-
New Zealand to use biometrics to monitor immigration
Technology will allow border control staff to conduct biometric checks on inbound and outbound passengers
-
-
New rules for private guards
Some 1,000 security companies operate in Greece, employing 50,000 people and making 90 million euros a year; the Greek parliament wants to tighten control of these companies
-
-
New crime: Forged eye biometrics recognition stamps
How accurate is iris scanning biometric technology? read on: Three individuals are arresed at the Dubai airport for smuggling forged eye biometrics recognition stamps; the criminals’ goal: to facilitate the entry to the UAE of individuals who were previously banned
-
-
-
ACLU: Terrorist Watch List hits one million names
ACLU claims terrorist watch list reached one million names; launches online watch list complaint form
-
-
TSA: ACLU’s terrorist watch list facts and figures are a myth
The Transportation Security Administration refutes the facts and figures used by the ACLU in the latter’s claim that the list is now 1-million strong
-
-
Cyber cafes to be monitored in India
Indian police places biometric systems and CCTV in more than 150 cyber cafes in order to catch cyber criminals in the act
-
-
Cybercrime gangs highly structured
The chain of command of a cybercrime gang is not unlike the Mafia, an evolution which shows how online crime is becoming a broad, well-organized endeavor
-
-
Powerful laser blinds Moscow partygoers
Organizers of a rave party north of Moscow use a powerful laser to beam the partygoers, causing retinal burns and permanent eye damage to many; engineers accuse party organizers of “technical illiteracy”
-
-
U.S. intelligence services aware of vast Chinese espionage campaign
Multifaceted Chinese espionage campaign in the United States and other Western countries aims not only to steal military secrets, but also industrial secrets and intellectual property in order to help Chinese companies better compete in the global economy; Chinese government and state-sponsored industries have relied not only on trained intelligence officers, but also on the Chinese diaspora — using immigrants, students, and people of second- and third-generation Chinese heritage
-
-
Ground fighting and its tactical applications
Every grappler, Jiu-Jitsu practitioner, and wrestler thinks that if he can take the fight to the ground, he will win; there are, however, a few inherent problems with this approach
-
-
An HS Daily Wire conversation with Walter Hamilton of the International Biometrics Industry Association (IBIA)
Walter Hamilton, chairman of the Board of Directors of IBIA, talks about different biometric technologies, new and innovative biometric approaches, the role of biometric in security and commerce, biometrics in the theater of battle, and more
-
-
Banks' PIN codes susceptible to hackers' theft
Network of PIN codes’ thieves nets millions of dollars; hackers are targeting the ATM system’s infrastructure, which is increasingly built on Microsoft’s Windows operating system and allows machines to be remotely diagnosed and repaired over the Internet
-
-
Air passnegers now must show an ID to be allowed on board
Until this past weekend, a passenger who agreed to secondary search of his or her body and baggage at airport check-points was allowed to board even if they did not have — or refused to show — an ID; this policy was changed on Saturday
-
-
First conviction under the Economic Espionage Act of 1996
Chinese-born software engineer sentenced for stealing industrial and military secrets on behalf of the PRC; first conviction under a 1996 law for misappropriating a trade secret with the intent to benefit a foreign government
-
More headlines
The long view
Need for National Information Clearinghouse for Cybercrime Data, Categorization of Cybercrimes: Report
There is an acute need for the U.S. to address its lack of overall governance and coordination of cybercrime statistics. A new report recommends that relevant federal agencies create or designate a national information clearinghouse to draw information from multiple sources of cybercrime data and establish connections to assist in criminal investigations.
Twenty-One Things That Are True in Los Angeles
To understand the dangers inherent in deploying the California National Guard – over the strenuous objections of the California governor – and active-duty Marines to deal with anti-ICE protesters, we should remind ourselves of a few elementary truths, writes Benjamin Wittes. Among these truths: “Not all lawful exercises of authority are wise, prudent, or smart”; “Not all crimes require a federal response”; “Avoiding tragic and unnecessary confrontations is generally desirable”; and “It is thus unwise, imprudent, and stupid to take actions for performative reasons that one might reasonably anticipate would increase the risks of such confrontations.”
Luigi Mangione and the Making of a ‘Terrorist’
Discretion is crucial to the American tradition of criminal law, Jacob Ware and Ania Zolyniak write, noting that “lawmakers enact broader statutes to empower prosecutors to pursue justice while entrusting that they will stay within the confines of their authority and screen out the inevitable “absurd” cases that may arise.” Discretion is also vital to maintaining the legitimacy of the legal system. In the prosecution’s case against Luigi Mangione, they charge, “That discretion was abused.”
Are We Ready for a ‘DeepSeek for Bioweapons’?
Anthropic’s Claude 4 is a warning sign: AI that can help build bioweapons is coming, and could be widely available soon. Steven Adler writes that we need to be prepared for the consequences: “like a freely downloadable ‘DeepSeek for bioweapons,’ available across the internet, loadable to the computer of any amateur scientist who wishes to cause mass harm. With Anthropic’s Claude Opus 4 having finally triggered this level of safety risk, the clock is now ticking.”
How DHS Laid the Groundwork for More Intelligence Abuse
I&A, the lead intelligence unit of the Department of Homeland Security (DHS) —long plagued by politicized targeting, permissive rules, and a toxic culture —has undergone a transformation over the last two years. Spencer Reynolds writes that this effort falls short. “Ultimately, Congress must rein in I&A,” he adds.