Examining a Crime Scene Bullet by bullet by new Algorithm

Source: NIST (National Institute of standard and technology) a story March 22, 1915, residents of the small town of West Shelby, New York, awoke to a horrific scene. A woman clad only in a bloodied nightgown lay shot to death in the snow on the doorstep of an immigrant farmhand, Charles Stielow. Across the street, … Continue reading Examining a Crime Scene Bullet by bullet by new Algorithm

Cloning Millions of Toyota, Hyundai, and Kia Keys becomes easy.

Researchers found problems in how Toyota, Hyundai, and Kia implement a Texas Instruments encryption system called DST80. Relay attacks, in which hackers exploit radio-enabled keys to steal vehicles without leaving a trace.A few cryptographic flaws combined with a little old-fashioned hot-wiring or even a well-placed screwdriver lets hackers clone those keys and drive away in seconds. … Continue reading Cloning Millions of Toyota, Hyundai, and Kia Keys becomes easy.

Identifying someone by their Heartbeat from a distance.

CREATING A POLICE STATE Combating Terrorism Technical Support Office (cttso), an agency of the defence department, has now developed a system, dubbed Jetson, is able to measure, from up to 200 metres away, the minute vibrations induced in clothing by someone’s heartbeat. Since hearts differ in both shape and contraction pattern, the details of heartbeats differ, … Continue reading Identifying someone by their Heartbeat from a distance.