The first priority in a bomb-related emergency is, of course, to safely dismantle the bomb. If it's a pipe bomb--the basement-built explosive device--a robot could be sent in to do the job. But enlisting one could hurt officials' secondary objective: obtaining evidence to determine who built the bomb. SAPBER, a new robot, can safely disarm it and turn over the forensics needed to track down its maker.
You are unique. This is one of the more obscure ways you're unique: An alternating current of different frequencies running through you causes a reaction that's noticeably different from anyone else's. Researchers from Dartmouth University are trying to put this difference to use by creating wearable electronics that respond to--and only to--their intended user.
U.S Customs and Border Protection has a new hire on hand at its Nogales, Ariz., border crossing between the United States and Mexico. CBP has installed an avatar kiosk at the checkpoint to help quickly move persons enrolled in CBP’s Trusted Traveler program through the border crossing quickly, analyzing what they say--both their words and the way they say them--for suspicious signals.
By David HamblingPosted 08.01.2012 at 3:28 pm 13 Comments
In the 1930s, U.S. Navy researchers stumbled upon the concept of radar when they noticed that a plane flying past a radio tower reflected radio waves. Scientists have now applied that same principle to make the first device that tracks existing Wi-Fi signals to spy on people through walls.
There’s more to iris scans than meets the eye, and that could end up being their undoing. New academic research coming out at the Black Hat Security conference this week shows a way to recreate iris images from the digital codes underlying iris-scanning security protocols--images that are so good that they can trick commercial-grade iris-scanning security devices into thinking they’re the real thing.
Usually it’s a problem when you can’t remember a password. But in this particular case, it’s by design. A new security technique mashes up cryptography with neuroscience to create passwords that are stored in users' brains but cannot be recalled, recited, or otherwise extracted by another party.
At a hacker conference in New York on Friday, a German security consultant demonstrated just how "disruptive" 3-D printing can really be. Using a 3-D printer, the hacker/consultant printed out various plastic copies of handcuff keys for bracelets manufactured by both English and German security firms. Then he used them to easily pop open both sets of cuffs.
That inconspicuous brown box above is reportedly a new kind of laser-based molecular scanner that can collect spectroscopic information from more than 150 feet away. It can instantly probe your clothing and luggage for chemical traces of anything--explosives, drugs, biological matter--and you will never even know it.
We’ve all grown quite used to the idea of botnets stowing away on PCs out there on the Internet, spamming us from hacked inboxes in unknown places. Now, botnets are going mobile. Microsoft researcher Terry Zink says he’s discovered evidence that an illegal botnet has hijacked smartphones running Google’s Android operating system and used them to send spam from users’ Yahoo email accounts.
Gaining access to your gym or office building could soon be as simple as waving a hand at the front door. A Hunsville, Ala.-based company called IDair is developing a system that can scan and identify a fingerprint from nearly 20 feet away. Coupled with other biometrics, it could soon allow security systems to grant or deny access from a distance, without requiring users to stop and scan a fingerprint, swipe an ID card, or otherwise lose a moment dealing with technology.