02:59 PM

In-Q-Tel Partners With Looxcie On Next-Gen Videocam

CIA's venture investment firm wants to develop a wearable video camera for use by the DHS.

Mission Intelligence: NRO's Newest Spy Satellites
Mission Intelligence: NRO's Newest Spy Satellites
(click image for larger view and for slideshow)
In-Q-Tel, the venture investment firm created by the CIA to identify, adapt, and deliver useful new technologies to the intelligence community, announced it has established a strategic partnership and technology development agreement with Looxcie Inc., maker of the first "wear-and-share" video camera.

The purpose of the agreement is to facilitate design and development of next-generation videocams, making use of Looxcie's intellectual property.

"Looxcie has established itself as a market leader in wearable videocam technology and we are impressed with the unique capabilities offered by the company," Steve Bowsher, managing partner at In-Q-Tel, said in a prepared statement. "Our partnership with Looxcie will provide our government customers with an opportunity to utilize and build upon this innovative product."

[ Read about DARPA's competition to develop unmanned aerial vehicles for real-time surveillance. See Drones Fail 'Perch And Stare' Contest. ]

In-Q-Tel said in the statement that the technology is being developed for the Department of Homeland Security's science and technology directorate.

Looxcie's wearable videocam is available through selected RadioShack stores across the country. Free mobile apps for the device are available through the company's website.

This is not the first time that In-Q-Tel has invested in technology available to retail and commercial customers. In May, the venture firm entered into a similar agreement with Walleye Technologies Inc., which developed a hand-held, microwave-based "see-through-walls" device. The digital images produced can be downloaded, stored, and transmitted. In-Q-Tel's investment will provide the funds for Walleye to begin manufacturing its devices, as well as open doors at government agencies that may have use for its capabilities.

In February, In-Q-Tel entered into an agreement with Mersive, a provider of visual computing software that enables the creation of large-scale, high-performance displays. Mersive's software is used by providers of commodity projector hardware to create displays, and with developers of visualization, command and control, and simulation and training software to enhance the display experience.

Since its founding in 1999, In-Q-Tel has expanded its scope of operations to support several agencies within the intelligence community, including the Defense Intelligence Agency and the National Geospatial-Intelligence Agency. The agreement with Looxcie, to benefit DHS, is an example of this expansion.

The Office of Management and Budget demands that federal agencies tap into a more efficient IT delivery model. The new Shared Services Mandate issue of InformationWeek Government explains how they're doing it. Also in this issue: Uncle Sam should develop an IT savings dashboard that shows the returns on its multibillion-dollar IT investment. (Free registration required.)

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Current Issue
E-Commerce Security: What Every Enterprise Needs to Know
The mainstream use of EMV smartcards in the US has experts predicting an increase in online fraud. Organizations will need to look at new tools and processes for building better breach detection and response capabilities.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio