New Border ID System Drawing FrownsAccording to a story from the San Antonio Express-News, border business advocates are worried about the Homeland Security Department’s plans to electronically identify foreign visitors who’ve overstayed their visas. Within two years, a digital photograph and a set of inkless fingerprints will be required of visitors at most ports of entry, and confirmation prints and a photo will be taken again when a visitor leaves. Those who overstay their official welcome might find it more difficult, and maybe impossible, to legally enter the country again, officials said. Because those requirements will apply to millions of Mexicans who use border crossing cards, the so-called “laser visas” typically good for 72-hour visits to the border area, it will have a significant effect on traffic, commerce, tourism and the underground economy there, the Express-News notes.Briton Pleads Guilty to Hacking U.S. Nuclear LabComputerWeekly.com. The lab, near Chicago, noticed something amiss when scheduled backups took longer than normal. McElroy was apparently using the labs servers to store hundreds of gigabytes of copyrighted film and music files, to which he also gave password access to friends. The teenager was arrested at his parents home in London following a joint investigation by the Department of Energy and Scotland Yards Computer Crime Unit. McElroy thought that the Fermilab computers were owned by a university, and claimed that he targeted universities because he thought that they did not have to pay Internet access charges, and made a point of not hacking into corporate systems.Joseph James McElroy, 18, a first-year undergraduate student in the U.K., admitted at a court hearing in London today to hacking into 17 computer systems at the Fermi National Accelerator laboratory, according to a story on Canadian Court Upholds Taking DNA from SuspectsThe Toronto Star today. The legislation requires that police obtain a warrant from a provincial judge, who must be satisfied there are reasonable grounds to believe the targeted person committed the offense. The three main methods involve plucking hair, pricking skin, or swabbing saliva from inside the mouth. The law was challenged by a rape case which produced a child; DNA suggested overwhelming probability the suspect was the father. He contested his DNA was taken without consent. The case was closely watched because DNA analysis is widely accepted as a reliable scientific tool in establishing the guilt or innocence of crime suspects. The Supreme Court of Canada has upheld the right of police to seize DNA from people suspected of serious violent crimes, according to Related content feature Top cybersecurity M&A deals for 2023 Fears of recession, rising interest rates, mass tech layoffs, and conservative spending trends are likely to make dealmakers cautious, but an ever-increasing need to defend against bigger and faster attacks will likely keep M&A activity steady in By CSO Staff Sep 22, 2023 24 mins Mergers and Acquisitions Mergers and Acquisitions Mergers and Acquisitions brandpost Unmasking ransomware threat clusters: Why it matters to defenders Similar patterns of behavior among ransomware treat groups can help security teams better understand and prepare for attacks By Joan Goodchild Sep 21, 2023 3 mins Cybercrime news analysis China’s offensive cyber operations support “soft power” agenda in Africa Researchers track Chinese cyber espionage intrusions targeting African industrial sectors. By Michael Hill Sep 21, 2023 5 mins Advanced Persistent Threats Cyberattacks Critical Infrastructure brandpost Proactive OT security requires visibility + prevention You cannot protect your operation by simply watching and waiting. It is essential to have a defense-in-depth approach. By Austen Byers Sep 21, 2023 4 mins Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe