Re: How much C4
For that type of drone, not enough to do more than break a car window. Their load carrying capacity is miniscule.
1434 posts • joined 7 Dec 2012
For that type of drone, not enough to do more than break a car window. Their load carrying capacity is miniscule.
"The IP could have been easily spoofed..."
Not really. IP spoofing works for something like UDP, but remember, SMTP is a two way communication process. Responses have to be received from server messages. Spoofing would prevent those server messages from being received.
There are some ways around that, but they're not very reliable.
The site is run by a contractor. The contractor can be cited for failure to perform and lose revenue. If it's found that there is no hope for satisfactory performance, it's a fundamental breach of contract and the contract goes to the runner-up.
Or another solution, block traffic from ad servers.
I'm actively DNS poisoning a handful of ad server sites after receiving malvertisement attempts.
Yeah, algal blooms suck. Royally.
Some people are sickened by atomized algae toxins 90 miles from US estuaries.
The real problem is teaching farmers to stop wasting their fertilizer, but retaining it in the soil by using less and preventing runoff. More simply, teaching them to stop pissing money away.
The fact is, linear induction motors are rather old technology, so we do know how to make them work. See maglev for an example in use today.
Evacuated tubes would be an issue though, seals degrade and would erode performance, but again, not an overwhelming technological issue.
Now, for solar powered everything, I'm a lot dubious on that one, solar powered car, possibly, but the magnetic motor, I'm inclined to doubt that one.
...Quantum hard drive years ago and it only stored Schrödinger's data.
I dunno, an ocean bottom barge is pretty useful - for fouling ancor lines.
A closed system isn't that much more massive. One only keeps a closed loop, so it's a bit more tubing.
"It wasn't a verified account and they weren't using 2FA?"
Twitter has 2FA for group accounts whose personnel rotate frequently? Talk about a logistiscal nightmare!
"Remind me. Why would CENTCOM have a Twitter feed? Would there be any connection with PR motives?"
In part. They also use it to keep in contact with their personnel, even when on leave.
Twitter and Facebook were used to alert and inform personnel during the Fort Hood shooting incident, as people off base would not be able to hear Giant Voice (a basewide PA system used for emergencies).
Hell, the CIA and NSA also have Twitter accounts.
Ah, but it's using a quite modern trackball.
Perhaps he's merely playing Missile Command.
"Apple; insecure, by default."
Apple; broke *BSD security badly by default.
Mutt is nice, but I prefer Alpine.
Still, for GPG encrypted mail, I stick with Thunderbird. Even my wife can work that.
"I only moved from Snow Leopard when new apps that I wanted were only supported on more recent version of OS X; and then I moved from Snow Leopard to Mavericks just before Yosemite shipped because I wanted to last stable version of OS X."
Same here, holding off, as I got bit by bugs and various programs not liking Mavericks at first.
Maybe I'll go with Yosemite in a year or so.
More like the NSA got into the proxy and got to watch traffic on both sides.
Hell, I'd not be surprised if the NSA got into their boxes as well.
"While I assume that the NSA knows its shit"
From my own, personal experience with them, yes, they know their shit quite well.
"a 100% Only Democracy In The Middle Eastern invention."
Iran *was* a democracy, British oil interests were upset about Iran nationalizing the oilfields and asked the US to have the CIA overthrow the government.
Truman said no, Eisenhower said yes. It was called Operation Ajax, which culminated with the installation of the Shah.
Eventually, the Iranians booted the Shah and installed a democracy, but one that also can have any laws overruled by an ayatollah.
As for Iranian nukes, I far prefer to chase plaid unicorns, which are far more numerous.
"Canada was found to have been hacking into servers in Brazil on behalf of the NSA in order to steal the commercially sensitive data of major Brazilian mining and oil companies, so it's not like the "5 eyes" countries aren't busy doing exactly the same thing to every other country in the world."
And why would the NSA ask Canada to hack into that which they have the capability to hack into themselves?
For some reason, flight induces near coma in me. I'm rapidly out like a light and don't usually awake until feeding time or on final approach.
Still, MTM... OK. My sectets tend to keep themselves. My net-fu is typically stronger than theirs is. I was an NA/SA/BOFL for a long, long time.
Which means that my laser mounted sharks can beat up their laser mounted sharks every time.
My mother was supervisor for the contracted pre-departure security for a major US airline. She and her team had regular briefings on the current threats, interestingly enough, many that I had as well for military counterterrorism operations.
She had related how a recent threat had arose where laptops could appear to be normal laptops, even appear to partially boot up, but if the login was entered a bomb detonated.
So, the security measure that was so wisely adopted was to force the user to login at the checkpoint. You know, where the passengers and security personnel would still be safe in the case of a detonation.
Hey, *she* didn't make that call, the FAA did. :/
But, that is a true story from the late 1990's.
The FBI conducted background investigations. Even for the military.
Later, OPM took over, under Bush the Lesser. Debacle city, as they were understaffed and the war ramp up required people with clearances.
Now, we contract that out (previously prohibited by law) and the contractor apparently dislikes encryption of data at rest.
Note the prohibited by law part, yet those who changed that law are "now asking pointed questions".
Just more panem et circenses.
Those ideas worked, huh?
Do you mean ideas like, oh, Operation Ajax, the overthrow of a democratic governent of Iran and installation of the corrupt and inept Shah? That idea?
*That* laid the seeds for the ongoing debacle of dealing with Iran. They're a bit testy over the tens of thousands dead, courtesy of the US installed Shah. All to take care of Eisenhower's war buddies in UK oil interests.
Just gravity and a massive thermal difference between in sun and in shade of a few hundred degrees.
As for unfurling testing conducted in free fall, the Vomit Comet has quite a short period of free fall, lest the free fall be rudely interrupted by an unintentional air-ground incursion.
What is always done when advanced warning of a major increase in solar radiation flux is about to occur.
Shut down sensitive electronics on satellites and energy grid providers watch for geomagnetic storms that could trip major sections of the power grid.
That is some *really great* engineering! That environment is pretty tough on mechanical devices.
So, I will say only this.
The NSA uses AES.
Need I say more?
OK, the *rest* of the US DoD uses AES.
"Imagine if Gmail users might not get through to Chinese clients. Many people outside China might be forced to switch away from Gmail."
So, those seeking suppliers then go to Indonesia.
Causing China to fsck itself economically.
As for the rather amusing "Cuba, how did anyone miss..." bullshit, I'll remind my fellow citizen that *only* the US embargoes Cuba. The rest of the civilized world engages in commerce and/or tourism.
Though, while working as an expat, I did try Cuban cigars. I far prefer Honduran.
"The part where they initially pulled the (The Interview) movie and said it would never see the light of day, to please the 'hackers'."
Epic reading failure.
Sony pulled the film because all of their major theater outlets refused to run the film. If it released without making money, Sony would have lost massive amounts of money. Not releasing it, due to no takers, kept the insurance clock stopped (upon release, the clock starts counting down).
As no English speaker comprehends "tomach", erm, WTF, over.?
Here, in the *real* world, availability of any part of a pig is varilable, *and* I honestly ponder your place as human. Add in the ignorance of pork skin and stomach differences...
Either you're not human or you avoid pork,
As one who avoids fat largely, I find the points... Interesting.
Either you are objecting to eating pork *or* you object to pigs by nature.
I have other considerations as well, but those are based upon NDA items.
I'll simply offer that the speaker is an APT .
Something I've dealt with repeatedly, for nearing a decade.
Hell and damnation, but I know the spice you mean and it entirely escapes my recall right now.
I'd be best served to drive an half to an hour to ask a Pennsylvania Dutch what the spice is, but I know from experience, it'll vary by the mile.
Someday, I'll actually get an opportunity to try haggis. Just to actually know what it really tastes like.
Really! I'm serious there. I've tried dishes and appetizers from many nations, even consuming raw garlic and onions as an appetizer (my Iranian hosts were astonished that a US citizen actually ate something of strong taste and smell, I had a secret weapon. Both a love of trying new foods (repeating the experience on a regular occasion, when I enjoyed it and avoiding the shit if I did not) and a lack of a sense of smell.
That is a good thing, as I'm known as a "supertaster", having more taste buds than the majority of humanity has.
As for the loss of a sense of smell, I'm entirely uncertain if it was secondary to grade school pugilism, of which I was uninvitingly a participant or secondary to ill advised chemo-cautery, secondary to severe nosebleeds that left at least a pint of blood on the floor or toilet (I was one of the reasons of the Red Cross guidance to *not* tip the head back, that damned near flooded my lungs with blood).
Interesting side note, my cooking is wildly popular. I simply refuse to work my up the food chain in chefdom. It's obscenely long, it's will renumerated and well, unappreciated in my nation.
I'm simply satisfied that my recipes are well received on three continents and reasonably well received on one other. That wasn't by any effort beyond cooking for fellow expats.
"Follow-up checks found another nine analysts who were doing the same thing, and all had their access to that data revoked."
That is key.
There *is* effort to abide by the law, despite abuses.
There is also another, rather annoying culture in the US DoD. That of advising, suggesting, ..., finally enforcing the law and regulations.
Case in point, a peer in Information Assurance (see Information Security) did repeatedly scan the network computers, including client computers, for "kiddie porn". That is something worthy, if it was part of his, or my job. It was not. We could only scan for that which we were ordered to. Said orders were "washed" through an attorney conversant with things military and things Constitutional (OK, it was a military attorney at law). Believe it or not, the US Constitution *is* in force, save in very, very, very narrow areas. *That* is in question on NSA activities, well, in the US or in regards to US citizens, the US Constitution does not protect foreigners abroad, ratified treaties do, find them, offer them and follow through to ratification or shut up. Ratified treaties are the law of the land, per the US Constitution.
Which is why I've *always* objected to torture, but that is wild afield here, just intercepting so me objections.
This proves to be an abuse of office by junior employees. I'll even admit to some abuses to see pictures of my grandchildren, while I was deployed and said parents refused to e-mail imagery, but "ordered" me to join FaceBook. I did, under duress. I accessed the imagery via secondary means, as malware was well established on FaceBook at that time and the risk was beyond objectionable to me.
Welcome to the real world, where balances are established, but rely upon young people to act mature, with somewhat predictable results.
The predictable results being revocation of access.
What is annoying is, the time taken to take action.
My teams revoked access against an unconstitutional search for "kiddie porn" by a mid level Information Security analyst after two attempts, his third being blocked and termination of access initiated, alongside disciplinary measure efforts.
The contractor sent him to an Iraqi base that was closed quite soon after his arrival, rather than go through the annoying efforts of defense or trial in civil court.
I've not tracked him since.
He was "good", otherwise, he was a village idiot in terms of boundaries.
"Go whole hog - say Oracle."
As Java is still not anywhere near a zero security patch per month, you've made a /dev/null point.
I gave both of you an upvote.
For the respondent, for factual response.
For you, for the head-desk slam.
Though, I tend towards idiocy on off days, rather than work days. I can't afford it on those days. ;)
"Selling narcotics or fake drugs over the Internet is a serious matter."
Fair enough, it is a very, very serious matter. One addressed by the federal government, which it was and a federal court of law found Google guilty of making the unlawful process easy and ordered Google to cease and desist.
Now, a *state* Attorney General seeks to enforce a federal court order? Not his jurisdiction. His jurisdiction is state level and below, with federal matters taken care of by the federal government. the *most* he can do is ask the US Attorney General to look into the matter.*
The author then goes on about a few thousand dollars here and there, ignoring the ancient bit of old news, that state officials come cheaper than federal officials, county officials coming even cheaper than state officials and those thousands of dollars contributed are remembered.
In short, what I've said for decades; The United States of America has the best government that money can buy.
Hell, during the "Robber Baron" era of sparse handful of industrialists having the majority of the money in the nation, they actually did buy themselves the President of their choice, with disastrous long term results.
I've read the tin foil hat version, I remain in contempt of those poor souls.
I've read "the enlightened" version of the story.
Now, I've read this one.
To be honest, the truth is in the middle between the two least outlandish versions.
For, an Attorney General is notable for one other thing. The Attorney General *is* an attorney and has many attorneys working under him or her. If legal action is taken against an Attorney General, the state pays for the defense and as those attorneys are getting paid the same to go to trial or sit and surf the internet, the cost isn't all that high. Everyone needed is already on the payroll and drawing their salaries regardless of what they are doing. The only one not to be is the attorney for Google.
As annotated at the end, the judge tossed the irreparable harm part, meaning no injunction will be issued.
So, it's reality as usual, a whole lot of bastards working for different corporations playing their usual games. On both sides.
*I've quite literally lost count of how many times I had to explain my nation's system of government to Europeans and especially to people from the UK. The marvel of the many different systems is universal, the amazement that it works at all is also universal.
What isn't typically apparent is, all too often, the entire thing lurches to a halt. Usually when one level of government attempts to do the job of a superior level of government.
Powers not granted the federal government fall to the states. Powers that the states are not granted by their constitutions fall to the counties, eventually to the individual.
For quite a long time, the entire US Constitution was believed to only grant rights to the governments federal and state (an interesting notion, considering the first handful of amendments), not to mention granting of citizenship and freedom of travel.
Indeed, before incorporation under the fourteenth amendment, the militia acts (which defined what age men were to be considered members of the militia (hence, how conscripting men for the armed forces operated as a mobilization of the militias) made no sense, as those laws were directed at citizens of the nation and state, but who were not incorporated under the Constitution and federal laws. But then, we've long ignored the hell out of common sense and laws (see the torture bit, as we have signed and ratified treaties, which are the law of the land, per the Constitution). For that matter, in many states and in federal court, it is possible to request a judicial duel, as the federal government never wrote a law against the ancient common law practice and many states did not as well.
Fortunately, most of my peers are unaware of that fact.
Really, I'm serious. Out of a joke, I researched the matter. I've hat attorneys confirm it.
The United States of America, a land where sanity never broached her shores.
Optimize the network *before* you fully map and document it?
A more sure plan to failure I have yet to witness.
First, document the *entire* network. It's a pain in the ass, but it'll pay for itself in less heartburn medication.
Second, learn the word proxy. It'll save you a lot of bandwidth.
So, it'd go:
User – WiFi router – Satellite modem – Satellite – ground station – proxy - Internet
Of course, you can content filter with a proxy, either by crude blacklisting or via something like Websense.
I've been at places where I had 2000 users hanging off of a one meg pipe. I've been at places where 6000 users hung off of a 6 meg pipe. In both instances, our proxy was aged and failed (HD failure dropped it), I stuck a squid proxy on a spare server running Linux. Watched a struggling network become operational, if slow on internet things.
I set squid for relatively primitive filtering and set to work rebuilding the array on the *real* proxy.
I won't even go into the bastardized mess I set up when higher command fucked up and didn't renew our Websense license, which left us in an unlawful position of unfiltered internet.
I'll just suggest that those senior officers did not enjoy my, erm, candor.
The license was swiftly renewed.
But, the *only* path to improvement is complete documentation, down to every endpoint.
I don't envy you the task, as having done so a few times, but if I were in the same nation, I'd give a hand. Heh, those roads aren't so challenging to someone who spent nearly three decades in military service. We'd have to go to Antarctica or the northern ice cap to find conditions I've not operated under.
"This kind of thing is much easier to do in the EU than the US. So yeah, almost certainly some european security service, albeit at the request of the US (it's believed this is the beginning of the payback for the Sony hack)."
Why bother? The NSA cracked TOR a handful of years ago.
"Is there any doubt that the NSA is behind it all ?"
The NSA doesn't have agents that serve warrants and physically touches servers. They're part of the DoD and are prohibited from doing any such thing in the US.
The FBI can and does such things.
Meanwhile, I was using TOR on my research computer all afternoon, through midnight Eastern time. Zero problems.
So, I call bullshit on this one.
First, for a rack mounted server, there would be no reason to open the case. At all.
One need only use the KVM to monitor it and one's magic USB tools to do data collection on it.
I'll call bullshit on it as well, as I was using my research machine from 15:30 to 00:30 today at work and it's on TOR. Didn't have any performance issues at all.
"Oh and our star is way to small to go supernova, it would need to be about 8 times more mass than it is."
Well, at this point, around 4 times its current mass would fit the bill. You only need to end up around 2.5 solar masses after red giant phase.
"I'm not sure what value you put in Wikipedia, but it has a nice summary of the threat and past events, plus a crunchy bibliography on the topic."
My daughters, when in college, had objected that Wikipedia was prohibited for research.
I calmly remarked that one may not use the *article*, but the bibliography and citations are most certainly usually acceptable. :)
"A supernova would have to be within 40 Ly to be serious cause for concern. http://en.wikipedia.org/wiki/Near-Earth_supernova . At 26 Ly it's estimated that half of our ozone layer would be destroyed. Closer than that, and inverse squares is a real bummer."
Ah, but a singularity *or* neutron star with its pole pointed at us could still give severe star burn to everyone on the planet. GRB's suck for around 600 ly or so.
Hmmm, which do you think we'll get to see first? Sag A* "eating" or Betelgeuse popping its cork?
"Well, if we survived that is ;)"
Well, it all depends upon where the poles are pointing, doesn't it?
And the class of supernova...
Still, I have my neutronium ointment to give me serious starblock.
The worst nonsense of the story, "(a trick we may need in a few billion years)".
To require that, we'd need to add around four times the sun's current mass (off the cuff estimate), to account for losses during the red giant phase and still retain 2.5 solar masses.
Then, a bit of magic to make the numbers still work...
Sol can *never* go supernova, save if another star rams into it and that star has enough mass. And well, we'd have worse problems than trying to outrun a supernova. You know, like ejection from the star system. Or ramming into either star as our orbit is turned into rubbish.
"The oil companies would like you to believe that."
The oil companies would rather that be a fact.
"Plants would look very strange indeed at least in visible light."
You should see them in ultraviolet light!
I do, now that the cataract is out (the natural lens filters UV, the synthetic one typically does not).
Plants look quite strange in infrared light as well.
"This suspiciously sounds like someone is not totally in the clear about the difference between the solar wind (not being used) and light pressure (being used)."
Or perhaps, they're considering wave-particle duality in this particular case?
Nah, they probably got it bollocks on.
But, I did ponder the solar wind, the pondered the amount extra from the Carrington event, then figured that anyone observing it directly, under a solar sail, wouldn't be experiencing it for very long.
A few additional ergs of pressure would be worth fatal irradiation, yes? ;)
Essentially, a kludge solution of using the shield of the spacecraft as a solar sail/stabilizer.
Do which I say, "Fucking cool! Great job, NASA!!!"
A kludge that works is simply an inelegant solution. A kludge that works within 5% of original, showroom floor precision is Fucking cool.
I say, give them a lot more of my tax dollars!
From a legal standpoint, it's even more complicated than that.
First, the ISP's have safe harbor law that protects them from such nonsensical and technologically impossible demands.
Second, opening them up to liability for traffic that they're paid to provide would also open up states to criminal liability for any and all crimes that the criminal used a toll road to get to or from the scene of a crime.
"Alternatively, some American TLA might be planning to'seize' -i.e. 'hack' the servers, even if they're located in other countries.
Or some nutty American judge could be planning another 'Finn job' and authorize one of those TLAs to pwn the servers located in foreign countries, without bothering with request letters and all that legal red tape. Not the first time it happens."
And those nefarious folks announced it to the TOR folks in advance, huh?