-
Legal skirmish over Defcon talk shows divide on disclosing security flaws
Gag order slapped on MIT students who prepared a talk about Boston transit authority security flaw reignites debate over what “responsible disclosure” of security flaw means
-
-
Microchips in e-passports easily forged
Dutch researcher uses his own software, a publicly available programming code, a £40 card reader, and two £10 RFID chips to clone and manipulate two passport chips to a point at which they were ready to be planted inside fake or stolen paper passports; the altered chips were then passed as genuine by passport reader software used by the UN agency that sets standards for e-passports; the researcher took less than an hour to alter the chips
-
-
Calls for tougher debit card regulation
On Tuesday the Justice Department announced the indictment of eleven people for stealing and selling more than 40 million credit card and debit card numbers; watchgroups say this is evidence, if one were needed, that federal laws governing debit cards should be tougher — and more uniform
-
-
Backed against the wall
The very term “having one’s back against the wall” implies that one is in a tight spot; this is not necessarily the case, as the wall may often be used as a tool or weapon allowing the individual being attacked to defend himself and gain control of the situation
-
-
New DNA sequencing techniques convince FBI of Ivins's culpability
Since 2001 techniques for sequencing microbial DNA have vastly improved and there has been a massive effort to sequence more anthrax samples
-
-
Bullet-tagging technology to help combat crime
U.K. researchers develop new bullet-tagging technology: tags are applied to gun cartridges by being embedded in cartridge coatings made from polylactic acid, sucrose ester, and tetrahydrofuran; the tags attach themselves to the hands or gloves of anyone handling the cartridge, but a portion of the tag remains on the cartridge even after it has been fired, making it possible to make a definite link between a cartridge fired during a crime and whoever handled it
-
-
2001 anthrax attacks chief suspect kills himself
Bruce Ivins, the FBI’s chief suspect in the 2001 anthrax attacks — after the previous main suspect, Steven Hatfill, has been exonerated — commits suicide; scientist kills himself after being told that the government was about to file criminal charges against him
-
-
Sharp increase in "zero-day" exploits
Cyber-criminals are adopting new automation techniques and strategies that allow them to exploit vulnerabilities much faster than ever before
-
-
New simulation tool for handling hazardous situations
Irish, Israeli companies develop new simulation tool which immerse trainees in a scene which has been designed for them; new tool will help first responders and law enforcement familiarize themselves with situations before they occur
-
-
New Zealand to use biometrics to monitor immigration
Technology will allow border control staff to conduct biometric checks on inbound and outbound passengers
-
-
New rules for private guards
Some 1,000 security companies operate in Greece, employing 50,000 people and making 90 million euros a year; the Greek parliament wants to tighten control of these companies
-
-
New crime: Forged eye biometrics recognition stamps
How accurate is iris scanning biometric technology? read on: Three individuals are arresed at the Dubai airport for smuggling forged eye biometrics recognition stamps; the criminals’ goal: to facilitate the entry to the UAE of individuals who were previously banned
-
-
-
ACLU: Terrorist Watch List hits one million names
ACLU claims terrorist watch list reached one million names; launches online watch list complaint form
-
-
TSA: ACLU’s terrorist watch list facts and figures are a myth
The Transportation Security Administration refutes the facts and figures used by the ACLU in the latter’s claim that the list is now 1-million strong
-
More headlines
The long view
How DHS Laid the Groundwork for More Intelligence Abuse
I&A, the lead intelligence unit of the Department of Homeland Security (DHS) —long plagued by politicized targeting, permissive rules, and a toxic culture —has undergone a transformation over the last two years. Spencer Reynolds writes that this effort falls short. “Ultimately, Congress must rein in I&A,” he adds.
Southport Attacks: Why the U.K. Needs a Unified Approach to All Violent Attacks on the Public
The conviction of Axel Rudakubana for the murder of three young girls in Southport has prompted many questions about how the UK handles violence without a clear ideological motive. This case has also shown up the confusion in this area, and made clear the need for a basic reframing of how we understand murderous violence against the public today.
Strengthening School Violence Prevention
Violence by K-12 students is disturbingly common. Ensuring that schools have effective ways to identify and prevent such incidents is becoming increasingly important. Expanding intervention options and supporting K-12 school efforts in Behavioral Threat Assessment and Management (BTAM) would help.
Memory-Holing Jan. 6: What Happens When You Try to Make History Vanish?
The Trump administration’s decision to delete a DOJ database of cases against Capitol riot defendants places those who seek to preserve the historical record in direct opposition to their own government.
Evidence-Based Solutions to Protect Against Mass Attacks
Mass attacks like the New Year’s Day incident in New Orleans stir public emotion and have tragic consequences. While the investigations into this case will take time, we know from our work that there are things law enforcement and the public can do to mitigate and perhaps stop mass casualty events.