August 19

Magick… What is it?

So you may have noticed that I use a weird spelling of the word “magic” – but if all you know about magick is “Rabbit out of a Top Hat”, Harry Potter, etc, then you don’t know magick.

So let us define some terms…

Magick is the way it is spelled if you mean it! By that, I mean to say that if you are doing such things a moving things with your mind (telekinesis), speaking to others (people, animals, trees, mushrooms) without using sound (telepathy), healing using the energy of your hands/body/chakras (Reiki), meditation for spiritual growth, etc. You are doing “Magick”…

(The truth, of course is that you are always doing Magick because you exist and if you ponder that long enough, you will gasp at just how magickal that fact is – too few do this).

The Magick above is, generally speaking known as “Low Magick” in magickal circles…and that is a pun because anyone familiar with various Pagan things knows all about “Magickal Circles” but I digress and will leave that for another post.

So called “Higher Magick” is when you invoke or “evoke” a spirit/god/daemon/faerie/etc of your choice into personal presence or actual physical presence so that you may communicate with them. This is done to gain wisdom, power, or other things.

At this point, if you are a traditional Baptist Church going Christian, you are no doubt cursing the ground I walk and consigning me to eternal damnation. Oh well. I’ve been a Baptist Christian so, I’m pretty sure you wrong about that, but we will see… 🙂

So Here I include a picture of my magical walking staff which I use whenever I go hiking in the various mountains and other places here in North Carolina. The top is an amethyst sphere for “Skrying” and the point is the center part of a large conch shell I found on the beach. The staff itself is a Oak or Elm staff which as been oiled and shod with a copper base (you cant see that) and adorned with Elder Futhark Runes that have special meaning to me.

MyStaffSo, some of you by now probably think I have lost my marbles.  “How is this engineering and science?” you ask…

I’ll tell you.  ALL Science was once magick, and ALL Engineering is applied Science, therefore applied Magick. Chemistry? Alchemy.  Physics? The Magick of the 4 Elements. Biology? The Magick of Animal husbandry, Herbalists, etc.

Magick just makes sure you never foget that there is a spiritual realm and aspect to all Science.  Those scientists who deny this in every way are usually the same ones you may see at a bar drinking and wondering why the field that looked so promising when they were young now seems to drain them of all desire.  Simple, your missing half!

What the hell do you think that sparkle is in the eye of a child?

-DTM

August 18

Break the Spy Cameras!

The world is flooded with cameras taking your picture and video recording you every day. Road cameras, Store cameras, WIFI laptop, cellphone, bank, etc. The list goes on. Everywhere you look these days, and many hidden places where you cannot look there are cameras.

And with these insidious cameras are new software technologies to perform facial recognition. This can then be used to link to massive databases of information on you, your browser history, your purchase history, your “criminal” history.

An criminal is in the eye of the beholder. To many of the elitists in government, everyone is a criminal in one way or another. They have seen to that by enacting so many different laws that there is nothing you can do alive OR dead without breaking some of them.

What is a freedom loving individualist to do?

How about not being recognized in the first place?

First lets get a very brief understanding how this technology works. Basically as can be seen from the following diagrams, the software maps a set of points on the face and has algorithms to detect a variety of facial changes as we do such things as eat, laugh, grimace, scowl, etc. Another set of algorithms allows the face to be mapped from any angle. Putting all of these together allows the computer to create a basic “Facial Fingerprint” unique to you.

F1.large

faebook-face-recognition-1024x576

Facebook has upped the anti by making every post able to map multiple faces and even map those faces as they change with age.

MultiFaceRec.png

This is scary stuff. Not only can retailers and ad people use this to target us to buy their products, but most intrusivly it allows a government with far too much power to infiltrate and basically control our lives.

How can we combat this obvious intrusion into our private lives?  Well a company in Japan is working on an idea – one that those individuals with some basic DIY skills can certainly emulate!

The key is to conceal or inject “new” points into the facial map so that what the computer thinks it is seeing is something completely different.  Short of making a mask of someone else, a la “Mission Impossible” what can be done is to confuse enough of the face so that the computer cannot make the link.  Here is a picture of the shades they are developing

nii2-100606811-primary.idge

And Here is the Link: Fooling the Facial Recognition Camera

The key appears to be the ability to reflect white light back towards the camera and at the same time, confuse it about where to place the eye points and the eye-line to nose begin line (see earlier mapping pics). Without this data, all the camera has to go by is the lower nose and mouth lines.

Now, when the software builds this database of your face, what it is doing to create the facial fingerprint is to first determine these various points and then, and this is key, to create a set of “distance lines” between each of the points that represent a dynamic measure based on your current facial response. In other words no matter what your face is “doing” (laughing, crying, shouting, anger, happy, smiling, etc.) the dynamic distances between these lines stay within a specific set of ratios. This set of measures is unique to you so that by knowing all of the points, and all of the ratios of the lines connecting those points, the computer can guess that you are who you are within an astonishing degree of accuracy.

But only if it can get those points and ratios.

If you can devise ways to flummox the software (And I assure you, you can) then this recognition goes out the window.

Ultimately you could just wear a entire face covering bowl with a one-way see through mirrored surface. But then you would attract attention. “Hey look mommy, a manikin is walking down the street!”

These white shades, while rather bulky currently, won’t attract that much attention!

Good Luck out there!

July 14

Online Anonymity Project Proxyham : REBOOT!

ProxyHam_2 ProxyHam_1

 

On July 1, 2015 Wired Magazine online printed this article about a new and unique way of achieving anonymity: Online Anonymity Project Proxyham

Here is the problem, apparently some unnamed legal entity and/or judge has issued a gag order against the company in an attempt to silence this information! Read here: Proxyham mysteriously vanishes!

So what are we going to do about it? Simple. I am going to start a series of blog posts here to show you how to build your own ProxyHam device. I invite anyone else who wants to, send me details of their similar devices and I will publish them as well!

I don’t give a (Insert bad language here) about the judges who issue such illegal, and unconstitutional orders.

I am going to repost the article here because it is possible that Wired may also get a gag order, so I am going to make sure the info gets out there:

COURTESY BEN CAUDILL

At the upcoming DefCon hacker conference in Las Vegas next month, Caudill plans to unveil ProxyHam, a “hardware proxy” designed to use a radio connection to add a physical layer of obfuscation to an internet user’s location. His open-source device, which he built for $200, connects to Wi-Fi and relays a user’s Internet connection over a 900 megaherz radio connection to their faraway computer, with a range of between one and 2.5 miles depending on interference from the landscape and buildings. That means even if investigators fully trace the user’s internet connection, they’ll find only the ProxyHam box the person planted in a remote library, cafe, or other public place—and not their actual location.

Caudill, a researcher for the consultancy Rhino Security Labs, compares his tool to typical tactics to hide the source of an Internet connection, like using a neighbor’s Wi-Fi, or working from a coffee shop instead of home. But “the problem with Wi-Fi as a protocol is that you can’t get the range you need. If the FBI kicks down the door, it may not be my door, but it’ll be so close they can hear me breathe,” says Caudill. “[ProxyHam] gives you all the benefits of being able to be at a Starbucks or some other remote location, but without physically being there.”

ProxyHam, which Caudill says he’ll offer for sale at cost to DefCon attendees and will also teach users how to build with instructions on his website and ProxyHam’s Github page (both available after DefCon), is actually two devices. The first part is a box the size of a large dictionary, containing a Raspberry Pi computer connected to a Wi-Fi card and a small 900 megaherz antenna, all of which is meant to be plugged in at some inconspicuous public place—Caudill suggests a dark corner of a public library. On the other end of a radio connection, the user plugs in a 900 megaherz antenna into his or her ethernet port. (In the picture above, Caudill uses a giant Yagi antenna, but he says a much smaller $57 flat patch antenna works, too.)

Caudill intends ProxyHam to protect sensitive Internet users, such as dissidents and whistleblowers, for whom tools like VPNs and even the anonymity software Tor may not provide sufficient security. If an attacker can manage to install malware on the user’s PC, for instance, that malware can circumvent Tor and send the user’s IP address directly to the attacker. But with ProxyHam, that malware attack would only lead investigators to the ProxyHam device, not the user. “The KGB isn’t kicking in your door,” says Caudill. “They’re kicking in the door of the library 2.5 miles away.”

To avoid radio detection on the user’s end, ProxyHam’s wireless signals are designed to look indistinguishable from the many cordless telephones that use the same frequency. And Caudill says the rise of more internet-connected wireless gadgets will provide further cover for ProxyHam users over time. “There are a ton of devices jumping into that space and communicating there,” he says. “It’s not feasible to say ‘we’ll chase down everyone who has this device communicating on this frequency.’ It’s a needle in a haystack.”

No one should depend on ProxyHam alone—particularly until its security has been proven in real-world testing, says Micah Lee, a security technologist for The Intercept and occasional developer for the anonymous whistle-blowing software SecureDrop. But Lee points out that it can be used in combination with existing anonymity software like VPNs and Tor. “It seems like a thing to augment your Tor usage rather than replace it. In that sense, it seems like a good idea,” he says. Lee himself counsels anonymous leakers who use SecureDrop to send secrets to a news organization to first connect to a public Wi-Fi network. ProxyHam, he says, could accomplish something similar. “No matter how many hops over the Internet you use, if there’s someone spying on everything, they can connect all the dots. But if one of the hops isn’t over the Internet and is instead over a radio link, it’ll be a lot harder to connect those dots.”

The version of ProxyHam Caudill intends to sell at DefCon will be fairly basic. But in future versions he’s still developing, Caudill says the device will also include accelerometers designed to detect and warn users if it’s been moved from its hiding place. He’s even hoping to include a microphone that can act as a “black box” recorder to relay to the owner the last few moments of audio the ProxyHam hears before it’s disconnected. All of that, says Caudill, is intended to prevent investigators from discovering a ProxyHam and then tampering with it to eavesdrop on its communications or to trap a user who comes to fix or retrieve it.

Going to the trouble of buying and planting a ProxyHam device—one that if used safely, you may never see again—may sound like paranoia. But Caudill intends ProxyHam to protect the very most sensitive people on the internet, those for whom mere software protections aren’t good enough. “Journalists and dissidents in Arab Spring countries, for instance…these people have very high security requirements,” Caudill says. “This is that last-ditch effort to remain anonymous and keep yourself safe.”

Okay, now for technical details: This is from Errata Security website: ProxyHam conspiracy is nonsense

The talk was hype to begin with. You can buy a 900 MHz bridge from Ubquiti for $125 (or MicroTik device for $129) and attach it to a Raspberry Pi. How you’d do this is obvious. It’s a good DEF CON talk, because it’s the application that important, but the technical principles here are extremely basic.

NOTE: CCE Readers, here is the link to the device at NewEgg:Buy UbiQuiTi NanoStation

If you look careful at the pic in the Wired story on ProxyHam, it appears they are indeed just using the Ubuiti device. Here is the pic from Wired:

And here is the link to Ubquiti’s website: Ubquiti. Look at the top pic at the Device and the Yagi Antenna.

Again from Errata Security:

I don’t know why the talk was canceled. One likely reason is that the stories (such as the one on Wired) sensationalized the thing, so maybe their employer got cold feet. Or maybe the FBI got scared and really did give them an NSL, though that’s incredibly implausible. The feds have other ways to encourage people to be silent (I’ve personally been threatened to cancel a talk), but it wouldn’t be an NSL.

And finally, here is another post that explains much of the technology needed to build these devices using the Rasberry Pi, 35 dollar computer.

Build your own Anonymity Device

UPDATE: 07/15/2015: Another great site with info on building your own ProxyHAM! : How to Build a Proxy Ham Device : Suck it Uncle Sam!

April 11

Taser Proof Clothing…

Just read a report about the rancher in Nevada whose son was tasered by the Feds (read about it here ) for being on their own land and on land that the state of Nevada has allowed ranchers to use for grazing for years.  The Feds have come “swooping” in to protect some stupid turtle.  Another Fed grab of lands that should belong to the people.

Now, to be sure, I do not think all government personnel are thugs… however the less local they are, the more thuggish they seem to act.  You local cop or even your state police are probably people you know, and are at least people who live where you live.  But in this case we are talking Total Thuggery and Total Unconstitutional action.  Your essential Jack-Booted Federal Agent with a superiority complex.

This, of course, is not the first time Fed thugs have used tasers on innocent people – now don’t get me wrong, there are plenty of criminals who need to be tasered.  It would be nice if the Feds would spend their time and resources going after real crooks, for example the Mexican cartels that are crossing our borders – but instead they keep going after the people of this country.  But I digress…

It is time we put a stop to innocent tasing.  To that end lets explore Tasers and Taser-Proof clothing and how to make them both yourself.

This post will look at some interesting projects others have done – I’m not saying one way or another if I have done it. 🙂

The basic principles are simple – just short out the taser by making an electrical pathway that is much more conductive than the human body.  Tasers work on the principle of injecting a high voltage square-wave Alternating Current (AC) into the body by 2 contacts  so as to disrupt the central nervous system.  Shorting those terminals out removes the offending voltage from the body, while also possibly destroying the taser device (if it is cheaply made).

So first we need to know what we are dealing with… what is a Taser?

Donut_Taserjpg

I said, hand over that doughnut!!!

Here are a few circuit diagrams so you can make one, take one apart, and basically understand what they are doing.

stun-gun-schematic stungun Stun-Gun-3a stun_gun1 dazer stun-gun-schematic-555

And here is an offending bit of description of the following taser device that is shown in block diagram:

An electronic disabling device includes first and second electrodes positionable to establish first and second spaced apart contact points on a target having a high impedance air gap existing between at least one of the electrodes and the target. The power supply generates a first high voltage, short duration output across the first and second electrodes during a first time interval to ionize air within the air gap to thereby reduce the high impedance across the air gap to a lower impedance to enable current flow across the air gap at a lower voltage level. The power supply next generates a second lower voltage, longer duration output across the first and second electrodes during a second time interval to maintain the current flow across the first and second electrodes and between the first and second contact points on the target to enable the current flow through the target to cause involuntary muscle contractions to thereby immobilize the target.

Remember… if you disagree with your government, you are the “target”.

 

This paper was written about using 40Hz square waves compared to the 19 Hz square waves of the “TASER(®) X26” device…

Conducted energy weapons (CEWs) (including the Advanced TASER(®) X26 model produced by TASER International, Inc.) incapacitate individuals by causing muscle contractions. In this study using anesthetized swine, the potential incapacitating effect of primarily monophasic, 19-Hz voltage imposed by the commercial CEW was compared with the effect of voltages imposed by a laboratory device that created 40-Hz square waves. Forces of muscle contraction were measured with the use of strain gauges. Stimulation with 40-Hz square waves required less pulse energy than stimulation with the commercial CEW to produce similar muscle contraction. The square-pulse stimulation, at the higher repetition rate, caused a more complete tetanus at a lower energy. Use of such a simple shape of waveform may be used to make future nonlethal weapon devices more efficient.

© 2013 American Academy of Forensic Sciences Published 2013. This article is a U.S. Government work and is in the public domain in the U.S.A.

Just from that we know that TASER uses 19 Hz monophasic (single phase) frequency in their devices. They have claimed in the past (as have others) that the specific “shape” of their devices square waves also help in making their devices more “impactful” – however I suspect that all they do is build a circuit (or use a micro controller) to induce a steep pulse at the beginning, ending, or both sides of the standard square wave pattern.  It really does not matter as the prior paper and this next one show that the most efficient pulse is a 40Hz Straight Square wave.

Electronic control devices (including the Advanced TASER(®) X26 model produced by TASER International) incapacitate individuals by causing muscle contractions. To provide information relevant to development of future potential devices, effects of monophasic square waves with different parameters were compared with those of the X26 electronic control device, using two animal models (frogs and swine). Pulse power, electrical pulse charge, pulse duration, and pulse repetition frequency affected muscle contraction. There was no difference in the charge required, between the square waveform and the X26 waveform, to cause approximately the same muscle-contraction response (in terms of the strength-duration curve). Thus, on the basis of these initial studies, the detailed shape of a waveform may not be important in terms of generating electro-muscular incapacitation. More detailed studies, however, may be required to thoroughly test all potential waveforms to be considered for future use in ECDs.

2010 American Academy of Forensic Sciences. Published 2010. This article is a U.S. Government work and is in the public domain in the U.S.A.

 

So, if you want to create a “taser proof” vest or clothing, you have to essentially short out the taser electrodes in a way that does not allow the power to go into your body.  Remember, your body is essentially a bag of somewhat salty water which makes it a rather crappy conductor, unless there is nothing else better.  Typically you don’t wear conductive clothing so you are essentially going to become a conductor… unless you have prepared.  A simple way to do this is to take your favorite jacket, tear out the lining (carefully and in 1 piece) and install carbon tape.

FGQOETQHRWNCQ1D.SQUARE3

Tasers are no match for a real conductor!

Here is an instructable for using carbon cloth tape to create the Taser-Proof Jacket...

After doing that, just make sure you are wearing your jacket whenever you get tased.

March 10

Hidden Gems in Old Technology…

Have you ever wondered about old tech? Let me explain.  Did you know that about the time that the transistor started taking the place of tubes (or “valves” if you are of European persuasion) that electron tube technology had progressed to the point of creating tiny tubes the same size as discrete transistors?

mini-valve-520

Now that is a tiny tube!

Eventually as transistors became more inexpensive to make, and more capable, the tube faded – but then it got re-invigorate as audiophiles (and Heavy Metal Guitarists) realized that transistors just could not reproduce the warm sounds of the tube in their amplifiers. Hence even today the best and most expensive amplifiers employ tubes.

There have been many technologies like this that have been all but forgotten, left to rot on the ash-heap of history.

But have you ever considered that those technologies may not have given us all they had to give? Is it possible there are anomalies and other design considerations of an old technology that were never considered at the time, and now lie waiting like some missed vein of gold in an abandoned gold mine?

Well… There are those who would try to steer you clear of any such notions – and based on what exactly you are looking into, there may even be those who would attempt to force you to stop looking into these things.

That makes me want to look all the more… and while we are on the topic of electron tubes (or valves) let us go to one of the fathers of the electron tube Philo Taylor Farnsworth. This man developed an amazing array of devices including the very first completely electronic Television and Camera. The funny thing is, most people have never heard of him. Much like Nikola Tesla, while almost single-handed developed an entire new technological arena, he got barely any credit for his inventions.

Philo-Farnsworth-last

PT Farnsworth with his fusor in what looks like a cookie jar…

But one of his most interesting, and mysteriously, his most under-appreciated invention was the Farnsworth–Hirsch fusor, employing inertial electrostatic confinement. In other words along with television, this man created the first sustainable fusion reaction in a device that many high-school science fair participants have recreated!

dp2leprecon2

High School Science Fair. Not sure how old that high school student is… Then again, maybe Neutrons increase beard growth?

 

 

I may at some point try my hand at a Fusor – but even the basic ones need a pretty good vacuum – even my little vacuum pump is nowhere near what is required for one of these! Still, a fusion reaction in my workshop… now that would be something, but I digress.

The point of this post is to think about technologies that are “repressed” not necessarily by big government or big corporations (although I am sure that occurs) but by “history” and neglect.

As I think of new ones I will add to this post. For now, check out this interesting link on the Farnsworth Fusor. (note, the document appears to have been scanned and contains many spelling and format errors, but it is worth the read!)