You are here


Sridhar Dhanapalan: Twitter posts: 2015-11-23 to 2015-11-29

Planet Linux Australia - 13 hours 34 min ago
  • Children’s growing use of mobile devices may hamper their learning of key technology skills: National Assessment Programme report http… 13:19:09, 2015-11-27
Categories: thinktime

Binh Nguyen: Israeli/Palestinian Conflict, Counter-Terrorism, and More

Planet Linux Australia - Sun 29th Nov 2015 23:11
- sometimes it feels as though the media makes light of conflicts around the world. Often, they have little idea of the background behind it. Hence, we're left with a sensationalist, biased report/summary of the circumstances based on whomever they've been able

Living under occupation - Daily Life in Occupied Palestine

History of the Israeli Palestinian Conflict

Israel and Palestine the truth [BBC ducumentry]

Palestine vs Israel Conflict - Conflict In The West Bank

Israel and Palestine Explained

Al Jazeera World - Palestine Divided

Documentary on Israel _ Palestine - Occupation

Israel_Palestine - The Gaza War From Ground Level

Palestinian Terrorism Against Israel - The Beginning _ Israeli-Palestinian Conflict _ Documentary

War Between Israel and Palestine - THE GAZA CONFLICT

- one of the great ironies is that people often portray the West as being the epitomy of what society should be like (peaceful, prosperous, secular, accepting, etc...). Despite this, the 'narrative' that is used by non-Westerners is that we're 'unclean' in the eyes of God. There's no doubt that this is true. If you were to think about life in the West it's almost impossible to live without sin. Along the way, the West has diverged one way while the other parts of the world have stayed and held true to a more interpretation of (supposed) covenants/agreements with God. Basically, divergences in opinions a long time ago (hundreds and thousands of years) has led to very different levels and types of development across our civilisations. If you to be honest with yourself though, most of us know in our heart of hearts there is no way that a lot of what we do is in accordance with God's teachings...

- people keep on having a go at Islamists saying that they are out to take over the world. If they were actually more attune, basically every single one of the major world religions says exactly the same thing. At some moment in time, when the world is in trouble there will be a 'Second Coming' and that particular religion will 'reign' over the entire world. Everyone will be converted to that religion... The only reason why we don't talk about radical Buddhists, Jews, Christians, etc... is that relatively speaking there aren't as many (yes, they engage in some similarly desctructive activities as well (in the past as well as present))

- it's obvious that some of the people who have left the intelligence services and have gone on to 'whistle-blow' are 'false flag' operations (forget about the links below. Just stories interesting stories...). They are simply there to confuse the enemy as to the current local capabilities. It's similar to the old Soviet practice of sending through one counter-defector after another to confuse the enemy. Other times they are there to sure up public opinion to make them think that the current incumbent government are more/less competent then they seem, etc... 'Doctored intelligence' is probably more normal than you would like to believe (I remember there were stories about an entire section of the KGB dedicated to this a long time ago. I wouldn't be surprised if this practice still continues). To anyone outside of this 'atmosphere/environment' you would think that they were insane. To people who are used to it, that's life...

- almost always there are those who fail to integrate when they are forced to leave their homelands. Should we pay/give them a chance to migrate elsewhere (as long as it's economically viable, things are stable elsewhere, etc...)?

- I wanted to know more about 'Sharia Law'. The one thing that is obvious is that the media only tends to focus on the most extreme/bad examples (I assure you that if you have some time you look you can make any society in any part of the world look absolutely rediculous). Obviously, there are some aspects of 'Sharia Law' that are really interesting and elegant (no apparent concept of 'financial interest' which results in a much simpler financial system, explicit rules to force wealthy people to give back to the poor, etc...) while others seem shocking given how lenient our lives seem (relatively) in the West (it will help a lot if you some Arabic and want to view some of these lectures... It becomes very confusing if you don't) There are some radically different interpretions of what Islamic life/religion/culture should be like as well... The term 'Jihad' can be interpreted as both 'violent resistence' as well as another one that revolves around spiritual interpretation and doing your best to make the world a better place in the future....

Islamic Legal Philosophy  (Yasir Qadhi, Jasser Auda & Tariq Ramadan)

The Battle for British Islam full Documentary HD 2015 !! 720p

Sharia Law 101 - the essential statistics

London's Holy Turf War

SHARIAH LAW Myths vs Facts - Explaining Sharia Law to non-Muslims _ Dr. Sabeel Ahmed

How Is Sharia Law Dangerous for Western Society

Debate - Does Sharia Law Negate Human Rights

Ahmadi Muslims Debate Sharia Law with One Law for All (Maryam Namazie) at UCL

Are You Afraid of Sharia Law - Haroon Moghul

What is Islamic Sharia Law by Sh. Abdool Rahman Khan

Sharia and Other Religious Laws

Your fatwa does not apply here _ Karima Bennoune _ TEDxExeter

- one obvious (and probably already used) mechanism to break the propaganda cycle may be to promote alternative/peaceful preachers and/or religions. Also, to break the cycle of enmity around the world by using media networks to occasionally (but regularly and with minimum standards/criteria based on international standards) give an idea of what life for people and things are really like on the other side of the world as opposed to what some people would like us to believe... Possibly, even consider opening the doors of all religions to all (within reason. There are already some programs like this)? Get to understand one anothers problems and help to fix them locally. Kill the problem further up the chain if at all possible?

The Islamic State (Full Length)

ISIS Tilting the Chess Board - The Dawn of a New Middle East Balance of Power - H. van Lynden lecture

Q and A 22 June 2015 ep21 Shaky Zaky Mallah

- it's clear that ISIS have already 'dug in' and established means of countering 'aerial bombing'. The irony here is that Russian style carpet bombing has been portrayed as 'inhumane' because but it's probably the quickest way of 'clearing territory' (note stats in previous blog post which indicate numbers may be similar between percentage of dumb vs guided bombs between US/Allies and other forces). They (and others including the US and it's allies) have been dropping leaflets/communicating their intentions prior to bombing. Thereafter, the people in question leave and they run through it. Here's the thing, if you 'carpet bomb' you can clear more structures quickly then precision bombing where foot soldiers need to 'clear' building after building... Precision bombing means that structures means that creating a line of advancement is much easier... and there are less places to hide which could lead to a higher likelihood of longer term guerilla warfare. This strategy comes at an obvious cost. Massive, possibly unrequired property destruction... - the irony is that technically the 'sourge of terrorism' isn't that large. More people die from car accidents, unhealthy food, etc... I think these people are looking at the problem too simplistically. Think about the number of people who have been displaced in Syria alone from a relatively small number of terrorists...Cameron to set out Syria strategy to MPs within days

- one obvious problem with China's rapid rise rise is that they've had to adapt so quickly/learn so much in such a short space of time. Even if they don't want to interfere in the affairs of other countries they may have to. Think about how the various empires have had naval escorts of civilian trade. Should other countries be forced to protect Chinese trade even if the Chinese are economically and militarily stronger in future? In future, China may be forced to live up to it's responsibilities as global player in spite of what it may want to do...

Xi calls for structural reform of military by 2020

China Nato Anti-Piracy Drills

- if you listen some people it feels as though we create the problem ourselves at times. The reason for some of the strangeness in policy is sometimes down to political acceptablity. Some of it seems completely crazy though. One former intelligence officer I've heard said that a group of people meeting with a truck, arms, is enough to warrant a drone 'signature attack' (they could be farmers given the remoteness of some of territories we're talking about here). Where/should you draw the line? Shouldn't this be a public disussion? At times, it feels like the US/Allies were fooled into bombing Libya, Yemen, Iraq, etc... (if you know something of military strategy this could also be to cause instability in the enemy (Iran, Syria, Russia, etc...)) so that ISIS could gain a foothold. Hence, the carefulness in deployment of military force in Syria... Information from operators/troops in the area doesn't match up with what you hear/see in the media...

The CIA, NSA, and DHS and Counterterrorism

Counterterrorism and Countering Violent Extremism

International Perspectives on Terrorism and Counterterrorism

Ignoring U.S. Destabilization of Libya, GOP Benghazi Hearing Asks Clinton All the Wrong Questions it's easy to be critical in every one of these circumstances here. The obvious question, what would you do? How would it stack up against what is currently happening (and being done) throughout the world?

- the Soviets/Russia and the US have engaged in what feel like crazy experimentation at times. The MK Ultra program was basically research into 'mind control'...

MKULTRA Documentary  CIA Mind Control Research   Human Experiments in the United States

America's Secret War - MKULTRA Mind Control

More Proof the CIA Tried to Use Subliminals to Brainwash America

- didn't realise there were so many skydiving animals nowadays

Skydiving cats cause uproar if you ever come across a Disc Stakka you're probably looking for drivers

- looks like the changes that I wanted to made to Australia's metadata program may be used after all...

- automated conversion of webpages to PDF software options

- interesting facts/statistics about our 'heart rate'

- promising new technologies to increase energy density

- how much did mathematical patterns play in the works of Bach?,deconstructing-the-genius-of-bach.aspx

- getting image metadata from the Linux CLI

- fixing Pioneer CDJ DJ Deck problems

- Ableton Live keyboard shortcuts

- benchmarking Joomla performance

- alternatives to Adsense

- Every day Jews are stabbed, slashed, shot, and murdered on the streets of Jerusalem, Tel Aviv, and Beersheba. And every day the world lies about “violence on both sides,” as if Netanyahu and Israel are inciting Jews to take knives and stab Palestinians the way that Palestinian clerics on the PA payroll and Mahmoud Abbas are doing about Jews.

There can be only one conclusion. Jewish blood is cheap and getting cheaper by the day. I know of no other ethnic or religious group on earth who face daily incitement to genocide with the world making not even a peep of protest.

- The United States' top fighter jet, the Lockheed Martin F-22, has recently required more than 30 hours of maintenance for every hour in the skies, pushing its hourly cost of flying to more than $44,000, a far higher figure than for the warplane it replaces, confidential Pentagon test results show.

The aircraft's radar-absorbing metallic skin is the principal cause of its maintenance troubles, with unexpected shortcomings -- such as vulnerability to rain and other abrasion -- challenging Air Force and contractor technicians since the mid-1990s, according to Pentagon officials, internal documents and a former engineer.

While most aircraft fleets become easier and less costly to repair as they mature, key maintenance trends for the F-22 have been negative in recent years, and on average from October last year to this May, just 55 percent of the deployed F-22 fleet has been available to fulfill missions guarding U.S. airspace, the Defense Department acknowledged this week. The F-22 has never been flown over Iraq or Afghanistan.

Sensitive information about troubles with the nation's foremost air-defense fighter is emerging in the midst of a fight between the Obama administration and the Democrat-controlled Congress over whether the program should be halted next year at 187 planes, far short of what the Air Force and the F-22's contractors around the country had anticipated.

"It is a disgrace that you can fly a plane [an average of] only 1.7 hours before it gets a critical failure" that jeopardizes success of the aircraft's mission, said a Defense Department critic of the plane who is not authorized to speak on the record. Other skeptics inside the Pentagon note that the planes, designed 30 years ago to combat a Cold War adversary, have cost an average of $350 million apiece and say they are not a priority in the age of small wars and terrorist threat

- “Putin thinks he is God, who can not only rule over people’s fates around the world but also control the flow of time and the expansion of space,” Parkohomenko said. “He is above all the concerns we have here on the ground, I believe that this is incurable.”

- The irony here is that Putin’s intervention has changed the strategic calculus in Syria precisely because it is happening on a scale that Barack Obama or Cameron do not contemplate, because they are not wanton warmongers. They are mindful of public opinion and hesitate to put soldiers’ and civilian lives at risk. They run their interventions past freely elected legislatures. If the prime minister has chosen to abandon his plan to ask parliament for permission to bomb Isis, knowing he would lose the vote, it can be read as a symptom of democracy working properly. If the result is a spur towards more rigorous diplomatic efforts to find a solution to the Syrian conflict, all the better.

But we can hardly congratulate ourselves for sidestepping the quagmire. The opposite of western assertiveness in this case has turned out to be a policy of inviting despots and terrorists to fight each other to a standstill, while leaving the civilian population to fend for itself. It may feel safe to be a bystander at such a scene, but it does not feel innocent.

- "We believe that there should be no extension of British military action into Syria unless there is a coherent international strategy that has a realistic chance of defeating ISIL and of ending the civil war in Syria," the MPs concluded.

- The United States and Russia are the only two countries who maintain a triad. We’re about to spend scads of money modernizing that triad, including replacing the most advanced bomber in the world with the next more advanced bomber in the world. We don’t need to reinvest in a nuclear program meant to destroy Soviet air defenses in 1985. How large a deterrent we need is an argument worth having, but in the meantime, let’s stop trying to refight the Cold War. That mission’s already been accomplished.

- "If the trend to smaller and smaller numbers of weapon system prime contractors continues, one can foresee a future in which the department has, at most, two or three very large suppliers for all the major weapons systems that we acquire," the Pentagon's acquisition chief, Frank Kendall, told reporters. "The department would not consider this to be a positive development and the American public should not either. ... With size comes power, and the department's experience with large defense contractors is that they are not hesitant to use this power for corporate advantage."

- The thing is, we need as many Syrians in the country to pick up and AK-47 and fight a war with ISIS. If all those people run away, especially young healthy men who can fight, then we have no soldiers to oust Assad & ISIS & Al Nusura & anybody else.

We need soldiers on the ground to do the work. If all those Syrians who want to run away and not fight for their country, I'm sorry but I have no sympathy for them. The US was founded in a trial by fire and blood. Every great country needs to oust their corrupt & evil government by force before they can make a solid new government. You can't expect the West to clean up after the Middle East all by itself, we need boots on the ground, even if they are just regular civilians trained to be a conscript army.

- You always hear of the celebrity defectors. They write best-selling books and appear on television. They can earn tens of thousands of dollars for an evening at a speaking engagement. They are eloquent as they tell their harrowing stories of dangerous flights from extreme oppression.

But there is sometimes a darker side to the stories of those who flee their homeland.

In South Korea, the statistics reveal a truth. The country's unification ministry says that 15% of the defectors who die each year kill themselves - more than three times the suicide rate for the population in general, and this is a country that consistently has the highest suicide rate of all the 34 industrialised countries in the OECD.

- It is generally accepted that the cost of the aircraft and crew of a carrier are roughly equal to the ship's purchase price.

- WASHINGTON — A now-defunct Defense Department office tasked to build a compressed natural gas automobile filling station in Afghanistan spent an "exorbitant" $43 million on the facility, according John Sopko, the special inspector general for Afghanistan reconstruction (SIGAR).

DoD awarded Central Asian Engineering a contract to build the station for just under $3 million, but SIGAR found that between 2011 and 2014 the Task Force for Stability and Business Operations (TFBSO) had spent nearly $40 million extra.


"One of the most troubling aspects of this project is that the Department of Defense claims that it is unable to provide an explanation for the high cost of the project or to answer any questions concerning its planning, implementation, or outcome," he wrote.


The SIGAR report states that no evidence exists that TFBSO conducted a feasibility study before diving into the project. If TFBSO had done so, Sopko says, "they might have noted that Afghanistan lacks the natural gas transmission and local distribution infrastructure necessary to support a viable market for CNG vehicles."

The average Afghan likely can't afford the cost of converting a car to run on compressed natural gas, which can cost about $700 per car. The average annual income for an Afghan is about $690, the report notes.

- “While Russia’s little green men in Crimea are widely known, insufficient attention has been paid to China’s little blue men in the South China Sea,” he said. “It’s so different from what the US does. People aren’t familiar with it, it’s hard to wrap their heads around it.”


“This is not a type of force we understand well enough,” Erickson said. “They could conceivably achieve some advantages through elements of surprise and confusion. Then even if we know who they are and what they’re doing we might have great difficulty dealing with them because of our rules of engagement. China could go out of its way to mis-portray some of these personnel as random patriotic fishermen, as vocal ‘residents’ of these ‘islands’ in the Spratlys. They’re very good at that kind of propaganda warfare.”

- “The enemy has started its work,” Jafari told a crowd at an event billed as the first anti-American event after the nuclear agreement. “We must understand the threat of infiltration and prevent certain actions.”

Marking “Fight Against International Arrogance and Imperialism Day” on Nov. 4, the Revolutionary Guards followed Jafari’s warning with their own statement on the dangers of “infiltration” and “sedition.”

- At least 196 U.S. service members fighting in Iraq were killed directly as a result of Iranian-made explosively formed penetrators, or EFPs, according to Cruz and congressional sources familiar with Centcom’s mostly classified report.

The deaths took place between 2003 and 2011. The Iranian explosive devices wounded another 861 U.S. soldiers, and a total of 1,534 attacks were carried out on U.S. military members over this period, according to sources familiar with the report, which was provided to Cruz’s office.

The explosive devices are a “hallmark weapon” of Iran’s Quds force, a paramilitary group that operates outside of Iran’s borders, according to sources familiar with the report. It has been determined that only Iranian-backed operatives use these weapons in Iraq.

U.S. military leaders disclosed in testimony before the Senate that Iranian terror activities have claimed the lives of around 500 U.S. soldiers, which accounts for at least 14 percent of all American casualties in Iraq from 2003 to 2011.


“Is it sound policy to give money to a terrorist nation that is at war with us?” Stethem asked, referring to the more than $150 billion in cash assets that will be released to Iran as a result of the recent nuclear accord.

- “The spread of a shallow understanding of Islam renders this situation critical, as highly vocal elements within the Muslim population at large — extremist groups — justify their harsh and often savage behavior by claiming to act in accord with God’s commands, although they are grievously mistaken,” said A. Mustofa Bisri, the spiritual leader of the group, Nahdlatul Ulama, an Indonesian Muslim organization that claims more than 50 million members.

“According to the Sunni view of Islam,” he said, “every aspect and expression of religion should be imbued with love and compassion, and foster the perfection of human nature.”

- The CIA-led policy in the Middle East works like this. If a regime is deemed to be unfriendly to the U.S., topple it. If a competitor like the Soviet Union or Russia has a foothold in the region, try to push it out. If this means arming violent insurgencies, including Sunni jihadists, and thereby creating mayhem: so be it. And if the result is terrorist blowback around the world by the forces created by the US, then double down on bombing and regime change.

In rare cases, great presidents learn to stand up to the CIA and the rest of the military-industrial-intelligence complex. JFK became one of the greatest presidents in American history when he came to realize the awful truth that his own military and CIA advisors had contributed to the onset of the Cuban Missile Crisis. The CIA-led Bay of Pigs fiasco and other CIA blunders had provoked a terrifying response from the Soviet Union. Recognizing that the U.S. approach had contributed to bringing the world to the brink, Kennedy bravely and successfully stood up to the warmongering pushed by so many of his advisors and pursued peace, both during and after the Cuban Missile Crisis. He thereby saved the world from nuclear annihilation and halted the unchecked proliferation of nuclear arms.

- If the research is successful, the scientists said that such a high energy density will be comparable to gasoline, enabling an electric car with a battery that is a fifth the cost and a fifth the weight of those currently on the market to drive from London to Edinburgh on a single charge.

However, the researchers said that, while the results are promising, there is still a lot of work to do, and that practical lithium-air batteries are still at least a decade away.

"While there are still plenty of fundamental studies that remain to be done to iron out some of the mechanistic details, the current results are extremely exciting," said Grey. "We are still very much at the development stage, but we've shown that there are solutions to some of the tough problems associated with this technology."
Categories: thinktime

Colin Charles: Voting for talks at the Percona Live Data Performance Conference 2016

Planet Linux Australia - Sun 29th Nov 2015 23:11

So this year the Percona Live conference has a new name — it is the “Data Performance Conference” (presumably for a much broader appeal and the fact that Percona is now in the MongoDB world as well). And the next new thing to note? You have to go through a process of “community voting”, i.e. the speaker has to promote their talks before via their own channels to see how many votes they can get (we tried this before at the MySQL & Friends Devroom at FOSDEM; in this case, please remember you also need to create a new account and actually vote while logged in).

I hope you vote for Sergei, Monty and my proposals!

  1. Using and Managing MariaDB – a tutorial, which has been referred to as The Complete MariaDB Server tutorial, I thought I will change the name up a little, in addition to the content. The most recent version of this tutorial was given at the Percona Live Conference in Santa Clara in 2015 (slides). Since then we’ve released MariaDB Server 10.1, and there’s much more new things to talk about!
  2. MariaDB 10.1 – What’s New? – a talk that would have Michael “Monty” Widenius (creator of MySQL and MariaDB) and me give it together. I’ve described this as a dance, and the last time we did this was at Percona Live Amsterdam. The content will of course be new, and I am creating the slide deck this time around.
  3. Databases in the Hosted Cloud – this is a pet talk. It costs some money to make, and if accepted I plan to also showcase who has better performing hosted databases. I did this at Percona Live Amsterdam 2015 (slides), but since then we’ve seen Amazon offering MariaDB Server as part of RDS, HPCloud being sunset, and also Rackspace upping their offering with High Availability Databases. More research to be done from now till then!
  4. Best Practices for MySQL High Availability – this would be another tutorial, and at Percona Live Amsterdam 2015 it had the highest registered attendance (Kortney told me the day before and I removed all practicals, since 100+ people with practicals is impossible for one person to manage – slides). I think with the changes in NDBCLUSTER (recently announced at OpenWorld), the addition of tools in the MHA world (mha-helper), this should have a lot of new information (and more importantly a lot of new things to play with).
  5. Choosing a MySQL HA solution today – a talk based on the above tutorial, cut short, to ensure people whom are not at tutorial day, will have solutions to think about and take home for implementation in the future.
  6. MariaDB/MySQL security essentials – a talk which focuses on improvements in MariaDB Server 10.1, and MySQL 5.6/5.7, including encryption at rest, easier SSL setup for replication topologies, and even external authentication plugins (eg. Kerberos is almost ready – see MDEV-4691).
  7. The MySQL Server Ecosystem in 2016 – a talk about MySQL and the forks around it, including the private trees that exist (some like the Twitter tree haven’t been updated in a while, but clearly have made inroads in giving us new features). Learn what to use, and what is the best one for your use case. 
  8. MariaDB Connectors: Fast and Smart with the new protocol optimizations – a talk from Sergei Golubchik, about new protocol optimisations in MariaDB Server as well as how we optimise this from the connectors as well.
  9. MariaDB 10.1 Security: Validation, Authentication, Encryption – a talk from Sergei Golubchik focusing on MariaDB 10.1 security improvements; he’s got some amazing slides on encryption that I saw at Percona Live Amsterdam, and you can see a five-minute lightning version from the meetup.

Here’s to happy voting and I hope to give at least some of these talks (if not all!).

Categories: thinktime

About to be

Seth Godin - Sun 29th Nov 2015 21:11
The only way to become the writer who has written a book is to write one. The only way to become the runner who has just finished a run it to go running. You might dread the writing or the...        Seth Godin
Categories: thinktime

David Rowe: SM2000 Part 2 – RF Amp Design

Planet Linux Australia - Sun 29th Nov 2015 18:11

For the SM2000 I need some VHF small signal RF amplifiers, for example a driver amplifier for the transmit PA. So I figured it was about time I learned to design RF transistor amplifiers. The S-parameter method seems to be the way to go, and I have some BRF92 transistors laying about that have S params on the data sheet.

Unless you are experienced in RF design this post may not make much sense. I estimate the eye glazing to interest ratio at 20dB. However as a RF noob I am documenting my experience to help me remember what I have learned.

I spent a day reading the small signal transistor amplifier chapters of “RF Circuit Design” by Chris Bowick, and getting my head around Smith Charts. I scratched about on a bunch of paper, complex numbers flying everywhere. Lots of errors and rework. The next morning, to cross check my manual work, I wrote this s_param_rf.m GNU Octave script to do all the tedious calculations for me.

I also found these helpful RF and Microwave Stuff Octave scripts, e.g. Smith Chart plotting, including stability circles.

The transistor and operating point I chose was not unconditionally stable, so I had get my head around “stability circles” and find an input and output load that would be stable, and design input and output matching networks. The “RF Circuit Design” book walked me through everything.

Here is the Smith Chart for my operating point:

The red and blue arcs are “no go” circles for the input and output impedance the transistors sees. The green is a 20dB constant gain circle. Any output reflection coefficient gammaL on the gain circle will give you an amplifier with 20dB gain. The source reflection coefficient gammaS is a function of gammaL. So I tried a few different gammaL (red star) until I found a stable gammaS (purple star).

The Smith Chart is rather “busy”. The output reflection coefficient gammaL = 0.8 – 0.4j is the same point as the load or output impedance Zo = 1 – 4j (normalised to 50 ohms which is 50 -200j without normalisation). Even though they map to identical points on the chart, they are read off different axis as different values.

Here is a sample run of the Octave script:

octave:207> s_param_rf

K =   250.5885e-003

-----Frequency: 1.00 - potentially unstable - plotting stability circles

Red is the gammaIn=1, for all loads (gammaL)

Blue is the gammaOut=1, for all sources (gammaS)

Green is the 20.0 dB constant gain circle for gammaL

Input: Zi = 67.6 + 26.9j ohms

       In parallel form Rp = 78.3 Xp = 197.1j ohms

       So for a conjugate match transistor input wants to see:

         Rp = 78.3 Xp = -197.1j ohms

       Rs = 50.0 to Rl = 78.3 ohm matching network Xs = 37.6j Xp = -104.1j

       with conj match to Zi Xs = 37.6j Xp = -301.1j

       matching components Ls = 0.040 uH Cp =  3.5 pF

       Ls can be made from 3.1 turns on a 6.25 mm diameter air core

Output: Zo = 50.0 + -200.0j ohms

        So for a conjugate match transistor output wants to see:

          Rl = 50.0 Xl = 200.0j ohms

        Which is a series inductor Lo = 0.212 uH

        Lo can be made from 7.1 turns on a 6.25 mm diameter air core

I then designed the bias network and came up with this circuit, which I soldered together:

You can just see the little SOT-23 surface mount transistor in the centre of the photo.

Much to my surprise it worked! They say anyone can design a RF oscillator but it takes skill to design an RF amplifier. This actually works as an amplifier! Here is the gain swept between 0 and 300MHz:

Gain was 23dB, return loss at both ports about 8dB at 150MHz. I’m not sure if the return loss is a problem, it represents about 1dB loss (15%) in the reflected signal. I figure getting within 15% is OK given component and S-param tolerances at VHF.

The noise figure was measured at 4dB, and 1dB compression point around 0dBm. The compression point feels a bit low, perhaps as I used a collector resistor rather than a RF choke. I’ll read up on that next, see if I can get a 10dBm output, suitable for driving the SM2000 PA.

Categories: thinktime

Past performance is not indicative of future results

Seth Godin - Sat 28th Nov 2015 21:11
This is clearly and demonstrably true of mutual funds. It's easy to confirm. And yet... We are very uncomfortable with randomness. So the newspaper does a 12 page section of mutual funds, filled with articles and ads and charts, all...        Seth Godin
Categories: thinktime

Unconscious consumption

Seth Godin - Fri 27th Nov 2015 21:11
Black Friday, of course, is a con. But it's also a symptom of a terrible trap we've set for ourselves. Consider the joy a little kid has the first time he spends his own money to buy an ice cream...        Seth Godin
Categories: thinktime

The vulnerability of 'thank you'

Seth Godin - Thu 26th Nov 2015 20:11
Thank you as in: I couldn't do it without you. As in: I don't want to do this alone. As in: I was afraid. And mostly: I would miss you if you were gone. Thank you brings us closer together....        Seth Godin
Categories: thinktime

Linux Users of Victoria (LUV) Announce: LUV Main December 2015 Meeting: Maxima / holiday gifts

Planet Linux Australia - Thu 26th Nov 2015 15:11
Start: Dec 1 2015 18:30 End: Dec 1 2015 20:30 Start: Dec 1 2015 18:30 End: Dec 1 2015 20:30 Location: 

6th Floor, 200 Victoria St. Carlton VIC 3053



• Chelton Evans, Maxima

• Andrew Pam, Holiday gift suggestions for Linux lovers

200 Victoria St. Carlton VIC 3053 (formerly the EPA building)

Late arrivals, please call (0490) 049 589 for access to the venue.

Before and/or after each meeting those who are interested are welcome to join other members for dinner. We are open to suggestions for a good place to eat near our venue. Maria's on Peel Street in North Melbourne is currently the most popular place to eat after meetings.

LUV would like to acknowledge Red Hat for their help in obtaining the venue and VPAC for hosting.

Linux Users of Victoria Inc. is an incorporated association, registration number A0040056C.

December 1, 2015 - 18:30

read more

Categories: thinktime

The end of the future is premature

Seth Godin - Wed 25th Nov 2015 21:11
Twenty years ago, when I was working on projects with AOL, we were sure that this was the next big thing for a long time to come. It was a profitable natural monopoly, one that could expand to serve everyone's...        Seth Godin
Categories: thinktime

All cases are special cases

Seth Godin - Tue 24th Nov 2015 21:11
The art of the successful institution is figuring out which cases are special enough to deserve a fresh eye. It's virtually impossible to scale an institution that insists on making a new decision every time it encounters a new individual....        Seth Godin
Categories: thinktime News: LCA2016 Optiver Diversity Programme Announced

Planet Linux Australia - Tue 24th Nov 2015 19:11 2016, in partnership with Optiver, are very proud to announce our diversity programme for 2016! LCA2016 and Optiver are proud to be able to support diversity in our community. The Optiver Diversity Programme is intended to ensure that continues to be a safe, open, and welcoming conference for everyone. Together with Optiver the programme has been developed to assist delegates from under-represented cohorts who contribute to the Open Source community but, without financial assistance, would not be able to attend LCA2016. For more information please see our Optiver Diversity Programme page
Categories: thinktime

David Rowe: SM2000 VHF Open Digital Voice Radio Part 1

Planet Linux Australia - Tue 24th Nov 2015 09:11

For the last month I’ve been working hard on prototyping the SM2000 – an open source VHF radio. It’s purpose is to test some advanced VHF/UHF ideas I have for FreeDV.

The SM2000 will be a small box (like the SM1000), that contains a fully functional VHF SDR Digital Voice radio. It will run advanced open source Digital Voice modes, have a 1W power output and adequate tx/rx filtering for real-world operation on the 2M band. No Host PC required. Open Hardware and Software, price TBD but a few hundreds of $. It will also run analog FM but no modes with a proprietary codec.

Just yesterday I demonstrated demodulation of 1200 bits/s 2FSK at -135dBm, right in line with predicted performance.

This is an important milestone. Analog FM and first generation digital voice (D-star/DMR/C4FM and friends) fall over at about -120dBm. One of my aims is equivalent performance to these systems at 10dB lower. With completely open hardware and software.


I need custom RF hardware to develop and demonstrate VHF DV ideas I have formed over the past year. However I am not a RF expert, am just one guy, and have limited resources. So I will focus on those areas that I can uniquely contribute to. Choose my battles. In other areas (e.g. certain aspects of RF performance), I will just shoot for acceptable.

I have a similar approach to architecture. There are many ways to build a radio, and I have chosen one that suits me at this time. Feel free to warm up your soldering iron and substitute your own favourite.

What I care about:

  • I don’t trust any part of the modem being in hardware. This means software defined waveforms, and SSB style up and down conversion. Direct FM is out. And don’t get me started on data running through analog FM modems.
  • TDMA needs a “bare metal” uC for hard real time, so no OS. Host PC/USB peripheral type designs won’t work.
  • Functional demos of advanced features such as sub -130dBm Digital Voice, $100 TDMA repeater, diversity to handle multipath, low cost, open hardware and software.
  • No chip sets or SoCs. This is open source. I need control.
  • Don’t have to a tick all boxes first time around.

Less important:

  • Minimal cost
  • Sparkling RF performance in areas such as phase noise, IP3, blocking, ACR, high tx power, multi-band operation, low spurious, power consumption. The RF Gurus can do that better than me so I’ll leave it to them.
  • Gold plating – is the feature going to add to our schedule? Can anyone else implement it? Will it introduce risk? Who will step up to make it happen?

Your Suggestions Welcome

But I’ll probably ignore them. What I really want is your contribution. If you want your-favourite-must-have-feature to happen, step up and make it happen. Genius is 1% inspiration and 99% perspiration. I get overwhelmed by well-meaning people with inspired ideas, and underwhelmed when I ask them to help implement those ideas.

Can you make my TODO list shorter, not longer? Now you have my attention.

Receiver Design

The receiver is a dual conversion superhet, with IFs at 10.7MHz and 24kHz. It is designed primarily for constant amplitude waveforms such as FSK, so does not have an AGC.

I used this Gain and Noise Spreadsheet as a tool to design the radio. It calculates cascaded NF, the NF of the ADC, and the gain required to get the MDS we need. I also have some sub-sections that I plug numbers into as I test, e.g. for NF calculations, and tuned circuit calculations. Very useful.

I haven’t designed the first BPF yet, but anticipate it will have a low loss (to maintain system NF), and a fairly broad response.

The PGA103 is a 0.5dB NF, 20dBm input IP3, 20dB gain block which sets up the overall receiver noise figure of 1.5dB. It’s major disadvantage is high power consumption (90mA at 5V), so I am considering a discrete transistor amplifier here.

The BPF near the mixer provides attenuation of out of band signals. Through a process of slightly mystified experimentation I have settled on a double tuned circuit:

Which has a response like this:

For reasons I do not understand (parasitic capacitive coupling?) changing the position of the coils relative to each other sets the position of the notches. I’ve set up the 60dB notch on the 126MHz image frequency. I’ve built it a couple of times with the same dimensions and the response is quite predictable. Each coil is 6 turns wound on a 1/4 inch drill bit, with a tap at half a turn for the 50 ohms input and output. The other end of each coil has a 12pF trimmer cap.

A Si5351 is employed for the local oscillators. For the purists I will include a Si570 option for the first LO. The RF switch for the two Si5351 outputs is to support diversity (two channel) reception. The radio can quickly shift to a channel a few hundred kHz away to receive a packet, effectively receiving on two frequencies at the same time.

I’m using a SBL-1 mixer but will move to an ADE-1. The RF Gurus tell me that termination of the IF port of the mixer is important. So I’m using a 15dB gain Termination Insensitive Amplifier (TIA) that presents a 50 ohm load to the mixer over a wide range of frequencies. I swept the TIA input using a return loss bridge and confirmed around 20dB return loss out to 300MHz (the sum of the LO and RF signals). The TIA has bandwidth of 50MHz which should effectively filter out the LO+RF IF signal.

A 10.7MHz 15kHz wide crystal filter attenuates off channel signals (47dB down at +/- 25kHz) and performs bandpass anti-aliasing filtering for the ADC. To get a nice flat response there is some impedance matching either side of the crystal filter.

I messed around with a few 2nd mixers (sub harmonic, discrete transistor, diode). I had some problems with noise when using a transistor mixer (LO injected into emitter, RF into base) which held me up for a few days. Then I tried a NE602 and it worked really well, and provides some gain. With a good Z-match on the input the 2nd mixer noise problem was gone. So that will do for now.

The baseband amp takes the 24 kHz IF and boosts it 50dB before feeding it to the uC ADC. It’s just two transistors with emitter degeneration to set the gain. The ADC is configured to sample at 96kHz, and upload samples to a Host PC via USB. I can then use a GNU Octave script (e.g. fsk_horus.m) to demodulate the FSK signal.


I am designing for test, e.g. using 50 ohm building blocks. This allows me to break out each section and test separately, for example sweeping the crystal filter, or driving the TIA with a 10.7MHz FSK signal, or measuring NF of a section.

I have been testing the Bit Error Rate (BER) performance from the very early building block stage. This measure neatly defines the performance of a digital radio. Much better to test BER early than wait for final integration and have dozens of problems to solve. We want to know as soon as possible if there is a problem.

This block diagram shows an example of testing from the IF down:

I modified the fsk_horus modem to support 1200 bit/s and a sample rate of Fs=96kHz. This is a well tested modem that has performance bang on ideal.

Component Selection

The radio is implemented with garden variety transistors, the most exotic parts being the ECS M15B crystal filter, SBL-1 mixer, PGA-103 LNA, and NE602. There are no transformers. I have used some toroids to wind my own inductors however these are not critical in terms of Q or tolerance and can be replaced with off the shelf parts.

There are three trimmer capacitors that need aligning with the use of a spectrum analyser. Although it may be possible to have an alignment mode, e.g. use the Si5351 to sweep a test signal, sample the signal and display a spectrum on a Host PC.

I used Manhattan style construction:

The two PCBs in the background are a STM32F4 Discovery board and an OpenRadio where I’m just using for it’s Si5351 outputs.

I didn’t even need a printed circuit board to prototype and reach the -135dBm performance milestone. This has allowed me to remove a large chunk of risk from the project very early on – a huge benefit.

I think it’s remarkable that with rough construction, no shielding, a poor layout to the STM32F4 ADC, I can demodulate such weak signals. I guess the engineering is subtle and not related to the physical appearance. It does go crazy when I key my HT next to it though!

When we do move to a PCB the same parts in surface mount packages will result in a nice compact design.

Next Steps

  • Build a 1W transmitter prototype. In particular deal with RF amplifiers and diode switching to make a TDMA transciever.
  • Testing of the receiver, e.g. other specs apart from MDS
  • Work with Rick, KA8BMA, to develop a Rev A prototype PCB version of the entire radio.
  • Lots of software work
  • The 1200 bit/s 2FSK modem has been used so far as it’s what I had lying around. For the final system I’m favouring 4FSK at 2400 bit/s which I estimate will work at -132dBm. So need to get 4FSK running soon.
  • Work towards functional demonstration of the project goals.

I haven’t planned any further forward. I’m not sure when a SM2000 product will emerge. Some time in 2016 I guess. Sooner if you help!

Command Lines

I’m documenting this here so I don’t forget.

Use fsk_horus to generate modem signal at Fs=96kHz. Use hackrf_uc.m to up-convert to IQ samples at Fs=10MHz for replay by the HackRF. hackrf_uc.m also adds a 700kHz offset (IQ designs have a black hole at DC).

For testing the IF we can then play a 10.7MHz signal from HackRF using:

/codec2-dev/octave$ hackrf_transfer -t -f 10000000 -a 1 -x 20

For testing at 146MHz input of the radio use:

~/codec2-dev/octave$ hackrf_transfer -t -f 145300000 -a 0 -x 15

Note the 700kHz offset.

In both cases adjust the -a and -x options and use an attenuator to get the level you want for testing. The level can be checked on a spec-an, although this gets tricky beneath -120dBm.

Simultaneously sample by flashing the STM32F4 Discovery with adc_rec_usb.elf, and then upload Fs=96kHz samples using:

~/codec2-dev/octave$ sudo dd if=/dev/ttyACM0 of=test.raw count=10000

Then demod using fsk_horus:

octave:109> fsk_horus

Fs: 96000 Rs: 1200 Ts: 80 nsym: 1200

demod of raw bits....

centre: 23976 shift: 1272 twist: -1.4 dB

coarse offset: 1192 nerrs_min: 25 next_state: 1


frames: 13 Tbits: 14400 Terrs: 2 BER 0.000 EbNo: 12.23

Here is a plot of the STM3F4 ADC with -135dBm at the rx input:

You can see the passband of the crystal filter – the internal noise from the radio front end passed through the filter creates the trapezoidal spectral shape at the input to the ADC. The two lines in the centre are the low and high FSK tones centered on the 24kHz IF, the hump of “noise” between them are part of the FSK signal. Not sure what that line around 17kHz is all about.

The lines on the far left are harmonics of the 1.2kHz interrupt service routine on the STM32F4. I cleaned most of this noise up with some power supply filtering, it was initially 20dB higher and all over the spectrum:

A little noise goes a long way with 100dB of gain.

Measuring Noise Figure with the Rigol DSA-815

After lots of reading on NF and a few false starts, I can now reliably measure noise figures, e.g. in my LNA, mixer, BPF, and IF amplifiers. For example the TIA amplifier is spec-ed at 5 dB and I measured 5.2dB. I have also measured the single (BPF in front) and double sided NF of the SBL-1 mixer and they were 3dB apart.

You need to have noise above the noise floor of the 815. With the 815 terminated in 50 ohms I measured -162dBm/Hz, which suggests a NF of 12dB. With gains of greater than 20dB on the device or system you are measuring, the numbers from the 815 start to make sense. So plan your tests such that the measured No is higher than -140dBm/Hz.

Here are the Rigol settings I use:

  1. Amplitude: attenuation 0dB. Pre-amp On
  2. BW/Det: sample
  3. Trace/P/F: Power average
  4. Marker Function: No function (to measure gain) Noise Marker (to measure No)

The procedure is: measure the gain G using a test signal, then switch the test signal off, terminate with 50 ohms, and measure No (noise power/Hz). NF = No – G + 174.

Here is my working for an earlier LNA-Mixer-IF amp combination:

Input power  -80.00

Output power -10.00

Gain          70.00

Noise pwr   -102.20  

NF             1.80

My design had a calculated NF of 1.3dB, so 1.8dB is reasonable given the 1.5dB accuracy of the 815. I have a spreadsheet setup so I can just plug the numbers in.


Mel K0PFX, and Jim, N0OBG for buying me the spec-an, which has been invaluable. Neil, VK5KA, for RF advice; John VK3IC and Craig VK3CDN for cables, test equipment, and RF advice; Matt, VK5ZM and Brady for bouncing ideas off; Glen English for RF guidance and in particular explaining ADC NF.

Brady pointed me at the DSP10 2M radio from 1999 which turns out is very similar to what I have come up with! Some very similar design decisions, and a useful example for me.

Categories: thinktime

Thanksgiving reminder

Seth Godin - Tue 24th Nov 2015 06:11
Today's a good day to download The Thanksgiving Reader. It's free to share, of course. We're gratified at the huge number of families that have already downloaded and printed a copy. And the creative ways people are choosing to share...        Seth Godin
Categories: thinktime

Is productive the same as busy?

Seth Godin - Mon 23rd Nov 2015 21:11
No one complains of having spent an entire day doing 'productive work'. Busywork, on the other hand, is mindnumbing. It's possible that if you have a job where your tasks (your busy-ness) is programmed by someone else, that being busy...        Seth Godin
Categories: thinktime

Sam Watkins: sswam

Planet Linux Australia - Mon 23rd Nov 2015 18:11

I like the Chrome browser, but the memory usage is fscking ridiculous.

I have a slightly older computer at work, if I open 4 or more tabs in Chrome the computer will grind to a halt, and I gotta wait perhaps a few minutes for it to swap everything out then I can close the tabs. 150MB for a tab, that’s just way way way too much.

Personally I strongly dislike “virtual memory” in the sense of swapping to disk. I’d much rather get a (non-fatal) “out of memory” error than have the computer grind to a halt, which is what happens when a virtual memory computer goes a bit over its RAM. I don’t want to click a different window that I haven’t used for a while and have to wait for 3 minutes while the computer loads it from disk again and tries to figure out what to swap out. If we didn’t use swap, programmers (looking at you, Google) would be more careful not to waste memory.

Computers are not all that much more functional than they were in to 1990s, or even the 1980s, for regular office tasks such as wordprocessing and spreadsheets – and those computers although technically slower were actually more responsive in many cases because they did NOT grind to a halt due to swapping.


Categories: thinktime

OpenSTEM: The Robots Are Coming!

Planet Linux Australia - Mon 23rd Nov 2015 18:11

The first Mirobot v2 kits have arrived in Australia! Ben Pirt at Pirt Design & Technology in the UK has once again delivered a very neat product. OpenSTEM is the main distributor for Australia, because we regularly get in quite a few for schools and individual students anyhow.

Most of our Mirobots are extra special, because we get them un-soldered. That is, there are a few SMD (surface mounted) components, but other than that students (of all ages!) can do a bit of soldering! This is part of our Robotics Program, where Soldering and otherwise assembling a moving product from all the loose parts is a real enabler – so with the v2 coming out in pre-soldered form by default, we had a word with Ben to ensure that we can keep doing the great stuff with the classes!

This does mean that for every shipment we get, we need to prep a few extra bits before sending on the kits or using them in the classroom. So we’re working on that now for this first shipment. There’ll be more – if you want a kit (un-soldered or pre-soldered), do get your order in soon!

Categories: thinktime News: Crowd favourite Bacon to headline

Planet Linux Australia - Mon 23rd Nov 2015 07:11

Newly-appointed Director of Community at GitHub, Jono Bacon, will be one of four outstanding keynotes for in February 2016. Bacon, formerly Community Manager at Canonical - the company behind Linux distribution Ubuntu, and author of the best-selling ‘The Art of Community’, will deliver insights into building strong, effective, diverse and successful technical communities.

Bacon shared his enthusiasm for keynoting “I am absolutely delighted to be joining you all in Geelong in 2016. LCA is a cornerstone in the global Linux and Open Source movement and I am not only excited about speaking but also getting to know all the attendees at the event”, Bacon says.

Conference Director, David Bell, was thrilled to announce Mr Bacon as Keynote Speaker.

“Our theme for 2016 is ‘Life is better with Linux’ - and the strength of our Linux and open source communities contribute significantly to that aspiration. Robust, diverse, and inclusive communities happen by design, not accident, and Jono has done an enormous amount to shape that. It’s truly an honour to be able to host him in Geelong in February.”

One of the most respected technical conferences in Australia, Linux Conference Australia ( will make Geelong home between 1st-5th February 2016. The conference is expected to attract over 500 national and international professional and hobbyist developers, technicians and innovative hardware specialists, and will feature nearly 100 Speakers and presentations over five days. Deakin University’s stunning Waterfront Campus will host the conference, leveraging state of the art networking and audio visual facilities.

The conference delivers Delegates a range of presentations and tutorials on topics such as open source hardware, open source operating systems and open source software, storage, containers and related issues such as patents, copyright and technical community development.

Linux is a computer operating system, in the same way that MacOS, Windows, Android and iOS are operating systems. It can be used on desktop computers, servers, and increasingly on mobile devices such as smartphones and tablets.

Linux embodies the ‘open source’ paradigm of software development, which holds that source code – the code that is used to give computers and mobile devices functionality – should be ‘open’. That is, the source code should be viewable, modifiable and shareable by the entire community. There are a number of benefits to the open source paradigm, including facilitating innovation, sharing and re-use. The ‘open’ paradigm is increasingly extending to other areas such as open government, open culture, open health and open education.

Potential Delegates and Speakers are encouraged to remain up to date with conference news through one of the following channels;

  • Website:
  • Twitter: @linuxconfau, hashtag #lca2016
  • Facebook:
  • Google+:
  • Lanyrd:
  • IRC: on
  • Email:
  • Announce mailing list:

We warmly encourage you to forward this announcement to technical communities you may be involved in.

Jono Bacon will be one of four keynotes for 2016 in Geelong
Categories: thinktime

Binh Nguyen: How Wasteful is the US DoD?, How Groundbreaking is the JSF?, and More

Planet Linux Australia - Mon 23rd Nov 2015 02:11
It's clear that I've been doing some digging of late with regards to US DoD and Intelligence spending. What's obvious is that large chunks of it are extremely wasteful but other parts are very underfunded which gives a very bad overall look to it. Some ex-defense/intelligence officials have stated that if they could run things more efficiently they could probably halve their spending and still get the same level of efficacy from their services. The main problems appear to be purchasing equipment that they don't need, repetition of programs/work, inadequate ovesight and corruption, lack of project management (whether in the defense or intelligence sector things seem to be caught very late in the game), high costs of ownership and/or research and development, overly ambitious programs, etc...

The following is a random sample of some of the US DoD's modern programs with some very rudimentary research regarding their status. Next to them is an indicator of whether they are likely on or off budget as well as status (in brackets)

- Bell V-22 Osprey Program (OVER BUT IN)

- Boeing Comanche (OVER AND CANCELLED)


- Ford Class Aircraft Carriers (OVER BUT IN)

- Apache Helicopter (OVER BUT IN)

- Seawolf class submarine (NOT ENOUGH INFO, LIKELY OVER)

- Virginia class submarine (UNDER COST AND IN)







- Zumwalt Class Destroyer (OVER)


- B-1/XB-70 (OVER)



- Arleigh Burke Class (NOT ENOUGH INFO, LIKELY ON)




The other thing we should factor in is that even though the US may enjoy a qualitative (and quantitative) edge it's clear that they have security issues possibly owing to the size of some of their programs and some very odd issues which have cropped up in the security of some of their equipment. For instance, it's speculated that some of their drones may have been jammed/hacked...

What's muddying things further is that like other bureaucracies worldwide they also seem to be getting creative with regards to accounting. It's very difficult to get a good idea of what things are like when they're trying to cover things up the way things are rather than how they're likely to be. If you're shifting money to make things look like things are working out okay you know that a program is in trouble. We could put some of this this down to 'Black Ops' but if what you see on the open is true it's likely that what you see behind the veil is also true... which means that the guesstimate by some ex-defense/intelligence staff that you see in the media makes sense (of halving the budget but maintaining the same capability)

As I've said previously a lot of what seems to be said in the marketing and advertising about the F-35 just seems rediculous. Moreover, if you know a bit or do a bit of research a lot of the new capabilities that the JSF is going to have (or is likely going to have) have already been trailed by the US and other defense forces around the globe. Seeing as though the program has been stripped back to meet a deadline I'm of the opinion that I'll believe it when I see it (there's just way too much spin doctoring at the moment for me to honestly believe that things are 'on track' in spite of what they say).  As for a break down of what I'm talking about let's take a look at some of the JSF's much vaunted capabilities...

- as I've said previously does anyone notice something vaguely familiar between the Yak-141 and the F-35? Apparently, after economic issues in the USSR they decided to cut their losses with regards to this program. Lockheed Martin engaged in joint research and also experimented with technology that was possibly later used in the F-35 and F-22 (thrust vectoring, lift off system (the Yak-141 has a different style of of system to achieve SVTOL but similar. They gave up on a dual engine configuration because of instability during takee off and landing. They also had experimented with different engine layouts and materials such as composites, flat nozzles, etc...). What is it that they say? Good artists create, great artists steal? (not having a go at the US just the marketing/hype is just so frustrating. Russia/China also just as guilty with regards to 'industrial espionage') Japan's F-2 (ground breaking AESA RADAR and work with composites) along with the Russia's Yak-141 probably gave the US the core of the F-22 and F-35 progams

- extended supercruise cababilities have been around for more than half a century

- LPI capabilities been around for quite a while. While they may have been crude they've existed

- it has been said that that helmet mounted targeting and cueing and HOBS is revolutionary but has been present for decades (though likely in a less advanced form)

- sensor fusion available in 4.5 gen fighters for a while now though in less advanced form. Likely to be upgraded in future

Sensor Fusion

- ceramic heat signature reduction experimentation on nozzles (look carefully at some of the pictures online. It's clear that the Russians have at least played around with this stuff before decades ago and other countries are likely the same...)

- sometimes I just wonder what the point of the JSF is? If the B/2LRS-B can penetrate unseen into enemy defenses and the JSF's EW capabilities are too weak that they require an escort (in the form of Growlers) the value for money aspect of the JSF goes out the window. What really peturbs me is this. One moment (sometimes the same person in the same conversation) they say the JSF is self-escorting. The next minute they say they have to travel with EW aircraft. If that's the case why don't you just run the LRS-B with Growlers... or just upgrade/increase the number of F-22's in the fleet (unless they also have serious running problems?)

Buying Growlers instead of Lightnings

- at the moment it's clear that other defense manufacturers can smell, "blood in the water". Moreover, there are too many SLEP, review programs at the moment to honestly say that out and out that the JSF is out of the woods with regards to research and development. Auditing and other reporting is being covered up through media hype (truth is in audit reports while 'spin' is healthy in media). Creative accouting possibly being used. Like I said, I'll believe it when I see it... As far as I'm concerned concurrency is basically disguising development and the true cost of the program (a lot of the cost savings that they're finding with regards to lubricants, different coatings, etc... they should have found earlier). If they had of been kept separate somewhat we would have a better understanding of what the true cost of development and production will ultimately be...

Why is the UK treating the F-35 like a 2nd tier Fighter?

- RAM upgrade on a Macbook Unibody

- diagnostic boot command options on statup for Mac OS X

Startup key combinations for Mac

- accessing HFS filesystems from Linux and Windows

- creating DMG files and bootable USB flash drives

- hard drive upgrades on a from Macbook Unibody

- Verbatim seem to use standard SATA based drives (not soldered USB PCB options) in their enclosures. A good option if you can find a good deal. Reputation of some of their internal drives seems a little dodgy though...

- The V-22's development process has been long and controversial, partly due to its large cost increases,[51] some of which are caused by the requirement to fold wing and rotors to fit aboard ships.[52] The development budget was first planned for $2.5 billion in 1986, which increased to a projected $30 billion in 1988.[33] By 2008, $27 billion had been spent on the program and another $27.2 billion was required to complete planned production numbers.[26] Between 2008 and 2011, the estimated lifetime cost for maintaining the V-22 grew by 61 percent, mostly allocated to maintenance and support.[53]

    Its [The V-22's] production costs are considerably greater than for helicopters with equivalent capability—specifically, about twice as great as for the CH-53E, which has a greater payload and an ability to carry heavy equipment the V-22 cannot... an Osprey unit would cost around $60 million to produce, and $35 million for the helicopter equivalent.

    — Michael E. O'Hanlon, 2002.[54]

- The V-22 Osprey program has become the largest scandal in US military history.  Stubborn Marine Corps Generals refuse to admit that dedication and political influence cannot overcome the laws of physics which have proven the complex tilt-rotor design flawed and ultra-expensive.  Details can be found in the seven previous G2mil articles about the V-22, which reveal blatant lies about the V-22's performance.  This article will cover the V-22's soaring cost, $96.2 million for each MV-22 this year, while the FY2005 defense budget request boosts the price 19% to $114.8 million per aircraft. The US Air Force requests three similar CV-22s in FY2005 for $443.0 million; or a unit cost of $147.7 million each.  If the $395.4 million requested in FY2005 for V-22 research, development, evaluation and testing is included in this buy of 11 V-22s, the total cost of each V-22 is $159.7 million.

     The US Army has lost 41 helicopters over Iraq and Afghanistan this past year, with another 24 so badly damaged they are likely to be scrapped.  This is proof that employing ultra-expensive V-22s over combat zones is unwise, especially since they are larger than any helicopter in the US inventory. The V-22 weighs twice as much and costs four times more than helicopters with comparable abilities.  For example, the Navy's FY2005 budget requests 15 MH-60S helicopters for $400.8 million; or a unit cost of $26.7 million each. This helo weighs one-third as much as the V-22, but can pick up nearly the same payload. It has room for 13 combat equipped Marines, compared to 18 for the V-22.  If Congress canceled the V-22 and diverted its $1756.5 million FY2005 request to buy MH-60Ss, this could provide 67 modern helicopters for the Corps, which can also carry machine guns, rockets, and Hellfire missiles, unlike the V-22.

- A day before the offer's expiration, both Lockheed Martin and Austal USA received Navy contracts for an additional ten ships of their designs; two ships of each design being built each year between 2011 and 2015. Lockheed Martin's LCS-5 had a contractual price of $437 million, Austal USA's contractual price for LCS-6 was $432 million. On 29 December 2010, Department of Navy Undersecretary Sean Stackley noted that the program was well within the Congressional cost cap of $480 million per ship. The average per-ship target price for Lockheed ships is $362 million, Stackley said, with a goal of $352 million for each Austal USA ships. Government-furnished equipment (GFE), such as weapons, add about $25 million per ship; another $20 million for change orders, and "management reserve" is also included. Stackley declared the average cost to buy an LCS should be between $430 million and $440 million.[103] In the fiscal year 2011, the unit cost was $1.8 billion and the program cost $3.7 billion.[104]

- Requiring 1,000 fewer crew members and 30 per cent less maintenance over its 50-year lifespan, the Ford is said to let the US Navy save $4 billion.

While the Navy praises this as another significant advantage, critics say, the cost of building the ship has already skyrocketed.  With the carrier now 70 per cent complete, construction costs are about 22 per cent over the over the scheduled budget. 

The high price still will not guarantee that after it is commissioned in 2016 the carrier will not face “significant reliability shortfalls”, as the Government Accountability Office, an investigative arm of Congress, said in September.

This may limit the ship's mission effectiveness and increase the government’s costs even more.

- “No one on this planet knows what inflation will be in, say, just six months time, but the Department of Defense seems to think they do,” said renowned military expert Winslow Wheeler, director of the Straus Military Reform Project, started in 2005. “The Pentagon plays this game all the time. It’s a typical example of how they manipulate long-term projections to make programs go down smoother.”

- Members of Congress have repeatedly criticized the inflated costs, and in 2012 lawmakers essentially reset the program’s budget and made Lockheed responsible for future cost increases. But that still leaves a hefty cost for the Pentagon, which will continue paying for its share of expenses well into the second half of this century. Yet in its 2013 F-35 report, the Pentagon claims the project has come in within budget and that costs have been reduced -- by $15.1 billion in today’s economy, or $89.5 billion, according to its 2065 projections.

However, the 97-page report doesn’t mention that the annual savings for the years 2012 to 2013 are both based on projections through 2065, the end of the program’s life. Analysts often project future costs over the short term, and often they’re wrong  -- Wall Street analysts, for example, regularly miss month-to-month projections for jobs reports. Projections for the next fifty years would have to involve an unusual degree of speculation and a wide margin for error.

-In a 2014 article in Foreign Policy, Lewis recalled the history of dirty bombs. How Russia tinkered with the radiological weapons during the 1950s. And how, during the darkest days of the Korean War, with Chinese and North Korean troops threatening to overrun American forces, U.S. Army Gen. Douglas MacArthur proposed “sowing a band of radioactive cesium across Manchuria as a kind of ‘cordon sanitaire’ against the Chinese advance.”

- First off, this has nothing to do with the F-22, F-35, B-2 or anything else the US is currently flying. It will not make them obsolete, because this isn't a detection tech. The UHF frequencies aren't a particularly effective counter either, because the installations have to be really large just to be able to resolve something the size of an aircraft. You can't just run the noise through a statistical model to pop out a Raptor. Even if you could get some kind of signal, you wouldn't be able to tell if there was one or twenty. UHF has poor angular resolution due to the wavelength.

Second, even if you could detect a stealth aircraft from the ground, you still need a way to guide aircraft or missiles to it. Combat tests have shown that pilots that can *see* an F-22 can't lock their fighter on to it. Since UHF sets have to be large to have sufficient resolution, you can't fit one into a fighter, never mind a missile. Indeed, UHF antennas aren't even road-mobile. They're fixed installations right now.

Third, coatings are actually the LEAST important part of a stealth aircraft. First is shaping, second is how it flies. Third is substructure. Fourth is coatings. And the coatings in use are already broadband-absorbing, including being fairly effective against UHF. Yet that's insufficient for complete invisibility because the shaping is optimized for high band.

Now, having said all that, is this a big advance? Maybe. It depends not just on the tunability (which appears to be fantastic) but how much of the spectrum it can absorb at a given time. Passive coatings will absorb all high band frequencies at the same time. You need to do that because a modern AESA emitter is broadcasting (randomly) over a very wide range of frequencies. You have to block all of those simultaneously, otherwise you're going to get pinged the next time the emitter cycles to a frequency you aren't currently blocking. Which is going to happen multiple times a second.

- A speaker at the recent ASPI submarine conference made the observation that ‘no system was too beautiful’ for the Seawolfs. In other words, pursuit of the highest level of performance was given priority above any thought of economical production. The result was inevitable; the Seawolf entered into an F-22-like ‘death spiral’ of higher projected unit costs and lower projected build numbers. In the end only three were built, versus 29 planned, as the 1991 cost estimate was close to US$5 billion per boat in today’s dollars.

- In 2005, it was estimated to cost at least $8 billion excluding the $5 billion spent on research and development (though that was not expected to be representative of the cost of future members of the class).[13] A 2009 report said that Ford would cost $14 billion including research and development, and the actual cost of the carrier itself would be $9 billion.[52] The life-cycle cost per operating day of a carrier strike group (including aircraft) was estimated at $6.5 million in 2013 published by the Center for New American Security.[53]

- Lawmakers and others have questioned whether the Zumwalt-class costs too much and whether it provides the capabilities the U.S. military needs. In 2005 the Congressional Budget Office estimated the acquisition cost of a DD(X) at $3.8–4.0bn in 2007 dollars, $1.1bn more than the navy's estimate.[76]

The National Defense Authorization Act For Fiscal Year 2007 (Report of the Committee On Armed Services House of Representatives On H.R. 5122 Together With Additional And Dissenting Views) stated the following: "The committee understands there is no prospect of being able to design and build the two lead ships for the $6.6 billion budgeted. The committee is concerned that the navy is attempting to insert too much capability into a single platform. As a result, the DD(X) is now expected to displace over 14,000 tons and by the navy's estimate, cost almost $3.3 billion each. Originally, the navy proposed building 32 next generation destroyers, reduced that to 24, then finally to 7 in order to make the program affordable. In such small numbers, the committee struggles to see how the original requirements for the next generation destroyer, for example providing naval surface fire support, can be met."[citation needed]

- In February 2011, the USAF reduced its planned purchase of RQ-4 Block 40 aircraft from 22 to 11 in order to cut costs.[19] In June 2011, the U.S. Defense Department's Director, Operational Test and Evaluation (DOT&E) found the RQ-4B "not operationally effective" due to reliability issues.[20] In June 2011, the Global Hawk was certified by the Secretary of Defense as critical to national security following a breach of the Nunn-McCurdy Amendment; the Secretary stated: "The Global Hawk is essential to national security; there are no alternatives to Global Hawk which provide acceptable capability at less cost; Global Hawk costs $220M less per year than the U-2 to operate on a comparable mission; the U-2 cannot simultaneously carry the same sensors as the Global Hawk; and if funding must be reduced, Global Hawk has a higher priority over other programs."[21]

On 26 January 2012, the Pentagon announced plans to end Global Hawk Block 30 procurement as the type was found to be more expensive to operate and with less capable sensors than the existing U-2.[22][23] Plans to increase procurement of the Block 40 variant were also announced.[24][25] The Air Force's fiscal year 2013 budget request said it had resolved to divest itself of the Block 30 variant, however, the National Defense Authorization Act for Fiscal Year 2013 mandated operations of the Block 30 fleet through the end of 2014.[26] The USAF plans to procure 45 RQ-4B Global Hawks as of 2013.[1] Just before his release from ACC, Hostage said of the U-2's replacement by the drone that "The combatant commanders are going to suffer for eight years and the best they’re going to get is 90 percent".[27]

From 2010-2013, costs of flying the RQ-4 fell by more than 50%. In 2010, the cost per flight hour was $40,600, with contractor logistic support making up $25,000 per flight hour of this figure. By mid-2013, cost per flight hour dropped to $18,900, contractor logistic support having dropped to $11,000 per flight hour. This was in part due to higher usage, spreading logistics and support costs over a higher number of flight hours.[28]

- Iran’s story about the electronic ambush of America’s sophisticated drone, the RQ-170 Sentinel, is that their experts used their technology savvy to trick the drone into landing where the drone thought was its actual base in Afghanistan but instead they made it land in Iran. They used reverse engineering techniques that they had developed after exploring less sophisticated American drones captured or shot down in recent years. They were able to figure how to exploit a navigational weakness in the drone’s system. "The GPS navigation is the weakest point," the Iranian engineer told the newspaper.

Iranian electronic warfare specialists were able to cut off the communications link by jamming on the communications. The engineer said that they forced the drone into autopilot. That state is where “the bird loses its brain." The Iranians reconfigured the drone's GPS coordinates and they used precise latitudinal and longitudinal data to force the drone to land on its own. In doing so the Iranian team did not have to bother about cracking remote control signals and communications from a control center in the U.S., and the RQ170 suffered only minimal damage, according to the report.

Adding strength and credibility to that story were military experts saying that even a combat-grade GPS system is vulnerable to manipulation. According to a GPS expert at the University of New Brunswick in Canada, Richard Langley, it’s theoretically possible to take control of a drone by jamming.

- Top US officials said in 2009 that they were working to encrypt all drone data streams in Iraq, Pakistan, and Afghanistan – after finding militant laptops loaded with days' worth of data in Iraq – and acknowledged that they were "subject to listening and exploitation."

Perhaps as easily exploited are the GPS navigational systems upon which so much of the modern military depends.

- With privacy and state snooping politically sensitive issues in Germany, the BND was already the focus of a parliamentary inquiry in Berlin into the extent of its surveillance and its targeting guidelines. It was reported in May that, despite Mrs. Merkel’s anger, the agency was aware of and cooperated with the National Security Administration’s surveillance program based out of Germany.

If true, the scope of Germany’s spying program seems to be more closely aligned with U.S. intelligence programs than previously stated.

Separately, citing Germany’s far-reaching data protection laws, U.S. software giant Microsoft announced plans Wednesday to build data centers in the country in an attempt to shield customers from U.S. surveillance.

The tech giant said it will provide cloud services, including Azure and Office 365, from facilities in Magdeburg and Frankfurt.

- “He has to travel around the entire country for field guidance, so there always needs to be a personal restroom exclusively for the Suryeong [Supreme Leader] Kim Jong-un,” the source said. “It is unthinkable in a Suryeong-based society for him to have to use a public restroom just because he travels around the country.”

- "China makes it a practice to not get extended into military conflicts in the Middle East," Deputy National Security Adviser Ben Rhodes said at the White House press briefing on Thursday. "Their policy over years, if not decades, is to not be overextended in military exercises."

This echoes what foreign-policy experts have said about the likelihood of Chinese involvement in Syria.

"This is very far from China's fight," Bremmer told Business Insider earlier this week. "They don't want responsibility for it, there's no potential diplomatic or security win for Beijing."

- But Kuwait is fighting back. Volunteer organisation Kuwait Oasis is working to plant 315,000 trees along the country's borders by 2019 to hold back the moving sands.

A similar initiative in Mongolia's Kubuqi Desert reduced sandstorms from 80 a year to fewer than five. Both use Waterboxx plant incubators from Dutch startup Groasis Technologies. These collect water from the air at night via condensation and prevent its evaporation during the day, so each tree consumes 35 times less water than with standard irrigation.

- “If you listen to what the IRGC says they’re doing, they say they’re assisting the Syrian military and the [National Defense Forces militias] at various different levels in how to run hardware, to use artillery, to do tactics and logistics—everything from the tactical to the strategic,” says Afshon Ostovar, an Iran expert at the Center for Naval Analyses, a federally funded research and development center.

“It doesn’t make sense for [Quds Force] to be able to advise on everything,” says Ostovar. “You’re going to need various skills brought to bear and it doesn’t make sense to just bring your special forces Quds Force guys, who are trained in language, tradecraft and bomb-making, to teach a guy how to use a howitzer or how to integrate armor with infantry tactics.”

- Should it be selected, the F-35 will replace Denmark's aging F-16 aircraft with an affordable, sustainable, and highly capable fifth-generation aircraft. The F-35 program includes partners from nine countries – Australia, Italy, Canada, Denmark, Netherlands, Norway, Turkey, United Kingdom, and United States – as well as three foreign military sales customers – Israel, Japan, and South Korea

Multicut A/S has a modern factory delivering complex machined parts and subassemblies. It uses state-of-the-art production equipment in its lean manufacturing facility – including 9-axis mill-turn machine tools, as well as 5-axis vertical and 4-axis horizontal computer numerical controlled machines networked with robotic material handling systems.

Source: Pratt & Whitney

- True, Syria is not Vietnam. In fact, it could end up being much worse, not least because instead of two broadly definable camps with (relatively) defined strategic and tactical objectives, Syria's war involves dozens of local and regional actors with shifting allegiances and often unidentifiable strategies. As a result, Syria makes the three-dimensional chess played by superpowers back then look quaint.

- Congressmen in Brazil, one of the most violent countries in the world, are proposing to dramatically loosen restrictions on personal gun ownership, bringing the country much closer to the American right to bear arms.

The politicians say the measures are necessary to allow embattled citizens the right to defend themselves from criminals armed with illegal weapons. But opponents say the move will only increase the country’s toll of nearly 60,000 murders in 2014.

- Truth be told, no one knows how to deal with ISIS. Not Washington, not Paris and not Moscow. There isn’t a rulebook — but there is certainly a list of tried and tested failures that can inform our decision making. What is also clear is that this threat does demand solidarity among nations who should be able to put their minor differences aside to face a common threat.

- Syria, though, remains the potent drawcard for those trying to radicalise citizens from France or elsewhere. Combined with social media, the propaganda has been much more effective than during other conflicts.

For instance, during 2001-2012, only about 60-70 French citizens were known to have journeyed to fight in Pakistan and Afghanistan, the official said.

And unlike the 1990s, identifying potential radicals within mosques had become "a nightmare for intelligent services".

The would-be fighters were often "isolated individuals" who might be radicalised within just one month. About 20 to 30 per cent of the French citizens seeking to fight for IS were converts to Islam, he said.

- In a recent report on American public opinion and U.S. foreign policy, “Defending our allies’ security” ranked near the bottom of a list of foreign policy priorities. Judging from their rhetoric and military spending plans, protecting our allies is the top concern for many of the men and women aspiring for higher office.

- According to North Korean state media both countries declared 2015 a “year of friendship”  in order to commemorate “Korea’s liberation and the victory in the great Patriotic War in Russia.”  A North Korean delegation, led by Lieutenant General Choe Jang Sik, deputy head of the Korean People’s Army General Staff Operations Bureau, visited Moscow in August to discuss the possible participation of a North Korean team in the “2016 International Army Games,” annually hosted by the Russian Ministry of Defense (See: “Russia Beats China in This Year’s International Army Games”).

- “Lichtenstein ranks number 1 considering the rights its citizens enjoy outside its jurisdiction. This is far beyond popular immigration countries such as the US, which is ranked 34. The UAE scores relatively well in 26th position.”

In another ranking, Kochenov compared countries considering these rights internally as well as externally. Here, Germany topped the list of strongest passports, while the UAE ranked 63th out of the 199 countries compared.

- "IS has shown that when they suffer battlefield reverses, they try to do something that ensures they counter any perception they are losing strength."

Ingram believes the shift in strategy was most likely long planned. He says it dovetails with another core IS objective, to weaken "infidel" western states and prove that Muslims and those of other faiths can't coexist.

He notes a lengthy article from an edition of the IS propaganda magazine vowing the destruction of the "grayzone", its term for secular societies.

"IS is saying to Muslims you no longer have a choice. There is no grey zone. You now have a caliphate, you have your own world to return to.

"You can't live in the land of the kuffar, no matter how devout, and be a good Muslim. Even if you pray five times a day and fast.

To this end, Islamic State hopes there will be rise in Islamophobia in the West. It will reinforce its hateful ideology."

- “From 1990 to 2010, the Army began and then cancelled 22 major programs,” the article noted, “at an approximate cost of $1 billion per year starting in 1996 and rising as high as $3.8 billion per year after 2004.”

While the White House tried to distance itself from the idea of containment, a senior administration official said, “What we had in essence was a containment policy” based on the belief that efforts to counter the Islamic State’s ideology had to be led by Sunni Muslim states, with backup from the United States.

Yet Mr. Obama’s strategy was also based on intelligence assessments that the Islamic State was overextended and vulnerable to a cutoff in its oil and black-market revenues — and that, in the long war against extremism, there was still time to bolster the most capable local forces and bring Arab states to the fight.

“If Paris changes anything,” an American official said, “it’s the recognition that we can’t wait for those two events to happen, if they ever happen.”

- In Brussels, NATO dropped the flags of its 28 member nations to half staff to honor the French dead. NATO officials said that France so far has declined to invoke the alliance's Article 5, which would oblige all members to join its fight against the militants..

The only time Article 5 has ever been invoked was, at U.S. request, after the September 2001 al-Qaeda attacks.

- With the trade of stolen data booming on the multi billion-dollar dark web, Mr Pogue said "data is the new oil" yet Australia, like most countries, still has a "head-in-the-sand approach".

"It will get worse before it gets better," he told Fairfax Media. "The sooner decision makers understand that there are only three types of organisations – those that have been breached, those that are currently breached (and likely don't know it) and those that are about to the breached – the better."

- Mr Pogue, senior vice-president of cyber threat analysis with Australian data investigation company Nuix, said hackers were becoming more creative and more aggressive.

Most advertise their skills in hidden Russian-language forums. The stolen data is sold on encrypted "dark net" sites, with stolen credit card details fetching an average of $100.

The money is then funding other crimes, such as terrorism and people smuggling.

One dark-net site identified by Australian police recently was selling credit cards for 8¢, CCVs for $8 and other card details, such as billing addresses, for $80. At one point, 14,000 users were accessing the site.

- The renminbi is already, according to SWIFT, the fifth most-used payment currency in the world, helped by the rapid expansion of the country's middle class and its growing use of the internet for shopping.

- Experts noted that several factors may have been behind the failures in January: Security services are drowning in data, overwhelmed by the quantity of people and emails they are expected to track, and hampered by the inability to make pre-emptive arrests in democratic countries

- Bernard Bajolet, the head of the French spy service, spoke during a public appearance at George Washington University in Washington two weeks ago about the twin threats France was facing, both from its own extremists and "terrorist actions which are planned (and) ordered from outside or only through fighters coming back to our countries."

General warnings about potential attacks from Iraqi intelligence or other Middle Eastern intelligence services are not uncommon, the official said. The French were already on high alert.

"During the last month we have disrupted a certain number of attacks in our territory," Bajolet said. "But this doesn't mean that we will be able all the time to disrupt such attacks."

Obtaining intelligence about the Islamic State group has been no easy feat given difficulties accessing territory held by the radical Sunni group. Iraqi agencies generally rely on informants inside the group in both Iraq and Syria for information, but that is not always infallible. Last year, reports from Iraqi intelligence officials and the Iraqi government that al-Baghdadi was injured were later denied or contradicted.

- The Prime Minister told Radio 4's Today programme: "The disagreement has been that we think that Assad should go at once and obviously Russia has taken a different view.

"We have to find a settlement where Assad leaves and there is a government that can bring Syria together and we mustn't let the gap between us be the alter on which the country of Syria is slaughtered.

"That is the challenge. Now that is going to take compromises."

Mr Cameron's talks with Mr Putin will be followed by a meeting of the Quint - an informal group of Western powers within the G20, made up of the UK, US, France, Germany and Italy - to assess progress and discuss how further efforts on Syria can be co-ordinated.

- What happened in Paris represented one shot in what could prove to be a long, painful battle that we cannot win with the sword. It was tragic for sure, but also predictable. The French have discovered what some of us have predicted since the outset of the US-led campaign: rather than stemming terrorism, the air strikes in Iraq and Syria are creating new Sunni  jihadists in the region and abroad.

Make no mistake: Paris was a direct response to this war. According to Professor Robert Pape, a terrorism expert at the University of Chicago, the clear majority of culprits in the more than 2100 documented cases of suicide bombings from 1980 to 2009 were motivated by foreign intervention in the Middle East, not ideological or religious conviction. For example, the 2004 Madrid and 2005 London bombings were in response to the 2003 Iraq invasion. And the recent downing of the Russian airline over the Sinai was in response to President Vladimir Putin's air strikes in Syria.

- Officials believe the ISIS geek squad is teaching terrorists how to use encryption and communication platforms like Silent Circle, Telegram and WhatsApp.

Aaron F. Brantly said he and his colleagues at the U.S. Army-affiliated Combating Terrorism Center have found that Islamic State members use as many as 120 separate platforms, many of them encrypted, to communicate and share information. One of its most favored methods, he said, is a highly encrypted form of communication called Telegram.

"It essentially allows them to hide what they are discussing from people who aren't explicitly looking for it," especially law enforcement and intelligence agencies, Brantly said. "Obviously this is a major concern. … They are creating a space for themselves to operate independent of direct surveillance."

- The senior European counterterrorism official said that European authorities are gravely concerned and will meet this week to discuss the issue - though they are already becoming contentious with each other about their lack of options. Some are restricted by civil liberties concerns in their home countries, while others note that creating a "back door" in an electronic communication platform - meaning a way for governments to spy on messages in real time - also creates an opportunity for non-governmental groups to take a peek. When Greece put a "back door" in electronic communications passing through its territories, it was quickly exploited by hackers.

"I am waiting for somebody to show me a way we can do this that is guaranteed to be only used by the good guys," said Paul Rosenzweig, a cyber consultant and former deputy assistant secretary in the U.S. Department of Homeland Security. "But it is not person-specific. Anything that we can create can, and will, be cracked."

- The fundamentalist interpretation of Islam is not a common mode of thinking for most Muslims, especially in recent times. But it is clearly driving the political agenda in Muslim countries. Not all Muslim modernisers are willing to confront the anti-Western and anti-Semitic beliefs that feed the Islamist narrative. The Islamists are dominating the discourse within the Muslim world by murdering secularists and forcing many of them to leave their countries.

With more than 1.4 billion Muslims around the globe, the swelling of the fundamentalist ranks poses serious problems. If only 1 per cent of the world's Muslims accepts this uncompromising theology, and 10 per cent of that 1 per cent decide to commit themselves to a radical agenda, we are looking at a 1 million strong recruitment pool for groups such as al-Qaeda, IS and whatever comes next.

Only a concerted ideological campaign against medieval Islamist ideology, like the one that discredited and contained communism, could turn the tide.

- "It is not just my view, but the view of my closest military and civilian advisors that that would be a mistake," he said.

"Not because our military could not march into Mosul or Raqqa or Ramadi and temporarily clear out ISIL, but because we would see a repetition of what we've seen before which is if you do not have local populations that are committed to inclusive governance, and who are pushing back against ideological extremes that they resurface."

Instead he defended his administration's current strategy and vowed to intensify it – supporting opposition forces on the ground with training, weapons and intelligence while conducting an airstrikes from above.

He said only by finding a political solution to the war in Syria could the chaos be ended and IS stifled, and that there was finally agreement on this course.

"We have the right strategy and we are going to see it through."

- Like Akshaya Mishra of Firstpost states, the Taliban, al-Qaeda and the likes of Osama bin Laden would not have existed if the US didn’t actively promote ideology-driven thugs to fight its Cold War against Russia. "Iraq would not be such a dangerous place if the US had not brought down Saddam Hussein for no reason at all."

The West is in the danger of making the same mistakes in this new Cold War that it did in the original one and such discord will further the causes of such entities as the Islamic State. The focus should remain on rooting out terrorist groups, that no longer require a US or a Russia, or even financiers within the G-20 countries; they are pretty much self sufficient.

- Imagine if every time you typed “Netflix and chill” (that’s code for casual sex, for the uninitiated) into Tinder, the app slapped you on the wrist with a warning message.

That’s what happens for users of Tantan, a dating app that’s popular among randy Chinese. A pound-for-pound copy of Tinder, Tantan lets users make friends or meet potential partners by swiping left or right at a set of photos, and enabling two-way chat for every mutual match. While it might help facilitate one-night stands, Tantan is not immune to China’s internet censorship.

- We applaud people in the Arab Spring standing up and saying this is not right. But when it happens in Yarraville people say that we are yuppies.

- Others have pointed out that the F-35 is hardly the first maligned plane in U.S. history. The F-4 Phantom suffered the same slings and arrows, and went on to survive battle with the more nimble MiGs during Vietnam (though as with all military history this is hotly contested: A better plane would have performed better). Still, as FighterSweep put it: “It’s fun to trash the new kid, especially the new kid that’s overweight, wears too much bling, and talks about how awesome it is all the time.”

- In considering future adversaries, Chinese information warfare doctrine makes clear the requirement to attack US C4ISR systems, including satellites, from the outset or even prior to, any military conflict. This information warfare campaign will be fought in space, cyberspace and across the electromagnetic spectrum. The PLA sees the information battle-space as an integrated environment comprising both cyberspace and electronic warfare, and base their approach to these domains around the concept of Integrated Networked Electronic Warfare (INEW).

General Dai Qingmin, PLA, states that a key goal of the PLA’s approach to INEW is to disrupt the normal operation of enemy battlefield information systems, while protecting one’s own, with the objective of seizing information superiority. Therefore, winning in the air against the PLAAF may be determined as much by which side wins these information warfare campaigns, as through success in tactical beyond-visual range air to air engagements. Imagine no data links between the F-35s and the AWACS; AESA radars on an E-7A Wedgetail spoofed; ASAT attacks that bring down strategic communications or computer-network attacks that strike logistics or which jam GPS signals, and the first shots fired are not missiles but satellites silenced by computer hackers or ground-based jamming. Furthermore there will be an incentive to strike quickly and decisively, with an information ‘battle of the first salvo’ effect emerging. Without the flexibility bestowed by these systems, the F-35 pilot must rely on on-board sensor systems such as its AESA Radar and Electro-Optical Targeting System (EOTS) to detect, track and engage targets which increase the detectability of the aircraft and potentially bring the F-35 into the envelope of an opponent’s within visual range systems.

- The terrorist attacks in Paris, beyond their obvious horror, recalled to me the words of the late Bernard Fall, a French-American historian and war correspondent in Vietnam. In 1965, Fall wrote: “When a country is being subverted it is not being outfought; it is being out-administered. Subversion is literally administration with a minus sign in front.” ISIS has subverted western Iraq and eastern Syria because it is out-administering the Baghdad and Damascus regimes there. That is, ISIS has erected a competent bureaucratic authority covering everything from schools to waste removal which, combined as it is with repression, is secure and stable. And with that territorial security, ISIS has apparently created a central dispatch point for planning terrorist attacks abroad. Eventually, the end of ISIS can only come about when some other force out-administers it. The AH-64 played roles in the Balkans during separate conflicts in Bosnia and Kosovo in the 1990s.[92][93] During Task Force Hawk, 24 Apaches were deployed to a land base in Albania in 1999 for combat in Kosovo. These required 26,000 tons of equipment to be transported over 550 C-17 flights, at a cost of US$480 million.[94] During these deployments, the AH-64 encountered problems such as deficiencies in training, night vision equipment, fuel tanks, and survivability.[95][96] On 27 April 1999, an Apache crashed during training in Albania due to a failure with the tail rotor,[97] causing the fleet in the Balkans to be grounded in December 2000.[98]

In 2000, Major General Dick Cody, 101st Airborne's commanding officer, wrote a strongly worded memo to the Chief of Staff about training and equipment failures.[99] No pilots were qualified to fly with night vision goggles, preventing nighttime operations.[100] The Washington Post printed a front-page article on the failures, commenting: "The vaunted helicopters came to symbolise everything wrong with the Army as it enters the 21st century: Its inability to move quickly, its resistance to change, its obsession with casualties, its post-Cold War identity crisis".[101] No Apache combat missions took place in Kosovo due to fears of casualties.[100]

- In January 1968, the United Kingdom terminated its F-111K order,[109] citing higher cost; increased costs along with devaluation of the pound had raised the cost to around £3 million each.[110] The first two F-111Ks (one strike/recon F-111K and one trainer/strike TF-111K) were in the final stages of assembly when the order was canceled.[109] The two aircraft were later completed and accepted by the USAF as test aircraft with the YF-111A designation.[108]

- The program costs, during 1963–1967, grew at an alarming rate; estimates by the USAF at the start of the program was placed at US$124.5 million, but by April 1967 had risen to $237.75 million.[36] While the initial price of US$5.21 million per aircraft was capped at US$5.95 million, R&D, labor, and other costs were not.[37] The rising price, three unexplained losses of USAF F-111As in Vietnam during their first month of deployment, and the British and U.S. Navy's orders' cancellations caused further controversy in Australia during 1968.[38] By 1973, however, when the F-111A had accumulated 250,000 flight hours, it had the best safety record among contemporary aircraft, which presaged the F-111C's own excellent record.[39]

- WASHINGTON -- Militants in Iraq have used $26 off-the-shelf software to intercept live video feeds from U.S. Predator drones, potentially providing them with information they need to evade or monitor U.S. military operations.

Senior defense and intelligence officials said Iranian-backed insurgents intercepted the video feeds by taking advantage of an unprotected communications link in some of the remotely flown planes' systems. Shiite fighters in Iraq used software programs such as SkyGrabber -- available for as little as $25.95 on the Internet -- to regularly capture drone video feeds, according to a person familiar with reports on the matter.

- Obama says he won't put boots on the ground. Does that mean the special forces will be going in with bare feet?
Categories: thinktime

Sridhar Dhanapalan: Twitter posts: 2015-11-16 to 2015-11-22

Planet Linux Australia - Mon 23rd Nov 2015 01:11
Categories: thinktime


Subscribe to kattekrab aggregator