
‘Smell detectors' and AI cameras to be considered to monitor criminals
Tech companies pitched devices to prisons and probation minister James Timpson on Tuesday, as ministers seek to overhaul the justice system.
A smell detector likened to the human nose, which uses synthetic brain cells and artificial intelligence to detect drugs such as spice or fentanyl, was among the proposals to be used in prisons and probation offices.
It could improve staff safety and also help detect if an offender in the community has breached licence conditions.
Companies developing artificial intelligence home monitoring were among the seven finalists of 90 submissions selected for the process.
AI cameras could be set up in homes of offenders in the community to check their behaviour on licence.
It comes as Justice Secretary Shabana Mahmood has said emerging technology has the potential to 'impose a digital prison outside of prison'.
The Government has accepted recommendations from the independent sentencing review to tackle overcrowding behind bars, which will see fewer criminals jailed and more serving sentences in the community.
Lord Timpson said: 'We inherited a justice system in crisis and in need of reform. Prisons and probation are working in analogue while tech drives forward a new digital age.
'That's why we have invited companies to present bold new ideas to help us deliver tough punishment and enhanced surveillance.
'Embracing new technologies will help us to protect victims, reduce reoffending and cut crime as part of our plan for change.'
Other pitched tech ideas included software to help staff consistently input information on offenders and transcription tools to cut administrative tasks.
Successful proposals will be considered to be rolled out under pilot schemes.
Decisions on the plans are expected over the coming months.
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


BBC News
an hour ago
- BBC News
Reading killer detained indefinitely on hospital order
A 49-year-old man has been detained under a hospital order after a trial of facts found he had killed another Mann, from Reading, killed 40-year-old Gerard Coulter at a property in Maldon Close, in the town, on 2 January 2025, a jury at Reading Crown Court concluded on been charged in the days following the stabbing, the court heard in May that Mann was not fit to has been indefinitely detained under a hospital order. Thames Valley Police previously said the pair were known to each were called to the house by South Central Ambulance Service shortly before 23:40 force said the victim, who had several stab wounds, was pronounced dead at the a statement released by police following his death, Mr Coulter's family said his loss had been "heartbreaking".The family said: "As a son, brother, grandson, cousin, nephew and uncle, he brought love and light into our lives in ways that words can scarcely describe."His passing was sudden and violent, something no-one deserves, least of all someone as kind and gentle as Gerard."His belief in the goodness of others and his unwavering hope in life's possibilities made him a rare and beautiful presence in this world." You can follow BBC Berkshire on Facebook, X, or Instagram.


Geeky Gadgets
an hour ago
- Geeky Gadgets
Obsidian Bases Update - NEW Card View Template Generator
What if your note-taking system could not only organize your thoughts but also visually transform your workflow? With the latest update to Obsidian Bases, that vision is now a reality. Imagine managing your projects, research, or personal knowledge base with tools that feel intuitive and almost effortless—like a digital workspace that adapts to you. From the sleek new card view format to dynamic formulas and AI-powered automation, this update redefines what's possible in note management. Whether you're a seasoned Obsidian user or exploring alternatives to platforms like Notion, these features promise to streamline your processes and elevate your productivity. In this piece, Wanderloots explore how the card view template generator and other innovative tools can reshape the way you interact with your notes. You'll discover how to bring clarity to complex projects, automate repetitive tasks, and even integrate visual elements for deeper context. But that's just the beginning—this update isn't just about better organization; it's about unlocking entirely new ways to think, plan, and create. As you read on, consider how these features might fit into your own workflow, transforming it from functional to truly inspiring. Obsidian Bases Update Highlights Card View Format: Visualizing Notes with Clarity The card view format offers a new way to interact with your notes by presenting them in a grid-style layout. Each card can include customizable cover images, making it easier to visually scan and locate information at a glance. You can adjust card sizes and aspect ratios to suit your preferences, whether you're organizing a project board, compiling research materials, or creating a visual knowledge base. This feature brings structure and clarity to your workspace, helping you stay focused and efficient. Automatic Note Generation: Creating Notes with Ease The automatic note generation feature simplifies the process of creating new notes. This tool allows you to generate notes directly within a table, automatically inheriting properties from the current view. For example, when managing a project, you can create task-specific notes pre-filled with relevant metadata, such as deadlines or assigned team members. This built-in template generator reduces manual effort, ensures uniformity across your database, and enhances overall productivity. Obsidian Bases Update 2025 Watch this video on YouTube. Here are more guides from our previous articles and guides related to Obsidian that you may find helpful. Dynamic Formulas: Smarter and More Efficient Task Management Dynamic formulas introduce a powerful tool for managing tasks and deadlines. You can calculate durations, such as the number of days remaining until a deadline or the time elapsed since a note was last updated. These calculations integrate seamlessly into your workflow, allowing you to track progress and set precise reminders. This feature is particularly useful for project management, helping you maintain control over timelines and responsibilities while making sure nothing falls through the cracks. Enhanced Metadata Handling: Organizing with Precision Managing metadata has become more intuitive with the update's enhanced property handling tools. You can now migrate tags, aliases, and CSS classes with ease, making sure consistency across your notes. Additionally, the ability to convert metadata from other platforms, such as Notion, simplifies the transition to Obsidian. These improvements reduce the risk of errors and duplication, allowing you to maintain a well-organized database with minimal effort. Improved Image Integration: Adding Visual Context to Notes The update enhances how images are integrated into your notes, allowing you to render images inline within tables. With dynamic properties, images can now provide additional context to your notes, making them more engaging and informative. This feature is particularly valuable for research databases or project boards, where visual elements can clarify complex ideas or add depth to your workspace. External Links and Sorting: Connecting Notes and Resources Managing external links has become more efficient with the update's new tools. You can link to external URLs and sort your notes based on these links within tables. Additionally, links embedded within notes are automatically displayed, making sure you never lose track of important references. This functionality is especially useful for research projects or collaborative work, where connecting to external resources is essential for success. Dynamic Project Boards: Adapting to Your Workflow Dynamic project boards introduced in this update adapt to the context of your notes, offering a flexible and efficient way to manage tasks and projects. Embedded views allow you to track progress in real time, while AI tools assist in generating and organizing complex systems. For instance, you can create a project board that updates automatically as tasks are completed, providing real-time insights into your progress. This feature is ideal for users looking to streamline their project management processes. Export and Migration Tools: Simplifying Data Management Exporting and migrating data has been made more straightforward with the update's new tools. You can export bases as CSV files, making it easy to share information or integrate with other tools. Migration tools also simplify the process of updating older metadata formats, making sure a smooth transition to the latest features. These capabilities make it easier to maintain and share your knowledge base across different platforms. AI Integration: Automating Workflows for Greater Efficiency AI integration takes productivity to the next level by automating repetitive tasks and generating templates. Tools like Notebook LM and Google AI Studio assist in creating and managing bases, allowing you to focus on higher-level tasks. For example, you can use AI to generate a research database or automate the creation of task-specific notes. These features reduce manual effort and enhance overall efficiency, making your workflows more streamlined and effective. Practical Applications: Unlocking New Possibilities The new features in Obsidian Bases open up a wide range of practical applications, including: Building dynamic project management systems with automated task tracking and real-time updates. Organizing research materials, such as articles, books, and videos, into unified and searchable tables. Implementing spaced repetition systems for learning and review, enhancing knowledge retention. By using these tools, you can create a personalized knowledge management system tailored to your specific needs, whether for professional or personal use. These features empower users to optimize their workflows and achieve greater levels of organization and productivity. Media Credit: Wanderloots Filed Under: Technology News, Top News Latest Geeky Gadgets Deals Disclosure: Some of our articles include affiliate links. If you buy something through one of these links, Geeky Gadgets may earn an affiliate commission. Learn about our Disclosure Policy.


Geeky Gadgets
an hour ago
- Geeky Gadgets
AI Meets Cybersecurity : Entry Level CIA Hacking Test Taken Using AI Assistance
What if the next generation of cybersecurity experts didn't just rely on their own skills but also leaned on artificial intelligence to crack complex challenges? Imagine a scenario where an aspiring CIA analyst uses AI to unravel hidden clues embedded in a single image—decoding GPS coordinates, uncovering usernames, and even extracting passwords. This isn't the plot of a spy thriller; it's a real-world exercise in using AI to solve entry-level open source intelligence (OSINT) puzzles. The integration of AI into cybersecurity tasks is reshaping how we approach problem-solving, offering both efficiency and precision in ways that were once unimaginable. But does this reliance on AI raise questions about the future of human expertise in the field? All About AI explore how AI tools, particularly large language models (LLMs), are being used to tackle OSINT challenges like those hosted on platforms such as TryHackMe. You'll discover how AI can analyze metadata, pinpoint locations, and even connect the dots between seemingly unrelated data points. But it's not just about the technology—context engineering and creative problem-solving remain critical to guiding AI toward meaningful insights. Whether you're curious about the mechanics of metadata analysis or the ethical implications of AI-assisted hacking, this exploration will shed light on the evolving relationship between human ingenuity and machine intelligence. As we dive deeper, one question lingers: are we witnessing the dawn of a new era in cybersecurity, or the outsourcing of critical thinking to machines? AI in OSINT Tasks Understanding the OSINT Challenge The OSINT challenge centers on analyzing a single image file to extract specific pieces of information. This task requires a combination of technical expertise and creative problem-solving. The key objectives include identifying: The username associated with the image. The location where the image was taken. The SSID (Wi-Fi network name) and BSSID (MAC address) of the network. An email address and password embedded within the data. This challenge is an excellent opportunity to apply AI tools in cybersecurity, as it involves uncovering hidden details that are not immediately visible. By using AI, you can streamline the process, making it faster and more precise. AI's Role in Metadata Analysis Metadata analysis is a critical component of the OSINT challenge, and AI tools like LLMs are particularly well-suited for this task. Metadata, often embedded within image files, contains valuable information that can reveal: GPS coordinates: These can pinpoint the exact location where the image was captured. These can pinpoint the exact location where the image was captured. Timestamps: These indicate when the image was taken, providing a temporal context. These indicate when the image was taken, providing a temporal context. Device details: Information about the camera or device used, which can hint at the user's identity. For instance, extracting GPS metadata can lead directly to the image's location, while timestamps and device details can offer additional context. AI tools excel at processing such data quickly and accurately, making them indispensable for this type of analysis. How AI is Transforming Cybersecurity Watch this video on YouTube. Master Cybersecurity with the help of our in-depth articles and helpful guides. Enhancing Precision with Context Engineering To maximize the effectiveness of AI tools, context engineering plays a crucial role. This involves crafting precise and targeted queries to guide the AI toward relevant insights. For example: When analyzing metadata, you can instruct the AI to focus on specific fields, such as GPS coordinates or camera settings, to extract meaningful information. When searching for user-related data, you can direct the AI to cross-reference metadata with external platforms like GitHub, LinkedIn, or social media profiles. By narrowing the AI's focus, context engineering minimizes irrelevant outputs and enhances the accuracy of the results. This approach ensures that the AI delivers actionable insights rather than overwhelming you with extraneous data. Advanced Techniques for Comprehensive Analysis While metadata analysis is a powerful starting point, solving the OSINT challenge often requires additional techniques to uncover all the necessary details. Two advanced methods include: HTML Source Code Analysis: Examining the HTML code of related web pages can reveal hidden information, such as embedded email addresses or passwords. For instance, a blog linked to the image might store sensitive data in plain text within its source code. Examining the HTML code of related web pages can reveal hidden information, such as embedded email addresses or passwords. For instance, a blog linked to the image might store sensitive data in plain text within its source code. Online Database Querying: Platforms like allow you to map BSSID to SSID. By inputting the BSSID extracted from the image metadata, you can identify the corresponding Wi-Fi network name, adding another layer of context to your findings. These techniques highlight the importance of combining AI with traditional cybersecurity tools. By integrating multiple approaches, you can achieve a more comprehensive analysis and uncover details that might otherwise remain hidden. Key Insights from the OSINT Challenge By systematically applying AI tools and traditional techniques, you can extract all the required information from the OSINT challenge. The key findings often include: The username and email address associated with the image. The GPS metadata pinpointing the image's location. The SSID and BSSID of the Wi-Fi network, identified through metadata and online databases. A password discovered through HTML source code analysis. These results demonstrate the potential of AI to streamline and enhance cybersecurity investigations. By effectively guiding AI tools, you can uncover meaningful insights from complex datasets, making the process both efficient and precise. Expanding Applications and Future Potential The OSINT challenge serves as a valuable educational tool, showcasing how AI can be integrated into cybersecurity exercises. By solving real-world problems with AI, you gain practical experience with both the technology and the underlying principles of cybersecurity. The techniques demonstrated—metadata analysis, context engineering, and database querying—can be applied to more advanced scenarios, such as cryptographic analysis or network security assessments. Looking ahead, the role of AI in cybersecurity is expected to grow significantly. As AI tools become more sophisticated, they will enable you to tackle increasingly complex challenges with greater speed and accuracy. Whether you are a seasoned cybersecurity professional or an enthusiast exploring the field, the intersection of AI and cybersecurity offers exciting opportunities for innovation and learning. By staying engaged with these technologies, you can remain at the forefront of a rapidly evolving domain. Media Credit: All About AI Filed Under: AI, Top News Latest Geeky Gadgets Deals Disclosure: Some of our articles include affiliate links. If you buy something through one of these links, Geeky Gadgets may earn an affiliate commission. Learn about our Disclosure Policy.