Menu

Blog

Archive for the ‘security’ category: Page 107

May 11, 2017

Homeland Security is building a ‘biometric pathway’ for the airport

Posted by in categories: government, privacy, robotics/AI, security, transportation

The US government has rolled out a plan to reshape airport security around facial recognition, playing off a wealth of passport photos and visa applications.

Led by Customs and Border Protection, the plan is built around the Biometric Exit program, which will register visitors leaving the US using facial recognition. But new statements show that CBP’s plans could make facial scans necessary for US citizens as well, documenting them when they reenter the country or pass through TSA checkpoints. The result would eventually grow into an airport-wide system Customs officials call “The Biometric Pathway.”

John Wagner, deputy assistant commissioner at CBP, laid out that vision at the ConnectID conference last week. “We’re going to build this for [Biometric] Exit. We’re out of time, we have to,” Wagner told the crowd. “But why not make this available to everyone? Why not look to drive the innovation across the entire airport experience?”

Continue reading “Homeland Security is building a ‘biometric pathway’ for the airport” »

May 3, 2017

3D Printing The Next Five Years

Posted by in categories: 3D printing, security, space travel

This is a guest post in our series looking at the future of 3D Printing. To celebrate 5 years of reporting on the 3D printing industry, we’ve invited industry leaders and 3D printing experts to give us their perspective and predictions for the next 5 years and insight into trends in additive manufacturing.

Brian O’Connor is Vice President, Production Operations at Lockheed Martin Space Systems. Lockheed Martin is a global security and aerospace company that employs approximately 97,000 people worldwide and is principally engaged in the research, design, development, manufacture, integration and sustainment of advanced technology systems, products and services.

How lockheed martin is printing the path to mars by brian o’connor.

Continue reading “3D Printing The Next Five Years” »

Apr 21, 2017

Quantum Cryptography Is Unbreakable. So Is Human Ingenuity — By Joshua Holden | Singularity Hub

Posted by in category: security

“But that’s not really true. What is true is that pretty much anyone can get hold of software that, when used properly, is secure against any publicly known attacks. ”

Read more

Apr 3, 2017

How Watson works — myth busting at IBM InterConnect 2017

Posted by in categories: computing, internet, neuroscience, security

The IBM IoT (Internet of Things) blog. The very latest IoT news, and blogs from IBM. Internet of Things info on security, connected buildings, automotive, Watson IoT, and cognitive computing.

Read more

Mar 29, 2017

Tallinn Manual 2.0 – the invaluable guide for state action in cyber space

Posted by in categories: governance, law, security, space

Following the principle set in the first version, Tallinn Manual 2.0 – a document that provides guidance on how the existing international law could be adapted to cyber operations in the most appropriate way – reiterates that cyber activity should not be perceived as happening in a legal vacuum.

Estonia has become one of the forerunners and success stories of introducing digital identity, e-governance and an online voting system. The e-residency programme, which allows foreign citizens living outside of the physical national borders of Estonia to obtain a secure digital identity and benefit from some of the services available, has further increased the interest in Estonia’s digital developments, contributing to Estonia’s image as one of the world’s most digitally advanced countries.

This impressive degree of integration means e-dimension is no longer solely the playfield of the IT sector. As this new dimension is rapidly gaining ground, various topics need to be addressed, including (and perhaps most importantly) security.

Continue reading “Tallinn Manual 2.0 – the invaluable guide for state action in cyber space” »

Mar 26, 2017

Firefighter Helmets Now Have Built In Thermal Imaging

Posted by in category: security

A fire protection and security company recently launched a new product called the “Scott Sight,” a face mask that incorporates thermal imaging with a display screen.

Tyco’s Scott Safety is bringing a big upgrade to the field of firefighting with their newly released product, the Scott Sight. This hands-free device is the first in the industry that incorporates an in-mask thermal intelligence system, according to an April 18th press release from the fire protection and security company.

Continue reading “Firefighter Helmets Now Have Built In Thermal Imaging” »

Mar 22, 2017

Europe has a five year project to scale up molecular biocomputers which could outperform quantum computers

Posted by in categories: computing, quantum physics, security

Electronic computers are extremely powerful at performing a high number of operations at very high speeds, sequentially. However, they struggle with combinatorial tasks that can be solved faster if many operations are performed in parallel.


The EU Horizon 2020 has launched Bio4Comp, a five-year €6.1M project to build more powerful and safer biocomputers that could outperform quantum computing.

The Bio4Comp project has the ambitious goal of building a computer with greater processing speed and lower energy consumption than any of the most advanced computers existing today. Ultimately, this could translate into enabling large, error-free security software to be fast enough for practical use, potentially wiping out all current security concerns.

Continue reading “Europe has a five year project to scale up molecular biocomputers which could outperform quantum computers” »

Mar 16, 2017

Secure Data Storage

Posted by in categories: computing, satellites, security

Launching small satellites with big storage capacities using the highest levels of security. Sensitive information is securely stored off-planet.

Read more

Mar 14, 2017

Your brain is unique – here’s how it could be used as the ultimate security password

Posted by in categories: finance, internet, mobile phones, neuroscience, privacy, security

Biometrics – technology that can recognise individuals based on physical and behavioural traits such as their faces, voices or fingerprints – are becoming increasingly important to combat financial fraud and security threats. This is because traditional approaches, such as those based on PIN numbers or passwords, are proving too easily compromised. For example, Barclays has introduced TouchID, whereby customers can log onto internet banking using fingerprint scanners on mobile phones.

However, this is not foolproof either – it is possible to forge such biometrics. Fingers can after all be chopped off and placed by impostors to gain fraudulent access. It has also been shown that prints lifted from glass using cellophane tape can be used with gelatine to create fake prints. So there is a real need to come up with more advanced biometrics that are difficult or impossible to forge. And a promising alternative is the brain.

Emerging biometric technology based on the electrical activity of the brain have indeed shown potential to be fraud resistant. Over the years, a number of research studies have found that “brainprints” (readings of how the brain reacts to certain words or tasks) are unique to individuals as each person’s brain is wired to think differently. In fact, the brain can be used to identify someone from a pool of 102 users with more than 98% accuracy at the moment, which is very close to that of fingerprints (99.8% accuracy).

Read more

Mar 13, 2017

DeepCoder builds programs using code it finds lying around

Posted by in categories: robotics/AI, security

Like all great programmers I get most of my code from StackOverflow questions. Can’t figure out how to add authentication to Flask? Easy. Want to shut down sendmail? Boom. Now, thanks to all the code on the Internet, a robot can be as smart as a $180,000 coder.

The system, called DeepCoder, basically searches a corpus of code to build a project that works to spec. It’s been used to complete programming competitions and could be pointed at a larger set of data to build more complex products.

From the paper:

Continue reading “DeepCoder builds programs using code it finds lying around” »