-1 “SECURITY: SEARCHING FOR THE FRONT LINE.” Brussels - 29-30. Oct. 2009 AFCEA/NATO - A3 Agency An exploration of the management of security and its technical and physical applications to everyday life. We make business for 19 years in this field developing: A new stochastic method against cloned documents and goods Contents: a) Can EXPERIENCE from the history help us for our future? b) HOW? – by using an ancient method dressed in hi&nano-tech! c) SOLUTIONS & PROPOSALS for urgent common activity. Slide: 1 - 7 Slide: 8-14 Slide: 15-21 1 -2 Some of the world biggest problems nowadays are related to corruption and terrorism. According to information and statistics from the most reputable security companies the annual amount spent worldwide only on corruption reaches more than 500 bln. USA $ - Kroll global fraud report VI.2009. As long as this huge amount of money flows into corruption and terrorism the war against them is lost! Where is the source of all that funding ? Some ten-fifteen years ago most of that money was coming from trafficking drugs, weapons and people and gambling. Today we witness a worldwide change and now most of the “black” money come from counterfeit documents, fake and pirated goods & products; bank frauds. The method that I will present today is awarded as best for combating corruption and terrorism in IENA 2000 - Germany, and INPEX 2002 – USA, reason to future develop it with many international partners for the following already developed applications: -Illicit firearms and munitions -stolen cars (implemented) -bank cards -passport, ID cards and other documents (implemented) -3 Basic Joint International R&D - Started since more then 32 years and was made jointly with scientists from USA, Russia, Germany, Austria, France, Japan, Italy, England and Bulgaria - An extract from the scientific and practical part was presented twice in the U.N and in the European Parliament - 5.12.2008 and three times in the Bulgarian Parliament 15 Gold medals from international exhibitions - More than 40 mln. mln. EURO used for research for 10 years including financing from F.P.6 and F.P.7 EU programs - Our partners in the implementation with started in 4 countries are companies such as Bundesdruckerei (Germany), SAGEM (France), Omnitech and HTSI (Switzerland) and others Presentation: www.alde.eu/fileadmin/images/Photo_Library/2008/081205_Cultural_heritage/ www.alde.eu/fileadmin/images/Photo_Library/2008/081205_Cultural_heritage/ Brussels_Pres_Eng_Dec2008_01Brussels_Pres_Eng_Dec2008_01-web.pdf video: www.alde.eu/en/details/news/aldewww.alde.eu/en/details/news/alde-seminarseminar-rolerole-ofof-liberalliberal-democracydemocracy-in thethe-actualizationactualization-ofof-the -culturalcultural-heritageheritage-of europe Note: Our joint presentations can be found in the CD available at our exhibition stand where you can see also a functioning machine Part from our machines 3 exhibitions in Bulgarian parliament -4 A CHILDS PROPHECY FULFILLED AND A WAR LOST BY ADULTS! Today we witness a child's prophecy from 1981: „A personal computer is a personal amplifier – in the hands of a smart person it will multiply their potential, and in the hands of a criminal – it will amplify their actions“ – answer to the question “what is personal computer?”. (May 1981 San Francisco-USA, at National computer conference, where IBM and APPLE presented their first personal computers). The Lost War Over the last 15 years we see two trends increase of the black economy economy by 15% annually, and only 13% growth in the legal economy. This result in a world 1 governed by a mafia of counterfeiters within the next 10 years, reaching up to 7,5% from the world economy and about 3000 bln $ annually earnings. First official statistics for 2000bln. black economy and 1400 bln. bln. “laundered” laundered” money annually - IX.2005 Brazil - Giovauni Coelho International conference; “The Economist – council of Ministers meeting” meeting” – XII.2007 Bulgaria; Giscare d’Estaign conference “Future for Europe” Europe” V.2008 – overview of the black economy. The development of the PC, the Internet, mobile communication as well as the boom in hi-tech products distributed to mass consumers increases the coefficient of amplification Criminals introduces new technology much faster, without public discussions, political debates or competition (competitors do not last long!). For our security we need a new method for writing of information: cheaper and Ecologically clean, independent from technology, corrupted governmental employees; ensuring possibility of every citizen safely to contribute to the war with mafia, independent from the time. We searched for it in the history. Other well-studied principles of stochastic phenomena There ways of introducing stochastically encrypted information 1. Principle encoded through human knowledge 11th century AD The most ancient encryption machine is the “Kukuzel Wheel” from Aton Monastery, Greece – author is the Bulgarian singer Joan Kukuzel –. 2. Encoded through artist’s intuition or as in pic.1 ? 14th century AD Magic square in the Four Gospels (XIV Cent. AD) – J/P with BL; LSE; Warmick University of E.U.: First stochastic presentation and religious dispute provided by Sts. Brothers Cyril and Methodius (authors of Cyrillic alphabet) in 867 AD at the Vatican -5 3. Natural encoded through physical fundamental low – energy and information stored in “emptiness” between water molecules …the shape of water crystal What is in the listening to music by Bach ... depth of the Dr. M. Emoto – Japan, great painting of Berkeley – USA; prof. Antonov, the Gioconda ? Keit Ltd., Bulgaria – See the Presentation at the 2nd World Two NGOs still Congress on Water - 2005, study thousands Heidelberg – Germany by of hidden prof. H. Klima, Atom Institute, pictures and Wien, Austria. geometric relations! I. Today, in XXI century, we use for security One and Two-dimensional -6 elementary stochastic encryption and unsafe and dangerous RFID (electromagnetic pollution) and “smart” chips (that are easy to be replaced with fake). Step I Step II One dimension encryption Step III Two dimensional RFID/ smart chip Generally Encryption in Steps I – III is easy for forging, with provides billions for corruption and terrorism II. The ancient stochastic encryption is multilayered, built by dedicated men Source: - On first level – The logo of the book is written 10,8 million times - On second level - “the Hesychast Tsar” is written 32 million times What makes the Magic Square so unique: The hidden messages within it are abundant. Pseudo – 3 dimensional for 7 levels of hidden information. The letter arrangements have been made on purpose, without need to any of commentary. They definitely do not fit the context and aim at a reader who is initiated into the code. Obviously the message is sacred because it lies in the sacred book. -7 Even on nano and sub-nano level this method is a physical law, defined and studied by the Nobel prize winners John Pople (19252004); Albert Szent Gyorgy (1893-1986) and Albert Einstein (1879-1955) + 9 + - Single Dipole molecule Astral water • Electrically neutral group Mental water + Temporary cluster Spiritual water “Die Welt verbeugt sich vor mir, und ich verbeuge mich vor dem Lehrer Peter Danov aus Bulgarien“ - Albert Einstein interview Radio Canal France International – broadcasted 1955 after his death! (Petar Danov) Beinsa Dunu *1864-1944) definition of 3 types of water- 14.05.1938 • - - + - - + + 0 16 + H - + + - H How this method is reinforced with hi & nano-tech and can be used for security: searching for the “front line” for safety of the world economy and our society? Step I: Comparison between currently used and new stochastic methods -8 To protect documents or labels the material is destroyed by laser perforation and stores single level personal information Standard method of writing information: Laser perforation over a documents, certificates, paper: 1/ Method used now: in one point 1 bit is written (present or not present) 2) New method proposed by - introduced 20 years ago by Crane & Co., USA and 10 years ago by IAI Netherlands INTRODUCED SO FAR: KEIT Ltd, Bulgaria, Bundesdruckerei, (Ger), SAGEM, France, HTSI – Switzerland, LKP – Austria] BANKNOTE PAPER SWISS FRANC IN RESULT: RUSSIAN RUBLE BELGIAN PASSPORT DUTCH DRIVING LICENSE, ETC. We are able to record multilevel hidden information including biometric data. “1” yes No “2” -9 Step II: A) A mathematical algorithms defines different x / y for a given perforation point (4) positions from the central matrix. Central matrix position B) Step II-B: The shape of the point can also be modified with a mathematical algorithm. (Step II-A) Different positions of point 4 Examples of different shapes forms and rotations of the encoded point C) Step II-C: The point can be rotated Note: Technical trends support this solution: smaller lengths and spots of laser beams, higher resolution ability of optical devices, sensors and CCD for reading process – a constant decrease in prices for the above key elements. Step III: Code of Material - Any attempt to scan our unique encrypted individual mark for purpose of reproducing, duplicating or cloning of the marking will be automatically discovered, because the “answer” from the microstructure of material of the substrate for the fake or replicated alleged “unique mark” will be different from the original, due to the “Code of Material” This is established through comparison with microphotographs as these shown below, recorded in the database during the process of application of each visible part of the unique mark or Effective (encrypted) Part Marking. Laser perforations on secured paper! Photos showing how different (1-A; 1-B) are the micro-holes with same power of the laser, and the random hits of apertures on the microprint (1-C) 1-A 1-B 1- C Result: If the counterfeiter tries to repeat the picture of stochastic encrypted mark, the material “answer” is totally different compared to the original. -10 Step II & III, but not for perforation – for engraving - 11 Secured smart chip on bank, ID and other cards Code of Material on hard metal surface - „micro fingerprint“ Encrypted unique mark Possible verification of smart chip for “cloning”, before reading by real data-base operation! Note: All databases of relation visible / invisible code of material (or backup on CD / DVD-ROM) - stochastically secured against inside corruption. 11 -12 Step IV: EU Mark – Readable, if destroyed (Resistance against erasure) EU helped to improve the technology with AFM method - FP6 and FP7 projects and focus on U.N. Firearms protocol – Article 8: “unique mark” http://www.unodc.org/documents/treaties/UNTOC/Publications/TOC%20Convention/TOCebook-e.pdf 1. 3D encrypted marking (a number). Resistance against erasure 3. Erased marking and its reading with nano-sensor by means of the control apertures engraved to the critical depth. 2. Cross-section of the part including 3D encrypted marking(number). - depth of the aperture 4. The result of the nano sensor’s reading. - critical depth of the aperture - variation of material microstructure round the aperture 5. Recovery of the control point followed by the after laser engraving with the high different power of recovery of the entire encrypted marking. each spots. -13 Step V: Encrypted mark & stochastic method transferred to nano level Sample OVD (for the banknotes) with nano stochastic encryption Nanocode matrix Preserved “nanocode” on about 200Å thin Film Aluminum at OVD. OVD with “nanocode” Security paper with OVD - cross section Stochastic laser perforation (guide for searching nanocode) Step VII: Police mobile reading device (with entirely secured authentification process) Telecommunication reading: Stochastic macro and even “nanocode” (6) Nano sensor (if unique mark is erased ) Encryption module The first machine and prototype, performing some of steps (I – VII) is working and tested in Germany and England in 2009. Encrypted OVD on important documents & expensive goods -14 We should try to accelerate the ratification and implementation of the UN protocol – for unique marking of weapons and munitions including modifications for easier acceptance by the countries which have not yet ratified the UN protocol - proposal made 27.04.2006 in Sofia. Stage I: -15 For police, civilians, hunters Note 1: Expanding the obligatory marking of cold weapons. Note 2: Changes to the criminal law – if weapon is not marked, carrying is illegal. Stage II: Standardization for Weapon possession documents, valid worldwide. Stage III: After stage I & II strict requirements to producers of new weapons and munitions, and about weapons on stock. NATO meeting - Ministers of Foreign Affairs 27-28 April 2006 – Sofia Bulgaria -16 Our 17 years old experience against car theft and crime Stolen cars and fake document (possibly used by “kamikaze” terrorists) are among the basic tools for terrorism! Today we use various sophisticated security features. However we have not yet have a common definition for interoperability, fast and reliable verification and elimination of “cloning” The presented activity has been confirmed by a Council Conclusion from 19. March 2008, but without definition -17 Brief pre-history of the first introduction of EU Mark and the method of stochastic encryption Car theft reduction more then seven times! What are the advantages in the encrypted unique marking technology! 1. Encrypted code of the marking agent. 2. Encryption protected OVD with a laser perforation of the number. 3. Piracy-protected database of marked vehicles and owners. 4. Quick verification through a mobile device: - manual (over the last 10 years) - automatic (since early 2008) 5. Assists car owner insurers by pointing to the maturity date of the insurance policy. 6. The unique marking is readable even if erased. S.1. Database designed against corruption among officials at the MoI and insurance companies. S.2. Validation and verification of insurance policies through our marking network. S.3. The MoI does not have a database of all insurance companies, while every insurance company has a complete database of its clients’ vehicles. S.4. Annual replacement of the encrypted labels, with the option of compiling a photo database for identifying / recording small damages. -18 For over 12 years since the introduced RFID & Smart Chip, world experts and governments discussed,developed and sponsored programs, looking for a technical solution for interoperability “unique mark”, security features against cloning! Seven particular definitions without much success! Nowadays the biggest generator (from security features) of electromagnetic pollution is RFID and antennas and they are implemented in billions! How dangerous are RFID and “cloning” good we presented in: - Second World Congress of women parliamentarians 19-20.VI.2006 - FUTURE FOR EUROPE – with participation of Giscard d’Estaing and EU commissars 21.V.2008 - First World Congress on |Nanotechnologies Antiquity and past, present and future” 12-13.V.2009 Electromagnetic and noise pollution were discovered and described through the World War II but till today we don’t take care about them John Atanasov (the Bulgarian who invent the first computer in the USA) was the first to notice and study during and after WW2 the exchange of energy and information within the water cycle! (A unique “noise/shriek” of snowflakes while touching the water surface that impedes the positioning of submarines fact from the history of World War II, while J.Atanasov has worked on creation of the sonar for the USA military) -19 Our unreasonable behaviour does not only concern the cutting of forests. The electromagnetic emissions are particularly dangerous! WHY? Paper production Electromagnetic pollution RFID chips destroy nature 1. Electromagnetic and mental pollution is absorbed from the air by water 2. The „shriek“ of snowflakes or drops on contact with water / ground -20 The method for stochastic recording and reading of information on subnano level in water (and water vapour in atmosphere) was presented in FAO – UN – Rome in 9-17.IX.2005 (CD is available) and the same effect is used in the industry already: Recording process Reading process Basic control equipment for reading of H-bond energy and information Structure of an vitalisation device – tap water follows a spiral path and „erases“ old information, “absorbing” the molecule orientation of information etalon water inside. EWOLinz-Austria. -21 Thank you very much for your attention! We will be glad to welcome you at our stand 11, where you can get additional information and CD-ROM with our presentation. Contacts: www.keit.bg Address: 1712 Sofia, Bulgaria, zk Mladost 3, bl. 380, 1-st floor e-mail: info@keit.bg Jivko Jelev