Tag Archive for: building

China is building a sprawling network of missile silos, satellite imagery appears to show


The likely missile field, comprising 120 silos that could potentially house weapons capable of reaching the United States mainland, was documented by researchers at the James Martin Center for Nonproliferation Studies using satellite imagery supplied by commercial satellite company Planet Labs Inc.

The researchers compared satellite photos taken during the past four months with images captured within the past week, finding the missile site covering a grid of hundreds of square kilometers in China’s Gansu province, said researcher Jeffrey Lewis, a Chinese nuclear weapons expert who examined the images with colleague Decker Eveleth, the first person to spot the silos.

Lewis told CNN on Friday that most of the silo construction, which has yet to be completed, has likely occurred in the past six months.

“It’s really a startling pace of construction,” he said, adding that the scope of the buildup was also surprising.

“It’s a lot of silos,” Lewis said. “It’s much larger than anything we expected to see.”

Reports of the likely new missile field came just a day before Chinese leader Xi Jinping said in a nationalistic speech on the Communist Party’s 100th anniversary that China’s rise is a “historical inevitability” and it will no longer be “bullied, oppressed or subjugated” by foreign countries.

“Anyone who dares to try, will find their heads bashed bloody against a great wall of steel forged by over 1.4 billion Chinese people,” Xi added, in comments that later appeared to be softened in the government’s own English language translation.

Satellite images appear to show four Chinese missile silos at various stages of construction.

New protection for China’s ICBMs

Though researchers have identified 120 likely silos, there is no indication they are in use, or will be used into the future. However, analysts said the silos, placed in a grid pattern, at 3-kilometer (1.9-mile) intervals, could be used to house Chinese-made DF-41 intercontinental ballistic missiles.

The DF-41, also known as the CSS-X-20, is estimated to have a range of 12,000 to 15,000 kilometers (7,400 to 9,300 miles) and could be equipped with up to 10 independently targeted nuclear warheads, according to the Missile Threat Project at the Center for Strategic and International Studies.

“It is projected to be able to strike the…

Source…

Building permits temporarily unavailable due to ransomware attack |


City officials said it could be several weeks before weekly building permits will be available.

The Tulsa World will resume publishing city building permits on Sundays for new commercial construction, expansions and enlargements of more than $50,000 when they become available.

Source…

Building the Android of UAVs with Open Source


Nowadays, the interaction between a user and a drone, and a drone and its hardware is mediated by software. For that reason, developing secure, dependable, well-implemented, and feature-rich software is critical to fly safely and collect the necessary data during a commercial operation. While, on the surface, proprietary software seems to tick all those boxes, the drone industry is currently shifting its focus to open-source technologies.

In 2009, we saw the birth of the Pixhawk* (which became PX4 in 2011) and the ArduPilot (APM) flight-control projects to enable everybody to freely create and use trusted, autonomous, unmanned vehicle systems. As open-source projects, it meant, and still means, the platform’s software source code was freely available on the Internet, providing everyone with easy access to code, software, designs, and features that could be shared, modified, redistributed, and implemented into developers’ applications and hardware, under certain licensing terms – such as GPLv3 for APM and BSD-3 for PX4. While these are two of the leading open-source projects, there are others such as the industry-standard communication protocol MAVLink, QGroundControl, and more.

In 2014, the Dronecode Foundation was founded to make sure all drone software created in an open-source environment stays that way and remains non-discriminative while building a sustainable ecosystem for critical drone components and fostering a collaborative community of top developers, end-users, and vendors. Today, as a non-profit organization that belongs to the Linux Foundation, Dronecode has set the standards over the last decade in the drone industry with PX4, MAVLink, and Pixhawk.

Still in 2014, a DroneAnalyst report from Colin Snow mentioned that thousands of hobbyists and researchers were taking advantage of open-source platforms, whereas most commercial drone operators were using proprietary drone software. For the latter, this was mostly due to the misconception that open-source software couldn’t get certified to be used commercially, and that it was harder to work with than proprietary software since it “lacked” in various fields, such as quality and tech support. This…

Source…

Benefits of Building a Multi-prong Mousetrap for WAF Policies with ML


The reason behind buying a market-leading Web Application Firewall (WAF) is to protect your website and web applications from malicious attacks, plus complying with industry or regional data and privacy standards. In addition to the typical OWASP Top 10 vulnerabilities, WAFs need to address a litany of cyber-threats from simple attacks like SQL injection to more sophisticated Advanced Bot Attacks. With the average cost of a data breach nearing 4 million dollars and the average time to identify and contain a breach nearing 280 days, enterprise security teams have an uphill battle to fight as the number and complexity of breaches grow. Fortunately, many security vendors are leveraging technologies – from automation and analytics to AI and crowdsourcing – in order to replace traditionally resource-intensive processes, for faster response times and for newer threat models. At Imperva, we recognized the growing threats of Bots from both the activity-level and threat complexity. To combat this, we’ve introduced Advanced Bot Protection (learn how Advanced Bot Protection is integrated into Imperva’s Cloud Application Security, here) that uses Machine Learning – this collects and analyzed data behavior for anomalies, and also incorporates advances in biometric data validation (e.g., mouse movements, mobile swipe, and accelerometer data, etc.) to catch malicious Botnets that attempt to hijack devices. We’re proud to say that we’ve become the industry leader in protecting and providing insights on advanced bots (download the 2021 Bad Bot Report).

Cybercriminals today are using AI, which typically runs on a supercomputer and is programmed to attack at any moment. Enterprise security professionals know the adage of ‘not bringing a knife to a gunfight’ and are continuing to seek out security solutions with advanced technologies to make their response a fair fight. Unfortunately, due to digital transformation initiatives or the post-covid era, the attack surface for enterprise continues to grow as threats continue to innovate, with the likes of botnet swarms and crypto-mining malware. Whether these threats are from individuals or nation-states, the intent to exploit has…

Source…