Good day, fellow technophiles,
Briefly, before we get to today's central report—a fascinating article Doug Hornig sent me yesterday on the true extent of domestic spying, far beyond the headlines Edward Snowden has gathered, and how it ties to the broader cyberwar—let me and share some recent feedback we've received.
There is no better validation of our work than when we hear from our readers. As researchers, we are intensely competitive. It's part of what drives us to dig so deeply to uncover what others aren't looking at yet, or prove something right in the face of intense countervailing opinion.
But performance in a vacuum can only salve the competitive ego for so long, which is why I love hearing from readers so much—in comments, in emails, and through our regular reader surveys, from which I want to share some comments.
In the most recent survey, our readers ranked Casey Extraordinary Technology (CET) tops among all our advisories in customer satisfaction.
"The periodic position updates are concise and clear, the newsletter is likewise concise and clear, and the investment picks are generally VERY good. Thank you!"
"I like it and use it. Investment-wise, I'm doing well from Alex's picks. The discussion also keeps me current on technology, and particularly medical advances. Thanks, keep it up!"
"Most of your picks have been great. So I give a 9 since they're not all perfect."
In fact, only one responder gave the publication less than an 8, 9, or 10 out of 10. This individual's reasoning:
"You tend to exit a position that is profitable too early, e.g. DDD and SGEN, although your call on MAKO was correct."
These results, of course, have to be largely attributable to the underlying investment performance of the letter:
- We've closed 30 winners to 9 losers, for an average gain over 42% since inception
- Recent wins include: Isis Pharmaceuticals (147% gain, on a "free ride"); Alnylam (a 127% win); Fortinet (105% gain); Seattle Genetics (+108%); and Amazon.com (+49%).
I like to think part of it is the weekly news updates that distill just what you need to know about the entire portfolio... or the alerts we send when news moves a stock more than 10% or a recommendation needs to be changed. Regardless, we couldn't be happier to see our subscribers so thrilled, and we want to thank all of you for your support.
But I am also disappointed. Some of you haven't even taken CET for a test drive yet, and have missed on so much. That's why I emailed all of you this Saturday with an offer intended to change that. It's simple: if you are not already a CET subscriber, take it for a test drive for six full months.
I expected that offer—which is much longer than any trial we've offered before—to be popular, but even I have been pleasantly surprised by the response. To those who took me up on it, thank you. I hope I can repay all of you with yet more fantastic gains.
If you have not taken us up on the test drive yet—and I have to believe my email must have been lost in the shuffle or ended up in your junk-mail folder if you haven't done so—I must remind you it is only open until tomorrow (it took enough to convince the bosses to try it). Click here now to start your half-year trial. What are you waiting for?
Last, before getting to Doug's excellent essay, I want to point out that his last piece, on the immense advances in less-lethal and nonlethal weaponry, garnered quite a bit of feedback too.
Among the responses was one from the makers of the long-range acoustic devices (or LRADs) he commented on. The company's PR rep shot an email to us, taking issue with Doug's use of the common colloquialism "sound cannon" as a descriptor for the refrigerator-sized megaphones.
In the interest of telling a round story—as researchers, we fail if we don't articulate both sides of a story, even if our conclusion lands on one particular side when we've gotten through it all—below Doug's article, you'll find his comment, which highlights the device's role as a lifesaver as opposed to a less deadly weapon.
With that, back to the show…
Chief Technology Investment Strategist
The NSA: And Who Will Watch the Watchmen?
225 years ago, a rather prescient James Madison wrote:
"I believe there are more instances of the abridgement of the freedom of the people by gradual and silent encroachments of those in power than by violent and sudden usurpations."
Today, the encroachments against which he warned have become the rule rather than the exception, as cyberspying has afforded governments unprecedented means to gain control over their own citizens.
It's been a long and twisted path from the likes of Madison to Richard Nixon, who once famously said, "When the president does it, that means that it is not illegal." For that, he was rightly vilified. Yet if the four decades since he passed from the scene have taught us anything, it's that vast armies of government officials have come believe that whatever they do is legal. The fourth and fifth amendments to the Constitution are violated so routinely that few people bother to notice, and an entire generation has grown up without knowing why they were written into the document and what they mean—or even that they exist at all.
The revelations from the Edward Snowden-orchestrated document leaks have been coming fast and furious for several months now. Each day, it seems, we learn about another government program we hadn't heard of before. And yet, we are complicit. Each day we also enable our own surveillance.
In early 2011, more than two years before Snowden surfaced, the humor website The Onion ran a spoof video about the supposed reauthorization of funding for Facebook by Congress, because it saves the intelligence community so much money. This quote purports to come from a deputy CIA director lauding Facebook:
"After years of secretly monitoring the public, we were astounded so many people would willingly publicize where they lived, their religious and political views, an alphabetized list of all their friends, personal email addresses, phone numbers, hundreds of photos of themselves, and even status updates of what they were doing moment to moment. It is truly a dream come true for the CIA."
It's hilarious but, like all good satire, it's a little painful to watch, as well. Imagine, for example, that the government had demanded at gunpoint that we turn over all of the personal info we voluntarily post about ourselves. There'd be outrage. High-horse Congresspersons would hold hearings. Scathing op-ed pieces would appear.
Luckily for the government, however, it doesn't even have to ask. All that stuff is out there in cyberspace, almost begging to be harvested. Who can blame the authorities for taking advantage?
In a sense, the same applies to our personal correspondence. At one time, opening someone else's mail was a serious federal crime—it still is, actually. But email? We agree to let our server archive our e-letters, read them if it wants to, or turn them over to anyone who files the proper request. There is no such thing as a truly private electronic exchange.
When we use Google, we give the company tacit permission to use the things it learns about us and our habits for its own or some affiliate's purposes. That information, too, can be demanded by government agents, as can our credit card records, which reveal an enormous amount about us. Ditto for the paper trail you leave with those grocery store discount cards.
And so on.
Compromising Social Media
Are we advocating going back to a world without Visa, iPhones, and Internet banking? No, of course not. But any consideration of the domestic cyberwar currently raging must include our cooperation with it, and the indisputable fact that we have quickly warmed to the convenience of the cyberuniverse without having paid much attention to the loss of privacy that has accompanied it.
One of the clearest lessons of history is that government will happily embrace the latest in technological advances that offer it the possibility of greater control over its subjects. And use them. And then abuse them.
But of course, "We don't have a domestic spying program." That's what President Obama declared on August 6 on The Tonight Show, in one of the most disingenuous statements ever made by a politician—and that's saying something.
What Obama should do next is to try saying that to any of the increasing number of Americans like Brandon Raub.
Raub, a 26-year-old decorated former Marine who served in Iraq and Afghanistan, made the mistake of posting political views and song lyrics to his private Facebook page that were critical of our current wars and of the government in general. Little did Raub know that the government is using Facebook as a surveillance tool. Even less did he suspect that in 2009, the Department of Homeland Security had launched Operation Vigilant Eagle, which aims to track military veterans who are voicing feelings of discontent, because they are to be regarded as potential terrorists.
As a result of Raub's Facebook rants, on Thursday, August 16, 2012, a swarm of local police, Secret Service, and FBI agents arrived at Raub's Virginia home, asking to speak with him about his postings. After a brief conversation and without providing any explanation, levying any charges against him, or reading him his rights, the officials handcuffed Raub and transported him first to police headquarters, then to a psychiatric hospital, where he was incarcerated against his will. Although he was sentenced only to 30 days of "observation," involuntary psychiatric commitment is different from an "arrest." It requires no proof, and can be very difficult to extricate oneself from.
Raub is not unique. Other veterans around the country have been swept up by Operation Vigilant Eagle and similarly harassed. The Raub story has a relatively happy ending, because he was one of the lucky ones. Outraged onlookers filmed the bust on their cellphones, and it went viral on YouTube. The Rutherford Institute, a nonprofit Constitutional law firm, jumped in and petitioned for his release, and an outraged Circuit Court judge ordered him immediately freed a week after his detention.
The point, though, is that his ordeal exemplifies how closely Facebook and other social media are being watched. The default assumption must be that whatever you post to the Internet is going to be scrutinized—by someone, in some agency, somewhere—and that it constitutes evidence that may be used against you, even outside an actual court of law.
Unleashing the Tech
While the government can hardly be accused of illicit activity in the gathering of one's publicly revealed Facebook information, surreptitious wiretapping without a warrant is another matter, with the legal niceties far from sorted out at this point.
One of the truly disturbing facts about Edward Snowden's leaks—which have caused such a commotion in the media and among civil libertarians, while also provoking calls in Congress for him to be tried as a traitor—is that they should have come as no surprise to anyone who has been paying the slightest attention. Clues have been popping up all over the place for more than a decade.
"ECHELON," for example, had been known about since before the turn of the century. A signals intelligence (SIGINT) collection and analysis network operated on behalf of the five signatory states to the UKUSA Security Agreement (Australia, Canada, New Zealand, the UK, and the US), it's a software system capable of interception, content inspection, and dissemination of downloaded commercial satellite trunk communications globally, including telephone calls, fax, email, and other data traffic.
On the domestic front, "Carnivore" was an early "packet sniffer" software deployed by the FBI in 1997. It could select and capture particular data packets flowing across the Internet, decode them, and examine their contents. The FBI countered the objections of privacy advocates by saying that Carnivore could distinguish between communications that could be lawfully intercepted and those that could not. Carnivore was eventually replaced by the far more powerful "NaurusInsight," noted for being the universal wiretap system installed in Room 641A at AT&T's operations center in San Francisco, as revealed in 2006.
But the big leap forward came when President Bush authorized the "President's Surveillance Program" (PSP) shortly after the 9/11 attacks. It included an ultrasecret NSA intelligence-gathering project code-named "STELLARWIND," involving data mining of a large database of the communications of American citizens, including email communications, phone conversations, financial transactions, and Internet activity. Almost immediately, there was fierce opposition within the Justice Department on the part of those who believed the president had exceeded his Constitutional authority. But the dissenters lost, and the project proceeded.
Though STELLARWIND's name remained secret, in December 2005, the New York Times alluded to it when it ran an article titled, "Bush lets U.S. spy on callers without courts." In the article, the NSA—whose mission was previously thought to be limited solely to spying on communications abroad—was outed for the first time as operating domestically. The Times cited as its sources "a dozen current and former officials, who were granted anonymity because of the classified nature of the program." The nation yawned.
The existence of the PSP itself has been known since 2008, when Thomas Tamm, a former attorney in the Department of Justice's Office of Intelligence Policy and Review, anonymously leaked information about it to the Times.
Then, in early 2012, whistleblower William Binney—a 32-year NSA veteran—went on record with all the gory details about the architectural and operational elements of STELLARWIND, which he had helped design. Binney said that the program he worked on had been intended for use in cases of foreign espionage, but after 9/11 was converted to spying on citizens in the United States—a development with which he disagreed and which led to his resignation from the agency in late 2001. He went on to state that the NSA has highly secured rooms that tap in to major switches, and satellite communications at both AT&T and Verizon, an assertion that was supported by the exposure of Room 641A.
STELLARWIND itself was theoretically discontinued in 2007, but it basically continued under various different names at the end of the Bush administration and straight through the Obama years. These include programs brought to public attention by Snowden, such as "Boundless Informant," "PRISM," "Fairview," "Dropmire," and "XKeyscore."
The Snowden File
Obviously, enough facts were known that there should have been a public airing of the whole warrantless spying issue long before Edward Snowden appeared. But since it is he who has become the poster boy for the issue, it's worth reviewing some of these revelations.
PRISM (leaked June 2013)
PRISM went operational in 2007, operating under the supervision of the Foreign Intelligence Surveillance Act (FISA) Court. It's a system the NSA uses to gain access to the private communications of users of nine popular Internet service providers: Google, Facebook, PalTalk, AOL, Microsoft, Apple, Yahoo!, Skype, and YouTube. The government contends that PRISM cannot be used domestically without a FISA warrant, but the leaked Snowden document calls PRISM "the number one source of raw intelligence used for NSA analytic reports." FISA approval isn't exactly tough to get. The Electronic Privacy Information Center reports that in 2012, the court received 1,856 applications and rejected none. (One day before PRISM leaked came the revelation that the FISA Court had been ordering a subsidiary of telecommunications company Verizon Communications to turn over to the NSA logs tracking all of its customers' telephone calls on an ongoing daily basis.)
The named companies went ballistic over this, insisting that their hands are clean. A typical response from Google CEO Larry Page stated that "any suggestion that Google is disclosing information about our users' Internet activity on such a scale is completely false."
However, it's possible that a bit of legal game-playing is going on here. This is the leaked graphic about PRISM that caused all the fuss:
About it, the Washington Post wrote:
"This slide draws a distinction between NSA surveillance programs that collect communications 'as data flows past' on fiber optic cables and PRISM, which collects communications 'directly from the servers' of U.S. Internet companies.
"Some have interpreted this to mean that the NSA has 'direct access' in a technical sense: automatic, unfettered access to the servers' contents. But in context, 'direct' is more likely to mean that the NSA is receiving data sent to them deliberately by the tech companies, as opposed to intercepting communications as they’re transmitted to some other destination. That's not inconsistent with tech company lawyers scrutinizing each request before complying with it."
XKeyscore (leaked July 2013)
This is a computer system used by the NSA for searching and analyzing Internet data about foreign nationals across the world. The program is run jointly with other agencies, including Australia's Defence Signals Directorate and New Zealand's Government Communications Security Bureau. It detects the nationality of foreigners by analyzing the language used within intercepted emails.
XKeyscore takes certain types of raw metadata that the NSA has already collected using other methods, and processes it with arrays of Linux machines. The Linux processing nodes look for specific key content in these captured network sessions; there are specialized plugins to enable the mining of packets for phone numbers, email addresses, webmail and chat activity, and the full content of users' Web browser sessions. For selected traffic, XKeyscore can also generate a full replay of a network session between two Internet addresses.
But rather than dumping everything back to a central processor, each XKeyscore site keeps most of the data in local caches. According to the documents leaked by Snowden, those caches can hold approximately three days of raw packet data—full "logs" of Internet sessions. There's also a local database at the network tap sites that can keep up to 30 days of locally processed metadata.
Boundless Informant (declassified document leaked June 2013)
A Big Data analysis and data-visualization system used to give NSA managers summaries of the agency's worldwide data-collection activities. As explained in a Guardian article:
"By extracting information from every DNI and DNR metadata record, the tool is able to create a near realtime snapshot of GAO's collection capability at any given moment. The tool allows users to select a country on a map and view the metadata volume and select details about the collection against that country. The tool also allows users to view high level metrics by organization and then drill down to a more actionable level—down to the program and cover term."
"GAO" (Global Access Operations) is an NSA operational branch whose motto is "The mission never sleeps." "DNI" stands for "digital network intelligence," and "DNR" for "dial number recognition."
According to the XKeystroke slide show, "Boundless Informant is hosted entirely on corporate services and leverages FOSS technology (available to all NSA developers)." "FOSS" stands for "free and open-source software," and I guess this means it could be disseminated pretty widely.
Fairview (leaked June 2013)
A mass surveillance program aimed at collecting phone, Internet, and email data in bulk from the computers and mobile telephones of foreign countries' citizens. According to Snowden: "The NSA partners with a large US telecommunications company... [which] partners with telecoms in the foreign countries, [which] then allow the US company access to those countries' telecommunications systems, and that access is then exploited to direct traffic to the NSA's repositories."
Dropmire (leaked June 2013)
A program aimed at surveillance of foreign embassies and diplomatic staff, including those of NATO allies. The Guardian reported that at least 38 foreign embassies were under surveillance—some as far back as 2007. Diplomatic spying by the United States had been known at least since 2010, when it was revealed that US agencies had spied on UN chief Ban Ki-moon, but at the time, it was not known that this had been done as part of a systematic program.
Everyone Wants In
These five are among the most important programs, but they are only the tip of the proverbial iceberg. Many others had been catalogued before Snowden came along; one blogger in March 2012 compiled a list of code names for 97 NSA (and NSA-contractor) programs involved in all aspects of SIGINT collection, processing, analysis, dissemination, and storage.
Lest we forget, the NSA is hardly the only arm of the federal government in the domestic spying business. There's also the FBI and the military. (Because we can't know otherwise, we'll give a reluctant assent to the CIA's insistence that it is involved only overseas.) Almost certainly Homeland Security. Oh yeah, and the Drug Enforcement Administration (DEA).
For example, the FBI is spending $1 billion on its "Next Generation Identification" program. The program is designed to advance the Bureau's biometric identification services, providing an incremental replacement of its current integrated automated fingerprint-identification capabilities with a multimodal biometric database. To fingerprints will be added iris scans, palm prints, DNA data, and even tattoos, as well as facial images and facial recognition software that will enable identification of individuals from private-sector security camera records. Whether the goal is to create a database containing biometrics on every American is unknown at this time.
Just recently, it came out that the DEA has skin in the game, too. An August Reuters article based on leaked documents revealed that the agency is "funneling information from intelligence intercepts, wiretaps, informants and a massive database of telephone records to authorities across the nation to help them launch criminal investigations of Americans."
For the record, the DEA is supposed to be hunting common criminals, not terrorists. But hey, who's counting at this point?
More interesting would be from whom it's getting those intercepts, etc. That's still classified. Furthermore, Reuters states that the documents show that "law enforcement agents have been directed to conceal how such investigations truly begin—not only from defense lawyers but also sometimes from prosecutors and judges," and that "federal agents are trained to 'recreate' the investigative trail to effectively cover up where the information originated, a practice that some experts say violates a defendant's Constitutional right to a fair trial." Not to mention that it would constitute a unique situation in law enforcement.
However, we can make some wild guesses as to the source of the info. The unit of the DEA that distributes the information is called the Special Operations Division, or SOD. Two dozen partner agencies comprise the unit, including the FBI, CIA, Internal Revenue Service, and the Department of Homeland Security. And, oops, I almost forgot—the NSA.
The military, through the Defense Advanced Research Projects Agency (DARPA), has a large number of projects under way, focusing on algorithmic improvement, espionage, surveillance, natural speech recognition, and video and image retrieval systems.
Among that last group is something called the "Video and Image Retrieval and Analysis Tool" (VIRAT). It aims to develop a system to provide military imagery analysts with the capability to exploit the vast amount of overhead video content being collected. If successful, VIRAT will enable analysts to establish alerts for activities and events of interest as they occur. VIRAT also seeks to develop tools that would enable analysts to rapidly retrieve—with high precision and recall—video content from extremely large video libraries.
This one is of particular interest, because it is probably critical to the success of "Argus," a new 1.8-gigapixel camera meant to be deployed on drones. Argus merges information from 368 separate image chips and can surveil a medium-sized city with a resolution of six inches from 17,000 feet in the air. It creates a library, enabling the drone operator to "go back in time" to home in on a particular event in a specific time or place. And perhaps most significant, it can also pinpoint and automatically track anything that is moving within its field of vision. That means if you're running or driving your car, it can zero in and follow you in real time. Though civilian applications are evident, the government is mum on whether there are any plans to deploy Argus domestically.
In that blogger's list referred to earlier, there appears a particularly spooky term: "Panopticon." Whether the NSA actually has a program with that code name has yet to be definitively documented, but the overall combined effect of its (and other government agencies') efforts is eerily Panopticon-like. That is one of the few aspects of the Snowden-leak story that has been underreported.
English philosopher and social theorist Jeremy Bentham first posited the idea of the Panopticon in the late 18th century. It was an architectural concept for a prison with cells arranged in a circle around a central tower where the guards—who couldn't be seen by inmates—had direct visual access to every cell. The idea was to instill in the prisoners' minds the notion that, since they could never know when they were being surveilled, they would have to assume that they always were.
French philosopher Michel Foucault described how insidious and clever this was. It would serve "to induce in the inmate a state of conscious and permanent visibility that assures the automatic functioning of power. So to arrange things that the surveillance is permanent in its effects, even if it is discontinuous in its action; that the perfection of power should tend to render its actual exercise unnecessary; that this architectural apparatus should be a machine for creating and sustaining a power relation independent of the person who exercises it; in short, that the inmates should be caught up in a power situation of which they are themselves the bearers."
How's that sound as a metaphor for the modern state?
Inducing a condition of perpetual paranoia in the population may seem like an extreme measure, and it is certainly counterproductive for a society, as the KGB and Stasi should have demonstrated for us quite convincingly. Nevertheless, as Foucault correctly argued, that is the inevitable result of a surveillance that is perceived to be all-encompassing. Repeat the word one more time: Inevitable.
Given the extent of what's now going on in the US, it's impossible to duck the question of government intentionality.
Yet the problem goes even deeper than that. The Roman poet Juvenal nailed the concomitant danger nearly 2,000 years ago when he asked: Quis custodiet ipsos custodes? Or, as we tend to loosely translate it these days: Who will watch the Watchmen?
Faced with all of this, the ordinary citizen may feel helpless. But one positive development from all the recent revelations about government surveillance is that a lot of people are questioning whether we've lost the allegiance to individual liberty on which the nation was founded, and are beginning to speak out that it's time to get it back. That quaint notion is in for a long-overdue rebirth, which we may yet get.
In the meantime, there are things that can be done to enhance individual privacy, which we've covered in past issues of Casey Extraordinary Technology. In addition, there are profits to be made from companies specializing in data security. Identifying them early and getting a jump on the crowd allowed us to make 102% with Fortinet and 46% in just one week with ArcSight. As always, we'll be on the lookout for future opportunities in the sector.
Hey, all Casey readers in the Reno, Nevada area: the Reno Casey Phyle is having a picnic this Saturday and would love to have you join them.
Where: Sparks Marina Park between the big gazebo and the lake
When: Saturday, Aug 17 at 2 p.m. PDT
Bring: food to share (optional)
Need more info? Email Zoe with questions.
“Sound Cannons” Save Lives in Katrina and Fukushima
Last week, we ran an article espousing the many technical advances in nonlethal weaponry that are changing the way law enforcement and the military engage suspects and combatants. The entire issue of less-lethal weaponry, as simple and beneficial an advance as it sounds on the surface, brings about a quagmire of ethical issues.
Does lessening the fear of killing a suspect lead to wanton use by officers, for instance? I am sure the parents of the young man who was recently killed by a Taser when it was shot into his back as he ran away from the police officers who caught him posting some graffiti would agree that's likely.
But, like the prototypical nuclear energy and atom bombs, any technology is agnostic as to its use. There are those who would employ it to destroy, and those who would employ it to create or improve.
That's exactly what has happened with the long-range acoustic devices (or LRADs) that we mentioned in our article. Some military strategists have suggested using their immense power to incapacitate, or even deafen, targets. At 20 yards away, these things will practically melt your eardrums, so it's very possible.
However, as the primary supplier pointed out in an email to us just after our article, we failed to mention that their primary intended use is not as a weapon, but as a means of communication. These sound arrays let anyone—including military and law enforcement, which own the overwhelming majority of them—communicate much farther and faster than any megaphone would ever allow, including in situations that would make any other means nearly impossible. For example, warning thousands of citizens of nuclear fallout risks at Fukushima, where one was employed with much success.
As the email to us said:
Thank you for the opportunity to respond to today's "The Technological Evolution of Nonlethal Weapons," which mischaracterized LRAD as a "sound cannon". LRAD fills a critical communications gap between the limited range and sound quality of bullhorns and non-lethal weapons. LRAD is not a "sound cannon"; it is a highly intelligible long range communications system used to clearly broadcast critical information, instructions and warnings in any language. Unlike nonlethals such as tear gas, Tasers, rubber bullets, pepper spray, and flash bang grenades (which emit an instantaneous burst of up to 175 decibels), LRAD is safe and nonkinetic.
LRAD broadcast levels are easily controlled and purposely kept below the threshold that could cause hearing damage from instantaneous exposure. LRAD broadcasts follow the inverse square law, which teaches that for every doubling of the distance from the sound source, sound intensity diminishes by 6 decibels. Like all loudspeakers, LRAD's audio output is measured in decibels at a distance of 1 meter in front of the device. According to the American Academy of Audiology, ambulance and fire engine sirens measure 130 decibels, and fireworks and custom car stereos measure 140 decibels. (http://www.audiology.org/resources/consumer/Documents/Fact%20Sheets%20-%20NIHL.pdf)
Even if a LRAD system is accidentally activated at close range, quickly covering the ears with hands reduces the sound pressure level (SPL) by approximately 25 decibels. In many cases, the maximum SPL individuals could be exposed to at close range by a LRAD system is less than ambulance, fire or police sirens at a similar range.
The individual went on to point out as we conversed further that the system was used at a Seattle ballpark to talk a potential suicide down from a ledge, without having to send anyone in harm's way and at a distance no megaphone would reach. Plus, it was used to warn people away from hazards after Hurricane Katrina, the aforementioned disaster at Fukushima, and more. These are laudable uses indeed, along with search and rescue, hostage situations, and other cited cases.
Of course, their materials also mention use by SWAT teams. Let's be honest: If the devices didn't have serious repelling power, those kinds of organizations wouldn't be all that interested. Because of their unique properties of sending incredibly loud sounds over long distances (and doing so quite clearly), they are actively used as weapons for things like crowd control as well. We''re pretty sure that use factors heavily into the brisk sales.
That said, if I were an Egyptian protestor, I'd sure rather face one of those "sound cannons" than a rubber bullet, a Taser, or an old-fashioned, hot lead cannon.
Whichever way these LDAR devices are used, the people behind their proliferation do deserve points for helping save lives.
Bits & Bytes
LA to San Fran in 30 Minutes (BusinessWeek)
While Californians debate a $70 billion high-speed train, one of our favorite entrepreneurs—Elon Musk—tried to blow the whole thing to smithereens this week. Musk wants instead for someone to build a solar-powered, city-to-city elevated transit system that could take passengers and cars from Los Angeles to San Francisco in a half-hour. His system, which he describes as a "cross between a Concorde, a rail gun and an air hockey table," may or may not work. But you can't accuse the guy of not thinking big.
Commodity Discs (YouTube)
First there were Liberty Dollars, but they got busted. Then there was Bitcoin, which has already been harassed. Now there's commodity discs. To be clear, this is not an endorsement of any kind. But it's an interesting idea that mates precious metals with technology: a one-oz., pure silver disc with an optically machine-readable, two-dimensional, QR barcode stamped on it. This lets you scan it with your smartphone to determine its value at any given moment. Somehow we expect the feds will be all over this, too.
Food? Who Needs It? (Vice)
OK, you gotta eat. But does it have to be solid food? One entrepreneur says no, you can drink your way to health, and he's been crowdfunded to the tune of nearly a million bucks to prove it. Quit the solids, lose weight, get healthier… we know a few people who'd prefer that route.
Instant Battery Tester (YouTube)
Yes, even we sometimes like the lowest-tech solutions to common problems. Want to know if your battery is dying and don't have an electric tester around? Just drop it. Seriously. But let us know if it doesn't work, as this one seems like an urban legend to us…