Uncategorized

  • Romney Unfit and Unworthy ton Become President. Reason Why is Here.

     
    There are some people sitting in chairs that attach an enormous amount of responsibility to their occupancy. In those places there is likely to be a Wall Street Journal. Financial Times of London. New York Times, the Economist. Decisions are made, and serious consideration is given to what goes into the basis for the decisions. The United States Government, the point at which almost all influential individuals and groups of individuals keep one eye focused , has relevance on a Global scale. All of the above matters affect the lives of almost everyone who is alive , and at this moment in time considers themselves a member of the human race.

    As all of the above is self evident, a slam dunk no brainier, then is there anyone who is reading this who could please explain to me how the people responsible for creating the Campaign of Mitt Romney, can act like they are, in pounding the American public, by polluting the airwaves, denigrating the political process, and posturing themselves in an ignorant and condescending manner, as they repeatedly and incessantly misrepresent what Barack Obama intended to communicate, even conceding that the President used poor syntax, and loosely phrased wording to allow someone to exploit the temptation to try and mislead and gain traction on the basis of an obvious, and ongoing conspiracy to mislead and deceive the American people.

    No one believes that Barack Obama was telling small business owners they did not build their business. An eight year old is able to intuit subtlety, and this is not a complicated point. What he was speaking about was the incredibly complex interplay and cooperation that it requires for anything worthwhile to happen at all, anywhere, under ideal conditions. Obama was pointing out that no man, single handed accomplishes significant progress. There is always, to a varying degree perhaps,  a team of family, friends, co workers, employees, etc. That is what he meant, if you think otherwise I am sure there is help for you. 

    And even in light of all this, the entire United States, at this very moment, is being blanketed by an ad campaign , costing millions of dollars, that has only one intent. To deliberately, and completely misrepresent to the American people, the message the President was trying to communicate. Mitt Romney begins his quest for Americans to trust him to lead us, by immediately going to extraordinary and extreme measures to distort our own reality in a barrage of prevarication and slimy campaign tactics. 

    Honestly, Mitt Romney has already shown me enough to have me know that he is completely disconnected from the vast majority of the American people. Who the hell does he think he is, to attempt to patronizingly lead the electorate to make decisions about who they should choose to have as their leader, with the wool that he is pulling over their proverbial eyes. It is lying, and it is the audacious behavior of someone who, by virtue of his wealth and social status, feels entitled to behave in a condescending and patronizing manner. Obama may not be a great President, but if ever I said anything , anywhere, that meant anything to anyone, then please listen to me now.

    DO NOT, REGARDLESS OF WHATEVER ELSE YOU DO THIS YEAR OR FOR THE REST OF YOUR LIFE, i REPEAT, DO NOT VOTE FOR ROMNEY TO BE PRESIDENT IN 2012. hE IS UNWORTHY TO REPRESENT PEOPLE WHO HE HAS SHOWN HE DOES NOT RESPECT OR CARE ABOUT. Michael P. Whelan. Las Vegas, Nevada. 

    Collapse this post

  • Newly Wed and Quickly Unraveling

    July 26, 2012
     

    Newly Wed and Quickly Unraveling

     

    By WENDY C. ORTIZ

     

    I WOKE up with my head on an unfamiliar pillow in a bungalow in the high desert of California, 140 miles from my dilapidated apartment in the Koreatown section of Los Angeles.

    It was my wedding day. Not only was my head on a strange pillow, it also housed a terrible rhythmic pounding. My feet were sore from dancing on the wood floor of a bar the night before. A righteous hangover seemed ominous, but there was no time to contemplate this.

    Ours would not be a traditional Mexican-American wedding; we couldn’t afford mariachis, for one. Yet I still needed to gather lilies, daisies and roses from the local grocery stores, shower, get into my orange mail-order dress, and put on my tiger’s-eye earrings before I went and got hitched.

    There was another omen I decided to overlook. It was early March: I had chosen this day months before for its full moon, enchanted by the notion that it would also be a full lunar eclipse. I would be 33, an auspicious age to begin a new life. What I overlooked was that the date was in the middle of Mercury retrograde, supposedly the time of year when one should avoid signing contracts or making life-altering decisions because of the potent possibility of reversal. Hence, retrograde.

    Regardless of superstition or omen, here were my friends, who had come from all points on the United States map, and there was my dress and my new brown cowboy boots. And there was my soon-to-be husband and his vintage tuxedo, waiting to marry me.

    The night before the trek out to the Mojave Desert, I had a funny exchange with a friend from work, a lesbian in a long-term relationship.

    Years earlier, when we were both new to the organization, she sat down in my office and we instantly began talking about our mothers. Soon we were eating Thai food and discussing films and plans with our partners, all of it creating a friendship of years. I appreciated many things about her, and she me, especially how we were total opposites. As the adage goes, opposites attract. My fiancé even knew that part of it, jokingly referring to her as my “boyfriend.”

    That day before I embarked on my wedding trip, she and I kept missing each other. My phone rang as I barreled down the hill from work, car windows down, smoking my second cigarette of the day (because I had started smoking again in those months of gut-wrenching anxiety leading up to my wedding). I answered, one hand on the wheel, the wind blasting my face. There she was, my friend.

    I had left her a message on a Post-it written in two different ink colors (even the pen seemed to be conspiring to keep us from having contact that day) saying I was sorry not to see her just as I was about to go out and become not-single. On the phone she referred to the note, the universe’s plan to keep us apart, in a way that sounded jokingly outraged. The delicious frisson of acknowledgment made me squirm in my seat.

    I thought of this conversation that late winter morning of the wedding in the town of Joshua Tree. By summer of that year, I realized that in marrying I had made a mistake of tragic proportions.

    A secret courtship with my friend at work began on the longest day of that year. There is no way around this: I cheated on my husband. I followed a longing that had been calling me all through adolescence, college and into adulthood.

    Months before our wedding, when my fiancé had said, “I talked to my therapist, and she thinks we should discuss your sexual orientation,” I had responded brusquely: “Why? I’m in love with you.”

    End of conversation. It was the beginning of something I thought of as the Compromise: the commitments one begins knitting together to start a married life with another, even if those commitments are a little frayed, of a different texture. The unspoken things began taking sips of oxygen out of the rooms we lived in, slowly, adeptly.

    Summer turned into fall of my newlywed year. I couldn’t extricate myself from my hidden relationship. The questions felt like bruises I kept pressing: Are these just postmarriage high jinks? How will I go about ending the affair? Do I even want it to end?

    I continued being married because I wasn’t sure what else to do. I smoked more cigarettes, became thinner and felt sicker. A little voice was asking me, then telling me, to make a decision.

    After the first of the new year, I came out to my husband. I turned over in bed to face him, and the sobs burst out of me and pooled between us. My chest heaved, my face was wet and contorted, but I forced the words out, finally, despite the pain.

    He sat up in bed, brought his hands to his face, and wailed.

    I knew neither of us would sleep that night and possibly many more nights.

    I was ready to shoulder the blame. I steeled myself for the hatred that might come my way from my spouse, not to mention the judgment and blame that might come from his friends and loved ones.

    Instead, that night, and days after, he listened. Amid his crying, his mourning, he listened.

    Even after he was aware of my betrayal, he was willing to give me a simple, civil, clear-cut divorce. Some part of him understood the magnitude of my realization, the voice I had not been heeding for half of my life. He understood that my ability to be truthful to myself had to take precedence, even as much as it hurt him and would change his life as profoundly as it would mine.

    He let me move out in peace.

    I took all my belongings to the tiniest studio ever, a place I imagined I could fold up and put in my pocket. I could see every detail of my life in this space, with its hint of a closet and its private patio where I sat and envisioned the unfolding of the next part of my life. The Mexican sage and the lone palm tree just outside the patio whispered and waved at me as I sat, weathering waves of loss, fear and finally, hope.

    I had never fancied myself a late bloomer, and yet there I was, part of that population of 30-something people who come out, and, unintentionally, take down a couple of people (or more) in the process.

    In the autumn, the divorce papers arrived in the mail, stamped, official.

    As I unsealed the envelope, I knew there was a certain kind of love I might never have been privy to until that moment. It was the love of someone who knew me, who had loved me and then had to let me go, in that way you hear about in stories and songs through the ages.

    He let me go respectfully, mindfully and lovingly, as best he could while in his own dark lake of loss.

    I was grateful, am grateful, to have received such a gift.

    A FEW years have passed since the summer of that sublime courtship. My partner and I still haven’t married, but only because the voters of California won’t let us.

    We learned how to be together through the epic transitions we were enduring: I, coming out to my family (who have been mysteriously and lavishly accepting, breaking all stereotypes of how a Mexican-American family might respond) and everyone else; she, ending a relationship of more than a decade, the one I inadvertently had helped end.

    We had a baby. We bought a house. I had not pictured these domestic scenarios when I was married to a man.

    Amid this new life, I sometimes dream about my ex-husband, whom I have run into a couple of times since our divorce.

    In one dream, he sees me on the streets of downtown Los Angeles. He walks toward me, unflinching and envelops me in a warm hug.

    This hug seems to communicate everything, encompassing the history of our relationship, from our sticky beginnings in a dirty Hollywood bar, to our sweet friendship, to the rocky road of a relationship I often resisted.

    The last time I ran into him in real life, I was standing with my partner, some friends and our 6-month-old baby girl. Too many people wanted brunch on a beautiful day, and we just happened to pick the same spot.

    My ex-husband was with a woman who wore a great vintage dress. He and I hugged. There were introductions. I had to imagine that the truth of the situation — clear and precise — was present with us on that sidewalk, and we all could live with it.

    When I said goodbye to him and his girlfriend, they walked away holding hands. I felt a sweet contentment. Things in their own complicated and beautiful ways had worked out for each of us.

     

    Wendy C. Ortiz, a writer and psychotherapist intern in Los Angeles, is a founder and curator of the Rhapsodomancy Reading Series.

     

    COPYRIGHT.2012 The New York Times Company. All Rights Reserved

  • Gore Vidal’s quotes, quips memorialized on Twitter

    Gore Vidal’s quotes, quips memorialized on Twitter

    August 1, 2012 |  9:38 am
     
     

     

    Gore Vidal, who died Tuesday at his Hollywood Hills home, was known for his unmatched wit and one-liners.

    The Times’ obituary, written by Elaine Woo, noted that the prolific author “demolished intellectual rivals like Norman Mailer and William F. Buckley Jr. with acidic one-liners, establishing himself as a peerless master of talk-show punditry.” She also described him as a “glorious gadfly on the national conscience.”

    “Style,” Vidal once said, “is knowing who you are, what you want to say, and not giving a damn.”

    PHOTOS: Gore Vidal | 1925 – 2012

    That quote — and numerous others — are circulating on the Internet and in social media on Wednesday, as a new generation is introduced to Vidal’s greatest quips, including this gem: “The United States was founded by the brightest people in the country — and we haven’t seen them since.”

     

    Copyright. 2012. The LA.Times. All Rights Reserved

  • An Updated Guide for Young Women

     Thirty Candles

    An Updated Guide for Young Women

    By STEPHANIE ZACHAREK
    Published: July 27, 2012
     

    In 1997, Glamour magazine published a manifesto for young women on the cusp of what is for many a fearful milestone. “30 Things Every Woman Should Have and Should Know by the Time She’s 30” — written by the columnist Pamela Redmond Satran — resonated with so many women that it wasn’t long before this artfully manicured checklist showed up on the Internet. In its viral form, it was attributed to everyone from Anonymous to Hillary Clinton, Jesse Jackson and Maya Angelou. Fifteen years later, that list has now become a book. In “30 Things Every Woman Should Have and Should Know by the Time She’s 30,” Glamour and Satran have not only officially reclaimed credit; they’ve expanded the original with essays from the likes of Kathy Griffin, Katie Couric, ZZ Packer and Angelou herself, each of whom puts her own spin on Satran’s lessons.

    Illustration by Joon Mo Kang

     

    30 THINGS EVERY WOMAN SHOULD HAVE AND SHOULD KNOW BY THE TIME SHE’S 30

    By the editors of Glamour and Pamela Redmond Satran

    Illustrated. 168 pp. Hyperion. $21.99.

    As viral sensations go, the original “30 Things” — which is included here — isn’t a bad list. The “should haves” span the personal (“One friend who always makes you laugh and one who lets you cry”) to the professional (“A résumé that is not even the slightest bit padded”). The “should knows” begin with “How to fall in love without losing yourself” and finish with “Why they say life begins at 30!” — an upbeat bit of wisdom intended to lessen the traumatic impact of those first few crow’s feet.

    But then what? The appeal of the original list was its pithiness; start embroidering and you get a tangle of bromides. While it’s charming that Angelou thinks every 30-year-old needs a good cashmere sweater — No. 25 on her version of the list — her No. 26, “another good cashmere sweater,” is just filler. Other Angelou essentials include one of her own books, “The Heart of a Woman” (No. 8), and, squeezed in at No. 15, those twin requirements of a life well lived, a coffee-serving set and a tea-serving set, both made of silver.

    Right about here you may be thinking, as I was, that “30 Things” is about 30 times longer than necessary. Before the thing even kicks off, we get a preface touting the merits of the original list, followed by an introduction detailing its genesis and Internet afterlife. After these preambles comes the list itself, followed by essays like the 22-year-old singer-songwriter Taylor Swift’s ruminations on what she envisions for herself at age 30. Swift quotes the song “You Learn,” by Alanis Morissette: “You live, you learn. You love, you learn. You cry, you learn. You lose, you learn.” As you’ve probably surmised, the upshot of the song (and the essay) is that you can learn from just about anything, though I doubt Swift has thought much about how a silver tea set can tarnish. Luckily, Angelou eventually comes to the rescue with her own must-have No. 16, silver polish, which I can tell you is right next to toothpaste on my own list of essentials.

    Not everything in “30 Things” is useless, reductive or ridiculous. The comedian Kathy Griffin’s entry is the liveliest (“Heterosexual men are like Martians to me — they may as well have antennae and arrive on a spaceship instead of picking me up in a Prius”), and the eminently sensible TV finance expert Suze Orman offers the kind of advice no one wants to hear and everyone ought to heed: “Live below your means but above your needs.” But there’s not much to be learned from the 26-year-old writer and actress Lauren Conrad, the onetime star of the reality show “The Hills,” who says she’d never be a “phony” or a “manipulator,” and pontificates about how she refused to pretend interest in a boy the producers of “The Hills” had chosen for her. Fortunately, this is a problem that few women who pick up “30 Things” are likely to have. Which frees them to make more important decisions, like what color that second cashmere sweater should be.

    Stephanie Zacharek has written for Salon, New York magazine and The Washington Post, among other publications.

     

    Copyright. 2012. The New York Times Company. All Rights Reserved

  • Hungary preview quotes – McLaren, Williams, Red Bull & more25 Jul 2012

     

    Hungary preview quotes – McLaren, Williams, Red Bull & more25 Jul 2012

    Podium (L to R): Second placed Sebastian Vettel (GER) Red Bull Racing, race winner Jenson Button (GBR) McLaren and third placed Fernando Alonso (ESP) Ferrari. Formula One World Championship, Rd 11, Hungarian Grand Prix, Race, Budapest, Hungary, Sunday, 31 July 2011Jenson Button (GBR) McLaren. Formula One World Championship, Rd10, German Grand Prix, Qualifying, Hockenheim, Germany, Saturday, 21 July 2012Lewis Hamilton (GBR) McLaren. Formula One World Championship, Rd10, German Grand Prix, Practice, Hockenheim, Germany, Friday, 20 July 2012Martin Whitmarsh (GBR) McLaren Chief Executive Officer. Formula One World Championship, Rd6, Monaco Grand Prix, Qualifying Day, Monte-Carlo, Monaco, Saturday, 26 May 2012Pastor Maldonado (VEN) Williams. Formula One World Championship, Rd10, German Grand Prix, Practice, Hockenheim, Germany, Friday, 20 July 2012Bruno Senna (BRA) Williams. Formula One World Championship, Rd10, German Grand Prix, Qualifying, Hockenheim, Germany, Saturday, 21 July 2012Mark Gillan (GBR) Williams F1. Formula One World Championship, Rd 15, Japanese Grand Prix, Practice Day, Suzuka, Japan, Friday, 7 October 2011Mark Webber (AUS) Red Bull Racing RB8. Formula One World Championship, Rd10, German Grand Prix, Qualifying, Hockenheim, Germany, Saturday, 21 July 2012Sebastian Vettel (GER) Red Bull Racing RB8. Formula One World Championship, Rd10, German Grand Prix, Qualifying, Hockenheim, Germany, Saturday, 21 July 2012Paul di Resta (GBR) Force India F1. Formula One World Championship, Rd10, German Grand Prix, Practice, Hockenheim, Germany, Friday, 20 July 2012Nico Hulkenburg (GER) Force India F1 Team. Formula One World Championship, Rd8, European Grand Prix, Preparations, Valencia, Spain, Thursday, 21 June 2012Timo Glock (GER) Marussia F1 Team. Formula One World Championship, Rd10, German Grand Prix, Qualifying, Hockenheim, Germany, Saturday, 21 July 2012Charles Pic (FRA) Marussia F1 Team. Formula One World Championship, Rd10, German Grand Prix, Preparations, Hockenheim, Germany, Thursday, 19 July 2012Michael Schumacher (GER) Mercedes AMG F1. Formula One World Championship, Rd9, British Grand Prix, Practice, Silverstone, England, Friday, 6 July 2012Nico Rosberg (GER) Mercedes AMG F1. Formula One World Championship, Rd9, British Grand Prix, Practice, Silverstone, England, Friday, 6 July 2012Norbert Haug (GER) Mercedes Sporting Director. Formula One World Championship, Rd 15, Japanese Grand Prix, Practice Day, Suzuka, Japan, Friday, 7 October 2011Paul Hembery (GBR) Pirelli Motorsport Director with FanVision. Formula One World Championship, Rd2, Malaysian Grand Prix, Qualifying, Sepang, Malaysia, Saturday, 24 March 2012Jaime Alguersuari (ESP) BBC 5 Live. Formula One World Championship, Rd1, Australian Grand Prix, Preparations, Albert Park, Melbourne, Australia, Thursday, 15 March 2012Kimi Raikkonen (FIN) Lotus F1. Formula One World Championship, Rd10, German Grand Prix, Qualifying, Hockenheim, Germany, Saturday, 21 July 2012Romain Grosjean (FRA) Lotus F1. Formula One World Championship, Rd10, German Grand Prix, Qualifying, Hockenheim, Germany, Saturday, 21 July 2012James Allison (GBR) Lotus F1 Technical Director. Formula One World Championship, Rd1, Australian Grand Prix, Practice, Albert Park, Melbourne, Australia, Friday, 16 March 2012Pedro De La Rosa (ESP) HRT Formula One Team HRT F112 on the grid. Formula One World Championship, Rd8, European Grand Prix, Race Day, Valencia, Spain, Sunday, 24 June 2012Narain Karthikeyan (IND) HRT Formula One Team. Formula One World Championship, Rd3, Chinese Grand Prix Preparations, Shanghai, China, Thursday, 12 April 2012Heikki Kovalainen (FIN) Caterham F1., Formula One World Championship, Rd10, German Grand Prix, Qualifying, Hockenheim, Germany, Saturday, 21 July 2012Vitaly Petrov (RUS) Caterham. Formula One World Championship, Rd9, British Grand Prix, Qualifying, Silverstone, England, Saturday, 7 July 2012Mark Smith (GBR) Caterham Technical Director. Formula One Testing, Day 4, Barcelona, Spain, Friday, 24 February 2012Tony Fernandes (MAL) Caterham Team Principal. Formula One World Championship, Rd 2, Malaysian Grand Prix, Qualifying, Sepang, Malaysia, Saturday, 24  March 2012Kamui Kobayashi (JPN) Sauber. Formula One World Championship, Rd9, British Grand Prix, Practice, Silverstone, England, Friday, 6 July 2012Sergio Perez (MEX) Sauber. Formula One World Championship, Rd9, British Grand Prix, Practice, Silverstone, England, Friday, 6 July 2012(L to R): Giampaolo Dall'ara, Sauber Head of Track Engineering and Peter Sauber (SUI) Sauber F1 Team Principal. Formula One World Championship, Rd5, Spanish Grand Prix, Qualifying Day, Barcelona, Spain, Saturday, 12 May 2012

    The Formula One paddock heads directly from Germany to Hungary this weekend for the second Grand Prix in a back-to-back doubleheader and the championship’s final round before the August summer break. Budapest’s Hungaroring circuit poses a high-downforce challenge, likened by some to a faster version of Monaco. Those involved in the Formula 1 Eni Magyar Nagydij 2012 discuss their prospects…

    Jenson Button, McLaren
    2011 Qualifying – 3rd, 2011 Race – 1st

    “The result in Germany puts us right back in the hunt. In that situation, there’s nothing better than a back-to-back weekender: you return to the cockpit almost before you’ve unpacked your bags from the previous race, so it’s great to carry forward that momentum.

    “Of course, Hungary’s a very special place for me: I won my first Grand Prix there back in 2006, I celebrated my 200th Grand Prix there on the Saturday evening with some of my oldest friends and colleagues in the paddock and I went on to win the Grand Prix on Sunday. It was the perfect weekend.

    “And there’s every reason to believe we can get another good result this year. Our pace at Hockenheim gives us cause for encouragement – it’s just that, as always, we’ll need to run flawlessly through qualifying and the race if we’re to be in the hunt at the end. 

    “That high level of performance shows just how close things currently are at the top in Formula One. I’m satisfied that we’re pushing hard enough to be up at the sharp end, so it would be fantastic to take home a winning result to reward all our recent hard work.”

    Lewis Hamilton, McLaren
    2011 Qualifying – 2nd, 2011 Race – 4th

    “I rolled the dice in Germany and got two ones. That’s life, sometimes, but at least I get the chance to give them another roll this weekend – and I’ll be hoping for two sixes! I think there’s good reason to feel confident, too; our Hockenheim upgrade package seems to have delivered the pace we anticipated and a good result just before the summer break would be the perfect way to end the first half of the season.

    “Things haven’t always gone our way in the first half, but I certainly feel like we’re experiencing something of a turning point for the whole team. We’ve really stepped up and delivered the pace we needed, our strategy has been spot-on and our pit stops, despite a troubled start at the beginning of the year, are now consistently the fastest in the pit lane.

    “Of course, we still have work to do to in order to fully understand the heating characteristics of the Pirelli tyres in wet weather. The current forecast is for mixed weather in Budapest, but we’re gathering more and more data on the tyres, and those conditions may give us further opportunity to overcome the issues we’ve recently encountered. I’m really looking forward to the whole weekend.”

    Martin Whitmarsh, McLaren team principal
    “With the halfway point in the 2012 FIA Formula One World Championship now behind us, it’s important that we head into the second half of the season with a concerted view to picking up as many points as possible in a bid to return us to the top. I firmly believe that we have the drivers, car and team to win both titles – and I think the difficulties we encountered during the first 10 races of 2012 have strengthened our resilience and hardened our resolve to fight back to the front.

    “At Hockenheim last weekend, we had a car capable of taking on and beating our main rivals – the aim now is to ensure both Jenson and Lewis both score points in every race and to take as many points away from our rivals as possible. On paper, it may look a difficult task, but we are singularly determined to close down the gaps between ourselves and the championship leaders.”

    “Our record at the Hungaroring is considerable: we have won there 10 times, more than any other team, and we go there with the clear aim to add an 11th victory to our tally. It certainly won’t be straightforward, but every single individual within Vodafone McLaren Mercedes is relishing that challenge.”

    Pastor Maldonado, Williams
    2011 Qualifying – 17th, 2011 Race – 16th

    “The track in Hungary is really slow speed and so we will need to adapt our set-up for this sort of circuit but we have shown so far this season that our car has good pace at different sorts of tracks. I have won here before so the track has good memories for me and the fans create a good atmosphere so I am looking forward to the weekend.”

    Bruno Senna, Williams
    2011 Qualifying – n/a, 2011 Race – n/a

    “The Hungaroring is one of the most challenging tracks we visit all year. Technically it’s a real test and it’s quite a slow lap so reminds me in some respects of Monaco. It’s also demanding physically because the temperature is often high and you have to do a lot of work behind the steering wheel so can get tired quickly. I have done well here in the past, particularly in GP2 in 2008, so I’m looking forward to this weekend.”

    Mark Gillan, Williams chief operations engineer
    “Logistics of the back to back races are always a bit more difficult with less turnaround between the events and therefore less time to react to any issues. The competition is so tight at the moment that one must ensure that you extract the maximum performance from the car – there is no room for errors. Pirelli bring the same compounds as used in the previous race, namely the medium and soft tyres. The circuit layout leads to very low average speeds, with only Monaco and Singapore being lower. This low efficiency metric means that you run the maximum downforce configuration. Teams also have to deal with the potentially high ambient temperatures which necessitate larger cooling ducts.”

    Remi Taffin, head of Renault Sport F1 track operations
    “The Hungaroring has the second lowest average speed of the year, after Monaco. The high number of corners and lack of straights means one lap is taken at just over 180km/h, therefore requiring extremely good low speed torque response. Cooling also becomes critical due to the lack of opportunity for the engine to ‘breathe’ and the high ambient temperatures, plus the high level of dirt and grit from the dusty surrounding fields that can be ingested into the inlets and radiators.”

    Mark Webber, Red Bull
    2011 Qualifying – 6th, 2011 Race – 5th

    “The Hungaroring is a good little venue and we’ve had some good races there in the past. Obviously overtaking has not been easy on that circuit, but it will be interesting to see how the cars perform there as it’s a hot race. The middle sector is very, very busy and you need to have a good balance over the top of the hill. In general, it’s a track that I enjoy, I like driving there and of course we’re looking forward to doing well before the summer break.”

    Sebastian Vettel, Red Bull
    2011 Qualifying – 1st, 2011 Race – 2nd

    “The race in Budapest is very popular and the city and the Danube offer many opportunities for fans off the track. I like the city a lot and I made my debut in 2007 with Scuderia Toro Rosso at the Hungaroring. The track itself is one of the slowest on the calendar, but as a driver you shouldn’t underestimate it, as there are a lot of opportunities to make mistakes. It can be very hot and that means the track can be very demanding physically. In addition, the surface has many bumps which shake you around a lot.”

    Paul di Resta, Force India
    2011 Qualifying – 11th, 2011 Race – 7th

    “I had a great race in Hungary last year when I finished seventh just before the summer break. It was the best way to end the first part of the season because there had been a few races up to that point where things hadn’t gone our way. Getting the result in Hungary helped make up for some of the bad luck earlier in the season. I had a great race there last year when I finished seventh just before the summer break. It was the best way to end the first part of the season because there had been a few races up to that point where things hadn’t gone our way. Getting the result in Hungary helped make up for some of the bad luck earlier in the season.”

    Nico Hulkenberg, Force India
    2011 Qualifying – n/a, 2011 Race – n/a

    “I have some very good memories, especially looking back to 2010 when I finished sixth, which at that time was the best result of my Formula One career. Also, in 2009 I won the GP2 race at the Hungaroring. So I’m looking forward to going back there, especially because I like the city of Budapest: it’s just a nice place to visit. I think we should be able to fight for points because we recently looked quite strong on circuits that don’t have so many fast corners, such as Valencia. Although it’s quite a slow circuit, it’s very difficult to get a good lap time because you need to hook up all the corners perfectly, so it’s quite challenging.”

    Dr Vijay Mallya, Force India team principal
    “People suggest that Hungary might play more to our strengths, but regardless of whether it suits us we just need to be ahead of the teams that we are fighting with in the championship and score points. If you take our immediate competitors, Sauber have had three races without points so far, Williams have had four, and we’ve had three. That’s what we need to address: we need to be scoring at every race.”

    Timo Glock, Marussia
    2011 Qualifying – 20th, 2011 Race – 17th

    “I’ve always had a bit of a special feeling about the Hungarian Grand Prix, to the point where it almost feels like a second home race. I have quite a lot of fans, particularly since I got the first podium finish of my F1 career there in 2008. Every time, I look forward to going there because for some reason I always seem to come to terms with the track very quickly and I’ve always enjoyed good races because of that. I think the weather will be a lot hotter – and drier – than in Hockenheim; sometimes the heat can be quite fierce, a little like Valencia. Physically it can be quite exhausting because of this, especially if it continues all weekend. It’s a back to back with Germany, so a tight turnaround for the team who have to cope with the heat as well. We all have the summer break to look forward to though; we all love to race but it has been a very demanding season so far and we need to get ourselves ready for ‘2012 – Part Two’.”

    Charles Pic, Marussia
    2011 Qualifying – n/a, 2011 Race – n/a

    “I came away from Hockenheim with a positive feeling. It is reassuring that the new package seems to have been performing consistently in Silverstone and Germany. For this reason I’m happy that we go to Hungary directly because we have everything fresh in our mind and we can see how well the car is suited to another different type of track. I really enjoyed the Hungaroring on the four occasions that I raced there in other series and had a good performance there last year in GP2, so I am comfortable with the circuit already, which always helps. After that, everyone in the team deserves to have a nice break to prepare for the many long haul races which follow later in the year, so I hope we can have another positive race this weekend.”

    John Booth, Marussia team principal
    “Whilst we aim to get to the bottom of the problems Timo has experienced with his car, we shouldn’t let that overshadow the otherwise positive route we appear to be taking with our development overall. We have had two races with the new aerodynamic package and the signs are that it is performing consistently and in line with the targets we set for ourselves relative to the other teams around us. Let’s hope we can make it three out of three in Budapest, to provide further confirmation. This week provides a challenging turnaround for the team with just a few days to transport our trackside operation across Europe and be up and running for Thursday. It’s a track and city that we’ve come to enjoy over the past couple of years though. In terms of the racing challenge, the circuit is always very dusty due to lack of use throughout the rest of the year, so it will take a little time to clean up. Timo enjoys the tight and twisty nature of the track and Charles is also reasonably familiar with it from previous formulae. We’re looking forward to the final race before the summer break, after which we will turn our minds to the second half of the season.”

    Michael Schumacher, Mercedes
    2011 Qualifying – 9th, 2011 Race – DNF

    “The race in Hungary is the last before the summer break and also marks the beginning of the second half of the season – which means it is time for a half-time analysis. As so often in life, this is, in my opinion, a question of perspective: if we only look at the points standings, it doesn’t seem so good; but if you look a bit deeper, and at certain results, then the overall picture is much better. We have taken a clear step forward and already achieved a few highlights. I’m looking forward to this weekend’s race because I really enjoy the Hungarian Grand Prix. It’s a circuit where the drivers are always busy around the lap, it’s really demanding and there are barely any opportunities to catch your breath. Let’s wait and see what we can achieve here, before the team heads off for a well-earned break.”

    Nico Rosberg, Mercedes
    2011 Qualifying – 7th, 2011 Race – 9th

    “The Hungaroring is a very challenging track and it’s definitely one that I enjoy. It’s like a street circuit but on a normal track because of the many tight and twisty turns and not so many straights. The layout should suit our car but you just can’t make predictions this year and you never know how it will work out over the weekend. Tyre wear will again be critical for the race so we will work hard to manage that properly. It would be nice if we can make a step forward and have a good weekend before the summer break.”

    Ross Brawn, Mercedes team principal
    “The final race before the summer break concludes an intense period for the team, coming on the back of our two home races in Silverstone and Germany. After our performance peaks and podium achievements in China, Monaco and Valencia, the last month has been tougher and we have not achieved the results that we would have wanted. There is a limited amount of work that can be done between back-to-back races but we will work hard to find the necessary improvements. Everyone always enjoys visiting Budapest which is a great city, and the Hungaroring track is a real technical challenge for both the drivers and engineers. It would be a nice reward to have a strong weekend there before a well-deserved mid-season break for the team.”

    Norbert Haug, Vice-President, Mercedes-Benz Motorsport
    “The Hungaroring has the slowest average speed of any permanent circuit on the calendar and the cars actually spend a lower proportion of the lap at full throttle than even in Monaco. The corners are predominantly medium and low speed, which require good traction, downforce and braking stability. Hungary is also the start of the second half of the season and, following the relatively cool conditions in Silverstone and Hockenheim, we can expect really hot weather and perhaps the highest temperatures of the season so far. The verdict on the first half of our season would be: ‘much achieved, much still to do’. We have been the pace-setters at a number of race weekends and Nico scored the first win for our new Silver Arrow works team in China, while Michael set the fastest time in a prestigious qualifying session in Monaco and Nico then finished second in the race. Two races later, in Valencia, Michael also scored a podium finish. Our team has scored over one third more points than at the same time last season, in spite of Michael suffering a run of technical retirements. The last two races have shown that we currently lack around half a second a lap to the pace-setters. This is clear to all in the team and we’ll be doing our maximum to develop the car further and close the gap.”

    Paul Hembery, Pirelli motorsport director
    “Hungary will provide a very stark contrast to the circuits that we have just come from, being the slowest permanent track on the calendar. This does not make it any less demanding on the tyres though: in fact a twisty and slippery circuit will often put more heat through the tyre than a fast and flowing layout as the tyre is moving around more – particularly when the ambient temperatures are high. Having said that, in Hungary last year we saw some wet weather, so it’s important not to make any assumptions. Consequently, we are still lacking some information about the performance of our slick tyres under race conditions at the Hungaroring. Balancing the demands of speed and durability will be key to getting the most out of the tyres in Hungary, in order to keep degradation under control. Overtaking is traditionally difficult, so the drivers have an opportunity to use strategy in order to gain track position. Because of this, the work done in free practice will be vital when it comes to preparing the race strategy: an opportunity that has been denied to the teams recently because of bad weather in the build-up to the last two Grands Prix.”

    Jaime Alguersuari, Pirelli test driver
    “Hungary is a bit like a go-kart track: it’s very good fun but a really tough race for the tyres and also the driver: your heart rate is at the highest that it is all year because of the high temperatures and not much cooling. In terms of set-up we run the highest downforce of the season, so we really maximise the aerodynamic potential of the car and this has an effect on the tyres too, with the front-left working particularly hard. With all the low to medium speed corners, combined traction and braking stability is very important: there is only one high-speed corner and that is really the only overtaking opportunity as well. Last year was a very complicated race where we started on the intermediate tyre and then moved onto the slick, but I think it should be quite different this year. The cars that should do well in Hungary this weekend are the ones that generate most downforce, because that is the most important factor there.”

    Kimi Raikkonen, Lotus
    2011 Qualifying – n/a, 2011 Race – n/a

    “It is always nice to go to Hungary. The circuit is not the most difficult of them all, but it is still quite challenging. It is also the last race before the summer break and it’s a great city to end the first half of the season. I have won once in Hungary and finished second three times. It is very hot and very demanding race. It’s only when you win that you don’t suffer at the Hungaroring. I hope I don’t suffer this time.

    “The team has been working hard in developing our car and we are confident we should be competitive in Hungary. Usually we have a hot weekend at the Hungaroring, and that’s what we have been looking forward to during the whole summer. It’s such a slow and twisty track that you there are two things most of all which are really important for fast lap times; these are good turn-in and good traction. If you have those, you have a competitive car there.

    “This is one of those circuits where it’s very difficult to overtake. Obviously, you need to get to the front in qualifying and you also ideally want to avoid the dirty side of the track on the grid. We haven’t been the best in qualifying so far, but we have been good in the race in hot conditions and able to make different strategies work. It won’t be the end of the world if we don’t qualify at the front, but it won’t make things easy for us either. Let’s see what happens.

    “It’s the closest we Finnish drivers get to a home race and a lot of Finns turn up every year. It is always nice to see the blue and white flags waving. Hopefully I will be able to celebrate with a win for them.”

    Romain Grosjean, Lotus
    2011 Qualifying – n/a, 2011 Race – n/a

    “It’s a familiar story; we need to achieve a good qualifying performance. We have a few updates coming which is good news and I’m sure we are going to be better than we were last time out. In terms of conditions, it should be hot and hopefully sunny which will suit our car better than the cold we’ve seen recently, and certainly better than in the cold and wet! The Hungaroring is a circuit that I quite like and one where I have had good experiences in the past. I scored my first GP2 Series pole position there in 2008 and last year I won and finished third, which was a pretty good weekend. Hopefully my past history at the track will help me to have a proper race weekend. Having all sessions in the dry, so we can work properly from beginning to end, will also be very helpful! I’m heading to Hungary with a positive attitude.”

    James Allison, Lotus technical director
    “If the first ten races of the year are a guide then we will be competitive in Hungary. It is a bit of a broken record, but for us to really live up to the promise we are sure exists in the team we need to qualify on the first two rows of the grid. This is even more important than normal on the twisty Hungaroring circuit.

    “We will continue to dial in the new device that we ran in Hockenheim with Kimi. Despite the difficult weather conditions, we did get a good feel of its performance potential from the free practice session and we aim to take it on a step at the Hungaroring.”

    Pedro de la Rosa, HRT
    2011 Qualifying – n/a, 2011 Race – n/a

    “The Hungaroring is the permanent Monaco and a circuit where I have very good memories since I achieved a podium there in 2006. I’m really looking forward to going this year because it’s a circuit where our car should adapt pretty well, as there are many slow corners. It’s similar to Monaco, and we were pretty competitive there, so I’m full of hope. The asphalt evolves a lot throughout the weekend and the track gets quicker so it’s very important to interpret this. In Germany we had a good performance and a good race so we’re looking forward to Hungary because we should do better there.”

    Narain Karthikeyan, HRT
    2011 Qualifying – n/a, 2011 Race – n/a

    “I’ve only raced once in Hungary, in 2005, and I remember it being quite a technical and challenging track. Seven years have passed since then so I’m going to have to work hard and make the most of the practice sessions to get used to the track. The car should adapt well and we’re also arriving with a good feeling after the German Grand Prix, so the ideal thing would be to finish off that good work with another positive result in Hungary so that we can go on holiday feeling good about ourselves.”

    Dani Clos, HRT test driver
    “I’m really excited about having another opportunity to drive the car in the first free practice session in Hungary. It will be the third consecutive Grand Prix and the fourth time this season that I get into the F112, and I hope to transform that continuity into a good rhythm and a positive result on the track with which to make my contribution to the team. To not compete is something new for me so I have to enjoy and make the most of these opportunities presented to me to continue learning.”

    Luis Perez-Sala, HRT team principal
    “We arrive at a different kind of circuit to the one in Germany because the Hungaroring has a lot of slow turns and few straights, meaning that overtaking isn’t easy. Dani will drive in the first free practice session once again and his work, just like in previous events, will definitely be of great use to the team. Both Pedro and Narain are in a good moment of form and given that in theory our car should adapt better to the characteristics of this track, I hope that we can continue with this progress to achieve a good result before heading out on holiday.”

    Heikki Kovalainen, Caterham
    2011 Qualifying – 19th, 2011 Race – DNF

    “I had my first Formula One win in 2008 in Hungary so it’s always good to come back to the Hungaroring. It’s fair to say I have some pretty good memories from here and I always have great support from the Finnish fans in Hungary. There’s always a lot of Finns in the crowd as I think it’s a bit easier for them to get to Hungary, and whenever there’s Finnish fans around there’s always a great atmosphere!

    “Technically the circuit is quite tricky as it is a mix of fast and slow corners and even though the cars run with maximum downforce you have to get the setup right for the quick and the slow stuff. The first sector is mostly about straight lines and outright speed but then you get into Sector 2 where it starts to get tight and twisty. The car is generally set up for those corners and if you have a good flow through there you can usually gain some time in that sector and improve on your lap time, if you set yourself and the car up correctly. You need to have good balance over the kerbs so that you can attack them, build up a good rhythm, and maintain your speed over the whole lap. 

    “The track also evolves a lot throughout the weekend. It usually starts off in quite a slippery state, but by the time we reach qualifying the grip levels can be pretty decent, assuming the weather has remained hot and dry. You just have to keep the evolution in mind during the first practice session and if the balance isn’t quite right you shouldn’t worry too much or dramatically change the set-up of the car – when the circuit starts to rubber in the car will improve. The rear of the car starts to become more stable and the track always improves as the weekend progresses.”

    Vitaly Petrov, Caterham
    2011 Qualifying – 12th, 2011 Race – 12th

    “I have very good memories of Hungary and am really looking forward to getting back to Budapest. In 2010 I out-qualified my team mate Robert Kubica there and I finished fifth in the race, plus it’s the country where I won my first race in Formula 3000.

    “It’s a challenging circuit for a few reasons. First, it’s pretty physical as it’s usually very hot, and second it’s a very technical track with tight sections so you need the right setup for each session on track. Physically, despite the heat, it isn’t too bad although you need some serious concentration behind the wheel for all 70 laps of the race!

    “Hungary will be the last race before our summer break in August and we all need a good break. Before we go on vacation it’ll be important to stop, analyse and discuss how the season is going with the guys so we can make adjustments for the remaining races. But then it’ll be time to switch off our own engines for two or three weeks, before coming back for training with recharged batteries for the next half of the season.”

    Mark Smith, Caterham technical director
    “The Hungaroring is an interesting challenge for the engineers as it is a low-efficiency circuit, like Monaco or Singapore, so we run high downforce levels across the whole car and that requires a specific approach to setup to give the driver maximum grip around the whole lap.

    “Hungary is what we call a lateral circuit, which means it is most demanding in cornering, but having good traction is also important as there are a lot of low speed corners where you need to get the car out as efficiently as possible. The track evolves over the weekend, generating more grip as the rubber goes down, so we must always take this into account, particularly during the earlier practice sessions, and manage our car setup and tyre strategies accordingly.

    “Climate wise, Hungary is usually hot and the track temperatures are relatively high. They often go above 35 degrees Celsius and this adds to the high tyre degradation levels we see. With that in mind, this year in particular, the teams that can keep their cars out on track as long as possible on each set of tyres will benefit the most.”

    Tony Fernandes, Caterham team principal
    “The Hungarian Grand Prix marks the mid-point of the F1 season and it is always good to pause for a moment and collect your thoughts before we all head off for a well-deserved summer break. In terms of progress on track we have definitely gained in pace and development but there is obviously more work to do. We are yet to really unlock the whole potential of this car and that will only come with more hard work and more time, but we are absolutely determined to achieve what we have set out to this year.

    “On the wider growth and development of the team I could not fault where we are now. We have started moving in to our new home in Leafield and that is a huge step for the F1 team and the whole Caterham Group. Our investment in that facility is a clear sign of how determined we are to join the F1 establishment but it does not stop there. In addition to Leafield we continue to attract well respected people from much bigger teams who are excited about the vision we have for our F1 team and all our automotive operations and we will be making more announcements on the commercial front in the very near future.

    “Now the team heads to Hungary and the aim there is to get back to the levels of performance we saw in Valencia. We know we can do it, we have the people to put us where we want to be and another week of hard work should be rewarded by a strong performance at the Hungaroring.”

    Kamui Kobayashi, Sauber
    2011 Qualifying – 13th, 2011 Race – 11th

    “In the past our car has not been brilliant on tracks like the Hungaroring, but with this year’s car it’s different. The Sauber C31 has proven to be quick on such twisty tracks as well, so I believe we can be strong there. Recently we were struggling a bit in the rain, but in Hungary the weather has been excellent for the majority of the Grand Prix weekends. I’m looking forward to what I hope will be a dry and hot race. The Hungarian Grand Prix is the final race before the summer break and therefore it’s particularly important. If you achieve a good result you can enjoy the break a lot more and I think after our strong performance in Hockenheim we have all the chances to manage that.”

    Sergio Perez, Sauber
    2011 Qualifying – 10th, 2011 Race – 15th

    “The Hungaroring is a very special track. It is a bit like the Monaco street circuit with many changes of direction, and the middle sector is especially tricky. I quite like the circuit and also the city of Budapest. We still have to improve our qualifying performance to get better grid positions as, for one reason or another, it went wrong at the recent races. I am sure our car can be as good at the circuit in Budapest as it was in Hockenheim. Last year I made it into Q3 in Hungary and this year we have got a much better car. I will give my utmost this coming weekend. I believe it will be important for the entire team to get in another good result in Hungary because we then disappear into the summer break and we should be able to do that in a positive mood.”

    Giampaolo Dall’Ara, Sauber head of track engineering
    “The Hungaroring is traditionally a high downforce circuit, and it requires almost the same level as Monaco. This is mostly because of the time the drivers spend cornering compared to the time they spend on the straights. So the main focus is on downforce. The difference to Monaco is that the corners – mainly slow and medium speed – are flowing. Therefore it’s important to work on the balance for these kinds of corners. Also the changes of directions are important. There are several of those at different speed levels from the slow chicane at turn six to the high speed corners two and three. Also important is the fact there is only one racing line, which makes qualifying even more important. Left and right of the line it‘s often dirty. It can be windy overnight and blow the sand back on the track. So the way the tyres behave changes a lot from Friday to Sunday. Pirelli is allocating the soft and the medium compound tyres, which is one level higher than one year ago. With lower temperatures this would be a conservative choice, but for the race weekend hot weather is expected, so this should work out well.”

    More to follow.

    For tickets and travel to 2012 Formula One races, click here.
    For Formula One and F1 team merchandise, click here.

     
    Copyright. 2012. F1.com All Rights Reserved
  • THE ONLINE THREAT Should we be worried about a cyber war?

     

    ANNALS OF NATIONAL SECURITY

    THE ONLINE THREAT

    Should we be worried about a cyber war?

    by NOVEMBER 1, 2010

    •  
    Some experts say that the real danger lies in confusing cyber espionage with cyber war.

    Some experts say that the real danger lies in confusing cyber espionage with cyber war.

    On April 1, 2001, an American EP-3E Aries II reconnaissance plane on an eavesdropping mission collided with a Chinese interceptor jet over the South China Sea, triggering the first international crisis of George W. Bush’s Administration. The Chinese jet crashed, and its pilot was killed, but the pilot of the American aircraft, Navy Lieutenant Shane Osborn, managed to make an emergency landing at a Chinese F-8 fighter base on Hainan Island, fifteen miles from the mainland. Osborn later published a memoir, in which he described the “incessant jackhammer vibration” as the plane fell eight thousand feet in thirty seconds, before he regained control.

    The plane carried twenty-four officers and enlisted men and women attached to the Naval Security Group Command, a field component of the National Security Agency. They were repatriated after eleven days; the plane stayed behind. The Pentagon told the press that the crew had followed its protocol, which called for the use of a fire axe, and even hot coffee, to disable the plane’s equipment and software. These included an operating system created and controlled by the N.S.A., and the drivers needed to monitor encrypted Chinese radar, voice, and electronic communications. It was more than two years before the Navy acknowledged that things had not gone so well. “Compromise by the People’s Republic of China of undestroyed classified material . . . is highly probable and cannot be ruled out,” a Navy report issued in September, 2003, said.

    The loss was even more devastating than the 2003 report suggested, and its dimensions have still not been fully revealed. Retired Rear Admiral Eric McVadon, who flew patrols off the coast of Russia and served as a defense attaché in Beijing, told me that the radio reports from the aircraft indicated that essential electronic gear had been dealt with. He said that the crew of the EP-3E managed to erase the hard drive—“zeroed it out”—but did not destroy the hardware, which left data retrievable: “No one took a hammer.” Worse, the electronics had recently been upgraded. “Some might think it would not turn out as badly as it did, but I sat in some meetings about the intelligence cost,” McVadon said. “It was grim.”

    The Navy’s experts didn’t believe that China was capable of reverse-engineering the plane’s N.S.A.-supplied operating system, estimated at between thirty and fifty million lines of computer code, according to a former senior intelligence official. Mastering it would give China a road map for decrypting the Navy’s classified intelligence and operational data. “If the operating system was controlling what you’d expect on an intelligence aircraft, it would have a bunch of drivers to capture radar and telemetry,” Whitfield Diffie, a pioneer in the field of encryption, said. “The plane was configured for what it wants to snoop, and the Chinese would want to know what we wanted to know about them—what we could intercept and they could not.” And over the next few years the U.S. intelligence community began to “read the tells” that China had access to sensitive traffic.

    The U.S. realized the extent of its exposure only in late 2008. A few weeks after Barack Obama’s election, the Chinese began flooding a group of communications links known to be monitored by the N.S.A. with a barrage of intercepts, two Bush Administration national-security officials and the former senior intelligence official told me. The intercepts included details of planned American naval movements. The Chinese were apparently showing the U.S. their hand. (“The N.S.A. would ask, ‘Can the Chinese be that good?’ ” the former official told me. “My response was that they only invented gunpowder in the tenth century and built the bomb in 1965. I’d say, ‘Can you read Chinese?’ We don’t even know the Chinese pictograph for ‘Happy hour.’ ”)

    Why would the Chinese reveal that they had access to American communications? One of the Bush national-security officials told me that some of the aides then working for Vice-President Dick Cheney believed—or wanted to believe—that the barrage was meant as a welcome to President Obama. It is also possible that the Chinese simply made a mistake, given the difficulty of operating surgically in the cyber world.

    Admiral Timothy J. Keating, who was then the head of the Pacific Command, convened a series of frantic meetings in Hawaii, according to a former C.I.A. official. In early 2009, Keating brought the issue to the new Obama Administration. If China had reverse-engineered the EP-3E’s operating system, all such systems in the Navy would have to be replaced, at a cost of hundreds of millions of dollars. After much discussion, several current and former officials said, this was done. (The Navy did not respond to a request for comment on the incident.)

    Admiral McVadon said that the loss prompted some black humor, with one Navy program officer quoted as saying, “This is one hell of a way to go about getting a new operating system.”

    The EP-3E debacle fuelled a longstanding debate within the military and in the Obama Administration. Many military leaders view the Chinese penetration as a warning about present and future vulnerabilities—about the possibility that China, or some other nation, could use its expanding cyber skills to attack America’s civilian infrastructure and military complex. On the other side are those who argue for a civilian response to the threat, focussed on a wider use of encryption. They fear that an overreliance on the military will have adverse consequences for privacy and civil liberties.

    In May, after years of planning, the U.S. Cyber Command was officially activated, and took operational control of disparate cyber-security and attack units that had been scattered among the four military services. Its commander, Army General Keith Alexander, a career intelligence officer, has made it clear that he wants more access to e-mail, social networks, and the Internet to protect America and fight in what he sees as a new warfare domain—cyberspace. In the next few months, President Obama, who has publicly pledged that his Administration will protect openness and privacy on the Internet, will have to make choices that will have enormous consequences for the future of an ever-growing maze of new communication techniques: Will America’s networks be entrusted to civilians or to the military? Will cyber security be treated as a kind of war?

    Even as the full story of China’s EP-3E coup remained hidden, “cyber war” was emerging as one of the nation’s most widely publicized national-security concerns. Early this year, Richard Clarke, a former White House national-security aide who warned about the threat from Al Qaeda before the September 11th attacks, published “Cyber War,” an edgy account of America’s vulnerability to hackers, both state-sponsored and individual, especially from China. “Since the late 1990s, China has systematically done all the things a nation would do if it contemplated having an offensive cyber war capability,” Clarke wrote. He forecast a world in which China might unleash havoc:

    Within a quarter of an hour, 157 major metropolitan areas have been thrown into knots by a nationwide power blackout hitting during rush hour. Poison gas clouds are wafting toward Wilmington and Houston. Refineries are burning up oil supplies in several cities. Subways have crashed in New York, Oakland, Washington, and Los Angeles. . . . Aircraft are literally falling out of the sky as a result of midair collisions across the country. . . . Several thousand Americans have already died.

    Retired Vice-Admiral J. Michael McConnell, Bush’s second director of National Intelligence, has issued similar warnings. “The United States is fighting a cyber war today, and we are losing,” McConnell wrote earlier this year in the Washington Post. “Our cyber-defenses are woefully lacking.” In February, in testimony before the Senate Commerce, Science, and Transportation Committee, he said, “As a consequence of not mitigating the risk, we’re going to have a catastrophic event.”

    A great deal of money is at stake. Cyber security is a major growth industry, and warnings from Clarke, McConnell, and others have helped to create what has become a military-cyber complex. The federal government currently spends between six and seven billion dollars annually for unclassified cyber-security work, and, it is estimated, an equal amount on the classified portion. In July, the Washington Post published a critical assessment of the unchecked growth of government intelligence agencies and private contractors. Benjamin Powell, who served as general counsel for three directors of the Office of National Intelligence, was quoted as saying of the cyber-security sector, “Sometimes there was an unfortunate attitude of bring your knives, your guns, your fists, and be fully prepared to defend your turf. . . . Because it’s funded, it’s hot and it’s sexy.”

    Clarke is the chairman of Good Harbor Consulting, a strategic-planning firm that advises governments and companies on cyber security and other issues. (He says that more than ninety per cent of his company’s revenue comes from non-cyber-related work.) McConnell is now an executive vice-president of Booz Allen Hamilton, a major defense contractor. Two months after McConnell testified before the Senate, Booz Allen Hamilton landed a thirty-four-million-dollar cyber contract. It included fourteen million dollars to build a bunker for the Pentagon’s new Cyber Command.

    American intelligence and security officials for the most part agree that the Chinese military, or, for that matter, an independent hacker, is theoretically capable of creating a degree of chaos inside America. But I was told by military, technical, and intelligence experts that these fears have been exaggerated, and are based on a fundamental confusion between cyber espionage and cyber war. Cyber espionage is the science of covertly capturing e-mail traffic, text messages, other electronic communications, and corporate data for the purpose of gathering national-security or commercial intelligence. Cyber war involves the penetration of foreign networks for the purpose of disrupting or dismantling those networks, and making them inoperable. (Some of those I spoke to made the point that China had demonstrated its mastery of cyber espionage in the EP-3E incident, but it did not make overt use of it to wage cyber war.) Blurring the distinction between cyber war and cyber espionage has been profitable for defense contractors—and dispiriting for privacy advocates.

    Clarke’s book, with its alarming vignettes, was praised by many reviewers. But it received much harsher treatment from writers in the technical press, who pointed out factual errors and faulty assumptions. For example, Clarke attributed a severe power outage in Brazil to a hacker; the evidence pointed to sooty insulators.

    The most common cyber-war scare scenarios involve America’s electrical grid. Even the most vigorous privacy advocate would not dispute the need to improve the safety of the power infrastructure, but there is no documented case of an electrical shutdown forced by a cyber attack. And the cartoonish view that a hacker pressing a button could cause the lights to go out across the country is simply wrong. There is no national power grid in the United States. There are more than a hundred publicly and privately owned power companies that operate their own lines, with separate computer systems and separate security arrangements. The companies have formed many regional grids, which means that an electrical supplier that found itself under cyber attack would be able to avail itself of power from nearby systems. Decentralization, which alarms security experts like Clarke and many in the military, can also protect networks.

    In July, there were reports that a computer worm, known as Stuxnet, had infected thousands of computers worldwide. Victims, most of whom were unharmed, were able to overcome the attacks, although it sometimes took hours or days to even notice them. Some of the computers were inside the Bushehr nuclear-energy plant, in Iran, and this led to speculation that Israel or the United States might have developed the virus. A Pentagon adviser on information warfare told me that it could have been an attempted “semantic attack,” in which the virus or worm is designed to fool its victim into thinking that its computer systems are functioning properly, when in fact they are not, and may not have been for some time. (This month, Microsoft, whose Windows operating systems were the main target of Stuxnet, completed a lengthy security fix, or patch.)

    If Stuxnet was aimed specifically at Bushehr, it exhibited one of the weaknesses of cyber attacks: they are difficult to target and also to contain. India and China were both hit harder than Iran, and the virus could easily have spread in a different direction, and hit Israel itself. Again, the very openness of the Internet serves as a deterrent against the use of cyber weapons.

    Bruce Schneier, a computer scientist who publishes a widely read blog on cyber security, told me that he didn’t know whether Stuxnet posed a new threat. “There’s certainly no actual evidence that the worm is targeted against Iran or anybody,” he said in an e-mail. “On the other hand, it’s very well designed and well written.” The real hazard of Stuxnet, he added, might be that it was “great for those who want to believe cyber war is here. It is going to be harder than ever to hold off the military.”

    A defense contractor who is regarded as one of America’s most knowledgeable experts on Chinese military and cyber capabilities took exception to the phrase “cyber war.” “Yes, the Chinese would love to stick it to us,” the contractor told me. “They would love to transfer economic and business innovation from West to East. But cyber espionage is not cyber war.” He added, “People have been sloppy in their language. McConnell and Clarke have been pushing cyber war, but their evidentiary basis is weak.”

    James Lewis, a senior fellow at the Center for Strategic and International Studies, who worked for the Departments of State and Commerce in the Clinton Administration, has written extensively on the huge economic costs due to cyber espionage from China and other countries, like Russia, whose hackers are closely linked to organized crime. Lewis, too, made a distinction between this and cyber war: “Current Chinese officials have told me that we’re not going to attack Wall Street, because we basically own it”—a reference to China’s holdings of nearly a trillion dollars in American securities—“and a cyber-war attack would do as much economic harm to us as to you.”

    Nonetheless, China “is in full economic attack” inside the United States, Lewis says. “Some of it is economic espionage that we know and understand. Some of it is like the Wild West. Everybody is pirating from everybody else. The U.S.’s problem is what to do about it. I believe we have to begin by thinking about it”—the Chinese cyber threat—“as a trade issue that we have not dealt with.”

    The bureaucratic battle between the military and civilian agencies over cyber security—and the budget that comes with it—has made threat assessments more problematic. General Alexander, the head of Cyber Command, is also the director of the N.S.A., a double role that has caused some apprehension, particularly on the part of privacy advocates and civil libertarians. (The N.S.A. is formally part of the Department of Defense.) One of Alexander’s first goals was to make sure that the military would take the lead role in cyber security and in determining the future shape of computer networks. (A Department of Defense spokesman, in response to a request to comment on this story, said that the department “continues to adhere to all laws, policies, directives, or regulations regarding cyberspace. The Department of Defense maintains strong commitments to protecting civil liberties and privacy.”)

    The Department of Homeland Security has nominal responsibility for the safety of America’s civilian and private infrastructure, but the military leadership believes that the D.H.S. does not have the resources to protect the electrical grids and other networks. (The department intends to hire a thousand more cyber-security staff members over the next three years.) This dispute became public when, in March, 2009, Rodney Beckstrom, the director of the D.H.S.’s National Cybersecurity Center, abruptly resigned. In a letter to Secretary Janet Napolitano, Beckstrom warned that the N.S.A. was effectively controlling her department’s cyber operations: “While acknowledging the critical importance of N.S.A. to our intelligence efforts . . . the threats to our democratic processes are significant if all top level government network security and monitoring are handled by any one organization.” Beckstrom added that he had argued for civilian control of cyber security, “which interfaces with, but is not controlled by, the N.S.A.”

    General Alexander has done little to reassure critics about the N.S.A.’s growing role. In the public portion of his confirmation hearing, in April, before the Senate Armed Services Committee, he complained of a “mismatch between our technical capabilities to conduct operations and the governing laws and policies.”

    Alexander later addressed a controversial area: when to use conventional armed forces to respond to, or even preëmpt, a network attack. He told the senators that one problem for Cyber Command would be to formulate a response based on nothing more than a rough judgment about a hacker’s intent. “What’s his game plan? Does he have one?” he said. “These are tough issues, especially when attribution and neutrality are brought in, and when trying to figure out what’s come in.” At this point, he said, he did not have “the authority . . . to reach out into a neutral country and do an attack. And therein lies the complication. . . . What do you do to take that second step?”

    Making the same argument, William J. Lynn III, the Deputy Secretary of Defense, published an essay this fall in Foreign Affairs in which he wrote of applying the N.S.A.’s “defense capabilities beyond the ‘.gov’ domain,” and asserted, “As a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain of warfare.” This definition raises questions about where the battlefield begins and where it ends. If the military is operating in “cyberspace,” does that include civilian computers in American homes?

    Lynn also alluded to a previously classified incident, in 2008, in which some N.S.A. unit commanders, facing penetration of their bases’ secure networks, concluded that the break-in was caused by a disabling thumb drive; Lynn said that it had been corrupted by “a foreign intelligence agency.” (According to press reports, the program was just as likely to be the product of hackers as that of a government.) Lynn termed it a “wakeup call” and a “turning point in U.S. cyber defense strategy.” He compared the present moment to the day in 1939 when President Franklin D. Roosevelt got a letter from Albert Einstein about the possibility of atomic warfare.

    But Lynn didn’t mention one key element in the commanders’ response: they ordered all ports on the computers on their bases to be sealed with liquid cement. Such a demand would be a tough sell in the civilian realm. (And a Pentagon adviser suggested that many military computer operators had simply ignored the order.)

    A senior official in the Department of Homeland Security told me, “Every time the N.S.A. gets involved in domestic security, there’s a hue and cry from people in the privacy world.” He said, though, that coöperation between the military and civilians had increased. (The Department of Homeland Security recently signed a memorandum with the Pentagon that gives the military authority to operate inside the United States in case of cyber attack.) “We need the N.S.A., but the question we have is how to work with them and still say and demonstrate that we are in charge in the areas for which we are responsible.”

    This official, like many I spoke to, portrayed the talk about cyber war as a bureaucratic effort “to raise the alarm” and garner support for an increased Defense Department role in the protection of private infrastructure. He said, “You hear about cyber war all over town. This”—he mentioned statements by Clarke and others—“is being done to mobilize a political effort. We always turn to war analogies to mobilize the people.”

    In theory, the fight over whether the Pentagon or civilian agencies should be in charge of cyber security should be mediated by President Obama’s coördinator for cyber security, Howard Schmidt—the cyber czar. But Schmidt has done little to assert his authority. He has no independent budget control and in a crisis would be at the mercy of those with more assets, such as General Alexander. He was not the Administration’s first choice for the cyber-czar job—reportedly, several people turned it down. The Pentagon adviser on information warfare, in an e-mail that described the lack of an over-all policy and the “cyber-pillage” of intellectual property, added the sort of dismissive comment that I heard from others: “It’s ironic that all this goes on under the nose of our first cyber President. . . . Maybe he should have picked a cyber czar with more than a mail-order degree.” (Schmidt’s bachelor’s and master’s degrees are from the University of Phoenix, though from one of their “ground” campuses.)

    Howard Schmidt doesn’t like the term “cyber war.” “The key point is that cyber war benefits no one,” Schmidt told me in an interview at the Old Executive Office Building. “We need to focus on that fact. When people tell me that these guys or this government is going to take down the U.S. military with information warfare I say that, if you look at the history of conflicts, there’s always been the goal of intercepting the communications of combatants—whether it’s cutting down telephone poles or intercepting Morse-code signalling. We have people now who have found that warning about ‘cyber war’ has become an unlikely career path”—an obvious reference to McConnell and Clarke. “All of a sudden, they have become experts, and they get a lot of attention. ‘War’ is a big word, and the media is responsible for pushing this, too. Economic espionage on the Internet has been mischaracterized by people as cyber war.”

    Schmidt served in Vietnam, worked as a police officer for several years on a SWAT team in Arizona, and then specialized in computer-related crimes at the F.B.I. and in the Air Force’s investigative division. In 1997, he joined Microsoft, where he became chief of security, leaving after the 9/11 attacks to serve in the Bush Administration as a special adviser for cyber security. When Obama hired him, he was working as the head of security for eBay. When I asked him about the ongoing military-civilian dispute, Schmidt said, “The middle way is not to give too much authority to one group or another and to make sure that we share information with each other.”

    Schmidt continued, “We have to protect our infrastructure and our way of life, for sure. We do have vulnerabilities, and we do talk about worst-case scenarios” with the Pentagon and the Department of Homeland Security. “You don’t see a looming war and just wait for it to come.” But, at the same time, “we have to keep our shipping lanes open, to continue to do commerce, and to freely use the Internet.”

    How should the power grid be protected? It does remain far too easy for a sophisticated hacker to break into American networks. In 2008, the computers of both the Obama and the McCain campaigns were hacked. Suspicion fell on Chinese hackers. People routinely open e-mails with infected attachments, allowing hackers to “enslave” their computers. Such machines, known as zombies, can be linked to create a “botnet,” which can flood and effectively shut down a major system. Hackers are also capable of penetrating a major server, like Gmail. Guesses about the cost of cyber crime vary widely, but one survey, cited by President Obama in a speech in May, 2009, put the price at more than eight billion dollars in 2007 and 2008 combined. Obama added, referring to corporate cyber espionage, “It’s been estimated that last year alone cyber criminals stole intellectual property from businesses worldwide worth up to one trillion dollars.”

    One solution is mandated encryption: the government would compel both corporations and individuals to install the most up-to-date protection tools. This option, in some form, has broad support in the technology community and among privacy advocates. In contrast, military and intelligence eavesdroppers have resisted nationwide encryption since 1976, when the Diffie-Hellman key exchange (an encryption tool co-developed by Whitfield Diffie) was invented, for the most obvious of reasons: it would hinder their ability to intercept signals. In this sense, the N.S.A.’s interests align with those of the hackers.

    John Arquilla, who has taught since 1993 at the U.S. Naval Postgraduate School in Monterey, California, writes in his book “Worst Enemies,” “We would all be far better off if virtually all civil, commercial, governmental, and military internet and web traffic were strongly encrypted.” Instead, many of those charged with security have adopted the view that “cyberspace can be defended with virtual fortifications—basically the ‘firewalls’ that everyone knows about. . . . A kind of Maginot Line mentality prevails.”

    Arquilla added that America’s intelligence agencies and law-enforcement officials have consistently resisted encryption because of fears that a serious, widespread effort to secure data would interfere with their ability to electronically monitor and track would-be criminals or international terrorists. This hasn’t stopped sophisticated wrongdoers from, say, hiring hackers or encrypting files; it just leaves the public exposed, Arquilla writes. “Today drug lords still enjoy secure internet and web communications, as do many in terror networks, while most Americans don’t.”

    Schmidt told me that he supports mandated encryption for the nation’s power and electrical infrastructure, though not beyond that. But, early last year, President Obama declined to support such a mandate, in part, Schmidt said, because of the costs it would entail for corporations. In addition to the setup expenses, sophisticated encryption systems involve a reliance on security cards and on constantly changing passwords, along with increased demands on employees and a ceding of control by executives to their security teams.

    General Alexander, meanwhile, has continued to press for more authority, and even for a separate Internet domain—another Maginot Line, perhaps. One morning in September, he told a group of journalists that the Cyber Command needed what he called “a secure zone,” a separate space within the Internet to shelter the military and essential industries from cyber attacks. The secure zone would be kept under tight government control. He also assured the journalists, according to the Times, that “we can protect civil liberties, privacy, and still do our mission.” The General was more skeptical about his ability to please privacy advocates when he testified, a few hours later, before the House Armed Services Committee: “A lot of people bring up privacy and civil liberties. And then you say, ‘Well, what specifically are you concerned about?’ And they say, ‘Well, privacy and civil liberties.’ . . . Are you concerned that the anti-virus program that McAfee runs invades your privacy or civil liberties?’ And the answer is ‘No, no, no—but I’m worried that you would.’ ”

    This summer, the Wall Street Journal reported that the N.S.A. had begun financing a secret surveillance program called Perfect Citizen to monitor attempted intrusions into the computer networks of private power companies. The program calls for the installation of government sensors in those networks to watch for unusual activity. The Journal noted that some companies expressed concerns about privacy, and said that what they needed instead was better guidance on what to do in case of a major cyber attack. The N.S.A. issued a rare public response, insisting that there was no “monitoring activity” involved: “We strictly adhere to both the spirit and the letter of U.S. laws and regulations.”

    A former N.S.A. operative I spoke to said, of Perfect Citizen, “This would put the N.S.A. into the job of being able to watch over our national communications grid. If it was all dot-gov, I would have no problem with the sensors, but what if the private companies rely on Gmail or att.net to communicate? This could put the N.S.A. into every service provider in the country.”

    The N.S.A. has its own hackers. Many of them are based at a secret annex near Thurgood Marshall International Airport, outside Baltimore. (The airport used to be called Friendship Airport, and the annex is known to insiders as the FANX, for “Friendship annex.”) There teams of attackers seek to penetrate the communications of both friendly and unfriendly governments, and teams of defenders monitor penetrations and attempted penetrations of U.S. systems. The former N.S.A. operative, who served as a senior watch officer at a major covert installation, told me that the N.S.A. obtained invaluable on-the-job training in cyber espionage during the attack on Iraq in 1991. Its techniques were perfected during the struggle in Kosovo in 1999 and, later, against Al Qaeda in Iraq. “Whatever the Chinese can do to us, we can do better,” the technician said. “Our offensive cyber capabilities are far more advanced.”

    Nonetheless, Marc Rotenberg, the president of the Electronic Privacy Information Center and a leading privacy advocate, argues that the N.S.A. is simply not competent enough to take a leadership role in cyber security. “Let’s put the issue of privacy of communications aside,” Rotenberg, a former Senate aide who has testified often before Congress on encryption policy and consumer protection, said. “The question is: Do you want an agency that spies with mixed success to be responsible for securing the nation’s security? If you do, that’s crazy.”

    Nearly two decades ago, the Clinton Administration, under pressure from the N.S.A., said that it would permit encryption-equipped computers to be exported only if their American manufacturers agreed to install a government-approved chip, known as the Clipper Chip, in each one. It was subsequently revealed that the Clipper Chip would enable law-enforcement officials to have access to data in the computers. The ensuing privacy row embarrassed Clinton, and the encryption-equipped computers were permitted to be exported without the chip, in what amounted to a rebuke to the N.S.A.

    That history may be repeating itself. The Obama Administration is now planning to seek broad new legislation that would enable national-security and law-enforcement officials to police online communications. The legislation, similar to that sought two decades ago in the Clipper Chip debate, would require manufacturers of equipment such as the BlackBerry, and all domestic and foreign purveyors of communications, such as Skype, to develop technology that would allow the federal government to intercept and decode traffic.

    “The lesson of Clipper is that the N.S.A. is really not good at what it does, and its desire to eavesdrop overwhelms its ability to protect, and puts at risk U.S. security,” Rotenberg said. “The N.S.A. wants security, sure, but it also wants to get to capture as much as it can. Its view is you can get great security as long as you listen in.” Rotenberg added, “General Alexander is not interested in communication privacy. He’s not pushing for encryption. He wants to learn more about people who are on the Internet”—to get access to the original internal protocol, or I.P., addresses identifying the computers sending e-mail messages. “Alexander wants user I.D. He wants to know who you are talking to.”

    Rotenberg concedes that the government has a role to play in the cyber world. “We privacy guys want strong encryption for the security of America’s infrastructure,” he said. He also supports Howard Schmidt in his willingness to mandate encryption for the few industries whose disruption could lead to chaos. “Howard is trying to provide a reasoned debate on an important issue.”

    Whitfield Diffie, the encryption pioneer, offered a different note of skepticism in an e-mail to me: “It would be easy to write a rule mandating encryption but hard to do it in such a way as to get good results. To make encryption effective, someone has to manage and maintain the systems (the way N.S.A. does for D.O.D. and, to a lesser extent, other parts of government). I think that what is needed is more by way of standards, guidance, etc., that would make it easier for industry to implement encryption without making more trouble for itself than it saves.”

    More broadly, Diffie wrote, “I am not convinced that lack of encryption is the primary problem. The problem with the Internet is that it is meant for communications among non-friends.”

    What about China? Does it pose such a threat that, on its own, it justifies putting cyber security on a war footing? The U.S. has long viewed China as a strategic military threat, and as a potential adversary in the sixty-year dispute over Taiwan. Contingency plans dating back to the Cold War include calls for an American military response, led by a Navy carrier group, if a Chinese fleet sails into the Taiwan Strait. “They’ll want to stop our carriers from coming, and they will throw whatever they have in cyber war—everything but the kitchen sink—to blind us, or slow our fleet down,” Admiral McVadon, the retired defense attaché, said. “Our fear is that the Chinese may think that cyber war will work, but it may not. And that’s a danger because it”—a test of cyber warfare—“could lead to a bigger war.”

    However, the prospect of a naval battle for Taiwan and its escalation into a cyber attack on America’s domestic infrastructure is remote. Jonathan Pollack, an expert on the Chinese military who teaches at the Naval War College in Newport, Rhode Island, said, “The fact is that the Chinese are remarkably risk-averse.” He went on, “Yes, there have been dustups, and the United States collects intelligence around China’s border, but there is an accommodation process under way today between China and Taiwan.” In June, Taiwan approved a trade agreement with China that had, as its ultimate goal, a political rapprochement. “The movement there is palpable, and, given that, somebody’s got to tell me how we are going to find ourselves in a war with China,” Pollack said.

    Many long-standing allies of the United States have been deeply engaged in cyber espionage for decades. A retired four-star Navy admiral, who spent much of his career in signals intelligence, said that Russia, France, Israel, and Taiwan conduct the most cyber espionage against the U.S. “I’ve looked at the extraordinary amount of Russian and Chinese cyber activity,” he told me, “and I am hard put to it to sort out how much is planning for warfare and how much is for economic purposes.”

    The admiral said that the U.S. Navy, worried about budget cuts, “needs an enemy, and it’s settled on China,” and that “using what your enemy is building to justify your budget is not a new game.”

    There is surprising unanimity among cyber-security experts on one issue: that the immediate cyber threat does not come from traditional terrorist groups like Al Qaeda, at least, not for the moment. “Terrorist groups are not particularly good now in attacking our computer system,” John Arquilla told me. “They’re not that interested in it—yet. The question is: Do vulnerabilities exist inside America? And, if they do, the terrorists eventually will exploit them.” Arquilla added a disturbing thought: “The terrorists of today rely on cyberspace, and they have to be good at cyber security to protect their operations.” As terrorist groups get better at defense, they may eventually turn to offense.

    Jeffrey Carr, a Seattle-based consultant on cyber issues, looked into state and non-state cyber espionage throughout the recent conflicts in Estonia and Georgia. Carr, too, said he was skeptical that China or Russia would mount a cyber-war attack against the United States. “It’s not in their interest to hurt the country that is feeding them money,” he said. “On the other hand, it does make sense for lawless groups.” He envisaged “five- or six-year-old kids in the Middle East who are working on the Internet,” and who would “become radicalized fifteen- or sixteen-year-old hackers.” Carr is an advocate of making all Internet service providers require their customers to use verifiable registration information, as a means of helping authorities reduce cyber espionage.

    Earlier this year, Carr published “Inside Cyber Warfare,” an account, in part, of his research into cyber activity around the world. But he added, “I hate the term ‘cyber war.’ ” Asked why he used “cyber warfare” in the title of his book, he responded, “I don’t like hype, but hype sells.”

    Why not ignore the privacy community and put cyber security on a war footing? Granting the military more access to private Internet communications, and to the Internet itself, may seem prudent to many in these days of international terrorism and growing American tensions with the Muslim world. But there are always unintended consequences of military activity—some that may take years to unravel. Ironically, the story of the EP-3E aircraft that was downed off the coast of China provides an example. The account, as relayed to me by a fully informed retired American diplomat, begins with the contested Presidential election between Vice-President Al Gore and George W. Bush the previous November. That fall, a routine military review concluded that certain reconnaissance flights off the eastern coast of the former Soviet Union—daily Air Force and Navy sorties flying out of bases in the Aleutian Islands—were redundant, and recommended that they be cut back.

    “Finally, on the eve of the 2000 election, the flights were released,” the former diplomat related. “But there was nobody around with any authority to make changes, and everyone was looking for a job.” The reality is that no military commander would unilaterally give up any mission. “So the system defaulted to the next target, which was China, and the surveillance flights there went from one every two weeks or so to something like one a day,” the former diplomat continued. By early December, “the Chinese were acting aggressively toward our now increased reconnaissance flights, and we complained to our military about their complaints. But there was no one with political authority in Washington to respond, or explain.” The Chinese would not have been told that the increase in American reconnaissance had little to do with anything other than the fact that inertia was driving day-to-day policy. There was no leadership in the Defense Department, as both Democrats and Republicans waited for the Supreme Court to decide the fate of the Presidency.

    The predictable result was an increase in provocative behavior by Chinese fighter pilots who were assigned to monitor and shadow the reconnaissance flights. This evolved into a pattern of harassment in which a Chinese jet would maneuver a few dozen yards in front of the slow, plodding EP-3E, and suddenly blast on its afterburners, soaring away and leaving behind a shock wave that severely rocked the American aircraft. On April 1, 2001, the Chinese pilot miscalculated the distance between his plane and the American aircraft. It was a mistake with consequences for the American debate on cyber security that have yet to be fully reckoned. 

    Read more http://www.newyorker.com/reporting/2010/11/01/101101fa_fact_hersh#ixzz21wupT9Wy

     

    Copyright. 2012 The New Yorker Magazine.com All Rights Reserved

  • ANNALS OF TECHNOLOGY.The man who started the hacker wars.

    ANNALS OF TECHNOLOGY

    MACHINE POLITICS

    The man who started the hacker wars.

    by MAY 7, 2012

    •  
    Radical hackers took up Hotz

    Radical hackers took up Hotz’s fight, although he never considered himself a cause.

    In the summer of 2007, Apple released the iPhone, in an exclusive partnership with A.T. & T. George Hotz, a seventeen-year-old from Glen Rock, New Jersey, was a T-Mobile subscriber. He wanted an iPhone, but he also wanted to make calls using his existing network, so he decided to hack the phone.

    Every hack poses the same basic challenge: how to make something function in a way for which it wasn’t designed. In one respect, hacking is an act of hypnosis. As Hotz describes it, the secret is to figure out how to speak to the device, then persuade it to obey your wishes. After weeks of research with other hackers online, Hotz realized that, if he could make a chip inside the phone think it had been erased, it was “like talking to a baby, and it’s really easy to persuade a baby.”

    He used a Phillips-head eyeglass screwdriver to undo the two screws in the back of the phone. Then he slid a guitar pick around the tiny groove, and twisted free the shell with a snap. Eventually, he found his target: a square sliver of black plastic called a baseband processor, the chip that limited the carriers with which it could work. To get the baseband to listen to him, he had to override the commands it was getting from another part of the phone. He soldered a wire to the chip, held some voltage on it, and scrambled its code. The iPhone was now at his command. On his PC, he wrote a program that enabled the iPhone to work on any wireless carrier.

    The next morning, Hotz stood in his parents’ kitchen and hit “Record” on a video camera set up to face him. He had unruly curls and wispy chin stubble, and spoke with a Jersey accent. “Hi, everyone, I’m geohot,” he said, referring to his online handle, then whisked an iPhone from his pocket. “This is the world’s first unlocked iPhone.”

    Hotz’s YouTube video received nearly two million views and made him the most famous hacker in the world. The media loved the story of the teen-age Jersey geek who beat Apple. Hotz announced that he was auctioning off the unlocked phone. The winning bid, from the C.E.O. of Certicell, a cell-phone-refurbishing company, was a 2007 Nissan 350Z sports car and three new iPhones. Later, on CNBC, Erin Burnett asked Hotz if he thought that day’s uptick in Apple stock was due in part to his efforts. “More people want iPhones now if they can use them with any sort of provider,” he said, and added that he “would love to have a talk right now with Steve Jobs” about it.

    “Man to man?” Burnett said.

    “Man to man.”

    Apple and A.T. & T. remained conspicuously silent. Unlocking a phone was legal, but it could enable piracy. Many hardware manufacturers sell the devices at a loss, recovering the costs through monthly contracts or software sales. When Steve Jobs was asked at a press conference about the unlocked iPhone, he smiled awkwardly and said, “This is a constant cat-and-mouse game that we play. . . . People will try to break in, and it’s our job to keep them from breaking in.” Hotz never heard directly from Jobs.

    Steve Wozniak, the co-founder of Apple, who hacked telephone systems early in his career, sent Hotz a congratulatory e-mail. “It was like a story out of a movie of someone who solves an incredible mystery,” Wozniak told me. “I understand the mind-set of a person who wants to do that, and I don’t think of people like that as criminals. In fact, I think that misbehavior is very strongly correlated with and responsible for creative thought.”

    Hotz continued to “jailbreak,” or unlock, subsequent versions of the iPhone until, two years later, he turned to his next target: one of the world’s biggest entertainment companies, Sony. He wanted to conquer the purportedly impenetrable PlayStation 3 gaming console, the latest version of Sony’s flagship system. “The PS3 has been on the market for over three years now, and it is yet to be hacked,” he blogged on December 26, 2009. “It’s time for that to change.”

    “My whole life is a hack,” Hotz told me one afternoon last June, in Palo Alto, California. He had moved there the previous month. He was now twenty-one, stocky, and scruffy. He wore a gray T-shirt under a gray hoodie, ripped bluejeans, and brown suède moccasins. “I don’t hack because of some ideology,” he said. “I hack because I’m bored.”

    The word “hacker,” when it was applied to technology, initially meant college students and hobbyists, exploring machines. At worst, a hacker was a prankster. In the early nineteen-seventies, Wozniak, the hacker archetype, built a system that let him make free phone calls. Among others, he called the Vatican, pretending to be Henry Kissinger, and managed to get a bishop on the line. Over time, “hacker” acquired a more sinister meaning: someone who steals your credit cards, or crashes the electronic grid. Today, there are two main types of hackers, and only one is causing this kind of trouble. A “white hat” hacker—an anti-virus programmer, for instance, or someone employed in military cyberdefense—aims to make computers work better. It is the “black hat” hacker who sets out to attack, causing havoc or ripping people off. A recent series of attacks on Brazil’s largest banks, which took down their Web sites for a short time, is an example of the malicious black-hat type. The number of black-hat intrusions is rising: in the U.S., the Department of Homeland Security has reported a spike—fifty thousand between October and March, up ten thousand from the same period last year.

    Hotz likes to hack according to the early definition of the word: getting inside a machine to see how it works, and changing it. To him, hacking is almost a sport, played against someone in a position of authority. “It’s a testosterone thing,” he told me. “It’s competitiveness, but it isn’t necessarily competitiveness with other people. It’s you versus the system. And I don’t mean the system like the government thing, I mean the system like the computer. ‘I’m going to stick it to the computer. I’m going to make it do this!’ And the computer throws up an error like ‘No, I’m not going to do this.’ It’s really a male thing to say, ‘I’m going to make you do this!’ ”

    We were sitting in Hotz’s apartment, on the ground floor of a building near Stanford. Red Bull cans and take-out menus littered the kitchen. Plastic wrappings, scattered cash, and empty computer boxes covered the living room. One box was overturned and being used as a dining table. A blue air mattress sagged in a corner. Hotz tossed a wad of cash from his pocket to the ground and sat with his legs crossed on a desk chair before three giant computer monitors. He held an iPad 2 that he had bought that afternoon at the Apple Store on University Avenue. Around the room, whiteboards were filled with scrawled notes and algorithms. One had a list labelled “Morning Routine”: “7:15 a.m., one snooze? . . . shower . . . floss/brush/wash . . . vitamins . . . dress nicely . . . water plants.” Another list, labelled “Uncomfortable Things,” included “Call Therapist” and “Join Gym and Use It.”

    Hotz talked about how he wrote his first computer program when he was five, while sitting on his father’s lap at their Apple II. By fifth grade, he was building his own video-game console with an electronic-projects kit from Radio Shack. His parents often found household appliances (remote controls, answering machines) gutted. “He always liked learning stuff, and if that was how he did it, great,” his father, George Hotz, Sr., a high-school computer teacher, told me. Hotz, bored with his classes and letting his grades slide, became known at school as an inventive joker who rolled down the hallways in wheeled sneakers and once hacked several classroom computers to simultaneously play Beethoven’s Ninth Symphony. His mother, Marie Minichiello, a social worker, told me that although she punished him for his acts of mild disobedience, she always supported him. “I didn’t want school to kill his passion,” she said.

    When Hotz was fourteen, he beat thousands of students from more than sixty countries to reach the finals of the Intel International Science and Engineering Fair. He appeared on the “Today” show with his invention, a small robot on wheels that could plot the dimensions of a room using infrared sensors, and wirelessly transmit the information to a computer. “Well, I think it’s very cool to be good in science,” Katie Couric told her viewers, as Hotz, in an ill-fitting dark suit, stepped forward, “and George Hotz is an example of that.” Couric asked if the technology could improve automated vacuum cleaners. But Hotz was more excited about helping soldiers fight terrorists. “They can send it into a complex before the military infiltrates it!” he said, his voice not yet broken. “Well, I’m impressed, George,” Couric replied, nudging him in the shoulder. “You’re a little brainiac, you.”

    In high school, Hotz built the Neuropilot, a sort of Segway controlled by brain waves, which you could drive around by thinking about it. Companies had explored similar technology for controlling video games, but building hardware controlled by brain waves still seemed like science fiction. The Neuropilot worked, though the movements were not always precisely translated from the driver’s brain. During his senior year, in 2007, Hotz built a “Star Trek”-inspired 3-D display called “I Want a Holodeck,” which again made him a finalist at the International Science and Engineering Fair. This time, he topped the electrical- and mechanical-engineering category and won fifteen thousand dollars. Before a Forbes photo shoot for a story about his achievement, Hotz smoked pot for the first time. In the photograph, he told me, smiling, “my eyes are bloodshot. It’s great.”

    While he was talking, Hotz had been playing with the iPad 2. He planned to spend the night hacking it but needed computer cables. We drove to Fry’s Home Electronics. It was around midnight, and as we approached a desolate intersection, hip-hop cranking from the car’s sound system, the light changed to red. With an angry swerve of the wheel, he cut through an adjoining parking lot and kept driving, muttering, “Fuck these assholes. Stupidest red light ever. It makes no sense at all.

    “I live by morals, I don’t live by laws,” he went on. “Laws are something made by assholes.”

    After high school, Hotz enrolled at the Rochester Institute of Technology but dropped out a few weeks later, to take up an internship at Google, in Silicon Valley. “We were not surprised or disappointed when he decided to leave school,” his father told me, though he admitted that he sometimes worried about his son, who spent a lot of time alone. Hotz supported himself through donations from people who had downloaded software he’d written and given away free; one program let people jailbreak the iPhone 3GS. His hacks generated enough income that he was able to buy an old white Mercedes. But after a few months he grew bored at Google and in 2009 moved back home to New Jersey. Since his iPhone feat, geeks often sent him devices just to see if he could hack them. That year, someone mailed Hotz a PlayStation 3 video-game system, challenging him to be the first in the world to crack it. Hotz posted his announcement online and once again set about finding the part of the system that he could manipulate into doing what he wanted. Hotz focussed on the “hypervisor,” powerful software that controls what programs run on the machine.

    To reach the hypervisor, he had to get past two chips called the Cell and the Cell Memory. He knew how he was going to scramble them: by connecting a wire to the memory and shooting it with pulses of voltage, just as he had when he hacked his iPhone. His parents often gave him gifts that were useful for his hobby: after he unlocked the iPhone, they bought him a more expensive one. For Christmas, 2009, they gave him a three-hundred-and-fifty-dollar soldering iron. Sitting on the floor of his room, Hotz twisted off the screws of the black PS3 and slid off the casing. After pressing the iron to the wire, he began pulsing the chips.

    Next, he had to write an elaborate command that would allow him to take over the machine. Hotz spent long nights writing drafts of the program on his PC, and trying them out on the hypervisor. “The hypervisor was giving me shit,” he recalls. It kept throwing up an error message—the number 5—telling Hotz that he was unauthorized. He knew that, if he got through, he’d see a zero instead. Finally, after several weeks typing at his computer, Hotz had composed a string of code five hundred lines long. He ran it on the PS3 and nervously watched the monitor. The machine displayed a sublime single digit: 0. Hotz called the code his “Finnegans Wake.”

    On January 23, 2010, a little more than a month after posting his challenge, Hotz announced on his blog, “I have hacked the PS3.” He later posted instructions for others to do the same, and freely distributed the code. Hotz had hacked the two most iconic and ironclad devices of his generation. “Nothing is unhackable,” he told the BBC. “I can now do whatever I want with the system. It’s like I’ve got an awesome new power—I’m just not sure how to wield it.”

    Sony responded by releasing a software update that disabled OtherOS, the feature through which Hotz had accessed the hypervisor. OtherOS enabled the machine to run Linux, the alternative operating system to Microsoft Windows and Apple OS. Running Linux essentially turned the PS3 from a single-purpose gaming console into a desktop computer, which people could use to write programs. They were furious that Sony had robbed them of this capability. “I am EXTREMELY upset,” a comment on Sony’s blog read. Some wanted to rally around Hotz, and organize: “THIS IS MADNESS!!! HACKERS UNITE!!! GEOHOT WILL LEAD US INTO THE LIGHT!” But many were angry at Hotz, not at Sony. “Congratulations geohot, the asshole who sits at home doing nothing than ruining the experience for others,” one post read. Someone posted Hotz’s phone number online, and harassing calls ensued.

    Recalling the controversy, Hotz seemed genuinely unfazed. “All those people flaming me, I could care less,” he told me. He spent the summer of 2010 biking through China, and that fall, back at his parents’ house, he read Ayn Rand, which he said made him want to “do something.” “We let him get away with murder,” his father admitted. “But he never did bad things. He always did what he felt was right, and we were happy with that.”

    In late December, Hotz decided once again to try to hack the PS3 in a way that would give him total control and let him restore what Sony had removed. On New Year’s Eve, Hotz and some high-school buddies played beer pong and watched the Times Square ball drop on TV. He woke up hung over on the couch at a friend’s house, with a towel stretched across him as a blanket, and stumbled back to his parents’ to fix some macaroni and cheese and think things through. Hotz wanted control of the PS3 metldr (pronounced “metloader”), a part of the software that, functioning like a master key, “lets you unlock everything.”

    Hotz knew that the metldr key was hidden within the PS3, but now he realized that he didn’t necessarily have to find and break into the secret place. He could run a special decryption program in a different part of the machine, and make the key appear there. He had to figure out how to speak to the metldr, and then command it to appear. Within ten minutes, he had coded the PS3 hack.

    The cursor blinked, indicating that Hotz had the power to do anything with the PS3: install OtherOS, play pirated games, or run obscure Japanese software. He prepared a Web page and a video documenting what he had done. But he hesitated. Although Apple had never sued anyone for jailbreaking, Sony had reacted fiercely to previous modifications of the PlayStation. Sony had also long boasted about the security of the PS3. Hotz wasn’t just undoing years of corporate P.R.; he was potentially opening the door to piracy.

    With this concern in mind, Hotz wrote code that disabled the ability to run pirated software using his hack and added a note in his documentation: “I don’t condone piracy.” Still, he wanted a second opinion. Before he put the site live, he signed into an online chat channel where hacker friends hung out, and asked them whether he should release his hack. “Yeah,” one told him. “Information should be free.” Hotz told me, “This is the struggle of our generation, the struggle between control of information and freedom of information.” Also, on the day of the hack, unbeknownst to his parents, Hotz was high. He told me he had taken Vicodin and OxyContin, which filled him with a sense of invulnerability. “You just feel good about everything,” he recalled. He pushed a button on the keyboard and uploaded the instructions for his PS3 jailbreak.

    On January 11, 2011, Hotz was playing Age of Empires II on his computer in New Jersey when he received an e-mail from Sony announcing a lawsuit against him. The company requested a temporary restraining order for violating the Computer Fraud and Abuse Act and facilitating copyright infringement, such as downloading pirated games. According to the Entertainment Software Association, piracy costs the industry eight billion dollars a year. Sony was also seeking to impound his “circumvention devices,” and it wanted him to take all the instructions offline immediately.

    As soon as the news hit the Web, geeks rushed to Hotz’s site, seeking the tools while they could. At Carnegie Mellon University, David Touretzky, a computer scientist and proponent of freedom of information online, made copies of Hotz’s files. Touretzky blogged that Sony was “doing something breathtakingly stupid, presumably because they don’t know any better. . . . Free speech (and free computing) rights exist only for those determined to exercise them. Trying to suppress those rights in the Internet age is like spitting in the wind.” The Electronic Frontier Foundation, a digital-rights advocacy group, released a statement saying that the Sony v. Hotz case sent a “dangerous message” that Sony “has rights in the computer it sells you even after you buy it, and therefore can decide whether your tinkering with that computer is legal or not. We disagree. Once you buy a computer, it’s yours.”

    But Sony believed that Hotz’s hack was sending a dangerous message of its own. If people were free to break into their machines, game creators would be cheated out of royalties. Cheaters could tweak the games in order to beat everyone who stuck to the rules. Riley Russell, the general counsel for Sony Computer Entertainment of America, said in a statement at the time, “Our motivation for bringing this litigation was to protect our intellectual property and our consumers.”

    On January 14th, Hotz went on “Attack of the Show,” a popular news program for gamers on G4, a cable-television network. When the host asked what he was being sued for, Hotz joked, “Making Sony mad.” He was serious, though, about his mission to keep information free. Later, he uploaded a hip-hop video on YouTube, which he titled “The Light It Up Contest.” He sat in front of his Webcam in a blue sweatshirt, his computer in the background. “Yo, it’s geohot,” he rapped, as the beat kicked in, “and for those that don’t know, I’m getting sued by Sony.” It was a surprisingly catchy tune about a complex issue from a whiz kid brazenly striking a pose. Hotz went on, bouncing in his desk chair, “But shit man / they’re a corporation / and I’m a personification / of freedom for all.”

    Hotz’s rap earned him sympathy in chat rooms but not in the courts. A California district court granted Sony the restraining order against Hotz, preventing him from hacking and disseminating more details about its machines. It also approved a request by Sony to subpoena information from Twitter, Google, YouTube, and Bluehost, Hotz’s Internet provider, including the Internet Protocol addresses of anyone who downloaded the instructions from his site—a move that further incensed digital-rights advocates. Sony also gained access to records from Hotz’s PayPal account. In some circles, the rebel leader was becoming a martyr. As one fan of Hotz’s posted: “geohot = savior of mankind.”

    Martyrs win devotees, and soon Hotz had gained the allegiance of the most notorious hackers: a group called Anonymous. In the past few years, the group has become famous for engineering elaborate online attacks and protests, often in the name of free speech and “lulz,” which is Internet-speak for laughs. Group members fought against the Church of Scientology, which they believed to be suppressing free speech online, and shut down government Web sites in defense of WikiLeaks. More recently, coders have joined the Occupy Wall Street movement, and threatened to release a list of people collaborating with the Zetas, a Mexican drug gang. At the time of the Sony hack, Anonymous had become its own pop-culture meme. On Comedy Central, Stephen Colbert called Anonymous members a “global hacker nerd brigade.” Others referred to them as “the paramilitary wing of the Internet.”

    Anonymous is an international, decentralized, shape-shifting hive. All you have to do to join is say you are part of it. No one goes by his or her real name. As in any shadowy group, some members are more extreme than others. A few years ago, I was invited to attend a secret meeting of Anonymous activists, at an Indian restaurant in Hollywood. While Anonymous is often characterized as a group of malicious cyber-terrorists, they struck me more as a group of earnest young protesters with a dark sense of humor and a brilliant knack for viral marketing. Anons, as members call themselves, are the best publicists on the Internet: through social media, they mobilize, inform, outrage, and entertain in ways that the Yippies could never imagine, and they do it all really fast.

    In early April, an Anonymous member created an Internet relay chat room called Operation Sony, or #OpSony. “It is the duty of Anonymous to help out this young lad, and to protest against Sony’s censorship,” the mission statement read. Around the world, curious coders logged into their phones and laptops to discuss plans.

    As the chat room filled, Anons began digging up personal contact information on Sony’s lawyers and debating the most effective tactics: Flash mobs outside Sony stores? Sending black faxes, which would waste all the ink in their machines? Eventually, they settled on a distributed denial of service, or DDoS, attack, overwhelming Sony’s Web sites with simultaneous visits until they crashed.

    On April 4th, Anonymous announced the plan to the public in a press release: “Congratulations, Sony. You have now received the undivided attention of Anonymous. You saw a hornets nest, and stuck your penises in it. You must face the consequences of your actions, Anonymous style.” Within hours, both Sony.com and PlayStation.com were down. Anonymous posted a video on YouTube with its demands: Drop the case against Hotz and allow for modifications on the PS3. Over an image of a Guy Fawkes mask, which the group uses as a symbol, text read, “Leave Fellow hackers like geohot alone.”

    Internet protests, like street protests, have a way of spinning out of control. People chant peacefully, but then someone throws a rock through a window and rioting begins. No sooner had the hacker war begun than one Anon declared a splinter faction, SonyRecon, calling for personal hacks against Sony employees and the judge in the geohot case. Other Anons posted the phone numbers, family-member names, and addresses of Sony executives. They even published a description of the C.E.O.’s house, and proposed various methods of attack:

    <sonyrecon335> We’ll shit on his doorstep, then run away
    <e-hippie741> dude
    <e-hippie741> you’d shit on someones doorstep
    <Hit_X> ring the kids school and pull a prank like hes been rushed in hospital:
    <e-hippie741> do you love geohot that much

    Back in his parents’ house, in front of the glowing computer screens in his cluttered bedroom, Hotz clicked with mounting apprehension through the news of Anonymous’s plans. “I hope to God Sony doesn’t think this is me,” he remembers thinking. He didn’t believe in secretive online warfare, much less in defecating on someone’s doorstep. “I’m the complete opposite of Anonymous,” he told me. “I’m George Hotz. Everything I do is aboveboard, everything I do is legit.”

    On April 11th, Sony announced that it had reached an agreement with Hotz, who denied wrongdoing but consented to a permanent injunction barring him from reverse-engineering any Sony product in the future. But Hotz’s supporters felt that the injunction was a form of censorship. Some of his defenders made “FREE GEOHOT” shirts, and others went to Sony stores in cities such as San Diego and Costa Mesa to protest. Black-hat hackers called for more destructive attacks against Sony.

    At 4:15 P.M. on April 19, 2011, technicians at the San Diego offices of Sony Network Entertainment noticed that four of their computer servers were rebooting without authorization. The team took the systems offline and began examining the activity logs. Their investigation confirmed that someone had broken into the servers, and possibly into others. Sony immediately shut down the PlayStation Network, their online-entertainment hub. The company concluded that it had been the victim of a sophisticated attack that had exposed the addresses, passwords, birthdays, and e-mail addresses of seventy-seven million PSN subscribers, who pay to play games and watch movies. “While there is no evidence at this time that credit card data was taken, we cannot rule out the possibility,” Patrick Seybold, a company spokesman, wrote in a blog post on PlayStation’s Web site. Though it remained unclear whether someone from Anonymous was responsible for the hack or whether it was just someone taking advantage of the chaos, the events were clearly linked.

    Security experts called it one of the biggest data breaches of all time. Sony announced that it would keep the PSN down indefinitely—at an estimated cost of ten million dollars in lost revenue per week—as it raced to plug the holes. Anonymous denied responsibility and temporarily suspended its campaign against the company.

    At 4:51 A.M. on April 28th, Hotz uploaded a lengthy rant against the PSN hackers. “Running homebrew and exploring security on your devices is cool,” he wrote. “Hacking into someone elses server and stealing databases of user info is not cool. You make the hacking community look bad, even if it is aimed at douches like Sony.” Hotz was pointing out the distinction between white- and black-hat hackers. Still, he knew he had helped loosen a boulder that was now crashing down a hill.

    On May 1st, the company discovered a data breach on the Sony Online Entertainment service, exposing twenty-four million personal accounts. Technicians also found a file that had been planted on one of their servers as a kind of digital graffiti. It was titled “Anonymous,” and read, “We Are Legion.” At a press conference in Tokyo that day, Kaz Hirai, the chief executive officer of Sony Computer Entertainment, and two other executives walked onto a stage and faced the packed crowd. “We offer our sincerest apologies,” Hirai said and, setting his microphone on a table, bowed low with the others for eight seconds as the cameras flashed. They said that some network services would be back up in a few days. But it took two weeks to fully restore the system.

    Sony soon had a new force to contend with: an Anonymous splinter group called Lulz Security, commonly known as LulzSec. Members were like the merry droogs of the net; on their Twitter feed, nicknamed the Lulz Boat, they identified themselves as “the world’s leaders in high-quality entertainment at your expense.” Their first bit of dark comedy came on May 30th, when they hacked the PBS Web site, in retaliation for what they thought was unfairly negative coverage of the WikiLeaks founder, Julian Assange. They posted a fake news story reporting that the late rappers Tupac Shakur and Biggie Smalls had been hiding out in New Zealand. “Local townsfolk refuse to comment on exactly how long or why the rappers were being sheltered,” the story read. “One man simply says ‘we don’t talk about that here.’ ”

    The day after the PBS prank, the group began tweeting a series of warnings to Sony. “Hey @Sony,” one read, “you know we’re making off with a bunch of your internal stuff right now and you haven’t even noticed? Slow and steady, guys.” Some saw the warnings as more geohot backlash for the company. “The group is sending a message to Sony for messing with one of their own, hacker George Hotz,” a blogger wrote.

    On June 2nd, LulzSec hacked the Sony Pictures Web site, compromising what it claimed to be more than a million passwords of consumers who had put their personal information on the site. (Sony later put the figure at thirty-seven thousand.) The group’s purpose, it explained in a statement, was not to come across as “master hackers” but to expose the continued weakness of Sony’s security systems. Lulz’s statement said that Sony was “asking for it,” because the company stored the passwords in plain text, instead of encrypting them. The statement went on to encourage fellow-hackers to “tear the living shit out of it while you can; take from them everything!” LulzSec members broke in using a rudimentary technique called SQL Injection, which allowed them access to unauthorized data on the Sony Pictures site. “From a single injection, we accessed EVERYTHING,” they said. “Why do you put such faith in a company that allows itself to become open to these simple attacks?”

    Black-hat hackers began posting corporate e-mails, and, during the summer of 2011, attacks on media, technology, and other institutions came almost daily. Nintendo got hacked, and so did Sega, Electronic Arts, the News Corporation, Booz Allen Hamilton, NATO, and Lady Gaga. Even the C.I.A. was hacked, LulzSec claimed. It was the Summer of Lulz. Hotz didn’t mean to inspire a hacker war, but he doesn’t regret what he did. One night at a restaurant in Palo Alto, he clarified his position on the attacks against Sony. “If being a techno-libertarian leads to online anarchy, so be it,” he said. “I’m not a cause. I just like messing with shit.”

    Hotz defines a hacker as “somebody with a set of skills,” and points out that the skills alone don’t make you good or evil. It’s up to you to decide how to use them. Facebook’s Mark Zuckerberg may be his generation’s most famous hacker, but Hotz most embodies its original spirit. He hacks for the technical challenge and the fun. He doesn’t identify as white-hat or black-hat, preferring to think of himself more like someone twisting wrenches under a sink. “Hacker is to computer as plumber is to pipes,” he once blogged. When I met him again, later in the summer, at DefCon, a hacker convention in Las Vegas, he wasn’t at a bar with guys in long black coats, plotting some corporate takedown. He was alone on a couch in a back room, coding on his laptop.

    A month after his settlement with Sony, last spring, Hotz moved back to California to take a full-time job at Facebook. He wouldn’t say what he worked on, other than design technology to improve the site. Some saw his transition as a shrewd move by Facebook to co-opt a hacker before he might compromise the company. Others flamed him for cashing in. “You have to love the amount of suck and sell-out that George Hotz contains within his flimsy nerd shell,” a detractor wrote online.

    One of my interviews with Hotz took place in Palo Alto just after he’d started the Facebook job, before word had leaked online. He showed up wearing a new blue-and-white Facebook T-shirt, a member of the Valley’s coolest frat. He was waking up early (as his “Morning Routine” whiteboard reminded him) to get to work. “Everything is very fast-moving and the culture is young,” he said, and then handed me his business card, which read, “I am the most illegal circumvention device of them all.” Eight months later, Hotz quit. He didn’t want to discuss why, but suggested that having a day job didn’t suit him. “Facebook is a fun place to work,” he told me, “but I wonder how people stay employed for so long.” He travelled in Panama, then returned to Palo Alto. He wouldn’t say what he was going to do next, only that he won’t be sharing his exploits on the Internet anymore. “I’m through with all that,” he said.

    He wasn’t the only one. On March 6, 2012, U.S. officials announced the indictment of six élite hackers from Anonymous and LulzSec. A federal law-enforcement official told me that the arrests were “very significant—these are core members.” Hotz had never made contact with LulzSec or Anonymous members, even when they were crusading on his behalf, and he was agnostic about their fate. The brash young man from the rap video who described himself as “a personification of freedom for all” had retired from battle. He refused to make what he called “a moral judgment” of the indicted hackers. “I’ll make a technical judgment,” he told me. “If they were that good, they wouldn’t have got caught.”

    Even with the arrests, other Anons have sworn to keep up the campaign. Companies are working hard, too. “The last year has demonstrated how sophisticated cybercriminals can be,” Jim Kennedy, the senior vice-president of strategic communications for Sony Corporation of America, wrote me in an e-mail. Sony created a new position—a corporate executive in charge of global-information security and privacy—and promoted Nicole Seligman, who as general counsel had been targeted by hackers, to president of the Sony Corporation of America. Kennedy admits that security remains an unceasing fight. “In the end, it must be recognized that no system is absolutely foolproof,” he wrote. “Constant vigilance is essential.”

    Last May, engineers from Sony invited Hotz to a meeting at its American headquarters, a half hour’s drive north, in Foster City. (“We are always interested in exploring all avenues to better safeguard our systems and protect consumers,” Kennedy told me.) Nervous but curious, Hotz walked into the building eating from a box of Lucky Charms, dropping marshmallows across the lobby. “If there were going to be lawyers there,” he recalled, “I was going to be the biggest asshole ever.” Instead, he found a roomful of PS3 engineers who were “respectful,” he said, and wanted to learn more about how he had beaten their system. During the next hour or so, the man who had started the hacker wars described his methodology. 

    ILLUSTRATION: RON KURNIAWAN

    Read more http://www.newyorker.com/reporting/2012/05/07/120507fa_fact_kushner#ixzz21wZrICSR

  • NSA chief: Internet ‘at great risk,’ needs defense system

    Devin Coldewey

    NSA chief: Internet ‘at great risk,’ needs defense system

    NSA

    NSA / Defcon

    General Keith Alexander, head of the National Security Agency, addressed an audience at the Defcon hacking conference in Las Vegas Friday, saying the Internet needed fundamental defenses against foreign incursion.

    It’s the first time an NSA official has spoken at the world-famous conference, where the attendees are often engaged in unquestionably illegal activities like attempting to breach the security of government agencies. But General Alexander seemed to regard them as kindred spirits as well as experts.

    “Sometimes you guys get a bad rap. From my perspective, what you’re doing to figure out vulnerabilities in systems is great,” he told the crowd, according to a report from CNET.

    But it wasn’t all civilities. Alexander said that the Internet as it is today is “at great risk from exploitation, disruption and destruction.” Tracking Internet activity is a massive task and even the NSA can’t do it without some kind of fundamental access.

    He compared the Internet’s traffic to a toll highway, and said he’d like the NSA to act as the monitor. Most traffic would barely be paid attention to, like a car with an “EZ Pass” cruising through without being stopped. But suspicious traffic would be identified and tracked.

    As MIT’s Technology Review points out, NSA has prototyped a version of an Internet monitoring system, with 17 defense contractors participating. If an internal alarm is tripped, presumably in the event of a breach, telemetry from the event is relayed automatically to the NSA. Alexander would like to see something like this applied more broadly.

    Naturally an audience of hackers would be skeptical of giving a government agency such broad access to all the U.S.’s Internet traffic, but Alexander assured them that their interest was strictly to investigate threats from abroad. “Our job is foreign intelligence. We get oversight by Congress,” he said, also taking time to say that recent reports that the NSA had a file on every American citizen were “absolute nonsense.”

    He also exhorted the audience of technically proficient hackers to get involved. With a tacit nod to the bumbling efforts of some legislators in regulating the Internet and security issues, he suggested that the Defcon attendees should be helping from the inside, not just taking pot shots at it from outside.

    General Alexander is head of perhaps the largest and most invasive intelligence and security agency in the world, and whether it’s despite that or because of that, his overtures to the hacking community seem reasonable. He and the occasionally lawless hackers may in some ways seem to be natural enemies, but as one hacker told MIT, when it comes to advancing the field of cybersecurity, “Our interests overlap.”

    Devin Coldewey is a contributing writer for NBC News Digital. His personal website is coldewey.cc.

     

    Copyright©2012 NBCNews.com All Rights Reserved

  • BBC Sport – Formula 1 Hungarian Grand Prix

    http://www.bbc.co.uk/sport/0/formula1/ 

     

    Results of Friday Practice

  • When Beauty Fades. The Shelf Life of Super Models

    Lee Clower for The New York Times

    Timothy Greenfield-Sanders’s documentary is “About Face: The Supermodels, Then and Now.”

     

    Timothy Greenfield-Sanders/HBO

    Paulina Porizkova is a subject of the film.

     

    July 25, 2012
     

    When Beauty Fades

    By 

     

    BOYISH in her gamin crop and tie, Isabella Rossellini faced down the camera. For sure, she acknowledged, aging is a bummer. “My social status has diminished because I know I’m not invited to the A parties anymore,” said Ms. Rossellini, 60. “My daughter is. As you grow older, you don’t count anymore.”

    With that, she erupted into peals of laughter touched with rue, the legacy of a lifetime of highs and lows in front of the camera.

    Her latest performance, captured by the photographer and filmmaker Timothy Greenfield-Sanders, offers a dose of the candor that highlights his new documentary, “About Face: The Supermodels, Then and Now.” The film, to be broadcast Monday on HBO, pokes behind the fastidiously maintained facades of some of the most celebrated beauties of the last half-century.

    Jerry Hall, China Machado, Marisa Berenson and Lisa Taylor are but a handful of the runway legends who wax funny and dour by turns as they reminisce with Mr. Greenfield-Sanders, taking up the highly charged issues of racism, drug abuse, self-image and, perhaps most provocatively, the topic of age, fashion’s last and, arguably, most fearsome taboo.

    The subject rivets the filmmaker, who was eager to explore, he said, “the power of beauty and fame, what that does to your ego, what it does to you when that fades.”

    The project, which originated as a photo shoot for Vanity Fair, could be mined, he suspected, for something more. “These women were still out there, after all,” he said, “still togging along and trying to be somebody.”

    Very much like Mr. Greenfield-Sanders, who has been photographing outsize personalities in the worlds of art, literature, music and film for the better part of his 60 years. The limelight, he knows, is hard to relinquish.

    “Even though you may feel that moment is gone, that you’ve been marginalized, you don’t want to give up,” he said. “You still want to be in the world, making a mark on the world.”

    The documentary, shown at the Sundance Film Festival, follows several others by Mr. Greenfield-Sanders, including a Grammy-winning film about the rocker Lou Reed and, more controversially, “The Black List,” a three-part series on HBO examining the lives of accomplished African-Americans, among them Faye Wattleton, the former president of Planned Parenthood, and Vernon Jordan, the civil rights activist and presidential adviser.

    His latest work will likely speak to several generations, though Sheila Nevins, the film’s producer, thinks that older women in particular “may find something special in the fact that beauty continues on some level, through either artifice or confidence.”

    Ms. Nevins, the president of HBO Documentary Films, suggested that viewers’ fascination, and her own, may have its ghoulish aspects. “Beautiful women getting older, women who decay, that’s always intriguing,” she said, especially when their livelihoods have rested on their looks. “They are their own instruments. What do you do when you’re a Stradivarius and you’re losing your strings?”

    If you’re practical, you might check in for a tuneup, as did the defiantly silver-haired Carmen Dell’Orefice, who is still striking poses at 81. “If you had the ceiling falling down in your living room,” Ms. Dell’Orefice challenged in the film, “would you not go and have a repair?”

    Karen Bjornson, a former star for Halston, tugged un-self-consciously at her features, acknowledging that she had had an eye lift before resuming her career at 50 on the Ralph Rucci runway. “It was money well spent,” Ms. Bjornson said, “getting the product in shape again.”

    The relentless self-scrutiny endemic to the trade starts at a tender age.

    “Working off your looks makes you pretty much the opposite of self-confident,” said Paulina Porizkova, the Czech-born former superstar. “Still, I don’t think any 15-year-old girl will turn down the chance to be called beautiful. You don’t realize at that point that you are also going to be called ugly.”

    Picked apart during castings for her teeth, or her thighs, Ms. Porizkova was terrified. “Every job felt like it was going to be my last,” she said. Propped on such flimsy scaffolding, her sense of self was compromised.

    “What people called sexual harassment, we called compliments,” she said. “When a 16-year-old is flattered by a man pulling out his penis in front of her, that’s noteworthy.”

    Not all of Mr. Greenfield-Sanders’s subjects were as forthcoming. He recalled that Ms. Rossellini was initially offended by “Ageless” (the working title of the film). She thought it smacked of misogyny. Beverly Johnson, the first black model to grace a Vogue cover, in 1974, had misgivings, intensified, she confided in a phone interview, when Mr. Greenfield-Sanders showed her early images. “I was like, ‘You’re going to retouch this photograph, aren’t you?’ ” she said. “ ‘We’re supermodels. You’ve got to retouch.’ ”

    The filmmaker’s warts-and-all approach angered some of her peers as well, Ms. Johnson said. “We were all calling each other on the phone, asking: “Can you believe this guy? Who does he think he is?’ But after awhile, we all felt kind of comfortable in it.”

    That they did is a testament to Mr. Greenfield-Sanders, whose mild-as-a-curate features and studiedly unassuming manner tend to foster trust. Like his subjects, he is aware of his own aging. “At Sundance we had to pose for these press pictures,” Ms. Johnson recalled. “I looked at him and noticed, he’s posing. He’s like the fourth model in the group, very aware of his looks.”

    “Everybody is sucked into that vortex,” she added. The hairdressers, the photographers — no one is immune. “We all live in a bubble, a place like no other.”

    By nature or necessity, though, the filmmaker remains mostly untouched. “There is a sweetness to his character,” Ms. Nevins said. “He laughs at himself.” Dolores Hart, who threw over a movie career in the 1960s to become a nun, was one of those who gained a sense, Ms. Nevins said, “that what’s in front of his lens is the most important thing in the world at that moment.”

    Mr. Greenfield-Sanders is cannily aware of his strengths. He sat chatting in the kitchen of his home and studio, a converted rectory on the Lower East Side of Manhattan, where most of the film was shot. The rooms are hung with artworks, most prominently the large figurative canvases of his daughter Isca Greenfield-Sanders.

    “I am very, very tuned into people,” he said. “If something’s wrong, I can sense it from the moment they walk in the studio.” It is a skill he picked up early. Commissioned to shoot Orson Welles, Mr. Greenfield-Sanders, then in his 20s, tried for a conversational icebreaker, asking him, “What’s your favorite film?

    “I don’t play games like that,” came the snarly reply.

    “What I learned is that I wasn’t there as a tourist,” Mr. Greenfield-Sanders said. “I was there to make him comfortable.”

    “People will tell you their stories if you give them a chance,” he added.

    Those tales can be amusing. Jerry Hall grew up in Texas, where she worked in her teens at a local Dairy Queen. Her mother made her clothes, she told the filmmaker, though not all of them. “We used to get the Frederick’s of Hollywood catalog,” she said. “All that snakeskin and satin,” she said, seemed to her the pinnacle of chic, suitably glamorous for a trip abroad. “We thought Paris was like that,” she said.

    Other stories are disturbing. Lisa Taylor, perhaps best remembered for lounging, legs parted suggestively, for a Helmut Newton photograph, succumbed to the lure of cocaine. “I was so insecure that I needed to do it,” she said. “It made me feel like I had something to say, that I was worthy of being photographed, that I was somebody.”

    Jade Hobson, a former fashion editor, makes a brief appearance, her comments a measure of changing times. In those days it was uncool for a model to smile. During a shoot with the photographer Francesco Scavullo and the model Gia Carangi (who died of AIDS in 1986), Ms. Hobson checked closely for stray hairs and errant threads. “I noticed track marks on Gia’s arms,” she recalled.

    No one intervened. “We were certainly aware of the heavy use of drugs,” she said. “We let it go. We maybe exploited these girls because it brought a certain look to the photographs.”

    Wrenching in a different way is Pat Cleveland’s account of traveling in the South in the early 1970s and being taunted for her color by local rowdies. They stormed the bus she shared with other models, rocking it until it quaked and nearly overturned, she recalls, still shaken at the memory.

    In a business notoriously tough, the skin thickens. Surviving and even thriving are women like Carol Alt. At 48, Ms. Alt famously posed nude for Playboy. Now 51, she turns out tomes on nutrition, continues to model and appears in films, her latest being Woody Allen’s “To Rome With Love,” in which she plays Alec Baldwin’s lissome wife.

    “There comes a point at which you are a precious commodity,” Ms. Alt said in a phone interview, “because there is nobody else like you.”

    Ms. Dell’Orefice, who began her career in the 1940s, when “model” was thought to be a euphemism for prostitute, rarely goes on castings, she said. (“If they don’t know who I am by now…”) When she does appear on set, she is hardly a pillar of patience. “If they say, ‘Oh, you’re too tall, you’re not this or whatever,’ I just leave,” she said. “It’s as simple as that.

    “There’s another job. Or there isn’t another job.”

     

    Copyright. 2012. The New York Times Company. All Rights Reserved