-
Containing the international spread of Ebola
The West African Ebola virus outbreak is already the largest of its kind, both in terms of numbers and geography. And with the most distant parts of the world less than a day’s flight away, it isn’t too difficult to imagine Ebola virus spreading. During the SARS outbreak, both exit and entry screening strategies failed to detect many cases. The virus spread from Asia to various parts of the world, especially to Canada. But despite the limited detection rate of the airport screening process during the SARS outbreak, it was still thought to be a useful way to educate incoming travelers about what to do and where to go if they became sick.
-
-
Financial firms go beyond NIST's cybersecurity framework
The National Institute of Standards and Technology(NIST) released its Framework for Improving Critical Infrastructure Cybersecurityin February 2014. Utilities, banks, and other critical industries welcomed the guidelines, but many considered the framework to be a baseline for what was needed to continuously protect their networks from cyberattacks. Some financial firms have developed industry-based cyber policies through association such as the Financial Services Information Sharing and Analysis Center’s (FS-ISAC) Third Party Software Security Working Group. The group has been reviewing cyber policies since 2012, before the NIST guidelines were finalized.
-
-
All-industry cybersecurity association needed: Experts
A new report is calling for a professional association committed to serving the cybersecurity industry. Theacknowledged the shortage of qualified cybersecurity professionals, as well as the difficulty of recruiting, training, and hiring potential candidates.Experts say that a cybersecurity association could help assess the needs of employers seeking cybersecurity professionals, establish ongoing training and development programs, and also help develop cybersecurity standards across all industries.
-
-
Program aiming to facilitate cyberthreat information sharing is slow to take off
President Barack Obama’s 2013 executive orderto improve critical infrastructure cybersecurity allows DHS to expand an information-sharing program, once restricted to Pentagoncontractors, to sixteencritical infrastructure industries. The Enhanced Cybersecurity Servicesprogram transmits cyber threat indicators to selected companies so they may prepare their network protection systems to scan for those indicators. A DHS inspector general (IG) reportreleased on Monday has found that just about forty companies from three of the sixteen industries — energy, communications services, and defense — are part of the program. Moreover, only two ISPs are authorized to receive the indicators.
-
-
Two major security vulnerabilities found in majority of world’s smartphones
Researchers have uncovered two major vulnerabilities in smart phones from manufacturers including Apple, Google Android, and Blackberry, among others. These flaws could put up to 90 percent of the world’s two billion smartphones at risk for stolen data, password theft, and the potential for hackers even to take control of the device.
-
-
Keith Alexander turns government experience into lucrative private sector career
Cybersecurity industry insiders are questioning the ethics behind recently retired NSA chief Keith Alexander’s decision to launch IronNet Cybersecurity, a private consultancy, equipped with patents for what he refers to as a game-changing cybersecurity model. Alexander says there is nothing out of the ordinary here. “If I retired from the Army as a brain surgeon, wouldn’t it be OK for me to go into private practice and make money doing brain surgery? I’m a cyber guy. Can’t I go to work and do cyber stuff?”
-
-
New device sniffs out billions in U.S. currency smuggled across the border
Criminals are smuggling an estimated $30 billion in U.S. currency into Mexico each year from the United States, but help could be on the way for border guards, researchers reported. The answer to the problem: a portable device that identifies specific vapors given off by U.S. paper money.
-
-
Utilities increasingly aware of grid vulnerability
An analysis by the federal government shows that if only nine of the country’s 55,000 electrical substations were shut down due to mechanical failure or malicious attack, the nation would experience coast-to-coast blackout. Another report finds cybersecurity as one of the top five concerns for U.S. electric utilities in 2014. The report also found that 32 percent of the surveyed electric utilities had deployed security systems with the “proper segmentation, monitoring and redundancies” needed for adequate cyber protection.
-
-
Harris protests FBI’s Motorola radio upgrade contract
The Harris Corp. has become the second contractor, afterRELM Wireless Corp., formally to protest the FBI’s decision to award a $500 million non-bid contract to Motorola Solutions Inc., claiming the contract to upgrade the FBI’s 30-year-old two-way radio network was “factually unsound, legally unwarranted and wholly unnecessary.”
-
-
Home Depot faces lawsuit over Joplin, Missouri tornado deaths
Home Depot is being sued in a wrongful death lawsuit by a woman who lost her husband and two children during a 2011 tornado in Joplin, Missouri. Edie Housel is contending that Home Depot is responsible for the death of her family due to the improper construction of the Home Depot store in which the three — along with five other people — were killed.
-
-
FDA authorizes use of unapproved Ebola virus test
As Ebola continues to spread throughout West Africa, the Food and Drug Administration(FDA) has authorized the use of an unapproved Ebola virus test developed by the Department of Defensefor use in individuals, including U.S. military personnel and responders, who may be at risk of infection because of their work with individuals who might have the virus.The Test-tube diagnostic test is one of the Pentagon’s investment in developing a vaccine or cure for Ebola.
-
-
Philadelphia refines area 911 call locator technology
In the Philadelphia area and around much of the country, emergency services and first responders are looking to retool the ways in which cell phone locator technology could allow them to aid individuals, and they are calling for the further cooperation of cell phone providers and the government alike. “If you don’t know where the guy is, you can’t help him,” said Edwin Truitt, the Delaware County [Pennsylvania] Emergency Services director.
-
-
Ebola outbreak could inspire African terrorist groups to weaponize the virus: Experts
Recent discussions about Ebola have mainly focused on the disease as a public health hazard, but counterterrorism officials are concerned that the new outbreak could inspire terror groups, specifically those based in West Africa, to weaponize the virus. The fear of weaponized Ebola dates back decades to when the Soviet Union’s VECTOR program, aimed at researching biotechnology and virology, was thought to have researched the creation of Ebola for warfare. In 1992 a Japanese cult group called Aum Shinrikyo tried, but failed, to collect samples of the Ebola virus in Zaire.
-
-
Luminex’s diagnostics tool used in Africa to help control Ebola outbreak
Luminex said the U.S. Army Medical Research Institute of Infectious Diseases (USAMRIID) Diagnostics Division is working on rapid diagnostics for the Ebola virus using Luminex xMAP Technology. Luminex’s MAGPIX system was recently deployed to Africa to support research efforts to control the current outbreak.
-
-
U.S. to impose stricter safety rules on crude oil rail shipment
The U.S. Department of Transportation(DOT) recently announced proposed rulesbetter to secure train cars and pipelines from oil spills that may lead to fire or accidents in communities across the country. The spills are byproducts of the increase in U.S. oil production and shipments coming from Canada or the Bakken oil fields of North Dakota. The proposed DOT rules would force railroads to upgrade railroad cars used for transporting crude oil, employ better braking systems, and enforce tighter speed controls.
-
More headlines
Who's online
The long view
U.S. contemplates responses to a cyber-Pearl Harbor attack on critical infrastructure
Cybersecurity experts often contemplate how U.S. security agencies would react to a cyber-9/11 or a digital Pearl Harbor, in which a computer attack would unplug the power grid, disable communications lines, empty bank accounts, and result in loss of life. “Ultimately, it absolutely could happen,” says one expert. “Yeah, that thought keeps me up at night, in terms of what portion of our critical infrastructure could be really brought to its knees.”
To bolster the world’s inadequate cyber governance framework, a “Cyber WHO” is needed
A new report on cyber governance commissioned by Zurich Insurance Group highlights challenges to digital security and identifies new opportunities for business. It calls for the establishment of guiding principles to build resilience and the establishment of supranational governance bodies such as a Cyber Stability Board and a “Cyber WHO.”
More money, different approach offer opportunities to border security tech companies
The number of border agents has reached roughly 21,000, up from 5,000 two decades ago. In fiscal year 2012, spending for border and immigration enforcement totaled almost $18 billion — 24 percent more than the combined budgets of the FBI, the DEA, the Secret Service, the U.S. Marshals, and the Bureau of Alcohol, Tobacco, Firearms and Explosives (total: $14.4 billion). One major trend driving the border security industry is the government’s shift from large-scale border security infrastructure projects to small unit security systems.
Coastal communities can lower flood insurance rates by addressing sea-level rise
City leaders and property developers in Tampa Bay are urging coastal communities to prepare today for sea-level rise and future floods in order to keep flood insurance rates low in the future. FEMA, which administers the National Flood Insurance Program(NFIP), is increasing flood insurance premiums across the country, partly to offset losses from recent disasters such as hurricanes Katrina and Sandy. Cities can reduce insurance premiums for nearly all residents who carry flood coverage by improving storm-water drainage, updating building codes to reflect projected rise in sea-levels, moving homes out of potentially hazardous areas, and effectively informing residents about storm danger and evacuation routes.
Changing human behavior key to tackling California drought: Expert
California is experiencing a drought that has gone far beyond a “dry spell,” and the state has imposed the first water restriction in state history, aiming to cut back on water consumption by 25 percent. One expert says that strict water conservation measures are long overdue, and that “what is happening is a realization that you can’t simply transplant another ecosystem onto a California desert system or arid southwestern system. In a sense, California and much of the U.S. southwest are living beyond their ecological means. Certain lifestyles have been adopted and crops are being grown that are not endemic or sustainable for this particular bioregion.” He adds: “This is a moment for not just cutting off personal water use and turning the tap off when you’re brushing your teeth, as important as that is. This is a moment of reflection, invitation and, I hope, legislation that will cause people to think about water use in the industrial sector too. This is for the long-term prosperity of the state and sustainability of the ecosystem.”