Security

Overview

 * Ubiquitous video surveillance is the norm when you are outside or in any public space, as well as many “private” spaces.
 * Pervasive monitoring by Cameras, Drones and sensors of all types
 * Facial, Gait, and other Biometric recognition, identification and authentication systems
 * In the science-fiction movie Gattaca, visitors only clear security if a blood test and readout of their genetic profile matches the sample on file. Now, cheap DNA sequencers and software make real-time DNA-authentication a reality: quick and accurate identification of people and cell lines from DNA. The technology has multiple applications, from identifying victims in a disaster to analyzing crime scenes.
 * Behavior analysis and other AI-based methods are used to detect suspicious activities
 * Physical security (alarms, sensors, etc)
 * Cyber security (hackers, ICE & AI defenses)
 * Civic & Personal Security Response Services
 * Roving cybersec bots (the police of public networked spaces)
 * Drones – both ground-based and aerial – for emergency response and relief operations
 * Vehicular, worn and mounted ensors ensure everything that happens on UbiComp streets can be sensed
 * Blockchains (peer-to-peer hash-based data authentication) for all sorts of industries
 * Speech Analysis makes lie detection almost infallible
 * AI-driven viruses and malware are in an ever-escalating battle with AI cybersec systems
 * Smart malware can analyze the environment it lands in to determine whether it’s in a sandbox or a honeypot, and conceal its true intentions or delay its actual behavior to evade detection
 * Computer viruses can mutate while replicating their parent signatures, rendering antivirus systems unable to detect ‘malware offspring’. They can perform multi-stage attacks that gradually capture related systems and peripherals.
 * Hackers could take over driverless cars to launch terrorist attacks
 * Area Scanners, both fixed and portable, for various frequencies

PHYSICAL SECURITY:


 * 1) locks
 * 2) guards
 * 3) cameras, motion sensors, bots
 * 4) PID scans
 * 5) biometrics [facial, retinal, palm, voiceprint, etc]
 * 6) robotic weapon systems

CYBER SECURITY (from 4 up they all employ some sort of AI):


 * 1) passwords, key pairs
 * 2) weak encryption/firewall
 * 3) strong encryption/firewall
 * 4) network monitoring [cleaning, quarantining, reporting]
 * 5) biometrics [fist, voice]
 * 6) defensive interactive ai

Data Security & Blockchains
Blockchains are the standard method of record-keeping and contractual accounting for most businesses and public services. A blockchain is a distributed ledger of all transactions that have occurred within a system, along with identifying details such as participant usernames, dates, amounts, media content and related files. This ledger is shared and updated across the entire network of peer users, ensuring that multiple copies always exist of the entire record. Meanwhile, all data communications and hash totals in the blockchain are verified and transmitted using advanced cryptographic techniques. This ensures that each block in the chain (a) comes from the source it claims to come from, (b) has remained unmodified, and (c) cannot be changed without setting off a chain of error alerts throughout the system.

AI Security Systems
AI systems may be used both to detect and to predict crime. Processing input from networked video cameras, sensors and drones, these systems are capable of rapidly spotting anomalous behavior. This allows security or police forces to respond quickly, sometimes often forecasting when and where crimes will be committed.

EMP Fields
Electro-Magnetic Pulse fields are an effective way of keeping unwanted cyber-snoopers out of a specific location. Low-level EMP Fields can cause electrical noise or interference that affects the operation of electronic devices in range. High-voltage EMPs can induce sparks capable of igniting any flammable elements in the surrounding air. Large and super-powerful EMPs can induce high currents and voltages, temporarily disrupting or permanently damaging electronic devices and RC drones. EMP may also be built into handheld ranged weapons called RF Rifles.

Identity Checks
An identity check will look for: Biometrics, PIDkits, and Identifying Devices (usually in that order). A weakly-secured system will be satisfied with just one of these; better systems will require two. Biometrics may include signature scans, finger or palm scans, facial scans, retinal scans, voice scans, DNA (swab) scans or a combination of those technologies.

Security Levels
Security Levels are rated on a scale of 1-10, with 1 being basically no security, and 10 being the ultimate in AI-augmented cyberdefense systems. Large companies and wealthy individuals often possess security systems of unique design, which can present would-be hackers with unforeseen difficulties. More pedestrian applications and people of lesser means often use systems with well-known exploits, and many of them never even change the factory-preset password.

Security Access
Security Access is likewise granted on a scale of 1-10, with the rating being equal to the maximum Security Level accessible by the agent.

Signal Jammers
The signal jammer broadcasts a continuous stream of white noise and random data, making those within its range or beside its sourcepoint effectively invisible to electromagnetic scanning and most listening devices.

Fake IDs
Fake IDs of various kinds are created by dedicated criminal professionals, and are not cheap. A fully-equipped identity consisting of paperwork, ID card, corporate ID numbers and PIDkit can cost 2,000-5,000 Credits. For each level of security access required, add another 1,000.

Ghost PIDs
It is possible to obtain the PIDkit of a person who is no longer alive, or no longer connected to the net. By whatever means – sometimes voluntary, sometimes not – their PIDkits have been removed from them, and any health monitors they carried have been hijacked, spoofed or blocked. The functioning PIDkit may then be attached or implanted in another person, fooling many sensors (except facial recognition systems) into believing them to be the original owner of the kit.

PIDShields
PIDShields are software systems that run alongside the user’s PIDkit, filtering the output it produces. The shield reaches out wirelessly into the neighboring network to grab available datawakes, and uses these random signatures to cloak the PIDkit’s signal, effectively creating the impression of a random person – or a randomly-shifting stream of people with bad connections, moving in and out of the fog.

Trash PIDs
By using specially-designed software, it is possible to hack a PIDkit and change its object signature, making it appear to be the RFID tag of something else – a vehicle, a product, even garbage. This is how Tube Rats fool CitySystem into seeing them as VacTrains when moving through the tubeways, for instance.