Oh no, you're thinking, yet another cookie pop-up. Well, sorry, it's the law. We measure how many people read us, and ensure you see relevant ads, by storing cookies on your device. If you're cool with that, hit “Accept all Cookies”. For more info and to customise your settings, hit “Customise Settings”.

Review and manage your consent

Here's an overview of our use of cookies, similar technologies and how to manage them. You can also change your choices at any time, by hitting the “Your Consent Options” link on the site's footer.

Manage Cookie Preferences
  • These cookies are strictly necessary so that you can navigate the site as normal and use all features. Without these cookies we cannot provide you with the service that you expect.

  • These cookies are used to make advertising messages more relevant to you. They perform functions like preventing the same ad from continuously reappearing, ensuring that ads are properly displayed for advertisers, and in some cases selecting advertisements that are based on your interests.

  • These cookies collect information in aggregate form to help us understand how our websites are being used. They allow us to count visits and traffic sources so that we can measure and improve the performance of our sites. If people say no to these cookies, we do not know how many people have visited and we cannot monitor performance.

See also our Cookie policy and Privacy policy.

Cameron cocks up UK's defences - and betrays Afghan troops

Cuts vital helicopters, fails to grip MoD. Abysmal


There will be no cuts in Afghanistan. Oh - except in helicopters

We're almost done. But there is one final point to note here. Mr Cameron and other Coalition politicians have repeatedly assured us that in fact all their decisions are aimed at support of our heroic troops fighting and dying in Afghanistan - but in fact, in one hugely important respect, they are slashing support for our boys and girls.

Last Christmas, regular Reg readers may remember, in a freak outburst of common sense Labour defence ministers announced plans to buy no less than 22 more desperately-needed Chinook helicopters. The powerful Chinook, only helicopter able to really overcome the tough hot-and-high conditions of Afghanistan, is the single greatest desire of our hard-pressed troops in Helmand. Lack of Chinooks is the worst handicap their commanders face. Say what you like about Labour, but in their last months they did the right thing and ordered a good big number of these vital machines. They planned to pay for them, sensibly, by cutting some Tornado bombers among other things.

Good old Mr Cameron, though - the soldier's friend - has cut this order to 12, almost halving it. He received massive cheers yesterday from ignorant MPs yesterday, saying:

There is no cut whatsoever in the support for our forces in Afghanistan ... we have been and will be providing more for our brave forces in Afghanistan [including] crucially, at last, the right level of helicopter capability.

That is perilously close to being an outright lie, we'd suggest. No matter what you think of the rest of his plans, Mr Cameron's decision to cut the Chinook order (to preserve Tornado bombers, too!) is an unforgivable betrayal of our fighting men and women at war right now - and then he has the gall to try and pretend that he's actually decided to order some helicopters rather than cutting an existing order!

We here on the Reg defence desk could possibly forgive Mr Cameron all the rest of it - who knows, we might be wrong about bombers and carriers and amphibs and the rest. There may never again be a war like the Falklands or the Balkans or Sierra Leone or Timor or Iraq or Afghanistan. Perhaps instead the future will see us mounting tank battles and antisubmarine campaigns and bombing raids against nuclear-armed well-equipped nation states. Perhaps there's some good reason to be buying paltry numbers of jobs at millions of pounds per head here in the UK with the money that ought to be providing proper defences for the realm.

But cutting our troops' vital lifesaving helicopters in the middle of a desperate, bloody shooting war and pretending it isn't a cut is beyond the pale. It's hard to think of something that Mr Cameron could do to redeem himself on this one. ®

Bootnotes

*Generally referred to by the BBC for some reason as a "spy plane", probably a legacy of the RAF's successful effort to convince the media that predecessor Nimrod MR2s had been doing something useful in proportion to their cost (in money and lives) above Afghanistan in recent years.

In fact the Nimrods - large airliner-sized planes crewed by more than a dozen people - were mainly employed relaying communications between units on the ground and providing basic aerial spyeye capability, tasks easily carried out by much smaller unmanned aircraft at a tiny fraction of the cost.

The only time you actually need a Nimrod or something like it is when up against a big, powerful force of enemy submarines. The only such forces now in existence are operated by the US, UK and France, so this is an unlikely situation.

**Carrier jets have operated extensively over Afghanistan and the first line troops we sent in were Royal Marines. We had marines based at sea in the Gulf from the earliest days following 9/11, and carried out a full-dress amphibious landing into Iraq in 2003.

One should also note that every time a British fighter has shot down an enemy plane since WWII, the fighter took off from a carrier to do so.

Similar topics

Broader topics

Narrower topics


Other stories you might like

  • NASA will award contract for second lunar lander to a biz that's not SpaceX
    'Competition is critical to our success,' says US agency boss

    NASA is offering a second lucrative contract to fund a lunar lander for its upcoming mission to put men and the first woman on the Moon, it announced this week.

    Under the Artemis program, NASA's most ambitious project yet, the space agency hopes to send humans back to the surface of Earth's natural satellite as early as 2025, more than half a century after it last set foot, in 1972 with the Apollo 17 mission. In April 2021, SpaceX was awarded a $2.89bn contract to build a lander to take a crew down to the lunar dunes.

    Rivals Blue Origin and Dynetics in response fired off an official complaint to protest NASA's decision. All work for SpaceX's Human Landing System was paused while the US Government Accountability Office investigated claims of foul play. 

    Continue reading
  • ‘Precursor malware’ infection may be sign you're about to get ransomware, says startup
    As more and more biz pays up to restore data, we're told

    Ransomware is among the most feared of the myriad cyberthreats circulating today, putting critical data at risk and costing some enterprises tens of millions of dollars in damage and ransoms paid. However, ransomware doesn't occur in a vacuum, according to security startup Lumu Technologies.

    A ransomware infection is usually preceded by what Lumu founder and CEO Ricardo Villadiego calls "precursor malware," essentially reconnaissance malicious code that has been around for a while and which lays the groundwork for the full ransomware campaign to come. Find and remediate that precursor malware and a company can ward off the ransomware attack is the theory.

    "The moment you see your network – and by network, I mean the network defined the modern times, whatever you have on premises, whatever is out in the clouds, whatever you have with your remote users – when you see any assets from your network contacting an adversarial infrastructure, eliminate that contact because that puts you in your zone of maximum resistance to attacks," Villadiego told The Register.

    Continue reading
  • How AI can help reverse-engineer malware: Predicting function names of code
    Or: What kind of research Google's getting in its Mandiant takeover

    GTC Disassembling and analyzing malware to see how it works, what it's designed to do and how to protect against it, is mostly a long, manual task that requires a strong understanding of assembly code and programming, techniques and exploits used by miscreants, and other skills that are hard to come by.

    What with the rise of deep learning and other AI research, infosec folks are investigating ways machine learning can be used to bring greater speed, efficiency, and automation to this process. These automated systems must cope with devilishly obfuscated malicious code that's designed to evade detection. One key aim is to have AI systems take on more routine work, freeing up reverse engineers to focus on more important tasks.

    Mandiant is one of those companies seeing where neural networks and related technology can change how malware is broken down and analyzed. At this week at Nvidia's GTC 2022 event, Sunil Vasisht, staff data scientist at the infosec firm, presented one of those initiatives: a neural machine translation (NMT) model that can annotate functions.

    Continue reading
  • Boom times for North America's big datacenter real estate market
    CSPs, social giants behind bulk of colocation leasing activity in 2021

    Datacenter demand is booming in North America as the economy recovers from the coronavirus pandemic, according to a report from CBRE.

    The real estate services and investments specialist said that in the primary datacenter market areas (Northern Virginia, Silicon Valley, Chicago, New York Tri-State, Dallas, Phoenix, and Atlanta) there was record absorption – or uptake of capacity – for the whole of 2021, up 50 percent over 2020.

    As a result, the total inventory across these primary market areas grew by 17 percent year-on-year during 2021 to 3,358MW of capacity, CBRE found, and another 728MW of capacity is currently under construction.

    Continue reading
  • Instant NeRF turns 2D photos into 3D scenes in seconds
    Nvidia says it has sped up NeRF rendering to mere tenths of a millisecond

    Nvidia has hashed out a new approach to neural radiance field (NeRF) technology that will generate a fully rendered 3D scene from just a few still photos, all in a matter of seconds, including model training time.

    NeRFs themselves were created in 2020 as a method "for synthesizing novel views of complex scenes" based on only a few still photos tagged with 5D coordinates including spatial location and viewing direction. 

    Nvidia's Instant NeRF doesn't change the underlying NeRF algorithms; rather, it takes that existing concept and speeds it via a novel model input method with dramatic speedups in both training and inferencing when pumped through one of the company's top-end GPUs.

    Continue reading
  • Atlassian flags Bitbucket and Confluence Data Center flaws
    Cluster tech vulnerability means either patching or port tinkering could be on the cards

    Atlassian has demonstrated the interconnectedness of all things with a warning that some versions of Bitbucket Data Center and Confluence Data Center require patching courtesy of the Hazelcast Java deserialization vulnerability.

    Hazelcast is an in-memory data grid and spreads data over the nodes of a cluster and is used for efficiency and performance via its in-memory tech. It is also relatively environment agnostic, running happily on-premises or in Microsoft, Amazon, and Google's clouds.

    The vulnerability affects products running as a cluster; the Server and Cloud versions of Bitbucket and Confluence are not affected. Exploitation is via a specially crafted JoinRequest with the potential result of arbitrary code execution.

    Continue reading
  • Hackers remotely start, unlock Honda Civics with $300 tech
    Any models made between 2016 and 2020 can have key fob codes sniffed and re-transmitted

    If you're driving a Honda Civic manufactured between 2016 and 2020, this newly reported key fob hijack should start your worry engine.

    Keyless entry exploits are nothing new. Anyone armed with the right equipment can sniff out a lock or unlock code and retransmit it. This particular issue with some Honda vehicles is just the latest demonstration that auto manufacturers haven't adapted their technology to keep up with known threats.

    This security weakness, tagged CVE-2022-27254, was discovered by Ayyappan Rajesh, a student at University of Massachusetts Dartmouth, and someone with the handle HackingIntoYourHeart. Their research indicated that Honda Civic LX, EX, EX-L, Touring, Si, and Type R vehicles manufactured between 2016 and 2020 all have this vulnerability.

    Continue reading
  • EU, US agree on Privacy Shield enhancements
    Transatlantic data sharing deal confirmed but court challenges ahead, warn lawyers

    The US and the EU have reached an agreement to enhance Privacy Shield following almost two years of work since the European Court of Justice struck down the data-sharing arrangement in 2020.

    As part of a joint statement with US president Joe Biden, European Commission president Ursula von der Leyen said the two sides had "found an agreement in principle on a new framework for transatlantic data flows."

    "This will enable predictable and trustworthy data flows between the EU and US, safeguarding privacy and civil liberties," she said. "I really want to thank Commissioner Reynders and Secretary Raimondo for their tireless efforts over the past months to find a balanced and effective solution. This is another step in strengthening our partnership. We manage to balance security and the right to privacy and data protection."

    Continue reading

Biting the hand that feeds IT © 1998–2022