06 Mar 2017
We launched new game this week called Grand Theft Uber, where you get to drive around over 25 cities across the globe, playing Uber in a variety of different game modes. When you first download the game you are in the default game level, and it increases in complexity as you ascend (or descend) into different levels, depending on your role.
- Default White Guy - The easiest, entry level for the game is a white guy, helping you get your bearings without any concerns.
- Woman - Drive around the city as a woman and better understand the amazing level of personalization women receive daily.
- Person Of Color - Play the game as a person of color--I would say driving, but I still haven't been able to get a ride on this level.
- Regulator - This is where the game get's interesting, and you start seeing the movie magic of the Uber algorithm.
- Law Enforcement - As law enforcement you start unlocking new tools, allowing you to combat some of the smoke & mirrors of the Uber universe.
- Uber Driver - Enjoy driving people around the city by day, and sleeping in your car by night--if you are lucky you'll get someone interesting riding in your car.
- Uber Manager - This is where you start unlocking new expansion packs, operating in more hostile cities, and even getting the chance to break into new markets.
- Uber Engineer - It isn't quite god status in the Uber universe, but pretty close to it, unlocking a pretty powerful view of the Uber universe.
If you buy the premium version of the game this week, you also get a couple of bonus game levels including Travis Kalanick (Uber's CEO), and famous people like Mark Cuban, Kanye West, and other surprises. Download the game here, and begin experiencing the many different levels of the Uber universe, giving you a better understanding how technological personalization is impacting our lives.
11 Jan 2017
I am a patent storyteller. I craft and file patents that are in the speculative, moonshot, design fiction, science fiction, and storyteller categories. These patents aren't mean to describe an actual product line. They are purely intended to boost the profile of our client company's patent catalog and get people talking about them.
Back in 2005, I was working as a patent attorney, and I noticed the unrealistic nature of the patents I was being hired to write. What really defined the shift for me was that US Patent Office was actually accepting and approving these wildly unrealistic, often comprehensive and abstract filings. It was the gold rush for filing technology patents, and building your company's portfollio before anything changed--a decade later, nothing has changed.
Along the way I decide to offer my clients an enhanced, more creative edition of my services that I am calling "patent storytelling". While patents are still filed, become real, tangible intellectual property, the intent behind them is all about stimulating the imagination of tech bloggers and journalists who pay attention to the patent catalogs of leading companies. The marketing value of these patent stories far exceeds any cost associated with the crafting and filing of these legal documents.
We live in a magical time. The Internet is an amazing virtual world where anything is possible. While we do keep our storytelling somewhat in alignment with a customer's product roadmap, we specialize in telling stories that give the media and blogosphere the compelling stories they want to tell, providing them with the entertainment their readers demand. While stimulating the imagination of the media, and potentially the new and existing customers, patent storytelling has the best impact on the competitors of the companies we work for, making them work much harder to understand where a company might be headed.
I can't identify specific pieces we've produced, but our clients include 80% of fortune 500 companies, and all of the leading tech companies you know and trust. I will let you look through their patent catalogs, and decide with filings are patent storytelling, and which ones are not on your own
25 Oct 2016
Algorithmic policing using facial recognition technology has been in place in 98% of police departments in the United States for almost 11 years now. The full report about the last decade has become available, and the results have clearly been devastating to the white population. Due to arrest decisions being made 100% algorithmically, and the fact that facial recognition technology is largely blind to people of color, the last decade of policing has largely targeted the now minority white population.
Blind faith in the algorithms and a lack of diversity amongst facial recognition development teams created this perfect storm. While it has been devastatingly effective in incarcerating the white population, it would have to remain in operation for another century before we would see the scales tipped back in the favor of people of color. It does provide a wonderful reminder of how privilege and a lack of diversity can really bite you in the ass when you believe so religiously in the power of the algorithm.
Nobody is sure what will happen next. Can we go back to a world of human policing? Mistrust of human police offer still exists, but now with a complete lack of trust of the policing algorithms, nobody trusts the new system either. Most advocates are in favor of leaving in place, and living with the bias built into the facial recognition systems, until a solution can be found--we lived with it knowingly built into the human version for so long, why be in such a hurry to change course now? Solving the diversity problem on facial recognition technology development teams seems like the only path forward at this time.
24 Oct 2016
I am telling you that all you need is for each of your devices to respond to your presale validation requests and you can sell it many times over, to a variety of cybersecurity players. You can sell to the Chinese, to the Russian, a variety of rogue actors, and even to some researchers and news outlets. The money in all of this isn't in the manufacturing, and selling of IoT devices, or even the data generated from them--it is selling unsecured access to them once they are plugged into any network.
A camera, microphone, speaker, light, crockpot, or any other device--it doesn't matter. The smaller, cheaper, and more entertaining the better. You manufacture in large quantities, ship in bulk, and encourage the giving away of each device making it irresistible for users to plug it into their network. The more devices you can muster with a presale device validation ping, the more you can request from your buyers, with the market for these type of buyers growing by 200X in the next six months.
The trick is to stay in tune with each trend in wearables, home, and office gear. This week it's the workplace cubicle fan that measures the temperature, and next week its the mini lava lamp posting your mood to Twitter. The Internet connectivity should be simple, convenient, and entertaining, making plugging it into the network rewarding for the user. Once this is done, each device can ping home its availability for command and control. There are a growing number of trade magazines that cover the device trends, but usually by the time they've been covered it is yesterday's news, so you have to do your own research.
Take a look at our catalog, crunch the number in the spreadsheet template we provided you with--you will see the numbers pencil out for selling access to these unsecured devices, not selling the devices themselves.
17 Oct 2016
From what we now know, the invasion began in the early 20th century, with early signals sent to our invaders via experimentation in radio waves in the mid 19th century. Early forms of communication did not draw their attention like the signals we sent by radio, television, telephone, the Internet, and cellular technology. Each wave of technology matched the accompanying wave of the invasion, with our adoption of these innovations laying the groundwork of our own demise.
While radio and television demonstrated that we were a society worth invading, it wasn't until the Internet age, that the full-scale invasion began, leaving no place on earth out of reach from the invading force. Within 50 years of the Internet being unleashed on the world, all humanity was under the full control of our invading species. Because we led our own invasion, we did not see our invaders, they looked like us, spoke like we did, and desired the same things we desired. We attacked each other, in the service of our invaders, and we called in cyber warfare.
There were warnings all along the way, that technology was bad, and we ignored all the signs. We told stories in books, music, and movies, all of which became distractions, numbing us from being able to actually see our invading force. With capitalism as a vehicle, we reduced everyone and everything to a transaction. Each thought, message, idea, emotion became a commodity and fuel for the invading force. We swapped out our DNA for blockchain command and control, building our own prison, and walking in when our invaders commanded.
14 Oct 2016
When you purchase your security camera, router, printer, or other potentially Internet-connected device and plug it in on your network, you will have to complete its activation. When you purchased your IoT device, this was just the first half of the activation sequence, once you get connected to your network, you will need to execute the second half of activation sequence.
At this time your device will operate as expected, and is registered in multiple federal and state agencies databases. When your device manufacturer releases a firmware update for the device you will have 72 hours to apply the update, or face an IoT device compliance violation. Depending on the device, it starts around $25.00 with a 5% daily increase for each day of non-compliance.
Your manufacturer may have automatic updates turned on by default, resulting in the most desirable update schedule for everyone involved. For some reason, some manufacturers haven't made this default, and some installers opt to turn off when it is present. This is one reason we've automated the violation framework, to incentivize compliant activations. There are many proprietary and open source solutions available today that assist you in the management of your IoT devices, helping you stay in compliance with government IoT device security regulations--it shouldn't be a problem.
While IoT device security compliance may seem like yet another regulatory hurdle to have to climb over as a small business owner, it hopefully gives you the opportunity to pause while determining which objects you connect to the Internet. We all have to share in the burden of online security and assume our responsibility for each device we decide to connect to the online world.
12 Oct 2016
Our fleets of drone deployed radio frequency (RF) spectrum scanners can be deployed as a cohesive mesh, producing 100% scanning coverage wherever you need them--within an hour. Each drone logs everything. All signals are recorded and synced with the cloud in real-time, where our systems get to work identifying devices, and matching with existing intelligence.
Depending on your intelligence data subscription you should have access to all updates within minutes of the data coming in from the drones. Each drone fleet will establish the mesh coverage needed, based upon the KML file we upload. If we need to expand in the region at any point, additional drones will be deployed in real-time and fill in any gaps--immediately reporting all signals found.
Our RF scanning fleets do not allow for any decision-making capabilities, that is up to your systems--we just provide the data. RF scanning drones are specialized--they do one thing well. They track on all available RF signals available in the area we tell them to, that is all they are capable of doing. If you need more information on other types of specialized drone fleets we offer, or data enabled decision-making solutions, let me know, and I'll get the required information you desire.
11 Oct 2016
My full-time job is to keep track of the medical devices that members of the senate depend on. Specifically, the Internet-connected or network enabled devices that they use on a regular basis. I have a counterpart who works in service of the members of congress, and a separate one in charge of the White House--wee all share notes and reduce the amount of overlap in our efforts.
The first task at hand is to know the top products that are in place when it comes to the common ailments our senate leadership faces. Knowing the equipment they use is important, but knowing of the best product available is more important, so I can advise on sensible product decisions when new treatments are advised by doctors. All senators are required to consult with my office on all health care decisions--we still have the occasional rogue senator, but for the most part, they are all in compliance.
The second part of my work is focused on paying attention to all claims of healthcare devices having security vulnerabilities. I work to validate them as soon as they come in and identify the senators in which these vulnerabilities will impact. Once we have a compromised device we work to mitigate the risk by switching out the device if possible or keeping them on a limited access plan until proper updates, and patches can be applied. A big part of this is often asking journalists to leave out details of a senator's health, or details on the specific device they use.
More senators are using connected healthcare devices, especially amongst the elder ones. More devices are being connected to a network and the Internet. Making my job increasingly difficult. Information sharing is critical to what I do, but it has to be done in a thoughtful way, otherwise I'm just making senators a target. It all keeps me on my toes, but it is a worthy job and helps keep our country's leaders safe, as the Internet continues to make our world both safer and more dangerous, all in the same motion.
07 Oct 2016
Our numbers show that almost any company will lower their physical defenses in response to an online DDOS attack on their infrastructure. After delivering over 12K successful campaigns we began to test physical entry capabilities, and after delivering another 10K attacks, we found the most lucrative opportunity is not through the digital front door, but the physical front door.
We aren't suggesting going in and physically taking anything from the location. Our recommendations is a service call for an existing printer, security camera, or other device that lives on the internal network. After a sustained attack, by the 3rd day physical security tends to relax, as everyone is in a state of focus on the sustained denial of service attack targeting virtual infrastructure. Printers, cameras, and other equipment can be replaced without anyone noticing, setting the stage for a frictionless attack from the inside-out.
If you'd prefer, we can do the much lower cost drone fly by, as drone defense systems are usually compromised in the face of a DDOS attack. A drone fly by can usually find an open network, a network that can be penetrated, or an individual device that can be compromised. DDOS plus drone fly by is providing to the best way to yield results when it comes to a digital / physical combo attack.
Let me know which direction you'd like to take, and will get your campaigns setup immediately.
03 Oct 2016
If the numbers regarding online sales from the website prove true, I am prepared to take the entire team to Mars for a vacation. I was just logged into the dashboard and the sales numbers were well into the eight figures for this month, with the defensive costs associated with keeping the website online only being about 43% of that total. Those are some pretty stellar numbers, and worth celebrating as a team.
Last year our defensive costs for DDOS attacks were well into the 70% range--it was a bad year for operating online. Whether it was the result in our investment in machine learning DefenseTech (TM) solutions or the result of effective policing, our defensive costs are down. Surviving online has proven difficult for most businesses in 2027, fortunately, our company has down well enough to afford the required investment in DefenseTech (TM).
It was a hard-won year, but we did it. We are not only part of the .03% of businesses who survive in today's online environment, we are truly finding success. Our team deserves to relax and enjoy their time off, something that is getting more difficult to do on earth. This is why the company will charter a private SpaceX shuttle and take the entire team to Mars for the entire month of August. Confirm your participation, and let us know which family members will be joining us--as space is limited.
Thanks for your hard work and dedication through the dark years, your commitment will be rewarded with an out of this world experience.
29 Sep 2016
As an independent cable contractor, I am always looking for extra ways to make some money. This is why I joined UberWatch, which allows me to pick up extra surveillance jobs in the areas I'm already working in. All I do when I am on my regular jobs, is to turn on the app, and it will let me know if there are open surveillance jobs in the area available to me, I either decline or accept as they come in.
Many jobs I get are just asking if there is a car parked in the driveway or on street, while others are looking to monitoring a house for an hour or two. There are many different types of surveillance emerging, and through my UberWatch application, I can personalize which types of jobs I want to receive--the more you specialize, the more you can potentially make on a per job basis.
I've just reached my one year anniversary with the company, and with a very high trust ranking, I am now given access to a whole new world of jobs, and I'm able to even take jobs out of my regular area, while on vacation or as part of travel for work. I am hoping to use UberWatch to become a full-time investigator and quit my regular job. I enjoy keeping an eye on people, studying and watching their habits for the highest bidder.
29 Sep 2016
We can get the price down to around $8.00 USD per device, allowing you to reduce the cost of building your Botnet out significantly. When you give away a free Internet of Things device out for free at local events like flea markets, fairs, and other local gatherings, we see an average of 65% connectivity rate--nearly twice what we saw with USB devices in the past.
Once connected each device will phone home for instructions, and check back each hour until any detailed targets and intents have been provided. For two dollar more, we can ensure each device can also be activated and connected locally via wifi, not needing a direct Internet connection. We find that we can achieve another 20% in device activations by flying through neighborhoods with an activation drone.
If we can get your order in by the end of the week, and it is over 10K units, we can even take another $1.00 USD off the price, further reducing your costs to deploy. Make sure and ask your sales person about our local organizations that are hungry for these types of giveaways, providing ready to go, on the ground deployment opportunities on a regular basis. You will need to operate in one of the gold or silver tiers before you can take advantage of these opportunities, but from time to time we have introductory offers if you stay connected.
Don't wait to invest in your network, you know your competitors are building their's out as we speak.
30 Aug 2016
If you want to join your local area's stingray cell tower befuddle brigade all you have to do is have your own (secondary) iPhone or Android device, and you can download the appropriate mobile image for your device via the websites downloads page. While we do not track your user agent or IP address, we recommend using TOR when you visit website and download anything. In some markets, you can visit your local brigades weekly meeting location, and get a USB version of the mobile device image and get assistance from a qualified representative.
One you are up and running, all you do is leave your secondary device on as you go about your regular daily routine. Your device will automatically identify stingray cell towers in your area, and begin to work overtime to generate fake data, messages, and other traffic to flood the cell towers with misinformation. The more local users we can light up, the more data we can send through these unlawful cell towers, making their work much harder and costly.
The goal is to completely overwhelm the cell towers, but at the very least we want to make sure they have to wade through terabytes of meaningless fake data that they cannot separate from real world data. We want to increase their workloads, and make it too costly to continue, and eventually bring their illegal work out of the shadows when it comes to police operations budgets.
Thank you for your service. We hope some day this will not be necessary, and local police forces will have to use lawful ways to obtain search warrants, and work with mobile network providers to get access to criminal's data--not blank sweeping up of all of our information. Until then, we will work overtime swell our brigade ranks to flood and befuddle these rogue stingray cell towers that are violating the civil rights of all citizens.
08 Aug 2016
We have thousands of cyber operations running within the United States at any moment. We measure the effectiveness of these operations in real time, and by far, the two most successful areas for infiltration, gathering intelligence, and inflicting damage are in the areas of gaming and the fast-growing Internet of Things universe.
The amount of intelligence we are gathering from consumer drone operators in the United States is astounding--we are hardly able to keep up with the amount of mapping and video data we have gathered. Obviously, we are focusing on information gathered from existing high-value targets, but we are saving it all, as we never fully grasp what will add value to future operations.
After drones, mobile gaming, augmented reality, and virtual reality has proven to be an equally rich world of infiltration into the everyday lives of citizens, business, and government users across the country. The best part of this is that we can develop entirely new games that direct legions of users as if they were zombies to do the work we need. If we need a swarm of operatives across New York City all we have to do is issue a new challenge to any one of the hundreds of active games we have operating.
The best part of this area of tech, is the appetite for gaming and Internet-connected devices in the United States seems to be endless. The US market is perfectly setup for endless waves of new operations masked as the latest technology, with millions of eager Americans just waiting to help us achieve our mission objectives. It is truly a new age of warfare, one where the soldiers in play are often unaware they are being used to attack their targets, and our enemies can't always see an attack coming from within their own ranks.
05 Aug 2016
In 2023 every city in the United States has emergency wireless Internet drone fleet for deployment in the event of a disaster. The Internet was declared a right a couple of years back, opening up a flood of new funding for cities, counties, and states when it comes to their financing their drone fleets.
It is now commonplace that within minutes of a disaster occurring, for swarms of Internet wifi broadcasting drones to be deployed, where they are needed. Access to the wifi connections is prioritized for emergency responders, but a certain amount of spectrum is made available for citizens to connect to the Internet and stay in touch with family, as well as receive official information and updates.
The first wave of drones deployed on scene are for communications. It is the priority to make sure first responders can do their jobs, and the communication lines are always open for citizens. The second wave of drones sent in are for designed for bringing supplies like water, medicine, and food by a freight class of drone--a much sturdier version of drone, than the communication ones.
It will be your job to write the software that evaluates data from 100 of the most recent disasters and discover where there has been any breakdown that resulted in deployment delays, or any failures in network coverage. Our goal is to ensure that for every emergency situation the wireless internet infrastructure is always in place within minutes, using the latest swarm drone hardware and software.
04 Aug 2016
Our company policy is to not fly our drone fleet into any area where we cannot have at least five backup connections in the queue at any one time. Our patented drone radio redundancy platform continuously scans the landscape looking for viable wifi connections, and will actively work to have a minimum of five connections queued up to act as relays. Of course, the drone will always be looking for active connections, and validating them for use at a later time or date.
Due to an increase in the drone crashes across the fleet, we are recommending double the connection queue limit. The number one reason for drone crashes is loss of signal, and having up to 10 active backup connections is considered the best possible scenario. The drone RC redundancy software handle the scaling up and down, allowing you to tap into as many connections as you need for optimal drone activity in a variety of industries and conditions.
Wifi redundancy has proven to be the cheapest and most reliable way to fly your drones anywhere in urban, and suburban landscapes. 3,4, and 5G options are also available, but will require additional hardware, and software upgrades. Light post charging stations have increased our drone power range, and now radio control redundancy has done the same for the radio signal for any drone fleet. We are able to reduce our drone loss to radio signal from 12% to 2%, by doubling the number of connections in the queue to 10.
Don't just rely on the local range of 2.4 GHz and 5.8 GHz, with our software based relay solution you can connect to your drone via any 2.4 GHz and 5.8 GHz wifi hotspot, and control it anywhere you need.
04 Aug 2016
Need to go somewhere and you don't want law enforcement or even that nosey boss or wife of yours knowing about? Boy, do we have the person drone for you! The new facade edition of our microdrone can clone your iPhone, and can mimic all or part of your daily activities for you, while you are out doing what you need to get done.
All it takes is 30 days worth of log files on your cell phone, and your personal micro drone will perform any activity you choose. All you do is browse the available activities, and community behavior templates via your smartphone app, pick the chosen schedule and go. The drone will do the rest, even hovering outside your office window pretending you are at work.
While your micro-drone is acting on your behalf your cell phone will automatically go into an incognito mode, giving full control over the drone to broadcast your location, and even tweet, take photos and perform other activities as you need. Obviously, there are limitations, but to anyone tracking your location via your regular social channels, it will appear you are behaving as usual.
The new facade micro-drone is not just for eluding surveillance, it can also be used to broadcast new and interesting journeys, that maybe you don't have the time to take, using the community preprogrammed facades. There are trips to the park, zoo, beach, and many other activities you would like to be doing, but may not have the time or money to do so.
The new micro-drone facade is available on our website, or through the Amazon store--get yours now!
03 Aug 2016
As the recent mobile phone footage of a drone squabble in the Mission District demonstrates, space on our cities street lamps has become extremely valuable. Drone programmers and operators have developed a wide range of approaches to ensure their drones, and the drones of their partners, are getting access to the power charging stations available on the modern city lamp post.
With the wide range of drones in operation in the average city in 2021, the number of drones looking for a place to charge at any given moment has outpaced the number of light posts, and the number of slots available per post. This has occurred even though a majority of the legacy lamp posts has been replaced with newer versions that maximize the quantity of available landing and charging slots.
Even with the addition of private charging stations that have emerged for fleets, the number of public charging stations available in the city is not enough. It has gotten so bad, that many drone operators have resorted to bad behavior like forcing the crash of competitor drones and stealing the slots, or employing squatter drones whose only job is to squat on slot until an approved drone on their network is in need of a charge. The squatter drone then hovers nearby to reclaim spot when finished.
Some cities have started selling access to slots for a premium, in addition to the surcharge placed on power consumption. Others are requiring drones to programmatically give priority to more critical drone operations like health care and policing units. Here in San Francisco, the mayor has imposed a new fine for drone operators whose vehicles demonstrate aggressive behavior, until a suitable solution can be found.
City drone incident response teams have been overwhelmed, and corporate incident response teams have formed as well. When you couple all of this with the rise in the number of smartphone camera videos of incidents, it is clear we have a growing problem on our hands.
03 Aug 2016
It is pretty easy to get into most of the systems we target. Porn and hookup type websites just aren't going to prioritize security like banks, and other companies will. We do not care about 98% of the profiles and activities we come across, but after we run through our graph database analyzer, there is usually about 2% of the users we will add to the database.
We are just looking for powerful people who are leaders in companies and governments of any shape or size. Our graph database keeps track of important people, their family, wives, girlfriends, and any other possible doorway to their online worlds. It only takes one message, one photo or video, from the right person, and we can pwn a potentially powerful person's digital self.
If they are a city council person they might only be worth a couple grand. If they work for a big corporation they might be worth a couple hundred grand. If they work in just the right government agency, they could be worth millions. Usually, the more they are worth, the more cautious they are online, except for the power variable--where the more powerful they are the more likely they are to do really stupid shit online that they think is secret.
Our graph database keeps track of all the people, their profiles, and their relationships--our predictive analytics drives the potential value ranking of each profile, often driving where we investment our time and resources. About 50% of our time is spent on infiltrating general targets, where the other 50% is spent on specific platforms where high-value targets are known to be frequenting--these can be harder to get into.
With the amount of time spent online by the average person, the odds are increasingly in our favor, all we have to do is keep mining. Of course, if you have any specific targets you'd like to see included, along with any specifics on their online activity we'd like to talk.
02 Aug 2016
We brought programmatic control and intelligence to the drone landing gear market. Before we entered the space with our intelligent landing gear™, it was just about extending, and augmenting the gear with static add-ons.
We made our big entrance into the sector with our street lamp charging gear, allowing drone fleets to grab onto existing pole infrastructure, and safely connect to electric charging stations. After consolidating with our biggest competitor DroneGear, we took their line of Smart Drone Delivery Gear™ to the next level.
Intelligent controls at the landing gear level have added another dimension to the programmable drone stack. A modern drone has intelligence built into the flight controller, camera, power, and landing gear levels. Drone landing gear has gone beyond its original purpose, and multi-function drone landing gear is essential no matter what industry you are operating in.
When it comes to Intelligent Drone Landing Gear ™, we are your choice--let us know how we can help.