Tech Talk
Share
Unmanned aerial systems (UAS), more commonly known as “drones,” are both affordable and accessible—a dangerous combination for malicious actors who want to wreak havoc. While no one wants to thi...
Tech Talk
Share
Police agencies are increasingly capturing and processing audio, video, and mobile data related to crimes with body-worn cameras documenting officers’ daily operations. This results in a growing vol...
Tech Talk
Share
In 2008, in response to an increasing need for enhanced public safety and more efficient criminal justice information sharing, Connecticut initiated the development of a centralized system for all cri...
Tech Talk
Share
The introduction of electronic color-changing technology on cars, seen recently in a TikTok video featuring a Porsche Macan, signals a new era in automotive design—even though it isn’t fully reali...
Tech Talk
Share
Lawful access is used by the police to uncover critical information to save victims and serve justice. However, the policing and national security communities are facing increasing challenges with acc...
Tech Talk
Share
The latest Criminal Justice Information Services (CJIS) Security Policy, which took effect on October 1, 2024,  requires any system or application that generates or stores U.S. criminal justice infor...
Tech Talk
Share
The Skeleton Key AI Security Threat is a type of cyber attack that targets large language models (LLMs) that are used to generate natural language outputs for various applications. The attack involves...
Tech Talk
Share
Google, the tech giant widely known for its search engine and online ads, has introduced privacy upgrades with its Privacy Sandbox project to enhance the security of the web environment. Integral to t...