Showing posts with label Criminal/Terrorist Networks. Show all posts
Showing posts with label Criminal/Terrorist Networks. Show all posts

Monday, 13 August 2007

China Enacting a High-Tech Plan to Track People

Starting this month in a port neighborhood and then spreading across Shenzhen, a city of 12.4 million people, residency cards fitted with powerful computer chips programmed by the same company will be issued to most citizens.

Data on the chip will include not just the citizen’s name and address but also work history, educational background, religion, ethnicity, police record, medical insurance status and landlord’s phone number. Even personal reproductive history will be included, for enforcement of China’s controversial “one child” policy. Plans are being studied to add credit histories, subway travel payments and small purchases charged to the card.


Homeland Security tests automated "Hostile Intent" detector

An uncomfortable fact of modern security is that too many people go through transit hubs and to public events for all of them to be screened both efficiently and thoroughly. As a result, there has been a lot of attention focused on producing automated systems that screen crowds without the need for human intervention.

Automated biometric scans have serious limits, however, in that they can only identify people who have already been classified as threats. The Department of Homeland Security is hoping to overcome that limitation by automating the identification of individuals whose behavior suggests they pose a threat via a program dubbed "Hostile Intent."

Monday, 6 August 2007

Cellphones may take banking to the rural poor in the third world

In many third world countries, where bank branches are few and far between, the development that finally may make financial services practical for the rural poor fits in the palm of a hand.

Mobile devices like cellphones have the potential to effectively bring financial markets to the countryside, allowing banks and other lenders in urban areas to provide services like loans and savings accounts to a new population, according to a report by Vodafone and Nokia published last week.

Read More

Thursday, 2 August 2007

Spies watch rise of virtual terrorists


THE bomb hit the ABC's headquarters, destroying everything except one digital transmission tower. The force of the blast left Aunty's site a cratered mess.

Just weeks before, a group of terrorists flew a helicopter into the Nissan building, creating an inferno that left two dead. Then a group of armed militants forced their way into an American Apparel clothing store and shot several customers before planting a bomb outside a Reebok store.

This terror campaign, which has been waged during the past six months, has left a trail of dead and injured, and caused hundreds of thousands of dollars' damage. The terrorists belong to a militant group bent on overthrowing the government. But they will never be arrested or charged for their crimes because they have committed them away from the reach of the world's law enforcement agencies, in the virtual world known as Second Life.

Read More

Friday, 22 June 2007

Text messaging could soon be the new way to call for help

Texting on your mobile could soon be the quickest way to call for police help.

The Government has given the go-ahead for a new 999 text-messaging emergency line which will work in tandem with the traditional call centre.

Soon typing in text speak "hlp 5-o sum1 hs brokN n2 my hous" - 'Help police, someone has broken into my house' - should summon an emergency response.


Read More

U.S. general laments Google Earth capability

The head of U.S. Air Force intelligence and surveillance on Thursday said data available commercially through online mapping software such as Google Earth posed a danger to security but could not be rolled back.

"To talk about danger is, if I may, really is irrelevant because it's there," said Lt. Gen. David Deptula, deputy chief of staff for intelligence, surveillance and reconnaissance.

Tuesday, 19 June 2007

Airline Sensor Could Pinpoint Germs

A new system that uses a computer program and sensors could identify passengers responsible for the release of chemical agents in a terrorist attack or the unintentional release of germs or a virus, such as the tuberculosis-infected man who recently flew on international flights.

"We can identify the location plus or minus one seat," said Qingyan Chen, principal director of the Air Transportation Center of Excellence for airliner cabin environment research at Purdue University in West Lafayette, Ind.

Read More

Monday, 18 June 2007

Homemade Microwave Weapons



The US military is hard at work designing, building, and using directed energy weapons (HERFs -- high energy radio frequency or microwave weapons) for use against micro-electronics and fuel vapor.

Unfortunately, directed energy weapons are much more valuable to global guerrillas than nation-state militaries due to the target imbalance between nation-states and non-state foes. The technology needed to build these weapons is generally available and inexpensive (numerous experiments, including this one, scroll to bottom, with a converted microwave oven demonstrate this).

Homemade directed energy weapons will eventually become the weapon of choice for global guerrillas intent on infrastructure destruction.

Read More

Online and offline worlds merge

Google has launched a tool designed to make it easier for computer users to use online applications offline.

One of the key limitations of web services such as e-mail, word processing and calendars, is that they require a net connection to function.


Hi-tech tool tracks city graffiti

US cities are battling the problem of vandalism head on with a hi-tech system that analyses and tracks graffiti and its perpetrators.

In the US, cleaning up graffiti is estimated to cost about $10bn (£5bn) per year. Rather than simply obliterate the graffiti, the system keeps a permanent record of it which allows police to compile a database of similar daubings.

China To Use Computer Viruses As Cyberwarfare First Strike


The Defense Department reports that the People's Liberation Army is moving beyond traditional battlefields and into cyberspace.

The People's Liberation Army in China is building up its cyberwarfare capabilities, even creating malware that could attack enemy computer systems in first-strike attacks, according to a report from the Department of Defense.


Thursday, 14 June 2007

NATO says urgent need to tackle cyber attack

NATO defense ministers agreed on Thursday that fast action was needed to tackle the threat of "cyber attacks" on key Internet sites after Estonia suffered a wave of assaults on its computer networks last month.

"There was sentiment round the table that urgent work is needed to enhance the ability to protect information systems of critical importance," NATO spokesman James Appathurai told a news conference at a two-day meeting in Brussels.

The Reality of Terrorist Cyber War

Terrorist groups can use the Internet to create a brand image, market themselves, recruit followers, raise capital, identify partners and suppliers, provide training materials, and even manage operations.

Wednesday, 6 June 2007

What the attacks on Estonia have taught us about online combat.


In Estonia, you can pay for your parking meter via cell phone, access free Wi-Fi at every gas station, and, as of two months ago, vote in national elections from your PC.
The small, wired country can now add another item to this list of technological achievements: It's the first government to get targeted for large-scale cyberwarfare.

Tuesday, 29 May 2007

Face recognition next in terror fight

Homeland Security leaders are exploring futuristic and possibly privacy-invading technology aimed at finding terrorists and criminals by using digital surveillance photos that analyze facial characteristics.

The government is paying for some of the most advanced research into controversial face-recognition technology, which converts photos into numerical sequences that can be instantly compared with millions of photos in a database.

Terror And Crime Go Digital

Emerging digital technologies to move money instantaneously and anonymously open up new possibilities for criminals and terrorists, while regulatory and law-enforcement agencies are limping far behind.

On May 3, at the release of the 2007 Money Laundering Strategy (pdf), the U.S. Treasury spokesperson was pleased to note: "Focusing on well-established money laundering methods and emerging trends identified in the Assessment, we have created a robust strategy for combating money laundering, deterring criminals, and addressing areas vulnerable to exploitation."

Yet the latest digital advances open to criminals and terrorists -- mobile phones or other mobile devices to secretly transfer money globally, or M-payments; gambling; and transfer of virtual money through online role-playing games, or RPGs -- are missing from this long-awaited government strategy.


Read More