Ever since 3-D printing became a commercially available service, Defense Distributed has sought to use the technology to create firearms. And in their latest act of circumventing the law, the online, open-source, libertarian group has created another means of building homemade firearms. But unlike the Liberator – their previous single shot incarnation – this one doesn’t involve making guns from 3-D printed plastic.
The group’s latest invention is known as the Ghost Gunner – a small, computer numerical control (CNC) milling machine that they used to create an aluminum lower receiver for an AR-15 rifle. This device, which costs about $1200, allows people with no gunsmith training to assemble a working assault rifle at home with no licensing or serial number. And for the moment, it’s completely legal.
The Ghost Gunner itself is a small box that measures about one foot on each side and contains an Arduino controller and a custom-designed spindle that holds a steel carbide drill bit. It works like any other CNC machine – the drill spins up and moves in three dimensions to carve items out of blocks of metal. However, this machine is specifically intended to make an AR-15 lower receiver.
That’s the part of a gun that connects the stock, barrel, and magazine – and the part that’s regulated by the ATF and assigned a serial number. Selling it without a license is illegal, but making it yourself is perfectly fine. An untraceable gun built without a serial number is often called a “ghost gun” by gun control advocates. Hence why Defense Distributed chose to appropriate the term, to deliberately generate controversy.
This is just the latest example of Defense Distributed pushing the bounds of home manufacturing technology to make a point. Cody Wilson, the group’s founder, is an openly radical, libertarian who has repeatedly stated that mass shootings and gun-related violence are simply the price people pay for freedom. In addition, his group has openly stated that they would not allow tragedies like the Sandy Hook Elementary School shooting deter them.
Manufacturing homemade weapons has always been his way of showing that technology can evade regulations, thus making the state obsolete. The group’s previous weapons – the 3D-printed Liberator gun – was more of a political statement. The gun itself was neither effective or practical; but then again, it wasn’t meant to be. This proof-of-concept weapon was simply meant to show that a new era of manufacturing is upon us.
The Liberator itself is prone to failure and usually only manages a few poorly aimed shots before breaking down. In designing a cheap CNC machine specifically to make gun parts, Defense Distributed is delivering a viable weapon at a fraction of the cost of other CNC machines (which cost many thousands of dollars). If you can make a lower receiver, all the other parts can be ordered online cheaply and legally.
The Ghost Gunner is capable of making anything that fits in the build envelope, which accounts for several gun parts that go into assembling a working assault weapon or handgun. The only requirement is the parts be created with Defense Distributed’s Physibles Development SDK (pDev) and distributed as a .dd file. In that respect, it’s not much different than any number of 3D printers.
Once again, Defense Distributed has proven that, for better or worse, we live in an entirely new era of manufacturing. In the past, a person needed considerable training if they wanted to make their own firearm. Nowadays, one needs only the right kind of hardware, software, and access to the necessary files. And as always seems to be the case in the digital age, the law is miles behind the curve.
One can expect the law will be upon Defense Distributed once again and place a ban on their Ghost Gunner. However, it goes without saying that Wilson and his colleagues will simply try again some other way and the fight between regulators and home manufactures will continue. But regardless of the issue of firearms, this is an indication of the age we now live in, where distributed systems are making for some rather interesting and fearful possibilities.
Source: extremetech.com














While they don’t have current plans to take the Casa Futebol beyond the concept stage, it is hoped that the project can inspire more socially-conscious approaches to problems of this kind. Combined with 3-D printed housing and other prefab housing projects, this kind of re-purposing of existing infrastructure is a way of addressing the problem of slums, something which goes far beyond the developing world.

In a recent security conference held in Canada before the Canadian Security Intelligence Service (CSIS), Alexander expressed the threat in the following, cryptic way:



In its ruling, the court also rejected prosecutors’ notion that the ability to remotely wipe or lock a phone required police to search the devices immediately upon arrest before evidence could be destroyed. The court responded that police can easily prevent evidence from being remotely destroyed by turning the phone off or removing its battery, or putting it into a Faraday cage that blocks radio waves until a search warrant can be obtained.


After holding a hearing on net neutrality in Vermont this past summer, Leahy came to an invariable conclusion:
The new bill would provide a mandate regarding how the FCC deals with any sort of paid prioritization, but it wouldn’t reclassify providers. Also, the new bill would only apply to connections from internet service providers to customers’ homes, commonly referred to as last mile connections. It wouldn’t pertain to “peering”, the deals governing the ways that internet service providers connect with each other or with content providers like Netflix and Google.
The bill may face serious challenges, however. Republicans control the House and have proposed their own bill to block the FCC from reclassifying internet service providers. In this respect, net neutrality is dividing lawmakers along partisan lines, and Republicans are not expected to support the proposed Leahy-Matsui bill. But in theory, a bipartisan agreement could be reached, especially since the Leahy-Matsui bill leaves reclassification off the table.
The Davis case brought this issue to the fore because the tracking was used to make an arrest. Basically, mobile phones send signals to the nearest cell towers so that the communications network system knows where to route a call should one come in. Many providers collect and store the location of towers a customer connects to at the beginning and end of the call for billing purposes. In this case, FBI agentsobtained these records without a search warrant and used them to place the defendant, Quartavious Davis, near the scene of a number of robberies.
Additionally, Smith built on the 1976 case of United States v. Miller, which held that a person does not have Fourth Amendment rights in their bank records because they are the bank’s business records and not the customer’s private data. Together the cases are known as the “third-party doctrine,” which says that you have no Fourth Amendment interest in a third party’s business records because you have voluntarily disclosed information to the business and assumed the risk of that information being further disclosed to the government.
Last December, a District of Columbia judge held that the bulk collection of phone records violates the Fourth Amendment – regardless of Smith – and called the program “almost Orwellian.” Shortly thereafter, a different district court judge relied on Smith to give the program his stamp of approval. This month, a third federal judge was obligated to allow the warrantless collection of records to continue, but opined that the Supreme Court should overturn Smith v. Maryland. 


He says he wants his signs to not just depict that momentum and progress, but to reflect the potentially disturbing aspects of those advances as well. Beyond that, Barbella sees an interesting dynamic in the public’s push and pull against what new technology allows us to do. Though the technology grants people access to information and other cultures, it also poses issues of privacy and ethics that hold that back. As a result, privacy concerns are thus featured in the collection in a number of ways.







