CYBERTERRORISM INTRODUCTION TO A NEW FORM OF HIGH TECH CRIME Just Freedom Now EMAIL JUSTFREEDOMNOW GMAIL COM For Questions Comments 832 304 4293 Ashli CYBERTERRORISM INTRODUCTION TO A NEW FORM OF HIGH TECH CRIME Just Freedom Now EMAIL JUSTFREEDOMNOW GMAIL COM For Questions Comments 832 304 4293 Ashli
2 Note to Reader Thank you for taking the time to read this information If you have any questions please contact me at the email or phone number listed above I wrote this because I became aware of a new form crime and I attempted to notify police I was told that the crime was impossible I didn t like that answer so I started calling all types of agencies talking to black hat hackers and doing my own research I found out that there is an underground high tech market and the criminals there are involved in some serious predatory crimes Hackers have paired with gangs predators enthusiasts white collar criminals and other high tech criminals and they have they been utilizing quantum free space laser saser systems to commit an entire book of crimes Most people don t know that their privacy can be violated in their homes businesses while driving going for a run in the shower while on the phone on the cell or even while in mid flight High tech criminals have begun to blur the lines of technological freedom privacy and human rights Many people blame the government for violating privacy but the government is not the threat Especially when a high tech criminal group is actively violating the law and human rights and no one is taking a stand I have spoken to quite a few victims and they are afraid This is America and women and men are afraid of these new types of criminals These new types of criminals can remain anonymous but can violate a person in a location other than their own This should be frightening I have drafted this to talk about various new or underdiscussed developments in high tech crime telecommunications technology neurotechnology laser technology and haptics Note that I know for most of you these concepts will seem quite futuristic but they are being utilize today Quite are few are being used criminally by a new dangerous breed of high tech criminals who are interested in more than your credit card number If you ever wondered what hackers would be capable of know that today it is anything even voyeurism drug trafficking and sex crimes It has never been a matter of if hackers would evolve but when The question is whether or not we are going to allow them to continue victimize the most vulnerable people in our populations businesses and our government and get away with it Technology is not going anywhere but if we don t address new aspects of crime and this new element in high tech crime these criminals will make the rule of law invalid We have hackers who have established a criminal network that violates human rights and preys on women and children in their home environments Specifically the high tech black market network that inspired publication is dangerous and they are involved in what can only be considered terrorism in America They are carrying out major crimes using new methods and since most people think laser technology is association with sci fiction the criminals have entire market that is not being policed We have forgotten that even in America there are militant organizations that act outside of the parameter of the law We have forgotten that we are truly in this together These criminals have taken it too far and something has to be done To deny a human being their innate rights to privacy life and liberty is to jeopardize the liberties of everyone who resides in this country And this is what they are doing Feel free to forward this to someone Ashli Author 2 Note to Reader Thank you for taking the time to read this information If you have any questions please contact me at the email or phone number listed above I wrote this because I became aware of a new form crime and I attempted to notify police I was told that the crime was impossible I didn t like that answer so I started calling all types of agencies talking to black hat hackers and doing my own research I found out that there is an underground high tech market and the criminals there are involved in some serious predatory crimes Hackers have paired with gangs predators enthusiasts white collar criminals and other high tech criminals and they have they been utilizing quantum free space laser saser systems to commit an entire book of crimes Most people don t know that their privacy can be violated in their homes businesses while driving going for a run in the shower while on the phone on the cell or even while in mid flight High tech criminals have begun to blur the lines of technological freedom privacy and human rights Many people blame the government for violating privacy but the government is not the threat Especially when a high tech criminal group is actively violating the law and human rights and no one is taking a stand I have spoken to quite a few victims and they are afraid This is America and women and men are afraid of these new types of criminals These new types of criminals can remain anonymous but can violate a person in a location other than their own This should be frightening I have drafted this to talk about various new or underdiscussed developments in high tech crime telecommunications technology neurotechnology laser technology and haptics Note that I know for most of you these concepts will seem quite futuristic but they are being utilize today Quite are few are being used criminally by a new dangerous breed of high tech criminals who are interested in more than your credit card number If you ever wondered what hackers would be capable of know that today it is anything even voyeurism drug trafficking and sex crimes It has never been a matter of if hackers would evolve but when The question is whether or not we are going to allow them to continue victimize the most vulnerable people in our populations businesses and our government and get away with it Technology is not going anywhere but if we don t address new aspects of crime and this new element in high tech crime these criminals will make the rule of law invalid We have hackers who have established a criminal network that violates human rights and preys on women and children in their home environments Specifically the high tech black market network that inspired publication is dangerous and they are involved in what can only be considered terrorism in America They are carrying out major crimes using new methods and since most people think laser technology is association with sci fiction the criminals have entire market that is not being policed We have forgotten that even in America there are militant organizations that act outside of the parameter of the law We have forgotten that we are truly in this together These criminals have taken it too far and something has to be done To deny a human being their innate rights to privacy life and liberty is to jeopardize the liberties of everyone who resides in this country And this is what they are doing Feel free to forward this to someone Ashli Author
3 CYBERTERRORISM INTRODUCTION TO A NEW FORM OF HIGH TECH CRIME Crime Prevention is the anticipation recognition and appraisal of crime risk and the initiation of some action to remove or reduce it1 A new form of computer based hightech crime has emerged This brochure seeks to familiarize its readers with a few current trends in high tech crime High tech criminals HTC are engineering new technologies2 that violate human rights and have made their crimes easier to commit Our experience with cybercrime has conditioned us to think that hackers i e high tech criminals only use the internet to carry out their crimes We think high tech criminals are motivated by hacking phreaking stealing passwords phishing ID theft child pornography harassment financial crimes cyberbullying and cyber stalking However there is much more to cybercrime than we ve been led to believe New forms of high tech crime present us with new problems in addition to the old fashioned ones Today s high tech criminals utilize technology that allows them to commit traditional types of crime without leaving their homes3 Advancements in quantum telecommunication4 high band optics interactive systems5 user and full body interface6 ultrahaptics7 laser technology8 and neurotechnology9 are but a few of the new technologies hackers have added to their resume These new crime markets allow HTC to use focused ultrasound for wireless noninvasive neuromodulation10 which is used in research to affect brain activity and isn t supposed to be wireless Modified free space technologies 11 are being combined with computer brain interface systems to affect involuntary victims New technology and the rise of entangled data transmission allows force feedback type sensations and controlled output and input in free space atmosphere mid air that can be transmit from one location to another and can create a localized force 12 where touch and pressure can be felt in mid air Eavesdropping for these criminals is only a laser microphone13 or sound wave like laser beam away Their advanced systems utilize energy that can pass through walls windows acquire high resolution imagery 14 with total anonymity15 over an undetermined distance This level of crime has an increased risk for children women16 private and public businesses and our important infrastructures As necessary as the listed technologies are to the improvement of our society in the fields of science and technology it is imperative that we focus our attention on establishing methods that prevent high tech crime and push law enforcement to do the same 3 CYBERTERRORISM INTRODUCTION TO A NEW FORM OF HIGH TECH CRIME Crime Prevention is the anticipation recognition and appraisal of crime risk and the initiation of some action to remove or reduce it1 A new form of computer based hightech crime has emerged This brochure seeks to familiarize its readers with a few current trends in high tech crime High tech criminals HTC are engineering new technologies2 that violate human rights and have made their crimes easier to commit Our experience with cybercrime has conditioned us to think that hackers i e high tech criminals only use the internet to carry out their crimes We think high tech criminals are motivated by hacking phreaking stealing passwords phishing ID theft child pornography harassment financial crimes cyberbullying and cyber stalking However there is much more to cybercrime than we ve been led to believe New forms of high tech crime present us with new problems in addition to the old fashioned ones Today s high tech criminals utilize technology that allows them to commit traditional types of crime without leaving their homes3 Advancements in quantum telecommunication4 high band optics interactive systems5 user and full body interface6 ultrahaptics7 laser technology8 and neurotechnology9 are but a few of the new technologies hackers have added to their resume These new crime markets allow HTC to use focused ultrasound for wireless noninvasive neuromodulation10 which is used in research to affect brain activity and isn t supposed to be wireless Modified free space technologies 11 are being combined with computer brain interface systems to affect involuntary victims New technology and the rise of entangled data transmission allows force feedback type sensations and controlled output and input in free space atmosphere mid air that can be transmit from one location to another and can create a localized force 12 where touch and pressure can be felt in mid air Eavesdropping for these criminals is only a laser microphone13 or sound wave like laser beam away Their advanced systems utilize energy that can pass through walls windows acquire high resolution imagery 14 with total anonymity15 over an undetermined distance This level of crime has an increased risk for children women16 private and public businesses and our important infrastructures As necessary as the listed technologies are to the improvement of our society in the fields of science and technology it is imperative that we focus our attention on establishing methods that prevent high tech crime and push law enforcement to do the same
4 TABLE OF CONTENTS INTRODUCTION P 2 4 222 FREE SPACE OPTIC QUANTUM TELECOMMUNICATION P 5 6 Hackers high tech criminals and cyber criminals all commit computer based crimes High tech criminals however are electronic specialists that also engineer technology to make their crimes more efficient High tech criminals have developed new behaviors17 that allow them to keep a theme of professionalism in their industry This report addresses new technologies and some of the innovative strategies currently being used to commit new technological crimes The goal is to provide you with information to create awareness inspire further investigation research and policy change Cybercrime has soared to new heights and unprecedented levels It is impossible to examine every high tech criminal dynamic therefore this will serve to magnifying new technologies and high tech trends that appear to be in their infancy stage Note that traditional cybercrime is still a major concern but the higher level hackers appear to be less concerned with your data and more concerned with your physical body18 Law enforcement and policy makers must acknowledge these threats and realize their potential impact on both crime and human rights today Many individuals are unaware of the limitless direction the technology science and telecommunication industries are gearing toward Therefore they cannot conceive the dangers posed by current trends The new behaviors and practices of cybercriminals should force experts to reconsider everything that is known about cyber threats Experts need to work to counteract the direction in which these criminals are evolving toward A clear definition of cybercrime and high tech crime needs to be established It s important that those responsible for pertinent policies and local and federal law enforcement grasp that while a solution was needed yesterday it requires one today CURRENT TRENDS IN HIGH TECH CRIME HIGHTECH ENERGY WEAPONS P 7 15 NEW BLACKMARKET CRIMES HIGH TECH SEX TRADE SLAVERY CRIMES AGAIINST CHILDREN P 16 HIGH TECH AMERICAN TERRORIST NETWORK P 17 WHY HAVEN T YOU HEARD ABOUT THIS CRIME P 18 4 TABLE OF CONTENTS INTRODUCTION P 2 4 222 FREE SPACE OPTIC QUANTUM TELECOMMUNICATION P 5 6 Hackers high tech criminals and cyber criminals all commit computer based crimes High tech criminals however are electronic specialists that also engineer technology to make their crimes more efficient High tech criminals have developed new behaviors17 that allow them to keep a theme of professionalism in their industry This report addresses new technologies and some of the innovative strategies currently being used to commit new technological crimes The goal is to provide you with information to create awareness inspire further investigation research and policy change Cybercrime has soared to new heights and unprecedented levels It is impossible to examine every high tech criminal dynamic therefore this will serve to magnifying new technologies and high tech trends that appear to be in their infancy stage Note that traditional cybercrime is still a major concern but the higher level hackers appear to be less concerned with your data and more concerned with your physical body18 Law enforcement and policy makers must acknowledge these threats and realize their potential impact on both crime and human rights today Many individuals are unaware of the limitless direction the technology science and telecommunication industries are gearing toward Therefore they cannot conceive the dangers posed by current trends The new behaviors and practices of cybercriminals should force experts to reconsider everything that is known about cyber threats Experts need to work to counteract the direction in which these criminals are evolving toward A clear definition of cybercrime and high tech crime needs to be established It s important that those responsible for pertinent policies and local and federal law enforcement grasp that while a solution was needed yesterday it requires one today CURRENT TRENDS IN HIGH TECH CRIME HIGHTECH ENERGY WEAPONS P 7 15 NEW BLACKMARKET CRIMES HIGH TECH SEX TRADE SLAVERY CRIMES AGAIINST CHILDREN P 16 HIGH TECH AMERICAN TERRORIST NETWORK P 17 WHY HAVEN T YOU HEARD ABOUT THIS CRIME P 18
5 Free Space Optic Quantum Telecommunication Due to growing demands in the communication and technology sectors researchers predict that if we continue using data at such an astronomical rate we will eventually run out of bandwidth This assessment has prompted commercial businesses and governments to explore other methods of data transmission that are self sustaining efficient faster and eco friendly in order to meet current and future estimated bandwidth needs19 Simply put we are running out of data20 Free space optical FSO quantum telecommunication systems21 seeks to be one of the solutions to our data problem FSOs use some of the principles of quantum physics to achieve quantum teleportation22 and offer a perfectly secure cryptographic key between parties FSOs allow more powerful computing techniques and modifications Any wave issues can be mitigated with Adaptive Optics AO which is also used in real time astronomy challenges for space telescopy AO easily optimizes the performance quality speed and signal strength of an FSO system Since FSOs have the ability to transmit digital video and audio data at extremely high bandwidths using superluminal speeds over large distances through midair i e free space optic laser systems have made the possibilities of technology limitless Hackers have developed free space systems that allow them to acquire real time images video that can be magnified 100 000x by teleporting light laser saser Their systems can even see thru walls using sound waves or see inside the human body with the right optics modification FREE SPACE OPTICS QUANTUM TELECOMMUNICATION Free spaces systems use of smart lighting techniques differ from traditional fiber optics technologies because they do not require a physical medium through which to pass information Free space optics use lasers beams to transmit data directly through the atmosphere Because FSOs are tunable to other wavelengths and can be modified to transmit high capacities of sound waves they provide an attractive alternative to conventional RF23 These systems can theoretically be built to support large numbers of processing elements relatively inexpensively24 with the incorporation of laser technology25 The appeal of systems like those mentioned to high tech criminals is obvious as FSOs are said to operate with speed capacity and security 26 Advanced high tech criminals are not trailing behind but instead are discreetly in front leading the global move toward responsible energy use underground As businesses develop more efficient ways to manage data high tech criminals have found ways to exploit these innovations and victimize people more effiecently27 HTC have been waiting for the rest of the world to catch up Hackers have evolved their practices to make their crimes more profitable they choose specialties master their skills create networks of colleagues and organize their crimes 28 They exploit new technologies that give them the near omnipotent ability to do more than just hack a system Hackers seek to control and dominate the telecommunications industry Now they want to hack us literally Surprise Technology no longer consists of just computers Teleportation is a quantum version of the process familiar from Star Trek the person molecule atom to be teleported dematerializes here and rematerializes over there Trap Door Time and Space PBS 5 Free Space Optic Quantum Telecommunication Due to growing demands in the communication and technology sectors researchers predict that if we continue using data at such an astronomical rate we will eventually run out of bandwidth This assessment has prompted commercial businesses and governments to explore other methods of data transmission that are self sustaining efficient faster and eco friendly in order to meet current and future estimated bandwidth needs19 Simply put we are running out of data20 Free space optical FSO quantum telecommunication systems21 seeks to be one of the solutions to our data problem FSOs use some of the principles of quantum physics to achieve quantum teleportation22 and offer a perfectly secure cryptographic key between parties FSOs allow more powerful computing techniques and modifications Any wave issues can be mitigated with Adaptive Optics AO which is also used in real time astronomy challenges for space telescopy AO easily optimizes the performance quality speed and signal strength of an FSO system Since FSOs have the ability to transmit digital video and audio data at extremely high bandwidths using superluminal speeds over large distances through midair i e free space optic laser systems have made the possibilities of technology limitless Hackers have developed free space systems that allow them to acquire real time images video that can be magnified 100 000x by teleporting light laser saser Their systems can even see thru walls using sound waves or see inside the human body with the right optics modification FREE SPACE OPTICS QUANTUM TELECOMMUNICATION Free spaces systems use of smart lighting techniques differ from traditional fiber optics technologies because they do not require a physical medium through which to pass information Free space optics use lasers beams to transmit data directly through the atmosphere Because FSOs are tunable to other wavelengths and can be modified to transmit high capacities of sound waves they provide an attractive alternative to conventional RF23 These systems can theoretically be built to support large numbers of processing elements relatively inexpensively24 with the incorporation of laser technology25 The appeal of systems like those mentioned to high tech criminals is obvious as FSOs are said to operate with speed capacity and security 26 Advanced high tech criminals are not trailing behind but instead are discreetly in front leading the global move toward responsible energy use underground As businesses develop more efficient ways to manage data high tech criminals have found ways to exploit these innovations and victimize people more effiecently27 HTC have been waiting for the rest of the world to catch up Hackers have evolved their practices to make their crimes more profitable they choose specialties master their skills create networks of colleagues and organize their crimes 28 They exploit new technologies that give them the near omnipotent ability to do more than just hack a system Hackers seek to control and dominate the telecommunications industry Now they want to hack us literally Surprise Technology no longer consists of just computers Teleportation is a quantum version of the process familiar from Star Trek the person molecule atom to be teleported dematerializes here and rematerializes over there Trap Door Time and Space PBS
6 Optics communication opens up an entirely new level of communication Hacker establishes full duplex communication with light beams almost 100 miles http hackaday com 2012 09 22 communicating with a beam of light FSOs has many benefits but the disadvantages may protect the cybercriminals exploiting this technology33 FSOs have no RF license requirement34 because they primarily use visible light and other wavelengths on the electromagnetic spectrum This means anyone can set up a system and theirs no way to track it It may prove difficult to regulate light or sound Its like trying to regulate the sun However license requirements should require that operators at least register when using FSOs or similar technologies This would help track free space systems and help easily identify systems that are being used for off the radar purpose Trends can quickly turn into threats especially when cybercriminals come into play FSOs has been around for decades35 but many people are unfamiliar with the technology Cybercriminals aren t They have been using technologies like FSOs for years and now they are building and modifying similar systems and using them to violate privacy voyeuristic crimes commit human rights violations crimes against children crimes against businesses and to remain steps ahead of government Technology is at a revolutionary stage Optics laser sound wave and innovative electronics are commonplace Now is a good time for policy makers and law enforcement to start addressing these dangerous high tech crime issues lest they see more of these new types of crimes emerge in coming years Newsflash Hackers have established an underground market One that dispenses and deals in technology where anyone with enough money to spend has the opportunity to purchase a system that allows everything from the wireless sexual assault of a child to eavesdropping on agencies like the DEA FBI or local police to find out if they are planning a raid or other activities These criminals have designed systems that allow private data to be accessed without hacking using only sound waves These high tech criminals are providing equipment to special interest groups who have a history of violence such as anti abortionist and other domestic criminal groups Technology is being sold that can terrorize kill assault and violate in unspeakable ways with little to no risk of being caught Technology that allows them free access to people in their home or work environments and the ability to acquire sensitive information about a person or business from miles away This new trend seeks to grow if ignored There is an entire market of interactive systems with sensors that simulate real touch using electrical pulses29 and holography30 Neurotechnology allows devices to be controlled with thought and computers alone Full body gaming technology can be modified by developers at their discretion 31 Our society is infatuated with technology32 and that s not going to change Prevention and acknowledgement of these new threats is important Each day that passes more black market systems are being designed sold and more people are put at risk FREE SPACE SYSTEMS 6 Optics communication opens up an entirely new level of communication Hacker establishes full duplex communication with light beams almost 100 miles http hackaday com 2012 09 22 communicating with a beam of light FSOs has many benefits but the disadvantages may protect the cybercriminals exploiting this technology33 FSOs have no RF license requirement34 because they primarily use visible light and other wavelengths on the electromagnetic spectrum This means anyone can set up a system and theirs no way to track it It may prove difficult to regulate light or sound Its like trying to regulate the sun However license requirements should require that operators at least register when using FSOs or similar technologies This would help track free space systems and help easily identify systems that are being used for off the radar purpose Trends can quickly turn into threats especially when cybercriminals come into play FSOs has been around for decades35 but many people are unfamiliar with the technology Cybercriminals aren t They have been using technologies like FSOs for years and now they are building and modifying similar systems and using them to violate privacy voyeuristic crimes commit human rights violations crimes against children crimes against businesses and to remain steps ahead of government Technology is at a revolutionary stage Optics laser sound wave and innovative electronics are commonplace Now is a good time for policy makers and law enforcement to start addressing these dangerous high tech crime issues lest they see more of these new types of crimes emerge in coming years Newsflash Hackers have established an underground market One that dispenses and deals in technology where anyone with enough money to spend has the opportunity to purchase a system that allows everything from the wireless sexual assault of a child to eavesdropping on agencies like the DEA FBI or local police to find out if they are planning a raid or other activities These criminals have designed systems that allow private data to be accessed without hacking using only sound waves These high tech criminals are providing equipment to special interest groups who have a history of violence such as anti abortionist and other domestic criminal groups Technology is being sold that can terrorize kill assault and violate in unspeakable ways with little to no risk of being caught Technology that allows them free access to people in their home or work environments and the ability to acquire sensitive information about a person or business from miles away This new trend seeks to grow if ignored There is an entire market of interactive systems with sensors that simulate real touch using electrical pulses29 and holography30 Neurotechnology allows devices to be controlled with thought and computers alone Full body gaming technology can be modified by developers at their discretion 31 Our society is infatuated with technology32 and that s not going to change Prevention and acknowledgement of these new threats is important Each day that passes more black market systems are being designed sold and more people are put at risk FREE SPACE SYSTEMS
7 Cybercrime or High Tech Crime Not Just in Cyberspace Anymore We already know that cybercriminals are creative and have evolved Dr Sabina Burton associate professor in the Department of Criminal Justice at UW Platteville spoke at the Profiling Hackers Who are the Cyber Criminals forum where she offered the following statement We are now seeing an emerging trend with traditional organized crime syndicates and criminally minded technology professionals working together pooling their resources and expertise Understanding the mindset of the people behind these illegal operations has become more important than ever 36 For so long computers have been the primary vessel used by cybercriminals to commit crimes like hacking i e computer intrusion identity theft stalking and cyber harassment The aforementioned crimes all fall under the traditional cybercrime umbrella However cybercrime has changed and most are unaware of what said changes entail The new behaviors of cyber criminals and the technologies they use to commit crimes demand a redefinition and reassessment of the threats to the cyber sector A classification criteria for traditional computerbased criminals needs to be established as well as the criteria for current and future computer criminals who engineer weapons and commit computer intrusion Or we can all continue to use the same jargon to reference them all smile Today high tech criminals are involved in well designed and well disguised hightech crimes A few crimes that can be committed include public and private privacy violations federal and local broadcast intrusion human rights violations engagement in sexual crimes and presumably other crimes that impact individuals outside of cyberspace like drug smuggling obstruction of justice assault attempted murder extortion and cyber terrorism using modified free space saser laser technology and off the radar communication systems The potential dangers of these highly intelligent criminals seeks to carry over to our important infrastructure if it already hasn t New Trends High Tech Weapons Haptics Energy Many years ago there existed a plethora of creative technological concepts but no practical way to utilize them There was not enough data to meet the demands of futuristic technologies The bandwidth problem has since been resolved as evidenced by the wave of new technologies inundating the market Now there are ways to maintain transmit and store38 huge amounts of data Most people are unaware that any part of the electromagnetic spectrum can used to carry data sound or visual New technologies that simulate physical sensation neurofeedback and thought only interfaces are becoming more common Certain interfaces are capable of producing simulated touch via holographic midair displays39 using sound waves Others involve whole body interactions in which users are able to feel simulated virtual reality or physically feel each other miles away or actions via sensors placed on a suit that generate pulses that stimulate neuroreceptors to produce lifelike sensations40 Sound waves allow haptic feedback and the ability to manipulate digital content in the real world41 using an ultrasound base Ultrasonic interactive technologies are growing in popularity Remember there is a blackmaket and they already have technology years before papers are released on it CURRENT TRENDS IN HIGH TECH CRIME HIGHTECH ENERGY WEAPONS 7 Cybercrime or High Tech Crime Not Just in Cyberspace Anymore We already know that cybercriminals are creative and have evolved Dr Sabina Burton associate professor in the Department of Criminal Justice at UW Platteville spoke at the Profiling Hackers Who are the Cyber Criminals forum where she offered the following statement We are now seeing an emerging trend with traditional organized crime syndicates and criminally minded technology professionals working together pooling their resources and expertise Understanding the mindset of the people behind these illegal operations has become more important than ever 36 For so long computers have been the primary vessel used by cybercriminals to commit crimes like hacking i e computer intrusion identity theft stalking and cyber harassment The aforementioned crimes all fall under the traditional cybercrime umbrella However cybercrime has changed and most are unaware of what said changes entail The new behaviors of cyber criminals and the technologies they use to commit crimes demand a redefinition and reassessment of the threats to the cyber sector A classification criteria for traditional computerbased criminals needs to be established as well as the criteria for current and future computer criminals who engineer weapons and commit computer intrusion Or we can all continue to use the same jargon to reference them all smile Today high tech criminals are involved in well designed and well disguised hightech crimes A few crimes that can be committed include public and private privacy violations federal and local broadcast intrusion human rights violations engagement in sexual crimes and presumably other crimes that impact individuals outside of cyberspace like drug smuggling obstruction of justice assault attempted murder extortion and cyber terrorism using modified free space saser laser technology and off the radar communication systems The potential dangers of these highly intelligent criminals seeks to carry over to our important infrastructure if it already hasn t New Trends High Tech Weapons Haptics Energy Many years ago there existed a plethora of creative technological concepts but no practical way to utilize them There was not enough data to meet the demands of futuristic technologies The bandwidth problem has since been resolved as evidenced by the wave of new technologies inundating the market Now there are ways to maintain transmit and store38 huge amounts of data Most people are unaware that any part of the electromagnetic spectrum can used to carry data sound or visual New technologies that simulate physical sensation neurofeedback and thought only interfaces are becoming more common Certain interfaces are capable of producing simulated touch via holographic midair displays39 using sound waves Others involve whole body interactions in which users are able to feel simulated virtual reality or physically feel each other miles away or actions via sensors placed on a suit that generate pulses that stimulate neuroreceptors to produce lifelike sensations40 Sound waves allow haptic feedback and the ability to manipulate digital content in the real world41 using an ultrasound base Ultrasonic interactive technologies are growing in popularity Remember there is a blackmaket and they already have technology years before papers are released on it CURRENT TRENDS IN HIGH TECH CRIME HIGHTECH ENERGY WEAPONS
8 Though most of the technologies listed above have been around for over a decade most civilians and most law enforcement officers are unaware 42 that such technologies are popular amongst members of the black market cyber community44 Eagerly these computer criminals use their skills in development and computer engineering to modify and reprogram systems to improve their function and capabilities High tech criminals have engineered methods similar to the concepts described above that are more advanced can reach further distances and are more high tech to create systems that allow them to simulate actual touch from a remote location and they can aim at anyone within the radius of their technology But you would never know it unless they wanted you to By exploiting the advantages of new technological developments focused ultrasound multiplexing technologies like AO and free space laser technology these hackers have established a new market that has an unlimited reach They can aim and track anyone in the United States anywhere This market is one that involves remote interaction with the real world using laser sound wave laser like beams and laser technology A frightening new element to crime and the predatory crimes industry Hackers have done what high tech criminals do they found insidious alternative uses for technology otherwise used to make our society function better Although these new and dangerous methods of crime have been looming around very few people are talking about them ostensibly because they don t know how these crimes are being carried out or why discussing them is important While most individuals think lasers are synonymous with science fiction movies you use lasers every day Your TV remote CD player Blu ray player and DVD player all operate with laser technology If you work for a commercial company and they have fiber optics you are using a laser Know that hackers have changed and they have paired with other crimes and they are all using lasers to assault and commit other types of crimes Don t be surprised Hackers today are educated individuals who work in professional environments and organizations They belong to groups and they don t look like what we expect criminals to look like But they are responsible for these new crimes being committed by them and other types of criminals that they have sold the technology to A hackers crime use to be limited to cyber space As they have added violent and predatory crimes against individuals government and women to their resume Know that their crimes can only be viewed as high tech terrorism as they are using advanced light sound based technologies as tools weapons It is unlawful to contact someone s body with light or sound and should be listed as a serious aggravated crimes HTC aren t just hacking anymore CURRENT TRENDS IN HIGH TECH CRIME ULTRASONIC LASER BLACK MARKET CRIMES 8 Though most of the technologies listed above have been around for over a decade most civilians and most law enforcement officers are unaware 42 that such technologies are popular amongst members of the black market cyber community44 Eagerly these computer criminals use their skills in development and computer engineering to modify and reprogram systems to improve their function and capabilities High tech criminals have engineered methods similar to the concepts described above that are more advanced can reach further distances and are more high tech to create systems that allow them to simulate actual touch from a remote location and they can aim at anyone within the radius of their technology But you would never know it unless they wanted you to By exploiting the advantages of new technological developments focused ultrasound multiplexing technologies like AO and free space laser technology these hackers have established a new market that has an unlimited reach They can aim and track anyone in the United States anywhere This market is one that involves remote interaction with the real world using laser sound wave laser like beams and laser technology A frightening new element to crime and the predatory crimes industry Hackers have done what high tech criminals do they found insidious alternative uses for technology otherwise used to make our society function better Although these new and dangerous methods of crime have been looming around very few people are talking about them ostensibly because they don t know how these crimes are being carried out or why discussing them is important While most individuals think lasers are synonymous with science fiction movies you use lasers every day Your TV remote CD player Blu ray player and DVD player all operate with laser technology If you work for a commercial company and they have fiber optics you are using a laser Know that hackers have changed and they have paired with other crimes and they are all using lasers to assault and commit other types of crimes Don t be surprised Hackers today are educated individuals who work in professional environments and organizations They belong to groups and they don t look like what we expect criminals to look like But they are responsible for these new crimes being committed by them and other types of criminals that they have sold the technology to A hackers crime use to be limited to cyber space As they have added violent and predatory crimes against individuals government and women to their resume Know that their crimes can only be viewed as high tech terrorism as they are using advanced light sound based technologies as tools weapons It is unlawful to contact someone s body with light or sound and should be listed as a serious aggravated crimes HTC aren t just hacking anymore CURRENT TRENDS IN HIGH TECH CRIME ULTRASONIC LASER BLACK MARKET CRIMES
9 Hackspaces hack er space hak r sp s a place in which people with an interest in computing or technology can gather to work on projects while sharing ideas equipment and knowledge In the last 10 years hacker societies and clubs have been popping up all over the country One city after another groups of hackers have been renting out buildings and establishing playhouses Criminal or legit these hangouts cater to a diverse group of experts with common interests computer based technology37 and hacking A lot of these environments are very misleading Some are brightly colored filled with individuals who hack for fun criminal or other wise For pleasure and for employment Some of these technological geniuses are employed at big IT companies government agencies private electronics companies programming companies and in other lines of work Quite a few are avid gamers who spend countless hours on the computer building electronics sharing their trade secrets and working on new projects at work and otherwise with their fellow peers Often they dedicate years to playing multi player role playing games like World of Warcraft or Live Action Role Play games where they get in character Today s hackers are leading what can only be considered a double life Many of them are well employed some with security clearances working on classified projects and new developments in artificial intelligence for example They are proficient in computer code and languages like python C prolog ILP etc Foreign languages to everyone but them They have created their own world where they can retreat where fellow computer hacker s cohort Todays hackers are not all the slackers portrayed in the film from the 1995 movie Hackers They include career professionals neuroscientist doctors lawyers psychologist researchers military men and women moms pillars in community and even drug dealers hang out in these hubs Research has confirmed a steadily flow of pot moves in and out of these environments Though we look at the pictures above and we see likeminded individuals getting together for harmless fun we must understand that there is a dark element to hacker societies One that most people do not know about and law enforcement needs to be aware of Where do you think these anonymous hackers come from They didn t pop up and decide to start a trend of hackers uniting They have taken hacktivism to an entirely new level and commercialized it to gain acceptance As they are not just retaliating against the man hackers are now behind crimes that only a hacker could commit remote privacy violations high tech assault sexual exploitation individuals in their home Hacker are hackers because they commit illegal acts or have at some point in their career These groups may appear to be professionals but where there is smoke there is fire Not all hacker spaces are riddled with criminally minded individuals but quite few are Today they are now involved in organized crime There are only a few groups that could be responsible for developing advanced technology that could enhance the abilities of free space systems Turning them from a beneficial mechanism used to transmit data into an energy weapon that is currently being used for organized crimes privacy violations domestic terrorism obstruction of justice broadcast intrusion and new high tech sex trade all remotely The technology used in these new crimes had to be engineered and requires the equipment to be maintained and only one type of person has the skills to do that HACKER CURRENT TRENDS IN HIGH TECH CRIME HACKERSPACES 9 Hackspaces hack er space hak r sp s a place in which people with an interest in computing or technology can gather to work on projects while sharing ideas equipment and knowledge In the last 10 years hacker societies and clubs have been popping up all over the country One city after another groups of hackers have been renting out buildings and establishing playhouses Criminal or legit these hangouts cater to a diverse group of experts with common interests computer based technology37 and hacking A lot of these environments are very misleading Some are brightly colored filled with individuals who hack for fun criminal or other wise For pleasure and for employment Some of these technological geniuses are employed at big IT companies government agencies private electronics companies programming companies and in other lines of work Quite a few are avid gamers who spend countless hours on the computer building electronics sharing their trade secrets and working on new projects at work and otherwise with their fellow peers Often they dedicate years to playing multi player role playing games like World of Warcraft or Live Action Role Play games where they get in character Today s hackers are leading what can only be considered a double life Many of them are well employed some with security clearances working on classified projects and new developments in artificial intelligence for example They are proficient in computer code and languages like python C prolog ILP etc Foreign languages to everyone but them They have created their own world where they can retreat where fellow computer hacker s cohort Todays hackers are not all the slackers portrayed in the film from the 1995 movie Hackers They include career professionals neuroscientist doctors lawyers psychologist researchers military men and women moms pillars in community and even drug dealers hang out in these hubs Research has confirmed a steadily flow of pot moves in and out of these environments Though we look at the pictures above and we see likeminded individuals getting together for harmless fun we must understand that there is a dark element to hacker societies One that most people do not know about and law enforcement needs to be aware of Where do you think these anonymous hackers come from They didn t pop up and decide to start a trend of hackers uniting They have taken hacktivism to an entirely new level and commercialized it to gain acceptance As they are not just retaliating against the man hackers are now behind crimes that only a hacker could commit remote privacy violations high tech assault sexual exploitation individuals in their home Hacker are hackers because they commit illegal acts or have at some point in their career These groups may appear to be professionals but where there is smoke there is fire Not all hacker spaces are riddled with criminally minded individuals but quite few are Today they are now involved in organized crime There are only a few groups that could be responsible for developing advanced technology that could enhance the abilities of free space systems Turning them from a beneficial mechanism used to transmit data into an energy weapon that is currently being used for organized crimes privacy violations domestic terrorism obstruction of justice broadcast intrusion and new high tech sex trade all remotely The technology used in these new crimes had to be engineered and requires the equipment to be maintained and only one type of person has the skills to do that HACKER CURRENT TRENDS IN HIGH TECH CRIME HACKERSPACES
10 How comfortable would you be with knowing that a group of hackers are modifying building and using free space adaptive optics and other advanced technologies to look listen and violate the privacy of your home business and our government While the vast majority of hackers may be disinclined towards violence it would only take a few to turn cyber terrorism into reality Dorothy Denning Well get comfortable High Tech Criminals are utilizing technology to infringe upon privacy and human rights Unless there is law enforcement starts taking these threats seriously and there is policy change these criminals will continue to violate the law uninterrupted and our innate rights Are hackers a threat The degree of threat presented by any conduct whether legal or illegal depends on the actions and intent of the individual and the harm they cause Hacker Kevin Mitnick 10 How comfortable would you be with knowing that a group of hackers are modifying building and using free space adaptive optics and other advanced technologies to look listen and violate the privacy of your home business and our government While the vast majority of hackers may be disinclined towards violence it would only take a few to turn cyber terrorism into reality Dorothy Denning Well get comfortable High Tech Criminals are utilizing technology to infringe upon privacy and human rights Unless there is law enforcement starts taking these threats seriously and there is policy change these criminals will continue to violate the law uninterrupted and our innate rights Are hackers a threat The degree of threat presented by any conduct whether legal or illegal depends on the actions and intent of the individual and the harm they cause Hacker Kevin Mitnick
11 Electromagnetic Spectrum To give you a clear understanding of the simplicity of this new form of crime that is being carried out by hackers using lasers computers and other technologies familiarizing yourself with the Electromagnetic Spectrum might be helpful A laser is a device that emits light through a process of optical amplification based on the stimulated emission of electromagnetic radiation Becoming familiar with the electromagnetic spectrum EMS 43 and light allows the reader to become acquainted with different types of radiation in our atmosphere44 Free space optics systems are designed to send data energy i e some form of radiation through the atmosphere at the speed of light46 to a designated point Quantum free space systems allow users to instantly transmit light or any form of radiation anywhere Even ultraviolet gamma visible light and sound waves All of the light you can see and sense with your eyes is called visible light There are other kinds of light that are invisible to the naked eye these other kinds of lights are around you all the time even though you cannot visually see them45 Others properties of the EMS include radio waves X ray or microwave see chart above Different forms of radiation are arranged according to frequency and wavelength how they move thru the atmosphere The benefit of free space systems is clear They are more powerful cleaner faster cheaper For hackers laser optics technology46 can transmit multiple wavelengths through multiplexing Any optical carrier signals can be transmitted on different wavelengths of laser light47 and adaptive optics is the same technology used in telescopes so it has a strong magnification Some free space optical communications links operate reliably even when many miles apart48 Ultrasound sound waves can be teleported as well Sound waves are produced by a physical frequency or a vibration wave These waves can simulate touch capture video and high frequency sound waves can cause tissue burns Sound wave are used in medicine to capture real time images of babies in the womb the brain and the internal body Free space systems can transmit any form of energy using beams to any coordinates CURRENT TRENDS IN HIGH TECH CRIME ELECTROMAGNETIC SPECTRUM 11 Electromagnetic Spectrum To give you a clear understanding of the simplicity of this new form of crime that is being carried out by hackers using lasers computers and other technologies familiarizing yourself with the Electromagnetic Spectrum might be helpful A laser is a device that emits light through a process of optical amplification based on the stimulated emission of electromagnetic radiation Becoming familiar with the electromagnetic spectrum EMS 43 and light allows the reader to become acquainted with different types of radiation in our atmosphere44 Free space optics systems are designed to send data energy i e some form of radiation through the atmosphere at the speed of light46 to a designated point Quantum free space systems allow users to instantly transmit light or any form of radiation anywhere Even ultraviolet gamma visible light and sound waves All of the light you can see and sense with your eyes is called visible light There are other kinds of light that are invisible to the naked eye these other kinds of lights are around you all the time even though you cannot visually see them45 Others properties of the EMS include radio waves X ray or microwave see chart above Different forms of radiation are arranged according to frequency and wavelength how they move thru the atmosphere The benefit of free space systems is clear They are more powerful cleaner faster cheaper For hackers laser optics technology46 can transmit multiple wavelengths through multiplexing Any optical carrier signals can be transmitted on different wavelengths of laser light47 and adaptive optics is the same technology used in telescopes so it has a strong magnification Some free space optical communications links operate reliably even when many miles apart48 Ultrasound sound waves can be teleported as well Sound waves are produced by a physical frequency or a vibration wave These waves can simulate touch capture video and high frequency sound waves can cause tissue burns Sound wave are used in medicine to capture real time images of babies in the womb the brain and the internal body Free space systems can transmit any form of energy using beams to any coordinates CURRENT TRENDS IN HIGH TECH CRIME ELECTROMAGNETIC SPECTRUM
12 Free Space Laser High Tech Assault High tech criminals are utilizing free space technologies for more than just their intended purpose of data transmission Free space systems can utilize principles of quantum physics to achieve real time instantaneous tasks by modulating visible or infrared laser sound wave beam transmissions through the atmosphere It is not surprise that it has gained appeal as a weapon49 This new and dangerous form of crime has arrived in the cyber sector and very few people are talking about it because they don t know what it is HTC are using laser technologies to emit energy that is not visible to the human eye50 They are physically and sexually assault adults and children remotely They also use this technology to violate the privacy of individuals businesses and government This technology allows them to capture real time images eavesdrop contact and harass individuals in their home or while in motion Sound waves has many uses It can simulate feelings such as induced tactical thermal tickling itching and pain sensations 51 on the skin Lasers systems can carry multiple forms of energy miles away and sound wave like laser beams can displace the air creating a pressure difference creating ultrasonic pressure a person can feel and see mid air in a separate location from the source When these systems are used physical sensations come from what appears to be thin air but in truth result from sound waves or light that is not visible to the human eye New technology like Inform and Ultrahaptics allows digital data to be felt HTC are using similar concepts and laser technology to interact with environments and people outside of their own Their technology allows the human body to be felt without requiring the hacker to be in the same place teleporting ultrasonic pressure Their free space technology operates on quantum levels and is derived from infrared laser technology Lasers can be used to induce pain inflict burns transmit sound and affect surrounding technology HTC set up laser sound systems that send light and sound from the source destination through the air like Wi Fi signals HTC lasers reach further are faster and can make contact with an individual s body and can even display a holographic image in midair A force that can be felt by the body Learn more about laser technology below Laser Technology Lasers were invented in the 1950s Laser technology has many uses52 Holoworld com list many uses for lasers such as tracking people surveillance gaming amplifying images communication holograms television activity recognition etc Today lasers are widely used for the transmission of data via but in the wrong hands lasers can and are being used as weapons Sound waves act the same way as lasers and sound waves can penetrate and create a localize pressure Most people think the lasers used in the free space optics are different from laser pointers or other lasers This is not true Handheld lasers are simply low powered lasers that emit visible light53 Some larger lasers are used for FSO and human tracking Because lasers are tunable their wavelengths can be altered in a controlled manner This means that lasers can X ray produce sound54 emit UV and act as a microphone Lasers can also burn the skin or be used as listening devices CURRENT TRENDS IN HIGH TECH CRIME HIGH ULTRASONIC LASER TECHNOLOGY 12 Free Space Laser High Tech Assault High tech criminals are utilizing free space technologies for more than just their intended purpose of data transmission Free space systems can utilize principles of quantum physics to achieve real time instantaneous tasks by modulating visible or infrared laser sound wave beam transmissions through the atmosphere It is not surprise that it has gained appeal as a weapon49 This new and dangerous form of crime has arrived in the cyber sector and very few people are talking about it because they don t know what it is HTC are using laser technologies to emit energy that is not visible to the human eye50 They are physically and sexually assault adults and children remotely They also use this technology to violate the privacy of individuals businesses and government This technology allows them to capture real time images eavesdrop contact and harass individuals in their home or while in motion Sound waves has many uses It can simulate feelings such as induced tactical thermal tickling itching and pain sensations 51 on the skin Lasers systems can carry multiple forms of energy miles away and sound wave like laser beams can displace the air creating a pressure difference creating ultrasonic pressure a person can feel and see mid air in a separate location from the source When these systems are used physical sensations come from what appears to be thin air but in truth result from sound waves or light that is not visible to the human eye New technology like Inform and Ultrahaptics allows digital data to be felt HTC are using similar concepts and laser technology to interact with environments and people outside of their own Their technology allows the human body to be felt without requiring the hacker to be in the same place teleporting ultrasonic pressure Their free space technology operates on quantum levels and is derived from infrared laser technology Lasers can be used to induce pain inflict burns transmit sound and affect surrounding technology HTC set up laser sound systems that send light and sound from the source destination through the air like Wi Fi signals HTC lasers reach further are faster and can make contact with an individual s body and can even display a holographic image in midair A force that can be felt by the body Learn more about laser technology below Laser Technology Lasers were invented in the 1950s Laser technology has many uses52 Holoworld com list many uses for lasers such as tracking people surveillance gaming amplifying images communication holograms television activity recognition etc Today lasers are widely used for the transmission of data via but in the wrong hands lasers can and are being used as weapons Sound waves act the same way as lasers and sound waves can penetrate and create a localize pressure Most people think the lasers used in the free space optics are different from laser pointers or other lasers This is not true Handheld lasers are simply low powered lasers that emit visible light53 Some larger lasers are used for FSO and human tracking Because lasers are tunable their wavelengths can be altered in a controlled manner This means that lasers can X ray produce sound54 emit UV and act as a microphone Lasers can also burn the skin or be used as listening devices CURRENT TRENDS IN HIGH TECH CRIME HIGH ULTRASONIC LASER TECHNOLOGY
13 Below Picture from Hackday http hacknmod com hack high power laser build with thermoelectric cooling A DIY lasers expert provides tutorial that walks you through building your own incredibly high power laser and cooling it using peltier plates The peltiers are cheap and so is the box fan and heatsink Lasers can be dangerous if turned up high enough Most lasers are not visible Hightech criminals are utilizing laser technology tunable beams and advanced technologies to assault and terrorize people in the United States discreetly FSO uses lasers Since information is available on the net I want to give you an idea of the technology hackers are using Free space optics works on the same basic principle as an infrared based TV remote controls wireless keyboards or wireless palm devices FSO utilizes a highly directed beam of light radiation between two end points to transfer information or messages data sound or video An FSO unit is comprised of an optical transceiver equipped with a laser transmitter and a receiver granting it bi directional capability Each FSO unit uses a high power narrow beam width optical source laser in addition to a lens that transmits light through the air to another receiving lens Above real photo is posted from Hackaday It is one of the examples of a high tech laser hack CURRENT TRENDS IN HIGH TECH CRIME FULL BODY INTERFACE Full Body Interface MIT Stanford USC companies like KINECT are exploring systems that track movement via infrared and full body suits Full Body control is what gamers have been waiting for Outside the gaming world such technologies are widely used to help individuals with physical disabilities regain coordination Several gaming companies offer hands free interface systems that allow individuals the ability to interact with games simply by talking and moving their bodies 55 Most offer programmers an opportunity to modify them at home Such technologies recognize emotions and can provide physical sensations that resemble the real thing using ultrasonic pulses and sensors placed on the suit Sound Unbelievable Don t expect black market criminals to send a post card informing people that they have designed a wireless suit that allows them to interact with wirelessly with another s environment Especially when the technology is so profitable Full body interface systems track the entire motion of the body using small infrared lasers They also provide users with visual and audio sensations Full body systems allow virtual information to be touched using sound waves and haptic technology Lasers and sensors track the motions of full body interface systems and transmit the digital representation Lasers are also used for tracking people and objects by the military and currently being researched at University of Southern California56 Picture from Harvard University 13 Below Picture from Hackday http hacknmod com hack high power laser build with thermoelectric cooling A DIY lasers expert provides tutorial that walks you through building your own incredibly high power laser and cooling it using peltier plates The peltiers are cheap and so is the box fan and heatsink Lasers can be dangerous if turned up high enough Most lasers are not visible Hightech criminals are utilizing laser technology tunable beams and advanced technologies to assault and terrorize people in the United States discreetly FSO uses lasers Since information is available on the net I want to give you an idea of the technology hackers are using Free space optics works on the same basic principle as an infrared based TV remote controls wireless keyboards or wireless palm devices FSO utilizes a highly directed beam of light radiation between two end points to transfer information or messages data sound or video An FSO unit is comprised of an optical transceiver equipped with a laser transmitter and a receiver granting it bi directional capability Each FSO unit uses a high power narrow beam width optical source laser in addition to a lens that transmits light through the air to another receiving lens Above real photo is posted from Hackaday It is one of the examples of a high tech laser hack CURRENT TRENDS IN HIGH TECH CRIME FULL BODY INTERFACE Full Body Interface MIT Stanford USC companies like KINECT are exploring systems that track movement via infrared and full body suits Full Body control is what gamers have been waiting for Outside the gaming world such technologies are widely used to help individuals with physical disabilities regain coordination Several gaming companies offer hands free interface systems that allow individuals the ability to interact with games simply by talking and moving their bodies 55 Most offer programmers an opportunity to modify them at home Such technologies recognize emotions and can provide physical sensations that resemble the real thing using ultrasonic pulses and sensors placed on the suit Sound Unbelievable Don t expect black market criminals to send a post card informing people that they have designed a wireless suit that allows them to interact with wirelessly with another s environment Especially when the technology is so profitable Full body interface systems track the entire motion of the body using small infrared lasers They also provide users with visual and audio sensations Full body systems allow virtual information to be touched using sound waves and haptic technology Lasers and sensors track the motions of full body interface systems and transmit the digital representation Lasers are also used for tracking people and objects by the military and currently being researched at University of Southern California56 Picture from Harvard University
14 Neurotechnology The Brain Research through Advancing Innovative Neurotechnologies BRAIN Initiative is part of the new Presidential focus aimed at revolutionizing our understanding of the human brain It is not however the first neurotechnology research project to emerge in the Unites States There are hundreds of such initiatives all over the United States and abroad Neurotechnology can be beneficial when used scientifically57 Researchers at Brown University are currently concentrating on brain machine interfaces and have implemented the technology in groundbreaking research Neuroengineers have also developed smart machines These machines decode brain activity and access real thought These machines aim to mimic the brain s functions in order to create smart machines that think understand and see as humans do These systems yield lots of potential to help those that are physically and visually impaired interact with the world as we do A professor at the University of Virginia compliance department was contacted and notified that high tech criminals are using wireless focused ultrasound to violate human rights and was asked what could be done He answered nothing The professor stated that there are no laws against the illegal use of neurotechnology He stated that government agencies could penalize institutions that are receiving funding but there is no stated law that makes it illegal for private individuals or groups to construct and use focused ultrasound technology for neuromodulation of involuntary individuals Neuromodulation technology with advanced algorithms can translate brain activity on a computer to speech or text58 This advancement in science and technology is monumental but not when in the hands of hackers This means your thoughts can be accessed the same way a hacker hacks a computer Don t under estimate technology Or hackers Neurotechnology is valuable to our society and it still has a long way to go Harvard Stanford Carnegie about 50 others universities around the world and sum thousands of gamers have already developed several neurotechnologies Noninvasive neurotechnology allows brain to computer and brain to brain interfacing Researchers at Harvard University released videos on their brain tobrain interface BBI in January 201359 Development kits are sold online for under 100 from companies like Emotiv60 and Neurosky61 High tech criminals are currently using their computer skills focused ultrasound and laser technology to maintain an underground black market crime network that engages in other organized crimes and a new type of high tech sex trade industry Neuromodulation can make a victim uninhibited affect their memory change their behavior and not put up a fight It should be no surprise that hackers have infused the capabilities of laser technology with neurotechnology They are selling similar technology that helps the victimizing people for sexual and non sexual purposes remotely using neurotechnology This is a new crime and I know it sounds different These hackers are light years ahead of mainstream technology this is why it s important that we encourage law enforcement look into this type of crime The researchers at Virginia Tech Carilion Research Institute62 study on non invasive focused ultrasound FUS concluded that ultrasound was better than the two other leading noninvasive brain stimulation technologies and less harmful to the brain CURRENT TRENDS IN HIGH TECH CRIME NEUROTECHNOLOGY 14 Neurotechnology The Brain Research through Advancing Innovative Neurotechnologies BRAIN Initiative is part of the new Presidential focus aimed at revolutionizing our understanding of the human brain It is not however the first neurotechnology research project to emerge in the Unites States There are hundreds of such initiatives all over the United States and abroad Neurotechnology can be beneficial when used scientifically57 Researchers at Brown University are currently concentrating on brain machine interfaces and have implemented the technology in groundbreaking research Neuroengineers have also developed smart machines These machines decode brain activity and access real thought These machines aim to mimic the brain s functions in order to create smart machines that think understand and see as humans do These systems yield lots of potential to help those that are physically and visually impaired interact with the world as we do A professor at the University of Virginia compliance department was contacted and notified that high tech criminals are using wireless focused ultrasound to violate human rights and was asked what could be done He answered nothing The professor stated that there are no laws against the illegal use of neurotechnology He stated that government agencies could penalize institutions that are receiving funding but there is no stated law that makes it illegal for private individuals or groups to construct and use focused ultrasound technology for neuromodulation of involuntary individuals Neuromodulation technology with advanced algorithms can translate brain activity on a computer to speech or text58 This advancement in science and technology is monumental but not when in the hands of hackers This means your thoughts can be accessed the same way a hacker hacks a computer Don t under estimate technology Or hackers Neurotechnology is valuable to our society and it still has a long way to go Harvard Stanford Carnegie about 50 others universities around the world and sum thousands of gamers have already developed several neurotechnologies Noninvasive neurotechnology allows brain to computer and brain to brain interfacing Researchers at Harvard University released videos on their brain tobrain interface BBI in January 201359 Development kits are sold online for under 100 from companies like Emotiv60 and Neurosky61 High tech criminals are currently using their computer skills focused ultrasound and laser technology to maintain an underground black market crime network that engages in other organized crimes and a new type of high tech sex trade industry Neuromodulation can make a victim uninhibited affect their memory change their behavior and not put up a fight It should be no surprise that hackers have infused the capabilities of laser technology with neurotechnology They are selling similar technology that helps the victimizing people for sexual and non sexual purposes remotely using neurotechnology This is a new crime and I know it sounds different These hackers are light years ahead of mainstream technology this is why it s important that we encourage law enforcement look into this type of crime The researchers at Virginia Tech Carilion Research Institute62 study on non invasive focused ultrasound FUS concluded that ultrasound was better than the two other leading noninvasive brain stimulation technologies and less harmful to the brain CURRENT TRENDS IN HIGH TECH CRIME NEUROTECHNOLOGY
15 Hackers have developed wireless non invasive systems that use computer brain interface technology that allow the wireless hack and access of the human brain Their focused sound wave systems creates a link between a victim and their computer or another person without a dedicated line entirely wireless They have developed a combinatory inclusion of algorithms and long range technology that allows thought processes to be controlled This means they give a command and the involuntary victim carries it out Researchers at Harvard found that Transcranial FUS techniques when given in pulsed mode at low acoustic energy demonstrated excitation suppression motor visual cortices and can produce performance Furthermore FUS has proven itself versatile by affecting emotion mood cognitive function thought causing lethargy affecting memory motor skills and behaviors In Harvard s computer to brain research users have a direct connection to another s brain and can operate another person s motor functions using electrodes placed on the scalp63 This experiment was made possible with focused ultrasound High tech criminals are using a free space system optics sound waves that they have modified It allows them to use free space real time sound waves computer brain interface that is entirely wireless and requires no dedicated lines on any one With neural population coding advanced algorithms these criminals can translate brain activity wirelessly to speech and or affect an individual s cognitive functions and using computer based technology They have developed a system that has bidirectional abilities where thoughts and ideas can be transmitted between the computer interface and the victim Neuromodulation technology is still being researched yet it is already being used criminally by high tech criminals However it is imperative that crime involving neurotechnology be addressed with extreme prejudice at this stage in the game Neuromodulation has the ability to affect the most important area of the body the brain Advanced criminals who are involved in many crimes not limited to the high tech sex trade industry can and are easily using this technology to immobilize their victims cognitively psychologically and to extend their profit potential But what else can they do Use your imagination What do you use your brain for Algorithms Neurotechnology full body interfaces and free space optics are just technologies until a computer programmer designs an algorithm that makes them operational Technology is only as limited as its designer Algorithms are the programming code and used for calculation data processing and reasoning Hackers improve technology and provide new functionality to computer programs and systems Recognition algorithms provide unparalleled accuracy in computing functions New algorithms can allow detection and identify a person obtain instant coordinates and track from miles away based on physical features body movements head shape and sound of voice Hackers are exploiting advanced technologies for major crimes A hacker can create an algorithm that can do anything and now with free space systems they can do anything to you CURRENT TRENDS IN HIGH TECH CRIME ALGORITHMS 15 Hackers have developed wireless non invasive systems that use computer brain interface technology that allow the wireless hack and access of the human brain Their focused sound wave systems creates a link between a victim and their computer or another person without a dedicated line entirely wireless They have developed a combinatory inclusion of algorithms and long range technology that allows thought processes to be controlled This means they give a command and the involuntary victim carries it out Researchers at Harvard found that Transcranial FUS techniques when given in pulsed mode at low acoustic energy demonstrated excitation suppression motor visual cortices and can produce performance Furthermore FUS has proven itself versatile by affecting emotion mood cognitive function thought causing lethargy affecting memory motor skills and behaviors In Harvard s computer to brain research users have a direct connection to another s brain and can operate another person s motor functions using electrodes placed on the scalp63 This experiment was made possible with focused ultrasound High tech criminals are using a free space system optics sound waves that they have modified It allows them to use free space real time sound waves computer brain interface that is entirely wireless and requires no dedicated lines on any one With neural population coding advanced algorithms these criminals can translate brain activity wirelessly to speech and or affect an individual s cognitive functions and using computer based technology They have developed a system that has bidirectional abilities where thoughts and ideas can be transmitted between the computer interface and the victim Neuromodulation technology is still being researched yet it is already being used criminally by high tech criminals However it is imperative that crime involving neurotechnology be addressed with extreme prejudice at this stage in the game Neuromodulation has the ability to affect the most important area of the body the brain Advanced criminals who are involved in many crimes not limited to the high tech sex trade industry can and are easily using this technology to immobilize their victims cognitively psychologically and to extend their profit potential But what else can they do Use your imagination What do you use your brain for Algorithms Neurotechnology full body interfaces and free space optics are just technologies until a computer programmer designs an algorithm that makes them operational Technology is only as limited as its designer Algorithms are the programming code and used for calculation data processing and reasoning Hackers improve technology and provide new functionality to computer programs and systems Recognition algorithms provide unparalleled accuracy in computing functions New algorithms can allow detection and identify a person obtain instant coordinates and track from miles away based on physical features body movements head shape and sound of voice Hackers are exploiting advanced technologies for major crimes A hacker can create an algorithm that can do anything and now with free space systems they can do anything to you CURRENT TRENDS IN HIGH TECH CRIME ALGORITHMS
16 Human Rights Sex Trade Terrorism Lasers Human rights is a broad topic that is comprised of many delicate issues Advancements in technology have further complicated these already sensitive subjects There are very few people taking on the subject of high tech crimes sex crimes and high tech terrorism at this time Sex trafficking or slavery is a multibillion dollar industry as it stands This new element could double the current numbers and even protect the high tech criminals Allowing predatory crimes to be committed with total anonymity Because the crime is more advanced than mainstream knowledge of technology it does not mean the crime isn t happening HTC are just more progressive and underground Victims could be recruited from anywhere Supermarket family dinner date school recital play group work at the gym or while driving These criminals don t have to remove their victim from their environment to assault them but if they wanted to they could make them less inhibited so they could be abducted by affecting decision making using neurotechnology Neurotechnology easily affects decision making and even causes confusion all wirelessly non invasively using focused ultrasound HTC are using this technology for a new crimes These crimes allow wireless physical violations of ones body and mind and does not involve direct physical contact but instead simulated contact an issue that has not been explored or addressed The impacts are still the same A victim is still violated a crime is committed they can be forced to engage in something they don t want to and left helpless to aggravated or sexual contact The major difference is that victims don t have to be removed from their home or environment to be victimized Believe it These new high tech crimes provide criminals with wireless experiences that are equal to traditional physical contact experiences with no limitations The current sex trade industry involves the exploitation of women and children for sex related work But now any one could be a victim and be assaulted in their own bed Unscrupulous predatory criminals have taken on a new form and this issue should be a major focal point CURRENT TRENDS IN HIGH TECH CRIME BLACKMARKET CRIMES HIGH TECH SEX TRADE SLAVERY CRIMES AGAIINST CHILDREN 16 Human Rights Sex Trade Terrorism Lasers Human rights is a broad topic that is comprised of many delicate issues Advancements in technology have further complicated these already sensitive subjects There are very few people taking on the subject of high tech crimes sex crimes and high tech terrorism at this time Sex trafficking or slavery is a multibillion dollar industry as it stands This new element could double the current numbers and even protect the high tech criminals Allowing predatory crimes to be committed with total anonymity Because the crime is more advanced than mainstream knowledge of technology it does not mean the crime isn t happening HTC are just more progressive and underground Victims could be recruited from anywhere Supermarket family dinner date school recital play group work at the gym or while driving These criminals don t have to remove their victim from their environment to assault them but if they wanted to they could make them less inhibited so they could be abducted by affecting decision making using neurotechnology Neurotechnology easily affects decision making and even causes confusion all wirelessly non invasively using focused ultrasound HTC are using this technology for a new crimes These crimes allow wireless physical violations of ones body and mind and does not involve direct physical contact but instead simulated contact an issue that has not been explored or addressed The impacts are still the same A victim is still violated a crime is committed they can be forced to engage in something they don t want to and left helpless to aggravated or sexual contact The major difference is that victims don t have to be removed from their home or environment to be victimized Believe it These new high tech crimes provide criminals with wireless experiences that are equal to traditional physical contact experiences with no limitations The current sex trade industry involves the exploitation of women and children for sex related work But now any one could be a victim and be assaulted in their own bed Unscrupulous predatory criminals have taken on a new form and this issue should be a major focal point CURRENT TRENDS IN HIGH TECH CRIME BLACKMARKET CRIMES HIGH TECH SEX TRADE SLAVERY CRIMES AGAIINST CHILDREN
17 Less than of the country knows what ultrahaptic is Most of us still think lasers are sci fiction technologies Very few people outside of research gaming and medicine are familiar with computer brain interface Maybe less than 1000 researchers will admit it can be used wirelessly Hackers know because a hacker group is selling free space interface interactive systems to all types of criminals Hackers high tech criminals computer based criminals whatever you call them are using free systems that carry sound waves that give them the ability engage in voyeurism simulate touch of the body of women or kids They can harass victims in other ways using these laser technologies They can uses these systems to communicate in mid air anywhere In particular an American high tech terrorist group is operating in Houston and more than likely in a city near you too These high tech terrorists are involved in a web of crimes all over our country that has the potential to affect millions Allowing a group of high tech criminals to molest women and children in their own homes violate the privacy of businesses government and make the rule of law invalid is disturbing HIGH TECH TERRORISTS New high tech crimes involve more than just hackers stealing data As stated today they violate human rights The weapons and technology used by current criminals are unfamilar to most but are being used to victimize many Their technology is so far ahead in concept that the primary applications include commercial research science medicine military and crime HIGH TECH AMERICAN TERRORIST NETWORK This underground phenomena requires local and federal government and cyber security agencies to pay immediate attention to the dangers of unregulated free space optical bandwidths and laser technologies Such organizations must address the new terrorist coalitions that are utilizing advancements in the neurotechnology ultrasonics and free space quantum technology for the purpose of human rights violations Officials must investigate the new high tech sex crime industry and hightech domestic homegrown terrorism dangers It is imperative that officials resolve these threats before the small high tech American terrorist network expands Protocols need to be established to prevent and detect these mature laser based crimes This isn t sci fiction this is true crime Law enforcement currently has no active solutions and this needs to change The rise of new technologies means there is a higher level of difficulty in isolating these threats as law enforcement has never faced these problems before and refuses to address them at all New elements of technology have changed the game The potential to impact individuals across our country is obvious and this alone should raise concerns regarding national security Federal and local law enforcement has claimed that performing extreme feats with laser technology is impossible They refuse to address the crimes researched and described in this document ignoring reports written on the subject of high tech crime and all that said reports claim It s important to acknowledge and address this crime and take action before it s too late If each reader sends their local policy maker or police agency a letter and request that they look into this crime maybe they make be willing to 17 Less than of the country knows what ultrahaptic is Most of us still think lasers are sci fiction technologies Very few people outside of research gaming and medicine are familiar with computer brain interface Maybe less than 1000 researchers will admit it can be used wirelessly Hackers know because a hacker group is selling free space interface interactive systems to all types of criminals Hackers high tech criminals computer based criminals whatever you call them are using free systems that carry sound waves that give them the ability engage in voyeurism simulate touch of the body of women or kids They can harass victims in other ways using these laser technologies They can uses these systems to communicate in mid air anywhere In particular an American high tech terrorist group is operating in Houston and more than likely in a city near you too These high tech terrorists are involved in a web of crimes all over our country that has the potential to affect millions Allowing a group of high tech criminals to molest women and children in their own homes violate the privacy of businesses government and make the rule of law invalid is disturbing HIGH TECH TERRORISTS New high tech crimes involve more than just hackers stealing data As stated today they violate human rights The weapons and technology used by current criminals are unfamilar to most but are being used to victimize many Their technology is so far ahead in concept that the primary applications include commercial research science medicine military and crime HIGH TECH AMERICAN TERRORIST NETWORK This underground phenomena requires local and federal government and cyber security agencies to pay immediate attention to the dangers of unregulated free space optical bandwidths and laser technologies Such organizations must address the new terrorist coalitions that are utilizing advancements in the neurotechnology ultrasonics and free space quantum technology for the purpose of human rights violations Officials must investigate the new high tech sex crime industry and hightech domestic homegrown terrorism dangers It is imperative that officials resolve these threats before the small high tech American terrorist network expands Protocols need to be established to prevent and detect these mature laser based crimes This isn t sci fiction this is true crime Law enforcement currently has no active solutions and this needs to change The rise of new technologies means there is a higher level of difficulty in isolating these threats as law enforcement has never faced these problems before and refuses to address them at all New elements of technology have changed the game The potential to impact individuals across our country is obvious and this alone should raise concerns regarding national security Federal and local law enforcement has claimed that performing extreme feats with laser technology is impossible They refuse to address the crimes researched and described in this document ignoring reports written on the subject of high tech crime and all that said reports claim It s important to acknowledge and address this crime and take action before it s too late If each reader sends their local policy maker or police agency a letter and request that they look into this crime maybe they make be willing to
18 Why havent you heard about this crime High tech criminals know that it takes time for new information to circulate They know that law enforcement and civilians alike need time to grasp what technology is capable of and implement protocols HTC technology currently has no other uses so therefore crime provides revenue meanwhile a market for these new technologies is developed which will mean the members of these high tech groups will be more difficult to find Think about this Sex trafficking is high tech whats next What happens when rapists pedophiles and terrorists can offer a high tech experience that allows touch What happens when behavior can be affected and decision making can be manipulated Ultrahaptic blackmarket wireless interfaces and interaction technologies are sold on the black market and allowing criminals to violate a child s body in the supposed safety of their own home Hackers are capable of assaulting a person in their home using ultrasonic laser technology Laser technology allows communication in free space from hundreds of miles away Criminals can use laser saser to eavesdrop on law enforcment Ultrasound can be used to perform a high tech hit and suffocate someone by blocking their airway when they are asleep in their home There are important questions that need to be answered How does a victim report this type of crime What agencies handles it How are high tech criminal networks that consist of members of hacker groups street gangs and interactive gamers crimes policed New forms of high tech crime and a new sex trade industry is growing You have an opprtounity to do something about it This kind of high tech crime is happening now and it requires necessary action the only way things get changed is if we change it report it write some one do something WHY HAVEN T YOU HEARD ABOUT THIS CRIME 18 Why havent you heard about this crime High tech criminals know that it takes time for new information to circulate They know that law enforcement and civilians alike need time to grasp what technology is capable of and implement protocols HTC technology currently has no other uses so therefore crime provides revenue meanwhile a market for these new technologies is developed which will mean the members of these high tech groups will be more difficult to find Think about this Sex trafficking is high tech whats next What happens when rapists pedophiles and terrorists can offer a high tech experience that allows touch What happens when behavior can be affected and decision making can be manipulated Ultrahaptic blackmarket wireless interfaces and interaction technologies are sold on the black market and allowing criminals to violate a child s body in the supposed safety of their own home Hackers are capable of assaulting a person in their home using ultrasonic laser technology Laser technology allows communication in free space from hundreds of miles away Criminals can use laser saser to eavesdrop on law enforcment Ultrasound can be used to perform a high tech hit and suffocate someone by blocking their airway when they are asleep in their home There are important questions that need to be answered How does a victim report this type of crime What agencies handles it How are high tech criminal networks that consist of members of hacker groups street gangs and interactive gamers crimes policed New forms of high tech crime and a new sex trade industry is growing You have an opprtounity to do something about it This kind of high tech crime is happening now and it requires necessary action the only way things get changed is if we change it report it write some one do something WHY HAVEN T YOU HEARD ABOUT THIS CRIME
19 Notes Progress Change happens because humans want to improve their condition Development Change happens because people want to build a decent life Technology Change happens because humans are motivated to solve problems which requires the creation of new technologies which in turn drive progress and social change Ideas Change happens when culture changes through the dissemination of new ideas One good idea has the potential to change the world The real power to create change belongs to the media which edits frames and disseminates ideas Cycles Change happens according to predictable patterns which can be discerned by studying history Conflict Change happens when groups of people engage in a struggle to improve their lot Those who understand change best are Marxists union leaders political organizers and activists and social justice advocates People succeed in creating change only if they re willing to fight for it and progress occurs when we pursue our own interests to the fullest Sara Robinson OurFuture org 19 Notes Progress Change happens because humans want to improve their condition Development Change happens because people want to build a decent life Technology Change happens because humans are motivated to solve problems which requires the creation of new technologies which in turn drive progress and social change Ideas Change happens when culture changes through the dissemination of new ideas One good idea has the potential to change the world The real power to create change belongs to the media which edits frames and disseminates ideas Cycles Change happens according to predictable patterns which can be discerned by studying history Conflict Change happens when groups of people engage in a struggle to improve their lot Those who understand change best are Marxists union leaders political organizers and activists and social justice advocates People succeed in creating change only if they re willing to fight for it and progress occurs when we pursue our own interests to the fullest Sara Robinson OurFuture org
20 References 1 Houston Police Department Crime Prevention Houston Police Department Crime Prevention N p n d Web 18 May 2014 http www houstontx gov police crime_prevention 2 Phrack Magazine Phrack Magazine N p n d Web 18 May 2014 http phrack org 3 Difference Between High Tech Crime and Traditional Forms of Criminal Activity Yahoo Contributor Network N p n d Web 18 May 2014 http voices yahoo com differencebetween high tech crime traditional 5805422 html 4 Progress Toward Quantum Communications Networks Opportunities and Challenges National Security Agency n d Web 18 May 2014 http www nsa gov research _files publications progress_toward_quantum_comms_netwo rks pdf 5 High Bandwidth Free Space Optical Communications Officer of Naval Research Science Technology n d Web 18 May 2014 http www onr navy mil media Files FactSheets 31 High Bandwidth Optical Communication ash 6 Applied Ergonomics Body Based Interfaces Kima Hanb Yangb Choa n d Web 18 May 2014 http citeseerx ist psu edu viewdoc download doi 10 1 1 96 7108 rep rep1 type pdf 7 UltraHaptics Multi Point Mid Air Haptic Feedback for Touch Surfaces University of Bristol n d Web 18 May 2014 http big cs bris ac uk wpcontent uploads 2013 10 Ultrahaptics Carter 2013 pdf 8 Laser Based People Tracking University of Southern California n d Web 18 May 2014 http robotics usc edu publications media uploads pubs 70 pdf 9 Homepage Neurogadget com Neurogadgetcom N p n d Web 18 May 2014 10 Ultrasound directed to the human brain can boost sensory performance http research vtc vt edu N p n d Web 18 May 2014 http research vtc vt edu news 2014 jan 12 ultrasound directed human brain canboost sensory 11 Visual Light Communication Bio electromagnetic Research Initiative n d Web 18 May 2014 http bemri org visible light communication html 12 Interactive Live Holography From Science Fiction to Science Fact ScienceGymnasium Science Gymnasium n d Web 18 May 2014 http www sciencegymnasium com 2013 11 interactive live holography from html 13 Laser mic makes eavesdropping remarkably simple Hackaday Hack A Day n d Web 19 May 2014 http hackaday com 2010 09 25 laser mic makes eavesdropping remarkablysimple 14 Wi Fi Tech Sees Through Walls DNews DNews Discovery News n d Web 18 May 2014 http news discovery com tech wi fi sees through walls 130628 htm 15 Network Architectures for Space Optical Quantum Cryptography Services Proc International Conference on Space Optical Systems and Applications n d Web 18 May 2014 http icsos2012 nict go jp pdf 1569657077 pdf 16 The Internet A Breeding Ground for Online Pedophiles Robert B Fried BS MS n d Web 18 May 2014 http www crime scene investigator net OnlinePred pdf 17 Lookout study hackers target mobile attacks by region PCWorld PC World n d Web 18 May 2014 http www pcworld com article 2099447 lookout study hackers targetmobile attacks by region html 18 Technology and Human Trafficking Friends or Foes WIIS Blog N p n d Web 18 May 2014 http womenininternationalsecurity wordpress com 2013 07 16 technology andhuman trafficking friends or foes 20 References 1 Houston Police Department Crime Prevention Houston Police Department Crime Prevention N p n d Web 18 May 2014 http www houstontx gov police crime_prevention 2 Phrack Magazine Phrack Magazine N p n d Web 18 May 2014 http phrack org 3 Difference Between High Tech Crime and Traditional Forms of Criminal Activity Yahoo Contributor Network N p n d Web 18 May 2014 http voices yahoo com differencebetween high tech crime traditional 5805422 html 4 Progress Toward Quantum Communications Networks Opportunities and Challenges National Security Agency n d Web 18 May 2014 http www nsa gov research _files publications progress_toward_quantum_comms_netwo rks pdf 5 High Bandwidth Free Space Optical Communications Officer of Naval Research Science Technology n d Web 18 May 2014 http www onr navy mil media Files FactSheets 31 High Bandwidth Optical Communication ash 6 Applied Ergonomics Body Based Interfaces Kima Hanb Yangb Choa n d Web 18 May 2014 http citeseerx ist psu edu viewdoc download doi 10 1 1 96 7108 rep rep1 type pdf 7 UltraHaptics Multi Point Mid Air Haptic Feedback for Touch Surfaces University of Bristol n d Web 18 May 2014 http big cs bris ac uk wpcontent uploads 2013 10 Ultrahaptics Carter 2013 pdf 8 Laser Based People Tracking University of Southern California n d Web 18 May 2014 http robotics usc edu publications media uploads pubs 70 pdf 9 Homepage Neurogadget com Neurogadgetcom N p n d Web 18 May 2014 10 Ultrasound directed to the human brain can boost sensory performance http research vtc vt edu N p n d Web 18 May 2014 http research vtc vt edu news 2014 jan 12 ultrasound directed human brain canboost sensory 11 Visual Light Communication Bio electromagnetic Research Initiative n d Web 18 May 2014 http bemri org visible light communication html 12 Interactive Live Holography From Science Fiction to Science Fact ScienceGymnasium Science Gymnasium n d Web 18 May 2014 http www sciencegymnasium com 2013 11 interactive live holography from html 13 Laser mic makes eavesdropping remarkably simple Hackaday Hack A Day n d Web 19 May 2014 http hackaday com 2010 09 25 laser mic makes eavesdropping remarkablysimple 14 Wi Fi Tech Sees Through Walls DNews DNews Discovery News n d Web 18 May 2014 http news discovery com tech wi fi sees through walls 130628 htm 15 Network Architectures for Space Optical Quantum Cryptography Services Proc International Conference on Space Optical Systems and Applications n d Web 18 May 2014 http icsos2012 nict go jp pdf 1569657077 pdf 16 The Internet A Breeding Ground for Online Pedophiles Robert B Fried BS MS n d Web 18 May 2014 http www crime scene investigator net OnlinePred pdf 17 Lookout study hackers target mobile attacks by region PCWorld PC World n d Web 18 May 2014 http www pcworld com article 2099447 lookout study hackers targetmobile attacks by region html 18 Technology and Human Trafficking Friends or Foes WIIS Blog N p n d Web 18 May 2014 http womenininternationalsecurity wordpress com 2013 07 16 technology andhuman trafficking friends or foes
21 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 Chen Brian Carriers Warn of Crisis in Mobile Spectrum The New York Times The New York Times 17 Apr 2012 Web 18 May 2014 http www nytimes com 2012 04 18 technology mobile carriers warn of spectrum crisisothers see hyperbole html pagewanted all _r 0 Wireless bandwidth Are we running out of room Computerworld Computer World n d Web 18 May 2014 http www computerworld com s article 9223670 Wireless_bandwidth_Are_we_running_o ut_of_room Free Space Optical Quantum Key Distribution Using Intersatellite Links CNES Intersatellite Link Workshop n d Web 18 May 2014 http vcq quantum at fileadmin Publications 2003 22 pdf Free Space Optics Technology FAQs free space optics Free Space Optics Technology FAQs Free Space Optics n d Web 18 May 2014 http www freespaceoptics org technologyfaqs html FSONA Technology Sona Optical Wireless Web 18 May 2014 http www fsona com technology php sec fso_guide FSO Free Space Optics Free Space Optics FSO FSO Free Space Optics Outdoor Optical Wireless Communications n d Web 18 May 2014 http www fso net Laser Technology Laser Measurement Laser Technology Laser Measurement Laser Technology n d Web 18 May 2014 http www lasertech com Free Space Optical Quantum Key Distribution Using Intersatellite Links CNES Intersatellite Link Workshop n d Web 18 May 2014 http vcq quantum at fileadmin Publications 2003 22 pdf Cyber warfare How scared should we be Global Post n d Web 18 May 2014 http www globalpost com dispatch news business technology 130514 cyber warfarehackers attack utilities infrastructure Economist The Organized Crime Hackers Are The True Threat To American Infrastructure Business Insider Business Insider Inc 11 Mar 2013 Web 18 May 2014 http www businessinsider com organized crime hackers are the true threat to americaninfrastructure 2013 3 Touch and Input Sensing Solutions Touch and Input Sensing Microchip n d Web 18 May 2014 http www microchip com pagehandler en us products touch and inputsensing Noncontact Tactile Display Based on Radiation Pressure of Airborne Ultrasound IEEE TRANSACTIONS ON HAPTICS n d Web 18 May 2014 http www hapis k utokyo ac jp public hiroyuki_shinoda research pdf 10_Trans_Haptics_Hoshi pdf PrioVR a full body mo cap suit for gaming CNET CNET CNET n d Web 18 May 2014 http www cnet com news priovr a full body mo cap suit for gaming Stuff Gadget Awards 2013 winners announced These are the 22 Best Gadgets of the Year Stuff Stuff n d Web 18 May 2014 http www stuff tv gadget awards 2013 stuff gadget awards 2013 winnersannounced these are 22 best gadgets year feature Free Space Optical Communication Free Space Optics Advantages and Disadvantages Free Space Optical Communication Outdoor Wireless Communications n d Web 18 May 2014 http www fso net advantages disadvantages html Free Space Optics A Viable Secure Last Mile Solution SANS Institute InfoSec Reading Room n d Web 18 May 2014 https www sans org readingroom whitepapers wireless free space optics viable secure last mile solution 161 Introduction to Fiber Optic Safety Larry Johnson and Glenn Rosin n d Web 18 May 2014 https www lightbrigade com productionFiles Resource PDF Fiber OpticSafety aspx 21 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 Chen Brian Carriers Warn of Crisis in Mobile Spectrum The New York Times The New York Times 17 Apr 2012 Web 18 May 2014 http www nytimes com 2012 04 18 technology mobile carriers warn of spectrum crisisothers see hyperbole html pagewanted all _r 0 Wireless bandwidth Are we running out of room Computerworld Computer World n d Web 18 May 2014 http www computerworld com s article 9223670 Wireless_bandwidth_Are_we_running_o ut_of_room Free Space Optical Quantum Key Distribution Using Intersatellite Links CNES Intersatellite Link Workshop n d Web 18 May 2014 http vcq quantum at fileadmin Publications 2003 22 pdf Free Space Optics Technology FAQs free space optics Free Space Optics Technology FAQs Free Space Optics n d Web 18 May 2014 http www freespaceoptics org technologyfaqs html FSONA Technology Sona Optical Wireless Web 18 May 2014 http www fsona com technology php sec fso_guide FSO Free Space Optics Free Space Optics FSO FSO Free Space Optics Outdoor Optical Wireless Communications n d Web 18 May 2014 http www fso net Laser Technology Laser Measurement Laser Technology Laser Measurement Laser Technology n d Web 18 May 2014 http www lasertech com Free Space Optical Quantum Key Distribution Using Intersatellite Links CNES Intersatellite Link Workshop n d Web 18 May 2014 http vcq quantum at fileadmin Publications 2003 22 pdf Cyber warfare How scared should we be Global Post n d Web 18 May 2014 http www globalpost com dispatch news business technology 130514 cyber warfarehackers attack utilities infrastructure Economist The Organized Crime Hackers Are The True Threat To American Infrastructure Business Insider Business Insider Inc 11 Mar 2013 Web 18 May 2014 http www businessinsider com organized crime hackers are the true threat to americaninfrastructure 2013 3 Touch and Input Sensing Solutions Touch and Input Sensing Microchip n d Web 18 May 2014 http www microchip com pagehandler en us products touch and inputsensing Noncontact Tactile Display Based on Radiation Pressure of Airborne Ultrasound IEEE TRANSACTIONS ON HAPTICS n d Web 18 May 2014 http www hapis k utokyo ac jp public hiroyuki_shinoda research pdf 10_Trans_Haptics_Hoshi pdf PrioVR a full body mo cap suit for gaming CNET CNET CNET n d Web 18 May 2014 http www cnet com news priovr a full body mo cap suit for gaming Stuff Gadget Awards 2013 winners announced These are the 22 Best Gadgets of the Year Stuff Stuff n d Web 18 May 2014 http www stuff tv gadget awards 2013 stuff gadget awards 2013 winnersannounced these are 22 best gadgets year feature Free Space Optical Communication Free Space Optics Advantages and Disadvantages Free Space Optical Communication Outdoor Wireless Communications n d Web 18 May 2014 http www fso net advantages disadvantages html Free Space Optics A Viable Secure Last Mile Solution SANS Institute InfoSec Reading Room n d Web 18 May 2014 https www sans org readingroom whitepapers wireless free space optics viable secure last mile solution 161 Introduction to Fiber Optic Safety Larry Johnson and Glenn Rosin n d Web 18 May 2014 https www lightbrigade com productionFiles Resource PDF Fiber OpticSafety aspx
22 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 FSO History and Technology FSO History and Technology Laser Optronics n d Web 18 May 2014 http www laseroptronics com index cfm id 57 66 htm Profiling hackers Who are cyber criminals University of Wisconsin n d Web http www3 uwplatt edu news profiling hackers who are cyber criminals 10 Upcoming Technology That May Change The World Hongkiatcom RSS Hongkiat n d Web 18 May 2014 http www hongkiat com blog revolutionary products Mid Air Hologram Solutions IO2 Technology Heliodisplay Mid Air Hologram Solutions IO2 Technology Heliodisplay Systems and Solutions 2D 3D Interactive multi controller embedded systems n d Web 18 May 2014 http www io2technology com Ultrasound Can Create Virtual Objects in Mid Air PSFK PSFK RSS PSFK n d Web 19 May 2014 http www psfk com 2008 09 ultrasound can create virtual objects in midair html OErcz Converging Technologies for Improving Human Performance NANOTECHNOLOGY BIOTECHNOLOGY INFORMATION TECHNOLOGY AND COGNITIVE SCIENCE NationalScience Foundation n d Web 18 May 2014 http www whitehouse gov sites default files microsites ostp bioecon 28 23 20023SUPP 29 20NSF NBIC pdf Dickerson Kelly MIT Is Developing Technology That Will Allow You To Reach IntoYour Computer Screen Pull Something Out And Move It With Your Hands Business Insider Business Insider Inc 3 Dec 2013 Web 18 May 2014 http www businessinsider com mittangible media group technologies 2013 11 Technological Innovations in Crime Prevention and Policing A Review of the Research on Implementation and Impact James Byrne and Gary Marx n d Web 18 May 2014 https www ncjrs gov pdffiles1 nij 238011 pdf Electromagnetic Spectrum Introduction NASA n d Web 18 May 2014 http imagine gsfc nasa gov docs science know_l1 emspectrum html The Basics of Light The Basics of Light John Hopkins University n d Web 18 May 2014 http violet pha jhu edu wpb spectroscopy basics html Simulation of full duplex data transmission in ROF system using Optisystem CiteSeerX Document Not Found International Journal of Electronics and Computer Science Engineering n d Web 18 May 2014 http citeseerx ist psu edu viewdoc download doi 10 1 1 259 5265 rep rep1 type pdf Laser and Electro Optics Society Laser and Electro Optics Society n d Web 18 May 2014 http photonicssociety org newsletters oct05 19leos05 pdf Photonics Revolutionizing our world Anke Lohmann editor n d Web 18 May 2014 http www michelsondiagnostics com wp content uploads 2013 12 photonicsrevolutionising our world 1 pdf Laser Based Communications Passes Military Tests Photonics com Optics Lasers Imaging Fiber Information Resource Photonics n d Web 19 May 2014 http www photonics com Article aspx AID 55391 Navy to unveil laser weapon in 2014 PressTV US to deploy laser weapon on warship in 2014 n d Web 18 May 2014 http www presstv com detail 2014 02 18 351228 us navyto unveil laser weapon in 2014 Lasers for Dummies Lasers for Dummies WickedLasers n d Web 18 May 2014 http www wickedlasers com laser tech dummies html UltraHaptics Multi Point Mid Air Haptic Feedback for Touch Surfaces University of Bristol n d Web 18 May 2014 http big cs bris ac uk wpcontent uploads 2013 10 Ultrahaptics Carter 2013 pdf Use of Lasers University of Alaska Fairbanks n d Web 18 May 2014 http ffden2 phys uaf edu 212_fall2003 web dir James_Becwar uses 22 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 FSO History and Technology FSO History and Technology Laser Optronics n d Web 18 May 2014 http www laseroptronics com index cfm id 57 66 htm Profiling hackers Who are cyber criminals University of Wisconsin n d Web http www3 uwplatt edu news profiling hackers who are cyber criminals 10 Upcoming Technology That May Change The World Hongkiatcom RSS Hongkiat n d Web 18 May 2014 http www hongkiat com blog revolutionary products Mid Air Hologram Solutions IO2 Technology Heliodisplay Mid Air Hologram Solutions IO2 Technology Heliodisplay Systems and Solutions 2D 3D Interactive multi controller embedded systems n d Web 18 May 2014 http www io2technology com Ultrasound Can Create Virtual Objects in Mid Air PSFK PSFK RSS PSFK n d Web 19 May 2014 http www psfk com 2008 09 ultrasound can create virtual objects in midair html OErcz Converging Technologies for Improving Human Performance NANOTECHNOLOGY BIOTECHNOLOGY INFORMATION TECHNOLOGY AND COGNITIVE SCIENCE NationalScience Foundation n d Web 18 May 2014 http www whitehouse gov sites default files microsites ostp bioecon 28 23 20023SUPP 29 20NSF NBIC pdf Dickerson Kelly MIT Is Developing Technology That Will Allow You To Reach IntoYour Computer Screen Pull Something Out And Move It With Your Hands Business Insider Business Insider Inc 3 Dec 2013 Web 18 May 2014 http www businessinsider com mittangible media group technologies 2013 11 Technological Innovations in Crime Prevention and Policing A Review of the Research on Implementation and Impact James Byrne and Gary Marx n d Web 18 May 2014 https www ncjrs gov pdffiles1 nij 238011 pdf Electromagnetic Spectrum Introduction NASA n d Web 18 May 2014 http imagine gsfc nasa gov docs science know_l1 emspectrum html The Basics of Light The Basics of Light John Hopkins University n d Web 18 May 2014 http violet pha jhu edu wpb spectroscopy basics html Simulation of full duplex data transmission in ROF system using Optisystem CiteSeerX Document Not Found International Journal of Electronics and Computer Science Engineering n d Web 18 May 2014 http citeseerx ist psu edu viewdoc download doi 10 1 1 259 5265 rep rep1 type pdf Laser and Electro Optics Society Laser and Electro Optics Society n d Web 18 May 2014 http photonicssociety org newsletters oct05 19leos05 pdf Photonics Revolutionizing our world Anke Lohmann editor n d Web 18 May 2014 http www michelsondiagnostics com wp content uploads 2013 12 photonicsrevolutionising our world 1 pdf Laser Based Communications Passes Military Tests Photonics com Optics Lasers Imaging Fiber Information Resource Photonics n d Web 19 May 2014 http www photonics com Article aspx AID 55391 Navy to unveil laser weapon in 2014 PressTV US to deploy laser weapon on warship in 2014 n d Web 18 May 2014 http www presstv com detail 2014 02 18 351228 us navyto unveil laser weapon in 2014 Lasers for Dummies Lasers for Dummies WickedLasers n d Web 18 May 2014 http www wickedlasers com laser tech dummies html UltraHaptics Multi Point Mid Air Haptic Feedback for Touch Surfaces University of Bristol n d Web 18 May 2014 http big cs bris ac uk wpcontent uploads 2013 10 Ultrahaptics Carter 2013 pdf Use of Lasers University of Alaska Fairbanks n d Web 18 May 2014 http ffden2 phys uaf edu 212_fall2003 web dir James_Becwar uses
23 53 54 55 56 57 58 59 60 61 62 63 The Unrecognized Dangers of New Laser Pointers Continuous Wave Laser Institute of America n d Web 18 May 2014 http www lia org blog 2011 07 the unrecognizeddangers of new laser pointers Acousto Optic Tunable Filters AOTFs Olympus America Inc n d Web 18 May 2014 http www olympusmicro com primer techniques confocal aotfintro html http pubs media mit edu pubs papers TR 257 pdf Olympus Microscopy Resource Center M I T Media Laboratory Perceptual Computing Technical Report No 257 n d Web 18 May 2014 http pubs media mit edu pubs papers TR 257 pdf Laser Based People Tracking University of Southern California n d Web 19 May 2014 http robotics usc edu publications media uploads pubs 70 pdf Focused ultrasound modulates region specific brain activity National Institute of Health n d Web 19 May 2014 http www ncbi nlm nih gov pmc articles PMC3342684 Neural correlations population coding and computation Nature n d Web 19 May 2014 http www bcs rochester edu people alex pub articles AverbeckLathamPougetNRN06 pdf Harvard creates brain to brain interface allows humans to control other animals with thoughts alone ExtremeTech ExtremeTech Extreme Tech n d Web 19 May 2014 http www extremetech com extreme 162678 harvard creates brain to brain interfaceallows humans to control other animals with thoughts alone Emotiv EEG System Electroencephalography Emotiv EEG System Electroencephalography Emotiv n d Web 19 May 2014 http emotiv com Biosensor innovation to power breakthrough wearable technologies today and tomorrow NeuroSky Neurosky n d Web 19 May 2014 http neurosky com Ultrasound directed to the human brain can boost sensory performance http research vtc vt edu Virginia Tech Carilion Research Institute n d Web 19 May 2014 http research vtc vt edu news 2014 jan 12 ultrasound directedhuman brain can boost sensory Harvard creates brain to brain interface allows humans to control other animals with thoughts alone Harvard University n d Web 19 May 2014 http www plosone org article info doi 10 1371 journal pone 0060410 23 53 54 55 56 57 58 59 60 61 62 63 The Unrecognized Dangers of New Laser Pointers Continuous Wave Laser Institute of America n d Web 18 May 2014 http www lia org blog 2011 07 the unrecognizeddangers of new laser pointers Acousto Optic Tunable Filters AOTFs Olympus America Inc n d Web 18 May 2014 http www olympusmicro com primer techniques confocal aotfintro html http pubs media mit edu pubs papers TR 257 pdf Olympus Microscopy Resource Center M I T Media Laboratory Perceptual Computing Technical Report No 257 n d Web 18 May 2014 http pubs media mit edu pubs papers TR 257 pdf Laser Based People Tracking University of Southern California n d Web 19 May 2014 http robotics usc edu publications media uploads pubs 70 pdf Focused ultrasound modulates region specific brain activity National Institute of Health n d Web 19 May 2014 http www ncbi nlm nih gov pmc articles PMC3342684 Neural correlations population coding and computation Nature n d Web 19 May 2014 http www bcs rochester edu people alex pub articles AverbeckLathamPougetNRN06 pdf Harvard creates brain to brain interface allows humans to control other animals with thoughts alone ExtremeTech ExtremeTech Extreme Tech n d Web 19 May 2014 http www extremetech com extreme 162678 harvard creates brain to brain interfaceallows humans to control other animals with thoughts alone Emotiv EEG System Electroencephalography Emotiv EEG System Electroencephalography Emotiv n d Web 19 May 2014 http emotiv com Biosensor innovation to power breakthrough wearable technologies today and tomorrow NeuroSky Neurosky n d Web 19 May 2014 http neurosky com Ultrasound directed to the human brain can boost sensory performance http research vtc vt edu Virginia Tech Carilion Research Institute n d Web 19 May 2014 http research vtc vt edu news 2014 jan 12 ultrasound directedhuman brain can boost sensory Harvard creates brain to brain interface allows humans to control other animals with thoughts alone Harvard University n d Web 19 May 2014 http www plosone org article info doi 10 1371 journal pone 0060410