This article is first to report on the secret European five-partner sigint alliance Maximator that started in the late 1970s. It discloses the name Maximator and provides documentary evidence. The five members of this European alliance are Denmark Sweden, Germany, the Netherlands, and France. The cooperation involves both signals analysis and crypto analysis. The Maximator alliance has remained secret for almost fifty years, in contrast to its Anglo-Saxon Five-Eyes counterpart. The existence of this European sigint alliance gives a novel perspective on western sigint collaborations in the late twentieth century.
Attitudes and judgments have these biases baked into them. Failing to appreciate this simple fact allows all sundry forms of popular nonsense to remain unchallenged. Such is the case with cyberattribution.
Faith-based attribution is a term used by security specialist Jeff rey Carr to denote nonscientific analysis that leads to untestable attribution to a security incident.
Putin, Wikileaks, the NSA and the DNC email fiasco that gave Trump and Clinton another reason to be at odds
Mind-shift, must have.
ExtremeTech, 17 May 2013
Over the past year, we’ve covered a number of the challenges facing the supercomputing industry in its efforts to hit exascale compute levels by the end of the decade. The problem has been widely discussed at supercomputing conferences, so we’re not surprised that Horst Simon, the Deputy Director at the Lawrence Berkeley National Laboratory’s NERSC (National Energy Research Scientific Computing Center), has spent a significant amount of time talking about the problems with reaching exascale speeds.
But putting up $2000 of his own money in a bet that we won’t hit exascale by 2020? That caught us off guard.
The exascale rethink
New revelations about National Security Agency abuses, which now include everything from industrial espionage to reports that the agency can access most data on our smartphones, seem to put everything we know about how business is done on the Internet in danger.
Complete story below the line.
Very good on hacker culture.