-
Sandia teams with industry to improve human-data interaction
Intelligence analysts working to identify national security threats in warzones or airports or elsewhere often flip through multiple images to create a video-like effect. They also may toggle between images at lightning speed, pan across images, zoom in and out or view videos or other moving records. These dynamic images demand software and hardware tools that will help intelligence analysts analyze the images more effectively and efficiently extract useful information from vast amounts of quickly changing data. Sandia Lab and EyeTracking, Inc. will research and develop tools to improve how intelligence analysts gather visual information.
-
-
Sound waves disable drones by disrupting the drone’s gyroscope
Hobbyists’ drones are becoming a growing national nuisance – violating people’s privacy, breaching security-sensitive airspace, disrupting attempts by firefighters to bring wildfires on the West Coast under control, and more. South Korean scientists report that sound waves could offer an effective protection from drones.
-
-
Bill requiring Internet companies to report “terrorist activity” opposed by digital rights groups
A coalition of digital rights groups and trade associations last week released a joint letter opposing a proposal in the Senate to require U.S. tech firms to police the speech of their users and to report any signs of apparent “terrorist activity” to law enforcement. The letter says that this sweeping mandate covers an undefined category of activities and communications and would likely lead to significant over-reporting by communication service providers. The letter urged senators to remove the “terrorist activity” reporting requirements from the Intelligence Authorization Act (S. 1705).
-
-
New air traffic management system to make drone air traffic safer
Researchers are now working on a new, low-altitude traffic management system to keep fast-moving flyers safer as they cruise through increasingly crowded skies. A handful of organizations are participating in the first phase of the NASA Ames Unmanned Aerial Systems Traffic Management project to enable safer use of low-altitude airspace, of 500 feet and below, where autonomous aerial vehicles, helicopters, gliders, and other general aircraft are operating.
-
-
DHS warns local law enforcement to watch for drones used by terrorists, criminals
DHS has circulated an intelligence assessment to police agencies across the United States warning about drones being used as weapons in an attack. The bulletin went out Friday and warned state and municipal law enforcement agencies that terrorist and criminals may begin to use drones to advance their goals. “Emerging adversary use of Unmanned Aircraft Systems [UAS] present detection and disruption challenges,” the intelligence bulletin warns.
-
-
German prosecutors charge news Web site with treason over leaks of surveillance plan
German authorities have launched a treason investigation into a news Web site which had reported on government plans to broaden state surveillance of online communications. This is the first time in more than fifty years that German journalists are facing treason charges for publishing leaked documents.
-
-
NSA to destroy millions of American call records collected under controversial program
The director of national intelligence said on Monday that the NSA would no longer examine call records collected by the NSA in its controversial bulk collection program before the June reauthorization of the Patriot Act which prohibits such collection. Bulk records are typically kept for five years, but the director said that although the records in the NSA database were collected lawfully, they would not be examined, and would soon be destroyed.
-
-
Journalists’ computer security tools lacking in a post-Snowden world
Edward Snowden’s leak of classified documents to journalists around the world about massive government surveillance programs and threats to personal privacy ultimately resulted in a Pulitzer Prize for public service. Though Snowden had no intention of hiding his identity, the disclosures also raised new questions about how effectively news organizations can protect anonymous sources and sensitive information in an era of constant data collection and tracking. Researchers found a number of security weaknesses in journalists’ and news organizations’ technological tools and ad-hoc workarounds.
-
-
In first case of its kind, UK high court rules surveillance law unconstitutional
Controversial surveillance legislation hustled through parliament last summer has been ruled unlawful by the U.K. High Court, which argued that the vague terms and descriptions of powers in the Data Retention and Investigatory Powers Act 2014 (DRIPA) renders the act incompatible with human rights under European law. DRIPA, one in a series of laws supporting controversial surveillance powers passed by successive U.K. governments, establishes the principle by which anti-terrorism measures and national security priorities take precedence over human rights considerations. However, the judgment rules that the EU Charter of Fundamental Rights must take precedence, and in doing so requires the U.K. government to undo its own act of parliament — a significant precedent by a British court.
-
-
FAA investigating teen’s gun-toting drone
An 18-year-old Connecticut man may have run afoul of federal aviation regulation after posting a video on YouTube showing a small drone hovering about ten of fifteen feet above ground in a wooded area while a gun strapped to it was firing shots. The FAA said Tuesday it was investigating whether Austin Haughwout of Clinton violated the agency’s regulations, which ban the careless or reckless operation of a model aircraft.
-
-
Questions raised about Kaspersky’s close ties to the Russian government
Kaspersky Lab is a Moscow-based company which sells security software, including antivirus programs. The company has 400 million customers, and it ranks sixth in revenue among security-software makers. Since 2012, the company began to replace senior managers with people with close ties to Russia’s military or intelligence services. The company is also helping the FSB, the KGB’s successor, in investigating hacks – and people in the know say the company provides the FSB with the personal data of customers. The company’s actual or perceived alliances have made it a struggle to win U.S. federal contracts.
-
-
New U.K. surveillance review calls for a fresh start in the law for interception of communications
After a year of investigation and consultation, the U.K. Independent Surveillance Review has delivered its conclusions to Prime Minister David Cameron. The authors presented their report, A Democratic License to Operate, yesterday (14 July 2015). The Review shows how a democracy can combine the high level of security the public has a right to expect, and also ensure the respect for privacy and freedom of speech that are the foundations of a democracy. The panel unanimously calls on government, civil society, and industry to accept its recommendations and work together to put them into practice.
-
-
Drones contribute to improving crops
Researchers have used a drone to measure the temperature, humidity, luminosity, and carbon dioxide concentration in a greenhouse. The capacity of an aerial vehicle to move in three-dimensional space, and the possibility to place the sensor at any point, have clear advantages compared to other alternatives such as sensor networks. By building maps of environmental variables, the drones could help achieve optimal conditions for plant growth.
-
-
Giving government special access to data poses major security risks
In recent months, government officials in the United States, the United Kingdom, and other countries have made repeated calls for law-enforcement agencies to be able to access, upon due authorization, encrypted data to help them solve crimes. Beyond the ethical and political implications of such an approach, though, is a more practical question: If we want to maintain the security of user information, is this sort of access even technically possible? A report by cybersecurity and encryption experts says that whether “backdoor” or “front-door,” such mechanisms “pose far more grave security risks, imperil innovation on which the world’s economies depend, and raise more thorny policy issues than we could have imagined when the Internet was in its infancy.”
-
-
Privacy vs. security debate intensifies as more companies offer end-to-end-encryption
A long running debate has now come to the fore with greater urgency. The tension between the privacy that encryption offers, and the need for law enforcement and national security agencies to have access to secured and encrypted e-mail, has become more acute in the last two years. The revelations of Edward Snowden about the post-9/11 reach and scope of surveillance by intelligence agencies and law enforcement, have caused some tech giants to offer encrypted services to their customers – encrypted services which enhance customers’ privacy protection, but which at the same time make it impossible for law enforcement and intelligence services to track and monitor terrorists and criminals. “Our job is to find needles in a nationwide haystack, needles that are increasingly invisible to us because of end-to-end encryption,” FBI director James Comey told lawmakers in recent hearing on the Hill.
-
More headlines
The long view
How DHS Laid the Groundwork for More Intelligence Abuse
I&A, the lead intelligence unit of the Department of Homeland Security (DHS) —long plagued by politicized targeting, permissive rules, and a toxic culture —has undergone a transformation over the last two years. Spencer Reynolds writes that this effort falls short. “Ultimately, Congress must rein in I&A,” he adds.