-
Fort Lauderdale attorney took extra security measures
Under-investigation Fort Lauderdale attorney Scott Rothstein surrounded himself with elaborate security measures which included dozens of hidden microphones stashed in the ceiling along with security cameras, surveillance cameras at his home, double-doors, private elevators, and private security detail for his family; he also paid for a security guard at his favorite restaurant (Bova Prime on Las Olas Boulevard), and carried a gun in an ankle holster underneath his tailored pants
-
-
U.K. regulator warns on school CCTV schemes
A Manchester school installed CCTVs in school during the holidays, without notifying parents; the cameras were filming students changing for PE classes — and the pictures were kept on the schools’ computers; Information Commissioner says that there is no need for cameras to be on during the day, when the school is staffed
-
-
Problems continue for virtual U.S.-Mexico border fence
With most of the 661-mile border fence complete, DHS is gearing up for testing a section of the fence near Tuscon; if the system survives this first round, it will be handed off to the Border Patrol in early 2010, who will put the technology through some real world scenarios
-
-
Canadian government finds support for Internet surveillance scheme
The Canadian federal government wants to broaden its Internet surveillance capabilities; the Security Intelligence Review Committee, the watch-dog over Canada’s spy agencies, supports the idea
-
-
Israel says it will continue to listen-in on Hezbollah communication
Hezbollah has its own communication network in Lebanon, separate and independent from the government’s sanctioned carrier networks; Israel says that bugging the organization’s network does not amount to a violation of Lebanon’s sovereignty
-
-
Robust hierarchical metropolitan quantum cryptography network
The security of a majority of classical cryptography is based on the complexity of the cipher algorithms and the development of distributed computing and specific hacking chips; this may no longer be sufficient, as quantum computing has become a serious threat to classical cryptography; the solution: quantum encryption
-
-
UK.gov's G Cloud may have security silver lining after all
Cloud computing offers many benefits, but enhanced security is not one of them — or is it? An expert says that the emergence of cloud computing is making it possible to take a new approach to security; until now, the U.K. government has kept its work on information security in specialist bodies such as GCHQ and CESG, separate from the development of business functions; “The cloud gives us the opportunity to get the specification right before we get too far down the track,” he says
-
-
The personal spy: the smartphone in your pocket may be spying on you, II
The advances in smartphone technology could well be exploited in much the same way that e-mail and the Internet can be used to “phish” for personal information such as bank details
-
-
U.K. abandons DNA retention project
At present in England and Wales, DNA is taken from every person arrested; at the last count the National DNA Database contained 986,000 profiles belonging to people never convicted of a crime; the DNA records were supposed to be kept for twelve years; the Home Office says it is now reconsidering this policy
-
-
The personal spy: the smartphone in your pocket may be spying on you, I
The advances in smartphone technology could well be exploited in much the same way that e-mail and the Internet can be used to “phish” for personal information such as bank details
-
-
Surveillance gear-equipped beetles to be the U.S. military's latest weapon
A team of scientists has implanted miniature neural and muscle stimulation systems into beetles to enable their flight to be remotely controlled; beetles can be equipped with surveillance gear and fly over enemy positions
-
-
MIT researchers develop powerful object recognition system
The new object recognition system could allow computers in the future automatically to search through hours of video footage for a particular two-minute scene; intelligence analysts should be happy
-
-
ioimage, Milestone in a technology partnership
ioimage intelligent cameras and encoders can now be integrated within the Milestone XProtect video management open platform, offering IP video surveillance capabilities to enterprises of all sizes
-
-
More demos set for nine-lived Fire Scout
A Northrop Grumman UAV — the MQ-8B Fire Scout — refuses to die; it was part of the now-canceled Future Combat Systems (FCS) program, but the system stubbornly hangs on
-
-
Canon eyes 10 percent share of India's security surveillance market
The size of India’s digital security surveillance market is estimated to be Rs 100 crore; Canon wants to account for 10 percent of that market by December 2010; market is growing at a rate of 45 percent annually
-
More headlines
The long view
How DHS Laid the Groundwork for More Intelligence Abuse
I&A, the lead intelligence unit of the Department of Homeland Security (DHS) —long plagued by politicized targeting, permissive rules, and a toxic culture —has undergone a transformation over the last two years. Spencer Reynolds writes that this effort falls short. “Ultimately, Congress must rein in I&A,” he adds.