Category Archives: Hardware

Cybernetic Prostheses in the Star Wars Universe


Luke’s missing hand is supposed to foreshadow that he is becoming more like Vader, and as the new trailer demonstrates, Luke is destined to eventually succumb to the dark side of the force.

Modern prosthesis in the real world are becoming more functional, including the ability to control movement of prosthetic limbs through brainwave reading technology, and in some cases directly attaching electronics to nerve tissue. These movement-controlling features are one way, with the brain signals ordering a machine to following commands properly.

Just around the corner from now, prosthesis will be able to send signals back to the brain, allowing the user to experience a sense of touch in their artificial limb. When this technology becomes available, the brain will actually be communicating with an artificial limb, an external piece of machinery that can influence the brain and create false impressions in specific areas of the mind.

The Star Wars movies don’t always explain how their technology works but there is an obvious symbolic pattern. When characters in Star Wars get an artificial limb, it works better than anything we have in the real world, today. It looks like a real hand, blending seamlessly with the humanoid it’s attached to. Most importantly, it can feel, even feel pain when a robotic tool pokes his fingers to test the tactile sensitivity.

Luke’s new hand can receive signals from his brain but it can also send signals back into his brain. Symbolically, this is the beginning of Luke’s long journey to the dark side. Luke is becoming more like his father in more than one way.

When this thought initially struck me, I went so far as to speculate that maybe the dark side of the force lives within the machinery, the computerized components of the Star Wars universe’s technology. There are some other examples of the light side of the force helping Luke aim photon torpedoes in order to blow up the original Death Star, which he did by specifically abandoning the computerized guidance system.

The flaw in this theory is this: The Emperor is the only character who can use the dark side of the force besides Darth Vader, when the original Trilogy, A New Hope, Empire Strikes Back, and Return of the Jedi were made. The Emperor doesn’t seem to have prostheses.

Back in our world it’s a dangerous precedent to associate cybernetics with evil, as workable prostheses become more likely to happen and a superstition associated with artificial limbs could become a form of bigotry against the disabled people who use prostheses. While no one wants to create a false worry, making a fully tactile prosthetic hand would actually involve manipulating the brain and indeed the mind itself.

Read more about artificial limbs with Biomimicry and the Search for New Tech

Jonathan Howard
Jonathan is a freelance writer living in Brooklyn, NY

biomimicry and the search for new tech


Biomimicry is the study of nature as inspiration for human designs in effort to fit  human technology into a more efficient and workable, sustainable model. Each organism alive today has the potential to teach humankind about the systems and rules it follows. Natural solutions aren’t just about having better materials.

They are about making products that might empower mankind against dwindling resources. Ecosystems aren’t just where we all live and consume resources but they are a resource of information as well. The ecosystem is self-replenishing and efficient and can be channeled and worked with in a way that has yet to be attempted. Potential new materials come with  side effects that warrant equal consideration. Biomimicry is a paradigm that fits many emerging techs. Take a look at spider venom’s effect on the drug industry, for example:

A peptide found in spider venom might lead to a safer class of painkillers. What other drugs, chemicals and designs are being inspired by biology and newly-studied species?

Biomimicry is a relatively young term, describing designs that derive inspiration by emulation of designs found in nature. The movement is focused on sustainable human endeavors and projects that will compliment the environment humans share with the rest of the natural world and thus better humanity’s chance for survival. Check out this video, the most recent by Janine Benyus, one of the idea’s most vocal proponents.

You might wonder why these chemicals are found in nature at all? There are many functions and motivations behind the diverse, unfound substances found in the Eco-system. Plants develop poison to discourage predators. some develop drugs to encourage other species to assist with seed dispersal. Evolution has provided the earth with highly diversified species of plants fungi and animals the vast majority of which have yet to be explored.

French researchers discovered a painkiller as powerful as morphine in the venom of e infamous African black mamba snake. Then there is a potential psoriasis treatment derived from the venom of the Caribbean sun anemone, undergoing testing in the U.S. might help sufferers with psoriasis, autoimmune disorders, multiple sclerosis and rheumatoid arthritis.gecko

Textures and surface patterns of geckos have been studied for stickiness. Skin textures of some animals have been proven to possess antimicrobial properties, in that bacterial colonies can’t find a way to attach to surfaces, making water currents and frequent rinsing enough to eliminate infective agents.

Artificial limb design and development has been greatly advanced by designs mimicking the weight-bearing capacity of other animals. New technologies are being developed to grant disabled people the ability to feel touch, as the natural mechanisms controlling pain, touch and movement are further understood.

 

In recent biomimetic news, we may see a mastery of understanding the human eye lead to a leap in ocular and immersive tech. MHOX is an Italian design firm who would like  synthetic replacement eyes.EYE to become an affordable, regular upgrade people opt for. Their work could restore sight to the blind and be the missing link to allow locative tech and a lot of web 2.0 concepts to become workable mainstream realities.

There is an initial shock in some people when these concepts are explained. Something about the current trends over the last few decades favoring straight, clean lines that are inspired by lifeless geometry over bio-inspired,  flowing shapes.

The drugs and prosthetics discussed, theorized and predicted in the biomimetics industries doesn’t have to turn humans into cyborgs, although some proponents wouldn’t be against that. It is likely that the public will be more inclined to accept these advancements as they are developed. Decades back people might have been less receptive to plastic hip replacements and artificial hearts, but the medical community has become very good at installing these prosthetics as minimally invasive, outpatient procedures.

 

Jonathan Howard
Jonathan is a freelance writer living in Brooklyn, NY

The future of Auto Theft


We live in a time where auto theft is incredibly impractical. Criminals in 2015 struggle to figure out how to get past electronic security and alarm systems,  reflecting an over 90% drop in NYC auto theft since the early 90’s. These days, even a successfully stolen vehicle can be recovered with GPS tracking and incidences of theft are often caught on video.

It might seem like convenience is weakness but since car theft is way down,  this might not hold true at the moment. The security holes that seem most vulnerable to exploitation revolve around a key fob. Fobs are those small black electronic keys that everyone uses to unlock their car these days.  They work by using A pre-determined electronic signal that must be authenticated by the CAN system. If the authentication checks out, the doors unlock. In newer cars, the engine will start via push button if the fob is in the immediate vicinity of the car so the driver doesn’t have to fish them out of her pocket.

Etymology of the word fob:  Written evidence of the word's usage has been traced to 1888. Almost no one uses a pocket watch these days but a fob was originally an ornament attached to a pocket watch chain. The word hung around as an ocassional, outdated way to refer to key chains. In the 80's, the consumer market was introduced to devices that allowed a car to be unlocked or started remotely. The small electronic device was easily attached to the conventional set of carkeys, and within a few years the term fob key was generally used to describe any electronic key entry system that stored a code in a device, including hotel keycards as well as the remote car unlocking device usually described by the word.
Let’s take a look at three ways a fob key can be hacked.

Recording FOB signals for replay. This is one of those urban legends that’s been around since at least 2008. The story goes: thieves record the key fob signal and can later replay it with a dummy fob. The car can’t tell the difference and unlocks/starts as if the correct key fob has been used. It’s easy for the thief to control the schedule and catch the victim unawares because it doesn’t have to interact with the fob in real time. Sounds like the most effective way to hack a key fob, right? Problem is, each signal is unique, created with an algorithm than includes time. If the devices are not synchronized the fob can’t open the lock. A recorded signal played back wouldn’t open the lock. The conventional wisdom is that the devices, proprietary knowledge and experience needed to make this method work are not worth a stolen car’s worth of risk. Secrets leak but honestly, a team organized enough to steal a car this way would be able to use the same skills to make a lot more money legally. Lastly, if you could reverse engineer and record fob signals the FBI would already be watching you. The demographic that used to steal cars in the 90’s were largely  not like the fast and furious franchise.  The idea that a huge tech security op could be thwarted isn’t necessarily far fetched but there are no recorded cases. Not one. For that to change, someone needs to figure out how the sync code is incorporated into the algorithm and apparently no one has.

Amplifying FOB signal to trigger auto unlock feature. Not only is this method genius but it is rumored to be already in use. Eyewitnesses claim to have seen this in use and it sparked theories about the methodology. Unlike recording a signal, amplification is a lot cheaper and requires almost no proprietary knowledge of the code to pull off. It works like this: A device picks up a range of frequencies that the key fob is giving off and increases the range. Some cars feature the ability to sense the authentic key fob in a five foot range and auto-unlock or autostart their ignitions. With a signal amp, the engine can theoretically be started if the real key fob is within 30 feet. So, the keys can be on your nightstand but the car thinks you are at the car door. The thief can then open the door, sit in the drivers seat and the ignition can be pushbutton triggered as if the key fob was in the car with the thief. I thought about repeating some of the anecdotes I found online about this method but none of them are confirmed. No one has tested it but it looks like a signal booster can be bought online for pretty cheap if you know what to buy($17 – $300). Last week, NYT ran a piece about signal boosting. You can read that here.

Random signal generator. So unique frequency codes means you can’t record  the signal and reuse it without a proprietary algorithm but signal amplification might not work on some systems in the near future. The rumors of it working successfully already have car companies working on a sensitive enough receiver that it would be sensitive to distortion and interference caused by the amp. But there are exceptions, where the signal is not random, such as a service codes. Manufacturers have overriding unlock codes and reset devices to assist with lost key fobs and maintenance/emergency cases. When these codes are leaked, they often open up a brief but large hole in security, during which thousands of cars can be swiped. The main reason it isn’t happening already is more about organized crime not being organized enough to plan and exploit that security hole. Or, you know, maybe the codes just haven’t leaked yet.

Hardware construction.

hackrfConstructing the hardware components needed takes specialized knowledge of hardware. Searching for information about this stuff if bound to attract NSA attention when followed by parts being ordered. The kind of guy who likes to sit in a workshop ordering parts and tinkering all day isn’t always the one who wants to go out and take risks with newer, higher-end cars. That is the kind of multifaceted thief NYC was famous for back before the numbers plunged in the 90’s but the hardware is becoming more and more esoteric. People are not as apt to work on devices that have such small parts on projects that run with such high risk. For that reason, there is more money to be made in producing a bunch of low-cost black market devices that are already calibrated and tested to work. Buying this device on the street and using it before selling it off again might leave a smaller trail than building it in a sketchy apartment-turned-lab that is sure to be searched if a heist goes wrong.

Paper trail & identity theft.

Technology has made it really difficult to even take the car int he first place but once you have a stolen car they are almost impossible to get rid of these days. There can be multiple tracking devices and serial number locations in one car and if the operation isn’t extremely current, the likelihood of the car being found in red hands goes up quickly.

Once the car is stolen, a tech-savvy thief would need special equipment to access the on-board computer and do things like disable the GPS system, take any additional tracking system offline, and disable tech support from manipulating the vehicle’s electronics. Equipment to hack the car’s CAN system has been expensive and shrouded in mystery for the last couple decades but in recent days the internet has united hackers and security researchers to create custom hardware like CANtact Device Lets you Hack a Car’s CPU for $60. 

 

Jonathan Howard
Jonathan is a freelance writer living in Brooklyn, NY

Revisiting the Death of Michael Hastings


Could emerging tech present new forensics in the suspicious early demise of controversial Rolling Stone reporter, Michael Hastings? How cheaper hardware and open-sourced coding could shed new light on a murder as the possibility of remotely hacking today’s cars gains traction.

Hacking your car might already be possible. This tweet by NYT tech writer, Nick Bilton, is a great example:

Weeks back, I wrote a short piece about CANtact, a $60 device that enables you  to interface with a car’s onboard computer through your laptop’s USB port. Eric Evenchick presented CANtact at Black Hat Asia 2015 security conference in Singapore. The onboard CPU of a motor-vehicle is called the CAN, for Controller Area Network. Evenchick hopes his device’s affordability will spur programmers to reverse engineer the firmware and proprietary languages various CAN systems use.

Read more about CANtact: CANtact Device Lets you Hack a Car’s CPU for $60

I got feedback on the CANtact story about a seemingly unrelated topic: The Death of Michael Hastings. Hastings was Rolling Stone and Buzzfeed contributor who became very vocal about the surveillance state when the  U.S. Department of Justice started investigating reporters in 2013. Hastings coined the term “war on journalism” when the Obama Administration sanctioned limitations on journalists ability to report when the White House considered it a security risk. Buzzfeed ran his last story, “Why Democrats Love to Spy On Americans”, June 7, 2013. Hastings is considered suspicious by many Americans after he died in an explosive, high -speed automobile accident, June 18, 2013, in Los Angeles, CA.

Check out one of the last interviews with Michael Hastings and scroll down for a description of the oft repeated conspiracy theory surrounding his untimely death.

The Michael Hastings Conspiracy Theory:

Unlike a lot of post-millennium conspiracy theories, which usually start online, this one actually began on television. Reporters were already contentious about the limitations the Obama admin. were attempting to impose and it seemed like extremely suspicious timing that one of the leaders of the criticism against censorship was suddenly killed. The internet ran with it and some Americans considered the crash as suspicious at the time. Public opinion is often without the merit of hard evidence, though, and this case was no different. Not everyone considered the media coverage unbiased, considering the political stake journalists had in the issue.

The first solid argument that Hasting didn’t die by accident came from Richard A. Clarke, a former U.S. National Coordinator for Security, Infrastructure Protection, and Counter-terrorism(what a title~!), who called the crash “consistent with a car cyber attack”. The conspiracy theory gestating around water coolers and message boards was truly born when Clarke went public with this outright accusation:

“There is reason to believe that intelligence agencies for major powers—including the United States—know how to remotely seize control of a car. So if there were a cyber attack on [Hastings’] car—and I’m not saying there was, I think whoever did it would probably get away with it.”

Next, WikiLeaks announced that Hastings reached out to a Wikileaks lawyer Jennifer Robinson only a few hours before the crash.

Army Staff Sergent Joe Biggs came forward with an email he thought might help in a murder investigation. The email was CCed to a few of Hastings’ colleagues, stating he was “onto a big story” and planned to “go off the radar”. Perhaps the most incriminating detail is that he warned the addressees of this email to expect a visit from the FBI. The FBI denied Hastings was being investigated in a formal press release.

LA Weekly admitted Hastings was preparing a new installment of what had been an ongoing story involving the CIA. Hastings’ wife, Elise Jordan, confirmed he had been working on a story profiling CIA Director John O. Brennan.

 

The case against foul play:

I have to admit, I got sucked in for a second but Cosmoso is a science blog and I personally believe an important part of science is to maintain rational skepticism. The details I listed above are the undisputed facts. You can research online and verify them. It might seem really likely that Hastings was onto something and silenced by some sort of foul play leading to a car accident but there is no hard evidence, no smoking gun, no suspects and nothing really proving he was a victim of murder.

The rumor online has always been that there are suspicious aspects to the explosion. Cars don’t always explode when they crash but Frank Markus director of Motor Trend said the ensuing fire after the crash was consistent with most high-speed car crashes. The usual conspiracy theorist reaction is to suspect this kind of testimony to have some advantage or involvement thus “proving” it biased. It’s pretty difficult to do that in the case of Frank Markus, who just directs a magazine and website about cars.

Hastings’ own family doesn’t seem to think the death was suspicious. His brother, Jonathan, later revealed Michael seemed “manic” in the days leading up to the crash. Elise Jordan, his wife told the press it was “just a really tragic accident”

A host of The Young Turks who was close with Hastings once said Hastings’ friends had noticed he was agitated and tense. Michael often complained that he was being followed and watched. It’s easy to dismiss the conspiracy theory when you consider it may have stemmed from the line of work he chose.

Maybe the government conspiracy angle is red herring.

Reporting on the FBI, the Military, the Whitehouse, or the CIA are what reporters do. People did it before and since. Those government organizations have accountability in ways that would make an assassination pretty unlikely.

If it wasn’t the government who would have wanted to kill Hastings?

A lot of people, it turns out. Hastings had publicly confirmed he received several death-threats after his infamous Rolling Stone article criticizing and exposing General McChrystal. Considering the United States long history of reactionary violence an alternate theory is that military personnel performed an unsanctioned hit on Hastings during a time when many right wing Americans considered the journalist unpatriotic.

Here’s where the tech comes into play:

Hastings had told USA Today his car had recently been “tampered with”, without any real explanation of what that means but most people in 2013 would assume it means physical tampering with the brakes or planting a bug. In any case he said he was scared and planned to leave town.

Now it’s only two years later, and people are starting to see how a little bit of inside knowledge of how the CAN computer works in a modern vehicle can be used to do some serious harm. We might never know if this was a murder, an assassination or an accident but hacking a car remotely seemed like a joke at the time; two years later no one is laughing.

Jonathan Howard
Jonathan is a freelance writer living in Brooklyn, NY