Wednesday, October 24, 2018

Great Hunter Orion In The Sky




Orion, legend of the hunter in the skies travels way back to Greek mythology when he was famed for his admiration of Artemis, resulting in the gods transforming Orion into a constellation. Orion has been a subject of interest to many ancient writers such Homer and Hesiod and often looked upon as a important tool for navigation by sailors.

Orion is said to be the son of Poseidon and Euryale. He is known as one of the great Greek lovers and it was said that he fathered over 50 sons to nymphs of the sea.

Orion was unsatisfied by his quests of the nymphs and landed in Chios where he chased after Merope, as one of the great Pleaides herself. It is said that Merope's father promised his daughter to Orion if the island was cleared of troublesome animals. In time Orion did so with very little trouble. The father loathsome to loose his daughter so easily asked Dionysus for help. Dionysus a god of wines and drink did so help by making Orion drunk so that he was blinded by satyrs.


Orion was said to have taken his prized Merope anyways, but the father would not allow the two to marry. As fates were kinder to Orion his sight eventually returned by going to visit Helios upon the ocean at the point where the sun first rises each day faraway in the east.

Upon reaching his destination in the east Helios is said to have restored Orion's sight and Helios's sister Eos, who is known as the dawn of the morning in legends fell immediately in love with the handsome hunter. Their passionate love is said to have given us our beautiful mornings and the blush of dawns.

Only time passing by would tell legends that Orion had more pursuits in love, later he proved ambitious enough to attack the goddess Artemis herself.

For his audacity Orion was cast into the stars by the gods. Below are the three stars of Orion's belt on the right with his dog Sirius as the brightest star in the sky.

Written by Homer, the Iliad shows Orion appearing upon the great shield of Achille's and notes Orion as a constellation made by Hephaistos. Appearing again later in Homer's writings, the next time Orion was very far from the stars and the heavens in the depth's of Hades.

Mentioned by Odysseus, Orion was hardly ever satisfied he continued chasing prey all over the earth armed with a weapons of indestructible bronze. Mentioned by Calypso, the COnstellation Orion had been used as a guide for Odysseus on his way home. Hesiod mentioned Orion's position in the night sky in several writings related to agricultural seasons, many additional constellations are useful for navigation as well.



The Pleaides; the seven sisters of the stars are seen in constant pursuit by Orion. All throughout myth's and legends it has been said that the Pleaides rise in the sky just before Orion symbolizing the chase.

Friday, October 19, 2018

Somethings are left Unseen




Credit: NASA Somethings are left unseen

In 2011 Saul Perlmutter of Berkeley National Laboratory, Brian Schmidt of the Australian National University, and Adam Riess of the Space Telescope Institute were awarded the Nobel prize for running 3 independent teams; all studying the effects of our galaxy 's expansion and confirming that the expansion is speeding up.

It is suspected that a mysterious force called dark matter makes up a good percentage of the material value and gravitational fields, and that dark energy is the a lack of energy over space time fields, composing two different forces in our universe. Scientists are working hard to confirm these theories, which might not be possible unless there was a force working against the inward pull of gravity.

Omega Centari Globular Star Cluster




September 12, 2018 by Jen



Credit: NASA, ESA, and the Hubble SM4 ERO Team

A colorful collection of 100,000 stars are displayed in this small region inside the Omega Centauri globular cluster, a dense group of nearly 10 million stars. This beautiful destination in the sky lies about 16,000 light years away from Earth. Omega Centauri is one of the biggest star clusters in our very own Milky Way Galaxy.

This picture was snapped by the panoramic view of the Hubble Space Telescope. Color versatility reflects the type and age of stars throughout their lifecycles. Yellow and white stars are very much like our sun, they shine brightly as hydrogen is fused deep inside their cores. Later-life stars appear to us as orange and red, they will become cooler and larger as time passes. Stars that are older will accumulate heavier elemental abundances like metals and carbon; whereas young stars have mostly hydrogen and helium, along with a small amount of heavier elements mixed in from their days of their creation.



This picture revealed a small region inside the massive star cluster called Omega Centauri that is home to more than 10 million stars! Hubble observed Omega Centauri on July 15, 2009, in ultraviolet and visible light spectrums.




Bright white and yellow stars are very much like our sun, they shine brilliantly as hydrogen is fused deep inside their cores. Later-in-life stars may appear as orange and red as they become cooler and expand.



Older stars begin to produce and accumulate heavier elements like metals and carbons; whereas young stars are composed of mostly hydrogen and helium. Large planets are also made of hydrogen and helium as well, these lighter gases can be lost in smaller planets.

Omega Centauri is one of the few stars clusters that can be seen with the naked eye, it appears as a small cloud from the Southern Sky in the constellation of Centaurus; Omega Centauri is one of the biggest and brightest star clusters in the Milky Way.


When stars expand they also eject materials from their cores, exhausting their fuel supplies. When a star runs out of helium it has reached the end of its life, only a burned up core called a white dwarf will remain. 

White dwarfs no longer generate heat energy via nuclear fusion, instead they will gravitationally contract  as they  continue to cool and dim for billions of years.. until all their energy is gone.

The stars making up Omega Centauri average from 10 billion to 12 billion years of age. Globular clusters are large swarms of stars tightly bound by gravity through out space time. Globular clusters can remain intact for over 12 billion years and can also be incorporated into Galaxies.

If we lived in Omega Centauri we would see a sky brightly lit with stars a hundred times brighter than on Earth.



As stars emit radiation in different electromagnetic wavelengths; the type of radiated light-waves emitted is dependent upon the temperature and conditions of each star. 

A cooler star at about 3000 Kelvins emits light in the infra-red spectrum. A star with a temperature above 4000 Kelvins will also emit light-waves in the ultra-violet light spectrum. Stars like our sun, burn above 5000 Kelvins and emit the visible light that we can see.

Extremely hot stars can be either; Type A of type B stars which can have temperatures above 10,000 Kelvins. These stars shine in brilliant blue spectrums.

Omega Centauri is actually a global cluster; not an open cluster which makes it different than other star clusters like the Pleiades and Hyades that are open star clusters.







Thursday, October 18, 2018

Everything About Blockchain Technologies



If you are just learning about cryptocurrencies some of the terms at times may seem confusing. The word blockchain may sound like it could be a part of an old automobile or a similar piece of rusty machinery, but it's not. A blockchain is nothing like that at all, more so it's a term used to describe a computer programming algorithm.

What Is A Blockchain?

A blockchain has the ability to store large volumes of new and related data, new entries create the evolution of the chain itself. Many blockchain projects have at the very least a few things in common; each should have a distributed ledger for managing the blockchain, a finite or limited supply of tokens and coins, and they also will operate on programming capable of hosting transactions.

Since blockchain technologies have been introduced to the world we now can handle vast volumes of changing information differently. 

Most favorably, a blockchain is an archive of digital records; wherein each individual new block has a record of the previous block, a timestamp, and records of new entries of data into the system. Each new block is kept in the chain and the blocks are linked together via cryptography. A blockchain, in other words is an open to the public distributed ledger, the ledger is capable of recording all transactions performed on the network with great efficiently.

Once new information has been verified and added to the chain it is permanent unless all nodes vote to make a change, this make information nearly unalterable and increases security accordingly.

All blockchain information can be accessed by the public. The first genesis block of the bitcoin blockchain was mined by Satoshi Nakamoto on January 3rd, 2009. Stored inside the genesis block was a statement that essentially warned of the instability of traditional fractional reserve banking systems. Since Satoshi’s first successful implementation of blockchain technologies to support and run the bitcoin network, many new developers have appeared with ever evolving ideas for the use of blockchain technologies.

Custom Built Blockchains

Some few years back a very talented young man named Vitalik Buterin had the idea to create a custom blockchain different from any other, this blockchain boasted a fast and powerfully shared global infrastructure with a securely encrypted core that can host many different kinds of business applications.

This custom built blockchain today is known as the Ethereum Network, it has evolved into one of the most successfully applied custom blockchains to date.

Ethereum provides support to the largest volume and variety of B2B applications. One of their strongest theories is that a good blockchain application should always be run by a decentralized network that contains shared memory functions and top notch security. Ethereum cryptocurrency economics are founded upon strong cryptography, ensuring privacy and the safety of all users on their network.

Ethereum has a secure base layer and a high speed protocols that allow people to develop and build real time applications for data storage, currency transfers and archiving. At the heart of the design is a security of consensus protocol: this protocol does not depend on any one person, instead it depends on mathematical proofs and systematic design.

A Blockchain is a digital archive of records. Every new individual block in the chain has a record of the previous block, a timestamp, and new data entries moving into the chain. The blocks and data are linked together by cryptography. The term Cryptography refers to using encryption to store data safely in the face of adversaries. Blockchains are securely managed by distributed ledgers. A distributed ledger is essentially a computerized ledger that manages transactions for the blockchain.

Accounting ledgers have been widely used throughout history, more recently new advancements in computing allow electronic ledgers to be distributed throughout the world on node network systems. Each node independently records data and then votes to ensure the majority of nodes that network agree on the results. This verifies that all information is correct and the database will then be updated. Multiple nodes operating running together creates a world wide node networking system.

What's next For Blockchain Technologies?

As different information and archiving needs come into light we will continue to see ever evolving fields of blockchain functionalities emerge. It should be noted that blockchains can improve almost every active database system publicly used in the world simply because they can link changing information in real time. There is no need to wait two days for large databases to update or process information as it's entered, blockchains eliminate delays by instantly storing information throughout distributed networks. All information is then publicly available on the internet. Continuing blockchain technologies will see better transparency and use of applications.

Biased opinions of currency misuse via blockchain technologies and electronic currencies are not so far different than that banknote currencies like U.S. Dollars which can be easily used in a drug trades or illegal activities, electronic currencies can actually be designed to deter currency misuse.

Database Solutions

Communication issues related to billing, food safety, identity, and more may leave citizens behind in real world events whereas blockchain technologies may offer real time communications solutions for databases. We may one day see identity and safety databases that run on blockchain technologies. Blockchains offer less expensive and faster digital currency transfers securely while presenting prime data archiving solutions in real world time. It's obvious the amount of un-used potential is expanding for blockchain related industries for the future.



The Future of Blockchain Technologies

VMware is on the leading edge of future blockchain revolutions as they recently disclosed information that they are working on several projects related to cutting edge cloud computing, artificial intelligences and enterprise blockchain solutions. We hope this info will help you have a great experience when learning about cryptocurrencies.
Thousands of cryptocurrencies are available for you to trade right now. Live digital cryptocurrency exchanges can be done on trading platforms like Bittrex.com

If your interested in mining cryptocurrencies instead of directly purchasing them, consider joining a cloud mining site. Use this complementary 3% off promo code to purchase hash power and join us with the worlds most innovative cloud mining company.


Everything About Cryptocurrency Trading



Everyday traders may earn profits by exchanging various currencies and cryptocurrencies all across the world, live on real time trading platforms. Live cryptocurrency buying / trading takes place on many different cryptocurrency exchange platforms like Coinbase. The values of different currencies tend to move up and down as markets fluctuate. Currency pricing variations are generally due to buying / selling demands of the markets and market trends throughout the world. Many things can influence pricing like things happening like news, progress of a specific coin development, good revenues reports, world events or politics may also play a larger role and more dramatic effects spread across trading boards.

The History of Bitcoin

The design of bitcoin is simple and beautiful, a peer to peer electronic currency system delivered to the world. It requires no permissions, it has no single governing authority, it runs on a decentralized network and by this bitcoin is run by the world. The first genesis block of bitcoin was mined by Satoshi Nakamoto on January 3rd, 2009. Stored inside the genesis block was a statement warning of the instability of traditional fractional reserve banking systems. Since then blockchain mining has been continued and adopted by the world. The list of innovations created since is almost limitless and includes: initial coin offerings, alternative coin projects, new blockchain technologies, worldwide speculation, cryptocurrency exchanges and a more recent explosion of related interest. An inquisitive mind might wonder how much of this did Satoshi Nakamoto foresee?

Who Is Satoshi Nakamoto?

Before traveling further lets take a glance at bitcoin’s creator. The person who authored bitcoins white paper and successfully deployed bitcoins first blockchain is known only by one name, Satoshi Nakamoto. This unknown person or group has seemingly since then vanished into the crowd, leaving behind a legacy of mystery. He is seen as a leader to the countless and faithful around the world, those who can follow Satoshi’s vision and design. The lore behind this mystery and the man will likely live on as most legends do. With his vision, the world has found endless potential in blockchain technologies and they have all developed well beyond initial expectations. Understanding the many uses of blockchain technologies sharpens our worlds perception of the future electronic currencies and digital archiving solutions. An experienced trader may view pricing variations as an opportunity to buy and sell cryptocurrencies for profit, changes in the value of cryptocurrencies and fiat currencies can easily trading opportunities. The effect of pricing variations is reflected across trading platforms around the world in real time, everyday traders around the world are looking to buy and sell currencies to make profits. Bitcoin was the world's first successfully implemented cryptocurrency. It is used most commonly for financial transactions of sending and receiving money and for cryptocurrency trading.

Everyday Bitcoin holds top cash volumes for trading on almost all major trading exchanges around the world. Alt-Coins are newer alternative cryptocurrency projects that are continually being proposed and developed progressively as time go by. Alternative coins are designed for most of the same purposes, like sending and receiving electronic currencies throughout the world. With cryptocurrencies you can send money to and from various platforms and applications with ease, alternative coins are widely used for worldwide payment systems and trading. Some newer altcoins offer many enhanced features and capabilities.

Buying Cryptocurrencies

Once you have purchased cryptocurrency you can send an electronic currency transaction to any exchange platform of your choice for trading. I would recommended to start by purchasing a mainstream coin like bitcoin, litecoin, or ethereum to begin. Before buying any cryptocurrency always do the proper research on the company that issues the coin to see what their about, who works on their team and if it seems like a legitimate developer, you can check their white paper to see what their plans are and how they intend on achieving those goals. While all cryptocurrencies can show volatility at times, certain coins have a far wider community base to help support them.


As a new trader you must open and fund an exchange account, you may want to pick a few ALT-COINS to begin trading against bitcoin pair or pick one of the coins listed available to trade against U.S. Dollars. Cryptocurrency trading platforms feature exchange boards with listing pairings available. On these boards you will see different combinations of currencies and cryptocurrencies that can be traded with each other. Shown on boards by pairing two currencies with abbreviated titles. Live digital asset and cryptocurrency trading happens in real time; allowing investors to monitor their portfolios anytime day or night.

Examples of Trading Platform Currency Pairs

U.S. Dollars / Bitcoin Exchange USD/BTC
U.S. Dollars / Ethereum Exchange USD/ETH
Bitcoin / Ethereum Exchange BTC/ETH
Bitcoin / Litecoin Exchange BTC/LTC

With an exchange account you will see options to buy and sell cryptocurrencies in exchange for other fiat currencies. Fiat currencies are physical currencies like the U.S. Dollar and the European Euro. Bitcoin can usually be exchanged across all trading boards on cryptocurrency exchanges alongside thousands of other alternative coins listed for exchange, each exchange tends to offer a different variety that they support.

Pricing Changes

Pricing of fiat currencies will fluctuate over time as well due to the strengths of economies. Likewise when a European Euro is exchanged for a U.S. Dollar the exchange rate will differ over time depending upon the economic strength of the currency issuer. Prices for all fiat currencies, commodities, electronic funds, stock markets, and cryptocurrency exchanges tend to vary over time.

On most trading platforms you will be able to create a limit buy or sell order, this will allow you to choose a desired rate of trade for each pairing. Another option on some exchanges will let you place a market rate buy or sell order to sell at the current market price. A Stop-limit is designed to offer security and to sell your asset if it drops a certain price range to prevent losses, for heavier investors using stop limit may be advised to protect your investment. A stop limit can protect your assets from severe losses during volatile market events, it can also sell your assets at less than you paid for it so be careful. Some trading strategies involve buying and holding cryptocurrencies for a long term time periods in hopes that the value will rise. Spot trading is live market trading, a technique used by investors to make quick trades for profits.

Opportunities in Cryptocurrency Industries Today

Currently the opportunity to use cryptocurrencies and trade for profit is ever expanding. We see new virtual currency trading exchanges opening up almost daily. New ventures and developing projects of alternative coins continue adding to the capabilities of blockchain technologies. As cryptocurrencies become more commonly used along will come newer innovations, from these we hope to see more stable and secure coins being developed. From these new developments we will also see amazing new data archiving solutions that will be catered to suit the needs of future financial and informational record keeping.

These new developments will also present new investment opportunities if you are watching closely. Cryptocurrencies are currently revolutionizing the way money moves around the world for casual transactions, they can be used as a less expensive and more fluent alternative to traditional banking systems. More adopted use will come along with the clarifications of expectations by governments, hopefully this will allow room for progress in the future by stabilizing and simplifying the use of electronic currencies by the world's population. Thousands of cryptocurrencies are available for you to trade right now.

Cryptocurrency trading has been done by enthusiasts around the world since Bitcoin was first introduced into worldwide finances. Used for moving electronic currency worldwide, Bitcoin operates on peer-to-peer decentralized networks. In 2009 Satoshi Nakamoto published his white paper on the concept of blockchain source codes and the successful implementation of digital currencies and since then the list of new coins and blockchain technologies that has emerged has been almost endless. We hope this guide will help you have a better experience when learning about cryptocurrencies.

Thousands of cryptocurrencies are available for you to trade right now. Live digital cryptocurrency exchanges can be done on trading platforms like Bittrex.com

If your interested in mining cryptocurrencies instead of directly purchasing them, consider joining a cloud mining site. Use this complementary 3% off promo code to purchase hash power and join us with the worlds most innovative cloud mining company.



Everything About Bitcoin

Octobe
A Beginners Guide To Bitcoin



A Beginners Guide To Bitcoin
by JLC

Are you new to the world of cryptocurrencies? If so, you may be wondering what is bitcoin and how does bitcoin function in a highly competitive global economy today? This guide is written for those who know little or nothing about bitcoin. With the information provided here you will be empowered with the most fascinating and fundamental aspects of cryptocurrency design, use and infrastructure. This powerful knowledge will allow you to forever understand the greatest revolution that we call cryptocurrencies in the twenty first century. We hope you follow along and enjoy this guide.

The History of Bitcoin

The design of bitcoin is simple and beautiful, a peer to peer electronic currency system delivered to the world. It requires no permissions, it has no single governing authority, it runs simply on a decentralized network and by this bitcoin is run by the world. The first genesis block of bitcoin was mined by Satoshi Nakamoto on January 3rd, 2009. Stored inside the genesis block was a statement warning of the instability of traditional fractional reserve banking systems. Since then blockchain mining has been continued and adopted by the world. The list of innovations created since is almost limitless and includes: initial coin offerings, alternative coin projects, new blockchain technologies, worldwide speculation, cryptocurrency exchanges and a more recent explosion of related interest. An inquisitive mind might wonder how much of this did Satoshi Nakamoto foresee?

Who Is Satoshi Nakamoto?

Before traveling further lets take a glance at bitcoin’s creator. The person who authored bitcoins white paper and successfully deployed bitcoins first blockchain is known only by one name, Satoshi Nakamoto. This unknown person or group has seemingly since then vanished into the crowd, leaving behind a legacy of mystery. He is seen as a leader to the countless and faithful around the world, those who can follow Satoshi’s vision and design. The lore behind this mystery and the man will likely live on as most legends do. With his vision, the world has found endless potential in blockchain technologies and they have all developed well beyond initial expectations. Understanding the many uses of blockchain technologies sharpens our worlds perception of the future electronic currencies and digital archiving solutions.

Related Terms

A blockchain is simply an archive of digital records. Every new individual block in the chain has a record of the previous block, a timestamp, and serves the purpose of recording new data entered into the system. The blocks and data are linked together via cryptography. The term cryptography refers to using encryption to store data safely in the face of adversaries. Thenceforth blockchains are securely managed by distributed ledgers. A distributed ledger is a computerized ledger that manages transactions throughout the blockchain. Is is true that accounting ledgers have been widely used throughout history, only recently new advancements in computing have allowed electronic ledgers to be distributed throughout the world via node networking systems. Each node independently records data and then votes to ensure the majority of nodes on that network agrees on the results. This verifies that all information is correct and the database is then updated. Multiple nodes operating around the world creates a world wide node network system.

How To Buy and Store Bitcoin

Storing bitcoin anywhere other than an exchange requires downloading a bitcoin wallet on your device. With this wallet you can send bitcoin to a receiving address for storage. For every new wallet created, a private key and a public key are generated via encryption. The key creation and encryption process is irreversible and secure. A public key is similar to an email address that can be shared with anyone. With your public key you can send and receive bitcoin safely and securely.

Public Key Example: DeXt2ne8pOvrxSme90wapEgdxm3ltomX


A private key is a much longer unique signature that should never shared, stored or revealed to anybody. With this key your funds can be accessed from anywhere in the world. Adding extra security protocols like 2 factor authentication to your accounts is strongly advised. Most cases of theft are caused by a mistake in either of the two aforementioned statements or poor data storage management. For convenience and flexibility you can also store and trade cryptocurrencies on secure trading platforms, by far my favorite and one of the most secure is Bittrex.com.

Advantages of Bitcoin

Still today the main features of bitcoin are safety, security and speed. Bitcoin may be purchased at multiple exchanges around the world in real time, at your convenience 24 hours a day and 7 days a week. There are no time or border restrictions. Imposing regulations and taxes by governing territories is still currently up for debate, likewise certain countries have placed domestic laws preventing trade on their land. Otherwise, there are no excessive fees related to using bitcoin. Bitcoin, unlike the stock markets or traditional banking systems is built with freedom and flexibility in mind.

The conveniences of spending bitcoin are expanding every day: It can be used for purchases at supporting retail outlets, online payments for goods and services, cash withdrawals from bitcoin ATMs, and for financial investing and trading. Unlike the U.S. Dollar or Chinese Yuan bitcoin is not necessarily meant to hold one stable value, instead it is flexible depending on worldwide demand and availability. One day the last bitcoin blockchain will be created along with the last 50 bitcoins. The number of bitcoins that can ever exist is 21 million, this is a finite number, that number can never go up and demands increase almost daily. If demand continues rising so will the value of bitcoin. As a worldwide finance vehicle bitcoin strengthens a our communities, supports new tech startups, enhances better business to business relationships and flexibly allows worldwide commerce. In a grander view cryptocurrencies can bring together our interests and economies allowing a whole new world of possibilities.


Cryptocurrencies right now are revolutionizing the way we think about traditional banking systems by stabilizing and simplifying the movement of money fluently and securely, at a much lesser expense. Thousands of cryptocurrencies are available for you to trade right now. Live digital cryptocurrency exchanges can be done on trading platforms like Bittrex.com

If your interested in mining cryptocurrencies instead of directly purchasing them, consider joining a cloud mining site. Use this complementary 3% off promo code to purchase hash power and join us with the worlds most innovative cloud mining company.


Sunday, October 14, 2018

Lockhead Martin Hacked 2018


Lockheed Martin said they have proof that hackers breached its network by using data stolen from a vendor that supplies coded security tokens to tens of millions of computer users. These findings confirm the fears of security experts about the safety of the SecurID tokens and growing concerns that other companies or government agencies that could be vulnerable to similar attacks.

SecurID Tokens are used to allow remote access to computer networks and are sold by the RSA Security Division of the EMC Corporation. RSA disclosed in March that hackers had stolen data that could compromise a company’s SecurID system in a broader attack. The breach of Lockheed, the nation’s largest defense contractor is a first for such an intentional damaging attack.

Higher frequencies of security breaches bring increasing tensions over the sophistication of computer hacking. Google said this week that it believed an effort to steal hundreds of Gmail passwords for accounts of prominent people, including senior American government officials, had originated in China. These findings confirm the fears of security experts about the safety of the SecurID tokens and growing concerns that other companies or government agencies could be vulnerable to similar attacks.


US charged Chinese Hackers for Stealing Sensitive Defense Information From the Largest United States Defense Contractor Lockheed Martin.

The US government continues to put pressure on Chinese cyber-espionage activities that stress international informational relationships. The US Justice Department has filed charges against a Chinese national named Su Bin. The business owner is charged with working with two unknown hackers to illegally obtain information on military aircraft produced by US defense contractors. Bin was reportedly arrested in Canada on June 28th and is facing extradition.


The three conspirators worked from 2009 to 2013 on obtaining the information, and they were apparently successful in stealing some sensitive documents related to the Lockheed Martin-built F-22 and F-35 fighter jets, as well as Boeing's C-17 military transport aircraft. The complaint additionally alleges that the conspirators provided Bin with a 1,467-page document of potential hacking targets. Bin could then select attractive files that he could then potentially sell to state-owned aerospace companies in China. While it seems that he was working for monetary gains the information gathered ended up directly in the hands of companies owned by the Chinese government.


Earlier this year the US charged Chinese army hackers for economic espionage for the first time it formally accused another country of hacking for economic gain. That was merely a high water mark in what has long been a heated exchange of words as the US has repeatedly cautioned the Chinese over the dangers of its cyber-espionage programs. According to a national intelligence report, the country's efforts to steal US trade secrets are the most aggressive in the world. 



Estimates say that these cyber-espionage activities cost the US anywhere from $24 billion to $120 billion per year. Lockheed Martin said they have proof that hackers breached its network by using data stolen from a vendor that supplies coded security tokens to tens of millions of computer users. These findings confirm the fears of security experts about the safety of the SecurID tokens and growing concerns that other companies or government agencies could be vulnerable to similar attacks.


Tokens that are used to allow remote access to computer networks are sold by the RSA Security Division of the EMC Corporation. RSA disclosed in March that hackers had stolen data that could compromise a company’s SecurID system in a broader attack. The breach of Lockheed, the nation’s largest defense contractor is a first for such a poorly intended and damaging attack.

Higher frequencies of security breaches bring increasing tensions over the sophistication and poor intent of computer hacking. Google said this week that it believed an effort to steal hundreds of Gmail passwords for accounts of prominent people, including senior American government officials, had originated in China. These findings confirm the fears of security experts about the safety of the SecurID tokens and growing concerns that other companies or government agencies could be vulnerable to similar attacks.


The Pentagon, which has long been concerned about efforts by China and Russia to obtain military secrets, announced separately that it would soon view serious computer attacks from foreign nations as acts of war that could result in a military response.

RSA officials noted that Lockheed said it planned to continue using the SecurID tokens, and they said they believed other customers would as well. 


But security experts said RSA’s reputation had most likely been seriously damaged, and many of its 25,000 customers, including Fortune 500 companies and government agencies around the world face hard decisions about what to do next. RSA’s prospects for holding on to some of those customers certainly seems bleak said the chief technology officer at Bit9, a firm that provides other types of security products and does not compete with RSA. He and other experts said RSA might need to reprogram many of its security tokens or create an upgraded version to rebuild confidence in its systems. In response to questions on Friday,


Lockheed said in an e-mail that its computer experts had concluded that the breach at RSA in March was a direct contributing factor in the attack on its network. Government and industry officials said the hackers had used some of the RSA data and other techniques to piece together the coded password of a Lockheed contractor who had access to Lockheed’s system. Lockheed, which makes fighter planes, spy satellites and other confidential equipment, said it had detected the attack quickly and blocked it before any important data was compromised.







Lockheed said it was replacing 45,000 SecurID tokens held by workers who need to log into its system from customer offices hotels or their homes. They also required its employees to change their passwords and it added a step to its sign-on process. He said the company would discuss reprogramming tokens with companies. In some cases that may require more work than other measures they could take to beef up different parts of their security systems. RSA based in Bedford Mass has declined to specify what data was stolen in March. It has also said that it detected the attack as the hackers were removing the data and that the attack was only partly successful.


But independent security experts have speculated that the hackers obtained at least part of the databases holding serial numbers and other critical data for the tens of millions of tokens, and Lockheed’s confirmation that the stolen data played a role in its attack supported that theory.


The RSA tokens provide security beyond a user name or password by requiring users to enter a unique number generated by the token each time they connect to their networks. To make use of the data stolen from RSA security experts said, the hackers would also have needed the passwords of one or more users on Lockheed’s network. RSA has said that in its own breach the hackers accomplished this by sending phishing e-mails to small groups of employees including one worker who opened an attached spreadsheet that contained a previously unknown bug. This let the hacker monitor the worker’s passwords. Security specialists suspect that something similar happened in the Lockheed attack, with the hackers using the data stolen from RSA to predict the security codes that the token would generate.


Mr.Sverdlove said that while mounting attacks many hackers now study Facebook and other social media for information to personalize their phishing e-mails and increase the odds they will be opened. He said that over the last two years there have been dramatic increases of attacks. Security experts said that the alternatives to the tokens include computerized smart cards and biometric tools tended to be more expensive. They said Northrop another giant military contractor was shifting from SecurID tokens to smart cards which will potentially offer enhanced security features.