• Hiding communication from government, law-enforcement snooping

    In response to increasing government and law-enforcement snooping, companies such as San Francisco’s Wickr are attempting to build traceless communications systems. The idea is to build the encryption into the actual message — rather than on the servers of the messaging provider — so no one other than the recipients can see what is being communicated. Right now Wickr works only on text messaging, but the company plans to extend its encryption services to e-mail and even social networks.

  • Police uses specially equipped tablets to nab thieves

    Dayton, Ohio Police officers are using a local software company’s technology to catch thieves and are reporting some success after several years of development. Detectives launched an ongoing operation in the Oregon District this weekend that utilizes specially equipped tablets to lure and then track thieves. They made two arrests in the first twenty-four hours of the operation.

  • U.S. skies may soon be open to drones

    Unmanned drones are cheaper than manned aircraft and can be used in a variety of ways, such as assessing environmental threats and damage from natural disaster, tracking criminals trying to escape on a highway, and assessing wildfires; according to an FAA prediction, 30,000 drones could be flying in the United States in less than twenty years; lawmakers and privacy advocates want the use of these drones more tightly regulated

  • Technology to help weather bushfires, floods and more

    Natural disasters have increased in severity and frequency in recent years; in 2010, 385 natural disasters affected 217 million people worldwide at a cost to the global economy of $123.9 billion; there is an on-going research into digital technologies and services for disaster planning, preparation, rescue, and recovery; these technologies can help emergency services better manage natural disasters and minimize their effects on people, infrastructure, and the environment

  • Israel successfully tests David’s Sling mid-range missile defense system

    During the just-ended Operation Pillar of Defense, Israel made military history by successfully employing a missile defense system to protect the country’s population: during the 8-day war, Hamas and Islamic Jihad launched 1,506 rockets and missiles at Israeli towns and cities; of those, 1,057 fell harmlessly in empty fields, but 449 were headed toward populated centers; of the 449, Israel’s Iron Dome system intercepted 421, and 28 hit buildings, killing five; yesterday Israel announced the successful test of David’s Sling, a mid-range missile defensive system; the system is designed to protect against missile with a range of up to 180 miles, like the missiles in the hands of Syria and Hezbollah

  • Improved technology to detect hazardous chemicals

    Scientists have developed a system quickly to detect trace amounts of illegal drugs, explosives, pollutants in rivers, or nerve gases released into the air; the new system can pick out a single target molecule from 10,000 trillion water molecules within milliseconds, by trapping it on a self-assembling single layer of gold nanoparticles

  • Arizona police departments test shirt-worn, high-tech cameras

    Two police departments in Arizona – Surprise and Peoria — are testing several brands of high-tech cameras that attach to an officer’s shirt; police in Mesa, Arizona used about fifty cameras for a 1-year study; the Phoenix Police Department plans on using the cameras full-time starting early next year; privacy and civil-liberties experts say the cameras can be used in a positive way, but that there needs to be a clear baseline of rules when it comes to how and when the cameras are used

  • New surveillance technologies for improved emergency management

    Researchers are working to design and build resilient streaming sensor networks for emergency response such as bushfires; experts say the emergency services sector can significantly improve the availability of critical information better to manage incidents by exploiting new and emerging surveillance strategies

  • Nanotech detection device emulates dog's nose to detect explosives

    Inspired by the biology of canine scent receptors, scientists develop a chip capable of quickly identifying trace amounts of vapor molecules; the chip is part of a device which is both highly sensitive to trace amounts of certain vapor molecules, and able to tell a specific substance apart from similar molecules

  • License plate scanners in Canada under fire from privacy commissioners

    British Columbia’s privacy commissioner is not happy about the way police departments are using their license-plate scanners; in a report released last week, Commissioner Elizabeth Denham said changes must be made to the Victoria police department’s Automated License Plate Recognition Program (ALPR), after it was discovered that the program could be used as a surveillance tool

  • DARPA seeking surveillance technology to predict future behavior

    DARPA has teamed up with scientists from Carnegie Mellon University to create an artificial intelligence system that can watch and predict what a person will “likely” do in the future, using specially programmed software designed to analyze various real-time video surveillance feeds; the system can automatically identify and notify officials if it recognized that an action is not permitted, detecting what is described as anomalous behaviors

  • Scanning social media as a tool for biosurveillance

    DHS is considering observing and scanning social media Web sites to collect and analyze health-related data which could help identify outbreaks of infectious diseases and other public health and national security risks

  • Searching social media sources by geography

    Geofeedia, has created a group of algorithms that can search multiple social media sources by geography in real time; the postings, pictures, and tweets that show up in the results of a search are geolocation-enabled, are free, and results can be streamed on a mobile device, computer, or tablet. Businesses may have to pay a fee for more intensive searches

  • Israel’s operation in Gaza: limited goals – for now, I

    In an impressive military move early Wednesday morning, Israel killed Ahmed Jabari, the top military leader of Hamas and a few of his lieutenants; even more impressively, and more meaningful strategically, the Israel Air Force (IAF) attacked dozens of targets across the Gaza Strip, destroying hundreds of Hamas missiles and rockets; the most important targets were storage facilities where mid-range Fajr-3 and Fajr-5 missiles were being kept, and dug-outs from which these missiles would be launched; in a few minutes, Hamas’s strategic ace in the hole was destroyed; but what are Israel’s broader goals, and can these goals be achieved?

  • Powerful debugging program to help U.S. nuclear deterrence

    Lawrence Livermore National Laboratory (LLNL) researchers have used the Stack Trace Analysis Tool (STAT), a highly scalable, lightweight tool to debug a program running more than one million MPI processes on the IBM Blue Gene/Q (BGQ)-based Sequoia supercomputer; LLNL plans to use Sequoia’s impressive computational capability to advance understanding of fundamental physics and engineering questions that arise in the National Nuclear Security Administration’s (NNSA) program to ensure the safety, security, and effectiveness of the U.S. nuclear deterrent without testing