-
DHS establishes the Countering Weapons of Mass Destruction office
Secretary of Homeland Security Kirstjen Nielsen last week announced the establishment of the Department of Homeland Security’s (DHS) Countering Weapons of Mass Destruction (CWMD) Office. DHS says that the CWMD Office will elevate and streamline DHS efforts to prevent terrorists and other national security threat actors from using harmful agents, such as chemical, biological, radiological, and nuclear material and devices to harm Americans and U.S. interests.
-
-
Better gas mask filters
In research that could lead to better gas mask filters, scientists have been putting the X-ray spotlight on composite materials in respirators used by the military, police, and first responders, and the results have been encouraging. What they are learning not only provides reassuring news about the effectiveness of current filters in protecting people from lethal compounds such as VX and sarin, but they also provide fundamental information that could lead to more advanced gas masks as well as protective gear for civilian applications.
-
-
Germany considering requiring home, car alarm systems to be equipped with back doors
The German government will next week discuss sweeping new surveillance powers aimed to improve public safety. The proposal to be discussed would require operators of car and house alarm systems to help police and security services in their efforts to spy on potential terrorists or criminals.
-
-
Software verifies someone’s identity by their DNA in minutes
In the science-fiction movie “Gattaca,” visitors only clear security if a blood test and readout of their genetic profile matches the sample on file. Now, cheap DNA sequencers and custom software could make real-time DNA-authentication a reality. Researchers have developed a method to quickly and accurately identify people and cell lines from their DNA. The technology could have multiple applications, from identifying victims in a mass disaster to analyzing crime scenes.
-
-
EFF wants information about government tattoo recognition technology
The Electronic Frontier Foundation (EFF) filed suit against the Department of Justice, the Department of Commerce, and the Department of Homeland Security the other day, demanding records about the agencies’ work on the federal Tattoo Recognition Technology program. EFF says that this secretive program involves a coalition of government, academia, and private industry working to develop a series of algorithms that would rapidly detect tattoos, identify people via their tattoos, and match people with others who have similar body art—as well as flagging tattoos believed to be connected to religious and ethnic symbols.
-
-
An armed robber’s Supreme Court case could affect all Americans’ digital privacy for decades to come
A man named Timothy Carpenter planned and participated in several armed robberies at Radio Shack and T-Mobile stores in Michigan and Ohio between 2010 and 2012. He was caught, convicted and sentenced to 116 years in federal prison. His appeal, which was heard by the U.S. Supreme Court on 29 November, will shape the life of every American for years to come – no matter which way it’s decided. The FBI found Timothy Carpenter because one of his accomplices told them about him. I believe the FBI could have obtained a search warrant to track Carpenter, if agents had applied for one. Instead, federal agents got cellphone location data not just for Carpenter, but for fifteen other people, most of whom were not charged with any crime. One of them could be you, and you’d likely never know it. The more people rely on external devices whose basic functions record and transmit important data about their lives, the more critical it becomes for everyone to have real protection for their private data stored on and communicated by these devices.
-
-
Fostering collaborations for bomb squad response
Every day, state and local bomb squads place themselves in harm’s way in order to shield citizens and property from potential catastrophe. Many of the improvised explosive devices (IEDs) they face are cobbled together from everyday objects with the intent to cause maximum casualties and damage—the reality is they are easy to build, difficult to combat and their makeup constantly evolves. How do first responders stay up-to-date on the latest tactics and techniques for IED response, and how does the DHS S&T ensure state and local bomb squads have the necessary resources at their fingertips?
-
-
Real security requires strong encryption – even if investigators get blocked
The FBI and the U.S. Department of Justice have been fighting against easy, widespread public access to encryption technologies for 25 years. Since the bureau’s dispute with Apple in 2016 over access to the encrypted iPhone of one of the two people who shot 14 victims in San Bernardino, California, this battle has become more pitched. This dispute is not about whether regular people can or should use encryption: The U.S. government is in favor of using encryption to secure data. Rather, it’s about the FBI’s demand that encryption systems include “exceptional access,” enabling police who get a warrant to circumvent the encryption on a device or on an encrypted call. The demand for exceptional access by law enforcement is a broad threat to fundamental parts of American society, and it poses a serious danger to national security as well as individual privacy. As technology changes, the jobs of police and intelligence workers must also change; in some ways, it will be harder, in others, easier. But the basic need for security supports the call for wide use of strong encryption – and without modifications that make it easy for Russians, or others, to break in.
-
-
DNA techniques could transform facial recognition technology
Camera-based visual surveillance systems were supposed to deliver a safer and more secure society. But despite decades of development, they are generally not able to handle real-life situations. During the 2011 London riots, for example, facial recognition software contributed to just one arrest out of the 4,962 that took place. The failure of this technology means visual surveillance still relies mainly on people sitting in dark rooms watching hours of camera footage, which is totally inadequate to protect people in a city. But recent research suggests video analysis software could be dramatically improved thanks to software advances made in a completely different field: DNA sequence analysis. By treating video as a scene that evolves in the same way DNA does, these software tools and techniques could transform automated visual surveillance.
-
-
FISA Section 702 reform bill a good Start, but improvements still needed: Critics
Last Wednesday, the draft of the House Judiciary Committee’s bill to reauthorize and reform Section 702 of the Foreign Intelligence Surveillance Act (FISA) was made public. Section 702 permits the government to collect the content of communications of targets who are non-Americans located abroad, including communications they may have with Americans. Critics urge Congress to pass significant and meaningful reforms to Section 702 which address the serious constitutional concerns it raises, or allow that surveillance authority to expire.
-
-
Scientific basis of fingerprints too weak for legal certainty
It may surprise many, especially those susceptible to the CSI effect, but fingerprint evidence is not conclusive beyond a reasonable doubt. A new American Association for the Advancement of Science (AAAS) working group report on the quality of latent fingerprint analysis says that courtroom testimony and reports stating or even implying that fingerprints collected from a crime scene belong to a single person are indefensible and lack scientific foundation.
-
-
DHS funds national consortium to develop better methods for fighting criminal activity
The University of Arkansas at Little Rock has been named a priority partner in a new DHS-funded national consortium. SHS S&T S&T) will award the consortium a $3.85 million grant for its first operating year in a 10-year grant period to create the Center of Excellence for Criminal Investigations and Network Analysis (CINA). The center’s research will focus on criminal network analysis, dynamic patterns of criminal activity, forensics, and criminal investigative processes.
-
-
S&T, the Pentagon changing K-9 bomb detection
DHS S&T Detection Canine Program partnered with the Pentagon Force Protection Agency (PFPA) to assist in developing a training initiative to add person-borne improvised explosive device (PBIED) detection capabilities to their canine teams. Traditionally, dogs sniff out “left-behind” bombs, but Sunny and the other members of his K-9 unit are also trained to pick up explosive scents on a person or any moving target.
-
-
Big data amplify existing police surveillance practices: Study
The big data landscape is changing quickly, and researchers wonder whether our political and social systems and regulations can keep up. With access to more personal data than ever before, police have the power to solve crimes more quickly, but in practice, the influx of information tends to amplify existing practices.
-
-
California’s police can't keep license plate data secret: Court
The Electronic Frontier Foundation (EFF) and the ACLU won a decision by the California Supreme Court that the license plate data of millions of law-abiding drivers, collected indiscriminately by police across the state, are not “investigative records” that law enforcement can keep secret. California’s highest court ruled that the collection of license plate data isn’t targeted at any particular crime, so the records couldn’t be considered part of a police investigation.
-
More headlines
The long view
Data Privacy After Dobbs: Is Period Tracking Safe?
Many people think all health care information is protected under the federal privacy law, known as HIPAA. But menstrual cycle tracking apps, along with other health care technologies, like texting platforms that patients can use with doctors, are not. There haven’t been any cases where a menstrual tracking app’s data has been subpoenaed yet, but that’s probably due to the slow speed of which cases proceed through the court system.