Flip Image is an easy way to create animated flipping digital photo albums that behave like actual photo albums. You can import hundreds of images from your computer, scanner or camera, and then generate a flipping album which can be viewed online as Flash slideshow, sent by email or even burnt to CD.
Flip Image enables you totally control your album style, size, colors, background, and all without any programming work!
One of our tipsters just sent us this fascinating story about The Bally Bomber, a single man’s huge undertaking that started back in 1999. It’s a 1/3rd scale version of the B-17G Bomber — and no, it’s not remote controlled, there will be a pilot.
Not familiar with the B-17G? What about its trade name? It’s called the Boeing B-17 Flying Fortress. This massive bomber was developed back in the 1930′s for the United States Army Air Corps as a combination between the Boeing 247 transport plane and the experimental Boeing XB-15 Bomber.
8680 of the B-17G model were built, but as of September 2011, only 13 of the entire B-17 family remain airworthy. The Bally Bomber is the only known scale replica, and looking through the progress photos it is an absolutely jaw-dropping project. It hasn’t been test flown yet, but they are getting painfully close to its maiden flight.
For more information, you can also check out their Facebook page which seems to be updated on a regular basis.
Filed under: transportation hacks
[Brett] just completed his DCF77 Master Bracket Clock, intended to be a backup to an old logic controlled clock he made. For our readers that don’t know, DCF77 is a German longwave time signal whose transmitter is located near Frankfurt (Germany). Every minute, the current date and time are sent on the 77.5kHz carrier signal.
The result, which you can see above, is made using an Ikea lantern, a skeleton clock, an ATmega328 (for Arduino compatibility), a voice recording playback IC (ISD1730), a cheap 20×4 LCD display, a DCF77 receiver module, and many LEDs. We’re pretty sure that it must have taken [Brett] quite a while to get such a nice looking clock. In case the clock loses power from the power supply, 3 AA cells provide battery backup. On the firmware side, making the platform Arduino-compatible allowed [Brett] to use its libraries so the coding was quickly done. Embedded after a break is a video of the final result.
Filed under: Arduino Hacks
, clock hacks
[Malcolm] finally got fed up with the fumes produced by his 3D printer, so he decided to setup this rather extensive fume exhausting system.
He already has a pretty awesome setup with his Type A 3D printer inside of a filing cabinet, with a plastic tote above it to keep his filament from absorbing too much water. But as you know, the fumes released while printing ABS are actually pretty bad for you. With this in mind he 3D printed adapter rings and fitted a fan salvaged from a space heater to the outside of his filing cabinet. A dimmer switch provides variable fan speeds and some dryer vent tubing reroutes the fumes to central vac piping which then goes directly outside. When the system is not in use the piping can be plugged to prevent cold air from entering the house. It’s a fairly clean build but [Malcolm] wants to make a nicer enclosure for the fan and speed control circuit.
The major problem we see with doing something like this is removing too much heat from the build chamber which can always affect print quality. Do you vent your 3D printer?
Filed under: 3d Printer hacks
See how New Zealand compares to the rest of the world as a destination for business in an interactive map.
Esri demographic data provides insights about superwealth in Silicon Valley.
Esri demographic data shows that wealth is shifting is Oahu's elite neighborhoods.
GIS brings greater understanding to open data by way of visualizing it in ways people can understand.
Quadcopters are gradually becoming more affordable and thus more popular; we expect more kids will unwrap a prefab drone this holiday season than any year prior. [Samy's] got plans for the drone-filled future. He could soon be the proud new owner of his own personal army now that he’s built a drone that assimilates others under his control.
The build uses a Parrot AR.Drone 2.0 to fly around with an attached Raspberry Pi, which uses everybody’s favorite Alfa adapter to poke around in promiscuous mode. If the SkyJack detects an IEEE-registered MAC address assigned to Parrot, aircrack-ng leaps into action sending deauthentication requests to the target drone, then attempts to take over control while the original owner is reconnecting. Any successfully lassoed drone doesn’t just fall out of the sky, though. [Samy] uses node-ar-drone to immediately send new instructions to the slave.
You can find all his code on GitHub, but make sure you see the video below, which gives a thorough overview and a brief demonstration. There are also a few other builds that strap a Raspberry Pi onto a quadcopter worth checking out; they could provide you with the inspiration you need to take to the skies.
Filed under: drone hacks
, Network Hacks
, security hacks
, wireless hacks
According to a new report from the Center for the Protection of Intellectual Property at the George Mason University School of Law, the notice and takedown provisions of the DMCA are no longer doing their job as intended.
The report, titled The Failure of the DMCA Notice and Takedown System: A Twentieth Century Solution to a Twenty-First Century Problem, states that the 15-year-old legislation’s Section 512, originally intended as an emergency measure to get content taken down quickly, is now “straining under the weight of a blizzard of notices, as copyright owners struggle to abate the availability of infringing copies of their most highly valued works.”
There can be little doubt that sites and service providers, especially those that deal with user-uploaded or generated content, are today having to deal with more complaints than ever before. While the RIAA and MPAA have always been in gear, over the past couple of years thousands of copyright holders have become aware of their right to send tens, hundreds or thousands of notices each month in order to have unauthorized content (or links to that content) taken down.
But as the report points out, it’s a largely unproductive task.
“Despite all the notice, there is precious little ‘takedown’ to show for it. Unless a site employs some sort of content filtering technology, the same content typically re-appears within hours after it is removed,” author Bruce Boyden writes.
“As a result, this is a system that makes no one happy. Copyright owners are unhappy with the amount of expense and effort the system requires for such paltry results. Online services are unhappy with the burden of having to process and respond to all of those notices. Users are unhappy with inconsistent enforcement and occasional, inevitable mistakes.”
As highlighted in the shutdown of file-hosting service Hotfile this week, filtering is something that the MPAA, RIAA and even the courts are interested in if the circumstances are right. The supposed $80m settlement with a filtering condition imposed was designed to send a clear message to US-based hosting and linking companies, over and above their established DMCA obligations.
Nevertheless, in the meantime it’s largely business as usual. Copyright holders are sending out millions of notices every month in an attempt to stem the tide, many of those to search engines such as Google and Bing. Google’s Transparency report reveals all of the copyright takedown notices the search engine receives every month from a wide range of rightsholders, but discovering the numbers sent to sites in general is an almost impossible task.
What today’s brief reveals, however, is that the notices sent to search engines are only half the story. The report contains details of the notices the MPAA studios sent in total during a six month period this year.
Starting in March 2013 the Hollywood studios sent takedowns for a total of 5.13 million URLs. Just over 2.7 million URLs were sent to search engines such as Google and Bing while 2.36 million were sent to the sites carrying or indexing the infringing content.
During April the the movie studios sent less notices – around 4.83 million – with the lion’s share going to search engines (2.85 million) and the remainder (1.98 million) being sent to sites.
In May the quantity of overall URLs dropped again to 3.46 million URLs, however the number of takedowns being sent to sites exceeded those sent to search engines, 2.16 million versus 1.3 million.
June saw a total of 3.37 million notices issued with around 400,000 more takedowns going to sites than search engines. By July total takedowns were back up to 4 million URLs, 23.4 million to sites and 1.65 million to Google and friends. Just over 4.4 million were sent in August, with just under 600,000 more notices going to sites than search engines.
During the total six month period (March to August 2013), the MPAA studios sent takedown notices for 25.23 million URLs, 13.23 million to sites and 11.99 million to search engines.
It should be noted that the report doesn’t indicate whether the content taken down from search engines is the same as that being taken down from sites, but it should be presumed that there is some, possibly a lot, of duplication. There is also no indication of the success of the notices sent to sites, although Google and Bing will have complied on most occasions.
Finally, of particular interest is the amount of opposition Hollywood encountered when applying for the URLs to be taken down. According to the studios just eight of their DMCA takedown notices were contested with DMCA counter-notices. That doesn’t suggest that in excess of 25.2 million were entirely accurate, but it does show that in the main there is no appetite to have links restored on any grounds.
Source: TorrentFreak, for the latest info on copyright, file-sharing and VPN services.
We’re pretty sure that most of you already know that a few months ago Hackaday was bought by SupplyFrame, who therefore became our new evil overlords. We do hope you’ve noticed that they’re actually quite nice, and in their divine goodness they recently gave the go-ahead on this series called Developed on Hackaday.
A new project will be made by the Hackaday staff & community and will hopefully be brought to the consumer market. For those who don’t have the time/experience to get involved in this adventure, we want to show and document what it takes to bring an idea to the marketable product stage. For the others, we would like to involve you in the design/development process as much as possible. Obviously, this project will be open source hardware/software. This time around, the hardware will mainly be developed by yours truly. You may already know me from the whistled platform (currently sold on Tindie) or from all the different projects described on my website, which makes this new adventure far from being my first rodeo.
What’s in it for the contributors? During all the steps of this project, we’ll offer many rewards as well as hand-soldered first prototypes of the device so you can start playing/testing it. Nothing is set in stone so every suggestion is welcome. Should we make a Kickstarter-like campaign to manufacture the final product, we’ll only do so once our prototype is final, our partners are chosen and all details of the production process are set and confirmed. In that case, we will just need to gather the required funds to make the device a reality. What are we going to build? Keep reading to find out.
So what about this new device? After many discussions with the writers, we decided we would make something useful for Hackaday readers. We wanted something simple that would simplify users’ lives and therefore settled on a secure offline password keeper. Keep in mind that the following description is just a draft, so your input is welcome in the comments section. Please keep it constructive as the way the comments are formatted is not optimal for this kind of discussion (we’re currently working on that).
The concept behind this product is to minimize the number of ways your passwords can be compromised, while generating long and complex random passwords for the different websites you use daily. As a side note, you may already know that most people often don’t use secure passwords, except red-haired women. Hypothetically, password keeping software could be circumvented by reading the key + encrypted passwords on the computer’s RAM. Ideally, the product should be so simple that my grand mother could use it (I’ll let you image her email password…). It will be as small as possible so it could fit in your pocket. Simply visit a website and the device will ask for confirmation to enter your credentials when you need to login.
What about the hardware? We thought a good solution was to make a device that uses a smart card, connected to your computer via USB (to keep costs low). The device will store your AES-256 encrypted passwords and the smart card will keep your AES-256 key (as well as a few other passwords). The smart card will be (for the sake of simplicity) a read protected EEPROM that requires a PIN code to unlock its contents. As with your credit card, too many tries will permanently lock the smart card. Therefore, the project’s main components will be: a smart card connector, a microcontroller (Arduino compatible?), an OLED screen and its touchscreen panel. The OLED screen will provide good contrast and therefore better visibility. On the software side, we’ll ‘only’ need to write a simple script running on the users’ browsers. The browser script will send the current website URL to the device (via HID reports).
We prefer a contact based smart card for several reasons. They’re much easier to source, are cheaper and can’t be easily sniffed without you noticing it. We hope that making this an open project will ensure any future problems are handled. We also want the device to be as hackable as possible, and an Arduino compatible device with a touch sensitive OLED screen and USB connectivity will surely interest beginners out there.
So what’s next? We need a project name, so please give us some feedback in the comments section. You can also directly contact me: mathieu[at]hackaday[dot]com if you’d like to contribute (we need designers, coders, webmasters…), be part of the beta tester team or if you already know potential partners for this project. We look forward to your comments!
[Smartcard Image Source - CC-BY-SA]
Filed under: Featured
We’ve seen them before, but only now has the Deltaprinter, a very simple and affordable delta printer finally hit Kickstarter.
We saw the Deltaprintr at the World Maker Faire last September where the team showed off their fancy new printer and the very nice prints it can produce. The printer itself is unique in that it eschews printed parts and is instead made of lasercut parts. Instead of belts, each arm of the delta bot is lifted with spectra line, and the entire mechanism is billed as not requiring calibration probably due to the accurate laser cut parts.
On a completely different note, we did notice the rewards for the Deltaprintr Kickstarter are limited. Unlike the gobs of 3D printers on Kickstarter, the Deltaprintr team actually wants to stay on schedule for their shipping dates. That’s an admirable dedication to getting their printer out to backers in a reasonable amount of time.
Filed under: 3d Printer hacks
, Crowd Funding
TweetSome helpful tips put together here by the American Trucking Association to help keep us all safe on the busy, and often icy, roads this holiday season. Winter road conditions can lead to dangerous situations. Fortunately, a team of million mile … Continue reading
TweetA fun map for us football fans as this NCAA season winds down and we ramp up for another BCS and Bowl season (and as usual I’m hoping for anyone but the Buckeyes to win the BCS!). This map by Bill … Continue reading
The Greater bulldog bat
) is nature's fisherman. Using its amazing echolocation ability, the bat finds fish by detecting ripples in the water made by those fish. Once the bat locates the fish, it dives down, catching the fish in the ample pouch located between its legs, holding on to the catch with its claws. The Greater bulldog bat is also known for emitting a high frequency sound not often heard from bats of this size.
The Greater bulldog bat is one of the larger bats
, with a combined length of about 12.7 cm. Males weigh, on average about 67 grams while the smaller, lighter females weigh in at about 56 grams. The wingspan of the bat extends one meter, tip to tip, though the majority of this wingspan is located in the third digit. Males are easily identified by bright orange fur along the back; the female having dull gray fur along the same area.
This bat can be found in a range that extends from western and eastern Mexico
south to the northern area of Argentina
. Most of the Caribbean islands also can claim to be home to the Greater bulldog bat. While the bat lives in a wide range, it is sparsely populated as its habitat requirements are fairly strict. Non-arid lowlands and major river basins are the preferred habitats of the animal.
The familial structure of the bats is particularly interesting in that the female of the species will remain together in the same location for several years while males will only stay in one area for two reproductive cycles. Females will also hunt and forage in their social group while the males forage on their own in areas separate from the females. During the wet season, the bats hunt for and feed on moths and beetles while, during the dry season, their diet consists of fish, crabs and scorpions. When water ripples made by fish are scarce, the bat will skim along the water, dragging his feet (or raking) for up to 10 meters, trying to catch fish. The areas it rakes are ones in which it has previously had success in hunting.
The Greater bulldog bat is not endangered but is threatened by deforestation like many other species of animal in the region. Those bats that live in Belize
are threatened by water pollution and changing water levels that have restricted their habitat range. In Guatemala
, fish farmers kill the Greater bulldog bats to essentially stop the competition. Happily, for now, the bats are still thriving and should do so for some time to come.
Picture of the Greater Bulldog Bat or Fisherman Bat, Noctilio leporinus (Linnaeus, 1758), adult, captive specimen, originally captured from Puerto Rico, photographed in the United States by Susan Ellis, Bugwood.org. The image is licensed under the Creative Commons Attribution 3.0 United States
There are many ways copyright holders approach today’s “online piracy problem.”
Some copyright holders prefer to do it through innovation, while others prefer educational messages, warnings or even lawsuits. Another group is aiming to generate revenue by obtaining lots of small cash settlements.
Rightscorp is one of the companies that facilitates these settlement demands. The company scours BitTorrent networks for people who download titles owned by the copyright holders they work for, and then approaches these alleged pirates via their Internet providers.
The company went public last month and works with prominent partners including Warner Bros. and BMI. On behalf of these clients Rightscorp usually asks for $10 or $20 per infringed title, demands that are concealed in DMCA notices so they can bypass the courts.
Under the DMCA Internet providers are obliged to forward copyright infringement notices to their customers, so with this strategy the company can contact the alleged pirates without knowing who they are.
At least, that’s the theory.
The problem is that Rightscorp’s entire business model relies on the willingness of the Internet providers to forward their full settlement requests. To make sure this happens the company specifically adds the following line on top of each DMCA notice.
**NOTE TO ISP: PLEASE FORWARD THE ENTIRE NOTICE**
Unfortunately for the anti-piracy outfit, not all ISPs are doing that.
TorrentFreak looked into the matter and we found that Comcast, the largest ISP in the United States, strips out all the threatening language and references to the proposed settlement. Instead, it only lists the infringement details including the source, file-name and a timestamp.
A copy of a Rightscorp warning forwarded by Comcast is pasted at the bottom of the article.
One of the reasons why Comcast truncates the DMCA notices could be to protect its customers from false accusations. However, when we contacted them the ISP declined to comment on the matter.
We also shared our findings with Rightscorp, who said that they were indeed protecting the rights of the artist in the notice we forwarded, but couldn’t confirm that it was coming from them. Despite sending over additional notices, the company said it would need more details to warrant a comment in public.
It is worth noting that Comcast is truncating all DMCA notices and not just the Rightscorp ones. This isn’t a big problem for copyright holders who send traditional takedown notices, but in Rightscorp’s case it is killing the company’s business model.
Investors are not going to be pleased to hear that there’s no revenue coming from the country’s largest ISP, and with increasing complaints from customers, there is a significant risk that other ISPs will follow Comcast’s lead.
If that happens, Rightscorp’s entire business model will be defunct.
An example of a Rightscorp DMCA notice processed by Comcast is pasted below. Here is a full notice forwarded by another ISP for comparison, complete with threatening language and a settlement offer.
Dear Comcast High-Speed Internet Subscriber:
Comcast has received a notification by a copyright owner, or its authorized agent, reporting an alleged infringement of one or more copyrighted works made on or over Comcast’s High-Speed Internet service (the ‘Service’). The copyright owner has identified the Internet Protocol (‘IP’) address associated with your Service account at the time as the source of the infringing works. The works identified by the copyright owner in its notification are listed below. Comcast reminds you that use of the Service (or any part of the Service) in any manner that constitutes an infringement of any copyrighted work is a violation of Comcast’s Acceptable Use Policy and may result in the suspension or termination of your Service account.
If you have any questions regarding this notice, you may direct them to Comcast in writing by sending a letter or e-mail to:
Comcast Customer Security Assurance
Comcast Cable Communications, LLC
1800 Bishops Gate Blvd., 3rd Floor East Wing
Mount Laurel, NJ 08054 U.S.A.
Phone: (888) 565-4329
Fax: (856) 324-2940
For more information regarding Comcast’s copyright infringement policy, procedures, and contact information, please read our Acceptable Use Policy by clicking on the Terms of Service link at http://www.comcast.net.
Comcast Customer Security Assurance
Copyright work(s) identified in the notification of claimed infringement:
Infringement Source: Torrent
Timestamp: 2013-xx-xx xx:xx:1x.x GMT
Infringers IP Address: xxx.x.xxx.xxx
Infringers Port: xxxxx
Listing of infringement(s) (Title/Filename/Timestamp/Hash): This Years Love | 08 This Years Love.mp3 | 2013-xx-xx xx:xx:xx.x | SHA1
Source: TorrentFreak, for the latest info on copyright, file-sharing and VPN services.
OK, today's picture sows a couple getting on a bus in Ohio after a snow storm. The picture was taken in 1940.
Don't know what the weather is like where you are, but we had another winter storm blow in. For us, we rarely get much snow, but the issue is almost always sleet and ice storms. Right now everything is covered in ice, and the schools are on a two hour delay (for now). If the roads don't thaw, then they will cancel school for the day.
People that live in really cold climates may scoff at our "winter storms", but what they don't realize is that they really are bad, because the infrastructure is not set up to handle ice. For example, they do not do anything for the ice on the roads. Last weekend when the ice storm hit, there were two fatalities in two separate wrecks on a 20 mile stretch of road between where I live and work. What happens is the roads appear to be fairly clear, and people think things are OK, and then hit ice patches on bridges and spin out.
Anyway, let us know what your weather is looking like today.
[Ralph] has been working on an extraordinarily tiny bootloader for the ATtiny85, and although coding in assembly does have some merits in this regard, writing in C and using AVR Libc is so much more convenient. Through his trials of slimming down pieces of code to the bare minimum, he’s found a few ways to easily trim a few bytes off code compiled with AVR-GCC.
To test his ideas out, [Ralph] first coded up a short program that reads the ATtiny85′s internal temperature sensor. Dissassembling the code, he found the a jump to a function called __ctors_end: before the jump to main. According to the ATtiny85 datasheet, this call sets the IO registers to their initial values. These initial values are 0, so that’s 16 bytes that can be saved. This function also sets the stack pointer to its initial value, so another 16 bytes can be optimized out.
If you’re not using interrupts on an ATtiny, you can get rid of 30 bytes of code by getting rid of the interrupt vector table. In the end, [Ralph] was able to take a 274 byte program and trim it down to 190 bytes. Compared to the 8k of Flash on the ‘tiny85, it’s a small amount saved, but if you’re banging your head against the limitations of this micro’s storage, this might be a good place to start.
Now if you want to hear some stories about optimizing code you’ve got to check out the Once Upon Atari documentary. They spent months hand optimizing code to make it fit on the cartridges.
Filed under: ATtiny Hacks
, Software Development
Cyber Monday may be behind us, but there are always some hackable, inexpensive electronics to be had. [Stephen's] wireless Android/Arduino outlet hack may be the perfect holiday project on the cheap, especially considering you can once again snag the right remote controlled outlets from Home Depot. This project is similar to other remote control outlet builds we’ve seen here, but for around $6 per outlet: a tough price to beat.
[Stephen] Frankenstein’d an inexpensive RF device from Amazon into his build, hooking the Arduino up to the 4 pins on the transmitter. The first step was to reverse engineer the communication for the outlet, which was accomplished through some down and dirty Arduino logic analyzing. The final circuit included a standard Arduino Ethernet shield, which [Stephen] hooked up to his router and configured to run as a web server. Most of the code was borrowed from the RC-Switch outlet project, but the protocols from that build are based on US standards and did not quite fit [Stephen's] needs, so he turned to a similar Instructables project to work out the finer details.
Stick around after the break for a quick video demonstration, then check out another wireless outlet hack for inspiration.
Filed under: Android Hacks
, Arduino Hacks
, home hacks
Aiseesoft Blu-ray Ripper is one of the best Blu-ray ripping software that can help users rip their Blu-ray movies easily to High Definition video and common video files for editing, watching on computer/devices/HDTV, backup. It provides users as many output profiles as you can imagine, such as MP4, MKV, MOV, AVI, WMV, FLV, iPad, iPhone, iPod, PSP, Samsung Tablet, Samsung Galaxy Note, etc. With ATI and CUDA hardware acceleration tech, the HD output with h.264 encoder is no longer a problem. Aiseesoft Blu-ray Ripper will not let you to wait for a whole night just rip a Blu-ray disc to HD video and it provides a 6X Faster conversion speed.
With ATI and CUDA hardware acceleration tech, the HD output with h.264 encoder is no longer a problem. Aiseesoft Blu-ray Ripper will not let you to wait for a whole night just rip a Blu-ray disc to HD video and it provides a 6X Faster conversion speed.
In addition, Aiseesoft Blu-ray Ripper can also rip DVD and convert videos to any video format you want. It allows users to edit the output video’s effect, trim output video’s length, remove the black bars of the movie. You can easily choose your favorite subtitle and audio track from the Blu-ray/DVD movies when you convert the movie.
Aiseesoft provides 50% off coupon code: AISEYQZ (apply to recommended products and other products) for all GOTD users.
Cyber warfare or information warfare is still a gray area of the military doctrine, it is necessary to define the “model of conflict” and rules for the actors.
Cyber war and cyber information warfare are two terms very inflated used to describe the current disputes within the cyberspace. To explain the effect of acts of cyber war, security experts use to mention the cyber attack against the Estonia’s government networks in 2007, an offense occurred in a period of intense political contrasts with Russia.
But the recent years have been characterized by an intense activity of governments in the cyberspace considered the fifth domain of the warfare, we assisted to the mutual network intrusions of Korean cyber armies the disputes between US and Israel against countries like China, Iran and Syria.
Almost every government in investing to improve its cyber capabilities, New Zeland and Russia for example have started important initiatives recently, the definition and the implementation of an efficient cyber strategy is a must for everyone. In many cases we discussed about the repercussions of a cyber attack on the reality, Stuxnet is a good example of the potential effect of a cyber weapon, a malicious code could in fact be used to harm an industrial process and cause loss of human life.
The absence of global accepted rules in the cyberspace, let’s think the concept itself of cyber weapon is ambiguous, is causing a fragmentation of the power, information warfare is significantly influencing the defense strategies of every governments requesting a review of decisional processes.
It is mandatory to establish a global collaboration interstate to prevent the escalation of cyber conflicts, the cyber warfare scenario is rapidly evolving and governments must align their strategies working to the definition of a set of cyber rules globally recognized and accepted.
Early 2013 an International Group of Experts tried to define this set of rules, formalizing their effort in an handbook titled “The Tallinn Manual on the International Law Applicable to Cyber Warfare”, a document that provides a study on how extant international law norms could be applied to cyber warfare.
NATO Cooperative Cyber Defense Center of Excellence has sustained the drafting of the document to clarify the rules of the governments in the cyberspace, and their conduct, defining jurisdiction, control and legal responsibilities.
«A State bears international legal responsibility for cyber operation attributable to it and which constitutes a breach of an international obligation.»
The experts provided a legal definition for a concept such as a cyber attack and a cyber weapon, following an abstract from the first draft release:
«A cyber attack is cyber operation, whether offensive or defensive, that is reasonably expected to cause injury or death to persons or damage or destruction to objects»
The NATO group isn’t the unique one, the EastWest Institute has created the Cyber 40, with delegates from 40 digitally advanced countries, the purpose is to involve government organizations, industry groups and think tanks to define practical “humanitarian agreements for cyber conflicts” in cyber warfare.
Within principal goals the definition of the duty of care in case of cyber attacks against a country that have to define which targets have to be preserved due the possible damage on the population. Dam, dykes and Nuclear Electrical Generating Stations could not represent a primary target for a cyber attack, another question is to operate in a “context” that needs to preserve children, journalists, medical and religious personnel. In cyber warfare, the context is fundamental to introduce the concept of cyber weapons, and experts have approached it defining the ‘Means’ of cyber warfare that are cyber weapons and their associated cyber systems.
“Cyber weapons are cyber means of warfare that are by design, use, or intended use, capable of causing either injury to, or death of, persons. The ‘Methods’ of cyber warfare are the cyber tactics, techniques and procedures, by which hostilities are conducted.”
As highlighted by many cyber experts it is necessary to contextualize the principles proposed by the Geneva and Hague conventions, to the information warfare facing with difficulties specific in the use of cyber tools.
What could be considered an act of cyber war? Which are the rules of engages? When is a cyber attack justified? Which is the limitation of an “offensive” approach to cyber security?
These are just a few of questions to approach, it is necessary to define a “model of cyber conflict”, defining roles and responsibilities (e.g. Attackers, targets) .
Within the various urgencies there is the need to be able to distinguish humanitarian interests in cyberspace to avoid that a cyber attack could impact them, but it is a hard task.
Another serious issue to address is the attribution of responsibility for the cyber war acts, in the majority of cases it is quite impossible to discover the origin of the attack and to identify the attacker. The acceptance of a law framework could help to create a shared awareness of what is considerable “moral” and what is not accepted.
Information warfare is conducted through the cyberspace but we must keep in mind the possible consequences on the real world, the human component must be always preserved also in a scenario in which machine component is assuming a crucial rule, let’s think for example of the definition of a new generation of tools and systems able to take decision in real time in case of cyber attacks.
Cyber offensives are instantaneous events and in some cases to avoid the destruction of assets or to prevent the loss of human life it is necessary to take decisions in real time.
Are we really able to substitute human intervention in critical situation evaluating every possible consequences real time? Are we able to design systems that could not be deceived and that will be able to take the right decision in a timely way?
Until we have defined a model for cyber conflict and the rules for the involved actors the answer is no!
The post Cyber warfare – Why we need to define a model of conflict? appeared first on Security Affairs.
Nowadays, if you want to ‘check in with Foursquare’ at your local laundromat, deli, or gas station, you need to take out your phone and manually ’check in with Foursquare’. It’s like we’re living in the stone age. iBeacon, Apple’s NFC competitor that operates over Bluetooth 4.0 changes all that. iBeacon can automatically notify both iOS and Android users of where they are. [Kevin Townsend] over at Adafruit came up with a tutorial that turns a Raspberry Pi into an iBeacon, perfect for telling you that you’re somewhere in the proximity of a Raspberry Pi, and some other cool stuff too.
The iBeacon protocol is actually very simple. Basically, the only thing the iBeacon transmits is a 128-bit company/entity value, and an optional major and minor values (to differentiate between locations and nodes within locations, respectively). After plugging in a Bluetooth 4.0 USB dongle into the Pi, it’s a simple matter of installing BlueZ and entering the iBeacon data.
iBeacon by itself doesn’t really do anything – the heavy lifting of figuring out exactly which Panera Bread or Starbucks you’re in is left to the apps on your phone. If you’re a mobile developer, though, this is a great way to set up a very useful testing rig.
Filed under: wireless hacks
The brand joined hordes of musical theater fans in reacting to the telecast starring Carrie Underwood. “You are 16, going on 17, and I assume you’d like pizza for your birthday dinner.”
View Entire List ›
TweetAn interesting update from NOAA reveals an updated, post-Hurricane Sandy nautical chart for New York harbor. From NOAA – “This new chart edition is the first product of a multi-year post-Sandy charting plan,” said Rear Admiral Gerd Glang, director of … Continue reading
Researchers at the University of Tokyo, Georgia Tech and a team from Microsoft Research have developed a low-cost method of printing circuits using an ordinary inkjet printer using a technique called Instant Inkjet Circuits.
The hack is quite literally as simple as injecting a refillable printer cartridge with a commercially available Silver Nano-particle Ink. This allows the printing of circuits onto many different flexible substrates including paper, transparent film, or basically anything you can fit in the printer. Typically if the medium is designed for printing it will work. Some exceptions to this include canvas cloth, magnetic sheets, and transfer sheets.
The researchers chose a Brother inkjet printer because they typically have nozzles that eject higher volumes of ink than other printers. The exact model they used was the Brother DCP-J140w. To maximize ink deposition, all cartridges are filled with the ink, and printed using photo mode where the C M and Y cartridges are simultaneously used to create black. No special software is required to print.
The full article is well worth the read and shows many examples of the different applications this could be used for — including instant prototyping using nothing but scotch tape.
If anyone can source some of this ink and try it out we would love to hear from you! Those that can’t may want to give the old inkjet/laser toner etch resist trick a try.
[via Power Electronics]
Filed under: misc hacks
Finals are coming up and it’s so cold outside you have to wear your Gore-Tex coat. Is it Festivus yet?
Winter break is so close, yet so far.
NBC / Via suprlol.com
Everyone's freaking out about finals and you're just like...
NBC / Via wifflegif.com
And whenever your professors bring them up in class, you check out a little more.
NBC / Via imgur.com
Because you're a little preoccupied.
NBC / Via imgur.com
View Entire List ›
TweetAn impressive virtual 3D model flies you around the Curtin University campus (Australia) created with aero3Dpr. About the project… Based on advanced aerial photogrammetry techniques, aero3Dpro is a 3D modeling service from Australian mapping and survey company AEROmetrex. The unprecedented … Continue reading
[Davide] saw our recent post on magnetic levitation and quickly sent in his own project, which has a great explanation of how it works — he’s also included the code to try yourself!
His setup uses an Atmega8 micro-controller which controls a small 12V 50N coil using pulse-width-modulation (PWM). A hall effect sensor (Allegro A1302) mounted inside the coil detects the distance to the magnet and that data is used by a PID controller to automatically adjust the PWM of the coil to keep the magnet in place. The Atmega8 runs at 8Mhz and the hall effect sensor is polled every 1ms to provide an updated value for the PWM. He’s also thrown in an RGB LED that lights up when an object is being levitated!
So why is there a kid with a floating balloon? [Davide] actually built the setup for his friend [Paolo] to display at an art fair called InverART 2013!
After the break check out the circuit diagram and a short demonstration video of the device in action!
Oh yeah, those of you not impressed by magnetic levitation will probably appreciate acoustic levitation.
(click for full size diagram)
Filed under: Microcontrollers
I, an ignorant American, just watched my first cricket match. Here’s what I took away from it.
Cricket is a little like baseball, but totally different in almost every way.
(I'm not sure why these men have their hands in the air, but I can only imagine it has something to do with stumps or wickets or something.)
David Gray / Reuters
View Entire List ›
This will either be the most magical thing or a disaster of epic proportions, so here are a few of our favorite drink(ing moments).
Let’s start at the very beginning, a very good place to start.
(Sung to the tune of “Do-Re-Mi”)
When you watch tonight’s program
And you feel one of these things
You take a drink, take a drink.
The thing you need to do is
take a drink, take a drink.*
View Entire List ›