The Times reports the program was started when Obama "concluded that the $300 billion spent since the Eisenhower era on traditional anti-missile systems...had failed the core purpose of protecting the continental United States," with tests of missile interceptors showing an overall failure rate of at least 56%. But after interviewing government officials, the Times concludes that the U.S. "still does not have the ability to effectively counter the North Korean nuclear and missile programs." Options include escalating the cyber and electronic warfare, trying to negotiate a freeze, asking the Chinese to cut off trade and support, or preparing for direct missile strikes on the launch sites, "which Obama also considered, but there is little chance of hitting every target." The New York Times article concludes: The White House is looking at military options against North Korea, a senior Trump administration official said. Putting U.S. tactical nuclear weapons back in South Korea -- they were withdrawn a quarter-century ago -- is also under consideration, even if that step could accelerate an arms race with the North.
Interestingly, there's no copyright protections on code written by federal employees, according to U.S. (and some international) laws, according to the site. "This can make it hard to attach an open source license to our code, and our team here at Defense Digital Service wants to find a solution. You can submit a public comment by opening a GitHub issue on this repository before we finalize the agreement at the end of March."
Slashdot reader ColdWetDog notes: "Yep, the intro is a bit of a swipe at Trump. But this should get the preppers and paranoids in the group all wound up. Grab your foil! Run for the hills!"
A "single-event upset" was also blamed for an electronic voting error in Schaerbeekm, Belgium, back in 2003. A bit flip in the electronic voting machine added 4,096 extra votes to one candidate. The issue was noticed only because the machine gave the candidate more votes than were possible. "This is a really big problem, but it is mostly invisible to the public," said Bharat Bhuva. Bhuva is a member of Vanderbilt University's Radiation Effects Research Group, established in 1987 to study the effects of radiation on electronic systems.
Cisco has been researching cosmic radiation since 2001, and in September briefly cited cosmic rays as a possible explanation for partial data losses that customer's were experiencing with their ASR 9000 routers.
"They got there through an open proxy, meaning the routing wasn't shut down the way it should have been, and the researcher, without even knowing it, was able to get to this internal network, because there was a vulnerability with the proxy, and with the actual system," said a post published on HackerOne, which managed the two bounty programs on its platform. "On its own, neither vulnerability is particularly interesting, but when you pair them together, it's actually very serious."