Random Articles (Page 3)

Have a deep view into what people are curious about.

πŸ”— Stuxnet

πŸ”— United States πŸ”— Computing πŸ”— Military history πŸ”— Military history/North American military history πŸ”— Military history/United States military history πŸ”— Military history/Military science, technology, and theory πŸ”— Military history/Weaponry πŸ”— Iran πŸ”— Computing/Software πŸ”— Computing/Computer Security πŸ”— Military history/Middle Eastern military history

Stuxnet is a malicious computer worm, first uncovered in 2010, thought to have been in development since at least 2005. Stuxnet targets supervisory control and data acquisition (SCADA) systems and is believed to be responsible for causing substantial damage to the nuclear program of Iran. Although neither country has openly admitted responsibility, the worm is widely understood to be a cyberweapon built jointly by the United States and Israel.

Stuxnet specifically targets programmable logic controllers (PLCs), which allow the automation of electromechanical processes such as those used to control machinery and industrial processes including gas centrifuges for separating nuclear material. Exploiting four zero-day flaws, Stuxnet functions by targeting machines using the Microsoft Windows operating system and networks, then seeking out Siemens Step7 software. Stuxnet reportedly compromised Iranian PLCs, collecting information on industrial systems and causing the fast-spinning centrifuges to tear themselves apart. Stuxnet's design and architecture are not domain-specific and it could be tailored as a platform for attacking modern supervisory control and data acquisition (SCADA) and PLC systems (e.g., in factory assembly lines or power plants), most of which are in Europe, Japan, and the US. Stuxnet reportedly ruined almost one-fifth of Iran's nuclear centrifuges. Targeting industrial control systems, the worm infected over 200,000 computers and caused 1,000 machines to physically degrade.

Stuxnet has three modules: a worm that executes all routines related to the main payload of the attack; a link file that automatically executes the propagated copies of the worm; and a rootkit component responsible for hiding all malicious files and processes, to prevent detection of Stuxnet. It is typically introduced to the target environment via an infected USB flash drive, thus crossing any air gap. The worm then propagates across the network, scanning for Siemens Step7 software on computers controlling a PLC. In the absence of either criterion, Stuxnet becomes dormant inside the computer. If both the conditions are fulfilled, Stuxnet introduces the infected rootkit onto the PLC and Step7 software, modifying the code and giving unexpected commands to the PLC while returning a loop of normal operation system values back to the users.

In 2015, Kaspersky Lab noted that the Equation Group had used two of the same zero-day attacks prior to their use in Stuxnet and commented that "the similar type of usage of both exploits together in different computer worms, at around the same time, indicates that the Equation Group and the Stuxnet developers are either the same or working closely together".

Discussed on

πŸ”— Operation Gladio

πŸ”— United States/U.S. Government πŸ”— United States πŸ”— International relations πŸ”— Germany πŸ”— Military history πŸ”— Military history/North American military history πŸ”— Military history/United States military history πŸ”— Europe πŸ”— Italy πŸ”— Sociology πŸ”— Organizations πŸ”— Military history/German military history πŸ”— Military history/French military history πŸ”— Military history/Cold War πŸ”— Cold War πŸ”— Military history/Dutch military history πŸ”— Rome πŸ”— European history πŸ”— Military history/Italian military history πŸ”— Military history/European military history πŸ”— Military history/British military history πŸ”— Military history/Post-Cold War πŸ”— NATO

Operation Gladio is the codename for clandestine "stay-behind" operations of armed resistance that were organized by the Western Union (WU), and subsequently by NATO and the CIA, in collaboration with several European intelligence agencies. The operation was designed for a potential Warsaw Pact invasion and conquest of Europe. Although Gladio specifically refers to the Italian branch of the NATO stay-behind organizations, "Operation Gladio" is used as an informal name for all of them. Stay-behind operations were prepared in many NATO member countries, and some neutral countries.

During the Cold War, some anti-communist armed groups engaged in the harassment of left-wing parties, torture, terrorist attacks, and massacres in countries such as Italy. The role of the CIA and other intelligence organisations in Gladioβ€”the extent of its activities during the Cold War era and any responsibility for terrorist attacks perpetrated in Italy during the "Years of Lead" (late 1960s–early 1980s)β€”is the subject of debate.

In 1990, the European Parliament adopted a resolution alleging that military secret services in certain member states were involved in serious terrorism and crime, whether or not their superiors were aware. The resolution also urged investigations by the judiciaries of the countries in which those armies operated, so that their modus operandi and actual extension would be revealed. To date, only Italy, Switzerland and Belgium have had parliamentary inquiries into the matter.

The three inquiries reached differing conclusions as regarded different countries. Guido Salvini, a judge who worked in the Italian Massacres Commission, concluded that some right-wing terrorist organizations of the Years of Lead (La Fenice, National Vanguard and Ordine Nuovo) were the trench troops of a secret army, remotely controlled by exponents of the Italian state apparatus and linked to the CIA. Salvini said that the CIA encouraged them to commit atrocities. The Swiss inquiry found that British intelligence secretly cooperated with their army in an operation named P-26 and provided training in combat, communications, and sabotage. It also discovered that P-26 not only would organize resistance in case of a Soviet invasion, but would also become active should the left succeed in achieving a parliamentary majority. The Belgian inquiry could find no conclusive information on their army. No links between them and terrorist attacks were found, and the inquiry noted that the Belgian secret services refused to provide the identity of agents, which could have eliminated all doubts. A 2000 Italian parliamentary report from the left wing coalition Gruppo Democratici di Sinistra l'Ulivo reported that terrorist massacres and bombings had been organised or promoted or supported by men inside Italian state institutions who were linked to American intelligence. The report also said the United States was guilty of promoting the strategy of tension. Operation Gladio is also suspected to have been activated to counter existing left-wing parliamentary majorities in Europe.

The US State Department published a communiquΓ© in January 2006 that stated claims the United States ordered, supported, or authorized terrorism by stay-behind units, and US-sponsored "false flag" operations are rehashed former Soviet disinformation based on documents that the Soviets forged.

The word gladio is the Italian form of gladius, a type of Roman shortsword.

Discussed on

πŸ”— Hitler and Mannerheim Recording

πŸ”— Germany πŸ”— Military history πŸ”— Military history/World War II πŸ”— Military history/German military history πŸ”— European history πŸ”— Military history/Nordic military history πŸ”— Finland πŸ”— Military history/European military history

The Hitler and Mannerheim recording is a recording of a private conversation between Adolf Hitler, FΓΌhrer of Nazi Germany, and Field Marshal Carl Gustaf Emil Mannerheim, Commander-in-Chief of the Finnish Defence Forces. It took place on a secret visit made to Finland by Hitler to honour Mannerheim's 75th birthday on 4 June 1942, during the Continuation War, a sub-theatre of World War II. Thor Damen, a sound engineer for the Finnish broadcaster Yleisradio (YLE) who had been assigned to record the official birthday proceedings, recorded the first eleven minutes of Hitler and Mannerheim's private conversationβ€”without Hitler's knowledge. It is the only known recording of Hitler speaking in an unofficial tone.

Discussed on

πŸ”— Cyc

πŸ”— Computing πŸ”— Computer science πŸ”— Cognitive science πŸ”— Software πŸ”— Software/Computing πŸ”— Databases πŸ”— Databases/Computer science

Cyc (pronounced SYKE, ) is a long-living artificial intelligence project that aims to assemble a comprehensive ontology and knowledge base that spans the basic concepts and rules about how the world works. Hoping to capture common sense knowledge, Cyc focuses on implicit knowledge that other AI platforms may take for granted. This is contrasted with facts one might find somewhere on the internet or retrieve via a search engine or Wikipedia. Cyc enables AI applications to perform human-like reasoning and be less "brittle" when confronted with novel situations.

Douglas Lenat began the project in July 1984 at MCC, where he was Principal Scientist 1984–1994, and then, since January 1995, has been under active development by the Cycorp company, where he is the CEO.

Discussed on

  • "Cyc" | 2022-09-28 | 24 Upvotes 2 Comments
  • "Cyc" | 2019-12-13 | 357 Upvotes 173 Comments

πŸ”— Great Britain road numbering scheme

πŸ”— Highways πŸ”— Road transport πŸ”— Transport in Scotland πŸ”— Highways/United Kingdom Roads πŸ”— UK geography

The Great Britain road numbering scheme is a numbering scheme used to classify and identify all roads in Great Britain. Each road is given a single letter, which represents the road's category, and a subsequent number, of 1 to 4 digits. Introduced to arrange funding allocations, the numbers soon became used on maps and as a method of navigation. Two sub-schemes exist: one for motorways, and another for non-motorway roads. While some major roads form part of the International E-road network, no E-routes are signposted in Great Britain, or the rest of the UK.

The scheme applies only to Great Britain (England, Scotland and Wales); a similar system is used in Northern Ireland, as well as outside the UK in the Isle of Man, Jersey and British overseas territories. These other numbering schemes use similar conventions.

Discussed on

πŸ”— Fart Proudly – An Essay by Benjamin Franklin

"Fart Proudly" (also called "A Letter to a Royal Academy about farting", and "To the Royal Academy of Farting") is the popular name of an essay about flatulence written by Benjamin Franklin c.Β 1781 while he was living abroad as United States Ambassador to France. It is an example of flatulence humor.

Discussed on

πŸ”— Balloonomania

πŸ”— Aviation

Balloonomania was a strong public interest or fad in balloons that originated in France in the late 18th century and continued into the 19th century, during the advent of balloon flights. The interest began with the first flights of the Montgolfier brothers in 1783 (in a balloon inflated with hot air). Soon afterwards Jacques Alexandre CΓ©sar Charles flew another type of balloon (inflated with hydrogen) and both types of balloon were in use from then on. The fad quickly spread in France and across the channel in England.

Discussed on

πŸ”— US Supreme Court upholds state power to enforce compulsory vaccination (1905)

πŸ”— Law πŸ”— U.S. Supreme Court cases

Jacobson v. Massachusetts, 197 U.S. 11 (1905), was a United States Supreme Court case in which the Court upheld the authority of states to enforce compulsory vaccination laws. The Court's decision articulated the view that the freedom of the individual must sometimes be subordinated to the common welfare and is subject to the police power of the state.