• Ruling shows Europe still vexed over NSA spying, leaving U.S. companies in legal limbo

    For over fifteen years, the Data Transfer Pact between the European Union and the United States, more commonly known as Safe Harbor, had ensured that companies with EU operations could transfer online data about their employees and customers back to the United States despite stark differences between U.S. and European privacy law. Earlier this month, U.S. companies operating in Europe got some unwelcome news: Safe Harbor had been ruled invalid. The European court’s ruling has serious implications for these companies’ business models and profitability, leaving many scrambling to find solutions. But it also exposes a fundamental cultural rift between the U.S. and Europe’s conceptions of privacy – one that a new agreement won’t be able to paper over.

  • Glowing fingerprints help fight crime

    Fingerprint identification has been used as a key method by law enforcement and forensic experts for over 100 years. Researchers say that by adding a drop of liquid containing crystals to surfaces, investigators using a UV light are able to see invisible fingerprints “glow” in about thirty seconds. The strong luminescent effect creates greater contrast between the latent print and surface enabling higher resolution images to be taken for easier and more precise analyses.

  • Internal fingerprint sensor enables more accurate ID

    In the 1971 film “Diamonds are Forever,” British secret agent James Bond uses fake fingerprints as part of a ploy to assume the identity of a diamond smuggler. At the time, sham prints were purely a futuristic bit of Bond gadgetry, but technology has since caught up. Quickly detecting “internal fingerprints” and sweat pores could make fingerprint sensors more reliable and less likely to be tricked by fake fingerprints.

  • White House will not seek law allowing law enforcement access to encrypted messages

    The Obama administration has decided not to seek legislation which would require tech companies to design their devices in a way which would give law enforcement agencies access to individuals’ encrypted messages, the White House said on Saturday. The tech industry, led by giants Apple, Google, Facebook, IBM, and Microsoft, has mounted a vigorous campaign opposing any administration moves to weaken ever-more-sophisticated encryption systems which are designed to protect consumers’ privacy.

  • European Court of Justice: U.S. data systems expose users to state surveillance

    The European Court of Justice (ECJ) in Luxembourg has ruled that U.S. digital data storage systems fail to provide sufficient privacy from state surveillance. The ECJ declared the American so-called safe harbor scheme “invalid.” The ruling, which is binding on all EU members states, stated that: “The United States … scheme thus enables interference, by United States public authorities, with the fundamental rights of persons…” The ruling will have far-reaching ramifications for the online industry and would likely lead many companies to relocate their operations.

  • Clothing that guards against chemical warfare agents

    Recent reports of chemical weapons attacks in the Middle East underscore the need for new ways to guard against their toxic effects. Scientists report that a new hydrogel coating that neutralizes both mustard gas and nerve agent VX. It could someday be applied to materials such as clothing and paint.

  • DHS recruits Silicon Valley entrepreneurs to develop first-response technology

    DHS wants better technology for first responders — police, firefighters, and EMTs — but rather than pushing for innovation from within the massive corporations that already provide technology to government agencies, the DHS has come to Silicon Valley to tap the entrepreneurial ecosystem of northern California. Giant technology firms have resources of large scale manufacturing and distribution, but there is one crucial difference. Technology startups are much more nimble, and can shift their development much faster than the huge corporations can.

  • Apple's encryption prevents it from complying with U.S. court order

    Apple said it could not comply with a court order to hand over texts sent using iMessage between two iPhones because the company’s encryption system makes it impossible to do so. The Justice Department persuaded the court to issue the order to facilitate an investigation involving guns and drugs. Legal experts say this is the first known direct face-off between the U.S. government and Apple over encryption. The FBI contends that such encryption puts the American public at risk because it makes it harder, if not impossible, to track and catch terrorists, pedophiles, and other criminals.

  • Determining the age of fingerprints

    Watch the imprint of a tire track in soft mud, and it will slowly blur, the ridges of the pattern gradually flowing into the valleys. Researchers have tested the theory that a similar effect could be used to give forensic scientists something they’ve long wished for: A way to date fingerprints. Even the approximate age of a fingerprint can have a critical bearing on forensic results, as it can rule out some prints as being too old to be relevant to a crime scene. Military forensics experts would like to be able to date the multitude of fingerprints found on improvised bombs used by insurgents to winnow out prints of individuals who may simply have handled the components in a shop from those of the actual bombmakers.

  • Prepaid card reader helps law enforcement in seizing fraudulent cards

    During arrests of criminal couriers, law enforcement officers rarely find bundles of cash wrapped in rubber bands anymore. Instead, they find stacks of plastic cards — bank credit and debit cards, retail gift cards, library cards, hotel card keys, even magnetic-striped Metrorail cards — which have been turned into prepaid cards. DHS S&T’s Electronic Recovery and Access to Data (ERAD) Prepaid Card Reader is a small, handheld device which uses wireless connectivity to allow law enforcement officers in the field to check the balance of cards. This allows for identification of suspicious prepaid cards and the ability to put a temporary hold on the linked funds until a full investigation can be completed.

  • Internet technology to aid police, courts, prisons – but privacy issues must be addressed

    New Internet-based technology may aid criminal justice agencies through tools such as better criminal databases, remotely conducted criminal trials, and electronic monitoring of parolees in the community, according to a new study. “The criminal justice field has mostly been reactive to new technology developments such as smart phones and social media,” said the lead author of the report. “We’ve developed a road map of how new Internet-based technologies might help law enforcement in the future, as well as set priorities for the improvements that are needed most.”

  • Sandia teams with industry to improve human-data interaction

    Intelligence analysts working to identify national security threats in warzones or airports or elsewhere often flip through multiple images to create a video-like effect. They also may toggle between images at lightning speed, pan across images, zoom in and out or view videos or other moving records. These dynamic images demand software and hardware tools that will help intelligence analysts analyze the images more effectively and efficiently extract useful information from vast amounts of quickly changing data. Sandia Lab and EyeTracking, Inc. will research and develop tools to improve how intelligence analysts gather visual information.

  • Bill requiring Internet companies to report “terrorist activity” opposed by digital rights groups

    A coalition of digital rights groups and trade associations last week released a joint letter opposing a proposal in the Senate to require U.S. tech firms to police the speech of their users and to report any signs of apparent “terrorist activity” to law enforcement. The letter says that this sweeping mandate covers an undefined category of activities and communications and would likely lead to significant over-reporting by communication service providers. The letter urged senators to remove the “terrorist activity” reporting requirements from the Intelligence Authorization Act (S. 1705).

  • NSA to destroy millions of American call records collected under controversial program

    The director of national intelligence said on Monday that the NSA would no longer examine call records collected by the NSA in its controversial bulk collection program before the June reauthorization of the Patriot Act which prohibits such collection. Bulk records are typically kept for five years, but the director said that although the records in the NSA database were collected lawfully, they would not be examined, and would soon be destroyed.

  • Journalists’ computer security tools lacking in a post-Snowden world

    Edward Snowden’s leak of classified documents to journalists around the world about massive government surveillance programs and threats to personal privacy ultimately resulted in a Pulitzer Prize for public service. Though Snowden had no intention of hiding his identity, the disclosures also raised new questions about how effectively news organizations can protect anonymous sources and sensitive information in an era of constant data collection and tracking. Researchers found a number of security weaknesses in journalists’ and news organizations’ technological tools and ad-hoc workarounds.