-
Content count
1,607 -
Joined
-
Last visited
-
Days Won
1
Content Type
Profiles
Forums
Calendar
Gallery
Downloads
Store
Everything posted by Atreides
-
Where's Samuel L Jackson when you need him ?
Atreides replied to Slartibartfast's topic in Military and General Aviation
Oh what the hell ! This is too funny for me to pretend to be sympathetic, I'll laugh ahahaha -
I wonder how much of an impact the outcome of this exercize will have on the potential Typhoon selection for the IAF's MMRCA contract. UPI link
-
War game to pit Eurofighter against Sukhoi
Atreides replied to Atreides's topic in Military and General Aviation
Thanks for explaining the Algerian angle. -
War game to pit Eurofighter against Sukhoi
Atreides replied to Atreides's topic in Military and General Aviation
Well the EF-2000 is in the MMRCA competition for the Indian Air Force. As for the Algerians I dont follow what you mean, the war game takes place in India and its going to be flying against the IAF Su's. -
One of the best jet fighter films Ive ever seen
Atreides replied to MigBuster's topic in Military and General Aviation
Lots of angry men with silly moustaches... They should have asked the guy below to be in the video. -
Good read. SU-35S
-
Congrats to Scaled Composites, always admired their unique approach to aviation.
-
Big friggin deal. China already has the civilian version of the C-130 except its called the Lockheed L-100-30 Hercules. 114 were delivered, and production ended in 1992. About 30 remain in service. So they're getting military tech from the U.S, nothing cutting edge and atleast they're going through the proper channels, China also has a small quantity of Black Hawks and there have been no unlicensed domestically manufactured versions of them flying around and no negative ramifications of that sale. The sale of the Hercs is good business for LM and the U.S. Below are some pics from airliners.net
-
Well gents, I apologise for not reading the other papers written by this "expert" prior to posting the article and since I'm an aviation enthusiast only and not involved in said industry I dont really know who is more credible than the other. On a side note this "expert" still has the "photograph" of the F-14 in Soviet markings and claims it to be genuine so.....
-
My bad ! Thanks for clearing that up.
-
Thanks a lot FC ! Never knew Cpl Hicks did stand up, would occasionally catch his show on FOX. HrntFxr, hey haven't seen you on this board for a while good to see you around.
-
Cool stuff. Video Engineers at BAE Systems in Lancashire have developed the world's first ''flapless'' plane, which uses jets of air to control its movements rather than the flaps on its wings. The revolutionary prototype of the new Demon plane has just made its maiden flight on Walney Island, off the Cumbrian Coast.
-
Interesting. If true this is awesome, killing their nuke program without the loss of human life. Stuxnet malware is 'weapon' out to destroy ... Iran's Bushehr nuclear plant? Cyber security experts say they have identified the world's first known cyber super weapon designed specifically to destroy a real-world target – a factory, a refinery, or just maybe a nuclear power plant. The cyber worm, called Stuxnet, has been the object of intense study since its detection in June. As more has become known about it, alarm about its capabilities and purpose have grown. Some top cyber security experts now say Stuxnet's arrival heralds something blindingly new: a cyber weapon created to cross from the digital realm to the physical world – to destroy something. At least one expert who has extensively studied the malicious software, or malware, suggests Stuxnet may have already attacked its target – and that it may have been Iran's Bushehr nuclear power plant, which much of the world condemns as a nuclear weapons threat. The appearance of Stuxnet created a ripple of amazement among computer security experts. Too large, too encrypted, too complex to be immediately understood, it employed amazing new tricks, like taking control of a computer system without the user taking any action or clicking any button other than inserting an infected memory stick. Experts say it took a massive expenditure of time, money, and software engineering talent to identify and exploit such vulnerabilities in industrial control software systems. Unlike most malware, Stuxnet is not intended to help someone make money or steal proprietary data. Industrial control systems experts now have concluded, after nearly four months spent reverse engineering Stuxnet, that the world faces a new breed of malware that could become a template for attackers wishing to launch digital strikes at physical targets worldwide. Internet link not required. "Until a few days ago, people did not believe a directed attack like this was possible," Ralph Langner, a German cyber-security researcher, told the Monitor in an interview. He was slated to present his findings at a conference of industrial control system security experts Tuesday in Rockville, Md. "What Stuxnet represents is a future in which people with the funds will be able to buy an attack like this on the black market. This is now a valid concern." A gradual dawning of Stuxnet's purpose It is a realization that has emerged only gradually. Stuxnet surfaced in June and, by July, was identified as a hypersophisticated piece of malware probably created by a team working for a nation state, say cyber security experts. Its name is derived from some of the filenames in the malware. It is the first malware known to target and infiltrate industrial supervisory control and data acquisition (SCADA) software used to run chemical plants and factories as well as electric power plants and transmission systems worldwide. That much the experts discovered right away. But what was the motive of the people who created it? Was Stuxnet intended to steal industrial secrets – pressure, temperature, valve, or other settings –and communicate that proprietary data over the Internet to cyber thieves? By August, researchers had found something more disturbing: Stuxnet appeared to be able to take control of the automated factory control systems it had infected – and do whatever it was programmed to do with them. That was mischievous and dangerous. But it gets worse. Since reverse engineering chunks of Stuxnet's massive code, senior US cyber security experts confirm what Mr. Langner, the German researcher, told the Monitor: Stuxnet is essentially a precision, military-grade cyber missile deployed early last year to seek out and destroy one real-world target of high importance – a target still unknown. "Stuxnet is a 100-percent-directed cyber attack aimed at destroying an industrial process in the physical world," says Langner, who last week became the first to publicly detail Stuxnet's destructive purpose and its authors' malicious intent. "This is not about espionage, as some have said. This is a 100 percent sabotage attack." A guided cyber missile On his website, Langner lays out the Stuxnet code he has dissected. He shows step by step how Stuxnet operates as a guided cyber missile. Three top US industrial control system security experts, each of whom has also independently reverse-engineered portions of Stuxnet, confirmed his findings to the Monitor. "His technical analysis is good," says a senior US researcher who has analyzed Stuxnet, who asked for anonymity because he is not allowed to speak to the press. "We're also tearing [stuxnet] apart and are seeing some of the same things." Other experts who have not themselves reverse-engineered Stuxnet but are familiar with the findings of those who have concur with Langner's analysis. "What we're seeing with Stuxnet is the first view of something new that doesn't need outside guidance by a human – but can still take control of your infrastructure," says Michael Assante, former chief of industrial control systems cyber security research at the US Department of Energy's Idaho National Laboratory. "This is the first direct example of weaponized software, highly customized and designed to find a particular target." "I'd agree with the classification of this as a weapon," Jonathan Pollet, CEO of Red Tiger Security and an industrial control system security expert, says in an e-mail. One researcher's findingsLangner's research, outlined on his website Monday, reveals a key step in the Stuxnet attack that other researchers agree illustrates its destructive purpose. That step, which Langner calls "fingerprinting," qualifies Stuxnet as a targeted weapon, he says. Langner zeroes in on Stuxnet's ability to "fingerprint" the computer system it infiltrates to determine whether it is the precise machine the attack-ware is looking to destroy. If not, it leaves the industrial computer alone. It is this digital fingerprinting of the control systems that shows Stuxnet to be not spyware, but rather attackware meant to destroy, Langner says. Stuxnet's ability to autonomously and without human assistance discriminate among industrial computer systems is telling. It means, says Langner, that it is looking for one specific place and time to attack one specific factory or power plant in the entire world. "Stuxnet is the key for a very specific lock – in fact, there is only one lock in the world that it will open," Langner says in an interview. "The whole attack is not at all about stealing data but about manipulation of a specific industrial process at a specific moment in time. This is not generic. It is about destroying that process." So far, Stuxnet has infected at least 45,000 industrial control systems around the world, without blowing them up – although some victims in North America have experienced some serious computer problems, Eric Byres, a Canadian expert, told the Monitor. Most of the victim computers, however, are in Iran, Pakistan, India, and Indonesia. Some systems have been hit in Germany, Canada, and the US, too. Once a system is infected, Stuxnet simply sits and waits – checking every five seconds to see if its exact parameters are met on the system. When they are, Stuxnet is programmed to activate a sequence that will cause the industrial process to self-destruct, Langner says. Langner's analysis also shows, step by step, what happens after Stuxnet finds its target. Once Stuxnet identifies the critical function running on a programmable logic controller, or PLC, made by Siemens, the giant industrial controls company, the malware takes control. One of the last codes Stuxnet sends is an enigmatic “DEADF007.” Then the fireworks begin, although the precise function being overridden is not known, Langner says. It may be that the maximum safety setting for RPMs on a turbine is overridden, or that lubrication is shut off, or some other vital function shut down. Whatever it is, Stuxnet overrides it, Langner’s analysis shows. "After the original code [on the PLC] is no longer executed, we can expect that something will blow up soon," Langner writes in his analysis. "Something big." For those worried about a future cyber attack that takes control of critical computerized infrastructure – in a nuclear power plant, for instance – Stuxnet is a big, loud warning shot across the bow, especially for the utility industry and government overseers of the US power grid. "The implications of Stuxnet are very large, a lot larger than some thought at first," says Mr. Assante, who until recently was security chief for the North American Electric Reliability Corp. "Stuxnet is a directed attack. It's the type of threat we've been worried about for a long time. It means we have to move more quickly with our defenses – much more quickly." Has Stuxnet already hit its target?It might be too late for Stuxnet's target, Langner says. He suggests it has already been hit – and destroyed or heavily damaged. But Stuxnet reveals no overt clues within its code to what it is after. A geographical distribution of computers hit by Stuxnet, which Microsoft produced in July, found Iran to be the apparent epicenter of the Stuxnet infections. That suggests that any enemy of Iran with advanced cyber war capability might be involved, Langner says. The US is acknowledged to have that ability, and Israel is also reported to have a formidable offensive cyber-war-fighting capability. Could Stuxnet's target be Iran's Bushehr nuclear power plant, a facility much of the world condemns as a nuclear weapons threat? Langner is quick to note that his views on Stuxnet's target is speculation based on suggestive threads he has seen in the media. Still, he suspects that the Bushehr plant may already have been wrecked by Stuxnet. Bushehr's expected startup in late August has been delayed, he notes, for unknown reasons. (One Iranian official blamed the delay on hot weather.) But if Stuxnet is so targeted, why did it spread to all those countries? Stuxnet might have been spread by the USB memory sticks used by a Russian contractor while building the Bushehr nuclear plant, Langner offers. The same contractor has jobs in several countries where the attackware has been uncovered. "This will all eventually come out and Stuxnet's target will be known," Langner says. "If Bushehr wasn't the target and it starts up in a few months, well, I was wrong. But somewhere out there, Stuxnet has found its target. We can be fairly certain of that." Link
-
Worlds first (expert claimed) known cyber super weapon
Atreides replied to Atreides's topic in CombatACE News
Its official now (even if the Iranians were expecting it, they're still being screwed). I'd pay money to see the look on the faces of their leadership if this virus completely brings it all down. Todays news article. Iran struggles to contain computer virus Link TEHRAN—Iran suspects a foreign government, or a well-funded private group, designed a quickly mutating computer worm that has been infiltrating industrial computer systems in the Islamic republic, a high-ranking official says. No one has claimed responsibility for the malicious “Stuxnet” computer code. Iran’s suspicion is based on the worm’s reach and complexity and the huge investment required to write the code. “The writer has had access to industrial information which is not available to IT experts,” Hamid Alipour, deputy head of Iran’s Information Technology Co., a part of the ministry of communication and information technology, told the Islamic Republic News Agency on Monday. Once inside the target system, the worm is capable of reprogramming the software that controls critical functions. Researchers still do not know what type of system it had in its sights or what type of sabotage was intended. Alipou stressed that an ordinary group of hackers could not have designed the virus. A number of governments with sophisticated computer skills would have the ability to create such a code. They include China, Russia, Israel, Britain, Germany and the United States. “We had anticipated that we could root out the virus within one to two months,” Alipour said. “But the virus is not stable, and since we started the cleanup process three new versions of it have been spreading.” Iranian officials said Saturday that they had been hit by “electronic warfare” and acknowledged that the worm had infected more than 30,000 computers, including personal computers owned by employees of the nuclear power plant near Bushehr. Although officials over the weekend said the nuclear facility was not in danger, one Iranian computer expert said the nuclear power plant must also be infected if employees’ personal computers were hit. “This could either be done by Israel, intending to steal nuclear secrets or disrupt power plants, or by India, which has the biggest private programming capacity worldwide,” said the expert, speaking on the condition of anonymity because of the sensitivity of the subject. Stuxnet was designed to go after several “high-value targets,” said Liam O’Murchu, manager of security response operations at Symantec. But both O’Murchu and U.S. government experts say there’s no proof it was specifically developed to target nuclear plants in Iran, despite speculation from some researchers. It is the first known case of malware designed to sabotage an industrial control system. The code was apparently constructed by a small team of as many as five to 10 highly educated and well-funded hackers, said O’Murchu. U.S. government experts and outside analysts say they have not been able to determine who developed the malware, short for malicious software, or why. “We’ve never seen anything like this before,” said O’Murchu. “It’s very dangerous.” International computer security experts say Stuxnet was designed to target control systems produced by Siemens, a German equipment manufacturer. Siemens products are widely used in Iranian electricity plants, communication systems and in the country’s first nuclear power plant, near the city of Bushehr, set to start production in October. The worm was discovered in June, and researchers found about 45,000 infected computers in various countries, including Indonesia and India. But the vast majority were in Iran, leading analysts to conclude that a system in Iran was the likely target. A low-level cyberwar between Iran and the West intensified after President Mahmoud Ahmadinejad’s disputed election victory last year. Several groups of Iranian hackers, some of them alleged to have ties to the intelligence ministry, have been attacking opposition Web sites. In December, they temporarily disrupted the Twitter network, which they accuse of assisting the grass-roots opposition movement. Hacker groups such as the Iranian Cyber Army and Ashiyaneh have been saying they disrupted thousands of Western sites in the past year. In return, hundreds of Iranian Web sites have also been under attack. Tehran-based engineers specializing in repairing personal computers said they had not noticed any upsurge in demands of repairs because of the virus. Computers are widely used in Iranian society, with the Internet playing an important role in distributing opposition news that is censored by state media outlets. -
The RN is to get its teeth pulled
Atreides replied to Slartibartfast's topic in Military and General Aviation
Perhaps give the F-35 the boot and buy this ? People in the pic give some idea as to its size. IMO nicer looking than Taranis, for a UCAV that is. -
Big friggin deal ! Why could'nt the military keep their mouth shut about this, granted "we" are supposed to be better than "them" but, its the Taliban, how much mercy or compassion have they shown to NATO troops ? Good on the Gurkhas, they shoud've tossed it later on so that there would be no proper burial for one less scumbag.
-
CF-18 Crash in Southern Alberta
Atreides replied to raptorman's topic in Military and General Aviation
Glad to know the pilot is ok but the crash leaves us with what ? Two -
Agree about the 2027 part they should've maybe made it around 2097 or something.
-
Kinda old news dont know if posted here before. Love the state of the art iTouch hologram boardroom......perfect for conference calls with Al-Qaeda. Link
-
The first one and the machine gunner vids are hilarious. Thanks for sharing.
-
FW-190D "The Butcher Bird".
-
Can hardly wait ! BTW if somebody can embed this that would be uber cool.
-
Indeed a RPG space marines game for PS3 and XBOX but in this the gameplay is like the trailer, think of it as God of War 3 meets the space marines NOT a RTS. Thanks to whoever embeded this. Basically you control any of the four characters in the god of war fashion. Sadly no release date as of yet.
-
AN-22 WIP
Atreides replied to Veltro2k's topic in Thirdwire: Strike Fighters 1 Series - Prop Heads Forum
That is very cool. Look forward ot its release.