current lyfiyingcurrent date什么意思思

当前位置: &
fly中文是什么意思
音标:[ flai ]&&发音:&&过去式: flew&&&过去分词: flown&&&现在分词: flying&&&
中文翻译英英解释vi.(flew flown )1.飞 (about away forth off out), 飞行;驾驶飞机,坐飞机旅行。2.飞跑;(时间等)飞逝;飞散,碎,(门)突然打开;突然…起来;〔古语〕突击,扑向 (at on, upon)。3.奔逃,逃走〔过去式和过去分词要用 fled〕; 消失;褪色。4.(旗帜、衣服等)飘动,飞舞。5.(在棒球中)打飞球〔过去式和过去分词要用 flied〕。6.放鹰打猎。 短语和例子vt.1.飞,驾驶,空运。2.放(风筝、鸟等)。3.(坐飞机)飞过。4.使(旗帜)飘扬。5.逃避,逃出,从…逃开〔过去式和过去分词一般用 fled〕。短语和例子n.1.飞,飞行;飞行距离,飞程。2.〔 pl. flys〕 〔英国〕轻便旅行马车。3.(服装的)钮扣遮布;(帐篷的)门帘;(旗帜的)外端[布幅]。4.〔 pl.〕(舞台上部)布景控制处。5.【机械工程】飞轮,整速轮;【印刷】(印刷机上的)拨纸器;(织机的)飞梭,锭翼,锭壳; 【纺织;印染】飞花,落棉,飞毛;(棒球中的)飞球。短语和例子n.(pl. flies )1.蝇,苍蝇。2.(有透明翼的)飞虫。3.植物的蝇害,虫害。4.(钓鱼用的)假蚊钩。短语和例子adj.〔俚语〕伶俐的;敏捷的,敏锐的。 fly cop 便衣侦探。:&&&&飞修正角转弯进场着陆:&&&& 飞向,扑; 攻击(不用被动语态 ...:&&&&时间飞逝; (一架或几架飞机)在低空飞过指定地点,飞越; ...:&&&& 进 ...:&&&&飞进; 突发:&&&&猛烈袭击, 向...发脾气:&&&&飞往某地; 飞向; 急向风转艏:&&&&n. (pl. -bies) 飞机或太空飞船的越过定点〔 ...:&&&&禁飞的:&&&&禁飞的
例句与用法We flew coach from denver to new york .我们坐二等舱由丹佛飞到纽约。The delegation flew from london to new york .代表团由伦敦飞往纽约。Two of the wolves flew upon the guide .有两只狼向那带路人扑了过去。Rosy evening clouds and lone ducks fly together ...落霞与孤鹜齐飞。Swallows fly about , carefree and at liberty .燕子自由自在地飞翔。We flew from london to bombay in one hop .我们从伦敦直接飞到孟买。They all set to work and the time flew .他们都开始工作,时间在飞逝。The foolish young man had asked her to fly .糊涂的小伙子约她私奔。His partner flew the coop with all the money .他的合伙人卷款逃走了。Those who fly too high may come to grief .野心勃勃的人可能遭惨败。更多例句:&&1&&&&&&&&&&
相邻词汇热门词汇
fly的中文翻译,fly是什么意思,怎么用汉语翻译fly,fly的中文意思,发音,例句,用法和解释由查查在线词典提供,版权所有违者必究。
&&&&&&&&&&&&&&&&
Copyright &
(京ICP备号)
All rights reserved(window.slotbydup=window.slotbydup || []).push({
id: '2014386',
container: s,
size: '234,60',
display: 'inlay-fix'
&&|&&1次下载&&|&&总272页&&|
少有的精算词典,上财出的
您的计算机尚未安装Flash,点击安装&
阅读已结束,如需下载到电脑,请使用积分()
下载:20积分
相关分类推荐
0人评价2页
0人评价2页
0人评价1页
0人评价28页
0人评价35页
所需积分:(友情提示:大部分文档均可免费预览!下载之前请务必先预览阅读,以免误下载造成积分浪费!)
(多个标签用逗号分隔)
文不对题,内容与标题介绍不符
广告内容或内容过于简单
文档乱码或无法正常显示
若此文档涉嫌侵害了您的权利,请参照说明。
评价文档:
下载:20积分current meter
测流计;[电] 电流计
电子电工、灯饰照明专业词汇 ...
current matching transformer 电流匹配互感器
current meter 海流计/流速计
current mode switch 电流型开关 ...
基于175个网页-
进出口货物名称中英对照(87) ...
current limiting type fuse cutout 限流熔断器
current meter 流速计
current mode digital-to-analog converter 电流型数-模转换器 ...
基于105个网页-
加气砼砌块砌筑规范 加气砼砌块价格,加气砼砌块 ...
current 电流流
current meter 临仪
current regime 水链态 ...
基于91个网页-
流速仪(current meter)是指用于测定水流速度的仪器。便携式超声波多普勒 流速仪是应用超声“多普勒效应”原理制成的超声测流仪。
基于82个网页-
叶轮式流速计
标准流速计
最大负荷测试器
电涡流厚度计
涡流测厚仪
电涡流厚流计
平方刻度电流表
自动流速记录仪
自动记录电疗
自动记录电流计
流速计电流表
斗式流速计
直流计数器
更多收起网络短语
- 引用次数:11
Fifthly, it gives a conclusion to the issue by analyzing from the sampling data, and put forward some new thinking about the current meter design.
第五,从数据采集的运行结果进行分析,对课题的研究进行了总结,并提出了设计流速仪的一些新思想。
参考来源 - 便携式智能流速仪的研制
- 引用次数:9
Combine with the data of UCM (Ultrasonic Current Meter), the original verification can be got for the theoretical analytic result.
结合UCM-60声学海流计相关实测数据,发现以上分析结果可以得到局部的初步验证。
参考来源 - 南海上层环流季节变化
- 引用次数:6
The acoustic difference travel-time ocean current meter's key technologies are studied in this paper.
本论文研究的是声传播时间差式海洋流速计的核心技术。
参考来源 - 时差法三维流速测量技术研究
&2,447,543篇论文数据,部分数据来源于
Current meter
A current meter is oceanographic device for flow measurement by mechanical (rotor current meter), acoustical means (ADCP) or electrical means.
以上来源于:
current meter
流速计,测流计
以上来源于:《21世纪大英汉词典》
[海洋][流]测流计;[电]电流计
Built-in indicator light, current meter, voltage meter buttons and rotary switch for customers to select.
内装万能转换开关、按钮、指示灯、电压表、电流表等元件,可按用户要求特殊加工。
A sea current meter protective cap is characterized by being a drum-shaped cap, a cap wall is provided with two grooves, and the cap bottom is provided with two cone-shaped posts.
一种海流计保护帽,其特征是一圆桶形的帽,帽壁上开有两个槽,帽底有两根锥形的柱。
At present, method of thermal current meter, hotbox method, infrared thermal perturbation of the external walls in China are main methods to measure the heat transfer coefficients.
现阶段,热流法、热箱法,热红外摄像仪法是我国测量外墙传热系数的主要方法。
American Nathan Adrian took the lead early, touching the wall ahead of Australian and current 100-meter world champion James Magnussen.
Raun and Ensor conclude that federal air quality standards are adequate where ozone levels are concerned (at 75 parts per billion), but that lives would be saved if particulate matter standards were tightened below the current level of 35 micrograms per cubic meter of air.
Current designs can produce two kilowatts per cubic meter of liquid reactor volume and without any drawbacks (some models produce methane as a by-product, this tech does not).
$firstVoiceSent
- 来自原声例句
请问您想要如何调整此模块?
感谢您的反馈,我们会尽快进行适当修改!
请问您想要如何调整此模块?
感谢您的反馈,我们会尽快进行适当修改!Categories:
Here is a copy for convenience of the , a London School of Economics (LSE) Reader in Health Economics and Policy:
Dr. Oliver is published in the areas of health equity, economic evaluation, risk and uncertainty, and the economics and policy of health care reform. The interface between economics and political science in health care policy analysis motivates .
Since 2001 he has worked at the LSE, where currently he is Lecturer in Health Economics and Policy in the Department of Social Policy, and Senior Research Fellow and Deputy Director of LSE Health and Social Care, one of the largest research institutes in the health-related social sciences in Europe. 2005-06 Commonwealth Fund Harkness Fellow in Health Care Policy, Dr. Oliver holds a doctorate in economics from the University of Newcastle and an MSc in health economics from the University of York. He is a 1995-97 Japanese Ministry of Education (Monbusho) Research Scholar, Founding Chair of the Health Equity Network, Founding Coordinator of the Preference Elicitation Group, and a former Coordinator of the European Health Policy Group. He also is Founding Co-Editor of the journal, Health Economics, Policy and Law.
See also the forthcoming ““, an interdisciplinary and international peer-reviewed journal devoted to behavioural research and its relevance to public policy.
Posted in .
November 8, 2016
Thanks to everyone recently telling me they miss my blog posts. To be honest I have a queue of written posts unreleased because I went through one of those writing phases where erratic Tweets seemed like an easier public legacy than slogging through full paragraphs and illustrations. For six years I wrote a post every day, come rain or shine. Now it’s down to a post every harvest moon if that.
Of course in private I write for a living, typing up analysis and trying to expose fun facts of history for the many corporations building security teams and products. As the private load increased, my public writing necessarily changed to keep some distance. Balance wasn’t really expected.
Recent posts in particular I have been asked to release include defense of backdoors, surveillance camera economics and models for patching IoT…with a little elbow grease and a hammer applied to this rusty site they may soon be appearing.
Posted in .
November 6, 2016
that Dave Aitel last April wrote an article “”
…while economic competitiveness is at some level a strategic need, the particular defense of a US Company is not something the NSA can and should prioritize. The answer to this problem is allowing private companies to offer their services under strict law enforcement and intelligence community oversight to perform the actions needed, including remote intrusion, data exfiltration and analysis, that would allow US Steel and the US Government to build a rock-solid case for criminal liability and sanctions. In that sense, cyber Letters of Marque are more similar to private investigator licensing than privateer licensing.
To me this misses the real point of letters of marque. An extension of government services under license is approaching the for-hire contract system as used already. The infamous Blackwater company, for example, .
We are trying to do for the national security apparatus what FedEx did for the Postal Service
Let me set aside a US-centric perspective for a moment, given that it has not ratified the
to formally outlaw privateers. Arguably this is because American leaders thought they never would want or have a standing military and thus would rely on privateers for self-defense against established European armies. The Constitution Article 1, Section 8 still has letters of marque as an enumerated power of Congress.
To declare War, grant Letters of Marque and Reprisal, and make Rules concerning Captures on Land and W
To raise and support Armies, but no Appropriation of Money to that Use shall be for a longer Term than two Y
Note that 2 year limit on funding Armies. US Congress right now can issue a letter of marque to private entities, who would be given neither funding nor oversight, so they can submit prizes won to a court for judicial determination.
On a more global note what really we ought be talking about here is how someone wronged directly can take action, akin to self-defense or hiring a body-guard, when their government says an organized defense is unavailable. A letter of marque thus would be offered as license to defend self in consideration of a court after-the-fact, where a government entity can not help.
In historic terms (before 1855) any authority might issue a letter to “privateers”; spoils of enemies found were to be brought back to that issuer’s court for settlement. Upon seizing goods the privateer returned to an admiralty or authority for assessment in what we might call a “spoils court”.
An excellent example of this was when two ships with American flags attacked a British ship because at war. A fourth ship sailed late into this battle flying a British flag and chased away the two American ships. Sounds like a simple case of British nation-state defending self against two American privateers, right?
No, this fourth ship then dropped its British flag, raised an American one, and scuttled the already heavily damaged British ship that it had pretended to defend. Now acting as an American privateer it could enter an American port alone with enemy spoils as a “patriotic” duty under a letter of marque. Had the fourth ship simply helped the other two American ships a spoils court would have awarded at most a third of the full sum it received.
The use of an authority for judgment of spoils and settlement is what distinguishes the “patriotic” privateers from pirates who operated independently and eschewed judgment by larger global organizations (pirates often were those who had left working for large organizations and set out on their own specifically to escape unjust/unhealthy treatment).
So I say letters of marque have a different and more controversial spin from the licensing or even a contractor model mentioned above in Aitel’s post:
…allowing private companies to offer their services under strict law enforcement and intelligence community oversight to perform the actions needed…
Strict oversight? What also we must consider is issuing letters to companies wronged that will not have strict oversight (because cost/complexity). How can
we , using after-the-fact oversight in courts?
We seek to maintain accountability while also releasing obligation for funding or strict coordination by an authority. This takes us into a different set of ethics concerns versus a system of strict oversight, as I illustrated with the American ship example above. Ultimately the two wronged American ships had recourse. They sued the fourth ship for claiming spoils unfairly, since it arrived late in the battle. Courts ruled in their favor, giving them their “due”.
Here’s a simple example in terms of US Steel:
The US government finds itself unable to offer any funds or oversight for a response to attack reported by US Steel. Instead the government issues a letter of marque. US Steel itself, or through private firms it contracts, finds and seizes the assets used by its attackers. Assets recovered and details of case are submitted to court, which judges their actions. Spoils in modern terms could mean customers, IP or even infrastructure.
In other words, if US Steel finds 90% of IP theft is originating from a specific service provider, and a “take over” of that provider would stop attacks, the courts could rule after US Steel defends itself that seized provider assets (e.g. systems and their networks found with IP stolen from US Steel) are a “prize” for US Steel.
It’s not a clear-cut situation, obviously, because it’s opening the possibility of powerful corporations seizing assets from anyone they see and think they can take. That would be piracy. Instead accountability for prizes is considered by authority of courts, to reduce abuse of letters.
Posted in , , .
June 30, 2016
While reading about the
I ran into a reference that said French Kings borrowed cryptography concepts from Arabs. A little more digging and I found an .
He writes that Muhammad ibn Abbad al-Mu’tamid (??????? ?? ????), King of Seville from , used birds in poetry for secret correspondence. For example:
La tourterelle du matin craint le vautour,
Qui pourtant préfère les nuées d’étourneaux,
Ou au moins les sarcelles et les loriots
Qui plus que tout craignent les éperviers.
Matching names of birds to their first letter we get “t v e s l e”, which Lehning contends is the message “tues-le”: kill him
My translation:
The morning dove fears the vulture,
yet who prefers swarms of starlings,
or at least teal and orioles,
who most of all fear the hawk.
Would love to find the original imagery as I imagine the King’s poetry to be highly calligraphic or even a form of pictorial encoding.
Posted in , , .
May 28, 2016
Looking at a brand new vehicle console interface for BlueTooth connections we found it prompted the user to select a device name, yet used a limited visual space. The prompt, right in front of the driver on the center console, asks (changed slightly to mask offending vehicle manufacturer):
Would you like to connect…
Then the device name gets inserted immediately after. This led to the natural question whether we could dictate behavior instead of asking the user to make a decision.
We changed a phone name to “Press OK to Continue” put phone into discovery/connect mode and waited in a parking lot. Soon after we had a rogue connection to a car, as a driver thought “Press OK to Continue” was a prompt, not the device name.
Posted in .
May 7, 2016
Charlotte, North Carolina, has a history marker that I noticed while walking on the street.
It is in need of major revision. Let me start at the end of the story first. A search online found a “NC Markers” program with an entry for .
Closer to the end of the war…tools and machinery from the yard were moved from Charlotte to Lincolnton. Before the yard could be reassembled and activated in Lincolnton, the war ended. After the war the yard’s previous landowner, Colonel John Wilkes, repossessed the property, for which the Confederate government had never paid him. Where the Confederate Navy Yard once operated, he established Mecklenburg Iron Works. It operated from 1865 until 1875 when it burned.
Note the vague “the war ended” sentence. This supposedly historic account obscures the simple context of the Confederates losing the war. I find that extremely annoying.
To make the problem more clear, compare the above L-56 official account with the :
The exact date of the formation of the Mecklenburg Iron Works is unknown, as is ownership of the firm until its purchase in 1859 by Captain John Wilkes. There is evidence, though, that the firm existed as early as 1846. The son of Admiral Charles Wilkes, John was graduated first in his class at the U.S. Naval Academy in 1847. Following a stint in the U.S. Navy, Wilkes married and moved to Charlotte in 1854. Two years after he purchased the iron works, the Confederate government took it over and used it as a naval ordnance depot. After the Civil War, Wilkes regained possession of the Iron Works, which he operated until his death in 1908. His sons, J. Renwick and Frank, continued the business until 1950, when they sold it to C. M. Cox and his associates.
So many things to notice here:
There was a Captain John Wilkes, not Colonel, although neither story says for which side he fought. An
and says he was active during Civil War
Captain John Wilkes was the son of infamous Union Navy Admiral Charles Wilkes, who was given a court-martial in 1864. Was John, son, fighting for the North with father, or South against him?
There is evidence these Iron Works were established long before the Civil War. NC Markers says “as early as ;. The
says Vesuvius Furnace, Tizrah Forge and Rehoboth Furnace were operating 35 years earlier, with a picture of the Mecklenburg Iron Works to illustrate 1810.(1)
Wilkes was not just “yard’s previous landowner”, he ran an iron works two years before the Confederate government took possession of it. Did he lose it as he went to fight for the North, or did he give it to help fight for the South? Seems important to specify yet no one does. In any case the iron works was pre-established, used during Civil War and continued on afterwards
The bigger question of course is who cares that there is a Confederate Navy yard in Charlotte, North Carolina? Why was a sign created in 1954 to commemorate the pro-slavery military?
Taking a picture of the sign meant I could show it to an executive business woman I met in Charlotte, and I asked her why it was there. She told me “Democrats put up that sign for their national convention”. She gave this very strangely political answer about the Democrats in her very authoritative voice while being completely wrong. She ended with an explanation that there was no mention of slavery because (yelling at me and walking away) “CIVIL WAR WAS ABOUT TAXES, NOT SLAVERY. I KNOW MY HISTORY”.
I found this also very annoying. Apparently white educated elites in North Carolina somehow have come to believe Civil War was not about slavery. She was not the only one to say this.
What actually happened, I found with a little research, was the North Carolina Highway Historical Marker Program started in 1935. They put up the signs, with no mention of Democrats of political conventions, as you can tell from .
Here is how the
on the street:
For residents the presence of a state marker in their community can be a source of pride
Source of pride.
Honestly I do not see what they are talking about. What are people reading this sign meant to be proud of exactly? Is a failed attempt by pro-slavery military to create a Navy a proud moment? Confederate yards failed apparently because of huge shortages in raw materials and labor, which ultimately were because of failures in leadership. That is pride material?
What am I missing here?
The sign is dated as 1954. Why this date? It was the year the U.S. Supreme Court struck down “separate but equal” doctrine, opening the door for the civil rights movement. It was the year after Wilkes oldest surviving child died. Does a pro-slavery military commemoration sign somehow make more sense in 1954 (city thumbing nose at Supreme Court or maybe left in will of Wilkes last remaining child) than it does in 2016?
to change one of their campus monuments explains the problem with claiming this as a pride sign:
Students and faculty immediately objected to this language, which 1) failed to acknowledge slavery as the central cause of the Civil War, 2) ignored the role white supremacy played in shaping the Lost Cause ideology that gave rise to such memorials, and 3) reimagined the continued existence of the memorial on our campus as a symbol of hope.
From the 1870s through the 1920s, memorial associations erected more than 1,000 Confederate monuments throughout the South. These monuments reaffirmed white southerners’ commitment to a “Lost Cause” ideology that they created to justify Confederate defeat as a moral victory and secession as a defense of constitutional liberties. The Lost Cause insisted that slavery was not a cruel institution and – most importantly – that slavery was not a cause of the Civil War.
Kudos to the Mississippi campaign to fix bad history and remove Lost Cause propaganda. The North Carolina sign’s 1950s date suggests there might be a longer period of monuments being erected. When I travel to the South I am always surprised to run into these “proud” commemorations of slavery and a white-supremacy military. I am even more surprised that the residents I show them to usually have no idea where exactly they are, why they still are standing or who put them up.
At the very least North Carolina should re-write the sign to be more accurate. Here is my suggestion:
MECKLENBURG IRON WORKS: Established here 1810. Seized by pro-slavery forces 1862 after defeat in Portsmouth, Va to supply Navy. Freed in 1865.
That seems fair. The
really also should be rewritten.
For example NC Markers wrote:
in time it began to encounter difficulty obtaining and retraining trained workers
Too vague. I would revise that to “Southerners depended heavily on immigrants and Northerners for shipyard labor. As soon as first shots were fired upon the Union by the South, starting a Civil War, many of the skilled laborers left and could not be replaced. Over-mobilization of troops further contributed to huge labor shortages.
NC Markers also wrote:
given its location along the North Carolina Railroad and the South Carolina Railroad, it was connected to several seaboard cities, enabling it to transport necessary products to the Confederate Navy
Weak analysis. I would revise that to “despite creating infrastructure to make use of the Confederate Navy Yard it had no worth without raw materials. Unable to provide enough essential and basic goods, gross miscalculation by Confederate leaders greatly contributed to collapse of plans for a Navy”
But most of all, when they wrote “the war ended” I would revise to say “the Confederates surrendered to the Union, and with their defeat came the end of slavery”.
Let residents be proud of ending the pro-slavery nation, or more specifically returning the Iron Works to something other than fighting for perpetuation of slavery.
So here is the beginning of the story, at its end. Look at this sign on the street in Charlotte, next to Bank of America headquarters:
(1) 1810 – Iron Industry screenshot from
Posted in , , .
April 18, 2016
I’ve spent years fiddling with social engineering at a bank of elevators. At first it was just part of the job (getting past security) and now it’s become something more of an analytic game.
Let’s say you have six doors, where you have to push the button and wait for one to open. A crowd forms, three, five, maybe even seven people. Should you try to jump in first when the door opens?
Time and again I find it better to step towards the door and hold it open until it’s completely full. Everyone else will move sheepishly towards the first door they see, or at least the closest open one. Encourage this behavior and help as many people as possible quickly squeeze into a tiny box together. Maybe even push all the floor buttons for them. Then jump out and let the doors close without you inside. The more you pushed in the better.
Pat yourself on the back, push the elevator button again and step alone into the next elevator that opens its doors. Of course the congratulations really depends on how well you estimated flow of arriving passengers and where they’re going (could be a group together choosing a single floor).
It’s a great game of allocation logistics that soon will be replaced by computers assigning people to elevators using basic math. Enjoy it while you can.
Posted in .
April 7, 2016
Does encryption prevent crime?
Recently I wrote of how the . Looking back at that example being on the right side of history meant being on the wrong side of a law, which ultimately meant committing a crime to prevent a crime. Privacy from surveillance was essential to creating change (e.g. ending the ) because a lack of privacy could mean arrest, imprisonment or even death. So yes, we can point to an example where encryption prevented crime, by enabling crime.
When we hear encryption prevents crime we probably need to ask for hard evidence to give us perspective or context. Rather than look at a rather complex issue case by case by case, I wonder if a larger body of work already is available. Has anyone written studies of how encryption prevents crime across the board, over time? Although I have searched far and wide, nothing has appeared so far. Please comment below or contact me if you know of such a study.
A good example of where I have searched is the . It has many great resources and links, with well-known cryptographers studying social issues. I thought for sure it would have at least several titles on this topic. Yet so far I have not uncovered any vetted research on the economics of preventing crime with encryption.
We may be left for now pulling from examples, specific qualitative cases, such as the ANC. Here is a contemporary one to contemplate: TJX used encryption for wireless communication, and yet ended up having their encryption , as explained by the Privacy Commissioner of Canada.
The point here is that, despite a fair number of qualitative technical assessments, we seem to lack quantitative study of benefits to crime fighting from encryption. We also lack nuance in how we talk about the use of encryption, which is why you might hear people claim “encryption is either on or off”. That binary thinking obviously does us no favors. Saying the lock is either open or closed doesn’t get at the true issue of whether a lock is capable of stopping crime. Encryption at TJX was on, and yet it was not strong enough to stop crime.
Another good example of where I have searched is the Verizon Breach report, arguably the best breach analysis in our industry. Unfortunately even .
What I am getting at is we probably should not passively accept people making claims about crime being solved, as if true and a foregone conclusion without supporting evidence. Let us see data and analysis of encryption solving crime.
While searching for studies I did find a 2015 . Bold claim.
…default encryption on smartphones will prevent millions of crimes, including one of the most prevalent crimes in modern society: smartphone theft. In the long run, widespread smartphone encryption will ultimately preserve law and order far more than it will undermine it.
Here is why I think it could be better to challenge these statements instead of letting them slip through. The author arrived at this conclusion through sleight of hand, blurring encryption with data from studies that say a “kill switch” option has been linked to lower rates of physical theft. These studies do not have data on encryption. Protip: . Not the same thing at all and data from one is not transferable to the other. Then, as if we simply swallowed without protest two very different things being served as equivalent, the author brings up ways that a kill switch can fail and therefore is inferior to encryption.
In logic terms it would be A solves for C, therefore use B to solve for C. And on top of that B is better than A because D. This is roughly like:
A: pizza solves C: hunger
B: therefore use water to solve for C: hunger
A: pizza gets soggy when wet, therefore B: water best to solve C: hunger because D: doesn’t get soggy
A careful reader should wonder why something designed to preserve and protect data from theft (encryption) is , which may not be related at all to data theft.
…kill switches—even if turned on by default—have serious shortcomings that default encryption doesn’t. First, the consumer has to actually choose to flip the switch and brick the phone after it’s been stolen. Second, the signal instructing the smartphone to lock itself actually has to reach the phone. That can’t happen if the crooks just turn the phone off and then take some trivial steps to block the signal, or ship the phone out of the country, before turning the phone back on to reformat it for resale. (Smartphone theft is increasingly an international affair for which kill switches are not a silver bullet.) And finally, enterprising hackers are always working to provide black market software solutions to bypass the locks, which is one of the reasons why there is a thriving market for even locked smartphones, as demonstrated by a quick search on eBay. Those same hackers, however, would be decisively blocked by a strong default encryption solution.
That last line is nonsense. If nothing else this should kill the article’s credibility on encryption’s role in solving crime. Hard to believe someone would say enterprising hackers always work to bypass locks in one sentence and then next say that “strong default encryption” is immune to these same enterprising hackers. Who believes hackers would be “decisively blocked” because someone said the word “strong” for either locks or encryption? Last year’s strong default encryption could be next year’s equivalent to easily bypassed.
What really is being described in the article is a kill switch becomes more effective using encryption, because the switch is less easily bypassed (encryption helps protects the switch from tampering). That is a good theory. No one should assume we can replace a kill switch with encryption and expect a straight risk equivalency. While encryption helps the kill switch, the reverse also is true. A switch actually can make encryption far safer by erasing the key remotely or on failed logins, for example. Encryption can be far stronger if access to it can be “killed”.
Does installing encryption by itself on a device make hardware unattractive to re-sellers? Only if data is what the attackers are after. Most studies of cell phone theft are looking at the type of crime where grab-and-run is profitable because of a device resale market, not data theft.
Otherwise encryption could actually translate to higher rate of thefts because a device could be sold without risk of exposing privacy information. It actually reduces risk to thieves if they aren’t able to get at the data and can just sell the device as clean, potentially making theft more lucrative. Would that increase crime because of encryption? Just a thought. Here’s another one: what if attackers use encryption to lock victims out of their own devices, and then demand a ransom to unlock? Does encryption then get blamed for increasing crime?
Slate pivots and twists in their analysis, blurring physical theft (selling iPhones on eBay) with data theft (selling identity or personal information), without really thinking about the weirdness of real-world economics. More importantly, they bring up several tangential concepts and theories, yet do not offer a single study focused on how encryption has reduced crime. Here’s a
by tangential.
As one fascinating study by the security company Symantec demonstrated, phone thieves will almost certainly go after the data on your stolen phone in addition to or instead of just trying to profit from sale of the hardware itself. In that study, Symantec deliberately “lost” 50 identical cellphones stocked with a variety of personal and business apps and data, then studied how the people who found the unsecured phones interacted with them. The upshot of the study: Almost everyone who got hold of one of the phones went straight for the personal information stored on that phone. Ninety-five percent of the people who picked up a phone tried to access personal or sensitive information, or online services like banking or email. Yet only half of those people made any attempt to return the phone—even though the owner’s phone number and email address were clearly marked in the contacts app.
What is fascinating to me is the number of times encryption or crypto appears in that study: zero. Not even once.
Symantec did not turn on encryption to see if any of the results changed. That study definitely is not about encryption helping or hurting crime. Can we try to extrapolate? Would people try harder to access data once they realize it is encrypted, being the curious types, looking for a key or guessing a PIN? Would attempts to return phones go down from half to zero when contact information is encrypted and can’t be read, causing overall phone loss numbers to go up?
And yet clearly the Slate author would have us believe Symantec’s study, which does not include encryption, proves encryption will help. The author gets even bolder from there,
There wouldn’t have been a breach at all if that information had been encrypted.
If encryption, then no more breach…Hey, I think I get it!
Collect Encrypted Underpants
No. This is all so wrong. Look again at the TJX breach I mentioned earlier. Look especially at the part where encryption was “in place” when the breach happened.
TJX was using encryption technology for wireless networking, known generally as WEP, that used the RC4 stream cipher for confidentiality and CRC-32 checksum for integrity. There’s the encryption, right there, in the middle of a report discussing a huge, industry changing breach. Despite encryption, or arguably even because of misuse/overconfidence in weak encryption, we saw one of the largest breaches in history. Again, the crux of the issue is we aren’t using nuance in our discussion of encryption “solving” crimes. Far more detail and research of real-world applied encryption is greatly preferred to people saying “encryption is good, prevents crime” dropping the mike and walking off stage.
Studies of encryption effects on crime beg details of how we would define levels of “strong”, what is “proper” key management, “gaps” between architecture and operation…but my point again is we don’t seem to have any studies that tell us where, when or how exactly encryption prevented crimes generally, let alone a prediction for our future. Say for example we treat encryption as a tax on threats, an additional cost for them to be successful. Can we model a decline in attacks over time? I would love to see evidence that higher taxes lower likelihood of threats across time compared to lower taxes (e.g. as has been ):
We know encryption can prevent types of crime. We no longer have an apartheid government in South Africa, proving a particular control has utility for a specific issue. I just find it interesting how easily people want to use a carte blanche argument for general crime being solved, greater good, when we talk about encryption. People call on us to sign a big encryption check, despite offering no real study or analysis of impact at a macro or quantitative level. That probably should change before we get into policy-level debates about the right or wrong thing to do with regulation of encryption.
Updated to add reference:
“Target Intelligence Committee.” The project, which was originally conceived by Colonel George A. Bicher, Director of the Signal Intelligence Division, ETOUSA, in the summer of 1944, aimed at the investigation and possible exploitation of German cryptologic organizations, operations, installations, and personnel, as soon as possible after the
impending collapse of the German forces.
Posted in , .
March 23, 2016
The following paragraph is from an opinion piece last year by CNN National Security Commentator Mike Rogers, called ““:
Back in the 1970s and ’80s, Americans asked private companies to divest from business dealings with the apartheid government of South Africa. In more recent years, federal and state law enforcement officials have asked — and required — Internet service providers to crack down on the production and distribution of child pornography. And banks and financial institutions are compelled to prevent money laundering by organized crime and terrorists finance networks.
All of this is against companies’ bottom-line business interests, but it has been in the public interest. These actions were taken to protect the public and for the greater good. And all of it was done to mitigate a moral or physical hazard.
Don’t know about you but that “apartheid” line jumped right out at me. African history doesn’t come up enough on its own let alone in the crypto debates. So my attention was grabbed.
Let me just say I agree in principle with a “greater good” plea. That’s easy to swallow at face value. However, a reference to fighting wrongs of a South African government while talking about encryption as a threat to security…Rogers makes a huge error here.
My first reaction was tweeting in frustration how
(he was taken captive by police and beaten to death in prison) if he had better privacy. I mean history could have turned out completely different, far better I would argue, had activist privacy in South Africa not been treated as a threat to national security. Encryption could have preserved the greater good. I’ll admit that is some speculation on my part, which deserves proper research.
More to the point against Rogers, South Africa severely underestimated encryption use by anti-apartheid activists. That’s the fundamental story here that kills the CNN opinion piece. Use of encryption for good, to defeat apartheid, is not a secret (see “,” Social Science Computer Review, 2007) yet obviously it needs to be told more widely in America:
…development of the encrypted communication system was key to Operation Vula’s success
Basically (no pun intended) hobbyists had taught themselves computer programming and encryption using a British computer called the Oric 1 and some .
An . You could say it had a following comparable to the Raspberry Pi today and therefore provides an extremely relevant story. With only a little investment, study and careful planning by ordinary people “” used encryption to fight against the apartheid regime.
When the operation was finally uncovered by the police in 1990 they knew too little and too late to disrupt Vula. Nonetheless
buildings using encryption were called ““.
So my second reaction was to tweet “” to try and generate more awareness. It had 247 tot now, nine months later, it still has only 7,766. Not bad, yet not exactly a huge number.
I also tweeted “” for those who would rather read Tim Jenkin’s first-person account of crypto taking down apartheid.
His prison-break (please read
– a ) and secure communication skills are critical to study thoroughly for anyone who wants to argue whether encryption is a “threat to security” in the context of apartheid and the 1980s.
Here is Tim Jenkin explaining what he did and why. Note there are only 185 views…
My third reaction was to contact the organizers of the RSA Conference, since it has a captive crowd in the tens of thousands. I know my tweets have limited reach (hat-tip to @thegrugq for
when I raise this topic, extending it to far wider audiences). A big conference seemed like another way for this story to go more mainstream.
So I , setup a nomination system/group and then I would submit Tim Jenkin. While Tim might not get the formal nod from the group, we at least would be on the right road to bringing this type of important historic detail forward into the light.
All that…because an op-ed incorrectly tried to invoke apartheid history as some kind of argument against encryption. Nothing bothers a historian more than seeing horrible analysis rooted in a lack of attention to available evidence.
So here we are today. RSA Conference just ended. Instead of Tim Jenkin on stage we were offered television and movie staff. CSI, Mr Robot, blah. I get that organizers want to appeal to the wider audience and bring in popular or familiar faces. I get that a lot of people care about fictionalized and dramatized versions of security, or whatever is most current in their media and news feeds.
It was painful to sit through the American-centric entertainment-centric vapidity on stage when I knew I had failed to convince the organizers to bring lesser-known yet important and real history to light. Even if Tim Cook had spoken it still would pale for me in comparison to hearing from Tim Jenkin. The big tech companies already have a huge platform and every journalist hanging on every word or press release. Big tech and entertainers dominate the news, so where does one really go for an important history lesson ready to be told?
What giant conference is willing to support telling of true war stories from seasoned experts in encryption, learning new insights from live interviews on stage, if not RSAC?
And beyond learning from history, Tim Jenkin also has become known for recent work on a . Past or future, his life’s work seems rather important and worth putting out to a wider audience, no?
It would have been so good to have recognized the work of Tim, and moreover to have our debates more accurately informed by the real-world anti-apartheid encryption. If only RSAC had courage to bring the deeper message to the main stage outside of the cryptographer’s panel. I will try harder to encourage this direction next year.
Disappointed.
Posted in , .
March 12, 2016
The US used aircraft to drop explosives in Somalia, killing a large number of people. This abruptly has reminded many people of the existence of ongoing US military operations there, under the aegis of , and I see confusion in my social networks. Perhaps I can help explain what is going on.
Allow me to back up a few years to give some context.
The Shift from Covert to Overt Operations
US military European Command (EUCOM) leaders realized ten years ago they needed a more focused and local approach if expected to run “stability operations” in Africa. Do you remember in 2006 when the ICU (Islamic Courts Union) defeated CIA-backed warlords in Mogadishu? In response, the
to retake control and remove the ICU, as I wrote in posts here called “” and in ““.
This public EUCOM “stabilization” effort, to use Ethiopia as a proxy military power after the CIA lost covert control, effectively created
a vacuum of leadership and instability (free market) was left behind after a neighboring state intervened. The ICU essentially transitioned into Al Shabaab at that time. Although that transition event might seem obscure, most Americans actually have heard of the piracy issues it generated. Unregulated seas and collapse of safe markets led to pirates, which became a major news story and headache in global shipping, as you can see in a simple
of President Bush’s 2007 Foreign Policy results:
The question before US politicians back then was how to build overt military operations in the Horn of Africa, almost exactly like 1940 for Britain to decide, that push for state control while being considered a light-touch state-building (aid) or at least state-support (self-defense) operation (mostly ignoring global piracy issues and wider regional market instability it would create).
Foreign Military Support for African States
EUCOM knew even before 2006 that the US needed a more focused regional approach in Africa to achieve its assigned policy aims. Africa obviously isn’t part of (post-colonial) Europe so change to a more focused regional resource was overdue. Thus, to formalize and better focus emerging intervention and military support policies for Africa, AFRICOM was :
This new command will strengthen our security cooperation with Africa and create new opportunities to bolster the capabilities of our partners in Africa. Africa Command will enhance our efforts to bring peace and security to the people of Africa and promote our common goals of development, health, education, democracy, and economic growth in Africa.
This presidential declaration eight years ago of bringing peace to Africa might seem a long stretch from the very recent news of US warplanes bombing Somalia. Bear with me for another minute.
The mission of AFRICOM originally was described as cooperation and augmentation of African governments aga a mission of dealing with “failing states” rather than taking on war-fighting or “conquering state” objectives. This is of course a bit ironic, given how it rose from the ashes of Somalia invaded by Ethiopia. To be fair though AFRICOM being established under Bush offered the chance for a different future and more locally relevant options than under EUCOM. Although I’ve studied military operations on the Horn of Africa all the way back to the 1930s this major policy shift in 2008 is a good place to start looking at American reasons for being in Somalia today.
Policy Shift and the Acceptance of Foreign Military Support
Creation of AFRICOM was not without controversy at the time, as .
Most Africans don’t trust their own militaries, which in places like Congo have turned weapons on their own people.
So “they don’t trust Africom, either, because it’s a military force,” Okumu [Kenyan analyst at South Africa’s Institute for Security Studies] said. There is also “a suspicion America wants to use us, perhaps make us proxies” in the war on terror.
AFRICOM initially was to take control and run an existing base in Africa, as well as support the increasingly wider regional military objectives. Aside from pushing a 2007 Ethiopian invasion of Somalia to bring down the ICU, US policy was following at least two prior initiatives: One, in 2002 a
(CJTF-HOA), staffed with thousands of military personnel. Two, by 2005 a “” among many African security forces was being led by the US across the Sahel region (from Djibouti to Senegal).
Thus it makes sense why some were worried that US operational bases with proxy combat missions could be a result. We may never know how AFRICOM was intended to roll out because, after Bush’s grand political hand waving about humanitarian missions and economic stabilization, Obama came into ownership in 2009 with different thoughts on foreign policy.
It seems to me the worries about intentions were well-founded. Obviously Bush already had been caught lying, or at least willfully ignoring truth, in order to invade Iraq. That alone should give everyone pause. His use of Ethiopia in 2007 appeared to similarly be a thinly-veiled destruction of Somali sovereignty to maintain CIA access for renditions and executions on foreign soil without declaring war. Bush foreign policy was so US-centric it raised concerns about, for lack of a better phrase, dumb imperialist thinking.
So in 2009 a new president came into ownership without the same legacy and policy baggage. Obama soon gave :
When there’s a genocide in Darfur or terrorists in Somalia, these are not simply African problems — they are global security challenges, and they demand a global response.
A good indicator of where AFRICOM headed under the new US leadership was seen in . Tactics changed under
through more intelligent and less heavy-handed methods of “direct action”, a euphemism for unmarked black helicopters appearing suddenly and killing people identified as threats to America…ahem, I mean .
Obama would say privately that the first task of an American president in the post-Bush international arena was “Don’t do stupid shit.”
The difference was significant.
A former president believed evidence was an inconvenience and a latter president wanted carefully weighed and measured outcomes. Less fanfare, less flowery, clear and surgical operations, based on strong evidence, led to highly targeted missions, albeit without much outside review or transparency.
Then, rather than condemn the new US foreign policy doctrine of AFRICOM and US “actions” in Africa, .
In a series of interviews in Mogadishu, several of the country’s recognized leaders, including President Sharif, called on the US government to quickly and dramatically increase its assistance to the Somali military in the form of training, equipment and weapons. Moreover, they argue that without viable civilian institutions, Somalia will remain ripe for terrorist groups that can further destabilize not only Somalia but the region. “I believe that the US should help the Somalis to establish a government that protects civilians and its people,” Sharif said.
It appears, from my reading of the Somali perspective over time, we can not easily write-off AFRICOM as the proxy war engine it could have become. There have been no new American bases built. Instead we have seen state-building, or at least assistance in state self-defense, pointing in the direction of augmentation and support. We can criticize transparency, but so far we don’t have a lot of ground to call Obama’s “direct actions” policy a purely self-serving war using African states as proxies.
The Bush administration was right to heed EUCOM establishing new focus, creating AFRICOM; it appears only to have been wrong in how it thought about supporting intelligence operations and its disregard for economic impact. Hard to say whether Obama has been right, but it is likely not worse than before (no longer threatening sovereignty, no longer undermining regional economic viability).
Somalia, let alone the African Union Mission in Somalia (AMISOM), has continued talking about being a partner on global security efforts. This is unlike the 2007 Ethiopian invasion with US objectives front and center, aligning awkwardly with other nations or prodding them into going along also for self-interest.
The US currently is feted as a partner in regional Horn stabilizing missions rather than owner or operator. Local stability and growth policy using global partnerships isn’t an entirely awful thing, especially when we see China talking about and doing much of the same in its foreign relations for this region and throughout Africa.
Why An Air Strike?
Ok, so enough background. Back to the present tense, what’s with bombing hundreds of people?
According to a , Tomi Oladipo:
both Al Shabab & residents confirmed militants hit. Dispute is over death toll.
Everyone on the ground seems to agree casualties were militants and not any civilians. I have not seen anything contradicting this: militants massed in a training camp were preparing to graduate and execute a mission to undermine regional stability. The only major caveat to the reporting and news is Al Shabaab has been known t local reporting can be hard to gather.
I asked , Associate Professor at GWU and author of ““, if this strike could be seen as a prevention measure, given recent Al Shabaab attacks. He :
#AMISOM reconfiguring after ,
to avoid a repeat.
If you’re familiar with those three references to Al Shabaab attacking security camps you easily can see why this strike to their camp fits regional conflict patterns, with the US serving to help local government forces maintain control and protect civilians.
With this in mind I would like to address
about the attack:
Were these really all al Shabaab fighters and terrorists who were killed? Were they really about to carry out some sort of imminent, dangerous attack on U.S. personnel?
Yes, we see credible accounts of imminent danger, in the pattern of recent attacks, from an Al Shabaab militant camp. It almost could be argued that this attack was in response to those earl a better self-defense plan was called for by local authorities (Somalia and Kenya) after those disasters. US personnel were in danger of attack by nature of working with the authorities targeted by Al Shabaab. We also don’t have details on the attack planned but it very well could have been similar to Westgate or Garissa University.
There are numerous compelling reasons demanding skepticism of U.S. government claims about who it kills in airstrikes.
Yes, big fan of skepticism here. At the same time, by all accounts and recent events, this appears to be a clear case of a military camp being destroyed to prevent terrorist attack later. BBC made the casualty type clear. Recent Al Shabaab operations, attacking Kenyans while in camp, should further erode skepticism around motive and opportunity of attacking militants while in their camps. I have not yet seen evidence civilians were in these camps. South Sudan, just for comparison, has been a completely different story.
We need U.S. troops in Africa to launch drone strikes at groups that are trying to attack U.S. troops in Africa. It’s the ultimate self-perpetuating circle of imperialism
This is lazy and shallow reasoning. If US troops left Somalia there would still be attacks by Al Shabaab on the authorities there.
Whether you agree or not with supporting the local regime, it is not fair to say the only purpose of US troops is to act like a target for the premise of self-defense to attack US enemies. We have credible evidence that it goes beyond a proxy conflict, and the US is in fact assisting local authorities who are under attack. We can debate the integrity of a US-backed authority and their role in calling for assistance, yet it is clear Al Shabaab is a threat to far more than just Americans.
Within literally hours, virtually everyone was ready to forget about the whole thing and move on, content in the knowledge — even without a shred of evidence or information about the people killed — that their government and president did the right thing.
Surely I will be called an exception here, as I mentioned already , yet I do not find lack of interest to be true for the general population. There never has been more interest in this region than today.
This blog post was written because people were talking in general conversations about these killings. The fact that the story initially was brought up as a drone attack meant it drew a lot of attention. Conversations went on for hours just about the technical feasibility of drones to carry out such a large attack.
Granted we should be paying more attention. That seems like a great general principle. I am seeing more people pay more attention than ever before to issues and a part of the world that used to be obscure. Within literally hours everyone was asking questions about what happened, who really was killed, and why. It is actually quite a shock to see Somalia so much in the news and Americans digging immediately into the details, asking what just happened in Africa.
Updated to add a , which better illustrates why power fractures and allegiances are complicated.
Posted in , .
March 10, 2016
About flyingpenguin
flyingpenguin, a security consultancy, designs and assesses risk mitigation, compliance and response solutions, as well as delivers strategic and competitive knowledge to security software and hardware vendors. Innovation, integrity and transparency are hallmarks of our services. Davi Ottenheimer, President of flyingpenguin, has more than twenty years’ experience managing global security operations and assessments, including a [&]
Select Month
November 2016
April 2016
March 2016
February 2016
January 2016
December 2015
November 2015
October 2015
September 2015
August 2015
April 2015
March 2015
February 2015
January 2015
December 2014
April 2014
March 2014
February 2014
January 2014
December 2013
November 2013
October 2013
September 2013
August 2013
February 2013
January 2013
December 2012
November 2012
October 2012
September 2012
August 2012
April 2012
March 2012
February 2012
January 2012
December 2011
November 2011
October 2011
September 2011
August 2011
April 2011
March 2011
February 2011
January 2011
December 2010
November 2010
October 2010
September 2010
August 2010
April 2010
March 2010
February 2010
January 2010
December 2009
October 2009
September 2009
August 2009
April 2009
March 2009
February 2009
January 2009
December 2008
November 2008
October 2008
September 2008
August 2008
April 2008
March 2008
February 2008
January 2008
December 2007
November 2007
October 2007
September 2007
August 2007
April 2007
March 2007
February 2007
January 2007
December 2006
November 2006
October 2006
September 2006
August 2006
April 2006
March 2006
February 2006
January 2006
December 2005
November 2005
October 2005
August 2003
January 2003
August 2002
April 2002
March 2002
February 2002
January 2002
December 2001
March 1999
August 1995

我要回帖

更多关于 current什么意思 的文章

 

随机推荐