• Algorithm can turn 2D images into 3D biometrics

    Researchers at Florida Atlantic University have developed a way to construct 3-dimensional faces from flat 2-dimensional images; the computer algorithm analyzes an image and constructs a 3-dimensional model based on viewing angle and illumination; using this technique computers can more accurately identify individuals as computers often have a hard time distinguishing between individuals with flat images; this algorithm can also be used to identify criminals caught on security camera

  • Four biometric identification tools combined in a single system

    A Lithuania-based company recently announced the release of its latest software that integrates fingerprint, iris, facial, and palm print biometrics into a single system; the combination of multiple biometric analysis tools in a single software helps to identify individuals faster and increases reliability beyond the use of just fingerprint analysis or iris scanners alone

  • TSA will not expand private screening at airports

    The Transportation Security Administration (TSA) has decided not to expand a program that would allow airports to replace government security screeners with private screeners; the news comes a month after the agency said it was “neutral” on the program; the private screening program became popular following the uproar over enhanced security pat-downs, which some travelers found intrusive — even though private screeners must follow the very same procedures government screeners do

  • Bamboo bikes to put Africa into motion

    Bamboo is grown locally in many regions of Africa, so Columbia University’s Bamboo Bike Project (BBP) arranged for an investment which allows Ghana-based Bamboo Bikes Limited (BBL) to produce 750 bikes for a test run at its facility in Kumasi, with larger-scale production runs to follow; bamboo-framed bicycles are lighter and stronger than steel-framed bikes, adaptable to difficult road conditions, and can be easily modified for different needs, such as carrying farm loads, passengers, food, water, and medicine

  • "Sniffer technology" may replace detection dogs

    Humans have approximately 5,000,000 sensory “smelling” cells, while certain breeds of dogs, such as the Alsation, can have up to 220,000,000; dogs trained for detection jobs are effective enough, but require much more maintenance than a machine — and researchers have just developed a sniffer machine which may well compete with dogs; the new device uses what is called quantum cascade (QC) lasers to detect any trace vapors of explosive material emitted by a passenger, without the passengers having to remove any article of clothing in the process

  • Saracen, another Erik Prince company, in trouble in Somalia

    Despite claims to the contrary, Erik Prince, the founder and owner of the private military company Xe, formally known as Blackwater Worldwide, is part of the management team of another troubled security firm — Saracen; the Somalia’s Transitional Federal Government (TFG) signed a contract with Saracen calling on the company to maintian peace, security, and stability in the country — only for UN and African union observers to realize that the company signed a separate security-related agreement with the separatist Puntland region in the north, in violation of the UN arms embargo

  • Non-lethal weapons in the wild

    Taser International has unveiled a Taser stun gun designed for use on large animals; it can temporarily incapacitate mammals like bears and moose and is designed to increase the safety of wildlife workers and park rangers; the laser-sighted weapon is based on the company’s most advanced police Taser, the X3, but is optimized to work on large animals with thick hides

  • Sophisticated analytic software helps identify criminals

    Law enforcement agencies around the world are increasingly using powerful predictive analytic software to help fight crime; the software is capable of compiling massive quantities of data from criminal records, Internet files, phone calls, monetary transactions, traffic movements, and patrols in seconds; Los Angeles, Memphis, and Bangalore currently use or are experimenting with these predictive analytics; in Memphis fifty-four criminals were apprehended using the software

  • New government move to crackdown on undocumented workers

    The Obama administration creates new unit to target major companies hiring undocumented workers; the new unit, composed of fifteen auditors, will work under the supervision of ICE; in 2010, ICE conducted nearly 3,000 audits that led to a record $7 million in fines on companies; critics say large companies mostly avoided prosecution; this new unit will work specifically to audit large companies

  • New magnets to reduce rare-earths dependence on China

    China produces more than 95 percent of the world’s rare Earth elements, and Japan, the United States, and other industrial societies are increasingly anxious about the dependence of important sectors of their economies on Chinese whims; researchers are now working on new types of nanostructured magnets that would use smaller amounts of rare Earth metals than standard magnets; many hurdles remain, but GE Global Research hopes to demonstrate new magnet materials within the next two years

  • Australia unprepared for cyber attacks

    The head of cyber security at BAE Systems Australia is calling for expanded training for cyber security experts in Australia; he believes that there is a lack of proper training and there must be greater cooperation between the government and the private sector; a government report finds that the Australian government is underprepared for cyber security threats; in February 2010 hackers brought down the government’s main site and the parliament’s homepage for two days

  • SBInet, the sequel

    DHS has begun the process of contracting to replace the SBInet system it scrapped last week by issuing a request for information (RFI) on interconnected surveillance towers; the department’s plan calls for acquiring proven, ready-made technology tailored to the terrain of each border region, as opposed to the now-defunct $1 billion SBInet; DHS is looking for tools that will offer automatic, continuous wide-area surveillance that are largely open, or not tied to any one brand’s proprietary technology

  • AVERT evaluates vulnerabilities, assess solutions

    Ares Corp.’s AVERT software tool analyzes the security of a given facility in order to understand vulnerabilities and evaluate the effectiveness of existing and proposed countermeasures; it aims to help users develop security solutions within budget and security constraints; traditional vulnerability analyses rely on subjective judgment and checklists, but the AVERT software applies probabilistic algorithms and Monte Carlo analysis to identify and quantify security vulnerabilities by simulating user-defined attacks against the site to determine worst case paths one or more intruders might take to specific targets

  • Private security screeners an alternative to TSA at airports?

    Representative John Mica (R-Florida) believes that using private security screeners at airport checkpoints is more efficient and cheaper; last November Mica sent letters to roughly 200 airports urging them to switch from the TSA to private screeners; seventeen airports in the United States currently use private screeners, including San Francisco International, Kansas City International, and Jackson Hole; advocates believe that private security firms offer better customer service and perform better because they are more easily held accountable; others are more skeptical, citing the fact that private screeners must follow the same procedures as TSA screeners and that it is uncertain whether using them actually saves money

  • Brivo: using the Internet to control, secure devices

    Cloud computing offers efficiency and economy — but the Achilles Heel of the technology is security; Brivo uses software as a service (SaaS)-based physical access control systems (PACS) to leverage the power and versatility of the Internet to provide real-time device control for organizations that need to protect buildings and facilities