Hacker Newsnew | past | comments | ask | show | jobs | submit | igivanov's commentslogin

>Putin is not named directly in these papers

yes that's absolutely damning. typical Putin /s

can you share more of your conclusions based on absence of evidence?


have you read the article? - no you haven't

"With relatively few sites reporting the radiation increase, identifying its origins is challenging. The RIVM added media reports that it believes Russia is the source are likely based on mistranslations of its Dutch statement, and that "no specific country of origin can be pointed out at this moment."

yet you took the trouble to collect in your post almost every single bad thing you heard about Russia, half of them outright lies, the rest being half-truths, and dump them all here.


that would be the UK government, has nothing to do with the FSB (which is btw ~ FBI of Russia) or NSA.


>It's like the Soviets copying the space shuttle and concorde.

they didn't though, please try again.


The resemblance is obvious, whether or not it's a "copy" by some standard.

It just occurred to me to check out the Mig-29 on Wikipedia, and it has an uncanny resemblance to the F-15.


It might be an optimum design for a glider, e.g., here is a design for India's Space Shuttle https://dynaimage.cdn.cnn.com/cnn/c_fill,g_auto,w_1200,h_675...


I actually just saw a documentary about the Mig 29, seems like it was a pretty revolutionary design https://youtu.be/zCnpuoD1PLo


Both the Mig-29 and Su-27 are based on the same aerodynamics research. That they look similar to the F-15 is probably more due to the fact that they were all designed to be air superiority fighters than any espionage.


Something that caught my eye was not just the overall layout but the intakes' shape.

When I say it looks like the F-15, I'm saying, as opposed to, say, the F-16 or F-18 or F-14.

And it's just a comment on the superficial appearance, not based on aerospace knowledge or about espionage.

This thread isn't even about espionage, is it?


[flagged]


Maybe you misread something? If I think something obviously looks like something else, that's not something you can disprove with a citation. There's no assumption involved.


no. for this one, no reported infections in children 15yo or younger.


It absolutely has infected children, as young as 36 hours old. There hasn't, however, been any reports of children dying.


technically you are probably correct though I was more replying to the parent's statement that it kills newborns

>The outbreak was first reported on December 31, but no children younger than 15 years old had been diagnosed as of January 22. A study in the New England Journal of Medicine said at the time that "children might be less likely to become infected or, if infected, may show milder symptoms" than adults.

>Since then, doctors have recorded a few one-off cases among children: a 9-month-old girl in Beijing, a child in Germany whose father was diagnosed with the virus first, and a child in Shenzhen, China, who was infected but displayed no symptoms.

>On Wednesday, Chinese authorities confirmed that an infant in Wuhan, China, had tested positive for the virus 30 hours after being born; the baby's mother is a coronavirus patient.

https://www.sciencealert.com/experts-are-puzzled-over-why-so...


Not likely at all. The Iranian defence structure is highly decentralized.


That does not follow. "Decentralized" is not a defense against "penetrated by the NSA". It just means that it's more work - one attack doesn't give you the keys to everything.

On the other side, from the Iranian perspective, it means that systems are secured by different people from different organizations with different degrees of training. That's a recipe for a number of attackable systems.


It means they are off the grid and are trained to act independently of the central command.


I'm pretty sure that there are exactly zero units of the Iranian military that have independent authority to, for example, start shooting missiles at US Navy warships. They may be able to act independently once they understand that it's time to open fire. But to decide to start... that's a central command decision.


But they will start shooting when they learn that a conflict has started. You know, if a US attack in the strait begins it will become obvious pretty pretty soon. Also they don't need a sophisticated link from the top to start an attack, just a simple command.


Doesn't matter. Cyber Command has a contingency plan, called Nitro Zeus, using cyber and other methods, to shut down the entire country of Iran. It's a full-scale attack in waiting.

When Nakasone and Cyber Command looked at what their digital weapons could contribute to the battle plan, they focused on the Iranian targets that they could reach by boring into the country's networks: Iran's air defense, its communications systems, and its power grid. Nitro Zeus would be the opening act of the war plan: turning off an entire country so fast that retaliation would have been extremely difficult. It was also, in the minds of some of its creators, a glimpse of the future. The idea was to plunge the target country into blackness and confusion from the very beginning of a conflict. That would give Israel and the United States time to bomb the many suspected nuclear sites, take pictures of how much damage was done, and if necessary bomb them again. But the hope was that Nitro Zeus would avert an all-out war, because the Iranians would, in theory, not be able to strike back. As part of the plan, Iran's missile capability would also have been targeted.

So, even as President Obama was worried about the vulnerability of America's electric grid, the United States was tunneling inside Iran's grid - along with its cell-phone network and even the Iranian Revolutionary Guard Corps' command-and-control systems.

"This was pretty mind blowing to me," one former official said. "Here we were, going to work every day behind sealed doors, essentially trying to figure out if it was possible to cripple an entire nation's infrastructure without ever firing a shot or dropping a bomb. So we littered Iran's networks with malware," he said, a reference to the process of placing implants in key strategic systems that could, later on, be used to inject destructive code or simply turn the networks off.

"The hard part was keeping track of all of it," he said. Keeping track was tricky business because networks always change - and because there was no way to test Iran's vulnerabilities in field conditions. So Nakasone and the thousands of people at work on Nitro Zeus resorted to tabletop exercises, simulations of an attack. They tested and retested on a virtual model of Iran's networks to make sure that the implants were not visible to the Iranians and that collateral damage was limited. And they created answers from scratch to a series of questions: How do you take down the grid and keep it down? How about the air defenses? If the Iranians try to retaliate, how do you make sure they never get off the ground? "This was an enormous, and enormously complex, program," the former official said. "Before it was developed, the US had never assembled a combined cyber and kinetic attack plan on this scale."

Source: David E. Sanger, "The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age", Crown, NY, 2018, pp.39-44


Your quotes quotes sound impressive but I wouldn't take them at face value and think that the Iranians are unaware of and unprepared to face these threats.

You may want to read articles by this guy for an alternative view on Iran's capabilities.

https://oilprice.com/contributors/Yossef-Bodansky

as a sidenote, some people even believed the US claims that their air defence systems are the best in the world, until a few days ago.


>time and effort might be key here for your mastery of this subject.

It doesn't have to be this way. If most programming languages were designed like regular expressions they would be unusable. I can spend a year w/o writing a single line of Pascal or C++ and then it would come back immediately. I occasionally found regular expressions useful in my work, but only a couple of times could justify spending time on learning a little bit of it only to forget the next day. In a few other cases I simply googled a solution and used w/o understanding it. Most often I just write code instead, it is verbose but at least it's clear what it does.


I suppose what I'm trying to say is that from personal and anecdotal experience I got 97% in a first year calculus course. I went in with a marginally good algebra result, but I resolved to learn the shit out of everything that came my way.

I systemised as much as I could, but there was a lot of write practice when it came to learning trigonomic idendities and transidnetal functions. And not just the normal ones; I mean all of them ... both the inverserse and hyperbolic identities.

I did all of the problems and got extra ones.

In short, I knew the material backwards and forwards; I finished hour long exams in 20 minutes, and was usually the first or second person to leave.

What I am trying to say is that REGEX is similar to calculas and in my view requires significant focus and practice to master. Or you can muddle your way through it when you have to.


In Canada it looks equally expensive if you don't have insurance (e.g. a non resident).

http://www.david-cummings.com/documents/canadian_hospital_ra...

You pay CAD750-800 for an ER visit if they just take a look at you.


what has intelligence and national security to do with the things the CIA is best known for: endless subversive acts, overthrows of governments, creating and enabling terrorists, assassinations, torture programs, extraordinary renditions? if anything it's quite the opposite.


While recounting anecdotes and making witty observations, let's not forget that this man was responsible for bringing incredible misery upon the people of Russia. Not he alone, but he was the main one.

Also a drunkard, a dictator and a darling of the West.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: