Body-worn video technology finds new use cases in the private sector

Protect yourself from online attacks that threaten your identity, your files, your system, and your financial well-being.

Over the past two years, security technology and public safety policy and transparency have violently bumped symbolic heads.  The shadow of body-worn video surveillance cameras has driven the public perception of deadly police encounters, primarily within the Black community and beyond. This recent exposure has put the technology on equal footing with myriad previous incidents that have grabbed headlines across the country and motivated a movement to mitigate these tragic encounters. As body-worn camera (BWC) proponents have long lauded the visceral perceived benefits to the public safety sector, there has been a steady migration of body-worn devices to other environments in the municipal and commercial business world.

Expanding Use Cases for BWCPolice body-worn cameras have become a high-profile item.Police body-worn cameras have become a high-profile item.Courtesy of Axon

Municipal agencies are seeing body-worn devices work their way into fire departments, courthouses, and onto the uniforms of emergency medical technicians, while on the commercial side, BWC solutions have infiltrated manufacturing plants, retail stores, warehouse facilities, healthcare and school facilities. The technology has even penetrated everything from private security officer companies to big-box retailers like Walmart, which issues proprietary body-worn cameras to monitor its In-Home delivery service team in at least three states around the country where drivers have access to private homes of absent owners to deliver perishable groceries directly inside waiting refrigerators.

In a recent interview with the Seattle Times, Axon, a leading manufacturer of BWC solutions, founder Rick Smith remarked that even though cameras like the GoPro have typified the consumer body-worn camera market for years, his company and others have gained traction with clients because its technology is better suited for evidence gathering given their 12-hour, full-police-shift battery life and delivery of accurate, non-erasable footage — even in low light — and crisp audio along with secure storage options.

Unlike the consumer-glad recreation BWC technology, vendors like Axon, Axis Communications and Tyco Exacq have specialized in integrating advanced data management platforms…


Calvin Teaches Students How To Hack Technology – News

Protect yourself from online attacks that threaten your identity, your files, your system, and your financial well-being.

“We hack everything.”

These are the words of Brian Paige, associate vice president for information technology at Calvin University.

That’s right—the words of Calvin’s chief information officer.

At 3:30 p.m. on Mondays and Thursdays, he and his students are busy at work.

“This is a hacking class,” said Paige.

Hitting the range

Information Security (CS364) is co-taught by Paige and his colleague Adam Vedra, the university’s chief information security officer.

The two spend a lot of time with their students in the U.S. Cyber Range, a virtual computer security lab built specifically for practicing hacking and counter-hacking techniques in a controlled environment.

“The Cyber Range provides an environment to explore legally and safely some of the tools related to cyber security,” said Enoch Mwesigwa, a senior computer science major. “This helped me to better understand the hacker mindset as well as how to thwart and detect them.”

It’s the reason Vedra and Paige want their students to not only learn the concepts, but practice them in a lab.

“We have the opportunity in the range to setup environments that mimic real-world situations,” said Vedra. “They are walking through the steps an attacker would go through to get information and passwords. It opens their eyes to see in some sense how easy it can be if you are properly trained … and it gives them the skills to know how to defend against those sorts of attacks.”

Making timely and historical connections

The labs mimic real-world situations, but so do the concepts discussed in class.

“Every one of our classes could be ripped from the headlines. We often take the daily headline literally from the Wall Street Journal or New York Times or Wired, whatever about nation state cyber war or hacks of credit card companies,” said Paige. “The reason it is so engaging is because you can find the same topics we are talking about reported in the daily news.”

And while the relevancy of the concepts appeal to students, so too does situating the topics in an historical context.

“One aspect of this course that stood out to me is how the professors talked about cybersecurity being a product of…


GBT filed a Patent Application Covering a Commercial Method and Software Application Empowered by AI Technology

Get inside Wall Street with StreetInsider Premium. Claim your 1-week free trial here.

SAN DIEGO, April 27, 2021 (GLOBE NEWSWIRE) — GBT Technologies Inc. (OTC PINK: GTCH) (“GBT” or the “Company”) filed a provisional patent for a commercial method and software empowered by its AI technology with U.S. Patent and Trademark Office (“USPTO”). The invention is targeting a wide variety of advertising and marketing applications and intended for all types of common media such as newspapers, magazines, publications, software, mobile apps, or any type of textual and graphical based material. The method and computer software may also be used on web sites using any Internet browser interface.

The method and software input is textual and/or graphical context in any standard format to produce an output with advertisement and marketing information symbols to attract potential customers attention. The produced material can include LOGOs, symbols, icons and other type of commercial oriented objects. Using the described invention within content of media, introduces a novel method to theoretically increase revenue due to a broader exposure to a marketing and advertising content. The system is targeted to be managed via GBT’s Artificial Intelligence algorithms for scanning a given text/graphics, identifying topics of interest within its context, and assigning commercial oriented objects as methods of advertisement and marketing. The AI engine is also capable of working via NLP (Natural Language Processing) to produce the desired results. The assigned application number is 63177669 and the filing date is April 21, 2021.  The Company is planned to file a nonprovisional application during the next few months.

“As part of our ongoing research and development activities we are filing a patent to protect another possible application for our AI technology, this time in the advertisement and marketing domains. The filed invention describes an innovative method and computer software that we believe has a potential to increase commercial exposure for products or services. It can be used for broad advertisement and marketing campaigns within common types of media like newspapers, magazines,…


Expect The Best, But Prepare For The Worst: 5 Practical Steps To Take Before A Ransomware Attack – Technology

Opt-in to Cyber Safety. Multiple layers of protection for your devices, online privacy and more.

United States:

Expect The Best, But Prepare For The Worst: 5 Practical Steps To Take Before A Ransomware Attack

To print this article, all you need is to be registered or login on

Last month, we wrote about steps to take after experiencing a
ransomware event. This month, as ransomware events continue to
grow in number and severity, we now share the following five
practical tips to implement before a ransomware event.
These tips should help you bolster your defenses and reduce the
havoc a ransomware attack can have on your business. 

1. Obtain Cyber Insurance

Obtain cyber insurance to protect yourself from potentially
devastating losses associated with a ransomware attack. In addition
to the financial peace of mind cyber insurance provides, your cyber
insurance carrier will be your first point of contact should your
business ever experience a ransomware attack. Your cyber insurance
carrier can connect you to the appropriate resources and experts to
assist you in responding to an attack. But please make sure that
you obtain adequate cyber insurance coverage, or else the
exceptionally high costs associated with a ransomware attack may
quickly make inadequate cyber insurance coverage feel like no cyber
insurance coverage at all. 

2. Use Off-Site Backups

Off-site backups are an effective way to recover from a
ransomware attack and restore operations if a ransomware attack
encrypts your on-site data. Ensure that your off-site…