• Using spooks’ software to select wine

    Delectable is a mobile application that allows users to explore wines by using technology currently employed to locate terrorists and prevent bank frauds. The application is considered to have the world’s largest database of wine, providing information on more than two million wines and offering users an option to purchase selected wines.

  • More equitable access to DNA identification after disaster or conflict needed: experts

    The April 2013 collapse of the Rana Plaza Factory Building in Bangladesh, in which more than 1,130 people were killed, is only the latest in a long line of events that has made plain the plight of the families whose loved ones go missing after conflict and disaster. Experts argue that international structures are needed to promote more equal access to forensic identification technologies, ensure their fair and efficient use, and provide uniform protections to participants following large-scale conflict and disaster.

  • NYPD designated all NYC mosques as terrorist organizations to facilitate broad surveillance

    The New York Police Department (NYPD) secretly labeled entire mosques in New York as terrorist organizations, allowing the NYPD to use surveillance techniques including informants and spies without needing evidence or proof of criminal or terrorist activities to investigate the mosques. The investigations, known as Terrorism Enterprise Investigations (TEI), began after the 9/11 attacks on New York City and the Pentagon.

  • Flexible vehicle-arrest system stops cars involved in crime, terrorism

    Researchers have developed a mathematical model that could help engineers design a flexible vehicle-arrest system for stopping cars involved in criminal activity or terrorism, such as suspect car bombers attempting break through a check point, without wrecking the car or killing the occupants.

  • New systems improve voice recognition

    Graduate students and researchers at the University of Texas Dallas have developed novel systems that can identify speaking voices despite conditions that can make it harder to make out a voice, such as whispering, speaking through various emotions, or talking with a stuffy nose.

  • Fusion centers collect information on non-threatening groups

    Since the 9/11 attacks, federal and state surveillance of nonviolent student groups, protest movements, and mosques has increased along with the growth of fusion centers. Fusion centers serve as the focal points for the receipt, analysis, gathering, and sharing of threat-related information. According to DHS, there are fifty-three primary fusion centers and twenty-five recognized fusion centers across the United States.

  • Police’s facial recognition program becomes a political issue in Ohio

    Attorney General Mike DeWine of Ohio confirmed last week that local and state law enforcement have used facial recognition software since June of this year to match images of potential suspects and victims to pictures on the state’s drivers’ licenses and mug shots. The Democratic challenger for the Attorney General post faulted DeWine’s office for launching the program on 6 June without any public notice.

  • Security vs. privacy

    Those who ask you to choose security or privacy and those who vote on security or privacy are making false choices. That’s like asking air or water? You need both to live. Maslow placed safety (of which security is a subset) as second only to food, water, sex, and sleep. As humans we crave safety. As individuals and societies, before we answer the question “security or privacy,” we first have to ask “security from whom or what?” and “privacy from whom and for whom?”

  • Privacy board wants Feds to update security agencies’ operating rules

    The independent Privacy and Civil Liberties Board says U.S. national security agencies are operating under outdated rules which should be revised to reflect advances in technology.The oversight board says that rules governing collection and retention of data about Americans need be revised to “appropriately capture both the evolution of technology and the roles and capabilities of the intelligence community since 9/11.”

  • Forensic experts may be influenced by the side retaining them

    Forensic psychologists and psychiatrists are ethically bound to be impartial when performing evaluations or providing expert opinions in court. New research suggests, however, that courtroom experts’ evaluations may be influenced by whether their paycheck comes from the defense or the prosecution.

  • Collaboration with industry leads to improved forensics

    Three-dimensional (3D) scanners used at crime scenes for forensic investigations are not just the stuff of prime time television. Investigators and crime laboratories are using 3D laser scanning measurement systems to measure and model, in 3D simulations, the critical aspects of crime scenes. A 2009 National Academy of Sciences (NAS) report, however, questioned the reliability of some forensic sciences, including the use of 3D scanning technique. Furthermore, pressure began building in the forensics community to have crime laboratories and stand-alone crime scene units in the United States adhere to specific standards in their services, which require traceability to the SI [the SI in SI traceability refers to the International System of Units (Système International d’unités)].

  • Iris recognition useable as a long-term form of identification

    For decades, researchers seeking biometric identifiers other than fingerprints believed that irises were a strong biometric because their one-of-a-kind texture meets the stability and uniqueness requirements for biometrics. Recent research, for example, has questioned that belief, finding that the recognition of the subjects’ irises became increasingly difficult, consistent with an aging effect. Other researchers, however, found no evidence of a widespread aging effect. A computer model used to study large populations estimates that iris recognition of average people will typically be useable for decades after the initial enrollment.

  • Forensic familial DNA searches carry risk of certain false matches

    DNA-based familial search may misidentify distant relatives of known offenders as close relatives. Familial searches can reliably distinguish first-degree relatives from unrelated individuals, but may misidentify distant relatives as being immediate family, according to this new research.

  • DEA uses NSA surveillance information to make arrests

    The Drug Enforcement Administration (DEA) has benefitted from multiple tips from the National Security Administration’s (NSA) surveillance programs – although not necessarily the programs revealed by Edward Snowden. DEA officials in a secret office known as the Special Operations Division (SOD) are assigned to handle incoming tips from the NSA. The information exchanged between the two agencies includes intelligence intercepts, wiretaps, informants, and a massive database of telephone records.

  • The FBI uses hackers’ methods in its surveillance programs

    The U.S. government is planning to expand its suspect surveillance programs to include tactics which are commonly used by computer hackers.The FBI typically uses hacking in cases involving organized crime, child pornography, or counterterrorism, a former U.S. official said. The agency is less inclined to use these tools when investigating hackers, out of fear the suspect will discover and publicize the technique.