U.S Customs and Border Protection has a new hire on hand at its Nogales, Ariz., border crossing between the United States and Mexico. CBP has installed an avatar kiosk at the checkpoint to help quickly move persons enrolled in CBP’s Trusted Traveler program through the border crossing quickly, analyzing what they say--both their words and the way they say them--for suspicious signals.
By David HamblingPosted 08.01.2012 at 3:28 pm 13 Comments
In the 1930s, U.S. Navy researchers stumbled upon the concept of radar when they noticed that a plane flying past a radio tower reflected radio waves. Scientists have now applied that same principle to make the first device that tracks existing Wi-Fi signals to spy on people through walls.
There’s more to iris scans than meets the eye, and that could end up being their undoing. New academic research coming out at the Black Hat Security conference this week shows a way to recreate iris images from the digital codes underlying iris-scanning security protocols--images that are so good that they can trick commercial-grade iris-scanning security devices into thinking they’re the real thing.
Usually it’s a problem when you can’t remember a password. But in this particular case, it’s by design. A new security technique mashes up cryptography with neuroscience to create passwords that are stored in users' brains but cannot be recalled, recited, or otherwise extracted by another party.
At a hacker conference in New York on Friday, a German security consultant demonstrated just how "disruptive" 3-D printing can really be. Using a 3-D printer, the hacker/consultant printed out various plastic copies of handcuff keys for bracelets manufactured by both English and German security firms. Then he used them to easily pop open both sets of cuffs.
That inconspicuous brown box above is reportedly a new kind of laser-based molecular scanner that can collect spectroscopic information from more than 150 feet away. It can instantly probe your clothing and luggage for chemical traces of anything--explosives, drugs, biological matter--and you will never even know it.
We’ve all grown quite used to the idea of botnets stowing away on PCs out there on the Internet, spamming us from hacked inboxes in unknown places. Now, botnets are going mobile. Microsoft researcher Terry Zink says he’s discovered evidence that an illegal botnet has hijacked smartphones running Google’s Android operating system and used them to send spam from users’ Yahoo email accounts.
Gaining access to your gym or office building could soon be as simple as waving a hand at the front door. A Hunsville, Ala.-based company called IDair is developing a system that can scan and identify a fingerprint from nearly 20 feet away. Coupled with other biometrics, it could soon allow security systems to grant or deny access from a distance, without requiring users to stop and scan a fingerprint, swipe an ID card, or otherwise lose a moment dealing with technology.
Agents in the war on terror attempt to identify unknown persons each and every day, but technology developed to battle criminality around the globe could soon be identifying persons of questionable identity going back centuries. Facial recognition software designed for various security and law enforcement applications is being adapted by art historians at the University of California to identify unknown faces in portraits.
Researchers from Carnegie Mellon University and Disney Research, which is the lab arm of the Disney Company that focuses on computer animation and interactivity, among other things, have worked out a new version of capacitive sensors--the same sensors used in modern smartphones and tablets. This version is able to detect touch in much more detail, like identifying which finger you've used to tap it.