Quotulatiousness

June 19, 2011

“You have reached 75% of your available bandwidth”

Filed under: Randomness — Tags: — Nicholas @ 10:50

Hmmmm. I just got a notice from Rogers that we’ve used 75% of our bandwidth already this month. I don’t think we’ve done that for years . . . and this hasn’t been a particularly heavy internet usage month for us. I wonder if they’ve lowered our bandwidth cap recently. That might explain it.

Update: Ah, mystery explained . . . while the notice talks about a month, it’s not the calendar month. We hit 75% on the last day of the billing period.

“It is clear they are running out of options”

Filed under: Britain, Economics, Europe, Greece — Tags: , — Nicholas @ 10:29

It looks as though the British banks are starting to get very nervous about Eurozone bank defaults:

Senior sources have revealed that leading banks, including Barclays and Standard Chartered, have radically reduced the amount of unsecured lending they are prepared to make available to eurozone banks, raising the prospect of a new credit crunch for the European banking system.

Standard Chartered is understood to have withdrawn tens of billions of pounds from the eurozone inter-bank lending market in recent months and cut its overall exposure by two-thirds in the past few weeks as it has become increasingly worried about the finances of other European banks.

Barclays has also cut its exposure in recent months as senior managers have become increasingly concerned about developments among banks with large exposures to the troubled European countries Greece, Ireland, Spain, Italy and Portugal.

H/T to Elizabeth for the link.

Cyber-espionage in theory and practice

Filed under: China, Government, Military, Technology, USA — Tags: , , , — Nicholas @ 09:50

An interesting article at Strategy Page discussing online espionage:

Firms with the most to lose, like financial institutions, guard their data most successfully. They do this the old-fashioned way, with layers and layers of security, implemented by the best (and most highly paid) people and pushed by senior managers who take the time to learn about what they are dealing with, and what it will take to stay on top of the problem.

It’s different in the defense business. If the Chinese steal data on some new weapon, there might be a problem years down the road, when the Chinese offer a cheaper alternative to an American weapon, for the export market. But even that problem has a silver lining, in that you can get away with insisting that those clever Chinese developed your technology independently. Meanwhile, everyone insists that there was no espionage, cyber or traditional, involved. As a further benefit, the American firm will get more money from a terrified government, in order to maintain the American technical edge. It’s the same general drill for military organizations. But for financial institutions, especially those that trade in fast moving currency, derivatives and bond markets, any information leaks can have immediate, and calamitous consequences. You must either protect your data, or die.

It’s not exactly a secret that China has been active in this area, but the extent of their official activity is hard to state. However, just as non-state actors take advantage of individuals who fail to use anti-virus software on their computers, ignorance and apathy are tools for state actors:

But the biggest problem, according to military Cyber War commanders, is the difficulty in making it clear to political leaders, and non-expert (in Internet matters) military commanders, what the cyber weapons are, and the ramifications of the attacks. Some types of attacks are accompanied by the risk of shutting down much, or all, of the Internet. Other types of operations can be traced back to the source. This could trigger a more conventional, even nuclear, response. Some attacks use worms (programs that, once unleashed, keep spreading by themselves.) You can program worms to shut down after a certain time (or when certain conditions are met). But these weapons are difficult, often impossible, to test “in the wild” (on the Internet). By comparison, nuclear weapons were a new, very high-tech, weapon in 1945. But nukes were easy to understand; it was a very powerful bomb. Cyber weapons are much less predictable, and that will make them more difficult for senior officials to order unleashed.

So the first order of business is to develop reliable techniques to quickly, and accurately, educate the senior decision makers about what they are about to unleash. This would begin with the simplest, and cheapest, weapons, which are botnets, used for DDOS attacks. In plain English, that means gaining (by purchase or otherwise) access to hundreds, or thousands, of home and business PCs that have had special software secretly installed. This allows whoever installed the software that turned these PCs into zombies, to do whatever they want with these machines. The most common thing done is to have those PCs, when hooked up to the Internet, to send as many emails, or other electronic messages, as it can, to a specified website. When this is done with lots of zombies (a botnet), the flood of messages becomes a DDOS (Distributed Denial of Service) attack that shuts the target down. This happens because so much junk is coming in from the botnet, that no one else can use the web site.

Powered by WordPress