“They go into stealth mode – completely silent,” said Dr Deecke [from the University of St Andrews in Scotland]. “This raises the question: how are they communicating?”
It seems that orcas can carry out complex, co-ordinated mammal-hunting trips without “talking to each other” at all.
[…]
Dr Deecke thinks that the orcas might “rehearse” their hunting routines, to learn the position of each group member.
“They tend to be very predictable,” he said. “I often know exactly where they are going to surface.”
Very predictable stealth mode? Funny. I assume he is trying to make a point with the contradiction in what he is describing.
Unexpectedly, whalers ran out of customers before they ran out of whales…the remnant whale populations were saved by technological innovators and profit maximizing capitalists.
He proposes two steps, both of which cost less than buying the petroleum they offset
Retool transportation to be two or three-times more efficient (save more than 60% by 2025)
Move to biofuel
We’ve done this before…1977-1985 when we last paid attention…oil imports from the Persian Gulf fell 87% and would have been gone if we had kept that up one more year.
Article 5 of the NATO treaty requires the Alliance to come to the aid of member-states if their territory comes under attack.
[…]
For the new NATO members, American troops continue to act as a hedge against what they see as Moscow’s unpredictable foreign policy.
“The nations that have been most concerned about the credibility of Article 5 are the Central Europeans,” Brzezinksi [former US Deputy Assistant Secretary of Defense for Europe and NATO Policy] said. “People remember that Estonia had a cyber attack that originated in Russia, and which most believe was organized by the Russian government.”
The Bulk Power System of the United States must comply with NERC standards CIP-002 through CIP-009.
The standards are setup so that CIP-002 has a significant influence over the need for standards CIP-003 through CIP-009. It requires a regulated entity to use a risk-based assessment methodology (RBAM) to identify critical assets. In other words, a RBAM is meant to set how much of an environment is within scope of review.
This is not a unique approach. If you are familiar with PCI this is like saying a regulated entity has to determine the systems that process, transmit or store cardholder data to set the scope.
As a result of audits conducted over the past couple of years through the CIP compliance monitoring program, NERC has found instances where entity methodologies are not sufficiently comprehensive to produce a complete and accurate list of critical assets. This suggests greater clarity is needed in either NERC standards or industry guidelines to provide a more accurate identification of entity critical assets. While in many cases, functional entities had similar methodologies, substantial differences were evident even amongst entities within the same registered function. In certain cases, this has led to audit findings of non-compliance.
a blog about the poetry of information security, since 1995