From The Wilderness Publications: "Clarifications Regarding Ptech Software
3/21/2005
From The Wilderness Publications
Dear Samantha Atkins,
Thank you for the time you invested in critiquing our January 2005 stories about Ptech. We'd like to address the points you raised and make the necessary clarifications. Early in your letter, you write:
There is no such thing as a program that can 'read, operate, and modify the source code' of other programs to the extent of being able to penetrate federal systems
We did not claim that Ptech software was able to 'penetrate federal systems.' Ptech software was the federal system, and the penetration occurred in 1996 when Bill Clinton gave Ptech high military clearance. Thus Ptech (currently Go Agile) began to acquire contracts throughout the US government and across the US military and intelligence agencies.
At the same time, it should be noted that programs have existed for decades that do modify other programs at run time - these are not written in the traditional way. They are meta-model driven.
You go on to state:
First, the source code of most software running on all systems is not even present. Only the actual binary machine language is available. Nor is there only one type of machine language. There are several types. To disassemble machine code to even slightly more compact assembly code would not yield something that could be understood by humans or computers at the semantic level of what the section of code was actually for or attempting to accomplish. Without such semantic understanding meaningful use, subversion and control of the code by a program like the one alleged is utterly impossible.
According to computer scientist Indira Singh, our primary source and consultant for "
No comments:
Post a Comment