GENERAL DESCRIPTION: A variety of projects which deploy collaborative device connection to support communications in challenged regions and disaster situations. Our teams have built, patented, deployed and delivered some of the first, and leading, peer to peer technology in the world. Some of our team technology has saved many, many lives.
Any device that can see an electromagnetic signal can often also send an electromagnetic signal. Many devices, today, can send and receive many types of electromagnetic signals, on the same device, some concurrently. This approach turns each device (ie: your smartphone or gamebox) into its own broadcasting, reception and relay station. This technology needs no servers, towers or infrastructure to operate. Signals can range from audio, radio, light, IR, UV, vibration, laser, reflection, GPS interrupts, induction, and other modifications of the I/O capabilities of the device.
USES: To support communications in challenged regions and disaster situations
[vimeo 125658259 w=425 h=350]
[vimeo 125390652 w=425 h=350]
[vimeo 125390151 w=425 h=350]
[vimeo 125390152 w=425 h=350]
[vimeo 126023660 w=425 h=350]
Related Past Projects:
Our team developed, engineered, produced, patented and marketed the software suite that has become one of the leading solutions sets in the intelligence, defense and emergency services arenas globally with over $300 Million invested in it’s production and deployment. One of the packages was distributed by Apple Computer with marketing personally accelerated by Steve Jobs in support of the Tsunami disaster. Other versions of the software have been used in refugee zones globally. When an illegal copycat version of our software failed in one region (Putting lives at risk), our authorized version kept on working. Our architecture has been proven to be unstoppable – against all odds. The full version STILL has yet to be hacked, in the field, by any known technology. It is STILL the least network- congestive, lowest-cost infrastructure, most ultra-secure, network solution in the world! A copy of the Movie: BIRTH OF A NATION was placed in the network flow out on the open web, using the technology, with a phrase imprinted across the center of the image. A $250,000.00 reward was offered to anyone who could provide a fully reassembled copy of the film with the imprinted image and certification headers intact. To this day: Nobody has been able to acquire that film sample off of the web, and reassemble it; proving the strength of the technology.
COMMOTION: A clone of our base system –
Scott’s Original “Internet in a Suitcase” product video:
GET IT ON IOS STORES and at
App uses P2P combination of Bluetooth and WiFi
The Umbrella Revolution is hardly the first protest to harness the power of technology to coordinate activities and broadcast messages, but it’s almost certainly the most sophisticated.
Andrew Lih, a journalism professor at American University, discussed the infrastructure the activists have adopted in an article for Quartz, a system that incorporates fast wireless broadband, multimedia smartphones, aerial drones and mobile video projectors, cobbled together by pro-democracy geektivists like the ad-hoc hacker coalition Code4HK.
Hong Kong clashes continue in Mong Kok
Hong Kong police push through barricade
Given this remarkable show of force by the crowd under the Umbrella, it’s not surprising that Beijing has moved quickly to prevent transmissions from reaching the mainland, blocking Chinese access to Instagram, where images and videos from the demonstrations and police crackdowns are regularly being posted, and banning all posts on popular messaging sites like Weibo and WeChat carrying keywords that refer to the protests.
Activists have fought back by downloading the peer-to-peer “mesh messaging” app FireChat — which allows communication among nearby users even when centralized mobile services are unavailable by linking smartphones directly to one another via Bluetooth and wifi — in the hundreds of thousands, and by creating an elaborate system of numerical hashtags to stand in for forbidden terms.
For example, #689 is the codename for Hong Kong chief executive C.Y. Leung, referring to the number of votes he received in his selection as the region’s highest government representative, a scant majority of the 1,200 members of the the Communist Party-approved nominating committee. #8964 references Beijing’s brutal June 4, 1989, crackdown on student democracy activists in Tiananmen Square, which casts a looming shadow over the Occupy Central demonstrations.
These strategies seem to have prompted the Chinese authorities to resort to new and more insidious tactics. Links — seemingly posted by Code4HK — have begun popping up on social media, inviting users to download a new app that allows for secure coordination of protest activities.
Instead, clicking the link downloads a Trojan horse that gives its developers — presumed by some security experts to be “red hat’ hackers working with support from the Chinese government — open access to the messages, calls, contacts, location and even the bank information and passwords of those naive enough to download it.
That’s a harsh lesson not just for those living under authoritarian regimes, but for us citizens of nominally free and democratic societies as well.
The smartphone is by far the most formidable tool for populist empowerment ever invented, turning individual human beings into mobile broadcast platforms and decentralized mobs into self-organizing bodies. But it’s also jarringly easy for these devices to be used against us.
Here in the United States, revelations of the existence of massive government surveillance programs like the NSA’s PRISM have caused an uproar among digital libertarians. Likewise, criminal smartphone hacking and cloud cracking has led to the release of celebrity nude photos and sex videos, to the humiliation of those who thought them private.
The response from leading smartphone developers like Apple and Google has been to announce new methods of locking and encrypting information to make it harder for individuals, businesses or governments to gain access to our personal information.
But even as they add these fresh layers of security, they continue to extend the reach of these devices into our lives, with services that integrate frictionless financial transactions and home systems management into our smartphones, and wearable accessories that capture and transmit our very heartbeats.
Imagine how much control commercial exploiters, criminals — or overreaching law enforcement — might have if it gained access to all these features. The upshot is that we increasingly have to take matters into our own hands (and handsets), policing our online behavior and resisting the temptation to click on risky links.
It may be worth exploring innovative new tools that offer unblockable or truly secure alternatives to traditional communications, like the free VPN browser extension Hola, which evades global digital boundaries to Web access; open-source projects likeServal and Commotion, which are attempting to develop standards for mesh connectivity that route around the need for commercial mobile phone networks; and apps like RedPhone and Signal, which offer free, worldwide end-to-end encrypted voice conversations.
Most of these are works in progress. But as technology becomes ever more deeply embedded into our lifestyles, keeping our digital identities secure and private is becoming increasingly critical. And as the protests in Hong Kong have shown, the only solution may be to use technology to defend against technology — in other words, to fight fire with FireChat.
EXAMPLES OF TECHNOLOGY:
IEEE Communications Magazine Publishes InterDigital Paper on P2P Communications
InterDigital’s M2M team was recently published in the prestigious IEEE Communications Magazine with their article, “CA-P2P: Context-Aware Proximity-Based Peer-to-Peer Wireless Communications.” The work was co-authored by Chonggang Wang, Qing Li, Hongkun Li, Paul Russell, Jr. and Zhuo Chen, all engineers at InterDigital.
The authors argue that CA-P2P may be a viable solution to both existing and new proximity-based services, including commercial applications such as advertising as well as emergency/disaster relief, when centralized networks may become unavailable. Taking various levels of context into account during the P2P connection results in quick, efficient peer discovery and peer association. This will become increasingly important in the emerging fifth generation, with growing numbers of small cell and D2D communications becoming common.
The paper delves into the benefits and challenges of CA-P2P and offers performance evaluations of simulations as evidence. Interested in learning even more? Visit our Vault, where you can search keywords such as peer-to-peer, device-to-device, D2D and IoT to find additional resources.