Category Archives: Asia

SEVEN SLEEPERS

Yedi Uyurlar Mağarası (Cave of the Seven Sleepers)

Seven early Christians were sealed into a cave where legend has it they slept unharmed for centuries.

EDIT PLACE

What started as a political protest against Roman paganism became the stuff of religious legend.

In January of 250, the Roman Emperor Decius issued an edict that everyone under his reign must perform a sacrifice dedicating themselves to the empire and to the Roman gods. Understandably, this caused an uproar among young Christian communities, who, though persecuted, had previously been free to worship. Refusal to submit came at the price of death. All the same, many Christians refused to deny their faiths.

Seven young men in Ephesus refused to make the sacrifice and hid in a cave on the outskirts of the city. Tired from fleeing, they fell asleep. The Roman sentries came upon the Seven slumbering peacefully in the cave. Rather than killing them outright, they sealed them in, perhaps in a mockery of Christians’ reverence for Jesus’ entombment. That was the last their families and friends ever heard of them.

Sometime much later, the myth continues, the farmer who owned the land thought to open the cave, perhaps to use as an animal pen. He was shocked to find seven young men inside, still asleep. When the light hit their faces, they awoke. Feeling hungry, they pooled their money and sent one of them to the village to buy food. They warned him to watch out for Romans, but, believing they had slept for a full day, they thought the coast was clear. When the young man reached the market and tried to buy bread, vendors were dismayed to see that he carried Decian coins—which were at least 150 years old by then. The bishop was called in (in the century they slept Christianity had resurfaced full force) to interview the Seven Sleepers, and they all died peacefully just a few hours after.

The cave outside Ephesus was excavated in the 1920s, revealing a number of 5th and 6th century Christian graves. An ancient Church sits atop the cave as well. Religious pilgrims still pay visits to the holy Cave of the Seven Sleepers.

The details of the myth are hotly disputed among the various cultures that tell it. Christians believe that the Seven slept for between 128 and 200 years, but the Qur’an states that they slept for around 300 years. Even the location is unclear. Though this cave in Ephesus is the most commonly visited by religious pilgrims, caves in Jordan, China, Tunisia, and Algeria lay claim to the myth of the Seven Sleepers.

Whatever the truth of story is, its lore has seeped into common culture. For example, in Danish, Norwegian, and Swedish, a sysover (“seven-sleeper”) is someone who sleeps long and hard. Seven Sleepers Day is June 27th, and is the German equivalent of American Groundhog Day.

Advertisements

NO MAS – ACCULTURATION

God, that’s pathetic. That’s why I’ll hardly touch the damned things…

http://qz.com/523746

iSIGHT – INTELLIGENT AIMS

Intelligence Start-Up Goes Behind Enemy Lines to Get Ahead of Hackers

By NICOLE PERLROTHSEPT. 13, 2015

One of scores of intelligence analysts working at his computer at the headquarters of the security firm iSight in Chantilly, Va. Credit Gabriella Demczuk for The New York Times

CHANTILLY, Va. — On a recent Wednesday morning, 100 intelligence analysts crammed into a nondescript conference room here and dialed into a group call with 100 counterparts in Argentina, Brazil, Cyprus, India, the Netherlands, Romania, Spain, Taiwan and Ukraine.

As they worked their way around the room, the analysts briefed one another on the latest developments in the “dark web.”

A security firm in Pakistan was doing a little moonlighting, selling its espionage tools for as little as $500. Several American utility companies were under attack. A group of criminals were up to old tricks, infecting victims with a new form of “ransomware,” which encrypts PCs until victims pay a ransom.

The analysts, employees of iSight Partners, a company that provides intelligence about threats to computer security in much the same way military scouts provide intelligence about enemy troops, were careful not to name names or clients, in case someone, somewhere, was listening on the open line.
John Watters, iSight’s chief, evokes military jargon to talk about his company’s focus. Credit Brandon Thibodeaux for The New York Times

For the last eight years, iSight has been quietly assembling what may be the largest private team of experts in a nascent business called threat intelligence. Of the company’s 311 employees, 243 are so-called cyberintelligence professionals, a statistic that executives there say would rank iSight, if it were a government-run cyberintelligence agency, among the 10 largest in the world, though that statistic is impossible to verify given the secretive nature of these operations.

ISight analysts spend their days digging around the underground web, piecing together hackers’ intentions, targets and techniques to provide their clients with information like warnings of imminent attacks and the latest tools and techniques being used to break into computer networks.

The company’s focus is what John P. Watters, iSight’s chief executive, calls “left of boom,” which is military jargon for the moment before an explosive device detonates. Mr. Watters, a tall, 51-year-old Texan whose standard uniform consists of Hawaiian shirts and custom cowboy boots, frequently invokes war analogies when talking about online threats.

“When we went into Iraq, the biggest loss of life wasn’t from snipers,” he said. It was from concealed explosive devices. “We didn’t get ahead of the threat until we started asking ourselves, ‘Who’s making the bombs? How are they getting their materials? How are they detonating them? And how do we get into that cycle before the bombs are ever placed there?’”

“Our business,” Mr. Watters continued, “is tracking the arms merchants and bomb makers so we can be left of boom and avoid the impact altogether.”

ISight’s investors, who have put $60 million into the company so far, believe that its services fill a critical gap in the battle to get ahead of threats. Most security companies, like FireEye, Symantec, Palo Alto Networks and Intel’s security unit, focus on blocking or detecting intrusions as they occur or responding to attacks after the fact.

ISight goes straight to the enemy. Its analysts — many of them fluent in Russian, Mandarin, Portuguese or 21 other languages — infiltrate the underground, where they watch criminals putting their schemes together and selling their tools.

The analysts’ reports help clients — including 280 government agencies, as well as banks and credit-card, health care, retail and oil and gas companies — prioritize the most imminent and possibly destructive threats.

Security experts say the need for such intelligence has never been greater. For the last three years, businesses have been investing in “big data” analytic tools that sound alarms anytime someone does something unusual, like gain access to a server in China, set up a private connection or siphon unusually large amounts of data from a corporate network.

The result is near constant and confusing noise. “Except for the most mature organizations, most businesses are drowning in alerts,” said Jason Clark, the chief security officer at Optiv, a security firm.

The average organization receives 16,937 alerts a week. Only 19 percent of them are deemed “reliable,” and only 4 percent are investigated, according to a study released in January by the Ponemon Institute, which tracks data breaches. By the time criminals make enough noise to merit a full investigation, it can take financial services companies more than three months, on average, to discover them, and retailers more than six months.

“Just generating more alerts is wasting billions of dollars of venture capital,” said David Cowan, an iSight investor and a partner at Bessemer Venture Partners. The last thing an executive in charge of network security needs is more alerts, he said: “They don’t have time. They need human, actionable threat intelligence.”

Mr. Cowan and others point to what happened to Target in 2013, when the retailer ignored an alert that ultimately could have stopped criminals from stealing 40 million customers’ payment details from its network.

A year earlier, iSight warned its clients that criminals were compiling and selling malware that was specifically designed to scrape payment data off cash registers. Had Target received that warning, the blip on its network might not have gone unnoticed.

“Target faced the same problem every retailer does every day,” Mr. Watters said. “They are awash in a sea of critical alerts every day. Without threat intelligence, they had roulette odds of picking the right one.”

Gartner, the research firm, estimates that the market for threat intelligence like iSight’s could grow to $1 billion in two years from $255 million in 2013. Gartner predicts that by 2018, 60 percent of businesses will incorporate threat intelligence into their defensive security strategy.

ISight, which plans to file for an initial public offering of stock next year, hopes to capitalize, as do the dozens of other cyberthreat intelligence outfits now flooding the market, each with a slightly different approach.

That proliferation of start-ups has led to a new complaint from computer security chiefs: overlapping information — sometimes as much as 40 percent — in the reports they receive, none of which is cheap. ISight charges customers based on size, and while it does not disclose pricing, some customers say they pay $500,000 or more annually for the company’s services, as much as five times what low-end services charge.

ISight makes 90 percent of its revenue from subscriptions to its six intelligence streams, each focused on a particular threat, including cyberespionage and cybercrime.

The company’s most recent competition comes from its oldest clients, particularly banks, which have been hiring former intelligence analysts to start internal operations. One former client, which declined to be named because of concerns that doing so could violate a nondisclosure agreement, said it had been able to build its own intelligence program at half the cost of its canceled iSight subscriptions.

But most businesses do not have the same resources as, say, a company like Bank of America, whose chief executive recently said there was no cap on the bank’s cybersecurity budget.

Many of those businesses remain paralyzed by the drumbeat of alarms that expensive security technologies are sounding on their networks.

At iSight’s threat center, the company’s approach is perhaps best summed up by a logo emblazoned on a T-shirt worn by one of its top analysts: “Someone should do something.”

WORLD WAR II AD – ACCULTURATION

In the Final Seconds of This World War II-Themed Ad, It Will Be Very Clear Why It Is Going Viral

A World War II-themed ad created by a mobile phone company in Thailand as part of a campaign called “The True Meaning of Giving” has taken the Internet by storm.

Produced by TrueMove, the three-minute spot uses a war story to show that “compassion is the true communication,” with the final moments of the ad tying everything together (we won’t spoil it for you).

As noted by AdWeek, one of the actors wrote in the YouTube comments that the story is in referee to a POW camp in Kanchanaburi, Thailand, where prisoners were forced by the Japanese to build a railway bridge.

TrueMove is no stranger to creating compelling advertisements. In September 2013, the company’s “Giving” ad amassed millions of views.

“OH FOOLISH MEN, AND SLOW OF HEART…”

That very day two of them were going to a village named Emma′us, about seven miles from Jerusalem,  and talking with each other about all these things that had happened. While they were talking and discussing together, Jesus himself drew near and went with them.

But their eyes were kept from recognizing him. And he said to them, “What is this conversation which you are holding with each other as you walk?”

And they stood still, looking sad. Then one of them, named Cle′opas, answered him, “Are you the only visitor to Jerusalem who does not know the things that have happened there in these days?”

And he said to them, “What things?”

And they said to him, “Concerning Jesus of Nazareth, who was a prophet mighty in deed and word before God and all the people,  and how our chief priests and rulers delivered him up to be condemned to death, and crucified him. But we had hoped that he was the one to redeem Israel. Yes, and besides all this, it is now the third day since this happened. Moreover, some women of our company amazed us. They were at the tomb early in the morning and did not find his body; and they came back saying that they had even seen a vision of angels, who said that he was alive. Some of those who were with us went to the tomb, and found it just as the women had said; but him they did not see.”

And he said to them, “O foolish men, and slow of heart to believe all that the prophets have spoken! Was it not necessary that the Christ should suffer these things and enter into his glory?” And beginning with Moses and all the prophets, he interpreted to them in all the scriptures the things concerning himself.

So they drew near to the village to which they were going. He appeared to be going further, but they constrained him, saying, “Stay with us, for it is toward evening and the day is now far spent.” So he went in to stay with them.

When he was at table with them, he took the bread and blessed, and broke it, and gave it to them. And their eyes were opened and they recognized him; and he vanished out of their sight.

They said to each other, “Did not our hearts burn within us while he talked to us on the road, while he opened to us the scriptures?” And they rose that same hour and returned to Jerusalem; and they found the eleven gathered together and those who were with them, who said, “The Lord has risen indeed, and has appeared to Simon!”

Then they told what had happened on the road, and how he was known to them in the breaking of the bread…

 

HAPPY EASTER FOLKS IT IS THE MORN OF OUR GREAT RESURRECTION

THE WISE CIVILIZATION from POLITICAL CAUSE

The Wise Civilization is that civilization that first admits to itself that not all men are civilized, and far more importantly, admits to itself that not all men even desire to be civilized.

There is but one way to advise – by example.

Mephit James' Blog

From one GM to another.

Kristen Twardowski

A Writer's Workshop

The Public Domain Review

There is but one way to advise – by example.

Longreads

The best longform stories on the web

Art of Shaima Islam

Fantasy Art and Illustration

Fantastic Maps

Fantasy maps and mapmaking tutorials by Jonathan Roberts

Matthew Zapruder

There is but one way to advise – by example.

Susie Day | children's author

books for kids about families, friendship, feelings and funny stuff

The Millions

There is but one way to advise – by example.

The Public Medievalist

The Middle Ages in the Modern World

There is but one way to advise – by example.

Clive Thompson

Journalist, author, musician

terribleminds: chuck wendig

Chuck Wendig: Freelance Penmonkey

Researchers in the world

Travel the world, meet researchers

The Last Word On Nothing

There is but one way to advise – by example.

The Missouri Review

There is but one way to advise – by example.

The Normal School: A Literary Magazine

There is but one way to advise – by example.

The Ploughshares Blog

There is but one way to advise – by example.

Eclipsed Words

Aspire to inspire others & the universe will take note

%d bloggers like this: