With 5G rising on the horizon, it’s an exciting time to be an RF engineer. As we embark on the road to 5G, the next-generation wireless communications system, there are countless challenges and opportunities emerging for the engineering community. 5G represents both an evolution and a revolution of mobile technologies that reaches the various high level goals that have been published to date by various members of the wireless ecosystem.
5G is widely seen as the generation of wireless that will enable cellular to expand into a completely new set of use, case, and vertical markets. While 5G is generally seen in technology that delivers ultrabroadband services, including HD and ultraHD video streaming, 5G technology will also enable cellular to enter the world of machines. It will contribute to autonomous vehicles and be used to connect millions of industrial sensors and a multitude of wearable consumer devices, to name a few applications.
CIA leak: Agency can turn Smart phomes into spy devices
Perhaps what is most notable is the purported emergence of another Snowden-type whistleblower: the source of the information told WikiLeaks in a statement that they wish to initiate a public debate about the “security, creation, use, proliferation and democratic control of cyberweapons.” Policy questions that should be debated in public include “whether the CIA’s hacking capabilities exceed its mandated powers and the problem of public oversight of the agency,” WikiLeaks claims the source said.
CIA ‘Signature School’ is creating total surveillance Smart Cities
Pegasus Global Holdings (PGH) a Trademark of Mobile Arch Partners (MAP) is working with DHS, the CIA , the Department of Defense (DOD) and the Department of Transportation (DOT) to create total surveillance Smart Cities.
The Center for Innovation Testing and Evaluation, the University of New Mexico (UNM) and numerous high-tech companies are helping design Smart Cities that will spy on everyone.
From Ty Bollinger, The Truth about Cancer
What is EMR and how can you protect yourself from it?… (Powerful interview)
The past couple of days you’ve learned about the dangers of cellphone radiation and what you can do to minimize your exposure to dirty electricity.
One of the ways manmade electromagnetic fields wreak havoc on cells is by disrupting the pineal gland.
which blocks your ability to produce melatonin.
In this compelling interview I did with Dr. Igor Smirnov, he explains what EMR is, how it effects your body and what you can do to lower your risk of side effects.
Click here to watch the interview>>
Most of us (including myself) need these conveniences to run our businesses, but you have to find a way to reduce exposure.
Please share this link with your friends and family on Facebook and Pinterest and be sure to let me know what you think in the Comments section below the video.
PS. Watch this interview to learn how to lower your risk and exposure to EMR- You'll be glad you did : - )
Wikileaks unveils 'Vault 7': ‘The largest ever publication of confidential CIA Documents’; another Snowden emerges
Julian Assange, WikiLeaks editor stated that "There is an extreme proliferation risk in the development of cyber 'weapons'. Comparisons can be drawn between the uncontrolled proliferation of such 'weapons', which results from the inability to contain them combined with their high market value, and the global arms trade. But the significance of "Year Zero" goes well beyond the choice between cyberwar and cyberpeace. The disclosure is also exceptional from a political, legal and forensic perspective."
Key Highlights from the Vault 7 release so far:
◦ "Year Zero" introduces the scope and direction of the CIA's global covert hacking program, its malware arsenal and dozens of "zero day" weaponized exploits against a wide range of U.S. and European company products, include Apple's iPhone, Google's Android and Microsoft's Windows and even Samsung TVs, which are turned into covert microphones.
◦ Wikileaks claims that the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized "zero day" exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.
◦ By the end of 2016, the CIA's hacking division, which formally falls under the agency's Center for Cyber Intelligence (CCI), had over 5000 registered users and had produced more than a thousand hacking systems, trojans, viruses, and other "weaponized" malware. Such is the scale of the CIA's undertaking that by 2016, its hackers had utilized more code than that used to run Facebook.
◦ The CIA had created, in effect, its "own NSA" with even less accountability and without publicly answering the question as to whether such a massive budgetary spend on duplicating the capacities of a rival agency could be justified.
◦ Once a single cyber 'weapon' is 'loose' it can spread around the world in seconds, to be used by rival states, cyber mafia and teenage hackers alike.
◦ In a statement to WikiLeaks the source details policy questions that they say urgently need to be debated in public, including whether the CIA's hacking capabilities exceed its mandated powers and the problem of public oversight of the agency. The source wishes to initiate a public debate about the security, creation, use, proliferation and democratic control of cyberweapons.
CIA targets iPhones, Androids, smart TVs:
◦ CIA malware and hacking tools are built by EDG (Engineering Development Group), a software development group within CCI (Center for Cyber Intelligence), a department belonging to the CIA's DDI (Directorate for Digital Innovation). The DDI is one of the five major directorates of the CIA (see this organizational chart of the CIA for more details).
◦ The increasing sophistication of surveillance techniques has drawn comparisons with George Orwell's 1984, but "Weeping Angel", developed by the CIA's Embedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones, is surely its most emblematic realization.
Also cars, suggesting that the CIA may have a role in the death of Michael Hastings:
◦ As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks.
◦ The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.
◦ The CIA also runs a very substantial effort to infect and control Microsoft Windows users with its malware. This includes multiple local and remote weaponized "zero days", air gap jumping viruses such as "Hammer Drill" which infects software distributed on CD/DVDs, infectors for removable media such as USBs, systems to hide data in images or in covert disk areas ( "Brutal Kangaroo") and to keep its malware infestations
Self-driving Volkswagen 'Sedric' pod unveiled as your futuristic personal chauffeur