-
U.K. revives sweeping digital surveillance scheme
The U.K. government has revived a sweeping surveillance scheme killed by its Labor predecessor last December; the scheme will require that every e-mail, phone call, and Web site visit be recorded and stored, allowing the security and police authorities to track every phone call, e-mail, text message, and Web site visit made by the public if they argue it is needed to tackle crime or terrorism; the information will include who is contacting whom, when, and where — and which Web sites are visited, but not the content of the conversations or messages
-
-
DARPA awards additional $11 million for video search technology
As a result of advancements in intelligence gathering technologies (think UAVs), the U.S. military and intelligence community have been accumulating video archives over the past decade which make YouTube look puny; it is not only the number of pictures, but their quality: mere HD movies and TV are small and tightly compressed compared to the high resolution, full-motion imagery which pours in like an avalanche from every Predator or Reaper drone — and dozens of these surveillance drones are airborne above southwest Asia every minute of every day; DARPA is looking for an effective, automated video search technology
-
-
Indian government: Google, Skype will follow BlackBerry in being forced to open networks
The Indian government, in a meeting last month with representatives of network operators and Internet service providers, said that after RIM was forced to open BlackBerry-based communication to government eavesdropping, Google and Skype would be asked to do the same — or face bans on some of their services in India; It is unlikely that the Indian government is interested in Google’s search business, but about twenty million Indians are active on Google’s social networking service, Orkut, which encourages them to communicate with each other over Google Talk
-
-
Conflict between governments' need to know and secure comms intensifies
The tensions between the desire of government authorities to use every tool available to them to detect and prevent crime — and acts of terrorism, on the one hand, and technologies which offer privacy to businesses and individuals, on the other hand, is not new; the skirmishes between BlackBerry — and, soon, Google and Skype — and the governments of India, Saudi Arabia, and UAE are but the latest round in this decades-old conflict
-
-
Deep judicial disagreements over increased police use of GPS surveillance
The U.S. Court of Appeals for the District of Columbia on 6 August overturned a drug-trafficking conviction because the police, without a warrant, placed a GPS tracking device on the suspect’s car; the decision contradicted decisions in three similar GPS-related cases by appellate panels in Chicago, St. Louis, and San Francisco; there are fierce judicial disagreements on the issue: Judge Douglas Ginsburg, who oppose GPS surveillance without a warrant, writes that “Prolonged surveillance reveals types of information not revealed by short-term surveillance, such as what a person does repeatedly, what he does not do, and what he does ensemble;” Judge Richard Posner, who says warrants are not necessary for GPS surveillance, says that the Fourth Amendment “cannot sensibly be read to mean that police shall be no more efficient in the 21st century than they were in the 18th”; Chief Judge Alex Kozinski characterized the GPS tracking as “creepy and un-American” and contended its capabilities handed “the government the power to track the movements of every one of us, every day of our lives”
-
-
U.S. Army to buy additional explosive disposal robots
Boeing, iRobot receive a follow-on order for 94 additional explosive disposal ground robots, bringing to total number of robots the U.S. Army has ordered to 323; the robot has the ability to perform reconnaissance during extremely hazardous explosive disposal missions involving unexploded ordnance and improvised explosive devices
-
-
Wikileaks case exposes security vulnerabilities of the digital age
Massive leak of documents to Wikileaks highlights the security challenges of the digital age, when gigabytes of stolen data can be shared in one click; the digital communications revolution, while bringing huge benefits to society overall, also raised security concerns; the proliferation of digital media and social software is going to increase the risks of similar leaks happening; one expert says: the Pentagon, like any organization, is going to have “bad actors” — insiders who turn against their employer — “but now it’s a lot easier for them to do things like this”
-
-
Sophisticated crime software helps police predict violent offences
“Minority Report”-style technology being tested by two British forces following success in the United States; the system, known as CRUSH (Criminal Reduction Utilizing Statistical History) evaluates patterns of past and present incidents, then combines the information with a range of data including crime reports, intelligence briefings, offender behavior profiles, and even weather forecasts
-
-
U.S. military to adopt NFL's instant replay technology
U.S. Air Force drones collected roughly 1,800 hours of video a month in Iraq and Afghanistan in 2009, nearly three times as much video than in 2007; sifting through this growing mountain of information is difficult, so the military wants to use the same instant replay technology used in professional football games; after all, U.S. broadcasters handle 70,000 hours daily of video
-
-
London police train private security guards to report suspicious behavior
Private security guards in London are trained by the police to be on the look out for — and report — suspicious behavior; this behavior includes individuals making sketches near buildings, taking photographs and recording video footage, even if they appear to be legitimate tourists; stateside, LAPD. officers are already required to fill out a suspicious activity report when they observe one of more than forty different types of behavior; categories include taking photographs or video “with no apparent aesthetic value”
-
-
DARPA looking for automated insider threat spotter
The U.S. National Counterintelligence Strategy asserts that “Trusted insiders — are targeting the US information infrastructure for exploitation, disruption, and potential destruction”; DARPA, the Pentagon research arm, is soliciting idea for technology which will automatically spot — and eliminate — insider threat to U.S. information infrastructure
-
-
U.S. officials: Smaller terrorist attacks would be devastating
Terrorism experts say Saturday’s botched car bombing in New York’s Times Square, and other recent plots, could be a sign that militant groups, hard-hit by U.S. drone strikes targeting their leaders, were starting to opt for smaller, rather than more spectacular, terror attacks; there are about 450 commercial airports and more than 50,000 malls and shopping centers in the United States; National Intelligence Director Dennis Blair and CIA chief Leon Panetta have both warned these could be targets for attack
-
-
UAVs to be outfitted with holographic adaptive optics-based instruments
Researchers are looking into the advantages and challenges associated with using holographic adaptive optics-based instruments aboard UAV; such systems would generally improve the quality of observations these aircrafts produce
-
-
CIA to increase reliance on technology, inter-agency cooperation
CIA director Leon Panetta outline an ambitious five-year plan to improve the agency’s information gathering technologies; he also highlighted the agency’s goal to increase the number of analysts and overseas operatives fluent in another language — a problem that has plagued military and civilian intelligence officers throughout much of the last decade of war in Afghanistan and Iraq
-
-
Acoustic surveillance for border, critical infrastructure security
A Montana company offers a new way to secure U.S. borders and critical infrastructure facilities: TerraEchos teams up with IBM to embed new IBM technology into a system of fiber-optic sensors; the sensors are capable of gathering real-time acoustic information, alerting of a possible security breach in remote and often unmanned areas
-
More headlines
Who's online
The long view
Fusion centers, created to fight domestic terrorism, suffering from mission creep: Critics
Years before the 9/11 attacks, law enforcement agencies throughout the country, alarmed by the 1995 Oklahoma City bombing, began to monitor and investigate signs of domestic terrorism. That increased monitoring, and the need for coordination among various law enforcement agencies, gave rise to the fusion centers. A new report, which is supported by current and former law enforcement and government officials, concludes that post-9/11, fusion centers and the FBI teams which work with them shifted their focus from domestic terrorism to global terrorism and other crimes, including drug trafficking.Experts say that at a time when the number of domestic terrorism threats, many of which are linked to right-wing extremist groups, is surging, law enforcement must refocus their attention on the threats from within.