Wednesday, June 20, 2012
Iran plans to build 10 new destroyers
TEHRAN – The deputy commander of the Iranian Navy has announced that Iran plans to build 10 new domestically designed destroyers.
In an interview with the Persian service of the Fars News Agency published on Tuesday, Rear Admiral Abbas Zamini said that the Navy has planned to design and manufacture 10 new destroyers in addition to the Jamaran and Velayat destroyers.
He added that the plan envisaged manufacturing seven destroyers of the Sina class, which were capable of firing missiles, and three destroyers of the Mowj class.
Iran’s first domestically manufactured destroyer, the Jamaran, was launched in February 2010.
The warship can carry helicopters and is equipped with torpedoes and electronic radar. It is 94 meters long and weighs over 1,500 tons.
The destroyer is capable of engaging in surface, air, and undersea warfare.
In September 2011, Navy Commander Habibollah Sayyari announced that the second domestically manufactured destroyer would join the country’s naval fleet in the near future.
Rear Admiral Sayyari said that the Jamaran II (Velayat) was highly advanced and differed greatly from the Jamaran.
Zamini also said that about 70 percent of the project to build the Velayat destroyer had been completed and expressed hope that the destroyer would be launched during the current Iranian calendar year, which started on March 20.
Analysis shows that the struggling company could make plenty of money from its mobile patents.
Nokia's Last Line of Defense
By David Talbot
Nokia may have failed to develop a smartphone that challenges either Apple or Android, but the once-dominant Finnish company—which last week announced it would lay off 10,000 workers and shut two R&D facilities and a manufacturing site—has a rich store of intellectual property that may determine its future.
The power of Nokia's patent portfolio was demonstrated in its 2009 suit against Apple, in which it claimed that the iPhone maker had violated 46 Nokia patents, including ones covering wireless standards, antennas, cameras, click wheels, and touch-screen controls. Apple agreed to settle last year for an undisclosed cash payment and ongoing royalties. Nokia gets a total of $600 million every year in revenue on patent licenses.
The explosive growth of the smartphone market means mobile patents are particularly valuable these days. Major players are increasingly going to court with one another over alleged infringements. And patents have proved to be gems amid the wreckage of failed companies; bankrupt Nortel's 6,000 patents were liquidated for $4.5 billion last year to an Apple-led consortium of tech companies. Google spent $13 billion on Motorola Mobility, gaining 17,000 patents.
Over the last 20 years, Nokia has sunk more than $50 billion into R&D and made several acquisitions, producing a war chest of 30,000 patents, including 11,000 filed in the U.S. "The quality of the patents is one of the best in the industry," says Chetan Sharma, a wireless analyst and consultant in Seattle.
Alexander Butler, executive vice president at IPVision, an intellectual-property consultancy in Cambridge, Massachusetts, says that measured against what Motorola's and Nortel's patents sold for, and taking into account the quality of Nokia's patents, the Nokia storehouse could be worth more than the company's market value, which stood at around $9.6 billion at midday Tuesday.
Nokia was long a leader in mobile computing. The pioneering products it has developed over the years include the first camera phone, the first mobile phone with a QWERTY keyboard, and the first phone with video calling.
Indeed, on its website the company presents a long string of novel commercial products it has developed in the past 30 years.
Nokia's most-cited patent—and therefore one of its most valuable—was issued in 1992 for a "method for mapping, translating, and dynamically reconciling data." It has been cited by other patents 300 times, a sign of its importance in the field. In essence, this technology is what we use today to align our digital calendars on various devices. Nokia obtained that patent through an acquisition.
However, Butler cautions that hardware patents, one area in which Nokia is particularly strong, are decreasing in importance over time. "They don't have as much quantity around interface and software patents, which is where a lot of the value is today," he says.
But the standards-related patents should hold their value, says a Nokia spokesman, Mark Durrant. Nokia was the first to market with a GSM phone and has many patents in that area.
The question is how well Nokia plays its hand from here. The company has sold patents 20 times in the last five years while getting more aggressive in court. "As our actions have shown—though litigation is not our preferred option—we will take whatever steps are necessary to protect our IP from unauthorized use by others," Durrant says.
In fact, Nokia last month filed an FTC complaint and lawsuits against HTC, RIM, and Viewsonic in the U.S. and Germany for allegedly violating 45 patents covering antennas, power management, app stores, data encryption, the retrieval of e-mail attachments, and more.
Whether it comes through licensing, sale, or litigation, patent-related cash flow could be vital if Nokia isn't to follow Nortel to bankruptcy court, says Alexander Poltorak, chief executive of a patent consultancy called General Patent in Suffern, New York.
"Nokia will be very mindful of Nortel's experience, and I think they are going to do everything they can to monetize their patents," Poltorak says. "They are well aware of the value of their patents, so they are going to accelerate their patent enforcement programs and sell some of their portfolio to raise cash. I am optimistic that is going to work, because Nokia is a very patent-savvy company."
None of this changes the fact that Nokia no longer dominates its industry. The focus is now on the company's endgame. "Nokia has a ton of cash but pretty much a dismal future. Best bet is for someone strategic to buy the whole company—probably its current partner, Microsoft," says Greg Aharonian, editor of a widely read patent newsletter. "Nokia will still die, but it least it can die serenely inside Microsoft."
U.S., Israel developed Flame computer virus to slow Iranian nuclear efforts, officials say
By Ellen Nakashima, Greg Miller and Julie Tate
The United States and Israel jointly developed a sophisticated computer virus nicknamed Flame that collected intelligence in preparation for cyber-sabotage aimed at slowing Iran’s ability to develop a nuclear weapon, according to Western officials with knowledge of the effort.
The massive piece of malware secretly mapped and monitored Iran’s computer networks, sending back a steady stream of intelligence to prepare for a cyberwarfare campaign, according to the officials.
The effort, involving the National Security Agency, the CIA and Israel’s military, has included the use of destructive software such as the Stuxnet virus to cause malfunctions in Iran’s nuclear-enrichment equipment.
The emerging details about Flame provide new clues to what is thought to be the first sustained campaign of cyber-sabotage against an adversary of the United States.
“This is about preparing the battlefield for another type of covert action,” said one former high-ranking U.S. intelligence official, who added that Flame and Stuxnet were elements of a broader assault that continues today. “Cyber-collection against the Iranian program is way further down the road than this.”
Flame came to light last month after Iran detected a series of cyberattacks on its oil industry. The disruption was directed by Israel in a unilateral operation that apparently caught its American partners off guard, according to several U.S. and Western officials who spoke on the condition of anonymity.
There has been speculation that Washington had a role in developing Flame, but the collaboration on the virus between the United States and Israel has not been previously confirmed. Commercial security researchers reported last week that Flame contained some of the same code as Stuxnet. Experts described the overlap as DNA-like evidence that the two sets of malware were parallel projects run by the same entity.
Spokesmen for the CIA, the NSA and the Office of the Director of National Intelligence, as well as the Israeli Embassy in Washington, declined to comment.
The virus is among the most sophisticated and subversive pieces of malware to be exposed to date. Experts said the program was designed to replicate across even highly secure networks, then control everyday computer functions to send secrets back to its creators. The code could activate computer microphones and cameras, log keyboard strokes, take screen shots, extract geolocation data from images, and send and receive commands and data through Bluetooth wireless technology.
Flame was designed to do all this while masquerading as a routine Microsoft software update; it evaded detection for several years by using a sophisticated program to crack an encryption algorithm.
“This is not something that most security researchers have the skills or resources to do,” said Tom Parker, chief technology officer for FusionX, a security firm that specializes in simulating state-sponsored cyberattacks. He said he does not know who was behind the virus. “You’d expect that of only the most advanced cryptomathematicians, such as those working at NSA.”
Conventional plus cyber
Flame was developed at least five years ago as part of a classified effort code-named Olympic Games, according to officials familiar with U.S. cyber-operations and experts who have scrutinized its code. The U.S.-Israeli collaboration was intended to slow Iran’s nuclear program, reduce the pressure for a conventional military attack and extend the timetable for diplomacy and sanctions.
The cyberattacks augmented conventional sabotage efforts by both countries, including inserting flawed centrifuge parts and other components into Iran’s nuclear supply chain.
The best-known cyberweapon let loose on Iran was Stuxnet, a name coined by researchers in the antivirus industry who discovered it two years ago. It infected a specific type of industrial controller at Iran’s uranium-
enrichment plant in Natanz, causing almost 1,000 centrifuges to spin out of control. The damage occurred gradually, over months, and Iranian officials initially thought it was the result of incompetence.
The scale of the espionage and sabotage effort “is proportionate to the problem that’s trying to be resolved,” the former intelligence official said, referring to the Iranian nuclear program. Although Stuxnet and Flame infections can be countered, “it doesn’t mean that other tools aren’t in play or performing effectively,” he said.
To develop these tools, the United States relies on two of its elite spy agencies. The NSA, known mainly for its electronic eavesdropping and code-breaking capabilities, has extensive expertise in developing malicious code that can be aimed at U.S. adversaries, including Iran. The CIA lacks the NSA’s sophistication in building malware but is deeply involved in the cyber-campaign.
The CIA’s Information Operations Center is second only to the agency’s Counterterrorism Center in size. The IOC, as it is known, performs an array of espionage functions, including extracting data from laptops seized in counterterrorism raids. But the center specializes in computer penetrations that require closer contact with the target, such as using spies or unwitting contractors to spread a contagion via a thumb drive.
Both agencies analyze the intelligence obtained through malware such as Flame and have continued to develop new weapons even as recent attacks have been exposed.
Flame’s discovery shows the importance of mapping networks and collecting intelligence on targets as the prelude to an attack, especially in closed computer networks. Officials say gaining and keeping access to a network is 99 percent of the challenge.
“It is far more difficult to penetrate a network, learn about it, reside on it forever and extract information from it without being detected than it is to go in and stomp around inside the network causing damage,” said Michael V. Hayden, a former NSA director and CIA director who left office in 2009. He declined to discuss any operations he was involved with during his time in government.
Years in the making
The effort to delay Iran’s nuclear program using cyber-techniques began in the mid-2000s, during President George W. Bush’s second term. At that point it consisted mainly of gathering intelligence to identify potential targets and create tools to disrupt them. In 2008, the program went operational and shifted from military to CIA control, former officials said.
Despite their collaboration on developing the malicious code, the United States and Israel have not always coordinated their attacks. Israel’s April assaults on Iran’s Oil Ministry and oil-export facilities caused only minor disruptions. The episode led Iran to investigate and ultimately discover Flame.
“The virus penetrated some fields — one of them was the oil sector,” Gholam Reza Jalali, an Iranian military cyber official, told Iranian state radio in May. “Fortunately, we detected and controlled this single incident.”
Some U.S. intelligence officials were dismayed that Israel’s unilateral incursion led to the discovery of the virus, prompting countermeasures.
The disruptions led Iran to ask a Russian security firm and a Hungarian cyber-lab for help, according to U.S. and international officials familiar with the incident.
Last week, researchers with Kaspersky Lab, the Russian security firm, reported their conclusion that Flame — a name they came up with — was created by the same group or groups that built Stuxnet. Kaspersky declined to comment on whether it was approached by Iran.
“We are now 100 percent sure that the Stuxnet and Flame groups worked together,” said Roel Schouwenberg, a Boston-based senior researcher with Kaspersky Lab.
The firm also determined that the Flame malware predates Stuxnet. “It looks like the Flame platform was used as a kickstarter of sorts to get the Stuxnet project going,” Schouwenberg said.
Labels:
cia,
computer virus,
cyber security,
Flame virus,
FusionX,
Internet,
iran,
Israel,
military,
NSA,
nuclear,
security,
sophisticated,
Stuxnet virus,
United States
Robot 'Skin' Built With Touch Superior to Humans
By Stephanie Mlot
Robots may not have a sense of emotional feeling, but thanks to researchers at the University of Southern California's Viterbi School of Engineering, they may soon have the gift of physical feeling.
With the right sensors, actuators, and software, robots can be given the ability to feel, or at least identify materials by touch, the school said.
Researchers today published a study in Frontiers in Neurorobotics said said a specially designed robot built to mimic the human fingertip can actually outperform a living person in identifying a wide range of materials, based on textures.
Biomedical Engineering Professor Gerald Loeb and recently graduated doctoral student Jeremy Fishel created the BioTac, a biologically inspired tactile sensor. With their new technology, the researchers explored the robot hand's ability to distinguish 117 common materials gathered from fabric, stationary, and hardware stores. The robot's 99.6 percent performance rate in correctly discriminating pairs of similar textures was better than most humans would test, according to researchers.
While the machine is good at identifying which textures are similar to each other, Loeb and Fishel said it still can't tell what textures people will prefer. Instead, success in the realm of touch-sensitive robotics could pave the way for advancements in prostheses, personal assistive robots, and consumer product testing, the university's press release said.
More than a one-trick robot, the machine is capable of other human sensations, like discerning where and in which direction forces are applied to the fingertip, and even the thermal properties of an object. Fingerprints on the surface of the BioTac sensor's soft, flexible "skin" enhance its sensitivity to vibration.
What's next —robot tear ducts? Or bionic ear drums?
In 2010, a team of researchers from Cornell University, the University of Chicago, and iRobot discovered a "universal gripper," built out of a balloon and coffee grinds. The basic-science concept enhanced the area of robotics, a University of Chicago physicist said at the time.
Legless man summits Mount Kilimanjaro
The legless Toronto man who was told as a child he would never be a functioning member of society has once again defied the odds, reaching the summit of Africa's highest mountain.
Spencer West made it to the top of Mount Kilimanjaro on Monday, achieving the primary goal of the 8-day trek he and his two friends David Johnson and Alex Meers began on June 12.
In an interview from the mountain in Tanzania Tuesday, West told CTV's Canada AM that despite training for about a year, the experience has proven more difficult than he imagined.
"It was a lot different than I anticipated," West said by telephone, describing the challenge of scrambling up the nearly 6,000-metre mountain on his hands, in his wheelchair and, at times, on the backs of porters.?
"I'll be honest, it was a little difficult," he said. "Number 1, there was a lot of snow at the top. Also my two buddies that were climbing with me actually got hit by massive altitude sickness and I didn't.
"So I ended up supporting them."
West said finally reaching the summit was an unforgettable, indescribable experience.
"By the time I got to the top my hands were numb, my elbows were sore, my shoulders were sore -- but there's something to be said about determination and trying to reach your goal," he explained.
"And for us, we wanted to be this symbol that anything is possible and that we could redefine what's possible for ourselves and maybe for others."
West was born in 1981 with a rare genetic spinal disorder called sacral agenesis. His legs were amputated when he was just five.
But the fact he's only two-feet, seven-inches tall hasn't stopped West from dedicating his life to inspiring others. The Wyoming native now lives in Toronto, where he works full time and travels as a motivational speaker.
His Kilimanjaro mission, dubbed "Redefine Possible," is aiming to raise $750,000 for the charity organization Free the Children's sustainable water initiatives in Kenya.
So far, West said they've raised two-thirds of the target amount.
Subscribe to:
Comments (Atom)




