CCA Ethernet Cables: Not Up To Scratch, But Are They Dangerous?

If you’ve ever bought a suspiciously cheap Ethernet cable from an online listing, there’s a decent chance you’ve encountered Copper Clad Aluminum. Better known as CCA, it’s exactly what it sounds like—an aluminium conductor with a thin skin of copper deposited on the outside. Externally, cables made with this material look largely like any other, with perhaps the only obvious tell being that they feel somewhat lighter in the hand.

CCA is cheaper than proper copper cabling, and it conducts signals well enough to function in an Ethernet cable. And yet, it’s a prime example of corner-cutting that keeps standards bodies and professional installers up at night. But just how dangerous is this silent scourge, found lurking in so many network cabinets around the world?

Not Up To Scratch

CCA wire is typically made by wrapping an aluminium core with copper strip and then extruding it through a die. Credit: USPTO

Everything you need to know about CCA is in the name—it refers to an aluminium wire with a thin copper cladding, typically applied through a die extrusion process. The reasoning behind this exploits a real physical phenomenon called the skin effect, wherein higher-frequency AC signals tend to travel along the outer surface of a conductor. The idea goes that since most of the current moves through the outer copper skin layer anyway, the less-conductive aluminium core doesn’t unduly impact the wire’s performance. Using copper-clad aluminium wiring is, in theory, desirable because aluminium is much cheaper than copper, which can really add up over long cable runs. Imagine you’re wiring a building with with hundreds of miles of Ethernet cabling, all with eight conductors each—the savings add up pretty quickly.

There’s a problem with CCA cabling in these contexts, though. Due to prevailing cabling standards, any cable made with CCA is technically not even a real Ethernet cable at all. The relevant documents are unambiguous.

ANSI/TIA-568.2-D requires conductors in Category-rated cable to be solid or stranded copper. No other materials are acceptable, and thus CCA is explicitly excluded from use in Category cable applications. A cable with CCA conductors cannot legitimately carry a Cat5e, Cat6, or any related designation under any circumstances. Similarly, ISO/IEC 11801 has the same requirement. The U.S. National Electrical Code also states that conductors in communications cables, other than coaxial cable, shall be copper. This isn’t a suggestion or a best practice; it’s the letter of the code. Anything lesser is simply not allowed. Continue reading “CCA Ethernet Cables: Not Up To Scratch, But Are They Dangerous?”

Spy Tech: Conflicts Bring A New Number Station

If you know much about radios and espionage, you’ve probably encountered number stations. These are mysterious stations that read out groups of numbers or otherwise encoded messages to… well… someone. Most of the time, we don’t know who is receiving the messages. You’d be excused for thinking that this is an old technology. After all, satellite phones, the Internet, and a plethora of options now exist to allow the home base to send spies secret instructions. However, the current-day global conflict has seen at least one new number station appear, apparently associated with the United States and, presumably, targeting some recipients in Iran, according to priyom.org.

As you might expect, these stations don’t identify themselves, but the Enigma Control List names this one as V32. It broadcasts two two-hour blocks a day at 0200 UTC and a repeat at 1800 UTC. Each message starts with the Farsi word for “attention” followed by what is assumed to be some header information as two 5-digit groups. Then there is a set of 181 five-digit groups. Each message is padded out to take 20 minutes, and there are six messages in each transmission.

Continue reading “Spy Tech: Conflicts Bring A New Number Station”

Artemis II Agenda Keeps Moon-Bound Crew Busy

With the launch of Artemis II from Cape Canaveral potentially just weeks away, NASA has been releasing a steady stream of information about the mission through their official site and social media channels to get the public excited about the agency’s long-awaited return to the Moon. While the slickly produced videos and artist renderings might get the most attention, even the most mundane details about a flight that will put humans on the far side of our nearest celestial neighbor for the first time since 1972 can be fascinating.

The Artemis II Moon Mission Daily Agenda is a perfect example. Released earlier this week via the NASA blog, the document seems to have been all but ignored by the mainstream media. But the day-by-day breakdown of the Artemis II mission contains several interesting entries about what the four crew members will be working on during the ten day flight.

Of course, the exact details of the agenda are subject to change once the mission is underway. Some tasks could run longer than anticipated, experiments may not go as planned, and there’s no way to predict technical issues that may arise.

Conversely, the crew could end up breezing through some of the planned activities, freeing up time in the schedule. There’s simply no way of telling until it’s actually happening.

With the understanding that it’s all somewhat tentative, a look through the plan as it stands right now can give us an idea of the sort of highlights we can expect as we follow this historic mission down here on Earth.

Continue reading “Artemis II Agenda Keeps Moon-Bound Crew Busy”

Hacking The System In A Moral Panic: We Need To Talk

It seems that for as long as there have been readily available 3D printers, there have been moral panics about their being used to print firearms. The latest surrounds a Washington State Legislature bill, HB2320, which criminalises the printing of unregistered guns. Perhaps most controversially, it seeks so impose a requirement on printers sold in the state to phone home and check a database of known firearms and refuse to print them when asked.

This has drawn a wave of protest from the 3D printing community, and seems from where we are sitting to be a spectacularly ill-conceived piece of legislation. It’s simply not clear how it could be implemented, given the way 3D printers and slicing software actually work.

Oddly This Isn’t About Firearms

The root of the problem with this bill and others like it lies in ignorance, and a misplaced belief in the power of legislation. Firearms are just the example here, but we can think of others and we’re sure you can too. Legislators aren’t stupid, but by and large they don’t come from technology or engineering backgrounds.

Meanwhile they have voters to keep happy, and therefore when a moral panic like this one arises their priority is to be seen to be doing something about it. They dream up a technically infeasible solution, push to get it written into law, and their job is done. Let the engineers figure out how to make it work. Continue reading “Hacking The System In A Moral Panic: We Need To Talk”

Pokemon Go Had Players Capturing More Than They Realized

Released in 2016, Pokemon Go quickly became a worldwide phenomenon. Even folks who weren’t traditionally interested in the monster-taming franchise were wandering around with their smartphones out, on the hunt for virtual creatures that would appear via augmented reality. Although the number of active users has dropped over the years, it’s estimated that more than 50 million users currently log in and play every month.

From a gameplay standpoint, Go is brilliant. Although the Pokemon that players seek out obviously aren’t real, searching for them closely approximates the in-game experience that the franchise has been known for since its introduction on the Game Boy back in 1996.

But now, instead of moving a character through a virtual landscape in search of the elusive “pocket monsters”, players find them dotted throughout the real world. To be successful, players need to leave their homes and travel to where the Pokemon are physically located — which often happens to be a high-traffic area or other point of interest.

As a game, it’s hard to imagine Pokemon Go being a bigger success. At the peak of its popularity, throngs of players were literally causing traffic jams as they roamed the streets in search of invisible creatures. But what players may not have realized as they scanned the world around them through the game was that they were helping developer Niantic build something even more valuable.

Continue reading Pokemon Go Had Players Capturing More Than They Realized”

Secure Communication, Buried In A News App

Cryptography is a funny thing. Supposedly, if you do the right kind of maths to a message, you can send it off to somebody else, and as long as they’re the only one that knows a secret little thing, nobody else will be able to read it. We have all sorts of apps for this, too, that are specifically built for privately messaging other people.

Only… sometimes just having such an app is enough to get you in trouble. Even just the garbled message itself could be proof against you, even if your adversary can’t read it. Enter The Guardian. The UK-based media outlet has deployed a rather creative and secure way of accepting private tips and information, one which seeks to provide heavy cover for those writing in with the hottest scoops.

Continue reading “Secure Communication, Buried In A News App”