<article>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#article09_11_21_0238253</id>
	<title>Cyber Attacks On US Military Jump Sharply In 2009</title>
	<author>Soulskill</author>
	<datestamp>1258830120000</datestamp>
	<htmltext><a href="http://www.goodgearguide.com.au/" rel="nofollow">angry tapir</a> writes <i>"Cyber attacks on the US Department of Defense &mdash; many of them coming from China &mdash; have jumped sharply in 2009, a US congressional committee has reported. Citing data provided by the US Strategic Command, the US-China Economic and Security Review Commission said that <a href="http://www.pcworld.idg.com.au/article/327075">there were 43,785 malicious cyber incidents</a> targeting Defense systems in the first half of the year. That's a big jump. In all of 2008, there were 54,640 such incidents. If cyber attacks maintain this pace, the yearly increase will be around 60 percent. The <a href="http://www.uscc.gov/annual\_report/2009/annual\_report\_full\_09.pdf">full report</a> (PDF) is available online."</i></htmltext>
<tokenext>angry tapir writes " Cyber attacks on the US Department of Defense    many of them coming from China    have jumped sharply in 2009 , a US congressional committee has reported .
Citing data provided by the US Strategic Command , the US-China Economic and Security Review Commission said that there were 43,785 malicious cyber incidents targeting Defense systems in the first half of the year .
That 's a big jump .
In all of 2008 , there were 54,640 such incidents .
If cyber attacks maintain this pace , the yearly increase will be around 60 percent .
The full report ( PDF ) is available online .
"</tokentext>
<sentencetext>angry tapir writes "Cyber attacks on the US Department of Defense — many of them coming from China — have jumped sharply in 2009, a US congressional committee has reported.
Citing data provided by the US Strategic Command, the US-China Economic and Security Review Commission said that there were 43,785 malicious cyber incidents targeting Defense systems in the first half of the year.
That's a big jump.
In all of 2008, there were 54,640 such incidents.
If cyber attacks maintain this pace, the yearly increase will be around 60 percent.
The full report (PDF) is available online.
"</sentencetext>
</article>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30182770</id>
	<title>Nope. You are not targeted</title>
	<author>WindBourne</author>
	<datestamp>1258795380000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>3</modscore>
	<htmltext>You are simply the result of the many worms working its way through the net. All Western DOD's are under attack and are actively targeted.</htmltext>
<tokenext>You are simply the result of the many worms working its way through the net .
All Western DOD 's are under attack and are actively targeted .</tokentext>
<sentencetext>You are simply the result of the many worms working its way through the net.
All Western DOD's are under attack and are actively targeted.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30182610</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30190372</id>
	<title>Re:A New Approach: Bait and Strike</title>
	<author>Anonymous</author>
	<datestamp>1258817280000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext>We've already done that.

<p>Best regards,</p><p>The NSA</p></htmltext>
<tokenext>We 've already done that .
Best regards,The NSA</tokentext>
<sentencetext>We've already done that.
Best regards,The NSA</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30182612</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30183332</id>
	<title>Who can say? This doesn't tell us anything!</title>
	<author>Doches</author>
	<datestamp>1258806300000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Neither! This data is statistically useless -- what we need to know is how many attacks occurred in the first half of 2008, otherwise the comparison is completely useless.

Look at it this way: what if (due to some outside factor) the vast majority of cyber attacks occur in the first half of the year? We know <em>nothing</em> about the distribution of attacks over time, and so we can draw no conclusions from this report! </p><p>I hate it when people misuse statistics...</p></htmltext>
<tokenext>Neither !
This data is statistically useless -- what we need to know is how many attacks occurred in the first half of 2008 , otherwise the comparison is completely useless .
Look at it this way : what if ( due to some outside factor ) the vast majority of cyber attacks occur in the first half of the year ?
We know nothing about the distribution of attacks over time , and so we can draw no conclusions from this report !
I hate it when people misuse statistics.. .</tokentext>
<sentencetext>Neither!
This data is statistically useless -- what we need to know is how many attacks occurred in the first half of 2008, otherwise the comparison is completely useless.
Look at it this way: what if (due to some outside factor) the vast majority of cyber attacks occur in the first half of the year?
We know nothing about the distribution of attacks over time, and so we can draw no conclusions from this report!
I hate it when people misuse statistics...</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30182618</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30182572</id>
	<title>chicken feed</title>
	<author>Anonymous</author>
	<datestamp>1258834500000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>2</modscore>
	<htmltext><blockquote><div><p>"The cost of such attacks is significant," the report notes. Citing data from the Joint Task Force-Global Network Operations, the report says that the military spent $100 million to fend off these attacks between September 2008 and March 2009</p></div></blockquote><p> That's a lot of money... That's almost 8 full hours of what is being spent on Iraq.</p></div>
	</htmltext>
<tokenext>" The cost of such attacks is significant , " the report notes .
Citing data from the Joint Task Force-Global Network Operations , the report says that the military spent $ 100 million to fend off these attacks between September 2008 and March 2009 That 's a lot of money... That 's almost 8 full hours of what is being spent on Iraq .</tokentext>
<sentencetext>"The cost of such attacks is significant," the report notes.
Citing data from the Joint Task Force-Global Network Operations, the report says that the military spent $100 million to fend off these attacks between September 2008 and March 2009 That's a lot of money... That's almost 8 full hours of what is being spent on Iraq.
	</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30185742</id>
	<title>U asked "what are we going to do about it?", Ok</title>
	<author>Anonymous</author>
	<datestamp>1258827900000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><div class="quote"><p><b>"Now, with a broken economy, we appear weak, and we invite ridicule and attack. Clever bandaids added to firewalls will make little difference long term. We need to regain strength and respect. This is not just a technical problem. Our recent administrations (Republicrats and Demopublican alike) through suicidal short-sighted policies aimed only to benefit a few fat cats have made us an easy target. Such is the fate of a fallen giant. Everyone wants to kick him. After all, what are we going to do about it?</b> - by hwyhobo (1420503) on Saturday November 21, @02:25AM (#30182594)</p></div><p>"What are we going to do about it?"... OK, here goes:</p><p><b>This is what I decided to do about it in the URL below</b> (which was spread around the information on how to stop such attacks, albeit, MOSTLY for the "end/home user" types, because imo @ experience, they're the ones most likely to get "victimized" by botnets &amp;/or worms, which get used in said attacks on this nation, &amp; yes, other nations too (&amp; network engineers/techs/admins?? They KNOW most of this stuff, so it's NOT "geared to them", but rather the folks that do NOT know this stuff, to help them not get "used or abused" by such machinations online, today):</p><p><b>HOW TO SECURE Windows 2000/XP/Server 2003/VISTA/Windows Server 2008/Windows 7, via CIS Tool Guidance</b> (&amp; beyond):</p><p>----</p><p><a href="http://www.tcmagazine.com/forums/index.php?s=103a842315186ac9fda403081a79b7d8&amp;showtopic=2662" title="tcmagazine.com" rel="nofollow">http://www.tcmagazine.com/forums/index.php?s=103a842315186ac9fda403081a79b7d8&amp;showtopic=2662</a> [tcmagazine.com]</p><p>----</p><p>And, it works... how well, or some testimonial proof thereof?? Ok:</p><p>----</p><p><a href="http://www.xtremepccentral.com/forums/showthread.php?t=28430&amp;page=3" title="xtremepccentral.com" rel="nofollow">http://www.xtremepccentral.com/forums/showthread.php?t=28430&amp;page=3</a> [xtremepccentral.com]</p><p>People such as THRONKA @ XtremePCCentral.com here stated, verbatim by he:</p><p>"Its 2009 - still trouble free! I was told last week by a co worker who does active directory administration, and he said I was doing overkill. I told him yes, but I just eliminated the half life in windows that you usually get. He said good point. So from 2008 till 2009. No speed decreases, its been to a lan party, moved around in a move, and it still NEVER has had the OS reinstalled besides the fact I imaged the drive over in 2008. Great stuff!"</p><p>----</p><p>This is the best I can do, &amp; hopefully, it "gets around" (&amp;, not just to U.S. Citizenry, but to EVERYONE who uses the internet (because I think it's the "8th wonder of the world" &amp; because I think that we're on the verge of really truly GREAT THINGS))!</p><p>(Great things, such as the ion drive, as 1 example thereof only)</p><p>I feel that way, especially IF we don't "blow ourselves up" in say, a stupid war or if we manufacture some deadly disease &amp; screw up that way, or even with a meteor/asteroid hitting us (not much control over that though)...</p><p>One BIG part of that? The internet, &amp; spots like this one online!</p><p>The internet's the gateway &amp; means to exchange such information, so we can progress, based on the information exchanges it allows &amp; yields... so, it's worth protecting!</p><p>(AND, for everyone, not just U.S. Citizenry only... imo @ least! I say that, simply because of that line of reasoning I am putting out &amp; that the internet is made up of people from EVERYWHERE exchanging ideas, &amp; that guide's the very best I can do/am capable of, so that hopefully happens &amp; keeps running smoothly, instead of becoming a warzone of "zombied/enslaved" systems making war on one another &amp; tying the damned internet in knots because of the misguided freaks + criminals who create such machinations)</p><p>That guide functions very well with great results such as those above noted in testimonial via quote excerpt of such said results, successfully thusfar to the tune of over 250,000++ views over a 1.5 yr. timeframe (&amp; originated in 1997-2002 as "Article #1" @ NTCompatible.com, &amp; other sites that are very WELL TRAVELLED, such as Neowin, picked up on the older model &amp; rated it quite highly here in 2001 -&gt;   as proof to my statement above, &amp; the guide you see in the 1st URL above is merely the outgrowth/extension/evolution of that original guide I just posted), often being rated "5/5 stars", or made an "Essential Guide", &amp;/or being made a "Sticky/Pinned Thread" on forums, etc., et al...</p><p>(I did that because I asked the SAME QUESTION YOU ASKED that I quote from you above to open this post with, especially your last words, &amp; alongside the efforts of many others who feel the same way, and as "Rorschach" from "The Watchmen" put it, this is why:</p><p>"We don't do this THING, because it's permitted... we do it because we have to. We do it because we're compelled"</p><p>Because you DO get rather sick &amp; tired of being victimized, losing work, getting your system destroyed (costs money to redo it if you don't know how to yourself) &amp; worst of all, being RIPPED OFF for your monies (goes on rampantly nowadays online)).</p><p>I'm far from alone, I just do so alongside many others, &amp; we all use the same basic means to helps others in this reqard (security online), &amp; to keep things going smoothly for all concerned online, as best we can, by spreading around what works to others (again - to keep them safer &amp; yes even F A S T E R too as a bonus, online).</p><p>Anyhow... there you are.</p><p>The internet helps me to function in life daily, learn, and do my jobs/tasks etc. et al better as well, because of access to information &amp; others to exchange ideas with... as I am sure it does others. There are, however, idiots that seem to NOT want it to be so, &amp; the ONLY GOOD THING THEY DO (whether they realize this, or not)? Is that they DO point out places &amp; things in our softwares, Operating Systems, &amp; critical telecommunications infrastructure, that need "shoring up" (trying to "make lemonade from lemons"  in that last statement is all (optimist here)).</p><p>I just hope I expressed myself clearly &amp; well enough, for others to undertand what I meant here in response to you, this Saturday a.m. is all (bit "hungover" today, admittedly, from a combined "celebration" of my doing well in my "return to academia" this semester, &amp; helping a pal get thru some "women problems" he's having with his lady... lots of drink last nite, lol, in other words (rare for me, but it was such an occasion, so... again, hope my point came thru clearly enough)</p><p>APK</p><p>P.S.=&gt; So, "bottom-line" here/reiterating my point? That was what I decided to do about it... per your last statement quoted above!</p><p>(And, hey -  I figure that there are/were worse things I could do with my time, so, why not "do something about it" as your statement I quoted noted, &amp; there you are... &amp; once more/again - I am not alone in it either, far from it (the community online tends to largely take care of itself I have found, as another aside, &amp; especially when things get "bogged down" in legislation by "lobbyists &amp; 'special interest groups'" (many times who are NOT out for the "genereal good" imo))... apk</p></div>
	</htmltext>
<tokenext>" Now , with a broken economy , we appear weak , and we invite ridicule and attack .
Clever bandaids added to firewalls will make little difference long term .
We need to regain strength and respect .
This is not just a technical problem .
Our recent administrations ( Republicrats and Demopublican alike ) through suicidal short-sighted policies aimed only to benefit a few fat cats have made us an easy target .
Such is the fate of a fallen giant .
Everyone wants to kick him .
After all , what are we going to do about it ?
- by hwyhobo ( 1420503 ) on Saturday November 21 , @ 02 : 25AM ( # 30182594 ) " What are we going to do about it ? " .. .
OK , here goes : This is what I decided to do about it in the URL below ( which was spread around the information on how to stop such attacks , albeit , MOSTLY for the " end/home user " types , because imo @ experience , they 're the ones most likely to get " victimized " by botnets &amp;/or worms , which get used in said attacks on this nation , &amp; yes , other nations too ( &amp; network engineers/techs/admins ? ?
They KNOW most of this stuff , so it 's NOT " geared to them " , but rather the folks that do NOT know this stuff , to help them not get " used or abused " by such machinations online , today ) : HOW TO SECURE Windows 2000/XP/Server 2003/VISTA/Windows Server 2008/Windows 7 , via CIS Tool Guidance ( &amp; beyond ) : ----http : //www.tcmagazine.com/forums/index.php ? s = 103a842315186ac9fda403081a79b7d8&amp;showtopic = 2662 [ tcmagazine.com ] ----And , it works... how well , or some testimonial proof thereof ? ?
Ok : ----http : //www.xtremepccentral.com/forums/showthread.php ? t = 28430&amp;page = 3 [ xtremepccentral.com ] People such as THRONKA @ XtremePCCentral.com here stated , verbatim by he : " Its 2009 - still trouble free !
I was told last week by a co worker who does active directory administration , and he said I was doing overkill .
I told him yes , but I just eliminated the half life in windows that you usually get .
He said good point .
So from 2008 till 2009 .
No speed decreases , its been to a lan party , moved around in a move , and it still NEVER has had the OS reinstalled besides the fact I imaged the drive over in 2008 .
Great stuff !
" ----This is the best I can do , &amp; hopefully , it " gets around " ( &amp; , not just to U.S. Citizenry , but to EVERYONE who uses the internet ( because I think it 's the " 8th wonder of the world " &amp; because I think that we 're on the verge of really truly GREAT THINGS ) ) !
( Great things , such as the ion drive , as 1 example thereof only ) I feel that way , especially IF we do n't " blow ourselves up " in say , a stupid war or if we manufacture some deadly disease &amp; screw up that way , or even with a meteor/asteroid hitting us ( not much control over that though ) ...One BIG part of that ?
The internet , &amp; spots like this one online ! The internet 's the gateway &amp; means to exchange such information , so we can progress , based on the information exchanges it allows &amp; yields... so , it 's worth protecting !
( AND , for everyone , not just U.S. Citizenry only... imo @ least !
I say that , simply because of that line of reasoning I am putting out &amp; that the internet is made up of people from EVERYWHERE exchanging ideas , &amp; that guide 's the very best I can do/am capable of , so that hopefully happens &amp; keeps running smoothly , instead of becoming a warzone of " zombied/enslaved " systems making war on one another &amp; tying the damned internet in knots because of the misguided freaks + criminals who create such machinations ) That guide functions very well with great results such as those above noted in testimonial via quote excerpt of such said results , successfully thusfar to the tune of over 250,000 + + views over a 1.5 yr. timeframe ( &amp; originated in 1997-2002 as " Article # 1 " @ NTCompatible.com , &amp; other sites that are very WELL TRAVELLED , such as Neowin , picked up on the older model &amp; rated it quite highly here in 2001 - &gt; as proof to my statement above , &amp; the guide you see in the 1st URL above is merely the outgrowth/extension/evolution of that original guide I just posted ) , often being rated " 5/5 stars " , or made an " Essential Guide " , &amp;/or being made a " Sticky/Pinned Thread " on forums , etc. , et al... ( I did that because I asked the SAME QUESTION YOU ASKED that I quote from you above to open this post with , especially your last words , &amp; alongside the efforts of many others who feel the same way , and as " Rorschach " from " The Watchmen " put it , this is why : " We do n't do this THING , because it 's permitted... we do it because we have to .
We do it because we 're compelled " Because you DO get rather sick &amp; tired of being victimized , losing work , getting your system destroyed ( costs money to redo it if you do n't know how to yourself ) &amp; worst of all , being RIPPED OFF for your monies ( goes on rampantly nowadays online ) ) .I 'm far from alone , I just do so alongside many others , &amp; we all use the same basic means to helps others in this reqard ( security online ) , &amp; to keep things going smoothly for all concerned online , as best we can , by spreading around what works to others ( again - to keep them safer &amp; yes even F A S T E R too as a bonus , online ) .Anyhow... there you are.The internet helps me to function in life daily , learn , and do my jobs/tasks etc .
et al better as well , because of access to information &amp; others to exchange ideas with... as I am sure it does others .
There are , however , idiots that seem to NOT want it to be so , &amp; the ONLY GOOD THING THEY DO ( whether they realize this , or not ) ?
Is that they DO point out places &amp; things in our softwares , Operating Systems , &amp; critical telecommunications infrastructure , that need " shoring up " ( trying to " make lemonade from lemons " in that last statement is all ( optimist here ) ) .I just hope I expressed myself clearly &amp; well enough , for others to undertand what I meant here in response to you , this Saturday a.m. is all ( bit " hungover " today , admittedly , from a combined " celebration " of my doing well in my " return to academia " this semester , &amp; helping a pal get thru some " women problems " he 's having with his lady... lots of drink last nite , lol , in other words ( rare for me , but it was such an occasion , so... again , hope my point came thru clearly enough ) APKP.S. = &gt; So , " bottom-line " here/reiterating my point ?
That was what I decided to do about it... per your last statement quoted above !
( And , hey - I figure that there are/were worse things I could do with my time , so , why not " do something about it " as your statement I quoted noted , &amp; there you are... &amp; once more/again - I am not alone in it either , far from it ( the community online tends to largely take care of itself I have found , as another aside , &amp; especially when things get " bogged down " in legislation by " lobbyists &amp; 'special interest groups ' " ( many times who are NOT out for the " genereal good " imo ) ) ... apk</tokentext>
<sentencetext>"Now, with a broken economy, we appear weak, and we invite ridicule and attack.
Clever bandaids added to firewalls will make little difference long term.
We need to regain strength and respect.
This is not just a technical problem.
Our recent administrations (Republicrats and Demopublican alike) through suicidal short-sighted policies aimed only to benefit a few fat cats have made us an easy target.
Such is the fate of a fallen giant.
Everyone wants to kick him.
After all, what are we going to do about it?
- by hwyhobo (1420503) on Saturday November 21, @02:25AM (#30182594)"What are we going to do about it?"...
OK, here goes:This is what I decided to do about it in the URL below (which was spread around the information on how to stop such attacks, albeit, MOSTLY for the "end/home user" types, because imo @ experience, they're the ones most likely to get "victimized" by botnets &amp;/or worms, which get used in said attacks on this nation, &amp; yes, other nations too (&amp; network engineers/techs/admins??
They KNOW most of this stuff, so it's NOT "geared to them", but rather the folks that do NOT know this stuff, to help them not get "used or abused" by such machinations online, today):HOW TO SECURE Windows 2000/XP/Server 2003/VISTA/Windows Server 2008/Windows 7, via CIS Tool Guidance (&amp; beyond):----http://www.tcmagazine.com/forums/index.php?s=103a842315186ac9fda403081a79b7d8&amp;showtopic=2662 [tcmagazine.com]----And, it works... how well, or some testimonial proof thereof??
Ok:----http://www.xtremepccentral.com/forums/showthread.php?t=28430&amp;page=3 [xtremepccentral.com]People such as THRONKA @ XtremePCCentral.com here stated, verbatim by he:"Its 2009 - still trouble free!
I was told last week by a co worker who does active directory administration, and he said I was doing overkill.
I told him yes, but I just eliminated the half life in windows that you usually get.
He said good point.
So from 2008 till 2009.
No speed decreases, its been to a lan party, moved around in a move, and it still NEVER has had the OS reinstalled besides the fact I imaged the drive over in 2008.
Great stuff!
"----This is the best I can do, &amp; hopefully, it "gets around" (&amp;, not just to U.S. Citizenry, but to EVERYONE who uses the internet (because I think it's the "8th wonder of the world" &amp; because I think that we're on the verge of really truly GREAT THINGS))!
(Great things, such as the ion drive, as 1 example thereof only)I feel that way, especially IF we don't "blow ourselves up" in say, a stupid war or if we manufacture some deadly disease &amp; screw up that way, or even with a meteor/asteroid hitting us (not much control over that though)...One BIG part of that?
The internet, &amp; spots like this one online!The internet's the gateway &amp; means to exchange such information, so we can progress, based on the information exchanges it allows &amp; yields... so, it's worth protecting!
(AND, for everyone, not just U.S. Citizenry only... imo @ least!
I say that, simply because of that line of reasoning I am putting out &amp; that the internet is made up of people from EVERYWHERE exchanging ideas, &amp; that guide's the very best I can do/am capable of, so that hopefully happens &amp; keeps running smoothly, instead of becoming a warzone of "zombied/enslaved" systems making war on one another &amp; tying the damned internet in knots because of the misguided freaks + criminals who create such machinations)That guide functions very well with great results such as those above noted in testimonial via quote excerpt of such said results, successfully thusfar to the tune of over 250,000++ views over a 1.5 yr. timeframe (&amp; originated in 1997-2002 as "Article #1" @ NTCompatible.com, &amp; other sites that are very WELL TRAVELLED, such as Neowin, picked up on the older model &amp; rated it quite highly here in 2001 -&gt;   as proof to my statement above, &amp; the guide you see in the 1st URL above is merely the outgrowth/extension/evolution of that original guide I just posted), often being rated "5/5 stars", or made an "Essential Guide", &amp;/or being made a "Sticky/Pinned Thread" on forums, etc., et al...(I did that because I asked the SAME QUESTION YOU ASKED that I quote from you above to open this post with, especially your last words, &amp; alongside the efforts of many others who feel the same way, and as "Rorschach" from "The Watchmen" put it, this is why:"We don't do this THING, because it's permitted... we do it because we have to.
We do it because we're compelled"Because you DO get rather sick &amp; tired of being victimized, losing work, getting your system destroyed (costs money to redo it if you don't know how to yourself) &amp; worst of all, being RIPPED OFF for your monies (goes on rampantly nowadays online)).I'm far from alone, I just do so alongside many others, &amp; we all use the same basic means to helps others in this reqard (security online), &amp; to keep things going smoothly for all concerned online, as best we can, by spreading around what works to others (again - to keep them safer &amp; yes even F A S T E R too as a bonus, online).Anyhow... there you are.The internet helps me to function in life daily, learn, and do my jobs/tasks etc.
et al better as well, because of access to information &amp; others to exchange ideas with... as I am sure it does others.
There are, however, idiots that seem to NOT want it to be so, &amp; the ONLY GOOD THING THEY DO (whether they realize this, or not)?
Is that they DO point out places &amp; things in our softwares, Operating Systems, &amp; critical telecommunications infrastructure, that need "shoring up" (trying to "make lemonade from lemons"  in that last statement is all (optimist here)).I just hope I expressed myself clearly &amp; well enough, for others to undertand what I meant here in response to you, this Saturday a.m. is all (bit "hungover" today, admittedly, from a combined "celebration" of my doing well in my "return to academia" this semester, &amp; helping a pal get thru some "women problems" he's having with his lady... lots of drink last nite, lol, in other words (rare for me, but it was such an occasion, so... again, hope my point came thru clearly enough)APKP.S.=&gt; So, "bottom-line" here/reiterating my point?
That was what I decided to do about it... per your last statement quoted above!
(And, hey -  I figure that there are/were worse things I could do with my time, so, why not "do something about it" as your statement I quoted noted, &amp; there you are... &amp; once more/again - I am not alone in it either, far from it (the community online tends to largely take care of itself I have found, as another aside, &amp; especially when things get "bogged down" in legislation by "lobbyists &amp; 'special interest groups'" (many times who are NOT out for the "genereal good" imo))... apk
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30182594</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30183820</id>
	<title>Re:A New Approach: Bait and Strike</title>
	<author>Anonymous</author>
	<datestamp>1258814820000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext>What a fascinating adolescent fantasy you've just pulled out of your ass. It's the kind of thing the DoD might come up with if all their security protocols were based on what they'd learned from playing Command and Conquer fucking Generals... what are you, 12?</htmltext>
<tokenext>What a fascinating adolescent fantasy you 've just pulled out of your ass .
It 's the kind of thing the DoD might come up with if all their security protocols were based on what they 'd learned from playing Command and Conquer fucking Generals... what are you , 12 ?</tokentext>
<sentencetext>What a fascinating adolescent fantasy you've just pulled out of your ass.
It's the kind of thing the DoD might come up with if all their security protocols were based on what they'd learned from playing Command and Conquer fucking Generals... what are you, 12?</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30182612</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30182562</id>
	<title>targeted attacks?</title>
	<author>sopssa</author>
	<datestamp>1258834380000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>1</modscore>
	<htmltext><p>What would be interesting to know is that if these are targeted attacks specifically against US military networks, or just random scanning for vulnerabilities by every day botnets? I think it's the later case, because if they were targeted attacks they would be stupid not to hide their origins and you wouldn't know they are from china or similar country. Or maybe they're just playing with people's image of bad china and north korea.</p><p>And since when North Korean's have had internet?</p></htmltext>
<tokenext>What would be interesting to know is that if these are targeted attacks specifically against US military networks , or just random scanning for vulnerabilities by every day botnets ?
I think it 's the later case , because if they were targeted attacks they would be stupid not to hide their origins and you would n't know they are from china or similar country .
Or maybe they 're just playing with people 's image of bad china and north korea.And since when North Korean 's have had internet ?</tokentext>
<sentencetext>What would be interesting to know is that if these are targeted attacks specifically against US military networks, or just random scanning for vulnerabilities by every day botnets?
I think it's the later case, because if they were targeted attacks they would be stupid not to hide their origins and you wouldn't know they are from china or similar country.
Or maybe they're just playing with people's image of bad china and north korea.And since when North Korean's have had internet?</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30182618</id>
	<title>One obvious question ...</title>
	<author>Anonymous</author>
	<datestamp>1258835460000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>2</modscore>
	<htmltext><p>Are there actually that many more attacks, or are they just <b>detecting</b> more of them?  I wouldn't be at all surprised if in years past, a lot of military computers have been pwned without anyone knowing it happened<nobr> <wbr></nobr>... especially given the DoD's ongoing love affair with Windows.</p></htmltext>
<tokenext>Are there actually that many more attacks , or are they just detecting more of them ?
I would n't be at all surprised if in years past , a lot of military computers have been pwned without anyone knowing it happened ... especially given the DoD 's ongoing love affair with Windows .</tokentext>
<sentencetext>Are there actually that many more attacks, or are they just detecting more of them?
I wouldn't be at all surprised if in years past, a lot of military computers have been pwned without anyone knowing it happened ... especially given the DoD's ongoing love affair with Windows.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30187990</id>
	<title>Re:Not surprised</title>
	<author>Anonymous</author>
	<datestamp>1258799100000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>China in a cold war with teh west?! OH! So thats why everything in the west is manufactured in China or Taiwan. K, Thanx!</p></htmltext>
<tokenext>China in a cold war with teh west ? !
OH ! So thats why everything in the west is manufactured in China or Taiwan .
K , Thanx !</tokentext>
<sentencetext>China in a cold war with teh west?!
OH! So thats why everything in the west is manufactured in China or Taiwan.
K, Thanx!</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30182616</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30185228</id>
	<title>So if China is outright attacking us...</title>
	<author>joocemann</author>
	<datestamp>1258825140000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>... why are we not doing anything real about it to stop them?  why do we permit these attacks?</p><p>Let me guess... tit for tat.  The whole world is full of lies and deception.  It doesn't talk about us doing it to China, but how is that not obvious?</p></htmltext>
<tokenext>... why are we not doing anything real about it to stop them ?
why do we permit these attacks ? Let me guess... tit for tat .
The whole world is full of lies and deception .
It does n't talk about us doing it to China , but how is that not obvious ?</tokentext>
<sentencetext>... why are we not doing anything real about it to stop them?
why do we permit these attacks?Let me guess... tit for tat.
The whole world is full of lies and deception.
It doesn't talk about us doing it to China, but how is that not obvious?</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30185350</id>
	<title>Re:A New Approach: Bait and Strike</title>
	<author>couchslug</author>
	<datestamp>1258825680000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Everyone who modded this "Interesting", please obtain a clue about missiles, launch systems, and warheads.</p><p>This is a geek forum, not 4chan.</p></htmltext>
<tokenext>Everyone who modded this " Interesting " , please obtain a clue about missiles , launch systems , and warheads.This is a geek forum , not 4chan .</tokentext>
<sentencetext>Everyone who modded this "Interesting", please obtain a clue about missiles, launch systems, and warheads.This is a geek forum, not 4chan.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30182612</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30183862</id>
	<title>Re:Garbage</title>
	<author>DNS-and-BIND</author>
	<datestamp>1258815300000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Both sides?  What's the other side?  What, you need to fake evidence to find something wrong with the Chinese government?<p>I suppose you missed the links to the BBC and Wikipedia articles in my post.  I tried to use what typical Westerners would consider the most authoritative sources available, and still I get outright rejection and disbelief.  Just because something doesn't fit your value or belief system is no reason to reject hard cold facts.</p><p>The real tragedy of the 50-cent gang is that nowadays, it has so poisoned the atmosphere online that any defense of China is considered astroturfing.  In my own way, I am quite pro-China since I live here and see with my own eyes.  I see local people reject such ideas the exact same way - they could never have massacred all those protesters on 6/4/1989.  It's sad that educated people can have the same reactions to "wrong" ideas as ignorant peasants (and I use "ignorant" without rancor, these people had no choice in the matter).</p></htmltext>
<tokenext>Both sides ?
What 's the other side ?
What , you need to fake evidence to find something wrong with the Chinese government ? I suppose you missed the links to the BBC and Wikipedia articles in my post .
I tried to use what typical Westerners would consider the most authoritative sources available , and still I get outright rejection and disbelief .
Just because something does n't fit your value or belief system is no reason to reject hard cold facts.The real tragedy of the 50-cent gang is that nowadays , it has so poisoned the atmosphere online that any defense of China is considered astroturfing .
In my own way , I am quite pro-China since I live here and see with my own eyes .
I see local people reject such ideas the exact same way - they could never have massacred all those protesters on 6/4/1989 .
It 's sad that educated people can have the same reactions to " wrong " ideas as ignorant peasants ( and I use " ignorant " without rancor , these people had no choice in the matter ) .</tokentext>
<sentencetext>Both sides?
What's the other side?
What, you need to fake evidence to find something wrong with the Chinese government?I suppose you missed the links to the BBC and Wikipedia articles in my post.
I tried to use what typical Westerners would consider the most authoritative sources available, and still I get outright rejection and disbelief.
Just because something doesn't fit your value or belief system is no reason to reject hard cold facts.The real tragedy of the 50-cent gang is that nowadays, it has so poisoned the atmosphere online that any defense of China is considered astroturfing.
In my own way, I am quite pro-China since I live here and see with my own eyes.
I see local people reject such ideas the exact same way - they could never have massacred all those protesters on 6/4/1989.
It's sad that educated people can have the same reactions to "wrong" ideas as ignorant peasants (and I use "ignorant" without rancor, these people had no choice in the matter).</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30183462</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30183452</id>
	<title>Re:A New Approach: Bait and Strike</title>
	<author>Jaro</author>
	<datestamp>1258808580000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>If I remember correctly this is what <a href="http://en.wikipedia.org/wiki/Clifford\_Stoll" title="wikipedia.org" rel="nofollow">Clifford Stoll</a> [wikipedia.org] did back in the 80s. Nothing new here.</p></htmltext>
<tokenext>If I remember correctly this is what Clifford Stoll [ wikipedia.org ] did back in the 80s .
Nothing new here .</tokentext>
<sentencetext>If I remember correctly this is what Clifford Stoll [wikipedia.org] did back in the 80s.
Nothing new here.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30182612</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30182594</id>
	<title>They still don't like us?</title>
	<author>hwyhobo</author>
	<datestamp>1258835100000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>4</modscore>
	<htmltext><p>And here I was, thinking that the Presidential Apology Tour would make it all better.</p><p>On a serious note, by moving our high tech industry offshore we have helped to make it happen. Now, with a broken economy, we appear weak, and we invite ridicule and attack. Clever bandaids added to firewalls will make little difference long term. We need to regain strength and respect. This is not just a technical problem. Our recent administrations (Republicrats and Demopublican alike) through suicidal short-sighted policies aimed only to benefit a few fat cats have made us an easy target. Such is the fate of a fallen giant. Everyone wants to kick him. After all, what are we going to do about it?</p></htmltext>
<tokenext>And here I was , thinking that the Presidential Apology Tour would make it all better.On a serious note , by moving our high tech industry offshore we have helped to make it happen .
Now , with a broken economy , we appear weak , and we invite ridicule and attack .
Clever bandaids added to firewalls will make little difference long term .
We need to regain strength and respect .
This is not just a technical problem .
Our recent administrations ( Republicrats and Demopublican alike ) through suicidal short-sighted policies aimed only to benefit a few fat cats have made us an easy target .
Such is the fate of a fallen giant .
Everyone wants to kick him .
After all , what are we going to do about it ?</tokentext>
<sentencetext>And here I was, thinking that the Presidential Apology Tour would make it all better.On a serious note, by moving our high tech industry offshore we have helped to make it happen.
Now, with a broken economy, we appear weak, and we invite ridicule and attack.
Clever bandaids added to firewalls will make little difference long term.
We need to regain strength and respect.
This is not just a technical problem.
Our recent administrations (Republicrats and Demopublican alike) through suicidal short-sighted policies aimed only to benefit a few fat cats have made us an easy target.
Such is the fate of a fallen giant.
Everyone wants to kick him.
After all, what are we going to do about it?</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30192928</id>
	<title>Re:Garbage</title>
	<author>kestasjk</author>
	<datestamp>1258901280000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Oh alright, you got me, I'm in the 50 cent gang. But now that I've told you I'm afraid I have to kill you.</htmltext>
<tokenext>Oh alright , you got me , I 'm in the 50 cent gang .
But now that I 've told you I 'm afraid I have to kill you .</tokentext>
<sentencetext>Oh alright, you got me, I'm in the 50 cent gang.
But now that I've told you I'm afraid I have to kill you.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30182800</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30183674</id>
	<title>let me guess</title>
	<author>bl8n8r</author>
	<datestamp>1258812840000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>cyber attacks of mass destruction ?  Sorry, but this sounds toi familiar.  Somebody get the pentagon a frickin firewall and a new AUP.</htmltext>
<tokenext>cyber attacks of mass destruction ?
Sorry , but this sounds toi familiar .
Somebody get the pentagon a frickin firewall and a new AUP .</tokentext>
<sentencetext>cyber attacks of mass destruction ?
Sorry, but this sounds toi familiar.
Somebody get the pentagon a frickin firewall and a new AUP.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30183166</id>
	<title>RX35 Switch</title>
	<author>Anonymous</author>
	<datestamp>1258803240000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>1</modscore>
	<htmltext>I work in IT support for the military, so if you read any further I will have to kill you.
<br> <br>
A few years ago I was stationed on a large warship.
<br> <br>
Now, you might expect IT security on the shipwide control system to be pretty tight, and indeed the firewalls to prevent external attacks are very secure (you don't really want some geek with a wireless laptop hacking in and controlling the ship lol), but if someone can actually get onto the ship, there are network ports all over which they can plug into and gain access to the whole control path.
<br> <br>
One time when the ship pulled in a small vessel which was suspected of smuggling, the shit-for-brains marines failed to search it properly and a handful of ne'erdowells then sneaked aboard, plugged into the network, and proceded to arse around inside it. As well as mucking about with the data on the brig, thay also managed to blow a fuse on the waste control circuits, which meant I had to take a trip out all the way to home base to get a replacement RX35 switch from central stores.
<br> <br>
As it turns out this was quite a lucky break, because while I was away this same bunch of chancers blew the whole ship up by firing some proton torpedos down the main reactor exhaust pipe.
<br> <br>
Phew!
<br>
<br>
[Stolen from <a href="http://www.b3ta.com/questions/helpdesk/post527645" title="b3ta.com" rel="nofollow">Here</a> [b3ta.com]]</htmltext>
<tokenext>I work in IT support for the military , so if you read any further I will have to kill you .
A few years ago I was stationed on a large warship .
Now , you might expect IT security on the shipwide control system to be pretty tight , and indeed the firewalls to prevent external attacks are very secure ( you do n't really want some geek with a wireless laptop hacking in and controlling the ship lol ) , but if someone can actually get onto the ship , there are network ports all over which they can plug into and gain access to the whole control path .
One time when the ship pulled in a small vessel which was suspected of smuggling , the shit-for-brains marines failed to search it properly and a handful of ne'erdowells then sneaked aboard , plugged into the network , and proceded to arse around inside it .
As well as mucking about with the data on the brig , thay also managed to blow a fuse on the waste control circuits , which meant I had to take a trip out all the way to home base to get a replacement RX35 switch from central stores .
As it turns out this was quite a lucky break , because while I was away this same bunch of chancers blew the whole ship up by firing some proton torpedos down the main reactor exhaust pipe .
Phew ! [ Stolen from Here [ b3ta.com ] ]</tokentext>
<sentencetext>I work in IT support for the military, so if you read any further I will have to kill you.
A few years ago I was stationed on a large warship.
Now, you might expect IT security on the shipwide control system to be pretty tight, and indeed the firewalls to prevent external attacks are very secure (you don't really want some geek with a wireless laptop hacking in and controlling the ship lol), but if someone can actually get onto the ship, there are network ports all over which they can plug into and gain access to the whole control path.
One time when the ship pulled in a small vessel which was suspected of smuggling, the shit-for-brains marines failed to search it properly and a handful of ne'erdowells then sneaked aboard, plugged into the network, and proceded to arse around inside it.
As well as mucking about with the data on the brig, thay also managed to blow a fuse on the waste control circuits, which meant I had to take a trip out all the way to home base to get a replacement RX35 switch from central stores.
As it turns out this was quite a lucky break, because while I was away this same bunch of chancers blew the whole ship up by firing some proton torpedos down the main reactor exhaust pipe.
Phew!


[Stolen from Here [b3ta.com]]</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30189478</id>
	<title>Re:They still don't like us?</title>
	<author>Anonymous</author>
	<datestamp>1258809840000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p><i>You could have made a good point, but instead you put your bias at the forefront of your post. To do so merely puts the reader/listener in a defensive position, rather than paying attention to the point you're trying to make.</i><br>Actually the "Presidential Apology Tour" part was quite funny!  You just gotta lighten up a little.</p></htmltext>
<tokenext>You could have made a good point , but instead you put your bias at the forefront of your post .
To do so merely puts the reader/listener in a defensive position , rather than paying attention to the point you 're trying to make.Actually the " Presidential Apology Tour " part was quite funny !
You just got ta lighten up a little .</tokentext>
<sentencetext>You could have made a good point, but instead you put your bias at the forefront of your post.
To do so merely puts the reader/listener in a defensive position, rather than paying attention to the point you're trying to make.Actually the "Presidential Apology Tour" part was quite funny!
You just gotta lighten up a little.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30183078</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30183232</id>
	<title>Re:chicken feed</title>
	<author>1s44c</author>
	<datestamp>1258804200000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>2</modscore>
	<htmltext><p><div class="quote"><blockquote><div><p>"The cost of such attacks is significant," the report notes. Citing data from the Joint Task Force-Global Network Operations, the report says that the military spent $100 million to fend off these attacks between September 2008 and March 2009</p></div></blockquote><p> That's a lot of money... That's almost 8 full hours of what is being spent on Iraq.</p></div><p>Yes but they don't get any oil out of this.</p><p>The phrase 'fend off' network attacks is moronic. You don't 'fend off' cyber attacks you set things up right the first time around. They should be setting things up right before they get attacked not as some afterthought.</p><p>Of course if they run windows on any networked machine they will always have some risk.</p></div>
	</htmltext>
<tokenext>" The cost of such attacks is significant , " the report notes .
Citing data from the Joint Task Force-Global Network Operations , the report says that the military spent $ 100 million to fend off these attacks between September 2008 and March 2009 That 's a lot of money... That 's almost 8 full hours of what is being spent on Iraq.Yes but they do n't get any oil out of this.The phrase 'fend off ' network attacks is moronic .
You do n't 'fend off ' cyber attacks you set things up right the first time around .
They should be setting things up right before they get attacked not as some afterthought.Of course if they run windows on any networked machine they will always have some risk .</tokentext>
<sentencetext>"The cost of such attacks is significant," the report notes.
Citing data from the Joint Task Force-Global Network Operations, the report says that the military spent $100 million to fend off these attacks between September 2008 and March 2009 That's a lot of money... That's almost 8 full hours of what is being spent on Iraq.Yes but they don't get any oil out of this.The phrase 'fend off' network attacks is moronic.
You don't 'fend off' cyber attacks you set things up right the first time around.
They should be setting things up right before they get attacked not as some afterthought.Of course if they run windows on any networked machine they will always have some risk.
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30182572</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30182616</id>
	<title>Not surprised</title>
	<author>Anonymous</author>
	<datestamp>1258835340000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>3</modscore>
	<htmltext>China is in a cold war with the west. These attacks are also going after European and Oceania countries.  The question is, when will the west realize that the same means that was used to stop USSR is being quietly used against the West.</htmltext>
<tokenext>China is in a cold war with the west .
These attacks are also going after European and Oceania countries .
The question is , when will the west realize that the same means that was used to stop USSR is being quietly used against the West .</tokentext>
<sentencetext>China is in a cold war with the west.
These attacks are also going after European and Oceania countries.
The question is, when will the west realize that the same means that was used to stop USSR is being quietly used against the West.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30182650</id>
	<title>Did anyone else read that as...</title>
	<author>w0mprat</author>
	<datestamp>1258836240000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Cyber attacks on US as a news topic jumped the shark in 2009</htmltext>
<tokenext>Cyber attacks on US as a news topic jumped the shark in 2009</tokentext>
<sentencetext>Cyber attacks on US as a news topic jumped the shark in 2009</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30183440</id>
	<title>What does this tell me? Nothing!</title>
	<author>Jaro</author>
	<datestamp>1258808280000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>3</modscore>
	<htmltext><p>Does this really tell me anything? Not really? What kind of "cyber attacks" are that? SSH break-in attempts? Bots looking for known holes? Script kiddies? Mail relay attempts? Or targeted attempts specifically designed to get access to their system? If I go for the script kiddie/SSH category I get around 25.000 attempts a year on one server alone, according to ossec.<br>This could also just mean that the number of attacks has risen generally and not specifically against the DoD.</p><p>So many unanswered questions<nobr> <wbr></nobr>...</p></htmltext>
<tokenext>Does this really tell me anything ?
Not really ?
What kind of " cyber attacks " are that ?
SSH break-in attempts ?
Bots looking for known holes ?
Script kiddies ?
Mail relay attempts ?
Or targeted attempts specifically designed to get access to their system ?
If I go for the script kiddie/SSH category I get around 25.000 attempts a year on one server alone , according to ossec.This could also just mean that the number of attacks has risen generally and not specifically against the DoD.So many unanswered questions .. .</tokentext>
<sentencetext>Does this really tell me anything?
Not really?
What kind of "cyber attacks" are that?
SSH break-in attempts?
Bots looking for known holes?
Script kiddies?
Mail relay attempts?
Or targeted attempts specifically designed to get access to their system?
If I go for the script kiddie/SSH category I get around 25.000 attempts a year on one server alone, according to ossec.This could also just mean that the number of attacks has risen generally and not specifically against the DoD.So many unanswered questions ...</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30182638</id>
	<title>Garbage</title>
	<author>kestasjk</author>
	<datestamp>1258835880000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>3</modscore>
	<htmltext><p><div class="quote"><p>The PRC is also recruiting from its
growing population of technically skilled people, including those
from the private sector, to increase its cyber capabilities. It is recruiting
skilled cyber operators from information technology
firms and computer science programs into the ranks of numerous
Information Warfare Militia units.</p></div><p>"cyber operators".. "Information Warfare Militia".. What?<br>
Try actually reading the linked PDF and see if you can take it seriously. All this stuff about increased "cyber attack incidences" and I can find <b>absolutely nothing</b> explicitly linking any incident with the Chinese government or anything even making explicit what a "cyber attack incident" is. (Also "cyber warfare" is a pretty small part of the report itself; the report isn't about "cyber-warfare", but US-China relations.)</p><p><div class="quote"><p>cyber-space (the electro-magnetic spectrum)</p></div><p>I think that quote just about sums it up. I am stunned that people here on slashdot are taking this seriously, this is the sort of thing I'd expect to see on Fox News.</p></div>
	</htmltext>
<tokenext>The PRC is also recruiting from its growing population of technically skilled people , including those from the private sector , to increase its cyber capabilities .
It is recruiting skilled cyber operators from information technology firms and computer science programs into the ranks of numerous Information Warfare Militia units .
" cyber operators " .. " Information Warfare Militia " .. What ? Try actually reading the linked PDF and see if you can take it seriously .
All this stuff about increased " cyber attack incidences " and I can find absolutely nothing explicitly linking any incident with the Chinese government or anything even making explicit what a " cyber attack incident " is .
( Also " cyber warfare " is a pretty small part of the report itself ; the report is n't about " cyber-warfare " , but US-China relations .
) cyber-space ( the electro-magnetic spectrum ) I think that quote just about sums it up .
I am stunned that people here on slashdot are taking this seriously , this is the sort of thing I 'd expect to see on Fox News .</tokentext>
<sentencetext>The PRC is also recruiting from its
growing population of technically skilled people, including those
from the private sector, to increase its cyber capabilities.
It is recruiting
skilled cyber operators from information technology
firms and computer science programs into the ranks of numerous
Information Warfare Militia units.
"cyber operators".. "Information Warfare Militia".. What?
Try actually reading the linked PDF and see if you can take it seriously.
All this stuff about increased "cyber attack incidences" and I can find absolutely nothing explicitly linking any incident with the Chinese government or anything even making explicit what a "cyber attack incident" is.
(Also "cyber warfare" is a pretty small part of the report itself; the report isn't about "cyber-warfare", but US-China relations.
)cyber-space (the electro-magnetic spectrum)I think that quote just about sums it up.
I am stunned that people here on slashdot are taking this seriously, this is the sort of thing I'd expect to see on Fox News.
	</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30186648</id>
	<title>43000 in six months? That's NOTHING!</title>
	<author>Anonymous</author>
	<datestamp>1258833660000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>I get 43,000 Chinese hack attempts on my DSL connection *DAILY*.<br>I calculated the bandwidth used to be about 650KB per day<br>or about 20MB per month. Multiply that by a conservative<br>estimate of 20 million DSL subscribers, which are all receiving<br>the same Chinese hack attempts, and you get 400TB per month,<br>or about 5 petabytes per year, just on the AT&amp;T DSL network.</p><p>Are TPTB going to block those yellow bellies in the BGP?<br>No, they won't because then the Homeland Security Cyber-Hysteria<br>Team would be unemployed and unable to pay their mortgages.</p></htmltext>
<tokenext>I get 43,000 Chinese hack attempts on my DSL connection * DAILY * .I calculated the bandwidth used to be about 650KB per dayor about 20MB per month .
Multiply that by a conservativeestimate of 20 million DSL subscribers , which are all receivingthe same Chinese hack attempts , and you get 400TB per month,or about 5 petabytes per year , just on the AT&amp;T DSL network.Are TPTB going to block those yellow bellies in the BGP ? No , they wo n't because then the Homeland Security Cyber-HysteriaTeam would be unemployed and unable to pay their mortgages .</tokentext>
<sentencetext>I get 43,000 Chinese hack attempts on my DSL connection *DAILY*.I calculated the bandwidth used to be about 650KB per dayor about 20MB per month.
Multiply that by a conservativeestimate of 20 million DSL subscribers, which are all receivingthe same Chinese hack attempts, and you get 400TB per month,or about 5 petabytes per year, just on the AT&amp;T DSL network.Are TPTB going to block those yellow bellies in the BGP?No, they won't because then the Homeland Security Cyber-HysteriaTeam would be unemployed and unable to pay their mortgages.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30183130</id>
	<title>Re:A New Approach: Bait and Strike</title>
	<author>\_merlin</author>
	<datestamp>1258802460000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>So you think killing thousands of citizens is an "ideal scenario"?</p></htmltext>
<tokenext>So you think killing thousands of citizens is an " ideal scenario " ?</tokentext>
<sentencetext>So you think killing thousands of citizens is an "ideal scenario"?</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30182612</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30183046</id>
	<title>Re:targeted attacks?</title>
	<author>h4rm0ny</author>
	<datestamp>1258800780000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><br>
I think it's also the case that these figures probably largely include general, rather than targeted. Remember - it's in the Pentagon's best interest for America to be under threat. It means more money, more respect and more, er, money.<nobr> <wbr></nobr>;)
<br> <br>
The fact that the source of these attacks isn't concealed might also mean that... However, it doesn't <i>need</i> to mean that. After all, the US military might be run by a bunch of short-sighted politicians that don't listen to what their military advisors tell them, and they might bleed billions through dubious supply deals, but they're not a complete load of idiots. Even if China attempted to hide attacks, the US would ferret it out. I'm not sure anyone is in the same league as the NSA, for example. All hiding the attacks would do is make it look like China is serious. Doing it fairly openly is classic Chinese psychology: they're openly demonstrating the position of strength they are in vs. a US that has (stupidly, imo) committed its military resources heavily in the Iraq, squandered a lot of the tolerance and good will of the people of the USA for countenancing military action and, far more significantly than that, is driving home the point that economic retaliation by the US would be mutually assured destruction.
<br> <br>
Given the source for all this information is from parties with a reason to enhance the public perception of threat, we have to regard it as dubious. However, that attacks have an obvious origin, isn't conclusive either way.</htmltext>
<tokenext>I think it 's also the case that these figures probably largely include general , rather than targeted .
Remember - it 's in the Pentagon 's best interest for America to be under threat .
It means more money , more respect and more , er , money .
; ) The fact that the source of these attacks is n't concealed might also mean that... However , it does n't need to mean that .
After all , the US military might be run by a bunch of short-sighted politicians that do n't listen to what their military advisors tell them , and they might bleed billions through dubious supply deals , but they 're not a complete load of idiots .
Even if China attempted to hide attacks , the US would ferret it out .
I 'm not sure anyone is in the same league as the NSA , for example .
All hiding the attacks would do is make it look like China is serious .
Doing it fairly openly is classic Chinese psychology : they 're openly demonstrating the position of strength they are in vs. a US that has ( stupidly , imo ) committed its military resources heavily in the Iraq , squandered a lot of the tolerance and good will of the people of the USA for countenancing military action and , far more significantly than that , is driving home the point that economic retaliation by the US would be mutually assured destruction .
Given the source for all this information is from parties with a reason to enhance the public perception of threat , we have to regard it as dubious .
However , that attacks have an obvious origin , is n't conclusive either way .</tokentext>
<sentencetext>
I think it's also the case that these figures probably largely include general, rather than targeted.
Remember - it's in the Pentagon's best interest for America to be under threat.
It means more money, more respect and more, er, money.
;)
 
The fact that the source of these attacks isn't concealed might also mean that... However, it doesn't need to mean that.
After all, the US military might be run by a bunch of short-sighted politicians that don't listen to what their military advisors tell them, and they might bleed billions through dubious supply deals, but they're not a complete load of idiots.
Even if China attempted to hide attacks, the US would ferret it out.
I'm not sure anyone is in the same league as the NSA, for example.
All hiding the attacks would do is make it look like China is serious.
Doing it fairly openly is classic Chinese psychology: they're openly demonstrating the position of strength they are in vs. a US that has (stupidly, imo) committed its military resources heavily in the Iraq, squandered a lot of the tolerance and good will of the people of the USA for countenancing military action and, far more significantly than that, is driving home the point that economic retaliation by the US would be mutually assured destruction.
Given the source for all this information is from parties with a reason to enhance the public perception of threat, we have to regard it as dubious.
However, that attacks have an obvious origin, isn't conclusive either way.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30182562</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30183462</id>
	<title>Re:Garbage</title>
	<author>Anonymous</author>
	<datestamp>1258808820000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>4</modscore>
	<htmltext>Who knows, maybe you are the one spreading propaganda. Someone could have faked the evidence of this "50 cent gang" in order to make China look bad. Basically both sides have the motivation to do this sort of thing and it can be hard to figure out who is who sometimes.</htmltext>
<tokenext>Who knows , maybe you are the one spreading propaganda .
Someone could have faked the evidence of this " 50 cent gang " in order to make China look bad .
Basically both sides have the motivation to do this sort of thing and it can be hard to figure out who is who sometimes .</tokentext>
<sentencetext>Who knows, maybe you are the one spreading propaganda.
Someone could have faked the evidence of this "50 cent gang" in order to make China look bad.
Basically both sides have the motivation to do this sort of thing and it can be hard to figure out who is who sometimes.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30182800</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30183106</id>
	<title>BIZNATCH</title>
	<author>Anonymous</author>
	<datestamp>1258802040000</datestamp>
	<modclass>Flamebait</modclass>
	<modscore>-1</modscore>
	<htmltext>posts. Therefore Would be a bad [amazingkreskin.com] purposes *BSD is Simple solution 7hings in us the courtesy</htmltext>
<tokenext>posts .
Therefore Would be a bad [ amazingkreskin.com ] purposes * BSD is Simple solution 7hings in us the courtesy</tokentext>
<sentencetext>posts.
Therefore Would be a bad [amazingkreskin.com] purposes *BSD is Simple solution 7hings in us the courtesy</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30182556</id>
	<title>Well...</title>
	<author>Anonymous</author>
	<datestamp>1258834260000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>They aren't dumb enough to have anything actually important connected to the internet... Right?<nobr> <wbr></nobr>...right?<nobr> <wbr></nobr>:(</p></htmltext>
<tokenext>They are n't dumb enough to have anything actually important connected to the internet... Right ? ...right ?
: (</tokentext>
<sentencetext>They aren't dumb enough to have anything actually important connected to the internet... Right? ...right?
:(</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30183128</id>
	<title>Re:Garbage</title>
	<author>Anonymous</author>
	<datestamp>1258802400000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p><div class="quote"><p>I am stunned that people here on slashdot are taking this seriously, this is the sort of thing I'd expect to see on Fox News.</p></div><p>This line in the summary alone give enough reason for this to be in<nobr> <wbr></nobr>/. front page:</p><p><div class="quote"><p> -- many of them coming from China --</p> </div><p>The anti-China sentiment in<nobr> <wbr></nobr>/. is <b>that</b> easy to exploit.</p></div>
	</htmltext>
<tokenext>I am stunned that people here on slashdot are taking this seriously , this is the sort of thing I 'd expect to see on Fox News.This line in the summary alone give enough reason for this to be in / .
front page : -- many of them coming from China -- The anti-China sentiment in / .
is that easy to exploit .</tokentext>
<sentencetext>I am stunned that people here on slashdot are taking this seriously, this is the sort of thing I'd expect to see on Fox News.This line in the summary alone give enough reason for this to be in /.
front page: -- many of them coming from China -- The anti-China sentiment in /.
is that easy to exploit.
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30182638</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30182612</id>
	<title>A New Approach:  Bait and Strike</title>
	<author>reporter</author>
	<datestamp>1258835340000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>2</modscore>
	<htmltext>The traditional approach toward dealing with Chinese hackers is to fortify all the computers in a company or institute.  Fortification takes time and money.
<p>
A better approach may be to rig some computers so that they are easy to hack.  We install some deliberately malicious software on those fake computers.  Then, we disperse those fake computers among the real computers.
</p><p>
Here is the ideal scenario.  A typical Chinese hacker will probe all the computers at the Department of Defense.  The probe will easily succeed in penetrating one of the rigged computers.  He downloads plenty of software.  He will then try to run them.  One of the ill-gotten applications then replicates itself and spreads throughout the Chinese Ministry of War.
</p><p>
The rogue application disables the safety mechanism in a Chinese nuclear warhead.  On the anniversary of the Chinese invasion of Tibet, the warhead explodes.  It  melts (literally) the entire military base and kills thousands of Chinese citizens in the nearby town.
</p><p>
On the day of that fire ball, the Chinese hackers will cease their activities for several months.</p></htmltext>
<tokenext>The traditional approach toward dealing with Chinese hackers is to fortify all the computers in a company or institute .
Fortification takes time and money .
A better approach may be to rig some computers so that they are easy to hack .
We install some deliberately malicious software on those fake computers .
Then , we disperse those fake computers among the real computers .
Here is the ideal scenario .
A typical Chinese hacker will probe all the computers at the Department of Defense .
The probe will easily succeed in penetrating one of the rigged computers .
He downloads plenty of software .
He will then try to run them .
One of the ill-gotten applications then replicates itself and spreads throughout the Chinese Ministry of War .
The rogue application disables the safety mechanism in a Chinese nuclear warhead .
On the anniversary of the Chinese invasion of Tibet , the warhead explodes .
It melts ( literally ) the entire military base and kills thousands of Chinese citizens in the nearby town .
On the day of that fire ball , the Chinese hackers will cease their activities for several months .</tokentext>
<sentencetext>The traditional approach toward dealing with Chinese hackers is to fortify all the computers in a company or institute.
Fortification takes time and money.
A better approach may be to rig some computers so that they are easy to hack.
We install some deliberately malicious software on those fake computers.
Then, we disperse those fake computers among the real computers.
Here is the ideal scenario.
A typical Chinese hacker will probe all the computers at the Department of Defense.
The probe will easily succeed in penetrating one of the rigged computers.
He downloads plenty of software.
He will then try to run them.
One of the ill-gotten applications then replicates itself and spreads throughout the Chinese Ministry of War.
The rogue application disables the safety mechanism in a Chinese nuclear warhead.
On the anniversary of the Chinese invasion of Tibet, the warhead explodes.
It  melts (literally) the entire military base and kills thousands of Chinese citizens in the nearby town.
On the day of that fire ball, the Chinese hackers will cease their activities for several months.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30183258</id>
	<title>Re:define "attack"</title>
	<author>1s44c</author>
	<datestamp>1258804620000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>4</modscore>
	<htmltext><p><div class="quote"><p>I have linux boxes all over the place and there are literally thousands of ssh/sft/etc attempts on each box each day. None of them are successful though.</p><p>Can I claim that my boxes have more attacks than the US Military?</p></div><p>If the US government would give you a 100 dollars to investigate each attack you might be tempted to.</p></div>
	</htmltext>
<tokenext>I have linux boxes all over the place and there are literally thousands of ssh/sft/etc attempts on each box each day .
None of them are successful though.Can I claim that my boxes have more attacks than the US Military ? If the US government would give you a 100 dollars to investigate each attack you might be tempted to .</tokentext>
<sentencetext>I have linux boxes all over the place and there are literally thousands of ssh/sft/etc attempts on each box each day.
None of them are successful though.Can I claim that my boxes have more attacks than the US Military?If the US government would give you a 100 dollars to investigate each attack you might be tempted to.
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30182610</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30183078</id>
	<title>Re:They still don't like us?</title>
	<author>pHus10n</author>
	<datestamp>1258801560000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>1)  What's your suggestion to fix the problem?  I see a lot of complaints, but so few solutions.  You may have suggested something like.... hardening systems thru more secure software (abandon Windows -- whether you like it or not, it's the best target due to being used by everyone).  Or, maybe beefing up a cyber attack strategy?  No... instead, you complained only to complain.  <br>
<br>
2)  It's not a Presidential Apology Tour.  You could have made a good point, but instead you put your bias at the forefront of your post.  To do so merely puts the reader/listener in a defensive position, rather than paying attention to the point you're trying to make.  I don't recall seeing a press conference from Beijing where Pres. Obama is apologizing for our ways.</htmltext>
<tokenext>1 ) What 's your suggestion to fix the problem ?
I see a lot of complaints , but so few solutions .
You may have suggested something like.... hardening systems thru more secure software ( abandon Windows -- whether you like it or not , it 's the best target due to being used by everyone ) .
Or , maybe beefing up a cyber attack strategy ?
No... instead , you complained only to complain .
2 ) It 's not a Presidential Apology Tour .
You could have made a good point , but instead you put your bias at the forefront of your post .
To do so merely puts the reader/listener in a defensive position , rather than paying attention to the point you 're trying to make .
I do n't recall seeing a press conference from Beijing where Pres .
Obama is apologizing for our ways .</tokentext>
<sentencetext>1)  What's your suggestion to fix the problem?
I see a lot of complaints, but so few solutions.
You may have suggested something like.... hardening systems thru more secure software (abandon Windows -- whether you like it or not, it's the best target due to being used by everyone).
Or, maybe beefing up a cyber attack strategy?
No... instead, you complained only to complain.
2)  It's not a Presidential Apology Tour.
You could have made a good point, but instead you put your bias at the forefront of your post.
To do so merely puts the reader/listener in a defensive position, rather than paying attention to the point you're trying to make.
I don't recall seeing a press conference from Beijing where Pres.
Obama is apologizing for our ways.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30182594</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30183592</id>
	<title>Kidde ping floods</title>
	<author>Dan541</author>
	<datestamp>1258811100000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>start&gt;run&gt;cmd</p><p>C:\Users\User&gt;ping defense.gov -t</p></htmltext>
<tokenext>start &gt; run &gt; cmdC : \ Users \ User &gt; ping defense.gov -t</tokentext>
<sentencetext>start&gt;run&gt;cmdC:\Users\User&gt;ping defense.gov -t</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30182562</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30182610</id>
	<title>define "attack"</title>
	<author>zkrige</author>
	<datestamp>1258835340000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>5</modscore>
	<htmltext>I have linux boxes all over the place and there are literally thousands of ssh/sft/etc attempts on each box each day. None of them are successful though.

Can I claim that my boxes have more attacks than the US Military?</htmltext>
<tokenext>I have linux boxes all over the place and there are literally thousands of ssh/sft/etc attempts on each box each day .
None of them are successful though .
Can I claim that my boxes have more attacks than the US Military ?</tokentext>
<sentencetext>I have linux boxes all over the place and there are literally thousands of ssh/sft/etc attempts on each box each day.
None of them are successful though.
Can I claim that my boxes have more attacks than the US Military?</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30183626</id>
	<title>Re:Garbage</title>
	<author>Dan541</author>
	<datestamp>1258811760000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p><div class="quote"><p>Try actually reading the linked PDF and see if you can take it seriously</p></div><p>381 pages, most people don't even read the summary let alone the article, let alone a massive pdf.</p></div>
	</htmltext>
<tokenext>Try actually reading the linked PDF and see if you can take it seriously381 pages , most people do n't even read the summary let alone the article , let alone a massive pdf .</tokentext>
<sentencetext>Try actually reading the linked PDF and see if you can take it seriously381 pages, most people don't even read the summary let alone the article, let alone a massive pdf.
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30182638</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30183042</id>
	<title>Re:Garbage</title>
	<author>pspahn</author>
	<datestamp>1258800720000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>2</modscore>
	<htmltext>Keep in mind that attitudes like this create the same complacency that makes us vulnerable.
<br> <br>
Don't dismiss something at face value because you "feel" there is a political motive behind it. It might hurt, but try to remain objective.</htmltext>
<tokenext>Keep in mind that attitudes like this create the same complacency that makes us vulnerable .
Do n't dismiss something at face value because you " feel " there is a political motive behind it .
It might hurt , but try to remain objective .</tokentext>
<sentencetext>Keep in mind that attitudes like this create the same complacency that makes us vulnerable.
Don't dismiss something at face value because you "feel" there is a political motive behind it.
It might hurt, but try to remain objective.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30182638</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30183878</id>
	<title>Anonymous</title>
	<author>Anonymous</author>
	<datestamp>1258815540000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>that happens because chinese goberment has censored, the porn pages on chine so people are really bored and so they have very much free time<nobr> <wbr></nobr>.... ("Im bored<nobr> <wbr></nobr>.... idea! I'll became a hacker!!! yeah!)</p></htmltext>
<tokenext>that happens because chinese goberment has censored , the porn pages on chine so people are really bored and so they have very much free time .... ( " Im bored .... idea ! I 'll became a hacker ! ! !
yeah ! )</tokentext>
<sentencetext>that happens because chinese goberment has censored, the porn pages on chine so people are really bored and so they have very much free time .... ("Im bored .... idea! I'll became a hacker!!!
yeah!)</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30183424</id>
	<title>Re:targeted attacks?</title>
	<author>Anonymous</author>
	<datestamp>1258807680000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Good point.</p><p>Also, as I've read elsewhere, if you're one in a million, China has 1300 identical to you. That number of attacks looks too conspicuous and yet, at the same time, might be work of a bunch of teenagers -- just like the case of the English dude who got inside Nasa.</p><p>Or perhaps they're doing in a wider way (e.g. because of tech secrets) and it just happens the mil attacks are better perceived. In this case, that would be the good ol' capitalist spying. Ironic, eh?</p></htmltext>
<tokenext>Good point.Also , as I 've read elsewhere , if you 're one in a million , China has 1300 identical to you .
That number of attacks looks too conspicuous and yet , at the same time , might be work of a bunch of teenagers -- just like the case of the English dude who got inside Nasa.Or perhaps they 're doing in a wider way ( e.g .
because of tech secrets ) and it just happens the mil attacks are better perceived .
In this case , that would be the good ol ' capitalist spying .
Ironic , eh ?</tokentext>
<sentencetext>Good point.Also, as I've read elsewhere, if you're one in a million, China has 1300 identical to you.
That number of attacks looks too conspicuous and yet, at the same time, might be work of a bunch of teenagers -- just like the case of the English dude who got inside Nasa.Or perhaps they're doing in a wider way (e.g.
because of tech secrets) and it just happens the mil attacks are better perceived.
In this case, that would be the good ol' capitalist spying.
Ironic, eh?</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30182562</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30182800</id>
	<title>Re:Garbage</title>
	<author>DNS-and-BIND</author>
	<datestamp>1258795860000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>3</modscore>
	<htmltext>Excuse me sir, are you a member of the <a href="http://en.wikipedia.org/wiki/50\_Cent\_Party" title="wikipedia.org" rel="nofollow">50 cent gang</a> [wikipedia.org]?  This isn't anything to do with the rapper, but rather refers to pro-China internet commenters.  For the three of you out there who have never heard of this, allow me to introduce:<blockquote><div><p>50 Cent Party is the name for paid[1] astroturfing bloggers operating since 2005 from People's Republic of China, whose role is posting comments favorable towards the government policies to skew the public opinion on various Internet message boards. They are named by the 50 Chinese cents, or 5 mao, they are paid per such post</p></div></blockquote><p>
If you're not convinced and think this must be some sort of Fox News conspiracy (ooo, a different point of view, ignore it!) I provide a link to that <a href="http://news.bbc.co.uk/2/hi/asia-pacific/7783640.stm" title="bbc.co.uk" rel="nofollow">paragon of correctness the BBC</a> [bbc.co.uk] to explain it in simple terms that you can understand.</p><blockquote><div><p>China is using an increasing number of paid "internet commentators" in a sophisticated attempt to control public opinion. These commentators are used by government departments to scour the internet for bad news - and then negate it.</p></div></blockquote><p>Please note that these are not actually pro-China commenters, but merely <i>anti</i>-anti-China commenters. Indeed I don't see anything pro-China in your post.  You've even Americanized it by attempting to tie it to Fox News, something that Americans will understand on a cultural level, rather than something baffling like attempting to tie it to those perfidious seperatists in Tibet or Xinjiang.  </p><p>Information warfare militia in China do exist.  It's like this: young men like to hack.  They also like to belong to something larger than themselves, and China is pretty darn big.  The USA is China's Main Enemy and is a natural target for any attack.  They go looking for the biggest target they can find, and sometimes they get something worthwhile.  Someone's dad is a major in the PLA, and they hand the documents off to him, and later a quiet "attaboy" comes down the channel with a request to send anything else they might find during their travels.  They're basically like any irregular force - mainly useful in keeping the enemy busy with dealing with low-level annoyances, or occupying territory.  There were American citizens who tried to hack the Iraqi defense system during the 1991 war (hi Par!) even though that was the last thing on Schwartzkopf's mind.  They mostly failed due to the lack of computers in Iraq or anything worthwhile to hack.</p><p>
If you're not in the 50-cent gang, I apologize for calling you out.  Although, it sure sucks when you're on the same side of the argument with totalitarian thugs.  At least they're getting paid, they're doing it as a job.  What are you getting out of it?</p></div>
	</htmltext>
<tokenext>Excuse me sir , are you a member of the 50 cent gang [ wikipedia.org ] ?
This is n't anything to do with the rapper , but rather refers to pro-China internet commenters .
For the three of you out there who have never heard of this , allow me to introduce : 50 Cent Party is the name for paid [ 1 ] astroturfing bloggers operating since 2005 from People 's Republic of China , whose role is posting comments favorable towards the government policies to skew the public opinion on various Internet message boards .
They are named by the 50 Chinese cents , or 5 mao , they are paid per such post If you 're not convinced and think this must be some sort of Fox News conspiracy ( ooo , a different point of view , ignore it !
) I provide a link to that paragon of correctness the BBC [ bbc.co.uk ] to explain it in simple terms that you can understand.China is using an increasing number of paid " internet commentators " in a sophisticated attempt to control public opinion .
These commentators are used by government departments to scour the internet for bad news - and then negate it.Please note that these are not actually pro-China commenters , but merely anti-anti-China commenters .
Indeed I do n't see anything pro-China in your post .
You 've even Americanized it by attempting to tie it to Fox News , something that Americans will understand on a cultural level , rather than something baffling like attempting to tie it to those perfidious seperatists in Tibet or Xinjiang .
Information warfare militia in China do exist .
It 's like this : young men like to hack .
They also like to belong to something larger than themselves , and China is pretty darn big .
The USA is China 's Main Enemy and is a natural target for any attack .
They go looking for the biggest target they can find , and sometimes they get something worthwhile .
Someone 's dad is a major in the PLA , and they hand the documents off to him , and later a quiet " attaboy " comes down the channel with a request to send anything else they might find during their travels .
They 're basically like any irregular force - mainly useful in keeping the enemy busy with dealing with low-level annoyances , or occupying territory .
There were American citizens who tried to hack the Iraqi defense system during the 1991 war ( hi Par !
) even though that was the last thing on Schwartzkopf 's mind .
They mostly failed due to the lack of computers in Iraq or anything worthwhile to hack .
If you 're not in the 50-cent gang , I apologize for calling you out .
Although , it sure sucks when you 're on the same side of the argument with totalitarian thugs .
At least they 're getting paid , they 're doing it as a job .
What are you getting out of it ?</tokentext>
<sentencetext>Excuse me sir, are you a member of the 50 cent gang [wikipedia.org]?
This isn't anything to do with the rapper, but rather refers to pro-China internet commenters.
For the three of you out there who have never heard of this, allow me to introduce:50 Cent Party is the name for paid[1] astroturfing bloggers operating since 2005 from People's Republic of China, whose role is posting comments favorable towards the government policies to skew the public opinion on various Internet message boards.
They are named by the 50 Chinese cents, or 5 mao, they are paid per such post
If you're not convinced and think this must be some sort of Fox News conspiracy (ooo, a different point of view, ignore it!
) I provide a link to that paragon of correctness the BBC [bbc.co.uk] to explain it in simple terms that you can understand.China is using an increasing number of paid "internet commentators" in a sophisticated attempt to control public opinion.
These commentators are used by government departments to scour the internet for bad news - and then negate it.Please note that these are not actually pro-China commenters, but merely anti-anti-China commenters.
Indeed I don't see anything pro-China in your post.
You've even Americanized it by attempting to tie it to Fox News, something that Americans will understand on a cultural level, rather than something baffling like attempting to tie it to those perfidious seperatists in Tibet or Xinjiang.
Information warfare militia in China do exist.
It's like this: young men like to hack.
They also like to belong to something larger than themselves, and China is pretty darn big.
The USA is China's Main Enemy and is a natural target for any attack.
They go looking for the biggest target they can find, and sometimes they get something worthwhile.
Someone's dad is a major in the PLA, and they hand the documents off to him, and later a quiet "attaboy" comes down the channel with a request to send anything else they might find during their travels.
They're basically like any irregular force - mainly useful in keeping the enemy busy with dealing with low-level annoyances, or occupying territory.
There were American citizens who tried to hack the Iraqi defense system during the 1991 war (hi Par!
) even though that was the last thing on Schwartzkopf's mind.
They mostly failed due to the lack of computers in Iraq or anything worthwhile to hack.
If you're not in the 50-cent gang, I apologize for calling you out.
Although, it sure sucks when you're on the same side of the argument with totalitarian thugs.
At least they're getting paid, they're doing it as a job.
What are you getting out of it?
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30182638</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30182632</id>
	<title>Cyber attacks</title>
	<author>Anonymous</author>
	<datestamp>1258835760000</datestamp>
	<modclass>Funny</modclass>
	<modscore>1</modscore>
	<htmltext><p>"Attacker":<br>bt3# ping spacecommand.mil</p><p>DOD:<br>ubermaliciouscyberincidents++</p></htmltext>
<tokenext>" Attacker " : bt3 # ping spacecommand.milDOD : ubermaliciouscyberincidents + +</tokentext>
<sentencetext>"Attacker":bt3# ping spacecommand.milDOD:ubermaliciouscyberincidents++</sentencetext>
</comment>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_21_0238253_18</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30183424
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30182562
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_21_0238253_2</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30183130
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30182612
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_21_0238253_12</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30183820
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30182612
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_21_0238253_9</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30192928
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30182800
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30182638
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_21_0238253_15</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30182770
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30182610
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_21_0238253_6</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30183332
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30182618
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_21_0238253_16</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30185350
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30182612
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_21_0238253_19</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30183232
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30182572
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_21_0238253_13</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30183258
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30182610
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_21_0238253_17</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30183128
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30182638
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_21_0238253_3</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30190372
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30182612
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_21_0238253_7</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30183042
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30182638
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_21_0238253_1</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30183592
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30182562
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_21_0238253_10</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30185742
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30182594
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_21_0238253_0</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30183452
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30182612
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_21_0238253_5</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30189478
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30183078
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30182594
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_21_0238253_4</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30183046
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30182562
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_21_0238253_14</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30183862
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30183462
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30182800
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30182638
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_21_0238253_8</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30183626
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30182638
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_21_0238253_11</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30187990
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30182616
</commentlist>
</thread>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_21_0238253.7</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30182572
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30183232
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_21_0238253.1</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30182618
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30183332
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_21_0238253.8</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30182594
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30183078
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30189478
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30185742
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_21_0238253.6</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30183440
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_21_0238253.5</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30182638
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30183042
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30183626
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30182800
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30183462
---http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30183862
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30192928
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30183128
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_21_0238253.3</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30182650
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_21_0238253.0</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30182562
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30183424
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30183592
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30183046
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_21_0238253.4</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30182616
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30187990
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_21_0238253.2</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30182556
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_21_0238253.10</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30182610
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30182770
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30183258
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_21_0238253.9</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30182612
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30190372
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30183820
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30183130
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30183452
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_21_0238253.30185350
</commentlist>
</conversation>
