-
Atlanta’s rapid transit deploys AI video analytics to bolster public safety
The Metropolitan Atlanta Rapid Transit Authority (MARTA) is deploying Behavioral Recognition Systems’ AISight, an artificial intelligence-based analytics solution that teaches itself to recognize and alert on unexpected patterns within massive volumes of data.
-
-
U.S. opens a second drone base in Niger
The Pentagon has reached an agreement with the government of Niger to open a second U.S. drone base in the landlocked country. The base, in the city of Agadez, will help the U.S. Air Force track Islamist militants who have gained control of remote parts of North and West Africa. U.S. and French troops already operate out of a military base in Niamey, Niger’s capital, where drones are set to conduct reconnaissance flights throughout the region.
-
-
People in leadership positions more willing to sacrifice privacy for security
People with higher job status may be more willing to compromise privacy for security reasons and also be more determined to carry out those decisions, according to researchers. This preoccupation with security may shape policy and decision-making in areas ranging from terrorism to investing, and perhaps cloud other options, said the author of the new study, adding: “What may get lost in the decision-making process is that one can enhance security without the negative impact on privacy.”
-
-
Using drones in law enforcement work
Using unmanned flight systems for domestic surveillance can provide emergency responders information during fires, earthquakes, storms, and man-made disasters, said John Hill, director of the Indiana Department of Homeland Security.He said that the general public is open to the use of unmanned systems when informed about their use.
-
-
NSA, FBI monitored e-mails of prominent Muslim American leaders, attorneys
The NSA and FBI monitored the e-mails of prominent Muslim American leaders and attorneys, including the head of the largest American Muslim civil rights group, The Intercept reported yesterday. Critics of the surveillance programs of the NSA and other government agencies said the revelations proved their contention that these programs should be more closely monitored. The critics say that in order to obtain FISA court approval for the surveillance, the government alleged that these activists were agents of foreign powers. The critics also note that the monitoring of lawyers’ e-mails raises concerns that some of the information collected may be protected by the attorney-client privilege, which the intelligence agencies are bound to respect.
-
-
Firefighters mull using drones in fighting wildfires
Federal wildland firefighting officials are exploring the deployment of drones to assist in surveillance and reconnaissance missions during a wildfire. Drones sent to survey fire patterns during a wildfire could help keep firefighters out of risky situations by providing real-time information to officials on the ground. Few wildfire officials have used drones in the line of duty, and managers with the U.S. Bureau of Land Management(BLM) and U.S. Forest Servicesay that while the technology has potential, agencies do not have the budget and have not developed protocols to integrate drones into regular firefighting operations.
-
-
Supreme Court cites NIST guidelines in ruling on cell phone searches
As digital technology transforms twenty-first century life, questions about privacy rights abound. The U.S. Supreme Court ruled on one such question in late June: if you are arrested, can the police search your cell phone without first obtaining a warrant? No, according to the 25 June 2014 ruling in Riley v. California. “Modern cell phones are not just another technological convenience. With all they contain and all they may reveal, they hold for many Americans ‘the privacies of life,’ … The fact that technology now allows an individual to carry such information in his hand does not make the information any less worthy of the protection for which the Founders fought,” Chief Justice John Roberts wrote for the majority.
-
-
License plate readers still to reach their full potential
Systems which automatically read automobile license plates have the potential to save police investigative time and increase safety, but law enforcement officials must address issues related to staffing, compatibility and privacy before the technology can reach its full potential, according to a new study. Addressing these issues will require a clear understanding of the current and potential value of the systems to criminal justice agencies.
-
-
NSA shelved collection program which could have prevented 9/11 attacks: Critics
Fourteen years ago the NSA research unit developed a collection program called Thin Thread which, its authors say, could have detected the perpetrators of the 9/11 attacks and prevented it. Critics of the program agreed it was a good program, but that it picked up more Americans than the other systemsthen being considered, and was thus deemed too invasive of Americans’ privacy. In the fall of 2000 General Michael Hayden, then-director of the NSA, decided against the program largely because of the legal implications.
-
-
Current White House drone policy a “slippery slope”: Report
An 81-page report, released last Thursday by the Stimson Center and authored by a bipartisan panel of former intelligence and defense officials, warned that the present targeted drone strike policy could represent a “slippery slope” toward never-ending war. The report stresses that drone operations should always be “having a positive effect on U.S. national security and not trading short-term gains for more negative longer-term strategic consequences.”
-
-
Leaked documents reveal law enforcement hacking methods
Through the sourcing of a leaked documents cache from the Italian firm Hacking Team, members of the University of Toronto’s Citizen Lab have revealed the methods of law-enforcement hackers. While much of Snowden’s revelations concerned broad international surveillance, documents from Hacking Team reveal more specific methods such as the actual techniques for tapping phones and computers to operate as eavesdropping devices.
-
-
Privacy advocates worried about new Senate cybersecurity bill
Privacy groups are concerned that a new Senate cybersecurity bill could give the NSA unrestricted access to personal information of Americans. The Cybersecurity Information Sharing Act (CISA), a counterpart to the Cyber Intelligence Sharing and Protection Act (CISPA) which passed the House in 2013, would create a “gaping loophole in existing privacy law,” several privacy advocacy groups wrote in a letter to lawmakers.
-
-
U.S. needs better intelligence cooperation with African states for effective counterterrorism strategy
The U.S. focus on counterterrorism efforts in Africa will require forming long-term partnerships with nations, an all-hands-on-deck commitment from all U.S. military branches, and a strong investment in intelligence, and surveillance technologies to face significant challenges created by the continent’s size and scope. Forming intelligence partnerships with Africa’s fifty-four countries, all with their own civil and military traditions, mixed with multiple languages and cultures is complex.
-
-
Drones must be used wisely to help advance U.S. interests
A new report examines three key issue sets in the unmanned aerial vehicle (UAV) debate: defense utility, national security, and economics; ethics and law; and export controls and regulatory challenges. The report concludes that UAV technologies are here to stay. Used recklessly, UAVs can endanger U.S. interests and diminish regional and global stability. Used wisely, they can help advance U.S. national security interests in the midst of a more robust global commitment to the rule of law.
-
-
Drones are cheap, soldiers are not: a cost-benefit analysis of war
Cost is largely absent in the key debates around the use of unmanned drones in war, even though drones are a cost-effective way of achieving national security objectives. Drones will never completely replace soldiers, but the drone-vs.-human being debate is becoming less important in the current strategic climate. The operating environments where drones are deployed — countries such as Pakistan, Somalia and Yemen — do not emphasize “hearts and minds” strategies where the human element has traditionally been valued as a force multiplier. Instead, objectives in these countries involve attacks on specific individuals, with operational data obtained by signal intelligence beforehand. Human contact becomes even less desirable given that a key tactic of combatants in these weak states is attrition with the aim of creating low-level civil conflicts. The end goal of these actions is to inflict high economic costs to the adversary. As a result, this remote and analytical method of engaging militarily leads to substantial cost efficiencies.
-
More headlines
Who's online
The long view
Fusion centers, created to fight domestic terrorism, suffering from mission creep: Critics
Years before the 9/11 attacks, law enforcement agencies throughout the country, alarmed by the 1995 Oklahoma City bombing, began to monitor and investigate signs of domestic terrorism. That increased monitoring, and the need for coordination among various law enforcement agencies, gave rise to the fusion centers. A new report, which is supported by current and former law enforcement and government officials, concludes that post-9/11, fusion centers and the FBI teams which work with them shifted their focus from domestic terrorism to global terrorism and other crimes, including drug trafficking.Experts say that at a time when the number of domestic terrorism threats, many of which are linked to right-wing extremist groups, is surging, law enforcement must refocus their attention on the threats from within.