-
Briefly noted
Obama administration looks to fill more than 300 IT positions… Larger inmate population is boon to private prisons… More attacks on critical infrastructure?
-
-
DHS to regulate ammonium nitrate
Ammonium nitrate mixed with fuel oil commonly is used as an explosive in mining and has been used by terrorists — such as Timothy McVeigh in Oklahoma; DHS proposes to regulate its use
-
-
U.K. local authorities lack intelligence for effective counter-terrorism
A government study finds that government counter-terrorism funding to local authorities and neighborhood policing over the last two years has yet to translate into a coherent strategy to stop people from becoming terrorists or supporting violent extremists
-
-
Train as you fight
To be effective, the training of soldiers and policemen must be done with training conditions resembling the conditions the trainee will face in a real fight; a policeman or soldier will not have time to warm up and stretch before a real encounter; they will also not be fighting wearing shorts, T-shirts, and tennis shoes; the real fight will not stop when they feel pain or discomfort
-
-
Where is James Bond when we need him?
The villains James Bond was fighting — Dr. No, Goldfinger, and Blofeld — looked improbable in the 1960s; these miscreants of globalization — part master criminal, part arms smuggler, part terrorist, part warlord —are now the stuff of reality
-
-
Briefly noted
Global CCTV market analysis 2008-12… U.S. intelligence agencies spend $47.5 billion in 2008… Changing role for DHS in cyber security… Auditors: Private security in Iraq cost over $6 billion… China begins investigation of tainted eggs
-
-
Messaging pictures as a safety device
A Pittsburgh-based startup allows you to take pictures of threatening individuals you may encounter in hairy situations, and message these pictures to a secure “vault”; if you do not come back to your home or office by a specified time, the date- and time-stamped pictures are made available to the police
-
-
Debate over safety of taser-proof vests
A U.S. body-armor company is selling taser-proof vests to police units; some argue that the vests make officers less safe because taser-toting bad guys would now aim for the officer’s head; the response: this is like arguing that bullet-proof vests make officer less safe because the bad guy would aim for the head
-
-
Debate over safety of taser-proof vests
A U.S. body-armor company is selling taser-proof vests to police units; some argue that the vests make officers less safe because taser-toting bad guys would now aim for the officer’s head; the response: this is like arguing that bullet-proof vests make officer less safe because the bad guy would aim for the head
-
-
U.K. security services push for expanded surveillance power
U.K. security services are pushing for a massive expansion of electronic surveillance in the United Kingdom, in the face of opposition from the Treasury and the Cabinet Office
-
-
U.S. government to take counterterrorism local
The federal government says local police efforts to record and share activities that could be related to terrorism are critical to the government’s counterterrorism effort; the creation and coordination of a uniform system of reporting among thousands of jurisdictions is a problem, though
-
-
SA police to buy mini-UAVs
South Africa is host to the 2010 Soccer World Cup; in preparation, the SA police is buying mini-UAVs and integrating them into the force; the UAV — Kiwit — is carried in a suitcase, weighs 3.5 kg, and can be assembled by a single person in five minutes
-
-
The "Israeli Lean"
The debate about the most effective shooting stance has divided supporters of the Weaver Stance from proponents of the Isosceles Stance; there is a third stance which offers many advantages: the Israeli Lean, which is based on the Point-Shoot
-
-
Web browsers affected by Clickjacking
US CERT issues a warning about a new cross-browser exploit technique called “Clickjacking”; clickjacking gives an attacker the ability to trick a user into clicking on something only barely or momentarily noticeable; thus, if a user clicks on a Web page, they may actually be clicking on content from another page
-
-
Stolen laptops "broadcast" their location to rightful owners
Huskies researchers develop a software tool which uses the Internet as a homing beam; if the thief uses the stolen laptop to connect to the Internet, the owner receives information on the laptop location (and Macintosh owners also recvied a picture of the thief)
-
More headlines
The long view
Need for National Information Clearinghouse for Cybercrime Data, Categorization of Cybercrimes: Report
There is an acute need for the U.S. to address its lack of overall governance and coordination of cybercrime statistics. A new report recommends that relevant federal agencies create or designate a national information clearinghouse to draw information from multiple sources of cybercrime data and establish connections to assist in criminal investigations.