iPhone 5s, iPhone 5c and iOS 7 what did we get

On Tuesday of this week, Sept. 10th, Apple held their event. We speculated on what we would get and talked about the other questions that still remained to be answered. Well now we have our answers. The iPhone 5s, iPhone 5c and iOS 7 were shown off so what did we get? Well we’re going to cover some of the details and also talk about some of the questions that are now created about where do they go form here. The video of the keynote is now available on the Apple site, go watch it.

So to go through what we got to see at the keynote, there was the

iPhone 5c (Android Free)

The iPhone everyone thought was going to be cheap turned out to be “less expensive” instead. No one should have been surprised since Apple doesn’t do cheap and yet they were. When netbooks proliferated the computer landscape Apple did the MacBook Air. It was far from cheap but “less expensive” than a MacBook Pro. The iPhone 5c is the same. It is far from cheap but at $99 for a 16GB model on a 2 Year contract(US) it’s cheap enough that it becomes a throwaway phone. It’s something parents can buy their teen as an emergency phone. It’s a phone people less interested with the latest and greatest technology as well as people coming from a feature phone can buy without sticker shock.

So the iPhone 5c comes in five colors, white, pink, yellow, blue and green. Yes pink, not red or fuchsia they proudly proclaimed it pink on stage.


The phone internals are the same as what is in last years model, the iPhone 5, with the exception of a slightly bigger battery and a slightly better FaceTime camera. This is impressive because I own an iPhone 5 and it is one hell of a smartphone. The wallpaper that comes on the iPhone 5c will match the color of the phone plus with iOS 7′s transparencies the OS will play even more on the color aspect. The pricing on contract is 16GB at $99, 32GB at $199 and $549 off contract. The pre-orders for the iPhone 5c will be available tonight and the phones will go on sale next Friday Sept. 20th.

iPhone 5s (Forward Thinking)

The iPhone 5s is the flagship model and brought a lot of things that were already rumored but became reality. The iPhone 5s comes in three colors, Silver, Gold and Space Grey. The silver and gold models have a white face and white accents while the space grey is the only model with a black face and black accents.


So they have added one more color, the gold but for me it sucks because I don’t like the white face. I wonder why they didn’t have the gold with both a white and black face? Perhpas this is just my personal color bias but I would have loved a black and gold model. It’s a trivial thing I will just get the Sky Grey model but I’m just a little sad at the lost oppurtunity :_(

Starting down bottom you will notice that the home button no longer has the little rounded rectangle on it. It also now has a stainless stell ring around it with the introduction of the Touch ID fingerprint scanner. The Touch ID will be used to unlock the device as well as authenticate a user for app store purchases. It can be trained to know up to 5 different finger prints and has 360 degree readability. The all new A7 chip inside is a 64 bit processor, the first in mobile and although it may not make sense on the iPhone it’s forward thinking for other iOS devices and future iPhone models. The new iOS 7 operating system (OS) is also 64 bit taking users along for the 64 bit transition of iOS devices. Now 64 bit typically means the ability to address more memory but it also means instead of doing things faster it does more things at the same speed. So you still end up accomplishing more but in a different way. Just imagine two people trying to eat as many hot dogs as they can. One guy takes normal sized bites but eats as fast as possible. While the other guy eats at the same speed but he takes bites twice as big. Even though he’s eating at the same speed as the first guy the bigger bites means he’ll finish faster. The ability to address more memory might not make sense now but in the iPads or in future generations of the iPhone and iPads that ability to address more than 3GB or RAM will make sense.

Continuing with the upgrades inside was the introduction of a new chip the M7. The new chip measures motion by taking readins from the accelorometer, gyroscope and compass. A task that would have be done by the A7, so that frees up some computing cycles on the A7 chip itself. The M7 chip allows for a new breed of apps while adding to the existing functions of the phone. The chip knows if you’re driving, running, walking, or sleeping. So for example if you switch from driving to walking the Maps app will switch from driving directions to walking directions automatically.

The cameras on the iPhone 5s got some upgrades too ofcourse. It now has a dual LED flash which is able to combine depending on the lighting of the scene being photographed to create better colors and skintones. The back camera now has a larger sensor, larger pixels and a larger aperture which all combine to let in more light for better pictures. This combines with the camera app in iOS 7 for new features like. Burst mode which snaps multiple shots at 10 images a second, great for action shots. Slow motion video, the camera shoots video at 120 frames per second allowing the user to play back the video at 1/4 of the speed for interesting effects. The front camera also has larger pixels along with better backside illumination. Better backside illumination allows more light to the sensor resulting in better pictures and video for great FaceTime calls and world renowned “selfies”.

The iPhone 5s will be sold at the same prices previous models of iPhones have sold at. On a 2 year contract (US) 16GB at $199, 32GB at $299 and 64GB at $399 while off contract the 16GB iPhone 5s starts at $649 (US). There will be no pre-order available for the iPhone 5s and they will go on sale next Friday Sept. 20th. You can get them at your local Apple store or by going to a carrier store. Although carrier stores usually don’t get as much stock on launch day as the Apple store.

iOS 7

The new OS has undergone some drastic changes to the look and feel while still doing most things the same way it always has. The new OS will be released to everyone next Wednesday Sept. 18th. It will support iPhone 4 and newer, iPad 2 and newer and iPad Mini. Beyond the new look and colors there are many refinements as well as new features that enable a user to get things done faster and easier. The notification center is now available from the lock screen to enable glancable information. There is a new Control Center that gives the user quick access to some of the typical phone controls like Wifi, Airplane mode, Bluetooth, etc. The Control Center is also available from the lock screen. Some users will not like the new colors and look of the interface and icons. Some will not like system changes like swiping down from anywhere on the home screen to open Finder instead of swiping the home screen right. You can’t please everyone but I have a feeling that this iOS will please almost everyone and that is Apple’s aim with it.

iOS 7

iWork (Free)

The next big announcement was that iWork for mobile which they listed as consisting of Keynote, Pages, Numbers, iMovie and iPhoto was going free. It will be going free for new iOS devices and as I have been told devices running iOS 7. This is awesome news for me since I already own two of the five software and would love to have the others. It will be a great bundle and should be yet another plus for users looking at upgrading their iOS device. It will also be a great addition to users upgrading to iOS 7. When users install iOS 7 there should be a prompt like there is now for downloading iBooks and the Podcasts app. It will now also include the five apps listed above.

LB_7958 LB_7965


Now that this has all been revealed there are a few questions that come out of these new introductions. With the release of the iPhone 5c the iPhone 5 model is gone. So going forward what is Apple going to name their iPhones? Next year will be the iPhone 6 and most likely the iPhone 6c with the iPhone 5s internals. However if there is an iPhone 6s there would be an iPhone 7c. Apple can call these devices whatever they want and it will sell but having the c model with a higher number than the flagship iPhone just does not seem feasible to me. They could also just kep the iPhone 6c name for release with both the iPhone 6 and 6s by upgrading the internals inside based on the previous year’s model. However even though the device is different having the same name just doesn’t seem sexy enough in my opinion. What I think is that they will drop the “s” model and just stick with full number releases from now on with the “c” model alongside. So there will be an iPhone 6 and 6c, 7 and 7c, 8 and 8c, etc. There would also be the possibility of them dropping the number altogether and having just the iPhone and iPhone c like they did with the iPad. However that also has it’s own advertising downsides.

Now that the iPhone 5s is out the rumors of the iPhone 6 are already starting to swirl. The biggest thing is that Apple will release an iPhone with a bigger screen. We are one year away so there is plenty of time for this rumor to pick up steam. I’m still not sure how I would feel about a bigger screen and it would depend how big of a screen. I love the screen size right now and the ease of using the phone with one hand. However if there was a 5″ iPhone I would definitely buy it. Any bigger than 5″ and for me personally that is too big. I would have to pass on that model and that will be the question Apple will contemplate if they are thinking of doing a bigger screen iPhone. Users all have different sized hands along with different opinions on what size is comfortable and what size is too big. As with Apple’s devices they make decisions based on what benefits the majority of their users. So if they do go to a bigger sized screen I’m sure it will be at a size that will please existing users and entice some users. But it wont please everyone so we’ll see if it happens at all.

64 bit
The A7 chip and iOS 7 are both now 64 bit. The upcoming iPads will have the new chip so does the 64bit come into play on those devices which would make much more use of more than 3GB of RAM? Or is this a future play for 7 or 8th generation iPhones/iPads that will eventually use RAM capacities north of 3GBs?

Well one thing is for sure it was an interesting event with some great devices launched. So are you getting a new iPhone 5s or 5c?

Pictures: The Verge, Apple

Read More


Why Google Glass is a perfect play by Google

Google Glass is the best thing Google has done for many reasons. It is much more important than their Android OS and no one even knows it yet. Why google glass is a perfect play by Google begins with the fact that they have first mover advantage. But it goes far beyond that, it spiders into everything Google and that is why it can become their most important venture, if it is done right!

Google Glass like iTunes has first mover advantage. There are no competitors in the market yet and what that does is allow Google to develop their 1.0 product and perfect it long before anyone gets a clue and joins the party. It is a huge advantage for them because when the device does become more popular and competitors appear Google will already have a huge head start. I compared it to iTunes because iTunes existed long before the iPhone, iPad, App store, etc. ever came about. It was just yet another media player. This afforded Apple the time to work on it, implement and get things working while having it work on Macs and Windows. Then when the mp3 craze hit and iPods became a craze it became the gateway to media and a way to control the device. The iPhone, iPad and app store then just increased the place iTunes plays in the complete package.

Now think about how Google Glass will tie into all of Google’s enterprises. It will allow the person wearing it to use Google’s search engine whenever they have a question or quandary. Google will have images from all over the world with Exif data. Images that can be incorporated into Google Maps for up to the minute data of locations. Apps developed for Goggle Glass will tie into the Android ecosystem enticing developers to push the platform further. The glasses will enable users to use all of Google’s services without effort. It will have the same effect as buying apps or music for 99 cents in iTunes. The low price makes the purchase an afterthought and that is what makes it so easy to shop. In the same way the ease of use of Google Glass will make the use of Google services an afterthought.

There will be some hurdles though, the first of which will be society. The possibilities of being recorded at anytime will call privacy into question and that is a very big hurdle. There might be indicators of when the glasses are taking a picture, recording video and/or audio. However hackers will quickly and easily be able to remove those indicators I’m sure. Then as with anything else there is always as much use of it for less than moral things as there will be for the use intended. Use of the device by voyeurs, spies and not to mention the criminal element will demand systems in place to counteract those possibilities if possible.

Yet another hurdle will be the need for people to talk to their devices. Whether asking questions, searching for things or dictating an email. There are already digital assistants that respond to voice, Siri and Google Now are just a few. Yet like the first bluetooth headsets most people still feel uncomfortable using them in very public places. The stigma of talking to yourself still exists along with the fact that private and personal things would need to be said instead of written. Things that people may not want to be public knowledge but perhaps like privacy, which is in a very different place now than it was years ago due to social networks and other online services. The whole attitude about talking to our devices might change and maybe Google Glass is the thing to push that shift. If that happens we might just end up knowing a lot more about each other more than we care to know in some cases.

If Google is able to market the glasses properly and get over the hurdles it has great possibilities. Schools would be a great place to have Google Glass for each student. It could eventually enable students not to take notes but instead to listen to the teacher/professor during class. The glasses’ OCR would pick up the written material on the blackboard and transfer it to a document while the student listened to the lesson. Then talk about an easy way to catch up on missed classes students could just borrow the video from a friend and share the electronic notes. The possibilities are just endless, malls could have their layout in a code that would be scanned by shoppers. Then when you need to find a store it’s as simple as looking it up or asking the glasses for directions. Shopping in a store and need to know the price of an item just scan the tag. These things for the most part are available now in more rudimentary ways. The best part for Google is the company will become the purveyor of all data!

This is why Google Glass is a perfect play by Google. But it will all depend on how it is handled so Google better hope they don’t drop the ball on it’s development and roll out. How we react to Google Glass depends on the user experience, how it is advertised and how accessible it is to customers aka price. So I guess we will just have to wait and see how it plays out in time.

Read More

Where's My Droid

Where’s My Droid Review

With an ever-increasing amount of private information getting entered into our cell phones, it has become increasingly important to have added security measures put in place to keep this information out of other people’s hands. Where’s My Droid is an app that is invaluable for anybody who is worried about their phone ending up in the wrong hands.

Where’s My Droid has two major goals. When you get the free version, you have access to many of the features needed to find a lost cell phone. If you’re the type of person who misplaces your phone a lot, this will definitely be useful. When you send a specific string of words to your phone, you can have it set to turn the volume to the max level and play a specific ring tone of your choosing. There are other features, such as the camera flash being turned on to give you a visual to find your phone.

My experience here was very positive. The phone responded very quickly when receiving the correct phrase in a text, and it became very easy to find it no matter where in my home the phone was.

When you get the paid app for just $3.99, you can get all kinds of security features activated. Where’s My Droid not only will give you a GPS reading of your phone’s location, but it will send you a Google Maps link and approximate address as well. Another keyword will allow the phone to take pictures and send those pictures to the phone you’re texting from. You’ll be able to lock your phone by sending a new password via text. If worst comes to worst, you can send out a code to wipe your phone’s data from the internal memory, the SD card, or both. I haven’t tried this feature out, but I would assume it’s as reliable as all of the other features.

Where’s My Droid is the premiere security app for Android users. It doesn’t require root, but it does require a hefty list of permissions, especially if you go pro and activate the security features. Whether you need a free app that can be used to find a misplaced phone, or you need the peace of mind a security app brings, Where’s My Droid is going to be exactly what you want.

Where's My Droid Download

Read More

FBook Hme Bnnr

Why the iPhone wont get the full Facebook Home experience

Today Facebook unveiled “Facebook Home” a new Facebook experience that will be available on the newest Android devices. The idea of Facebook Home is very cool, its fluid it enables you to get at your Facebook information no matter what you are doing on your phone or what your phone is doing. Will the same thing come to the iPhone and other iOS devices not the way it is on Android.

Watching the video about Facebook Home the first thing they show is that from the lock screen of the device you are able to see Facebook updates and swipe to access other things, Photos, Friends, etc. My very first though, security alert, when that device is lost or stolen how do you protect that information? It is bad enough protecting the data that is inside the phone behind the lock screen now you’re giving up access right from the get go? Would you leave a computer at the library logged in with your Facebook and just walk out? Regardless if the user must put in their pass-code to update status or reply to messages the information is still accessible merely by looking at the screen. This is one feature that I am almost sure Apple would never allow on their iPhone no matter how great a relationship they have with Facebook. This is why the iPhone wont get the full Facebook Home experience.

Over at Cult of Mac there is a post about “Why Facebook Home won’t come to the iPhone” which has some great points. Though I think that there are also some really cool elements that Apple might allow in an iPhone version Facebook Home. The “Talking Heads” is great it allows you to continue doing whatever you are doing on the device while still talking to your Facebook friends. This is pretty much what people have wanted in iMessage and something I could see Apple potentially allowing. Just like how Twitter and Facebook are allowed access to the Notification Center which no other third-party applications are allowed access. When asked if Facebook Home would come to the iPhone Zuckerberg clearly put the ball in Apple’s court saying it would require their collaboration. So I guess we’ll just have to wait and see.

Source: Cult of Mac

Read More


Law Enforcement to Mandate Carriers Store Text Messages?

In a disturbing Big Brother kinda of turn of events, law enforcement officials are banding together to pass legislation that would mandate all cellular carriers to store text messages.  the move would keep those texts on file for an indefinite amount of time for the sole purpose of making them available to law enforcement during criminal investigations.  It may sound okay at first but the safety and security of stored text messages alone is a whole messy can of worms.  Add to that the fact that nobody could be absolutely positive about how these agencies would be using these stored texts and you have a very controversial issue indeed.

Bill Would Instruct Carriers to Store Text Message Incriminating or Otherwise

CNET uncovered the request from “a constellation of law enforcement groups” that included those in several major cities across the United States. Word is that the Major Cities Chiefs Police Association, the National District Attorneys’ Association, and the National Sheriff’s Association are the three main leads behind this proposed legislation.

Carriers may soon be required to store your text messagesThe legality of asking carriers to store text messages will definitely be called into question but with testimony in hand leaders from these agencies have been repeatedly proposing this move to various congressional groups since earlier this month.

The Good Side of Stored Text Messages

Investigators would be able to use these stored messages to prosecute individuals in various criminal activities including theft, domestic abuse, murder, and a host of other offenses. The stored text messages would also likely lead to greater recovery rates for stolen items and could indeed prevent crimes before they happen.

The Bad and the Ugly

Companies can’t even keep highly secured data safe from hackers so what’s to say that our stored text messages would be any safer? Random degenerates could easily get their hands on private sexy time messages, be able to follow the activity of individuals, and even access sensitive data that shouldn’t have been sent via text (but was anyway).

In addition, policing the police is a notoriously impossible job and civilian oversight committees are struggling to keep up with their current load of police infractions. Adding another layer to this may be a case of the straw that broke the camel’s back.

And who is to say that these text messages won’t be used for inappropriate purposes? The law enforcement agencies requesting them? The carriers responsible for storing them? It’s a very slippery slope and the issues seems to be sliding relatively unnoticed right under our collective noses.

Read More

battlefield play4free bug exploits OS hole

Battlefield Play4Free Bug Allows Hackers to Hijak Users’ PCs

Security experts spotted a nasty Battlefield Play4Free bug in the code that EA published which allows hackers to violate any users’ PC. The exploit allows the hacker to then lure the player to a “booby-trapped” website where all sorts of things can go wrong.

The Battlefield Play4Free bug was brought to light at the Black Hat security conference in Amsterdam last week. Older versions of Windows (including XP and 2003) are vulnerable to the Battlefield Play4Free bug which is bad news. Approximately 39% of the 1 million players networked to Battlefield Play4Free still use these outdated operating systems.

Battlefield Play4Free Bug Sneaks in Your Back Door

The exploit works by instructing users to download a seemingly necessary “MOD” file. The file, in fact, contains a corrupt batch file that is executed at PC restart. This Battlefield Play4Free bug is similar to many such exploits that take advantage of software (such as games) that were designed for play on newer computers with newer operating systems but which are backwards compatible with older systems. Because of the discrepancy in coding, hackers can easily skirt all of the security measures put in place by game designers and easily capture the PCs (and potentially personal data) of unaware users.

Donato Ferrante discovered the Battlefield Play4Free bug with his fellow researcher Luigi Auriemma. The two also uncovered several other bugs which allow hackers to subvert a user’s computer through malicious websites even if user’s PC has inactive gaming software installed.

battlefield play4free bug exploits OS hole

EA didn’t immediately comment on the discovery but a representative for the company told ArsTechnica that they are examining the security issue.

Depending ont he contents of the batch file that’s uploaded through this backdoor, the hackers could easily capture just about anything on an unsuspecting user’s PC. They can also alter operating system files, browser extensions, etc.

The Battlefield Play4Free bug does have one weakness though — it relies on the gamer to navigate to the initial malicious website. the key to avoiding this whole unnecessary and potentially devastating series of events is being exceptionally discretionary when deciding which websites to visit and which to avoid. In short, if it looks too good to be true or feels the least bit “hinky” don’t tread there my friend. You don’t want someone hacking your computer.

Read More

samsung galaxy s 3 lockscreen bug

Galaxy S III Bug Bypasses Lock Screen for Full Access

Beware of the Galaxy S III Bug for lock screen bypass!

A few weeks ago there were reports of a bug in several builds of iOS 6 which granted unauthorized access to the phone module without a pass code even when a lock screen has been enabled on the phone.

Android devices were not safe either as the Galaxy Note II bug let the quick –fingered to launch anything behind the lock screen. The same flaw has been now reported on the Galaxy S III as well that breaks the lock screens altogether, permitting full use of the phone. This is bad news for those who have valuable data on their smartphone.

To make this Galaxy S III bug happen, tap on the “Emergency Call” button that appears on the lock screen. Go to the ICE (emergency contacts) menu. Press the home button, the power button in quick succession. If you did it right, press the power button again, the home screen will come straight away allowing you full access to the device. The lock screen will not return unless the handset is restarted. Sounds pretty easy but experience proved wrong.

The method was initially tried on a Galaxy S III running Android 4.0.4 ICS version and furthermore on a Note ll but it did not work. Then when tried on a Galaxy S III that runs on 4.1.2 Jelly Bean and it worked. The timing between the home and power button pushes has to be accurate. Samsung should be aware of the bug by now and a solution must be under works but until a word is heard officially keep the phones concealed from those nosy colleagues of yours!

Read More


Java Refuses to Get Act Together, New Malware Spotted on Patch Day

Oracle just can’t catch a break these days, can they? As of March 4, a fully-updated Java running the latest patch has been exposed to a signature vulnerability, one which could potentially set the already strained Java security team back another week at the least.

Using credentials stolen from ClearResult Consulting, the applet has been able to build a backdoor on the test machine that researcher Eric Romang has been tracking since McRat took over the malicious code headlines. The applet itself is running on expired tires and the key has been revoked, but unless users specifically go through their revocation lists and know what they’re looking for, the program can be propped up within a matter of minutes after being accidentally downloaded.


java vulnerability
Symnatec has diagrammed how the original McRat Trojan got in


In a statement released by Eric Maurice of Oracle, users have been encouraged to update as soon as possible, and to raise their Java security settings to “High” as the default method for dealing with all incoming and outgoing requests. He also made sure to assure those outside of Europe that they shouldn’t be too worried, as so far the crack has only been hosted from a German dictionary site that was infected with the “g01pack” exploit kit.

“In order to protect themselves, desktop users should only allow the execution of applets when they expect such applets and trust their origin,” Oracle advises.

There is some speculation that the app still needs to ask permission to get through to your PC. However if we’re to believe the original Twitter post which first alerted everyone to the flaw, that build of the exploit was running on a version of Java that has already been hotpatched as of late last night. Personally I recommend you uninstall Java completely until this all blows over, and make sure you remove it as a plugin in your browsers and disable it from automatically running in your settings.


Source| InformationWeek


Read More

hp vulnerabilities

HP Reports 8,000 New Vulnerabilities This Year

Earlier today at the RSA Conference 2013, HP reported that they had seen 8,000 new software vulnerabilities surface in 2012, close to a 20 percent increase over the previous year.

In their Cyber Risk Report, which has been seen by industry professionals as one of the most comprehensive evaluations of network security to look forward to annually, reports this is the highest number of backdoors that administrators have dealt with since 2006, and the the most common found so far have been cross-site scripting vulnerabilities in between major websites. This is a process wherein users are asked to use one login in order to verify another, and when properly hijacked it can give hackers full access to email accounts, Facebook, and many other secure servers simply by lifting your information as it passes between the two domains.

A perfect example of this is when you use Facebook to login to Spotify, even if it’s just to verify you aren’t trying to receive a second free trial. Phishing schemes drop in on the interactions the two servers are having through malware installed on the user’s computer, which then allow it to record any and all data transmissions that pass between each. The report estimates that up to 45 percent of all the security flaws found were of the cross-site scripting variety.

HP asks the hard questions

HP chief technology officer of enterprise security Jacob West told V3.co.uk that adapting to these threats is essential for the enterprise industry if they hope to stay one foot ahead of the competition this year.

“Even when armed with the right security intelligence, organisations must still focus on understanding and controlling risk rather than ‘winning’ the battle against attackers.” Focusing on a more defeatist perception of preservation rather than eradication, he continued.

“Threats are a given, managing their impact to acceptable levels is the challenge enterprises must address.”

With SQL injection, denial of service, buffer overflow, and remote file vulnerabilities rounding out the rest of the list, it’s easy to see that security firms still have a long way to go before we reach a point where any device or software can truly be considered “secure” in the mobile marketplace.


Read more at V3; http://www.v3.co.uk/v3-uk/news/2250534/hp-sees-8-000-software-vulnerabilities-in-2012-as-threats-escalate

Read More


Raytheon’s RIOT Tracks Your Every Move


Raytheon’s Rapid Information Overlay Technology (RIOT) is intended to assist governments by providing a social network data analysis program enabling the development of a detailed picture of activity for targeted individuals.  RIOT isn’t new, but the following video obtained by the Guardian is.

Using the software it’s possible to construct a complete picture of someone’s life — their friends, places they’ve visited, where they might go, when they might go — in only a few minutes.

In this video obtained by the Guardian, Brian Urch, Raytheon’s principal investigator, explains that “exif header data” embedded on smartphones sometimes includes latitude and longitude data with photographs. Of course, the software doesn’t just retrieve that information. It scourers through everything that’s available.

The program takes this information and organizes it in a way so as to show not only the targets photographs, but also the locations they were taken.

Urch says in the video, “We’re going to track one of our own employees…Nick… We know where Nick’s going, we know what Nick looks like… now we want to try to predict where he may be in the future.”

RIOT can also display a spider diagram which shows associations and relationships between individuals online by determining who they’ve communicated with and how often they communicate. It mines data from Facebook and GPS data from Foursquare. RIOT compiles a list of the top ten places a person of interest visits, when they visit, and when they might visit them again.

Urch goes on to say, “So if you ever did want to try to get hold of Nick, or maybe get hold of his laptop, you might want to visit the gym at 6am on a Monday.”

RIOT’s associated patent states that Raytheon believes its software can determine of subjects constitute a security risk.

Ginger McCall of the Electronic Privacy Information Center (EPIC) told the Guardian that, “Social networking sites are often not transparent about what information is shared and how it is shared… Users may be posting information that they believe will be viewed only by their friends, but instead, it is being viewed by government officials or pulled in by data collection services like the [RIOT] search.”

A spokesperson for Raytheon’s intelligence and information systems department said this about RIOT, “Its innovative privacy features are the most robust that we’re aware of, enabling the sharing and analysis of data without personally identifiable information [such as social security numbers, bank or other financial account information] being disclosed.”

However, a bit of conflicting information from 2010 claims that RIOT, according to vice president of Raytheon’s Information Security Solutions business, “readily scales to trillions of entities.” Yeah that’s right, trillions.

Read More