All items about security

Links
Video

Zdenek Kalal, a PhD at the University of Surrey, has developed an impressive real-time system which looks within a live camera feed for an identified object or person, then watches and learns to track that object as it rotates, moves or disappears, reappears. He demonstrates a prototype of the system in the video shown to the right.

The project won him the ICT Pioneer award and has attracted a great deal of attention from press and industry alike, as this could enable a plethora of image-tracking applications, from security systems to video stablization and control systems for the handicapped.

What is remarkable about the system is that it needs no special training (for example learning what a face is), you can simply identify an object on screen and the system will learn to track it. It looks like the stuff of science-fiction, but it’s very real. Read more on his project page.

Links

The PlaneFinder Augmented Reality app identifies planes in the sky

If an aircraft enthusiast monitors position broadcasts from passing flights and records the identifiers and positions of those planes, is it a threat to security? Most would say no, the information is already being broadcast. What about if he publishes that information on a website? Well, now it’s easier for anyone to use that information – but it’s the same information.

Now, an app, PlaneFinder, has been released for the Android and iPhone which ┬ámakes that same information even more usable – you can now point your phone at the sky and get a live readout of the flight number, speed, destination and route of that otherwise unknown dot in the sky – a pretty powerful tool for plane-spotters and the public.

US authorities including the Federal Aviation Authority and the Department of Homeland Security are concerned that this could be used by terrorists and are investigating the matter. The Daily Mail and other tabloids are concocting horror stories of how the app could be used to target surface-to-air missiles. There are reports that “security experts” have deemed the app “an aid to terrorists”.

Clearly, there is some fear-mongering here, as with any story that can be linked to terrorists – but the pattern is one that is repeating more and more. Using new technology, people are harvesting publicly accessible data, making it usable in new ways, in new situations – and shifting the balance of power from the establishment to the individual. And the establishment doesn’t like that. Should tools that offer such access be banned, as the tabloids suggest? Or would that just deny the public access to a useful tool – and make little difference to the determined wrong-doer?

Read more at ndtv or on Slashdot.

Links

Look out Snow Crash and Strange Days: a British researcher says he’s the first person to become infected with a computer virus.

It’s just a proof of concept, but Dr. Marc Gasson of the University of Reading showed that he could infect an implanted chip (used to open doors and activate his phone) and have that virus passed on to other devices.

While the example seems trivial, it does offer some tantalizingly threatening possibilities: what if I infect your pacemaker, then use that to extort money from you in order to keep it working?

Powered by WordPress, based on Mina theme.