-
The company: Nucleix fighting biological identity theft
Its assay technology is in advanced stages of development. Several patents have already been granted; CEO Elon Ganor made his name mainly at VocalTec, a company that pioneered telephony over Internet
-
-
Über-hacker Albert "Segvec" Gonzalez's plea scuttled by indictment
Gonzalez’s attorney was close to taking responsibility for his crimes and agreeing to a sentence of about twenty years when hew was indicted on new counts on Monday
-
-
Writing style identity tool easily fooled
It was thought that writing style is almost as unique to a person as a fingerprint or DNA, and literary historians and courts used the approach; a new study suggests that some of these so-called stylometry techniques are easily fooled, even by people without linguistic or literary training
-
-
Police to use DNA "mugshots" as a predictive tool to narrow search
Scientist say that rather than simply try to match DNA to individuals already in their database, DNA should be used to suggest what a suspect might look like
-
-
L-1 receives $9.6 million in new orders for HIIDE and PIER
The last twelve months have been good to L-1; in October 2008 L-1 won a contract potentially worth $250 million from the State of New York for more than 75 facilities for fingerprinting, background checks, and other data required for applications to certain jobs and state licenses; it has won several other contracts since
-
-
Harold Schliesske: Using tactical biometrics in the theater
Schliesske, assistant product manager at the Office of the Project Manager Defense Department Biometrics’ Tactical Biometric Systems organization, helps develop technology that protects combat personnel on the ground in Iraq and Afghanistan
-
-
U.S. government agencies increase use of biometric technology
The National Institute of Justice is evaluating the use of face recognition technologies to identify suspects and improve security and officer safety; this is but one of many biometric technologies being evaluated by U.S. government agencies
-
-
Anti-ID groups critical of Hillingdon ID card scheme
While the debate in the United Kingdom over the national ID scheme rages, Hillingdon Borough came up with the idea to introduce a local ID card scheme; critics are unhappy
-
-
Global Entry expanded to 13 additional U.S. airports
The Global Entry initiatives allows passengers to register their biometric information at an airport kiosk — and then go through streamlined screening process before boarding
-
-
Behavioral observation comes to Canada's airports
Planning for the training and deployment of behavioral plainclothes security officers is to begin this fall, with a pilot project expected to roll out at a major airport in 2010
-
-
Ditching U.K. ID cards would save £3 billion
The general election in Britain must be held by June 2010; if the Tories win, and if they stick to their promises to cancel the ID card scheme, they will save the U.K. economy over £3 billion
-
-
Second part of Secure Flight is phased in beginning Saturday
Starting Saturday, some travelers will begin providing their birth date and sex when booking their airline reservations; Secure Flight aims to match passengers’ names against the government’s terrorism watch list
-
-
Chinese women face ID problem after cosmetic surgery trip
A group of Chinese women traveled to South Korea for plastic surgery; when they came back, their new looks did not match their passport photos, causing confusion for airport officers
-
-
Kemesa: Solving the identity theft problem
The ideal solution to the online identity theft problem is to not transmit personal information to Web sites in the first place; with Kemesa’s Shop Shield, personal information can not be stolen because it is never revealed during the online transaction process
-
-
Digital certificate standard compromised by hackers
Researchers demonstrated exploits against the X.509 standard for digital certificates used by Secure Sockets Layer; Deputy Defense Secretary Robert Lentz, DOD’s chief information assurance officer, cited identity authentication as a key security challenge for the department
-