• Automatic license plate readers used to collect, store data on millions of Americans

    Automatic license plate readers are the most widespread location tracking technology available to law enforcement. Mounted on patrol cars or stationary objects like bridges, they snap photos of every passing car, recording their plate numbers, times, and locations. At first the captured plate data was used just to check against lists of cars law enforcement hoped to locate for various reasons (to act on arrest warrants, find stolen cars, etc.). Increasingly, however, all of this data is being fed into massive databases that contain the location information of many millions of innocent Americans stretching back for months or even years.

  • Highly sensitive fingerprint technique developed

    Researchers have developed a new and extremely sensitive method for visualizing fingerprints left on metal surfaces such as guns, knives, and bullet casings. The technique utilizes color-changing fluorescent films and the researchers say that it can be used to complement existing forensic processes.

  • Thermal imaging could bolster biometric security

    Fingerprints and iris recognition will soon give way to thermal imaging.The pattern of blood vessels located just beneath the skin of a person’s face can be isolated using an infrared thermal imaging camera. The blood vessel patterns are as unique as a fingerprint and iris, but are almost impossible to forge.

  • CBP drones may be armed with non-lethal weapons

    Customs and Border Protection (CBP) currently has eight Predator drones used on the northern and southern borders, and two more drones watching the Caribbean. The drones are equipped with high-tech cameras. Critics say drones are not an efficient way to monitor the border, and that they lead to few arrests and seizures. Other critics are worry about something else: a recent CBP report show that the agency is considering arming these drones with “expendables or non-lethal weapons designed to immobilize [targets of interest].”

  • Highly portable X-ray imaging system developed

    Los Alamos National Laboratory and Tribogenics have developed the MiniMAX (Miniature, Mobile, Agile, X-ray) camera to provide real-time inspection of sealed containers and facilities.MiniMAX is an alternative to the large, expensive, and fixed facilities presently required for security inspections using X-ray imaging. The complete MiniMAX portable radiography system weighs less than five pounds.

  • NYPD police chief Raymond Kelly criticizes NSA for secrecy surrounding surveillance program

    NYPD commissioner Raymond Kelly yesterday pointedly criticized the secrecy surrounding the National Security Agency (NSA), saying that Americans would probably be comfortable knowing their conversations are monitored. Kelly also said that if Snowden is correct in his allegations that the surveillance system can be readily abused, then there is a need for more oversight of the NSA. He said that more transparency about the checks on and supervision of what NSA analysts can monitor would help put the public at ease.

  • Webcast of Forensic Handwriting Analysis Conference available online

    On 4-5 June 2013 NIST and partnering organizations hosted the Measurement Science and Standards in Forensic Handwriting Analysis Conference. In case you missed this event or would like to view/listen again to the presentations, the archived video of the Webcast is now available online.

  • Detecting explosives, not toothpaste

    Researchers want airports, border checkpoints, and others to detect homemade explosives made with hydrogen peroxide without nabbing people whose toothpaste happens to contain peroxide. This is part of the challenge faced in developing a portable sensor to detect a common homemade explosive called a FOx (fuel/oxidizer) mixture, made by mixing hydrogen peroxide with fuels.

  • NSA director: surveillance programs prevented “dozens” of terror attacks

    Gen. Keith Alexander, the director of the National Security Agency (NSA) and commander of the U.S. Cyber Command, told lawmakers yesterday (Wednesday) that the NSA’s electronic surveillance programs have been indispensable in thwarting “dozens” of terrorist attacks on targets in the United States and abroad. He told the senators that securing a “cyber arena” could be done without infringing upon the privacy rights of Americans. “We do not see a tradeoff between security and liberty,” Alexander said, later adding, “We are trying to protect Americans.”

  • ACLU files lawsuit challenging NSA's phone surveillance

    In the wake of the past week’s revelations about the NSA’s surveillance of phone calls, the yesterday American Civil Liberties Union (ACLU) filed a lawsuit charging that the program violates Americans’ constitutional rights of free speech, association, and privacy.

  • Edward Snowden, an NSA contractor employee, says he is the source of NSA leaks

    Edward Snowden, a 29-year-old former technical assistant in the CIA and more recently an employee of the defense contractor Booz Allen Hamilton, has identified himself as the source of the leaks about three massive NSA surveillance schemes. Snowden says the NSA’s surveillance activities are all-consuming; these activities “are intent on making every conversation and every form of behavior in the world known to [the NSA].” He said that once he concluded that the NSA’s surveillance scheme would soon be irrevocable, it was just a matter of time before he chose to act. “What they’re doing” poses “an existential threat to democracy,” he said.

  • Second NSA domestic surveillance scheme revealed: data mining from nine U.S. ISPs

    A day after it was revealed that the NSA was collecting communication information on millions of Verizon’s U.S. customers, another NSA domestic surveillance scheme was exposed: the NSA and the FBI have been tapping directly into the central servers of nine leading U.S. Internet service providers for the purpose of harvesting audio, video, photographs, e-mails, documents, and connection logs. The information collected allowed intelligence analysts to track an individual’s movements and contacts over time.

  • Nevada lawmakers fail to restore DHS funds to Las Vegas

    Members of the Nevada congressional delegation were taken aback when they found that Las Vegas would lose DHS funding for anti-terror programs, and immediately began to work their fellow lawmakers on the Hill to add money to DHS security grants to cities. The effort failed, and Las Vegas will have to find other sources of funding for some of the city’s security programs.

  • NSA collecting information on Verizon customers’ communications

    The National Security Agency (NSA) has been collecting massive amounts of “metadata,” or transactional information, on millions of Verizon’s U.S. customers. A court granted the NSA permission to begin information collection on 25 April, stipulating the collection must end by 19 July. The court order instructs Verizon to “continue production on an ongoing daily basis thereafter for the duration of this order.” It specifies that the records to be produced include “session identifying information,” such as “originating and terminating number,” the duration of each call, telephone calling card numbers, trunk identifiers, International Mobile Subscriber Identity (IMSI) number, and “comprehensive communication routing information.”

  • Iowa City to ban red-light cameras, drones, license plate readers

    Iowa City could become the first city in the United States to issue a sweeping ban on three law-enforcement technologies:  drones, license plate readers, and red-light cameras. Privacy advocates say each of these technologies poses a threat to privacy, and the cumulative effect of using all three would turn America into a surveillance society.