All these fifty years of conscious brooding have brought me no nearer to the answer to the question, ‘What are light quanta?’ Nowadays every Tom, Dick and Harry thinks he knows it, but he is mistaken.
Albert Einstein, 1954
As 1926 was coming to a close, the physics world lauded Erwin Schrodinger and his wave mechanics. Schrodinger’s purely mathematical tool was being used to probe the internal structure of the atom and to provide predictable experimental outcomes. However, some deep questions still remained – primarily with the idea of discontinuous movements of the electron within a hydrogen atom. Niels Bohr, champion of and chief spokesperson for quantum theory, had developed a model of the atom that explained spectral lines. This model required an electron to move to a higher energy level when absorbing a photon, and releasing a photon when it moved to a lower energy level. The point of contention is how the electron was moving. This quantum jumping, as Bohr called it was said to be instantaneous. And this did not sit well with classical minded physicists, including Schrodinger.
How does one go about measuring the mass of an object? Mass is defined as the amount of matter an object contains. This is very different from weight, of course, as the mass of our object would remain the same despite the presence or size of a gravitational field. It is safe to say, however, that most laboratory measurement systems are here on Earth, and we can use the Earth’s gravity to aid in our mass measurement. One way is to use a balance and a known amount of mass. Simply place our object on one side of the balance, and keep adding known amounts of mass to the other side until the balance is balanced.
But what if our object is very small…too small to see and too light to measure with gravity? How does one measure the mass of single atom? Furthermore, how does one determine how much of an object consists of a particular type of atom? There are two commonly used tools just for this purpose. Chances are you’ve heard of one of these but not the other. These tools used to measure substances on the atomic level is the focus of today’s article.
Einstein referred to her as the most important woman in the history of mathematics. Her theorem has been recognized as “one of the most important mathematical theorems ever proved in guiding the development of modern physics.” Yet many people haven’t the slightest clue of who this woman was, or what she did that was so significant to our understanding of how our world works. If you count yourself as one of those who have never heard of Emmy Noether and wish to enlighten yourself, please read on. I can only hope I do her memory justice. Not just by telling you who she was, but by also giving you an understanding of how her insight led to the coming together of symmetry and quantum theory, pointing academia’s arrow toward quantum electrodynamics.
Being a female in Germany in the late 1800s was not easy. She wasn’t allowed to register for math classes. Fortunately, her father happened to be a math professor, which allowed her to sit in on many of his classes. She took one of his final exams in 1904 and did so well that she was granted a bachelors degree. This allowed her to “officially” register in a math graduate program. Three years later, she earned one of the first PhD’s given to a woman in Germany. She was just 25 years old.
1907 was a very exciting time in theoretical physics, as scientists were hot on the heels of figuring out how light and atoms interact with each other. Emmy wanted in on the fun, but being a woman made this difficult. She wasn’t allowed to hold a teaching position, so she worked as an unpaid assistant, surviving on a small inheritance and under-the-table money that she earned sitting in for male professors when they were unable to teach. She was still able to do what professors are supposed to do, however – write papers. In 1916, she would pen the theorem that would have her rubbing shoulders with the other physics and mathematical giants of the era.
Noether’s Theorem – The Basics
Emmy Noether’s Theorem seems simple on the onset, but holds a fundamental truth that explains the fabric of our reality. It goes something like this:
For every symmetry, there is a corresponding conservation law.
We all have heard of laws such as Newton’s first law of motion, which is about the conservation of momentum. And the first law of thermodynamics, which is about the conservation of energy. Noether’s theorem tells us that there must be some type of symmetry that is related to these conservation laws. Before we get into the meaning, we must first understand a little known subject called The Principle of Least Action.
The Universe is Lazy
I would wager a few Raspberry Pi Zeros that many of you already have an intuitive grasp of this principle, even if you’ve never heard of it before now. The principle of least action basically says that the universe has figured out the easiest way possible to get something done. Mathematically, it’s the sum over time of kinetic energy minus potential energy as the action occurs. Let us imagine that you’re trying to program an STM32 Discovery eval board in GCC. After about the 6,000th try, you toss the POS across the room and grab your trusty Uno. The graph depicts the STM32 moving through time and space.
The green points represent particular points of how how high the STM32 is at a given point in time. Note that there are no values for height and time – this example is meant to explain a principle. We can say that at these points (and all points along the curve), the SMT32 has both kinetic and potential energies. Let us call the kinetic energy (kt) and the potential energy (pt). The ‘t‘ subscript is for time, as both the energies are functions of time. The action for each point will be called s, and can be calculated as:
However, action is the total sum of the difference of energies at each point between t1 and t2. If you’ve read my integral post, you will know that we need to integrate in order to calculate the total action.
Now before you get your jumper wires in a bunch, all that is saying is that we’re taking the difference in potential (p) and kinetic (k) energies at each point along the curve between t1 and t2, and we’re adding them together. The elongated S symbol means a sum, and the (dt) means as it changes over time. The path that the STM32 will take will be the path where the action S is at its minimum value. Check out the video in the source section below if you’re confused. It’s only 10 minutes and goes into this concept in easy to follow details.
Noether’s Theorem – The Details
Noether’s theorem is based upon a mathematical proof. It’s not a theory. Her proof can be applied to physics to develop theories, however. Now that we know what the principle of least action is, we can do just this.
Any law of nature can be traced back to a symmetry and the least action principle. Let’s consider two very simple examples – Newton’s first law of motion and the first law of thermodynamics.
Conservation of Momentum
Space has what is known as translational symmetry. That’s just fancy-pants talk for saying that what you do in one point in space is the same as what you do in another point in space. It doesn’t matter what hacker space you throw your STM32, it will act the same at all hacker spaces on earth. Space itself provides the symmetry. And because the principle of least action applies, you have a natural law – the first law of motion.
Conservation of Energy
Time has the same translational symmetry as space does. If I toss the STM32 now, and toss it tomorrow, it will act the same. It doesn’t matter what point in time I toss it, the results will always be the same. Thus energy is conserved between different points in time. Time is our symmetry, and the 1st law of thermodynamics is the result.
Now, I realize these examples might seem a bit useless. But when you dig a bit deeper, things get interesting. Electrical charge is also conserved. Noether says there must then be some type of symmetry involved. What do you suppose that symmetry might be? Keep following that rabbit hole, and you’ll end up face to face with QED. We’ll get there in a future article, so for now just keep Noether’s Theorem in mind.
Physics Helps, The principle of least action, video link.
Ransom Stephens, Ph.D., Emmy Noether and The Fabric of Reality, video link
One of the biggest challenges for a company that holds invaluable data is protecting it. At first, this task would seem fairly straightforward. Keep the data on an encrypted server that’s only accessible via the internal network. The physical security of the server can be done with locks and other various degrees of physical security. One has to be thoughtful in how the security is structured, however. You need to allow authorized humans access to the data in order for the company to function, and there’s the rub. The skilled hacker is keenly aware of these people, and will use techniques under the envelope of Social Engineering along with her technical skills to gain access to your data.
Want to know how secure your house is? Lock yourself out. One of the best ways to test security is to try and break in. Large companies routinely hire hackers, known as penetration testers, to do just this. In this article, we’re going to dissect how a hired penetration tester was able to access data so valuable that it could have destroyed the company it belonged to.
The start of any hack involves information gathering. This is usually pretty easy for larger companies. Their website along with a few phone calls can reveal quite a bit of useful information. However, you can be assured that any company who has hired a pen tester has taken the necessary precautions to limit such information.
And such was the case for our hacker trying to gain access to the ACME Corp. servers. Her first target was the dumpsters – dumpster dives have been proven to unearth a trove of valuable information in the past. But the dumpsters were inside the complex, which was guarded by a contracted security firm. Through a bit of website snooping and a few phone calls, she was able to find out the department that was in charge of trash removal for the company. She then placed a phone call to this department. Using a social engineering (SE) technique known as pretexting, she pretended to be with a trash removal company and wanted to submit a quote to service their business. Using another SE technique called elicitation, she was able to find out:
that trash collection took place on Wednesdays and Thursdays
the total number of dumpsters
that there was a special dumpster for paper and technology trash
the name of the current waste removal company – Waster’s Management
the name of the employee in charge of the waste removal – [Christie Smith]
Armed with this information, she went to the Waster’s Management website and grabbed their JPEG logo. Within a few days, she had a shirt and hat with the logo in her hands. She called the security department and said she was with Waster’s Management, and that [Christie Smith] had told her one of the dumpsters was damaged, and she needed to take a look at it before the next trash removal.
The next day, wearing the shirt and hat she had ordered online, she was given a badge from security and allowed access to the dumpsters. Now, any hacker worth her weight in PIC16F84’s already knows what dumpster she dove into. It didn’t take her long to walk away with several hard drives, a few USB drives and some useful documents. She was able to gain knowledge of an upcoming IT contract work, the name of the CFO, and the name of a server with some level of importance – prod23.
Hacking the Server
With some more SE, she was able to find out when the IT work was scheduled. It was after hours. She showed up a bit late and was able to walk right through the front door by claiming she worked for the IT contract company. She then shifted roles and pretended to be an employee. She approached one the real IT contract guys, and said she worked for the CFO, [Mr. Shiraz], and asked if he knew to be careful with the prod23 server. With more SE, she was able to find out the prod23 server was off-limits, encrypted, and only accessible by specific admins.
She was able to access an admin office, and it was there she would don her black hat. She booted the computer with BackTrack via USB and installed a key logger. She made an SSH tunnel to her personal server where she could dump the contents of the key logger, along with some other shells. Now, this is where things get interesting. She opened Virtual Box and used the computer’s hard drive as the boot medium. The VM booted the OS, and she hid all of the screen decorations to make it look like the target OS was running. The admin would log in without a clue, and our hacker would get their username and password through the key logger.
Once the login information came in, she was able to access the admin’s computer, and from there the prod23 server. You can imagine the look on the faces of the top executives for ACME Corp when our hacker handed them a copy of the keys to their kingdom.
Social engineering is human hacking, and a dark art in itself. Our hacker in this story would have never been able to even get close to the server if she did not have SE skills. No matter how secure you make something, so long as you allow humans access to it, it’s vulnerable to attack. And then it’s down to how well-trained your people are in repelling these kinds of intrusions.Just ask Target.
You can find the full story in the source below.
Social Engineering, The Art of Human Hacking, Chapter 8, by Christopher Hadnagy, ISBN-13: 860-1300286532
Rudis – A small wooden sword given to a Gladiator as proof of his achieved freedom. It signifies his ascent from being a slave to becoming a free man.
One thing is certain – anything that runs on electricity can be connected to the internet. The only obstacle is cost. And as costs come down, the reality of The Internet of Things will be upon us. Everything from cars to curling irons will be connected to the Internet. With this newly connected world will come a new breed of hacker. The Black Hats will move out from behind their keyboards and spill into the streets, only to be met by the White Hats as they battle for control over our endlessly connected world.
And such was the case on the morning of October 16, 2029. The air was cool and breezy when Randall C. Tubbs, a senior police officer at the Bronx 49th precinct, received a call over his radio to check out a tripped alarm at a nearby cell tower. Barely a minute had passed by when he pulled in to the Tower Road cul-de-sac on the day our story begins. The cell tower dominated the horizon, and was silhouetted against a cloudless blue sky. The trees of the forest surrounding the area were just starting to show their colors, with the yellow oak leaves being most vibrant. A narrow gravel driveway led to a small, brown, nondescript building at the base of the tower. At first glance, Officer Tubbs could see no sign of anything unusual. There was no service truck in sight, and the gate to the ten-foot-tall chain link fence surrounding the tower was latched shut and securely locked.
It wasn’t until he unlocked the gate that he first noticed something odd. A security camera on the right corner of the building was pointing toward the forest. He glanced around and quickly spotted two other cameras, each of them pointing away from the tower building. Clearly, they should have been pointing toward the tower and the door to the building… a door that Officer Tubbs now realized was slightly open. He could barely make out shadows moving around from the small sliver of light that was peeking ominously through the opening, suggesting someone was inside. Suddenly, the sound of his footsteps on the gravel seemed to become amplified, and his breathing so loud that for a split second he held his breath. He reached down and turned the volume of his radio to silent, and slowly began making his way to the open door.
In this day and age we’re consistently surrounded with portable electronic devices. In order for them to be called “portable”, they must run on batteries. Most, if not all, use rechargeable batteries. These batteries have a finite lifespan, and will eventually need to be replaced. UCI chemist [Reginald Penner] and doctoral candidate [Mya Le Thai] have been hard at work on making rechargeable batteries that last forever.
Nanowires are great candidates for rechargeable battery technology because the wires, thousands of times thinner than a human hair, are great conductors of electricity. The problem is repeated charging and discharging makes them brittle, which causes them to eventually fail. Typically, the researchers at UCI could get 5000 to 7000 cycles in before they failed. After some trial and error, they found that if they coat a gold nanowire with an acrylic-like gel, they can get up to 200,000 charge/discharge cycles through it before failure.
Symmetry is everywhere in our natural world. Just take a look at your hands, a butterfly, or a sunflower. It’s easy to pass off the idea of symmetry and symmetric structures as a simple quirk of existence, and to pay it little mind. If this is your view, I can assure you it will no longer be by the end of this series. If we force ourselves to look beyond the grade school applications of symmetry, we find a world rich in connections via many different types of symmetric identities. One of the most interesting is Gauge Symmetry, which lies at the heart of Quantum Electrodynamics, or QED (we’ll get into this a bit later in the series). Several branches of higher level mathematics study symmetry in detail, allowing a host of sciences, from physics to chemistry, to view difficult problems and theories from a different perspective.
The subject matter of the ideas explored in symmetry is complicated, and not well known outside of academia and the theoretical sciences. It is the goal of this series of articles to simplify some of the concepts that underpin the study of symmetry, so that the average hacker can gain a basic (and I mean basic) understanding of this fascinating body of knowledge, and put it to use in future projects. We’ll start things off by taking a look at a machine that has crossed the Hackaday server many times – those nifty Rubik’s Cube solvers. Just how do those things work anyway?