Day: June 16, 2011
By Nic Halverson
Mar. 15, 2011 — Buildings, parking garages and store fronts all map our perception of a city’s blue print and visually define a metropolitan identity. Crisscrossing a city’s I-beams, bricks and mortar, however, is a lattice of Wi-Fi networks that, while crucial to our day-to-day life, are invisible to the naked eye. That is, until now
Entitled “Immaterials: Light Painting Wi-Fi,” Timo collaborated with Jorn Knutsen and Einar Sneve Martinussen to construct a 13-foot-high light rod fixed with 80 lights that detect Wi-Fi signals and light up according to the strength of the signal. ( See a gallery of images here.)
The artists used the common light painting technique of long-exposure times to capture the images, while strolling the streets of Oslo, light rod in hand. The artists’ slow gait allowed the camera to capture the light rod as it measured the wireless signals, thus bringing the networks to life in a fence-like series of glowing bars. As signals fluctuate, the bars rise and fall.
During the project, the group learned that the size and shape of pre-existing landmarks, such as buildings, influence how Wi-Fi signals traverse the urban landscape. Also detected were the vast Wi-Fi umbrellas often emanating from the networks of coffee shops and university buildings, virtually extending the boundaries of these structures without physically affecting the landscape.
Enmeshing the way private and public property co-exist in the virtual sphere, this intriguing project challenges our awareness of urban topography and reminds us that we are constantly surrounded by cyber scaffolding, and its anything but immaterial.
All photos courtesy Timo Arnall
Hackers are secretive, but they are also social. Many spend their spare time in chat rooms and forums discussing their latest targets, techniques and conquests. Eavesdropping on those conversations offers a fascinating insight into their motives.
Say hacker to someone and they are likely to trot out the usual aged clichés – geek, loner, bedroom-bound teenager.
Philosopher is unlikely to feature high on the list. But it seems the modern-day hacker spends a lot of time contemplating the meaning of life.
- The Researcher: hunts for vulnerabilities in computer systems
- The Dealer: Rents botnets and takes out valuable information such as personal data
- The Farmer: Maintains the botnets
- Crime lord: Makes money from stolen data
“Each has a philosophy and they want to discuss it,” says Noa Bar Yosef.
She ought to know. Her job with security firm Imperva involves hanging around in hacker forums trying to work out what motivates them.
It is a murky, idiosyncratic world where Ms Yosef admits she spends far too much time.
In one group she visits, members discuss the best reading matter for would-be thinkers.
“Start with Kierkegaard, then Nietzsche and after you’ve read Nietzsche, Sartre is the most logical choice”.
Another poses a question about the practicalities of hacker life: “what kit would you take with you if you were on the run?”MORE
With almost 150,000 Twitter followers, hacker group LulzSec certainly has a higher profile than it did a few weeks ago—so much so that it is now taking requests.
The group has opened a call-in line, where it will field suggestions for hacking targets. Don’t like a particular company? Leave a message with LulzSec and the group might hack into its database and post damaging information on the Web.
“Now accepting calls from true lulz fans—let’s all laugh together at butthurt gamers. 614-LULZSEC, accepting as many as we can, let’s roll,” the group tweeted yesterday.
LulzSec said it had 5,000 missed calls and 2,500 voicemails yesterday, a day it dubbed #TitanicTakeoverTuesday. The group’s Tuesday targets included Escapist Magazine, Eve Online, Minecraft, League of Legends, and eight call-in requests. Today, it claims to have taken out the login server for Heroes of Newerth.
On its blog, security firm Sophos asked readers if they were amused or disgusted by LulzSec’s hacks, and the results thus far are split. About 40 percent (or 597 votes) of people said the group is funny and is making a serious point about security, while 43 percent (or 652 votes) said no, they’re not amusing and hacking into companies or launching DDoS attack are no laughing matter. Another 17 percent (or 259 votes) found LulzSec amusing, but did not approve of what the group was doing.
As Sophos has noted before, LulzSec does not “appear to be motivated purely for the group’s own entertainment.” LulzSec apparently agrees. When it hacked into the Senate.gov database, the group said it was a “small, just-for-kicks release” of internal data.
The authorities have not yet spoken publicly about LulzSec, though they are likely investigating. As Sophos also pointed out after the Senate hack, such activity could result in five to 20 years in prison under the Computer Fraud and Abuse Act, if convicted.
Update: LulzSec is now reporting that it is forwarding its call-in number to the customer support lines of various businesses, including magnets.com and World of Warcraft. “Our number literally has anywhere between 5-20 people ringing it every single second. We can forward it anywhere in the world. Suggestions?” the group tweeted.
For more from Chloe, follow her on Twitter @ChloeAlbanesius.
A court in Düsseldorf, Germany, has convicted a man who extorted money out of online gambling websites in the run-up to the 2010 Football World Cup in South Africa.
The Frankfurt man, who has not been identified, successfully blackmailed three online betting sites (and attempted to extort money from three others) by threatening them with distributed denial-of-service (DDoS) attacks which could have blasted them off the internet.
According to German media reports, the blackmailer hired a botnet for $65 per day and told the betting firms that he would make their websites unavailable during July 2010 – the month of the World Cup – if they did not pay him 2,500 Euros ($3,700).
When three of the sites refused to pay any money, the man reduced the ransom to 1,000 Euros.
This isn’t the first time, by any means, that denial-of-service attacks have been used to blackmail online gambling websites in the run-up to a major sporting event. For instance, in 2006 a Russian gang who were said to haveextorted $4 million from British bookmakers were sentenced to jail.
As more and more firms rely on internet visitors for their revenue, so the potential impact that can be caused by a denial-of-service attack increases. It’s sadly no surprise, therefore, that some cybercriminals will see it as a way to make money.
The German authorities should be congratulated on their successful conclusion to this investigation. The man has now been sentenced to two years and 10 months in prison, and was ordered to pay up to 350,000 Euros ($504,000) in damages to the affected firms.
My guess is that he’s unlikely to be sending significant traffic to any websites anytime soon.
Ask yourself, is it good that a company headquarters is roughly the size of the Pentagon? Or should that be a red flag? I jest. Somewhat. But that’s basically the size of Apple’s new building, proposed by CEO Steve Jobs, although a bit of a smaller footprint overall. Check out the graphic below from the Mercury News. In a presentation before the Cupertino City Council on June 7 (see here), Jobs said, “Apple’s growing like a weed.”
CURIOSITY.COM: 10 Surprising Ways Software Keeps Moving
He said they have almost 12,000 people in the area and were renting buildings at an ever greater radius from their campus. They have a plan that allows them to stay in Cupertino and “continue to pay taxes.” Apple bought some land formerly owned by Hewlett Packard, and have designed an unsual building.
“It’s a little like a spaceship landed,” Jobs told the council. Here’s what the building will have:
- 4 stories high
- 3.1 million square foot sphere of glass
- energy-generating center
- 150 acres of land
- capable of holding 12,000
- employee gym
- cafeteria that can hold 3,000 people
- some aboveground but mostly underground parking
- research facilities
- move-in: 2015
- 6,000 trees and apricot orchards
- 80 percent of the land will be landscaped
Credit: Youtube Screen grab; Mercury News
If a mountain biker executes a 360 tailwhip before landing a 30-foot drop-off into a desert canyon, but no one is around to witness it, did it even happen? Rather than ponder the metaphysics of their extreme sports, adrenaline junkies have been filming their stunts, leaving audiences jaw-dropped and totally stoked.
But for every shaky, hand-held fisheye-lense clip, there’s a thousand more clips that are just as amateurish. If you prefer your extreme sports movies to have a little more cinematic depth to them, then the epically narrated and beautifully filmed Life Cycles mountain biking movie just might be what your gnarly little heart craves.MORE
YOU MIGHT ALSO LIKE
Hopping on a bicycle saddle and peddling through the heart of the city is not for the faint of heart. Besides being safeguarded by minimal protection amidst aggressive traffic, their slower pace and low visibility often subject bikers to unfathomable road rage and projectiles hurled from angry motorists.
I’ve been grazed by enough tossed cups, bottle caps, and side-view mirrors to know that biker visibility is paramount to a more peaceful and safe coexistence between cyclists and motorists.
Helping bridge this gap is BLAZE, a device invented by Emily Brooke, a final-year Product Design student at the University of Brighton. Her device alerts drivers to the presence of a bikers by projecting a laser image onto the road in front of the bicycle.MORE
YOU MIGHT ALSO LIKE
It’s undeniable that our world is becoming increasingly digital, interactive and connected. Over the past few years some amazing progress has been made that allows us to bridge the gap between the physical world and the digital one. We can expect that one day everything we know in the physical world will have a parallel existence in cyberspace.
Hannes Harms, a student at the Royal College of Art in London, has an idea for a way to do this when it for food. He wants to implant food items with edible radio frequency identification (RFID) chips. RFID tags are often used to catalogue and track various objects ranging from merchandise inventory to casino chips. They are made out of a small integrated circuit with an antenna and are generally not edible. However in 2007 Kodak developed a safe, ingestible RFID tag to be used in medical imaging. MORE