19th Century technology meets 21st Century music over a bottle of beer in the latest extension to the Beck’s Record Label project.
This time, the art label has evolved, and been replaced by the grooves of Auckland band Ghost Wave. Their new single was inscribed into the surface of a Beck’s beer bottle which could then be played on a specially-built device based on Thomas Edison’s original phonograph.
Making the world’s first playable beer bottle was a formidable technical challenge. (more with video)
Thursday, June 13, 2013
Top 10 iPhone Passwords
Time to change your password.
1. “1234”
2. “0000”
3. “2580”
4. “1111”
5. “5555”
6. “5683”
7. “0852”
8. “2222”
9. “1212”
10. “1998”
(more)
Oh, Number 6, it spells LOVE.
2. “0000”
3. “2580”
4. “1111”
5. “5555”
6. “5683”
7. “0852”
8. “2222”
9. “1212”
10. “1998”
(more)
Oh, Number 6, it spells LOVE.
New "Surveillance-Industrial State" Book Coming
A Pulitzer Prize-winning author and investigative journalist is working on a book about the "surveillance-industrial state" that emerged after the Sept. 11, 2001, terrorist attacks.
Penguin Press announced Thursday that it had acquired a book by Barton Gellman, a contributing editor at large for Time magazine and a Washington Post reporter. The book, currently untitled, does not have a release date. (more)
Barton also has a great blog... CounterSpy
Penguin Press announced Thursday that it had acquired a book by Barton Gellman, a contributing editor at large for Time magazine and a Washington Post reporter. The book, currently untitled, does not have a release date. (more)
Barton also has a great blog... CounterSpy
Cloak of Invisibility Emerges from the Labs
To make a Harry Potter-style invisibility cloak requires the use of materials that have what's known as a negative refractive index over all optical wavelengths, from red to violet.
However, the artificially-structured optical materials from which cloaks are made thus far have been restricted to a very narrow range of optical wavelengths, limiting their ability to cloak over a range of colors.
That obstacle to progress looks to be at an end, as a group of optical engineers at Stanford has succeeded in designing a broadband metamaterial that exhibits a negative refractive index over nearly the entire rainbow...
The broad bandwidth of the new Stanford metamaterial suggests that this new class of materials will one day allow the fabrication of invisibility cloaks that are truly invisible, at least to the human eye. Beyond this, the extraordinary freedom to control light with metamaterials is likely to lead to hordes of applications never previously imagined. (more) (original paper) (lab-shirt) (How to hide a bug from an IR viewer.)
Imagine the impact on eavesdropping and spying.
You don't see yourself. |
That obstacle to progress looks to be at an end, as a group of optical engineers at Stanford has succeeded in designing a broadband metamaterial that exhibits a negative refractive index over nearly the entire rainbow...
The broad bandwidth of the new Stanford metamaterial suggests that this new class of materials will one day allow the fabrication of invisibility cloaks that are truly invisible, at least to the human eye. Beyond this, the extraordinary freedom to control light with metamaterials is likely to lead to hordes of applications never previously imagined. (more) (original paper) (lab-shirt) (How to hide a bug from an IR viewer.)
Imagine the impact on eavesdropping and spying.
Spybusters Tip #631 - Top Four Anti-Surveillance Apps
...as reported by Violet Blue for Zero Day.
Text Secure (play.google.com)
TextSecure encrypts your text messages over the air and on your phone. It's almost identical to the normal text messaging application, and is just as easy to use.
Red Phone (play.google.com)
RedPhone provides end-to-end encryption for your calls, securing your conversations so that nobody can listen in.
Onion Browser (Apple iTunes)
Onion Browser is a minimal web browser that encrypts and tunnels web traffic through the Tor onion router network and provides other tools to help browse the internet while maintaining privacy.
Orbot (play.google.com)
Orbot is a "proxy app that empowers other apps to use the internet more securely. It uses Tor to encrypt Internet traffic and hide it by basically bouncing through a series of computers around the world; it is the official version of the Tor onion routing service for Android. (more)
Text Secure (play.google.com)
TextSecure encrypts your text messages over the air and on your phone. It's almost identical to the normal text messaging application, and is just as easy to use.
Red Phone (play.google.com)
RedPhone provides end-to-end encryption for your calls, securing your conversations so that nobody can listen in.
Onion Browser (Apple iTunes)
Onion Browser is a minimal web browser that encrypts and tunnels web traffic through the Tor onion router network and provides other tools to help browse the internet while maintaining privacy.
Orbot (play.google.com)
Orbot is a "proxy app that empowers other apps to use the internet more securely. It uses Tor to encrypt Internet traffic and hide it by basically bouncing through a series of computers around the world; it is the official version of the Tor onion routing service for Android. (more)
Wednesday, June 12, 2013
Thoughts on a PRISM Term
by James B. Rule, a sociologist and a scholar at the University of California, Berkeley, School of Law.
"THE revelation that the federal government has been secretly gathering records on the phone calls and online activities of millions of Americans and foreigners seems not to have alarmed most Americans... We privacy watchers and civil libertarians think this complacent response misses a deeply worrying political shift of vast consequence...
Institutions and techniques predictably outlive the intentions of their creators. J. Edgar Hoover went before Congress in 1931 to declare that “any employee engaged in wiretapping will be dismissed from the service of the bureau.” A few decades later, F.B.I. agents were in full pursuit of alleged Communist sympathizers, civil rights workers and the Rev. Dr. Martin Luther King Jr. — using wiretapping, break-ins and other shady tactics.
We must also ask how far we want government to see into our private lives, even in the prevention and punishment of genuine wrongdoing. The promise that one especially egregious sort of crime (terrorism) can be predicted and stopped can tempt us to apply these capabilities to more familiar sorts of troublesome behavior.
Imagine that analysis of telecommunications data reliably identified failure to report taxable income. Who could object to exploiting this unobtrusive investigative tool, if the payoff were a vast fiscal windfall and the elimination of tax evasion? Or suppose we find telecommunications patterns that indicate the likelihood of child abuse or neglect. What lawmaker could resist demands to “do everything possible” to act on such intelligence — either to apprehend the guilty or forestall the crime.
Using surveillance for predictive modeling to prevent all sorts of undesirable or illegal behavior is the logical next step. These possibilities are by no means a fantastical slippery slope — indeed, the idea of pre-empting criminals before they act was envisioned by Philip K. Dick’s short story “The Minority Report,” later a movie starring Tom Cruise." (more)
"THE revelation that the federal government has been secretly gathering records on the phone calls and online activities of millions of Americans and foreigners seems not to have alarmed most Americans... We privacy watchers and civil libertarians think this complacent response misses a deeply worrying political shift of vast consequence...
Institutions and techniques predictably outlive the intentions of their creators. J. Edgar Hoover went before Congress in 1931 to declare that “any employee engaged in wiretapping will be dismissed from the service of the bureau.” A few decades later, F.B.I. agents were in full pursuit of alleged Communist sympathizers, civil rights workers and the Rev. Dr. Martin Luther King Jr. — using wiretapping, break-ins and other shady tactics.
We must also ask how far we want government to see into our private lives, even in the prevention and punishment of genuine wrongdoing. The promise that one especially egregious sort of crime (terrorism) can be predicted and stopped can tempt us to apply these capabilities to more familiar sorts of troublesome behavior.
Imagine that analysis of telecommunications data reliably identified failure to report taxable income. Who could object to exploiting this unobtrusive investigative tool, if the payoff were a vast fiscal windfall and the elimination of tax evasion? Or suppose we find telecommunications patterns that indicate the likelihood of child abuse or neglect. What lawmaker could resist demands to “do everything possible” to act on such intelligence — either to apprehend the guilty or forestall the crime.
Using surveillance for predictive modeling to prevent all sorts of undesirable or illegal behavior is the logical next step. These possibilities are by no means a fantastical slippery slope — indeed, the idea of pre-empting criminals before they act was envisioned by Philip K. Dick’s short story “The Minority Report,” later a movie starring Tom Cruise." (more)
Business Espionage - FBI Stops "Millions" from Flying Out of the U.S.
NJ -
FBI agents arrested an engineer on Wednesday as he was preparing to return to India with trade secrets he allegedly stole from Becton, Dickinson and Co., the Franklin Lakes-based global medical technology company, authorities said.
Ketankumar "Ketan" Maniar, 36, an Indian national who lived in Mahwah until last week, had amassed a veritable tool kit for the manufacture of a new pen-like device for injecting drugs that was being developed by Becton Dickinson, authorities said...
The stolen information was valued in the millions of dollars and could be used by Maniar to set up a new business or sold to a competitor...
If convicted, Maniar could face up to 10 years in prison and a $250,000 fine. (more)
B-D Patent from the late 1990's |
The stolen information was valued in the millions of dollars and could be used by Maniar to set up a new business or sold to a competitor...
If convicted, Maniar could face up to 10 years in prison and a $250,000 fine. (more)
Tuesday, June 11, 2013
Quote of the Year - You Decide
Quote 1: "You are not even aware of what is possible. The extent of their
capabilities is horrifying. We can plant bugs in machines. Once you go
on the network, I can identify your machine. You will never be safe
whatever protections you put in place."
Quote 2: "You can't come up against the world's most powerful intelligence agencies and not accept the risk. If they want to get you, over time they will." (more - with video interview)
From an interview with Edward Snowden, self-confessed Intelligence Community whistle-blower, now on the run.
Dead man running?
Russia has offered to consider an asylum request from the US whistleblower Edward Snowden... (more) (sing-a-long)
Quote 2: "You can't come up against the world's most powerful intelligence agencies and not accept the risk. If they want to get you, over time they will." (more - with video interview)
From an interview with Edward Snowden, self-confessed Intelligence Community whistle-blower, now on the run.
Dead man running?
Russia has offered to consider an asylum request from the US whistleblower Edward Snowden... (more) (sing-a-long)
Guess Who Else is Scared of PRISM
Business and the advertising industry!
via... AdAge
Privacy legislation has been brewing in congress for years now, but a combination of public apathy and strong industry opposition has kept it at bay. Could the Prism data surveillance scandal become the watershed moment that propels it forward?
It's too soon to tell how revelations that the U.S. government has been mining web communications and phone logs will impact public opinion, but none of what the government has been implicated in doing would be possible if corporations weren't mining and storing consumer data, often for advertising purposes...
Of course, many in the ad industry hope this government data-gate serves as a foil to commercial data practices, resulting in less focus on how marketers gather and use consumer information. (more)
via... AdAge
Privacy legislation has been brewing in congress for years now, but a combination of public apathy and strong industry opposition has kept it at bay. Could the Prism data surveillance scandal become the watershed moment that propels it forward?
It's too soon to tell how revelations that the U.S. government has been mining web communications and phone logs will impact public opinion, but none of what the government has been implicated in doing would be possible if corporations weren't mining and storing consumer data, often for advertising purposes...
Of course, many in the ad industry hope this government data-gate serves as a foil to commercial data practices, resulting in less focus on how marketers gather and use consumer information. (more)
Sunday, June 9, 2013
"Whatever happened to OPSEC?"
Last week's news sparked much discussion about privacy. Here is one semi-sarcastic exchange between two well-respected, over-50 security professionals...
Q. "Whatever happened to OPSEC?"
A. "Indeed. Whatever happened to OPSEC?
I think you and I are seeing the "generation gap" from the other side, now. Yesterday, I was talking to a sixteen year-old about the past week's news (PRISM and the Supreme Court decision on DNA).
The attitude was, "So?"
Geeez, the under-30 crowd has no expectation of privacy. It is a foreign concept to them. They grew up going to school with cameras aimed at them all day, and Ra-parents checking their email, and cocooning them in play dates and bike helmets. Sprinkle with general self: indulgence, centered-ness, and entitlement, and this is what evolves—a new world where real privacy is a quaint concept.
Their new world is "look at me, look at me", tweet, tweet, tweet. The new privacy hinges on SnapChat zaps, and the ability to 'friend' and 'unfriend'.
The first Eloi of this new wave are starting to take their places in business and government. They are being egged on, and in turn enabling, a few dystopian power-elders. Together they constructed PRISM. The flip side of the coin, however, is that they don't get to do it in private.
So, to answer the question, OPSEC and Privacy have joined hands... and are skipping on their merry f-ing way to oblivion.
Q. "Whatever happened to OPSEC?"
A. "Indeed. Whatever happened to OPSEC?
I think you and I are seeing the "generation gap" from the other side, now. Yesterday, I was talking to a sixteen year-old about the past week's news (PRISM and the Supreme Court decision on DNA).
The attitude was, "So?"
Geeez, the under-30 crowd has no expectation of privacy. It is a foreign concept to them. They grew up going to school with cameras aimed at them all day, and Ra-parents checking their email, and cocooning them in play dates and bike helmets. Sprinkle with general self: indulgence, centered-ness, and entitlement, and this is what evolves—a new world where real privacy is a quaint concept.
Their new world is "look at me, look at me", tweet, tweet, tweet. The new privacy hinges on SnapChat zaps, and the ability to 'friend' and 'unfriend'.
The first Eloi of this new wave are starting to take their places in business and government. They are being egged on, and in turn enabling, a few dystopian power-elders. Together they constructed PRISM. The flip side of the coin, however, is that they don't get to do it in private.
So, to answer the question, OPSEC and Privacy have joined hands... and are skipping on their merry f-ing way to oblivion.
Saturday, June 8, 2013
The PRISM of Surveillance - 2002-2013
The Information Awareness Office (IAO) was established by the Defense Advanced Research Projects Agency (DARPA) in January 2002 to bring together several DARPA projects focused on applying surveillance and information technology to track and monitor terrorists and other asymmetric threats to U.S. national security, by achieving Total Information Awareness (TIA).
Following public criticism that the development and deployment of this technology could potentially lead to a mass surveillance system, the IAO was defunded by Congress in 2003.
However, several IAO projects continued to be funded, and merely run under different names. (more) (60's update... "We all prism'ers chicky babe, we all locked in.")
Following public criticism that the development and deployment of this technology could potentially lead to a mass surveillance system, the IAO was defunded by Congress in 2003.
However, several IAO projects continued to be funded, and merely run under different names. (more) (60's update... "We all prism'ers chicky babe, we all locked in.")
Obama: 'Nobody Is Listening to Your Telephone Calls'
President Barack Obama on Friday defended his administration's vast collection of emails and telephone records, saying the programs help prevent terrorist attacks while imposing only "modest encroachments" on people's privacy...
"When it comes to telephone calls, nobody is listening to your telephone calls," the president said.
Mr. Obama made clear that his own views of such intelligence-gathering efforts have evolved since he was a candidate for the presidency in 2008. He suggested he is now more comfortable with the "trade-offs" involved in guarding against terrorism. (more)
"When it comes to telephone calls, nobody is listening to your telephone calls," the president said.
Mr. Obama made clear that his own views of such intelligence-gathering efforts have evolved since he was a candidate for the presidency in 2008. He suggested he is now more comfortable with the "trade-offs" involved in guarding against terrorism. (more)
Labels:
cartoon,
eavesdropping,
FBI,
government,
law,
mores,
NSA,
privacy,
surveillance,
telephone,
wiretapping
Thursday, June 6, 2013
FutureWatch: 24/7 Outdoor Surveillance from 17,000 Feet - Recorded & Searchable
A new camera developed by the Pentagon's research arm was highlighted in a recent special on PBS' "Nova" in an episode called "Rise of the Drones." It's a camera system so detailed it can discern specific movements and even what a subject is wearing.
The Defense Advanced Research Projects Agency's (DARPA's) Autonomous Real-Time Ground Ubiquitous Surveillance Imaging System (ARGUS) has 1.8 billion pixels (1.8 gigapixels), making it the world' highest resolution camera.
The sensors on the camera are so precise, PBS stated it is the equivalent to the capabilities of 100 Predator drones in a medium city.
The Defense Advanced Research Projects Agency's (DARPA's) Autonomous Real-Time Ground Ubiquitous Surveillance Imaging System (ARGUS) has 1.8 billion pixels (1.8 gigapixels), making it the world' highest resolution camera.
The sensors on the camera are so precise, PBS stated it is the equivalent to the capabilities of 100 Predator drones in a medium city.
Spain - Law to Install Spyware Being Drafted
Spain pushing for right to install government spyware on citizens' devices...
Spanish daily El PaÃs reported on Tuesday that the bill, drawn up by the ministry of justice, is still in its draft phase. But should it be passed into law, police authorities would have the power to install spyware on computers, laptops, tablets, mobile phones and even USBs and external hard drives in order to harvest personal information about the owner.
The bill states that targets would have to be suspected of terrorism, organized crime, child pornography, online fraud or cyber-bullying offenses carrying a minimum sentence of three years for the use of spyware to be authorized. The spyware would be installed remotely, the report said, and the target machine would have to be physically located in Spain. (more)
FutureWatch: See a trend?
Spanish daily El PaÃs reported on Tuesday that the bill, drawn up by the ministry of justice, is still in its draft phase. But should it be passed into law, police authorities would have the power to install spyware on computers, laptops, tablets, mobile phones and even USBs and external hard drives in order to harvest personal information about the owner.
The bill states that targets would have to be suspected of terrorism, organized crime, child pornography, online fraud or cyber-bullying offenses carrying a minimum sentence of three years for the use of spyware to be authorized. The spyware would be installed remotely, the report said, and the target machine would have to be physically located in Spain. (more)
FutureWatch: See a trend?
Technorant - Your children are slaves to their smartphones...
A Caution Sign on the Highway of Life
Summary: (from the article) Today's teens and pre-teens are overly reliant on technology, lazy, self-entitled, and are the worst read of any generation. (more)
The author is a bit harsh, but the article may give smart kids a little help in taking back their lives... if they read it.
Summary: (from the article) Today's teens and pre-teens are overly reliant on technology, lazy, self-entitled, and are the worst read of any generation. (more)
The author is a bit harsh, but the article may give smart kids a little help in taking back their lives... if they read it.
Subscribe to:
Posts (Atom)