Cyber Warfare and the ICPod
Scroll Down there's lots of good information here.


Cyber Warfare is becoming harsher. Hackers worldwide are breaking into many computers, causing havoc everywhere. They can do this because of the worldwide Internet and operating systems that have back doors that allow entry, that are supposed to be kept secret, but can be discovered, as their activities prove. And lots of folks haven't anything better to do than try. If it's possible, someday, someone will make it.

But there is a way you can protect your information, especially from change, and in some cases from espionage, and have truly private communications with your folks, worldwide.

Cyber Warfare exists because current encryption methods are breakable. If they were not, it would be a waste of time trying to break them. Our system is UNBREAKABLE, and you can prove it. I'm unable to tell you how it works, because encryption systems are classified as munitions and thus, it is illegal for me to transmit our method outside of the U.S. But I can tell you about it.

The only proven method of unbreakable encryption is called the one-time-pad, or Pad. It was actually patened in 1919 and remains the standard worldwide. It was named for the way it was implemented during World War II. The Allies used it, and they won, the Axis did not, and you know what happed to them.

Lets look at the positive features of the one-time-pad. Encryption is commonly done in one of 2 ways, although there are some other seldom used methods. The letters of the alphabet are numbers to a computer. They are standardized in the ASCII code.

A code number is added to each character in the message, or nowadays, message file, called the plaintext to produce an encrypted file or cypher text.

This cypher text is transmitted over open transmission systems, such as the Internet, that outsiders have access to. But to them its garbage, because each letter is fouled up.

Then at the proper receiver, the correct code numbers are subtracted, and the original plaintext is revealed. Nowadays, this can be done automatically, inside your computer.

Simple huh!

Another way, is to use the computers XOR function, XOR together each plaintext letter (byte in computer language,) with its code byte, yielding the cypher text, and doing that a 2nd time at the receiver yields the plaintext again. Both methods work.

Of course, you have to have the correct list of code numbers, or it comes out wrong. In fact, one of the features of the Pad is that all possible guesses at the code produce all possible output files, so the cryptanalyst (the person trying to break in) hasn't a clue which is the correct one. Cool huh!

Each character in the plaintext message file, has its own code number. And there is no mathematical relation between one number and the next.

Its unbreakable.

One way that breakable encryption methods are cracked, is called the brute force method. That is, have a fast computer simply try all possible code numbers until you get the right one.

Of course, with the Pad, you haven't a clue which output is the correct one.

In fact, if you knew some portion of the message file, such as the address, even if you got it, thats no proof that the rest is correct. For example, a message file may say "bomb Pearl Harbor 07" or it may say "save Pearl Harbor 12" or it may say "kiss my sweet potato" you just don't know.

In using the brute force method, each bit in the code doubles the number of numbers you have to try, because its binary. For example, in the old DES (Data Encryption Standard) the Government said you could use, but they couldn't (guess why.) The number was only 7 bytes or 56 bits long. That was a big number even to a computer back in the 70s.

So the number was 256, you'd have to try.

Somebody must have figured it out, because they were forced to change it.

It of course was not a Pad, ours is, and has a maximum of 256 bytes or 22048. Which is so big, my new computer won't even calculate it. Even with a photonic computer running at 1 femtosecond, or a million times faster than an 1 ghz per instruction, you'd be ready to retire before it got done, and since there is no indication which code is the correct one, if you did happen to get it somewhere along the way, you wouldn't know it.

In fact, if only one of its 2048 bits is wrong, the entire decryption will be wrong, not just part of it. How do we do that? That's part of the secret. Yet because that represents all possible ASCII bytes, all possible of guesses produce all possible files. Its truly UNBREAKABLE.

I use 2 different words, "key" and "code," because the common word "key" can be calculated. whereas a "code" is just a list of random bytes, with no way to calculate them. Breakable encryption methods use a key, that's why theyre breakable. In that case, if you guess part of the message right, you can just calculate the remainder.

But if you run a nuclear power plant, or even your bank account, which type would you want?

The code for a Pad is a list of random bytes, which of course has to be as long as the plaintext. That was a problem a half-century ago, but with modern computing speed its generally no big deal.

But also, our method is a Pad Generator, whose basic code is REUSABLE, for as many message files as you wish. The actual code used to do the encryption is unique to that plaintext. Yet the algorithm has only a dozen machine code commands, and so in a 2 gigahertz computer, it goes like the wiz.

However, an old fashioned Pad can be used only one time. You can't reuse a code table over again on a different message. If you do, the cryptanalyst can figure it out, and break in. That's why ours is unique. Its reusable.

Another drawback of the Pad, is distributing the correct codes to the correct people. In the past, these were written on a pad of paper, and as each one was used, the page was torn off and burnt. It was slow, but look who won!

All of these things are used as excuses to get you to use their breakable systems, even though they often don't mean much in todays world.

What's more they say, "Never use a proprietary system." They say that encryption is difficult, and they have experience and can find breakable systems. Bull! Always use a proprietary system!

As I've explained its not difficult if you use an ICPod. Anybody can do it. Just follow the rules.

They want you to give them the algorithm because their folks are paid by the hour, and trying to figure your algorithm out takes time and money. They tested mine that way, and then wouldn't charge me because they couldn't crack it, in spite of all their bluster.

Personal contact is still the best way to transmit a new code to your receiver, spy, employee or whatever. However, there are other ways too. For example, in the old movies the spy would get the location of the code over the phone. Then go to the library, or daily newspaper, and pick out the place designated.

In fact, with the ICPod, you can purchase a code over the internet, and receive it encrypted and secret from all others. Add an over the phone password, and its pretty tough to find it out, even for the authorities. Letters in a text, seldom have any mathematical sequence that would allow an enemy entry. That is, if you can trust the phone. Think how many are just in Moby Dick!

Having a password ahead of time can even be used to scramble the code. Electronic photographs are good too. In fact, you can have them use 2 of them, encrypted together to produce the code. The enemy would have to be listening in on both communication means.

And one message can be used to encrypt another. If you watch what you're doing.

Now, encryption works because computers, especially over the Internet, are very accurate at transmitting messages. However, if the enemy has control, they can foul up your communications, even if they can't read or substitute them.

In our method I've developed a provable UNBREAKABLE method of producing a Pad, unique to each message, so it's reusable. The code does not have to be as long as the plaintext, and one can easily add a password, direct it to individuals, and even control the actions of people, and protect remote control facilities.

Imagine the trouble Japan would have avoided if they had had my system when the tsunami hit, they could have shut down their reactors from Tokyo.

But don't trust software. Its changeable. Ours is burnt into firmware hardware. That way if it screws up, you know whose fault it was.

What's more, no virus, no hacker, not even you can change the unchangeable. Even the codes are hidden from human view, each one has a name so they can be identified, but the code itself is hidden in the hardware.

I started inventing it in the 60s, I called it a Navitron because it started off as a navigation device. (That was even before there were computer chips to build one.) Then as it grew, I called it a Wedge for its new shape.

And one day I was explaining it to my cousin, and I noticed that if you had information in it, you couldn't get it out, unless it wanted to give it to you. So, I changed its name to the Information Controlling Module, or ICM.

And if you wanted to insert information, unless it wanted to accept it, there was no way to insert it. It had total control.

In the 90s I got 2 patents on the hardware, but kept the encryption secret.

Now it's called the Information Controlling Pod, because I've added a tiny screen and keypad.

Let me give you an example of how our hardware and firmware can work together. Lets say that you have an employee with an ICPod and he turns bad, and you find out. Since it has a tamperproof clock, he has to call in, using encrypted email, or telephone, each work day.

When he does, you being the owner, can secretly send encrypted commands to his ICPod changing his password.

Then you tell him to give his ICPod to the new employee. He knows hes in trouble, but he has a choice. He can comply, then the new person can call for the new password when he has the ICPod in hand.

Or the old employee may refuse to give his ICPod to the new person. In that case his ICPod is worthless without the new password. And you, as the boss, can program a new ICPod, Fedex it, and the new person is in business the next day, and the old one is out. There suddenly become many things that work now because of unbreakable communication between one computer and another.

What if his ICPod is also his credit card? You can control all of his purchases by remote control. Try to do that with an old fashioned card.

Yes, through these means you can actually have remote control over people. I'm sure you can think of more with targeted unbreakable communications between hand-held computers.

Cyber Warfare exists because the present system is breakable. But with our system, warfare fails. You think you can break in? You're welcome to try.

If you buy it, I'll train your best people in all its details. Or will you wait until some guy in China or Pakistani compromises your business?

If you're interested in our system, and are an American, email me.

    Thanks for your interest.

Contact Dr. Hait