Spider in a Light
Daily Photo Written with a loving hand by kitt some time around 13:30 on 25 October 2017This spider must have had quite the adventure to have ended in Mom's car's tail light.
Sleeping Giants
Book Notes kitt decided around 21:51 on 24 October 2017 to publish this:This is book 1 of The Themis Files
This book was on my Amazon Wish List from a year or so ago. It was on some reading list I had read, likely a book riot list, but not on my immediate to-read stack. Sagan had it on our road trip, which is when I started reading it. I didn't finish it on the trip, so kept it to finish later. And, today was later.
I enjoyed this book. It is told in the piece-together reports from different people, told in an interview style, as popularized by World War Z. The characters were written well enough for me to "GRRRRRR!" at a couple, which is great. The ending was a surprise, but likely shouldn't have been given this is book one of a (planned) three book series.
I'll read the next book when it comes out.
"Most people don't really have a purpose, a sense of purpose anyway, beyond their immediate surroundings. They're important to their family, but it doesn't go much beyond that. Everyone is replaceable at work. Friendships come and go.
Part 3: 3: Headhunting File No. 120
"Love makes people do some crazy things."
Part 3: 3: Headhunting File No. 120
"One thing is certain. You are a survivor, Doctor Hans. You are definitely not one to throw away your life, your family, and your career, for something as petty as principles."
File No. 121
"They're bluffing. You know that."
"So are we. Bluffing doesn't mean what it used to. No one wants an all out war, and everyone knows it. Both sides know the other side doesn't want to fight so we push each other against the wall, a tiny bit further every time. It's all about saving face, but basically we're playing chicken, and both sides think they can do whatever they want because the other guy will never use its nuclear arsenal. It probably won't be today, but someday, someday, one of us is going to be terribly wrong."
File No. 129
"I never understand the merits of proportional response."
"I'm not sure there are any. It's just what we call human nature for people with too much firepower in their hands."
File No. 129
"I can understand your desire to distance yourself from this decision, given the current state of affairs, but you did make a choice. That choice will not cease to be yours because a lot of people might die as a result."
File No. 129
"Your an asshole, you know that? Isn't that a bit arbitrary?"
"Of course it is. Most things are."
File No. 129
"What he did, however horrifying, doesn't have to negate every other day of his life."
File No. 141
"What did you do then?"
"Nothin'. Our other boat stopped. We waited. Submarines are slow, clumsy things. A lot of what we do is just sit and wait. We're good at that."
File No. 143
"They told me she'd be courtmartialed. She must have been right, about her orders, I mean."
"I thought you said she would be ..."
"They also made it very clear to me that none of this ever happened. I don't think they'll put anyone on trial for something that didn't happen."
"Are you always this cynical? You seem to doubt a lot of what you were told."
"It's all cockamamie, if you ask me. Military intelligence. They'd come up with these really farfetched stories, and just because we don't ask questions they think we're actually buying it. They forget they're talking to people who were trained not to ask questions. If it were up to me, I'd rather they just didn't tell me anything. It's less insulting than to be lied to."
File No. 143
"People often confuse leadership with managerial skills. I agree with their assessment. You certainly have the ability to inspire people. Minutae on the other hand might not be your forte."
File No. 229
"It's one thing to risk your own life. It's fairly easy to rationalize the deaths of strangers. To shoulder the death of a friend, someone you know, that's a completely different thing."
File No. 229
"I feel numb... After something this intense, everything else just... things that would have you up in arms before now seem so utterly trivial. Nothing really matters. You start to ignore little things because they're little things. You compromise, you rationalize. Soon you look at yourself in the mirror and you don't recognize the person staring back at you. But, you know, I'm alive, I'm okay. I wake up every day and I get out of bed thinking today might be just a bit better than yesterday. Most of the time it is."
File No. 229
"Most of their days are never going to change, no matter what. I suppose that's why people are disenchanted with politics. They expect whoever they elect to change their lives."
File No. 233
"... My deepest wish is for this discovery to redefine alterity for all of us."
"Alterity?"
"The concept of otherness. What I am is very much a function of what I am not. If the other is the Muslim world, then I am the Judeo-Christian world. If the other is from thousands of light years away, I am simply human. Redefined alterity and you erase boundaries."
File No. 233
"It pains me to say it, but I have always been thoroughly bewildered by North Korea. They cannot be threatened, as they feel themselves superior to the one making the threat. They cannot be reasoned with, and most importantly, they are one hundred percent convinced of their righteousness, so they cannot be bought. Meglomaniacs with delusions of granduer are notoriously difficult to handle, but how generations could follow one another is beyond me."
File No. 233
"If you fall love with someone, there is a good chance the person won't love you back. Hatred, though, is usually mutual. If you despise someone, it's pretty much a given they're also not your biggest fan."
File No. 250
"... I guess what I'm saying is, it's easier to be just one more soldier in a giant army than being the whole army by yourself."
"It does not matter if you are all alone or one in an army of thousands. You have a choice. You have always had a choice. You should be grateful to be in a position to make it when the stakes are so clear. They rarely are."
"I'm not sure I understand."
"You are in control of a formidable weapon, but one that is designed for close combat. This means that you will always see whomever you choose to kill. That is a clear choice. Destroying a bridge in a night incursion is a much harder decision to make, you just never took the time to think about it. Removing it could prevent enemy reinforcements from reaching the front line, that bridge could also be the only escape route for civilians. How many people will you save? How many will you send to their deaths? That is a complicated decision to make."
File No. 250
"I will say one more thing before you go. Stop worrying so much. Are you doing your best?"
"I fear my best may not be enough."
"Then you should come to peace with whatever comes. All you can do is try your best."
File No. 255
Countdown to Zero Day
Book Notes kitt decided around 19:29 on 22 October 2017 to publish this:Whoa. Another non-fiction book. It's like my goal to finish all my started books is demonstrating I'm not a big fan of non-fiction books, post-school.
Or something.
This book describes the exposure and investigation of the Stuxnet computer virus. Because the book is describing the virus, and its subsequent children, parents, and cousins, it has to give some background of the world as it existed when the virus was released. This particular form of story-telling, the form of chronological progression, makes the first part of this book slooooooooooooow. Rob warned me when he handed me the book, told me to keep going, it'll get better. The fact that I started this book in December of 2015, and am only now finishing it, testifies somewhat to how slow I found the beginning of the book.
The middle of the book, however, and the end, those went much faster. Around chapter eight or so, the story line picks up and becomes interesting and engaging.
If you have a good library and interest in this book, I recommend starting out with the audiobook version, to get through the first part, then switch to reading. The whole story is politically and technically fascinating.
That there are people who believe in making the computing world safe for the rest of us, despite some of the bad guys being on our own team, helps me sleep better at night. Not well, but better. That the world described in the book still exists and that we have Cheetoh instead of Obama is a terrifying prospect.
In amassing zero-day exploits for the government to use in attacks, instead of passing the information about holes to vendors to be fixed, the government has put critical-infrastructure owners and computer users in the United States at risk of attack from criminal hackers, corporate spies, and foreign intelligence agencies who no doubt will discover and use the same vulnerabilities for their own operations.
Location 4019
But it’s a government model that relies on keeping everyone vulnerable so that a targeted few can be attacked — the equivalent of withholding a vaccination from an entire population so that a select few can be infected with a virus.
Location 4032
Dagan was known to favor assassination as a political weapon.
Location 4433
Bencsáth’s heart was pounding as he clicked Send to e-mail the report. “I was really excited,” he says. “You throw down something from the hill, and you don’t know what type of avalanche there will be [ as a result ].”
Location 4686
On one, he’d circled the URL of a website he’d visited that contained the letters “en/us” — proof that the US government was watching his computer, he ...
Location 4702
Okay, I laughed out loud at this one. en/us is a designation to display a web page with US English, instead of say, Canadian English or UK English (you know, that color versus colour thing).
Another correspondent, a female cookbook author, sent Chien a few e-mails via Hushmail — an anonymous encrypted e-mail service used by activists and criminals to hide their identity.
Location 4704
I have to wonder why the "female" part of the author's identity had to be explicitly stated. Because male cookbook authors aren't technically clueless? Something about the balls make male cooks more technically sophisticated than women cooks?
A nuclear-armed Iran, he said, would be “a grave threat” to peace not just in the Middle East, but around the world. 37 He promised that under his leadership all options would remain on the table to prevent Iran from obtaining nuclear weapons. Although in essence this meant a military option as well, Obama, like Bush, wanted to avoid a military engagement at all costs.
Location 6048
"Avoid a military engagement at all costs."
This isn't something I think I hear nearly enough. The cost of war is incredible. It destroys people, the victors and the defeated. Everyone but the arms dealers who don't see the results of their product are damaged in some way.
But don't tell my dead brother that. He thinks violence solves all problems.
“Together with the international community, the United States acknowledges your right to peaceful nuclear energy — we insist only that you adhere to the same responsibilities that apply to other nations,” he said. “We are familiar with your grievances from the past — we have our own grievances as well, but we are prepared to move forward. We know what you’re against; now tell us what you’re for.”
Location 6392
“Faced with an extended hand,” Obama said, “Iran’s leaders have shown only a clenched fist.”
Location 6396
US military and intelligence agencies had been penetrating foreign systems in Iran and elsewhere, building stockpiles of digital weapons, and ushering in a new age of warfare, all without public discussion about the rules of engagement for conducting such attacks or the consequences of doing so.
Location 6907
Of all the nations that have a cyberwarfare program, however, the United States and Israel are the only ones known to have unleashed a destructive cyberweapon against another sovereign nation — a nation with whom it was not at war. In doing so, it lost the moral high ground from which to criticize other nations for doing the same and set a dangerous precedent for legitimizing the use of digital attacks to further political or national security goals.
Location 6926
Civil War general Robert E. Lee said famously that it was a good thing war was so terrible, “otherwise we should grow too fond of it.” The horrors and costs of war encourage countries to choose diplomacy over battle, but when cyberattacks eliminate many of these costs and consequences, and the perpetrators can remain anonymous, it becomes much more tempting to launch a digital attack than engage in rounds of diplomacy that might never produce results.
Location 6932
The targets most in danger from a digital attack in the United States are not just military systems but civilian ones — transportation, communication, and financial networks; food manufacturing and chemical plants; gas pipelines, water, and electric utilities; even uranium enrichment plants. 13
Location 6970
Any future use of digital weapons will likely be as an enhancement to conventional battle, not as a replacement for it. Critics of digital doomsayers also point to the fact that no catastrophic attack has occurred to date as evidence that the warnings are overblown. But others argue that no passenger jets had been flown into skyscrapers, either, before 9 / 11.
Location 7051
“For cyber deterrence to work,” Cartwright said in 2012, “you have to believe a few things : One, that we have the intent; two, that we have the capability; and three, that we practice — and people know that we practice.”
Location 7065
But while deterrence of this sort might work for some nations — as long as they believe an attack could be attributed to them — irrational actors, such as rogue states and terrorist groups, aren’t deterred by the same things that deter others.
Location 7069
Though one can argue that the 9 / 11 attacks required at least as much planning and coordination as a destructive cyberattack would require, a well-planned digital assault — even a physically destructive one — would likely never match the visual impact or frightening emotional effect that jets flying into the Twin Towers had.
Location 7097
Richard Clarke, former cybersecurity czar under the Bush administration and a member of the panel, later explained the rationale for highlighting the use of zero days in their report. “If the US government finds a zero-day vulnerability, its first obligation is to tell the American people so that they can patch it, not to run off [ and use it ] to break into the Beijing telephone system,” he said at a security conference. “The first obligation of government is to defend.” 40
Location 7167
Under the new policy, any time the NSA discovers a major flaw in software, it must disclose the vulnerability to vendors and others so the flaw can be patched. But the policy falls far short of what the review board had recommended and contains loopholes. 43 It applies only to flaws discovered by the NSA, without mentioning ones found by government contractors, and any flaw that has “a clear national security or law enforcement” use can still be kept secret by the government and exploited. The review board had said exploits should be used only on a temporary basis and only for “high priority intelligence collection” before being disclosed.
Location 7181
Then in 2012, the president signed a secret directive establishing some policies for computer network attacks, the details of which we know about only because Edward Snowden leaked the classified document. 50 Under the directive, the use of a cyberweapon outside a declaration of war requires presidential approval, but in times of war, military leaders have advance approval to take quick action at their discretion.
Location 7265
The presidential directive addresses only the military’s use of digital operations, however. A list of exceptions in the document excludes intelligence agencies like the NSA and CIA from it, as well as law enforcement agencies like the FBI and Secret Service.
Location 7281
The MFTUOAE Award
Blog Yeah, kitt finished writing this at 16:02 on 22 October 2017Okay, I have a nominee for the most frustrating to use OSX application EVAR, the coveted MFTUOAE Award.
It is, drumroll please, the Kindle App for Mac.
Good lord, is this thing frustrating to use.
If you use the mouse to move forward a page, the app will forward two pages.
If you use the mouse to move backward a page, the app will move backward two pages.
EVERY.
TIME.
If you want to highlight a passage, the app will move the book a page, forward or backward, neither direction is consistent.
If you do manage to select a section for highlighting, the selection will disappear when you move the cursor to the highlight section.
EVERYTHING about this app is frustrating with a mouse. I ended up using the trackpad on my laptop and the keyboard exclusively to track the sections of the books I wanted to highlight for a review.
I need to rethink my audiobook to ebook transfer process, this is so frustrating.
When A Beginner Asks For A Project To Do
Commentary kitt decided around 18:40 on 21 October 2017 to publish this:So, I'm about to start an adventure where I learn a new serverless (also known as 'Backend as a Service' or BaaS) technology and implement a small project with the new technology I've learned. Because there are large number of offerings for serverless(-for-me) technologies, we needed to have a number of projects to implement.
Sidenote, an argument could be made for implementing the same project across multiple serverless technologies, to expose the strengths and weakness of each of the technologies, as well as the service complexity and depth, in comparison with each other. While a worthwhile and valid argument if the adventure goal were to find a good technology fit for my company, the goal of the adventure is to explore the different serverless technologies. Variation is helpful with this exploration.
The first step on this adventure is commit to the adventure. Have done that.
The second step is generate a list of projects to consider for building. Each project needs a front-end app and a (serverless, natch) back-end API. Each needs a level of security. Each needs to store information. Each needs to have a set of models, and a set of actions. None of this is new information: I need a project to build.
So, I go off to the Intarwebs™, and start looking for "small web developer project ideas" and "projects for my web developer portfolio" and "what web project should I build?" and the like.
I'm expecting to find a nice, concise list of "Here, try building these. Each of them is a good, self-contained project that will explore some particular aspect of web development. You can document what you've done, put the code up on GitHub, and explore with potential peers the what-you-did, the why-you-chose-X, and the how-you-did-it."
Instead, there are a number of top posts that tell me, play around with building a form, build something with AJAX, build something with Bootstrap, learn Javascript!, learn about grid systems, and I just want to pull out my hair.
The reason for a project is to learn HOW to use these things. Reading examples or documentation doesn't mean using the code, playing with it, learning the nuances of the technology, and understanding what is going on with the code. Projects do that, they give someone a goal to complete, something with parts that great and parts that you have to trudge through.
Creating something that didn't exist before, making something you want to exist, THAT is where the high of programming starts. Using technology to solve a problem makes programming worth the time and mental energy. Learning for the sake of learning is fun, yes, but building something, THAT is better.
So, yeah, next time someone asks for a project, don't tell them to learn a technology. Instead, give them a problem to solve, something that you wish existed. Be excited about the project. She will have a project to build, and you'll have a problem solved.
And likely you'll have one fewer rant from me.