The Tunnels of NYC’s East Side Access Project

A huge public works project is currently under construction in New York City, connecting Long Island to Manhattan’s East Side. Deep underground, rail tunnels are extending from Sunnyside, Queens, to a new Long Island Rail Road terminal being excavated beneath Grand Central Terminal. Construction began in 2007, with an estimated cost of $6.3 billion and completion date of 2013. Since then, the cost estimate has been raised to $8.4 billion, and the completion date moved back to 2019. When finished, the line will accommodate 24 trains per hour at peak traffic, cutting down on commute times from Long Island, and opening up access to John F. Kennedy International Airport from Manhattan’s East Side. Collected here are images of the progress to date, deep beneath Queens and Manhattan.

via The Tunnels of NYC’s East Side Access Project – In Focus – The Atlantic.

Scammers Extort BitTorrent Users Posing as Law Enforcement

According to information obtained by SJD the accusations are not made up. This means that the IP-addresses were indeed “caught” sharing the files listed in the letter. However, it is a mystery how the “Internet Copyright Law Enforcement Agency” obtained the home addresses of the subscribers.

via Scammers Extort BitTorrent Users Posing as Law Enforcement | TorrentFreak.

It was only a matter of time before these kind scams surfaced.  The outfit in question is here.  Fearful of real life charges of real crimes involving interstate commerce probably convinced them to publish this on their site:

Effective immediately, the Internet Copyright Law Enforcement Agency has ceased operations. Please disregard any notices you received from us, and please do not send us any payments.

Throwing and catching an inverted pendulum

Armed with a good theoretical model and knowledge of its strengths and limitations, the researchers set out on a process of engineering the complete system of balancing, throwing, catching, and re-balancing the pendulum. This involved leveraging the theoretic insights on the problem’s key design parameters to adapt the physical system. For example, they equipped both quadrocopters with a 12cm plate that could hold the pendulum while balancing and developed shock absorbers to add at the pendulum’s tips.

via Video: Throwing and catching an inverted pendulum – with quadrocopters | Robohub.

Below is the Youtube video.

More info at the Flying Machine Arena.

The Flying Machine Arena (FMA) is a portable space devoted to autonomous flight. Measuring up to 10 x 10 x 10 meters, it consists of a high-precision motion capture system, a wireless communication network, and custom software executing sophisticated algorithms for estimation and control.

What is AP Isolation Mode and why should I disable it on my router?

In the computer networking world, AP stands for Access Point, or in this case, a wireless access point. AP Isolation effectively creates a “virtual” network among wireless clients, in which each device is an individual entity that cannot communicate with other wireless devices on the same Wi-Fi access point. This configuration can be useful for public Wi-Fi hotspots to separate potentially malicious network traffic from other.

via What is AP Isolation Mode and why should I disable it on my router? – Customer Feedback & Ideas for Photosmith.

The tomato router has this option.  Other APs do not.

Attribution Is Much More Than A Source IP

What seems to be happening in many intrusion cases is that an IP located in China has been associated with the attack. The immediate assumption, often by inexperienced persons involved in the investigation, is that someone in China, most likely state-sponsored, targeted their incredibly important information.

via Tech Insight: Attribution Is Much More Than A Source IP – Dark Reading.

TIFF Files Can Attack BlackBerry Server

Hiding malicious code inside image files isn’t new: way back in ye olden days of 2004, malware hidden inside JPEG files plagued Windows machines. Some administrators are doubtlessly wondering why, after all this time, this sort of vulnerability hasn’t been decisively eliminated from the online world.

via TIFF Files Can Attack BlackBerry Server.

From: BlackBerry Vulnerability Could Allow Access to Enterprise Server

An attacker could rig a TIFF image with malware and get a user to either view the image via a specially crafted website or send it to the user via email or instant message. The last two exploit vectors could make it so the user wouldn’t have to click the link or image, or view the email or instant message, for the attack to prove successful. Once executed, an attacker could access and execute code on Blackberry’s Enterprise Server. According to the advisory, an attacker could also “extend access to other non-segmented parts of the network,” depending on privileges.