-
Mexicans turn to radio implants as kidnapping for ransom soar
Kidnapping for ransom has become a growth industry in Mexico; in response, more and more Mexicans are having tiny radio transmitters implanted under their skin so they can be quickly tracked and rescued
-
-
Legal skirmish over Defcon talk shows divide on disclosing security flaws
Gag order slapped on MIT students who prepared a talk about Boston transit authority security flaw reignites debate over what “responsible disclosure” of security flaw means
-
-
Scientists to study synthetic telepathy
Researchers are lookig into synthetic telepathy — for example, a soldier would “think” a message to be transmitted and a computer-based speech recognition system would decode the EEG signals and transmit the thought to its intended target
-
-
Microchips in e-passports easily forged
Dutch researcher uses his own software, a publicly available programming code, a £40 card reader, and two £10 RFID chips to clone and manipulate two passport chips to a point at which they were ready to be planted inside fake or stolen paper passports; the altered chips were then passed as genuine by passport reader software used by the UN agency that sets standards for e-passports; the researcher took less than an hour to alter the chips
-
-
Calls for tougher debit card regulation
On Tuesday the Justice Department announced the indictment of eleven people for stealing and selling more than 40 million credit card and debit card numbers; watchgroups say this is evidence, if one were needed, that federal laws governing debit cards should be tougher — and more uniform
-
-
Backed against the wall
The very term “having one’s back against the wall” implies that one is in a tight spot; this is not necessarily the case, as the wall may often be used as a tool or weapon allowing the individual being attacked to defend himself and gain control of the situation
-
-
New DNA sequencing techniques convince FBI of Ivins's culpability
Since 2001 techniques for sequencing microbial DNA have vastly improved and there has been a massive effort to sequence more anthrax samples
-
-
Bullet-tagging technology to help combat crime
U.K. researchers develop new bullet-tagging technology: tags are applied to gun cartridges by being embedded in cartridge coatings made from polylactic acid, sucrose ester, and tetrahydrofuran; the tags attach themselves to the hands or gloves of anyone handling the cartridge, but a portion of the tag remains on the cartridge even after it has been fired, making it possible to make a definite link between a cartridge fired during a crime and whoever handled it
-
-
DHS releases national emergency communications plan
Seven years after 9/11, and three years after Katrina, DHS releases the U.S. first strategic plan aimed at improving emergency response communications
-
-
2001 anthrax attacks chief suspect kills himself
Bruce Ivins, the FBI’s chief suspect in the 2001 anthrax attacks — after the previous main suspect, Steven Hatfill, has been exonerated — commits suicide; scientist kills himself after being told that the government was about to file criminal charges against him
-
-
Sharp increase in "zero-day" exploits
Cyber-criminals are adopting new automation techniques and strategies that allow them to exploit vulnerabilities much faster than ever before
-
-
New simulation tool for handling hazardous situations
Irish, Israeli companies develop new simulation tool which immerse trainees in a scene which has been designed for them; new tool will help first responders and law enforcement familiarize themselves with situations before they occur
-
-
New Zealand to use biometrics to monitor immigration
Technology will allow border control staff to conduct biometric checks on inbound and outbound passengers
-
-
New rules for private guards
Some 1,000 security companies operate in Greece, employing 50,000 people and making 90 million euros a year; the Greek parliament wants to tighten control of these companies
-
-
New crime: Forged eye biometrics recognition stamps
How accurate is iris scanning biometric technology? read on: Three individuals are arresed at the Dubai airport for smuggling forged eye biometrics recognition stamps; the criminals’ goal: to facilitate the entry to the UAE of individuals who were previously banned
-
More headlines
The long view
Tantalizing Method to Study Cyberdeterrence
Tantalus is unlike most war games because it is experimental instead of experiential — the immersive game differs by overlapping scientific rigor and quantitative assessment methods with the experimental sciences, and experimental war gaming provides insightful data for real-world cyberattacks.
Using Drone Swarms to Fight Forest Fires
Forest fires are becoming increasingly catastrophic across the world, accelerated by climate change. Researchers are using multiple swarms of drones to tackle natural disasters like forest fires.
Testing Cutting-Edge Counter-Drone Technology
Drones have many positive applications, bad actors can use them for nefarious purposes. Two recent field demonstrations brought government, academia, and industry together to evaluate innovative counter-unmanned aircraft systems.
European Arms Imports Nearly Double, U.S. and French Exports Rise, and Russian Exports Fall Sharply
States in Europe almost doubled their imports of major arms (+94 per cent) between 2014–18 and 2019–23. The United States increased its arms exports by 17 per cent between 2014–18 and 2019–23, while Russia’s arms exports halved. Russia was for the first time the third largest arms exporter, falling just behind France.
How Climate Change Will Affect Conflict and U.S. Military Operations
“People talk about climate change as a threat multiplier,” said Karen Sudkamp, an associate director of the Infrastructure, Immigration, and Security Operations Program within the RAND Homeland Security Research Division. “But at what point do we need to start talking about the threat multiplier actually becoming a significant threat all its own?”
The Tech Apocalypse Panic is Driven by AI Boosters, Military Tacticians, and Movies
From popular films like a War Games or The Terminator to a U.S. State Department-commissioned report on the security risk of weaponized AI, there has been a tremendous amount of hand wringing and nervousness about how so-called artificial intelligence might end up destroying the world. There is one easy way to avoid a lot of this and prevent a self-inflicted doomsday: don’t give computers the capability to launch devastating weapons.