Total Pageviews

Powered By Blogger

Popular Posts

Blog Archive

Sunday, 5 June 2011

Hacker group vows 'cyberwar' on US government, business Actions to retaliate for treatment of WikiLeaks, Manning, spokesman for Anonymous says

By Michael Isikoff National investigative correspondent
NBC News

EXCLUSIVE

A leader of the computer hackers group known as Anonymous is threatening new attacks on major U.S. corporations and government officials as part of at an escalating “cyberwar” against the citadels of American power.

“It’s a guerrilla cyberwar — that’s what I call it,” said Barrett Brown, 29, who calls himself a senior strategist and “propagandist” for Anonymous. He added: “It’s sort of an unconventional, asymmetrical act of warfare that we’ve involved in. And we didn’t necessarily start it. I mean, this fire has been burning.”

A defiant and cocky 29-year-old college dropout, Brown was cavalier about accusations that the group is violating federal laws. He insisted that Anonymous members are only policing corporate and governmental wrongdoing — as its members define it.

Breaking laws, but 'ethically'
“Our people break laws, just like all people break laws,” he added. “When we break laws, we do it in the service of civil disobedience. We do so ethically. We do it against targets that have asked for it.”

And those targets are apparently only growing in number. Angered over the treatment of Bradley Manning, the Army private who is accused of leaking classified U.S. government documents to WikiLeaks and who is currently being held in solitary confinement at a military brig in Quantico, Va., Brown says the group is planning new computer attacks targeting government officials involved in his case.

Read more reporting by Michael Isikoff in 'The Isikoff Files'

Among the methods the group is vowing to use: posting personal information about the officials on the Internet, a method known as “doxing.” The group also this week issued a threat over the Internet to “harass” the staff at Quantico “to the point of frustration,” including a “complete communications shutdown” of its Internet and phone links.

Advertise | AdChoices

In recent months, Anonymous — a loose collection of tech-savvy hackers or “hacktivists” — has threatened some of the biggest corporations in the country. The group is also the target of a major FBI investigation that has included dozens of subpoenas and raids on the homes of suspected members.

(In the interview, Brown, a sometimes freelance journalist, said he is not personally involved in hacking computers, stressing that he only advises the group, participates in its internal strategy sessions and serves as its spokesman. An FBI spokeswoman on Tuesday described the bureau’s investigation of Anonymous members as “ongoing,” but declined further comment.)

Anonymous has been blamed by senior U.S. government officials — including Deputy Defense Secretary William Lynn — with mounting so-called “distributed denial of service” (DDoS) attacks on major corporate and government targets. The group is believed to do this by mobilizing thousands of so-called “zombie” computers, which have been infected with viruses, and directing them to flood a targeted website simultaneously, creating such a huge demand for service that the site shuts down.

Champion of WikiLeaks, Mideast protesters
Anonymous is believed to have used this method in December, when it took credit for crashing the websites of MasterCard and Visa in retaliation for their decision to cut off service to WikiLeaks. It also claimed credit for shutting down government websites in Tunisia, Egypt, and Libya, which it thereby helping to stoke the uprising in those countries.

Last month, the hackers group launched what may have been its most audacious attack to date, aiming its guns on HBGary Federal, a major cybersecurity firm and government contractor. After HBGary Federal’s CEO threatened to expose members of Anonymous, the group struck back — breaking into the cybersecurity firm’s computers, hijacking the CEO’s Twitter account and swiping tens of thousands of embarrassing emails that it later posted on the Internet.

Related coverage: Do WikiLeaks imitators put your e-mail at risk?

The emails appeared to show that HBGary Federal and two other contractors were proposing a “disinformation campaign” aimed at discrediting political allies of WikiLeaks and critics of the Bank of American and the U.S. Chamber of Commerce, prompting a group of House Democrats to call for a congressional investigation into the contractors.

Asked about Anonymous, Greg Hoglund, the CEO of HBGary, the founder of HBGary Federal, said Tuesday: “These are not hacktivists. They are criminals. They are breaking into computer systems and stealing information — and that violates multiple federal statutes.”

In the first network television interview he has given, Brown – who has been widely quoted as one of the group’s spokesmen — invited NBC to his walk up, one-room Dallas apartment and allowed a reporter to observe as he and what he said were other Anonymous members communicated in a secure chat room.

Their goal that day: drafting a threatening letter to PayPal, the online processing firm owned by eBay, in response to news that the firm had restricted service to Manning’s legal defense fund.

Threatening PayPal
“We politely ask you to finally stand up and show some backbone,” said Brown, reading from the letter on his small laptop. “Unfreeze the account, or release the funds, so Bradley Manning and his lawyers can access it. Otherwise you prove you are nothing but a puppet of a criminal government, which is violating the Geneva Convention and the First Amendment of the U.S. Constitution.”

And then, said Brown: “As always, it ends…We are Anonymous. We do not forgive. We do not forget.”

Advertise | AdChoices

“That’s our little motto,” he added.

There is still much about Anonymous that remains obscure -- and which Brown would not reveal. As he tells it, the group has thousands, if not tens of thousands, of participants, including, he claims, computer managers at major corporations and government agencies and journalists. But, he says, the group’s activities are governed, or at least shaped, by a much smaller group of a “couple dozen” people that reacts to the “ebb and flow” of events. Their overarching goal, he said, “information freedom.”

But there is little doubt that they are capable of brutal actions. Hoglund, the HBGary CEO, said that as part of their attack on his corporate affiliate HBGary Federal, Anonymous members collected personal information on company employees, including Social Security numbers, home addresses and the names of their children. Some employees received death threats, he said.

“Anonymous is not what people think,” he added. “They are vicious individuals and they are having the time of their lives because of all the press they are receiving.”

No apologies for tough tactics
Brown, for his part, makes no bones about the fact that Anonymous plays rough.

Asked about the group’s capabilities, he said, “Well, they keep increasing, but I can tell you that our capabilities are such that, we can, for instance, go into the servers of a federal contracting company … take those servers down, delete backups, take all internal emails, take documents, shut down the websites of the owners of those companies, take everything from those websites, ruin the lives of people who have done it wrong … harass them, make sure they’ll never work again in this particular industry.

“We can expose people. We can go to the media with things, we can give them scoops. We can give them information about companies and their wrongdoing. We can organize protests —anywhere across the globe. We can get the attention of the national conversation if we need to.”

  1. Only on msnbc.com
    1. Victim of 9/11 hate crime fights for attacker's life
    2. China gets angry about cyberwar allegations
    3. Hotmail, Yahoo Mail users also targets in attacks
    4. Slow-moving economy hits 'brick wall'
    5. Jobs no longer topping political agenda
    6. Thailand cracks down on royal insults
    7. Groupon IPO raises thoughts of a bubble

As a possible example of its ability to penetrate secure information, Anonymous — in its attack on HBGary Federal -- has even claimed to have secured a version of the notorious Stuxnet computer virus, believed to have been used by Western intelligence agencies to set back Iran’s nuclear program. (U.S. officials have steadfastly refused to comment on Stuxnet.)

"Yeah, its dangerous software," Brown said when pressed about Anonymous' claims of access to the virus. "Shouldn’t have been floating around like that."

Should it have been in the hands of Anonymous?

"But it is,” he said. “C'est la vie."

Hacker group vows 'cyberwar' on US government, business Actions to retaliate for treatment of WikiLeaks, Manning, spokesman for Anonymous says

By Michael Isikoff National investigative correspondent
NBC News

EXCLUSIVE

A leader of the computer hackers group known as Anonymous is threatening new attacks on major U.S. corporations and government officials as part of at an escalating “cyberwar” against the citadels of American power.

“It’s a guerrilla cyberwar — that’s what I call it,” said Barrett Brown, 29, who calls himself a senior strategist and “propagandist” for Anonymous. He added: “It’s sort of an unconventional, asymmetrical act of warfare that we’ve involved in. And we didn’t necessarily start it. I mean, this fire has been burning.”

A defiant and cocky 29-year-old college dropout, Brown was cavalier about accusations that the group is violating federal laws. He insisted that Anonymous members are only policing corporate and governmental wrongdoing — as its members define it.

Breaking laws, but 'ethically'
“Our people break laws, just like all people break laws,” he added. “When we break laws, we do it in the service of civil disobedience. We do so ethically. We do it against targets that have asked for it.”

And those targets are apparently only growing in number. Angered over the treatment of Bradley Manning, the Army private who is accused of leaking classified U.S. government documents to WikiLeaks and who is currently being held in solitary confinement at a military brig in Quantico, Va., Brown says the group is planning new computer attacks targeting government officials involved in his case.

Read more reporting by Michael Isikoff in 'The Isikoff Files'

Among the methods the group is vowing to use: posting personal information about the officials on the Internet, a method known as “doxing.” The group also this week issued a threat over the Internet to “harass” the staff at Quantico “to the point of frustration,” including a “complete communications shutdown” of its Internet and phone links.

Advertise | AdChoices

In recent months, Anonymous — a loose collection of tech-savvy hackers or “hacktivists” — has threatened some of the biggest corporations in the country. The group is also the target of a major FBI investigation that has included dozens of subpoenas and raids on the homes of suspected members.

(In the interview, Brown, a sometimes freelance journalist, said he is not personally involved in hacking computers, stressing that he only advises the group, participates in its internal strategy sessions and serves as its spokesman. An FBI spokeswoman on Tuesday described the bureau’s investigation of Anonymous members as “ongoing,” but declined further comment.)

Anonymous has been blamed by senior U.S. government officials — including Deputy Defense Secretary William Lynn — with mounting so-called “distributed denial of service” (DDoS) attacks on major corporate and government targets. The group is believed to do this by mobilizing thousands of so-called “zombie” computers, which have been infected with viruses, and directing them to flood a targeted website simultaneously, creating such a huge demand for service that the site shuts down.

Champion of WikiLeaks, Mideast protesters
Anonymous is believed to have used this method in December, when it took credit for crashing the websites of MasterCard and Visa in retaliation for their decision to cut off service to WikiLeaks. It also claimed credit for shutting down government websites in Tunisia, Egypt, and Libya, which it thereby helping to stoke the uprising in those countries.

Last month, the hackers group launched what may have been its most audacious attack to date, aiming its guns on HBGary Federal, a major cybersecurity firm and government contractor. After HBGary Federal’s CEO threatened to expose members of Anonymous, the group struck back — breaking into the cybersecurity firm’s computers, hijacking the CEO’s Twitter account and swiping tens of thousands of embarrassing emails that it later posted on the Internet.

Related coverage: Do WikiLeaks imitators put your e-mail at risk?

The emails appeared to show that HBGary Federal and two other contractors were proposing a “disinformation campaign” aimed at discrediting political allies of WikiLeaks and critics of the Bank of American and the U.S. Chamber of Commerce, prompting a group of House Democrats to call for a congressional investigation into the contractors.

Asked about Anonymous, Greg Hoglund, the CEO of HBGary, the founder of HBGary Federal, said Tuesday: “These are not hacktivists. They are criminals. They are breaking into computer systems and stealing information — and that violates multiple federal statutes.”

In the first network television interview he has given, Brown – who has been widely quoted as one of the group’s spokesmen — invited NBC to his walk up, one-room Dallas apartment and allowed a reporter to observe as he and what he said were other Anonymous members communicated in a secure chat room.

Their goal that day: drafting a threatening letter to PayPal, the online processing firm owned by eBay, in response to news that the firm had restricted service to Manning’s legal defense fund.

Threatening PayPal
“We politely ask you to finally stand up and show some backbone,” said Brown, reading from the letter on his small laptop. “Unfreeze the account, or release the funds, so Bradley Manning and his lawyers can access it. Otherwise you prove you are nothing but a puppet of a criminal government, which is violating the Geneva Convention and the First Amendment of the U.S. Constitution.”

And then, said Brown: “As always, it ends…We are Anonymous. We do not forgive. We do not forget.”

Advertise | AdChoices

“That’s our little motto,” he added.

There is still much about Anonymous that remains obscure -- and which Brown would not reveal. As he tells it, the group has thousands, if not tens of thousands, of participants, including, he claims, computer managers at major corporations and government agencies and journalists. But, he says, the group’s activities are governed, or at least shaped, by a much smaller group of a “couple dozen” people that reacts to the “ebb and flow” of events. Their overarching goal, he said, “information freedom.”

But there is little doubt that they are capable of brutal actions. Hoglund, the HBGary CEO, said that as part of their attack on his corporate affiliate HBGary Federal, Anonymous members collected personal information on company employees, including Social Security numbers, home addresses and the names of their children. Some employees received death threats, he said.

“Anonymous is not what people think,” he added. “They are vicious individuals and they are having the time of their lives because of all the press they are receiving.”

No apologies for tough tactics
Brown, for his part, makes no bones about the fact that Anonymous plays rough.

Asked about the group’s capabilities, he said, “Well, they keep increasing, but I can tell you that our capabilities are such that, we can, for instance, go into the servers of a federal contracting company … take those servers down, delete backups, take all internal emails, take documents, shut down the websites of the owners of those companies, take everything from those websites, ruin the lives of people who have done it wrong … harass them, make sure they’ll never work again in this particular industry.

“We can expose people. We can go to the media with things, we can give them scoops. We can give them information about companies and their wrongdoing. We can organize protests —anywhere across the globe. We can get the attention of the national conversation if we need to.”

  1. Only on msnbc.com
    1. Victim of 9/11 hate crime fights for attacker's life
    2. China gets angry about cyberwar allegations
    3. Hotmail, Yahoo Mail users also targets in attacks
    4. Slow-moving economy hits 'brick wall'
    5. Jobs no longer topping political agenda
    6. Thailand cracks down on royal insults
    7. Groupon IPO raises thoughts of a bubble

As a possible example of its ability to penetrate secure information, Anonymous — in its attack on HBGary Federal -- has even claimed to have secured a version of the notorious Stuxnet computer virus, believed to have been used by Western intelligence agencies to set back Iran’s nuclear program. (U.S. officials have steadfastly refused to comment on Stuxnet.)

"Yeah, its dangerous software," Brown said when pressed about Anonymous' claims of access to the virus. "Shouldn’t have been floating around like that."

Should it have been in the hands of Anonymous?

"But it is,” he said. “C'est la vie."

American Wikileaks Hacker Jacob Appelbaum fights repressive regimes around the world - including his own.

Photograph by Peter Yang
By Nathaniel Rich
December 1, 2010 6:34 PM ET

On July 29th, returning from a trip to Europe, Jacob Appelbaum, a lanky, unassuming 27-year-old wearing a black T-shirt with the slogan "Be the trouble you want to see in the world," was detained at customs by a posse of federal agents. In an interrogation room at Newark Liberty airport, he was grilled about his role in Wikileaks, the whistle-blower group that has exposed the government's most closely guarded intelligence reports about the war in Afghanistan. The agents photocopied his receipts, seized three of his cellphones — he owns more than a dozen — and confiscated his computer. They informed him that he was under government surveillance. They questioned him about the trove of 91,000 classified military documents that Wikileaks had released the week before, a leak that Vietnam-era activist Daniel Ellsberg called "the largest unauthorized disclosure since the Pentagon Papers." They demanded to know where Julian Assange, the founder of Wikileaks, was hiding. They pressed him on his opinions about the wars in Afghanistan and Iraq. Appelbaum refused to answer. Finally, after three hours, he was released.

Sex, Drugs, and the Biggest Cybercrime of All Time

Appelbaum is the only known American member of Wikileaks and the leading evangelist for the software program that helped make the leak possible. In a sense, he's a bizarro version of Mark Zuckerberg: If Facebook's ambition is to "make the world more open and connected," Appelbaum has dedicated his life to fighting for anonymity and privacy. An anarchist street kid raised by a heroin- addict father, he dropped out of high school, taught himself the intricacies of code and developed a healthy paranoia along the way. "I don't want to live in a world where everyone is watched all the time," he says. "I want to be left alone as much as possible. I don't want a data trail to tell a story that isn't true." We have transferred our most intimate and personal information — our bank accounts, e-mails, photographs, phone conversations, medical records — to digital networks, trusting that it's all locked away in some secret crypt. But Appelbaum knows that this information is not safe. He knows, because he can find it.

He demonstrates this to me when I meet him, this past spring, two weeks before Wikileaks made headlines around the world by releasing a video showing U.S. soldiers killing civilians in Iraq. I visit him at his cavernous duplex in San Francisco. The only furniture is a black couch, a black chair and a low black table; a Guy Fawkes mask hangs on a wall in the kitchen. The floor is littered with Ziploc bags containing bundles of foreign cash: Argentine pesos, Swiss francs, Romanian lei, old Iraqi dinars bearing Saddam Hussein's face. The bag marked "Zimbabwe" contains a single $50 billion bill. Photographs, most of them taken by Appelbaum, cover the wall above his desk: punk girls in seductive poses and a portrait of his deceased father, an actor, in drag.

The Battle For Facebook

Appelbaum tells me about one of his less impressive hacking achievements, a software program he invented called Blockfinder. It was not, he says, particularly difficult to write. In fact, the word he uses to describe the program's complexity is "trivial," a withering adjective that he and his hacker friends frequently deploy, as in, "Triggering the Chinese firewall is trivial" or "It's trivial to access any Yahoo account by using password-request attacks." All that Blockfinder does is allow you to identify, contact and potentially hack into every computer network in the world.

American Wikileaks Hacker Jacob Appelbaum fights repressive regimes around the world - including his own.

Photograph by Peter Yang
By Nathaniel Rich
December 1, 2010 6:34 PM ET

On July 29th, returning from a trip to Europe, Jacob Appelbaum, a lanky, unassuming 27-year-old wearing a black T-shirt with the slogan "Be the trouble you want to see in the world," was detained at customs by a posse of federal agents. In an interrogation room at Newark Liberty airport, he was grilled about his role in Wikileaks, the whistle-blower group that has exposed the government's most closely guarded intelligence reports about the war in Afghanistan. The agents photocopied his receipts, seized three of his cellphones — he owns more than a dozen — and confiscated his computer. They informed him that he was under government surveillance. They questioned him about the trove of 91,000 classified military documents that Wikileaks had released the week before, a leak that Vietnam-era activist Daniel Ellsberg called "the largest unauthorized disclosure since the Pentagon Papers." They demanded to know where Julian Assange, the founder of Wikileaks, was hiding. They pressed him on his opinions about the wars in Afghanistan and Iraq. Appelbaum refused to answer. Finally, after three hours, he was released.

Sex, Drugs, and the Biggest Cybercrime of All Time

Appelbaum is the only known American member of Wikileaks and the leading evangelist for the software program that helped make the leak possible. In a sense, he's a bizarro version of Mark Zuckerberg: If Facebook's ambition is to "make the world more open and connected," Appelbaum has dedicated his life to fighting for anonymity and privacy. An anarchist street kid raised by a heroin- addict father, he dropped out of high school, taught himself the intricacies of code and developed a healthy paranoia along the way. "I don't want to live in a world where everyone is watched all the time," he says. "I want to be left alone as much as possible. I don't want a data trail to tell a story that isn't true." We have transferred our most intimate and personal information — our bank accounts, e-mails, photographs, phone conversations, medical records — to digital networks, trusting that it's all locked away in some secret crypt. But Appelbaum knows that this information is not safe. He knows, because he can find it.

He demonstrates this to me when I meet him, this past spring, two weeks before Wikileaks made headlines around the world by releasing a video showing U.S. soldiers killing civilians in Iraq. I visit him at his cavernous duplex in San Francisco. The only furniture is a black couch, a black chair and a low black table; a Guy Fawkes mask hangs on a wall in the kitchen. The floor is littered with Ziploc bags containing bundles of foreign cash: Argentine pesos, Swiss francs, Romanian lei, old Iraqi dinars bearing Saddam Hussein's face. The bag marked "Zimbabwe" contains a single $50 billion bill. Photographs, most of them taken by Appelbaum, cover the wall above his desk: punk girls in seductive poses and a portrait of his deceased father, an actor, in drag.

The Battle For Facebook

Appelbaum tells me about one of his less impressive hacking achievements, a software program he invented called Blockfinder. It was not, he says, particularly difficult to write. In fact, the word he uses to describe the program's complexity is "trivial," a withering adjective that he and his hacker friends frequently deploy, as in, "Triggering the Chinese firewall is trivial" or "It's trivial to access any Yahoo account by using password-request attacks." All that Blockfinder does is allow you to identify, contact and potentially hack into every computer network in the world.

Help 2600 Magazine Compile a List of Dates for their Hacker Calendar!


2600, the magazine familiar to many as a preeminent hacking quarterly, is publishing a calendar. While, according to the 2600 site, most calendars only mark holidays, 2600 intends to “provide as complete a guide to milestones in the hacker world as humanly possible.” Not an easy task considering that, depending on your definition, hacking could extend to the discovery of fire, or at least the wheel.

2600 gives some examples in which they only list events back to March 3, 1885, when AT&T was founded. If this example is followed, that “only” gives one 126 years to work with, but compiling a full list of hacking dates is still a daunting task. If you can think of any dates worthy of consideration, email them to: calendar@2600.com. We think maybe September 5th, 2004 might be a notable date to include. We’ll leave it up to figure out what that date is, in case it wasn’t painfully obvious.

Trick mouse keeps the screen saver at bay

mouse_wiggler

[Jerry] wrote in to share a little device he built to solve a problem he was having at work. You see, every computer in his office has a policy-enforced idle timeout, requiring the user to enter a password in order to regain access to their desktop.

This is a huge pain, since he sporadically uses an old computer for the sole purpose of monitoring some applications running in his data center. With the computer timing out every 10 minutes, he is constantly required to enter his password in order to take a 10 second glance at the screen to ensure everything is OK.

Rather than circumvent the screen saver using a local security policy or by implementing a microcontroller-based signal generator, he opted to create a mechanical solution instead. His computer’s optical mouse resides inside a wooden frame, and is periodically swept from side to side by an ATmega-controlled servo, keeping the screensaver permanently at bay.

Call it a hack, call it a kludge, call it what you will. All we know is that while we might have done it a little differently, it works just fine for [Jerry], and it generates all sorts of interesting conversation to boot.

Stick around for a quick video demonstration of his mouse wiggler box.

Kickstarter Roundup: Wednesday, June 1st

We have been getting tons of emails lately recommending we take a look at various Kickstarter projects. We used to ignore them since they all boil down to a request for project funding, but since there are so many cool projects out there, we figured we might as well share a couple. Some of these projects have already met their funding goals, but we thought they were worth a mention anyhow.


Solar Powered Coffee Roasting

solar_coffee_roaster

We’re all about both coffee and alternative energy, so this one caught our eye right away. While this coffee roaster won’t exactly fit on your back porch, it would be perfect for a coffee shop located in a sunny locale. Based off “power tower” solar concentrator systems, this rooftop-mounted solar harvester has big potential. Pair this with sopme sustainably-grown coffee, and you’ve got quite the tasty combo.


HexBright – an open source flashlight

hexbright

What do you get when you combine milled aluminum hex bar and a Cree XM-L LED? A lightweight, extremely bright flashlight that won’t roll away on you. The HexBright puts out 500 lumens and sports a built-in rechargeable battery that can be topped off via your computer’s USB port. Not only that, the high-end version can be programmed to support any pattern or brightness that you choose. We’ll take two, thanks.


Arduino Project Board

arduino_project_board

[Randy Sarafan] of Clap-off bra fame is working on a slimmed-down Arduino board for use in the final stages of project development. He really doesn’t see the need to put an entire Arduino development board into his finished projects and often makes a quick perfboard circuit for his builds once he is finished prototyping. He’s grown tired of the process and developed a small circuit board that has all the connectivity he needs, without all the extra bits found on Arduino development boards.

Hidden device distorts news on wireless networks, brews beer, is time machine
posted May 29th 2011 2:00pm by Brian Benchoff
filed under: news, wireless hacks

We covered the Newstweek, a wall-wart sized box that injects fake news stories over public WiFi connections last February, but now there’s a great walk through and it seems our doubts about this project were disproved.

The Newstweek uses ARP spoofing to change the text displayed on several news sites. After doing some field research, placing and configuring the device, there’s a simple web frontend that configures the man-in-the-middle hack. Right now, the Newstweek only allows a few news sites to be targeted, but the team is working on allowing anyone to add their own targets.

Aside from the relatively simple build, we’re wondering about the social engineering aspects of the Newstweek. In our previous coverage of the Newstweek, we couldn’t decide if this was a social commentary art project, or a real device. It looks like it’s both now. Would hackaday readers succumb to injecting, “President Bacon addressed the nation last night…” or would you do the responsible thing and put the “(D)s” and “(R)s” in their proper places?

The Newstweek team posted a video of a short demonstration, but check out the video after the break for the “incredibly geeky and thorough demo.”


Speak your mind and help RadioShack suck less


radio_shack

We can all agree that RadioShack isn’t exactly the DIY mecca it once was.

What used to be a haven for amateur radio operators, tinkerers, and builders alike has devolved into a stripmall mainstay full of cell phones and overpriced junk. RadioShack knows that they have fallen out of your good graces, and since you are the demographic that put them on the map, they are appealing to the DIY community for input.

They want to know what is important to you – what you would like to see at your local RadioShack, and what would bring you back through their doors. Obviously price is a huge concern, especially with online outlets like Digikey and Mouser just a few clicks away. At the end of the day however, if you require a component RIGHT NOW, it would be nice to have the ability to grab some parts locally.

We’re well aware of the fact that this is all part of a marketing scheme, but if it helps stock your local store with a few odds and ends that are actually helpful, it won’t hurt to let your voice be heard.

Stick around to watch the video appeal from RadioShack’s brand manager, [Amy Shineman].

[Thanks komradebob]

[via ARRL.org]



Adding persistent memory and Ethernet to vintage arcade machines


z80_bus_tapper

If you are a frequent reader, you are undoubtedly familiar with hacker [Sprite_tm]. He has been working with fellow members of the TkkrLab hackerspace to get things ready for their official grand opening on May 28th, and wrote in to share a project he recently completed to kick things off.

As part of their preparations, they have been stocking the joint with all sorts of hacker-friendly goodies including plenty of tools and Club Mate, as well as a vintage ‘1943’ arcade cabinet. The game is a group favorite, though every time the power is turned off, it loses all of the hard-earned high scores. [Sprite_tm] knew he could improve on the current paper-based score register, so he pulled the machine open to see what could be done.

He used an AVR to tap into the machine’s Z80 logic board, allowing him to read and write to the entirety of the game’s RAM whenever he pleased. This enabled him to keep tabs on the high scores, restoring them to memory whenever the machine is powered back on. The addition of the AVR also allowed him to add a TCP/IP interface, which is used to send high scores to Twitter whenever someone beats the previous record.

His modular bus tap can be used in all sorts of Z80-based hardware, so if you have some vintage equipment laying around, be sure to swing by his site for a more detailed look at the build process.


Tracking eye movement by measuring electrons in the eye


[Luis Cruz] is a Honduran High School student, and he built an amazing electrooculography system, and the writeup (PDF warning) of the project is one of the best we’ve seen.

[Luis] goes through the theory of the electrooculogram – the human eye is polarized from front to back because of a negative charge in the nerve endings in the retina. Because of this minute difference in charge, a user’s gaze can be tracked by electrodes attached to the skin around the eye. After connecting eye electrodes to opamps and a microcontroller, [Luis] imported the data with a Python script and wrote an “eyeboard” application to enable text input using only eye movement. The original goal of the project was to build an interface for severely disabled people, but [Luis] sees applications for sleep research and gathering marketing data.

We covered [Luis]‘ homebrew 8-bit console last year, and he’s now controlling his Pong clone with his eye-tracking device. We’re reminded of a similar system developed by Atari, but [Luis]‘ system uses a method that won’t give the user a headache after 15 minutes.

Check out [Luis] going through the capabilities of his interface after the break. Read the rest of this entry »


RF robot controlled from a terminal window


This robot can be controlled from the terminal window of your computer. You can see a manilla-colored board mounted between the wheels. This is the RF receiver which has quite a long antenna that we’ve cropped out to get a better look at the bot itself. [Ashish] picked up an RF transmitter/receiver pair for about $4 and after the break you can watch him walk us through the method he’s using for control.

First off, he had to find a way to interface the transmitter with his computer. He decided to use an Arduino because sending data to it from the computer is as simple as writing to /dev/ttyUSB0. The Arduino sketch just listens for incoming characters on the serial connection and pushes them over the RF transmitter.

We like his development methods. In the video he shows the command syntax used to drive and stop the robot. Once he figured that out he wrote a shell script to send the bot on a preprogrammed square path. From there a bit more coding would give him real-time control which could be extended to something like a web-based interface for smartphone control.

Oh, and if you’re wondering about the bot itself it’s a kit robot which normally uses IR control. [Ashish] upgraded to RF since it doesn’t require line-of-sight to work.


Help 2600 Magazine Compile a List of Dates for their Hacker Calendar!


2600, the magazine familiar to many as a preeminent hacking quarterly, is publishing a calendar. While, according to the 2600 site, most calendars only mark holidays, 2600 intends to “provide as complete a guide to milestones in the hacker world as humanly possible.” Not an easy task considering that, depending on your definition, hacking could extend to the discovery of fire, or at least the wheel.

2600 gives some examples in which they only list events back to March 3, 1885, when AT&T was founded. If this example is followed, that “only” gives one 126 years to work with, but compiling a full list of hacking dates is still a daunting task. If you can think of any dates worthy of consideration, email them to: calendar@2600.com. We think maybe September 5th, 2004 might be a notable date to include. We’ll leave it up to figure out what that date is, in case it wasn’t painfully obvious.

Trick mouse keeps the screen saver at bay

mouse_wiggler

[Jerry] wrote in to share a little device he built to solve a problem he was having at work. You see, every computer in his office has a policy-enforced idle timeout, requiring the user to enter a password in order to regain access to their desktop.

This is a huge pain, since he sporadically uses an old computer for the sole purpose of monitoring some applications running in his data center. With the computer timing out every 10 minutes, he is constantly required to enter his password in order to take a 10 second glance at the screen to ensure everything is OK.

Rather than circumvent the screen saver using a local security policy or by implementing a microcontroller-based signal generator, he opted to create a mechanical solution instead. His computer’s optical mouse resides inside a wooden frame, and is periodically swept from side to side by an ATmega-controlled servo, keeping the screensaver permanently at bay.

Call it a hack, call it a kludge, call it what you will. All we know is that while we might have done it a little differently, it works just fine for [Jerry], and it generates all sorts of interesting conversation to boot.

Stick around for a quick video demonstration of his mouse wiggler box.

Kickstarter Roundup: Wednesday, June 1st

We have been getting tons of emails lately recommending we take a look at various Kickstarter projects. We used to ignore them since they all boil down to a request for project funding, but since there are so many cool projects out there, we figured we might as well share a couple. Some of these projects have already met their funding goals, but we thought they were worth a mention anyhow.


Solar Powered Coffee Roasting

solar_coffee_roaster

We’re all about both coffee and alternative energy, so this one caught our eye right away. While this coffee roaster won’t exactly fit on your back porch, it would be perfect for a coffee shop located in a sunny locale. Based off “power tower” solar concentrator systems, this rooftop-mounted solar harvester has big potential. Pair this with sopme sustainably-grown coffee, and you’ve got quite the tasty combo.


HexBright – an open source flashlight

hexbright

What do you get when you combine milled aluminum hex bar and a Cree XM-L LED? A lightweight, extremely bright flashlight that won’t roll away on you. The HexBright puts out 500 lumens and sports a built-in rechargeable battery that can be topped off via your computer’s USB port. Not only that, the high-end version can be programmed to support any pattern or brightness that you choose. We’ll take two, thanks.


Arduino Project Board

arduino_project_board

[Randy Sarafan] of Clap-off bra fame is working on a slimmed-down Arduino board for use in the final stages of project development. He really doesn’t see the need to put an entire Arduino development board into his finished projects and often makes a quick perfboard circuit for his builds once he is finished prototyping. He’s grown tired of the process and developed a small circuit board that has all the connectivity he needs, without all the extra bits found on Arduino development boards.

Hidden device distorts news on wireless networks, brews beer, is time machine
posted May 29th 2011 2:00pm by Brian Benchoff
filed under: news, wireless hacks

We covered the Newstweek, a wall-wart sized box that injects fake news stories over public WiFi connections last February, but now there’s a great walk through and it seems our doubts about this project were disproved.

The Newstweek uses ARP spoofing to change the text displayed on several news sites. After doing some field research, placing and configuring the device, there’s a simple web frontend that configures the man-in-the-middle hack. Right now, the Newstweek only allows a few news sites to be targeted, but the team is working on allowing anyone to add their own targets.

Aside from the relatively simple build, we’re wondering about the social engineering aspects of the Newstweek. In our previous coverage of the Newstweek, we couldn’t decide if this was a social commentary art project, or a real device. It looks like it’s both now. Would hackaday readers succumb to injecting, “President Bacon addressed the nation last night…” or would you do the responsible thing and put the “(D)s” and “(R)s” in their proper places?

The Newstweek team posted a video of a short demonstration, but check out the video after the break for the “incredibly geeky and thorough demo.”


Speak your mind and help RadioShack suck less


radio_shack

We can all agree that RadioShack isn’t exactly the DIY mecca it once was.

What used to be a haven for amateur radio operators, tinkerers, and builders alike has devolved into a stripmall mainstay full of cell phones and overpriced junk. RadioShack knows that they have fallen out of your good graces, and since you are the demographic that put them on the map, they are appealing to the DIY community for input.

They want to know what is important to you – what you would like to see at your local RadioShack, and what would bring you back through their doors. Obviously price is a huge concern, especially with online outlets like Digikey and Mouser just a few clicks away. At the end of the day however, if you require a component RIGHT NOW, it would be nice to have the ability to grab some parts locally.

We’re well aware of the fact that this is all part of a marketing scheme, but if it helps stock your local store with a few odds and ends that are actually helpful, it won’t hurt to let your voice be heard.

Stick around to watch the video appeal from RadioShack’s brand manager, [Amy Shineman].

[Thanks komradebob]

[via ARRL.org]



Adding persistent memory and Ethernet to vintage arcade machines


z80_bus_tapper

If you are a frequent reader, you are undoubtedly familiar with hacker [Sprite_tm]. He has been working with fellow members of the TkkrLab hackerspace to get things ready for their official grand opening on May 28th, and wrote in to share a project he recently completed to kick things off.

As part of their preparations, they have been stocking the joint with all sorts of hacker-friendly goodies including plenty of tools and Club Mate, as well as a vintage ‘1943’ arcade cabinet. The game is a group favorite, though every time the power is turned off, it loses all of the hard-earned high scores. [Sprite_tm] knew he could improve on the current paper-based score register, so he pulled the machine open to see what could be done.

He used an AVR to tap into the machine’s Z80 logic board, allowing him to read and write to the entirety of the game’s RAM whenever he pleased. This enabled him to keep tabs on the high scores, restoring them to memory whenever the machine is powered back on. The addition of the AVR also allowed him to add a TCP/IP interface, which is used to send high scores to Twitter whenever someone beats the previous record.

His modular bus tap can be used in all sorts of Z80-based hardware, so if you have some vintage equipment laying around, be sure to swing by his site for a more detailed look at the build process.


Tracking eye movement by measuring electrons in the eye


[Luis Cruz] is a Honduran High School student, and he built an amazing electrooculography system, and the writeup (PDF warning) of the project is one of the best we’ve seen.

[Luis] goes through the theory of the electrooculogram – the human eye is polarized from front to back because of a negative charge in the nerve endings in the retina. Because of this minute difference in charge, a user’s gaze can be tracked by electrodes attached to the skin around the eye. After connecting eye electrodes to opamps and a microcontroller, [Luis] imported the data with a Python script and wrote an “eyeboard” application to enable text input using only eye movement. The original goal of the project was to build an interface for severely disabled people, but [Luis] sees applications for sleep research and gathering marketing data.

We covered [Luis]‘ homebrew 8-bit console last year, and he’s now controlling his Pong clone with his eye-tracking device. We’re reminded of a similar system developed by Atari, but [Luis]‘ system uses a method that won’t give the user a headache after 15 minutes.

Check out [Luis] going through the capabilities of his interface after the break. Read the rest of this entry »


RF robot controlled from a terminal window


This robot can be controlled from the terminal window of your computer. You can see a manilla-colored board mounted between the wheels. This is the RF receiver which has quite a long antenna that we’ve cropped out to get a better look at the bot itself. [Ashish] picked up an RF transmitter/receiver pair for about $4 and after the break you can watch him walk us through the method he’s using for control.

First off, he had to find a way to interface the transmitter with his computer. He decided to use an Arduino because sending data to it from the computer is as simple as writing to /dev/ttyUSB0. The Arduino sketch just listens for incoming characters on the serial connection and pushes them over the RF transmitter.

We like his development methods. In the video he shows the command syntax used to drive and stop the robot. Once he figured that out he wrote a shell script to send the bot on a preprogrammed square path. From there a bit more coding would give him real-time control which could be extended to something like a web-based interface for smartphone control.

Oh, and if you’re wondering about the bot itself it’s a kit robot which normally uses IR control. [Ashish] upgraded to RF since it doesn’t require line-of-sight to work.


Hacker News


1.
Show HN: Log.io (Realtime log monitoring, powered by node.js + socket.io) (logio.org)

50 points by msmathers 1 hour ago | 11 comments
2.
Show HN: Google Charts done in Canvas, side project (mattgreer.org)

99 points by city41 4 hours ago | 21 comments
3.
"My iOS app is being pirated, over 90% haven't paid for it. What can I do?" (reddit.com)

38 points by loy22 2 hours ago | 26 comments
4.
CERN Scientists Trap Antimatter for Almost 17 Minutes (pcmag.com)

24 points by nickolai 1 hour ago | 5 comments
5.
WWDC 2011 Prelude (daringfireball.net)

29 points by Judson 1 hour ago | 1 comment
6.
The Guts of Android (lwn.net)

7 points by wallflower 37 minutes ago | discuss
7.
The Good, the Bad, and the Ugly of REST APIs (oreilly.com)

56 points by apievangelist 4 hours ago | 22 comments
8.
My Lisp Experiences and the Development of GNU Emacs (gnu.org)

32 points by mofey 3 hours ago | 15 comments
9.
Usenet, updated in real time as it was thirty years ago (olduse.net)

87 points by adambyrtek 7 hours ago | 33 comments
10.
Algorithms for Massive Data Sets (princeton.edu)

94 points by helwr 8 hours ago | 5 comments
11.
Analemma: SVG charts with Clojure (github.com)

24 points by phren0logy 4 hours ago | discuss
12.
Starting a Game (eddiescholtz.com)

32 points by sled 4 hours ago | 3 comments
13.
(Mis)adventures in trying to promote a book on AdWords (trevorburnham.posterous.com)

35 points by TrevorBurnham 5 hours ago | 11 comments
14.
Lulzsec Attempts Nintendo Hack - No Customer Information Lost (wsj.com)

29 points by rkalla 3 hours ago | 10 comments
15.
3d Printed Rocket Engine Takes Flight (reprap.org)

34 points by ph0rque 4 hours ago | 3 comments
16.
Why people form beliefs that aren't based on evidence (sciencebasedmedicine.org)

4 points by bendmorris 41 minutes ago | discuss
17.
Some Thoughts on Cancer from a Hacker (whattofix.com)

23 points by DanielBMarkham 3 hours ago | 11 comments
18.
Quantum Physics & Natural Language Processing (pp. 8-11) [scribd] (ox.ac.uk)

14 points by haliax 3 hours ago | 1 comment
19.
Can a £15 computer solve the programming gap? (bbc.co.uk)

44 points by Peteris 7 hours ago | 38 comments
20.
Sony Music Brazil hacked (sucuri.net)

124 points by sucuri2 11 hours ago | 45 comments
21.
On anonymous feedback (gabrielweinberg.com)

17 points by swah 4 hours ago | 4 comments
22.
Types Are Anti-Modular (gbracha.blogspot.com)

44 points by swannodette 8 hours ago | 31 comments
23.
What are you doing to feel uncomfortable? (joel.is)

68 points by joelg87 9 hours ago | 15 comments
24.
Show HN: Weekend Project - My MVB (minimum viable business) (thehodge.co.uk)

23 points by thehodge 3 hours ago | 8 comments
25.
Regarding Unit Tests (winterazalea.livejournal.com)

6 points by noaharc 1 hour ago | 3 comments
26.
Ask HN: My Startup is Going to Die Because I Messed Up

116 points by calebhicks 7 hours ago | 77 comments
27.
I moved to Singapore (sivers.org)

190 points by sivers 18 hours ago | 171 comments
28.
New biography of Steve Jobs comes out March 2012 (amazon.com)

17 points by carterac 2 hours ago | 5 comments
29.
Companies looking for their first customers (bemyfirstcustomer.com)

86 points by abrimo 12 hours ago | 25 comments
30.
Three Haskell web frameworks: an overview (linux.ie)

34 points by dons 8 hours ago | 3 comments

Labels

GlobalView

PTP