Stealth wallpaper keeps company secrets safe

A type of wallpaper that prevents Wi-Fi signals escaping from a building without blocking mobile phone signals has been developed by a British defence contractor. The technology is designed to stop outsiders gaining access to a secure network by using Wi-Fi networks casually set up by workers at the office.

via Stealth wallpaper keeps company secrets safe – 08 August 2004 – New Scientist.

Copper coated

Solid metal antennas normally give a very strong reflection to enemy radar scanners. To hide them, FSS sheeting can be electrically set to allow through only the precise frequency the antenna wants to transmit and receive, while absorbing all other frequencies including those of the incoming radar.

BAE’s anti-Wi-Fi wallpaper is made from a 0.1-millimetre-thick sheet of kapton, the same plastic used to make flexible printed circuit boards in lightweight portable gadgets like camcorders. The kapton is coated on each side with a thin film of copper.

Ethernet over Copper

ADTRAN’s Ethernet over Copper (EoCu) products enable service providers to extend packet-based business-class services beyond the reach of their fiber networks by leveraging the existing investment of copper-based TDM business services assets. This means leveraging the full advantages of TDM, the most understood, successful, and ubiquitous business service infrastructure. Due to budget restrictions and time to market requirements, deploying fiber to address nascent or disperse service demand is not feasible. This leaves a large percentage of businesses to rely on copper business access.

via Ethernet over Copper | EoCu Products | TDM Business Services from ADTRAN.

White spaces and happy faces: TV stations drop lawsuit against “super WiFi”

Now the remaining obstacles to widespread adoption of white spaces technology are mostly technical. Art Brodsky of Public Knowledge told us that supporters of the technology are working on building the databases needed to track which television channels are available for use at any particular time and location. He said the databases are being set up on a “market-by-market basis. When they hit a critical mass of markets, or can accommodate multiple markets, this technology will take off much more strongly.

via White spaces and happy faces: TV stations drop lawsuit against “super WiFi”.

1Gbps wireless network made with red and green laser pointers

Now, I think for the first time ever, researchers at the National Taipei University of Technology in Taiwan have transmitted data using lasers — not high-powered, laboratory-dwelling lasers; handheld, AAA-battery laser pointers. The setup is rather simple: The engineers took a red and green laser pointer, wired in a 500Mbps data stream into each, and simply pointed them at photodiode receptors. On the receiving end, the signals are amplified and then multiplexed to create a 1Gbps data stream. The complete setup, according to New Scientist, cost just $600.

via 1Gbps wireless network made with red and green laser pointers | ExtremeTech.

Will laser-based VLC actually find its way to market, then? There’s no getting around the fact that laser links are highly directional (even more so than the shoddy IrDA networks of yore), and atmospheric conditions will play a big part in the BER, and thus the actual data rate. With WiGig making its way to market, laser pointer VLC will probably never be seen by consumers. Still, for quick bursts of data between mobile devices, or wireless communications in hospitals, or simply as a fun hobby for amateur radio (?) operators, cheap, laser pointer VLC could be very useful indeed.

OONI

OONI is the Open Observatory for Network Interference and its aim is to collect high quality data using open methodologies, using Free and Open Source Software (FL/OSS) to share observations and data about the kind, methods and amount of surveillance and censorship in the world

via – OONI.

Engineers ponder easier fix to dangerous Internet problem

But the routers do not verify that the route “announcements,” as they are called, are correct. Mistakes in entering the information — or worse yet, a malicious attack — can cause a network to become unavailable.

It can also cause, for example, a company’s Internet traffic to be circuitously routed through another network it does not need to go through, opening the possibility the traffic could be intercepted. The attack is known as “route hijacking,” and can’t be stopped by any security product.

via Engineers ponder easier fix to dangerous Internet problem | ITworld.

In March 2011, a researcher noticed that traffic destined for Facebook on AT&T’s network strangely went through China for a while. While the requests would normally go directly to Facebook’s network provider, the traffic first went through China Telecom and then to SK Broadband in South Korea before routing to Facebook. Although the incident was characterized as a mistake, it would have been possible for unencrypted Facebook traffic to have been spied on.

UPD Cambridge UK Trial of TV White Space Wireless Broadband is Successful

The TV White Spaces Consortium, which comprises 17 international and UK technology and media companies (BT, Microsoft, BBC, Virgin Media, Alcatel-Lucent etc.), has reported that their 10 month long trials of White Space (IEEE 802.22) wireless broadband tech in urban and rural areas around Cambridge (England) have been “successful“.

via UPD Cambridge UK Trial of TV White Space Wireless Broadband is Successful – ISPreview UK.

City centre coverage. The consortium set up base stations on the north side of the Cambridge city centre in four pubs and a theatre, aiming to provide widespread coverage, including “pop-up” Wi-Fi hotspots. The base stations were connected to dual omnidirectional wide-band antennas mounted on rooftops (radios and antennas provided by Neul), enabling considerably further coverage than could have been achieved with conventional Wi-Fi, in 2.4GHz, for example. The tests showed that TV white spaces can help extend broadband access and offload mobile broadband data traffic. These hotspots can enable users to enjoy data-intensive services such as online video provided by BBC iPlayer and Sky Go during peak usage times, when additional capacity and wider reach is needed.

Iraq Emerges From Isolation as Telecommunications Hub

The new cable will speed Internet and telephone traffic to India in the East and Sicily in the West. From there, traffic moves onto other networks to connect to the rest of the world.

Much of the world takes lightning-fast broadband service for granted, but any kind of Internet access remains a rarity in Iraq, where fewer than 3 percent of households are online. The new capacity could help bring Internet connections to 50 percent within two years, said Mohammed Tawfiq Allawi, the Iraqi communications minister.

via Iraq Emerges From Isolation as Telecommunications Hub – NYTimes.com.

All-Optical Networks: The Last Piece of the Puzzle

The functionality of an optical diode is simple to understand, as explained by MIT’s Caroline Ross, whose lab recently published a paper on the diode: “It lets light go one-way, but blocks it from going the other way.” In that sense, it’s no different from electrical diodes that have existed for decades. (While the electronics term is “diode,” the preferred term in photonics is “optical isolator.”)

But controlling photons presents challenges far more complex than controlling electrons. “You need to have a material where light propagating in one direction behaves differently from light propagating in the opposite direction,” says Ross. In order to achieve that, you need a transparent material that when magnetized creates an asymmetrical medium, which allows you to control the light’s direction.

via All-Optical Networks: The Last Piece of the Puzzle – Input Output.

HP Ships Network Switches With Malware Infected Flash Cards

HP has warned of a security vulnerability associated with its ProCurve 5400 zl switches that contain compact flash cards that the company says may be infected with malware. The company warned that using one of the infected compact flash cards in question on computer could result in the system being compromised.

via HP Ships Network Switches With Malware Infected Flash Cards | SecurityWeek.Com.

In March 2012, a consortium of experts published a preview of standards meant to improve the security of the global supply chain for commercial software and hardware products. The standards are the work of The Open Group, and are supported by companies ranging from Boeing to Oracle to IBM. The document has been dubbed the Open Trusted Technology Provider Standard (O-TTPS) Snapshot. The standards are being aimed at providers, suppliers and integrators with the goal of enhancing the security of the supply chain and allowing customers to differentiate between providers who adopt the standard’s practices and those who don’t.