Risk
6/29/2012
02:59 PM
50%
50%

In-Q-Tel Partners With Looxcie On Next-Gen Videocam

CIA's venture investment firm wants to develop a wearable video camera for use by the DHS.

Mission Intelligence: NRO's Newest Spy Satellites
Mission Intelligence: NRO's Newest Spy Satellites
(click image for larger view and for slideshow)
In-Q-Tel, the venture investment firm created by the CIA to identify, adapt, and deliver useful new technologies to the intelligence community, announced it has established a strategic partnership and technology development agreement with Looxcie Inc., maker of the first "wear-and-share" video camera.

The purpose of the agreement is to facilitate design and development of next-generation videocams, making use of Looxcie's intellectual property.

"Looxcie has established itself as a market leader in wearable videocam technology and we are impressed with the unique capabilities offered by the company," Steve Bowsher, managing partner at In-Q-Tel, said in a prepared statement. "Our partnership with Looxcie will provide our government customers with an opportunity to utilize and build upon this innovative product."

[ Read about DARPA's competition to develop unmanned aerial vehicles for real-time surveillance. See Drones Fail 'Perch And Stare' Contest. ]

In-Q-Tel said in the statement that the technology is being developed for the Department of Homeland Security's science and technology directorate.

Looxcie's wearable videocam is available through selected RadioShack stores across the country. Free mobile apps for the device are available through the company's website.

This is not the first time that In-Q-Tel has invested in technology available to retail and commercial customers. In May, the venture firm entered into a similar agreement with Walleye Technologies Inc., which developed a hand-held, microwave-based "see-through-walls" device. The digital images produced can be downloaded, stored, and transmitted. In-Q-Tel's investment will provide the funds for Walleye to begin manufacturing its devices, as well as open doors at government agencies that may have use for its capabilities.

In February, In-Q-Tel entered into an agreement with Mersive, a provider of visual computing software that enables the creation of large-scale, high-performance displays. Mersive's software is used by providers of commodity projector hardware to create displays, and with developers of visualization, command and control, and simulation and training software to enhance the display experience.

Since its founding in 1999, In-Q-Tel has expanded its scope of operations to support several agencies within the intelligence community, including the Defense Intelligence Agency and the National Geospatial-Intelligence Agency. The agreement with Looxcie, to benefit DHS, is an example of this expansion.

The Office of Management and Budget demands that federal agencies tap into a more efficient IT delivery model. The new Shared Services Mandate issue of InformationWeek Government explains how they're doing it. Also in this issue: Uncle Sam should develop an IT savings dashboard that shows the returns on its multibillion-dollar IT investment. (Free registration required.)

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-3971
Published: 2014-12-25
The CmdAuthenticate::_authenticateX509 function in db/commands/authentication_commands.cpp in mongod in MongoDB 2.6.x before 2.6.2 allows remote attackers to cause a denial of service (daemon crash) by attempting authentication with an invalid X.509 client certificate.

CVE-2014-7193
Published: 2014-12-25
The Crumb plugin before 3.0.0 for Node.js does not properly restrict token access in situations where a hapi route handler has CORS enabled, which allows remote attackers to obtain sensitive information, and potentially obtain the ability to spoof requests to non-CORS routes, via a crafted web site ...

CVE-2004-2771
Published: 2014-12-24
The expand function in fio.c in Heirloom mailx 12.5 and earlier and BSD mailx 8.1.2 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in an email address.

CVE-2014-3569
Published: 2014-12-24
The ssl23_get_client_hello function in s23_srvr.c in OpenSSL 1.0.1j does not properly handle attempts to use unsupported protocols, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an unexpected handshake, as demonstrated by an SSLv3 handshak...

CVE-2014-4322
Published: 2014-12-24
drivers/misc/qseecom.c in the QSEECOM driver for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, does not validate certain offset, length, and base values within an ioctl call, which allows attackers to gain privileges or c...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.