The Obama administration's decision to try Khalid Sheik Mohammad and four henchmen in federal court in NYC has provoked a lot of criticism/comment. The idea is derided as a "show trial".
Got news for you newies. The purpose of a public trial is to show that the bastard is guilty so people feel right about hanging him. This goes way back, thousands of years. If you don't bother to show the bastard is guilty, the bastard's friends and relatives will start up a blood feud.
So let's have a show trial. Should have done it years ago. Let's hope the US judiciary understands their duty and makes a decent job of it. Lots of testimony from grieving loved ones. Ugly pictures of smashed bodies and people jumping to avoid the flames. Introduce every sort of derogatory evidence. Allow recorded testimony. Don't rule out incriminating evidence just because the accused was made a little uncomfortable in the course of gathering said evidence. Deny defense requests for classified information. Trial conducted in English, with on-line translation into Arabic, by our translators, not Al Jazeera's translators. Don't allow the accused to make speeches, limit him to answering questions put to him by counsel.
Get it moving, and don't waste time. This kind of show is good for a week or two on TV. Don't drag it out like the OJ trial.
Keep in mind that the purpose of this trial is to convince the entire world that the bastard is really really guilty.
This blog posts about aviation, automobiles, electronics, programming, politics and such other subjects as catch my interest. The blog is based in northern New Hampshire, USA
Saturday, November 14, 2009
Friday, November 13, 2009
Snow Blitz rides again
Years ago cores from New England pond bottoms suggested that the last ice age came on fast, with in a year or two. If I remember aright this was based on analysis of pollen grains in the pond bottom cores. This was called "snowblitz" at the time. People pointed out that snow is positive feedback. The white snowcover reflects mucho solar heat back into space, so that once the northern hemisphere bcomes snowcovered, it won't melt out. This was a topic of discussion back in the '60s or '70s when people worried about the ice ages coming back.
Right here is another pond bottom mud core study, this time in Ireland, where the investigators show another rapid onset of an ice age.
The global warming people have backed off a little since the world started cooling down ten years ago. This report suggests that it could get a lot colder, real fast.
Right here is another pond bottom mud core study, this time in Ireland, where the investigators show another rapid onset of an ice age.
The global warming people have backed off a little since the world started cooling down ten years ago. This report suggests that it could get a lot colder, real fast.
Hacking thru the radar Part II
"In the famous "Suter" series of electronic attach experiments as Nellis AFB Nev. a data stream was fired into an integrated air defense network's antenna's by an EC-130 Compass Call electronic attack aircraft. " So saith Aviation Week.
Cool. Couple of years ago Aviation Week reported that the Israeli's used this technique in the air strike on the Syrian nuclear reactor.
Couple of things to wonder at. How do radio frequency data streams get inside the "integrated air defense network"? The network antennas are radar antennas which are mostly analog, mixed with Identification Friend or Foe (IFF) system. Transmitting analog signals can confuse the radar, but the process is called jamming and has been around since WWII. Sending phony IFF digital signals is called spoofing, and has been around just about as long. Neither process would be called "firing a data stream" by any one in USAF.
"Firing a data stream into network antenna's" implies the airborne attackers are getting into the digital data links between the radar sites and the fighter/missile direction centers and inserting false targets, or erasing real targets, or doing other kinds of mischief. It's a neat trick, but the counter measure is simple, use land lines or optical fiber for the data links. Don't use radio data links. No way can radio frequency energy emitted by aircraft get into plain old telephone wires or optical fibers.
I dare say some air defense systems use radio data links 'cause you just have to aim the antennas and switch on the power and your data is linking, out for maybe 50 miles. Might take a week to string wire or fiber that far. But was I in charge, I'd order the boys out to string the wire or fiber the day I arrived in theater, and after a week, I would have secure data links. And I would no longer be transmitting "here I am, come bomb me" over the air. For a radar site the extra emissions probably don't matter, but a fighter/missile direction center, fighter base or missile site could maintain radio silence and become harder to find.
Cool. Couple of years ago Aviation Week reported that the Israeli's used this technique in the air strike on the Syrian nuclear reactor.
Couple of things to wonder at. How do radio frequency data streams get inside the "integrated air defense network"? The network antennas are radar antennas which are mostly analog, mixed with Identification Friend or Foe (IFF) system. Transmitting analog signals can confuse the radar, but the process is called jamming and has been around since WWII. Sending phony IFF digital signals is called spoofing, and has been around just about as long. Neither process would be called "firing a data stream" by any one in USAF.
"Firing a data stream into network antenna's" implies the airborne attackers are getting into the digital data links between the radar sites and the fighter/missile direction centers and inserting false targets, or erasing real targets, or doing other kinds of mischief. It's a neat trick, but the counter measure is simple, use land lines or optical fiber for the data links. Don't use radio data links. No way can radio frequency energy emitted by aircraft get into plain old telephone wires or optical fibers.
I dare say some air defense systems use radio data links 'cause you just have to aim the antennas and switch on the power and your data is linking, out for maybe 50 miles. Might take a week to string wire or fiber that far. But was I in charge, I'd order the boys out to string the wire or fiber the day I arrived in theater, and after a week, I would have secure data links. And I would no longer be transmitting "here I am, come bomb me" over the air. For a radar site the extra emissions probably don't matter, but a fighter/missile direction center, fighter base or missile site could maintain radio silence and become harder to find.
Thursday, November 12, 2009
Windows worm grounds French Air Force
According to Aviation Week the "conficker" worm got into French air force mission planning software. Rafaele fighters were grounded because they were unable to download flight plans from infected databases. Once on the loose, the "conficker" worm got into French Navy networks, the Villacoublay air base, and 8th Transmissions Regiment. French investigators think someone plugged an infected thumb drive into a machine on the network.
Additional grief happened in Britain where a virus infected Royal Navy and Royal Air Force computer networks, including aircraft carrier Ark Royal, and was emailing god know what intelligence to a Russian internet server.
The Americans got theirs last year about this time, when a cyberworm got into Pentagon computers. The US thinks they were infected from a thumb drive, since they banned use of all such devices shortly afterwards.
Wow. James Bond would be proud. So would Kevin Mitnick.
Lesson to be learned. Any Windows computer on the Internet is totally vulnerable to hackers. They can take over the machine, run their own programs, and cover their tracks so well that no one will really notice. Even if you keep the Windows computers off the internet, the thumb drives can still infect them.
Bottom line, never use Windows computers for anything important. Linux is life.
And, never computerize anything that you don't need to computerize.
For instance, that French mission planning system isn't really necessary. In USAF we wrote out flight plans with pencil and paper and filed them over the telephone. Worked just fine. If the fancy software goes west, the French should have been able to go back to the good old manual way of doing things.
The thumb drive problem is harder. The things are so convenient, so small and easily concealed (about the size of a 50 cent piece) that just putting out an order not to use them ain't going to cut it. Just plugging an infected thumb drive into a Windows machine will infect it because of a Windows "feature". It's a feature not a bug. And you can believe as much of that as you like.
Back when CD-Rom drives were new, Microsoft arranged for CD-ROMs bearing software to "auto-run". Just inserting the CD in the drive was enough to start the install program on the CD running. Or a music CD playing. Cool. Trouble starts when the CD contains a virus instead of new software. Microsoft is so in love with this "feature" that they added it to the USB ports, and now thumb drives with viruses will infect whole networks.
I'm glad I'm not a security guy trying to keep my computers un infected today. You gotta figure that sooner or later someone will stick an infected thumb drive into one of your computers. That infects the first computer. The infection then spreads itself over the network connection or thru any other thumb drive ever inserted in the infected machine. If the infected machine is networked, it will infect all the other machines on the network within a short time.
You really cannot remove the USB ports that thumb drives plug into because the computers need those ports for mice, keyboards, printers, cameras, et cetera, et cetera. You can disable the "autorun" feature in software, but it has a tendency to come back to life spontaneously. You'd have to inspect every computer every day to make sure it was still disabled. That could be automated I suppose, but it would be a major PITA.
Additional grief happened in Britain where a virus infected Royal Navy and Royal Air Force computer networks, including aircraft carrier Ark Royal, and was emailing god know what intelligence to a Russian internet server.
The Americans got theirs last year about this time, when a cyberworm got into Pentagon computers. The US thinks they were infected from a thumb drive, since they banned use of all such devices shortly afterwards.
Wow. James Bond would be proud. So would Kevin Mitnick.
Lesson to be learned. Any Windows computer on the Internet is totally vulnerable to hackers. They can take over the machine, run their own programs, and cover their tracks so well that no one will really notice. Even if you keep the Windows computers off the internet, the thumb drives can still infect them.
Bottom line, never use Windows computers for anything important. Linux is life.
And, never computerize anything that you don't need to computerize.
For instance, that French mission planning system isn't really necessary. In USAF we wrote out flight plans with pencil and paper and filed them over the telephone. Worked just fine. If the fancy software goes west, the French should have been able to go back to the good old manual way of doing things.
The thumb drive problem is harder. The things are so convenient, so small and easily concealed (about the size of a 50 cent piece) that just putting out an order not to use them ain't going to cut it. Just plugging an infected thumb drive into a Windows machine will infect it because of a Windows "feature". It's a feature not a bug. And you can believe as much of that as you like.
Back when CD-Rom drives were new, Microsoft arranged for CD-ROMs bearing software to "auto-run". Just inserting the CD in the drive was enough to start the install program on the CD running. Or a music CD playing. Cool. Trouble starts when the CD contains a virus instead of new software. Microsoft is so in love with this "feature" that they added it to the USB ports, and now thumb drives with viruses will infect whole networks.
I'm glad I'm not a security guy trying to keep my computers un infected today. You gotta figure that sooner or later someone will stick an infected thumb drive into one of your computers. That infects the first computer. The infection then spreads itself over the network connection or thru any other thumb drive ever inserted in the infected machine. If the infected machine is networked, it will infect all the other machines on the network within a short time.
You really cannot remove the USB ports that thumb drives plug into because the computers need those ports for mice, keyboards, printers, cameras, et cetera, et cetera. You can disable the "autorun" feature in software, but it has a tendency to come back to life spontaneously. You'd have to inspect every computer every day to make sure it was still disabled. That could be automated I suppose, but it would be a major PITA.
Wednesday, November 11, 2009
V, the new series on ABC
Disappointing. For those that don't know, V is a remake of a science fiction miniseries from nearly thirty years ago. It is/was an invasion of earth by nasty aliens plot. The original wasn't bad, not Shakespeare, but watchable light entertainment.
The new episode on ABC last night suffered from the curse of the soundman. You couldn't hear the dialog. The actors mumble or whisper, the mikes aren't placed right, and the score and the sound effects drown the actors out. PITA. It's early in the story, we in the audience are trying to sort out the good guys from the bad guys, and half the time I miss a key revelation 'cause I cannot hear the dialog.
Cast is all new faces except Morena Baccarin of Firefly fame. She gets the snooty and villainous alien leader role, which isn't going to do her any favors, careerwise.
Plot is weak, it has five or six sets of characters, all doing unrelated things, and the camera cuts from one to the next to the next with wild abandon. There is a lady FBI agent (didn't catch her name) who is fighting with her superiors, hiding important evidence, and generally being an unprofessional. Scully and Mulder were more effective investigation wise.
I'll watch a few more episodes but I fear the worst. ABC Tuesday night at 8 Eastern.
The new episode on ABC last night suffered from the curse of the soundman. You couldn't hear the dialog. The actors mumble or whisper, the mikes aren't placed right, and the score and the sound effects drown the actors out. PITA. It's early in the story, we in the audience are trying to sort out the good guys from the bad guys, and half the time I miss a key revelation 'cause I cannot hear the dialog.
Cast is all new faces except Morena Baccarin of Firefly fame. She gets the snooty and villainous alien leader role, which isn't going to do her any favors, careerwise.
Plot is weak, it has five or six sets of characters, all doing unrelated things, and the camera cuts from one to the next to the next with wild abandon. There is a lady FBI agent (didn't catch her name) who is fighting with her superiors, hiding important evidence, and generally being an unprofessional. Scully and Mulder were more effective investigation wise.
I'll watch a few more episodes but I fear the worst. ABC Tuesday night at 8 Eastern.
Tuesday, November 10, 2009
Terrorism or Treason?
Lot of talk on the TV about that Major Hasan, the Ft Hood shooter. Is he a terrorist? Who knows, and what's a terrorist anyhow. Skip that. He is a traitor though.
"Treason against the United States, shall consist only in levying war against them, or in adhering to their enemies, providing them aid and comfort." US Constitution, Article III section 3.
I'd say shooting 30 or 40 US soldiers, on an Army post, is levying war against the United States. It's treason for a plain civilian, and it's infinitely worse when the shooter is a commissioned officer of the US Army.
And it is also premeditated murder.
So what to charge Major Hasan with? Let's not grant this awful man the glory of political martyrdom. Let's charge him with plain old murder, which still carries the death penalty in the Uniform Code of Military Justice. Let him plead the insanity defense. Better to have him proclaim to the world that he is a maniac rather than a glorious martyred jihadi.
Our enemies are trying to make Major Hasad into a hero of Jihad. Let's not help them.
"Treason against the United States, shall consist only in levying war against them, or in adhering to their enemies, providing them aid and comfort." US Constitution, Article III section 3.
I'd say shooting 30 or 40 US soldiers, on an Army post, is levying war against the United States. It's treason for a plain civilian, and it's infinitely worse when the shooter is a commissioned officer of the US Army.
And it is also premeditated murder.
So what to charge Major Hasan with? Let's not grant this awful man the glory of political martyrdom. Let's charge him with plain old murder, which still carries the death penalty in the Uniform Code of Military Justice. Let him plead the insanity defense. Better to have him proclaim to the world that he is a maniac rather than a glorious martyred jihadi.
Our enemies are trying to make Major Hasad into a hero of Jihad. Let's not help them.
Saturday, November 7, 2009
Compact Fluorescents go blue
In order to bring light to the shaving mirror, a four bulb (60 W per bulb) fixture was installed over the medicine cabinet many years ago. Couple of years ago I replaced the 240 watts worth of plain old light bulbs with those curly que compact fluorescent lamps (CFL). After 3 years of service one of the CFL's died. So I did the ordinary thing, bought a new CFL down at Franconia hardware.
Put the new bulb in service, turned on the juice, everything lit up. But WOW. New CFL shines a bright blue along side the three old bulbs which glow a cheery pink. Put the cover on the fixture an it does look odd, a bright blue spot in the midst of cheery pink.
Looks like the CFL maker in China decided to save a few pennies on phosphors. Phosphors for blue and green are cheap and bright. Red phosphors are expensive and not so bright. The old line fluorescent lamps were done in "Cool White" a very blue mix popular for years that was cheap but threw an unpleasant shade of light. Which is why fluorescent lamps never made much headway in the home, the light was just plain ugly and made rugs and furnishings look ugly.
When the CFL bulbs first came out, they had the more expensive red rich phosphor mixes and the light looked pretty good, for a fluorescent. Looks like that's going away now that the CFL's have caught on. Back to cool white ugliness.
Put the new bulb in service, turned on the juice, everything lit up. But WOW. New CFL shines a bright blue along side the three old bulbs which glow a cheery pink. Put the cover on the fixture an it does look odd, a bright blue spot in the midst of cheery pink.
Looks like the CFL maker in China decided to save a few pennies on phosphors. Phosphors for blue and green are cheap and bright. Red phosphors are expensive and not so bright. The old line fluorescent lamps were done in "Cool White" a very blue mix popular for years that was cheap but threw an unpleasant shade of light. Which is why fluorescent lamps never made much headway in the home, the light was just plain ugly and made rugs and furnishings look ugly.
When the CFL bulbs first came out, they had the more expensive red rich phosphor mixes and the light looked pretty good, for a fluorescent. Looks like that's going away now that the CFL's have caught on. Back to cool white ugliness.
Subscribe to:
Posts (Atom)