Risk
6/29/2012
02:59 PM
Connect Directly
RSS
E-Mail
50%
50%

In-Q-Tel Partners With Looxcie On Next-Gen Videocam

CIA's venture investment firm wants to develop a wearable video camera for use by the DHS.

Mission Intelligence: NRO's Newest Spy Satellites
Mission Intelligence: NRO's Newest Spy Satellites
(click image for larger view and for slideshow)
In-Q-Tel, the venture investment firm created by the CIA to identify, adapt, and deliver useful new technologies to the intelligence community, announced it has established a strategic partnership and technology development agreement with Looxcie Inc., maker of the first "wear-and-share" video camera.

The purpose of the agreement is to facilitate design and development of next-generation videocams, making use of Looxcie's intellectual property.

"Looxcie has established itself as a market leader in wearable videocam technology and we are impressed with the unique capabilities offered by the company," Steve Bowsher, managing partner at In-Q-Tel, said in a prepared statement. "Our partnership with Looxcie will provide our government customers with an opportunity to utilize and build upon this innovative product."

[ Read about DARPA's competition to develop unmanned aerial vehicles for real-time surveillance. See Drones Fail 'Perch And Stare' Contest. ]

In-Q-Tel said in the statement that the technology is being developed for the Department of Homeland Security's science and technology directorate.

Looxcie's wearable videocam is available through selected RadioShack stores across the country. Free mobile apps for the device are available through the company's website.

This is not the first time that In-Q-Tel has invested in technology available to retail and commercial customers. In May, the venture firm entered into a similar agreement with Walleye Technologies Inc., which developed a hand-held, microwave-based "see-through-walls" device. The digital images produced can be downloaded, stored, and transmitted. In-Q-Tel's investment will provide the funds for Walleye to begin manufacturing its devices, as well as open doors at government agencies that may have use for its capabilities.

In February, In-Q-Tel entered into an agreement with Mersive, a provider of visual computing software that enables the creation of large-scale, high-performance displays. Mersive's software is used by providers of commodity projector hardware to create displays, and with developers of visualization, command and control, and simulation and training software to enhance the display experience.

Since its founding in 1999, In-Q-Tel has expanded its scope of operations to support several agencies within the intelligence community, including the Defense Intelligence Agency and the National Geospatial-Intelligence Agency. The agreement with Looxcie, to benefit DHS, is an example of this expansion.

The Office of Management and Budget demands that federal agencies tap into a more efficient IT delivery model. The new Shared Services Mandate issue of InformationWeek Government explains how they're doing it. Also in this issue: Uncle Sam should develop an IT savings dashboard that shows the returns on its multibillion-dollar IT investment. (Free registration required.)

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6335
Published: 2014-08-26
The Backup-Archive client in IBM Tivoli Storage Manager (TSM) for Space Management 5.x and 6.x before 6.2.5.3, 6.3.x before 6.3.2, 6.4.x before 6.4.2, and 7.1.x before 7.1.0.3 on Linux and AIX, and 5.x and 6.x before 6.1.5.6 on Solaris and HP-UX, does not preserve file permissions across backup and ...

CVE-2014-0480
Published: 2014-08-26
The core.urlresolvers.reverse function in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 does not properly validate URLs, which allows remote attackers to conduct phishing attacks via a // (slash slash) in a URL, which triggers a scheme-relative URL ...

CVE-2014-0481
Published: 2014-08-26
The default configuration for the file upload handling system in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 uses a sequential file name generation process when a file with a conflicting name is uploaded, which allows remote attackers to cause a d...

CVE-2014-0482
Published: 2014-08-26
The contrib.auth.middleware.RemoteUserMiddleware middleware in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3, when using the contrib.auth.backends.RemoteUserBackend backend, allows remote authenticated users to hijack web sessions via vectors relate...

CVE-2014-0483
Published: 2014-08-26
The administrative interface (contrib.admin) in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 does not check if a field represents a relationship between models, which allows remote authenticated users to obtain sensitive information via a to_field ...

Best of the Web
Dark Reading Radio
Listen Now The Best of the Rest of Black Hat: The Enterprise View
This episode of Dark Reading Radio looks at infosec security from the big enterprise POV with interviews featuring Ron Plesco, Cyber Investigations, Intelligence & Analytics at KPMG; and Chris Inglis & Chris Bell of Securonix.