-
Bolstering police anti-child porn technology
Microsoft Corp. and NetClean the other day announced a joint effort to combat the sexual exploitation of children by making Microsoft PhotoDNA technology available and accessible to law enforcement agencies worldwide to help enhance child sex abuse investigations
-
-
Pentagon explores mind-controlled battle robots
Taking a page from the popular movie Avatar, the military’s advanced research arm DARPA is seeking to develop technology that would allow troops to remotely inhabit the bodies of mechanical androids on the battlefield
-
-
Using people with cell phones as surveillance nodes
Eighty-eight percent of Americans now own a cell phone, forming a massive network that offers scientists a wealth of information and an infinite number of new applications; with the help of these phone users — and their devices’ cameras, audio recorders, and other features — researchers envision endless possibilities for gathering huge amounts of data
-
-
Researchers developing wireless emergency network for disasters
University of Arkansas researchers are developing a solar powered wireless emergency communications network that can be deployed during major disasters to transmit critical warnings and geographic information
-
-
DHS seeks camera that sees hundreds of kilometers at once
DHS is interested in adding powerful military technology to its growing arsenal of surveillance equipment; the agency is considering new cameras that will be able to track and monitor several moving objects simultaneously over as much as four square miles
-
-
Innovative CCTV protects copper cables
The theft of copper cables has cost the British economy an estimated £770 million a year over the last few years; British company which rely on copper cables to deliver their services are deploying an innovative CCTV to combat the thieves
-
-
Growing unease over illegal cell phone jammers
For less than $40 nearly anyone can purchase a cell phone jamming device to prevent those nearby from making calls, which has law enforcement agencies uneasy
-
-
Face and gunshot detecting technology
Individuals who fire weapons with criminal intent will now have to think twice now that Safety Dynamics Inc. and FaceFirst have decided to join forces
-
-
Tighter regulation of industry’s disaster preparedness required
Before 11 March 2011, Japan was held up as a paragon for preparedness; they had a national readiness plan, regular disaster drills, and strong civic engagement; the Fukushima disaster exposed a disturbing reality: search and rescue efforts were delayed, shelters ill-equipped, and supply chains broken; worst of all, there was confusion about who was managing the nuclear accident — the power company TEPCO or the Japanese government; information, when forthcoming, was sometimes contradictory
-
-
GAO: new emergency responder network lacks critical features
A recent Government Accountability Office (GAO) report concludes that limitations in the government’s plans to create a nationwide broadband network for first responders will require the continued use of the existing system for at least another decade
-
-
Reliable communications during natural disasters, emergencies
The Contingency Response Communications System (CRCS) is easily set up within thirty minutes. Once set up is complete the CRCS allows emergency first responders quickly to communicate with military commanders through phone or Internet
-
-
Detroit prioritizes how its responds to 911 calls
With the help of a newly created unit, Detroit Police are changing how they respond to emergency calls; under the new system, officers will be able to respond to the most immediate threats first before dealing with non-emergency requests
-
-
NASA official says hackers gained “full functional control”
Last week NASA officials disclosed details about the alarming extent that hackers were able to penetrate the agency’s networks
-
-
U.K. police learning to battle cartels in El Paso
This week law enforcement officers from the United Kingdom are in El Paso, Texas to train with DHS; the special agents from the U.K.’s Serious Organized Crime Agency are in town specifically to learn how to combat the growing threat of trafficking
-
-
Computer spots liars by looking at the way they talk
Computer scientists are exploring whether machines can read the visual cues of an individual’s conduct to discover whether or not that individual is lying; in a study of forty videotaped conversations, an automated system the researchers developed correctly identified whether interview subjects were lying or telling the truth 82.5 percent of the time
-
More headlines
The long view
Tantalizing Method to Study Cyberdeterrence
Tantalus is unlike most war games because it is experimental instead of experiential — the immersive game differs by overlapping scientific rigor and quantitative assessment methods with the experimental sciences, and experimental war gaming provides insightful data for real-world cyberattacks.
Using Drone Swarms to Fight Forest Fires
Forest fires are becoming increasingly catastrophic across the world, accelerated by climate change. Researchers are using multiple swarms of drones to tackle natural disasters like forest fires.
Testing Cutting-Edge Counter-Drone Technology
Drones have many positive applications, bad actors can use them for nefarious purposes. Two recent field demonstrations brought government, academia, and industry together to evaluate innovative counter-unmanned aircraft systems.
European Arms Imports Nearly Double, U.S. and French Exports Rise, and Russian Exports Fall Sharply
States in Europe almost doubled their imports of major arms (+94 per cent) between 2014–18 and 2019–23. The United States increased its arms exports by 17 per cent between 2014–18 and 2019–23, while Russia’s arms exports halved. Russia was for the first time the third largest arms exporter, falling just behind France.
How Climate Change Will Affect Conflict and U.S. Military Operations
“People talk about climate change as a threat multiplier,” said Karen Sudkamp, an associate director of the Infrastructure, Immigration, and Security Operations Program within the RAND Homeland Security Research Division. “But at what point do we need to start talking about the threat multiplier actually becoming a significant threat all its own?”
The Tech Apocalypse Panic is Driven by AI Boosters, Military Tacticians, and Movies
From popular films like a War Games or The Terminator to a U.S. State Department-commissioned report on the security risk of weaponized AI, there has been a tremendous amount of hand wringing and nervousness about how so-called artificial intelligence might end up destroying the world. There is one easy way to avoid a lot of this and prevent a self-inflicted doomsday: don’t give computers the capability to launch devastating weapons.