ashar

joined 1 year ago
MODERATOR OF
[–] ashar@infosec.pub 37 points 2 days ago (1 children)

The 40,000 killed statistic is reliable in that the killed persons name, identity number etc are reported to MoH officials and recorded by them, and the dead are seen by the officials. However the figure is a small subset of the actual number dead. 200,000 to 300,000 dead in Gaza in the past year is a conservative estimate.

[–] ashar@infosec.pub 2 points 3 days ago

The Economist had a good (probably unintentional) illustration of this.

[–] ashar@infosec.pub 1 points 3 days ago (1 children)

The killing according to the Gaza Ministry of Health statistics seems to be slowing down, but this is because the MoH is maintaining a very high bar for recording the deaths. The attacks on the population is continuing at what seems to be the same rate.

from: https://www.dropsitenews.com/p/how-gaza-health-ministry-counts-dead "The Ministry of Health is committed to registering only those who reach its hospitals or other emergency medical care facilities in the Gaza Strip. Consequently, the number of martyrs announced by the ministry does not necessarily represent the total number of casualties but only those that have been officially documented."

Given that state of the hospitals is dire (they have all been bombed and attacked), the slow down in recording of deaths correlates with and is due to the destruction of the MoH and general civilian infrastructure. The reduction in rate of killing recorded does not align with the rate of actual killing.

[–] ashar@infosec.pub 1 points 3 days ago (1 children)

Also, have you ever wondered why South Africa of all countries brought the case to the ICJ? Probably because they are deeply offended by the Israeli apartheid and they are even more against genocide?

Do you think it has anything to do with the fact that they entertained Hamas leaders as visiting dignitaries a month before they submitted the case? Um, yes. Why would they not do this?

Ah, you classify Hamas as a terrorist organisation.... Since South Africa regards Hamas to be a resistance movement (and this is the position of most of the world), coordinating with them would be sensible.

 

Utah’s Premiere Cyber Security Conference

October 22-25, 2024

Utah Valley Convention Center — Provo, Utah

SAINTCON 2024 Schedule

SAINTCON 2024 Livestreams

[–] ashar@infosec.pub 4 points 3 days ago (3 children)

Sir, your president is quoted in the genocide case (South Africa vs Israel) as one of the inciters to genocide.

 

An analysis of the MoH methodology, the exacerbating challenges it faces as the war continues, and estimates from independent researchers and humanitarian

https://dataactivists.org/estimating_death_toll_of_war_on_gaza/

[–] ashar@infosec.pub 10 points 5 days ago (2 children)

I wonder why Israel does not allow journalists into Gaza and has killed more than 170 Palestinian journalists?

 

An analysis of the Gaza MoH methodology, the exacerbating challenges it faces as the war continues, and estimates from independent researchers and humanitarian organisations.

 

An analysis of the MoH methodology, the exacerbating challenges it faces as the war continues, and estimates from independent researchers and humanitarian organisations.

https://dataactivists.org/estimating_death_toll_of_war_on_gaza/

4
submitted 1 week ago* (last edited 13 hours ago) by ashar@infosec.pub to c/security_cpe@infosec.pub
 

Schedule

Live Stream Track 1

The Track 2 audio is difficult to understand and the video shows the presentation very badly. Live Stream Track 2

Live Stream Track 3

[–] ashar@infosec.pub 13 points 1 week ago

See Brexit. That was to leave but same principle.

[–] ashar@infosec.pub 3 points 1 week ago

Are you actually saying that Sinwar's strategy paid off?

[–] ashar@infosec.pub 1 points 1 week ago

No, it would be war squared.

Or maybe war(war());

[–] ashar@infosec.pub 8 points 2 weeks ago

This is sort of report you get from a reporter under military censorship.

 

This lecture given onsite at MIT Lincoln Laboratory on 25 April 1985 coveres many salient points still relevent today.

Rear Admiral Grace Hopper's famous MIT Lecture

Grace Brewster Hopper (née Murray; December 9, 1906 – January 1, 1992) was an American computer scientist, mathematician, and United States Navy rear admiral.[1] She was a pioneer of computer programming. Hopper was the first to devise the theory of machine-independent programming languages, and used this theory to develop the FLOW-MATIC programming language and COBOL, an early high-level programming language still in use today. She was also one of the first programmers on the Harvard Mark I computer. She is credited with writing the first computer manual, "A Manual of Operation for the Automatic Sequence Controlled Calculator."

Before joining the Navy, Hopper earned a Ph.D. in both mathematics and mathematical physics from Yale University and was a professor of mathematics at Vassar College. She left her position at Vassar to join the United States Navy Reserve during World War II. Hopper began her computing career in 1944 as a member of the Harvard Mark I team, led by Howard H. Aiken. In 1949, she joined the Eckert–Mauchly Computer Corporation and was part of the team that developed the UNIVAC I computer. At Eckert–Mauchly she managed the development of one of the first COBOL compilers.

1
HOU.SEC.CON. 2024 (www.houstonseccon.com)
3
submitted 2 weeks ago* (last edited 2 weeks ago) by ashar@infosec.pub to c/security_cpe@infosec.pub
[–] ashar@infosec.pub 3 points 3 weeks ago

What sort of army does not fight against an invading force? Is this why Hezbollah exists?

 

Podcast

Why Aren't More Defenders Winning? Defender’s Advantage and How to Gain it!

Guest: Dan Nutting, Manager - Cyber Defense, Google Cloud

Topics:

What is the Defender’s Advantage and why did Mandiant decide to put this out there?

This is the second edition. What is different about DA-II?

Why do so few defenders actually realize their Defender’s Advantage?

The book talks about the importance of being "intelligence-led" in cyber defense. Can you elaborate on what this means and how organizations can practically implement this approach?

Detection engineering is presented as a continuous cycle of adaptation. How can organizations ensure their detection capabilities remain effective and avoid fatigue in their SOC?

Many organizations don’t seem to want to make detections at all, what do we tell them?

What is this thing called “Mission Control”- it sounds really cool, can you explain it?

Resources:

Defender’s Advantage book

The Defender's Advantage: Using Artificial Intelligence in Cyber Defense supplemental paper

[–] ashar@infosec.pub 50 points 1 month ago (1 children)

Sending out IEDs that will probably explode in a supermarket and kill civilians is generally considered a war crime. So far 2 kids killed in Beirut by the Israeli bombs in devices.

view more: next ›