Swarms of giant drones have been flying above Colorado and Nebraska at night, perplexing both local law enforcement and the federal government.
Category: law enforcement – Page 14
The Federal Aviation Administration put forward a rule Thursday that would empower the government to track most drones in the U.S.
The rule will require drones to implement a remote ID system, which will make it possible for third parties to track them. The measure will help law enforcement identify unauthorized drones that may pose a security threat, paving the way for wider adoption of commercial drone technology.
The rule said that the FAA expects all eligible drones in the U.S. to comply with the rule within three years.
To that end, Fields decided to ask a Florida judge to grant him a warrant that would override the new policy, allowing him to search GEDmatch’s entire database, including users who hadn’t opted in — and Judge Patricia Strowbridge did just that, the detective announced at a recent police convention, according to the NYT.
Legal experts told the NYT that this appears to be the first time a judge has approved a DNA website warrant this broad, with New York University law professor Erin Murphy calling it “a huge game-changer.”
“The company made a decision to keep law enforcement out, and that’s been overridden by a court,” Murphy told the newspaper. “It’s a signal that no genetic information can be safe.”
Europe’s police agency is worried that the 5G will interfere with law enforcement’s ability to track people.
Catherine De Bolle, head of Europol is asking European Union leaders to allow their agency to be more engaged in policy conversations involving the adoption of 5G technology, Reuters reports.
Researchers discovered a new malicious activity that involved by Russian APT hackers to attack Government and Military officials in Ukrainian entities.
The attacker’s targets are not limited but they also infect various individuals who is part of the government and Law enforcement, Journalists, Diplomats, NGO and the Ministry of Foreign Affairs.
Researchers believe that the campaign attributed to Gamaredon activity in which attackers using Dynamic Domain Name Server as C2 server, VBA macro, and VBA script as a part of this attack.
Law enforcement and technologists have been arguing over encryption controls for more than two decades. On one side are privacy advocates and tech bosses like Apple’s chief executive, Timothy D. Cook, who believe people should be able to have online communications free of snooping. On the other side are law enforcement and some lawmakers, who believe tough encryption makes it impossible to track child predators, terrorists and other criminals.
After years of on-and-off debate over nearly snoop-proof security, the industry is girding for new pressure from law enforcement around the world.
Future Consequences of Cryptocurrency Use: Systemic Investigation of Two Scenarios
Posted in bitcoin, business, complex systems, counterterrorism, cryptocurrencies, cybercrime/malcode, disruptive technology, economics, education, employment, encryption, finance, futurism, governance, government, hacking, innovation, law enforcement, open access, policy, privacy, security, strategy, terrorism
We face complexity, ambiguity, and uncertainty about the future consequences of cryptocurrency use. There are doubts about the positive and negative impacts of the use of cryptocurrencies in the financial systems. In order to address better and deeper the contradictions and the consequences of the use of cryptocurrencies and also informing the key stakeholders about known and unknown emerging issues in new payment systems, we apply two helpful futures studies tools known as the “Future Wheel”, to identify the key factors, and “System Dynamics Conceptual Mapping”, to understand the relationships among such factors. Two key scenarios will be addressed. In on them, systemic feedback loops might be identified such as a) terrorism, the Achilles’ heel of the cryptocurrencies, b) hackers, the barrier against development, and c) information technology security professionals, a gap in the future job market. Also, in the other scenario, systemic feedback loops might be identified such as a) acceleration of technological entrepreneurship enabled by new payment systems, b) decentralization of financial ecosystem with some friction against it, c) blockchain and shift of banking business model, d) easy international payments triggering structural reforms, and e) the decline of the US and the end of dollar dominance in the global economy. In addition to the feedback loops, we can also identify chained links of consequences that impact productivity and economic growth on the one hand, and shift of energy sources and consumption on the other hand.
Watch the full length presentation at Victor V. Motti YouTube Channel
Rogue drones will be brought down by “detect and destroy” technology under plans for a new national counter-drone force to prevent Gatwick-style disruption, ministers have announced.
The new mobile special unit, to be set up by the Home Office, will be available to any police force or law enforcement agency in the UK to counter potential drone threats at major events or malicious attacks such as the chaos at Gatwick airport last Christmas.
The unit is expected to have military-grade cameras, radar and radio frequency scanners to detect rogue drones, similar to those deployed by the Army at Gatwick.
Hackers equipped with black market software are targeting cash machines with dated software and substandard security and walking away with millions over the course of a series of attacks, according to a collaborative investigation by Motherboard and German newsroom Bayerischer Rundfunk. Though law enforcement agencies are tightlipped about the trend, it’s a sign that banks may be surprisingly vulnerable to cybercrime.
Other sources, granted anonymity by Motherboard, described the same trend: “There are attacks happening, but a lot of the time it’s not publicized,” said one.
Plug-And-Play
The German attacks and others throughout Europe seem to be carried out with Russian software called Cutlet Maker, which Motherboard reports can be bought for $1,000. In the U.S., a program called Ploutus. D is more popular.
Time for my yearly proselytizing for PBS UK’s Rough Science. Awesome educational show where a bunch of scientists are dumped on an island and have to work together to make something crazy out of local scavenged materials.
The group is taken to a disused prison on the island where they have to determine the longitude and latitude of the island, create a radio from a saucepan and create an insect repellent.