Menu

Blog

Archive for the ‘law enforcement’ category: Page 14

Dec 8, 2019

Russian APT Hackers Attack Government Network via malicious Word Doc

Posted by in categories: government, law enforcement, military

Researchers discovered a new malicious activity that involved by Russian APT hackers to attack Government and Military officials in Ukrainian entities.

The attacker’s targets are not limited but they also infect various individuals who is part of the government and Law enforcement, Journalists, Diplomats, NGO and the Ministry of Foreign Affairs.

Researchers believe that the campaign attributed to Gamaredon activity in which attackers using Dynamic Domain Name Server as C2 server, VBA macro, and VBA script as a part of this attack.

Nov 21, 2019

What Is End-to-End Encryption? Another Bull’s-Eye on Big Tech

Posted by in categories: encryption, law enforcement, security, terrorism

Law enforcement and technologists have been arguing over encryption controls for more than two decades. On one side are privacy advocates and tech bosses like Apple’s chief executive, Timothy D. Cook, who believe people should be able to have online communications free of snooping. On the other side are law enforcement and some lawmakers, who believe tough encryption makes it impossible to track child predators, terrorists and other criminals.


After years of on-and-off debate over nearly snoop-proof security, the industry is girding for new pressure from law enforcement around the world.

Oct 25, 2019

Future Consequences of Cryptocurrency Use: Systemic Investigation of Two Scenarios

Posted by in categories: bitcoin, business, complex systems, counterterrorism, cryptocurrencies, cybercrime/malcode, disruptive technology, economics, education, employment, encryption, finance, futurism, governance, government, hacking, innovation, law enforcement, open access, policy, privacy, security, strategy, terrorism

We face complexity, ambiguity, and uncertainty about the future consequences of cryptocurrency use. There are doubts about the positive and negative impacts of the use of cryptocurrencies in the financial systems. In order to address better and deeper the contradictions and the consequences of the use of cryptocurrencies and also informing the key stakeholders about known and unknown emerging issues in new payment systems, we apply two helpful futures studies tools known as the “Future Wheel”, to identify the key factors, and “System Dynamics Conceptual Mapping”, to understand the relationships among such factors. Two key scenarios will be addressed. In on them, systemic feedback loops might be identified such as a) terrorism, the Achilles’ heel of the cryptocurrencies, b) hackers, the barrier against development, and c) information technology security professionals, a gap in the future job market. Also, in the other scenario, systemic feedback loops might be identified such as a) acceleration of technological entrepreneurship enabled by new payment systems, b) decentralization of financial ecosystem with some friction against it, c) blockchain and shift of banking business model, d) easy international payments triggering structural reforms, and e) the decline of the US and the end of dollar dominance in the global economy. In addition to the feedback loops, we can also identify chained links of consequences that impact productivity and economic growth on the one hand, and shift of energy sources and consumption on the other hand.

Watch the full length presentation at Victor V. Motti YouTube Channel

Oct 21, 2019

Rogue drones to be targeted by new hi-tech ‘detect and destroy’ unit set up by Home Office

Posted by in categories: drones, law enforcement, military

Rogue drones will be brought down by “detect and destroy” technology under plans for a new national counter-drone force to prevent Gatwick-style disruption, ministers have announced.

The new mobile special unit, to be set up by the Home Office, will be available to any police force or law enforcement agency in the UK to counter potential drone threats at major events or malicious attacks such as the chaos at Gatwick airport last Christmas.

The unit is expected to have military-grade cameras, radar and radio frequency scanners to detect rogue drones, similar to those deployed by the Army at Gatwick.

Oct 16, 2019

This Malware Makes ATMs Spit Out All Their Money

Posted by in categories: cybercrime/malcode, economics, finance, law enforcement

Hackers equipped with black market software are targeting cash machines with dated software and substandard security and walking away with millions over the course of a series of attacks, according to a collaborative investigation by Motherboard and German newsroom Bayerischer Rundfunk. Though law enforcement agencies are tightlipped about the trend, it’s a sign that banks may be surprisingly vulnerable to cybercrime.


Other sources, granted anonymity by Motherboard, described the same trend: “There are attacks happening, but a lot of the time it’s not publicized,” said one.

Plug-And-Play

Continue reading “This Malware Makes ATMs Spit Out All Their Money” »

Oct 12, 2019

Rough Science 1 Mediterranean Mystery

Posted by in categories: education, law enforcement, science

Time for my yearly proselytizing for PBS UK’s Rough Science. Awesome educational show where a bunch of scientists are dumped on an island and have to work together to make something crazy out of local scavenged materials.


The group is taken to a disused prison on the island where they have to determine the longitude and latitude of the island, create a radio from a saucepan and create an insect repellent.

Oct 1, 2019

Researchers’ new method enables identifying a person through walls from candidate video footage, using only WiFi

Posted by in categories: habitats, internet, law enforcement, security, surveillance

Researchers in the lab of UC Santa Barbara professor Yasamin Mostofi have enabled, for the first time, determining whether the person behind a wall is the same individual who appears in given video footage, using only a pair of WiFi transceivers outside.

This novel video-WiFi cross-modal gait-based person identification system, which they refer to as XModal-ID (pronounced Cross-Modal-ID), could have a variety of applications, from surveillance and security to smart homes. For instance, consider a scenario in which law enforcement has a of a robbery. They suspect that the robber is hiding inside a house. Can a pair of WiFi transceivers outside the house determine if the person inside the house is the same as the one in the robbery video? Questions such as this have motivated this new technology.

Continue reading “Researchers’ new method enables identifying a person through walls from candidate video footage, using only WiFi” »

Aug 23, 2019

Bernie Sanders Wants to Ban Facial Recognition for Policing, I Disagree

Posted by in categories: information science, law enforcement, policy, robotics/AI

Under his plan, “Justice and Safety for All,” Bernie Sanders wants to ban facial recognition software for policing. As a supporter of Sanders, I’m going to have to respectfully disagree. Here’s why…


Last Sunday, presidential-hopeful Bernie Sanders released on his website what is arguably one of the most extensive plans for law enforcement oversight and criminal justice overhaul that the United States has ever seen. As a progressive, myself, and supporter of Sanders during his primary run, I fully endorse everything that’s been laid out in this plan— that is, except for one minor policy.

The plan, titled “Justice and Safety for All,” calls to “Ban the use of facial recognition software for policing.” It also calls for a “moratorium on the use of the algorithmic risk assessment tools in the criminal justice system until an audit is completed,” whereby the audit would “ensure these tools do not have any implicit biases that lead to unjust or excessive sentences.”

Continue reading “Bernie Sanders Wants to Ban Facial Recognition for Policing, I Disagree” »

Aug 14, 2019

They Stole Your Files, You Don’t Have to Pay the Ransom

Posted by in categories: cybercrime/malcode, law enforcement

The F.B.I. should follow the example of European law enforcement and help victims of ransomware decrypt their data.

Aug 12, 2019

Boston Strangler Case Solved After 50 Years

Posted by in categories: biotech/medical, law enforcement

A water bottle recovered from a construction site where Tim DeSalvo – whose uncle Albert DeSalvo had confessed to being the internationally notorious Boston Strangler – gave police the DNA evidence they needed to bring closure to a case that has been a mystery for nearly 50 years, murders for which no one has ever been charged.

“This is really a story of relentlessness,’’ Boston Police Commissioner Ed Davis explained today as Massachusetts top law enforcement officials revealed that DNA preserved from the body of the Boston Strangler’s last victim—raped and murdered in 1964—can now be linked with ”99.9 percent certainty” to the late Albert DeSalvo.

”This is good evidence. This is strong evidence. This is reliable evidence,’’ Suffolk County District Attorney Dan Conley said of the new DNA result. ”But there can be no doubt.”

Page 14 of 23First1112131415161718Last