Poetslife

10/27/2017

John Vincent Atanasoff Inventor of the Computer


Is there a device more important to everyday living than the personal computer?  Well, did you know the inventor of the personal computer, the Atanasoff Berry Computer (ABC), was John Vincent Atanasoff, and was buried at the Pine Grove Chapel in Mount Airy, MD in 1995?
And that the principles of John Atanasoff's computer are the basis of millions of computers and the information revolution, without which modern society would not exist? The big breakthrough was made by John Atanasoff who abandoned mechanics and designed electronic circuits for calculating by use of a binary system of numbers.
That you do not know may not be an accident given that Atanosoff’s invention plans was stolen from him in 1938 and used by Sperry Univac. He had to sue for years to prove in court that he, and not Sperry Univac, was the true inventor of the personal computer.
In 1937, a professor of mathematics and physics went for a long drive to Illinois during which he conceived several ideas that still change the world. These ideas led Professor John Vincent Atanasoff (together with his PhD assistant Clifford Edward Berry) to invent and build the Atanasoff Berry Computer (ABC), the first DIGITAL electronic computer.
They built it in the basement of the physics building at Iowa State College during 1939–42. He was driven by the need to solve physics problems using long numeric equations.
Among the breakthroughs that John Atanasoff made were the following ideas, all of which he jotted down on a napkin in a tavern.
·         Electricity and electronics, not mechanical methods
·         Binary numbers internally
·         Separate memory made with capacitors, refreshed to maintain 0 or I state
·         Direct 0-1 logic operations, not enumeration
From these ideas, he was able to successfully build the ABC. The ENIAC successor, and all subsequent computers, are based on these ideas.
For memory, the ABC used electrostatic store-drums made up of 1600 capacitors each. These capacitors are used to store a small charge representing the 1, or on, state. The off, or 0, state was represented by no charge. Therefore, binary numbers could be stored onto the drums. This is the first use of the idea now known as DRAM, a modern day technology used in today’s computers.
The ABC was a specific-use computer, designed to solve systems of linear algebraic equations, and was capable of solving systems with up to 29 unknowns. 
What is remarkable about John Atanasoff’s computer is that he created it on his own, with no real financial backing from companies or the government like future projects such as the ENIAC, EDVAC or UNIVAC.
In 1942, John Atanasoff was called on duty and he started a defence-related position in the Naval Ordnance Laboratory in White Oak, MD, as a theoretical physicists to work on various projects related to mines disarming, underwater bombs, and rockets. He participated in the atomic bomb tests at Bikini Atoll n 1946.
Between 1942 and 1966, most of his scientist work was related to the dynamics of sea vessels. He holds patents to over 30 different devices (for a device for capturing and recording seismic sound waves, a post office sorting system, automated systems for package preparation and others).
In 1973, after a Federal patent judge voided a patent owned by Sperry Rand Corp. on ENIAC, the Atanasoff-Berry Computer was credited as the first electronic digital computer. This decision put the invention of the electronic digital computer in the public domain and granted legal recognition to John Atanasoff as the inventor of the first electronic digital computer.
Following World War II, John Atanasoff remained with the government and developed specialized seismographs and microbarographs for long-range explosive detection. In 1952, he founded and led the Ordnance Engineering Corporation, selling the company to Aerojet General Corporation in 1956 and becoming Aerojet's Atlantic Division president. 
In 1960, he and his wife Alice moved to their farm in New Market, MD. In 1961, he started another company, Cybernetics in Frederick that he operated for 20 years. In 1970, John Atanasoff was invited to Bulgaria (his father John emigrated to the U.S. in 1889 at 13 from Bulgaria) by the Bulgarian Academy of Sciences, and the Bulgarian Government conferred to him the Cyrille and Methodius Order of Merit First Class. President George H.W. Bush awarded him the National Medal of Science and Technology in 1990. 
John Atanasoff’s father, Ivan, was a Bulgarian immigrant. On October 4th, 2003 on the 100th birthday of John Atanasoff, Bulgaria named him the “electronic Prometheus” who gave birth to digital computing, and dedicated a monument to him in Sophia, noting that his creation incorporated several major innovations in computing including the use of binary arithmetic, regenerative memory, parallel processing and separation of memory and computing functions.
Inventor of the digital computer, father of the modern computer, WWII war research victory contributor, company founder, husband, father, immigrant’s son…the man who quietly revolutionized the world…and then for years had to defend the theft of his invention from very powerful companies in multiple lawsuits. His life and work contributed mightily to the American Dream. An immigrant’s son who knew genius required grit to succeed. We all, especially everyone who has used a computer, owe him a huge debt of gratitude.
 
Sources:

10/24/2017

When State Hackers Take Aim at the Power Grid

  “To me, the most terrifying form of warfare would be if there was some simultaneous cyber attack on our grid, on the banking system, and on our transportation system. That would be quite a devastating thing, and yet in theory, absent some real protective measures, that could happen.” – Wilbur Ross , U.S. Secretary of Commerce, Senate Commerce, Science and Transportation Committee, Confirmation Hearings,   1/17/2017

 The question is no longer IF hackers will take aim at the power grid.
            They already have. As one example, stories of hackers penetrating our energy sector regularly appear in the news.
            See, for example, “Dragonfly: Western energy sector targeted by sophisticated attack group
Resurgence in energy sector attacks, with the potential for sabotage, linked to re-emergence of Dragonfly cyber espionage group.” (https://www.symantec.com/connect/blogs/dragonfly-western-energy-sector-targeted-sophisticated-attack-group).
            Or, from the New York Times: “Since May [2017], hackers have been penetrating the computer networks of companies that operate nuclear power stations and other energy facilities, as well as manufacturing plants in the United States and other countries. Among the companies targeted was the Wolf Creek Nuclear Operating Corporation, which runs a nuclear power plant near Burlington, Kansas ((July 6, 2017 https://www.nytimes.com/2017/07/06/technology/nuclear-plant-hack-report.html).
            Enter “hacker’s + power grid” into www.duckduckgo.com (unlike the behemoth Google DuckDuckGo will not keep a record of your searches) and see just how this prior abstract danger has become a clear and present one. 
            Unfortunately, the most common meme of a hacker is the one created by Hollywood, usually a smart, gifted if lonely teen in his bedroom with a hankering to explore the deep recesses of the Web. (Think of Matthew Broderick in the movie WarGames.)
            The real world of real hackers is very different.
For example, the Communist Red Chinese have entire divisions in their military devoted to hacking, discovering and exploiting American infrastructure. Their genius is that they pair a hacker criminal, say from Hong Kong, with a disciplined lieutenant colonel from the Red Chinese People’s Liberation Army (PLA). It is a variation on the old option judges would give teens in this country: jail time or join the U.S. Marines.
The Red Chinese version is they give the Chinese national hackers they arrest the option of jail time or — use your hacking skills to advance the superpower ambitions of the Communist Chinese Party.
The Red Chinese learned decades ago it was easier to steal American technology advances to accelerate their economic development in a spectacularly rapid pace. They have continued this strategy in the cyberwar sphere. Their command strategy has as its first tenant the taking down of digital capabilities in the US. Taking out the power grid is a primary tenant of that strategy.  They prefer to take our systems down in a digital manner without dropping one bomb or firing one bullet.
And they are succeeding in their probing until they decide to launch the apocalyptic cyber-attack on our energy grid.
They are not alone. North Korea, Russia, Iran and other nations have the same plans.
“Incidents of foreign network penetration and espionage …conducted by the Chinese government have recently become both more frequent and more clearly attributable to the People’s Liberation Army (PLA) rather than independent nationalist hackers, and 33% of all cyberattacks in the third quarter of 2012 seemingly originated from China.”#
This PLA attack on our critical infrastructure was identified over five years ago and has only increased in the intervening years.
Unfortunately, they are not alone. There are many other nations (Russia, North Korea, Iran, etc.) that have realized the same strategy. And they are probing and penetrating our systems daily. Cybersecurity — the ability to protect or defend the use of cyberspace from cyber-attacks — is a goal that requires many layers, much creativity, and eternal vigilance. Below I list organizations that exercise those skills daily.

What is to be Done

In the world of cybersecurity, given the potential harm that can be done immediately to our entire way of life, the old reactive strategy (Think —Decide—ACT) has been replaced by a proactive strategy (Decide—Act—Think). The Websites below act as the cybersecurity canary in the dark Web mine. To be proactive, you need a proactive toolset. Signs of an impending cyberattack may be identified by such entities before the actual attack starts. The organizations below will be among those who are the first line of defense to that attack.
The good news is we have quiet professionals, cyber security experts, who daily countermand the cyber hackers. They would be the first line of defense were the current probes turn into a complete attack on the power grid. I highlight some of them below.

Who Handles the Hackers — Private Sector

There are numerous private sector companies that handle the day-to-day threat of hacker probes and penetrations of our critical infrastructure.  Were there to be a hacker attack on the power grid, they are the first line of defense. A few are listed below.

Organizations
Description
CyberSecure IPS
Provides protection against critical infrastructure intrusion attempts and dispatches first response teams in real-time.
Palo Alto Software
Software prevention to reduce cybersecurity risk to a manageable degree.
Advanced Persistent Threat (APT) Groups and Operations
The sheet is maintained by a select group of editors and includes data of APT activity by China, Russia, Iran, North Korea, etc.), their tools, operations, and targets.
FireHOL IP Lists
Analyzes security IP feeds to identify cybercrime and malware trends and data analytic tools to track unique IPs.
IBM X-Force Exchange
Exchange threat platform (malicious IP addresses, botnet distributions) with a security intelligence blog and forum for responders to post information on common vulnerabilities.
Malware Check
Monitors URLs for suspicious malware, virus, worm, phishing and other activity by a search engine.
MalwareTech Botnet Tracker
Tracks active botnets by looking at their type, geographic distribution, and unique IPs on a live map that displays every incident and type that has occurred in the past 5 minutes.
Phishtank
Current, community based tracking of domains connected to phishing attacks along with downloadable databases.
SysAdmin, Audit, Network and Security (SANS) Institute Internet Storm Center
Offers data and analysis on future threat hunting trends and malware threats

 Who Handles the Hackers - Government

Just as the private sector has organizations that will be the first line of defense against an attack on the power grid, there are numerous government organizations that handle the day-to-day threat of hacker probes and penetrations of our critical infrastructure. A few are listed below.

Organization
Description
Electricity Subsector
Coordinating Council
(ESCC)
The ESCC serves as the principal liaison between the federal government and the electric power sector, with the mission of coordinating efforts to prepare for national-level incidents or threats to critical infrastructure.
The National Cybersecurity and
Communications Integration Center
(NCCIC)
Part of the Department of Homeland Security that would act as the central command point where the government collects and analyzes data on the impact of any hacker attack on the power grid.
Department of Homeland Security (DHS) AIS (Automated Indicator Sharing)
Automated indicator sharing to help government and private sector entities exchange info on threat indicators.
Supervisory Control and Data
Acquisition Systems
(SCADA)
Software used by manufacturers, nuclear plant operators and pipeline operators to monitor variables to monitor and diagnose unexpected problems, such as a hacker attack.
The United States House
Permanent Select Committee
on Intelligence (HPSCI)
https://intelligence.house. gov/cyber/
Cyber criminals, often supported by hostile governments, are increasing their attacks on U.S. networks and American businesses. The HPSCI acts to mitigate this growing problem.
The National Security
 Agency  (NSA)
Part of the US Department of Defense, under the authority of the Director of National Intelligence that protect U.S. communications networks and IT systems.
The North American Electric Reliability Corporation (NERC) https://www.ferc.gov/industries/ electric/indus-act/reliability/cybersecurity.asp
Regulatory authority that assures the reliability and security of the bulk power system in North America.
U.S. Security and
Exchanges Commission (SEC)
Identifies and manages cybersecurity risks and ensures that market participants — including issuers, intermediaries, investors and government authorities.
National Institute of
Science and Technology  (NIST)
Practical, innovative security technologies and methodologies that enhance the country’s ability to address current and future computer and information security.

Fortunately, everyday there are highly gifted, very creative, and extremely skilled cybersecurity and engineering experts manning the protective firewalls of the cloud and network-based data systems in this nation. I know because I’ve worked with them.
They are well aware of the challenge. They know their duty. They are quiet professionals as important as the Special Forces quiet professionals we depend on every day.
And they deserve the same level of respect, resources and support.

#James Dohnert, ‘Akamai study finds a third of all cyber-attacks originate from China’, V3.co.uk, 25 January 2013, http://www.v3.co.uk/v3-uk/news/2238996/akamai-studyfinds-a-third-of-all-cyber-attacks-originate-from-china.

9/28/2017

Emergency Preparedness Expo


On September 23, 2017 I attended the Carroll County Emergency Preparedness Expo. It was hosted by the Carroll County Department of Public Safety.

There were police, emergency medical services, public safety, fire companies, electric companies, and static displays. The photos  provide a good representation of who participated.
Given the state of the world and the current threat matrix, every community should host an emergency preparedness like this once a year. 

Facebook: To keep up with Carroll County Emergency Preparedness on Facebook, go to: facebook.com/CarrCOMDPubSafeTwitter. 

To connect on Twitter, use: @CarrCOMDPubSafe.

The Responder Safety Institute serves as an informal advisory panel of public safety leaders committed to reducing deaths and injuries to America's Emergency Responders. They represent the best of American volunteerism aimed at saving lives through education. Visit their website: http://www.respondersafety.com/

Preparedness App: To download an iPhone or Android app by the Carroll County MD Emergency Management Department,  search Prepare Me Carroll.

























9/18/2017

Shelter from NBC or EMP


Update...OMG....The U.S. Government is finally waking up to the EMP threat after ignoring it for 70 years. Read about their sudden awaking here. I provided an Applied Physics Laboratory scientist with a variety of EMP background from TACDA and my personal files. Maybe some made it to this hearing. Read the PDF of the hearing here.
For one analysis of the effect of EMP on the US, see here.
Since 1986, Utah Shelter Systems has been America's leading builder of shelters for nuclear, biological, and chemical (NBC) and by extension, electromagnetic pulse (EMP) attack. They have been at this for decades, unlike the fly-by-night nuclear survival companies that have sprung up lately. Five years ago, Paul Seyfried (the owner of Utah Shelter Systems) did this podcast on this subject. What he says here is even more relevant.

EPISODE-743- PAUL SEYFRIED ON NBC UNDERGROUND SHELTER CONSTRUCTION


Utah Shelter Sytemes
Today we are joined by Paul Seyfried, President of Utah Shelter Systems. Paul has been building shelters since 1986, and incorporated Utah Shelter Systems in 1998 along with his partner, Sharon Packer.
Utah Shelter Systems shelters can be constructed of either corrugated steel or steel plate and can withstand blasts up to the 150 psi range.  The shelters are manufactured in North Salt Lake, Utah and transported throughout the entire United States and Canada.
Paul joins us today to discuss civil defense in the US and in other nations, the continued threat of nuclear war, chemical attack and biological weapons.  He also explains the value of shelters for storm protection, storing supplies and more.  Shelters seem like an “extreme prep” to many but today we take a balanced view of their practical applications.
Join us today as Paul Answers Questions Such As…
  • Why build a shelter now, that the Cold War is “over”?
  • What are the main criteria for a proper shelter?
  • What can shelters do other than protect you in a NBC attack?
  • Why does Switzerland continue to build 100s of shelters monthly?
  • Why did the U.S. choose not to build shelters?
  • What other countries have shelter programs for civilians?
  • What are some current nuclear threats including EMP?
  • What are some current chemical weapons threats?
  • What are some current bio weapons threats?
  • What is the cost of a fully installed shelter?
  • What are some ways people can save cost or self build?
  • What is the best type of door for a shelter?
  • What equipment do you need for air handling?
The Swiss are the best in the world at building and using shelters. Find details here. And a brief discussion of the history of the nuclear threat may be found here.


9/08/2017

How to Prepare for Natural Disasters

There are multiple ways you can prepare for natural disasters. For example, the Volunteer Mobilization Center Floor Plan to the left was developed after the lessons of many hurricanes in Florida.
It is an efficient way to vet people with skills (tree trimmers, nurses, first responders) from the curios and criminal. It is a good way to get personnel with necessary skills out to the disaster site and preventing those who are not skilled or who have criminal intent.
The greatest lesson of preparing for any natural disaster is to do the work BEFORE they arrive. For example, store enough water to make it through two weeks (Waterbricks).
Here are some resources to help you do so.
Protect Your Home
Prepare Your Home for a Hurricane
Prepare Your Home for a Tornado
Tornado Safety and Technology
Mike Smith, Meteorologist, Scientist, Weatherman
Creative Disaster Preparedness Checklist
Prepare, Power, Kids Zone
Why Prepare: Scenes from Hurricane Irma
Why Meteorologist Matter