Smile You’re on Camera

Smile for the camera

Smile for the camera


It used to be that average people were photographed for special occasions like weddings. Elaborate staging and costuming accompanied the event. This was related to the high relative cost of film and processing. We gathered the precious photos in scrapbooks which were kept in our libraries.
This all changed with the advent of digital photography. In the beginning it was not much different. The floppy disc storage media could only hold a dozen or so pictures. Not much different than a film camera expect that the result was fuzzy. However, Moore’s law marches on and we all have thousands of pictures stored in personal digital media. Most everyone has a smart phone that takes selfies.
1984 has arrived. Big Brother is watching. Smile.
Security cameras are a feature of most buildings an parking lots

Security cameras are a feature of most buildings an parking lots


Actually it did not turn out to be the government that was watching. Most of us want the security that come from monitoring. A friend of ours recovered her stolen purse using the security camera footage of the thief in the process of using her stolen credit card. This was within a hour of the theft. Most of us no longer notice the cameras.
I have also heard funny stories about attempts to hide activity by placing cups over the visible camera enclosures. Security camera technology has advanced rapidly. The large enclosures that you see are no longer needed. A plant that I know of was plagued by early shutdowns by a saboteur who liked to quit early on Fridays. Covering the big security cameras enclosures with coffee cups did not block the view of the actual cameras that were hidden up in the rafters. The dismissed temporary employee quit objecting when he was shown the pictures of him literally throwing a monkey wrench into the works.
It is easy to focus on the occasional negative example. On the positive front, a Go Pro video camera has evolved into a powerful training tool. In this era of rapid change we are constantly in a learning mode. Watching a Go Pro video made by the first person to become proficient at a task, speeds the transfer of the knowledge to the rest of the team. This is particularly effective because watching others perform a task is one of the most effective training methods. The ability to use the same video to establish industrial engineering standards without the invasive timing stopwatch is a secondary benefit.
Everyone is now able to be the photographer. The camera in our cell phone create better pictures than the Instamatic cameras of old. We are just beginning to create the apps that will unlock the usefulness of the camera in the smart phone.
Most smart phones have sophisticated cameras

Most smart phones have sophisticated cameras

Digital Key

Digital security will protect our connected devices from theft

Digital security will protect our connected
devices from theft


There has been much media attention applied to the massive hacking of various web sites to steal data. A lot less attention has been showered on the thieves that use radio receivers to capture and duplicate the electronic codes used for key-less car ignition. As a prudent strategy if you own a car that does not have a physical key, you should always avoid using the remote to lock the vehicle. This is especially true in a parking lot where it is impossible to detect whether a car thief is lurking in a nearby car. The current reality is unfortunate because our smart phones have the potential to increase security. It will take a lot more sophistication than we currently apply. We may need to delay the disabling of the device for a few days to enable a return trip home on a electric bicycle when your cell phone has died.
Electric bikes are less attractive as a theft target  if they become disabled

Electric bikes are less attractive as a theft target if they become disabled


Just like insurance has a cost, it may be necessary to subscribe to a cloud security service. Within the cloud it is possible to store unique key codes series for each device. The location capability of the cell phone system, combined with a suitable app, can create a cloud based log that records the cell phone number and when and where the device was unlocked which will enable multiple users. We will hear stories about stupid thieves who use their cell phone to activate stolen devices.
As a teenage at Halloween, we thought it was funny to do a drive-by garage door opener run. This worked because the system was based on only a few codes, and a collection of remotes would result in enough matches to be fun. If the activation codes are ever changing, there is no advantage in thieves listening in. Thieves who use a radio (or blue tooth) to obtain a code will discover that it has been changed. In the transition period, not everyone will want to use a cell phone based key. A chip key should also be included such that the device is active when it is plugged in. Obviously, the advantage of the cloud database is that it becomes possible to sell replacement keys. The cell phone based replacement can happen quickly but a physical chip based key requires delivery. We can all relate to loosing a key sometime or other.

Industrial Demilitarized Zone

Korean DMZ -picture by Lim Yeongsik search operation Korean armed forces

Korean DMZ -picture by Lim Yeongsik search operation Korean armed forces


Just like the north Koreans are continuously trying to penetrate the demilitarized zone, there are hostile elements who use the world wide web as a corridor to attack. Since many historic IoT (Internet of Things) devices have very little protection, a browser program like Shodan can crawl the web and create map of connected devices. “Shodan’s been used to find webcams with security so low that you only needed to type an IP address into your browser to peer into people’s homes, security offices, hospital operating rooms, child care centers and drug dealer operations.”Kashmir Hill September 23, 2013 issue of Forbes. The real question is what do you do to protect your castle. it takes thinking in military terms to protect yourself from attack. I am not surprised that this picture of a turnstile was taken within a communist country. Their society has a lot more military control. It is curious that they think youth hostels are where the control is needed.
PERCo Turnstile Territory of student's hotel St Petersburg by Bestar

PERCo Turnstile Territory of student’s hotel St Petersburg by Bestar


Camouflage is a great military tactic. After you progress past having wide open door to your industrial control by implementing a second 10/100 gate with a guard post, it is helpful to hide your new entrance in plain sight. In programming terms it is called spoofing. The hackers who are using programs like Shodan ignore you if you appear to be an uninteresting application. A USB to 10/100 converter costs less than US $50. The USB driver programs can be configured such that the echo seen by the search engines looks like a baby monitor for example. The only other major requirement is to invent a quick staged authentication so that a DOS (denial of service) attack does not block the legitimate users from logging onto the system.
A simple USB to 10/100 converter can be programmed as a gate keeper

A simple USB to 10/100 converter can be programmed as a gate keeper

I can picture a time in the very near future when “lights out” manufacturing is IoT enabled. Current impediments such power outages can be remotely corrected if we can trust the remote access.

Modern Moats

Herstmonceux Castle and Moat for TO6410 cc Dave Croker

Herstmonceux Castle and Moat for TO6410 cc Dave Croker


Planners who were trying to safeguard valuables back in the middle ages discovered that it takes more than fortifications to succeed. This is especially true when the fortifications have secret doors that were installed by the builder. I suspect that the fortress defenders discovered that the addition of a moat also flooded the tunnels under the walls. In this digital age, the task of defending a company’s digital fortress is daunting. The magnitude of this task will only increase as more of our foreign-built devices become internet connected.
by Stan Schneider Real Time Devices

by Stan Schneider Real Time Devices


As revelations by Edward Snowden and others have demonstrated, the fortress walls of these IoT (Internet of Things) devices come with pre-installed secret doors. This fact has not escaped the thieves that exploit these weaknesses. In much the same way that Google crawls the web looking for home pages, a search engine named Shodan crawls the web looking for the hidden back doors http://www.forbes.com/sites/kashmirhill/2013/09/04/shodan-terrifying-search-engine/. Using this search engine to help them, I am not surprised that the thieves find that some of these doors are unlocked. So how do you go about installing a moat before the thieves make off with the crown jewels? What does a modern moat look like? The first moat of the electrical age was related to the high voltage wires needed to transmit power for long distance. Nickolai Tesla working for George Westinghouse developed the high voltage power system we use today. Glass insulators kept the high voltage from shorting to ground.
Sophisticated insulators stop the loss of high voltage power

Sophisticated insulators stop the loss of high voltage power

It is very exciting when the salt we use on the road causes massive fires in the substations melting the conductors. Obviously the fuses blow, but most of us have also lost a TV, radio or computer because the high voltage finds its way into our electronics. The fragile electronics in our computer chips died regularly, until we discovered how to use light in the form of opto isolators to build a non-conducting moat around the processor.
light waves protect microprocessors from voltage spikes  by Inductiveload

light waves protect microprocessors from voltage spikes by Inductiveload


Light can also be used to protect the program running the computer from hacking and malware. Early in the development of microelectronics a type of memory called UVprom was invented. Bright ultraviolet light bathed on the chip erases the memory.
Ultraviolet light erases this chip CC by SA 2.5  ST Microelectronics M27C2568-12FI

Ultraviolet light erases this chip CC by SA 2.5 ST Microelectronics M27C2568-12FI

The convenience of the electrically erasable chip has led to its wider use. In general, it is not convenient if spyware and malware are remotely added using the electrically erasable chip to steal the crown jewels. I suspect that the vandals of the middle ages would have liked conducting their raids without ever having to leave home. I believe that we will go back to locking in the operating program. It is promising to hear that Google is unveiling their Vault micro SIM card for a mobile phones. We will all be watching to see whether it actually improves security or is just to keep out every one but Google (and the NSA by hidden deal) http://www.cnet.com/news/googles-project-vault-is-a-security-chip-disguised-as-an-micro-sd-card/ This is probably why so many users cling to Windows XP (also named Windows NT) Daily web updates to fix the bugs in incomplete operating systems are a big gap in the moat we are trying to build around our data fortress.
In the early days of computing, many of us used time sharing. The derivative virtual machine adds one more level of security but it does not protect against back doors that were embedded in the parent operating system.
Virtual Marble Machine  CC by Torley

Virtual Marble Machine CC by Torley

I like playing video games, but if I am interested in data security I will go back to build and maintaining the moat. Windows NT is very stable and bug free operating system if is isolated from the web. Thinking in military terms it is better to have a mine field between you and the theives. We have all played minesweeper.
Memory with embedded "mines" can be built into the cables that connect to the internet

Memory with embedded “mines” can be built into the cables that connect to the internet

Remote probing is a lot more difficult if only a small amount of data is availaible at one time in a two directional buffer memory and random memory addressed are mined.
Currently 40% of the cost of new vehicles is software. Companies who wish to remain in business must take building a moat against the “Great Cannon of China” more seriously