December 5, 2012
Last month, the Defense Advanced Research Project Agency (DARPA) unveiled Vetting Commodity IT Software and Firmware (VET) program. This endeavor is designed to indicate “backdoors and other hidden malicious functionality in commercial information devices, like cell phones, routers and other networked consumer devices.”
According to DARPA reports, their agency and the Department of Defense (DoD) are concerned about the reliance upon digital technology that encompasses military, governments and citizens worldwide.
As of now the Central Intelligence Agency (CIA) is able to spy on Americans through commercial devices that reside in nearly every household.
In December of 2011, the Federal Communications Commission (FCC) announced plans to transition unused over-the-air wireless bands into Super Wi-Fi. This super Wi-Fi will use low frequencies (from 470 to 698 megahertz) that have longer wavelengths and travel father; and even penetrate walls.
This super Wi-Fi transmits 15 times the data rate of a 4g LTE cellular signal used by all Androids, smartphones, and iPhones. A simple four-watt commercial transmitter could download and transmit to any device data that extends 2 or 3 miles in a dense city region and up to 40 miles in open spaces.
The majority of super Wi-Fi devices will be available in 2014, however manufacturers are installing super Wi-Fi chips in electronics currently being made as soon as next year. These integrated Wi-Fi technologies will be upgradable when the bulk of the technology is made available to the public.
An indicator of these plans can be found on the underside of any electronic device in your home. Even on the underside of a simple calculator, toaster oven, and even your refrigerator; you will find the following:
This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation.
What this disclaimer means is that this device is not allowed to jam or block any signals and must accept any incoming signal given (by FCC regulations under Part 15 of the FCC Rules).
The happening became obvious with the iPhone 4s. These phones were turned on remotely, capturing video, audio and recording calls with the simple app that anyone can download.
There was a major lawsuit that resulted from these activities. An estranged husband was able to remotely turn on his wife’s iPhone 4s and record audio and video of his wife’s extra-marital affair. The husband was able to use this as evidence in his divorce hearings against his wife.
The CIA has been accessing this technology since the release of the Android.
In Australia, private data is regularly under surveillance by law enforcement and Australian governmental agencies without a warrant. The digital information gathered includes:
• Phone calls inbound and outbound
• Internet account login and password
As this practice is being reported in local media, the Australian government is clamoring for more totalitarian Big Brother surveillance; setting up foundation for a complete “surveillance state.”
The DoD is concerned about technological devices with components built in foreign nations with regard to digital security.
The US House Intelligence Committee (USHIC) is warning American corporations in a new report against conducting business with 2 Chinese firms because of national security threats. Both Huawei Technologies and ZTE, two of the world’s largest telecommunications corporations and suppliers of cellular phones and technology are being highlighted by the US government and blamed for cyber-attacks. It is also claimed by the USHIC that they are involved in digital espionage.
Huawei was founded by a former Chinese military engineer and has quickly risen to be the most profitable supplier of telecommunications gear. The ZTE Corporation is the largest manufacturer of mobile phones.
According to the report, “China has the means, opportunity, and motive to use telecommunications companies for malicious purposes. . . . The investigation concludes that the risks associated with Huawei’s and ZTE’s provision of equipment to U.S. critical infrastructure could undermine core U.S. national-security interests.”
It is claimed that former industry insiders provided intelligence to the US concerning Huawei’s violations of US laws such as immigration, bribery and corruption as well as an alleged “pattern and practice” using pirated software in its US satellites.
It was cited in the report that the Chinese corporations were employing intelligence sources as well as private sector companies and other unnamed entities that could and assumedly did steal trade secrets, sensitive information and prehistory data while simultaneously shipped infected hard ware and software to the US with the intent to cause disruptions in national security during war time.
DARPA and the DoD are hosting another “Proposer’s Day” this month. At their last Proposer’s Day, the goal was for the advancement of hypersonic technologies through the Integrated Hypersonic (IH) program. There was a need for global-range, maneuverable, hypersonic flight technology that could be integrated into space missions as well as having military applications. DARPA has active solicitations for “executive summaries, white papers and proposals for advanced research and development.”