-
Creating reliable emergency communications networks
When disaster strikes, it is important for first responders to have reliable, unhindered access to a controlled network, allowing them to receive and deliver critical information while ensuring effective emergency response. Unfortunately this is currently not the case. Due to power outages and cell tower damages, the infrastructure for communications is not readily available during the response to an incident or disaster, and furthermore, the cost of this infrastructure is unreasonable, even for large organizations.
-
-
Detecting concealed weapon, threat is not easy, and experience is no help to police officers
Detecting potential threats is part of the job for police officers, military personnel and security guards. Terrorist attacks and bombings at concerts, sporting events and airports underscore the need for accurate and reliable threat detection. However, the likelihood of a police officer identifying someone concealing a gun or bomb is only slightly better than chance, according to new research. Officers with more experience were even less accurate.
-
-
Tethered drone tested in securing Trump’s vacation golf course in New Jersey
DHS has announced it will test a tethered drone for surveillance over the Trump National Golf Course in New Jersey, where the president is on a 17-day vacation which started on Friday. Tethered drones fly at altitudes of 300-400 feet. The fly autonomously, but an operator on the ground can control the cameras.
-
-
Identifying, analyzing drone-collected evidentiary data
DHS awards nearly $1 million to a Colorado company to develop ways to increase law enforcement capabilities to identify, collect, and analyze evidentiary data from consumer and professional drones. The award is part of S&T’s Cyber Forensics, a project which focuses on development of new capabilities to help law enforcement with the forensic investigations of digital evidence from various devices such as mobile phones and automobile infotainment systems.
-
-
U.S. weapons main source of trade in illegal arms on the Dark Web
New report, based on first-ever study, looks at the size and scope of the illegal arms trade on the dark web. European purchases of weapons on the dark web generate estimated revenues five times higher than the U.S. purchases. The dark web’s potential to anonymously arm criminals and terrorists, as well as vulnerable and fixated individuals, is “the most dangerous aspect.”
-
-
Testing tactics for mitigating jamming
Jamming devices are illegal, and may delay emergency response times, escalate hazardous situations, or result in loss of life. Nearly 100 federal, state, and local public safety and private organizations gathered last week to test tactics and technologies to identify, locate, and mitigate illegal jamming of communications systems, such as GPS, radio, and wireless systems.
-
-
Better technologies help first responders respond more quickly, safely, and effectively
When disaster strikes, first responders rush in to provide assistance. In addition to their courage and training, they depend on a panoply of technologies to do their jobs. Pacific Northwest National Laboratory has partnered with emergency management and public safety professionals to define, develop, test and deploy these technologies to improve response and recovery. The Lab also applies its scientific capabilities to assess emergencies as they unfold.
-
-
Smart quadcopters find their way on their own -- without human help or GPS
Phase 1 of DARPA’s Fast Lightweight Autonomy (FLA) program concluded recently following a series of obstacle-course flight tests in central Florida. Over four days, three teams of DARPA-supported researchers huddled under shade tents in the sweltering Florida sun, fine-tuning their sensor-laden quadcopter unmanned aerial vehicles (UAVs) during the intervals between increasingly difficult runs. The quadcopters slalomed through woodlands, swerved around obstacles in a hangar, and reported back to their starting point all by themselves.
-
-
New virtual training prepares first responders for active shooter incidents
Amidst the chaos of an active shooter event, preparedness is key to a seamless, swift and effective response—and a new video game funded by the DHS S&T and the U.S. Army Research Laboratory just might do the trick. Enhanced Dynamic Geo-Social Environment, or EDGE, is a virtual training platform, available now to all response agencies nationwide. Built on the Unreal Engine, it allows responders of all disciplines to assume discipline-based avatars and simultaneously role-play complex response scenarios.
-
-
More rigorous approach to training of explosive-detecting dogs
With a sense of smell much greater than humans, dogs are considered the gold standard for explosive detection in many situations. But that does not mean there is no room for improvement. In a new study, scientists report on a new, more rigorous approach to training dogs and their handlers based on real-time analysis of what canines actually smell when they are exposed to explosive materials.
-
-
Growing opposition in Germany to new surveillance measures
In the aftermath of the Christmas 2016 market attacks in Berlin last December, the German government written several sweeping surveillance and data retention laws, which were narrowly passed by the Bundestag. Many of these laws will go into effect 1 July. Civil libertarians, opposition parties, and some security experts have criticized the new powers as diminishing privacy without adding much to security. These politicians and NGOs say that a spate of security measures just go too far.
-
-
Rapid DNA technology verifies relationships after mass casualty events
Rapid DNA technology developed by DHS S&T has recently been used to identify simulated “victims” in several mass casualty exercises across the United States. The technology greatly expedites the testing of deoxyribonucleic acid (DNA), the only biometric that can accurately verify family relationships.
-
-
Australia: Five-Eyes nations should require backdoors in electronic devices
Australia attorney-general George Brandis said he was planning to introduce a proposal to Australia’s four intelligence-sharing partners in the Five Eyes group — the United States, United Kingdom, New Zealand, and Canada – to require technology companies to create some kind of a backdoor to their devices. Australian leaders have emerged as strong proponents of allowing law-enforcement and intelligence agencies to gain access to the information and communication records on devices used by terrorists and criminals.
-
-
Rapid DNA technology verifies relationships after mass casualty events
Rapid DNA technology developed by DHS S&T has recently been used to identify simulated “victims” in several mass casualty exercises across the United States. The technology greatly expedites the testing of deoxyribonucleic acid (DNA), the only biometric that can accurately verify family relationships.
-
-
Bringing transparency to cell phone surveillance
Modern cell phones are vulnerable to attacks from rogue cellular transmitters called IMSI-catchers — surveillance devices that can precisely locate mobile phones, eavesdrop on conversations or send spam. Security researchers have developed a new system called SeaGlass to detect anomalies in the cellular landscape that can indicate where and when these surveillance devices are being used.
-
More headlines
The long view
Data Privacy After Dobbs: Is Period Tracking Safe?
By Paige Gross
Many people think all health care information is protected under the federal privacy law, known as HIPAA. But menstrual cycle tracking apps, along with other health care technologies, like texting platforms that patients can use with doctors, are not. There haven’t been any cases where a menstrual tracking app’s data has been subpoenaed yet, but that’s probably due to the slow speed of which cases proceed through the court system.