• CBP readies maritime UAV

    To increase the long-range reconnaissance capabilities over water, the U.S. Coast Guard and the U.S. Customs and Border Protection take deliver of a maritime variant of the Predator B UAV; the Predator B UAV has already proven its value to homeland security over the U.S. land borders and the Great Lakes region

  • U.S. Air Force offers more details on stealth UAV

    After much speculation and many rumors, the USFA reveals that it has been using a new-design UAV — deep, fat centerbody blended into the outer wings – for surveillance missions in Afghanistan; observers note that with its low-observable design, the aircraft could be useful for flying the borders of Iran and peering into China, India, and Pakistan for useful data about missile tests and telemetry, as well as gathering signals and multi-spectral intelligence

  • Columbus debates security cameras' costs

    The mayor of Columbus, Ohio, wants CCTVs installed in the city; a $250,000 deal with a consulting firm has been approved to study the issue, and a $1.25 million pilot project is likely to move forward; still, civil libertarians ask whether this is a wise – and effective — investment

  • MIT researchers develop a smart anchor which mimics the razor clam

    The razor clam is about seven inches long by an inch wide, but it can dig into the ocean floor at a rate of about a centimeter a second; researchers also say that in a measure of anchoring force, or how hard you pull before an anchor rips out of the soil compared to the energy required to embed the anchor, razor clams beat everything, including the best anchors, by at least a factor of 10

  • "Fingerprinting" RFID tags will prevent counterfeiting

    RFID tags embedded in objects will become the standard way to identify objects and link them to the cyberworld; trouble is, it is easy to clone an RFID tag by copying the contents of its memory and applying them to a new, counterfeit tag, which can then be attached to a counterfeit product — or person, in the case of these new e-passports; researchers develop an electronic fingerprinting system to prevent this from happening

  • U.S. will not arm drones flying reconnaissance missions over Gulf of Aden -- yet

    The governments of the United States and the Seychelles agreed to use Mahé regional airport as a base for U.S. UAVs flying over the Gulf of Aden in an effort to gather intelligence on Somali pirates; the U.S. says it is not currently considering arming the UAVs

  • U.S. Navy's PANDA technology to detect "deviant" ships

    There are tens of thousands of ships on the high seas every day, carrying millions of containers, entering and leaving hundreds of ports in dozens of countries; monitoring this vast amount of traffic to make sure that none of the containers is carrying WMDs is humanly impossible; Lockheed Martin has developed the PANDA Maritime Domain Awareness program to help the U.S. Navy and intelligence community keep a closer eye on the global maritime traffic

  • Fort Lauderdale attorney took extra security measures

    Under-investigation Fort Lauderdale attorney Scott Rothstein surrounded himself with elaborate security measures which included dozens of hidden microphones stashed in the ceiling along with security cameras, surveillance cameras at his home, double-doors, private elevators, and private security detail for his family; he also paid for a security guard at his favorite restaurant (Bova Prime on Las Olas Boulevard), and carried a gun in an ankle holster underneath his tailored pants

  • U.K. regulator warns on school CCTV schemes

    A Manchester school installed CCTVs in school during the holidays, without notifying parents; the cameras were filming students changing for PE classes — and the pictures were kept on the schools’ computers; Information Commissioner says that there is no need for cameras to be on during the day, when the school is staffed

  • Problems continue for virtual U.S.-Mexico border fence

    With most of the 661-mile border fence complete, DHS is gearing up for testing a section of the fence near Tuscon; if the system survives this first round, it will be handed off to the Border Patrol in early 2010, who will put the technology through some real world scenarios

  • Canadian government finds support for Internet surveillance scheme

    The Canadian federal government wants to broaden its Internet surveillance capabilities; the Security Intelligence Review Committee, the watch-dog over Canada’s spy agencies, supports the idea

  • Israel says it will continue to listen-in on Hezbollah communication

    Hezbollah has its own communication network in Lebanon, separate and independent from the government’s sanctioned carrier networks; Israel says that bugging the organization’s network does not amount to a violation of Lebanon’s sovereignty

  • Robust hierarchical metropolitan quantum cryptography network

    The security of a majority of classical cryptography is based on the complexity of the cipher algorithms and the development of distributed computing and specific hacking chips; this may no longer be sufficient, as quantum computing has become a serious threat to classical cryptography; the solution: quantum encryption

  • UK.gov's G Cloud may have security silver lining after all

    Cloud computing offers many benefits, but enhanced security is not one of them — or is it? An expert says that the emergence of cloud computing is making it possible to take a new approach to security; until now, the U.K. government has kept its work on information security in specialist bodies such as GCHQ and CESG, separate from the development of business functions; “The cloud gives us the opportunity to get the specification right before we get too far down the track,” he says

  • The personal spy: the smartphone in your pocket may be spying on you, II

    The advances in smartphone technology could well be exploited in much the same way that e-mail and the Internet can be used to “phish” for personal information such as bank details