April 25, 2018
Obsolesce Of Nuclear Weapons
This is one incredible video.
It shows the killing power of micro killer drones.
With a host of cameras and other sensors including facial recognition and GPS, plus a small amount of explosives, these drones can target individuals or critical infrastructure and take them out!
The drones can work alone or in swarms to get into and kill or destroy anything.
No VIP (very important person) or CIP (critical infrastructure protected) is safe.
We can wipe out entire cities or the nuclear infrastructure of our enemies.
Despite the warning about artificial intelligence at the end of this video, rest assured these killer microdrones are coming.
Big is the new small, and small is the new big.
In fact, big things come in small packages--exactly!
Iran and North Korea are chasing obsolete technology to harm the U.S. and Israel, and within a short time, they will see the error of their malevolent ways
G-d foretells us all in the Bible and like David and Goliath--a slingshot to the forehead and the fight with the evil is over. ;-)
(Thank you to Itzchak for sharing this video with me).
April 13, 2016
2016 Technology Advances - Doing Well Sir
2016 Technology Advances - Doing Well Sir
April 30, 2014
Crooked x 2
Thought these were awesome, even though the gardner did a little bit of a crooked job here.
And when it comes to crooked, I overheard a funny story in the locker room the other day.
These school students were talking about getting caught stealing something in a local store.
One says that he got spotted on the surveillance cameras and that they even have facial recognition now, but he's okay on that because he was wearing a cap.
Another kid in the group says "why didn't you just tell them you didn't know you couldn't take it!"
Some very sophisticated crooks we got here. ;-)
(Source Photo: Andy Blumenthal)
Crooked x 2
September 12, 2013
Apple Is Giving Us The Finger
This week, with the introduction of the iPhone 5S, Apple had the opportunity to introduce something new and exciting, but instead what did we get?
- A faster processor and Touch ID fingerprint reader.
In nutshell, since Steve Jobs untimely passing, Siri was a bombshell, actually just a big consumer product bomb.
And now with the fingerprint reader as the big newcomer add-on to the iPhone, it's as if (sorry to say), Apple is giving us all the proverbial finger.
While the fingerprint reader is cute and a faster logon, it is really not a must-have or a game-changer.
The only thing less exciting than Touch ID is the new Yahoo logo.
In the last two years, Apple has taken a mighty innovation lead and squandered it.
Still, no one can touch their highly integrated iPhone product.
However, if much more time goes by without something meaningfully new and innovative, they will be in trouble.
Rumors of an iPhablet (iPhone/tablet) with a significantly larger screen (ranging from 4.8 to 6 inches) will be more like the Samsung Galaxy S4 with 5-inch screen rather than than iPhone 5S 4-inch screen, and would have attraction for people who like to read or watch on a larger, better display.
Of course a significantly better camera would be helpful too--need I say more?
Some interaction with wearable technology, like a Google Glass with augmented reality would also be a winner.
And a fully ruggedized smartphone, similar in concept to a Panasonic Toughbook--and up to military grade specs--that withstands drops, spills, dust, and lots of everyday field use punishment, would be way cool for the action-adventurer in all of us--and maybe then we wouldn't need all the silly looking cases.
In the meantime, put your index finger on the home bottom, while Apple puts their middle finger up at you, the consumer.
Steve Jobs, where the heck are you? ;-)
(Source Photo: here with attribution to CNET)
Apple Is Giving Us The Finger
August 25, 2012
Choke Points to Checkpoints
This is some promising biometric technology from AOptix.
Enrolling in the system is the first step and means just seconds of standing in the capture field of the slender tower, and the device scans both iris and face of the person.
The scanning captures images within seconds and the software converts the images into binary code.
It then subsequently scans and matches the person's biometrics against the database for positive identification.
The beauty of this system is that it is simple and fast and can be used for passenger screening, immigration, or any other access control for entry/egress for a building, location, or even to a computer computer system and it's information.
According to Bloomberg Businessweek, the Insight Duo Towers sells for $40,000 each.
Eighty of these are currently in use at all air, land, and sea borders in Qatar. Further, Dubai International Airport has been piloting this at a terminal that handles 40 million people per year, and it has cut immigration waiting times from 49 minutes to 22 seconds.
This technology has obvious important applications for military, law enforcement, and homeland security, as well as even more generalized security use in the private sector.
And while very impressive, here are some concerns about it that should be addressed:
1) Enrollment of Biometrics and Personal Identification--registering for the system may only take a few seconds for the actual scan, but then verifying who you are (i.e. who those biometrics really belong to) is another step in the process not shown. How do we know that those iris and face prints belong to Joe Schmo the average citizen who should be allowed through the eGate and not to a known terrorist on the watch list? The biometrics need to be associated with a name, address, social security, date of birth and other personal information.
2) Rights versus Recognitions--rights to access and recognition are two different things. Just because there is iris and facial recognition, doesn't mean that this is someone who should be given access rights to a place, system or organization. So the devil is in the details of implementation in specifying who should have access and who should not.
3) Faking Out The System--no system is perfect and when something is advertised as accurate, the question to me is how accurate and where are the system vulnerabilities. For example, can the system be hacked and false biometrics or personal identification information changed? Can a terrorist cell, criminal syndicate, or nations state create really good fake iris and facial masks for impersonating an enrollee and fooling the system into thinking that a bad good is really a good guy.
4) Privacy of Personally Identifiable Information (PII)--not specific to AOptix, but to this biometric solutions overall--how do we ensure privacy of the data, so it is not stolen or misused such as for identity theft. I understand that AOptix has PKI encryption, but how strong is the encryption,who long does it take to break, and what are the policies and procedures within organizations to safeguard this privacy data.
5) Big Brother Society--biometrics recognition may provide for opportunities for safe and secure access and transit, but what are the larger implications for this to become a "big brother" society where people are identified and tracked wherever they go and whatever they do. Where are the safeguards for democracy and human rights.
Even with these said, I believe that this is the wave of the future for access control--as AOptix's says, for changing choke points to checkpoints--we need a simple, fast, secure, and cost-effective way to identify friends and foe and this is it, for the masses, in the near-term.
Choke Points to Checkpoints
October 13, 2011
Increase Security On Your Google Account
After reading the article Hacked! in The Atlantic (November 2011), I looked into Google's new security feature called 2-Step Verification (a.k.a. Two Factor Authentication).
Increase Security On Your Google Account
June 4, 2011
Armored Skin
Armored Skin
February 18, 2011
You Can Run From MORIS, But You Can't Hide
You Can Run From MORIS, But You Can't Hide
April 4, 2010
Advanced Biometrics for Law Enforcement
Homeland Security Today Magazine (March 2010) has an interesting article called “Biometrics on the Battlefield" about how the American military has had significant success in Afghanistan taking biometrics and in using it for “vetting, tracking, and identification.”
Here’s how it’s done:
The biometrics system uses HIIDE (Handheld Interagency Identity Detection System) devices, which is “similar in size to a large camera, [that] connects directly to the BATS [Biometrics Automated Tool Set] database and matches inputs against a biometrics watch list of 10,000 individuals.”
The database “BATS uses a combination of fingerprints, photographs and iris scans, in addition to an in-depth background examination” to “screen potential local employees, identify detainees, and differentiate friendly individuals from insurgents and terrorists.”
How successful has the use of biometrics been?
“The use of biometrics has clearly thwarted security breaches and helped prevent unwanted activities by the enemy. Additionally, in 2008 alone, hundreds of HVTs (high value targets) were identified through the use of this biometrics technology.”
The article suggests the application of this biometric system for domestic law enforcement use.
Currently, fingerprint cards or stationary scanners are common, but with the proposed military biometrics system, there is the technology potential to use mobile scanning devices quickly and easily in the field.
The article gives the example: “if an officer came into contact with an individual under suspect conditions, a simple scan of the iris would ascertain that person’s status as a convicted felon, convicted violent felon, convicted sex offender or someone on whom an alert has been placed.”
In this scenario, quicker and more accurate identification of suspects could not only aid in dealing with dangerous offenders and benefit the officers in terms of their personal safety, but also contribute to ensuring community safety and security through enhanced enforcement capabilities.
Of course, using such a system for law enforcement would have to pass legal muster including applicable privacy concerns, but as the author, Godfrey Garner, a retired special forces officer, states “hopefully, this valuable technology will be recognized and properly utilized to protect law enforcement officer in the United States. I know that I’ve seen it protect our sons and daughters on the battlefields of Afghanistan.”
We are living in an amazing time of technology advances, and the potential to save lives and increase public safety and security through lawful use of biometrics is a hopeful advancement for all.
Advanced Biometrics for Law Enforcement
July 6, 2008
Biometrics and Enterprise Architecture
Biometrics is “the study of methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits.” (Wikipedia)
Biometrics is crucial for identifying and taking out of play enemy combatants, terrorists, and criminals or for providing access to trusted employees or partners in public or private sector organizations, like the intelligence community, defense, security, and various sensitive industries like financial, telecommunications, transportation, energy, and so forth.
National Defense Magazine, November 2007 has an article on the significant advances being made in biometric technologies and their applications to our organizations.
According to “’The National Biometrics Challenge,’ a report produced by the Office of the President’s National Science and Technology Council…’a tipping point in the maturation of the technology has been reached.’”
Both the FBI’s Information Services Division and The Department of Defense Biometric Fusion Center are leading the way in this field.
Currently, identity is established based on the trinity: “something you know (such as a password), something you have (like an identity card), or something you are, which is where biometrics comes in.”
Biometrics includes technologies for recognizing fingerprints, facial features, irises, veins, voices, and ears, and even gait.
But these are technologies identification means are not fool-proof: remembering multiple complex passwords can be dizzying and identity cards can be lost, stolen, or forged. So biometrics becomes the cornerstone for identity management.
However, even biometrics can be spoofed. For example, fake rubber fingers have been used in lieu of a real fingerprint (although now there are ways with living flesh sensors to protect against this). So therefore, biometrics is evolving toward “multi-modial” collection and authentication. This could involve using 10 fingerprints versus one or combing fingerprint, iris scans, and digital mugshots (called the “13 biometrics template” and used to gain access in U.S. managed detention centers in Iraq) or some other combination thereof.
Biometrics has advanced so much so that an Iris scan system from Sarnoff Corp. of Princeton NJ “can scan and process 20 people per minute from distances of about 10 feet away, even those who are wearing glasses.”
The keys to further enterprise application of these technologies in our enterprises are the following:
- Lowering the cost (especially to make it available to local law enforcement agencies)
- Making it rugged enough for extreme environments for the military
- Making it portable so that it can be used for a variety of law enforcement and defense operations
- Reengineering business processes so that measurements are captured, stored, accessible, and readily available for making a match and generating a decision on someone’s identity in real-time
- Developing policies that “effectively govern the proper use of the data” and ensure adequate protection for civil liberties and privacy.
Overall, biometrics has moved from emerging technology to applied technology and needs to be planned into your identity management architectures.
Biometrics and Enterprise Architecture