• Drone security questions raised years ago

    Questions about the security of drone communications were raised years ago; in 2004, U.S. officials raised concerns about Russia and China intercepting and manipulating video from drone aircraft, but the military believed it was facing more pressing issues; officers at the time were not concerned about communications being intercepted in Iraq or Afghanistan because they believed militants were technically unsophisticated.

  • U.S. Army working to encrypt UAV video feeds

    The Army is scrambling to secure the live video feeds from its UAVs from being intercepted by insurgents in Iraq and Afghanistan; Raven drones will be retrofitted with encryption technology as early as this month; the U.S. Air Force has known for more than a decade that the live video feeds from its unmanned aerial vehicles can be intercepted by the enemy but opted not to do anything about it until this year.

  • Pentagon says U.S. fixed drones hacked by Iraqi insurgents

    Iraqi insurgents, using a $25.95 off-the-shelf commercial application, were able to intercept communication between U.S. surveillance UAVs and the UAVs’ command center; the hacking was discovered when the U.S. military found files of intercepted drone video feeds on laptops of captured militants; U.S. soldiers discovered “days and days and hours and hours of proof,” one U.S. officer said; the same hacking technique is known to have been employed in Afghanistan; the U.S. government has known about the UAV communication flaw since the 1990s, but assumed its adversaries would not be able to take advantage of it.

  • Interim U.K. CCTV regulator is appointed

    The U.K. government appointment of an interim CCTV regulator in an effort to improve the public’s power in regards to the technology; the regulator will advise the government on matters surrounding the use of CCTV in public places, including the need for a regulatory framework.

  • Michigan in cyber-security partnership with DHS

    Michigan will deploy EINSTEIN 1, the DHS-run cyber security system which all federal agencies are required to use; EINSTEIN 1 automates the collection and analysis of computer network security information from participating agency and government networks to help analysts identify and combat malicious cyber-activity

  • DHS invites Kiwi research cooperation

    A DHS representative visited New Zealand to explore research collaboration with New Zealand institution; of special interest to DHS is work done at the Human Interface Technology (HIT) Lab at Canterbury University about finding new ways of interacting with large amounts of data, particularly unstructured data — enabling zettabytes (10 to the power 21 bytes) of data to be economically represented in ways that make patterns such as clusters of similarity and outliers readily appreciable by the human eye.

  • IDF aims for quieter, sturdier UAVs

    The IDF has issues an RFP for a stealthy UAV; the quiet UAV will be attached to battalions in the theater to provide surveillance on a tactical, pinpointed level; also, in an effort to increase its intelligence-gathering capabilities, the IAF will in the coming months establish a new squadron of Heron TP UAVs, called the Eitan, manufactured by IAI

  • Russia wants more Israeli spy UAVs

    Russia tried, but failed, to develop its own fleet of advanced UAVs; it has purchased a dozen UAVs from Israel already, and now wants Israel to sell it the most advanced UAVs in Israel’s arsenal; the Russian publicly say that they will reverse-engineer the technology, and Israel is going along because this the price the Russians demanded for not supplying Iran with advanced S-300 air defense systems

  • CBP readies maritime UAV

    To increase the long-range reconnaissance capabilities over water, the U.S. Coast Guard and the U.S. Customs and Border Protection take deliver of a maritime variant of the Predator B UAV; the Predator B UAV has already proven its value to homeland security over the U.S. land borders and the Great Lakes region

  • U.S. Air Force offers more details on stealth UAV

    After much speculation and many rumors, the USFA reveals that it has been using a new-design UAV — deep, fat centerbody blended into the outer wings – for surveillance missions in Afghanistan; observers note that with its low-observable design, the aircraft could be useful for flying the borders of Iran and peering into China, India, and Pakistan for useful data about missile tests and telemetry, as well as gathering signals and multi-spectral intelligence

  • Columbus debates security cameras' costs

    The mayor of Columbus, Ohio, wants CCTVs installed in the city; a $250,000 deal with a consulting firm has been approved to study the issue, and a $1.25 million pilot project is likely to move forward; still, civil libertarians ask whether this is a wise – and effective — investment

  • MIT researchers develop a smart anchor which mimics the razor clam

    The razor clam is about seven inches long by an inch wide, but it can dig into the ocean floor at a rate of about a centimeter a second; researchers also say that in a measure of anchoring force, or how hard you pull before an anchor rips out of the soil compared to the energy required to embed the anchor, razor clams beat everything, including the best anchors, by at least a factor of 10

  • "Fingerprinting" RFID tags will prevent counterfeiting

    RFID tags embedded in objects will become the standard way to identify objects and link them to the cyberworld; trouble is, it is easy to clone an RFID tag by copying the contents of its memory and applying them to a new, counterfeit tag, which can then be attached to a counterfeit product — or person, in the case of these new e-passports; researchers develop an electronic fingerprinting system to prevent this from happening

  • U.S. will not arm drones flying reconnaissance missions over Gulf of Aden -- yet

    The governments of the United States and the Seychelles agreed to use Mahé regional airport as a base for U.S. UAVs flying over the Gulf of Aden in an effort to gather intelligence on Somali pirates; the U.S. says it is not currently considering arming the UAVs

  • U.S. Navy's PANDA technology to detect "deviant" ships

    There are tens of thousands of ships on the high seas every day, carrying millions of containers, entering and leaving hundreds of ports in dozens of countries; monitoring this vast amount of traffic to make sure that none of the containers is carrying WMDs is humanly impossible; Lockheed Martin has developed the PANDA Maritime Domain Awareness program to help the U.S. Navy and intelligence community keep a closer eye on the global maritime traffic