*, was and will remain a satellite state of the PRC. That news is only thousands of years old.
Strange that you missed the memo, I got the memo around... Genesis.
Re: Hacking into defense nets? That makes me feel safe
"If all the electronic traffic generated by the various militaries is so secret and sensitive, why is it going across what appears to be the "public" networks?"
OK, a primer. First, the traffic is *not* typically over "public" networks. It is over private networks, with various means of encryption, but with internet access.
That leaves a dozen rather sweet spots of vulnerability and more less sweet spots open.
Laundry, food, toilet requirements and more are unclassified and hence, are transmitted on (hopefully) private network connections back home.
Well, that (hopeful) is only that, if a server or certain workstations can "see" said traffic.
Now, here in the real world, food requirements and laundry is the *least* of that which is transmitted on unclassified networks.
One also must include vendors supplying the needs of the defense requirement.
So, what is *your* suggestion?
I'm quite certain it will be outside of mission requirements or general reality.
"Instead, many regime-sponsored attacks are launched from cells based in China, US, South Asia, Europe, and even South Korea."
Interestingly enough, various nations learned the value of buffer nations. China learned of it far, far, far long ago.
The west learns of it at variable lengths of time.
I'm honestly uncertain if the UK or US has the longest record. There were a few gaps, the longest being the US, but some, erm, effort has since been expended...
Re: What's that rattling noise coming from HP?
Save that HP wasn't the *only* source. It's only the only trivially available publicly available source.
But, whatever. I know what I saw in the traffic and logs, you know far better than I, based upon your Twinkie encrusted sofa in mom's basement.
Re: North Korea is ramping up its cyber spying efforts ..
"Luckly, we here in free world have the American NSA and British GCHQ to protect us .."
Well, if it's any consolation, there is the US NSA, the US DoD, the US DHS and more "protecting us".
For every charm there is a countercharm.
For every mousetrap, there is a smarter mouse.
To be honest, today's weapon of WMD is an exceptionally cheap one. Education and network access. No Manhattan project, no adding hydrogen species to the mixture, simple network access and education.
I'm an information security professional and one with US DoD experience watching raw logs.
We'll suffice it to say that I'm rather alarmed, not by this, just overall open atmosphere nuclear testing of information warfare.
The harm that can result from some actions *can* result in the use of WMD's.
For, all sides are village idiots and insist upon pushing things in some ways. It'll only take one off programme individual or group to run it all off of civilized information warfare into ruins.
As in, the nuclear clock should be two seconds from midnight.
Worse, I'm an optimist in my field.
Re: The conspiracy becomes clear...
Sorry to burst your bubble, but I managed to track traffic of some rather serious trolls that were hellbent upon causing unrest in certain regions to this particular entity.
I'll remind you of this: "Although North Korea’s cyber infrastructure may not measure up to that of wealthier nations, the regime is making significant progress in developing capable and technically trained forces..."
The PRC has quite an exemplary cyber operations unit and education programme. Within that programme is various dialects of English, such as UK, Australian, New Zealand and US English educated upon.
It's quite good.
I am unable to go further, due to various NDA signatures.
Apparently, our intrepid author failed to recognize *dictionary attacks*.
Hence, the dictionary of refute.
My personal one is far more extensive, but profanity is quite common.
"...maybe even flying cars one day..."
Who in the hell would want that?!
They can't bloody drive on the ground, I'd hate to see the mess that the average idiot driver would do in the air.
And honestly, I put a roof on the house 10 years ago, I'm not in a hurry to replace it, along with the upper story of my home due to an idiot driver crashing above.
Well, here, in the real world
The NSA *officially* supported the software. Officially.
Then, considering the official mandate of supporting certain people, via TOR.
Meanwhile, I consider the *mission* of the "puzzle palace" and their ongoing mission to meet new encryption and crush it or adopt it.
*That* is the real world.
Some parts are trying to catch up, some parts are forward of that curve, a few adjusting, the "senior management" still fights and is first echelon.
We, in the real world are stuck with licensing of our software, guarding against many enemies, some being part of the US "bad list", some earning their keep onto a watchlist.
For the El Reg correspondent, I'll suggest more research. You've screwed the pooch and missed a much more notable story, as I know from a firsthand basis, if the NSA doesn't want to be noticed, it shan't. That said, I know full well how said agency goes "loud".
Now, if you'll excuse me, I have to phrase something, I *really* need to address a certainand current problem set.
Signature detection doesn't work. Use *our* signatureish BS.
I'm looking on my watch for the blowme button....
Just today I read about Big Blue having a chip with the "brain" of a farking FROG.
If we're currently endangered by a farking frog, we *should* join the dinosaurs!
Never fear, more moron milk will ensue from "above"ish...
Re: So quite a lot of AV not very good?
SSL isn't *that* hard to decrypt. Especially so in a corporate enclave.
But, AV isn't the be all and end all of security. It's the storm door lock, which opens to find the entry door lock of much more complexity.
One line of defense is no defense at all. Ask the French about one line of defense in WWII.
One layers and staggers defenses.
Such as monitoring network traffic, monitoring endpoints, NIDS, HIDS, etc.
For, the zero day can and does await. With a layered and staggered and target oriented defense, one will prevail.
Waiting for AV to detect is a fools errand akin to the Maginot Line.
But, you do what you want to do and your organization desires. I'll stick with what works.
Yet again, Microsoft offers a Forefront * security offering.
With somewhat mixed blessing in *real* security.
Mixed blessing for *any* security product. :/
"China has never been particularly chuffed about the allegations but it is even less amused these days after former-NSA-operative-turned-whistleblower Edward Snowden revealed the extent of the US's data snooping."
Yet then rejects antivirus software well known to be connected with the USA and Russia.
Then, promotes their own malware, erm, antivirus software.
The reality of it is, anyone who has more than an E1 connection is doing it at a national level.
Frankly, the *only* nation I'm aware of that isn't is Somalia. Hell, Libya still is online.
Just get used to it, as I've yet to hear a *realistic* solution to resolve the problem. And to be blunt, I have no solution either.
Got a solution? Shoot it my way, I'll see to it that you're wealthier than the royal family in spades.
I'll settle for three million dollars. One to work for me, one to be riskier invested, one to be "safely" invested.
I'll not expect a realistic reply. :/