<article>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#article10_02_11_1413258</id>
	<title>Simulated Hack To Test US Government Response</title>
	<author>CmdrTaco</author>
	<datestamp>1265903520000</datestamp>
	<htmltext>superapecommando writes <i>"Security industry analysts and lawmakers will get an unprecedented chance next week to evaluate how the government might respond to a hack attack on critical infrastructure targets.
The Bipartisan Policy Center, a Washington-based non-profit established in 2007 by several lawmakers, will host a <a href="http://www.computerworlduk.com/management/government-law/public-sector/news/index.cfm?newsid=18787">simulated nation-wide cyber-attack</a> next Tuesday for a group of former administration and national security officials, who will be playing the roles of Cabinet members."</i></htmltext>
<tokenext>superapecommando writes " Security industry analysts and lawmakers will get an unprecedented chance next week to evaluate how the government might respond to a hack attack on critical infrastructure targets .
The Bipartisan Policy Center , a Washington-based non-profit established in 2007 by several lawmakers , will host a simulated nation-wide cyber-attack next Tuesday for a group of former administration and national security officials , who will be playing the roles of Cabinet members .
"</tokentext>
<sentencetext>superapecommando writes "Security industry analysts and lawmakers will get an unprecedented chance next week to evaluate how the government might respond to a hack attack on critical infrastructure targets.
The Bipartisan Policy Center, a Washington-based non-profit established in 2007 by several lawmakers, will host a simulated nation-wide cyber-attack next Tuesday for a group of former administration and national security officials, who will be playing the roles of Cabinet members.
"</sentencetext>
</article>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_11_1413258.31100628</id>
	<title>Duck and cover!</title>
	<author>gparent</author>
	<datestamp>1265908560000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>The only appropriate response.</htmltext>
<tokenext>The only appropriate response .</tokentext>
<sentencetext>The only appropriate response.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_11_1413258.31101140</id>
	<title>simulated hacks...</title>
	<author>Anonymous</author>
	<datestamp>1265911500000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext>Glancing at the title, I thought maybe they were moving beyond outsourcing and were now beginning to test virtualizing government employees.</htmltext>
<tokenext>Glancing at the title , I thought maybe they were moving beyond outsourcing and were now beginning to test virtualizing government employees .</tokentext>
<sentencetext>Glancing at the title, I thought maybe they were moving beyond outsourcing and were now beginning to test virtualizing government employees.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_11_1413258.31101244</id>
	<title>Re:Simulated?</title>
	<author>Anonymous</author>
	<datestamp>1265911920000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Last place I worked; the fire drills were scheduled months ahead of time. Everyone in the building got several e-mails detailing when it would occur, which route to take, where to meet, and who to report to. Then supervisors would come around personally and ensure that each employee was aware of the drill, and all the accompanying info. Simulations indeed. <br>,<br>Admittedly it does make sense from a business perspective. We had millions of dollars worth of molecular biology experiments running there, and interrupting them (left too long at the wrong temperature etc...) could have proved costly, (at a minimum compromised the data we were gathering). Still, I'm convinced that such a drill serves to satisfy regulations only and provides very little real information about emergency preparedness.</p></htmltext>
<tokenext>Last place I worked ; the fire drills were scheduled months ahead of time .
Everyone in the building got several e-mails detailing when it would occur , which route to take , where to meet , and who to report to .
Then supervisors would come around personally and ensure that each employee was aware of the drill , and all the accompanying info .
Simulations indeed .
,Admittedly it does make sense from a business perspective .
We had millions of dollars worth of molecular biology experiments running there , and interrupting them ( left too long at the wrong temperature etc... ) could have proved costly , ( at a minimum compromised the data we were gathering ) .
Still , I 'm convinced that such a drill serves to satisfy regulations only and provides very little real information about emergency preparedness .</tokentext>
<sentencetext>Last place I worked; the fire drills were scheduled months ahead of time.
Everyone in the building got several e-mails detailing when it would occur, which route to take, where to meet, and who to report to.
Then supervisors would come around personally and ensure that each employee was aware of the drill, and all the accompanying info.
Simulations indeed.
,Admittedly it does make sense from a business perspective.
We had millions of dollars worth of molecular biology experiments running there, and interrupting them (left too long at the wrong temperature etc...) could have proved costly, (at a minimum compromised the data we were gathering).
Still, I'm convinced that such a drill serves to satisfy regulations only and provides very little real information about emergency preparedness.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_11_1413258.31100388</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_11_1413258.31103350</id>
	<title>Re:Simulated?</title>
	<author>david\_thornley</author>
	<datestamp>1265920020000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>
There's two sorts of drills, both useful.
</p><p>
A scheduled drill is a teaching tool.  For example, the recent fire drill where we were all shepherded out the proper door and to the designated rally point.  That develops specific knowledge in the participants.  The drillers won't learn much.
</p><p>
An unscheduled drill is more like a test.  It won't teach the participants much, except in the post-mortem, but it will show you how well they react to the fire alarm or whatever.</p></htmltext>
<tokenext>There 's two sorts of drills , both useful .
A scheduled drill is a teaching tool .
For example , the recent fire drill where we were all shepherded out the proper door and to the designated rally point .
That develops specific knowledge in the participants .
The drillers wo n't learn much .
An unscheduled drill is more like a test .
It wo n't teach the participants much , except in the post-mortem , but it will show you how well they react to the fire alarm or whatever .</tokentext>
<sentencetext>
There's two sorts of drills, both useful.
A scheduled drill is a teaching tool.
For example, the recent fire drill where we were all shepherded out the proper door and to the designated rally point.
That develops specific knowledge in the participants.
The drillers won't learn much.
An unscheduled drill is more like a test.
It won't teach the participants much, except in the post-mortem, but it will show you how well they react to the fire alarm or whatever.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_11_1413258.31100388</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_11_1413258.31100352</id>
	<title>Use it as cover!</title>
	<author>Anonymous</author>
	<datestamp>1265907360000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>3</modscore>
	<htmltext><p>So when a real hack happens at the same time, we don't react?</p></htmltext>
<tokenext>So when a real hack happens at the same time , we do n't react ?</tokentext>
<sentencetext>So when a real hack happens at the same time, we don't react?</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_11_1413258.31100602</id>
	<title>This will be a nice change from the status quo,</title>
	<author>Anonymous</author>
	<datestamp>1265908380000</datestamp>
	<modclass>Funny</modclass>
	<modscore>2</modscore>
	<htmltext>...where "Political Hacks Interfere With US Government Response".</htmltext>
<tokenext>...where " Political Hacks Interfere With US Government Response " .</tokentext>
<sentencetext>...where "Political Hacks Interfere With US Government Response".</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_11_1413258.31100482</id>
	<title>Hope you don't have plans next Tuesday...</title>
	<author>N3tRunner</author>
	<datestamp>1265907840000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>I'm sure this will go well. If you have any government work that you need to do, make sure it's in before next Tuesday! Or maybe you should wait until afterwards in case they lose everything somehow.</p></htmltext>
<tokenext>I 'm sure this will go well .
If you have any government work that you need to do , make sure it 's in before next Tuesday !
Or maybe you should wait until afterwards in case they lose everything somehow .</tokentext>
<sentencetext>I'm sure this will go well.
If you have any government work that you need to do, make sure it's in before next Tuesday!
Or maybe you should wait until afterwards in case they lose everything somehow.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_11_1413258.31177102</id>
	<title>Calling BS</title>
	<author>MrTripps</author>
	<datestamp>1265023140000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>The whole thing is pretty stupid. It doesn't say there is a specific weakness in security, but rather assumes some hypothetical attack that is immediately successful and is able to bypass any and all security measures. It is like running a bank vault security check using the chick from X-Men who can walk through walls as your test intruder. The take away is that a handful of random political people who don't manage IT infrastructure don't know anything about managing IT infrastructure. That won't stop the sensationalist headlines though. Some might suspect that is the whole idea. These days "bipartisan" doesn't mean what it used to mean.</htmltext>
<tokenext>The whole thing is pretty stupid .
It does n't say there is a specific weakness in security , but rather assumes some hypothetical attack that is immediately successful and is able to bypass any and all security measures .
It is like running a bank vault security check using the chick from X-Men who can walk through walls as your test intruder .
The take away is that a handful of random political people who do n't manage IT infrastructure do n't know anything about managing IT infrastructure .
That wo n't stop the sensationalist headlines though .
Some might suspect that is the whole idea .
These days " bipartisan " does n't mean what it used to mean .</tokentext>
<sentencetext>The whole thing is pretty stupid.
It doesn't say there is a specific weakness in security, but rather assumes some hypothetical attack that is immediately successful and is able to bypass any and all security measures.
It is like running a bank vault security check using the chick from X-Men who can walk through walls as your test intruder.
The take away is that a handful of random political people who don't manage IT infrastructure don't know anything about managing IT infrastructure.
That won't stop the sensationalist headlines though.
Some might suspect that is the whole idea.
These days "bipartisan" doesn't mean what it used to mean.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_11_1413258.31100600</id>
	<title>Re:Hope you don't have plans next Tuesday...</title>
	<author>MachDelta</author>
	<datestamp>1265908380000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>"Sorry mister IRS man, my tax got hax'd!"</p></htmltext>
<tokenext>" Sorry mister IRS man , my tax got hax 'd !
"</tokentext>
<sentencetext>"Sorry mister IRS man, my tax got hax'd!
"</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_11_1413258.31100482</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_11_1413258.31102014</id>
	<title>Re:Chinese Sub</title>
	<author>GooberToo</author>
	<datestamp>1265915700000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>3</modscore>
	<htmltext><p>Except that article is all fluff and lacking any type of intelligence.</p><p>Those were regularly scheduled exercises which take place annually in the exact same spot every year. The FACT is, no one in the military was embarrassed. Period. Only the idiot reporters, who improperly frame it as an embarrassment, have been embarrassed.</p><p>This is reality. The Chinese, wishing to cause a publicity stunt, hoping that idiots, which are frequently referred to as reporters, will pick up on a stunt are report on it because one, they are idiots, and two, won't actually check fact their story. And so, the Chinese decide to quietly sit in the middle of nowhere waiting for the US military to come along; as they've done every year preceding for who knows how many years. Sure enough, just like every year before, the US Navy comes cruising along in the exact same area. The Chinese pop up and start cruising toward the highest value target available; a US aircraft carrier. Next, idiot reporter states the military is embarrassed because he's too stupid to realize they are not.</p><p>The simple truth is, unless they are able to break US military cryptography, which I very seriously doubt, or if they are planning on a preemptive strike whereby China disappears from the face of the Earth, this is in no way, shape, or form, representative of any type of military action possible by the Chinese.</p><p>The Chinese do not pose any credible threat to the US Navy in open waters. None. Not one bit. They do, however, pose a threat in regional, shallow waters, which is why the Navy is pushing so hard to improve their sonar capabilities in that environment.</p><p>To summarize, the only people embarrassed by the Chinese are idiot reporters and ignorant masses who believe it speaks to China's Naval capabilities. In reality, it was a completely non-news event and reports and people who ignorantly repeat such stories are nothing but sock puppets for the Chinese propaganda machine; which the US Military is now trying to play to obtain yet additional funding.</p></htmltext>
<tokenext>Except that article is all fluff and lacking any type of intelligence.Those were regularly scheduled exercises which take place annually in the exact same spot every year .
The FACT is , no one in the military was embarrassed .
Period. Only the idiot reporters , who improperly frame it as an embarrassment , have been embarrassed.This is reality .
The Chinese , wishing to cause a publicity stunt , hoping that idiots , which are frequently referred to as reporters , will pick up on a stunt are report on it because one , they are idiots , and two , wo n't actually check fact their story .
And so , the Chinese decide to quietly sit in the middle of nowhere waiting for the US military to come along ; as they 've done every year preceding for who knows how many years .
Sure enough , just like every year before , the US Navy comes cruising along in the exact same area .
The Chinese pop up and start cruising toward the highest value target available ; a US aircraft carrier .
Next , idiot reporter states the military is embarrassed because he 's too stupid to realize they are not.The simple truth is , unless they are able to break US military cryptography , which I very seriously doubt , or if they are planning on a preemptive strike whereby China disappears from the face of the Earth , this is in no way , shape , or form , representative of any type of military action possible by the Chinese.The Chinese do not pose any credible threat to the US Navy in open waters .
None. Not one bit .
They do , however , pose a threat in regional , shallow waters , which is why the Navy is pushing so hard to improve their sonar capabilities in that environment.To summarize , the only people embarrassed by the Chinese are idiot reporters and ignorant masses who believe it speaks to China 's Naval capabilities .
In reality , it was a completely non-news event and reports and people who ignorantly repeat such stories are nothing but sock puppets for the Chinese propaganda machine ; which the US Military is now trying to play to obtain yet additional funding .</tokentext>
<sentencetext>Except that article is all fluff and lacking any type of intelligence.Those were regularly scheduled exercises which take place annually in the exact same spot every year.
The FACT is, no one in the military was embarrassed.
Period. Only the idiot reporters, who improperly frame it as an embarrassment, have been embarrassed.This is reality.
The Chinese, wishing to cause a publicity stunt, hoping that idiots, which are frequently referred to as reporters, will pick up on a stunt are report on it because one, they are idiots, and two, won't actually check fact their story.
And so, the Chinese decide to quietly sit in the middle of nowhere waiting for the US military to come along; as they've done every year preceding for who knows how many years.
Sure enough, just like every year before, the US Navy comes cruising along in the exact same area.
The Chinese pop up and start cruising toward the highest value target available; a US aircraft carrier.
Next, idiot reporter states the military is embarrassed because he's too stupid to realize they are not.The simple truth is, unless they are able to break US military cryptography, which I very seriously doubt, or if they are planning on a preemptive strike whereby China disappears from the face of the Earth, this is in no way, shape, or form, representative of any type of military action possible by the Chinese.The Chinese do not pose any credible threat to the US Navy in open waters.
None. Not one bit.
They do, however, pose a threat in regional, shallow waters, which is why the Navy is pushing so hard to improve their sonar capabilities in that environment.To summarize, the only people embarrassed by the Chinese are idiot reporters and ignorant masses who believe it speaks to China's Naval capabilities.
In reality, it was a completely non-news event and reports and people who ignorantly repeat such stories are nothing but sock puppets for the Chinese propaganda machine; which the US Military is now trying to play to obtain yet additional funding.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_11_1413258.31101200</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_11_1413258.31126188</id>
	<title>hooray</title>
	<author>Anonymous</author>
	<datestamp>1266069000000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>they do this every fucking year.   it keeps contractors and subcontractors employed (think GenDyn, Lockheed, IBM, MS, etc) and making payroll.</p></htmltext>
<tokenext>they do this every fucking year .
it keeps contractors and subcontractors employed ( think GenDyn , Lockheed , IBM , MS , etc ) and making payroll .</tokentext>
<sentencetext>they do this every fucking year.
it keeps contractors and subcontractors employed (think GenDyn, Lockheed, IBM, MS, etc) and making payroll.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_11_1413258.31100842</id>
	<title>Observe 4Chan</title>
	<author>taliesinangelus</author>
	<datestamp>1265909700000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Shouldn't they learn all they need to know from observing 4Chan and Verizon?</htmltext>
<tokenext>Should n't they learn all they need to know from observing 4Chan and Verizon ?</tokentext>
<sentencetext>Shouldn't they learn all they need to know from observing 4Chan and Verizon?</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_11_1413258.31100788</id>
	<title>The Office</title>
	<author>LtGordon</author>
	<datestamp>1265909400000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Reminds me of episode where Dwight teaches the office self-defense by attacking himself. It's kind of hard to successfully attack yourself without <i>the element of surprise!</i></htmltext>
<tokenext>Reminds me of episode where Dwight teaches the office self-defense by attacking himself .
It 's kind of hard to successfully attack yourself without the element of surprise !</tokentext>
<sentencetext>Reminds me of episode where Dwight teaches the office self-defense by attacking himself.
It's kind of hard to successfully attack yourself without the element of surprise!</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_11_1413258.31101264</id>
	<title>In the meantime...</title>
	<author>noddyxoi</author>
	<datestamp>1265912040000</datestamp>
	<modclass>Funny</modclass>
	<modscore>2</modscore>
	<htmltext>Goldman Sachs and JPM prepare a Short Selling attack in America.</htmltext>
<tokenext>Goldman Sachs and JPM prepare a Short Selling attack in America .</tokentext>
<sentencetext>Goldman Sachs and JPM prepare a Short Selling attack in America.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_11_1413258.31100566</id>
	<title>how will they know?</title>
	<author>Anonymous</author>
	<datestamp>1265908260000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>4</modscore>
	<htmltext><blockquote><div><p>Security industry analysts and lawmakers will get an unprecedented chance next week to evaluate how the government might respond to a hack attack on critical infrastructure targets</p></div></blockquote><p>Have they been notified? And how is it a simulation if they are or how will they know how to respond or detect it even?</p><p>If I imagine this to happen here, to a global bank, this has been a real scenario:</p><p>"How did they get those data?"<br>
"Appearantly all our clients have been leaked"<br>
"Oh shits, heads gonna roll! Call serverteam!!"<br>
*Perform security audit, fire 3rd party solution creators, creating a hole through carelessness.*</p><p>Now, if you would do a "large scale test", it will in my experience go like this:<br>:<br>
"Agents complain of slow access, what is up?"<br>
"It's lunchbreak, people are surfing, let them know we're checking it out."<br>
"Agents are still complaining, we have some error logs coming in from website users."<br>
"Ok, lets contact servermaintenance, request a logfile."<br>
"Server maintenance here, we're swamped with requests, I can send it to you tomorrow or the day after soonest."<br>
"We need a stat on the server, things are slow"<br>
"CPU is looking ok, memory is reasonable. Must be some configuration on your side, wait for the logs. Tmorrow."<br>
"Oh, nvm it cleared up. Guess we got a pusblished article in the papers drawing in more folks. Applause for sales. Close the ticket."</p></div>
	</htmltext>
<tokenext>Security industry analysts and lawmakers will get an unprecedented chance next week to evaluate how the government might respond to a hack attack on critical infrastructure targetsHave they been notified ?
And how is it a simulation if they are or how will they know how to respond or detect it even ? If I imagine this to happen here , to a global bank , this has been a real scenario : " How did they get those data ?
" " Appearantly all our clients have been leaked " " Oh shits , heads gon na roll !
Call serverteam ! !
" * Perform security audit , fire 3rd party solution creators , creating a hole through carelessness .
* Now , if you would do a " large scale test " , it will in my experience go like this : : " Agents complain of slow access , what is up ?
" " It 's lunchbreak , people are surfing , let them know we 're checking it out .
" " Agents are still complaining , we have some error logs coming in from website users .
" " Ok , lets contact servermaintenance , request a logfile .
" " Server maintenance here , we 're swamped with requests , I can send it to you tomorrow or the day after soonest .
" " We need a stat on the server , things are slow " " CPU is looking ok , memory is reasonable .
Must be some configuration on your side , wait for the logs .
Tmorrow. " " Oh , nvm it cleared up .
Guess we got a pusblished article in the papers drawing in more folks .
Applause for sales .
Close the ticket .
"</tokentext>
<sentencetext>Security industry analysts and lawmakers will get an unprecedented chance next week to evaluate how the government might respond to a hack attack on critical infrastructure targetsHave they been notified?
And how is it a simulation if they are or how will they know how to respond or detect it even?If I imagine this to happen here, to a global bank, this has been a real scenario:"How did they get those data?
"
"Appearantly all our clients have been leaked"
"Oh shits, heads gonna roll!
Call serverteam!!
"
*Perform security audit, fire 3rd party solution creators, creating a hole through carelessness.
*Now, if you would do a "large scale test", it will in my experience go like this::
"Agents complain of slow access, what is up?
"
"It's lunchbreak, people are surfing, let them know we're checking it out.
"
"Agents are still complaining, we have some error logs coming in from website users.
"
"Ok, lets contact servermaintenance, request a logfile.
"
"Server maintenance here, we're swamped with requests, I can send it to you tomorrow or the day after soonest.
"
"We need a stat on the server, things are slow"
"CPU is looking ok, memory is reasonable.
Must be some configuration on your side, wait for the logs.
Tmorrow."
"Oh, nvm it cleared up.
Guess we got a pusblished article in the papers drawing in more folks.
Applause for sales.
Close the ticket.
"
	</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_11_1413258.31101122</id>
	<title>Re:Simulated?</title>
	<author>hey!</author>
	<datestamp>1265911380000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>2</modscore>
	<htmltext><p>That's kind of an extreme position, don't you think?</p><p>Just because an unannounced drill is useful, doesn't mean announced drills aren't useful.  For one thing, you *can't* do realistic drills of some scenarios. Some reactions to emergencies kill people.  Clog the roads with emergency vehicles and panicking people and rush most of your EMTs and ambulances to the "disaster" site and people who need to ride in an ambulance for real suffer.  Shutdown the airport for a few hours and somebody might not get his heart transplant.</p><p>People and groups learn by being stretched, and of course an unannounced drill stretches people, but sometimes when people are very poorly prepared they don't learn anything from abject failure.  If *nothing* works, then you get a useless emotional reaction.  If you give people a chance to prepare, you can get them to think about the general parameters of what an effective response would be.</p><p>Not everything in a drill people know is coming has to be expected.  So you got your workers out there, and then you say, "OK everyone, the UHF radios have stopped working," or "You can't get any blood plasma from Mount Sinai because they're full up with casualties," or "Guess what, this isn't a chemical spill, it's radioactive."</p><p>The thing about disasters is that they disrupt normal systems. That's the <em>definition</em> of a disaster.  It takes a while to get people trained up to the point where you can throw anything at them and it will be a learning experience.</p></htmltext>
<tokenext>That 's kind of an extreme position , do n't you think ? Just because an unannounced drill is useful , does n't mean announced drills are n't useful .
For one thing , you * ca n't * do realistic drills of some scenarios .
Some reactions to emergencies kill people .
Clog the roads with emergency vehicles and panicking people and rush most of your EMTs and ambulances to the " disaster " site and people who need to ride in an ambulance for real suffer .
Shutdown the airport for a few hours and somebody might not get his heart transplant.People and groups learn by being stretched , and of course an unannounced drill stretches people , but sometimes when people are very poorly prepared they do n't learn anything from abject failure .
If * nothing * works , then you get a useless emotional reaction .
If you give people a chance to prepare , you can get them to think about the general parameters of what an effective response would be.Not everything in a drill people know is coming has to be expected .
So you got your workers out there , and then you say , " OK everyone , the UHF radios have stopped working , " or " You ca n't get any blood plasma from Mount Sinai because they 're full up with casualties , " or " Guess what , this is n't a chemical spill , it 's radioactive .
" The thing about disasters is that they disrupt normal systems .
That 's the definition of a disaster .
It takes a while to get people trained up to the point where you can throw anything at them and it will be a learning experience .</tokentext>
<sentencetext>That's kind of an extreme position, don't you think?Just because an unannounced drill is useful, doesn't mean announced drills aren't useful.
For one thing, you *can't* do realistic drills of some scenarios.
Some reactions to emergencies kill people.
Clog the roads with emergency vehicles and panicking people and rush most of your EMTs and ambulances to the "disaster" site and people who need to ride in an ambulance for real suffer.
Shutdown the airport for a few hours and somebody might not get his heart transplant.People and groups learn by being stretched, and of course an unannounced drill stretches people, but sometimes when people are very poorly prepared they don't learn anything from abject failure.
If *nothing* works, then you get a useless emotional reaction.
If you give people a chance to prepare, you can get them to think about the general parameters of what an effective response would be.Not everything in a drill people know is coming has to be expected.
So you got your workers out there, and then you say, "OK everyone, the UHF radios have stopped working," or "You can't get any blood plasma from Mount Sinai because they're full up with casualties," or "Guess what, this isn't a chemical spill, it's radioactive.
"The thing about disasters is that they disrupt normal systems.
That's the definition of a disaster.
It takes a while to get people trained up to the point where you can throw anything at them and it will be a learning experience.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_11_1413258.31100388</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_11_1413258.31101168</id>
	<title>You're an idiot.</title>
	<author>Anonymous</author>
	<datestamp>1265911560000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p><div class="quote"><p>So when a real hack happens at the same time, we don't react?</p></div><p>You're not a genius, dude.  You don't actually think of shit nobody else considered.</p><p>Case in point, no computers participating in this simulated attack would have any confidential information, because the testers would be a vulnerability.  This is essentially a drill, allowing people to learn what decisions to take in case of a serious attack.  If somebody else takes this time to hack <b>real</b> systems, believe me, nobody is going to think it's part of the drill.</p></div>
	</htmltext>
<tokenext>So when a real hack happens at the same time , we do n't react ? You 're not a genius , dude .
You do n't actually think of shit nobody else considered.Case in point , no computers participating in this simulated attack would have any confidential information , because the testers would be a vulnerability .
This is essentially a drill , allowing people to learn what decisions to take in case of a serious attack .
If somebody else takes this time to hack real systems , believe me , nobody is going to think it 's part of the drill .</tokentext>
<sentencetext>So when a real hack happens at the same time, we don't react?You're not a genius, dude.
You don't actually think of shit nobody else considered.Case in point, no computers participating in this simulated attack would have any confidential information, because the testers would be a vulnerability.
This is essentially a drill, allowing people to learn what decisions to take in case of a serious attack.
If somebody else takes this time to hack real systems, believe me, nobody is going to think it's part of the drill.
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_11_1413258.31100352</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_11_1413258.31100388</id>
	<title>Simulated?</title>
	<author>ircmaxell</author>
	<datestamp>1265907480000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>4</modscore>
	<htmltext>A "Simulated" attack?  So basically people wandering around pretending that power just went out?  I understand that holding fire drills is good and all, but why not try lighting a controlled fire and seeing how everyone reacts?  And never announce a drill.  Otherwise, it's simply not real enough to give you useful information about the response...</htmltext>
<tokenext>A " Simulated " attack ?
So basically people wandering around pretending that power just went out ?
I understand that holding fire drills is good and all , but why not try lighting a controlled fire and seeing how everyone reacts ?
And never announce a drill .
Otherwise , it 's simply not real enough to give you useful information about the response.. .</tokentext>
<sentencetext>A "Simulated" attack?
So basically people wandering around pretending that power just went out?
I understand that holding fire drills is good and all, but why not try lighting a controlled fire and seeing how everyone reacts?
And never announce a drill.
Otherwise, it's simply not real enough to give you useful information about the response...</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_11_1413258.31100776</id>
	<title>Crime and Punishment</title>
	<author>Anonymous</author>
	<datestamp>1265909340000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p><nobr> <wbr></nobr></p><div class="quote"><p>... a Washington-based non-profit established in 2007 by several <b>lawmakers</b>...</p></div><p>(Bold emphasis is mine, of course). Is crime such an important part of American culture that they need professional "lawmakers" to constantly think up new laws to enforce?</p></div>
	</htmltext>
<tokenext>... a Washington-based non-profit established in 2007 by several lawmakers... ( Bold emphasis is mine , of course ) .
Is crime such an important part of American culture that they need professional " lawmakers " to constantly think up new laws to enforce ?</tokentext>
<sentencetext> ... a Washington-based non-profit established in 2007 by several lawmakers...(Bold emphasis is mine, of course).
Is crime such an important part of American culture that they need professional "lawmakers" to constantly think up new laws to enforce?
	</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_11_1413258.31101064</id>
	<title>Me, me! Please can I play?</title>
	<author>Anonymous</author>
	<datestamp>1265911020000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Ooo, ooo, me, me, can I please play one of the former Presidents? When they come to notify me of the attack<br>I'll look lost, then I'll read a children's book and look lost for another 30 minutes without doing anything<br>before acknowledging reality and while being dragged away by my aides I'll mumble:<br>"Cyber attack? I... I cybered last night with a woman by the nickname DoubleDDaisy... She kept complaining<br>about my typos and about how slow my typing is... And she now attacked someone because of that or..? Did you<br>offer her money? I have some hooker money in my socks, let me take off my shoes and we'll have this sorted<br>out in a minute..."</p></htmltext>
<tokenext>Ooo , ooo , me , me , can I please play one of the former Presidents ?
When they come to notify me of the attackI 'll look lost , then I 'll read a children 's book and look lost for another 30 minutes without doing anythingbefore acknowledging reality and while being dragged away by my aides I 'll mumble : " Cyber attack ?
I... I cybered last night with a woman by the nickname DoubleDDaisy... She kept complainingabout my typos and about how slow my typing is... And she now attacked someone because of that or.. ?
Did youoffer her money ?
I have some hooker money in my socks , let me take off my shoes and we 'll have this sortedout in a minute... "</tokentext>
<sentencetext>Ooo, ooo, me, me, can I please play one of the former Presidents?
When they come to notify me of the attackI'll look lost, then I'll read a children's book and look lost for another 30 minutes without doing anythingbefore acknowledging reality and while being dragged away by my aides I'll mumble:"Cyber attack?
I... I cybered last night with a woman by the nickname DoubleDDaisy... She kept complainingabout my typos and about how slow my typing is... And she now attacked someone because of that or..?
Did youoffer her money?
I have some hooker money in my socks, let me take off my shoes and we'll have this sortedout in a minute..."</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_11_1413258.31100588</id>
	<title>Simulation of the results follows</title>
	<author>0racle</author>
	<datestamp>1265908320000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>2</modscore>
	<htmltext>I predict that the results will be along the lines that there are some short comings in the responses but overall the results were good enough for most things. Those that conducted the test will be more then happy to assist the targeted agencies shoring up their weak points and improving training for exorbitant prices.</htmltext>
<tokenext>I predict that the results will be along the lines that there are some short comings in the responses but overall the results were good enough for most things .
Those that conducted the test will be more then happy to assist the targeted agencies shoring up their weak points and improving training for exorbitant prices .</tokentext>
<sentencetext>I predict that the results will be along the lines that there are some short comings in the responses but overall the results were good enough for most things.
Those that conducted the test will be more then happy to assist the targeted agencies shoring up their weak points and improving training for exorbitant prices.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_11_1413258.31101078</id>
	<title>How it all works.</title>
	<author>KevinH456</author>
	<datestamp>1265911140000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>in america, you pen test the government
in soviet russia, government pen tests you</htmltext>
<tokenext>in america , you pen test the government in soviet russia , government pen tests you</tokentext>
<sentencetext>in america, you pen test the government
in soviet russia, government pen tests you</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_11_1413258.31100618</id>
	<title>Paranoia</title>
	<author>handy\_vandal</author>
	<datestamp>1265908500000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>What a perfect cover story for launching a real cyber attack. Let the paranoia begin!</htmltext>
<tokenext>What a perfect cover story for launching a real cyber attack .
Let the paranoia begin !</tokentext>
<sentencetext>What a perfect cover story for launching a real cyber attack.
Let the paranoia begin!</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_11_1413258.31100654</id>
	<title>If my paranoid conspiracy theories are correct,</title>
	<author>Anonymous</author>
	<datestamp>1265908740000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext>then the "attack" will be successful, and the "response" will be successful or eventually successful. I'll elaborate after the event is completed.</htmltext>
<tokenext>then the " attack " will be successful , and the " response " will be successful or eventually successful .
I 'll elaborate after the event is completed .</tokentext>
<sentencetext>then the "attack" will be successful, and the "response" will be successful or eventually successful.
I'll elaborate after the event is completed.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_11_1413258.31101358</id>
	<title>Better summary at The Atlantic</title>
	<author>wiredog</author>
	<datestamp>1265912520000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p><a href="http://politics.theatlantic.com/2010/02/\_recreating\_a\_s\_ituation.php" title="theatlantic.com">Right here</a> [theatlantic.com].  Although I expect ot see lots of posts here rated "5", which completely miss the difference between a drill and a war game.</p></htmltext>
<tokenext>Right here [ theatlantic.com ] .
Although I expect ot see lots of posts here rated " 5 " , which completely miss the difference between a drill and a war game .</tokentext>
<sentencetext>Right here [theatlantic.com].
Although I expect ot see lots of posts here rated "5", which completely miss the difference between a drill and a war game.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_11_1413258.31101320</id>
	<title>It's a war game, not a drill</title>
	<author>wiredog</author>
	<datestamp>1265912340000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>They are war gaming this.</p></htmltext>
<tokenext>They are war gaming this .</tokentext>
<sentencetext>They are war gaming this.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_11_1413258.31100388</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_11_1413258.31103770</id>
	<title>Scripted Simulation</title>
	<author>unsupported</author>
	<datestamp>1265921520000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>The simulation is occurring in a hotel.  It is being simulated to test the response of officials.  Not to test the response of security professionals.  There is a production company who is providing scripts to security professionals.  So I am sure the officials will be asking the security professionals for updates or detailed information, which will be scripted.  It is like a table read for a television show, (ie Saturday Night Live), where everyone sits around a table and reads the scripts, without actually being on a stage, with make-up, lights, and cameras.</p></htmltext>
<tokenext>The simulation is occurring in a hotel .
It is being simulated to test the response of officials .
Not to test the response of security professionals .
There is a production company who is providing scripts to security professionals .
So I am sure the officials will be asking the security professionals for updates or detailed information , which will be scripted .
It is like a table read for a television show , ( ie Saturday Night Live ) , where everyone sits around a table and reads the scripts , without actually being on a stage , with make-up , lights , and cameras .</tokentext>
<sentencetext>The simulation is occurring in a hotel.
It is being simulated to test the response of officials.
Not to test the response of security professionals.
There is a production company who is providing scripts to security professionals.
So I am sure the officials will be asking the security professionals for updates or detailed information, which will be scripted.
It is like a table read for a television show, (ie Saturday Night Live), where everyone sits around a table and reads the scripts, without actually being on a stage, with make-up, lights, and cameras.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_11_1413258.31101200</id>
	<title>Chinese Sub</title>
	<author>Hadlock</author>
	<datestamp>1265911740000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>4</modscore>
	<htmltext><p>Does anyone remember this event happening? <br>
&nbsp; <br>
&nbsp; <a href="http://www.dailymail.co.uk/news/article-492804/The-uninvited-guest-Chinese-sub-pops-middle-U-S-Navy-exercise-leaving-military-chiefs-red-faced.html" title="dailymail.co.uk">http://www.dailymail.co.uk/news/article-492804/The-uninvited-guest-Chinese-sub-pops-middle-U-S-Navy-exercise-leaving-military-chiefs-red-faced.html</a> [dailymail.co.uk] <br>
&nbsp; <br>Yes, that really happened in real life. It also happened in Tom Clancy's book "<i>Executive Orders</i>". Let me summarize the headline for you real quick, <b>The uninvited guest: Chinese sub pops up in middle of U.S. Navy exercise, leaving military chiefs red-faced</b> <br>
&nbsp; </p><blockquote><div><p>When the U.S. Navy deploys a battle fleet on exercises, it takes the security of its aircraft carriers very seriously indeed.<br>At least a dozen warships provide a physical guard while the technical wizardry of the world's only military superpower offers an invisible shield to detect and deter any intruders.<br>That is the theory. Or, rather, was the theory. Uninvited guest: A Chinese Song Class submarine, like the one that sufaced by the U.S.S. Kitty Hawk<br>American military chiefs have been left dumbstruck by an undetected Chinese submarine popping up at the heart of a recent Pacific exercise and close to the vast U.S.S. Kitty Hawk - a 1,000ft supercarrier with 4,500 personnel on board.<br>By the time it surfaced the 160ft Song Class diesel-electric attack submarine is understood to have sailed within viable range for launching torpedoes or missiles at the carrier.<br>According to senior Nato officials the incident caused consternation in the U.S. Navy.<br>The Americans had no idea China's fast-growing submarine fleet had reached such a level of sophistication, or that it posed such a threat.<br>One Nato figure said the effect was "as big a shock as the Russians launching Sputnik" - a reference to the Soviet Union's first orbiting satellite in 1957 which marked the start of the space age.<br>The incident, which took place in the ocean between southern Japan and Taiwan, is a major embarrassment for the Pentagon. Battle stations: The Kitty Hawk carries 4,500 personnel<br>The lone Chinese vessel slipped past at least a dozen other American warships which were supposed to protect the carrier from hostile aircraft or submarines.<br>And the rest of the costly defensive screen, which usually includes at least two U.S. submarines, was also apparently unable to detect it.<br>According to the Nato source, the encounter has forced a serious re-think of American and Nato naval strategy as commanders reconsider the level of threat from potentially hostile Chinese submarines.<br>It also led to tense diplomatic exchanges, with shaken American diplomats demanding to know why the submarine was "shadowing" the U.S. fleet while Beijing pleaded ignorance and dismissed the affair as coincidence.<br>Analysts believe Beijing was sending a message to America and the West demonstrating its rapidly-growing military capability to threaten foreign powers which try to interfere in its "backyard".<br>The People's Liberation Army Navy's submarine fleet includes at least two nuclear-missile launching vessels.<br>Its 13 Song Class submarines are extremely quiet and difficult to detect when running on electric motors.<br>Commodore Stephen Saunders, editor of Jane's Fighting Ships, and a former Royal Navy anti-submarine specialist, said the U.S. had paid relatively little attention to this form of warfare since the end of the Cold War.<br>He said: "It was certainly a wake-up call for the Americans.<br>"It would tie in with what we see the Chinese trying to do, which appears to be to deter the Americans from interfering or operating in their backyard, particularly in relation to Taiwan."<br>In January China carried a successful missile test, shooting down a satellite in orbit for the first time.</p></div></blockquote><p>...So who's to say something similar won't happen this time, except in cyberspace? Imagine, in the middle of a simulated hack, the Chinese government actually hacks our systems during a military exercise. Knowing what we know now, it's not improbable.</p></div>
	</htmltext>
<tokenext>Does anyone remember this event happening ?
    http : //www.dailymail.co.uk/news/article-492804/The-uninvited-guest-Chinese-sub-pops-middle-U-S-Navy-exercise-leaving-military-chiefs-red-faced.html [ dailymail.co.uk ]   Yes , that really happened in real life .
It also happened in Tom Clancy 's book " Executive Orders " .
Let me summarize the headline for you real quick , The uninvited guest : Chinese sub pops up in middle of U.S. Navy exercise , leaving military chiefs red-faced   When the U.S. Navy deploys a battle fleet on exercises , it takes the security of its aircraft carriers very seriously indeed.At least a dozen warships provide a physical guard while the technical wizardry of the world 's only military superpower offers an invisible shield to detect and deter any intruders.That is the theory .
Or , rather , was the theory .
Uninvited guest : A Chinese Song Class submarine , like the one that sufaced by the U.S.S .
Kitty HawkAmerican military chiefs have been left dumbstruck by an undetected Chinese submarine popping up at the heart of a recent Pacific exercise and close to the vast U.S.S .
Kitty Hawk - a 1,000ft supercarrier with 4,500 personnel on board.By the time it surfaced the 160ft Song Class diesel-electric attack submarine is understood to have sailed within viable range for launching torpedoes or missiles at the carrier.According to senior Nato officials the incident caused consternation in the U.S. Navy.The Americans had no idea China 's fast-growing submarine fleet had reached such a level of sophistication , or that it posed such a threat.One Nato figure said the effect was " as big a shock as the Russians launching Sputnik " - a reference to the Soviet Union 's first orbiting satellite in 1957 which marked the start of the space age.The incident , which took place in the ocean between southern Japan and Taiwan , is a major embarrassment for the Pentagon .
Battle stations : The Kitty Hawk carries 4,500 personnelThe lone Chinese vessel slipped past at least a dozen other American warships which were supposed to protect the carrier from hostile aircraft or submarines.And the rest of the costly defensive screen , which usually includes at least two U.S. submarines , was also apparently unable to detect it.According to the Nato source , the encounter has forced a serious re-think of American and Nato naval strategy as commanders reconsider the level of threat from potentially hostile Chinese submarines.It also led to tense diplomatic exchanges , with shaken American diplomats demanding to know why the submarine was " shadowing " the U.S. fleet while Beijing pleaded ignorance and dismissed the affair as coincidence.Analysts believe Beijing was sending a message to America and the West demonstrating its rapidly-growing military capability to threaten foreign powers which try to interfere in its " backyard " .The People 's Liberation Army Navy 's submarine fleet includes at least two nuclear-missile launching vessels.Its 13 Song Class submarines are extremely quiet and difficult to detect when running on electric motors.Commodore Stephen Saunders , editor of Jane 's Fighting Ships , and a former Royal Navy anti-submarine specialist , said the U.S. had paid relatively little attention to this form of warfare since the end of the Cold War.He said : " It was certainly a wake-up call for the Americans .
" It would tie in with what we see the Chinese trying to do , which appears to be to deter the Americans from interfering or operating in their backyard , particularly in relation to Taiwan .
" In January China carried a successful missile test , shooting down a satellite in orbit for the first time....So who 's to say something similar wo n't happen this time , except in cyberspace ?
Imagine , in the middle of a simulated hack , the Chinese government actually hacks our systems during a military exercise .
Knowing what we know now , it 's not improbable .</tokentext>
<sentencetext>Does anyone remember this event happening?
  
  http://www.dailymail.co.uk/news/article-492804/The-uninvited-guest-Chinese-sub-pops-middle-U-S-Navy-exercise-leaving-military-chiefs-red-faced.html [dailymail.co.uk] 
  Yes, that really happened in real life.
It also happened in Tom Clancy's book "Executive Orders".
Let me summarize the headline for you real quick, The uninvited guest: Chinese sub pops up in middle of U.S. Navy exercise, leaving military chiefs red-faced 
  When the U.S. Navy deploys a battle fleet on exercises, it takes the security of its aircraft carriers very seriously indeed.At least a dozen warships provide a physical guard while the technical wizardry of the world's only military superpower offers an invisible shield to detect and deter any intruders.That is the theory.
Or, rather, was the theory.
Uninvited guest: A Chinese Song Class submarine, like the one that sufaced by the U.S.S.
Kitty HawkAmerican military chiefs have been left dumbstruck by an undetected Chinese submarine popping up at the heart of a recent Pacific exercise and close to the vast U.S.S.
Kitty Hawk - a 1,000ft supercarrier with 4,500 personnel on board.By the time it surfaced the 160ft Song Class diesel-electric attack submarine is understood to have sailed within viable range for launching torpedoes or missiles at the carrier.According to senior Nato officials the incident caused consternation in the U.S. Navy.The Americans had no idea China's fast-growing submarine fleet had reached such a level of sophistication, or that it posed such a threat.One Nato figure said the effect was "as big a shock as the Russians launching Sputnik" - a reference to the Soviet Union's first orbiting satellite in 1957 which marked the start of the space age.The incident, which took place in the ocean between southern Japan and Taiwan, is a major embarrassment for the Pentagon.
Battle stations: The Kitty Hawk carries 4,500 personnelThe lone Chinese vessel slipped past at least a dozen other American warships which were supposed to protect the carrier from hostile aircraft or submarines.And the rest of the costly defensive screen, which usually includes at least two U.S. submarines, was also apparently unable to detect it.According to the Nato source, the encounter has forced a serious re-think of American and Nato naval strategy as commanders reconsider the level of threat from potentially hostile Chinese submarines.It also led to tense diplomatic exchanges, with shaken American diplomats demanding to know why the submarine was "shadowing" the U.S. fleet while Beijing pleaded ignorance and dismissed the affair as coincidence.Analysts believe Beijing was sending a message to America and the West demonstrating its rapidly-growing military capability to threaten foreign powers which try to interfere in its "backyard".The People's Liberation Army Navy's submarine fleet includes at least two nuclear-missile launching vessels.Its 13 Song Class submarines are extremely quiet and difficult to detect when running on electric motors.Commodore Stephen Saunders, editor of Jane's Fighting Ships, and a former Royal Navy anti-submarine specialist, said the U.S. had paid relatively little attention to this form of warfare since the end of the Cold War.He said: "It was certainly a wake-up call for the Americans.
"It would tie in with what we see the Chinese trying to do, which appears to be to deter the Americans from interfering or operating in their backyard, particularly in relation to Taiwan.
"In January China carried a successful missile test, shooting down a satellite in orbit for the first time....So who's to say something similar won't happen this time, except in cyberspace?
Imagine, in the middle of a simulated hack, the Chinese government actually hacks our systems during a military exercise.
Knowing what we know now, it's not improbable.
	</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_11_1413258.31103194</id>
	<title>Re:Use it as cover!</title>
	<author>Anonymous</author>
	<datestamp>1265919420000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>I guess two days later the US will want to start bombing China, even though "evidence" points to Texas, and a few weeks later anyone who thinks that's dodgy will be arrested under new Patriotism (tm) laws.<br>As the Fearless Iranians From hell sang back in the eighties: "The new definition of patriotism is follow blindly without question"</p></htmltext>
<tokenext>I guess two days later the US will want to start bombing China , even though " evidence " points to Texas , and a few weeks later anyone who thinks that 's dodgy will be arrested under new Patriotism ( tm ) laws.As the Fearless Iranians From hell sang back in the eighties : " The new definition of patriotism is follow blindly without question "</tokentext>
<sentencetext>I guess two days later the US will want to start bombing China, even though "evidence" points to Texas, and a few weeks later anyone who thinks that's dodgy will be arrested under new Patriotism (tm) laws.As the Fearless Iranians From hell sang back in the eighties: "The new definition of patriotism is follow blindly without question"</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_11_1413258.31100352</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_11_1413258.31100400</id>
	<title>Result</title>
	<author>Anonymous</author>
	<datestamp>1265907540000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Send everyone to a simulated jail.</p></htmltext>
<tokenext>Send everyone to a simulated jail .</tokentext>
<sentencetext>Send everyone to a simulated jail.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_11_1413258.31107784</id>
	<title>Re:Simulated?</title>
	<author>Mishotaki</author>
	<datestamp>1265894760000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>controlled fire? bad idea... use a big smoke machine that you got in while everyone was out on weekend and start it in the first hour of monday morning... see how people react to a shitload of smoke coming out of a room instead</htmltext>
<tokenext>controlled fire ?
bad idea... use a big smoke machine that you got in while everyone was out on weekend and start it in the first hour of monday morning... see how people react to a shitload of smoke coming out of a room instead</tokentext>
<sentencetext>controlled fire?
bad idea... use a big smoke machine that you got in while everyone was out on weekend and start it in the first hour of monday morning... see how people react to a shitload of smoke coming out of a room instead</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_11_1413258.31100388</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_11_1413258.31110388</id>
	<title>Where do I sign up?</title>
	<author>Anonymous</author>
	<datestamp>1266007920000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext>It will probably be a honey pot. Eitherway Cult of the Dead Cow or pulltheplug have already r00ted the target in 60 seconds. Not that I have anything to do with CDC or know anyone that does such matters and locks out lazy sys admins. Get your proxy servers ready and chain them ladies and gentleman. Nmap at the ready insecure.org <a href="http://www.sec-tools.org/" title="sec-tools.org" rel="nofollow">http://www.sec-tools.org/</a> [sec-tools.org] or maybe check <a href="http://www.packetstormsecurity.org/" title="packetstormsecurity.org" rel="nofollow">http://www.packetstormsecurity.org/</a> [packetstormsecurity.org] (Evolve or Die) *chuckle*</htmltext>
<tokenext>It will probably be a honey pot .
Eitherway Cult of the Dead Cow or pulltheplug have already r00ted the target in 60 seconds .
Not that I have anything to do with CDC or know anyone that does such matters and locks out lazy sys admins .
Get your proxy servers ready and chain them ladies and gentleman .
Nmap at the ready insecure.org http : //www.sec-tools.org/ [ sec-tools.org ] or maybe check http : //www.packetstormsecurity.org/ [ packetstormsecurity.org ] ( Evolve or Die ) * chuckle *</tokentext>
<sentencetext>It will probably be a honey pot.
Eitherway Cult of the Dead Cow or pulltheplug have already r00ted the target in 60 seconds.
Not that I have anything to do with CDC or know anyone that does such matters and locks out lazy sys admins.
Get your proxy servers ready and chain them ladies and gentleman.
Nmap at the ready insecure.org http://www.sec-tools.org/ [sec-tools.org] or maybe check http://www.packetstormsecurity.org/ [packetstormsecurity.org] (Evolve or Die) *chuckle*</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_11_1413258.31103342</id>
	<title>wait, we've seen this before</title>
	<author>SkunkPussy</author>
	<datestamp>1265919960000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>presumably the response will be to invade an innocent and unrelated country. maybe belgium.</p></htmltext>
<tokenext>presumably the response will be to invade an innocent and unrelated country .
maybe belgium .</tokentext>
<sentencetext>presumably the response will be to invade an innocent and unrelated country.
maybe belgium.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_11_1413258.31101384</id>
	<title>Bogus Simulation: If The Simulation Is Realistic</title>
	<author>Anonymous</author>
	<datestamp>1265912700000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>the government hacks would specify a URL and INVITE hacks.</p><p>Good luck with your submitted <a href="http://www.youtube.com/watch?v=2GdqoQJa6r4" title="youtube.com" rel="nofollow">botnet</a> [youtube.com].</p><p>Yours In St. Petersburg,<br>K. Trout</p></htmltext>
<tokenext>the government hacks would specify a URL and INVITE hacks.Good luck with your submitted botnet [ youtube.com ] .Yours In St. Petersburg,K. Trout</tokentext>
<sentencetext>the government hacks would specify a URL and INVITE hacks.Good luck with your submitted botnet [youtube.com].Yours In St. Petersburg,K. Trout</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_11_1413258.31101228</id>
	<title>The ancient DoS attacks: are they really prepared?</title>
	<author>garompeta</author>
	<datestamp>1265911800000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>2</modscore>
	<htmltext><b>1) Plant a bomb</b> <br>
Who needs a complicated hack when you can use thermite on key interconnections?<p>

<b>2) Lure an insider</b> <br>
Ancient methods that the CIA is still using to gather foreign "intelligence" from their euphemistically called "Agents" (in their respective countries these Agents would be called traitors).<br>
Who can stop a trusted and authorized user with the right privileges from opening ports from behind the enemy lines (aka. firewalls)... when the "bad guys" get him the proper incentive or coersion?</p><p>

<b>3) Creative Social Engineering</b> <br>
Are they also be implementing policies to ensure that people are not plugging randomly dispersed usb drives with malware? The guy who delivers the mail, the fedex guy, the cleaning personnel, the cable guy, the Verizon guy. Those are valid strategies for everyday black hat hacking.</p><p>

Now, that is a realistic scenario. Are they really prepared for that?<br>
If I was planning a full-scale attack to the US infrastructures, the old methods would be the first choices.</p><p>

I can imagine the following happening: </p><p>"Sir, when are they gonna start attacking us? We aren't getting any suspicious traffic"<br> "Ahem, you already have been hacked, training is over".</p></htmltext>
<tokenext>1 ) Plant a bomb Who needs a complicated hack when you can use thermite on key interconnections ?
2 ) Lure an insider Ancient methods that the CIA is still using to gather foreign " intelligence " from their euphemistically called " Agents " ( in their respective countries these Agents would be called traitors ) .
Who can stop a trusted and authorized user with the right privileges from opening ports from behind the enemy lines ( aka .
firewalls ) ... when the " bad guys " get him the proper incentive or coersion ?
3 ) Creative Social Engineering Are they also be implementing policies to ensure that people are not plugging randomly dispersed usb drives with malware ?
The guy who delivers the mail , the fedex guy , the cleaning personnel , the cable guy , the Verizon guy .
Those are valid strategies for everyday black hat hacking .
Now , that is a realistic scenario .
Are they really prepared for that ?
If I was planning a full-scale attack to the US infrastructures , the old methods would be the first choices .
I can imagine the following happening : " Sir , when are they gon na start attacking us ?
We are n't getting any suspicious traffic " " Ahem , you already have been hacked , training is over " .</tokentext>
<sentencetext>1) Plant a bomb 
Who needs a complicated hack when you can use thermite on key interconnections?
2) Lure an insider 
Ancient methods that the CIA is still using to gather foreign "intelligence" from their euphemistically called "Agents" (in their respective countries these Agents would be called traitors).
Who can stop a trusted and authorized user with the right privileges from opening ports from behind the enemy lines (aka.
firewalls)... when the "bad guys" get him the proper incentive or coersion?
3) Creative Social Engineering 
Are they also be implementing policies to ensure that people are not plugging randomly dispersed usb drives with malware?
The guy who delivers the mail, the fedex guy, the cleaning personnel, the cable guy, the Verizon guy.
Those are valid strategies for everyday black hat hacking.
Now, that is a realistic scenario.
Are they really prepared for that?
If I was planning a full-scale attack to the US infrastructures, the old methods would be the first choices.
I can imagine the following happening: "Sir, when are they gonna start attacking us?
We aren't getting any suspicious traffic" "Ahem, you already have been hacked, training is over".</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_11_1413258.31100674</id>
	<title>A Simulated Fire Sale...</title>
	<author>spammeister</author>
	<datestamp>1265908860000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Bruce Willis is not impressed!
(or)
There's an app for that!</htmltext>
<tokenext>Bruce Willis is not impressed !
( or ) There 's an app for that !</tokentext>
<sentencetext>Bruce Willis is not impressed!
(or)
There's an app for that!</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_11_1413258.31101836</id>
	<title>Re:Chinese Submarines at walmart</title>
	<author>Anonymous</author>
	<datestamp>1265915040000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>yes cause we all know the chinese are launching a submarine attack on americans via walmart</p></htmltext>
<tokenext>yes cause we all know the chinese are launching a submarine attack on americans via walmart</tokentext>
<sentencetext>yes cause we all know the chinese are launching a submarine attack on americans via walmart</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_11_1413258.31101200</parent>
</comment>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_02_11_1413258_4</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_11_1413258.31102014
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_11_1413258.31101200
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_02_11_1413258_9</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_11_1413258.31101244
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_11_1413258.31100388
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_02_11_1413258_8</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_11_1413258.31101320
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_11_1413258.31100388
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_02_11_1413258_2</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_11_1413258.31107784
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_11_1413258.31100388
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_02_11_1413258_6</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_11_1413258.31101122
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_11_1413258.31100388
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_02_11_1413258_3</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_11_1413258.31103194
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_11_1413258.31100352
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_02_11_1413258_7</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_11_1413258.31100600
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_11_1413258.31100482
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_02_11_1413258_5</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_11_1413258.31101836
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_11_1413258.31101200
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_02_11_1413258_1</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_11_1413258.31101168
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_11_1413258.31100352
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_02_11_1413258_0</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_11_1413258.31103350
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_11_1413258.31100388
</commentlist>
</thread>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation10_02_11_1413258.7</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_11_1413258.31100482
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_11_1413258.31100600
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation10_02_11_1413258.4</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_11_1413258.31100602
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation10_02_11_1413258.2</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_11_1413258.31100352
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_11_1413258.31103194
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_11_1413258.31101168
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation10_02_11_1413258.1</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_11_1413258.31101078
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation10_02_11_1413258.6</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_11_1413258.31100388
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_11_1413258.31101122
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_11_1413258.31103350
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_11_1413258.31107784
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_11_1413258.31101320
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_11_1413258.31101244
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation10_02_11_1413258.0</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_11_1413258.31100674
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation10_02_11_1413258.5</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_11_1413258.31101200
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_11_1413258.31101836
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_11_1413258.31102014
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation10_02_11_1413258.3</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_11_1413258.31100588
</commentlist>
</conversation>
