• Secure Communities to have greater impact than Arizona immigration law

    Since 27 October 2008 through the end of May 2010, almost 2.6 million people have been screened with Secure Communities; of those, almost 35,000 were identified as illegal immigrants previously arrested or convicted for the most serious crimes, including murder and rape; more than 205,000 who were identified as illegal immigrants had arrest records for less serious crimes; during an eight-month period between 1 October 2009 to 7 June 2010, ICE figures show that 113,453 foreign nations with criminal records had been deported

  • End to water-boarding: Using brain waves to reading terrorists minds about imminent attacks

    There may soon be no need for water-boarding or other “enhanced interrogation” to extract vital information about pending attacks from captured terrorists or terrorism suspects; Researchers at Northwestern university were able to correlate P300 brain waves to guilty knowledge with 100 percent accuracy in the lab

  • Japanese rescue robot can sniff out, and help, buried disaster survivors

    Japanese emergency services are testing a search-and-rescue robot that can search rubble for survivors and deliver water, food, or cellphones in disaster zones; the device has a robotic arm that can be remote-controlled to turn doorknobs, maneuver through rubble and carry crucial survival items after an earthquake or other disaster

  • Huge jump in IED attacks in Afghanistan

    Monthly IED “incidents” in Afghanistan — incidents are defined as IEDs placed by insurgents and either found or detonated — from January 2004 to April 2010 has risen dramatically; data shows that an astounding jump in IED incidents occurred beginning summer 2009 — coinciding with the Marine offensive in the Helmand River Valley — and IED attacks have steadily mounted; there were more than 1,000 IED incidents during March, April, and May of this year; one expert says: data shows “that IEDs have become the equivalent of the Stinger [during the mujahedin war against the USSR in the 1980s] in allowing irregular forces to pose a major threat even to the most advanced military forces in the world”

  • UAVs fail to penetrate India's dense forests to track Maoist militants

    Indian security forces, battling the militants of the Naxals Maoist group, say that UAVs which perform well in the deserts of Iraq and the barren mountains of Afghanistan and Pakistan, are useless in the densely forested areas of eastern India; Indian security experts say that issues concerning internal security in the country have now reached the board room of Indian business companies and that the new technology these companies produce should be able to meet the specific needs of Indian security forces rather than offer something which is not applicable to Indian conditions

  • Arizona's new immigration law in effect tomorrow; degree of federal cooperation unclear

    Arizona tough immigration law goes into effect tomorrow; it is not clear to what extent the Immigration and Customs Enforcement (ICE), the U.S. immigration enforcement agency, will cooperate with police who are trying to enforce it; ICE officials said they are waiting to see whether the law survives court challenges, contending that the law is unconstitutional and could lead to racial profiling; there is a history of cooperation between ICE and Arizona law enforcement: the agency has signed so-called 287(g) agreements with nine law-enforcement agencies in Arizona that either allow local officers to enforce federal immigration laws or allow jail officials to identify illegal immigrants booked into jails to be processed for deportation

  • Snake-like robots dispose of IEDs

    Snakes are flexible, and they can crawl, slither, swim, climb, or shimmy through narrow spaces; the U.S. military wants to emulate these characteristics in snake-like robots that can replace soldiers in dangerous search and rescue missions, surveillance operations, and IED disposal

  • Wikileaks case exposes security vulnerabilities of the digital age

    Massive leak of documents to Wikileaks highlights the security challenges of the digital age, when gigabytes of stolen data can be shared in one click; the digital communications revolution, while bringing huge benefits to society overall, also raised security concerns; the proliferation of digital media and social software is going to increase the risks of similar leaks happening; one expert says: the Pentagon, like any organization, is going to have “bad actors” — insiders who turn against their employer — “but now it’s a lot easier for them to do things like this”

  • Sophisticated crime software helps police predict violent offences

    Minority Report”-style technology being tested by two British forces following success in the United States; the system, known as CRUSH (Criminal Reduction Utilizing Statistical History) evaluates patterns of past and present incidents, then combines the information with a range of data including crime reports, intelligence briefings, offender behavior profiles, and even weather forecasts

  • U.K. citizens to be spied on by foreign police

    The U.K. Home Office today signed up to the European Investigation Order (EIO) which, when it is approved by the European Parliament, would allow any police force in Europe to spy on and pursue Britons even for the minor offenses; the power allows prosecutors from any EU country to demand details such as DNA or even bank and phone records on anyone they suspect of a crime as minor as leaving a restaurant without paying the bill

  • Law enforcement agencies using new recording technology for interviews

    A $28,000 iRecord recording system allows a police supervisor or other case agents to see an interview remotely from another room; during breaks, they can suggest questions that the interviewing officer might not have asked; uniformed patrol officers also can watch the interviews, making it a training tool

  • Stealth overcoat hides military equipment

    BAE developed “stealth coating” for military vehicles; the coating makes vehicles and equipment in the field much harder to spot not only visually, but also offers vehicles and equipment protection against detection by radar and thermal imaging devices

  • Sending power wirelessly through inches of steel

    Submarines are made of very thick steel; this keeps them safe, but makes communication and data collection from sensors difficult; currently, 300 holes have to be drilled in a submarine hull to accommodate the sensors and communications technology the vessel requires; researchers develop a way to transmit power wirelessly through several inches of steel — which will allow submarines to communicate without an expensive hole-and-valve system; the technology will also be useful for the nuclear and oil industries

  • GAO: U.S. aid to Mexico's anti-drug efforts needs better oversight

    Under the Obama administration, the focus of the Merida Initiative is shifting away from high-priced helicopters and airplanes and toward reforming Mexico’s corrupt law enforcement, courts and other government institutions

  • Federal money to bolster crime-fighting capabilities of Arizona border counties

    Governor Jan Brewer allocates up to $10 million in federal stimulus money to help law enforcement pay for costs associated with illegal immigration, including drug trafficking and human smuggling; funds will buy satellite phones, SUVs, night-vision scopes, thermal imagers and weapons