Risk
6/29/2012
02:59 PM
Connect Directly
RSS
E-Mail
50%
50%

In-Q-Tel Partners With Looxcie On Next-Gen Videocam

CIA's venture investment firm wants to develop a wearable video camera for use by the DHS.

Mission Intelligence: NRO's Newest Spy Satellites
Mission Intelligence: NRO's Newest Spy Satellites
(click image for larger view and for slideshow)
In-Q-Tel, the venture investment firm created by the CIA to identify, adapt, and deliver useful new technologies to the intelligence community, announced it has established a strategic partnership and technology development agreement with Looxcie Inc., maker of the first "wear-and-share" video camera.

The purpose of the agreement is to facilitate design and development of next-generation videocams, making use of Looxcie's intellectual property.

"Looxcie has established itself as a market leader in wearable videocam technology and we are impressed with the unique capabilities offered by the company," Steve Bowsher, managing partner at In-Q-Tel, said in a prepared statement. "Our partnership with Looxcie will provide our government customers with an opportunity to utilize and build upon this innovative product."

[ Read about DARPA's competition to develop unmanned aerial vehicles for real-time surveillance. See Drones Fail 'Perch And Stare' Contest. ]

In-Q-Tel said in the statement that the technology is being developed for the Department of Homeland Security's science and technology directorate.

Looxcie's wearable videocam is available through selected RadioShack stores across the country. Free mobile apps for the device are available through the company's website.

This is not the first time that In-Q-Tel has invested in technology available to retail and commercial customers. In May, the venture firm entered into a similar agreement with Walleye Technologies Inc., which developed a hand-held, microwave-based "see-through-walls" device. The digital images produced can be downloaded, stored, and transmitted. In-Q-Tel's investment will provide the funds for Walleye to begin manufacturing its devices, as well as open doors at government agencies that may have use for its capabilities.

In February, In-Q-Tel entered into an agreement with Mersive, a provider of visual computing software that enables the creation of large-scale, high-performance displays. Mersive's software is used by providers of commodity projector hardware to create displays, and with developers of visualization, command and control, and simulation and training software to enhance the display experience.

Since its founding in 1999, In-Q-Tel has expanded its scope of operations to support several agencies within the intelligence community, including the Defense Intelligence Agency and the National Geospatial-Intelligence Agency. The agreement with Looxcie, to benefit DHS, is an example of this expansion.

The Office of Management and Budget demands that federal agencies tap into a more efficient IT delivery model. The new Shared Services Mandate issue of InformationWeek Government explains how they're doing it. Also in this issue: Uncle Sam should develop an IT savings dashboard that shows the returns on its multibillion-dollar IT investment. (Free registration required.)

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2010-5110
Published: 2014-08-29
DCTStream.cc in Poppler before 0.13.3 allows remote attackers to cause a denial of service (crash) via a crafted PDF file.

CVE-2012-1503
Published: 2014-08-29
Cross-site scripting (XSS) vulnerability in Six Apart (formerly Six Apart KK) Movable Type (MT) Pro 5.13 allows remote attackers to inject arbitrary web script or HTML via the comment section.

CVE-2013-5467
Published: 2014-08-29
Monitoring Agent for UNIX Logs 6.2.0 through FP03, 6.2.1 through FP04, 6.2.2 through FP09, and 6.2.3 through FP04 and Monitoring Server (ms) and Shared Libraries (ax) 6.2.0 through FP03, 6.2.1 through FP04, 6.2.2 through FP08, 6.2.3 through FP01, and 6.3.0 through FP01 in IBM Tivoli Monitoring (ITM)...

CVE-2014-0600
Published: 2014-08-29
FileUploadServlet in the Administration service in Novell GroupWise 2014 before SP1 allows remote attackers to read or write to arbitrary files via the poLibMaintenanceFileSave parameter, aka ZDI-CAN-2287.

CVE-2014-0888
Published: 2014-08-29
IBM Worklight Foundation 5.x and 6.x before 6.2.0.0, as used in Worklight and Mobile Foundation, allows remote authenticated users to bypass the application-authenticity feature via unspecified vectors.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
This episode of Dark Reading Radio looks at infosec security from the big enterprise POV with interviews featuring Ron Plesco, Cyber Investigations, Intelligence & Analytics at KPMG; and Chris Inglis & Chris Bell of Securonix.