• Germany to search refugees' phones to establish identity, spot suspicious connections

    German interior minister Thomas de Maizière will next week announce a new German anti-terror steps, which, among other things, will require refugees and asylum-seekers arriving in Germany without a passport to surrender their smartphones – and all the passwords and security pin numbers associated with the phones – so German security agencies could check the owners’ social media accounts. The security services in Denmark, Norway, Sweden, and the Netherlands already routinely examine refugees’ mobile phones to establish a refugee’s identity.

  • Successful flight test of UAV with mass-actuated controls

    For the first time an unmanned aerial vehicle that uses moving weights in its wings, instead of traditional control surfaces or ailerons to turn, was successfully flight-tested. A recently graduated University of Texas at Arlington student  used existing UTA research to design, build, and test a UAV that uses mass actuation — weights that move back and forth within the wings to change the center of gravity from side to side — to turn while airborne.

  • New tool keeps track of violent groups without having to geolocate the tweets

    Researchers have developed new sentiment analysis algorithms which can monitor the social network Twitter in search of violent groups. The system analyzes both the messages these individuals share and how their relationships develop. The police and other law enforcement agencies could use the tool to detect critical points, threats, and areas with concentrations of potentially dangerous people.

  • ISIS using drones with explosives, spy cameras: Pentagon

    The Pentagon says that ISIS fighters are have been posing a growing threat to U.S. and Iraqi forces by using small commercial drones to carry improvised explosives devices (IEDs) or surveillance cameras. These drones are especially threatening because they can evade detection. The growing threat led the Joint Improvised-Threat Defeat Agency, the Pentagon’s office charged with keeping tab on and countering IEDs, to ask Congress for permission to reallocate $20 million to provide money for a counter-drone program.

  • Intelligence agencies spy on our data by manipulating computer chips

    Researchers work to develop mechanisms that will render the Internet of Things more secure. They focus on a specific security gap: the manipulation of computer chips, that is, hardware components. These components can be found not only in PCs and laptops, but also in all other devices with integrated electronics; those include credit cards, cars, and smartphones, as well as large industrial facilities and medical equipment.

  • Trump calls for profiling of Muslims, surveillance of mosques

    Providing more details about his response to the Orlando shooting, Donald Trump on Sunday proposed the profiling of Muslims by law enforcement, and the nation-wide implementing of a Muslim surveillance programs which was used for a while by the NYPD, but which was discontinued after it had failed to yield a single useful lead.

  • Tracking, analyzing how ISIS recruits through social media

    A team of researchers has developed a model to identify behavioral patterns among serious online groups of ISIS supporters that could provide cyber police and other anti-terror watchdogs a roadmap to their activity and indicators when conditions are ripe for the onset of real-world attacks. The researchers apply the laws of physics to study how terrorist support groups grow online, and how law enforcement can track activities.

  • Weak spots in Europe’s “Right to be Forgotten” data privacy law

    Under Europe’s “Right to be Forgotten” law, citizens there can petition Internet search providers such as Google to remove search results linked to personal information that is negative or defamatory. In many cases, these links lead to information about accusations of criminal activity or financial difficulties, which may be “delisted” if the information is erroneous or no longer relevant. But “gone” doesn’t always mean “forgotten,” according to a new study.

  • Hackers could easily cause drones to ignore human controllers, or crash

    Sales of drones — small flying machines equipped with cameras — are soaring. But new research by a computer security team has raised concerns about how easily hackers could cause these robotic devices to ignore their human controllers and land or, more drastically, crash. The researchers say that more secure flying devices are needed for aerial deliveries and photography.

  • Infrared thermal imaging system spots menacing drones at a distance

    With the start of the UEFA Euro 2016 soccer tournament kicking off on10 June, expecting to draw a large international crowd at ten different stadiums in cities across France, security measures have been carefully considered by the organizers in light of a turbulent past couple of years in Europe and abroad. The growing popularity of the use of drones has necessitated consideration of counter-UAV technologies to thwart a terrorist attack using this method.

  • Snowden performed “public service” but should be punished: Eric Holder

    Eric Holder, the former U.S. Attorney General, has said Edward Snowden performed a “public service” by triggering a debate over surveillance techniques. Holder added, however, that he believed Snowden should be punished for leaking classified intelligence information which threatened U.S. national security.

  • France to employ anti-drone technology to protect Euro 2016 soccer games

    France will employ anti-drone technology to interfere with and take control of any flying machines breaching strict no-fly zones over stadiums where the games of the 2016 European Soccer Championship will be played. The technology is part of broad and unprecedented security measures taken to secure Europe’s biggest sports event. French security agencies have been training for some time for the possibility of drones used to disperse chemical agents over crowds.

  • Telephone metadata can reveal surprisingly sensitive personal information

    Most people might not give telephone metadata – the numbers you dial, the length of your calls – a second thought. Some government officials probably view it as similarly trivial, which is why this information can be obtained without a warrant. Researchers show, however, that telephone metadata – information about calls and text messages, such as time and length – can alone reveal a surprising amount of personal detail. The work could help inform future policies for government surveillance and consumer data privacy.

  • Harnessing thousands of network cameras for public safety

    Researchers have developed a prototype system that could allow law enforcement and public safety agencies to tap into thousands of cameras located in numerous venues including parking garages, college campuses, national parks and highways. In addition to applications in law enforcement, the system can be used to quickly find damage, plan rescues, and other operations during natural disasters.

  • FAA expands initiative to detect unauthorized drones near airports

    The Federal Aviation Administration (FAA) is expanding the part of its Pathfinder Program that focuses on detecting and identifying unmanned aircraft systems (UAS) flying too close to airports. The FAA says that the other day the agency signed Cooperative Research and Development Agreements (CRDAs) with Gryphon Sensors, Liteye Systems Inc., and Sensofusion. The FAA will evaluate procedures and technologies designed to identify unauthorized UAS operations in and around airports.