DARPA launches dragnet program to monitor drones in cities

DARPA launches dragnet program to monitor drones in cities

WHY THIS MATTERS IN BRIEF As our skies increasingly fill up with swarming drones we need ways to monitor and manage our airspaces.   Amid the rise of drones, or small Unmanned Aerial Systems (UAS), DARPA, the Pentagon’s research arm, is developing technology to provide persistent, wide-area surveillance of all...

Read more
Drone forensics is now a thing

Drone forensics is now a thing

WHY THIS MATTERS IN BRIEF Where did that drone come from? Now we know… Dunkin Donuts use drones to deliver – guess what!? Donuts. But criminals are using them to deliver much more unsavoury items into prisons. The problem has grown so fast that now one wireless and mobile technology company,...

Read more
SRI unveils Minority Report like touchless biometric technologies

SRI unveils Minority Report like touchless biometric technologies

WHY THIS MATTERS IN BRIEF Big brother biometric technologies that can ID individuals remotely arrives.   You are used to being tracked everywhere you go online but offline? Prepare for a world where there is no hiding place. Iris recognition has been used as a biometric for access control applications for...

Read more
Scientists use WiFi to read your emotions

Scientists use WiFi to read your emotions

WHY THIS MATTERS IN BRIEF We are edging closer to living in the world of Minority Report, surrounded by technologies that authorise us, sense us and interact with us remotely, and now the only thing that is fiction is privacy.   Whether it’s at your local fuel station or at...

Read more
British spymasters lay plans to build a Great British Firewall

British spymasters lay plans to build a Great British Firewall

With the number of cyber attacks against UK businesses and infrastructure increasing GCHQ lays down plans for a Great British Firewall Ambitious new plans are being drawn up by GCHQ to create a “Great British Firewall” to block malicious websites countrywide and combat a doubling of serious cyber attacks threatening...

Read more
Exploit allowed hackers to take remote control of a Tesla Model S

Exploit allowed hackers to take remote control of a Tesla Model S

Tesla has now fixed the exploit but this isn’t the first time, or the last time that hackers will take control of individual cars, or entire fleets of autonomous vehicles, and that raises concerns It’s not the first time that we’ve heard this kind of news and it certainly won’t...

Read more
The US and China are developing supersonic submarines

The US and China are developing supersonic submarines

WHY THIS MATTERS IN BRIEF The world’s military powers are pushing the boundaries of speed – underwater.   Water is a thousand times more dense than air and as any of you who swim will know this difference in density creates a huge amount of drag. But for submarines the problem is...

Read more
New brain scanning technologies can pull secrets from your brain waves

New brain scanning technologies can pull secrets from your brain waves

WHY THIS MATTERS IN BRIEF New brain wave monitoring devices are making it easier than ever for companies, governments and institutions to pull your darkest secrets from your head.   In a world where biometric security is often seen as the de-facto consumer and enterprise security technology, and where Touchless...

Read more
Pentagon tests Artificial Intelligence electronic warfare systems

Pentagon tests Artificial Intelligence electronic warfare systems

Advanced warfare platforms are increasingly using unused spectrum, now the Pentagon needs a system to cripple it The US military is cultivating new electronic warfare technologies that, in real time, use artificial intelligence to learn how to jam enemy systems that are using never-before-seen frequencies and waveforms. Although this “cognitive...

Read more
US Government drafts plans to confuse cyber-criminals

US Government drafts plans to confuse cyber-criminals

WHY THIS MATTERS IN BRIEF Hackers, even AI ones, can’t break into your systems if they’re confused… or so goes the theory.   Intelligence work is often as much about gathering information as it is about disseminating misinformation. To that end, the Intelligence Advanced Research Projects Activity (IARPA), the branch...

Read more
New airborne city wide surveillance systems watch your every move

New airborne city wide surveillance systems watch your every move

Google Earth with TiVo capability was the pitch and security forces around the world are starting to snap the technology up

Read more
Police use DNA to create photofits of criminals

Police use DNA to create photofits of criminals

WHY THIS MATTERS IN BRIEF Many crimes go unresolved because there are no witnesses but now a new technique can create photofits from fragments of DNA.   A murder has been committed, and all the cops have to go on is a trace of DNA left at the scene. It doesn’t...

Read more
Researchers secure the Internet of Everything with Dark Web tech

Researchers secure the Internet of Everything with Dark Web tech

WHY THIS MATTERS IN BRIEF The TOR network protects the anonymity of users in the Dark Web, now researchers think it’s the perfect tool to secure the Internet of Things.   The privacy software Tor has helped everything from drug dealing marketplaces to whistleblowing websites evade surveillance on the Darknet, the shadowy under...

Read more
DARPA’s king Robo-hacker “Mayhem” proves no match for humans

DARPA’s king Robo-hacker “Mayhem” proves no match for humans

WHY THIS MATTERS IN BRIEF DARPA’S Cyber Grand Challenge is over but the winner is still no match for humans.   The Heartbleed security bug existed in many of the world’s computer systems for nearly two-and-a-half years before it was discovered and a fix circulated in the spring of 2014,...

Read more
MIT’s latest Human-AI hybrid cybersecurity platform blitzes trials

MIT’s latest Human-AI hybrid cybersecurity platform blitzes trials

WHY THIS MATTERS IN BRIEF We are in the middle of a tug of war that pits Human security experts against autonomous AI “Robo-Hackers” but MIT’s found a middle ground that out performs them all.   Today’s security systems usually fall into one of two categories – Human or Machine. So...

Read more
Bitcoin slumps twenty percent after $65m Bitfinex hack

Bitcoin slumps twenty percent after $65m Bitfinex hack

The Bitfinex heist is the latest is a growing line of high profile heists that are undermining confidence in the crypto currency The price of the virtual currency Bitcoin fell sharply Tuesday after Hong Kong-based digital-currency exchange Bitfinex said it was hacked, resulting in the possible theft of $65 million...

Read more
The White House just issued a Defcon scale for cyber attacks

The White House just issued a Defcon scale for cyber attacks

WHY THIS MATTERS IN BRIEF In an increasingly connected society cyber attacks can wreak more havoc than ever before and now the US has a plan.   In a sign of the times White House officials have finally gotten around to writing out a plan to deal with future cyber attacks...

Read more
DARPA teams go head to head to find the worlds best robo-hacker

DARPA teams go head to head to find the worlds best robo-hacker

WHY THIS MATTERS IN BRIEF Humans can no longer keep up with the tusnami of cyber threats but the robo-hackers can.   Could you invent an autonomous hacking system that could find and fix vulnerabilities in computer systems before criminals could exploit them, and without any human being involved?  ...

Read more
One camera to watch an entire city, meet WAMI

One camera to watch an entire city, meet WAMI

WHY THIS MATTERS IN BRIEF It’s like combining Google Maps with Tivo, authorities can watch an entire city with just a one camera.   An unblinking sentinel will watch over the Olympic Games from high above Rio de Janiero this summer. No, not the iconic Christ the Redeemer statue, but...

Read more
Researchers listen in to crack 4096-bit encryption

Researchers listen in to crack 4096-bit encryption

WHY THIS MATTERS IN BRIEF Researchers have used sound to break the worlds’ toughest encryption standard.   Security researchers have successfully broken one of the most secure encryption algorithms, 4096-bit RSA, by listening — yes, with a microphone — to a computer as it decrypts some encrypted data. The attack is...

Read more