Here is today's update!

Links and Stuff

Want to contribute?

RSS Feed

Examples of racism/euro-centrism during the Russia-Ukraine conflict

Add to the above list if you can, thank you.


Resources For Understanding The War Beyond The Bulletins


Defense Politics Asia's youtube channel and their map, who is an independent youtuber with a mostly neutral viewpoint.

Moon of Alabama, which tends to have good analysis (though also a couple bad takes here and there)

Understanding War and the Saker: neo-conservative sources but their reporting of the war (so far) seems to line up with reality better than most liberal sources.

On the ground: Patrick Lancaster, an independent journalist reporting in the Ukrainian warzones.

Unedited videos of Russian/Ukrainian press conferences and speeches.


Yesterday's discussion post.


  • Leon_Grotsky [comrade/them]
    hexbear
    17
    2 years ago

    Isn't this the one that also uhhhh... escaped and fucked up alot of computers all over the place?

    • jackal [he/him]
      hexbear
      17
      2 years ago

      Yeah others modified it for attacking other industrial systems:

      The Legacy of Stuxnet

      Although the makers of Stuxnet reportedly programed it to expire in June 2012, and Siemens issued fixes for its PLC software, the legacy of Stuxnet lives on in other malware attacks based on the original code. These “sons of Stuxnet” include:

      • Duqu (2011). Based on Stuxnet code, Duqu was designed to log keystrokes and mine data from industrial facilities, presumably to launch a later attack.
      • Flame (2012). Flame, like Stuxnet, traveled via USB stick. Flame was sophisticated spyware that recorded Skype conversations, logged keystrokes, and gathered screenshots, among other activities. It targeted government and educational organizations and some private individuals mostly in Iran and other Middle Eastern countries.
      • Havex (2013). The intention of Havex was to gather information from energy, aviation, defense, and pharmaceutical companies, among others. Havex malware targeted mainly U.S., European, and Canadian organizations. Industroyer (2016). This targeted power facilities. It’s credited with causing a power outage in the Ukraine in December 2016.
      • Triton (2017). This targeted the safety systems of a petrochemical plant in the Middle East, raising concerns about the malware maker’s intent to cause physical injury to workers.
      • Most recent (2018). An unnamed virus with characteristics of Stuxnet reportedly struck unspecified network infrastructure in Iran in October 2018.

      While ordinary computer users have little reason to worry about these Stuxnet-based malware attacks, they are clearly a major threat to a range of critical industries, including power production, electrical grids, and defense. While extortion is a common goal of virus makers, the Stuxnet family of viruses appears to be more interested in attacking infrastructure.


      • Frank [he/him, he/him]
        hexbear
        6
        2 years ago

        This is funny because it's the same reason that using actual viruses and bacteria in warfare is foolish; once it's in the wild you can't control where it goes next.