Quotulatiousness

April 19, 2011

WikiLeaks exposes Chinese espionage unit

Filed under: China, Military, Technology, USA — Tags: , , — Nicholas @ 09:15

Strategy Page points out that it’s not just American and allied secrets that have been exposed by WikiLeaks:

Chinese Cyber War units have been plundering foreign government and military online data for over five years now. But thanks to Wikileaks, and several other sources, the identity and location of the main Chinese Cyber War operation is now known. The Chinese Chengdu Province First Technical Reconnaissance Bureau (1st TRB) is a Chinese Army electronic warfare unit located in central China (Chengdu), and is the most frequent source of hacking attacks traced back to their source. The servers used by the 1st TRB came online over five years ago, and are still used. The Chinese government flatly refuses to even discuss the growing pile of evidence regarding operations like the 1st TRB.

The 1st TRB is part of the Chinese Army’s Third Department, which is responsible for all sorts of electronic eavesdropping. But given the praise showered on the 1st TRB, a lot of valuable data has apparently been brought to Chengdu, and then distributed to the appropriate industrial, diplomatic or military operations. The hacking operation has been so successful, that it has obtained more staff and technical resources. As a result, in the last five years, detected hacking attempts on U.S. government and corporate networks has increased by more than six times. Most of these hacks appear to be coming from China. Not all the hacking is done by 1st TRB personnel. A lot of it appears to be the work of Chinese freelancers, often working for pay, but sometimes just to “serve the motherland.”

Reuters has a special report on “Byzantine Hades”:

According to U.S. investigators, China has stolen terabytes of sensitive data — from usernames and passwords for State Department computers to designs for multi-billion dollar weapons systems. And Chinese hackers show no signs of letting up. “The attacks coming out of China are not only continuing, they are accelerating,” says Alan Paller, director of research at information-security training group SANS Institute in Washington, DC.

Secret U.S. State Department cables, obtained by WikiLeaks and made available to Reuters by a third party, trace systems breaches — colorfully code-named “Byzantine Hades” by U.S. investigators — to the Chinese military. An April 2009 cable even pinpoints the attacks to a specific unit of China’s People’s Liberation Army.

Privately, U.S. officials have long suspected that the Chinese government and in particular the military was behind the cyber-attacks. What was never disclosed publicly, until now, was evidence.

U.S. efforts to halt Byzantine Hades hacks are ongoing, according to four sources familiar with investigations. In the April 2009 cable, officials in the State Department’s Cyber Threat Analysis Division noted that several Chinese-registered Web sites were “involved in Byzantine Hades intrusion activity in 2006.”

Another commercial wargame used for professional training

Filed under: Gaming, Military, Technology — Tags: , — Nicholas @ 09:02

Back in 2005, I posted some information about a software package in use by the USMC called Tacops, which was a single-developer wargame that provided very high training value. The unusual thing was that the military was willing to adopt a commercial wargame for their own training, over internally developed simulations. They seem to have gotten over that inhibition, as Steel Beasts, another single developer wargame, is seeing similar use today:

It was a decade ago that tank crews the world over became aware of a computer tank simulator, Steel Beasts, that was different. Steel Beasts was created by a single programmer, but with input from several professional tank troops. The graphics weren’t the greatest, but it was very accurate, so much so that the professionals were starting to use it as a training device. The publisher and creator of Steel Beasts seized the opportunity, and by 2006 there was a version for military use (Steel Beasts Professional) only that allowed for the use of a LAN, an instructor watching over how all the players were doing, scenario and terrain building and AAR (after action report) functions so that everything that happened in a game was captured. This allowed the instructor to point out errors, and what should have been done.

So far, ten countries (Austria, Denmark, Sweden, Norway, Finland, Chile, Canada, Australia, Spain and the U.S.) have bought Steel Beast Professional (at $125 a copy) for training their armor vehicle crews. The troops find the vehicle controls, and tactical situations to be realistic, and compelling. The game really gets the pucker factor going, and even before the pro version came along, troops were buying the commercial version and playing it for the professional, and entertainment, value.

April 18, 2011

Happy thought of the day

Filed under: Law, Liberty, Media, Technology, USA — Tags: , , , , — Nicholas @ 15:43

Darlene Storm offers this cheery little nugget of information (from a post back in December):

Dear Americans: If you are not “authorized” personnel, but you have read, written about, commented upon, tweeted, spread links by “liking” on Facebook, shared by email, or otherwise discussed “classified” information disclosed from WikiLeaks, you could be implicated for crimes under the U.S. Espionage Act — or so warns a legal expert who said the U.S. Espionage Act could make “felons of us all.”

As the U.S. Justice Department works on a legal case against WikiLeak’s Julian Assange for his role in helping publish 250,000 classified U.S. diplomatic cables, authorities are leaning toward charging Assange with spying under the Espionage Act of 1917. Legal experts warn that if there is an indictment under the Espionage Act, then any citizen who has discussed or accessed “classified” information can be arrested on “national security” grounds.

H/T to Bruce Schneier for the link.

The Magic Washing Machine, by Hans Rosling

Filed under: Economics, Environment, Health, Technology — Tags: , , , — Nicholas @ 09:49

H/T to Jon for the link.

April 14, 2011

From supercar to superscrap

Filed under: Europe, Germany, Technology — Tags: , — Nicholas @ 12:15

This is what it looked like before the owner’s son took it for a drive:

And this is after the drive got stopped a bit early:

The good news is that the driver and passenger were able to walk away from the wreck, leaving £275,000 of scrap metal behind.

DANE to address weaknesses in internet security?

Filed under: Technology — Tags: , — Nicholas @ 12:05

The Economist looks at a possible way to address the known weaknesses of the current internet security defaults:

[A] comprehensive solution would let domain owners confirm that the names and machine numbers issued by a given CA are kosher. Under DNS-based Authentication of Named Entities (DANE), a standard being developed by Mr Schultze and others at the Internet Engineering Task Force, a browser retrieves a certificate from a web server, but checks with the DNS whether the certificate is in fact the one that was issued to a given domain owner. So, though a CA will still provide a validation step, the domain owner will have had to give it the thumbs up first. To prevent malevolent fiddling the DNS infrastructure itself needs to be secured, too. A long-running effort to do this, known as DNSSEC, hit a key milestone in 2010 and may have enough pieces in place soon to be usable. This is important because DANE would be incomplete without it.

Whilst all current browsers must be updated to take advantage of DANE, the new system can coexist with the old, and a gradual transition can be made. Browser plug-ins could bridge the gap before browser makers build in DANE, too. Those that want the added robustness of the new system — whether individuals, companies, or governments — may accelerate the adoption of updated browsers as DANE becomes available.

These moves do not provide total assurance that what your browser is told about an internet site’s identity and security is true. Trust, but verify — and verify again.

April 13, 2011

Never seen this before

Filed under: Randomness, Technology — Tags: — Nicholas @ 11:28

My Rogers email account appears to have a nasty case of rot-13 encoding in the address book. I’d include a screen capture, but now that I’ve told you the trick of decoding it, it’d expose folks’ email addresses, which would be a bit unethical of me. At first, I thought it was just a garble, but I noticed that a lot of the addresses ended in “.pbz” and “.pn” (that’d be “.com” and “.ca” rotated 13 characters).

It’s not crippling, as I can just copy and paste from existing email messages, but it is annoying.

Update, 14 April: It appears to be fixed now.

April 12, 2011

Israel’s “Iron Dome” missile defence system in action

Filed under: Middle East, Military, Technology, Weapons — Tags: , — Nicholas @ 08:42

Strategy Page discusses the first use of the new Israeli anti-missile system to defend civilian targets last week:

Israel has deployed two batteries of its Iron Dome anti-missile system near the Gaza border. One is near the town of Beer Sheva (the largest town in the Negev desert) and another near the coastal city Ashdod (the largest city within range of 122mm rockets fired from Gaza). On April 7th, a 122mm rocket was intercepted near Ashkelon, which is south of Ashdod. This deployment was prompted by an increase in rockets fired from Gaza, and the growing use of longer range (20 kilometers) 122mm rockets. Iron Dome proved that it could work under combat conditions, preventing the longer range, factory made, rockets from landing in populated areas.

This is a big turnaround for this system. Four months ago, the Israeli military revealed that its new Iron Dome anti-rocket system was not meant for defending towns and villages, but military bases. For years, politicians touted Iron Dome as a means of defending civilians living close to rockets fired from Gaza in the south and Lebanon in the north. But it turns out that it takes about 15 seconds for Iron Dome to detect, identify and fire its missiles. But most of the civilian targets currently under fire from Gaza are so close to the border (within 13 kilometers) that the rockets are fired and land in less than 15 seconds. This means that the town of Sderot, the closest Israeli urban area to Gaza, cannot be helped by Iron Dome.

[. . .]

Iron Dome uses two radars to quickly calculate the trajectory of the incoming rocket (Palestinian Kassams from Gaza, or Russian and Iranian designs favored by Hezbollah in Lebanon) and do nothing if the rocket trajectory indicates it is going to land in an uninhabited area. But if the computers predict a rocket coming down in an inhabited area, a $40,000 guided missile is fired to intercept the rocket. This makes the system cost-effective. That’s because Hezbollah fired 4,000 rockets in 2006, and Palestinian terrorists in Gaza have fired over six thousand Kassam rockets in the past eight years, and the Israelis know where each of them landed. Over 90 percent of these rockets landed in uninhabited areas, and few of those that did caused few casualties. Still, a thousand interceptor missiles would cost $40 million. But that would save large quantities of military equipment and avoid many dead and injured troops. Israel already has a radar system in place that gives some warning of approaching rockets. Iron Dome will use that system, in addition to another, more specialized radar in southern Israel.

Next iPhone to be delayed into 2012?

Filed under: Technology — Tags: , , — Nicholas @ 08:27

According to sources at some of the various suppliers for key iPhone components, Apple may be delaying the next iPhone:

Analyst firm Avian Securities said that production of the iPhone 5 won’t begin till September, meaning a holiday launch at the earliest, or even a New Year’s debut.

The note, reported in Business Insider, is based on chats with key component suppliers, which support a consensus view that launch will be either a late 2011 or early 2012 event.

The note adds that a low-spec, low-price iPhone is also on the Apple roadmap, though exactly where on the roadmap is unclear.

This is surely a worrying development for the iPhone elite — not only could such a nano-iPhone divert some components, further pushing back the iPhone 5, but it would mean that “ordinary people” can get their hands on a fondleslab.

My own iPhone 3G is still holding up well (I’m not a particularly abusive owner), but I’ll finally be out of contract with Rogers in August, so the delay in the next iPhone release may increase the chances of me switching to an Android phone instead.

April 11, 2011

SSL is “just an illusion of security”

Filed under: Technology — Tags: , , , , — Nicholas @ 10:09

SSL (Secure Sockets Layer) is critically important to safe communications on the internet. It may also be “hopelessly broken“:

SSL made its debut in 1994 as a way to cryptographically secure e-commerce and other sensitive internet communications. A private key at the heart of the system allows website operators to prove that they are the rightful owners of the domains visitors are accessing, rather than impostors who have hacked the users’ connections. Countless websites also use SSL to encrypt passwords, emails and other data to thwart anyone who may be monitoring the traffic passing between the two parties.

It’s hard to overstate the reliance that websites operated by Google, PayPal, Microsoft, Bank of America and millions of other companies place in SSL. And yet, the repeated failures suggest that the system in its current state is hopelessly broken.

“Right now, it’s just an illusion of security,” said Moxie Marlinspike, a security researcher who has repeatedly poked holes in the technical underpinnings of SSL. “Depending on what you think your threat is, you can trust it on varying levels, but fundamentally, it has some pretty serious problems.”

Although SSL’s vulnerabilities are worrying, critics have reserved their most biting assessments for the business practices of Comodo, VeriSign, GoDaddy and the other so-called certificate authorities, known as CAs for short. Once their root certificates are included in Internet Explorer, Firefox and other major browsers, they can’t be removed without creating disruptions on huge swaths of the internet.

April 10, 2011

Canada’s peaceful submarines

Filed under: Britain, Cancon, Military, Technology, Weapons — Tags: , , — Nicholas @ 11:02

Apparently, the navy’s purchase of used British submarines has still not been completed: the boats are in our hands, but they’re still unarmed:

The country’s stock of second-hand submarines — already beleaguered with repairs and upgrades — is incapable of firing the MK-48 torpedoes they currently own.

When Canada purchased its current fleet of four submarines from Britain in 1998, they were fitted for British torpedoes. At the time, Canada was heavily invested with the modern MK-48 torpedo system and did not want to abandon it.

Like any shopper trying to justify a second-hand purchase in the face of an obstacle, they figured it was still a good deal. They “Canadianized” the submarines, but, 13 year later, they still haven’t got around to the “weaponization” part.

“The Canadian Forces has always intended for the Victoria Class submarines to carry and fire the Mark 48 torpedo,” wrote Denise LaViolette, the director of navy public affairs, in an email. “Initial weapons certification will be progressed early in 2012 in HMCS Victoria for Pacific operations followed that year by HMCS Windsor for Atlantic operations.”

I noted the lack of torpedo armament on the Canadian sub fleet back in 2004. I had no clue that they’d still be unarmed in 2011!

Later that same year, I said:

As I’ve said in other posts, I’m not a former Navy person, so my knowledge of the situation is neither broad nor deep. I’m moderately well-read on naval mattters, but that’s the limit. On that basis, I thought the purchase of the Upholder subs was a brilliant solution for both the Canadian and Royal Navies: we got a heck of a deal and they got the subs off their inventory. It really did look like a win-win, and both sides thought they’d gotten the better of the bargain.

In the long run, this may still turn out to be true. I certainly hope so.

As several others have noted, until we find out exactly what happened on HMCS Chicoutimi, we can’t make any determination about whether the subs are going to be safe and effective vessels for our navy. And, as Bruce R. pointed out the other day, if we want to retain any claims of sovereignty over the coastal waters of this huge country, we need those subs in the water now.

Well, the subs have been in the water for several years, but without torpedoes, they’re not fully functional.

Update, 12 April: Strategy Page has a useful summary of the history of the Upholder/Victoria class submarines:

It all began in the 1990s, when Canada wanted to replace its 1960s era diesel-electric subs. This did not seem possible, because the cost of new boats would have been about half a billion dollars each. Britain, however, had four slightly used Upholder class diesel-electric subs that it was willing to part with for $188 million each. Britain had built these boats in the late 1980s, put them in service between 1990 and 1993, but then mothballed them shortly thereafter when it decided to go with an all-nuclear submarine fleet.

So the deal was made in 1998, with delivery of the Upholders to begin in 2000. Canada decommissioned its Oberons in 2000, then discovered that the British boats needed more work (fixing flaws, installing Canadian equipment) than anticipated. It wasn’t until 2004 that the subs were ready, and that one year one of them was damaged by fire, while at sea. This boat is to be back in service next year. By the end of this year, three boats should be back in service. Maybe.

[. . .]

The problem is that the subs were bought without a through enough examination. It was later found that most major systems had problems and defects that had to be fixed (at considerable expense). Thus these boats have spent most of their time, during the last decade, undergoing repairs or upgrades. The final fix will be to get the torpedo tubes working. In any event, a Canadian [submarine] has never fired a torpedo in combat, mainly because the Canadian Navy did not get subs until the 1960s. Lots of Canadian surface ships have fired torpedoes in combat, but the last time that happened was in 1945. The sole operational Victoria class boat is on patrol in the Pacific, listening for trouble which, if found, will be reported to the proper authorities.

April 8, 2011

British study finds wind power even less economical than hoped

Filed under: Britain, Economics, Technology — Tags: , — Nicholas @ 09:56

The assumption was that wind farms would produce 30% of their theoretical maximum over time (the wind doesn’t blow all the time, so no wind farm will ever produce 100% for more than a short period of time). This number now appears to be too optimistic:

A new analysis of wind energy supplied to the UK National Grid in recent years has shown that wind farms produce significantly less electricity than had been thought, and that they cause more problems for the Grid than had been believed.

The report [. . .] was commissioned by conservation charity the John Muir Trust and carried out by consulting engineer Stuart Young. It measured electricity actually metered as being delivered to the National Grid.

[. . .]

In general, then, one should assume that a wind farm will generate no more than 25 per cent of maximum capacity over time (and indeed this seems set to get worse as new super-large turbines come into service). Even over a year this will be up or down by a few per cent, making planning more difficult.

It gets worse, too, as wind power frequently drops to almost nothing. It tends to do this quite often just when demand is at its early-evening peak:

At each of the four highest peak demands of 2010 wind output was low being respectively 4.72%, 5.51%, 2.59% and 2.51% of capacity at peak demand.

And unfortunately the average capacity over time is pulled up significantly by brief windy periods. Wind output is actually below 20 per cent of maximum most of the time; it is below 10 per cent fully one-third of the time. Wind power needs a lot of thermal backup running most of the time to keep the lights on, but it also needs that backup to go away rapidly whenever the wind blows hard, or it won’t deliver even 25 per cent of capacity.

April 7, 2011

Unmanned sub hunter

Filed under: Military, Technology, USA — Tags: , , , — Nicholas @ 10:25

Lewis Page looks at the Continuous Trail Unmanned Vessel (ACTUV):

No doubt regular readers will recall the US military’s cunning plan to develop unmanned submarine-hunting robotic frigates — warships which would prowl the oceans like automated Mary Celestes, remorselessly tracking enemy submarines regardless of how their pale, sweaty, malodorous captains might twist and turn.

The Anti-submarine warfare Continuous Trail Unmanned Vessel (ACTUV) project is intended to produce “an X-ship founded on the assumption that no person steps aboard at any point in its operating cycle”. The uncrewed frigate would have enough range and endurance for “global, months long deployments with no underway human maintenance”, being able to cross oceans and fight its battles largely without any human input — communications back to base would be “intermittent”, according to DARPA.

As you might imagine, there are lots of potential issues to sending an armed, unmanned ship out into the ocean, including how to handle interactions with other users of the sea lanes. It’d be worse than embarassing to the US Navy to have one of their fancy new ACTUV vessels get tangled up in a fishing net or get caught in the middle of a regatta.

Perhaps unsurprisingly, then, it has been decided that the best way to hammer out a set of tactics for ACTUVs is to develop a game-style simulation pitting ACTUV against submarine and get people to play it — so crowdsourcing the methods and tactical principles that will then be coded into the robo-frigates’ AIs.

The new game — from which these visuals are drawn — is called ACTUV Tactics. The game engine is used in various military sims and in the Dangerous Waters commercial release of 2005. [. . .]. In it, a player tries to find and track an enemy submarine while avoiding collisions with commercial vessels and the like. Various different proposed models of ACTUV robo-frigate are available: Gator, Remora, Seahorse, Shark and Triton.

April 6, 2011

A good example of what not to crowdsource

Filed under: Britain, Humour, Media, Technology — Tags: , , — Nicholas @ 12:16

The Guardian tried to enlist the brainpower of the crowd to solve the problems at Fukushima. As innovative as some of these solutions might be, it does demonstrate that there are things that cannot be crowdsourced:

Todd: “Build the worlds biggest tank over the whole site with pre-fab tilt slab concrete. […] I have done similar projects on a smaller scale but not with nuclear waste.”

Weston, Nuclear Radiologist: “repair the reacters befor any thing else bad happiens”

Andrew, Inventor: “water problem is un-fixable. Stop trying. Let it run off into the Pacific.”

Hugh, Geology Student: “I would use explosive materials to detach the Fukushima plant from the main land, use air-bags to float it 50km out into the pacific and then sink the whole lot 7000m down to the bottom of the Japan Trench.”

Max: “I suggest removing radioactive contamination there by using a small controlled explosion of a specially engineered nuclear device at the site of the stricken Fukushima plant”

OmegaSector: “IN FUTURE, ALL NEW NUCLEAR REACTOR MUST BE BUILT OVER A 1.2 km hole. Any out of control reactor, one press of a buttom and boom, the reactor will fail down 1.2 km and then seal up with soil.”

Denny, Assistant to Dr Strangelove: “Small scale nuclear strike.”

Kevin: “Japan has over 30,000 suicides per year — that’s over 80 per day. Since these people are planning to kill themselves anyway, how about the government asking for volunteers to go in, fix piping, visually inspect the damage, etc..?”

Not Einstein: “friendly radiation… to probably cancel out its effects. Its more like injecting good cholesterols to fight off bad ones in your body. I am not versed in these nuclear technicalities but I do understand philosophy of things, and sometimes you just need to fight fire with fire.”

Oscar. Mike. Golf.

XM-25 video released

Filed under: Military, Technology, USA, Weapons — Tags: , — Nicholas @ 07:14

XM25 from PEO Soldier on Vimeo.

If the field trials in Afghanistan go well, this could be a very useful addition to the US Army’s armament collection. As the video shows, however, firing a 25mm round means there’s quite a kick to the soldier firing the weapon. The capability the weapon provides, however, isn’t available at the squad level any other way, so just hand it to your biggest trooper . . .

« Newer PostsOlder Posts »

Powered by WordPress