Join us on Wednesday, January 29 at noon Pacific for the Open-Source Medical Devices Hack Chat with Tarek Loubani!
In most of the developed world, when people go to see a doctor, they’re used to seeing the latest instruments and devices used. Most exam rooms have fancy blood pressure cuffs, trays of shiny stainless steel instruments, and a comfortable exam table covered by a fresh piece of crisp, white paper. Exams and procedures are conducted in clean, quiet places, with results recorded on a dedicated PC or tablet.
Such genteel medical experiences are far from universal, though. Many clinics around the world are located in whatever building is available, if they’re indoors at all. Supplies may be in chronically short supply, and to the extent that the practitioners have the instruments they need to care for patients, they’ll likely be older, lower-quality versions.
Tarek Loubani is well-versed in the practice of medicine under conditions like these, as well as far worse situations. As an emergency physician and researcher in Canada, he’s accustomed to well-appointed facilities and ample supplies. But he’s also involved in humanitarian relief, taking his medical skills and limited supplies to places like Gaza. He has seen first-hand how lack of the correct tools can lead to poor outcomes for patients, and chose to fight back by designing a range of medical devices and instruments that can be 3D-printed. His Glia Project has free plans for a high-quality stethoscope that can be built for a couple of dollars, otoscopes and pulse oximeters, and a range of surgical tooling to make the practice of medicine under austere conditions a little easier. Continue reading “Open-Source Medical Devices Hack Chat”
How would you survive in a war-torn country, where bombs could potentially fall from the sky with only very short notice? And what if the bomb in question were The Bomb — a nuclear weapon? This concern is thankfully distant for most of us, but it wasn’t always so. Only 75 years ago, bombs were raining down on England, and until much more recently the threat of global thermonuclear war was encouraging school kids to “duck and cover”. How do you protect people in these situations?
The answers, naturally, depend on the conditions at hand. In Britain before the war, money was scarce and many houses didn’t have basements or yards that were large enough to build a family-sized bomb shelter in, and they had to improvise. In Cold War America, building bomb shelters ended up as a boon for the swimming pool construction industry. In both cases, bomb shelters proved to be a test of engineering ingenuity and DIY gumption, attempting to save lives in the face of difficult-to-quantify danger from above.
Continue reading “Hacking Shelters And Swimming Pools”
Gen. Robert H. Barrow, USMC, once said that “Amateurs talk about tactics, but professionals study logistics.” That’s true in many enterprises, but in warfare, the side that neglects logistics is likely to be the loser. Keeping soldiers fed, clothed, and armed is the very essence of effectively prosecuting a war, and the long logistical chain from rear supply depots to forward action is what makes that possible.
Armies have had millennia to optimize logistics, and they have always maximized use of new technologies to position supplies where they’re needed. Strong backs of men and beasts sufficed for centuries, supplemented by trains in the 19th century and supplanted by motor vehicles in the 20th. Later, aircraft made an incalculable impact on supply chains, allowing rapid mobilization of supplies and supporting the industrial scale death and destruction of the 20th-century’s wars.
Continue reading “Automate The Freight: Front Line Deliveries By Drone”
Just in case you’re one of the people out there who still doesn’t believe in “the cyber” — it appears that the Russian military served malicious cell-phone apps to the Ukrainian army that allowed them to track a particular artillery cannon.
The legitimate version of the Android app helped its operator use the 1960’s-era former Soviet howitzer. The trojanized version of this application did just the same, except it also phoned home to Russian military intelligence with its location. In addition to giving the Russian army valuable information about troop movements in general, it also led to the destruction of 80% of the cannons in question over two years.
The cited article goes into depth about how certain it is that a hacking group, referred to as FANCY BEAR, are nearly certainly responsible for the attack. The exploit has fingerprints that are not widely known outside of the security research community, and the use of the exploit against the Ukrainian army pretty much ties FANCY BEAR to the Russian military.
This is also the same exploit that was used against the Democratic National Committee in the United States. Attribution is one of the hardest parts of white-hat hacking — attackers don’t want to be found and will leave misleading clues when they can — but the use of the same proprietary malware in these two attacks is pretty convincing evidence that Russian military intelligence has also hacked into US political parties and NGOs.
(Banner image by Vitaly Kuzmin, CC-BY-SA 3.0.)
What does a hacker do when going into battle for the freedom of their country? He builds a tank from scratch, of course. It’s a little bit of a stretch calling it a tank as it lacks treads. But it’s got a high-caliber gun mounted on top and has been heavily armored.
There is room enough inside for two people. What may look low tech in this picture is a different story from the cockpit. A pair of LCD monitors display images from five different cameras. You can see the shrouds that protect three of them on the front of the vehicle with a fourth acting as the rear view. A fifth camera mounted on the gun gives the passenger a look at where he’s aiming. A PS1 controller can rotate it and we assume has a fire feature as well. Check out the demonstration video embedded after the break.
Continue reading “Homemade Tank Joins The Battle In Syria”