Uploaded by gineous1

13 JelevAFCEA KEIT 09

advertisement
-1
“SECURITY: SEARCHING FOR THE FRONT LINE.”
Brussels - 29-30. Oct. 2009 AFCEA/NATO - A3 Agency
An exploration of the management of security and its technical and physical
applications to everyday life.
We make business for 19 years in this field developing:
A new stochastic method against
cloned documents and goods
Contents:
a) Can EXPERIENCE from the history help us for our future?
b) HOW? – by using an ancient method dressed in hi&nano-tech!
c) SOLUTIONS & PROPOSALS for urgent common activity.
Slide: 1 - 7
Slide: 8-14
Slide: 15-21
1
-2
Some of the world biggest problems nowadays are related to corruption and
terrorism. According to information and statistics from the most reputable
security companies the annual amount spent worldwide only on corruption
reaches more than 500 bln. USA $ - Kroll global fraud report VI.2009.
As long as this huge amount of money flows into corruption and terrorism the
war against them is lost!
Where is the source of all that funding ? Some ten-fifteen years ago most of that
money was coming from trafficking drugs, weapons and people and gambling. Today
we witness a worldwide change and now most of the “black” money come from
counterfeit documents, fake and pirated goods & products; bank frauds.
The method that I will present today is awarded as best for combating corruption and
terrorism in IENA 2000 - Germany, and INPEX 2002 – USA, reason to future develop it
with many international partners for the following already developed applications:
-Illicit firearms and munitions
-stolen cars (implemented)
-bank cards
-passport, ID cards and other documents (implemented)
-3
Basic Joint International R&D
- Started since more then 32 years and was made jointly with scientists
from USA, Russia, Germany, Austria, France, Japan, Italy, England
and Bulgaria
- An extract from the scientific and practical part was presented twice
in the U.N and in the European Parliament - 5.12.2008 and three times
in the Bulgarian Parliament
15 Gold medals from
international exhibitions
- More than 40 mln.
mln. EURO used for research for 10 years including
financing from F.P.6 and F.P.7 EU programs
- Our partners in the implementation with started in 4 countries are
companies such as Bundesdruckerei (Germany), SAGEM (France),
Omnitech and HTSI (Switzerland) and others
Presentation: www.alde.eu/fileadmin/images/Photo_Library/2008/081205_Cultural_heritage/
www.alde.eu/fileadmin/images/Photo_Library/2008/081205_Cultural_heritage/
Brussels_Pres_Eng_Dec2008_01Brussels_Pres_Eng_Dec2008_01-web.pdf
video:
www.alde.eu/en/details/news/aldewww.alde.eu/en/details/news/alde-seminarseminar-rolerole-ofof-liberalliberal-democracydemocracy-in thethe-actualizationactualization-ofof-the
-culturalcultural-heritageheritage-of europe
Note: Our joint presentations can be found in the CD
available at our exhibition stand where you can see also a
functioning machine
Part from our machines
3 exhibitions in Bulgarian parliament
-4
A CHILDS PROPHECY FULFILLED AND
A WAR LOST BY ADULTS!
Today we witness a child's prophecy from 1981:
„A personal computer is a personal amplifier – in the hands of a smart person it
will multiply their potential, and in the hands of a criminal – it will amplify their
actions“ – answer to the question “what is personal computer?”.
(May 1981 San Francisco-USA, at National computer conference, where IBM
and APPLE presented their first personal computers).
The Lost War
Over the last 15 years we see two trends increase of the black economy
economy by 15%
annually, and only 13%
growth
in
the
legal
economy.
This
result
in a world
1
governed by a mafia of counterfeiters within the next 10 years, reaching up to
7,5% from the world economy and about 3000 bln $ annually earnings.
First official statistics for 2000bln. black economy and 1400 bln.
bln. “laundered”
laundered” money
annually - IX.2005 Brazil - Giovauni Coelho International conference; “The
Economist – council of Ministers meeting”
meeting” – XII.2007 Bulgaria; Giscare d’Estaign
conference “Future for Europe”
Europe” V.2008 – overview of the black economy.
The development of the PC, the Internet, mobile communication as well as the
boom in hi-tech products distributed to mass consumers increases the coefficient of
amplification
Criminals introduces new technology much faster, without public discussions,
political debates or competition (competitors do not last long!).
For our security we need a new method for writing of information: cheaper and
Ecologically clean, independent from technology, corrupted governmental employees;
ensuring possibility of every citizen safely to contribute to the war with mafia,
independent from the time. We searched for it in the history.
Other well-studied principles of stochastic phenomena
There ways of introducing stochastically encrypted information
1. Principle encoded through
human knowledge
11th century AD
The most ancient
encryption machine
is the “Kukuzel
Wheel” from Aton
Monastery, Greece –
author is the
Bulgarian singer
Joan Kukuzel –.
2. Encoded through artist’s
intuition or as in pic.1 ?
14th century AD
Magic square in the Four
Gospels (XIV Cent. AD) – J/P
with BL; LSE; Warmick University
of E.U.:
First stochastic presentation and
religious dispute provided by Sts.
Brothers Cyril and Methodius
(authors of Cyrillic alphabet) in
867 AD at the Vatican
-5
3. Natural encoded
through physical
fundamental low –
energy and
information stored in
“emptiness” between
water molecules
…the shape of water crystal
What is in the
listening to music by Bach ...
depth of the
Dr. M. Emoto – Japan,
great painting of
Berkeley – USA; prof. Antonov,
the Gioconda ?
Keit Ltd., Bulgaria – See the
Presentation at the 2nd World
Two NGOs still
Congress on Water - 2005,
study thousands
Heidelberg – Germany by
of hidden
prof. H. Klima, Atom Institute,
pictures and
Wien, Austria.
geometric
relations!
I. Today, in XXI century, we use for security One and Two-dimensional
-6
elementary stochastic encryption and unsafe and dangerous RFID
(electromagnetic pollution) and “smart” chips (that are easy to be replaced with fake).
Step I
Step II
One dimension
encryption
Step III
Two dimensional
RFID/ smart chip
Generally
Encryption in
Steps I – III is easy
for forging, with
provides billions for
corruption and
terrorism
II. The ancient stochastic encryption is multilayered, built by dedicated men
Source:
- On first level – The logo of the book is written 10,8 million times
- On second level - “the Hesychast Tsar” is written 32 million times
What makes the Magic Square so unique:
The hidden messages within it are abundant.
Pseudo – 3 dimensional for 7 levels of hidden
information.
The letter arrangements have been made on
purpose, without need to any of commentary.
They definitely do not fit the context and aim at a reader who is initiated into
the code.
Obviously the message is sacred because it lies in the sacred book.
-7
Even on nano and sub-nano level this method is a physical law,
defined and studied by the Nobel prize winners John Pople (19252004); Albert Szent Gyorgy (1893-1986) and Albert Einstein (1879-1955)
+
9
+
-
Single Dipole
molecule
Astral water
•
Electrically
neutral group
Mental water
+
Temporary
cluster
Spiritual
water
“Die Welt verbeugt sich vor mir, und ich verbeuge mich vor dem Lehrer Peter Danov
aus Bulgarien“ - Albert Einstein interview Radio Canal France International – broadcasted 1955 after his death!
(Petar Danov) Beinsa Dunu *1864-1944) definition of 3 types of water- 14.05.1938
•
-
-
+
-
-
+
+
0
16
+
H
-
+
+
-
H
How this method is reinforced with hi & nano-tech and can be used for security:
searching for the “front line” for safety of the world economy and our society?
Step I: Comparison between currently used and new
stochastic methods
-8
To protect documents or labels the material is destroyed by laser
perforation and stores single level personal information
Standard method
of writing information:
Laser perforation over a documents,
certificates, paper:
1/ Method used now: in one point 1 bit is
written (present or not present)
2) New method proposed by
- introduced 20 years ago by Crane & Co., USA
and 10 years ago by IAI Netherlands
INTRODUCED SO FAR:
KEIT Ltd, Bulgaria,
Bundesdruckerei, (Ger),
SAGEM, France, HTSI –
Switzerland, LKP –
Austria]
BANKNOTE PAPER
SWISS FRANC
IN RESULT:
RUSSIAN RUBLE
BELGIAN PASSPORT
DUTCH DRIVING LICENSE, ETC.
We are able to
record multilevel
hidden
information
including
biometric data.
“1” yes
No “2”
-9
Step II: A) A mathematical algorithms defines different x / y for a
given perforation point (4) positions from the central matrix.
Central
matrix
position
B) Step II-B: The shape of the
point can also be modified with a
mathematical algorithm.
(Step II-A)
Different positions
of point 4
Examples of different shapes forms and
rotations of the encoded point
C) Step II-C: The point can be
rotated
Note: Technical trends support this solution: smaller lengths and spots of
laser beams, higher resolution ability of optical devices, sensors and CCD for
reading process – a constant decrease in prices for the above key elements.
Step III: Code of Material - Any attempt to scan our unique encrypted individual
mark for purpose of reproducing, duplicating or cloning of the marking will be
automatically discovered, because the “answer” from the microstructure of
material of the substrate for the fake or replicated alleged “unique mark”
will be different from the original, due to the “Code of Material”
This is established through comparison with microphotographs as these shown below,
recorded in the database during the process of application of each visible part of the unique
mark or Effective (encrypted) Part Marking.
Laser perforations on secured paper! Photos showing how different (1-A; 1-B) are the
micro-holes with same power of the laser, and the random hits of apertures on the
microprint (1-C)
1-A
1-B
1- C
Result: If the counterfeiter tries to repeat the picture of stochastic encrypted
mark, the material “answer” is totally different compared to the original.
-10
Step II & III, but not for perforation – for engraving
- 11
Secured smart chip on bank, ID and other cards
Code of Material on hard metal surface - „micro fingerprint“
Encrypted unique mark
Possible verification of
smart chip for “cloning”,
before reading by real
data-base operation!
Note: All databases of relation visible / invisible code of material (or backup on
CD / DVD-ROM) - stochastically secured against inside corruption.
11
-12
Step IV: EU Mark – Readable, if destroyed
(Resistance against erasure)
EU helped to improve the technology with AFM method - FP6 and FP7 projects
and focus on U.N. Firearms protocol – Article 8: “unique mark”
http://www.unodc.org/documents/treaties/UNTOC/Publications/TOC%20Convention/TOCebook-e.pdf
1. 3D encrypted marking
(a number).
Resistance against erasure
3. Erased marking and its reading with nano-sensor
by means of the control apertures engraved to the
critical depth.
2. Cross-section of the part including 3D
encrypted marking(number).
- depth of the aperture
4. The result of the nano sensor’s reading.
- critical depth of the aperture
- variation of material microstructure round the aperture 5. Recovery of the control point followed by the
after laser engraving with the high different power of
recovery of the entire encrypted marking.
each spots.
-13
Step V:
Encrypted mark & stochastic method transferred to nano level
Sample OVD (for the banknotes) with nano stochastic encryption
Nanocode
matrix
Preserved “nanocode” on about 200Å
thin Film Aluminum at OVD.
OVD with “nanocode”
Security paper
with OVD - cross section
Stochastic laser perforation
(guide for searching nanocode)
Step VII: Police mobile reading device
(with entirely secured authentification process)
Telecommunication reading:
Stochastic macro
and even
“nanocode”
(6) Nano sensor
(if unique mark is erased )
Encryption
module
The first machine and prototype,
performing some of steps (I – VII) is
working and tested
in Germany and England in 2009.
Encrypted OVD on important documents & expensive goods
-14
We should try to accelerate the ratification and implementation of the UN protocol –
for unique marking of weapons and munitions including modifications for easier
acceptance by the countries which have not yet ratified the UN protocol - proposal
made 27.04.2006 in Sofia.
Stage I:
-15
For police, civilians, hunters
Note 1: Expanding the obligatory marking of
cold weapons.
Note 2: Changes to the criminal law – if
weapon is not marked, carrying is
illegal.
Stage II: Standardization for Weapon
possession documents, valid
worldwide.
Stage III: After stage I & II strict requirements
to producers of new weapons and
munitions, and about weapons on
stock.
NATO meeting - Ministers of Foreign Affairs
27-28 April 2006 – Sofia Bulgaria
-16
Our 17 years old experience against car theft and crime
Stolen cars and fake document (possibly used by
“kamikaze” terrorists) are among the basic tools
for terrorism! Today we use various sophisticated
security features. However we have not yet have
a common definition for interoperability, fast and
reliable verification and elimination of “cloning”
The presented activity has been confirmed by a
Council Conclusion from 19. March 2008, but
without definition
-17
Brief pre-history of the first introduction of EU Mark and
the method of stochastic encryption
Car theft reduction more then seven times!
What are the advantages in the encrypted unique
marking technology!
1. Encrypted code of the marking agent.
2. Encryption protected OVD with a laser
perforation of the number.
3. Piracy-protected database of marked
vehicles and owners.
4. Quick verification through a mobile
device:
- manual (over the last 10 years)
- automatic (since early 2008)
5. Assists car owner insurers by pointing to
the maturity date of the insurance policy.
6. The unique marking is readable even if
erased.
S.1. Database designed against corruption
among officials at the MoI and insurance
companies.
S.2. Validation and verification of insurance
policies through our marking network.
S.3. The MoI does not have a database of all
insurance companies, while every insurance
company has a complete database of its
clients’ vehicles.
S.4. Annual replacement of the encrypted
labels, with the option of compiling a photo
database for identifying / recording small
damages.
-18
For over 12 years since the introduced RFID & Smart Chip, world experts and governments
discussed,developed and sponsored programs, looking for a technical solution for interoperability
“unique mark”, security features against cloning! Seven particular definitions without much success!
Nowadays the biggest generator (from security features) of electromagnetic pollution is RFID and antennas
and they are implemented in billions! How dangerous are RFID and “cloning” good we presented in:
- Second World Congress of women parliamentarians 19-20.VI.2006
- FUTURE FOR EUROPE – with participation of Giscard d’Estaing and EU commissars 21.V.2008
- First World Congress on |Nanotechnologies Antiquity and past, present and future” 12-13.V.2009
Electromagnetic and noise pollution were discovered and described
through the World War II but till today we don’t take care about them
John Atanasov (the Bulgarian who invent the first
computer in the USA) was the first to notice and
study during and after WW2 the exchange of energy
and information within the water cycle!
(A unique
“noise/shriek” of snowflakes while touching the
water surface that impedes the positioning of
submarines fact from the history of World War II,
while J.Atanasov has worked on creation of the
sonar for the USA military)
-19
Our unreasonable behaviour does not only
concern the cutting of forests.
The electromagnetic emissions are particularly
dangerous! WHY?
Paper production
Electromagnetic
pollution
RFID chips
destroy nature
1. Electromagnetic and mental pollution is absorbed from the air by water
2. The „shriek“ of snowflakes or drops on contact with water / ground
-20
The method for stochastic recording and reading of information on subnano level in
water (and water vapour in atmosphere) was presented in FAO – UN – Rome in
9-17.IX.2005 (CD is available) and the same effect is used in the industry already:
Recording process
Reading process
Basic control equipment for reading of
H-bond energy and information
Structure of an
vitalisation device
– tap water follows
a spiral path and
„erases“ old
information,
“absorbing” the
molecule
orientation of
information etalon
water inside. EWOLinz-Austria.
-21
Thank you very much for your
attention!
We will be glad to welcome you at our stand
11, where you can get additional information
and CD-ROM with our presentation.
Contacts:
www.keit.bg
Address:
1712 Sofia, Bulgaria,
zk Mladost 3, bl. 380, 1-st floor
e-mail: info@keit.bg
Jivko Jelev
Download