-
Crude-oil train accidents endanger 1.5 million Pennsylvania residents
About 1.5 million people living in Pennsylvania are in danger if a crude-oil train derails and catches fire, according to an analysis which looked at populations living or working within a half-mile on each side of rail lines where trains haul more than one million gallons of Bakken crude oil at a time. A half-mile is the federal evacuation zone recommended when a crude oil tank car catches fire. Within that evacuation zone are 327 K-12 schools, thirty-seven hospitals, and sixty-one nursing homes in Pennsylvania.
-
-
Biometric security could do away with passwords
With hackers and cyber thieves running rampant online, efforts to create stronger online identity protection are leading major tech firms to invest in biometric security methods. Analysts predict that 15 percent of mobile devices will be accessed with biometrics in 2015, and the number will grow to 50 percent by 2020.
-
-
Lockheed Martin recognized for supporting young girls’ STEM education
Over the next eight years there will be more jobs available in Science, Technology, Engineering, and Mathematics (STEM) than any other occupation. The Society of Women Engineers (SWE) recently presented Lockheed Martin with its first “Invaluable” award for championing education programs that inspire the next generation of women engineers and technologists. Since 2010, Lockheed Martin has given more than $45 million to programs that promote STEM education.
-
-
Derailments, ruptures of new crude-oil tank cars raise safety concerns
Following a series of crude-oil train derailments in 2013 and early 2014, the Transportation Department proposed new rules for tank cars carrying crude. The rules suggest three main options for tank cars: railroads would use the improved CPC-1232 tank cars, develop stronger cars, or retrofit existing cars. Critics of the rail industry’s growing volume of crude-oil shipments note that four recent oil train derailments relied on CPC-1232 cars, therefore improvements to crude by rail shipments must extend beyond new tank cars.
-
-
Latest version of laser weapon system stops truck in field test
Lockheed Martin’s 30-kilowatt fiber laser weapon system successfully disabled the engine of a small truck during a recent field test, demonstrating the rapidly evolving precision capability to protect military forces and critical infrastructure. The company says that the ground-based prototype system, — called ATHENA, for Advanced Test High Energy Asset — burned through the engine manifold in a matter of seconds from more than a mile away. The demonstration represents highest power ever documented by a laser weapon of its type
-
-
Hackers exploit 1990s-era weak-encryption mandate
Researchers have an old-new computer security vulnerability — the Factoring Attack on RSA-EXPORT Keys (FREAK), which affects SSL/TLS protocols used to encrypt data as it is transmitted over the Internet. The FREAK vulnerability goes back to an early 1990s U.S. restriction which limited software sold abroad to a maximum 512-bit code encryption. The mandate was set to allow U.S. federal intelligence agencies easily to spy on foreign software users.
-
-
Cyber researchers need to predict, not merely respond to, cyberattacks: U.S. intelligence
The Office of the Director of National Intelligence wants cybersecurity researchers to predict cyberattacks rather than just respond to them, according to the agency’s Intelligence Advanced Research Projects Activity (IARPA) program. Current cyber defense methods such as signature-based detection “haven’t adequately enabled cybersecurity practitioners to get ahead of these threats,” said Robert Rahmer, who leads IARPA’s Cyber-attack Automated Unconventional Sensor Environment (CAUSE) program. “So this has led to an industry that’s really invested heavily in analyzing the effects or symptoms of cyberattacks instead of analyzing [and] mitigating the cause.”
-
-
Aviation industry under-prepared to deal with cyber risk: Expert
The aviation industry is behind the curve in terms of its response and readiness to the insidious threat posed by cyber criminality whether from criminals, terrorists, nation states, or hackers, according to Peter Armstrong, head of Cyber Strategy for Willis Group Holdings, the global risk adviser, insurance and reinsurance broker. Armstrong explained that the aviation industry’s under-preparedness is noteworthy in a sector that abhors uncertainty and works tirelessly to eradicate it.
-
-
Agriculture groups say bill would disrupt farming operations, decrease food production
The Legal Workforce Act(LWA — H.R. 1147), introduced by U.S. Representative Lamar Smith (R-Texas) and approved this week by the House Judiciary Committee, could disrupt farming operations if it passes Congress. LWA requires employers in the United States, within three years, to use E-Verifyto verify whether employees are legally allowed to work in the country. Ag industry groups say that passing LWA without some sort of immigration reform for agricultural workers could lead to a $30 billion to $60 billion decrease in food production. The ag industry also notes that each of the two million hired farm employees supports two to three fulltime American jobs in the food processing, transportation, farm equipment, marketing, retail, and other sectors.
-
-
North Korea’s cyber warriors target Western critical infrastructure
North Korea has a team of roughly 3,000 cyber soldiers dedicated to launching attacks at Western interests in the private and government sector, according to Kim Heung-gwang, a former professor at North Korea’s Hamhung University of Computer Technology, a key military training facility. Heung-gwang, urging Western governments to do more to counter North Korean hacking, said the country’s hackers are targeting Western nuclear power plants, transportation networks, and electrical utilities.
-
-
U.S. cracks down on “birth tourism”
Each year, thousands of wealthy couples, mostly from China, the Middle East, Africa, and South Korea partake in what authorities have coined “birth tourism,” in which pregnant women pay to visit the United States and give birth, thereby making their child or children U.S. citizens. In most cases, the parents would also gain permanent U.S. resident status. Roughly 40,000 babies are born each year to women visiting the United States for the sole purpose of giving birth.
-
-
Philadelphia terror charges highlight mall kiosks security issues
The arrest last week of Abror Habibov on terrorism finance charges has brought new scrutiny to the oversight and security of mall kiosk businesses. Habibov ran a series of largely unlicensed mall kiosks along the East Coast, where his employees sold kitchen wares and repaired cell phones. He was arrested after being caught organizing support with two other individuals for ISIS operations in Syria. Security analysts say that the qualities which make these small businesses attractive to their owners — low overhead, short-term leases, and low site maintenance — may also serve as an ideal cover for employing members of terrorist groups.
-
-
Distributed future: Local electricity could meet half of U.K. power needs by 2050
Research conducted by nine leading U.K. universities has found that up to 50 percent of electricity demand in the United Kingdom could be met by distributed and low carbon sources by 2050. The research assesses the technological feasibility of a move from the current traditional business models of the Big Six energy providers to a model where greater ownership is met by the civic energy sector. It also goes further by questioning what types of governance, ownership and control a distributed future would need.
-
-
Government’s authority to protect consumer privacy questioned
A case in the U.S. Court of Appeals for the Third Circuitin Philadelphia could determine what authority the federal government has in protecting consumer privacy on the Internet. Hotel giant Wyndham Worldwide Corp. argued in court that the Federal Trade Commission(FTC) unlawfully tried to enforce cybersecurity standards when the agency brought a case against Wyndham after hackers allegedly stole data from hundreds of thousands of customer accounts in a series of attacks between April 2008 and January 2010.
-
-
DHS termination of bio-detection contract questioned
In February 2014, six months before Silicon Valley startup NVS delivered the first prototypes of its polymerase chain reaction (PCR) pathogen detector to DHS, the department sent NVS’s chief executive Hans Fuernkranz a notice terminating the project. According to a 26 November 2014 draft audit report by DHS’s inspector general’s office, the decision was improperly made by a single agency official without supporting evidence and “against S&T [DHS Science & Technology Directorate] subject matter expert advice.”The official who made the decision to cancel the project had expressed concerns about the cost associated with the NVS contract, and said the contract was terminated because existing technologies could better meet the agency’s needs for confronting bio-threats. The auditors say, however, that they “did not identify evidence to substantiate any of the concerns.”
-
More headlines
Who's online
The long view
U.S. contemplates responses to a cyber-Pearl Harbor attack on critical infrastructure
Cybersecurity experts often contemplate how U.S. security agencies would react to a cyber-9/11 or a digital Pearl Harbor, in which a computer attack would unplug the power grid, disable communications lines, empty bank accounts, and result in loss of life. “Ultimately, it absolutely could happen,” says one expert. “Yeah, that thought keeps me up at night, in terms of what portion of our critical infrastructure could be really brought to its knees.”
To bolster the world’s inadequate cyber governance framework, a “Cyber WHO” is needed
A new report on cyber governance commissioned by Zurich Insurance Group highlights challenges to digital security and identifies new opportunities for business. It calls for the establishment of guiding principles to build resilience and the establishment of supranational governance bodies such as a Cyber Stability Board and a “Cyber WHO.”
More money, different approach offer opportunities to border security tech companies
The number of border agents has reached roughly 21,000, up from 5,000 two decades ago. In fiscal year 2012, spending for border and immigration enforcement totaled almost $18 billion — 24 percent more than the combined budgets of the FBI, the DEA, the Secret Service, the U.S. Marshals, and the Bureau of Alcohol, Tobacco, Firearms and Explosives (total: $14.4 billion). One major trend driving the border security industry is the government’s shift from large-scale border security infrastructure projects to small unit security systems.
Coastal communities can lower flood insurance rates by addressing sea-level rise
City leaders and property developers in Tampa Bay are urging coastal communities to prepare today for sea-level rise and future floods in order to keep flood insurance rates low in the future. FEMA, which administers the National Flood Insurance Program(NFIP), is increasing flood insurance premiums across the country, partly to offset losses from recent disasters such as hurricanes Katrina and Sandy. Cities can reduce insurance premiums for nearly all residents who carry flood coverage by improving storm-water drainage, updating building codes to reflect projected rise in sea-levels, moving homes out of potentially hazardous areas, and effectively informing residents about storm danger and evacuation routes.
Changing human behavior key to tackling California drought: Expert
California is experiencing a drought that has gone far beyond a “dry spell,” and the state has imposed the first water restriction in state history, aiming to cut back on water consumption by 25 percent. One expert says that strict water conservation measures are long overdue, and that “what is happening is a realization that you can’t simply transplant another ecosystem onto a California desert system or arid southwestern system. In a sense, California and much of the U.S. southwest are living beyond their ecological means. Certain lifestyles have been adopted and crops are being grown that are not endemic or sustainable for this particular bioregion.” He adds: “This is a moment for not just cutting off personal water use and turning the tap off when you’re brushing your teeth, as important as that is. This is a moment of reflection, invitation and, I hope, legislation that will cause people to think about water use in the industrial sector too. This is for the long-term prosperity of the state and sustainability of the ecosystem.”