-
Hiding communication from government, law-enforcement snooping
In response to increasing government and law-enforcement snooping, companies such as San Francisco’s Wickr are attempting to build traceless communications systems. The idea is to build the encryption into the actual message — rather than on the servers of the messaging provider — so no one other than the recipients can see what is being communicated. Right now Wickr works only on text messaging, but the company plans to extend its encryption services to e-mail and even social networks.
-
-
Police uses specially equipped tablets to nab thieves
Dayton, Ohio Police officers are using a local software company’s technology to catch thieves and are reporting some success after several years of development. Detectives launched an ongoing operation in the Oregon District this weekend that utilizes specially equipped tablets to lure and then track thieves. They made two arrests in the first twenty-four hours of the operation.
-
-
U.S. skies may soon be open to drones
Unmanned drones are cheaper than manned aircraft and can be used in a variety of ways, such as assessing environmental threats and damage from natural disaster, tracking criminals trying to escape on a highway, and assessing wildfires; according to an FAA prediction, 30,000 drones could be flying in the United States in less than twenty years; lawmakers and privacy advocates want the use of these drones more tightly regulated
-
-
Technology to help weather bushfires, floods and more
Natural disasters have increased in severity and frequency in recent years; in 2010, 385 natural disasters affected 217 million people worldwide at a cost to the global economy of $123.9 billion; there is an on-going research into digital technologies and services for disaster planning, preparation, rescue, and recovery; these technologies can help emergency services better manage natural disasters and minimize their effects on people, infrastructure, and the environment
-
-
Israel successfully tests David’s Sling mid-range missile defense system
During the just-ended Operation Pillar of Defense, Israel made military history by successfully employing a missile defense system to protect the country’s population: during the 8-day war, Hamas and Islamic Jihad launched 1,506 rockets and missiles at Israeli towns and cities; of those, 1,057 fell harmlessly in empty fields, but 449 were headed toward populated centers; of the 449, Israel’s Iron Dome system intercepted 421, and 28 hit buildings, killing five; yesterday Israel announced the successful test of David’s Sling, a mid-range missile defensive system; the system is designed to protect against missile with a range of up to 180 miles, like the missiles in the hands of Syria and Hezbollah
-
-
Improved technology to detect hazardous chemicals
Scientists have developed a system quickly to detect trace amounts of illegal drugs, explosives, pollutants in rivers, or nerve gases released into the air; the new system can pick out a single target molecule from 10,000 trillion water molecules within milliseconds, by trapping it on a self-assembling single layer of gold nanoparticles
-
-
Arizona police departments test shirt-worn, high-tech cameras
Two police departments in Arizona – Surprise and Peoria — are testing several brands of high-tech cameras that attach to an officer’s shirt; police in Mesa, Arizona used about fifty cameras for a 1-year study; the Phoenix Police Department plans on using the cameras full-time starting early next year; privacy and civil-liberties experts say the cameras can be used in a positive way, but that there needs to be a clear baseline of rules when it comes to how and when the cameras are used
-
-
New surveillance technologies for improved emergency management
Researchers are working to design and build resilient streaming sensor networks for emergency response such as bushfires; experts say the emergency services sector can significantly improve the availability of critical information better to manage incidents by exploiting new and emerging surveillance strategies
-
-
Nanotech detection device emulates dog's nose to detect explosives
Inspired by the biology of canine scent receptors, scientists develop a chip capable of quickly identifying trace amounts of vapor molecules; the chip is part of a device which is both highly sensitive to trace amounts of certain vapor molecules, and able to tell a specific substance apart from similar molecules
-
-
License plate scanners in Canada under fire from privacy commissioners
British Columbia’s privacy commissioner is not happy about the way police departments are using their license-plate scanners; in a report released last week, Commissioner Elizabeth Denham said changes must be made to the Victoria police department’s Automated License Plate Recognition Program (ALPR), after it was discovered that the program could be used as a surveillance tool
-
-
DARPA seeking surveillance technology to predict future behavior
DARPA has teamed up with scientists from Carnegie Mellon University to create an artificial intelligence system that can watch and predict what a person will “likely” do in the future, using specially programmed software designed to analyze various real-time video surveillance feeds; the system can automatically identify and notify officials if it recognized that an action is not permitted, detecting what is described as anomalous behaviors
-
-
Scanning social media as a tool for biosurveillance
DHS is considering observing and scanning social media Web sites to collect and analyze health-related data which could help identify outbreaks of infectious diseases and other public health and national security risks
-
-
Searching social media sources by geography
Geofeedia, has created a group of algorithms that can search multiple social media sources by geography in real time; the postings, pictures, and tweets that show up in the results of a search are geolocation-enabled, are free, and results can be streamed on a mobile device, computer, or tablet. Businesses may have to pay a fee for more intensive searches
-
-
Israel’s operation in Gaza: limited goals – for now, I
In an impressive military move early Wednesday morning, Israel killed Ahmed Jabari, the top military leader of Hamas and a few of his lieutenants; even more impressively, and more meaningful strategically, the Israel Air Force (IAF) attacked dozens of targets across the Gaza Strip, destroying hundreds of Hamas missiles and rockets; the most important targets were storage facilities where mid-range Fajr-3 and Fajr-5 missiles were being kept, and dug-outs from which these missiles would be launched; in a few minutes, Hamas’s strategic ace in the hole was destroyed; but what are Israel’s broader goals, and can these goals be achieved?
-
-
Powerful debugging program to help U.S. nuclear deterrence
Lawrence Livermore National Laboratory (LLNL) researchers have used the Stack Trace Analysis Tool (STAT), a highly scalable, lightweight tool to debug a program running more than one million MPI processes on the IBM Blue Gene/Q (BGQ)-based Sequoia supercomputer; LLNL plans to use Sequoia’s impressive computational capability to advance understanding of fundamental physics and engineering questions that arise in the National Nuclear Security Administration’s (NNSA) program to ensure the safety, security, and effectiveness of the U.S. nuclear deterrent without testing
-
More headlines
The long view
AI-Controlled Fighter Jets May Be Closer Than We Think — and Would Change the Face of Warfare
Could we be on the verge of an era where fighter jets take flight without pilots – and are controlled by artificial intelligence (AI)? US R Adm Michael Donnelly recently said that an upcoming combat jet could be the navy’s last one with a pilot in the cockpit.
What We’ve Learned from Survivors of the Atomic Bombs
Q&A with Dr. Preetha Rajaraman, New Vice Chair for the Radiation Effects Research Foundation in Hiroshima and Nagasaki, Japan.
Need for National Information Clearinghouse for Cybercrime Data, Categorization of Cybercrimes: Report
There is an acute need for the U.S. to address its lack of overall governance and coordination of cybercrime statistics. A new report recommends that relevant federal agencies create or designate a national information clearinghouse to draw information from multiple sources of cybercrime data and establish connections to assist in criminal investigations.