industryterm:wireless network

  • The Terrifying Potential of the 5G Network | The New Yorker
    https://www.newyorker.com/news/annals-of-communications/the-terrifying-potential-of-the-5g-network

    Two words explain the difference between our current wireless networks and 5G: speed and latency. 5G—if you believe the hype—is expected to be up to a hundred times faster. (A two-hour movie could be downloaded in less than four seconds.) That speed will reduce, and possibly eliminate, the delay—the latency—between instructing a computer to perform a command and its execution. This, again, if you believe the hype, will lead to a whole new Internet of Things, where everything from toasters to dog collars to dialysis pumps to running shoes will be connected. Remote robotic surgery will be routine, the military will develop hypersonic weapons, and autonomous vehicles will cruise safely along smart highways. The claims are extravagant, and the stakes are high. One estimate projects that 5G will pump twelve trillion dollars into the global economy by 2035, and add twenty-two million new jobs in the United States alone. This 5G world, we are told, will usher in a fourth industrial revolution.

    A totally connected world will also be especially susceptible to cyberattacks. Even before the introduction of 5G networks, hackers have breached the control center of a municipal dam system, stopped an Internet-connected car as it travelled down an interstate, and sabotaged home appliances. Ransomware, malware, crypto-jacking, identity theft, and data breaches have become so common that more Americans are afraid of cybercrime than they are of becoming a victim of violent crime. Adding more devices to the online universe is destined to create more opportunities for disruption. “5G is not just for refrigerators,” Spalding said. “It’s farm implements, it’s airplanes, it’s all kinds of different things that can actually kill people or that allow someone to reach into the network and direct those things to do what they want them to do. It’s a completely different threat that we’ve never experienced before.”

    Spalding’s solution, he told me, was to build the 5G network from scratch, incorporating cyber defenses into its design.

    There are very good reasons to keep a company that appears to be beholden to a government with a documented history of industrial cyber espionage, international data theft, and domestic spying out of global digital networks. But banning Huawei hardware will not secure those networks. Even in the absence of Huawei equipment, systems still may rely on software developed in China, and software can be reprogrammed remotely by malicious actors. And every device connected to the fifth-generation Internet will likely remain susceptible to hacking. According to James Baker, the former F.B.I. general counsel who runs the national-security program at the R Street Institute, “There’s a concern that those devices that are connected to the 5G network are not going to be very secure from a cyber perspective. That presents a huge vulnerability for the system, because those devices can be turned into bots, for example, and you can have a massive botnet that can be used to attack different parts of the network.”

    This past January, Tom Wheeler, who was the F.C.C. chairman during the Obama Administration, published an Op-Ed in the New York Times titled “If 5G Is So Important, Why Isn’t It Secure?” The Trump Administration had walked away from security efforts begun during Wheeler’s tenure at the F.C.C.; most notably, in recent negotiations over international standards, the U.S. eliminated a requirement that the technical specifications of 5G include cyber defense. “For the first time in history,” Wheeler wrote, “cybersecurity was being required as a forethought in the design of a new network standard—until the Trump F.C.C. repealed it.” The agency also rejected the notion that companies building and running American digital networks were responsible for overseeing their security. This might have been expected, but the current F.C.C. does not consider cybersecurity to be a part of its domain, either. “I certainly did when we were in office,” Wheeler told me. “But the Republicans who were on the commission at that point in time, and are still there, one being the chairman, opposed those activities as being overly regulatory.”

    Opening up new spectrum is crucial to achieving the super-fast speeds promised by 5G. Most American carriers are planning to migrate their services to a higher part of the spectrum, where the bands are big and broad and allow for colossal rivers of data to flow through them. (Some carriers are also working with lower-spectrum frequencies, where the speeds will not be as fast but likely more reliable.) Until recently, these high-frequency bands, which are called millimetre waves, were not available for Internet transmission, but advances in antenna technology have made it possible, at least in theory. In practice, millimetre waves are finicky: they can only travel short distances—about a thousand feet—and are impeded by walls, foliage, human bodies, and, apparently, rain.

    Deploying millions of wireless relays so close to one another and, therefore, to our bodies has elicited its own concerns. Two years ago, a hundred and eighty scientists and doctors from thirty-six countries appealed to the European Union for a moratorium on 5G adoption until the effects of the expected increase in low-level radiation were studied. In February, Senator Richard Blumenthal, a Democrat from Connecticut, took both the F.C.C. and F.D.A. to task for pushing ahead with 5G without assessing its health risks. “We’re kind of flying blind here,” he concluded. A system built on millions of cell relays, antennas, and sensors also offers previously unthinkable surveillance potential. Telecom companies already sell location data to marketers, and law enforcement has used similar data to track protesters. 5G will catalogue exactly where someone has come from, where they are going, and what they are doing. “To give one made-up example,” Steve Bellovin, a computer-science professor at Columbia University, told the Wall Street Journal, “might a pollution sensor detect cigarette smoke or vaping, while a Bluetooth receiver picks up the identities of nearby phones? Insurance companies might be interested.” Paired with facial recognition and artificial intelligence, the data streams and location capabilities of 5G will make anonymity a historical artifact.

    To accommodate these limitations, 5G cellular relays will have to be installed inside buildings and on every city block, at least. Cell relays mounted on thirteen million utility poles, for example, will deliver 5G speeds to just over half of the American population, and cost around four hundred billion dollars to install. Rural communities will be out of luck—too many trees, too few people—despite the F.C.C.’s recently announced Rural Digital Opportunity Fund.

    Deploying millions of wireless relays so close to one another and, therefore, to our bodies has elicited its own concerns. Two years ago, a hundred and eighty scientists and doctors from thirty-six countries appealed to the European Union for a moratorium on 5G adoption until the effects of the expected increase in low-level radiation were studied. In February, Senator Richard Blumenthal, a Democrat from Connecticut, took both the F.C.C. and F.D.A. to task for pushing ahead with 5G without assessing its health risks. “We’re kind of flying blind here,” he concluded. A system built on millions of cell relays, antennas, and sensors also offers previously unthinkable surveillance potential. Telecom companies already sell location data to marketers, and law enforcement has used similar data to track protesters. 5G will catalogue exactly where someone has come from, where they are going, and what they are doing. “To give one made-up example,” Steve Bellovin, a computer-science professor at Columbia University, told the Wall Street Journal, “might a pollution sensor detect cigarette smoke or vaping, while a Bluetooth receiver picks up the identities of nearby phones? Insurance companies might be interested.” Paired with facial recognition and artificial intelligence, the data streams and location capabilities of 5G will make anonymity a historical artifact.

    #Surveillance #Santé #5G #Cybersécurité

  • Four Dead-Simple Ways to Improve Home #wifi Performance
    https://hackernoon.com/four-dead-simple-ways-to-improve-home-wifi-performance-b1f1de0950bd?sour

    Photo: escapejaja / Adobe StockOver the past decade, WiFi has become the internet connection medium of choice that keeps us all connected to our digital lives. As wireless internet access has grown, so too has the number and type of devices we expect our wireless networks to accommodate, and spectrum congestion is becoming an intractable problem in many places. That’s one of the major reasons that hardware vendors are so keen to introduce the new WiFi 6 standard into the market, which is designed from the ground up to cope with congested wireless environments and an ever-larger number of simultaneous device connections.Of course, it’s unrealistic to expect that WiFi 6 is going to become the dominant type of wireless network overnight — especially when you consider the fact that there are (...)

    #internet-service-provider #internet-of-things #router #wifi-router

  • #wifi Cracking
    https://hackernoon.com/wifi-cracking-48ad5594ba60?source=rss----3a8144eabfe3---4

    Noted that cracking into a network that is not yours or you do not have permission to is illegal. All of the networks in the follow article were owned by myself or agreed with the network administrator that these brute force attacks were going to be attempted.Successful crackGeneral IdeaHacking into Networks has a long history. Ever since the advent of the wireless networking, and obvious challenge is securing pieces of data over this non visible network. There have been various attempts at securing this phenom. These security attempts come in a few flavors called:Wired Equivalent Privacy (WEP)Wi-Fi Protected Access (WPA)Wi-Fi Protected Access II (WPA2)All of these methods have proven secure for a periods of time but have been cracked — either due to a actual security flaw, implementation (...)

    #cybersecurity #wifi-cracking #hacking #exploit

  • China’s #Xinjiang Province: A Surveillance State Unlike Any the World Has Ever Seen - SPIEGEL ONLINE
    http://www.spiegel.de/international/world/china-s-xinjiang-province-a-surveillance-state-unlike-any-the-world-has-ever

    At the same time, Beijing is equipping the far-western province with state-of-the-art #surveillance technology, with cameras illuminating every street all over the region, from the capital Urumqi to the most remote mountain village. Iris scanners and WiFi sniffers are in use in stations, airports and at the ubiquitous checkpoints — tools and programs that allow data traffic from wireless networks to be monitored.

    The data is then collated by an “integrated joint operations platform” that also stores further data on the populace — from consumer habits to banking activity, health status and indeed the DNA profile of every single inhabitant of Xinjiang.

    #Chine

  • Meet the People Building Their Own Internet in Detroit - VICE Video : Documentaries, Films, News Videos
    https://video.vice.com/en_us/video/motherboard-dear-future-people-building-their-own-internet-detroit/59cebd5795073d0905939aeb

    When it comes to the internet, our connections are generally controlled by telecom companies. But a group of people in Detroit is trying to change that. Motherboard met with the members of the Equitable Internet Initiative (EII), a group that is building their own wireless networks from the ground up in order to provide affordable and high-speed internet to prevent the creation of a digital class system.

    Sur cette expérience, il faut voir également la thèse de François Huguet : (Re)coudre avec du sans fil. Enquête sur des pratiques de médiation infrastructurelle
    https://hal-montpellier-supagro.archives-ouvertes.fr/TICE/tel-01400991

    #MESH_network #Detroit #Accès_internet #Communs_urbains

    • merci @massivesci

      une histoire #triste supplémentaire à ajouter au systématique #dénigrement_des_femmes

      3. The idea wasn’t adopted at the time, in part due to skepticism that an actress could contribute to technology

      When Lamarr and Antheil approached the National Inventors’ Council to present their device, they were rebuffed. The council suspected it would be too cumbersome to implement the communication system in military crafts.

      She was also rebuffed in her direct attempts to help the war effort. When she offered her expertise in wartime technology to the council, she was denied. They suggested that the “most beautiful woman in films” could make a bigger difference by acting as a spokeswoman for war bonds.
      4. Today, the invention is fundamental to wi-fi, bluetooth technology, and other wireless networks

      In the 1950s, engineers at Sylvania Electric Products began looking seriously at the neglected patent. By the early 1960s, they completed the technology to finally implement frequency hopping – not with a bulky mechanical apparatus, as in the patent, but with an electric signal processing system.

      #informatique #codeuse #crypto #réseau #femme #historicisation (hééé @mad_meg what’s up !-)

  • Internet, we have a problem: Wi-Fi WPA2 security probably broken through key re-installation attack

    Two Belgian researchers, Mathy Vanhoef of KU Leuven and Frank Piessens of imec-DistriNet, are confident they really have done serious damage to WPA2.

    Their paper “Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2” will be formally presented on November 1st at the ACM Conference on Computer and Communications Security.

    https://www.modmy.com/wi-fi-wpa2-security-has-been-krack-ed

    The vulnerability, called KRACK (Key Reinstallation AttaCK), is found within the 4-way handshake process which takes place when a device attempts to connect to a wireless network. This process involves generating unique single-use numbers to secure the connection between the device and the wireless access point. As it turns out, under certain reproducible conditions, such a number (called a nonce) can be reused, which may significantly weaken the encryption for traffic between Wi-Fi access points and devices connecting to them.

    https://www.theregister.co.uk/2017/10/16/wpa2_inscure_krackattack

    The CVE (Common Vulnerabilities and Exposures) numbers for Krack Attack have been reserved. They are CVE-2017-13077, CVE-2017-13078, CVE-2017-13079, CVE-2017-13080, CVE-2017-13081, CVE-2017-13082, CVE-2017-13084, CVE-2017-13086, CVE-2017-13087, and CVE-2017-13088

    https://www.i4u.com/2017/10/124939/wi-fi-wpa2-security-broken

    The researchers published last year a paper titled “Predicting, Decrypting, and Abusing WPA2/802.11 Group Keys.” The core problem for that security problem of Wi-Fi was the 802.11 random number generator allowing predicting its output including the group key. The paper shows how a downgrade-style attack against the 4-way handshake works. The researchers also propose the solution to fix the vulnerability with the random number generator based on randomness extracted from the wireless channel.

    https://www.alexhudson.com/2017/10/15/wpa2-broken-krack-now

    Lots of us have old routers at home, which have no chance of a firmware upgrade, and lots of WiFi equipment that may well not get a protocol upgrade if one is required. Right now, it sounds like all this stuff is going to be worthless from the perspective of encryption.

    #WPA2

  • Ultrafast #wi-fi on horizon as scientists send data at 100 times current speeds
    http://www.telegraph.co.uk/science/2017/08/10/ultrafast-wi-fi-horizon-scientists-send-data-100-times-current

    The researchers sent video signals using terahertz, rather than traditional microwaves, at speeds of 50 gigabytes per second. Most wireless networks only operate at top speeds of 500 megabytes a second.

    #vitesse #internet

  • Berkeley Votes to Make Cell Phone Retailers Warn Customers About Health Risks | Mother Jones
    http://www.motherjones.com/environment/2015/05/berkeley-cell-phone-law-right-know-ordinance

    “If you carry or use your phone in a pants or shirt pocket or tucked into a bra when the phone is ON and connected to a wireless network, you may exceed the federal guidelines for exposure to RF radiation,” the notice, which must be posted in stores that sell cell phones, reads in part. “This potential risk is greater for children. Refer to the instructions in your phone or user manual for information about how to use your phone safely.”

    Ah bin enfin quelqu’un le dit officiellement.

    • Pendant ce temps (dans le même article) :

      Cell phones emit non-ionizing radiation in the form of electromagnetic fields (EMF) that can penetrate human tissues. Although ionizing radiation, the kind used in x-rays, is known to cause cancer, the National Cancer Institute says there is no evidence that non-ionizing radiation increases cancer risk. The American Cancer Society calls the evidence for a cell phone-cancer link “uncertain.” The federal Centers for Disease Control maintains that “we do not have the science to link health problems to cell phone use.”

  • SigFox Installing a Cellular Network for the Internet of Things in San Francisco and #Silicon_Valley | MIT Technology Review
    http://www.technologyreview.com/news/527376/silicon-valley-to-get-a-cellular-network-just-for-things

    San Francisco is set to get a new cellular network later this year, but it won’t help fix the city’s spotty mobile-phone coverage. This wireless network is exclusively for things.

    The French company SigFox says it picked the Bay Area to demonstrate a wireless network intended to make it cheap and practical to link anything to the Internet, from smoke detectors to dog collars, bicycle locks, and water pipes.

    A SigFox base station can serve a radius of tens of kilometers in the countryside and five kilometers in urban areas. To connect to the network, a device will need a $1 or $2 wireless chip that’s compatible, and customers will pay about $1 in service charges per year per device.

    #iot #internet_des_objets

  • At Newark Airport, the Lights Are On, and They’re Watching You - NYTimes.com

    http://www.nytimes.com/2014/02/18/business/at-newark-airport-the-lights-are-on-and-theyre-watching-you.html?nl=todaysh

    Visitors to Terminal B at Newark Liberty International Airport may notice the bright, clean lighting that now blankets the cavernous interior, courtesy of 171 recently installed LED fixtures. But they probably will not realize that the light fixtures are the backbone of a system that is watching them.

    Using an array of sensors and eight video cameras around the terminal, the light fixtures are part of a new wireless network that collects and feeds data into software that can spot long lines, recognize license plates and even identify suspicious activity, sending alerts to the appropriate staff.

    #contrôle #sécurité #suveillance #cctv