Showing posts with label Law Enforcement. Show all posts
Showing posts with label Law Enforcement. Show all posts

January 27, 2013

Personal Bulletproof Shields


In light of the horrible school shootings we have witnessed in Sandy Hook Elementary School, Virginia Tech, Columbine High School, and more, people and companies are trying to figure out how to fight back. 

In some cases, ex-Marines have decided to stand guard at their children's schools.

In others, companies are coming up with emergency protective devices as a last line of defense for teachers and school children. 

Hardwire Armor Systems has developed a white board that doubles as a bulletproof shield. 

According to USA Today (22 January 2013), the whiteboards are 18" by 20", a quarter inch thick, and 3.75 lbs. and have three rubberized handles on the back for slipping your arm through.

The shield is large enough to cover the head and torso, is 2 1/2 times as strong as Kevlar, and "can stop a bullet from a handgun shot at point-blank range." 

The whiteboards are made of a similar ultra-strong polyethylene material used in Mine Resistant Ambush Protective (MRAP) vehicles in Iraq and Afghanistan, and they are light enough and less dense than water and will actually float. 

While we hope our teachers and children never need these to hold off an attacker until first responders arrive, it is good to know that they are there just in case to stop that deadly oncoming bullet. 

The whiteboard costs $299 and a smaller 10" by 13" bulletproof clipboard costs $109.To outfit a standard high school with whiteboards would cost $15,000 and for all 7 million teachers and administrators in America $1.8 billion. 

From teaching math and science to protecting our children and teachers, these ballistic shields can be part of a multi-layered defense plan for our schools--and I would think for corporate America, religious institutions, and government agencies as well--and is an awesome idea. ;-)

Share/Save/Bookmark

December 14, 2012

Children, Our Future

20 children dead today in school shooting. 

Completely unacceptable!

We need better psychiatric screening, more treatment options, and safer schools.

How can we expect children to excel, when they can't even feel safe. 

Safeguard our children, protect our future.

(Source Photo: here with attribution to Massimo Valiani, Source Quote: ABC News article comment by Quinn, and Mashup by Andy Blumenthal)

Share/Save/Bookmark

October 19, 2012

Overcoming The Height Factor


I really liked this law enforcement elevation product called the Mobile Adjustable Ramp System (MARS) made by Patriot 3 in the United States. 

It is fitted on top of armored or unarmored personnel carriers and used by law enforcement or SWAT teams to carry out raids and rescues on multiple stories simultaneously. 

Two independent moving hydraulic platforms can be fitted on a single vehicle and each ramp can extended independently by remote control.

The ramps extends over 40 feet, enough to gain entry to the second and even third stories of buildings, unto an aircraft, breach a fenced perimeter, or even be used as a sniper post.  

According to the Ideas and Discoveries Magazine (Dec. 2012), MARS has been fitted on the Ford F550 pickup truck and at $370,000--can seat 9, hold 40 gallons of gas in an armored tank, go up to 100 miles per hour, and as an armored-cased vehicle, it "can withstand up to 24 hours of relentless gunfire."

While this vehicle may look a little funny, it serves it's purpose which it to take the height advantage away from the bad guys--get in and get out--quickly and safely.

Share/Save/Bookmark

August 24, 2012

Military-Style ATV For Pleasure Or Kicking Butt


This is a very cool all-terrain vehicle (ATV) modeled after the Segway, that is built with military or extreme sports in mind.

According to Bloomberg Businessweek, the DTV Shredder runs on tank treads, has a motocycle throttle, and the mobility of a skateboard.

The Shredder is made by BPG Werks and can go up to 30 miles per hour, has a three-foot turning radius, can haul up to 800 pounds over rocky terrain, and costs only $4,000.

This is a cost-effective, energy-efficient, rugged transportation mule can carry people, equipment, or supplies through friendly or hostile terrain, and it can even be used through a remote controller. 

A precursor transit device from this company was the Uno--a very cool looking, self-balancing, all-electric unicycle--that won Intel's International Science and Engineering Fair (ISEF) in 2007, was on the cover of Popular Science Magazine (2008), and secured $1.25 million from angel investors. 

When we talk about mobile technology, everyone first thinks of smartphones and tablet computers, but new and improved modes of personal transportation can also be innovative and high-tech with applications for everything from snowmobiling to beach patrol and hunting to overseas deployments. 

End of the world scenarios come to mind too--with a mobile device like this...outmaneuver, outwit, outlast.  

Of course, having to stand for the whole ride can be a bummer, and an open ATV certainly does not imply all-weather, so practicality limits its usefulness, but this is still my cool gadget of the week for fighting or for fun. ;-)

Share/Save/Bookmark

August 18, 2012

The Privacy Slope

I read with interest Ronald Bailey's book review of Privacy by Garet Keizer in the Wall Street Journal ( 16 August 2012). 

In a nutshell, privacy is founded in the Constitution's 4th Amendment: "the right of the people to be secure in their persons, houses, papers, and effects against unreasonable searches and seizures, shall not be violated."

I would define privacy as the freedom--to think, to feel, and to act as ourselves (within ethical boundaries) without fear of intrusion, revelation, or reprisal. 

In other words, it should only be our business who we love, what we are interested or believe in, who we vote for, what we choose to do with our lives, and more. 

I think in grade school, the children generally sum it up well when they playfully chant: "Mind your own BI," where BI is used for business (or biziness). :-)

According to Keizer, the danger to privacy come into play from two main sources: 
- Commerce--who want to sell you something and
- Government--that needs to surveil for security and law enforcement purposes 

After 9/11, their was a perceived need for greater surveillance to enhance homeland security, and with advances in technology and communications (smartphones, Internet, social media, etc.), the ability to snoop became far easier.

In 2002, the DoD program for Total Information Awareness (TIA) was an attempt to know everything (i.e. total) about those who would do us harm, but fears about this capability being used against the innocent, quickly required a rethinking or perhaps, just a rebranding. 

Some say that the new NSA mega data center in Utah is the fulfillment of the TIA dream--according to the Washington Post, already in 2010 NSA intercepted and stored "1.7 billion emails, phone calls, and other types of communications." Further, law enforcement demanded records from cellphone carriers on 1.3 million subscribers "including text messages and caller locations" over just the last year's time. 

Keizer cautions that "the ultimate check on government as a whole is its inability to know everything about those it governs"--i.e. without the people holding the cards, there is the risk of spiraling into a Big Brother totalitarian society--goodbye democracy!

I think Keizer perhaps oversells the fear of government surveillance and underemphasizes intrusion from business--his thinking is that "If consumers are annoyed with a merchant's monitoring, they can buy elsewhere." 

But what Keizer misses is that industry as a whole has moved toward the use of technology--from club cards and promotions to use of Internet cookies, RFID, and more--to systematically track consumers and their buying behavior and that information is readily captured, packaged, used, and sold for marketing and sales--as well as to the government!

As a common practice now, where is a consumer to go that will shield them from hungry business looking to capture market share and earn nice profits?

At the same time, while government surveillance can certainly be misused and abused with terrible consequences for individuals society---there are potentially a lot of people looking over the shoulder of those carrying out public programs--and this "sunlight"--where and when it shines--can help to prevent bad things happening. 

The problem is that the system is not perfect, and there are always those program people who act of out of bounds and those watchers who are ineffective and/or dishonest.

Overall, it's a zero sum game, where those that hype up security and capitalism, can tramp down on privacy, and vice versa.
In totality, we can never just assume everything will be okay when it comes to privacy and how information is used, but we have to be active citizens helping ensure that right things are done, the right way. 

For regular, hardworking, decent citizens, there is a definite need to safeguard privacy--and technology can be helpful here with anonymizers, encryptors, and other shielding tools.

For the bad guys, I would imagine, no question, that the government will continue to develop the means to thwart their secrecy and planning to inflict harm on the American people. 

For business, it's okay to capture consumer information and sell, but pour it on to thick and people will think twice about your company's ethics and brand--and even a lawsuit may be in the making. 

Yes, privacy is a slippery slope, and not only can a person's self be revealed or used inappropriately, but the voyeur can get burned too if they overdo it. 

(Source Photo: Andy Blumenthal)

Share/Save/Bookmark

April 1, 2012

A Word Indeed


The information in your smartphone and managed by your telecommunications carrier is available and accessible to others with today's tools and following the right processes. 

Bloomberg BusinessWeek (29 March 2012) reports on a new tool for law enforcement that captures your data from smartphones. 

It is called the Cellebrite or Universal Forensic Extraction Device (UFED).

As the video describes it works with almost every mobile device out there--over 1,800 of them. 

And when attached to a smartphone, it can extract everything from your call log, emails, texts, contact list, web history, as well as photos and videos. 

The forensic tool can even retrieve deleted files from your phone. 

Your smartphone is a digital treasure trove of personal information and the privacy protection afforded to it is still under debate. 

The article cites varying court opinions on "whether it's fair game to examine the contents of a mobile phone without a warrant," since it is in the suspect's immediate possession. 

According to law enforcement sources quoted in the article, "we use it now on a daily basis."

Aside from the contents on the phone itself, Bloomberg BusinessWeek (29 September 2012) earlier reported that telecommunications companies are also storing your personal data for various lengths of time.

For example, detail call records and text contacts are retained for up to 7 years and phone location information indefinitely, depending on the carrier.

This data is available too under the processes specified in the Electronic Communications Privacy Act. 

While the technology is constantly getting better for us to electronically manage our information and communicate with each other, the reach and life cycle of digital information can certainly be far and long.

As we should all by now know, working remotely, digitally, in cyberspace, and encrypting, deleting, or even attempting to destroy data files does not ensure their ultimate privacy. 

In that respect, both digital and non-digital information are the same in one very important facet and that is as we all learned early in life that "a word once said cannot be taken back."

Share/Save/Bookmark

March 16, 2012

Human Trafficking Hurts Everyone

Cbp_report_human_trafficking
A few years ago, I saw the movie Taken (2008) about a 17-year old girl kidnapped in Paris and sold into prostitution. Fortunately, in this movie, the teenage girl's father is a retired CIA agent, and he is able to get his daughter back and inflict some serious punishment on the traffickers. The scariest scene in the movie that's been shown repeatedly in the trailer is where the girl is hiding under the bed pleading with her father to help her, when she is discovered and pulled roughly from underneath to disappear into this netherworld of child trafficking and sex abuse.

This week, I saw another movie called Trade (2007) with a similar theme, where a 13-year old girl is abducted outside her home on the streets of Mexico City while riding her new birthday bicycle. The scenes of sexual abuse, violence, forced drugging, and more were enough to send me for an emotional deep dive. In the movie, while other innocent women are trafficked, abused, and murdered, this little girl is saved by her brother and Texas cop who join forces to rescue her (and other children found behind a secret door in the same house) from being sold into sex slavery. 

At the conclusion of the movie, the tagline comes up about 50,000 to 100,000 girls, boys, and women being trafficked annually to the U.S. to be pimped out or sold for forced sex--and more than 1 million are trafficked annually across international borders against their will.

According to The Department of Homeland Security U.S. Customs and Border Protection, "There are at least 12.3 million enslaved adults and children around the world at any given time." I would guess that these numbers are quite understated given all the silent victims around the world that have been silenced by fear, coercion, and violence and so we don't even know about them and their plights. 

Further, The Department of State's Office to Monitor and Combat Trafficking in Persons has many good resources including information, tips, and training located at that site. 

I've attached, at the top, the phone number of the Customs and Border Protection hotline to report human trafficking. There is also a non-profit hotline at the National Human Trafficking Resource Center.

While this is frequently portrayed as women's issue and it is, it is also a family and societal issue that affects all of us. When a women or child is abused, the impact goes way beyond the individual.

I know that I can certainly not understand how anyone can inflict these cruelties on others. Money doesn't explain it. Circumstances doesn't explain it. To me, there must truly be such a thing as evil in this world, and unfortunately, we are all witnesses to it.

Look out for others, the way you would want them to look out after your own--maybe together, we can help tilt the scale in favor of the victims.

Share/Save/Bookmark

February 25, 2012

The False Information G-d

The amount of data in the world is exploding and yet the belief in G-d is evaporating.  

A review in the Wall Street Journal (22 February 2012) of a book called "Abundance" points to the explosion of data with the prevalence of information technology. 

From the earliest civilization to 2003, all written information totaled 5 exabytes (an exabyte is a quintillion bytes or 1 followed by 18 zeros).

But this is nothing compared to the last number of years, "where the change is not just accelerating, but the rate of acceleration of change is itself accelerating."

Between 2003-2010, 5 exabytes of digital information was created every 2 days, and by next year, 5 exabytes will be produced every 10 minutes!

Similarly, Wired Magazine (March 2012) reports in an interview with George Dyson that the "Digital Universe" is growing organically and "cycling faster and faster and it's way, way, way more than doubling in scale every year. Even with the help of [tools like] Google and YouTube and Facebook, we can't consume it all."

According to ComputerWorld (13 February 2012) in Your Big Data To-Do List, with all this data being generated, there is a mistaken assumption that we have to consume it all like drinking from a firehose. The article references a McKinsey study that projects that by 2018, there will be a need for 140,000 to 190,000 additional data analysts and statistical experts to try and make sense of it all. The article suggests that instead of trying to grasp at all the data, we instead "data scoop" and "target projects that can showcase results as opposed to opting for the big-bang, big-data projects."

And tools are being developed and deployed to try to get our arms around the information rolling in around the world. For example, Bloomberg Businessweek (November 28 - December 4, 2011) describes the tool from Palantir being used by the military, Intel, and law enforcement agencies for data mining, link analysis, and even predictive analytics. 

These days, "It's like plugging into the Matrix"--in terms of the amount of data streaming in. One special forces member in Afghanistan describes it as follows: "The first time I saw it, I was like Holy crap. Holy crap. Holy crap." But the thinking is now-a-days that with tools like Palantir (and others), we "can turn data landfills into gold mines."

But while information is power, Harvard Business Review (September 2011) in Learning to Live With Complexity acknowledges "We are hampered by cognitive limits." And moreover, "Most executives think they can take in more information than research suggests they can." And harnessing data into information is constrained by the complexity involved--driven by the number, interconnections, and diversity of interacting elements.

The result is that while we are becoming in a sense data rich, in may ways, we are still information poor. And even with all the sensors, data, and tools available to search, access, and analyze it, we are becoming perhaps overconfident in our ability to get our arms around it all and in turn master the world we live in. 

The hubris in our abilities to use information technology is leading many to worship the proverbial information G-d, and in turn, they are forgetting the real one. According to the Pew Forum on Public and Religious Life (February 2010) as quoted in CNN, "young Americans are significantly less religious than their parents and grandparents were when they were young."  Moreover, a full one in four American millennials--those born after 1980--are not affiliated with any faith--they are agnostic or atheists.

Similarly, Mental Floss Magazine just a few months ago (November-December 2011) had various authored columns asking "Is G-d In Our Genes?" and another "Is G-d In a Pill?" questioning whether the age-old belief in G-d comes either from a genetic disposition in some to a drug-induced states in others.

While religion is a personal matter, and for a long time people have argued whether more people have died in wars over religion or money and power, as a person who believes in G-d, I find it most concerning that with the rise of information (technology) power in the last 30 years, and the exuberance and overconfidence generated from this, there is an associated decline in belief in G-d himself.  

While technology has the potential to raise our standard of living (in leaps and bounds even) and help solve many of our vexing problems, we cannot forget that technology is run by human beings who can choose to be good or evil and use information technology to either better mankind or the opposite, to destroy it. 

Ultimately, I believe that it is but G-d almighty who shapes the thoughts and destiny of mankind, so that one man sees just a string of bits and bytes--a matrix of zeros and ones--while another sees a beautiful new musical composition, the next terrorist attack, or even the amazing cure for cancer.  

(Source Photo: here)

Share/Save/Bookmark

February 19, 2012

Big Phish, Small Phish

Phishing is an attack whereby someone pretends to be a trustworthy entity, but is really trying to get your personal information in order to steal from you or an organization.
Phishing is a type of social engineering where fraudsters try to deceive and spoof their victims by sending email or instant messages (or even by calling) and pretending to be a legitimate private or public sector organization. They then either request personal information, provide links to fake websites, or even create unauthorized pop-ups from legitimate websites to get you to give them your personal data.

Additionally, phishing emails can contain attachments that infect recipient's computers with malware, creating a backdoor to control or compromise a system and its information.

In all of these cases, the intent of phishing is impersonate others and lure consumers into providing information that can be used to steal identities, money, or information.
The word phishing alludes to the technique of baiting people and like in real fishing, fooling at least some into biting and getting caught in the trap. 

In this fraudulent type, perpetrators pretend to be legitimate financial institutions, retailers, social media companies, and government agencies in an attempt to get you to divulge private information like date of birth, social security numbers, mother maiden names, account numbers, passwords and more.
Once criminals have this valuable information, they can commit identity theft, break into your accounts, and steal money or information.

Spear-phishing is a derivative of this scam that is targeted on specific people, and whaling is when the scam is perpetrated on organization executives or other high profile targets,  which can be especially compromising and harmful to themselves or the organizations they represent.
The first recorded phishing attack was in 1987.  Over the years, the prevalence of these attacks have steadily increased. According to the Anti-phishing Working Group (APWG), there were some 20,000-25,000 unique phishing campaigns every months through the first half of 2011, each targeting potentially millions of users.  Additionally, as of March 2011, there were as many as 38,000 phishing sites.  The most targeted industry continues to be financial services with 47% of the attacks.
There are a number of ways to protect yourself against phishing attacks.
  1. Delete email and messages that are unwarranted and ask for personal information
  2. Do not click on links, instead go directly to a website by using a search engine to locate it or copying the link and pasting it into the browser
  3. Configure your browser to block pop-ups
  4. Use anti-virus, firewalls, and anti-spam software
  5. Set up automatic security updates
  6. Input personal information only into secure sites, such as those that begin with "https"
  7. Only open attachments when you are expecting them and recognize where they are coming from
  8. Check financial statements upon receipt for any fraudulent activity
  9. If you are caught in a phishing scheme, notify law enforcement and credit reporting authorities immediately
  10. Always be cautious in giving out personal information
Whether you consider yourself a big fish or a small fish, beware of those trying to catch you up on the Internet--hook, line, and sinker.

Share/Save/Bookmark

February 1, 2012

App Provides Push-Button Emergency Help

Crimepush
An important new free iPhone/Android App called CrimePush hit the market today.

It allows you or a loved one at the push of a button to report a crime.  

Once you download the app, you can store your name, phone number, and address (so it's there in case something G-d forbid happens).

Further, you can set the App to report crimes with your information or anonymously and with or without your GPS location. 

Then you have a screen that provides you with 9 options for the various types of crime or emergency:

- Theft
- Threat
- Altercation
- Sexual Abuse
- Medical
- Accident
- Vandalism
- Drugs
- Harassment


Click on theft, as an example, the date and time are pre-populated for you, and you have a free text area to describe the incident, and the options to add a photo, video, or audio.

Then simply hit the "push" button to submit to the authorities. 

My understanding is that more enhancements to the CrimePush App are in the works such as the ability to shake your phone to activate CrimePush, so the police can find you quickly through GPS. 

CrimePush has the potential to help a lot of people and ultimately actually help to reduce crime by having people report instead of ignore, and provide information to the authorities faster, more accurately, and more comprehensively using the various multimedia options to capture the crime and the criminals.

(Source Photo: here)

Share/Save/Bookmark

December 31, 2011

The Not So Candid Camera

When you're at the swimming pool, it's a time for swimming, splashing, and fun.

With family and friends, it's even a great time to catch some scenic photos of loved ones having a great time.

You expect to see cameras and smartphones taking some discreet pictures or videos.

Not a new problem, but some people take advantage of the people swimming or tanning to take compromising shots.

When people are knowingly scantily clad in public--people will argue what level of responsibility they have for the way they present themselves.

However, when others take advantage of that--let's be clear, the predator is the aggressor!

At the pool, I saw this taken to a whole new level today--and by someone and in a way I would not have expected.

This older-looking guy, with a hat on, strolls up to the pool with a huge tripod mounted video camera on a WALKER and starts taking rolling video on a pool almost exclusively filled with little children.

There was no warning, no request--"may I", no do you mind, just a video camera mounted on a walker at the head of the pool with lots of little kids, and also some teens, women, and more.

First, I watched to see what this guy was doing...then I thought, I better capture this and I took a series of photographs of the guy--who had no apparent compunction about invading everyones privacy.

But the story isn't over--it get's worse.

All of a sudden, I notice my computer picking up a wireless network with a name that self identified them with a clear inclination for child pornography (I am withholding the actual name so as not to tip off the criminal). I capture this too--with a screenshot. Was it the same guy with mounted video camera or someone else?

So much for a relatively serene vacation, and some quiet private time.
I just saw Dateline's "To Catch A Predator" early this week and I almost can't believe this is happening. I think to myself--is this real? Unfortunately it is.

I reported both incidents to hotel security. At their request, I email them the screenshot of the wireless network name that would make anyone cringe. Next call is to the National Center for Missing and Exploited Children and CyberCrime.com.

Normally, I believe in live and let live, but we all have to do our part to protect children and other innocent victims.

Share/Save/Bookmark

December 2, 2011

Who Will Protect Those Who Protect Us?

This is a video that the Federal Law Enforcement Officers Association (FLEOA) sent to Congress to appeal to them not to cut funding to all the activities that our law enforcement officers do for us.

While the functions of government can always be more efficient--and we should constantly work to achieve these--federal law enforcement is incredibly important.

From the FBI to the Secret Service and from Border Patrol to DEA, we need to support all our federal law enforcement efforts.

These agents and officers risk their lives every day for all of us, and it's time that we stand by them to protect their mission and jobs.

Share/Save/Bookmark

November 26, 2011

Espionage, Social Media Style

You are being watched!
Good guys and bad guys are tracking your movements, rants and raves, photos, and more online.
For example, The Atlantic reported on 4 November 2011 in an article titled How the CIA Uses Social Media to Track How People Feel that "analysts are tracking millions of tweets, blog posts, and Facebook updates around the world."
Further, in January 2009, "DHS established a Social Networking Monitoring Center (SNMC) to monitor social networking sites for 'items of interest.'"
And even more recently in August 2011, DARPA invited proposals for "memetracking" to identify themes and sentiments online and potentially use this for predictive analysis.
The thinking is that if you can use online information to predict stock market movements as some have attempted, why not criminal and terrorist activity?
Similarly, The Guardian reported on 16 March 2010 FBI using Facebook in fight against crime and cautions that "criminals dumb enough to brag about their exploits on social networking sites have now been warned: the next Facebook 'friend' who contacts you may be an FBI agent."
This is reminescent of the work of private sector, Dateline NBC in using Internet chat rooms to catch sexual predators online by luring them to a house where the predators believed they were going to meet up with a underage girl for a tryst.
While these efforts are notable and even praiseworthy by the good guys--assuming you can get over the privacy implications in favor of the potential to have a safer society to live in--these activities should be carefully safeguarded, so as not to infringe on the rights and freedoms of those who behave legally and ethically.
But the good guys are not the only ones using the tools of the trade for monitoring and analyzing social networking activities--the bad guys too recognize the implicit information treasure trove available and have you in their crosshairs.
For example, in the last years Arab Spring, we have nation states tracking their citizens political activities and using their power over the Internet to shut off access and otherwise surpress democracy and human rights. Further, we have seen their use for cyberspying and testing offensive cyber attack capabilities--only the most recent of which was the alleged infiltration of a SCADA system for a Illinois water plant.
Moreover, this past week, Forbes (21 November 2011) reported in The Spy Who Liked Me that "your social network friends might not be all that friendly."
From corporate espionage to market intelligence, there are those online who "steadfastly follows competitors' executives and employees on Twitter and LinkedIn."
In fact, the notion of online monitoring is so strong now that the article openly states that "if you're not monitoring your competitors activity on social media, you may be missing out on delicious tidbits" and warns that "it's easy to forget that some may not have your best intersts at heart."
Additionally, while you may not think your posts online give that much away, when your information is aggregated with other peoples posts as well as public information, it's possible to put together a pretty good sketch of what organizations and individuals are doing.
Forbes lists the following sites as examples of the "Web Spy Manual" with lots of information to pull from: Slideshare, Glassdoor.com, Quora, iSpionage, Youtube as well as job postings and customer support forums.
When you are on your computer in what you believe to be the privacy of your own home, office, or wherever, do not be deceived, when you are logged on, you are basically as open book for all the world to see--good guys and bad guys alike.
(Source Photo: here)

Share/Save/Bookmark

November 10, 2011

Tougher Than An iPad



Panasonic unveiled their ToughPad this week--the FZ-A1.

This is a hardened device ready for outdoor use. Rated for MIL-STD-810G, the device is 4' shock-resistant, rated for extreme temperatures, and is resistant to water and dust with IP65 sealed design.

Currently comes in 10" size, but the FZ-B1 device is slated for a smaller 7" screen in Q2 2012.

The toughPad packs a lot of punch: This is an Android 3.2 device with 1.2 GHz dual core,1 GB RAM, 16 GB storage, 2 cameras (back 5 megapixel and front 2 megapixel), anti-glare multitouch screen 768 x 1024 megapixels, a 10 hour repalceable battery, USB, GPS, WIFI 802.11, Bluetooth, and optional 3G mobile broadband.

Optional accessories for vehicle mounting and hands-free holsters.

Priced at around $1299.

Great option for the warfighter, law enforcement, and homeland security professional as well as others working in challenging environments.


Share/Save/Bookmark

October 23, 2011

Architecting Crowd Control

Last week (19 October 2011) T3 Motion Inc. in CA launched their all electric Non-Lethal Response Vehicle (NLRV) for "crowd control."

The vehicle is a souped-up three-wheeled Segway equipped two compressed air powered rifles able to shoot 700 non-lethal rounds per minute of pepper, water, dye, or rubber projectiles, and each vehicles can carry 10,000 rounds.

According to Trendhunter, the NLRV also has a "40,000-lumen LED strobe light, a riot shield, a P.A. system, and puncture-proof tires" as well as a video camera.

The notion of a law enforcement officer shooting an automatic (non-lethal, as it may be) to quell a riot does not quite fit in with general first amendment rights for peaceful assembly and typical demonstrations that as far as I know are generally NOT an all heck break loose scenario.

I wonder whether instead of a NLRV for handling riot control, a better idea would be a Lethal Response Vehicle (LRV)--with proper training and precautions--to handle homeland security patrols at major points of entry and around critical infrastructure.

From an architecture perspective, this seems to me to be a clear case of where a "desirement" by somebody out there (gaming, fantasy, or what not) should be channeled into fulfilling a more genuine requirement for people actually protecting our homeland.

The benefits of speed and maneuverability can benefit field officers in the right situations--where real adversaries need to be confronted quickly with the right equipment.

Share/Save/Bookmark

October 2, 2011

Robots Are Not Just For Fighting

"The AlphaDog Proto is a lab prototype for the Legged Squad Support System [LS3], a robot being developed by Boston Dynamics with funding from DARPA and the US Marine Corps. When fully developed the system will carry 400 lbs of payload on 20-mile missions in rough terrain. The first version of the complete robot will be completed in 2012."

According to Boston Dynamics, AlphaDog will follow a leader with computer vision or travel via GPS to designated locations.

The video shows a truly amazing display of the robot galloping, traversing obstacles, recovering from being pushed, and even rolling over and getting up from a supine position.

AlphaDog is designed as a true workhorse and resembles something more out of a Mad Max movie than what you would think of as supporting our next generation war fighters. Note: I'll take a flying hovercraft with pinpoint fire laser ray beams over a 4-legged robot workhorse any day! :-)

But with the array of sensors and weapons supported by drones flying overhead and robotics sentries on the ground, and 4-legged robots ferrying supplies to the front lines, the battlefield is quickly changing to man and machine fighting side by side, and maybe one day machines fighting in lieu of people.

While MIT Technology Review states "This is just what soldiers need," I'm interested in seeing future applications of these robots not just for the military, but also in terms of how they will change areas such as law enforcement, fire and rescue, construction, assembly-line production, transportation, medicine, service industries, and more.

Robots are not just for fighting, although it looks like AlphaDog could give anyone a good kick in the teeth and keep on lugging its load.

Share/Save/Bookmark

August 5, 2011

Facial Recognition Goes Mainstream

Bar

Facial recognition applications are no longer just for the military and law enforcement to identify hostiles or criminals, but rather is going mainstream.

The Wall Street Journal (5 August 2011) reports from the bar scene to the television and from vampire gaming to celebrity match-ups, facial recognition software is now part of our everyday technology mix.

Facial recognition is "at a tipping point where some of these face-recognition technologies are not just gimicks, but are becoming useful." Moreover, the technology has become quite good with "frontal face images, the error rate of rejecting a legitimate claim--when the face image and name match-decreased to 0.29% in 2010 from a rate of 79% in 1993."

So here are some examples of how facial recognition is being used:

- SceneTap: Free app for iPhone and Droid "displays real time stats on the local bar scene...shows the number of people at the bar, the male-to-female ratio, and the average age of the patron"--all from facial recognition--this is not bad except for the bartender on a slow night.

- TVs with Viewdle: TV set-top boxes with facial recongition can "identify who is sitting in front of the TV then customize programming accordingly...displaying most recently watched or recorded shows"--can anyone say America's Got Talent!

- Third Eye: Facebook game that based on facial recognition identifies people as either vampires or slayers. Even without the app, I'd bet I'm one of the slayers :-)

- FaceR Celebrity: This iPhone app uses a picture and facial recognition software to determine which celebrities you most closely resemble. For me, it's Sylvester Stallone, all the way--I'm sure of it.

A lot of people are concerned about the privacy implications of facial recognition--collecting and storing images of faces and using it for surveillance and tracking and getting into your business...like knowing what bars or whereever else you are going to.

But apps like SceneTap say they don't collect personal information, nobody sees the video feed, and they don't match the images to photos on the web or Facebook to identify exactly who is entering the bar. This is sounding a little like TSA and the body imaging scanners they use--i.e. don't worry nobody sees your privates! :-)

But perhaps, whether or not they do or don't isn't the point, they could and that is a privacy concern.

Facial recognition technology, even though it is used in gaming, it is not kid's play, and it should be regulated to avoid a society where Internet "big brother" has virtually unlimited capability to track and match each and every facial you!

(Source Photo: here)

Share/Save/Bookmark

June 16, 2011

New Beginnings

Next week I am excited to begin a new journey as a Division Chief at the U.S. Department of State.

I just wanted to take a minute to thank the ATF for the opportunity to serve there as the Chief Technology Officer these last few years.

There are no finer or more dedicated law enforcement agents than those that work for our federal government, and I am so proud that the ATF chose me to support their vital mission of protecting our country.

I also greatly appreciate the opportunity to have worked and learned with such talented and dedicated professionals in the Office of Science and Technology.

Some people have asked me to comment on my tenure from the perspective of what's going on in the news. It wouldn't be appropriate for me to do that, but I do want to recognize and thank people for caring so passionately about our great country.

It's a new chapter in my life and I'm ready to roll up my sleeves, learn, and contribute as well.

I am grateful for the wonderful opportunity--ready, set, go!

Share/Save/Bookmark

June 5, 2011

Video Surveillance Made Easier

One of the big problems with video surveillance is that even the most alert security team can be lulled by fatigue and boredom into missing critical events and details on the closed-circuit television (CCTV).

Now there is a new technology called BriefCam (founded in 2007) from Hebrew University in Israel that summarizes hours of video in brief minutes.

What differentiates this new technology, according to The Economist (15 February 2011) is that rather than fast-forwarding or using motion detection to capture or select images, BriefCam captures everything, but "creates a summary of all moving events and play back a synopsis...not speeded up, each person moves at their actual pace. And at any time during the review an operator can switch [click-on the time stamp of the event of interest] to see the original video footage."

BriefCam creates like a time warp where "all moving events from the period of interest are collected and shifted in time to create the synopsis."

Essentially objects are overlaid on a timeless background, so you are seeing them occur simultaneously, each with a timestamp that can be selected and clicked to isolate the event.

What makes this an incredible forensic tool, is that there are controls for speed and density of what you watching, and for even moving objects out of the way on the screen.

The Chairman of BriefCam explains, "We don't try to replace human eyes, we just report what we see so that it is more comprehensible."

This is particularly helpful since according to CNBC (July 2010), which awarded BriefCam as number 2 of Europe's 25 Most Creative Companies, noted "the average person viewing surveillance footage has an effective attention span of about [only] 20 minutes."

This is why BriefCam can help our law enforcement and security personnel overcome the traditional video surveillance issues that the Wall Street Journal (27 September 2010) put as "there's not enough time and manpower to watch it all." This is one reason that the WSJ awarded BriefCam their 2010 Innovation Award.

Potential customers for this physical security technology includes police, homeland security, military, as well as commercial customers.

This is a very promising technology tool that with the addition or integration of recognition software and metadata tagging can help us monitor and safeguard our borders, streets, and critical infrastructure.

Share/Save/Bookmark

June 4, 2011

Armored Skin


(Source Photo: CrunchGear)

Not just for super heroes in comic books anymore, ArmStar has invented a new non-lethal weapon called the BodyGuard.

It was invented by David Brown, a cameraman, editor, and producer, and supposed friend of Kevin Costner.

The idea of the encased ballistic nylon arm glove is that if you are wearing the weapon, you won't drop it or easily be disarmed by your opponent.

According to CrunchGear (31 May 2011), "The BodyGuard is an armored gauntlet with a 500,000-volt stunner protruding from the back of the hand, with room for any number of other weapons of self defense."

Aside from the stun gun, current prototypes come equipped with video camera, laser pointer, and flashlight; and future versions are envisioned to have chemical sensors, GPS, biometric readers, translators, and more.

I would imagine, you could also install things like mace or smoke that can be dispensed into action at the push of a button (with safety).

This is why the BodyGuard is seen not only as a weapon, but also as a weapons platform, with an actuator pressure pad in the palm of the hand controlling the release of the weapons.

The menacing display of voltage between the electrodes on the wrist, the green laser target on one's chest, as well as knowing that you may be videotaped (along with the possibility of other embedded weapons) can make the BodyGuard a useful tool for law enforcement to help prevent and defuse confrontations, deter criminals, and save lives.

The BodyGuard won a Popular Science 2011 Invention Award and according to their magazine "the first demo unit will be released to the Los Angeles sheriff's department later this year."
While I think the non-lethal version is promising for law enforcement, a lethal version for our military seems like a another market and next step in delivering ergonomic and flexible battle gear to our war fighters.

I think there is also potential here for non-weaponized versions, for commercial and personal use--where ever and whenever body protection and quick access to tools and gadgets are needed--construction, manufacturing, even mountain climbing!

Finally, while having this is nice on one arm, I think this could be expanded for modules for both arms, legs, and so forth.

This has a lot of potential and I wish I had one of these when riding the IRT subway late in the evenings in NYC as a kid...it would have been nice to hit the pressure button and watch the volts arc and the bad guys just run the other way.

Share/Save/Bookmark