Toggle light / dark theme

The Federal Aviation Administration put forward a rule Thursday that would empower the government to track most drones in the U.S.

The rule will require drones to implement a remote ID system, which will make it possible for third parties to track them. The measure will help law enforcement identify unauthorized drones that may pose a security threat, paving the way for wider adoption of commercial drone technology.

The rule said that the FAA expects all eligible drones in the U.S. to comply with the rule within three years.

To that end, Fields decided to ask a Florida judge to grant him a warrant that would override the new policy, allowing him to search GEDmatch’s entire database, including users who hadn’t opted in — and Judge Patricia Strowbridge did just that, the detective announced at a recent police convention, according to the NYT.

Legal experts told the NYT that this appears to be the first time a judge has approved a DNA website warrant this broad, with New York University law professor Erin Murphy calling it “a huge game-changer.”

“The company made a decision to keep law enforcement out, and that’s been overridden by a court,” Murphy told the newspaper. “It’s a signal that no genetic information can be safe.”

Europe’s police agency is worried that the 5G will interfere with law enforcement’s ability to track people.

Catherine De Bolle, head of Europol is asking European Union leaders to allow their agency to be more engaged in policy conversations involving the adoption of 5G technology, Reuters reports.

Researchers discovered a new malicious activity that involved by Russian APT hackers to attack Government and Military officials in Ukrainian entities.

The attacker’s targets are not limited but they also infect various individuals who is part of the government and Law enforcement, Journalists, Diplomats, NGO and the Ministry of Foreign Affairs.

Researchers believe that the campaign attributed to Gamaredon activity in which attackers using Dynamic Domain Name Server as C2 server, VBA macro, and VBA script as a part of this attack.

Cops have long had dogs, and robots, to help them do their jobs. And now, they have a robot dog.

Massachusetts State Police is the first law enforcement agency in the country to use Boston Dynamics’ dog-like robot, called Spot. While the use of robotic technology is not new for state police, the temporary acquisition of Spot — a customizable robot some have called “terrifying” — is raising questions from civil rights advocates about how much oversight there should be over police robotics programs.

The state’s bomb squad had Spot on loan from the Waltham-based Boston Dynamics for three months starting in August until November, according to records obtained by the American Civil Liberties Union of Massachusetts and reviewed by WBUR.

Law enforcement and technologists have been arguing over encryption controls for more than two decades. On one side are privacy advocates and tech bosses like Apple’s chief executive, Timothy D. Cook, who believe people should be able to have online communications free of snooping. On the other side are law enforcement and some lawmakers, who believe tough encryption makes it impossible to track child predators, terrorists and other criminals.


After years of on-and-off debate over nearly snoop-proof security, the industry is girding for new pressure from law enforcement around the world.

We face complexity, ambiguity, and uncertainty about the future consequences of cryptocurrency use. There are doubts about the positive and negative impacts of the use of cryptocurrencies in the financial systems. In order to address better and deeper the contradictions and the consequences of the use of cryptocurrencies and also informing the key stakeholders about known and unknown emerging issues in new payment systems, we apply two helpful futures studies tools known as the “Future Wheel”, to identify the key factors, and “System Dynamics Conceptual Mapping”, to understand the relationships among such factors. Two key scenarios will be addressed. In on them, systemic feedback loops might be identified such as a) terrorism, the Achilles’ heel of the cryptocurrencies, b) hackers, the barrier against development, and c) information technology security professionals, a gap in the future job market. Also, in the other scenario, systemic feedback loops might be identified such as a) acceleration of technological entrepreneurship enabled by new payment systems, b) decentralization of financial ecosystem with some friction against it, c) blockchain and shift of banking business model, d) easy international payments triggering structural reforms, and e) the decline of the US and the end of dollar dominance in the global economy. In addition to the feedback loops, we can also identify chained links of consequences that impact productivity and economic growth on the one hand, and shift of energy sources and consumption on the other hand.

Watch the full length presentation at Victor V. Motti YouTube Channel

Rogue drones will be brought down by “detect and destroy” technology under plans for a new national counter-drone force to prevent Gatwick-style disruption, ministers have announced.

The new mobile special unit, to be set up by the Home Office, will be available to any police force or law enforcement agency in the UK to counter potential drone threats at major events or malicious attacks such as the chaos at Gatwick airport last Christmas.

The unit is expected to have military-grade cameras, radar and radio frequency scanners to detect rogue drones, similar to those deployed by the Army at Gatwick.

Hackers equipped with black market software are targeting cash machines with dated software and substandard security and walking away with millions over the course of a series of attacks, according to a collaborative investigation by Motherboard and German newsroom Bayerischer Rundfunk. Though law enforcement agencies are tightlipped about the trend, it’s a sign that banks may be surprisingly vulnerable to cybercrime.


Other sources, granted anonymity by Motherboard, described the same trend: “There are attacks happening, but a lot of the time it’s not publicized,” said one.

Plug-And-Play

The German attacks and others throughout Europe seem to be carried out with Russian software called Cutlet Maker, which Motherboard reports can be bought for $1,000. In the U.S., a program called Ploutus. D is more popular.

Both programs can be installed into ATMs through a USB or other physical access point — though the hackers usually need to break into the ATM’s hardware to access it.

Time for my yearly proselytizing for PBS UK’s Rough Science. Awesome educational show where a bunch of scientists are dumped on an island and have to work together to make something crazy out of local scavenged materials.


The group is taken to a disused prison on the island where they have to determine the longitude and latitude of the island, create a radio from a saucepan and create an insect repellent.