Military History | How To Make War | Wars Around the World Rules of Use How to Behave on an Internet Forum
The Electronic Battlefield Discussion Board
   Return to Topic Page
Subject: superman vission
newjarheaddean    12/1/2010 8:35:02 PM
AHOY, question; did scientist,(while using satiltites in orbit around earth) here awhile back... discover how to use the ionosphere to create x-ray images, i.e. i seem to recall the method involved using the ionosphere somehow to alter the returning energy (from the surface of the earth) as it reach the ionosphere. anyone? G-day!
 
Quote    Reply

Show Only Poster Name and Title     Newest to Oldest
newjarheaddean    Sheephood 4   6/13/2011 1:46:48 PM
AHOY,
 
 

U.S. Works to Deploy Secret Internet, Mobile Phone Systems For Dissidents

http://www.democracynow.org/2011/6/13/headlines/us_works_to_deploy_secret_internet_mobile_phone_systems_for_dissidents" addthis:username="demnow" addthis_default_style"="" style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px; border-style: initial; border-color: initial; ">F" target="_blank" style="text-decoration: none; color: #990000; outline-style: none; outline-width: initial; outline-color: initial; cursor: pointer; float: left; padding-top: 0px; padding-right: 2px; padding-bottom: 0px; padding-left: 2px; ">

New details have emerged about a secret U.S. effort to deploy shadow Internet and mobile phone systems overseas to give political dissidents a way to communicate with the world free of government censorship. The New York Times reports the project involves developing what has been described as an "Internet in a suitcase" that would allow dissidents to use “mesh network” technology to create an invisible wireless web without a centralized hub. Part of the effort is being led by Sascha Meinrath, director of the Open Technology Initiative at the New America Foundation. Meinrath described par

 
Quote    Reply

mabie       6/13/2011 8:21:34 PM
What happens when its signals are detected and location triangulated?
AHOY,
 
 
link style="font-family: verdana, arial, helvetica, sans-serif; font-size: 12px; line-height: 15px; ">

U.S. Works to Deploy Secret Internet, Mobile Phone Systems For Dissidents

New details have emerged about a secret U.S. effort to deploy shadow Internet and mobile phone systems overseas to give political dissidents a way to communicate with the world free of government censorship. The New York Times reports the project involves developing what has been described as an "Internet in a suitcase" that would allow dissidents to use “mesh network” technology to create an invisible wireless web without a centralized hub. Part of the effort is being led by Sascha Meinrath, director of the Open Technology Initiative at the New America Foundation. Meinrath described part of the project on Democracy Now! in April.

 
Sascha Meinrath, New America Foundation, Open Technology Initiative Director: “So we’ve been working on a number of technologies to develop distributed communication systems, so that you can turn cell phones, for example, into a medium that doesn’t need to go through a cell tower, a central location, but communicate in a peer-to-peer manner, directly with one another. And so, you can imagine if you daisy-chain a lot of these together, you can actually have an entire network built out of the already existing hardware that doesn’t need a central authority.”
 

 
IMO maybe they well call it "Dark Cloud". LOL
 
 
 
"I well bet my lucky star" IKYG
 
G-day!  
 
 


 
Quote    Reply

newjarheaddean    Sheephood 5   6/13/2011 10:55:32 PM
AHOY,
 
mabie, yes, electronics is not my specialty. I suppose any signal can be detected and located. Do you think one could tell if a signal was not using the towers and thus part of a so called suite case network. I mean the signal is going to hit the tower weather it needs to use it or not is it not? The daisy chain to could be quite numerous and spread out or close together i.e. multiple rooms of same hotel thus difficult to tell exactly were the people were and not just one of many cell phones serving as relays. 
 
And then there is the old tactic of asking your question by say a phone and then answering by say text messages, etc.  
 
I find it odd that this comes out during same time frame as so called middle east spring.  
 
I just thought this was worth letting people know. 
 
"I well bet my lucky star" IKYG
 
G-day!  
 
Quote    Reply

WarNerd       6/14/2011 6:49:36 AM

What happens when its signals are detected and location triangulated?
U.S. Works to Deploy Secret Internet, Mobile Phone Systems For Dissidents
New details have emerged about a secret U.S. effort to deploy shadow Internet and mobile phone systems overseas to give political dissidents a way to communicate with the world free of government censorship. The New York Times reports the project involves developing what has been described as an "Internet in a suitcase" that would allow dissidents to use “mesh network” technology to create an invisible wireless web without a centralized hub. Part of the effort is being led by Sascha Meinrath, director of the Open Technology Initiative at the New America Foundation. Meinrath described part of the project on Democracy Now! in April.
Sascha Meinrath, New America Foundation, Open Technology Initiative Director: “So we’ve been working on a number of technologies to develop distributed communication systems, so that you can turn cell phones, for example, into a medium that doesn’t need to go through a cell tower, a central location, but communicate in a peer-to-peer manner, directly with one another. And so, you can imagine if you daisy-chain a lot of these together, you can actually have an entire network built out of the already existing hardware that doesn’t need a central authority.”
 
IMO maybe they well call it "Dark Cloud". LOL
 
"I well bet my lucky star" IKYG
Because there is no central hub you need to locate and take down all the repeaters to shut the system down, and you need to do it fast enough to keep them from bringing more repeaters on line or the system can selfheal.  I think the system would be inherently vulnerable to denial-of-service style attacks however, once the authorities can gain access.
The scary part is that they think they can do this with existing COTS hardware.  I say scary because there are a lot of
people who will want to setup these systems, from terrorists hiding from the government to teenagers who don't want to pay for cell phone service (or be monitored by their parents) when texting their friends, and would set them up without regards to frequency allocation and interference (the whole reason behind the original creation of the FCC in the USA), and degrading the capacity of the regular networks, possibly to the point of collapse.
 
Quote    Reply

newjarheaddean    Sheephood 6   6/14/2011 10:16:50 AM
AHOY,
 
 WarNerd, quote; denial-of-service style attacks however, once the authorities can gain access.
 
 
The scary part is that they think they can do this with existing COTS hardware.  
 

with denial-of-service etc. you mentioned once authorities gain access. So am I correct that normally, one most answer the phone or open email or try to gain access to the internet, for such an attack to work?
 
By your use of the phase "they think" I'm assuming you mean they think they can do it without permission from the manufactures? And thus I might add IMO the Authorities are always one step ahead and there could be all kinds of built into the board ways for the manufacturers to locate and shut down COTS equipment. 
 
There very well may also be COTS periphery equipment needed too. Thus the term "suite case" network.  IMO there is also software or chip i.e. card switching.
 
And I'm glad you brought up the kids etc. Because this story leads one to think its only possible overseas.
 
 
"I well bet my lucky star" IKYG
 
G-day!  
 
 
 
Quote    Reply

WarNerd       6/14/2011 12:01:04 PM

 WarNerd, quote; denial-of-service style attacks however, once the authorities can gain access.

with denial-of-service etc. you mentioned once authorities gain access. So am I correct that normally, one most answer the phone or open email or try to gain access to the internet, for such an attack to work?
Any network, like a cell phone for example, has a handshake proceedure to gain access.  Once they know the handshake they are in.  It is like an undercover cop needing to know the password to get into a drug house to gather evidence to justify a raid.

A denial-of-service (DOS) attack is a computer network term for when you deliberately overload the network so that it no longer functions and is effectively shut down.
The scary part is that they think they can do this with existing COTS hardware.  

By your use of the phase "they think" I'm assuming you mean they think they can do it without permission from the manufactures? And thus I might add IMO the Authorities are always one step ahead and there could be all kinds of built into the board ways for the manufacturers to locate and shut down COTS equipment. 
 
There very well may also be COTS periphery equipment needed too. Thus the term "suite case" network.  IMO there is also software or chip i.e. card switching.
COTS is an acronym for Commercial Off The Shelf, which means widely available consumer items, not military or otherwise specialized.  In this case they are probably talking about iPhones, laptop computers, and routers.  The rest is probably just a software app.

It is unlikely that the manufacturers have any means to shut these down remotely. Odds are that hackers would find and exploit them if they did existed, and given the amount of this hardware is manufactured in China there has also been a huge concern that the Chinese may have put such things in for cyberwar purposes, but no one has found any yet. Even if they did exist you would still need access to the network they are part of to activate them.
And I'm glad you brought up the kids etc. Because this story leads one to think its only possible overseas.
As for the kids, I will bet you that there is already something doing just what they propose in a college dorm somewhere.  If not, then the article get them started and there should be a basic system in place by the beginning of next week, this sounds like a communications network version of Napster.  And just like Napster it will spread everywhere and overloading the existing bandwidth of the system, and slowing it down. The difference is that, since it is wireless, we cannot just build more capacity to handle the load.
 
Quote    Reply

newjarheaddean    Sheephood 7   6/14/2011 2:34:23 PM
AHOY,
 
WarNerd; quote; It is unlikely that the manufacturers have any means to shut these down remotely. Odds are that hackers would find and exploit them if they did existed, and given the amount of this hardware is manufactured in China there has also been a huge concern that the Chinese may have put such things in for cyberwar purposes, but no one has found any yet. Even if they did exist you would still need access to the network they are part of to activate them.
 

 That's some good reasoning, so IMO we may get to that true wild, wild, west internet yet.
 
As for others in collages already doing this, it is true that great minds think alike.
 
It might also have implications for increasing the range and improving the counter countermeasures for those using IEDs.
 
Maybe providing remote control for some kind of Taliban/poor-man Drones. I've been wondering why someone (anyone) dose not produce a semi or actual Autonomous kamikaze drone system.  If your not taking off or landing like the 9-11 plots had no reason to learn these things and your targeting parameters are low thus less need for sophisticated software or sensors. Or just blimps for surveillance until they run out of energy. 
 
 
"I well bet my lucky star" IKYG
 
G-day!  
 
 
 
 
Quote    Reply



 Latest
 News
 
 Most
 Read
 
 Most
 Commented
 Hot
 Topics