• Finding the needle in a haystack

    Video cameras are popping up everywhere; on a typical day out in a big city a person could be filmed by hundreds of closed-circuit television (CCTV) cameras; the combined output of all these systems is far greater than the capacity of security staff to watch all the images; an Israeli company is offering a solution which makes searching through video images easy; in some cases, twenty-four hours of video from a security camera can be searched in under a minute

  • Using location-based services to protect infrastructure

    Location-based services (LBS) have enabled marketing firms to alert mobile phone users of nearest coffee shops and eateries as well as help phone owners find their geographical location on hand-held mapping devices; now, location based service enabled phones can help protect critical infrastructure facilities by alerting authorities about threats and giving them time to apprehend intruders

  • Fireballs neutralize biological weapons

    A California company will develop fireballs that can neutralize biological weapons and infrared decoy flares that are nearly invisible to the naked eye; the company, the fireballs are among the counter-terrorism tools that Exquadrum plans to start testing soon at four abandoned military bunkers in Victorville, California

  • Engineering competition features Blue Tooth-capable trebuchet

    During the first Storm the Citadel Trebuchet Competition in Charleston over the weekend, Google employees combined Android cell phones, a computer the size of a credit card, and a Blue Tooth receiver to trigger a medieval weapon used in the twelfth century to destroy enemy fortifications

  • New association for maritime security industry formed

    Maritime security consultant Peter Cook recently announced the formation of the Security Association for the Maritime Industry (SAMI); SAMI will help establish rules and regulations in the fledgling maritime security industry; the maritime security industry has grown rapidly in recent years, but has suffered from lack of regulation and rapid expansion; the industry’s reputation has been tarnished with incidents of hired security firms abandoning ships when pirates attack leading to long periods of captivity for the ship’s crew; to prevent these incidents from occurring and to uphold the reputation of the industry, SAMI will vet maritime security companies, establish standards, and ensure that its members comply with established standards

  • Tainted apps make their way into official Android store

    More than fifty applications have been found to be infected with a new type of Android malware called DroidDream, an information stealer; fraudsters repackaged legitimate apps (mostly games) so that they included malicious code before uploading them to the marketplace; the tactic has been seen in mobile marketplaces in China and elsewhere but this is the first time the approach has been successfully applied in the United States

  • ASIS and (ISC)2 join forces for annual security conference and more

    (ISC)2 will hold its first annual Security Congress in conjunction with ASIS International’s 57th annual Seminar and Exhibits conference in Orlando, Florida; the combined events are expected to attract more than 20,000 security professionals from around the world; during the conference the two organizations will jointly offer certification seminars for various security and technology-related credentials; (ISC)2 and ASIS signed a deal to work together and leverage their mutual strengths and membership bases; beyond the conference, the two organizations will work together on developing educational programming, research, and legislative issues; the ASIS International conference will be held from 19 September 2011 to 22 September 2011

  • Kenya orders 100,000 more biometric ID cards from OTI

    On Track Innovations Ltd. (OTI) recently received an additional order for 100,000 of its MediSmart healthcare biometric ID cards; the cards were purchased by Kenya’s Smart Applications International Ltd. (SMART) for use in medical facilities across Kenya; the card contains a microchip that stores a patient’s name, picture, signature, and medical treatment records; SMART has already issued an estimated 200,000 MediSmart cards to combat fraud

  • China races to claim Arctic resources

    As temperatures around the world continue to rise and the ice in the Arctic Ocean melts, the once frozen seas are increasingly open for exploration and countries have been scrambling to claim the region’s vast resources; several countries including Canada, the United States, and Russia have all sought to expand their territorial claims over the region and now new countries like China are pushing in; Chinese researchers recently sailed to within 120 nautical miles of the North Pole; only a few years prior, this trip would have been impossible due to the thick ice in the ocean that can be more than 30 feet thick; scientists estimate that during the summer months, the Arctic Ocean could be ice-free by as early as 2013 or as late as 2060

  • Acoustic gunfire detection devices heading to the field

    Technological developments may one day create artificial soldiers, but until they come along, the United States and other countries will continue to rely on human soldiers; the militaries thus want to preserve as many of their soldier’s lives as possible; to that end, Shoulder-Worn Acoustic Targeting System (SWATS), which helps Marines zero in on enemy sniper fire, is a godsend to the United States; asymmetric warfare favors the forces that can strike and runaway unharmed, but with plentiful acoustic sensors in the field it will be that much harder for snipers to ambush U.S. soldiers and live to escape

  • Law enforcement, and domain name registrars discuss ways to tackle net crooks

    Police and other law enforcement agencies in the United States and the United Kingdom are increasingly turning their attention to domain names as an Internet choke-point that can be used to shut down Web sites selling counterfeit goods and enabling the trading of pirated movies and child pornography

  • Are your phones really secure?

    Breakthroughs in technology have enabled malicious actors to listen in on any conversation using your phone even when not in use; eavesdroppers have circumvented encrypted audio channels by relying on a relatively simple principle in physics — resonance; by tapping into an object’s natural resonance, spies have turned phones and phone cables into listening devices even when they are not in use; researchers at Teo, a manufacturer of secure telecommunications equipment, were able to capture human voices using standard phones, unplugged Ethernet cables, or even a rock; to address this security gap, Teo has designed its IP TSG-6 phones with special vibration dampening circuitry and materials that render them impervious to these types of listening devices

  • Android apps send private data in the clear

    Cell phones running the Android operating system fail to encrypt data sent to and from Facebook and Google Calendar, shortcomings that could jeopardize hundreds of millions of users’ privacy; Facebook’s recently unveiled always-on SSL encryption setting to prevent snooping over insecure networks — but the encryption is no good, meaning that all private messages, photo uploads, and other transactions are visible to eavesdroppers

  • Harris Corp. awarded $9 million Army contract to boost biodefense

    The U.S. Army recently signed a $9 million deal with Harris Corp. to bolster the army’s biological defense capabilities; Harris will provide the Army’s Joint Biological Point Detection System (JBPDS) with its advanced Falcon II AN/PRC-150 high-frequency radio system; the radio system is capable of detecting and identifying biological warfare agents and will automatically send alerts to headquarters when it senses the presence of these agents; JBPDS is a portable self-contained unit designed to automatically detect and identify airborne biological agents

  • Border bottlenecks hamper trade

    Last year, U.S. exports to Mexico totaled $163 billion, and imports from Mexico totaled $229.6 billion; nearly 80 percent of that trade crosses through land border ports on trucks and railcars; the 1.8-million strong Border Trade Alliance says bottlenecks at border crossings hamper this trade and make it more costly to grow it; the Alliance urges Congress and the Obama administration to invest in border ports of entry, including hiring more staff; Obama’s proposed 2011 budget includes only 300 new Customs and Border Protection officers, while Republicans propose shrinking the Border Patrol by 870 agents