Bombproof TV rolling-news eco bins target the City

Zeitgeistgasm: Rubbish/media security recycling


City workers not yet living in old fridge boxes under motorways will now be able to receive news of their redundancies even faster, as a new video news channel may soon deploy onto street screens across the Square Mile. The screens will be attached to recyclo-eco-bins - which will also feature secret terrorist-bomb-proofing technology.

That, you have to say, is a positive zeitgeistgasm - relentless 24-hour feedback loop media, combined with a green/eco/recyclo push and some kind of mysterious counter-terrorism security bomb technology.

The scheme, known variously as RE:NEW and Renew, is the brainchild of former LSE students Kaveh Memari and Brian James, who have been punting it through six years and four rounds of financing. Last weekend, they finally clinched a deal with the notoriously stuffy City of London Corporation - the local government of the capital's financial district - permitting them to bring their bombproof media/rubbish bins onto the streets.

"The City has quite tough restrictions on street advertising," RE:NEW spokesman Bill Spears told the Reg. "They're also quite strict about street furniture - what they'll allow. This is a major step."

Spears said that the RE:NEW scheme "won't cost the government or Joe Public a penny". Rather, the idea is that bins will be sponsored, often by a major corporation with offices nearby. The sponsor pays for the bin to be installed, and gets their corporate logo on top of it - linked to positive assurances that the rubbish in the bins will all be recycled.

The servicing, cleaning, emptying and recycling will all be handled by RE:NEW, who will also manage the "financial news channel" which will play on the screens attached to the bins. There's a handy chart of potential central-London rubbish'n'media recycle platform portals here (pdf) for those interested.

Though Spears insisted that the video channel would be "agnostic" and "primarily news", he said that bin sponsors would be able to put "messages" on it, paying RE:NEW to do so. Likewise, "media partners" such as Bloomberg or Reuters, wishing to put their content on the bin channel, would be a "revenue source" for RE:NEW. There might also be paid-for "corporate announcements" - not adverts as such, but results and investor-relations stuff and so on.

But what about the bomb issue? As everyone knows, the reason that the City has almost no public litter bins is that they make a handy place to plant a bomb (or, for fans of the original Italian Job, an infrastructure-disabling electronics payload of some sort).

Not to worry - RE:NEW have that covered. Their bins, they say, feature "blast intelligent technology" which will mitigate blast and fragmentation. Amazingly, the bins are also "composed of more than 50 per cent recycled material". They also look quite slimline and elegant in the concept pics - no massive reinforced-concrete bunkers here.

We here on the Reg bomb-disposal desk loved the sound of that. We noticed a press release from Florida company BlastGard, in which RE:NEW signed up for their amazing lightweight bomb-quench tech, BlastWrap™. Indeed, BlastGard also refer to their stuff as "blast intelligent technology" (pdf), just like RE:NEW - especially if employed in their inhouse bombproof rubbish bin.

Broader topics


Other stories you might like

  • Azure issues not adequately fixed for months, complain bug hunters
    Redmond kicks off Patch Tuesday with a months-old flaw fix

    Updated Two security vendors – Orca Security and Tenable – have accused Microsoft of unnecessarily putting customers' data and cloud environments at risk by taking far too long to fix critical vulnerabilities in Azure.

    In a blog published today, Orca Security researcher Tzah Pahima claimed it took Microsoft several months to fully resolve a security flaw in Azure's Synapse Analytics that he discovered in January. 

    And in a separate blog published on Monday, Tenable CEO Amit Yoran called out Redmond for its lack of response to – and transparency around – two other vulnerabilities that could be exploited by anyone using Azure Synapse. 

    Continue reading
  • Microsoft fixes under-attack Windows zero-day Follina
    Plus: Intel, AMD react to Hertzbleed data-leaking holes in CPUs

    Patch Tuesday Microsoft claims to have finally fixed the Follina zero-day flaw in Windows as part of its June Patch Tuesday batch, which included security updates to address 55 vulnerabilities.

    Follina, eventually acknowledged by Redmond in a security advisory last month, is the most significant of the bunch as it has already been exploited in the wild.

    Criminals and snoops can abuse the remote code execution (RCE) bug, tracked as CVE-2022-30190, by crafting a file, such as a Word document, so that when opened it calls out to the Microsoft Windows Support Diagnostic Tool, which is then exploited to run malicious code, such spyware and ransomware. Disabling macros in, say, Word won't stop this from happening.

    Continue reading
  • Inside the RSAC expo: Buzzword bingo and the bear in the room
    We mingle with the vendors so you don't have to

    RSA Conference Your humble vulture never liked conference expos – even before finding myself on the show floor during a global pandemic. Expo halls are a necessary evil that are predominatly visited to find gifts to bring home to the kids. 

    Do organizations really choose security vendors based on a booth? The whole expo hall idea seems like an outdated business model – for the vendors, anyway. Although the same argument could be made for conferences in general.

    For the most part, all of the executives and security researchers set up shop offsite – either in swanky hotels and shared office space (for the big-wigs) or at charming outdoor chess tables in Yerba Buena Gardens. Many of them said they avoided the expo altogether.

    Continue reading
  • CISA and friends raise alarm on critical flaws in industrial equipment, infrastructure
    Nearly 60 holes found affecting 'more than 30,000' machines worldwide

    Updated Fifty-six vulnerabilities – some deemed critical – have been found in industrial operational technology (OT) systems from ten global manufacturers including Honeywell, Ericsson, Motorola, and Siemens, putting more than 30,000 devices worldwide at risk, according to private security researchers. 

    Some of these vulnerabilities received CVSS severity scores as high as 9.8 out of 10. That is particularly bad, considering these devices are used in critical infrastructure across the oil and gas, chemical, nuclear, power generation and distribution, manufacturing, water treatment and distribution, mining and building and automation industries. 

    The most serious security flaws include remote code execution (RCE) and firmware vulnerabilities. If exploited, these holes could potentially allow miscreants to shut down electrical and water systems, disrupt the food supply, change the ratio of ingredients to result in toxic mixtures, and … OK, you get the idea.

    Continue reading
  • Cisco EVP: We need to lift everyone above the cybersecurity poverty line
    It's going to become a human-rights issue, Jeetu Patel tells The Register

    RSA Conference Exclusive Establishing some level of cybersecurity measures across all organizations will soon reach human-rights issue status, according to Jeetu Patel, Cisco EVP for security and collaboration.

    "It's our civic duty to ensure that everyone below the security poverty line has a level of safety, because it's gonna eventually get to be a human-rights issue," Patel told The Register, in an exclusive interview ahead of his RSA Conference keynote. 

    "This is critical infrastructure — financial services, health care, transportation — services like your water supply, your power grid, all of those things can stop in an instant if there's a breach," he said. 

    Continue reading
  • 1Password's Insights tool to help admins monitor users' security practices
    Find the clown who chose 'password' as a password and make things right

    1Password, the Toronto-based maker of the identically named password manager, is adding a security analysis and advice tool called Insights from 1Password to its business-oriented product.

    Available to 1Password Business customers, Insights takes the form of a menu addition to the right-hand column of the application window. Clicking on the "Insights" option presents a dashboard for checking on data breaches, password health, and team usage of 1Password throughout an organization.

    "We designed Insights from 1Password to give IT and security admins broader visibility into potential security risks so businesses improve their understanding of the threats posed by employee behavior, and have clear steps to mitigate those issues," said Jeff Shiner, CEO of 1Password, in a statement.

    Continue reading

Biting the hand that feeds IT © 1998–2022