• U.K. adapts to DCGS

    The U.S. military has been using Distributed Common Ground System (DCGS) for a while now to provide a more accurate, timely understanding of adversaries and their actions; U.K. adapts the U.S. system to its own needs

  • Unmanned Ground Systems Summit: Early Bird Special

    Unmanned systems perform more and more missions that used to be performed by humans; the Pentagon plans to spend about $4 billion on robots by 2010; IDGA holds ground robots summit in D.C. this August

  • New satallite images identification technology

    Researchers offer the first computerized method that can analyze a single photograph and determine where in the world the image likely was taken

  • Team developing NGI defines roles and responsibilities

    Lockheed Martin is the prime contractor for the FBI’s ambitious Next Generation Identification System; team members define their contributions to the project

  • U.K. to store all phone calls and e-mails

    The U.K. Home Office plans to create a massive database to store every person’s e-mails, phone calls, text messages, and Internet use; police and security services would only be granted access to the information after seeking permission from the courts

  • Secret wiretap warrants double since 9/11

    A Justice Department report shows FISA warrants for counterterrorism, espionage cases up

  • Developing miniature robots to increase situational awareness

    The military wants to increase the situational awareness of of its officers and soldiers, and an alliance of industry and academia is set up to develop advanced robotic equipment for use in urban environments and complex terrain, such as mountains and caves

  • Landscape of business intelligence market changes in six months

    A campaign of acquisitions by IBM, Microsoft, Oracle, and SAP has changed the look of the business intelligence market in the last six months; The Big Four’s market moves were driven by the growing BI hype, the need for self-preservation, and even some fear

  • MI5 seeks powers to trawl records in new terror hunt

    As part of the Brown government’s new counterterrorism strategy, which places emphasis on thwarting a cyber-attack on the United Kingdom, MI5 seeks total access to commuters’ travel records to help them meet the threat

  • Data sharing among local, state, and federal law enforcement grows

    The 9/11 attacks demonstrated the need for more information and intelligence sharing among law enforcement services a the local, state, and federal levels; more and more intelligence sharing systems are being put in place by private companies to help law enforcement cope with — and meaningfully and effectively use — the vast new sources of data now open to them; privacy advocates worry

  • Researchers show principles of mind-reading machine

    Researchers have developed a more sophisticated way to extract visual stimuli from brain signals; they developed a computational model that uses functional MRI (fMRI) data to decode information from an individual’s visual cortex; system may help in decoding dreams, and may offer a more humane interrogation technique

  • On needles and haysacks: New way to deal with large datasets

    The ability to gather vast amounts of data and create huge datasets has created a problem: Data has outgrown data analysis; for more than eighty years one of the most common methods of statistical prediction has been maximum likelihood estimation (MLE); Brown University researchers offer a better way to deal with the enormous statistical uncertainty created by large datasets

  • Analyzing e-mail messages to find insider threat

    Researchers develop a technology based on Probabilistic Latent Semantic Indexing (PLSI) to detect changes in the words and terms individuals in an organization use in their e-mail messages — to fellow employees and to outsiders; research shows that certain verbal and terminological changes indicate criminal or even terrorist intent

  • Computer science helps in combating terrorism

    The University of Maryland develops the SOMA Terror Organization Portal (STOP); SOMA (Stochastic Opponent Modeling Agents) is a formal, logical-statistical reasoning framework which uses data about past behavior of terror groups in order to learn rules about the probability of an organization, community, or person taking actions in different situations

  • Detecting insider threats early

    Insiders pose serious threats to organizations ranging from multinational companies to military installations; one way to spot insider threats is to use data mining techniques to scour e-mail and build up a picture of social network interactions; the technology could prevent serious security breaches, sabotage, and even terrorist activity