-
26 -- Second test of the water and Africa story codes
The sovereign citizen movement, the roots of which lie in white separatism and anti-Semitism, now welcomes non-white adherents. Especially susceptible to recruitment efforts by the movement are African Americans – called “Moorish Americans” or “Moorish Natives” by movement members – from poor and neglected neighborhoods.“They are much more reflective of the demographics of society today,” a former FBI case manager notes.
-
-
25 -- Testing the functionality of the Africa and Water story codes
The sovereign citizen movement, the roots of which lie in white separatism and anti-Semitism, now welcomes non-white adherents. Especially susceptible to recruitment efforts by the movement are African Americans – called “Moorish Americans” or “Moorish Natives” by movement members – from poor and neglected neighborhoods.“They are much more reflective of the demographics of society today,” a former FBI case manager notes.
-
-
22 -- Testof Africa and Water codes functionality
Three members of a right-wing militia have been sentenced to twelve years in prison for conspiring to use weapons of mass destruction in attacks against federal government agencies. The defendants planned to attack critical infrastructure in Georgia while motivating militia groups in other states to rise up and join them in removing government officials who they believed had exceeded their Constitutional power. The militia members planned on starting a revolution against the federal government by conducting an attack aimed at the infrastructure supporting the TSA, DHS, and FEMA.
-
-
BiometricsDHS awards $58.9 million biometric support contract to Ideal Innovations, Inc.
Arlington, Virginia-based Ideal Innovations, Inc. (I3) has been awarded a contract by the Department of Homeland Security (DHS)’s Office of Biometric Identity Management (OBIM) to provide specialized fingerprint analysis in support of OBIM’s Biometric Support Center (BSC). The BSC provides fingerprint identification services when the automated matching capabilities of DHS’s central repository cannot determine whether two sets of fingerprints match.
-
-
Face recognitionUsing “average” photo improves smartphone face recognition
Face recognition security on smartphones can be significantly improved if users store an “average” photo of themselves, according to new research. A research team found that combining different pictures of the user, rather than a single “target” image, leads to much better recognition across all kinds of daily settings.
-
-
BiomtericsBiometric technologies have failed to guarantee integrity of elections in Africa
As Nigerians voted this past weekend in the 2015 presidential elections, there were many reports of technical problems with electronic fingerprint readers, intended to verify voters’ identities before they cast their ballots.At least twenty-five African countrieshave held elections with voters using some sort of electronic voting system. Many of these efforts have failed. Experts say that African governments should not divert public funds to expensive electronic voting systems, and use these funds instead on ways to eliminate voter intimidation, post-election violence, and ballot fraud — all of which are attributes of current election periods regardless of how votes are submitted.
-
-
Visa Waiver ProgramBill would expand Visa Waiver Program despite security concerns
U.S. Representatives Joe Heck (R-Nevada) and Mike Quigley (D-Illinois) have re-introduced the Jobs Originated through Launching Travel (JOLT) Act, which aims to create American jobs by expanding the nation’s Visa Waiver Program(VWP) to more countries. Today, thirty-eight countries are included in the VWP, but with more than 3,000 European nationals flocking to Syria and Iraq to fight in the ranks of terror groups such as Islamic State (ISIS), expanding the VWP to more countries is a security concern.
-
-
VisasWith thousands of Westerners joining ISIS, visa waiver program puts U.S. at risk: Lawmakers
Security concerns are threatening the 1986 visa waiver program (VWP), which allows millions of people with (mostly) Western passports to travel to the United States for ninety days without a visa. Lawmakers argue that the program, which applies to citizens of thirty-eight countries, has created a security weakness that terrorist groups, specifically the Islamic State (ISIS), could exploit. Thousands of European citizens have traveled to Syria and Iraq to join ISIS. Security officials fear that many of them could return back to Europe, then board a U.S.-bound flight with the intent of launching an attack on American soil.
-
-
CybersecurityBiometric security could do away with passwords
With hackers and cyber thieves running rampant online, efforts to create stronger online identity protection are leading major tech firms to invest in biometric security methods. Analysts predict that 15 percent of mobile devices will be accessed with biometrics in 2015, and the number will grow to 50 percent by 2020.
-
-
Real IDIllinois scrambles to meet Real ID deadline
State officials in Illinois are working to make driver’s licenses and identification cards comply with the Real ID Act of 2005before commercial air travel restrictions are implemented in 2016. Illinois identification cards do not meet minimum standards mandated by Congress in 2005. The Real ID Act requires states to verify personal information of applicants including birth certificates. The information is then electronically scanned and stored in a federal database, and data can be shared among states and the federal government.
-
-
BiometricsFBI’s biometric data center key to identifying Jihadi John
The FBI is unlikely to release details of how, working with allies in the United Kingdom, it managed to accomplish the task of identifying “Jihadi John” with only video footage of the suspect’s hidden face and a voice with a British accent. Identifying Mohammed Emwazi, a Kuwaiti-born, British-educated man in his mid-20s, was likely done at the FBI’s Criminal Justice Information Services Division(CJIS), which houses the bureau’s Biometric Center of Excellence(BCE). At BCE, the FBI uses the $1.2 billion dollar Next Generation Identification(NGI) software to scan photos, aliases, physical traits, fingerprints, and voiceprints. The software is interoperable with the Pentagon’s Automated Biometric Identification System(ABIS) and DHS’s Automated Biometric Identification System(IDENT).
-
-
CrimeHair dye “CSI” could help police solve crimes
Criminals with a penchant for dyeing their hair could soon pay for their vanity, as scientists have found a way to analyze hair samples at crime scenes to rapidly determine whether it was colored and what brand of dye was used. Researchers showed that surface-enhanced Raman spectroscopy (SERS) could be used rapidly to confirm whether hair samples, even microscopic ones, were dyed and what brand of colorant was used.
-
-
CybersecurityGrants competition to improve security, privacy of online identity verification systems
The National Institute of Standards and Technology (NIST) is launching a competition for a fourth round of grants to pilot online identity verification systems that help improve the privacy, security, and convenience of online transactions. The pilot grants support the National Strategy for Trusted Identities in Cyberspace (NSTIC), a White House initiative launched in 2011. NSTIC’s goal is to improve trust online through the creation of a vibrant “Identity Ecosystem,” in which individuals and organizations are able to better trust one another because they follow agreed-upon standards and processes for secure, privacy-enhancing and interoperable identity solutions online.
-
-
Visa Waiver ProgramLawmakers want more security features to be added to Visa Waiver Program
The recent attacks in Paris have led U.S. lawmakers to propose restrictions on, or adding more security to, the U.S. Visa Waiver Program(VWP), which allows citizens from thirty-eight countries to travel to the United States for up to ninety days without obtaining a traditional visa. Concerns now revolve around the threat that some of the roughly 3,000 European nationals who have traveled to Syria to fight alongside Islamic extremist groups, and are now equipped with skills to launch an attack, may return to Europe and then book a flight to the United States to launch an attack.
-
-
AuthenticationSmart keyboard can tell who you are – and also powers and cleans itself
In a novel twist in cybersecurity, scientists have developed a self-cleaning, self-powered smart keyboard that can identify computer users by the way they type. The smart keyboard can sense typing patterns — including the pressure applied to keys and speed — that can accurately distinguish one individual user from another.
-