• Bullet-tagging technology to help combat crime

    U.K. researchers develop new bullet-tagging technology: tags are applied to gun cartridges by being embedded in cartridge coatings made from polylactic acid, sucrose ester, and tetrahydrofuran; the tags attach themselves to the hands or gloves of anyone handling the cartridge, but a portion of the tag remains on the cartridge even after it has been fired, making it possible to make a definite link between a cartridge fired during a crime and whoever handled it

  • 2001 anthrax attacks chief suspect kills himself

    Bruce Ivins, the FBI’s chief suspect in the 2001 anthrax attacks — after the previous main suspect, Steven Hatfill, has been exonerated — commits suicide; scientist kills himself after being told that the government was about to file criminal charges against him

  • Sharp increase in "zero-day" exploits

    Cyber-criminals are adopting new automation techniques and strategies that allow them to exploit vulnerabilities much faster than ever before

  • New simulation tool for handling hazardous situations

    Irish, Israeli companies develop new simulation tool which immerse trainees in a scene which has been designed for them; new tool will help first responders and law enforcement familiarize themselves with situations before they occur

  • view counter
  • New Zealand to use biometrics to monitor immigration

    Technology will allow border control staff to conduct biometric checks on inbound and outbound passengers

  • New rules for private guards

    Some 1,000 security companies operate in Greece, employing 50,000 people and making 90 million euros a year; the Greek parliament wants to tighten control of these companies

  • view counter
  • New crime: Forged eye biometrics recognition stamps

    How accurate is iris scanning biometric technology? read on: Three individuals are arresed at the Dubai airport for smuggling forged eye biometrics recognition stamps; the criminals’ goal: to facilitate the entry to the UAE of individuals who were previously banned

  • US-VISIT

    James Jasinski, CEO, Cogent Systems, comments on a young program that is discharging an immense responsibility

  • ACLU: Terrorist Watch List hits one million names

    ACLU claims terrorist watch list reached one million names; launches online watch list complaint form

  • TSA: ACLU’s terrorist watch list facts and figures are a myth

    The Transportation Security Administration refutes the facts and figures used by the ACLU in the latter’s claim that the list is now 1-million strong

  • Cyber cafes to be monitored in India

    Indian police places biometric systems and CCTV in more than 150 cyber cafes in order to catch cyber criminals in the act

  • Cybercrime gangs highly structured

    The chain of command of a cybercrime gang is not unlike the Mafia, an evolution which shows how online crime is becoming a broad, well-organized endeavor

  • Powerful laser blinds Moscow partygoers

    Organizers of a rave party north of Moscow use a powerful laser to beam the partygoers, causing retinal burns and permanent eye damage to many; engineers accuse party organizers of “technical illiteracy”

  • U.S. intelligence services aware of vast Chinese espionage campaign

    Multifaceted Chinese espionage campaign in the United States and other Western countries aims not only to steal military secrets, but also industrial secrets and intellectual property in order to help Chinese companies better compete in the global economy; Chinese government and state-sponsored industries have relied not only on trained intelligence officers, but also on the Chinese diaspora — using immigrants, students, and people of second- and third-generation Chinese heritage

  • Ground fighting and its tactical applications

    Every grappler, Jiu-Jitsu practitioner, and wrestler thinks that if he can take the fight to the ground, he will win; there are, however, a few inherent problems with this approach