-
Cyber cafes to be monitored in India
Indian police places biometric systems and CCTV in more than 150 cyber cafes in order to catch cyber criminals in the act
-
-
Cybercrime gangs highly structured
The chain of command of a cybercrime gang is not unlike the Mafia, an evolution which shows how online crime is becoming a broad, well-organized endeavor
-
-
Powerful laser blinds Moscow partygoers
Organizers of a rave party north of Moscow use a powerful laser to beam the partygoers, causing retinal burns and permanent eye damage to many; engineers accuse party organizers of “technical illiteracy”
-
-
U.S. intelligence services aware of vast Chinese espionage campaign
Multifaceted Chinese espionage campaign in the United States and other Western countries aims not only to steal military secrets, but also industrial secrets and intellectual property in order to help Chinese companies better compete in the global economy; Chinese government and state-sponsored industries have relied not only on trained intelligence officers, but also on the Chinese diaspora — using immigrants, students, and people of second- and third-generation Chinese heritage
-
-
Ground fighting and its tactical applications
Every grappler, Jiu-Jitsu practitioner, and wrestler thinks that if he can take the fight to the ground, he will win; there are, however, a few inherent problems with this approach
-
-
An HS Daily Wire conversation with Walter Hamilton of the International Biometrics Industry Association (IBIA)
Walter Hamilton, chairman of the Board of Directors of IBIA, talks about different biometric technologies, new and innovative biometric approaches, the role of biometric in security and commerce, biometrics in the theater of battle, and more
-
-
Banks' PIN codes susceptible to hackers' theft
Network of PIN codes’ thieves nets millions of dollars; hackers are targeting the ATM system’s infrastructure, which is increasingly built on Microsoft’s Windows operating system and allows machines to be remotely diagnosed and repaired over the Internet
-
-
Air passnegers now must show an ID to be allowed on board
Until this past weekend, a passenger who agreed to secondary search of his or her body and baggage at airport check-points was allowed to board even if they did not have — or refused to show — an ID; this policy was changed on Saturday
-
-
First conviction under the Economic Espionage Act of 1996
Chinese-born software engineer sentenced for stealing industrial and military secrets on behalf of the PRC; first conviction under a 1996 law for misappropriating a trade secret with the intent to benefit a foreign government
-
-
China in campaign to impriove coastal water, inland waterways security
China has a long coast and many rivers and canals; there are about 200,000 boats and ship plowing these waters, the the Chinese authorities want them to be able to communicate more effectively with security and law enforcement; U.K. company helps
-
-
New biometric measures: Birth marks, scars, and tatoos
Michigan State researcher develops a system that could allow police to identify individuals by matching marks on their body with those stored in a computer database
-
-
Shipment of restricted technology to India brings 35-month sentence
A South Carolina businessmen is sentenced the three years in prison for smuggling restricted technology to India; technology used in India’s space and ballistic-missile programs
-
-
Botnet cyberattack costs Japanese company 300 million yen
There is a new type of blackmail in Japan: Hackers use botnets in denial-of-service attacks on companies’ computers — ending the attacks only when hefty ransom is paid
-
-
FEMA will be aggregator/gateway for CMAS
FEMA said it will be the aggregator and gateway for the Commercial Mobile Alert System, a voluntary nationwide emergency alert system
-
-
Breakthrough: Reading fingerprints even after they are gone
The name is Bond, John Bond (of Leicester University, that is): Researchers at Leicester develop a fingerprints visualization technique which would allow reading a fingerprint even after the print itself has been removed; new method would allow solving decade-old unsolved cases
-
More headlines
The long view
How DHS Laid the Groundwork for More Intelligence Abuse
I&A, the lead intelligence unit of the Department of Homeland Security (DHS) —long plagued by politicized targeting, permissive rules, and a toxic culture —has undergone a transformation over the last two years. Spencer Reynolds writes that this effort falls short. “Ultimately, Congress must rein in I&A,” he adds.
Southport Attacks: Why the U.K. Needs a Unified Approach to All Violent Attacks on the Public
The conviction of Axel Rudakubana for the murder of three young girls in Southport has prompted many questions about how the UK handles violence without a clear ideological motive. This case has also shown up the confusion in this area, and made clear the need for a basic reframing of how we understand murderous violence against the public today.
Strengthening School Violence Prevention
Violence by K-12 students is disturbingly common. Ensuring that schools have effective ways to identify and prevent such incidents is becoming increasingly important. Expanding intervention options and supporting K-12 school efforts in Behavioral Threat Assessment and Management (BTAM) would help.
Memory-Holing Jan. 6: What Happens When You Try to Make History Vanish?
The Trump administration’s decision to delete a DOJ database of cases against Capitol riot defendants places those who seek to preserve the historical record in direct opposition to their own government.
Evidence-Based Solutions to Protect Against Mass Attacks
Mass attacks like the New Year’s Day incident in New Orleans stir public emotion and have tragic consequences. While the investigations into this case will take time, we know from our work that there are things law enforcement and the public can do to mitigate and perhaps stop mass casualty events.