-
Flexible vehicle-arrest system stops cars involved in crime, terrorism
Researchers have developed a mathematical model that could help engineers design a flexible vehicle-arrest system for stopping cars involved in criminal activity or terrorism, such as suspect car bombers attempting break through a check point, without wrecking the car or killing the occupants.
-
-
New systems improve voice recognition
Graduate students and researchers at the University of Texas Dallas have developed novel systems that can identify speaking voices despite conditions that can make it harder to make out a voice, such as whispering, speaking through various emotions, or talking with a stuffy nose.
-
-
Fusion centers collect information on non-threatening groups
Since the 9/11 attacks, federal and state surveillance of nonviolent student groups, protest movements, and mosques has increased along with the growth of fusion centers. Fusion centers serve as the focal points for the receipt, analysis, gathering, and sharing of threat-related information. According to DHS, there are fifty-three primary fusion centers and twenty-five recognized fusion centers across the United States.
-
-
Police’s facial recognition program becomes a political issue in Ohio
Attorney General Mike DeWine of Ohio confirmed last week that local and state law enforcement have used facial recognition software since June of this year to match images of potential suspects and victims to pictures on the state’s drivers’ licenses and mug shots. The Democratic challenger for the Attorney General post faulted DeWine’s office for launching the program on 6 June without any public notice.
-
-
Security vs. privacy
Those who ask you to choose security or privacy and those who vote on security or privacy are making false choices. That’s like asking air or water? You need both to live. Maslow placed safety (of which security is a subset) as second only to food, water, sex, and sleep. As humans we crave safety. As individuals and societies, before we answer the question “security or privacy,” we first have to ask “security from whom or what?” and “privacy from whom and for whom?”
-
-
Privacy board wants Feds to update security agencies’ operating rules
The independent Privacy and Civil Liberties Board says U.S. national security agencies are operating under outdated rules which should be revised to reflect advances in technology.The oversight board says that rules governing collection and retention of data about Americans need be revised to “appropriately capture both the evolution of technology and the roles and capabilities of the intelligence community since 9/11.”
-
-
Forensic experts may be influenced by the side retaining them
Forensic psychologists and psychiatrists are ethically bound to be impartial when performing evaluations or providing expert opinions in court. New research suggests, however, that courtroom experts’ evaluations may be influenced by whether their paycheck comes from the defense or the prosecution.
-
-
Collaboration with industry leads to improved forensics
Three-dimensional (3D) scanners used at crime scenes for forensic investigations are not just the stuff of prime time television. Investigators and crime laboratories are using 3D laser scanning measurement systems to measure and model, in 3D simulations, the critical aspects of crime scenes. A 2009 National Academy of Sciences (NAS) report, however, questioned the reliability of some forensic sciences, including the use of 3D scanning technique. Furthermore, pressure began building in the forensics community to have crime laboratories and stand-alone crime scene units in the United States adhere to specific standards in their services, which require traceability to the SI [the SI in SI traceability refers to the International System of Units (Système International d’unités)].
-
-
Iris recognition useable as a long-term form of identification
For decades, researchers seeking biometric identifiers other than fingerprints believed that irises were a strong biometric because their one-of-a-kind texture meets the stability and uniqueness requirements for biometrics. Recent research, for example, has questioned that belief, finding that the recognition of the subjects’ irises became increasingly difficult, consistent with an aging effect. Other researchers, however, found no evidence of a widespread aging effect. A computer model used to study large populations estimates that iris recognition of average people will typically be useable for decades after the initial enrollment.
-
-
Forensic familial DNA searches carry risk of certain false matches
DNA-based familial search may misidentify distant relatives of known offenders as close relatives. Familial searches can reliably distinguish first-degree relatives from unrelated individuals, but may misidentify distant relatives as being immediate family, according to this new research.
-
-
DEA uses NSA surveillance information to make arrests
The Drug Enforcement Administration (DEA) has benefitted from multiple tips from the National Security Administration’s (NSA) surveillance programs – although not necessarily the programs revealed by Edward Snowden. DEA officials in a secret office known as the Special Operations Division (SOD) are assigned to handle incoming tips from the NSA. The information exchanged between the two agencies includes intelligence intercepts, wiretaps, informants, and a massive database of telephone records.
-
-
The FBI uses hackers’ methods in its surveillance programs
The U.S. government is planning to expand its suspect surveillance programs to include tactics which are commonly used by computer hackers.The FBI typically uses hacking in cases involving organized crime, child pornography, or counterterrorism, a former U.S. official said. The agency is less inclined to use these tools when investigating hackers, out of fear the suspect will discover and publicize the technique.
-
-
Locating criminals by tracking their cell phones’ digital fingerprints
To keep from being tracked and getting caught, criminals use evasion tactics such as modifying the built-in ID code in their cell phone or swapping out SIM cards, making it impossible for law enforcement to track the criminals down by relying solely on cell phone signals. German engineers found, however, that the radio hardware in a cellphone — a collection of components like power amplifiers, oscillators, and signal mixers — all introduce radio signal inaccuracies. When these inaccuracies, or errors, are taken together, as seen in the digital signal sent to a cell tower, the result can be read as a unique digital signal –a digital fingerprint. These digital fingerprints do not change even if the built-in ID code has been modified, or the SIM card has been swapped out.
-
-
U.S. Appeals Court: govt. does not need search warrant to track cellphones
Law enforcement agencies have won a victory Tuesday when a federal appeals court ruled that government authorities could extract historical location data directly from telecommunications carriers without a search warrant. The ruling by the U.S. Court of Appeals for the Fifth Circuit is the first ruling directly to address the constitutionality of warrantless searches of historical location data stored by cellphone service providers. He appeals court said that historical location data is a business record which is the property of the cellphone provider. The appeals court also said that the collection of such data by authorities does not have to meet a probable cause standard as outlined under the Fourth Amendment, which protects against unlawful search and seizure and requires a search warrant.
-
-
Angry lawmakers warn NSA to curb surveillance operations
John Inglis, the deputy director of the National Security Agency (NSA), told angry lawmakers yesterday that his agency’s ability to analyze phone records and online behavior is greater than what the agency had previously revealed. Inglis told members of the House Judiciary Committee that NSA analysts can perform “a second or third hop query” through its collections of telephone data and Internet records in order to find connections to terrorist organizations. Representative James Sensenbrenner (R-Wisconsin), the author of the 2001 Patriot Act, warned the intelligence officials testifying before the committee that unless they rein in the scope of their surveillance on Americans’ phone records, “There are not the votes in the House of Representatives” to renew the provision after its 2015 expiration. “You’re going to lose it entirely,” he said.
-