-
New biometric measures: Birth marks, scars, and tatoos
Michigan State researcher develops a system that could allow police to identify individuals by matching marks on their body with those stored in a computer database
-
-
Shipment of restricted technology to India brings 35-month sentence
A South Carolina businessmen is sentenced the three years in prison for smuggling restricted technology to India; technology used in India’s space and ballistic-missile programs
-
-
Botnet cyberattack costs Japanese company 300 million yen
There is a new type of blackmail in Japan: Hackers use botnets in denial-of-service attacks on companies’ computers — ending the attacks only when hefty ransom is paid
-
-
FEMA will be aggregator/gateway for CMAS
FEMA said it will be the aggregator and gateway for the Commercial Mobile Alert System, a voluntary nationwide emergency alert system
-
-
Breakthrough: Reading fingerprints even after they are gone
The name is Bond, John Bond (of Leicester University, that is): Researchers at Leicester develop a fingerprints visualization technique which would allow reading a fingerprint even after the print itself has been removed; new method would allow solving decade-old unsolved cases
-
-
OSHA issues guidance regarding storage of face masks, respirators
OSHA requests comments on proposed guidance on workplace stockpiling of respirators and face masks for pandemic influenza
-
-
Iranian-born U.S. citizen charged with nuclear smuggling
The Iranian-born engineer worked for seventeen years at Palo Verde nuclear plant, about fifty miles west of downtown Phoenix, the largest U.S. nuclear plant; he loaded software onto his laptop, and took the laptop to Iran
-
-
But will it work, Sir?
There are many different combat and defensive techniques, and each has some merit, some application, some innovation; the question that must be asked is: will this technique work when the ultimate test arrives and it must be used in real time?
-
-
IBM joins Next Generation Identification (NGI) system team
NGI, the FBI’s new multi-modal, state-of-the-art biometrics system to be used by state, local, and federal authorities, will store fingerprints, palm prints, iris, and facial recognition information; it will accommodate other biometric modalities as they mature
-
-
Secret wiretap warrants double since 9/11
A Justice Department report shows FISA warrants for counterterrorism, espionage cases up
-
-
Malicious hardware may be next hacker tool
Next threat on the computer security front: Malicious hardware; malicious hardware is more problematic because it is more difficult to detect; China is already using an early, and simple, version of malicious hardware in its massive military and industrial espionage campaign against Western countries and companies
-
-
Stolen military items available for sale online
GAO investigators buy dozens of prohibited military items on eBay and Craigslist; some of the time would be of direct help to terrorists and insurgents
-
-
DHS grants Maine Real ID extension
Unless a state received a Real ID extension from DHS, then the driver’s licenses it issues to its residents must be Real ID-compliant by 11 May or state residents will not be able to board a plane, open a bank account, or enter a federal building; Maine’s application was not to DHS’s liking, so the state missed the extension application deadline; DHS decided to give the state 48 hours to comply
-
-
"Intellectual vacuum cleaner": China's industrial espionage campaign, I
In an effort to accelerate its rise to economic and technological hegemony, China is employing its military, intelligence services, trade missions abroad, students sent to foreign universities — and Chinese-born citizens who are sent to form espionage sleeper cells — in a massive industrial espionage campaign against Western companies
-
-
Miami police applie for FAA approval for UAV
Bad guys in Iraq, Afghanistan, and Pakistan worry about U.S.-operated UAVs; the Miami Dade police wants to use Honeywell’s “hover and stare” drone to track bad guys in South Florida
-
More headlines
The long view
How DHS Laid the Groundwork for More Intelligence Abuse
I&A, the lead intelligence unit of the Department of Homeland Security (DHS) —long plagued by politicized targeting, permissive rules, and a toxic culture —has undergone a transformation over the last two years. Spencer Reynolds writes that this effort falls short. “Ultimately, Congress must rein in I&A,” he adds.
Southport Attacks: Why the U.K. Needs a Unified Approach to All Violent Attacks on the Public
The conviction of Axel Rudakubana for the murder of three young girls in Southport has prompted many questions about how the UK handles violence without a clear ideological motive. This case has also shown up the confusion in this area, and made clear the need for a basic reframing of how we understand murderous violence against the public today.
Strengthening School Violence Prevention
Violence by K-12 students is disturbingly common. Ensuring that schools have effective ways to identify and prevent such incidents is becoming increasingly important. Expanding intervention options and supporting K-12 school efforts in Behavioral Threat Assessment and Management (BTAM) would help.
Memory-Holing Jan. 6: What Happens When You Try to Make History Vanish?
The Trump administration’s decision to delete a DOJ database of cases against Capitol riot defendants places those who seek to preserve the historical record in direct opposition to their own government.
Evidence-Based Solutions to Protect Against Mass Attacks
Mass attacks like the New Year’s Day incident in New Orleans stir public emotion and have tragic consequences. While the investigations into this case will take time, we know from our work that there are things law enforcement and the public can do to mitigate and perhaps stop mass casualty events.