02:59 PM

In-Q-Tel Partners With Looxcie On Next-Gen Videocam

CIA's venture investment firm wants to develop a wearable video camera for use by the DHS.

Mission Intelligence: NRO's Newest Spy Satellites
Mission Intelligence: NRO's Newest Spy Satellites
(click image for larger view and for slideshow)
In-Q-Tel, the venture investment firm created by the CIA to identify, adapt, and deliver useful new technologies to the intelligence community, announced it has established a strategic partnership and technology development agreement with Looxcie Inc., maker of the first "wear-and-share" video camera.

The purpose of the agreement is to facilitate design and development of next-generation videocams, making use of Looxcie's intellectual property.

"Looxcie has established itself as a market leader in wearable videocam technology and we are impressed with the unique capabilities offered by the company," Steve Bowsher, managing partner at In-Q-Tel, said in a prepared statement. "Our partnership with Looxcie will provide our government customers with an opportunity to utilize and build upon this innovative product."

[ Read about DARPA's competition to develop unmanned aerial vehicles for real-time surveillance. See Drones Fail 'Perch And Stare' Contest. ]

In-Q-Tel said in the statement that the technology is being developed for the Department of Homeland Security's science and technology directorate.

Looxcie's wearable videocam is available through selected RadioShack stores across the country. Free mobile apps for the device are available through the company's website.

This is not the first time that In-Q-Tel has invested in technology available to retail and commercial customers. In May, the venture firm entered into a similar agreement with Walleye Technologies Inc., which developed a hand-held, microwave-based "see-through-walls" device. The digital images produced can be downloaded, stored, and transmitted. In-Q-Tel's investment will provide the funds for Walleye to begin manufacturing its devices, as well as open doors at government agencies that may have use for its capabilities.

In February, In-Q-Tel entered into an agreement with Mersive, a provider of visual computing software that enables the creation of large-scale, high-performance displays. Mersive's software is used by providers of commodity projector hardware to create displays, and with developers of visualization, command and control, and simulation and training software to enhance the display experience.

Since its founding in 1999, In-Q-Tel has expanded its scope of operations to support several agencies within the intelligence community, including the Defense Intelligence Agency and the National Geospatial-Intelligence Agency. The agreement with Looxcie, to benefit DHS, is an example of this expansion.

The Office of Management and Budget demands that federal agencies tap into a more efficient IT delivery model. The new Shared Services Mandate issue of InformationWeek Government explains how they're doing it. Also in this issue: Uncle Sam should develop an IT savings dashboard that shows the returns on its multibillion-dollar IT investment. (Free registration required.)

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Current Issue
Dark Reading Tech Digest September 7, 2015
Some security flaws go beyond simple app vulnerabilities. Have you checked for these?
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2015-10-09
Simple Streams (simplestreams) does not properly verify the GPG signatures of disk image files, which allows remote mirror servers to spoof disk images and have unspecified other impact via a 403 (aka Forbidden) response.

Published: 2015-10-09
The Telephony component in Apple OS X before 10.11, when the Continuity feature is enabled, allows local users to bypass intended telephone-call restrictions via unspecified vectors.

Published: 2015-10-09
IcedTea-Web before 1.5.3 and 1.6.x before 1.6.1 does not properly sanitize applet URLs, which allows remote attackers to inject applets into the .appletTrustSettings configuration file and bypass user approval to execute the applet via a crafted web page, possibly related to line breaks.

Published: 2015-10-09
IcedTea-Web before 1.5.3 and 1.6.x before 1.6.1 does not properly determine the origin of unsigned applets, which allows remote attackers to bypass the approval process or trick users into approving applet execution via a crafted web page.

Published: 2015-10-09
The Safari Extensions implementation in Apple Safari before 9 does not require user confirmation before replacing an installed extension, which has unspecified impact and attack vectors.

Dark Reading Radio
Archived Dark Reading Radio
What can the information security industry do to solve the IoT security problem? Learn more and join the conversation on the next episode of Dark Reading Radio.