It looks like you're using an Ad Blocker.

Please white-list or disable AboveTopSecret.com in your ad-blocking tool.

Thank you.

 

Some features of ATS will be disabled while you continue to use an ad-blocker.

 

NEW PRIVACY MENACE: Your Touch Screen Display is NOW a MICROPHONE!

page: 4
5
<< 1  2  3    5  6 >>

log in

join
share:
(post by StargateSG7 removed for a serious terms and conditions violation)

posted on Mar, 29 2016 @ 08:47 PM
link   
a reply to: StargateSG7

I got a question for you.

Let's say this thing is real. How exactly would anything being talked about in front of a touch screen monitor be transmitted?

Would it be through the computer the screen is connected to? If that's the case then how do they get around firewalls, antivirus software, the thing not being on the internet?

Same with a mobile phone. There would need to be software on there as hardware does nothing without coding. If you're going to go through all the trouble of putting extra chips in phones and having software decode the electrical energy into sound waves on the other end, would it not be easier just to put malware on the phone to set it to record from the microphone?

That's where the whole thing falls apart. The idea is over kill. Why have extra hardware, software (on both ends) and special decoding when all you would need is a small bit of malware to record and send through instant delete text or transmit to a secure phone number which records on the other end?



posted on Mar, 29 2016 @ 08:53 PM
link   

originally posted by: BuzzyWigs
a reply to: StargateSG7

Sincere question: Are you just copying and pasting some website's content?
Seems pretty 'third-generation-xerox' type stuff.

Not even trying to write original thoughts?

Strange formatting for a human actually typing on a forum.


...uhmmmm NO! I write my own stuff....BUT I DO HAVE
access to impressive documentation and trusted sources
who truly are recognized SUBJECT MATTER EXPERTS in
their fields.

My text formatting is DESIGNED to obfuscate certain
things but STILL INFORM YOU which is why I link to
patents and other websites or documents which,
IF YOU ACTUALLY TAKE THE TIME TO READ,
in a round-about manner tend to support
and/or confirm my assertions....!!!!



posted on Mar, 29 2016 @ 08:55 PM
link   

originally posted by: StargateSG7

originally posted by: BuzzyWigs
a reply to: StargateSG7

Sincere question: Are you just copying and pasting some website's content?
Seems pretty 'third-generation-xerox' type stuff.

Not even trying to write original thoughts?

Strange formatting for a human actually typing on a forum.


...uhmmmm NO! I write my own stuff....BUT I DO HAVE
access to impressive documentation and trusted sources
who truly are recognized SUBJECT MATTER EXPERTS in
their fields.

My text formatting is DESIGNED to obfuscate certain
things but STILL INFORM YOU which is why I link to
patents and other websites or documents which,
IF YOU ACTUALLY TAKE THE TIME TO READ,
in a round-about manner tend to support
and/or confirm my assertions....!!!!



Actually they don't as they have NOTHING to do with what you stated in your op.

It would be like me saying oranges are bad for you and linking to sites showing how apples are bad for you.



posted on Mar, 29 2016 @ 09:00 PM
link   
a reply to: StargateSG7


..uhmmmm NO! I write my own stuff....BUT I DO HAVE
access to impressive documentation and trusted sources
who truly are recognized SUBJECT MATTER EXPERTS in
their fields.


Okay - I'll take you at your word. So, why are you risking your own integrity by telling us, a bunch of anonymous conspiracy theory site frequenters? What do you think that will accomplish?

Why don't you publicly blow the whistle if you are so privy to such sensitive stuff? Be Assange! Be Snowden! GET YOUR DUE!!! Expose this stuff on live network tv - tell the world!!!!

You GO!!! DO IT!!!


Automated Electromechanical PIN Cracking: R2B2 and C3BO


"R2B2 and C3BO"? Really? Lame. Sorry, not buying it.



posted on Mar, 29 2016 @ 09:09 PM
link   

originally posted by: TerryDon79
a reply to: StargateSG7

I got a question for you.

Let's say this thing is real. How exactly would anything being talked about in front of a touch screen monitor be transmitted?

Would it be through the computer the screen is connected to? If that's the case then how do they get around firewalls, antivirus software, the thing not being on the internet?

Same with a mobile phone. There would need to be software on there as hardware does nothing without coding. If you're going to go through all the trouble of putting extra chips in phones and having software decode the electrical energy into sound waves on the other end, would it not be easier just to put malware on the phone to set it to record from the microphone?

That's where the whole thing falls apart. The idea is over kill. Why have extra hardware, software (on both ends) and special decoding when all you would need is a small bit of malware to record and send through instant delete text or transmit to a secure phone number which records on the other end?



---


I will use an anecdote from the 1980's era Spy-on the Soviet Union
Cold War Days (Ronald Reagan years) where Caspar Weinberger
(DefSec at the time) ordered a number of things including the
installation of Adlib-type sound cards be shipped to "Special Buyers"
in the Soviet Union that would be installed with "fixed" chips into
various offices at the Kremlin and other agencies.

These computers would tend to be left on all day
and overnight and would be directed to record
audio data (via voice detection) to onboard
storage at extreme compression ratios.

Later on, office cleaners, compromised personnel
or contractors having "fixed" cleaning or special repair
gear that they didn't know about would work in these
offices and these sound cards would hear a special
high frequency beep which would trigger an acoustic
based data transfer (high frequency air-gap audio
communications) which would transfer a few
hundreds of bytes at a time and over long time period
make up a full audio file which the CIA/NSA/DIA
would intercept and create actionable intelligence from.

---

In the case of the technology I AM TALKING ABOUT this
is purely an intelligence community play....many agencies
AROUND THE WORLD use everything from Air Gap Hi-Freq
audio communications to acoustic imaging to audio waveform
re-construction to EM signals intercept to gain INFORMATION.

IN MANY CASES the tools are EMBEDDED into CONSUMER PRODUCTS
which are tracked, shipped to and then installed in sensitive locations.
(you should see the room where the CIA/NSA modifies consumer routers and switches!)

AND since malware is SPECIFICALLY CHECKED FOR these days
at goverment and commercial levels, you need to take another
route by MODIFYING or ADDING TO general everyday hardware
products and systems so as to get the intelligence needed
by any given agency!

Coding for the BIOSes and Microcode is done at various levels
and can be installed AT THE FACTORY or afterwards during
a shipment intercept.
edit on 2016/3/29 by StargateSG7 because: sp



posted on Mar, 29 2016 @ 09:09 PM
link   
a reply to: StargateSG7

Buy a phone case. Problem solved.



posted on Mar, 29 2016 @ 09:10 PM
link   

originally posted by: BuzzyWigs
a reply to: StargateSG7


..uhmmmm NO! I write my own stuff....BUT I DO HAVE
access to impressive documentation and trusted sources
who truly are recognized SUBJECT MATTER EXPERTS in
their fields.


Okay - I'll take you at your word. So, why are you risking your own integrity by telling us, a bunch of anonymous conspiracy theory site frequenters? What do you think that will accomplish?

Why don't you publicly blow the whistle if you are so privy to such sensitive stuff? Be Assange! Be Snowden! GET YOUR DUE!!! Expose this stuff on live network tv - tell the world!!!!

You GO!!! DO IT!!!


Automated Electromechanical PIN Cracking: R2B2 and C3BO


"R2B2 and C3BO"? Really? Lame. Sorry, not buying it.





DOES THIS WORK FOR YA!!!!!



Automated Electromechanical PIN Cracking: R2B2 and C3BO

Password and PIN systems are often encountered on mobile devices. A software approach to cracking these systems is often the simplest, but in some cases a pen tester or forensic investigator may have no better option than to start pushing buttons.

Robotic Reconfigurable Button Basher (R2B2) is a robot designed to manually brute force PINs or other passwords via manual entry. R2B2 can operate on touch screens or physical buttons. R2B2 can also handle more esoteric lockscreen types such as pattern tracing. R2B2 can crack a stock Android 4 digit PIN exhaustively in 20 hours. Times for other devices vary depending on lockout policies and related defenses.

Capacitive Cartesian Coordinate Bruteforceing Overlay (C3BO) is a combination of electronics designed to electrically simulate touches on a capacitive touch screen device. C3BO has no moving parts and can work faster than R2B2 in some circumstances.

Both tools are built with open source software. Parts lists, detailed build instructions, and STL files for 3d printed parts will be available for download.

R2B2 and C3BO will be running against live devices at the kiosk!


---

That was demoed at a Black Hat conference IT IS VERY REAL !!!!

----

I have no NEED to whistleblow ANYTHING !!!

I am reasonably well-known in the Intelligence Community.
And while MANY TIMES said agencies tend to dismiss me
as being a mere crackpot BS'er, I sometimes have USEFUL
information for them when they find time to monitor me.
So on an absolute basis, they know EXACTLY WHERE to find
and call me and ALSO many times my information source
reveals are done BY DESIGN!

And NOTHING so far revealed is of a truly secret nature
since the basic research is all publicly funded and fully
available for those who look!


In this case howver, while the research and documents
are reasonably non-secret, the personnel involved have
certain personal and commercial interest they wish to
keep confidential at the public level while at the agency
level they are already well known and generally inconsequential.

...

Now if you want me to reveal the full contents of
"The Secret Patents List" .... Then we'll have to kill ya!

edit on 2016/3/29 by StargateSG7 because: sp

edit on 2016/3/29 by StargateSG7 because: sp

edit on 2016/3/29 by StargateSG7 because: sp



posted on Mar, 29 2016 @ 09:12 PM
link   
a reply to: StargateSG7

Source it, please. Provide a link.

Thanks for your efforts to help us, but unfortunately your information is a bit sketchy and suspect.


I'm sure you are sincere in trying to help, though.
Have a good night.



edit on 3/29/2016 by BuzzyWigs because: (no reason given)



posted on Mar, 29 2016 @ 09:16 PM
link   
a reply to: StargateSG7

And you think this hardware runs by itself without and software?

Not gonna happen.

If I have a bunch of circuit boards sitting there, they're not doing anything until I code them.

To transmit the data it would need to be done through either a phone connection or internet connection. An airlocked system has neither so this would be redundant in that case.

Again, malware/virus would be the easiest approach. If you think otherwise, let me just point to stuxnet.



posted on Mar, 29 2016 @ 09:36 PM
link   

originally posted by: TerryDon79
a reply to: StargateSG7

And you think this hardware runs by itself without and software?

Not gonna happen.

If I have a bunch of circuit boards sitting there, they're not doing anything until I code them.

To transmit the data it would need to be done through either a phone connection or internet connection. An airlocked system has neither so this would be redundant in that case.

Again, malware/virus would be the easiest approach. If you think otherwise, let me just point to stuxnet.



Stuxnet and Flame were NSA/Israeli created virus/trojans/worms
that YES are effective...BUT... in certain cases the systems and
personnel where actionable intelligence is located MAY BE truly
remote or otherwise protected at a very high level and therefore
OTHER MEANS are needed to steal information.

...using an example.. in my case, various people KEEP trying
to get into my computing systems...EVERY SINGLE DAY !!!!
Worms, Viruses, Trojans, even MS-Windows Updates!
All of it has been tried but they only get my DAILY work
activities because my GOOD STUFF is NOT stored on
a NORMAL COMPUTING SYSTEM !!!!!! They will NEVER
get into it...even IF they try to use a Telus phone
contractor to put in an intercept on the fibre lines! ;-)

No MATTER WHAT METHOD TEHY USE they will NOT
get my super-super-duper-secret stuff! EVER !!!!!
So said agencies and general criminals need to
use a different tack on me which means trying a
more personally-directed consumer products hack!

So if certain agencies can't use general worms and viruses,
they try other attacks! (Lotsa Benjamin Franklins and
Double-D's will work wonders on me! ;-) :-)

There is a saying in German relating to cars
which I have translated into English:

Why make it simple, when the complex also works!

So YUP some people LIKE taking the long hard road to get something!

Don't Assume OCCAM'S RAZOR is valid here !!!

edit on 2016/3/29 by StargateSG7 because: sp



posted on Mar, 30 2016 @ 06:55 AM
link   

originally posted by: StargateSG7
As per your own screen name...my DUTY
on ATS is to absolutely get YOU HYPED and
with my media training that means bait-click
like HEADLINE WRITING !!!


Are you doing a study on how media can be used to persuade people on an invalid argument by any chance?
Headline writing, emphasising certain words, linking to seemingly-relevant-but-not-really sources / patents, claiming to have a secret source / be an insider...etc



posted on Mar, 30 2016 @ 11:29 AM
link   

originally posted by: Vasteel

originally posted by: StargateSG7
As per your own screen name...my DUTY
on ATS is to absolutely get YOU HYPED and
with my media training that means bait-click
like HEADLINE WRITING !!!


Are you doing a study on how media can be used to persuade people on an invalid argument by any chance?
Headline writing, emphasising certain words, linking to seemingly-relevant-but-not-really sources / patents, claiming to have a secret source / be an insider...etc


===

NO! My sources are VERY REAL...with links into SOMETIMES
very high spots within the aerospace and intelligence arena.
I have been in this business a VERY LONG TIME so while my
methods are unusual, the data is very real...AND...if you
CARE to actually READ the links and data I espouse, you will
find there is an underlying and SUPPORTIVE scientific basis
for all my assertions.

So here is ANOTHER LINK to an article on capacitive sensors
with regards to false triggering and noise production...which
SHOULD give you pause as to HOW noise can be induced into
touch screens from an external source....AND THEN...delving
further you MAY BE ABLE TO SEE that changing the LOCAL
environment near the screen CAN TRIGGER a touchscreen
AND/OR introduce a patterned amount or interpretable
amount of electrical noise into the system....AND ONCE
YOU GET TO THAT STAGE....would you like some SOFTWARE
to interpret that noise BACK into an audible and listenable
audio waveform?


Differentiating noise from real touch: the key to robust capacitive sensing.
Kannan Srinivasagam & Vibheesh B., Cypress Semiconductor Corp.

See link:
www.eetimes.com...

See where I am getting at?

1) You are speaking near a capacitive touchscreen.

2) The pressure waves produced by your vocal chords
follow a specific pattern of rise-times and fall times.

3) Those impulses HIT the screen bouncing back off
the front-side acoustically reflective surface.

4) Those bouncing waveforms disturb the microdust
and water vapour within the air close to the screens
surface.

5) That moving dust and water vapour (i.e. humidity)
changes the CONDUCTANCE of that 3D-XYZ space.
That change in conductance INDUCES a spurious
introduction of ELECTRICAL NOISE into the
capacitive touch screen circuits.

6) That noise travels to the ADAC (analog to digital
converter software/hardware) which NORMALLY filters
it out because it is UNWANTED ELECTRICAL NOISE.

7) That unwanted electrical noise follows the
SAME PATTERN as the acoustic waveform that
actually hit the screen as pressure waves.

8) Custom HACKED software takes that UNFILTERED
electrical noise and digitally converts it to weak but
discernable impulses of numeric values that represent
amplitude and frequency too!

9) That series of numbers is compared to a secret onboard
database of human voice samples of COMMON phonemes
(male and female) ad pronunications of common vowels
and consonants.

10) the VOCODER then re-creates a mimicry of what
the voice PROBABLY sounded like in it's original form.
That VOCODER data is then converted to easily compressible
text which is then transferred to VARIOUS locations using
common network tarnsmission techniques (TCP/IP or USB)
OR stored secretly on the connected computing system
for LATER PHYSICAL retrieval!

---

SO! CAN YOU READ THE ABOVE AND DO YOU UNDERSTAND IT?

If you can, DO YOU AGREE with the BASE engineering
and mathematics of such technology! If you CANNOT, then
I can't help you and you need to consult an expert level MScEE
who KNOWS something about Digital Signal Processing,
vocoder technology, and noise filtering.

----

The above link is a seemingly related article on WHAT noise is
and why it is a problem with capacitive touchscreens....!!!
It SHOULD give you SOME insight in that electrical noise
can ALSO become information IF it is interpreted correctly!
That is why I use the terms Statistical Analysis and Digital
Signal Processing (DSP). Read up on it...and SEE THE LIGHT!


edit on 2016/3/30 by StargateSG7 because: sp



posted on Mar, 30 2016 @ 11:31 AM
link   
a reply to: StargateSG7

So customer hacked software?

Why not just use "custom hacked software" to use the MICROPHONE?



posted on Mar, 30 2016 @ 11:37 AM
link   

originally posted by: TerryDon79
a reply to: StargateSG7

So customer hacked software?

Why not just use "custom hacked software" to use the MICROPHONE?


===

As I stated earlier you are applying OCCAM's RAZOR here which is a fallacy!

"Among competing hypotheses, the one with the fewest assumptions should be selected."

In the intelligence game SIMPLICITY IS NOT THE GOAL .... !!!

The end-result ACTIONABLE INTELLIGENCE IS THE GOAL ...!!!

That means we try to AVOID THE OBVIOUS and go for
the novel and UNKNOWN, which means SUCH TECHNOLOGY
CANNOT BE DETECTED and therefore MORE ACTIONABLE
INTELLIGENCE can be gathered before eventual discovery!

DO NOT APPLY consumer wants with government desires
for information....in this line of work that mistake can
get you killed!

edit on 2016/3/30 by StargateSG7 because: sp



posted on Mar, 30 2016 @ 11:40 AM
link   
a reply to: StargateSG7

And you aren't applying logic at all.

All you've done is scream from the rooftops that it's true because "someone" told you so.

You've offered no proof whatsoever and all the links you've provided have nothing to do with what you've stated in the op.

We have shown you and explained to you how it simply would not work, yet you continue on saying it's true.

I'm out of here as this should be in hoax.



posted on Mar, 30 2016 @ 11:45 AM
link   
...and a speaker can become a microphone, and a microphone can become a speaker. They're just the inverse of one another.


edit on 30-3-2016 by MystikMushroom because: (no reason given)



posted on Mar, 30 2016 @ 11:48 AM
link   
a reply to: TerryDon79

Hmmmm......I showed this to OUR ENGINEERS
and they ALL have MScEE's...and while they have
reservations about its complexity and have noted
BADLAM's previous assertion of the issue of the
bit-size of the samples within analog-to-digital
converters on consumer-grade touch screen
displays which gives rise to whether an
ACCURATE interpretation of noisy electrical
signals can be obtained, they have indicated
IT IS NOT AN IMPOSSIBLE TASK with high
bit-depth ADCs!

...

So I can tell you this...IS IT DIFFICULT? YES!

Is it electrically and software-wise IMPOSSIBLE? NO!



edit on 2016/3/30 by StargateSG7 because: sp



posted on Mar, 30 2016 @ 12:11 PM
link   

originally posted by: StargateSG7
8) Custom HACKED software takes that UNFILTERED
electrical noise and digitally converts it to weak but
discernable impulses of numeric values that represent
amplitude and frequency too!

9) That series of numbers is compared to a secret onboard
database of human voice samples of COMMON phonemes
(male and female) ad pronunications of common vowels
and consonants.

Oh really? I reverse engineer and modify proprietary mobile device firmware (and write custom firmware/kernels) for a living, so where does this "secret onboard database" reside. Bear in mind, I have full access to the entire partition table on modern devices, including bootloaders and radios, so I want specifics; Which block(s) and in which partition(s)?


10) the VOCODER then re-creates a mimicry of what
the voice PROBABLY sounded like in it's original form.
That VOCODER data is then converted to easily compressible
text which is then transferred to VARIOUS locations using
common network tarnsmission techniques (TCP/IP or USB)
OR stored secretly on the connected computing system
for LATER PHYSICAL retrieval!

And how do such relatively resource intensive processes manage to completely mask themselves from the CPU's raw output and from the mobile radio?



posted on Mar, 30 2016 @ 12:36 PM
link   
a reply to: AdmireTheDistance

Ultra secret agent-sciency-technology-magic!

There's your answer.




top topics



 
5
<< 1  2  3    5  6 >>

log in

join