'sensory skin'-[soon cyber 'sensory skin' games]

NASA's 'sensory skin' can detect damages outside spacecraft

Deccan Chronicle - ‎1 hour ago‎
Scientists and engineers envision tiling the squares together like a quilt to make a complete sensor network. NASA scientists have developed a 'sensory skin' for spacecraft that can pick up signs of damage in real time, an innovation that could help ...
NASA Develops 'Sensory Skin' To Detect Damage Outside Spacecraft
NASA » Sensory nervous system »

5 Predictions For The Future Of Sex, Because Sex Robots Are Not Far ...

https://www.bustle.com/.../195612-5-predictions-for-the-future-of-sex-because-sex-ro...
Nov 18, 2016 - Soon, cyber-sex will feel a whole lot more like the real thing. Given how many sex toys connect to apps that can be controlled from a distance, ...

'Kissing Box' Takes Cyber Sex to a New Creepier Level | Fox News

www.foxnews.com/tech/2011/05/.../kissing-box-takes-cyber-sex-new-creepier-level.htm...
May 6, 2011 - Read more: http://www.news.com.au/technology/kissing-box-takes-cyber-sex-to-new-level/story-e6frfro0-1226049764857#ixzz1LZp6CZIr.

British Teen Corrects NASA Data Error, Receives 'Appreciation' From Space Agency

British Teen Corrects NASA Data Error, Receives 'Appreciation' From Space Agency

5 Shares
EMAIL
PRINT
COMMENTS
British Teen Corrects NASA Data Error, Receives 'Appreciation' From Space Agency
The research was part of a project which gives students across UK chance to work on data from ISS.
London:  A 17-year-old schoolboy in the UK has pointed out an error in the data recorded by NASA on the International Space Station (ISS), earning him appreciation from the US space agency.

Miles Soloman, an A-level student at Tapton school in Sheffield, contacted scientists at NASA, telling them that radiation sensors on the ISS were recording false data.

Miles said it was "pretty cool" to email NASA, adding the correction was "appreciated" by the space agency, which invited him to help analyse the problem.

Miles is studying physics, further maths and chemistry, and jumped to join the project.

The research was part of a project which gives students across the UK the chance to work on data from ISS, looking for anomalies and patterns that might lead to further discoveries.

The detectors had recorded the radiation levels on the space station. "I went straight to the bottom of the list and I went for the lowest bits of energy there were," Miles was quoted as saying by BBC News.

"We were all discussing the data but he just suddenly perked up in one of the sessions and went 'why does it say there is -1 energy here?'" said Miles's teacher and head of physics, James O'Neill.

What Miles had noticed was that when nothing hit the detector, a negative reading was being recorded. Which turned to be not convincing to Mike. As you cannot get negative energy into the detector.

So Miles and his teacher contacted NASA. NASA said it was aware of the error, but believed it was only happening once or twice a year. But Miles had found it was actually happening multiple times a day.

CIA hacking Q&A: Is your TV spying on you and your phone listening in?

The leaked documents by Wikileaks suggest the CIA has a catalogue of 'zero-day' vulnerabilities

Daniele Sgandurra | The Conversation 
CIA
CIA


WikiLeaks has released thousands of documents that appear to show how the US Central Intelligence Agency (CIA) is able to spy on smartphones, computers and other internet-connected devices. They apparently have the ability to break into any and smartphone, as well as devices running Windows, Mac OS or Linux operating systems. Though the leak doesn’t tell us how widely these techniques are used, it does highlight just how vulnerable the technology on which we increasingly rely is to security breaches.

How can the hack these devices?
The leaked documents suggest the has a catalogue of “zero-day” vulnerabilities. A software vulnerability is typically a flaw in a program that a hacker can use to undermine the security of a system and break in to control it or steal its data. Usually, vulnerabilities are reported to vendors so they can produce a software patch that will fix the flaw and to eliminate or reduce the chances of a successful attack. Those flaws that the software manufacturer doesn’t know about are called zero-day vulnerabilities (referring to the number of days the manufacturer has known about the problem).
By exploiting these zero-day vulnerabilities, the could theoretically undermine the controls of computer operating systems and smartphones. This would allow it to bypass, for example, the security of many messaging apps that are considered secure, such as WhatsApp, Telegram or Signal. It doesn’t show that these apps have had their strong encryption methods broken – instead the messages can be read directly from the operating system before being encrypted.
What can the do with these techniques?
The leaked documents also detail a highly technical catalogue of hacking tools, such as instructions for compromising Skype, Wi-Fi networks, PDF documents and commercial anti-virus programs. There are also instructions on how to steal passwords, such as those inputted into internet browsers. For example, a technique called “QuarkMatter” can insert stealthy spying software on an Apple computer by hiding it in the EFI system partition, the part of the hard drive where the startup files are kept.
The documents also report that the might be able to listen to conversations heard by the microphones in smart TVs even when the TVs appear to be switched off. But that doesn’t mean the can exploit anyone’s smart TV. The program, called “Weeping Angel”, was designed specifically for the F8000 TV. And it is entirely possible that the created this technique (and like it) just to target specific individuals. It also seems that the program can only be loaded onto a television via a software update from a So someone would have to enter your house and access your TV to be able to hack it.
But we should also note that other “Internet of Things” connected devices could be used for similar purposes, such as the Amazon Echo home assistant. The CIA has, it is claimed, even explored ways of remotely controlling and hacking into cars in order to crash them, creating a “nearly undetectable assassination”.


How serious is the issue? Many commenters have noted that some of the vulnerabilities that are shown in the catalogue are old and some of them have already been patched up. For example, the TV hack is not possible anymore in recent devices with updated firmware. But that doesn’t mean that the (or any other intelligence agency) hasn’t updated its arsenal to exploit newer vulnerabilities.
The document suggests the is willing to exploit public technology for spying and put it at further risk of hacking. If manufacturers don’t know about vulnerabilities then they can’t fix them and so they are also available for malicious hackers or other governments to exploit as well.
The US government has established the Vulnerabilities Equities Process (VEP) as a way of helping its agencies deciding whether or not to disclose or not a vulnerability. If the CIA is stockpiling a catalogue of vulnerabilities it discovers, as other agencies have previously denied doing, then it may be ignoring this protocol. There are exceptions, such as if the exploit has “a clear national security or law enforcement need”. But as we don’t know how the vulnerabilities have been exploited, it isn’t clear if they fall into this category.
It’s also not clear what other hacking activities the may be undertaking. The leak includes 8,761 documents and files, many of which haven’t yet been analysed, and there are likely more documents to come. Some documents have been redacted by editors to avoid disclosing the actual programming code for the attacks, to make it difficult to copy them.
Finally, it appears that the entire archive of disclosed toolkit consists of several hundred million lines of code (by comparison, Windows 7 is composed of 25m lines of code). So it might take some time to fully understand the extent of their hacking capabilities.


Daniele Sgandurra, Lecturer in Information Security, Royal Holloway
This article was originally published on The Conversation. Read the original article.
The Conversation