Ads 468x60px

Labels

Social Icons

.

Must have future gadgets 2014

Real Star Trek Phasers: Science Friction Ep 2

Google and NASA's Quantum Artificial Intelligence Lab

FUTURE SHOCKS -- Motherboard.Vice.com

These Quadcoptors Are Better Robotic Musicians Than the Rock-Afire Explosion



In his book Musicophilia, Oliver Sacks writes that, “Anatomists would be hard put to identify the brain of a visual artist, a writer, or a mathematician—but they could recognize the brain of a professional musician without a moment's hesitation."
Making music is one of the most neurologically demanding things we people can do. When you're playing off sheet music you're performing a combination of fine physical and mental operations—translating the symbols to motion, memorizing and reciting phrases, all while simultaneously getting and integrating feedback from what you're playing. And just as a guitarist's fingers become calloused in response to repeated exposure to strings, a musician's brain changes in response.
A study comparing the brains of professional musicians, amateur musicians, and non-musicians found a positive correlation between between being a musician and an increase in gray matter volume in the brain's perirolandic regions, including “primary motor and somatosensory areas, premotor areas, anterior superior parietal areas, and in the inferior temporal gyrus bilaterally.”
Now, what these drones are doing in the video above isn't really comparable—the drones aren't listening to the music they're making, learning from it, or getting any more gray matter.
Of course, the credit still lies with the programmers, which, in the case of the video above, KMel Robotics, particularly for how cleverly they rigged up the slide guitar. For now, the culpability for when robots do something stupid, like fly by a jetliner, or when they do something rad, like the national anthem, still resides with Team Flesh & Blood.
But it is an example of the fine coordination, timing and incremental movements that we people can now program groups of drones to perform, which is very cool. Coordinating swarming groups of robots remains an engineering/bandwidth puzzle, and each of these drones singing videos—while indisputably sort of silly—is also an amazing, if incremental step toward robots repairing bridges and building stuff on Mars.
If they start playing other songs of their own volition, maybe this should all be filed away under “better left undone.” As Motherboard's loyal readers will know, superintelligent AI carries real risk. It's nice to imagine that, if its ever developed, it will also carry a tune.
TOPICS: dronesvideofunmusicculture
Written by

BEN RICHMOND

A New Look at Kowloon Walled City, the Internet's Favorite Cyberpunk Slum

A New Look at Kowloon Walled City, the Internet's Favorite Cyberpunk Slum

Until its final demolition in 1994, Hong Kong's Kowloon Walled City remained one of the strangest places on Earth. At its height in the late 80s, some 33,000 people were packed into roughly 2.6 hectares enclosed by the former military base. Fitting so many people into such an incredibly tiny space meant building upward, turning the city into a stunningly dense vertical slum.
By all accounts, the ungoverned city had terrible living conditions, owing both to the simple reality of cramming so many people into such a tiny place as well as a legacy of Triad control. As noted by a 1995 South China Morning Post article touting the $61 million park that replaced the slum, the Kowloon Walled City was beset by "squalor and lawlessness" right up until it was demolished.
"The Walled City—the only part of Hong Kong which the imperial Chinese government refused to hand over to the British—became famous for its prostitutes, opium dens and unlicensed dentists," reads SCMP reporter John Flint's eulogy for the city. Flint reported that then-Hong Kong Governor Chris Patten "applauded the 'fantastic transformation'" of the former slum.
And what else could you say? Cramming tens of thousands of people into an area comparable to a city block without proper infrastructure could result in nothing else. And yet in the two decades since its disappearance, fascination with the city has endured, especially online.
Likely because it represents the perfect confluence of things internet loves—superlatives (the most crowded place on Earth!), a weird, bloggable history, China, contrarianism, its image of the cyberpunk dystopia we're all rocketing towards—the city has, in some portrayals, transitioned from one of the world's worst slums into "the modern pirate utopia." 


That dichotomy, of the city being both a symbol of poverty affected by political gamesmanship as well as an internet curio, is why the Wall Street Journal's new documentary on Kowloon proves fascinating. It features Ian Lambot and Greg Girard, who combined to produce the text and photographs of City of Darkness: Life In Kowloon Walled City, which was published around the time of the city's demise, and remains one of the best records of what life there was actually like.
The city was borne out of longstanding tensions between the British and Chinese governments. It was spawned by the agreement, completed in 1898, to lease Hong Kong to the British for 99 years, which didn't include the Walled City. Hong Kong authorities attempted to demolish much of the former military outpost in the 1930s, which left the Walled City's formerly small population at close to zero, and Japan continued to tear down the fort during World War II. 
But following the Japanese surrender, China reasserted its claim, causing the first flow of squatters to enter the city, which opened up to a flood as Mao Zedong instituted Communist rule in China. An essay by Julia Wilkinson in City of Darkness explains that these events, combined with an inability by the British to control the Walled City left it largely lawless; a 1959 murder trial resulted in jurisdiction being assigned to Hong Kong, but by that time, as the Journal documentary notes, the Walled City was already entrenched.
The result was a heavily isolated, ramshackle city-state. The documentary, as told through the lenses of Lambot and Girard, who are about to release a follow-up book called City of Darkness Revisited, shows how that isolation was a double-edged sword.
The city in 1989, soon before evictions began. Image: Wikipedia

The lack of outside support meant the Walled City was built on itself largely by itself, with commerce and industry mixed into itself as produced by a self-sufficient population. This idea, that an entire city could be built in three dimensions to support itself—imagine, say, a dentist's office squeezed into a dark alley four stories in the air—is likely what sparks the romanticized view of the city, especially after its influence spread into countless seminal sci-fi works, including William Gibson's Bridge trilogy.
It's a viewed typified by what Hong Kong architect Aaron Tan, who was a grad student when the Walled City came down, told CNN earlier this week. "I was fascinated—it was like a piece of machinery that worked very well. The demolition was like taking the machine apart—the first time you could see what was inside," he said. "It was a really humbling process for me as a designer—when we met this Walled City, we started to see that people could be more intelligent than us, the designers—that they could think of ways to solve problems that are outside the traditional academic world."
At the same time, that ingenuity was spawned by the city's isolation. There was little in the way of public services, meaning sanitation, public safety, and crime prevention were all the purview of locals. Heroin addiction and prostitution were rampant, and the city's citizens were largely on their own.
The same set of conditions that allowed the city to grow into an organic mass that's not been duplicated also produced its essential problem, which has often gotten lost in translation as the city's history has been canonized: The city's political, physical, and economic isolation left its citizens trapped inside its walls. It's a problem that stayed with residents to the end. "When people couldn't afford heroin, they would die," one former resident told the Journal. "Their family members just moved their dead bodies to the bedrooms."
The Kowloon Walled City continues to captivate people because of those problems, and its ills are also what make it such powerful inspiration for fictional portrayals of what's to come. An anonymous suburb is neither memorable nor a great plot device; even in Neal Stephenson's Snow Crash, which is perhaps the best cyberpunk representation of the suburbanization of America, burbclaves take a back seat to the mystery of the floating slum that is the Raft. At the same time, the Walled City stands as proof that the dystopian futures we imagine have already been built.
TOPICS: culturehistoryKowloon walled cityChinaasia, sci-fidystopiascyberpunk,videos

Anonymous' New Walkie Talkies Use Radio Waves to Access the Internet

Image: Lulz Labs/Vimeo

The hacktivist group Anonymous is working on a new communication tool to circumvent censorship and set information free, and it’s going low-tech this time. The project is called Airchat, and it will use radio waves instead of wifi, broadband, or phone lines to communicate data and messages between computers. It’s basically pirate radio for ones and zeros.
The idea for Airchat was hatched because of the “lessons learned in the Egyptian, Libyan and Syrian revolutions, but also from the experience of Occupy Wall Street and Plaza del Sol,” explains the project description on Github, posted under “Lulz Labs,” which was spotted by International Business Times. With social upheaval in Ukraine and Venezuela and other places around the world, a safe anonymous way for dissidents to organize movements and share information is as relevant as ever.
The radio communication works much like a walkie-talkie or CB radio, with the transmitter acting as a sender and receiver—only you’re sending computer commands instead of audio.


This kind of radio data transfer has been done before. The concept has existed since ALOHAnet was introduced in 1971, a University of Hawaii project that sent data over radio. In 2010, a startup called OneBeep created software that transferred data over radio waves by converting it into an audio signal and then back to the original information packets for the computer to translate.  
The team also experimented with laser light-based transmissions, a more complicated method of transmitting data through the pulse of a laser beam, but decided to put a pin in that for now.
Beyond political dissidence, the group writes that Airchat could be used for disaster relief, by support groups or medical teams, or by sailors to communicate weather conditions out at sea. Basically, it could be used any time you need information and traditional communication methods are down.
The end goal is to make this all available for free—“free as in 'free beer' and free as in 'Jeremy Hammond must be freed,” the group writes—without the control of megacorporations or heavy-handed governments.
"Even after all these years of technological advance, we still need to meet in common public places to continue expressing ourselves in a free way," they write.
We’ve seen apps like Zello play a major role for rebel groups in Venezuela and Ukraine, becoming the go-to walkie talkie app that gave protesters the ability to communicate in private voice messages on the go. The problem with Zello, as was witnessed in Venezuela, is that it can only run using wifi or a data plan. With Airchat, which will use both encrypted and non-encrypted radio waves, that shouldn’t be an issue.
In its current incarnation, the project uses Fldigi software to communicate data—it’s the software commonly used to broadcast amateur radio stations from a computer. The machine’s sound card controls most of the communication of information to and from the transmitter using audio-frequency signals. It typically works on Linux, OSX, and Windows.
The radio transmitter is operated by keyboard commands, and Airchat can be programmed to let you send messages, access Twitter streams, download, news, or find community related articles, the group writes. For extra security, the program will is capable of using anonymous Tor servers and proxy support.
So far, they’ve had trouble transferring images via Google's WebP format, due to lack of browser support, but they’re still working out the kinks.
As it currently exists, as you can see in the Vimeo video posted this week, the program is still quite technical for everyday folk. At this point Airchat is still a proof of concept, and the group is releasing early information about it to try to rally community support and funding.
But it’s already been used by Anonymous to play chess with people 180 miles away, share images and communicate “encrypted low bandwidth digital voice chats.” They have also accomplished 3D printing at distances over 80 miles and have been able to send medical orders at distances over 100 miles.
It works, but it doesn’t operate at high-speeds, and the clarity of the connection depends on the strength of your radio signal. As the group writes, it “sacrificed bandwidth for freedom.”
TOPICS: free the networkhackingAnonymouscensorshipradioairchat, power

Energy Firms' Cybersecurity Is So Bad They Can't Get Insurance

Energy Firms' Cybersecurity Is So Bad They Can't Get Insurance

Malevolent hackers looking to cause havoc couldn’t find a much better target than the energy grid. In our electrified world, power is pretty vital in delivering even the most essential services, and is the backbone of other indispensable sectors to boot. But when it comes to cyberattacks, confidence in energy companies’ abilities to protect their critical systems appears to be lacking.
In a report today, the BBC revealed that UK energy firms are being denied insurance against cyberattacks because their defences are too weak. They spoke to underwriters at Kiln Syndicate, which offers cover via Lloyd's of London. 
When companies apply for cover, the insurance firm assesses what measures they have in place to safeguard against attacks—and they said that in the majority of cases, they’ve turned down applicants for not doing enough. As underwriter Laila Khudari told the BBC, “We would not want insurance to be a substitute for security.”
While that’s likely partly to cover the insurers’ backs—they don’t want to be faced with huge payouts if huge damages were actually to occur—it’s also in the public interest. Insurance companies can help systems recover financially after a breach, but it’s not in their remit to prevent attacks happening in the first place. And I know which I’d prefer.
Part of the reason this news is coming out now is probably because more energy companies are actually realising the full danger of cyberattacks and so are seeking insurance in this area for the first time. In some ways, it’s a good thing that they’ve finally recognised the threat. Then again, it’s perhaps more worrying that they didn’t think to insure against such attacks before. Or build adequate defences against them.
While the threat of cyberattacks on the power industry across the world isn’t new, it’s certainly grown over the past few years, and with the increasing pressure the companies involved are no doubt keen to safeguard against “what if?” scenarios.
In a 2013 report, US congressman Edward Markey warned that “the electric grid is the target of numerous and daily cyber-attacks.” President Obama said in a statement this month on the subject of critical infrastructure that “cyber threats pose one the gravest national security dangers that the United States faces.”
In the UK, security expert Chris McIntosh said last year that Britain’s energy infrastructure was at risk of shutdown from cyber attacks, especially after an invitation for Chinese companies to run UK nuclear reactors. “We need to have new regulations that dictate that energy companies introduce security systems that protect operational networks from attack,” he said.
Just this month, we reported on the complex Careto malware, a very sophisticated virus that has apparently been propagating since 2007 and that targets major power brokers—including companies in the energy sector. Cyberattacks on energy firms are a very real threat, and it looks like they might have woken up to that.
Khudari also suggested to the BBC that changes to the energy companies' systems might have made them more vulnerable. “I think what's behind [the increase in applications for insurance] is the increase in threats and the fact that a lot of these systems were never previously connected to the outside world,” she said. While companies might have previously sought insurance for digital crimes like stolen customer information, they’re now seeking huge policies for if their actual computers and power networks are damaged.
Let’s just hope the firms are rushing to improve cyber defences with as much haste as they’re running to insurers.
TOPICS: cyberattacks, power gridenergypowerhackingcyber defencescybersecurity,, security

Why California Is Organized Cybercrime's Favorite Target

Why California Is Organized Cybercrime's Favorite Target
"Cyber gangs" most likely conjure up images of black hat hackers trafficking guns and drugs on the deep web, laundering money through cryptocurrencies, or fraudsters stealing your credit card numbers to sell on the black market. This is all true. But there's another realm of cybercrime beyond contraband that has law enforcement wriging its hands: Organize cyber gangs targeting lucrative commercial industries, like the energy sector, oil, finance, and especially, a new report suggests, Silicon Valley and Hollywood.
This afternoon, California Attorney General Kamala Harris presented a detailed report on the growing cybercrime problem in the state, and the stats are pretty grim. California is the top US target for foreign-based cyber gangs, pretty much acrosss the board. It led the country in the number of computer systems hacked or infected by malware, the number of victims of internet crimes, and the amount of money lost to identity fraud. The report called the state a "new frontier" for organized cybercrime.
So who are these digital criminals? It runs the gamut from your stereotypical computer whiz with a low moral bar, to politically charged hacktivist groups or state-sponsored cyber militias exploiting the fact that huge swaths of global commerce have moved online and this digital infrastructure be breached.
The number of breaches jumped 280 percent in the US and 27 percent in California.

The report, Gangs Beyond Borders: California and the Fight Against Transnational Organized Crime found that computer network breaches in the Golden State are on the rise, "and many originate from organizations based in China, Russia, Romania, and Nigeria, among other countries." The study covered a broad range of transnational organized crime, one part of which included high-tech crimes like online piracy, hacking, and fraud.
What makes California an attractive target is, in a nutshell, money. Criminals will go where the cash is flowing, and California's in the midst of a 21st Century Gold Rush. The state's GDP is about $2 trillion, which makes it the eighth-largest economy in the world, bigger than the whole of Canada and nearly twice the size of New York or Texas. And it's not just the VC-rich tech industry catching cybercriminals' eyes; the monied celebrities populating star-studded Los Angeles also leaves the state vulnerable to identity and intellectual property theft, and Hollywood is a hotbed for online piracy.
Naturally, the attorney general is using the unnerving findings from the research she led to ask for more state money for the Department of Justice, which she heads up. So it's worth taking the statistics, as always, with a grain of salt. But it's no secret that cybercrime is a serious and growing threat to the US, on both the military and economic front—and one the country is still remarkably unprepared to deal with.
California, for its part, seems to be making an effort. In 2011 the state Justice Department launched a new "eCrime" unit to "investigate and presecute technology crime," specifically to prevent identity theft and fraud and protect Californians' right to privacy.
Now Harris wants to expand the unit to crack down harder.
“State and local law enforcement officers are on the front lines of this fight every day," she said in today's news release. "Our response must include sustained funding for their work and strong coordination at all levels of government.”
TOPICS: CyberwarcyberattacksCaliforniahackingpower

Hacking a Car Shouldn't Be as Easy as Hacking a Computer

Hacking a Car Shouldn't Be as Easy as Hacking a Computer

As you've no doubt picked up on by now, the future car is, for better or worse, a computer with wheels. You log in to your car with a password to control the digitized features. The car comes with built-in internet and downloadable apps. Toyota's new electric concept is named the "iRoad." As Motherboard's Derek Mead reported from CES this year, the trend is crystal clear: "Every car is going to get smarter and more connected, and no car will be worth its salt unless it's got an app."
There's a lot of cool shit you can do with a smart car. The problem with having an automobile that works just like a computer is it can be hacked just like a computer—in other words, far too easily.
At the Black Hat Asia security conference in Singapore over the weekend, security consultant Nitesh Dhanjani demonstrated just how easily it is to break into and control a vehicle, specifically a Tesla Model S.
Dhanjani focused his research on the all-electric car because it's leading the trend of computerized vehicles. The Model S comes with 3G data and wireless internet, its API is open to third-party developers who are starting to build apps for the car, and the car is remote-controllable via the Tesla iPhone app (screenshot below).
That app is accessed with a six-digit password that Tesla owners set up when they first buy the car. Dhanjani's report spells out how insecure this is, especially since the system doesn't lock you out after numerous incorrect attempts.
It'd take a hell of a long time to try to brute-force the password, but without a lockout, it's not impossible. If that didn't work, a phishing scheme could potentially be successful, Dhanjani explained. Or perhaps a bit of social engineering aimed at Tesla customer service employees or the owner could work. In any case, Dhanjani's point is that if a car has a password, that password can be swiped.
Once in, the attacker would be able to see the car's location, unlock it, and start messing around with the various connected features—relatively innocuous stuff like like draining the battery, honking the horn, or opening and closing the sunroof. But the virtual intruder could also steal valuable data about the owner and track their whereabouts.
“It’s a big issue where a $100,000 car should be relying on a six-character static password,” Dhanjani wrote.
They wouldn't be able to start the car and take off with it, or pull off the terrifying scenario of hacking the car while it's moving; for that to happen, the owner's electronic fob key would need to be present.
Tesla didn't comment on the specific report but said in a statement to Reuters, "We protect our products and systems against vulnerabilities with our dedicated team of top-notch information security professionals, and we continue to work with the community of security researchers and actively encourage them to communicate with us through our responsible reporting process."
It's not just Tesla. A spate of internet-enabled automobiles from General Motors are coming off the line this summer, which will make the connected car more mainstream. Right now some 23 million cars on the road globally are connected to the internet in some capacity, according to research firm IHS Automotive, and that’s expected to jump to 152 million by 2020, Time reported.
Researchers have exposed serious security flaws in a variety of vehicles in the past, and as cars get more connected and more automated, the opportunities for an attack grow, and so does the concern—last December, a Massachusetts senator asked automakers to explain how they'll protect against car hacks.
It's no secret that the burgeoning Internet of Things is a potential security nightmare. But as much as no one wants their computer, phone, or smart home broken into, a car takes the risk to the next level. This is the point Dhanjani was trying to make.  
"Owners of Tesla as well as other cars are increasingly relying on information security to protect the physical safety of their loved ones and their belongings," he wrote. "Given the serious nature of this topic, we know we can’t attempt to secure our vehicles the way we have attempted to secure our workstations at home in the past by relying on static passwords and trusted networks. The implications to physical security and privacy in this context have raised stakes to the next level."
TOPICS: transportationhackingcarssmart carsinternet of thingssecurity,cybersecuritymachines

Live Feed

Popular Posts

Blog Archive

Followers

Visitors

HQ

View My Stats