Archives

Tesla – ‘I am a Defeated Man’*

Tesla – ‘I am a Defeated Man’*

By Soren Dreier

Once, in 1899, Nikola Tesla had an interview with a certain journalist John Smith, when Tesla said “Everything is the Light“.  Full transcript below

Tesla: Yes, these are some of my most important discoveries. I’m a defeated man. I have not accomplished the greatest thing I could.

Journalist: What is it, Mr. Tesla?

Tesla: I wanted to illuminate the whole earth. There is enough electricity to become a second sun. Light would appear around the equator, as a ring around Saturn. I am part of a light, and it is the music. The Light fills my six senses: I see it, hear, feel, smell, touch and think. Thinking of it means my sixth sense. Particles of Light are written note. O bolt of lightning can be an entire sonata. A thousand balls of lightning is a concert.. For this concert

I have created a Ball Lightning, which can be heard on the icy peaks of the Himalayas. About Pythagoras and mathematics a scientist may not and must not infringe of these two. Numbers and equations are signs that mark the music of the spheres. If Einstein had heard these sounds,   he would not create theories of relativity. These sounds are the messages to the mind that life has meaning, that the Universe exists in perfect harmony, and its beauty is the cause and effect of Creation. This music is the eternal cycle of stellar heavens.

The smallest star has completed composition and also, part of the celestial symphony. The man’s heartbeats are part of the symphony on the Earth. Newton learned that the secret is in geometric arrangement and motion of celestial bodies. He recognized that the supreme law of harmony exists in the Universe. The curved space is chaos, chaos is not music. Einstein is the messenger of the time of sound and fury.

Journalist: Mr. Tesla, do you hear that music?

Tesla: I hear it all the time. My spiritual ear is as big as the sky we see above us. My natural ear I increased by the radar. According to the Theory of Relativity, two parallel lines will meet in infinity. By that Einstein’s curved will straighten. Once created, the sound lasts forever. For a man it can vanish, but continues to exist in the silence that is man’s greatest power.

No, I have nothing against Mr. Einstein. He is a kind person and has done many good things, some of which will become part of the music. I will write to him and try to explain that the ether exists, and that its particles are what keep the Universe in harmony, and the life in eternity.

Journalist: Tell me, please, under what conditions Angel adopt on the Earth?

Tesla: I have ten of them. Keep good records vigilant.

Journalist: I will document all your words, Dear Mr. Tesla.

Tesla: The first requirement is a high awareness of its mission and work to be done. It must, if only dimly, exist in the early days. Let us not be falsely modest; Oak knows that it is oak tree, a bush beside him being a bush. When I was twelve, I have been sure I will get to Niagara Falls. For most of my discoveries I knew in my childhood that I will achieve them, although not entirely apparent … The second condition to adapt is determination. All that I might, I finished.

Journalist: What is the third condition of adjustment, Mr. Tesla?

Tesla: Guidance for all the vital and spiritual energies in labour. Therefore purification of the many effects and needs that man has. I therefore have not lost anything, but just gained.

So I enjoyed every day and night. Write down: Nikola Tesla was a happy man… The fourth requirement is to adjust the physical assembly with a work.

Journalist: What do you mean, Mr. Tesla?

Tesla: First, the maintenance of the assembly. Man’s body is a perfect machine. I know my circuit and what’s good for him. Food what nearly all people eat, to me it is harmful and dangerous. Sometimes I visualize that chefs in the world are all in conspiracy against me … Touch my hand.

Journalist: It was cold.

Tesla: Yes. Bloodstream can be controlled, and many processes in and around us. Why are you frightened young man?

Journalist: It’s a story that Mark Twain wrote a mysterious stranger, that wonderful book of Satan, inspired by you.

Tesla: The word “Lucifer” is more charming. Mr. Twain likes to joke. As a child I was healed once by reading his books. When we met here and told him about, he was so touched that he cried. We became friends and he often came to my lab. Once he requested to show him a machine that by vibration provokes a feeling of bliss. It was one of those inventions for entertainment, what I sometimes like to do.

I warned Mr. Twain as not to remain under these vibrations. He did not listen and stayed longer. It ended by being, like a rocket, holding pants, darted into a certain room. It was a diabolically funny, but I kept the seriousness.

But, to adjust the physical circuit, in addition to food, dream is very important. From a long and exhausting work, which required superhuman effort, after one hour of sleep I’d be fully recovered. I gained the ability to manage sleep, to fell asleep and wake up in the time which I have designated. If I do something what I do not understand, I force myself to think about it in my dream, and thus find a solution.

Tesla: The fifth condition of adjustment is memory. Perhaps in the most people, the brain is keeper of knowledge about the world and the knowledge gained through the life. My brain is engaged in more important things than remembering, it is picking what is required at a given moment. This is all around us. It should only be consumed. Everything that we once saw, hear, read and learn, accompanies us in the form of light particles. To me, these particles are obedient and faithful.

Goethe’s Faust, my favorite book, I learned by heart in German as a student, and now it can all recite. I held my inventions for years ‘in my head “, and only then I realized them.

Journalist: You often mentioned the power of visualization.

Tesla: I might have to thank to visualization for all that I invented. The events of my life and my inventions are real in front of my eyes, visible as each occurrence or the item. In my youth I was frightened of not knowing what it is, but later, I learned to use this power as an exceptional talent and gift. I nurtured it, and jealously guarded. I also made corrections by visualization on most of my inventions, and finish them that way, by visualization I mentally solve complex mathematical equations. For that gift I have, I will receive rank High Lama in Tibet.

My eyesight and hearing are perfect and, dare to say, stronger than other people. I hear the thunder of a hundred fifty miles away, and I see colors in the sky that others cannot see. This enlargement of vision and hearing, I had as a child. Later I consciously developed.

Journalist: In youth you have several times been seriously ill. Is it a disease and a requirement to adapt?

Tesla: Yes. It is often the result of a lack of exhaustion or vital force, but often the purification of mind and body from the toxins that have accumulated. It is necessary that a man suffers from time to time. The source of most disease is in the spirit. Therefore the spirit and can cure most diseases. As a student I got sick of cholera which raged in the region of Lika. I was cured because my father finally allowed me to study technology, which was my life. Illusion for me was not a disease, but the mind’s ability to penetrate beyond the three dimensions of the earth.

I had them all my life, and I have received them as all other phenomena around us. Once, in childhood, I was walking along the river with Uncle and said: “From the water will appear the trout, I’ll throw a stone and it is cut.” That’s what happened. Frightened and amazed, his uncle cried: “Bade retro Satan’s!” He was an educated and he spoke in Latin …

I was in Paris when I saw my mother’s death. In the sky, full of light and music floated are wonderful creatures. One of them had a mother’s character, who was looking at me with infinite love. As the vision disappeared, I knew that my mother died.

Journalist: What is the seventh adjustment, Mr. Tesla?

Tesla: The knowledge of how the mental and vital energy transform into what we want, and achieve control over all feelings. Hindus call it Kundalini Yoga. This knowledge can be learned, for what they need many years or is acquired by birth. The most of them I acquired by birth. They are in the closest connection with a sexual energy that is after the most widespread in the Universe. The woman is the biggest thief of that energy, and thus the spiritual power.

I’ve always knew that and was alerted. Of myself I created what I wanted: a thoughtful and spiritual machine.

Journalist: A ninth adjustment, Mr. Tesla?

Tesla: Do everything that any day, any moment, if possible, not to forget who we are and why we are on Earth. Extraordinary people who are struggling with illness, privation, or the society which hurts them with its stupidity, misunderstanding, persecution and other problems which the country is full of a swamps with insects, leaves behind unclaimed until the end of the work. There are many fallen angels on Earth.

Journalist: What is the tenth adaptation?

Tesla: It is most important. Write that Mr. Tesla played. He played the whole of his life and enjoyed it.

Journalist: Mr. Tesla! Whether it relates to your findings and your work? Is this a game?

Tesla: Yes, dear boy. I have so loved to play with electricity! I always cringe when I hear about the one also the Greek who stole fire. A terrible story about studding, and eagles peck at his liver. Did Zeus did not have enough lightning and thunder, and was damaged for one fervor? There is some misunderstanding…

Lightning are the most beautiful toys that can be found. Do not forget that in your text stand out: Nikola Tesla was the first man who discovered lightning.

Journalist: Mr. Tesla, you’re just talking about angels and their adaptation to the Earth.

Tesla: Am I? This is the same. You could write this: he dared to take upon himself the prerogatives of Indri, Zeus and Peron. Imagine one of these gods in a black evening suit, with the bowler hat and wearing white cotton gloves prepares lightning, fires and earthquakes to the New York City elite!

Journalist: Readers love the humor of our paper. But you confuse me stating that your findings, which have immense benefits for the people, representing the game. Many will frown on it.

Tesla: Dear Mr. Smith, the trouble is that people are too serious. If they were not, they would be happier and much longer would have lived. Chinese proverb says that the seriousness reduces life. Visiting the inn Tai Pe guessed that he visits the Imperial Palace. But that the newspaper readers would not have frowned, let’s get back to things which they consider important.

Journalist: They would love to hear what your philosophy is.

Tesla: Life is a rhythm that must be comprehended. I feel the rhythm and direct on it and pamper in it. It was very grateful and gave me the knowledge I have. Everything that lives is related to a deep and wonderful relationship: man and the stars, amoebas’ and the sun, the heart and the circulation of an infinite number of worlds. These ties are unbreakable, but they can be tame and to propitiate and begin to create new and different relationships in the world, and that does not violate the old.

Knowledge comes from space; our vision is its most perfect set. We have two eyes: the earthly and spiritual. It is recommended that it become one eye. Universe is alive in all its manifestations, like a thinking animal.

Stone is a thinking and sentient being, such as plant, beast and a man. A star that shines asked to look at, and if we are not a sizeable self-absorbed we would understand its language and message. His breathing, his eyes and ears of the man must comply with breathing, eyes and ears of the Universe.

Journalist: As you say this, it seems to me like I hear Buddhist texts, words or Taoist Parazulzusa.

Tesla: That’s right! This means that there is general knowledge and truth that man has always possessed. In my feeling and experience, the Universe has only one substance and one supreme energy with an infinite number of manifestations of life. The best thing is that the discovery of a secret nature, reveals the other.

One cannot hide, there are around us, but we are blind and deaf to them. If we emotionally tie ourselves to them, they come to us themselves. There are a lot of apples, but one Newton. He asked for just one apple that fell in front of him.

Journalist: A question that might be set at the beginning of this conversation. What was Electricity for you, Dear Mr. Tesla?

Tesla: Everything is Electricity. First was the light, endless source from which points out material and distribute it in all forms that represent the Universe and the Earth with all its aspects of life. Black is the true face of Light, only we do not see this. It is remarkable grace to man and other creatures. One of its particles possesses light, thermal, nuclear, radiation, chemical, mechanical and an unidentified energy.

It has the power to run the Earth with its orbit. It is true Archimedean lever.

Journalist: Mr. Tesla, you’re too biased towards electricity.

Tesla: Electricity I am. Or, if you wish, I am the electricity in the human form. You are Electricity; too Mr. Smith, but you do not realize it.

Journalist: Is it thus your ability to allow fails of electricity of one million volts trough your body?

Tesla: Imagine a gardener who is attacked by herbs. This would indeed be crazy. Man’s body and brain are made from a large amount energy; in me there is the majority of electricity. The energy that is different in everyone is what makes the human “I” or “soul”. For other creatures to their essence, “soul” of the plant is the “soul” of minerals and animals.

Brain function and death is manifested in light. My eyes in youth were black, now blue, and as time goes on and strain the brain gets stronger, they are closer to white. White is the colour of heaven. Through my window one morning, landed a white dove, which I fed. She wanted to bring me a word that she was dying. From her eyes the light jets were coming out. Never in the eyes of any creature had I not seen so much light, as in that pigeon.

Journalist: Personnel in your lab speak about flashes of light, flames and lightning that occur if you are angry or into kind of risk.

Tesla: It is the psychic discharge or a warning to be alert. The light was always on my side. Do you know how I discovered the rotating magnetic field and induction motor, which made me became famous when I was twenty-six? One summer evening in Budapest, I watched with my friend Sigetijem sunset.

Thousands of fire was turning around in thousands of flaming colours. I remembered Faust and recited his verses and then, as in a fog, I saw spinning magnetic field, and induction motor. I saw them in the sun!

Journalist: Hotel service telling that at the time of lightning you isolate into the room and talk to yourselves.

Tesla: I talk with lightning and thunder.

Journalist: With them? What language, Mr.Tesla?

Tesla: Mostly my native language. It has the words and sounds, especially in poetry, what is suitable for it.

Journalist: Readers of our magazine would be very grateful if you would interpret that.

Tesla: The sound does not exist only in the thunder and lightning, but, in transformation into the brightness and colour. A colour can be heard. Language is of the words, which means that it is from the sounds and colours. Every thunder and lightning are different and have their names. I call some of them by the names of those who were close in my life, or by those whom I admire.

In the sky brightness and thunder live my mother, sister, brother Daniel, a poet Jovan Jovanovic Zmaj and other persons of Serbian history. Names such AsIsaiah, Ezekiel, Leonardo, Beethoven, Goya, Faraday, Pushkin and all burning fires mark shoals and tangles of lightning and thunder, which does not stop all night bringing to the Earth precious rain and burning trees or villages.

There is lightning and thunder, and they are the brightest and most powerful, that will not vanish. They are coming back and I recognize them among the thousands.

Journalist: For you, science or poetry is the same?

Tesla: These are the two eyes of one person. William Blake was taught that the Universe was born from the imagination, that it maintains and it will exist as long as there is a last man on the Earth. With it was a wheel to which astronomers can collect the stars of all galaxies. It is the creative energy identical to the light energy.

Journalist: Imagination is more real to you than life itself?

Tesla: It gives birth to the life. I have fed by my taught; I’ve learned to control emotions, dreams and visions. I have always cherished, as I nurtured my enthusiasm. All my long life I spent in ecstasy. That was the source of my happiness. It helped me during all these years to bear with work, which was enough for the five lives. The best is to work at night, because the stellar light, and close bond.

Journalist: You said that I am, like every being, the Light. This flatter me, but I confess, I do not quite understand.

Tesla: Why would you need to understand, Mr. Smith? Suffice it to believe it. Everything is light. In one its ray is the fate of nations, each nation has its own ray in what great light source we see as the sun. And remember: no one who was there did not die. They transformed into the light, and as such exist still. The secret lies in the fact that the light particles restore their original state.

Journalist: This is the resurrection!

Tesla: I prefer to call it: return to a previous energy. Christ and several others knew the secret. I am searching how to preserve human energy. It is forms of Light, sometimes straight like heavenly light. I have not looked for it for my own sake, but for the good of all. I believe that my discoveries make people’s lives easier and more bearable, and channel them to spirituality and morality.

Journalist: Do you think that time can be abolished?

Tesla: Not quite, because the first feature of the energy is that it transforms. It is in perpetual transformation, as clouds of Taoists. But it is possible to leverage the fact that a man preserves consciousness after the earthly life. In every corner of the universe exist energy of life; one of them is immortality, whose origin is outside of man, waiting for him.

The universe is spiritual; we are only half that way. The Universe is more moral than us, because we do not know his nature and how to harmonize our lives with it. I am not scientist, science is perhaps the most convenient way to find the answer to the question that always haunt me, and which my days and nights turned into fire.

Journalist: What’s the matter?

Tesla: How are your eyes brightened!… What I wanted to know is: what happens to a falling star as the sun goes out? Stars fall like dust or seed in this or in other worlds, and the sun be scattered in our minds, in the lives of many beings, what will be reborn as a new light, or cosmic wind scattered in infinity.

I understand that this is necessary included in the structure of the Universe. The thing is, though, is that one of these stars and one of these suns, even the smallest, preserves.

Journalist: But, Mr. Tesla, you realize that this is necessary and is included in the constitution of the world!

Tesla: When a man becomes concussed; that his highest goal must be to run for a shooting star, and tries to capture it; shall understand that his life was given to him because of this and will be saved. Stars will eventually be capable to catch!

Journalist: And what will happen then?

Tesla: The creator will laugh and say: ”It fall only that you chase her and grab her.”

Journalist: Isn’t all of this contrary to the cosmic pain, which so often you mention in your writings? And what is it cosmic pain?

Tesla: No, because we are on Earth … It is an illness whose existence the vast majority of people are not aware of. Hence, many other illnesses, suffering, evil, misery, wars and everything else what makes human life an absurd and horrible condition. This disease cannot be completely cured, but awareness shall make it less complicated and hazardous. Whenever one of my close and dear people were hurt, I felt physical pain. This is because our bodies are made as of similar material, and our soul related with unbreakable strands. Incomprehensible sadness that overwhelmed us at times means that somewhere, on the other side on this planet, a child or generous man died.

The entire Universe is in certain periods sick of itself, and of us. Disappearance of a star and the appearance of comets affect us more than we can imagine. Relationships among the creatures on the Earth are even stronger, because of our feelings and thoughts the flower will scent even more beautiful or will fall in silence.

These truths we must learn in order to be healed. Remedy is in our hearts and evenly, in the heart of the animals that we call the Universe.

Source*

Related Topics:

CERN’s Tesla Tower vs. Earth’s Shields*

Free Energy and Tesla’s Pyramid*

Tesla: The Inventor Who was a National Security Threat!

The World’s first Flashlight That Runs on Free Energy*

India Permits Free Energy Technology Despite Threats from U.K., U.S., Saudi Arabia*

Rising Energy Prices, Yes – Free Energy, No = Big Profits!

Iran’s Free Energy Technology

Muslims Launch the World’s First Islamic Sign Language Book*

Muslims Launch the World’s First Islamic Sign Language Book*

Did you know nine out of ten deaf children are born to hearing parents? Well, meet Zakariyya, a 19-year-old deaf teenager who was also born to hearing parents. For many children like Zakariyya, although he grew up in a loving and supportive home his communication and language barriers have affected his ability to enjoy a normal life.

Zakariyya attended primary specifically catering for his needs who supported him with much of his language development. However at his first secondary school, like with many other deaf and hard of hearing children, had very low self-esteem and confidence. Zakariyya was often a sadly a victim of bullying and it was unfortunate that his peers would tease him, run away with his hearing aid or simply wind him up knowing that he could not verbally respond and react.

Zakariyya also had additional learning needs, which his first secondary school could not fully cater for. Though he had a chance to integrate in mainstream school with his hearing peers, his parents made a conscious decision to send him to a specialist deaf boarding college to meet his tailored learning needs.

However, although now he was settled, interacting with fellow deaf peers and his learning needs were now being catered for at the boarding school, Zakariyya unfortunately severely lacked many of his core social skills. Like many others, he would be taken and brought home in a special school bus arranged specifically for students with special needs.

This is the case for many deaf children and adults, as they have grown up only experiencing limited interactions beyond their own communities. Thus many tend to grow up feeling isolated, neglected, and frustrated with limitations on many aspects of their everyday lives and in fact eventually suffer from depression, anxiety and other similar conditions.

Alhamdulillah it was fortunate that Zakariyya, through his local council disability service was paired with a family link supporter named Aminul Hoque who was trained in BSL (British Sign Language). Aminul was responsible for delivering stimulating play and social activities such as football and bowling, as well as introducing new ‘first time’ life experiences to Zakariyya, like travelling by train, going shopping and eating in public restaurants. His parents were so happy with the impact this had on their son: 

“We are grateful for such encounters, which have enormously contributed to the progressive development of Zakariyya’s routines, behavior and positive interactions at home and school.”

However many children across London and the U.K. don’t have access to such services due to Government funding cuts. Four in ten parents (38%) said their disabled children ‘rarely’ or ‘never’ have the opportunity to socialise with non-disabled children. (Source: Scope & Mumsnet)

Aminul continued to mentor Zakariyya and maintain relations with his family, as Zakariyyah and his sister Suraiyah were chosen to feature in a ‘deaf-friendly’ special campaign video by Amin & Yasmin.

ABOUT AMIN and YASMIN

Amin and Yasmin themselves are also brother and sister, whom many years ago both embarked on the pursuit of learning British Sign Language (BSL). During their journey and interactions with members of the deaf community and their families, they realized the growing concern and limited access globally for deaf friendly Islamic educational resources.

They have launched an incredible campaign to raise funds for the World’s first Islamic Sign Language Book series in BSL along with a digital app and other educational resources.

They want to empower Deaf Muslims and improve family bonds through fun, interactive ‘deaf-friendly’ resources and bridge the communication and social skills gap between communities.

YOU are invited to support this awesome campaign by following this link;

  • Contribute & Donate – Sponsor part of the campaign even if just one book, with a generous donation today!
  • Gift a book to child, sibling, parent, cousin or nephew/niece.
  • Share – Please spread the word about this unique project through your personal social media and in conversations with family, friends and colleagues.

Source*

Related Topics:

The aql is not Reason – it’s Consciousness*

The Healing Power of Fasting*

Ramadhan a Beacon of Light in Jerusalem*

Slow Ramadhan Foods: Health Benefits of Yoghurt

Muslim Schoolboy Rejects £5mn from American Investors for Money-Saving Website*

Austrian President calls on All Women to Wear Hijab in Solidarity with Muslims against Islamophobia*

New Licenses Awarded to Muslim Radio Stations*

The NSA’s Virus Can Still Destroy Your Data, Here Are 5 Ways to Make Sure It Won’t*

The NSA’s Virus Can Still Destroy Your Data, Here Are 5 Ways to Make Sure It Won’t*

By Claire Bernish

Thanks to the NSA’s apparent lust to know and see everything, agency-designed ransomware virus was unleashed on the planet yesterday, leaving anyone using a Windows system — corporations, governments, and even those who only post cat pictures online — vulnerable to exploitation for a price.

That price — $300 in Bitcoin, increasing after a given time period — would theoretically have to be paid in order to rid the infected computer of the WanaCrypt ransomware, or the victim would lose everything on their system. Ransomware literally holds your data hostage until the fee asked by attackers is paid — but if you don’t pay, you lose everything.

Everything.

WanaCrypt0r, alternately known as WanaCry, WanaCrypt, or WCry, is believed to have infected no less than 126,500 computers in 99 countries prior to the threat being partially abated — but not before it had wrought havoc on the U.K.’s National Health Service, FedEx, Spanish telecommunications company, Telefónica, and other systems around the globe.

“This is one of the largest global ransomware attacks the cyber community has ever seen,” Splunk director of threat research, Rich Barger, told Reuters. Splunk is one of several firms who divined WanaCrypt0r’s origins with the National Security Agency.

Analysts say the particularly infectious worm exploited a Microsoft software flaw, and, although the company issued a patch in March after identifying WCry in February, not all users had updated their systems accordingly.

Cybersecurity experts worked at a fever pitch to stop the malicious worm, but it took what the Guardian termed an “accidental hero” to bring a tentative halt to the pandemonium. Reports the outlet, a Twitter user, “tweeting as @malwaretechblog, with the help of Darien Huss from security firm Proofpoint, found and inadvertently activated a ‘kill switch’ in the malicious software.”

He “halted the global spread of an unprecedented ransomware attack by registering a garbled domain name hidden in the malware has warned the attack could be rebooted.”

And payment of the $10.69 registration fee — temporary, though the end to the exploit may be — was all it took.

A significant risk could still be lurking — after all, the attackers used tools designed by the NSA, whose entire collection of older hacking tools were leaked online last month by an entity calling itself the Shadow Brokers, and WCry could yet mutate or be altered — but there are a few ways to stay safe and prevent having precious data and files wrested from you.

  1. Update, update, update

As tech outlet, Tom’s Guide, notes,

“If you’ve not installed the March, April or May Windows Update bundles, do so immediately. It’s worth shutting down your system for a few minutes if it gives you a chance to avoid this.”

Windows Vista users will be protected through the March or April update bundles, and Microsoft has since issued a patch for Windows XP and its 2003 server — while the company released information to help customers cope with the ransomware virus.

  1. Don’t fall hook, line, or sinker

Although WanaCrypt exploits the aforementioned Windows vulnerability, people must be vigilant — as always — not to fall for online phishing schemes, as this malware could also have been spread randomly in hopes people would open email from an unfamiliar source.

Be exceedingly cautious when visiting websites and opening attachments — WanaCry could be ready to pounce. Use common sense — and pepper it with extraordinary discretion.

  1. Back it up

Cybersecurity experts constantly harangue the rest of us to backup important data and files, and — while that directive might generate an eyeroll, and grumblings about time and energy — backing up one’s system is an imperative which now cannot be ignored.

Storing vital information in a secondary location, such as a USB storage stick or external hard drive, could save you tears and headaches in the long run — particularly if WCry or another variant takes control of your system. Cloud storage could be an option — depending on which cloud you use, as the original NSA leaker and insider, Edward Snowden, has warned — but would also leave your data vulnerable in other ways.

  1. Get your defenses up

Install solid, reputable antivirus software — particularly one targeting ransomware — as a line of defense against the intrusion. Experts now say WanaCrypt appears to be “wormable,” which, Tom’s Guide explains, means it spreads

“from system to system by itself as a computer worm, rather than relying on human interaction as a Trojan horse, or infecting desktop applications like a traditional computer virus.”

Since most antivirus software protects and updates in real time, even if the worm breaks through your defenses, RT points out,

“chances are good that within a short while an automatic antivirus update will clear the intruder from your system. Most antivirus companies offer trial versions free of charge to test before subscribing for a paid service, which should be enough if one needs to urgently remove a stray malware.”

Forbes reports,

“If you have up-to-date malware protection software from a reputable cybersecurity company such as Avast installed on your computer, you are probably protected.  Check your cybersecurity company’s website to make sure you are. WanaCry is a world-wide, runaway threat. If your cybersecurity company’s website has nothing to say about it, don’t assume you are protected. Make sure you are running the current version of Windows.”

  1. Keep your money

Perhaps the most basic instruction most analysts and security pros emphasize is also difficult for many to swallow. Don’t shell out the money they’re demanding — be it Bitcoin, dollars, gold, or any other iteration.

Of course, those holding your files hostage for money hope to exploit you in two insidious ways — first, by locking down your data, but second, through your emotional panic resultant from having your critical files abruptly unavailable. That alarm pumps you full of adrenaline, and could provoke a response which seems the simplest solution in the moment — forking over the funds.

If you do that, cybersecurity analysts say, no guarantee exists you’ll actually get your data back — and your willingness to do so could make you a target for future exploits — which, again, could be coming around anytime.

***

Considering the scope of the documents leaked by the Shadow Brokers, virtually anything could be possible now. This basic list will only help to an extent, and should not be considered comprehensive — nor should it be considered, of course, expert advice.

That said, the precautions offered are a bit better than leaving your system naked to malicious infection.

That “accidental hero” credited with truncating the worm’s virulent proliferation admonished the public to be wary and alert, because — although altered or ‘improved’ iterations of WanaCrypt have yet to appear online — “they will.”

“This is not over,” he told the Guardian.

“The attackers will realise how we stopped it, they’ll change the code and then they’ll start again. Enable Windows update, update and then reboot.”

Source*

Related Topics:

Leaked NSA Malware Is Helping Hijack Computers around the World*

Leaked NSA Malware Threatens Windows Users Around the World*

 

Facial Recognition Is Everywhere — but So Are Tools to Defeat It*

Facial Recognition Is Everywhere — but So Are Tools to Defeat It*

The new Privacy Visor is one of many devices designed to thwart facial detection systems

Photo Illustration: R. A. Di Ieso

 

By Joshua Kopstein

Apart from celebrities and high-profile fugitives, most people take for granted the ability to walk around in public without being identified by strangers, blissfully detached from their names and personal history. But more recently, this basic concept of public anonymity has been rapidly eroding.

Thanks to the rise of social media, ubiquitous cameras, internet-connected devices, and massive police facial recognition databases, more than half the U.S. adult population can now be near-instantly identified and tracked on the street simply by revealing their face. In response, privacy-minded engineers and activists have been fighting back with tech of their own.

“You can see a crumbling border between the cyber and physical worlds due to the spread of advanced sensors,” said Professor Isao Echizen during a recent talk at the International Workshop on Obfuscation at NYU Law School.

Before becoming a researcher at Japan’s National Institute of Informatics, Echizen spent a decade working in a research and development lab at Hitachi, where he designed copyright protection systems for the Japanese electronics giant. More recently, he’s been using his experience defending corporate intellectual property to defend people’s privacy.

In 2012, Echizen and his colleagues unveiled a prototype of the Privacy Visor, a bizarre-looking pair of glasses that defeats face detection systems by blasting camera sensors with beams of near-infrared light, which are invisible to the human eye.

The visor worked, but it wasn’t exactly subtle or flattering to wear. Commercial face detection algorithms have also evolved since then, and computer vision researchers have used advanced machine learning systems like artificial neural networks to successfully thwart various anti-face detection techniques — including Echizen’s prototype.

Now, after years of development, Echizen has unveiled an improved version of the Privacy Visor that doesn’t require power or use any electronics at all. Instead, the new model — which he officially released to market in March — uses repeating white patterns printed on a plastic transparency. The dense patterns reflect light back at the camera’s sensor, causing enough noise to prevent many algorithms from successfully detecting faces.

When I got my hands on one of Echizen’s Privacy Visors, I had almost no difficulty fooling the face detection schemes used by popular social media platforms. The puppy faces and other cute video filters provided by Snapchat’s face-detecting Lenses quickly disappeared after lowering the visor onto the center of my face — though it often needed a bit of adjustment. Facebook’s algorithm also didn’t detect any faces in uploaded photos of people wearing the visor from various angles and distances.

But as situations change and technology improves, experts say there’s no permanent “silver bullet” solution to the problem Echizen’s Privacy Visor is trying to solve. In a paper published last September, researchers at Cornell University built an artificial neural network that can de-obfuscate and match face images with up to 95 percent accuracy, even at extremely low resolutions.

“There’s no approach that ‘just works,’ or anything close to it,” Lujo Bauer, a researcher at Carnegie Mellon University who recently co-authored a paper detailing new methods of defeating facial recognition, told Vocativ.

That’s partly due to the old paradox of obfuscation: if you’re the only one actively trying to hide from surveillance technologies like facial recognition, you’re way more likely to stand out.

“In general, the more effective the approach, the more likely it is to be conspicuous to those nearby,” said Bauer.

“A face recognition algorithm may not immediately identify you, but bystanders may gawk, and a human looking at a video feed would also likely notice that something suspicious is going on.”

Nevertheless, researchers have continued to come up with new methods and technologies for thwarting face detection and recognition. In a recent paper, Bauer and his collaborators designed a set of 3D-printed glasses with patterns that reduce the effectiveness of facial recognition — the algorithms that try to identify people in a photo, after their faces have been successfully detected.

Artist and privacy researcher Adam Harvey is perhaps best known for his CV Dazzle anti-face detection makeup patterns. Instead of preventing algorithms from detecting faces, his most recent experiment causes them to detect too many.

The project, called HyperFace, is a textile pattern containing vaguely face-shaped assortments of pixels that form “ideal” face template images, as understood by the most commonly-used face detection method, Viola-Jones. This turns the material into a kind of camouflage, hiding the wearer’s face by fooling the algorithm into detecting false ones.

Still, Harvey says it’s hard to convince large numbers of people to wear the 21st century equivalent of a tin foil hat. With future versions of HyperFace, he’s aiming to make the “faces” on the material less visible using colored patterns — part of a continuing effort to “make tin foil look really good,” he says.

Adam Harvey holds up HyperFace textile pattern at NYU Obfuscation workshop.

 

“There’s a lot of propaganda coming from the FBI and Facebook that you have no right to hide,” said Harvey during a talk at the NYU Obfuscation workshop.

“Going against that narrative has always been difficult because Facebook is popular and the FBI is powerful.”

The effectiveness of any anti-facial recognition tool ultimately depends on what kind of adversary you’re trying to protect against, and how badly they want to find you. While there’s no practical way to hide from a well-resourced government agency, Bauer says it’s difficult — but still not impossible — to hide from automated systems that identify and track people en-masse.

“Suppose I don’t want to be identified in a crowd at a protest. If I’m at the protest for four hours, it means that if any [camera] captured me in the four hours, I have to fool all of them,” Bauer told Vocativ.

That can be extremely difficult, he said, since remaining undetected would mean successfully avoiding facial detection from all possible camera angles and at various distances — not to mention making sure your anti-facial detection visor or glasses doesn’t slip off for a brief moment.

Nevertheless, Bauer thinks there’s good reason for people to want anti-facial recognition tech. And he has no doubt creative solutions like Privacy Visor will continue to pop up as the cat-and-mouse game continues.

“For very specific situations, I believe there will continue to be solutions, but those are likely to be of more benefit to people seeking to cause harm than to those seeking to maintain their privacy,” he said. “To maintain privacy in general, however, we’d have to be evading facial recognition all the time, regardless of who’s doing it and what algorithm they’re using — and that’s much harder.”

Source*

Related Topics:

U.S. Marshals Biometric Scan Passenger Retinas to Board Flight: “Like Everyone Else, I Complied”*

Third of British Population on States Big Brother Facial Recognition Database*

NWO: Central Banks Imposing Biometric ID in Developing Countries First*

Biometric Identification Control: What Will You Do?

A Biometric Passport Can Be Easily Faked*

U.S. Marshals Biometric Scan Passenger Retinas to Board Flight: “Like Everyone Else, I Complied”*

Los Alamos Study Finds Airport Scanners Alter DNA*

School-issued Devices Allow the Feds to Spy on Everything Students have ever Done*

School-issued Devices Allow the Feds to Spy on Everything Students have ever Done*

The Feds, and educational technology (edtech) companies are using tablets and laptops to spy on students from kindergarten through college.

Students, teachers, administrators and librarians across the country are being forced to use school-issued tablets and laptops which use educational cloud services that spy on everything.

According to a EFF’s “Spying on Students” report, more than 30 million students, teachers, and administrators use Google’s education suite of software.

“Across the U.S., more than 30 million students, teachers, and administrators use Google’s G Suite for Education (formerly known as Google Apps for Education), and that number is rapidly growing.”

According to the report, students are being given Google login ID’s with no option to opt-out.

Feds collect intimate and detailed reports of everything students have ever done

EFF’s report warns, these device spy on everyone and keep their information indefinitely. Imagine big brother having an intimate and detailed knowledge of everyone’s entire education from PreK-12 and beyond.

EFF warns, school-issued devices know everyone’s name, student ID, date of birth, their browsing history, their search terms, their location, their contact lists, their graduation dates, and behavioral information.

EFF also warns, some school programs upload this data to the cloud automatically by default.

School-issued devices spy on families nationwide

Schools often require students to use these devices at home to do homework, which means the Feds could easily use it to spy on your home network without a warrant.

In other words, the Feds are using government issued devices to spy on families across the country!

Knewton CEO Joe Ferreira: “Education is the most data mineable industry by far”

What Ferreira is really saying is, students from PreK-12 and beyond is the most spied on data by far.

The ‘Software & Information Industry Association’ estimates that spying on PreK-12 is an $8.38 billion dollar industry.

What does this mean for our kid’s future?

A parent from a Maryland public school had suspicions about data collection, retention, and eventual use by ed tech companies:

“They are collecting and storing data to be used against my child in the future, creating a profile before he can intellectually understand the consequences of his searches and digital behaviour.”

 

Imagine your child going through school and applying for a job or applying for college. Imagine big brother, employers and universities being able to see their entire educational history and flag anything that would disqualify them from a job, higher education, or higher salary.

Imagine law enforcement, politicians, etc., spying on kids throughout their school years and flagging them for activism or being subversive.

That’s the future the Feds and corporations are creating!

Source*

Related Topics:

World Freemasons Gather in Tokyo to Select New Leader as Golden Age Dawns*

From Public Schools to Indoctrination Centres*

Occupy World: Parents Defeat Attempt to Implement Palm Scanners in School*

Google Fined for Spying on Wi-Fi Users*

A Courageous School Girl Challenges the Personalized Electronic Tracking System

Toy Dolls are Recording Your Conversations and Uploading them to Police*

How a Young American Escaped the No-Fly List*

RFID Monitoring and DNA Profiles Unite*

Implant RFID Chip Technology in Students without Parental Consent*

Non-Compliance Stops California’s RFID Tracking Plans for Drivers

A Successful Strike Against RFID’s – Personalized Electronic Tracking System

Israeli Submarine Set-up for Syrian Gas Attacks*

Israeli Submarine Set-up for Syrian Gas Attacks*

By Gordon Duff

“What the story doesn’t tell is that the Israeli submarine with 84 onboard, went down with teams of IDF commandos who had been in Syria placing radio repeaters disguised as rocks. The repeaters were later used to send out messages “in the clear” misattributed to the Syrian Army, “confessions” of the use of Sarin gas. Evidence from these Israeli repeaters was presented to the U.N, after the August 2013 Sarin attack in Ghouta that killed 1000.”

Today we learned that the primary evidence the U.S. has shown its NATO allies on the Syrian gas attack isn’t satellite images, easily exposed as photoshopped.  It is radio intercepts of Syrians screaming out “get me more sarin gas..”

{For today’s parallel account from a chemical warfare expert at MIT, please read: http://www.veteranstoday.com/2017/04/12/busted-white-house-syria-report-obviously-false/}

Well, VT has caught them before and has this this time as well.  Bear with us while we head into the past and weave a yarn of duplicity and criminality, where America becomes the evil empire Reagan warned us about.

Veterans Today broke the story of an Israeli submarine being sunk by Syria on May 22, 2013.  We had learned that Israeli teams had been inside Syria for some time, planting radio repeaters.  Israel figured President Obama would fall for their trick, repeaters in rocks, screaming out:

“Thank goodness those Americans will never catch us Syrians using Sarin gas on our own people for no reason…we are just going to chat away because we are bored and stupid.”

This isn’t a new ploy, not new for Israel and not knew for necon America, and there has never been anyone quite as “neocon” as Trump.  From Veterans Today (and the Washington Post) 2012, the U.S. using phony radio traffic to start a war

In 2007, an American armada, troop ships, aircraft carriers, guided missile cruisers and destroyers sailed into the Persian Gulf.  Their plan was to land Marines on Iranian soil, a plan hatched by Vice President Dick Cheney and White House officials including Karl Rove, Paul Wolfowitz and Richard Clarke. Vice Admiral Kevin Cosgriff

Military command of this invasion, to be done without consultation of congress or the United Nations was left to Vice Admiral Kevin J. Cosgriff and Admiral Will J. Fallon, both career opportunists with extremist political views, willing to do anything for promotion and the curry favor from the powerful criminal figures in U.S. government.

Their “cover story” was to sale a frigate up the Shatt al Arab, a disputed waterway between Iraq and Iran, hoping to stimulate a “response” from Iran.

Their real plan was to create the response themselves, as was done by the Navy during the Tonkin Gulf Incident in 1964 when America “invented” an attack by North Vietnam as a prelude to a 10 year war America eventually lost.

Their plans were to create phony radio traffic simulating an Iranian attack in order to push America into authorizing hostilities that they, themselves, had perpetrated in as part of a conspiracy.

In the interview below, Vladimir Putin discusses, among other things, America’s phony radio intercepts.

You see, it was phony radio intercepts, they call it SIGINT for signals intelligence, from the USS Maddock,  that was used to justify America’s entry into the Vietnam War, which killed millions and wiped out a generation of Americans.  Phony radio intercepts are the heart of every war.  In 1967, Israel claimed that it had to go to war because of radio intercepts between Egypt’s Nassar and Jordan’s King Hussein.  Lest we forget, Israel pummeled the USS Liberty, offshore in international waters. to prevent real radio intercepts that would have proven their fake interception to be just that, fake.

USS Liberty

 

It was Israel that jammed communications by the USS Liberty allowing the crew to be slaughtered, the same Israel whose radio repeaters were used during the August 2013 Ghouta sarin attack and, I think we can safely surmise, the Idlib attack as well.  We begin with backstory, enjoy:

[ Editor’s note: It was time for Gordon to do one of his retrospective dot connectors. It is not that we are running out of current news; but because after years of covering a story, its beginning, middle and ending can get blurred.

We also like to keep pointing out how quickly mainstream media seems to forget, as they never put much effort into retrospection, even though it is easier to see what and why things were done after a few years, which makes you more aware of what is going on now.

I fear some of this is due to the unpleasant reality of their thinking that the public has no retention, so that effort would be wasted. Under the massive perception management assault we all endure, more and more people reject anything and everything that conflicts with what they want to believe.

Fewer readers are really searching for information and truth, but for validation of what they already believe. Fox News can explain the psychology to you in detail.

That sad state of affairs emanated from one of the early artificial intelligence studies. A computer was programmed to talk to interviewees and answer their questions. The purpose was to expose the weaknesses and improve the programming.

But what the system did was always repeat back what the participant asked, and then posed another question back to the participant; and this same process was repeated, for hours even. The scientist was astounded to see subjects loving the experience; and what he discovered was going on was that they loved being validated; they loved having their thoughts and words repeated to them over and over, and having the illusion of talking to someone/something that “understood them”.

This was quickly jumped on by the crowd manipulators as one of their main perception management tools, and with all the google profiling available as to what people’s interests are, this information is a goldmine for political operators who use it extensively in not only finding supporters, but keeping them revved up, and inexpensively, too. We are becoming plantation critters to them, in a literal senseJim W. Dean ]

On February 24, 2016, Turkey announced that it took the Syrian city of al Bab when ISIS resistance mysteriously collapsed. The day before, Veterans Today published a story, based on a live interview on the ground at al Bab, that Turkey had just loaded 950 ISIS fighters on trucks and was moving them north, into Turkey for redeployment to al Raqqah.

Based on this evidence and a strange battle narrative that had made little sense tactically, this deception by Turkey fits the Erdogan profile. Turkey has always coveted a buffer zone in Northern Syria and had, as it seems, used their own military to seize it some time ago, as our sources confirmed.

Now, as part of a coalition between Russia, Iran, Syria and themselves, they staged a battle in order to occupy Northern Syria officially. This may well be why the Syrian Arab Army is moving forces north and east to block Turkey from moving further into Syria, rather an attack Idlib or retake Palmyra.

What we are seeing is continued deception, not just in Syria but Iraq as well. But let’s look at the concurrent move by the Trump administration. President Trump had said reports damning Syria, who was actively fighting ISIS where others were, were largely fake news. One key example has been chemical warfare.

Here is another story that was buried and for good reason, because it is tied to a deception about Syria’s use of chemical weapons and how Israel was party to fabricating proof about these accusations, which are being taken to the United Nations Security Council this week by the U.S. under orders of President Trump, a violation of his promises to not only voters but Russia as well. From SyriaNews, May 22, 2013:

“Syrianews managed to confirm the news we received a couple of days ago that a Syrian Navy boat destroyed an Israeli submarine off the Syrian coast at 150 metres depth on 02 May 2013 around 2 – 2:30 am. We were not told the type or size of the submarine but we were confirmed it was destroyed.

In the details we managed to get: the enemy object was detected and orders were given to one of the nearby boats to destroy it which they did with a torpedo (not told which type), then it was monitored sinking until landing on the seabed off the coast.

A heavy movement of Syrian Army helicopters was observed over the site where the submarine was destroyed.

It’s not the first time Syrian Navy engage with enemy and hostile objects. At the very beginning of the Syrian crisis, the Syrian Navy spotted a German navy ship on a reconnaissance mission and harassed it away, a German minister then complained of the Syrian Navy acts claiming the ship was not spying, just listening and collecting information!”

What the story doesn’t tell is that the submarine with 84 onboard, went down with teams of IDF commandos who had been in Syria placing radio repeaters disguised as rocks. The repeaters were later used to send out messages “in the clear” misattributed to the Syrian Army, “confessions” of the use of Sarin gas. Evidence from these Israeli repeaters was presented to the U.N. after the August 2013 Sarin attack in Ghouta that killed 1000.

Now the United States under Trump is trying to renew these long ago exposed fake charges and pile on more. We might add that Russia tried repeatedly to introduce evidence on this Sarin case and subsequent uses of mustard and chlorine gasses by not only ISIS but U.S. backed rebels as well. The FSA went so far as to post video on YouTube showing them using gas projectiles in Syria but seemingly the CIA can’t crack into YouTube.

Jeffrey Silverman after one of his beatings by U.S. contractors, angry over his reporting

 

We can go further, correspondent Jeffrey Silverman, Georgia Bureau Chief for Veterans Today and featured contributor for New Eastern Outlook, investigated a U.S. facility in Tbilisi, Georgia, funded by USAID and built by Bechtel Corporation.

Silverman got plans of a U.S. lab, called the Lugar Laboratory, named after a famous American politician, formerly called the National Reference Laboratory of Georgia. According to plans for the facility that Silverman received from sources and subsequently published and statements by employees there, the U.S. had built a bio-chemical weapons facility.

A subsequent investigation showed how American corporate security operating in Georgia, working with the security services of Ukraine and Turkey, had moved chemical weapons to Syria where they were deployed by ISIS with the assistance of officers from the military of Saudi Arabia and Qatar.

In December, 2014, I met with the Syrian Ministry of Justice in Damascus and reviewed his records on this issue including reports of a Syrian Spetsnaz attack on a production and storage facility in Northern Syria and the results of that attack which included captured Turkish, Saudi and Qatari military officers and considerable documentation and physical evidence of chemical weapons deployment.

This evidence has repeatedly been offered to the United Nations, the evidence has been made available to the press, and the intelligence services of the United States most certainly. We also know that President Trump has had all of this made available to him and that he is aware of the “Lugar Lab” in Tbilisi and Israel’s role, aided by the Coventry U.K. based Syrian Human Rights Observatory and the Reuters News Agency, in a disinformation campaign against Syria.

Let’s look at issues of the massive amounts of military equipment terrorists have received. We are aware that units of the Syrian Army joined the rebels and took equipment with them including tanks, artillery and missile launchers. We are also aware that, when ISIS took Mosul, they captured tanks, Humvee’s and much more.

However, the fleets of Toyota Hilux “technical” with reinforced suspension and gun mounts are something else. These vehicles were delivered, already armed and converted, to the Jordanian port of Aqaba. With the hundreds of these units that have been captured or destroyed, no one has ever recorded the serial numbers of a single truck.

Similarly, when al Qaeda shows up with the latest TOW and Stinger missiles, in new shipping containers labeled “Raytheon Corporation/USA” nothing is said about that as well.

Then there is the issue of drones. In 2012, the Turkish Army signed a contract with Israel, despite bans put in place after the 2010 Mavi Marmara incident, to buy drones. Though many of the drones ISIS uses are commercially available and supplied to them by, well we don’t really know who, do we, some of them carry weapons and are of the same type as those delivered by Israel to Turkey. Imagine that.

Then there is the U.S. military air facility inside Jordan and the C130 aircraft without markings that are on the runway. In addition, US Special Forces have at least two airfields inside Syria, reported by mainstream news media but quickly forgotten, even visited by one CNN reporter, but when those facilities are used to drop supplies to ISIS, as is alleged by the Iraqi government, they suddenly vanish, from the media at least.

As President Trump relies on media that republishes these stories and uses material like this as his basis for attacking the mainstream media as fake, and rightly so, why does he not include this information in his policies as well, seeking redress?

What we have is broad support for terrorism by the U.S., Israel, Saudi Arabia, Ukraine, Georgia, Turkey and the Gulf States, so obvious it can’t be ignored, so illegal, so heinous, one might think something should be done.

When Israel simply walks away from having a submarine sunk, and starts a multi-year deception of paying off families of the dead, silencing them, and repainting hull markings to cover the loss, as we have also confirmed, what else is being done?

Former Military Contractor Tries to Sell Secret Surveillance Rock on eBay for $10 Million

By Dana Liebelson

Most people check out eBay for vintage shoes, collectable Lord of the Rings swords, and limited edition Bruce Springsteen posters. But last week, eBayers had the opportunity to bid on national security surveillance equipment, intended to be disguised in a fake rock (rock not included, although you can get one at Home Depot). The technology was allegedly accredited by the Department of Defense and developed for Lockheed Martin in the early 2000s. But Lockheed never bought the commissioned project. So Gregory Perry, a former subcontractor who has done cybersecurity work for the Executive Office for United States Attorneys (EOUSA), advertised that for a starting bid of $3 million—or a “buy it now” price of $10 million—you could get hundreds of pages of development instructions, two years of email backups with Lockheed, and some hardware, including a specialized radio. All of this would supposedly equip you to build your own “RockCam,” intended to be used to take encrypted video and audio of US critical infrastructure, like nuclear power plants and oil and gas pipelines.

Welcome to the bizarre world of fake-rock subcontracting.

“Selling this collection of information is an attempt at recouping all or a portion of my investment of time, effort, personal monies, and sweat equity,” Perry tells Mother Jones.

Perry, who has 100 percent positive buyer’s feedback on eBay, received dozens of bids when he first put the item up weeks ago. He took it down because he felt his story had received adequate exposure—and none of the bids were anywhere close to his original $10 million asking price. But he relisted the auction last week with a minimum bid because he “might have a serious buyer at this juncture.” As of publication, Perry had ended the auction on Sunday with zero bids, which is also the case with the $1,795 3-D printer that Perry was selling.

In the late ’90s, Perry worked for NETSEC Inc, a contractor that installed firewalls and did intrusion detection for EOUSA. (His employment by NETSEC was confirmed to Mother Jones by Zal Azmi, former chief information officer for EOUSA and the FBI.) Then, in 2002, Perry was hired by a subcontractor called Advanced Wireless Automation (AWA), where he owned a 10 percent founder’s share of the company. The subcontractor’s shining product was the RockCam, which is either a video camera with a lot of batteries or a high-tech piece of surveillance equipment, depending on who you ask. Perry says that RockCams—which on the outside, look like rocks—contain devices capable of sending encrypted information via 900 MHz radio to a main communication hub. According to the eBay listing, each high-resolution image and video is tagged with geographic coordinates, and the rock also contains environmental hardware, “such as temperature and humidity sensors for sampling weather-related data from the area.” The batteries last for three years. Here is a picture of the technology:

Perry says that Lockheed agreed to pay between $250,000-$500,000 for the final version of the device. (A Lockheed financial statement Perry sent Mother Jones shows that Lockheed was billed $4,000 for each public key encryption system, which doesn’t include the rest of the hardware.) Perry says his $96,000 salary was funded by these purchases as well as the investors that put money into the company. But Perry claims that after the RockCam was certified by DoD, he was fired by his fellow AWA shareholders (none of whom contacted by Mother Joneswould comment) and the company dissolved because Lockheed did not pick up the product. Then, a couple years later, “spy rock” arrived:

Last year, Jonathan Powell, former chief of staff to Tony Blair, admitted that MI6, the British secret service, had used a spy rock, planted in a park in Moscow, to communicate with secret agents there in 2006. Powell called the security breach “embarrassing.” After the rock was discovered, Russian leader Vladimir Putin then ordered a crackdown on foreign-funded NGOs, accusing them of destabilizing the country.

Perry claims that spy rock borrows technology he developed with RockCam—and as a result, he wants compensation for his 10 percent shareholder’s claim. However, there’s no evidence that Lockheed made the famous spy rock (MI6 does not answer press questions). According to Wired, it’s not entirely outside the realm of possibility that Lockheed is in the fake surveillance rock business, as it’s leaving small wireless sensors—disguised as rocks—across the Afghan countryside, in order to perform “unobtrusive, continuous surveillance” for decades. But one technology expert told Mother Jones that RockCam is a glorified camera, and spy rock acts as a mailbox for uploading wireless files, so the only thing they have in common is the fake rock (Perry argues that his design has “wireless networking capabilities”).

Melissa Dalton, a spokesperson for the Lockheed Martin Aeronautics Skunkworks Group, would not comment on the eBay sale nor documents Perry sent Mother Jones allegedly showing his relationship with the company. Mark Wright, a spokesman for the Department of Defense, says that on cursory investigation, “We couldn’t find any knowledge of DOD involvement with this project.” However, after sending additional requested information about the project, another DOD spokesperson said that “we’re researching it” but did not respond by deadline.

Wayne Mitzen—a technology developer with several patents who worked with Perry at NETSEC and currently makes sex toys—says that this eBay listing isn’t actually that unusual. “One of my clients, who invented wireless microphone technology, mentioned his stuff’s ended up on eBay, too. It happens,” he says. “It’s the Snowden effect. Everybody thinks they’re Snowden, you know?”*

Source*

Related Topics:

Chicago Protest: #HandsOffSyria!

“Hitler Never Gassed His Own People” but the U.S. Did*

Rothschild Demands Western Nations Invade Syria*

Syrian Air Defense Shoots Down one of 4 Israeli Warplanes Targeting Military Site near Palmyra*

Trump-Israel Struggling to Save ISIS to divide and Conquer Syria and Iraq*

Syria Shoots Down 34 of 59 Cruise Missiles, Russia to Upgrade System*

Cheney, Rothschild, Murdoch Violate International Law By Drilling for Oil in Syria*

So you think you can secure your Mobile Phone with a Fingerprint?*

So you think you can secure your Mobile Phone with a Fingerprint?*

Similarities in partial fingerprints may be sufficient to trick biometric security systems on smartphones

Smartphones typically capture a limited portion of the full fingerprint using small sensors. Multiple partial fingerprints are captured for the same finger during enrollment. The figure shows a set of partial fingerprints (b) extracted from the full fingerprint (a). Credit: Image courtesy of NYU Tandon School of Engineering

 

No two people are believed to have identical fingerprints, but researchers at the New York University Tandon School of Engineering and Michigan State University College of Engineering have found that partial similarities between prints are common enough that the fingerprint-based security systems used in mobile phones and other electronic devices can be more vulnerable than previously thought.

The vulnerability lies in the fact that fingerprint-based authentication systems feature small sensors that do not capture a user’s full fingerprint. Instead, they scan and store partial fingerprints, and many phones allow users to enroll several different fingers in their authentication system. Identity is confirmed when a user’s fingerprint matches any one of the saved partial prints. The researchers hypothesized that there could be enough similarities among different people’s partial prints that one could create a “MasterPrint.”

Nasir Memon, a professor of computer science and engineering at NYU Tandon and the research team leader, explained that the MasterPrint concept bears some similarity to a hacker who attempts to crack a PIN-based system using a commonly adopted password such as 1234. “About 4% of the time, the password 1234 will be correct, which is a relatively high probability when you’re just guessing,” said Memon. The research team set out to see if they could find a MasterPrint that could reveal a similar level of vulnerability. Indeed, they found that certain attributes in human fingerprint patterns were common enough to raise security concerns.

Memon and his colleagues, NYU Tandon Postdoctoral Fellow Aditi Roy and Michigan State University Professor of Computer Science and Engineering Arun Ross, undertook their analysis using 8,200 partial fingerprints. Using commercial fingerprint verification software, they found an average of 92 potential MasterPrints for every randomly sampled batch of 800 partial prints. (They defined a MasterPrint as one that matches at least 4 percent of the other prints in the randomly sampled batch.)

They found, however, just one full-fingerprint MasterPrint in a sample of 800 full prints. “Not surprisingly, there’s a much greater chance of falsely matching a partial print than a full one, and most devices rely only on partials for identification,” said Memon.

The team analyzed the attributes of MasterPrints culled from real fingerprint images, and then built an algorithm for creating synthetic partial MasterPrints. Experiments showed that synthetic partial prints have an even wider matching potential, making them more likely to fool biometric security systems than real partial fingerprints. With their digitally simulated MasterPrints, the team reported successfully matching between 26 and 65 percent of users, depending on how many partial fingerprint impressions were stored for each user and assuming a maximum number of five attempts per authentication. The more partial fingerprints a given smartphone stores for each user, the more vulnerable it is.

Roy emphasized that their work was done in a simulated environment. She noted, however, that improvements in creating synthetic prints and techniques for transferring digital MasterPrints to physical artifacts in order to spoof a device pose significant security concerns. The high matching capability of MasterPrints points to the challenges of designing trustworthy fingerprint-based authentication systems and reinforces the need for multi-factor authentication schemes. She said this work may inform future designs.

“As fingerprint sensors become smaller in size, it is imperative for the resolution of the sensors to be significantly improved in order for them to capture additional fingerprint features,” Ross said.

“If resolution is not improved, the distinctiveness of a user’s fingerprint will be inevitably compromised. The empirical analysis conducted in this research clearly substantiates this.”

Memon noted that the results of the team’s research are based on minutiae-based matching, which any particular vendor may or may not use. Nevertheless, as long as partial fingerprints are used for unlocking devices and multiple partial impressions per finger are stored, the probability of finding MasterPrints increases significantly, he said.

“NSF’s investments in cybersecurity research build the foundational knowledge base needed to protect us in cyberspace,” said Nina Amla, program director in the Division of Computing and Communication Foundations at the National Science Foundation. “Much as other NSF-funded research has helped identify vulnerabilities in everyday technologies, such as cars or medical devices, investigating the vulnerabilities of fingerprint-based authentication systems informs continuous advancements in security, ensuring more reliable protection for users.”

Source*

Related Topics:

U.S. Marshals Biometric Scan Passenger Retinas to Board Flight: “Like Everyone Else, I Complied”*

NWO: Central Banks Imposing Biometric ID in Developing Countries First*

Biometric Identification Control: What Will You Do?

A Biometric Passport Can Be Easily Faked*

FBI Errors Lead to Discovery that DNA Evidence is not Reliable*