Feeds

Home Office plans for science to tackle terror

Boffins, your country needs you!

Beginner's guide to SSL certificates

The government has set out its plans to use science and technology to tackle crime and terrorism. Home Office Minister Andy Burnham, last seen on the ID card campaign trail, published details of the technologies he hopes can be brought to bear in the department's Science and Innovation Strategy 2005-08.

His wish list includes RFID tracking, new scanning technologies, the development of a so-called drugalyser for roadside drug testing and a wider use of biometric identifiers. In particular, the report highlights the potential of gene analysis to help identify a person by suggesting details of their "physical characteristics and lifestyle".

Burnham said: "We are dealing with increasingly sophisticated, organised criminality and we need to ensure that our use of science and technology meets the challenge."

The Home Office Scientific Development Branch (HOSDB) is already working on many of these technologies. The researchers are working on using spectroscopy to probe a saliva sample for any drugs, including illegal drugs, that it might contain.

RFID tagging is already being used to combat counterfeiting, and other tracking technologies are in use to monitor criminals. There is also more to come from automatic tracking and identification from CCTV pictures, the department said.

As well as setting up a team within the Home Office to oversee the implementation of the strategy, Burnham says he hopes to work closely with universities, industry and other government departments both in the UK and abroad.

"We invest nearly £60m each year across a broad range of sciences and on top of our own investment, we are now leading a £14 million cross-Whitehall counter-terrorism research programme to address the knowledge gaps that need to be filled." ®

Read the proposal for yourself here.

Intelligent flash storage arrays

More from The Register

next story
I'll be back (and forward): Hollywood's time travel tribulations
Quick, call the Time Cops to sort out this paradox!
Musicians sue UK.gov over 'zero pay' copyright fix
Everyone else in Europe compensates us - why can't you?
Megaupload overlord Kim Dotcom: The US HAS RADICALISED ME!
Now my lawyers have bailed 'cos I'm 'OFFICIALLY' BROKE
MI6 oversight report on Lee Rigby murder: US web giants offer 'safe haven for TERRORISM'
PM urged to 'prioritise issue' after Facebook hindsight find
BT said to have pulled patent-infringing boxes from DSL network
Take your license demand and stick it in your ASSIA
Right to be forgotten should apply to Google.com too: EU
And hey - no need to tell the website you've de-listed. That'll make it easier ...
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
The total economic impact of Druva inSync
Examining the ROI enterprises may realize by implementing inSync, as they look to improve backup and recovery of endpoint data in a cost-effective manner.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.