Apple patenting AI trojan for use in mobile devices [updated]

Posted on August 25th, 2010 Admin

While many of my pals have I-phones, I have no intention of getting one.  The interface is slick and it has all the features a person could ask for in a mobile device (and more), but the inability to remove the battery sends shivers up my spine.

Steve Jobs proudly displays the latest NSA bugging device

In this patent application, Apple claims it has software that essentially turns a mobile device into a biometric trojan horse, identifying users by their biometric data (heartbeat pattern, accelerometer vibration patterns, voice print, and face recognition), logging keystrokes, saving packet data, etc. all under the thin guise of protecting the device from unauthorized use.

Now let’s not kid ourselves, law enforcement agencies can already install a trojan on most if not all major models of mobile devices via firmware updates, but as usual Apple is thinking different.  This is bigger.  Machine vision, biometric identification, accelerometer analysis, GPS, voice recognition…. all these streams of data amount to much more than a traditional eavesdropping device.

Apple’s patent turns the devices into literal sensory organs for an AI threat assessment system like the NSA Main Core.  Humans would not even begin to be able to integrate all these input data streams, but AI software can.

Not only has Apple devised the ultimate intelligence trojan, they’ve also designed a personalized weapon targeting system.  If a mobile device identifies a human target, A missile or beam weapon strike can be confidently delivered to the target using the device’s biometric identification and GPS locator, confirmed by satellite.

The sheer number of mobile devices and sensory data available, and the abililty to integrate these streams centrally using AI systems creates a biometric surveillance cloud for the ruling oligarchs to have Total Information Awareness* over their subjects, the human cattle.§

As communications device manufacturers and telcos grow, they will inevitably be approached by intelligence agencies with offers they can’t refuse.  Either they cooperate and profit from compromising the security of their platforms, or misfortune may befall them.  It’s the easy way or the hard way.

The big story here is that Apple is going out in the open with it, attempting to profit from the intellectual “property” they’ve developed, most likely at the command of shadow government intelligence agencies.

The brazen nature of filing a patent for an intelligence agency AI trojan is significant.  As we move past the point of no return toward the New World Order, the shadow government devils will come out of the shadows, until ultimately when their drone armies are sufficiently powerful, they will wage a new World War on some manufactured threat in an effort to reduce our numbers and enslave us, in what they believe will be a utopian “re-wilding” of the Earth.

We need to stop deluding ourselves. When they bring this AI extermination grid online it’s going to be like shooting fish in a barrel.    Just do something, whatever you can. At the very least, stop  feeding it.  We still have the power to disable this thing using the free market and whatever is left of our free will.

Don’t take that job for Raytheon or Lockheed Martin.  Don’t sell your research to DARPA.  Don’t enlist in the military. Don’t support the corporations that are building the extermination grid.  Do use your powers for good and not evil.  Do work toward self-sufficiency and strengthen your family and local community.  Do protect your children from brainwashing.

Here’s the patent application:

What is claimed is:

1 . A method for identifying an unauthorized user of an electronic device, [This means the software will be running all the time.] the method comprising: determining that a current user of the electronic device is an unauthorized user; gathering information related to the unauthorized user’s operation of the electronic device in response to determining, wherein the unauthorized user’s operation comprises operations not related to the authentication; and transmitting an alert notification to a responsible party in response to gathering.

2 . The method of claim 1, wherein determining further comprises: determining the identity of the current user; comparing the determined identity to the identity of one or more authorized users of the electronic device; and detecting that the determined identity does not match the identity of at least one of the one or more authorized users.

3 . The method of claim 1, wherein determining further comprises: identifying a particular activity performed by the current user that indicates suspicious behavior. [device will be profiling your behavior]

4 . The method of claim 3, wherein the particular activity comprises one or more of hacking the electronic device, jailbreaking the electronic device, unlocking the electronic device, removing a SIM card from the electronic device, and moving at least a predetermined distance away from a synced device. [like an electronic house arrest tracking device]

5 . The method of claim 1, wherein gathering further comprises gathering one or more of screenshots, keylogs, communications packets served to the electronic device, and information related to a host device coupled to the electronic device.

6 . The method of claim 1, wherein the alert notification comprises a general message indicating that an unauthorized user has been detected.

7 . The method of claim 1, wherein the alert notification comprises at least a portion of the gathered information.

8 . The method of claim 1, further comprising: gathering information related to the identity of the unauthorized user in response to determining; and gathering information related to the location of the electronic device in response to determining.

9 . The method of claim 1, further comprising: restricting at least one function of the electronic device in response to determining.

10 . The method of claim 1, further comprising: transmitting sensitive data from the electronic device to a remote storage; and erasing the sensitive data from the electronic device.

11 . An electronic device operable to detect an unauthorized user of an electronic device, the electronic device comprising: a processor operable to: receive an input from a current user of the electronic device; determine the input is not associated with an authorized user of the electronic device; and record usage information of the electronic device in response to determining; and communications circuitry operable to transmit the usage information to a remote device.

12 . The electronic device of claim 11, further comprising: a microphone operable to record the voice of the current user; and wherein the processor is further operable to: compare the recorded voice with voice prints of authorized user of the electronic device; and determine that the recorded voice does not match the voice print of any authorized user of the electronic device.

13 . The electronic device of claim 11, further comprising: a heartbeat sensor operable to detect the heartbeat of the current user; and wherein the processor is further operable to: compare the detected heartbeat with heart signatures of each authorized user of the electronic device; and determine that detected the heartbeat does not match the heart signature of any authorized user of the electronic device.

14 . The electronic device of claim 11, further comprising: an input device operable to receive an authenticating input for authenticating a user of the electronic device; and wherein the processor is further operable to: determine that a predetermined number of successive incorrect authenticating inputs have been received.

15 . The electronic device of claim 11, further comprising: a camera operable to take a photograph of the vicinity of the electronic device; and positioning circuitry operable to determine current location information of the electronic device; and wherein the processor is further operable to: geotag the photograph by associating the photograph with the current location information.

16 . The electronic device of claim 11, further comprising: an accelerometer operable to record a vibration profile of the electronic device; and a signal processor operable to compare the recorded vibration profile with a library of vibration profiles to determine a current mode of transportation of the electronic device.

17 . A system comprising: an electronic device comprising; an input device operable to receive a password provided by a user; a camera operable to take a photograph of the user; a processor operable to: determine that a predetermined number of incorrect passwords have been successively received; direct the camera to take a photograph of the user; and generate an alert notification in response to the processor determining, wherein the alert notification comprises information related to the identity of the user and the photograph of the user; and communications circuitry operable to transmit the alert notification to a remote device.

18 . The system of claim 17, wherein: the camera is operable to take a plurality of photographs of the surroundings of the electronic device; and wherein the processor is further operable to: analyze each of the plurality of photographs to identify distinguishing landmarks in the photographs; and determine the location of each photograph based on the identified distinguishing landmarks.

19 . The system of claim 17, wherein the alert notification is transmitted via one of text message, facsimile, VoIP application, instant messaging application, on-line profile application, on-line blog application, and a cloud server.

20 . Machine-readable media for identifying unauthorized users of an electronic device, comprising machine-readable instructions recorded thereon for: determining that a current user of the electronic device is an unauthorized user; gathering information related to the unauthorized user’s operation of the electronic device in response to determining, wherein the unauthorized user’s operation comprises operations not related to authentication; and transmitting an alert notification to a responsible party in response to gathering.

21 . The machine-readable media of claim 20, further comprising machine-readable instructions recorded thereon for: determining the identity of the current user; comparing the determined identity to the identity of one or more authorized users of the electronic device; and detecting that the determined identity does not match the identity of at least one of the one or more authorized users.

* Total Information Awareness project was publicly scrapped.  However it would be naiive to assume that intelligence agencies gave up on being “totally aware” of everyone’s private information.

§ Nice job.  I hope you’re happy with yourselves.

See also: Report: Apple testing RFID swipe support in iPhone prototypes


Leave a Reply

You must be logged in to post a comment.