Category Archive: Technology

Ecocapsule: Off-grid Living Anywhere in the World

Maybe your dream is to live off the grid on a beach. The ecocapsule is a small egg-shaped low-energy home for exactly that! This is an ultra-portable housing, designed by Nice Architects based in Bratislava, is completely self-contained. This capsule can collect energy from solar panels lining the top and a wind turbine that can be attached through a connection on the roof of the capsule. It also has a rainwater collection and filtration system set up.



Ecocapsule is a low-energy house packed into a compact form. It merges an energy efficient shape, compact volume and off-grid capabilities with the luxuries of a warm bed, running water and a hot meal.



The ecocapsule home is fitted with “all essentials necessary for a comfortable prolonged stay without a need to recharge or re-supply.” It has a tiny kitchen, bathroom with a toilet and shower, and even a flushing toilet. In total, the Ecocapsule is about 86 square feet.

Ecocapsule gets all of its power from solar panels in the roof and a 750 Watt wind turbine. Both feed a 4200 Wh battery, which supplies all the necessary energy. It also has a rainwater collector that filters it for use.


Start now to make sure you are staying prepared.

Via: survivalist

Source: HigherPerspectives


Save pagePDF pageEmail pagePrint page

21 Homeschool Resources For All Ages

From our frinds at thesurvivalmom

When my parents first pulled my brother and me out of private school to educate us at home in 1994, we were on the very fringe of an often misunderstood movement. We knew only two other families who homeschooled their kids. We heard rumors that there were others, but had no way to get in touch with them. It was nearly impossible to find resources, so my mother used a lot of the same curriculum that had been used by our last school. My mother often said that she wished she had pulled us out to homeschool earlier, but she had no way of knowing where to purchase materials or curricula. Obviously this was before the internet became widely used.

The homeschooling landscape has changed a lot in the last twenty years. Negative stereotypes that hounded us in 1994 have largely been proven ridiculous. When I started homeschooling my kindergartener last year, I was up to my eyeballs in resources, many of them free. My parents spent $1000 on curricula the first year they taught us at home. In 2014 I spent less than $100.

Here’s a selection of my favorite articles and homeschool resources for all ages, and they’re all free.

Homeschool Philosophy/ Homeschool Tips

1) Avoiding Homeschool Burnout

Burnout is the #1 problem homeschoolers face, which is why I listed it as the very first link. How many of us start the year with glorious expectations of our children’s academic success, only to find, six weeks in, that we are living an unsustainable model? Read Avoiding Homeschool Burnout for tips from experienced homeschooling parents.

2) Using Netflix in Homeschool Curriculum

I confess I do not have a Netflix account, but I use YouTube in a similar fashion in my own home school. Read Homeschooling with Netflix Documentaries and Using Netflix in Our Homeschooling.

3)  “The Baby IS the Lesson

Many families homeschool for moral or religious reasons. Moral instruction is an important part of a child’s upbringing but sometimes gets lost in the busy-ness that is homeschooling. Read The Baby IS The Lesson for inspiration.

Resources for Teaching Art

4) Harrington Harmonies

The author of this blog regularly posts fun and useful art projects around a theme, perfect for younger children who love to explore.

5) Drawspace

Simple, step-by-step instruction on the more technical side of drawing. Topics include line, value, shape, perspective, and color. Some lessons are free, others require a paid subscription.Browse here for all kinds of lessons in art.

6) Metropolitan Museum of Art – books with full text

You know those giant coffee-table books with all the pictures that they sell at museums? The Metropolitain Museum of Art has published a couple hundred of these over the years, and many of them are now available as free pdf downloads. Not only a good resource for art, but history as well.

7) Google Cultural Institute

Will the wonders of Google never cease? The cultural institute is a searchable image database of museum collections from all over the world, along with item descriptions.

Resources for Teaching Literacy

8) This Reading Mama

Lots and lots of free printable worksheets and emergent readers to inspire literacy in young children. The author of This Reading Mama blog also has products for sale.

9) The Amazing-Incredible Handwriting Worksheet Maker

My kindergartner is not inspired by his handwriting workbook, which encourages him to write, “Grey Goose,” and “The band can play,” dozens of times. He is very interested, however, in writing about things that interest him, so I regularly print up worksheets for things that say, “Space Shuttle,” and “Jupiter,” and “Kuiper Belt.” This site lets you choose from print manuscript, D’nealian, and cursive handwriting fonts.

Resources for Teaching Math and Science

10) Khan Academy

What started with a guy sharing simple videos on how to do a variety of math problems has evolved into a sophisticated online system of courses on a variety of subjects. Khan Academy math classes range from elementary-level mathematics to differential equations and linear algebra. Also offered are video lectures on history, art history, science, economics, and preparation for college entrance exams. The math section is Common Core Aligned.

11) Physics Animations

Sometimes you have to see a scientific principle in action before you understand it. These short animations of physics concepts are clear and concise.

Resources for Teaching History

12) BBC’s Primary History

This BBC website includes information on a wide cross-section of time periods – colorful illustrations and clear, easy-to-read text.

For Advanced Students: Open Courseware

Open courseware is a term that describes recordings and materials from actual university courses now available for free. Subjects vary from technical fields to history and social science.

13) Yale

14) Massachusetts Institute of Technology

For Special Needs Students

15) Homeschooling with Dyslexia

Dyslexia is often misunderstood, and can really throw a wrench in one’s educational plans. Some homeschool philosophies proclaim, “reading is easy, don’t sweat it.” Ha. (As a dyslexic, myself, I ought to know!) This site, Homeschooling with Dyslexia, probably would have been nice to have when I was growing up.

16) Homeschooling Autism.

This Homeschooling Autism blog has a lot of valuable information, though it hasn’t been updated in a few months.

Free! Homeschooling Resources for All Ages

17) Homeschool Giveaways

If you are looking for a site that does all the work for you in compiling lists of free worksheets and print-out activities on nearly every subject you can think of, here it is. This site primarily provides outside links to other sites, some of which require that you sign up for their email newsletter before you can access the material.

18) Homeschool Share.

This site has hundreds of free lapbooks, for a variety of age levels. Each download includes both the activities and the research required to complete it. If you have children in the younger elementary grades, they will love these cut-and-past activities.

Still lost?

If you need to begin homeschooling immediately either by desire or necessity but still don’t know quite where to start, there are several sites that include entire online curricula from kindergarten to high school.

19) Easy Peasy All-In-One Homeschool

A complete curriculum for all subjects that can be done by a student entirely on the computer.

20) Ambleside Online

Comes with the Survival Mom Stamp of Approval.

21) Discovery K12

Another complete online curriculum.

There are as many different approaches to homeschooling as there are children to be homeschooled. When I first began our homeschool year with my kindergartner, I had a very clear, structured idea of what we would be doing. Our reality became quite different as I decided to pull from a variety of different approaches instead of following one set curriculum, choosing to follow my child’s interests in lieu of a predetermined syllabus. Having the ability to access free homeschool resources for all ages has been a definite help.

Whether you are already homeschooling, or just thinking about it, I hope this short list (because this could have been much, much longer) will be of use.

 

 

Start now to make sure you are staying prepared.

 

 

Via:  thesurvivalmom

 


Save pagePDF pageEmail pagePrint page

Use Plants To Charge Your phone – E-Kaia

 

Did you know that you can charge your phone whether you have an outlet near you or not? No, I’m not talking about lugging a battery around to keep your phone charged. I’m talking about the soil. You can use energy from plants in the soil to charge your phone or other low energy products. In Chile, three engineering students have developed a new device to charge your phone by simply plugging your the terminals of a handheld device directly into the soil. This could be a monumental change for developing countries around the world.

So many do not have electricity readily available to them like we do here in the United States. Rather than bringing the energy to those areas, this device could simply allow them to harvest the energy that is available right beneath their feet all the time.

Three engineers in Chile have invented a smartphone charger that is able to harness energy from plants in order to charge a phone, removing the need for an electrical power supply.


E-Kaia is the brainchild of Evelyn Aravena, Camila Rupcich and Carolina Guerrero, three engineering students who came up with the idea for an electricity-free smartphone charger when they were in university at the Duoc UC in Valparaíso and the Andrés Bello National University in 2009.

In the Netherlands, there is a solution called Plant-e that involves harnessing electricity from living plants, but many plants are required to create the energy needed. Instead, E-Kaia only needs one healthy plant.

A biocircuit is buried in a plant pot with a plant, with outputs leading out of the soil, and 5 volts and 600 milliamps can be harvested and converted into electrical energy without causing any damage to the plant. This amount of power can charge a smartphone in one and a half hours, according to the creators.

The portable ergonomic charging device prototype is still patent-pending, and the creators say that it is not just limited to charging phones– the technology can harvest enough electricity to charge LED lamps, fans, speakers and any type of low-power product that recharges its batteries using a USB port.

Start now to make sure you are staying prepared.

 

Via: survivalist


Save pagePDF pageEmail pagePrint page

GridCrash: Instant Chaos, Just Add Code

Guest post by By Doc Montana, a contributing author of Survival Cache and SHTFBlog

—————–

With all the recent attention about cyberterrorism flowing from the popular media’s kitchen sink approach to journalism, I thought it an appropriate time to address the very real possibility of an instantaneous GridCrash. And what makes a GridCrash so frightening is that it can happen without any warning, under a clear blue sky, in the middle of any day, and carries with it an unlimited supply of unpredictable downstream events. One second there is power and water and information. Then next second you’re Dark, Dry, and Dumb.

What Normal Is

Today’s “normal” is housed in little more than a constant stream of ones and zeros that every computer everywhere consumes at a record rate even if the source of the numbers is highly questionable.  Add to that the massive arrogance and overconfidence held by those at the top of the computing food chain and you can easily see that this recipe for disaster is already in the oven baking away on broil.  The magnitude of this threat is so mind boggling that the shear weight of the implications are paralyzing to the point of indifference.  Ladies and gentlemen, we are so far down this rabbit hole that even if it does not cave in on us through malice, it will cave in under its own weight no matter what.

Sony’s recent woes are just the tip of the proverbial iceberg, but they are also a useful wake up call to prepare for the most sudden kind of crash that produces no sound. Even worse, a crash might actually be a safer stop than what is likely to happen where we are terrorized first then we crash. The vast underestimation of North Korea’s cyber-capabilities, regardless of who is truly behind the wheel, is evidence enough to worry that this current ‘beta test’ is a dry run for all potentially malicious digital actions whether directly related or not.

Data breaches like those of Target, Home Depot, AOL, the US Government, and just about everyone else whether you were informed about it or not, are child’s play in the big picture. Got a pile of SS numbers and bank info? Well goodie for you. Lost personal data is like graffiti.  But when the keys to modern civilization’s kingdom go missing, we know it’s not a drill.

The Scary Parts

First, like identity theft the only way cyber trespassing is detected is after it happened. I can rattle off a pile of statistics, but since you are the likely recipient of  letter informing you of a data breach involving your personal information, you already know this is both real and out of control not to mention seemingly without any punishment to those who collected and then lost our data.

Second, if you heard about it, then its no longer internally contained and thus raging so far out of control that the PR nightmare and stock price drop will no longer deter the silence.

Third, the victim is at the mercy of the criminal’s word when it comes to the extent of the damage, and there is no way the criminal is going to show his complete hand. Instead, that fist full of aces will be thrown down over time and as needed. All we can do is watch and wait.

Consider North Korea’s threats. If they pulled off the biggest cyber-coup since the dawn of the microchip, then pretending their threats are idle is foolish at best.  Strange thing about N. Korea, it is so far behind in all our measures of progress that of all the places on this planet, it is the one that seems the most contradictory when it comes to cyber-crime. It’s almost as if the mild mannered owner of the local burger joint runs the biggest meth dealership west of the Mississippi.

And forth, the downstream implications of a massive and malicious cyber-takeover are literally unimaginable due to the infinite number of combinations of outcomes. The forest of fault-trees has never been logged so we have absolutely no idea how this will play out. And no doubt the sugar coated outcomes delivered to Congress have made this sound like a vote-able choice was involved somewhere.  Making matters worse is that those who are paid the big bucks to think about this stuff have won’t share much info with us peasants. Not that it will make much difference, but it would certainly help.

Remember the big push to outfit all Americans with duct tape, bottled water, and plastic sheeting?  Well, that list should have included some additional items like tax breaks for preppers, survivalist literature displays at the post office and DMV, city council meeting updates on public survival education and supply channel backups, and most importantly, a candid and honest assessment of the risks given our current infrastructure. Since we are all relying on each other to do the job right the first time, and we know that rarely happens, we should build into our GridCrash plans the fact that things will be much worse much faster than what the red three-ring binder sitting on the shelf would lead you to believe. This will not be a slow whimper into darkness. It will be an instantaneous cyber shock wave that will leave everyone with their mouth open and their ears ringing.

So take a moment right now and think Boom! It’s over.  It’s not an EMP so your car will run through the gas you have on hand. Anything not relying on the water/electric/gas/financial/communication/medical/logistics grid will continue to function for a while, but that’s only the stuff you can touch with a 10-foot pole.  The rest is gone.  Vaporized.  Or worse.

The physical world is still here and just the same as two seconds ago.  What is different is that our modern society is not only held together with ones and zeros, but so much of our collective knowledge base is kept in those weightless digits as well.  The announcement from the White House stating that the Sony data breach is a national security issue means we are officially one small step behind North Korea, and one giant leap away from being able to do anything about it.

Well of course its a national security issue. What isn’t? But this is so much different than a traditional physical threat. This current “issue” is like a diagnosis of stage 4 cancer. The time for threat is gone. That ship sailed when Sony sin’s went public. The truth is we have no idea how, where, when, exactly who, why, and the biggest question of what. Chasing hope in a crime scene is not encouraging.  So on to plan B.

Regret Will Be Expensive

Make no mistake.  This is big.  When cell phones and computers go dark, we will be shocked and confused.  When water, power and food stop flowing, we will be scared and angry.  When the bullets start flying, we will be on our own. Remember all those good intentions of forming a neighborhood network of like-minds, all those survival items sitting in your Amazon shopping cart, all those additional cans of food you were going to buy soon?  Guess what?   You blew it. Yup, you screwed the pooch. May I ask why? Not that it matters now, but I’m just curious. Did you really believe that you would have any more of head start on this then you do now? The alarms have gone off. The lights are flashing. The doors are slowly closing. And its all in the headlines.

Look in the mirror. And then fish or cut bait. If you are waiting for someone to tell you what to do, well then I will right now. Follow this simple list:

  1. Get scared.
  2. Get food.
  3. Get water.
  4. Get protection.
  5. Get a clue.

This website, shtfblog.com and Survivalcache.com are jam packed with advice, gear, perspectives, solutions, and of course clues for unfriendly times.  But none of it matters if you don’t pull your head and your family out of the sand and do something. Anything is better than nothing, and you are much smarter than the average bear since you’ve read this far.  It’s time to do some serious preparation.

Let’s, for a moment, let our imaginations run amok with near-Sci Fi scenarios of cyber-terrorism that, unbelievably, are actually already in play.  Consider for a moment what would happen if many of the cheap home wireless routers, internet TV appliances, and cheap no-name computers had malicious code baked into them at point of manufacture. Hardly a stretch. In fact there are cases where network devices were contaminated right out of the box.  The moment it was plugged in, it began its nefarious activities.  Now consider how many consumers could care less where the electronic device came from as long as its cheap or a Black Friday blowout sale.

Or how about data storage devices with on-board malicious code that automatically writes bad stuff to any media inserted into it. Or the very media (CD, DVD, USB, Etc.) that are shipped infected.  Maybe the code is dormant until a certain date, or maybe personal info is captured and sent to who knows where, never detected for years.  Even if we suddenly wanted to protect our grid, we can’t. That train left the station the moment you plugged in the cord.

Finally, imagine if a black market outpost was not full of arms dealers, but instead packed with a clean-cut suit-wearing business types selling stolen and mutated computer viruses.  When a virus, worm or operating system vulnerability is created or discovered, it could be worth millions of dollars. But unlike actual weapons made of molecules, digital weapons can be shared instantaneously all over the world, and an infinite number of perfect copies can be made from just one.  What if one AK47 could be instantly transformed into thousands or millions of AKs.  All you need is one gun and you can outfit an army. Oh, and that AK can be emailed.

Given the swift response the US made to N. Korea, I imagine that much of our current grid and network protection comes from a old-school MAD mentality rather than perfect security.  MAD, if you recall is a nuclear annihilation model where you assure the destruction of your enemy if they are so stupid to annihilate you.  Perhaps those in the top-floor offices believe that nobody is dumb enough to destroy another country’s grid because it will result in the immediate destruction of their own grid.  Hmm.  I don’t think I’ll hold my breath for that to work very much longer.  Finding a digital-suicide bomber is only a matter of time.

However, if it’s any consolation, I offer this one-time opportunity to our readers.  Should you find yourself in a GridCrash, just head Montana ward  Should you happen to stumble upon my land, I will welcome you with open arms.  You see most of the essentials of modern life are still just interesting conveniences out here in wild Montana.

 

Start now to make sure you are staying prepared.

 

 

Via: shtfblog


Save pagePDF pageEmail pagePrint page

Sony Hackers Make New Demands… This Is What Happens When You Negotiate With Terrorists

Though the U.S. government’s official position is that North Korea is to blame, it’s not clear exactly who has hacked Sony and one could argue that it is nothing more than a propaganda show designed to distract the American public from more important matters like a collapsing global economy, problems in Russia or the fact that our Congress just passed a spending bill padded with all sorts of goodies for banking behemoths.

But it has nonetheless been interesting to observe.

So much so that even the President of the United States has now gotten involved. After Sony reportedly pulled ‘The Interview’ from theater distribution earlier this week in response to threats of a “9/11-style attack” from the hacking collective that calls itself the Guardians of Peace, the President said in a press conference that Sony executives made a mistake.

“I am sympathetic to the concerns that they faced,” Obama said. “Having said all that, yes, I think they made a mistake.”

“I wish they’d spoken to me first [before canceling the release of the film],” Obama said later.

“We cannot have a society in which some dictator someplace can start imposing censorship here in the United States,” Obama said. “If somebody’s able to intimidate folks out of releasing a satirical movie, imagine what they start doing when they see a documentary they don’t like, or news reports they don’t like. Or even worse, imagine if producers and distributors and others start engaging in self-censorship because they don’t want to offend the sensibilities of someone whose sensibilities probably need to be offended.”

Indeed, that’s one statement from the President we can agree with.

Sony supposedly pulled the movie because theaters that were going to show the flick were threatened with terrorist attacks. That, of course, is an easy out for executives at the firm, because just a couple of days earlier the ‘GOP’ hackers warned Sony of a Christmas surprise. Specifically, they said that if the movie opened as scheduled they would release even more damning evidence and information against the company. In fact, they even released a massive digital file named after the CEO of Sony, Michael Lynton, and said it would be decrypted for the public if Sony didn’t back off.

Given what we saw from the previous Sony hack, Lynton must have realized that failing to heed the hackers’ warnings would be a career ender for him. So, in the interests of self preservation, Lynton jumped on board with ‘The Interview’ ban in the hopes that all of his problems would go away.

But as you might have expected, when you negotiate with terrorists, it will only lead to more demands.

Appeasement was a failed policy under Neville Chamberlain that allowed Hitler to continue to Blitzkrieg Europe, and as noted by well known Hollywood actor Rob Lowe, it is a failed policy for Sony.

In the spirit of Kim Jong Il, Un and the rest of the world’s dictators, the hackers now want all traces of the movie’s existence removed from the annals of history… or else.

“It’s very wise that you have made the decision to cancel the release of The Interview. It will be very useful for you,” CNN reports the message as reading. The email concludes, “We will ensure the security of your data unless you make additional trouble.

Unfortunately for Sony, that “trouble” includes a laundry list of perceived issues: “Now we want you never let the movie released, distributed or leaked in any form of, for instance, DVD or piracy,” the message reportedly says. It also says, “And we want everything related to the movie, including its trailers, as well as its full version down from any website hosting them immediately.

But why stop there?

Why not force all American movie companies to simply submit all of their scripts and production plans to the hacking collective for approval?

We understand Sony’s decision was based on the self preservation of its executives in this matter. But from public relations perspective the company completely fumbled the ball on this one.

They could have taken the short-term pain and went with the release of the film. The hackers would have released the emails. More than likely heads would have rolled at the executive management levels of the company. But the company would have, at the very least, been seen as an organization that is prepared to do as they said, which is to “stand behind the free expression” of the artists involved in their films.

Now they are seen by the American public as weak and spineless.

And guess what? Chances are that all that sensitive data is going to be released anyway.

This is what happens when you cave in to the demands from terrorists. Moreover, Sony just sent a clear signal to the rest of the world that American companies are more than willing to negotiate.

 

Start now to make sure you are staying prepared.

 

Via :  shtfplan


Save pagePDF pageEmail pagePrint page

Can Iran Turn Off Your Lights?

Online security company Cylance released a report last week showing that an Iranian cyber-espionage operation “Operation Cleaver” had successfully breached U.S. and foreign military, infrastructure and transportation targets. The report claimed to confirm widely-suspected Iranian hacks of the unclassified Navy Marine Core Intranet system, NMCI, in 2013. It describes (with explicitly naming) more than 50 targets around the world, including players in energy and transportation.

But is the Iranian cyber threat overblown?

The tactics detailed in the report show an escalation of Iranian hacking activity, which the report’s writers, in several instances, refer to as rapid.

“We observed the technical capabilities of the Operation Cleaver team rapidly evolve faster than any previously observed Iranian effort. As Iran’s cyber warfare capabilities continue to morph the probability of an attack that could impact the physical world at a national or global level is rapidly increasing. Their capabilities have advanced beyond simple website defacements, Distributed Denial of Service (DDoS) attacks, and Hacking Exposed style techniques,” the report states.

The Operation Cleaver team found vulnerabilities in the Search Query Language or SQL coding in various target systems and then used those SQL vulnerabilities to inject secret commands into back servers (a tactic called SQL injection). They were then able to upload new tools into the systems allowing for more data theft and access. The tools enabled the hackers to capture a wide number of administrator passwords (a technique known as credential dumping) and even log keystrokes on affected computers.

Among the targets were some 50 companies in 16 countries, representing 15 industries including “military, oil and gas, energy and utilities, transportation, hospitals, telecommunications, technology, education, aerospace, defense contractors, chemical, companies and governments.”

The report’s most dramatic assertion appears on page 5, “Iran is the New China” it declares.

But is it true?

The Not-So-New China of Cyber-Attacks

Speaking before the House Intelligence Committee last month, Vice Admiral Michael Rogers, the commander of U.S. Cyber Command, said that China and perhaps “one or two others” could effectively blackout portions of the United States. “It is a matter of when, not if, that we are going to see something dramatic.”

What does “something dramatic” look like? In a word: dark. “If I want to tell power turbines to go offline and stop generating power, you can do that,” Rogers said. “It enables you to shut down very tailored parts of our infrastructure.”

Rogers declined to mention which “one or two others” had the ability to turn off your lights, but Iran’s burgeoning cyber-capabilities occupy a growing portion of Roger’s job.

In 2013, when hackers within Iran attacked NMCI, it was Roger’s job to fix the gaps, an issue that members of the Senate Armed Services committee asked him about during his 2014 confirmation hearing. At the time, he said that NMCI was “properly architected and constructed against external cyber attacks.”

Other cyber hawks have been more eager to play up the Iranian threat. House Intelligence Committee Chairman Rep. Mike Rogers, R-Mich., speaking to The
Washington
Free Beacon
last month, noted, “We have seen some very, very devastating efforts on behalf of Iran.”

To understand what those efforts may be, it makes sense to consider the history of Iran’s cyber capabilities.

In the 2009, as the Green Movement was fomenting popular resistance the Iranian government, the formation of the “Iranian Cyber Army” marked “a concentrated effort to promote the Iranian government’s political narrative online,” according to OpenNet Initiative’s 2013 analysis of Internet Controls in Iran from 2009-2012. The Army attacked news organizations and opposition Websites within Iran with great success.

Around the same time, the pro-government Basij paramilitary organization launched the Basij Cyber Council, which recruited hackers to develop cyber attacks and spy on Iranian dissidents through malware and “phishing campaigns” where victims were lured to fake websites and tricked into surrendering information. Not long afterward, Iran’s pro-government hacker community turned its attention outward.

The most severe attack that can be linked to Iran was the 2012 “Shamoon” attack against Saudi Arabian oil company Aramco. It emerged from a shadowy group called the “Cutting Sword of Justice” and effectively took out 33,000 Aramco computers, erasing the data on the hard drives. Then-Defense Secretary Leon Panetta called it “a significant escalation of the cyber threat and they have renewed concerns about still more destructive scenarios that could unfold.” Escalation sounds troubling until you consider the baseline state from which said escalation ascends.

Here’s what Shamoon did not do: affect any of the computers that actually controlled vital mechanical processes at Aramco. It did not cause any industrial accidents and did not shut down oil production. The attack was costly, caused inconvenience on a large scale, but was not a black-out attack.

“There was nothing about Shamoon that was sophisticated. In fact, Shamoon was only 50 percent functional according to one of the labs that I spoke with,” Jeffrey Carr, CEO of the cyber-security firm Taia Global and the author of Inside Cyber Warfare: Mapping the Cyber Underworld, told Defense One.

The level of technical expertise displayed by Shamoon, and hinted at in the Cylance report, suggest that the sophistication of Iran’s cyber capabilities has not reached that of China or Russia or the United States. SQL injection hacks can be severe but are not exotic. The attacks detailed in the Cylance report also make use of a widely known security bug, the MS08-O67 flaw in Microsoft Windows.

Today Is Not Zero-Day

Cylance claims that they uncovered “only a fraction” of the systems that Operation Cleaver likely targeted. But as Dan Goodin, writing for Ars Technica, reports “there’s no evidence any zero-day vulnerabilities were exploited.” That suggests that the gaps Operation Cleaver took advantage of are fixable at relatively low cost.

So-called zero-day attacks exploit new classes of vulnerabilities in systems, vulnerabilities for which there is no effective patch. When a zero-day attack occurs, the security team has “zero” days to come up with a solution a very novel problem. Stuxnet, the worm that effectively shut down the Iranian nuclear refinement centrifuges in 2010, was a zero-day weapon and actually did succeed in shutting down vital mechanical processes outside of cyberspace.

Hackers within China are practiced at zero-day attacks, including a reported global attack against shipping interests occurring in July. That attack, while sophisticated, amounted to little more than industrial espionage, which fits with China’s modus operandi.

China vs. Iran: Differing Capabilities and Motivations

Therein lies the big difference between China and Iran as a cyber adversary. China is more capable and more focused on narrow objectives, which Cole defines as “stealing intellectual property and national secrets primarily to give itself a competitive edge in competing in the global market.”

Government officials have echoed that view. Speaking before the Senate Intelligence Committee in January, James Clapper, the Director of National Intelligence, said “China’s cyber operations reflect its leadership’s priorities of economic growth, domestic political stability, and military preparedness.” Read that to mean a likely continuance of data theft, not terrorist acts that could damage both economies.

Iran, as a cyber adversary, is both less capable and more bellicose than China. The Iranian economy, unlike China’s, is largely divorced from that of the United States. And Iran was the only nation to actually suffer a catastrophic cyber attack, for which it blames Israel and the U.S. As a result of these and other factors, Iran may have more of a will for cyber-mayhem even if it lacks the most dangerous tools.

In this way, Iran is the perfect cyber adversary for Washington’s hawks to rattle sabers against, and the rattling is becoming more frequent.

Speaking to The Hill’s Cory Bennett on Nov. 22, Rep. Rogers speculated that a breakdown in negotiations between Iran and the United States on an upcoming nuclear deal could compel Iran to attack water and oil and water systems in the United States.

“As soon they believe it’s to their advantage to begin again in more aggressive cyber activity toward the United States, they’re going to do it,” Rogers said. “It would be logical to conclude that if the talks fail completely, they’ll re-engage at the same level.”

The deadline for a deal passed—peacefully—two days later, with the parties agreeing to a seven-month extension.

“Are they the new China? At this point they haven’t shown us enough capability to overshadow the continuous attacks of various levels of sophistication from China,” Tony Cole, the global government chief technical officer for the cybersecurity group FireEye told Defense One. “They might be simply showing the world that they have a capability at this point in the cyber arena or it could be for more nefarious purposes where they plan on creating a cyber attack to have a kinetic and damaging effect in the real world. We hope it’s not the latter.”

(For a history of Iranian cyber capabilities, check out FireEye’s 2013 paper.)

 

Start now to make sure you are staying prepared.

 

Via: defenseone


Save pagePDF pageEmail pagePrint page

NSA Director Confirms: Entire U.S. Power Grid could be Shut down by Single Cyber Attack

It’s something that has been talked about for years, but up until this point nobody in the federal government would confirm it; until now.

Speaking at a House Intelligence Commute hearing, Admiral Michael Rogers, director of the National Security Agency and commander of the U.S .Cyber Command, admitted that China, and a handful of other countries currently possess the power to launch a cyber-attack that would shut down the entire U.S. power grid.

At the hearing, Rogers said U.S. adversaries are performing electronic “reconnaissance” on a regular basis so that they can be in a position to disrupt the industrial control systems that run everything from chemical facilities to water treatment plants.

“All of that leads me to believe it is only a matter of when, not if, we are going to see something dramatic,” he said.

This comes weeks after the Department of Homeland Security issued a warning that Russian hackers had successfully penetrated, and inserted malware into some of the nation’s most vital infrastructure systems.

The Malware, which experts say has the power to trigger the shutdown of vital public utilities throughout the country, was found in software used to control industrial operations like oil and gas pipelines, power transmission grids, water distribution and filtration systems, wind turbines and even some nuclear plants.

The Coming Cyber Wars that Could Shut Down Everything

The threat has actually been known for some time, this is just the first time someone at this level is actually admitting there’s a problem.

In 2013, two engineers discovered a major vulnerability in the Industrial Control Systems that control our power grid, a flaw that allows hackers to take control of the entire U.S. power grid.

During the course of testing, the engineers found they could penetrate and shutdown almost every major Industrial Control System they tested. This would give hackers direct access to control everything from our communication infrastructure, to our drinking water and our electric power grid.

The two compiled a 20-page report detailing the vulnerabilities they found for the Department of Homeland Security’s Industrial Control Systems Cyber Emergency Response Team. The report was used in a massive cyber drill that simulated the take down of the entire U.S. power grid.

Is the Obama Administration Preparing for a Coming Cyber War?

In his testimony, Rogers admitted the Obama administration was in the process of outlining our military cyber operation’s rules of engagement.

“We need to define what would be offensive, what’s an act of war,” he said.

With people like former CIA Bureau Chief Claire Lopez warning, “9 out of 10 of all Americans would be dead,” within a year after this type of attack, the threat is something we can’t afford to ignore. This country can barely manage a small-scale disaster – just look at what happened during Hurricane Sandy, or the recent Ebola Crisis – what do you think will happen if someone shuts down the entire power grid?

All Hell is going to Break Loose!

America was founded on a spirit of self-reliance and freedom, sadly somewhere along the way the country lost its way. Over the last couple of decades that spirit of self-reliance has all but faded away, replaced by a country full of takers who only exist because they constantly suck off the system.

While this may sound a little harsh, it’s the truth, and sugar coating the sad reality of the situation does nothing to help prepare us for what I believe is coming – the eventual downfall and collapse of the entire system.

Whether it’s a cyber-attack that plunges us into the abyss, or the 18 trillion dollars in debt that eventually pushes us over the edge, the need to prepare should be more than obvious at this point.

 

Start now to make sure you are staying prepared.

 

 

 

Via :   offgridsurvival


Save pagePDF pageEmail pagePrint page

Apps to help you find people during disasters and help for them

Here’s a little technology that can help during disasters. There are many more so look around.

These apps could help reduce panic and aid first responders to where someone might be located.

Apps to the rescue

There is nothing more nerve wracking than not knowing where someone important to you is during a disaster. The emergence of Twitter has provided an avenue of sorts for people to find out if someone has made it out alive. But if it is ever to the point in which loved ones, or employees in your organization, have not yet been found, these apps could help emergency personnel locate them

 


Red Panic Button

By ULTIMATE COMMUNICATION SOFTWARE


$2.99

You are required to set a panic number or mail address and the phone will send a message, which contains your address and location. It uses GPS/Network (where available on iPhone and iPad 3G) to determine your location or Wifi (on the iPod touch and iPad Wifi)

According to a few reviews, make sure to check with the company on any extra costs associated with upgrades or customizations.

 

VisionLink OEM Shelter

By VisionLink


Free

Maybe you are frantically looking everywhere for your lost loved one. This app will help you locate the disaster shelters in your area. You can view open shelters by state and also find the latest disaster information via the Red Cross Disaster Online Newsroom.

 

Disaster Alert (Pacific Disaster Center’s World Disaster Alerts)

By Pacific Disaster Center


Free

Disaster Alert provides mobile access to multi-hazard monitoring of and early warning for natural disasters around the globe. The reviews in iTunes were glowing for this app.

 

National Library of Medicine

Disaster Information Management Research Center


Free

ReUnite provides ability to upload missing and found person information for family reunification during and after disasters. It provides structured information to the National Library of Medicine’s People Locator service.

 

SirenGPS

SirenGPS


Free

SirenGPS connects everyone in a community to first responders and allows first responders to communicate with each other, all on a single platform. It allows first responders to determine the precise location of 911 callers.

 

Life 360

Life 360


Free

While Life 360 is portrayed as more of a way for families to keep in touch through their busy lifestyles, it also has the ability to connect someone who might be trapped and needs help.

 

ICE: In Case of Emergency

ICE: In Case of Emergency


$3.99

Stores important information for first responders and hospital staff to use in case of an emergency involving you:

 

https://itunes.apple.com/au/app/triple-zero-kids-challenge/id679476707?mt=8

 

Guardly Mobile Safety Apps

Guardly


Free

By launching Guardly’s safety app, it will transmit real-time GPS location and indoor location within buildings (for select enterprise customers), and provide two-way communication with private security, 911 authorities and safety groups.

 

Red Cross Mobile Apps

Download Red Cross Apps!

Red Cross mobile apps put help in your hand.

Also check out:

 

Are you prepared for anything? Here’s some links you WILL need!

 

Keeping your family safe – PLANNING FOR THE OBVIOUS

 

Plan Your Escape Routes Before Disaster Strikes

 

IT’S A DISASTER!!! Now what?

 

Would You Survive Doomsday? An Infographic from Nat Geo

 

Start now to make sure you are staying prepared.

 

 

Via :    csoonline


Save pagePDF pageEmail pagePrint page

Flying defibrillator/ambulance drone

I go back and forth on the subject of drones but wanted to share this:

—————

A Dutch student has revealed a prototype ‘ambulance drone’, a flying defibrillator able to reach heart attack victims within precious life-saving minutes.
Developed by engineering graduate Alec Momont, it can fly at speeds of up to 100 kilometres per hour (60 miles per hour). Painted in emergency services yellow and driven by six propellers, the drone can carry a four kilogramme load – in this case a defibrillator. ‘Around 800,000 people suffer a cardiac arrest in the European Union every year and only 8.0 percent survive,’ Momont, 23, said at the TU Delft University.

‘The main reason for this is the relatively long response time of emergency services of around 10 minutes, while brain death and fatalities occur with four to six minutes,’ he said.
‘The ambulance drone can get a defibrillator to a patient within a 12 square kilometre (4.6 square miles) zone within a minute, reducing the chance of survival from 8 percent to 80 percent.’
The drone tracks emergency mobile calls and uses the GPS to navigate. Once at the scene, an operator, like a paramedic, can watch, talk and instruct those helping the victim by using an on-board camera connected to a control room via a livestream webcam.

The prototype has already attracted the interest of emergency services including that of Amsterdam, the Dutch daily Algemeen Dagblad said. The Dutch Heart Foundation also applauded the idea, the newspaper added. Momont however wants his drone to become a ‘flying medical toolbox’ able to carry an oxygen mask to a person trapped in a fire or an insulin injection to a diabetes sufferer.
However, the drone is still in its infancy as far as developing its steering mechanism and legal issues regarding its use are concerned, Momont said. He said he hopes to have an operational emergency drone network across the Netherlands in five years.

The drone is expected to cost around 15,000 euros ($19,000) each. ‘I hope it will save hundreds of lives in the next five years,’ Momont said. It is essential that the right medical care is provided within the first few minutes of a cardiac arrest,’ says. ‘If we can get to an emergency scene faster we can save many lives and facilitate the recovery of many patients. ‘This especially applies to emergencies such as heart failure, drownings, traumas and respiratory problems, and it has become possible because life-saving technologies, such as a defibrillator, can now be designed small enough to be transported by a drone.

Check out St John First Aid  video on how this works.

Youtube add:

 

Start now to make sure you are staying prepared.



Save pagePDF pageEmail pagePrint page

Building Your Own Faraday Cage

A Faraday cage is an enclosed space with an outer layer that conducts electricity. The physical shape of the Faraday cage does not matter: it can be spherical, cylindrical, or a box. Either the cage itself can be made of a conductive material, or the cage can be built of a non-conductive material such as wood and then covered in a conductive material.

The conductive material can be as simple as several layers of aluminum foil, which makes constructing your own Faraday cage a fairly simple and inexpensive affair.


What are Faraday Cages Used For?
The Faraday cage is designed to guard whatever is inside of it from excessive levels of static and non-static electricity. This can be accomplished either by reflecting incoming electric fields, absorbing incoming fields, or creating opposing electrical fields.

The Faraday cage can help to protect whatever electrical equipment is contained within it from the kind of electromagnetic pulse (EMP), it’s a good practice to keep your emergency electronics such as radios and GPS devices stored in a Faraday cage so they are not incapacitated in the event of an EMP.

How Does a Faraday Cage Work?
Incoming fields are cancelled when the free electrons in the conductive material on the Faraday cage instantaneously realign themselves and block the incident electric field.

For this to work, the cage has to be made from a conductive material; otherwise, the free electrons are not sufficiently mobile to realign themselves. The layer of conductive material can itself be quite thin. This is thanks to the “skin effect,” which is a term that describes the inclination of electrical currents to move mainly on the outer layer of a conductor. Provided that the conductive layer is more than the skin depth of the material, the electrical shielding of the Faraday cage will be outstanding because there will be very high levels of absorption loss.

The skin depth is a function of the material the conductor is made of and the frequency of the incoming wave. Typically, wrapping your Faraday cage in several layers of heavy-duty aluminum foil will give you the needed skin depth to protect your electronics from high-frequency radiated fields like the kind generated by a EMP.

Building a Faraday Cage
The material you use for your Faraday cage does not have much influence on how effective the cage will be at protecting your electronics from high-frequency fields. Virtually any metal has the necessary conductivity to allow free electrons to realign and cancel out incoming electric fields.

Certain metals, are more conductive than others, which gives them a reduced skin depth – for example, at 200 MHz, silver has a skin depth of less than five microns, as compared to aluminum, which has a skin depth of 24 microns at the same frequency. But on a macro scale, that difference is negligible, which is why you can use heavy-duty aluminum foil, instead of far more expensive materials.

Your Faraday cage can have small holes in it, provided they are not too large with respect to the wavelength of the incoming electromagnetic wave. This is why you can also use fine aluminum mesh to build a larger Faraday cage. For example, a 1 GHz wave has a wavelength of 0.3 meters in space.

Generally with these kinds of mesh cages, the cage door is typically the part that causes the most leakage, but this can be fixed by taping the seams with conductive tape.

You can also use existing metal containers as Faraday cages, including metal ammunition boxes, metal garbage bins, anti-static bags, and even unused microwave ovens. Each of these has its own level of effectiveness: the main concern is that gaps and seams are minimized to reduce leakage.

You do not have to ground your Faraday cage in order to protect the electronics contained within, although doing so will help to keep the cage from becoming charged and possibly re-radiating charge, which could be dangerous if you touch it.


Large Faraday Cages
If you want to build a larger “shield room,” as engineers refer to rooms that are essentially large Faraday cages for storing electronics, you can do so by covering the inside of a small room or closet with several layers of heavy-duty aluminum foil.

Overlap all of the seams and tape them with regular cellophane tape. Cover all outlets, light switches, and other conductive breaches with aluminum foil, and do not plug anything into any outlets. Once the floor is covered in foil, place a piece of plywood over it so you do not damage it by walking on it. Such a room can store all of your emergency electronics and protect them from incoming high-frequency radiated fields.

 

Start now to make sure you are staying prepared.

 
Via: thereadystore


Save pagePDF pageEmail pagePrint page