<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:media="http://search.yahoo.com/mrss/"><channel><title><![CDATA[Legendary Industries]]></title><description><![CDATA[Not legendary. Not an industry. Just my thoughts in longform.]]></description><link>https://legendary.industries/</link><image><url>https://legendary.industries/favicon.png</url><title>Legendary Industries</title><link>https://legendary.industries/</link></image><generator>Ghost 4.32</generator><lastBuildDate>Mon, 27 Apr 2026 09:46:01 GMT</lastBuildDate><atom:link href="https://legendary.industries/rss/" rel="self" type="application/rss+xml"/><ttl>60</ttl><item><title><![CDATA[Let's Talk About Irelands Cyber Security Strategy]]></title><description><![CDATA[<p>Over Christmas, <a href="https://www.dccae.gov.ie/documents/National_Cyber_Security_Strategy.pdf">Ireland released it&apos;s National Cyber Security Strategy for implementation between 2019-2024</a>. Considering that this was released, I believe on the 27th of December 2019, we&apos;re already a year behind which is a fantastic start... But let&apos;s dig into the detail of it</p>]]></description><link>https://legendary.industries/irish-cyber-strategy/</link><guid isPermaLink="false">5e332d30c03dff052da847ca</guid><category><![CDATA[InfoSec]]></category><category><![CDATA[Ireland]]></category><dc:creator><![CDATA[Paddy Kerley]]></dc:creator><pubDate>Mon, 03 Feb 2020 21:35:55 GMT</pubDate><content:encoded><![CDATA[<p>Over Christmas, <a href="https://www.dccae.gov.ie/documents/National_Cyber_Security_Strategy.pdf">Ireland released it&apos;s National Cyber Security Strategy for implementation between 2019-2024</a>. Considering that this was released, I believe on the 27th of December 2019, we&apos;re already a year behind which is a fantastic start... But let&apos;s dig into the detail of it and see where we stand going forward on the issue.</p><p>And I can&apos;t stress this enough. I do not want this to be seen as a hit piece against anyone at the NCSC, NSAC, An Garda S&#xED;och&#xE1;na, the Irish Defence Forces or anyone else in the national security apparatus of Ireland. I have met several of them over the past few years and while they are passionate and deeply care about the mission of protecting Ireland from cyber threats it is not their fault that they collectively work hard on information security issues and are plagued by issues like being under paid compared to others in the private sector and international colleagues and under resourced and having to deal with successive governments who have had no vision or care for information security and it&apos;s importance in the modern era.</p><p>This is a long post, so if you want the gist of my thoughts and you want to skip the detail, the final section has a summation of my thoughts and some form of a conclusion.</p><!--kg-card-begin: markdown--><h1 id="2vision">2: Vision</h1>
<!--kg-card-end: markdown--><p>The vision of the document is pretty standard. It is based around <em>Protect, Develop and Engage</em> which you will see in other cyber security strategy documents. The protection aspect is based around protecting the State, the people of Ireland and the critical infrastructure of the State. It&apos;s pretty standard aspirational language to say this is where we would love to be in 2024 in an aspirational document. Not much more to add.</p><p>Personally I would love to see how we plan to find a balance of risks and costs because historically, the Irish Government has chosen to choose the cheap option that does not account for risks.</p><p>I would also love to know more details about developing the capacity of the state in the 5th Domain because everyone that I have talked to about this, be they cyber security students, lecturers, industry professionals or friends elsewhere think working for for the government on information security matters is insanity when I could be working elsewhere doing my best work and getting better paid for my work too. How do you plan to develop the capacity when only those who see the mission of protecting the state as more important than pay when people who would look at the world that way are few and far between?</p><p>Finally to engage others nationally and internationally on a free and open cyberspace. This is a goal I&apos;m 100% behind because alone, we will not be able to solve all the issues we face. Working internationally will also allow us to develop key skills and finally, another goal is to integrate cyber into our diplomacy where we have secure missions to other nations that have the capacity to help other nations develop some of the capabilities that we have.</p><!--kg-card-begin: markdown--><h1 id="3objectives">3: Objectives</h1>
<ul>
<li>
<p>To continue to improve the ability of the State to respond to and manage cyber<br>
security incidents, including those with a national security component</p>
</li>
<li>
<p>To identify and protect critical national infrastructure by increasing its resilience to cyber attack and by ensuring that operators of essential services have appropriate incident response plans in place to reduce and manage any disruption to services</p>
</li>
<li>
<p>To improve the resilience and security of public sector IT systems to better protect data and the services that our people rely upon</p>
</li>
<li>
<p>To invest in educational initiatives to prepare the workforce for advanced IT and cybersecurity careers</p>
</li>
<li>
<p>To raise awareness of the responsibilities of businesses around securing their<br>
networks, devices and information and to drive research and development in cyber<br>
security in Ireland, including by facilitating investment in new technology</p>
</li>
<li>
<p>To continue to engage with international partners and international organisations to ensure that cyber space remains open, secure, unitary, free and able to facilitate economic and social development</p>
</li>
<li>
<p>To increase the general level of skills and awareness among private individuals<br>
around basic cyber hygiene practices and to support them in this by means of<br>
information and training</p>
</li>
</ul>
<!--kg-card-end: markdown--><p>As goals in an aspirational document, these are fine. Personally, the key to this is the educational component. The pipeline of students doing cyber security is incredibly narrow, in part because of a small number of lecturers to teach the courses and in part because until very recently, ITB, now TU Dublin was the only place to get a solid education cyber. You could have a single module on it from various different colleges and universities, but you skimmed a huge area in a semester or went places like Trinity and Letterkenny which have societies to fill the gap that they both see in their education. And when <a href="https://zerodays.ie/">Zero Days CTF</a> comes around every year, the vast vast, vast majority of people taking part in the competition are current and former students from TU Dublin @ Blanchardstown, Trinity College Dublin and Letterkenny IT which is no coincidence.</p><p>Staying on education, educating all sectors of the economy of issues that they face will also be key. I don&apos;t know how best to accomplish this, but we have an economy where the vast number of people employed are employed in small and medium enterprise and these companies in the modern era are built on data. If anything were to happen to the database that stored this business critical information like a ransomware attack, it could shut down companies and that&apos;s no hyperbole. <a href="https://www.zdnet.com/article/company-shuts-down-because-of-ransomware-leaves-300-without-jobs-just-before-holidays/">It&apos;s already happened</a>. And not just that, if you follow ransomware, it&apos;s happening, all day, every day, everywhere and we&apos;re potentially one catastrophic zeroday away from having sectors or industries come to a halt. And there are very few companies that can handle something like, I believe historically it&apos;s been <a href="https://darknetdiaries.com/episode/30/">Saudi Aramco</a>, <a href="https://www.cyberscoop.com/notpetya-ransomware-cost-merck-310-million/">Merck</a>, <a href="https://www.forbes.com/sites/leemathews/2017/08/16/notpetya-ransomware-attack-cost-shipping-giant-maersk-over-200-million/">Maersk Line</a> and the <a href="https://www.telegraph.co.uk/technology/2018/10/11/wannacry-cyber-attack-cost-nhs-92m-19000-appointments-cancelled/">NHS</a> that have weather such a storm and done so not only because they had the know how to deal with such an issue and were somewhat prepared, but also because they had the cash reserves on hand required to deal with such attacks.</p><p>Education will also be key to dealing with the issues the general public faces from general cyber crime threats as in my personal experience, across nearly all age ranges there is very little conception of the threats they face, and arguably worse, what to do about such threats. And as someone who has tried to educate those who are not familiar with cyber security, the biggest problem I have personally found and I think it will be a major headache is going to be giving actionable information to people so that they can proactively raise their defence posture. &#xA0;It&apos;s all well and good telling a 60 year old to use a password manager, but it&apos;s one thing to tell someone to use it and to explain why they need to use it and how they should use it as simply as possible. </p><p>And this actionable information, what ever it is, is going to create narrow, technical, sniping arguments in the community because this is how we have operated as a discipline for the longest time which means that even if it works for the threat model, people may ignore the advice as noise rather than signal. But as professionals, we also need to be aware of the threat model that others are using and not apply it to ourselves and we need to stay abreast of the latest information and how that applies to threat models as advice like not writing down passwords is garbage advice in the modern era. </p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://legendary.industries/content/images/2020/02/slide_sample.PNG" class="kg-image" alt loading="lazy"><figcaption>Google&apos;s account security czar on writing down your passwords form a slide I have on the basics Privacy and Security.&#xA0;</figcaption></figure><p>Finally on education, we also need to start adequately funding third level. It&apos;s good that we are putting computer science into second level, but there is a shortfall in spending on third level that some say <a href="https://www.independent.ie/business/budget/budget-2019-10-things-to-know-about-education-measures-amid-warning-of-growing-third-level-crisis-37400570.html">is approaching crisis levels</a> and since our economy is built on knowledge, this in general is not something that we can allow to happen.</p><p>With a start on the education, and a wider pipeline of people coming into the industry, then we can start to look at other goals we have in mind. The major issue is that there will be a lag time that we cannot afford between now and education coming online. The only solution to this is to attract the talent needed from the private sector and the bottom line, like it or not, is that there is a huge pay gap between what the private sector can afford and what the government will pay you. When I graduate at the end of this semester, my starting wage as a graduate in cyber security roles exceeds what a public sector wage would be by a significant margin. While it is a pay cut I would be willing to make in the national interest, I am in a very small minority.</p><!--kg-card-begin: markdown--><h1 id="41strategicrisks">4.1: Strategic Risks</h1>
<!--kg-card-end: markdown--><p>While I have been quite critical up to now, this is where for a brief moment things look up. There is actually an element of strategy here. The government is aware that Great Power Politics is back in vogue again and that this creates certain threats and risks at a global geopolitical level and it has an impact on international relations and international security. Specifically the threats to Ireland are on trade and the impact of influence over technology vendors which for Ireland, which has a small, open vulnerable with a lot of multinational technology vendors, we are vulnerable to a change in trade or technology winds. </p><p>All of these technology vendors in Ireland host a large proportion of European Citizens data and the infrastructure required to host all of this data. This data we host means that we will have to secure some of the most important critical infrastructure in Europe and be aware that are critical to the functioning of our economy.</p><p>Ireland is also aware and makes it extremely clear that;</p><blockquote>Recent years have seen the development and regular use of very <strong>advanced tools for cyber enabled attacks</strong> and espionage, and, <strong>likely for the first time, the physical destruction of Critical National Infrastructure by cyber enabled means</strong>. As such, the field of cyber security is <strong>characterised by an ongoing and high stakes technological arms race</strong>, ...</blockquote><p>We are aware that other nations are flexing their cyber muscles with cyber tools like the Great Cannon, Stuxnet, Flame, BlackEnergy and Triton and that this is part of an ongoing arms race between the actors that are leading the charge of great power politics and also that these tools generally go after critical infrastructure. Though curiously, while we call it an arms race, and we mention no tools, we do not call them arms or weapons when reasonably under some definitions, you could. </p><p>What is unfortunate is that while we are aware of the great power politics and the ongoing arms race;</p><blockquote>... that any single State can only exercise a degree of control over the operation of the network in its territory</blockquote><p>While this is indeed true, this misses a critical point in that while in an open, liberal nation like Ireland, it is difficult to dictate how private industry should do procurement of their infrastructure, but this does not mean that the role the government can play in advising the the private sector in what infrastructure they buy or even use the sovereign powers of a government to prevent the purchase of infrastructure or level the market playfield if it is uneven or if it does endanger national security;</p><!--kg-card-begin: html--><blockquote class="twitter-tweet"><p lang="en" dir="ltr">&#x201C;We&apos;re committed to Huawei, they have been a good supplier&#x201D;<br><br>Yes, because the Chinese government are subsidizing your cheap business model via them and the trade off is you let their shitty product spy on your customers. <a href="https://t.co/DD6QtuyAyw">https://t.co/DD6QtuyAyw</a></p>&#x2014; Defence Ireland (@DefenceIreland) <a href="https://twitter.com/DefenceIreland/status/1223145302242340865?ref_src=twsrc%5Etfw">January 31, 2020</a></blockquote> <script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script><!--kg-card-end: html--><!--kg-card-begin: html--><blockquote class="twitter-tweet" data-conversation="none"><p lang="en" dir="ltr">So the Chinese government subsidize them, and they subsidize <a href="https://twitter.com/eir?ref_src=twsrc%5Etfw">@eir</a> who then put their shitty product in their network so they can compromise their customers. Customers like the Guards. <a href="https://t.co/W1sMmQszEj">pic.twitter.com/W1sMmQszEj</a></p>&#x2014; Defence Ireland (@DefenceIreland) <a href="https://twitter.com/DefenceIreland/status/1223147747009843200?ref_src=twsrc%5Etfw">January 31, 2020</a></blockquote> <script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script><!--kg-card-end: html--><!--kg-card-begin: html--><blockquote class="twitter-tweet" data-conversation="none"><p lang="en" dir="ltr">What&#x2019;s worse is that the <a href="https://twitter.com/eir?ref_src=twsrc%5Etfw">@eir</a> CEO <a href="https://twitter.com/carolan_lennon?ref_src=twsrc%5Etfw">@carolan_lennon</a> is going around citing that they have the Garda mobile contract when asked about Huawei security concerns by <a href="https://twitter.com/adrianweckler?ref_src=twsrc%5Etfw">@adrianweckler</a> as if its an endorsement. How long have they got the contract and was it before Huawei concerns arose?</p>&#x2014; Defence Ireland (@DefenceIreland) <a href="https://twitter.com/DefenceIreland/status/1223148807573078021?ref_src=twsrc%5Etfw">January 31, 2020</a></blockquote> <script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script><!--kg-card-end: html--><p></p><p>It does not mean the government has a fig leaf for allowing the stupidity that is the body charged with protecting the national security of Ireland, from using subsidized, cheap Chinese network equipment on the Eir network. An issue so grave in the UK that <a href="https://www.gov.uk/government/news/new-plans-to-safeguard-countrys-telecoms-network-and-pave-way-for-fast-reliable-and-secure-connectivity">Huawei&apos;s equipment placement in the network is extremely restricted</a> and <a href="https://www.whitehouse.gov/presidential-actions/executive-order-securing-information-communications-technology-services-supply-chain/">are effectively banned on networks in the United States</a>, both for national security concerns related to what they know about Huawei. While you can argue about how much risk the UK is taking onboard vs the US approach, at least the UK had a discussion on the pros and cons on settled on an approach for good or ill. We didn&apos;t and we just let it happen and that has really mortgaged our future national security for a cheaper present installation of infrastructure, didn&apos;t discuss the risks and adopted it, no questions asked into the body charged with protecting our national security. That is a travesty that we cannot let continue if we are to take our national security seriously. </p><p>In some cliff notes, the government is aware of the issues that IoT devices could cause to security on a broad scale. That the government is not willing to pursue <em>an intrusive system of monitoring</em>, that there is a general issue around the openness of publicizing cyber attacks, even to the government and finally, the Government has set up the National Security Analysis Centre (NSAC) to assess technology in national security area&apos;so that the government can receive good advice on the strategic threats we face as a nation.</p><!--kg-card-begin: markdown--><h1 id="42hybridthreats">4.2: Hybrid Threats</h1>
<!--kg-card-end: markdown--><p>Hybrid Threats are; </p><blockquote>... multidimensional, combining coercive and subversive measures, using both conventional and unconventional tools and tactics (diplomatic, military, economic, and technological) to destabilise the adversary.</blockquote><p>In simpler terms, they are disinformation campaigns aimed at destabilizing and in general are difficult to counter by their nature. While they can use various techniques, the most common is the hack and dump method that Russia used extensively during the US Presidential Election of 2016. &#xA0;The EU is much closer to Russia than the US and <a href="https://www.nytimes.com/2007/05/29/technology/29estonia.html">countries like Estonia have been dealing with such <em>hybrid war</em> going back as far as 2007</a>.</p><p>While I am by no means an expert on electoral security or hybrid warfare, I do see this as a massive threat. Ireland has, even throughout the Great Recession, had a mostly stable, open, liberal democracy and that could be a major factor in continuing to attract companies to come to Ireland in the wake of Brexit and if there is to be a more unified tax policy in Europe. It is good to know that at least we have a working group thinking about these issues and that we are contributing to European efforts to fight off disinformation and hybrid warfare and I hope that we are doing more than thinking and issuing a report with some thoughts in it and that if there are recommendations, they are followed as this is crucial to the future of our small nation.</p><p>Though someone on twitter who does know a great deal more about this is far from impressed;</p><!--kg-card-begin: html--><blockquote class="twitter-tweet" data-conversation="none"><p lang="en" dir="ltr">The nod towards hybrid threats is frankly either pretty lazy or pretty incompetent. Nothing in here suggests the <a href="https://twitter.com/hashtag/Irish?src=hash&amp;ref_src=twsrc%5Etfw">#Irish</a> state is prepared to put in place the structures necessary to build intelligence on, analyse and counter false narratives and disinformation etc. <a href="https://t.co/E07iVQDvxg">pic.twitter.com/E07iVQDvxg</a></p>&#x2014; Rory Byrne (@roryireland) <a href="https://twitter.com/roryireland/status/1210591825037320193?ref_src=twsrc%5Etfw">December 27, 2019</a></blockquote> <script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script><!--kg-card-end: html--><p></p><!--kg-card-begin: markdown--><h1 id="43criticalnationalinfrastructureandpublicsectorsystemsanddata">4.3: Critical National Infrastructure and Public Sector Systems and Data</h1>
<!--kg-card-end: markdown--><p>The Governments strategy until now has been that of risk reduction in the area&apos;s of</p><blockquote><em>energy, transport, banking, financial market, health, drinking water supply and distribution and digital infrastructure</em></blockquote><p>Which are defined in <a href="https://eur-lex.europa.eu/legal-content/EN/TXT/?qid=1505297631636&amp;uri=COM:2017:476:FIN">Annex II of EU&apos;s Directive on security of network and information systems (NIS Directive)</a>. And also online services, listed below, which are defined in Annex III of the same document</p><blockquote>online marketplace, online search engine and cloud computing service</blockquote><p>While the Irish Government&apos;s document does not make clear what they mean by reduction of risk, it isn&apos;t an information security term, the NIS Directive makes clear that it is the common risk mitigation strategy. It is also clear that while the NIS Directive covers certain sectors of importance, there is awareness that mitigating risks does not eliminate risk nor does it account for unknown unknowns. And that while the NIS directive does cover these sectors, it appears that an inventory of infrastructure has been done so that they are aware that the NIS directive does not cover all the infrastructure deemed critical and that some critical infrastructure is interdependent on other critical infrastructure such as the energy sector powering most of the other NIS sectors. </p><p>It&apos;s disappointing that the only real paragraph they have on securing public sector systems says that some departments and agencies are ISO 27001 compliant while others aren&apos;t and there&apos;s no mention of doing anything about the other departments and agencies. There are governance issues around classified information, be it Irish, shared with Ireland or stored in Ireland for whatever reason and that plans are underway to deal with this issue.</p><p>And finally;</p><blockquote>The nature of these networks and technology is relevant also; being software defined and virtualised means that new types of security measures will likely be required in this sector to ensure the security of both the 5G network and of the services dependent on it.</blockquote><p>At least the government appears aware that traditional threat models and defensive mechanisms will not work for 5G.</p><!--kg-card-begin: markdown--><h1 id="appendix1actions">Appendix 1: Actions</h1>
<!--kg-card-end: markdown--><p>This has been an extraordinarily long post by my standards so I&apos;m not going to go point by point across all actions proposed, only the ones that I think are worth mentioning, but you can read them if you so desire in the document. Though I may not discuss the timeframes as I know that they have slipped already given the release date of the document.</p><blockquote><strong>Measure 1: The National Cyber Security Centre will be further developed, particularly with regard to expand its ability to monitor and respond to cyber security incidents and developing threats in the State.</strong></blockquote><p>Great idea and I really hope that it gets up and running sooner rather than later. Monitoring attacks in the state and gaining visibility into the threats that the state faces, as well as being able to fuse our data with that of international partners is key to protecting even the most basic of services provided by the government and is essential in staying abreast of emerging threats internationally. I worry though what 24/7/365 staffing of such an organization would look like and how it is intended to be staffed.</p><blockquote><strong>Measure 2: Threat intelligence and analysis prepared by the National Cyber Security Centre will be integrated into the work of the National Security Analysis Centre.</strong></blockquote><p>This is a common sense measure, but an important one and one that should have been done when both bodies were set up. If we have a bodying working analysing threats to national security, you need to feed them adequate intelligence so that they can accomplish their mission. This is also probably benefits from Measure 6 which will further develop threat intelligence efforts at the NCSC.</p><blockquote><strong>Measure 4: The NCSC, with the assistance of the Defence Forces and An Garda S&#xED;och&#xE1;na, will perform an updated detailed risk assessment of the current vulnerability of all Critical National Infrastructure and services to cyber attack.</strong></blockquote><p>This is basically a plan to deepen the vulnerability assessment of critical infrastructure which is well warranted as living in a post-Triton world as we have had the threat landscape expanded to include devices that were previously considered systems that would not be attacked.</p><blockquote><strong>Measure 5: The existing Critical National Infrastructure protection system will be expanded and deepened over the life of the Strategy to cover a broader range of Critical National Infrastructure, including aspects of the electoral system.</strong></blockquote><p>Measure 3 is not worth mentioning as it&apos;s basically just complying with an EU Directive but it feeds into this measure which is to say that while the NIS misses some aspects in infrastructure which we deem critical, we should assess the risks to all of our critical infrastructure.</p><blockquote><strong>Measure 7: Government will introduce a further set of compliance standards to support the cyber security of telecommunications infrastructure in the State.</strong></blockquote><p>Well, that vague... It&apos;s based on <a href="https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32018L1972">Directive 2018/1972</a> from the EU and the key thing that needs to be done at a high level is the following from paragraph (94);</p><blockquote>Security measures should take into account, as a minimum, all the relevant aspects of the following elements: as regards security of networks and facilities: physical and environmental security, security of supply, access control to networks and integrity of networks; as regards handling of security incidents: handling procedures, security incident detection capability, security incident reporting and communication; as regards business continuity management: service continuity strategy and contingency plans, disaster recovery capabilities; as regards monitoring, auditing and testing: monitoring and logging policies, exercise contingency plans, network and service testing, security assessments and compliance monitoring; and compliance with international standards.</blockquote><p>That may come from EU law but my god, there&apos;s more strategy in what the major issues are in that paragraph than nearly the entire document released by the Irish Government and that directive covers more of the wide spectrum of threats we face.</p><p>And a little late if you&apos;re worried about Huawei 5G equipment, it&apos;s a shame that the Irish Government is adopting regulations designed to deal with <em>security of supply, access control to networks and integrity of networks</em> and <em>security incident detection capability, security incident reporting and communication</em> AFTER such equipment has been adopted and when it is unknown if such equipment has a secure supply chain, can maintain network integrity or has adequate logging because the UK, even though they have allowed Huawei to operate at a restricted capacity in the 5G network, <a href="https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/727415/20180717_HCSEC_Oversight_Board_Report_2018_-_FINAL.pdf">the UK NCSC are by no means impressed with Huawei gear</a>.</p><blockquote><strong>Measure 8: The NCSC will develop a baseline security standard to be applied by all Government Departments and key agencies.</strong></blockquote><p>Is this a case of <a href="https://xkcd.com/927/">XKCD 927</a> or is this adopting ISO 27001 across the board? Measure 10 also covers this where the heads of IT in each dept will work with the NCSC to deploy this security baseline, whatever it is.</p><blockquote><strong>Measure 9: The existing &#x2018;Sensor&#x2019; Programme will be expanded to all Government Departments, and an assessment will be conducted by the same date as to the feasibility of expanding Sensor to cover all of Government networks.</strong></blockquote><p>This genuinely scares me. When I was doing CCNA Cybersecurity Operations, sensors are defined in 5.2.1.8 as;</p><!--kg-card-begin: markdown--><blockquote>
<p>IDS and IPS technologies share several characteristics, as shown in the figure. IDS and IPS technologies are both deployed as sensors. An IDS or IPS sensor can be in the form of several different devices:</p>
<ul>
<li>A router configured with Cisco IOS IPS software</li>
<li>A device specifically designed to provide dedicated IDS or IPS services</li>
<li>A network module installed in an adaptive security appliance (ASA), switch, or router</li>
</ul>
</blockquote>
<!--kg-card-end: markdown--><p>I have also though seen sensors as honeypots or canary tokens but I really hope it&apos;s not the traditional definition I know as a sensor because the thought that in 2020, we have government networks that have no IDS or IPS whatsoever is a scary thought... Does that extend as far as firewalls also?! I can&apos;t imagine that&apos;s the case but I would consider the deployment of both mandatory in this day and age.</p><blockquote><strong>Measure 11: The NCSC will be tasked by Government to issue Recommendations with regard to the use of specific software and hardware on Government IT and telecommunications infrastructure.</strong></blockquote><p>100% on board with this! But as I said before, maybe we should have thought about this just a little earlier when it came to telecommunications and this might be a great opportunity to look into FOSS and what it could offer as well as what other vendors have to offer.</p><blockquote><strong>Measure 12: Government will continue to ensure that second and third level training in computer science and cyber security is developed and deployed, including by supporting the work of Skillnets Ireland in developing training programmes for all educational levels and supporting SOLAS initiatives for ICT apprenticeship programmes in cyber security.</strong></blockquote><p>There&apos;s not much more to say here. Integrating cyber across all second level and above education, in as broad a spectrum as possible is a commendable initiative! I just wish we had more in the way of detail.</p><blockquote><strong>Measure 13: Science Foundation Ireland (SFI) will promote cyber security as a career option in schools and colleges by means of their Smart Futures Programme.</strong></blockquote><p>The fact that we aren&apos;t speaks volumes.</p><blockquote><strong>Measure 14: Science Foundation Ireland along with DBEI and DCCAE, will explore the feasibility through the SFI Research Centre Programme, the Research Centre Spoke programme or other enterprise partnership programmes to fund a significant initiative in Cyber Security Research.</strong></blockquote><p>This shouldn&apos;t be to <em>explore the feasibility</em> of a Cyber Security Research Centre. This should just simply be to set up a Cyber Security Research Centre. End of. It shouldn&apos;t be a question because we want to promote a cyber as public sector, private sector or academic career path, you can&apos;t think about it in terms of maybe. It has to be in terms of doing. A combination of this with Measure 15 and Measure 16 could be beneficial as links between the public and private sectors with academia to design and built the technology and do research into what is needed going forward is an important step.</p><blockquote><strong>Measure 17: We will reinforce Ireland&#x2019;s diplomatic commitment to cyber security, including by stationing cyber attach&#xE9;s in key diplomatic missions and by engaging in sustainable capacity building in third countries.</strong></blockquote><p>I genuinely think this is fantastic! Hire people to work in a diplomatic capacity to share out skills with the rest of the world! I would drop my life to work on something like this I believe in it so much. It&apos;s the cyber equivalent of Peace Keeping and it&apos;s a genuinely commendable initiative. I just hope that we can have enough staff so that we can staff all the posts we will need to in Ireland and working on diplomacy globally.</p><blockquote><strong>Measure 18: We will create an interdepartmental group (IDG) on internet governance and international cyber policy to coordinate national positions across Departments.</strong></blockquote><p>Can we lead a global Arms Control initiative for cyber like we did for <a href="https://www.ireland.ie/global-diaspora/stories/ireland-and-nuclear-disarmament.php">nuclear weapons</a>? There&apos;s already the start of a framework for this in Microsoft&apos;s <a href="https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RW67QH">Digital Geneva Convention</a> and I will totally go and get a <a href="https://www.nonproliferation.org/education/">Master of Arts in Nonproliferation and Terrorism Studies</a>! I&apos;ve kinda already been accepted into the course I want to do;</p><!--kg-card-begin: html--><blockquote class="twitter-tweet"><p lang="und" dir="ltr">YES!</p>&#x2014; Jeffrey Lewis (@ArmsControlWonk) <a href="https://twitter.com/ArmsControlWonk/status/1217621640135077888?ref_src=twsrc%5Etfw">January 16, 2020</a></blockquote> <script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script><!--kg-card-end: html--><p></p><blockquote><strong>Measure 19: We will deepen our existing engagement in international organisations, including by joining the Cyber Security Centre of Excellence (CCD-COE) in Tallinn, Estonia.</strong></blockquote><p>I think Rory says all that&apos;s need to be said here and I hope we do get a volunteer corps of some kind, though I do think this is a welcome development and something we should do more of. Working alone on the same issues as everyone else</p><!--kg-card-begin: html--><blockquote class="twitter-tweet" data-conversation="none"><p lang="en" dir="ltr">Joining CCD-COE is a welcome development. Sending one person is hardly that revolutionary. An opportunity for the state to doing something really farsighted and leap ahead by embracing the Estonian Cyber Volunteer concept was missed. <a href="https://t.co/KPjp5M9g6h">https://t.co/KPjp5M9g6h</a> <a href="https://t.co/POhWzgGSHn">pic.twitter.com/POhWzgGSHn</a></p>&#x2014; Rory Byrne (@roryireland) <a href="https://twitter.com/roryireland/status/1210594399262007296?ref_src=twsrc%5Etfw">December 27, 2019</a></blockquote> <script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script><!--kg-card-end: html--><p></p><!--kg-card-begin: markdown--><h1 id="whatsmissing">What&apos;s Missing?</h1>
<!--kg-card-end: markdown--><p>You could say a lot is missing but really... The only thing missing the human factor. There&apos;s ideas and technologies that could be implemented, but to run the JSOC, you need people to sit in chairs and analyse events as they arise and you need them there all of the time. There needs to be a rapid scale up in the numbers of people working at the different bodies across the nation on cyber security and national security issues and the only way you&apos;re going to get that is by getting the people to work the problem.</p><p>And I&apos;m not alone though, I&apos;ve used <a href="https://twitter.com/roryireland/status/1210591796084068353">Rory Byrne&apos;s thread on twitter</a> already in this but the whole thread is worth the read rather than the select few tweets I have shown but I do want to show some more from him as well as others on more stuff that&apos;s missing;</p><!--kg-card-begin: html--><blockquote class="twitter-tweet" data-conversation="none"><p lang="en" dir="ltr">There is no mention of recreating the very successful model of the UK NCSC Cyber Security Information Sharing Partnership (CiSP). So a key way to broaden and engage stakeholders from the wider business, NGO etc community on day to day threat sharing is lost.</p>&#x2014; Rory Byrne (@roryireland) <a href="https://twitter.com/roryireland/status/1210591827230908416?ref_src=twsrc%5Etfw">December 27, 2019</a></blockquote> <script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script><!--kg-card-end: html--><!--kg-card-begin: html--><blockquote class="twitter-tweet" data-conversation="none"><p lang="en" dir="ltr">There is no mention of reconfiguring and enhancing state structures such as the Garda and Defence Forces to be able to increase their large gaps in recruitment, training and retention of staff.</p>&#x2014; Rory Byrne (@roryireland) <a href="https://twitter.com/roryireland/status/1210591828522754051?ref_src=twsrc%5Etfw">December 27, 2019</a></blockquote> <script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script><!--kg-card-end: html--><!--kg-card-begin: html--><blockquote class="twitter-tweet" data-conversation="none"><p lang="en" dir="ltr">Regarding education and building the cyber experts of the future. The strategy is lazy and fails to even bother looking at some of the oustanding initiatives across the water. We are patting ourselves on the back for some pretty mediocre resources compared to UK Cyberfirst etc. <a href="https://t.co/dkxJISeQo6">pic.twitter.com/dkxJISeQo6</a></p>&#x2014; Rory Byrne (@roryireland) <a href="https://twitter.com/roryireland/status/1210593197220646912?ref_src=twsrc%5Etfw">December 27, 2019</a></blockquote> <script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script><!--kg-card-end: html--><p></p><!--kg-card-begin: markdown--><h1 id="wrappingthisup">Wrapping This Up</h1>
<!--kg-card-end: markdown--><p>What I find really frustrating about this strategy is that it appears that behind the scenes that a lot of work has been done by the right people to identify the problems and lay them out in a coherent fashion including an annex of actions, you could almost say I had a glowing review of most elements with all but a few items, like the Guards contract with Eir, where I was at least constructive in my criticism.</p><p>But the wheels come off the strategy bus is when you look at the ambition the plan shows in the annex of actions. Some of them come down to just following the law, basically defeatedly saying that we have to because we don&apos;t have a choice. Or that we recognize that X is an issue and this will be solved with public information campaigns or with more third level graduates but does not account for the lag time between those graduates coming online and now and how that gap is to be plugged or the recognition that educating the general public on general cyber security matters is a difficult challenge that even experienced professionals fail at a large majority of the time.</p><p>And on the education front, maybe we need to look at what other nations are doing like the <a href="https://www.acq.osd.mil/cmmc/docs/cmmc-overview-brief-30aug19.pdf">Cybersecurity Maturity Model Certification (CMMC) in the US</a>. It&apos;s a way in which you can begin the process of building a cyber capability within an organization through bootstrapping and adding capabilities over time and requires formal certification to make sure you meet the requirements of each level of the certification. This kind of approach will gradually raise the bar security across the whole sector of defence contractors over time in the US.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://legendary.industries/content/images/2020/02/slide_sample-1.PNG" class="kg-image" alt loading="lazy"><figcaption>The levels of security in the Cybersecurity Maturity Model Certification</figcaption></figure><p>There&apos;s no mention of how we could even consider the cost of this or where the money should be raise for it. Or if it&apos;s worth using something like the <a href="https://isif.ie/" rel="noopener">Ireland Strategic Investment Fund</a> to provide funding some of the grand scale, long term projects listed in this. The strategy isn&apos;t aware that this might need a strategic funding source that isn&apos;t from the daily budgets of the Department of Defence of or the Department of Department of Communications, Climate Action and Environment or the Department of Justice and Equality. </p><p>It is a strategy, but it lacks ambition and arguably a grounding in realities of how dynamic information security is and how statically we seem to see the problems at a national level. We realize they are there but we think that they can be solved with little change when historically the implementation of deep and far reaching operational security measures have required organizational sea changes. Or how we plan to integrate cyber into more of what we do since that&apos;s what we really need to do, to effectively tackle this issue head on and to be able to think about these issues in the modern, broad sense since it is an issue that effects everyone.</p><p>Maybe it&apos;s too short term to accomplish wider goals? Maybe I expect too much of what&apos;s politically possible in Ireland? Or maybe I see issues like the fact that these missions are spread out across multiple bodies being the issue but the civil service does not? Maybe we should look at utilizing the Department of Defence more fully and make it a full cabinet position again with it&apos;s remit being that of National Security and move bodies like the NCSC, NSAC, the Defence Forces and the national security elements of An Garda S&#xED;och&#xE1;na all in under one roof? I don&apos;t know what all the answers are, but what I do know is that we need to start looking for better answers.</p><!--kg-card-begin: markdown--><hr>
<!--kg-card-end: markdown--><p>And just to show that I&apos;m not some arsehole on the internet throwing stones at glasses houses, this is an issue I really worry about and I think we are not doing enough on, nor are we really prepared for at a national level and for the betterment of the nation, I will happily give 5 to 10 years and maybe even more, to the NCSC, the NSAC, the Defence Forces, An Garda S&#xED;och&#xE1;na, being a CCD-COE representative or working as one of the cyber attach&#xE9;s mentioned in Measure 17, working on these issues in Ireland or with international partners at home or in far flung postings and accept whatever pay cut I have take compared to my fellow graduates when I graduate from college at the end of the current semester because this is the hill I intend to die on.</p><p>I have said something to that effect every time I have made this commitment to the above agencies, every time I have met them throughout my time in college and have always been referred to Public Jobs where they never seem to hire anyone. So I will look forward to <a href="https://www.nssi.ie/">Sl&#xE1;nd&#xE1;il 2020</a> where I will continue to meet people in these bodies and continue to attempt to join their efforts.</p>]]></content:encoded></item><item><title><![CDATA[I Was On the Arms Control Wonk Podcast Talking About Investigating The PS752 Shootdown With OSINT]]></title><description><![CDATA[<p>As I&apos;ve mentioned in previous posts, I&apos;ve used the Arms Control Wonk Podcast Slack as the basis for starting several of my own investigations into various different things and recently myself and some of the guys on Slack investigated the shootdown of PS752 over Iran by</p>]]></description><link>https://legendary.industries/acwp-ps752/</link><guid isPermaLink="false">5e2cba45c03dff052da84525</guid><category><![CDATA[OSINT]]></category><dc:creator><![CDATA[Paddy Kerley]]></dc:creator><pubDate>Sat, 25 Jan 2020 22:12:44 GMT</pubDate><content:encoded><![CDATA[<p>As I&apos;ve mentioned in previous posts, I&apos;ve used the Arms Control Wonk Podcast Slack as the basis for starting several of my own investigations into various different things and recently myself and some of the guys on Slack investigated the shootdown of PS752 over Iran by the IRGC.</p><p>While the regular hosts of the pod were aware that we were investigating, they were no aware of the extent of the investigation we had done and when I opened my big fat mouth on twitter and documented the scale of what we had done in the thread below, well... They asked me to go on and talk about some of things we got up to in our investigation</p><figure class="kg-card kg-embed-card"><blockquote class="twitter-tweet"><p lang="en" dir="ltr"><a href="https://twitter.com/ACWPodcast?ref_src=twsrc%5Etfw">@ACWPodcast</a> <a href="https://twitter.com/ArmsControlWonk?ref_src=twsrc%5Etfw">@ArmsControlWonk</a> <a href="https://twitter.com/aaronstein1?ref_src=twsrc%5Etfw">@aaronstein1</a> <a href="https://twitter.com/annemp13?ref_src=twsrc%5Etfw">@annemp13</a> <a href="https://twitter.com/wslafoy?ref_src=twsrc%5Etfw">@wslafoy</a> I have one minor issue with the most recent pod. I know you don&apos;t check slack often and I&apos;m not saying you have to, but Slack did a lot of good work on the downing of PS725 and I kinda have to point it out with links</p>&#x2014; Paddy Kerley (@LegendaryPatMan) <a href="https://twitter.com/LegendaryPatMan/status/1217613398269186049?ref_src=twsrc%5Etfw">January 16, 2020</a></blockquote>
<script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script>
</figure><p>If you&apos;re interested in hearing me talk about the investigation and what other things we get up to on Slack, you can grab the pod in the tweet below and listen</p><figure class="kg-card kg-embed-card"><blockquote class="twitter-tweet"><p lang="en" dir="ltr">New Arms Control Wonk podcast! <a href="https://twitter.com/LegendaryPatMan?ref_src=twsrc%5Etfw">@LegendaryPatMan</a> joins <a href="https://twitter.com/ArmsControlWonk?ref_src=twsrc%5Etfw">@ArmsControlWonk</a> to talk about collaborative open-source intelligence and the ACWPodcast community&apos;s rapid OSINT response to the downing of PS752<a href="https://t.co/PZOrvNxxbo">https://t.co/PZOrvNxxbo</a> <a href="https://t.co/fBST65IZlJ">pic.twitter.com/fBST65IZlJ</a></p>&#x2014; ArmsControlWonkPod (@ACWPodcast) <a href="https://twitter.com/ACWPodcast/status/1220031042305904645?ref_src=twsrc%5Etfw">January 22, 2020</a></blockquote>
<script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script>
</figure>]]></content:encoded></item><item><title><![CDATA[That Time I Accidentally Burned A Malware Campaign]]></title><description><![CDATA[<p>It&apos;s been ages since I&apos;ve written here and part of that has been down to being just busy with life, projects and college work but a large amount of that has been down to the completely garbage editor that Ghost now uses that isn&apos;t</p>]]></description><link>https://legendary.industries/that-time-i-accidentally-burned-a-malware-campaign/</link><guid isPermaLink="false">5df10bb8c03dff052da842de</guid><dc:creator><![CDATA[Paddy Kerley]]></dc:creator><pubDate>Thu, 12 Dec 2019 18:53:29 GMT</pubDate><content:encoded><![CDATA[<p>It&apos;s been ages since I&apos;ve written here and part of that has been down to being just busy with life, projects and college work but a large amount of that has been down to the completely garbage editor that Ghost now uses that isn&apos;t based in Markdown and turned a fantastic experience into one I despise because of how utterly frustrating it is to have written for years in Markdown and to have it taken away from me... But that&apos;s neither here nor there and what is important is that I&apos;ve been busy working on some idea&apos;s and it&apos;s time to share a small part of what I have been working on!</p><p>I&apos;ve been playing with Honeypots/nets for the best part of three months to see what kind of data I could usefully get out of them and to be honest, the vast, vast majority of what I&apos;ve seen has either not been so interesting because its a low effort, low cost, opportunistic attacks and of the few that have stood out, upon digging deeper, they turn out to be much ado about nothing. The largest attacks I&apos;ve seen have been just spammed out across the internet and have been noticed by many large and small security companies and been analyzed to death, like the 5,201 samples of WannaCry I picked up of which the only discernible difference is that they have a different crypto wallet address to deposit your ransom in or they have a different packer version. </p><p>Thinking I spent an age working on something, only to have nothing again, I took a chance and looked at something I wouldn&apos;t normally look at. What people were trying to do over SSH to my poor honeypot. And ohh boy did I find something interesting!</p><figure class="kg-card kg-image-card"><img src="https://legendary.industries/content/images/2019/12/14.PNG" class="kg-image" alt loading="lazy"></figure><p>Now it&apos;s not particularly weird to see an attack look for who user they are or system information as they are useful to know your next steps. But it&apos;s weird to see someone <code>curl</code> OR <code>wget</code> a script and pipe that to bash while sending all feedback to <code>/dev/null</code> and not just that, running it in the background! This was kind of irresistible and I kinda spend nearly every waking hour if not thinking about this, but working on it and verifying that I was right and that I wasn&apos;t crazy </p><figure class="kg-card kg-image-card"><img src="https://legendary.industries/content/images/2019/12/script-snip.PNG" class="kg-image" alt loading="lazy"></figure><p>Above is a snippet of the text that the command try&apos;s to execute and essentially, if a number of conditions are met it will reach out to to a number of image hosting sites and pull down an x32 or x64 &quot;png&quot; file and failing that it also reaches out to another site and pulls down a second script</p><figure class="kg-card kg-image-card"><img src="https://legendary.industries/content/images/2019/12/pygo-snip.PNG" class="kg-image" alt loading="lazy"></figure><p>This second script goes to two more &quot;png&quot; files and failing that, it just cuts and runs to a malware distribution point to download the x32 or x64 versions.</p><figure class="kg-card kg-image-card"><img src="https://legendary.industries/content/images/2019/12/16.PNG" class="kg-image" alt loading="lazy"></figure><p>If you try and look a the images, you get warnings such as above from image hosting sites that say that the image cannot be displayed because it contains error, which would be unusual for an image... If you download the image though and open it with a text editor, you get an ELF header which is not the expected behavior for an image.</p><figure class="kg-card kg-image-card"><img src="https://legendary.industries/content/images/2019/12/17.PNG" class="kg-image" alt loading="lazy"></figure><p>Using <code>sha1sum</code> I got the hash and uploaded it to Virus Total and I&apos;m not sure if it was me who found it or not, but if it wasn&apos;t me, I was dam close to finding it! Using the <em>Relations </em>tab I was able to get domains associated with malware and map things out. The associated domains are the same domain three times though which isn&apos;t of much use but looking at the domain in VT Graph did allow me to see that it is related to other variants of Linux Coin Miners:</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://legendary.industries/content/images/2019/12/19.PNG" class="kg-image" alt loading="lazy"><figcaption><a href="https://www.virustotal.com/graph/ge025ab348d09452eaf17e2b5b394eac0e5a850207f75434ab363ef036f0aed1b">https://www.virustotal.com/graph/ge025ab348d09452eaf17e2b5b394eac0e5a850207f75434ab363ef036f0aed1b</a></figcaption></figure><p>Also using VT Graph I was able to map out a mental picture for me of how the attack worked in an end to end fashion. I know that&apos;s not for VT Graph is necessarily for, but if you ever have to present your work in an easy to understand way for less digitally literate people or if you want great pictures for professionals to describe attacks, VT Graph is perfect! </p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://legendary.industries/content/images/2019/12/20.PNG" class="kg-image" alt loading="lazy"><figcaption><a href="https://www.virustotal.com/graph/g0025770d073a488eb98d8d7b591ef624b0500f0ffee8416e80c41ad56b26c89e">https://www.virustotal.com/graph/g0025770d073a488eb98d8d7b591ef624b0500f0ffee8416e80c41ad56b26c89e</a></figcaption></figure><p>So if I can detect the command they are executing, can I see how they are logging in? Splunk Can give me useful information, but as useful as it is, there&apos;s a slight problem:</p><figure class="kg-card kg-image-card"><img src="https://legendary.industries/content/images/2019/12/Connection-snip.PNG" class="kg-image" alt loading="lazy"></figure><p>If I get the IP&apos;s that the attackers are using and search for the usernames and passwords used, I get zero results:</p><figure class="kg-card kg-image-card"><img src="https://legendary.industries/content/images/2019/12/ssh-logins.PNG" class="kg-image" alt loading="lazy"></figure><p>Now I have two theories as to why this is. The first and most likley is that my Splunk command is wrong and I need a logical operator before the first src command. The second is that there is a small gap in Cowrie&apos;s abailty to log. I&apos;m not exactly sure where this gap exists though. My working hypothesis is that since one of the connections issuing the commands is using the <code>SSH-2.0-Go</code> client, that either Go is doing sometime unusual or the attacker is doing something unusual and the only unusal thing I could think of was directly appending a command to the SSH login. So I tried that:</p><figure class="kg-card kg-image-card"><img src="https://legendary.industries/content/images/2019/12/ssh-attempt.PNG" class="kg-image" alt loading="lazy"></figure><p>And I was able to successfully able to execute this in bash and have everything run as inteneded in the background while trying to get it to execute as <code>root</code> but its never that simple is it...</p><figure class="kg-card kg-image-card"><img src="https://legendary.industries/content/images/2019/12/cowrie-test.PNG" class="kg-image" alt loading="lazy"></figure><p>Cowrie didn&apos;t detect any of it, at all... Which leaves me with more questions about how than answers. I was hoping to dig deeper into the why this is the case, but while preparing a presentation on this research, I noticed that I forgot to save a copy of the pygo script and ohh boy am I glad I didn&apos;t becuase the attackers cleary weren&apos;y happy that myself and some other individuals had dumped their work into Virus Total and had updated their pygo script t0 be a serioes of &#xA0;char variables that are coupled to make the script when executed.</p><figure class="kg-card kg-image-card"><img src="https://legendary.industries/content/images/2019/12/pygo-update.PNG" class="kg-image" alt loading="lazy"></figure><p>And of course i had to go and burn this too because you just can&apos;t not leave them like that. And I left links to Virus Total along with hashes, a list of all the domains and also the details on the C2 servers and anywhere I used a VT Graph I made, I left a link to the graph in the caption too. Happy digging if you want to!</p><p>Going forward, I&apos;ve been thinking a lot more about honeypots for specific, targeted information such as <a href="https://doublepulsar.com/eternalpot-lessons-from-building-a-global-nation-state-smb-exploit-honeypot-infrastructure-3f2a0b064ffe">EternalPot by Kevin Beaumont</a> though tailored to something else more interesting to me personally and using something that has a much better capability than I can see Splunk has for packet captures such as QRadar or The Hive and playing back what attackers do like in Azure Sentinel or having a better capability for Malware Analysis or having better ways to automatically send data to Virus Total, Malice or MISP to get reports back or help do a deeper analysis that I currently can with the limited time and resources I have. Or maybe just a further dive into either automating the Malware Analysis or doing some datamining to make further work on this less time intensive for me since it did consume 5 full days I really couldn&apos;t afford to give to it... Failing that, I&apos;ve also been reading a lot about how to fool Computer Vision systems <a href="https://arxiv.org/abs/1707.08945">can be fooled</a> or how you can <a href="http://dx.doi.org/10.1145/2976749.2978392">defeat facial recognition systems</a> using commodity hardware. </p><p>So I guess I&apos;ve ton&apos;s of idea&apos;s to work away on, I just need to find the time</p><hr><p>SHA1 Hashes:<br>a64/b64/c64/urlx64/urlx642 Malware dec3575c3630d0c16841b559875bc5d572459691 <a href="https://www.virustotal.com/gui/file/1efd1a187db6790c236e3db0fa73be2924959c2da280ec00b179291fcf65b370/detection"><code>https://www.virustotal.com/gui/file/1efd1a187db6790c236e3db0fa73be2924959c2da280ec00b179291fcf65b370/detection</code></a> <br>a32/b32/c32/urlx32/urlx322 Malware 132f8a76587f7c1d2a424be948b01ac704b820e9 <a href="https://www.virustotal.com/gui/file/440562a2ff84a52a6cbdbdd2a963867c0d2d00fc04c1e5f258260aadd5192e2a/detection"><code>https://www.virustotal.com/gui/file/440562a2ff84a52a6cbdbdd2a963867c0d2d00fc04c1e5f258260aadd5192e2a/detection</code></a><br>pygo script 1dd32cb1bcf7f871d9eca24c2c60860153f189b6 <code>https://www.virustotal.com/gui/file/77ec02d1ebb04935bbdf0f317a6625c6c6775999ebb96c1f56c2ffad94a75302/detection</code><br>pygo char() script 253f9302de8b353c0d08d64edebcbe2cc00e3a56 <a href="https://www.virustotal.com/gui/file/e719a6bb65edc3f6a9dd024a9a57327fdc81980a11b320fabad38f94d4b69185/detection"><code>https://www.virustotal.com/gui/file/e719a6bb65edc3f6a9dd024a9a57327fdc81980a11b320fabad38f94d4b69185/detection</code></a><br><br>Suspected C2 Servers or Coin Mining Pools:<br>cron.iap5u1rbety6vifaxsi9vovnc9jjay2l.com <a href="https://www.virustotal.com/gui/url/4c9c06df85940ab045d9a4e583d344b69a34f25a9160c246e1e8a1c04ce93fd7/detection"><code>https://www.virustotal.com/gui/url/4c9c06df85940ab045d9a4e583d344b69a34f25a9160c246e1e8a1c04ce93fd7/detection</code></a></p><p>Domains:<br>lsd.systemten.org<code>https://www.virustotal.com/gui/domain/lsd.systemten.org/details</code><br>aliyun.one<code>https://www.virustotal.com/gui/domain/aliyun.one/details</code><br>aliyun.one/pygo<a href="https://www.virustotal.com/gui/url/cbd1151c0b3eda9a6aaa406fdebba0cc9ff7f53224b63d1775bccec0eeaa3261/detection"><code>https://www.virustotal.com/gui/url/cbd1151c0b3eda9a6aaa406fdebba0cc9ff7f53224b63d1775bccec0eeaa3261/detection</code></a><br>a64<code>https://www.virustotal.com/gui/url/e5333430394ff002fcb5042372aac5feb8fa3f24965f8740cb00ab07ea187fe9/detection</code><br>a32<a href="https://www.virustotal.com/gui/url/b410a5d4e138ea0f4880bc0f122d30be4e25f36c424e42fb6a44c859d5852b03/detection"><code>https://www.virustotal.com/gui/url/b410a5d4e138ea0f4880bc0f122d30be4e25f36c424e42fb6a44c859d5852b03/detection</code></a><br>b64<a href="https://www.virustotal.com/gui/url/bcc829325505145528d628c49ae431f5938bcb2f245a0e6a4db5cf741700d70e/detection"><code>https://www.virustotal.com/gui/url/bcc829325505145528d628c49ae431f5938bcb2f245a0e6a4db5cf741700d70e/detection</code></a><br>b32<a href="https://www.virustotal.com/gui/url/ac1742f757f9de8e10758f8839eba7ef314e2ff9579e99284a02131f589a032d/detection"><code>https://www.virustotal.com/gui/url/ac1742f757f9de8e10758f8839eba7ef314e2ff9579e99284a02131f589a032d/detection</code></a><br>c64<a href="https://www.virustotal.com/gui/url/20e9224e177a9b1ad20313935511f69e6c89967325d3ac9768e42bca1ba35572/detection"><code>https://www.virustotal.com/gui/url/20e9224e177a9b1ad20313935511f69e6c89967325d3ac9768e42bca1ba35572/detection</code></a><br>c32<a href="https://www.virustotal.com/gui/url/23a2c261ca05be58eb7eff49c586df412bf025abcb379a016c6310442e3c4d30/detection"><code>https://www.virustotal.com/gui/url/23a2c261ca05be58eb7eff49c586df412bf025abcb379a016c6310442e3c4d30/detection</code></a><br>urlx64 <a href="https://www.virustotal.com/gui/url/e5333430394ff002fcb5042372aac5feb8fa3f24965f8740cb00ab07ea187fe9/detection"><code>https://www.virustotal.com/gui/url/e5333430394ff002fcb5042372aac5feb8fa3f24965f8740cb00ab07ea187fe9/detection</code></a><br>urlx642<a href="https://www.virustotal.com/gui/url/14f6e80115b1a54e64716df0c0769eaacb8d12055a3f5173dc8dc061f7248c9a/detection"><code>https://www.virustotal.com/gui/url/14f6e80115b1a54e64716df0c0769eaacb8d12055a3f5173dc8dc061f7248c9a/detection</code></a><br>urlx32 <a href="https://www.virustotal.com/gui/url/b410a5d4e138ea0f4880bc0f122d30be4e25f36c424e42fb6a44c859d5852b03/detection"><code>https://www.virustotal.com/gui/url/b410a5d4e138ea0f4880bc0f122d30be4e25f36c424e42fb6a44c859d5852b03/detection</code></a><br>urlx322<a href="https://www.virustotal.com/gui/url/bdb2c12b7106ad3863457ddb06e17490ac9dc9bdcc5dbd60fc6e18ee50121a65/detection"><code>https://www.virustotal.com/gui/url/bdb2c12b7106ad3863457ddb06e17490ac9dc9bdcc5dbd60fc6e18ee50121a65/detection</code></a></p>]]></content:encoded></item><item><title><![CDATA[The Tinfoil Hat Recession Predictor Thing!]]></title><description><![CDATA[<h2 id="-this-is-not-financial-advice-">*** THIS IS NOT FINANCIAL ADVICE! ***</h2><h2 id="-you-re-a-literal-crazy-person-if-you-take-me-seriously-">*** YOU&apos;RE A LITERAL CRAZY PERSON IF YOU TAKE ME SERIOUSLY ***</h2><hr><p>Myself and a few friends on Slack like watching certain indicators and gleaming something resembling insight from them and since the <a href="https://www.bloomberg.com/opinion/articles/2018-12-03/u-s-yield-curve-just-inverted-that-s-huge">Yield Curve inverted several days ago</a> there&apos;s been a back</p>]]></description><link>https://legendary.industries/the-tinfoil-hat-recession-predictor-thing/</link><guid isPermaLink="false">5d543f9359bbd34cb3bdfad2</guid><category><![CDATA[Finance?]]></category><dc:creator><![CDATA[Paddy Kerley]]></dc:creator><pubDate>Sat, 08 Dec 2018 17:06:00 GMT</pubDate><content:encoded><![CDATA[<h2 id="-this-is-not-financial-advice-">*** THIS IS NOT FINANCIAL ADVICE! ***</h2><h2 id="-you-re-a-literal-crazy-person-if-you-take-me-seriously-">*** YOU&apos;RE A LITERAL CRAZY PERSON IF YOU TAKE ME SERIOUSLY ***</h2><hr><p>Myself and a few friends on Slack like watching certain indicators and gleaming something resembling insight from them and since the <a href="https://www.bloomberg.com/opinion/articles/2018-12-03/u-s-yield-curve-just-inverted-that-s-huge">Yield Curve inverted several days ago</a> there&apos;s been a back and fourth about what next given that the Yield Curve is the single best predictor of recessions in the United States since the 60&apos;s, and I thought I&apos;d get all of my indicators together in one place and give a bit of an explanation of the what and why of their predictive power and then make some pages with all the data so that we can track what&apos;s going on and spark some discussion with friends</p><p>If you want to gleam some insight from the following indicators, ignore one out of sigma or one day events. For example, the Yield Curve&apos;s trend is down and has inverted BUT to be effective in predicting recessions, there needs to be a sustained inversion over roughly a quarter or two to predict a recession in the next 4 quarters.</p><p>Also even if say the Yield Curve remains inverted, no indicators is perfect therefore, you need to look at the longer time frame across several indicators and since me and some friends like to talk on Slack about this exact thing, I thought I&apos;d put together some of the things that I look for in</p><p>This project is in its early stages and for the moment, there will be this explainer on the different pieces of data and what to interpret from them as well as a few pages displaying the data sources by country or maybe also region since a whole page for the Euro Zone might be interesting. Hopefully in time I will start every page have a composite of all of the data with a graph of the past composite number and a simple indication of if we&apos;re on for a recession somewhere or not.</p><h3 id="the-currently-completed-models-are-below">The Currently completed Models are below</h3><!--kg-card-begin: markdown--><p><a href="https://legendary.industries/us-model/">The United States</a></p>
<!--kg-card-end: markdown--><p>Major To-Do Models</p><!--kg-card-begin: markdown--><ol>
<li><a href="http://ie-model">Ireland</a></li>
<li><a href="http://nk-model">North Korea</a></li>
</ol>
<!--kg-card-end: markdown--><hr><h2 id="what-indicators-and-why">What Indicators and Why</h2><p>Generally, indicators can be broken into the following three categories, Leading, Coincidental or Coincident and Lagging indicators. In the US and some other nations like Japan, Germany and the UK, they are made easily available by The Conference Board, <a href="https://www.conference-board.org/data/bci/index.cfm?id=2160">who have a page that breaks down what all of them mean</a> and why they are important. As well as details about the <a href="https://www.conference-board.org/data/bcicountry.cfm?cid=1">current indicator, past indicators and details on calculating it yourself</a>. Below I will try to break down in the simplest terms, why they are important and useful. Note though that I will not be using all of them in every model.</p><p>For the moment I will not be including most of Lagging indicators because I don&apos;t think they are that useful at predicting a recession since they can only be assessed after a fluctuation in the data. I will be including the Average duration of unemployment indicator though as I think employment figures are generally good, though the overall employment figure is not.</p><h3 id="leading-indicators">Leading Indicators</h3><p>These are indicators that change prior to a change in the economy as a whole. These are generally seen as the following</p><!--kg-card-begin: markdown--><h4 id="1averageweeklyhoursmanufacturing">1. Average weekly hours (manufacturing)</h4>
<p>Over the long term you get a baseline of the average weekly hours worked in manufacturing. As a recession approaches, employers will tend to cut hours prior to cutting the workforce.</p>
<h4 id="2averageweeklyjoblessclaimsforunemploymentinsurance">2. Average weekly jobless claims for unemployment insurance</h4>
<p>People filing for unemployment can be a volatile number but getting the average over a period of weeks, for example 4 weeks, indicates the overall strength of an economy. If the graph is trending down, less people are filing for unemployment whereas if the graph is trending up, more people are filing for unemployment.</p>
<h4 id="3manufacturersnewordersforconsumergoodsmaterials">3. Manufacturers&apos; new orders for consumer goods/materials</h4>
<p>These are goods primarily used by consumers and adjusted for inflation. If the number is trending up, there is demand for more consumer goods while if it is trending down, demand is dropping off, which is indicative of a slow down in consumer orders for goods.</p>
<h4 id="4ismneworderindex">4. ISM New Order Index</h4>
<p>This index reflects weather the surveyed participants are reporting increased or decreased orders over the previous month. Readings greater than 50 reflect that orders have increased while orders lower than 50 reflect that orders have decreased, which is indicative of a slow down in consumer orders for goods.</p>
<h4 id="5manufacturersnewordersfornondefensecapitalgoods">5. Manufacturers&apos; new orders for non-defense capital goods</h4>
<p>This index is the same as 3, but includes aircraft purchases and as such should be read the same way.</p>
<h4 id="6buildingpermitsnewprivatehousingunits">6. Building permits, new private housing units</h4>
<p>This is the number of residential building permits issued in the prior month and is an indicator of construction activity. While trending up, more residential buildings are under construction whereas if trending down, construction activity is dropping. Construction generally leads to other forms of economic production and activity so a long term downward trend is indicative of a recession.</p>
<h4 id="7stockpricesofcommonstocks">7. Stock prices of common stocks</h4>
<p>Tracks the movement of prices in a board selection of common stocks. An increasing price trend shows broad economic growth while a decreasing price curve shows a board economic slowdown.</p>
<h4 id="8interestratespreadtheyieldcurve">8. Interest rate spread/The Yield Curve</h4>
<p>This is the spread between a government 10 year bond and 3 month bond or 10 year and 2 year bond. When the curve is trending up, investors are confident that they can make returns on investments into the future, while if it is trending down, or inverted, it shows that investors are not confident they will make a return in the short term, be that 3 months or two years.</p>
<p>This is the <a href="https://www.npr.org/sections/money/2018/01/12/577710151/the-recession-predictor">single most effective predictor of recessions</a> and is <a href="https://www.npr.org/2018/08/09/637224491/the-og-yield-curve-whisperer">backed by piles of data with an impressive track record</a> that has yet to fail.</p>
<h4 id="9consumerconfidenceindex">9. Consumer Confidence Index</h4>
<p>Is a measure of how confident consumers are in the coming 6 or 12 months and if they are positive, negative or unchanged about future economic conditions. Trending up or flat means that consumers are confident whereas if it is trneding down, consumers are not confident in the future.</p>
<!--kg-card-end: markdown--><h3 id="coincidental-indicators">Coincidental Indicators</h3><p>These are indicators that change as a change occurs in the economy as a whole.</p><!--kg-card-begin: markdown--><h4 id="1employeesonnonagriculturalpayrollsornetemployment">1. Employees on nonagricultural payrolls or Net Employment</h4>
<p>This is the net net hiring and firing rate of all but agricultural employees. When this is trending up, firings are down and more people are being hired, while when trending down, more people are being fired rather than hired.</p>
<h4 id="2personalincomelesstransferpayments">2. Personal income less transfer payments</h4>
<p>The value of the income received from all sources adjusted inflation to measure the real salaries and other earnings of all persons. Income levels help determine both aggregate spending the general health of the economy, so trending up is healthy while trending down or flattening to, or below inflation is not as wage growth will have stopped.</p>
<h4 id="3indexofindustrialproduction">3. Index of industrial production</h4>
<p>This is the total output of a number of manufacturing, mining, and gas and electric utility industries and it covers physical product counts, values of shipments, and employment levels. Though this is a small fraction of the total economy, it has historically captured a majority of the fluctuations.</p>
<h4 id="4manufacturingandtradesales">4. Manufacturing and trade sales</h4>
<p>This is the total, inflation adjusted spending in business to business transactions. A drop off in business to business spending is indicative of reduced investment due to low confidence in the economy.</p>
<!--kg-card-end: markdown--><h3 id="lagging-indicators">Lagging Indicators</h3><!--kg-card-begin: markdown--><h4 id="1averagedurationofunemployment">1. Average duration of unemployment</h4>
<p>The average duration, in weeks, that a person is counted as unemployed. This index is inverted and thus when the trend is downwards, people are spending less time unemployed whereas if it is trending up, people are spending more and more time unemployed.</p>
<!--kg-card-end: markdown--><h3 id="extra-indicators">Extra Indicators</h3><p>While all of these indicators are useful, there are also some personal indicators that are not covered, that I also think are crucially important to to understanding what is going on in an economy at any given time and all of these are market indicators.</p><!--kg-card-begin: markdown--><h4 id="1overnightindexedswaps">1. Over Night Indexed Swaps</h4>
<p>These indicators are extremely good at showing credit risk in markets as it is a direct representation of the difference between safe government bonds and what interest rate a bank is willing to offer another bank. If the spread is large enough, it is indicative of a credit crisis as banks are not willing to lend to other banks without the other bank paying a premium.</p>
<h4 id="2highyieldbondspreadjunkbondspread">2. High Yield Bond Spread/Junk Bond Spread</h4>
<p>This is the spread between safe government bonds and low quality bonds that are not of investment grade. These indicators are also good at showing credit risk as investors are demanding a premium and it shows their risk tolerance as the size of the spread shows that they will only invest for big returns to match the perceived risk</p>
<h4 id="3marketvolatilityindicators">3. Market Volatility indicators</h4>
<p>These indicators do not in themselves indicate a recession but they let you know how volatile a market is and recessions are extremely volatile times for markets, so lots of volatility along with numerous other indicators is hugely indicative of a crisis.</p>
<h4 id="4theeconomistintelligenceunitsyieldcurvetogdpspread">4. The Economist Intelligence Unit&apos;s Yield Curve to GDP spread</h4>
<p>The <a href="https://www.economist.com/graphic-detail/2019/07/27/yield-curves-help-predict-economic-growth-across-the-rich-world">Economist had a fantastic piece about the predictive power of the yield curve as outside the US</a>, it is not a predictor of recessions at all, in fact it has not predictive power whatsoever. The team at the Data Unit decided to see if they could come up with a method to have the same predictive power and noticed that for ever percentage point the Yield Curve flattens or inverts in a given nation, GDP tends to drop by half a percentage point</p>
<!--kg-card-end: markdown--><h2 id="a-note-on-data-sources">A note on Data Sources</h2><p>I would love to have the same kind of data that the US has so easily available to an idiot like me who&apos;s just good at google and research, but sadly it&apos;s harder to find. Generally the US will have basically all it&apos;s data coming from the <a href="https://fred.stlouisfed.org">St. Louis Federal Reserve FRED</a> and other nations will probably use a combination of <a href="https://tradingeconomics.com">Trading Economics</a> and <a href="https://tradingview.com">Trading View</a> until I figure out how to properly identify and use data in places like <a href="https://sdw.ecb.europa.eu/">ECB Data Warehouse</a>.</p><hr><h2 id="other-indicators-i-like">Other Indicators I Like</h2><p><a href="https://www.npr.org/podcasts/510325/the-indicator-from-planet-money"><strong>The Indicator from Planet Money</strong></a><br>This is probably my favourite daily podcast. It&apos;s generally less then 10 minutes, and covers some of the most interesting things happening in the world of economics for JOBS DAY to the Yield Curve. Also Stacey and Cardiff are great for a back and fourth on twitter! Though I&apos;m still annoyed the TED Spread isn&apos;t an indicator since that&apos;s the original Indicator from back in 2008</p><p><a href="https://www.npr.org/podcasts/510289/planet-money"><strong>Planet Money Podcast</strong></a><br>This is what got me started into thinking about predicting recessions by having daily and sometimes several times per day podcasts, with time stamps so you knew exactly what was happening, as it was happening in 2008. Post 2008 they have reported on why it all happened, got some of the assets responsible and started coving more general economic stories but they are no less interesting! I just hope their coverage will be the same in the next major crisis</p><p><a href="https://www.calculatedriskblog.com"><strong>Calculated Risk blog by Bill McBride</strong></a><br>Comprehensive, in depth analysis of an astonishing array of topics related to the US Economy with the odd prediction about where we are going and a track record of being right</p><p><a href="https://www.economist.com/"><strong>The Economist</strong></a><br>A Brilliant Magazine and Podcast provider with interesting stories as well as having in depth analysis of <a href="https://pca.st/IKHH">what&apos;s going on from day to day in the world</a>, in <a href="https://pca.st/VijH">financial markets</a>, in <a href="https://pca.st/jOgf">tech</a>, or <a href="http://www.eiu.com/home.aspx">Data</a>.</p><p><a href="https://pca.st/6BWU"><strong>Trade Talks</strong></a><br>A Podcast about trade from trade wonks. Simple. Also includes bad jokes about double underscores.</p>]]></content:encoded></item><item><title><![CDATA[Estimating How Many Pits DPRK Has, Part 1.5 New Numbers]]></title><description><![CDATA[<!--kg-card-begin: markdown--><p>In <a href="https://legendary.industries/2018/07/24/estimating-how-many-pits-dprk-has/">Part 1</a> I had a guesstimate at the production capacity of North Korea to make fissile material and other relevant materials for their nuclear weapons. I wanted to talk a little about their testing regime and also about some considerations about bomb design, missiles and missions, and I&apos;</p>]]></description><link>https://legendary.industries/part-1-5-new-numbers/</link><guid isPermaLink="false">5d52dcde59bbd34cb3bdf9de</guid><dc:creator><![CDATA[Paddy Kerley]]></dc:creator><pubDate>Mon, 30 Jul 2018 21:30:47 GMT</pubDate><content:encoded><![CDATA[<!--kg-card-begin: markdown--><p>In <a href="https://legendary.industries/2018/07/24/estimating-how-many-pits-dprk-has/">Part 1</a> I had a guesstimate at the production capacity of North Korea to make fissile material and other relevant materials for their nuclear weapons. I wanted to talk a little about their testing regime and also about some considerations about bomb design, missiles and missions, and I&apos;ve been working on that, but some things have come to light that I want to discuss first.</p>
<p>First and foremost, I missed a really, really important <a href="http://isis-online.org/uploads/isis-reports/documents/Kangsong_25May2018_final.pdf">pdf from David Albright at ISIS</a> on Kangson and it&apos;s production capacity based on his figures and on US Government figures that&apos;s he&apos;s privy to. And secondly, I&apos;m not happy with my HEU numbers and I think I made a mistake. I don&apos;t think it&apos;s right to stealth edit out my figures so I&apos;m going to keep them and cover Albtight&apos;s figures as well as my new production numbers.</p>
<h2 id="albrightsnumbers">Albright&apos;s Numbers</h2>
<p>As I said above, I think Albright has a very interesting pdf filled with new data. Personally if anyone is close to knowing their stocks of fissile material, it&apos;s Albright so with that in mind, I want to look into what he has, discuss it and take it into account for further discussions on estimating how many pits North Korea is capable of producing.</p>
<h6 id="heu">HEU</h6>
<p>Albright accepts, though with some skepticism, the numbers of his US Government sources, giving an estimate of &quot;6000-12000 or more P2 centrifuges&quot; which I think is A LOT and given that he thinks it&apos;s capable of 600Kg to 1000Kg of HEU production, I&apos;m way off. Even my wrong numbers in my last post don&apos;t come cose to that. Even with my fixed estimates I&apos;d come more around <a href="https://duckduckgo.com/?q=0.04*6000&amp;atb=v79-2__&amp;ia=calculator">240Kg</a> to <a href="https://duckduckgo.com/?q=0.04*12000&amp;atb=v79-2__&amp;ia=calculator">480Kg</a>.</p>
<p>Now Albright&apos;s a much smarter guy than me, and I&apos;m more inclined to believe his numbers rather than mine, but I&apos;m having trouble squaring this circle since I can&apos;t verify his numbers. Is he talking in terms of cascade&apos;s or centrifuges? Or interchangeably using cascade and centrifuge? Because if Kangson is packed with a cascade per square meter rather than a centrifuge per sqm, then all of a sudden, you have a lot more centrifuges and a lot more production bringing those numbers into closer to my current new estimates below.</p>
<h6 id="pu">Pu</h6>
<p>Albright has a hard cap on 30Kg of Pu processed from unloaded fuel at the 5MWe reactor. I&apos;m inclined to believe this as Chris mentioned that <a href="https://acwpodcast.slack.com/archives/C3TDZPKGA/p1532388273000063?thread_ts=1531845517.000524">Reprocessing is a dirty, nasty, and very visible process</a> and the reprocessing facility at Yongbyon has been quiet in imagery and pretty cold in thermal signatures implying that there is very little going on in terms of reprocessing. Also interesting to note that Albright doesn&apos;t think that much has gone on in the way of reprocessing since 2007 when he estimated that North Korea had <a href="https://web.archive.org/web/20121017211603/http://www.isis-online.org/publications/dprk/DPRKplutoniumFEB.pdf">28Kg to 50Kg</a> of Pu 239 that was usable.</p>
<h6 id="othernotes">Other Notes</h6>
<p>One of my goals with this series of posts was to either verify the <a href="https://thediplomat.com/2017/08/us-intelligence-north-korea-may-already-be-annually-accruing-enough-fissile-material-for-12-nuclear-weapons/">DIA&apos;s estimate</a> of having 60 pits but more importantly, that North Korea was making enough fissile material for 12 more each year. The report &quot;assumes the use of composite pit core designs&quot;. Albright had some thoughts on this;</p>
<blockquote>
<p>In one report, the U.S. indicated that North Korea had up to 60 nuclear weapons. In our analysis, I would interpret this value as not including losses and being in the upper tail of the first distribution.<br>
I would stress that in our analysis a value of 60 represents a worst case.<br>
And I would also stress that our base estimate is 14-34 nuclear weapons, reflecting on-going uncertainties about the status and operation of an older centrifuge plant.</p>
</blockquote>
<p>This would be where my thinking is going. It doesn&apos;t seem that North Korea has that kind of production capacity. Albright says that it&apos;s an absolute worst case, which may imply a third site, which is the other goal of this series. If I can&apos;t find a way to verify the DIA&apos;s estimate, then that&apos;s because they know more than they are letting on about North Korea&apos;s capacity which opens up routes for further analysis on suspect sites at locations like <a href="http://www.nti.org/learn/facilities/741/">Hagap</a>, <a href="http://www.nti.org/learn/facilities/743/">Bakcheon</a>, or <a href="http://www.nti.org/learn/facilities/744/">Taecheon</a> to name just a few as the NTI database has many suspected nuclear sites with unknown uses from reactors to enrichment facilities.</p>
<h2 id="correctingmynumbers">Correcting My Numbers</h2>
<p>As much of a valiant effort as I made, in making my numbers, I believe that during the first drafts of of the first post, I had estimated a LOT higher numbers of centrifuges for Kangson&apos;s capacity, and maybe I was right given what Albright and the US Gov estimated, but I never changed my estimates after rounding down the number of centrifuges. So I want to correct that. I also think that unless the P-2 centrifuge is between 0.5x and 0.75x smaller than the P-1 it&apos;s highly unlikely that at 1 square metre per centrifuge, that there are 6000 to 120000 centrifuges in that building. But as I have said it&apos;s unlikely that I&apos;m right and Albright is wrong.</p>
<p>The long and short of it is that Sig Hecker say&apos;s that Yongbyon is capable of making <a href="https://fsi-live.s3.us-west-1.amazonaws.com/s3fs-public/Heckerpresentation1.pdf">40Kg of 90% HEU</a> with it&apos;s 2000 centrifuges. That&apos;s 40 grams per centrifuge. If that&apos;s the case, then the total amount of capacity from my estimate of 6675 centrifuges is <a href="https://duckduckgo.com/?q=0.04*6675&amp;atb=v79-2__&amp;ia=calculator">267Kg</a> total and for Kangson with 4475 centrifuges, that&apos;s <a href="https://duckduckgo.com/?q=0.04*4675&amp;atb=v79-2__&amp;ia=calculator">187Kg</a>. As I also said above, if cascade and centrifuge are being used interchangeably, then there&apos;s reason to believe this is the case, but then we&apos;re looking at 3 or 4 centrifuge&apos;s per sqm, which makes the numbers make sense, but that again requires that cascade and centrifuge are being used interchangeably.</p>
<p>Though if you think these numbers are straight up wrong, ping me with an @legendarypatman on twitter or on the <a href="https://acwpodcast.slack.com/archives/C3TDZPKGA/p1531845517000524">ACWP Slack thread</a> or <a href="https://legendary.industries/about-contact/">contact me via the About page</a> because as close as my original numbers seem, I don&apos;t think I can justify them.</p>
<h2 id="newtotalsforyearlyproduction">New Totals for Yearly Production</h2>
<p>Finally, an updated table of production. Pu is still a static number as the 5MWe reactor is still seems unused or has been running very minimally and the ELWR doesn&apos;t seem to be ready to run just yet.</p>
<table>
<thead>
<tr>
<th style="text-align:left">Material</th>
<th style="text-align:center">My Minimum qty</th>
<th style="text-align:center">My Maximum qty</th>
<th style="text-align:center">Albright/USG Min</th>
<th style="text-align:center">Albright/USG Max</th>
</tr>
</thead>
<tbody>
<tr>
<td style="text-align:left">HEU</td>
<td style="text-align:center">187Kg</td>
<td style="text-align:center">267Kg</td>
<td style="text-align:center">600Kg</td>
<td style="text-align:center">1000Kg</td>
</tr>
<tr>
<td style="text-align:left">Pu</td>
<td style="text-align:center">56Kg - 77Kg</td>
<td style="text-align:center">76Kg - 103Kg</td>
<td style="text-align:center">N/A</td>
<td style="text-align:center">30Kg</td>
</tr>
<tr>
<td style="text-align:left">2H</td>
<td style="text-align:center">???</td>
<td style="text-align:center">???</td>
<td style="text-align:center">N/A</td>
<td style="text-align:center">N/A</td>
</tr>
<tr>
<td style="text-align:left">6Li</td>
<td style="text-align:center">120Kg</td>
<td style="text-align:center">???</td>
<td style="text-align:center">N/A</td>
<td style="text-align:center">N/A</td>
</tr>
<tr>
<td style="text-align:left">3H</td>
<td style="text-align:center">60g (IRT-2000 only)</td>
<td style="text-align:center">???</td>
<td style="text-align:center">N/A</td>
<td style="text-align:center">N/A</td>
</tr>
</tbody>
</table>
<hr>
<p>This post wouldn&apos;t have been possible without a great conversation that Peter started in the <a href="https://acwpodcast.slack.com/archives/C3TDZPKGA/p1531845517000524">ACWP Community Slack</a> as well as help from Peter, Andrew, Retin, Chris, Nathan, Kieran and Dylan. Massive thanks to you guys for the entertaining conversation, facts, fact checking and finding awesome sources!</p>
<!--kg-card-end: markdown-->]]></content:encoded></item><item><title><![CDATA[Estimating How Many Pits DPRK Has, Part 1: Relevant Materials Production]]></title><description><![CDATA[<!--kg-card-begin: markdown--><p>Nearly a year ago, a <a href="https://thediplomat.com/2017/08/us-intelligence-north-korea-may-already-be-annually-accruing-enough-fissile-material-for-12-nuclear-weapons/">report leaked from the DIA</a> said that the DPRK had enough fissile material for 60 pits and was making enough fissile material for 12 more each year. A few days ago, the <a href="https://www.armscontrolwonk.com/archive/1205628/north-koreas-new-old-enrichment-site-kangson/">OSINT Team at MIIS</a> had a slam dunk analysis of where DPRK has</p>]]></description><link>https://legendary.industries/estimating-how-many-pits-dprk-has/</link><guid isPermaLink="false">5d52dcde59bbd34cb3bdf9db</guid><category><![CDATA[Nuclear]]></category><category><![CDATA[DPRK]]></category><dc:creator><![CDATA[Paddy Kerley]]></dc:creator><pubDate>Tue, 24 Jul 2018 18:08:19 GMT</pubDate><content:encoded><![CDATA[<!--kg-card-begin: markdown--><p>Nearly a year ago, a <a href="https://thediplomat.com/2017/08/us-intelligence-north-korea-may-already-be-annually-accruing-enough-fissile-material-for-12-nuclear-weapons/">report leaked from the DIA</a> said that the DPRK had enough fissile material for 60 pits and was making enough fissile material for 12 more each year. A few days ago, the <a href="https://www.armscontrolwonk.com/archive/1205628/north-koreas-new-old-enrichment-site-kangson/">OSINT Team at MIIS</a> had a slam dunk analysis of where DPRK has a second HEU enrichment facility and reporting from <a href="https://thediplomat.com/2018/07/exclusive-revealing-kangson-north-koreas-first-covert-uranium-enrichment-site/">Ankit Panda</a> confirmed the analysis. This site has been covertly been operating from maybe as far back as 2003. If that&apos;s the case, this place has been operating for 15 years producing HEU. This got me thinking, what kind of manufacturing capability does DPRK have when it comes to making the materials required for these pits?</p>
<p>The DIA report &quot;assumes the use of composite pit core designs&quot; so let&apos;s examine what composite can mean. It&apos;s an important distinction as it is an indicator that Pu-239 is scarce and as I&apos;ll lay out later, it is in very short supply for North Korea. Composite cores are made of a combination of HEU and Pu but I think with DPRK it is worth examining some other options given how low some estimates of North Korea&apos;s stockpile of Pu-239 is. I believe the DIA maybe using composite to mean a combination of fissile material with a second gas or solid used to &quot;boost&quot; the bomb. Below is a list of potential candidates available to North Korea for their pits;</p>
<ol>
<li>HEU/Pu composite</li>
<li>HEU and/or Pu/3H composite</li>
<li>HEU and/or Pu/DT(2H3H) composite</li>
<li>HEU and/or Pu/6Li2H composite</li>
</ol>
<h1 id="production">Production</h1>
<p>With a list of potential candidates for their pits, let&apos;s have a look at the production capabilities for each of the listed materials.</p>
<h2 id="heu">HEU</h2>
<p>To make HEU, you need to enrich U-235. The three main techniques are Gas or Thermal Diffusion, via Centrifuge or via Laser Separation. Diffusion is highly unlikely as both methods generate a lot of heat and would be readily visible in thermal imagery from satellites. North Korea does have a <a href="http://www.nti.org/learn/facilities/742">Laser Research facility that is suspected as a laser enrichment facility</a> but little is known about it in the open source as to whether it has been successful or if it was, it&apos;s scale. This leaves North Korea with just Centrifuges which they use at both their known facilities in Yongbyon and Kangsong.</p>
<h6 id="yongbyon">Yongbyon</h6>
<p><a href="https://twitter.com/SiegfriedHecker">Sig Hecker</a> is one of the few people to have ever <a href="https://nautilus.org/napsnet/napsnet-special-reports/a-return-trip-to-north-koreas-yongbyon-nuclear-complex/">been inside Yongbyon</a> and he reported that they are P-2 centrifuge&apos;s and that there are 2000 of them at the complex, capable of producing <a href="https://fsi-live.s3.us-west-1.amazonaws.com/s3fs-public/Heckerpresentation1.pdf">40kg of 90%</a>.</p>
<h6 id="kangson">Kangson</h6>
<p>Assuming that Kangson is using the same setup as Yongbyon, it&apos;s safe to say that the centrifuges are P-2 as well. P-2 centrifuges are similar to P-1 as seen at Natanz but the internal rotors are made of Maraging Steel instead of Aluminium. Since they are similar to the ones at <a href="https://web.archive.org/web/20180104184156/http://www.isis-online.org:80/publications/iran/natanz03_02.html">Natanz we can assume that they took up 1sqm of floor space</a>. And knowing that Kangson facility is 110m wide and 50m long, giving a total area of 5500 sqm. In that space, the maximum number of centrifuges, if the building is absolutely packed is roughly 5500. Iran wasn&apos;t using the total floor space of their facilities, only 83% of floor space, so I think we can assume that the DPRK is using a similar number so there is space for staff, control equipment, power etc, lets say 85% giving them roughly 4675sqm of centrifuges or 4675 centrifuges.</p>
<h6 id="total">Total</h6>
<p>Estimating the capacity of 6 675 centrifuges at both facilities, given Sig Hecker&apos;s numbers would be 534Kg of 90% U-235 per year, at 100% capacity or 374Kg 90% U-235 at just Kangsong as all of the capacity from Yongbyon may be required to make LEU for the ELWR reactor at Yongbyon. These numbers are likely not correct as they are estimates if the facilities are running at 100% capacity and that is currently an unknown.</p>
<h2 id="pu">Pu</h2>
<p>Pu-239 is made by breeding U-238 in nuclear reactors and then processing the fuel after unloading to separate the Pu-239 from the U-238. North Korea has access to two ways of breeding Pu-239. The first and what I believe is the less likely option is in their IRT-2000 Reactor and the second is the 5MWe Reactor, both are at Yongbyon. <a href="https://en.wikipedia.org/wiki/David_Albright">David Albright</a> has a paper that estimates as of 2007, North Korea had <a href="https://web.archive.org/web/20121017211603/http://www.isis-online.org/publications/dprk/DPRKplutoniumFEB.pdf">46 Kg to 64 Kg with 28 Kg to 50 Kg for use in weapons</a>.</p>
<h6 id="5mwereactor">5MWe Reactor</h6>
<p>Using the same paper from Albright, he estimates that North Korea could produce 10Kg to 13Kg every 20 months and in the 11 years since then, North Korea had the capacity to produce an astonishing 4092Kg IF there were core changes, but I haven&apos;t been able to verify core changes outside of 1994, 2005 and 2007, as listed in the paper. There MAY have been a fuel loading in <a href="https://www.38north.org/2016/04/yongbyon041516/">2016</a> or <a href="https://www.38north.org/2017/07/yongbyon071417/">2017</a> which may bring them up to as much as 56Kg to 77Kg though it&apos;s very hard to verify unless they are covertly loading and unloading fuel though there is no evidence of that.</p>
<h6 id="irt2000">IRT-2000</h6>
<p>It isn&apos;t really feasible to use the IRT-2000 to produce Pu-239 as it&apos;s <a href="http://www.nti.org/learn/facilities/767/">&quot;has operated only intermittently due to North Korea&#x2019;s inability to obtain new fuel&quot;</a> since the collapse of the Soviet Union. Though it appears that <a href="https://web.archive.org/web/20160730052528/http://www.isis-online.org/uploads/isis-reports/documents/IRT_Reactor_March_9_2016_FINAL.pdf">North Korea has been able to manufacture it&apos;s own fuel</a> to keep this reactor running. According to Albright&apos;s paper, it is capable of producing &quot; at most a few hundred grams&quot;, though the  U.S. Department of Energy estimates that it could have been used to produce up to 1 Kg to 2 kg of Pu-239. I find it is unlikely that the IRT-2000 is used for this purpose since it&apos;s not able to produce much, and it has two other purposes. One is in another paper by Albright and it is the <a href="https://web.archive.org/web/20180723211815/http://www.isis-online.org/publications/dprk/CivilNuclearNK.pdf">production of iodine 131 for treating thyroid cancers</a> while the second is something I will cover later, the production of 3H.</p>
<h6 id="total">Total</h6>
<p>Assuming that the 5MWe reactor hasn&apos;t been loaded it is safe to assume that they have approximately 56Kg to 77Kg total Pu-239, not accounting for Pu-240 contamination. If as claimed in 2013, <a href="https://web.archive.org/web/20130407063220/http://www.bbc.co.uk/news/world-asia-21999193">North Korea restarted operation of the 5MWe reactor</a>, they would have 66Kg to 90Kg and if it was loaded again in <a href="https://www.38north.org/2016/04/yongbyon041516/">2016</a> or <a href="https://www.38north.org/2017/07/yongbyon071417/">2017</a> may have happened, they would have a total of 76Kg to 103Kg of Pu-239</p>
<h6 id="anoteontheelwr">A Note on the ELWR</h6>
<p>North Korea has been building a <a href="https://www.globalsecurity.org/wmd/world/dprk/yongbyon-elwr.htm">25 MWe to 30 MWe ELWR</a> at the facility at Yongbyon. &quot;While a light-water power reactor can be used to produce plutonium, it is not optimal for this purpose, so it must be assumed that the Experimental Light Water Reactor (ELWR) is intended to develop techniques and train personnel to lay the foundation for much larger reactor program ...&quot; It is plausible that this is a peaceful use of nuclear power to generate electrical power, though it may also be used for the production of Pu-239. This is easier to monitor as LWR&apos;s have batch reloading which is harder to hide and though not optimal, <a href="https://www.38north.org/2013/05/yongbyon050113/">&quot;While the reactor seems designed to produce electricity for the civilian economy, it will have a residual capability to produce plutonium that can be used for nuclear weapons.&quot;</a></p>
<h2 id="2h">2H</h2>
<p>2H or Deuterium, sometimes abbreviated to D, is a stable isotope of Hydrogen used as heavy water in some nuclear reactors, like North Korea&apos;s 5MWe reactor at Yongbyon and also can be used to boost and store weapons as it is a stable gas. It is <a href="https://web.archive.org/web/20170320144245/http://www.vertic.org/media/assets/TV/TV152.pdf">produced via distillation or electrolysis</a> of seawater to extract naturally occurring 2H. This is also relatively easy to hide as it would just be a plant next to the sea, though lacking output. It can also be produced by with <a href="https://patents.google.com/patent/US4620909">Lasers</a> which North Korea could be looking into at their <a href="http://www.nti.org/learn/facilities/742/">Laser Research Institute</a> but there is no evidence of this.</p>
<h6 id="total">Total</h6>
<p>Currently there is no known estimate of North Korea&apos;s production capability for 2H. Given their access to the sea however and their potential future need for 2H in a Pu production HWR reactor, it&apos;s safe to say that they have a reasonable capability that most likely is not a limiting factor for their pit designs.</p>
<h2 id="6li">6Li</h2>
<p>6Li is a stable isotope of Lithium that naturally occurs and is around 7.5% of Lithium deposits. When a neutron splits it, it creates 4He but more importantly, 3H which can boost weapons. Information about the production of 6Li is extremely controlled information as it has very little use out of boosting fission weapons or as a neutron absorber in fusion weapons. ISIS has an article stating that <a href="http://isis-online.org/isis-reports/detail/north-koreas-lithium-6-production-for-nuclear-weapons#fn2">mercury-based column exchange process (COLEX)</a> and procured this around 2012. ISIS notes; &quot;... the purchase of mercury in combination with lithium hydroxide is a strong indicator that North Korea is using the chemicals in a mercury-dependent lithium 6 production process.&quot;</p>
<h6 id="total">Total</h6>
<p>Currently there is no known estimate of North Korea&apos;s production capability for 6Li. North Korea <a href="https://undocs.org/S/2017/150">attempted to export 10Kg of 99.99% 6Li per month in 2016</a> and given those figures, it&apos;s safe to assume that they are processing at least 120Kg per year of 6Li and this is just for the export market and does not account for how much 6Li they may need internally for its own uses. This is a substantial amount of 6Li production and I think it puts to bed the rumour of the Lithium shortage in North Korea, especially when coupled with news reports that <a href="https://qz.com/1004330/north-korea-is-sitting-on-trillions-of-dollars-on-untapped-wealth-and-its-neighbors-want-a-piece-of-it/">North Korea might have trillions of USD in untapped mineral wealth</a></p>
<h2 id="3h">3H</h2>
<p>3H is a radioactive isotope of hydrogen and crucially, it has a half-life of 12 years. There are two main ways for North Korea to access 3H, <a href="https://www.armscontrolwonk.com/archive/1201373/producing-tritium-in-north-korea/">importing and breeding it in a rector</a>. Importing is unlikely given that no producer of 3H would export it to them and China, who does produce 3H, has been cutting down on sanctioned exports. They can also 6Li2H as listed above but this is a less efficient method of for the production of 3H as it needs to be incorporated into the pit and during fission, the 6Li2H steals a neutron from the chain reaction slowing it down.</p>
<h6 id="irt2000">IRT-2000</h6>
<p>6Li is easily breed in the control channels of the IRT-2000, that run though the core and are exposed to the maximum neutron flux. To quote extensively from the above link;</p>
<blockquote>
<p>Over an eight-month operating cycle, this cubic centimetre target of lithium-6 could generate about 80 milligrams of tritium. To generate three grams of tritium (an approximate amount used in modern boosted weapons), North Korea would therefore have to irradiate approximately nineteen grams of lithium-6 over an eight-month operational cycle.</p>
</blockquote>
<blockquote>
<p>A single target containing nineteen grams of lithium-6 (equivalent to a slug roughly 3cm in diameter and 5cm in length) could potentially generate enough tritium for a single nuclear weapon in one yearly operational cycle.</p>
</blockquote>
<blockquote>
<p>Assuming that only four of the IRT&#x2019;s experimental channels are located within the reactors core, North Korea would be able to generate enough tritium for twenty &#x2018;DT&#x2019; boosted nuclear weapons per year by irradiating five such slugs in each channel.</p>
</blockquote>
<h6 id="total">Total</h6>
<p>Given the data above, one 19g slug can generate 3g of 3H. Exposing 20 slugs as described above would allow for the production of 60g of 3H over the yearly operating cycle, giving North Korea a significant amount of 3H for use in pits.</p>
<h2 id="otherboostingcompounds">Other boosting compounds</h2>
<h6 id="6li2h">6Li2H</h6>
<p>Is a solid, low density compound that is made by treating 6Li with 2H gas. The reaction can occur at as low as 29 Celsius, though it only has a yield of 60%, which may be ideal for North Korea as it hides the activity. Though more temperature and pressure do speed up the process. I can&apos;t find solid numbers for what mass of material can be processed per hour or per day, given that you can treat 6Li with 2H in 2 hours, at 600 Celsius and get a yield of 98%, it seems to be an issue of how much 6Li and 2H North Korea has and not how long it takes. <a href="https://ntrs.nasa.gov/search.jsp?R=19720066808&amp;hterms=lithium+hydride+fuel&amp;qs=Ntx%3Dmode%2520matchallpartial%2520%26Ntk%3DAll%26N%3D0%26Ntt%3D%2522lithium%2520hydride%2522%2520fuel">All temperatures and yield are in this paper</a>.</p>
<h6 id="2h3hdt">2H3H/DT</h6>
<p>Being a gaseous compound, it&apos;s not difficult to manufacture when you have the raw materials and it just requires a form of sealed storage with a top up every 12 years to maintain the supply of 3H. It has been estimated that <a href="https://www.armscontrolwonk.com/archive/1201373/producing-tritium-in-north-korea/">&quot;... North Korea would be able to generate enough tritium for twenty &#x2018;DT&#x2019; boosted nuclear weapons per year ...&quot;</a></p>
<h6 id="letsjustrecapourtotalyearlyproduction">Lets just recap our total yearly production</h6>
<p>Below are yearly production figures with the exception of Pu, that is their total stockpile of Pu.</p>
<table>
<thead>
<tr>
<th style="text-align:left">Material</th>
<th style="text-align:center">Minimum Quantity</th>
<th style="text-align:center">Maximum Quantity</th>
</tr>
</thead>
<tbody>
<tr>
<td style="text-align:left">HEU</td>
<td style="text-align:center">374Kg</td>
<td style="text-align:center">534Kg</td>
</tr>
<tr>
<td style="text-align:left">Pu</td>
<td style="text-align:center">56Kg - 77Kg</td>
<td style="text-align:center">76Kg - 103Kg</td>
</tr>
<tr>
<td style="text-align:left">2H</td>
<td style="text-align:center">???</td>
<td style="text-align:center">???</td>
</tr>
<tr>
<td style="text-align:left">6Li</td>
<td style="text-align:center">120Kg</td>
<td style="text-align:center">???</td>
</tr>
<tr>
<td style="text-align:left">3H</td>
<td style="text-align:center">60g (IRT-2000 only)</td>
<td style="text-align:center">???</td>
</tr>
</tbody>
</table>
<p>In <a href>Part 2</a>, I&apos;m going to examine what designs North Korea is using for it&apos;s pits so I can better project how many pit&apos;s of what type they have in service and how many they are capable of making per year.</p>
<hr>
<p>This post wouldn&apos;t have been possible without a great conversation that Peter started in the <a href="https://acwpodcast.slack.com/archives/C3TDZPKGA/p1531845517000524">ACWP Community Slack</a> as well as help from Peter, Andrew, Rethin, Chris, and Nathan. Massive thanks to you guys for the entertaining conversation, facts, fact checking and finding awesome sources!</p>
<!--kg-card-end: markdown-->]]></content:encoded></item><item><title><![CDATA[Update on the Chemical Weapons Attack in Douma on the 7th of April]]></title><description><![CDATA[<!--kg-card-begin: markdown--><p>The OPCW Fact Finding Mission has reported on the technical details of the attack and there are some key takeaways from my <a href="https://legendary.industries/2018/04/19/chemical-weapons-confirmation-bias-and-missing-the-point-in-douma/">previous post</a></p>
<p>I speculated based on imagery evidence at the time that Chlorine Gas and Sarin Gas were used.<a href="https://www.opcw.org/news/article/opcw-issues-fact-finding-mission-reports-on-chemical-weapons-use-allegations-in-douma-syria-in-2018-and-in-al-hamadaniya-and-karm-al-tarrab-in-2016/">What the FFM reported</a> was;</p>
<blockquote>
<p>The results show that</p></blockquote>]]></description><link>https://legendary.industries/update-on-the-chemical-weapons-attack-in-douma-on-the-7th-of-april/</link><guid isPermaLink="false">5d52dcde59bbd34cb3bdf9d9</guid><category><![CDATA[Syria]]></category><category><![CDATA[Chemical Weapons]]></category><dc:creator><![CDATA[Paddy Kerley]]></dc:creator><pubDate>Sat, 07 Jul 2018 16:13:28 GMT</pubDate><content:encoded><![CDATA[<!--kg-card-begin: markdown--><p>The OPCW Fact Finding Mission has reported on the technical details of the attack and there are some key takeaways from my <a href="https://legendary.industries/2018/04/19/chemical-weapons-confirmation-bias-and-missing-the-point-in-douma/">previous post</a></p>
<p>I speculated based on imagery evidence at the time that Chlorine Gas and Sarin Gas were used.<a href="https://www.opcw.org/news/article/opcw-issues-fact-finding-mission-reports-on-chemical-weapons-use-allegations-in-douma-syria-in-2018-and-in-al-hamadaniya-and-karm-al-tarrab-in-2016/">What the FFM reported</a> was;</p>
<blockquote>
<p>The results show that no organophosphorous nerve agents or their degradation products were detected in the environmental samples or in the plasma samples taken from alleged casualties. Along with explosive residues, various chlorinated organic chemicals were found in samples from two sites, for which there is full chain of custody</p>
</blockquote>
<p>Which is to say that there was no Sarin or the compounds it breaks down into found in the environment or in blood sample from victims. Even if imagery shows injuries consistent with Sarin usage. This makes a lot of sense since the canisters dropped from the two Mi-8 helicopters are only consistent with the use or Chlorine Gas.</p>
<p>As well as this, the FFM says that &quot;various chlorinated organic chemicals were found in samples from two sites&quot; which is to say that Chlorine gas was used and was found in samples at both sites, which I assume means in both environment and blood samples.</p>
<p>What I find interesting is that the OPCW recently voted to <a href="https://www.theguardian.com/world/2018/jun/05/opcw-chemical-weapons-watchdog-special-session-russia-syria">attribute CW attacks</a> but there was no attribution of who committed the attack in either Douma on the 7th of April or in Al-Hamadaniya on 30 of October 2016 and Karm al-Tarrab 13th of November 2016 which were also included in this report.</p>
<!--kg-card-end: markdown-->]]></content:encoded></item><item><title><![CDATA[What OpSec to Expect for the Kim-Trump Summit]]></title><description><![CDATA[<!--kg-card-begin: markdown--><p>A few weeks ago when North Korea &quot;Disabled&quot; their Nuclear Test Site at Punggye-ri, I had a talk with some of my friends at the Slack Channel for the <a href="https://www.armscontrolwonk.com/archive/author/podcast/">Arms Control Wonk Podcast</a> about some of the measures that the North Korean&apos;s were taking to preserve</p>]]></description><link>https://legendary.industries/expected-opsec-for-the-kim-trump-summit/</link><guid isPermaLink="false">5d52dcde59bbd34cb3bdf9d2</guid><category><![CDATA[OpSec]]></category><dc:creator><![CDATA[Paddy Kerley]]></dc:creator><pubDate>Sun, 10 Jun 2018 19:37:01 GMT</pubDate><content:encoded><![CDATA[<!--kg-card-begin: markdown--><p>A few weeks ago when North Korea &quot;Disabled&quot; their Nuclear Test Site at Punggye-ri, I had a talk with some of my friends at the Slack Channel for the <a href="https://www.armscontrolwonk.com/archive/author/podcast/">Arms Control Wonk Podcast</a> about some of the measures that the North Korean&apos;s were taking to preserve the secrecy of the their program, with some rather extreme measure like taking dosimeters off of journalists and <a href="https://twitter.com/LegendaryPatMan/status/999400530123337728">I had some things to say about that on twitter</a>. That conversation happened again after <a href="https://www.nbcnews.com/news/amp/ncna880896">NBC published an article</a> on what the US IC was expecting and people at the ACWP Slack thought some of the measures were pretty nifty instead of tweeting some short form idea&apos;s, I&apos;d write a bit about what to expect and why</p>
<hr width="50%" align="center">
<h1 id="sowhatdidthearticlemention">So what did the article mention?</h1>
<h2 id="therearethreemainpointsthatthearticlementions">There are three main points that the article mentions:</h2>
<blockquote>
<p>U.S. officials are concerned China has recruited informants among the waiters and other staff in Singapore&#x2019;s restaurants and bars, who are paid to eavesdrop on American customers and report back to their Chinese handlers.</p>
</blockquote>
<p>This isn&apos;t surprising at all. Hotel staff at the Capella Sentosa Hotel and the surrounding area in Singapore are going to by default have a lot of access to both Trump and KJU as they will be serving drinks and food, cleaning rooms and have general proximity to buffets, tea/coffee and water coolers etc where they may just so happen to over hear someone talking about something they shouldn&apos;t be talking about either in person or on the phone.</p>
<p>This is HUMIT 101. This should be totally expected. Yes, the US IC might be more worried about China&apos;s capability&apos;s but this is something that at a minimum everyone should expect. Especially when this is a capability that is so easy to build. It just requires money and a strategy. You blanket a key area that you want to target with you&apos;re informants and have the provide you information in exchange for cash. You find your informants by either staying at the location and following staff after work to find people who need the money. Alternatively you could hack into systems to find employee time tables etc but they won&apos;t give you a full profile of who is the right people for an informant. That requires more leg work.</p>
<blockquote>
<p>Officials also expect electronic surveillance of the summit meeting sites. Americans will sweep for bugs in rooms at the Capella Hotel that could be used for side discussions, and could erect tents inside hotel meeting rooms to block any concealed cameras from viewing classified documents.</p>
</blockquote>
<p>Similarly to above, this isn&apos;t surprising at all. SIGINT should be expected since it is so easily available with the proliferation of computers. For example, a suite with one of the leaders will most likely have air conditioning. But in the modern era, there are no air conditioners, there are computers that cool air to keep a space at a comfortable temperature. An implant in the aircon prior to the summit could allow you to capture video or audio with camera&apos;s and microphones or the TV&apos;s or phones in the room could have had exploits used on them so the software captures data or voice conversations, even if the phones are not in use.</p>
<p>Bug sweeps of the rooms should catch 99% of physical bugs, but finding out if a computer has been exploited isn&apos;t so easy. This is also standard practice of modern Espionage and again, is something that should be totally expected given the proliferation of computing devices.</p>
<p>Interestingly, the article mentions &quot;tents&quot;, this is a SCIF or Sensitive Compartmented Information Facility. The whole point of these tents is that you can read and access TS//SCI information in a secure manner that maintains the confidentiality of the information in the documented.</p>
<blockquote>
<p>Chinese intelligence agencies have shown the ability to penetrate mobile phones even when they are off, and U.S. officials are now told to take their batteries out when they are concerned about eavesdropping, according to a U.S. intelligence official.</p>
</blockquote>
<h2 id="butthearticlealsomentionssomeinterestingotherscenarios">But the article also mentions some interesting other  scenarios:</h2>
<blockquote>
<p>The Chinese, who have been known to bug everything from hotel keys to the gifts given to American visitors,</p>
</blockquote>
<p>This is again, is something to be expected. It should surprise no one that bugs will planted or exploits will be implanted in hostile environments be they physical or electronic environments.</p>
<blockquote>
<p>According to three U.S. officials, in one recent case a top U.S. official working in China repeatedly had trouble with his hotel key card. He had to replace it several times at the front desk because it wouldn&#x2019;t open his door.<br>
He brought one of the key cards back to the U.S., where security officials found a microphone embedded inside, according to the U.S. officials.</p>
</blockquote>
<p>Ok, this is kind of amazing! I&apos;m not entirely sure how exactly this was done but I&apos;d assume there is some form of local storage to store data, a power source for the microphone and form of flat microphone. You can even recycle the method the card uses to unlock the door via NFC or SmartCard Chip to relay data back to it&apos;s Masters.</p>
<blockquote>
<p>Chinese intelligence agencies have shown the ability to penetrate mobile phones even when they are off</p>
</blockquote>
<p>This is also something that should be of much surprise if you have been keeping an eye on exploits related to Intel&apos;s ME/AMT system over the past few years and it&apos;s been demonstrated that when you device is &quot;off&quot; it&apos;s really just in a hardware sleep. <a href="https://www.webcitation.org/68FLdCH2k?url=http://software.intel.com/en-us/articles/architecture-guide-intel-active-management-technology/">Intel themselves even admit this isn&apos;t a bug but a feature</a> where they state:</p>
<blockquote>
<p>Intel&#xAE; AMT stores hardware asset information in flash memory that can be read anytime, even if the PC is powered off</p>
</blockquote>
<p>Since there are known problems with Intel ME, it is possible that you could use something like a Rubber Ducky to run some exploit code, if you get close enough to a computer, you can exploit the system and have persistent access to data on the system. Informants may also be useful for this as they will have the access and may be able to get close enough to access the system.</p>
<p>Granted no phone runs an X86 System but regardless, similar things are in ARM chips by design that allow ARM chips to only run when instructions are received. I don&apos;t know specifically if this is what phones do when they are &quot;off&quot; but even if it doesn&apos;t, the chip will need something to do power management that that chip will be running, similar to Intel&apos;s ME/AMT.</p>
<hr width="50%" align="center">
<h1 id="whatwasntmentioned">What wasn&apos;t mentioned?</h1>
<p>Curiously, I thought it was super interesting that drones where not mentioned. I don&apos;t think that we will see macro scale drones, but the technology has existed from the 70&apos;s for Micro scale drones like the CIA&apos;s Dragonfly Drone</p>
<p><img src="https://legendary.industries/content/images/2018/06/dragonfly-drone.jpg" alt="dragonfly-drone" loading="lazy"></p>
<p>There&apos;s also a technology called the Laser Microphone that allows you to use a laser to turn smooth flat surfaces or even the window&apos;s themselves into microphones to record conversations. If you&apos;re interested and don&apos;t have the money to spend on the kind of solutions you might expect from actors in the Espionage space, <a href="http://www.instructables.com/id/LASER-MICROPHONE/">there&apos;s guide&apos;s online to build your own!</a></p>
<p>Finally there was no mention of how data communications will be achieved since officials may not be able to use phones or get internet connections though regular sources. I woundn&apos;t be surprised if we see a US satellite dish pop up somewhere on site as well as some Harris radio&apos;s that can do both voice and data connections. This would allow US Officials to continue to have safe, encrypted access to classified data in SCIF&apos;s as well as lesser classified data. We may not even see a satellite as we could see the <a href="https://www.harris.com/solution/harris-falcon-iii-anprc-152a-wideband-networking-handheld-radio">Harris Falcon III AN/PRC-152A</a> which has the ability to do satellite voice and data as well as local line of sight tactical radio operations</p>
<hr width="50%" align="center">
<p>Also, don&apos;t expect China to be just doing this. Anyone with an interest will be doing similar things. I would expect at a minimum that Japan, South Korea, France, Germany, the UK, Russia and probably Israel are for sure going to be doing something similar. And this should be expected. This is what Espionage is for. You want to confirm that what you hear from the Official is what is actually happening.</p>
<!--kg-card-end: markdown-->]]></content:encoded></item><item><title><![CDATA[ZeroDays 2018]]></title><description><![CDATA[<!--kg-card-begin: markdown--><p>Holy shit! Yesterday, <a href="https://victorazzam.github.io/">Victor</a>, <a href="https://twitter.com/mystikPeach">Kim</a>, <a href="https://twitter.com/_RobGeraghty_">Rob</a> and myself came second at <a href="https://zerodays.ie">ZeroDaysCTF</a> as part of the SpontaneousWindowsUpdate Team!</p>
<p><img src="https://legendary.industries/content/images/2018/04/ZD-Colleges-CTF-2018---Google-Chrome_039-2.png" alt="ZD-Colleges-CTF-2018---Google-Chrome_039-2" loading="lazy"></p>
<p>It&apos;s crazy that last year I did my first ever CTF and came 29th as part of Team Irelanstein. Since then I&apos;ve done two more and improved gradually</p>]]></description><link>https://legendary.industries/zerodays-2018/</link><guid isPermaLink="false">5d52dcde59bbd34cb3bdf9d1</guid><category><![CDATA[CTF]]></category><dc:creator><![CDATA[Paddy Kerley]]></dc:creator><pubDate>Fri, 27 Apr 2018 17:23:26 GMT</pubDate><content:encoded><![CDATA[<!--kg-card-begin: markdown--><p>Holy shit! Yesterday, <a href="https://victorazzam.github.io/">Victor</a>, <a href="https://twitter.com/mystikPeach">Kim</a>, <a href="https://twitter.com/_RobGeraghty_">Rob</a> and myself came second at <a href="https://zerodays.ie">ZeroDaysCTF</a> as part of the SpontaneousWindowsUpdate Team!</p>
<p><img src="https://legendary.industries/content/images/2018/04/ZD-Colleges-CTF-2018---Google-Chrome_039-2.png" alt="ZD-Colleges-CTF-2018---Google-Chrome_039-2" loading="lazy"></p>
<p>It&apos;s crazy that last year I did my first ever CTF and came 29th as part of Team Irelanstein. Since then I&apos;ve done two more and improved gradually but coming second, at the third largest CTF of it&apos;s kind is kinda crazy! Working since September with the guys has been awesome and I&apos;m really glad I got to meet the guys and work with them! &lt;3</p>
<p>For the record, my costume was a dragon. Dragons are giant lizards with wings. Dinosaurs are giant lizards. Therefore, dinosaur onesie + fairy wings = dragon. The wings chose me and I looked fabulous!</p>
<blockquote class="twitter-tweet" data-lang="en"><p lang="en" dir="ltr">Team SpontaneousWindowsUpdate are loving <a href="https://twitter.com/hashtag/ZeroDaysCTF?src=hash&amp;ref_src=twsrc%5Etfw">#ZeroDaysCTF</a>  Huge thanks to all the sponsors <a href="https://twitter.com/itbdublin?ref_src=twsrc%5Etfw">@itbdublin</a> <a href="https://twitter.com/edgescan?ref_src=twsrc%5Etfw">@edgescan</a> <a href="https://twitter.com/Integrity360?ref_src=twsrc%5Etfw">@Integrity360</a> <a href="https://twitter.com/wardsolutions?ref_src=twsrc%5Etfw">@wardsolutions</a> <a href="https://twitter.com/Deloitte?ref_src=twsrc%5Etfw">@Deloitte</a> <a href="https://twitter.com/bhconsulting?ref_src=twsrc%5Etfw">@bhconsulting</a><a href="https://twitter.com/amazon?ref_src=twsrc%5Etfw">@amazon</a> @skillnetcourses <a href="https://twitter.com/ppentestlabs?ref_src=twsrc%5Etfw">@ppentestlabs</a> <a href="https://twitter.com/ReliaQuest?ref_src=twsrc%5Etfw">@ReliaQuest</a> <a href="https://t.co/tgEREEnUJN">pic.twitter.com/tgEREEnUJN</a></p>&#x2014; DJ Rob Gero&#x2122;&#xA9; (@_RobGeraghty_) <a href="https://twitter.com/_RobGeraghty_/status/989475928827932672?ref_src=twsrc%5Etfw">April 26, 2018</a></blockquote>
<script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script>
<p>I also just want to say a huge thanks to the two Mark&apos;s behind ZeroDays, the <a href="https://twitter.com/_BUCSS">@_BUCSS</a> team&apos;s from Bournemouth, <a href="https://twitter.com/peterhuerlimann">Peter</a> from our friends at <a href="https://twitter.com/CyberSecurityLI">@CyberSecurityLI</a> , as well as the Polish, Russian and German teams who made the effort to come from so far away! But most of all, thanks to the Trinity team who are alwalys great fun and compeitition! Finally thanks to the memelords who hijacked the <a href="https://twitter.com/hashtag/ZeroDaysCTF?src=hash">#ZeroDaysCTF</a> hashtag and spammed it with some brilliant images!</p>
<p>For the most part, it was harder than other years, espescially in Reverse Engineering but all that does is who me where we have to improve for next year and I&apos;m really looking forward to that!</p>
<p>Write up&apos;s are coming and they will be on the <a href="https://github.com/itbhackersoc">ITB HackerSoc GitHub</a> so keep any eye out there if you want a read of them or to try them for yourself!</p>
<!--kg-card-end: markdown-->]]></content:encoded></item><item><title><![CDATA[Chemical Weapons, Confirmation Bias and Missing the Point in Douma]]></title><description><![CDATA[<!--kg-card-begin: markdown--><p>I was planning on a differnt post after a break from the blog, including posting some backlogged posts from my time away and at least one talk I&apos;ve done, but I&apos;ve a lot of friends who have a lot of idea&apos;s about the commited</p>]]></description><link>https://legendary.industries/chemical-weapons-confirmation-bias-and-missing-the-point-in-douma/</link><guid isPermaLink="false">5d52dcde59bbd34cb3bdf9cf</guid><category><![CDATA[Syria]]></category><category><![CDATA[Chemical Weapons]]></category><dc:creator><![CDATA[Paddy Kerley]]></dc:creator><pubDate>Thu, 19 Apr 2018 13:51:04 GMT</pubDate><content:encoded><![CDATA[<!--kg-card-begin: markdown--><p>I was planning on a differnt post after a break from the blog, including posting some backlogged posts from my time away and at least one talk I&apos;ve done, but I&apos;ve a lot of friends who have a lot of idea&apos;s about the commited the Chemical Weapons attack in Douma, Eastern Ghouta, Syria on the 7th of April and none of them are correct. So I though I would break down the why I&apos;m confident in my assertion that it was the Assad Regieme and not some flase flag conspiracy theory</p>
<p>I think first and most importantly, anyone who has been following the conflict for a while knows that this isn&apos;t the first time Chemial Weapons have been used in 2018, not only that, but it&apos;s the fifth time in 2018 in Eastern Ghouta alone that an attack has happened The following attacks have happened:</p>
<ol>
<li><a href="https://www.stj-sy.com/en/view/392">January 13th</a></li>
<li><a href="https://www.stj-sy.com/en/view/413">January 22nd</a></li>
<li><a href="https://www.stj-sy.com/en/view/415">February 1st</a></li>
<li><a href="https://www.bellingcat.com/news/mena/2018/03/15/syrian-forces-bombard-eastern-ghouta-chemical-weapons-fourth-consecutive-time-since-beginning-2018/">March 15th</a></li>
<li><a href="https://www.bellingcat.com/news/mena/2018/04/11/open-source-survey-alleged-chemical-attacks-douma-7th-april-2018/">April 7th </a></li>
</ol>
<p>So I&apos;m going to examine the evidnce that shows me, without a shodow of a doubt that the Assad Regieme was behind the attack and I&apos;m even going to be kind and ignore some evidence that looks really bad for the Syrian&apos;s and the Russian&apos;s</p>
<ol>
<li><a href="https://www.opcw.org/fileadmin/OPCW/EC/M-59/en/ecm59dg02_e_.pdf">A UN reconnaissance team, escorting the OPCW Inspectors came under small arms fire and an explosive was detonated</a> while in Douma on April 18th, which is an aera under the total control of the Assad Regieme and Russian Forces</li>
<li>Gen. Gerasimov, Chief of the General Staff of the Armed Forces of Russia, <a href="https://youtube.com/watch?v=LuPSvHbX3Ug">basically predicted the attack, in detail</a>. He could have put the districts under some form of greater protection as he knew the attack was coming in the form of Air Defence or boots on the ground, or called the OPCW to investigate the coming incident for credibility or raise the issue with the US and it&apos;s allies along with evidence to prove he was right to completly discredit the coming attack. But he did literally nothing at all, other than mention it. This to me reeks of dezinformatsiya</li>
</ol>
<p>So lets get on with it and examine the evidence we have from Open Sources</p>
<hr width="50%" align="center">
<h1 id="imageryevidence">Imagery Evidence</h1>
<h2 id="1weknowwhatthemunitionlookedlike">1. We know what the munition looked like</h2>
<p><a href="https://www.cbsnews.com/news/syria-inside-douma-the-site-of-apparent-chemical-attack-2018-04-16/">CBS journalist Seth Doane visited Douma</a> and on April 16th, published a piece with and <a href="https://cbsnews2.cbsistatic.com/hub/i/r/2018/04/16/751d2744-55e7-4b31-b6db-5e0c890dd5e4/resize/620x/c850d3ac9565729b6712227ab90282b9/0416-syria-doane-material-1-frame-2954.jpg">image of munition</a> which looks strikingly similar to the pressure vessels that <a href="https://www.hrw.org/news/2017/02/13/syria-coordinated-chemical-attacks-aleppo">Human Rights Watch</a> have been keeping track of, as used for <a href="https://www.hrw.org/video-photos/photograph/2017/02/14/2017-eme-syria-chemical-remnants">Chlorine Gas munitions in Aleppo</a> by the Syrian Government.</p>
<h2 id="2thedeliverymethodisconsistantwithotherchlorinegasattacks">2. The delivery method is consistant with other chlorine gas attacks</h2>
<p><a href="https://www.bellingcat.com/news/mena/2018/04/11/open-source-survey-alleged-chemical-attacks-douma-7th-april-2018/">Bellingcat</a> mentions that <a href="https://twitter.com/Sentry_Syria">@Sentry_Syria</a> observers had seen two Mi-8 Hip helicopters headed in the direction of Douma (though I am unable to find the tweet as I don&apos;t speak arabic):</p>
<blockquote>
<p>Aircraft observers that are part of the Sentry Syria network observed two Hip helicopters heading southwest from Dumayr Airbase, northeast of Damascus, in the direction of Douma, 30 minutes before the chemical attack in Douma, and two Hip helicopters were observed above Douma shortly before the attack. Hip transport helicopters have also been linked to previous aerial chlorine attacks.</p>
</blockquote>
<h2 id="3theinjuriesweseeareconsistantwithachlorinegasandpotentiallyasaringasattack">3. The injuries we see are consistant with a Chlorine Gas and potentially a Sarin Gas attack</h2>
<p>This is going to be graphic. You have been warned. I will also correctly reference information so you can see the exact information I&apos;m working from.</p>
<h3 id="chlorine">Chlorine</h3>
<p>Exposure to Chlorine Gas is identified by coughing/wheezing and a runny noise(rhinoreha) and symtopms consistant with a runny nose is visible in <a href="https://youtu.be/0K9H8dh12uE?t=1m11s">imagery taken from the scene</a></p>
<blockquote>
<p>Chloirine readily disolves in the moist mucosa of the upper respriatory tract. The resulting reaction with water causes rhinorehea, hyperventalation and may cause <strong>laryngeal edema</strong>. In the lower respratory tract, the reaction causes coughing, wheezingabd pulmonary edema.<br>
(Weapons of Mass Casualties and Terrorism Response Handbook, 2000)</p>
</blockquote>
<p>As well as this, high concentrations of Chlorine gas cause Chemical Burns which are also potentially <a href="https://youtu.be/0K9H8dh12uE?t=1m56s">visible on a victims face</a> and arms at the scene</p>
<blockquote>
<p>High concentrations of of chlorine gas will produce chemical skin burns<br>
(Weapons of Mass Casualties and Terrorism Response Handbook, 2000)</p>
</blockquote>
<h3 id="sarin">Sarin</h3>
<p>A key telltale that Sarin was used is <a href="https://youtu.be/0K9H8dh12uE?t=16s">foaming at the mouth</a>, which is visible from video taken at the scene. The U.S. Army Medical Research Institute of Chemical Defense has a Field Manual on the treatment of casualties on Chemial Weapons and discribes the effects of Sarin on victims with the following quote:</p>
<blockquote>
<p>If the damage is severe, the casualty will start coughing up a clear, foamy sputum, the plasma from his blood that has leaked into his alveoli.<br>
(Field Management of Chemical Casualties, 2006)</p>
</blockquote>
<p>As of yet, it is unclear that Sarin was used, as <a href="https://www.bellingcat.com/news/mena/2018/04/11/open-source-survey-alleged-chemical-attacks-douma-7th-april-2018/">Bellingcat points out</a></p>
<blockquote>
<p>With allegations of Sarin use, it is important to note that these yellow gas cylinders are not associated with the use of Sarin, and as Sarin is a liquid a compressed gas cylinder seems an unlikely method of delivery for Sarin. Possible explanations for the allegations of Sarin use may be a result of the severity of the symptoms presented, of an undocumented munition being used, or another chemical agent being used that presents symptoms that could be confused with Sarin use.</p>
</blockquote>
<p>Though, that said, there is a report from NBC that <a href="https://www.nbcnews.com/news/mideast/u-s-has-blood-samples-show-nerve-agent-syria-gas-n865431">US Intelligence has blood samples showing the presence of Chlorine and an unnamed nerve agent</a></p>
<p>So lets conclude before moving on. We have imagery of the munition that is consistant with used in previous attacks by the Assad Regime. The helicopters reported in the area are consistant with previous attacks by the Assad Regime. The injuries of the victims are consistant with victims of clorine gas attacks and also potentially Sarin attacks. It walks like a duck and it quacks like a duck, it&apos;s a duck. It&apos;s an attack commiteed by the Assad Regime</p>
<hr width="50%" align="center">
<h1 id="emmanuelmacron">Emmanuel Macron</h1>
<p>I&apos;ve seen a lot of people rage against the establioshment and claim that it was a false flag to get the US to stay in Syria by just about everyone from Trump, <a href="https://www.washingtonpost.com/world/national-security/trump-instructs-military-to-begin-planning-for-withdrawal-from-syria/2018/04/04/1039f420-3811-11e8-8fd2-49fe3c675a89_story.html?utm_term=.67a3cbc18c20">who wanted to leave Syria just days before hand</a> or by Defence Contractors <a href="http://fortune.com/2017/04/07/syria-airstrikes-tomahawk-missile-boeing-raytheon-stock/">who saw their stocks rise</a>. Basically anyone under the sun who wasn&apos;t Syria. But Macron is no establishment stooge. If anything he&apos;s also an outsider. He was also <a href="http://uk.businessinsider.com/macron-france-will-strike-syria-if-proven-assad-used-chemical-weapons-2018-2?r=US&amp;IR=T">initially skeptical of reports</a>, even though there was verifiable open source information that showed the use of Chemial Weapons after this statement. Though he has seen the evidence of the most recent attack and is <a href="https://www.washingtonpost.com/world/europe/frances-macron-takes-harder-line-on-syria-asserting-proof-of-chemical-attack/2018/04/12/658e2412-3e71-11e8-a7d1-e4efec6389f0_story.html?utm_term=.e636c0cdde87">convinced by it</a>. The evidence that the US has is clearly so credible that the skeptic was convinced that Chemical Weapons were used.</p>
<h1 id="therobertfiskarticle">The Robert Fisk Article</h1>
<p>Robert is a journalist with the <a href="https://www.independent.co.uk">Independent</a> and he published an <a href="https://www.independent.co.uk/voices/syria-chemical-attack-gas-douma-robert-fisk-ghouta-damascus-a8307726.html#gallery">article</a> on the 17th of April that a lot of people are digging way to deep into and letting confirmation bias take over. The most common thing I have heard is that Fisk reports that the attack didn&apos;t happen. He didn&apos;t. He reported a claim from a docter who reports that the attack didn&apos;t happen:</p>
<blockquote>
<p>War stories, however, have a habit of growing darker. For the same 58-year old senior Syrian doctor then adds something profoundly uncomfortable: the patients, he says, were overcome not by gas but by oxygen starvation in the rubbish-filled tunnels and basements in which they lived, on a night of wind and heavy shelling that stirred up a dust storm.</p>
</blockquote>
<blockquote>
<p>As Dr Assim Rahaibani announces this extraordinary conclusion, it is worth observing that he is by his own admission not an eyewitness himself and, as he speaks good English, he refers twice to the jihadi gunmen of Jaish el-Islam [the Army of Islam] in Douma as &#x201C;terrorists&#x201D; &#x2013; the regime&#x2019;s word for their enemies</p>
</blockquote>
<p>He wasn&apos;t an eyewitness and he openly declares a pro government bias. He could be right, but given that he wasn&apos;t a witness and is pro government, I find that hard to stomach. Not only that, he only got one side of the story, as the doctors who were treating victims where giving oral testimony to the Organisation for the Prohibition of Chemical Weapons , which Fisk also lets people know:</p>
<blockquote>
<p>By bad luck, too, the doctors who were on duty that night on 7 April were all in Damascus giving evidence to a chemical weapons enquiry, which will be attempting to provide a definitive answer to that question in the coming weeks.</p>
</blockquote>
<p>What is interesting is that he was given video of such hypoxia that was mentioned above by the doctor:</p>
<blockquote>
<p>I was with my family in the basement of my home three hundred metres from here on the night but all the doctors know what happened. There was a lot of shelling [by government forces] and aircraft were always over Douma at night -- but on this night, there was wind and huge dust clouds began to come into the basements and cellars where people lived. People began to arrive here suffering from hypoxia, oxygen loss. Then someone at the door, a &#x2018;White Helmet&#x2019;, shouted &#x2018;Gas!&#x201D;, and a panic began. People started throwing water over each other. Yes, the video was filmed here, it is genuine, but what you see are people suffering from hypoxia &#x2013; not gas poisoning.</p>
</blockquote>
<p>What I find really interesting is that somewhere, someone is lying becuase in the same article</p>
<blockquote>
<p>Of course we must hear their side of the story, but it will not happen here: a woman told us that every member of the White Helmets in Douma abandoned their main headquarters and chose to take the government-organised and Russian-protected buses to the rebel province of Idlib with the armed groups when the final truce was agreed.</p>
</blockquote>
<p>So the Whte Helmets were both there and not there, simulataniously, a Schr&#xF6;dinger&apos;s Whte Helmet if you will, and the artilery barrage caused hypoxia, to such an extent that it caused the injuries seen above and not just that, this is to my knowlege, the first ever, reported case of artilery causing hypoxia that isn&apos;t from chemical weapons. Including all of the worst Hurricane bombardment&apos;s devised by Durchbruchm&#xFC;ller for der Kaiserschlacht.</p>
<p>Someone somewhere is not telling the truth. It could be the info about the White Helments not being in town, it could have been the doctor, I don&apos;t know. But it&apos;s poor reporting from a great journalist who didn&apos;t get the whole story.</p>
<h1 id="thegrandconspiracy">The Grand Conspiracy</h1>
<p>Finally, a lot of people would have been needed to pull of a conspiracy of this size, over multiple countires Governements, Inteligence Agencies and Militaries. That level of coordination is totally possible, but building it on a lie is impossible to sustain. <a href="http://journals.plos.org/plosone/article?id=10.1371%2Fjournal.pone.0147905">It has been studied</a> and all conspiracy&apos;s are mathmathically destined to fall apart under their own weight. <a href="https://theness.com/neurologicablog/index.php/math-vs-conspiracies/">Dr. Steven Novella</a> summed it up best:</p>
<blockquote>
<p>Grand conspiracies can only exist in a fantasy world in which individuals can have preternatural competence, in which it is possible for a few people to secretly have tremendous reach and control, and in which these powerful and brilliant people also make ridiculously stupid mistakes that expose them to the enlightened few who can see through the conspiracy.</p>
</blockquote>
<hr width="50%" align="center">
<p>So why is any of this important in any way shape or form?! Simple. There has been a taboo on the use of Chemical Weapons since WWI and ever since then any use of Chemical Weapons has caused massive international backlash. This taboo is sliding away before our eyes as we care about other things that aren&apos;t nearly as important and worse, as you can see above, we aren&apos;t even really talking about the use of Chemical Weapons but we are talking about who had what motive and why. We aren&apos;t even talking about the use of Chemical Weapons anymore, we&apos;re caught up in a game of Whodunit and Whataboutism and this is a deeply disapointing and frustrating problem. It&apos;s an all too common problem in Arms Control too as you see, Arms Control is like Fiat Currency, it&apos;s worth the value you place in it. We are demonstrating though actions and words that Russia and Syria espescially, but everyone is guilty of not caring and moving on, while we witness, and now ignore monthly uses of these horrific weapons</p>
<h1 id="references">References</h1>
<p>Weapons of Mass Casualties and Terrorism Response Handbook. (2006). 1st ed. [ebook] Jones &amp; Bartlett Learning, pp.37-39. Available at: <a href="https://books.google.ie/books?id=7ZnXZfwWwgcC&amp;source=gbs_navlinks_s">https://books.google.ie/books?id=7ZnXZfwWwgcC&amp;source=gbs_navlinks_s</a> [Accessed 18 Apr. 2018].</p>
<p>Field Management of Chemical Casualties. (2000). 2nd ed. [pdf] U.S. Army Medical Research Institute of Chemical Defense (USAMRICD), pp.33-35. Available at: <a href="https://www.rke.vaems.org/wvems/Libraryfiles/Dis/E_04.pdf">https://www.rke.vaems.org/wvems/Libraryfiles/Dis/E_04.pdf</a> [Accessed 18 Apr. 2018].</p>
<!--kg-card-end: markdown-->]]></content:encoded></item><item><title><![CDATA[Talk on OpSec @ ITB Hacker Soc]]></title><description><![CDATA[<!--kg-card-begin: markdown--><p>I gave a talk to the <a href="https://hackersoc.tk/">ITB Hacker Soc</a> about OpSec. I don&apos;t have video, but I do have the <a href="https://cloud.legendary.industries/index.php/s/Pijy7Fej3XKzrKj">slides</a>. This is a talk that&apos;s going to go though a serious workthought becasue a friend of mine pointed out that not everyone has the tinfoil</p>]]></description><link>https://legendary.industries/talk-on-opsec-itb-hacker-soc/</link><guid isPermaLink="false">5d52dcde59bbd34cb3bdf9d0</guid><category><![CDATA[Talks]]></category><dc:creator><![CDATA[Paddy Kerley]]></dc:creator><pubDate>Wed, 15 Nov 2017 14:29:00 GMT</pubDate><content:encoded><![CDATA[<!--kg-card-begin: markdown--><p>I gave a talk to the <a href="https://hackersoc.tk/">ITB Hacker Soc</a> about OpSec. I don&apos;t have video, but I do have the <a href="https://cloud.legendary.industries/index.php/s/Pijy7Fej3XKzrKj">slides</a>. This is a talk that&apos;s going to go though a serious workthought becasue a friend of mine pointed out that not everyone has the tinfoil hat that I have... So taking on her advice, I&apos;m going to change it up to show that what I am giving you is a set of tools that you can use, if you so choose to protect yourself to a level you find useful</p>
<!--kg-card-end: markdown-->]]></content:encoded></item><item><title><![CDATA[Some Quick Thoughts on the Barron's Report]]></title><description><![CDATA[<!--kg-card-begin: markdown--><p>A report has come to light from the recently retired Gen Sir Richard Barrons who was the Commander of the Joint Forces Command, or the big cheese in the British armed forces. His report is a haul down report covering the issues in the military for the next commander and</p>]]></description><link>https://legendary.industries/some-q/</link><guid isPermaLink="false">5d52dcde59bbd34cb3bdf9cd</guid><category><![CDATA[UK]]></category><dc:creator><![CDATA[Paddy Kerley]]></dc:creator><pubDate>Sun, 18 Sep 2016 22:27:24 GMT</pubDate><content:encoded><![CDATA[<!--kg-card-begin: markdown--><p>A report has come to light from the recently retired Gen Sir Richard Barrons who was the Commander of the Joint Forces Command, or the big cheese in the British armed forces. His report is a haul down report covering the issues in the military for the next commander and it raises some interesting issues that are worth talking about in different contexts.</p>
<p>So the first thing that&apos;s striking from the report is</p>
<blockquote>
<p>could not withstand attack by major power like Russia</p>
</blockquote>
<p>This is regarding the entire British armed forces. To some people, like me, this isn&apos;t so much of an issue as it is a known fact. If we break down some of the issues that Britain has, it quickly becomes apparent that this is going to be a problem for GB in the event of an attack.</p>
<p>So if we look at the big trends globally in militaries the two big things are EW and A2AD. Britain&apos;s access to EW isn&apos;t great, as the report highlights,</p>
<blockquote>
<p>no electronic warfare capability</p>
</blockquote>
<p>But not only that, the only training facility in Europe is the Polygon between Germany and France. Which is a Joint EU/US project. And guess who&apos;s leaving the EU... Yup, GB. So they lack a capability and can&apos;t train it&apos;s offence and defence.</p>
<p>And on A2AD</p>
<blockquote>
<p>UK air defence now consists of the [working] Type 45 [destroyers], enough ground-based air defence to protect roughly Whitehall only, and RAF fast jets.</p>
</blockquote>
<p>So the Type 45 Destroyers, listed as working, is debatable... They look cool as fuck and futuristic as all get out! But GB cheaped out on the engines and they keep breaking down... So, in reality they&apos;re not great! They are based on Aegis Combat System which is a big plus, but if you compare the capabilities of a Type 45 to a French La Fayette or a Dutch De Zeven Provinci&#xEB;n, which is arguably the BEST Air Defence ship on the seas as we speak! But there&apos;s more. The ground-based air defence is basically what&apos;s referred to as RAF Fast Jets, which are Eurofighter Typhoons, which are arguably the best jets in the skies right now, but they are being replaced with F-35&apos;s as we speak. And the ground-based system for Whitehall, I know nothing about and the rest of the system, CAMM, is an idea at present...</p>
<p>So where do we stand? No access to EW and no real working A2AD... And Russia exploits that all the time by flying Bear&apos;s, and I&apos;ve heard Blackjacks into GB airspace until they are intercepted.</p>
<p>But it&apos;s worse than that.</p>
<blockquote>
<p>The current army has grown used to operating from safe bases in the middle of its operating area, against opponents who do not manoeuvre at scale, have no protected mobility, no air defence, no substantial artillery, no electronic warfare capability, nor &#x2013; especially &#x2013; an air force or recourse to conventional ballistic or cruise missiles.</p>
</blockquote>
<p>That quote is a scathing criticism of the British Army. It says that the Army only knows how to fight targets who have no real modern hardware who don&apos;t maneuver like like say a Russian Maneuver Battalion kitted out with T-14&apos;s and BTR&apos;s. And even if it could fight them, it can&apos;t fight the supporting troops who use Artillery, EW, Air Forces and conventional and ballistic cruise missiles. It&apos;s a fancy way to say that they can&apos;t fight for shit in more polite political language.</p>
<p>But my favourite part of the entire report is this line in reference to the brand spanking new Queen Elizabeth class Aircraft Carriers and other small but hugely expensive pieces of equipment that dominate the UK Military like the F-35 and the Vanguard-class submarine&apos;s or the hilariously expensive Trident Missile System which both are in Scotland, which may no longer be in GB if the SNP have their way!</p>
<blockquote>
<p>we cannot afford to use fully, damage or lose</p>
</blockquote>
<p>And this part of the report is dead right! If GB does loose a carrier in conflict, that&apos;s the Pride of the British Navy and the Armed Forces in general. That&apos;s HMS Tiger all over again. That&apos;s a huge loss to morale! And it&apos;s a very costly loss! And it can so easily happen as the CVN USS Theodore Roosevelt and it&apos;s escorts found out in 1999 when a Dutch Walrus-class submarine sunk a training exercise called JTFEX/TMDI99 in the Atlantic Ocean. The Dutch sub got into the Task Force, sunk it all and got out without being detected and left because it ran out of torpedo&apos;s.</p>
<p>And one last thing.</p>
<blockquote>
<p>lack of manpower across the military</p>
</blockquote>
<p>The British Army has been at war for 100 years on the trot with no breaks. It&apos;s had no recovery time. It has great institutional knowledge of fighting and how to fight, but it lacks the man power to do so and the manpower isn&apos;t trained well enough to do so since more and more troops are needed to keep working on operations</p>
<p>And just to end as Brexit was mentioned... GB hates the idea of an EU Army or European Defence Pact/Colation/Corps because it&apos;s the end of NATO. Europe will form it, pay for their force and not NATO&apos;s. It will be GB, USA and a few non-EU nations and the US will likely with the current political climate look at NATO as a waste of resources and a boone for US Isolationists. And that right there is the end of the UK/USA agreement or the end of the &quot;Special Relationship&quot;.</p>
<!--kg-card-end: markdown-->]]></content:encoded></item><item><title><![CDATA[How to shoot down an F-35. An Amateur Weapons Designers Guide]]></title><description><![CDATA[<!--kg-card-begin: markdown--><p>So I&apos;ve been rater silent.. I&apos;ve been working on two blogs, one on Ireland during WWII and how we were so neutral we weren&apos;t neutral at all. I was working on that in the run up to Brexit and of course, that took a</p>]]></description><link>https://legendary.industries/how-to-shoot-down-an-f-35-an-amateur-weapons-designers-guide/</link><guid isPermaLink="false">5d52dcde59bbd34cb3bdf9cc</guid><category><![CDATA[Weapons Design]]></category><dc:creator><![CDATA[Paddy Kerley]]></dc:creator><pubDate>Fri, 08 Jul 2016 13:20:00 GMT</pubDate><content:encoded><![CDATA[<!--kg-card-begin: markdown--><p>So I&apos;ve been rater silent.. I&apos;ve been working on two blogs, one on Ireland during WWII and how we were so neutral we weren&apos;t neutral at all. I was working on that in the run up to Brexit and of course, that took a lot of my attention as both someone who will most&#xA0;likely&#xA0;be&#xA0;affected by it in the future and as a Europhile&#xA0;thinking rater gloomily about the future of the Union. But we&apos;re back and we&apos;re talking about Weapons Systems again today and the specific future of BVR weapons.</p>
<p>The main reason I&apos;m thinking about this is the Lockheed-Martin and the&#xA0;USAF&apos;s PR push for the&#xA0;Lockheed-Martin F-35 Lightning II. They are now making a lot of noise about how much they&apos;ve improved so many aspects of it, how much more maneuverable it is, how many software bugs have been fixed and so on. Now some or all of that may be true, I&apos;ve heard from many several places about how good or bad things have gotten, but the one thing that&apos;s not really talked about all that often is how god damn hot the thing runs!</p>
<p>It runs so hot that to stop of the fuel from combusting&#xA0;in it&apos;s tanks that refueling has to use pre-cooled fuel and&#xA0;Lockheed-Martin and the USAF are redesigning the inerter that keeps the levels of oxygen in the fuel tank at a low level. This is super important because J1 Jet Fuel is at it&apos;s most combustible as a vapor. It also means that it&apos;s super important not to fly too close to a thunder storm or&#xA0;Lightning could down a&#xA0;Lightning..</p>
<p>But none of that is what we&apos;re here to talk about today. We&apos;re going to talk about the Engine. The giant hot engine that that has one giant exhaust that also gets very hot. And hot things have big IR Signatures. And if the wings get so hot it vaporizes the fuel and the rear is hot because of the giant engine, it&apos;s going to have a GIANT IR signature.</p>
<p>But what kind of range can you detect an IR Signature from? Well the AIM-9 Sidewinder is the IR missile with the greatest range that I know of and that is out to 30-35 Km. There exists IR Radar but that is shockingly new and basically designed to counteract stealth aircraft. Being so new, it&apos;s operational range is highly classified..</p>
<p>So my theory as to where anti F-35 weapons will either&#xA0;have a giant acronym like&#xA0;Beyond Visual Range, Lock On After Launch, Infrared Red Missile or&#xA0;BVR LOAL IRM. Or it will if the F-35 isn&apos;t as good as&#xA0;Lockheed-Martin and the&#xA0;USAF think for&#xA0;first look, first kill aircraft since the missiles it will be using for BVR combat are AIM-AMRAAM 120&apos;s which can have a launch detected at maybe 30 Km range from some probably unreliable sources. But that&apos;s boring and can all be solved by stuff that all ready exists! So we&apos;re going to look at the first option!</p>
<p>So how do we find an F-35 or any Stealth aircraft at range since it is a &quot;First look, First Kill&quot; and designed to engage at Beyond Visual Range? Well to see something like that at range you need an early warning radar, something akin to the Over the Horizon RADAR at Chernobyl known as Duga 3. It&apos;s frankly gigantic and completely and completely unrealistic as something that could fit in the nose of a plane or a missile. But that kind of RADAR is really only good for say, bouncing a signal off the ionosphere. If you take the L-Band, UHF or VHF, and can process the signal enough to reduce noise in the RADAR then you can find and hit the plane as the USA found out in 1999 when the Serbian&apos;s shot down an F-117 Nighthawk Stealth Aircraft.</p>
<p>So we know this can be done. But didn&apos;t the F-117 get shot down by a S-125 that locked on when the bomb bay doors opened up? Yeah.. And that&apos;s the thing. That&apos;s a super small window to hit something and unless you can cover 100 Km in a few seconds, BVR is out of the game. So we can find the plane at range, but how do we hit it? We have a giant IR signature. So the missile is fired and doesn&apos;t lock on. It goes in the general direction of the aircraft. When it gets to within 30 Km, it can start to detect it with IR and lock on like an AIM-9 Sidewinder.</p>
<p>So since so much technology exists already but isn&apos;t in one package, can we&#xA0;squeeze&#xA0;all that RADAR&#xA0;and IR detection tech into a small enough package that we can put in a 230mm package to fit on the wing of a Flanker a Fulcrum or a PAK-FA? Or say a 203mm package to be used on a&#xA0;Chengdu J-20? Or even&#xA0;180mm package suitable to fit on a NATO to be used on an F-22 or F-35 as a replacement for an AMRAAM 120&#xA0;against other stealth aircraft? That is a whole other question.</p>
<p>But what I really want to do is to see if I can build such a thing and make it work! And can it be done with things I have lying around my bedroom and garage.. IR camera connected&#xA0;a&#xA0;Raspberry Pi to control the sensor and detech targets.&#xA0;Then&#xA0;an arduino to turn movement commands from the RPi into attitude&#xA0;changes&#xA0;from an amateur rocket&#xA0;motor. It will be missing an IFF system but that requires having friendly signatures so you can identify who&apos;s who and that&apos;s the job of a real defense&#xA0;contractor when the time comes for&#xA0;someone to make one for real&#xA0;operational&#xA0;use.</p>
<p>So as I&apos;ll get my head around this problem that really isn&apos;t a problem and have updates in time</p>
<!--kg-card-end: markdown-->]]></content:encoded></item><item><title><![CDATA[The Next Gen of CPU's are GPU's are the Most Important in Years]]></title><description><![CDATA[<!--kg-card-begin: markdown--><p>That&apos;s a rather ambitions title don&apos;t you think? Well to be honest with you, I think it&apos;s the truth! I think what we will see from AMD will be beneficial to everyone, be they enterprise or consumer, scientist or gamer or even the neglected</p>]]></description><link>https://legendary.industries/the-next-gen-of-cpus-are-gpus-are-the-most-important-in-years-13-6-16/</link><guid isPermaLink="false">5d52dcde59bbd34cb3bdf9cb</guid><category><![CDATA[Hardware]]></category><dc:creator><![CDATA[Paddy Kerley]]></dc:creator><pubDate>Mon, 13 Jun 2016 13:19:00 GMT</pubDate><content:encoded><![CDATA[<!--kg-card-begin: markdown--><p>That&apos;s a rather ambitions title don&apos;t you think? Well to be honest with you, I think it&apos;s the truth! I think what we will see from AMD will be beneficial to everyone, be they enterprise or consumer, scientist or gamer or even the neglected market of the third world.</p>
<p>Why is this the case? Well lets take a look back at the recent past. In the CPU market, Intel have reigned supreme after AMD&apos;s disastrous Bulldozer architecture. Intel did what any good company would do and really capitalized on the situation! The released just before that the cracking i5-2500K and then then the iX-4XXX series CPU&apos;s which even 4 years later are awesome! But AMD floundered and improved some what on&#xA0;Bulldozer&#xA0;with&#xA0;Piledriver, but&#xA0;you&#xA0;can only dress shit up so well. And in a market with only two compeititors, you can see where this is going to go and who it will effect the worst.. The Consumer. And it did recently with the release of the Broadwell E chips from Intel. You can get a 10 core chip for a whopping 1700 USD! And not only that, but there are &quot;cheaper&quot;&#xA0;versions&#xA0;of the Broadwell E&#xA0;series with 8 cores but they are hugely expensive compared to their counter parts from the&#xA0;previous&#xA0;generation.</p>
<p>Around the same time, is what I remember Nvidia really getting their hype machine going too. So much so that even I would say I fell victim to buying a GTX 560. Which, not a bad card, but the Radeon HD&#xA0;6870 was a better card and really held up better in the long run. Nvidia used it&apos;s position quickly to start to sign developers up to using it&apos;s proprietary system of developing games which has the dubious nick name of Gimpworks since it appears to gimp it&apos;s competitors card. Not that AMD&apos;s cards were in any way better or worse, they were generally on par, but they had what I at least would call better technologies , if you were will to have a bigger, beefier PSU like FreeSync, which is Open Source and free, compared to Nvidia&#xA0;proprietary&#xA0;and expensive G-Sync. But Nvidia had the market and the hype train and we all know the internet loves a good hype train!</p>
<p>This has all recently come to a head as I mentioned that Intel released it&apos;s 10 core processor and Nvidia released their GTX 10XX series of GPU&apos;s nicknamed Pascal. Intel charging 1700 USD for a processor costing that much when you can get better Xeon processors for&#xA0;cheaper&#xA0;is just blatant price gouging. Intel are basically seeing how much money&#xA0;they can get out of the consumer for a little performance gain as possible. Nvidia did something similar where they released the GTX 1070 and GTX 1080 recently with big price tags in what was a paper launch. But if you really wanted to, you could by another 100 USD to get a reverence version direct from Nvidia. If you read the tech press reviewing the cards and benchmarking them to Nvidia&apos;s Benchmark&#xA0;guides, vs what say, reddit users are getting, they differ wildly.</p>
<p>So why will AMD change this? Well there are a few reasons. Firstly and I think more importantly they have showed off their new Polaris GPU&apos;s at Computex and E3. The best so far of them is the RX 480 and at 199 USD it looks like a beast and should compete with the GTX 1070 for about 1/2 the price. And AMD isn&apos;t coming back out of it&apos;s corner swinging on the GPU front. They have a new CPU&apos;s coming too and are taking aim at Intel&apos;s big profit margins for high end chips and making what look to be only 8 and 16 core monsters that are on par with Intel&apos;s Skylake processors. We don&apos;t know&#xA0;pricing&#xA0;yet but they are&#xA0;expected to be again about half the price. And these products are not like Nvidia&apos;s cards that are the old&#xA0;architecture&#xA0;scaled down to 16nm or Intel&apos;s Broadwell E which is a generation old, but matured process. Neither of those things are bad&#xA0;necessarily, and AMD is guilty of&#xA0;product&#xA0;refreshes as we see with the R9 3XX being a refresh of the R9 2XX GPU&apos;s.</p>
<p>Secondly, the&#xA0;developers&#xA0;who make games&#xA0;generally&#xA0;don&apos;t just make games for one audience like&#xA0;PC&#xA0;gamer&apos;s. They make games for Console too and if you look at what the Hardware of current and future consoles are, they are all built on AMD powered hardware. The&#xA0;developers&#xA0;know exactly what they are doing with AMD systems. Not only that, the&#xA0;XBox One uses a variant of Windows 10 running D3D12 which uses extensive low level coding to get the most out of the system. Playstation uses a variant of AMD&apos;s Mantle ported to work with Playstation&apos;s modded FreeBSD/BSD OS and Mantle is the basis of Vulkan and both also use extensive low level coding too. So the&#xA0;developers&#xA0;making the games we will&#xA0;be playing in future, are using the API&apos;s of the future and are all using AMD hardware. Why would a dev use Nvidia&apos;s Gameworks&#xA0;development&#xA0;environment on Intel CPU&apos;s&#xA0;when they&#xA0;have&#xA0;been&#xA0;using AMD&apos;s GPU open on AMD CPU&apos;s&#xA0;behind the scenes?</p>
<p>Thirdly is the technology front. In all honestly, I think that Intel are head and shoulders ahead of AMD in the processor front but, they do have one advantage. In both D3D12, Mantle and Vulkan you have the ability to scale compute across processor cores as needed in a sort of dynamic provisioning. Intel are still on 4 cores and AMD are going 8 core minimum. If you compare some of the AMD Piledriver 8 core FX processors to Intel&apos;s most recent 4 core Skylake CPU&apos;s in a compute intensive game like Ashes of the Singularity, which&#xA0;admittedly&#xA0;is an AMD Gaming Evolved title, the 4 extra cores can be used can bridge the&#xA0;decide&#xA0;caused by the poor Bulldozer&#xA0;architecture.</p>
<p>Not only that but on the GPU front Nvidia&apos;s dominance of the D3D11 era came to a quick end when every D3D12 game showed huge improvement with the exception of the Tomb Raider which, was an Nvidia Gameworks title. Most of this&#xA0;performance&#xA0;improvement comes from a little feature called Async Compute where the hardware can dynamically and&#xA0;asynchronously&#xA0;and diviy up&#xA0;what shaders&#xA0;are doing between graphics and compute tasks thanks to a command processor. Nvidia claims the same can be done with a driver and in software but how you emulate a command processor&#xA0;and expect it to preform the same as bare metal is beyond me and to be honest, I&apos;d love to see what Nvidia bring to the table! That said, with the gains that AMD has made by including it&apos;s its design over the years, it gives a lot of life to the the card that have it, something that can not be said for Nvidia&apos;s cards in the long run</p>
<p>Finally, AMD are doing something different and are targeting everyone rather than&#xA0;enthusiasts. AMD are looking at overall reducing the cost of computing and opening up the market. AMD are looking towards China, India and Africa as well as the western world. They see a giant market of people who would love to be playing games and they want to make as much hardware as possible available to them and do it giving the best experience possible. And unlike both Intel and Nvidia who are chasing short term profits, AMD are playing the long game.</p>
<p>So in short, Intel and Nvidia have spent the last few years of market dominance price gouging the consumer, but over the next few quarters when we see AMD&apos;s new GPU&apos;s and CPU&apos;s targeting the masses with great technology and the return of AMD&apos;s CPU&apos;s, it should make the market really competitive. And that can only be good for all.</p>
<!--kg-card-end: markdown-->]]></content:encoded></item><item><title><![CDATA[Debunking MS-804 crash as a Terrorist Attack]]></title><description><![CDATA[<!--kg-card-begin: markdown--><p>When one decides to write a blog, it&apos;s probably a good idea to have a topic that you want to write about in advance since you know, that&apos;s what blogging is.. I on the other hand started doing this just to play around with build a</p>]]></description><link>https://legendary.industries/debunking-ms-804-crash-as-a-terrorist-attack-10-6-16/</link><guid isPermaLink="false">5d52dcde59bbd34cb3bdf9ca</guid><category><![CDATA[Terrorism]]></category><dc:creator><![CDATA[Paddy Kerley]]></dc:creator><pubDate>Fri, 10 Jun 2016 13:16:00 GMT</pubDate><content:encoded><![CDATA[<!--kg-card-begin: markdown--><p>When one decides to write a blog, it&apos;s probably a good idea to have a topic that you want to write about in advance since you know, that&apos;s what blogging is.. I on the other hand started doing this just to play around with build a website so that I can have email and since then, things have changed drastically. I have a website that&apos;s probably been over designed, no email and&#xA0;a blog.</p>
<p>So for my first post lets take a look at something that I despise. It&apos;s a word. It&apos;s Terrorism. It&apos;s used all the time, the world over by law makers the world over to&#xA0;justify&#xA0;overly powerful bills, militaries, intelligence agencies and law enforcement for larger budgets and by pundits on the media we consume to basically spread fear rather than report. Most of those statements are what some may call opinion and that&apos;s fine and they will probably result in other blog posts. But I&apos;m going to take issue with one of those&#xA0;groups&#xA0;today the intelligence agencies of the world.</p>
<p>In the wake of the attack there were&#xA0;unconfirmed&#xA0;statements from an unknown sources inside French Intelligence, the Greek Military &amp; the Egyptian Security Services (I&apos;m lacking a source, but&#xA0;regardless&#xA0;I can also debunk media speculation) that the that the attack on Egypt Air MS-804 was terror attack. And ohh boy did that statement add petrol to a fire in the media. So how do I, a random guy in who doesn&apos;t work in intelligence some how know this? Simple, I have my own intelligence that is&#xA0;drastically&#xA0;different from their intelligence.</p>
<p>The AV Herald, a great resource for all things aviation crash related, managed to get hold of the ACARS messages that were sent by the plane and they are as follows;</p>
<pre><code>00:26Z 3044 ANTI ICE R WINDOW
00:26Z 561200 R SLIDING WINDOW SENSOR
00:26Z 2600 SMOKE LAVATORY SMOKE
00:27Z 2600 AVIONICS SMOKE
00:28Z 561100 R FIXED WINDOW SENSOR
00:29Z 2200 AUTO FLT FCU 2 FAULT
00:29Z 2700 F/CTL SEC 3 FAULT
no further ACARS messages were received.
</code></pre>
<p>Now that is Grade A Gibberish to anyone who doesn&apos;t&#xA0;understand&#xA0;how to read ACARS messages. But&#xA0;luckily&#xA0;we&#xA0;have reddit for that!&#xA0;And&#xA0;/u/Jackal___ delivered with this gem, an Airbus Accident Information Transmission that outlines what the ACARS messages mean.</p>
<p>So what we can tell from&#xA0;the AIT is that at 0026 2 cockpit temperature sensors in the right hand side of the cockpit failed and also a toilet smoke sensor detected smoke. At 0027 we know a smoke sensor detected smoke in the Avionics Bay. 0028 another temperature sensor failed in the cockpit. Finally at 0029 we know that computers in the Avionics Bay failed before no other messages were&#xA0;received.</p>
<p>So how do I know that it wasn&apos;t a terrorist attack. Well that&apos;s pretty simple. The ACARS messages are standard computer logs and they are time series logs. This means that the first log is the first event to happen. So knowing that if we reexamine the logs again in a simpler format;</p>
<pre><code>1. 00:26Z 3044 ANTI ICE R WINDOW
2. 00:26Z 561200 R SLIDING WINDOW SENSOR
3. 00:26Z 2600 SMOKE LAVATORY SMOKE
4. 00:27Z 2600 AVIONICS SMOKE
5. 00:28Z 561100 R FIXED WINDOW SENSOR
6. 00:29Z 2200 AUTO FLT FCU 2 FAULT
7. 00:29Z 2700 F/CTL SEC 3 FAULT
no further ACARS messages were received.
</code></pre>
<p>Doing this we can see that the first sensor to fail was a cockpit temperature sensor, then another and then the toilet smoke sensor detected smoke and all this&#xA0;happened&#xA0;in the 60 seconds that makes up 0026. So flat out we can see that it simply&#xA0;can&apos;t be fire in the toilet. The fire had to start in the cockpit.</p>
<p>Ok, so how do I know a pilot didn&apos;t start the fire? Well that&apos;s also pretty simple. In the wake of Germanwings Flight 9525 the Two Man Rule was made law in Europe. Now Egypt isn&apos;t in Europe but because of&#xA0;Egypt Air flight 990 in 1999 when it&apos;s believed that the crash was caused&#xA0;deliberately&#xA0;by a pilot and made law in the USA,&#xA0;Egypt Air instigated the Two Man Rule. So one of the pilots managed to subdue the other, and noiselessly at that and then started a fire in the cockpit, seems&#xA0;unlikely&#xA0;since anyone who&apos;s ever been in a fight or flight situation knows you have a&#xA0;tendency&#xA0;to&#xA0;freak out&#xA0;just a&#xA0;little&#xA0;and&#xA0;yell or scream.</p>
<p>So what caused the fire?! Wouldn&apos;t that be the first Airbus A320 to EVER have an&#xA0;on board&#xA0;component fire?! Yes, yet it would. But the cockpit is filled with something that can catch fire and fast and generate a lot heat and smoke, Lithium Polymer batteries. They are used when the plane is on the ground, with the engines off and with no&#xA0;generator&#xA0;attached to keep systems running.</p>
<p>So if we examine what we know and apply some critical thinking, what we know as a fact is that the fire started sometime around 0026 in the right hand side of the cockpit causing two temperature sensors to fail. After this we know there was smoke detected in a toilet, most&#xA0;likely&#xA0;one close to the cockpit. At 0027 we know that there was smoke detected in the Avionics bay. At 0028 we know another right hand side&#xA0;cockpit&#xA0;temperature sensor failed. Finally at 0029 we know 2 computers in the Avionics bay failed before transmission ceased. We know the flight went down around 0033 so the SDU must have failed or been damaged since there are no further messages.</p>
<p>But that&apos;s not really&#xA0;satisfying&#xA0;is it? What would Mythbusters do? Try and loosely recreate the myth for fun! So how would I get through Airport secure and start a fire on a plane? Pretty simple actually, Airport Security&#xA0;is largely a farce and it&apos;s very easy to make explosives after airport security. Evan Booth&apos;s Terminal Cornucopia&#xA0;is probably the best example of this but there is also a lot of really great&#xA0;security&#xA0;bloggers and researchers&#xA0;that cover the issue as well as some pilots too.</p>
<p>So how would I start a fire after airport&#xA0;security? Simple. Buy a bottle of water, some kind of device to hold the water, a Swiss Army Knife/Screwdriver/Tweezers/Scissors, any electronic device at all that has a battery and lastly some Hydrogen Peroxide contact lens cleaner. If you combine them, in the magic order you can start a fire and spread it very&#xA0;quickly. If you&apos;re really good, and can make it burn quick and clean, there&apos;s a small chance you can do it without smoke. Then all you have to do is break down the cockpit door and throw the burning mixture all over the place.</p>
<!--kg-card-end: markdown-->]]></content:encoded></item></channel></rss>