-
New virtual training prepares first responders for active shooter incidents
Amidst the chaos of an active shooter event, preparedness is key to a seamless, swift and effective response—and a new video game funded by the DHS S&T and the U.S. Army Research Laboratory just might do the trick. Enhanced Dynamic Geo-Social Environment, or EDGE, is a virtual training platform, available now to all response agencies nationwide. Built on the Unreal Engine, it allows responders of all disciplines to assume discipline-based avatars and simultaneously role-play complex response scenarios.
-
-
More rigorous approach to training of explosive-detecting dogs
With a sense of smell much greater than humans, dogs are considered the gold standard for explosive detection in many situations. But that does not mean there is no room for improvement. In a new study, scientists report on a new, more rigorous approach to training dogs and their handlers based on real-time analysis of what canines actually smell when they are exposed to explosive materials.
-
-
Growing opposition in Germany to new surveillance measures
In the aftermath of the Christmas 2016 market attacks in Berlin last December, the German government written several sweeping surveillance and data retention laws, which were narrowly passed by the Bundestag. Many of these laws will go into effect 1 July. Civil libertarians, opposition parties, and some security experts have criticized the new powers as diminishing privacy without adding much to security. These politicians and NGOs say that a spate of security measures just go too far.
-
-
Rapid DNA technology verifies relationships after mass casualty events
Rapid DNA technology developed by DHS S&T has recently been used to identify simulated “victims” in several mass casualty exercises across the United States. The technology greatly expedites the testing of deoxyribonucleic acid (DNA), the only biometric that can accurately verify family relationships.
-
-
Australia: Five-Eyes nations should require backdoors in electronic devices
Australia attorney-general George Brandis said he was planning to introduce a proposal to Australia’s four intelligence-sharing partners in the Five Eyes group — the United States, United Kingdom, New Zealand, and Canada – to require technology companies to create some kind of a backdoor to their devices. Australian leaders have emerged as strong proponents of allowing law-enforcement and intelligence agencies to gain access to the information and communication records on devices used by terrorists and criminals.
-
-
Rapid DNA technology verifies relationships after mass casualty events
Rapid DNA technology developed by DHS S&T has recently been used to identify simulated “victims” in several mass casualty exercises across the United States. The technology greatly expedites the testing of deoxyribonucleic acid (DNA), the only biometric that can accurately verify family relationships.
-
-
Bringing transparency to cell phone surveillance
Modern cell phones are vulnerable to attacks from rogue cellular transmitters called IMSI-catchers — surveillance devices that can precisely locate mobile phones, eavesdrop on conversations or send spam. Security researchers have developed a new system called SeaGlass to detect anomalies in the cellular landscape that can indicate where and when these surveillance devices are being used.
-
-
Israeli data startups driving N.Y. ecosystem
The ability to interpret big data and find the needle in the haystack of information to help in decision-making is crucial. Israel startups thrive at finding needle-in-the-haystack information in order to make sense of the data and help in decision-making. “Data is a natural resource. Data by itself is like bricks. It’s all about what you do with it,” says Amir Orad, CEO of Sisense.
-
-
Helping explosive detection canine teams across the U.S.
Dogs are uniquely suited to sniffing out explosives – their sense of smell is more than a million times stronger than a human’s. Harnessing this natural ability to help law enforcement identify explosives requires specialized training and testing. Many detection canine teams, however, have limited access to critical training materials and limited time to establish rigorous training scenarios. DHS S&T’s Detection Canine Program has developed an initiative to support these needs for the nation’s more than 4,000 explosives detection canine teams.
-
-
Extracting useful insights from a flood of data is hard to do
A mantra of these data-rife times is that within the vast and growing volumes of diverse data types, such as sensor feeds, economic indicators, and scientific and environmental measurements, are dots of significance that can tell important stories, if only those dots could be identified and connected in authentically meaningful ways. Getting good at that exercise of data synthesis and interpretation ought to open new, quicker routes to identifying threats, tracking disease outbreaks, and otherwise answering questions and solving problems that previously were intractable.
-
-
Coroners unable to agree on cause of death, or whether a case merits inquest
Around 507,000 people die in England and Wales every year. Nearly half (45 percent) of these deaths are reported to coroners, who investigate those believed to be violent, unnatural, or of unknown cause, to find out the identity of the deceased and the circumstances of his or her death. A former top detective turned university researcher has published his findings that coroners in England and Wales are seemingly unable to agree on what caused a person’s death or whether it merits an inquest, even when faced with identical case information.
-
-
Face Recognition Challenge seeks better face-identification software
Have you developed software to identity faces in general web photographs? Can your software verify that a face in one photograph is the same as in another? The Intelligence Advanced Research Projects Activity (IARPA) announced the launch of the Face Recognition Prize Challenge (FRPC). The challenge aims to improve biometric face recognition by improving core face recognition accuracy.
-
-
What it takes to be a forensic fingerprint examiner?
Being a forensic examiner seems glamorous on TV. But working in a crime lab requires long hours of intense focus that are anything but action-packed. This is especially true for fingerprint examiners, who must focus on minute visual details that would leave most people cross-eyed. It’s not a job for everyone.Experts are developing tests to help identify people with the pattern-matching skills needed for analyzing fingerprints.
-
-
Using antimalarial compound to detect bloodstains
As seen on crime shows, investigators use a combination of luminol and other substances to light up bloodstains at crime scenes. But now, researchers report that combining luminol with artemisinin, a natural peroxide and antimalarial treatment, reduces the risk of false positives compared to the traditional method.
-
-
Tech firms urge Congress to enact surveillance reforms
More than thirty leading internet companies have sent a letter to the chair of the House Judiciary Committee asking for reforms to the law used for carrying out mass surveillance. The letter concerns Section 702 of the Foreign Intelligence Surveillance Act (FISA). The act must be renewed by Congress before the end of the year. Over the years, the U.S. security agencies have creatively interpreted the law to allow them to store information on potentially millions of U.S. citizens – even though the law specifically requires the opposite.
-
More headlines
The long view
Forensic Science Method for Firearm Identification Is Flawed
Like fingerprints, a firearm’s discarded shell casings have unique markings. This allows forensic experts to compare casings from a crime scene with those from a suspect’s gun. Finding and reporting a mismatch can help free the innocent, just as a match can incriminate the guilty. But a new study reveals mismatches are more likely than matches to be reported as “inconclusive” in cartridge-case comparisons.