An Overview Of The Dreaded EMC Tests

There is one man whose hour-long sessions in my company give me days of stress and worry. He can be found in a soundless and windowless room deep in the bowels of an anonymous building in a town on the outskirts of London. You’ve probably driven past it or others like it worldwide, without being aware of the sinister instruments  that lie within.

The man in question is sometimes there to please the demands of the State, but there’s nothing too scary about him. Instead he’s an engineer and expert in electromagnetic compatibility, and the windowless room is a metal-walled and RF-proof EMC lab lined with ferrite tiles and conductive foam spikes. I’m there with the friend on whose work I lend a hand from time to time, and we’re about to discover whether all our efforts have been in vain as the piece of equipment over which we’ve toiled faces a battery of RF-related tests. As before when I’ve described working on products of this nature the specifics are subject to NDAs and in this case there is a strict no-cameras policy at the EMC lab, so yet again my apologies as any pictures and specifics will be generic.

There are two broadly different sets of tests which our equipment will face: RF radiation, and RF injection. In simple terms: what RF does it emit, and what happens when you push RF into it through its connectors and cables? We’ll look at each in turn as a broad overview pitched at those who’ve never seen inside an EMC lab, sadly there simply isn’t enough space in a Hackaday article to cover every nuance.

Continue reading “An Overview Of The Dreaded EMC Tests”

Review: The Asus Tinker Board (Updated)

In the years since the launch of the original Raspberry Pi we have seen the little British ARM-based board become one of the more popular single board computers in the hobbyist, maker, and hacker communities. It has retained that position despite the best efforts of other manufacturers, and we have seen a succession of competitor boards directly copying it by imitating its form factor. None of them have made a significant dent in the sales figures enjoyed by the Pi, yet they continue to appear on a regular basis.

We recently brought you news of the latest challenger in this arena, in the form of the Asus Tinker Board. This is a board that has made us sit up and take notice because unlike previous players this time we have a product from a giant of the industry. Most of us are likely to own at least one Asus product, indeed there is a good chance that you might be reading this on an Asus computer or monitor. Asus have made some very high quality hardware in their time, so perhaps this product will inherit some of that heritage. Thus it was with a sense of expectation that we ordered one of the first batch of Tinker Boards, and waited eagerly for the postman.

Update:

A member of the Asus Marketing team read this review and contacted Hackaday with some updated information. According to our discussion, the Tinker Board has not officially launched. This explains a lot about the current state of the Tinker Board. As Jenny mentions in her review below, the software support for the board is not yet in place, and as comments on this review have mentioned, you can’t source it in the US and most other markets. An internal slide deck was leaked on SlideShare shortly after CES (which explains our earlier coverage), followed by one retailer in the UK market selling the boards ahead of Asus’ launch date (which is how we got our hands on this unit).

Asus tells us that they are aiming for an end of February launch date, perhaps as soon as the 26th for the United States, UK, and Taiwan. Other markets might have some variation, all of this contingent on agreements with and getting stock to regional distributors. With the launch will come the final OS Distribution (TinkerOS based on Debian), schematics, mechanical block diagrams, etc. Asus tells Hackaday it is a top priority to deliver hardware video acceleration for the Rockchip on the Tinker Board. The Board Support Package which hooks the feature into Linux is not yet finished but will come either on launch day or soon after. This is the end of the update, please enjoy Jenny List’s full review below.

Continue reading “Review: The Asus Tinker Board (Updated)”

Living High-Altitude Balloon

High-altitude balloons are used to perform experiments in “near space” at 60,000-120,000 ft. (18000-36000m). However, conditions at such altitude are not particularly friendly and balloons have to compete with ultraviolet radiation, bad weather and the troubles of long distance communication. The trick is to send up a live entity to make repairs as needed. A group of students from Stanford University and Brown University repurposed nature in their solution. Enter Bioballoon: a living high-altitude research balloon.

Instead of using inorganic materials, the Stanford-Brown International Genetically Engineered Machine (iGEM) team designed microbes that grow the components required to build various tools and structures with the hope of making sustained space research feasible. Being made of living material, Bioballoon can be grown and re-grown with the same bacteria, lowering the cost of manufacturing and improving repeatability.

Bioballoon is engineered to be modular, with different strains of bacteria satisfying different requirements. One strain of bacteria has been modified to produce hydrogen in order to inflate the balloon while the balloon itself is made of a natural Kevlar-latex mix created by other cells. Additionally, the team is using Melanin, the molecule responsible for skin color and our personal UV protection to introduce native UV resistance into the balloon’s structure. And, while the team won’t be deploying a glider, they’ve designed biological thermometers and small molecule sensors that can be grown on the balloon’s surface. They don’t have any logging functionality yet, but these cellular hacks could amalgamate as a novel scientific instrument: cheap, light and durable.

Living things too organic for your taste? Don’t worry, we’ve got some balloons that won’t grow on you.

Continue reading “Living High-Altitude Balloon”

Soviet Era Smoke Detector Torn Down, Revealing Plutonium

It’s widely known that a smoke detector is a good ionizing radiation source, as they contain a small amount of americium-241, a side product of nuclear reactors. But what about other sources? [Carl Willis] got hold of an old Soviet era smoke detector and decided to tear it down and see what was inside. This, as he found out, isn’t something you should do lightly, as the one he used ended up containing an interesting mix of radioactive materials, including small amounts of plutonium-239, uranium-237, neptunium-237 and a selection of others. In true hacker fashion, he detected these with a gamma ray spectroscope he has in his spare bedroom, shielded from other sources with lead bricks and copper and tin sheets. Continue reading “Soviet Era Smoke Detector Torn Down, Revealing Plutonium”

Ham Radio Trips Circuit Breakers

Arc-fault circuit breakers are a boon for household electrical safety. The garden-variety home electrical fire is usually started by the heat coming from a faulty wire arcing over. But as any radio enthusiast knows, sparks also give off broadband radio noise. Arc-fault circuit interrupters (AFCI) are special circuit breakers that listen for this noise in the power line and trip when they hear it. The problem is that they can be so sensitive that they cut out needlessly. Check out the amusing video below the break.

Our friend [Martin] moved into a new house, and discovered that he could flip the breakers by transmitting on the 20-meter band. “All the lights in the place went out and my rig switched over to battery. I thought it was strange as I was certainly drawing less than 20 A. I reset the breakers and keyed up again. I reset the breakers again and did a [expletive] Google search.” Continue reading “Ham Radio Trips Circuit Breakers”

More Power: Powel Crosley And The Cincinnati Flamethrower

We tend to think that there was a time in America when invention was a solo game. The picture of the lone entrepreneur struggling against the odds to invent the next big thing is an enduring theme, if a bit inaccurate and romanticized. Certainly many great inventions came from independent inventors, but the truth is that corporate R&D has been responsible for most of the innovations from the late nineteenth century onward. But sometimes these outfits are not soulless corporate giants. Some are founded by one inventive soul who drives the business to greatness by the power of imagination and marketing. Thomas Edison’s Menlo Park “Invention Factory” comes to mind as an example, but there was another prolific inventor and relentless promoter who contributed vastly to the early consumer electronics industry in the USA: Powel Crosley, Jr.

Continue reading “More Power: Powel Crosley And The Cincinnati Flamethrower”

Hacking The Aether: How Data Crosses The Air-Gap

It is incredibly interesting how many parts of a computer system are capable of leaking data in ways that is hard to imagine. Part of securing highly sensitive locations involves securing the computers and networks used in those facilities in order to prevent this. These IT security policies and practices have been evolving and tightening through the years, as malicious actors increasingly target vital infrastructure.

Sometimes, when implementing strong security measures on a vital computer system, a technique called air-gapping is used. Air-gapping is a measure or set of measures to ensure a secure computer is physically isolated from unsecured networks, such as the public Internet or an unsecured local area network. Sometimes it’s just ensuring the computer is off the Internet. But it may mean completely isolating for the computer: removing WiFi cards, cameras, microphones, speakers, CD-ROM drives, USB ports, or whatever can be used to exchange data. In this article I will dive into air-gapped computers, air-gap covert channels, and how attackers might be able to exfiltrate information from such isolated systems.

Continue reading “Hacking The Aether: How Data Crosses The Air-Gap”