• Crude-oil train accidents endanger 1.5 million Pennsylvania residents

    About 1.5 million people living in Pennsylvania are in danger if a crude-oil train derails and catches fire, according to an analysis which looked at populations living or working within a half-mile on each side of rail lines where trains haul more than one million gallons of Bakken crude oil at a time. A half-mile is the federal evacuation zone recommended when a crude oil tank car catches fire. Within that evacuation zone are 327 K-12 schools, thirty-seven hospitals, and sixty-one nursing homes in Pennsylvania.

  • Biometric security could do away with passwords

    With hackers and cyber thieves running rampant online, efforts to create stronger online identity protection are leading major tech firms to invest in biometric security methods. Analysts predict that 15 percent of mobile devices will be accessed with biometrics in 2015, and the number will grow to 50 percent by 2020.

  • Lockheed Martin recognized for supporting young girls’ STEM education

    Over the next eight years there will be more jobs available in Science, Technology, Engineering, and Mathematics (STEM) than any other occupation. The Society of Women Engineers (SWE) recently presented Lockheed Martin with its first “Invaluable” award for championing education programs that inspire the next generation of women engineers and technologists. Since 2010, Lockheed Martin has given more than $45 million to programs that promote STEM education.

  • Derailments, ruptures of new crude-oil tank cars raise safety concerns

    Following a series of crude-oil train derailments in 2013 and early 2014, the Transportation Department proposed new rules for tank cars carrying crude. The rules suggest three main options for tank cars: railroads would use the improved CPC-1232 tank cars, develop stronger cars, or retrofit existing cars. Critics of the rail industry’s growing volume of crude-oil shipments note that four recent oil train derailments relied on CPC-1232 cars, therefore improvements to crude by rail shipments must extend beyond new tank cars.

  • view counter
  • Latest version of laser weapon system stops truck in field test

    Lockheed Martin’s 30-kilowatt fiber laser weapon system successfully disabled the engine of a small truck during a recent field test, demonstrating the rapidly evolving precision capability to protect military forces and critical infrastructure. The company says that the ground-based prototype system, — called ATHENA, for Advanced Test High Energy Asset — burned through the engine manifold in a matter of seconds from more than a mile away. The demonstration represents highest power ever documented by a laser weapon of its type

  • Hackers exploit 1990s-era weak-encryption mandate

    Researchers have an old-new computer security vulnerability — the Factoring Attack on RSA-EXPORT Keys (FREAK), which affects SSL/TLS protocols used to encrypt data as it is transmitted over the Internet. The FREAK vulnerability goes back to an early 1990s U.S. restriction which limited software sold abroad to a maximum 512-bit code encryption. The mandate was set to allow U.S. federal intelligence agencies easily to spy on foreign software users.

  • view counter
  • Cyber researchers need to predict, not merely respond to, cyberattacks: U.S. intelligence

    The Office of the Director of National Intelligence wants cybersecurity researchers to predict cyberattacks rather than just respond to them, according to the agency’s Intelligence Advanced Research Projects Activity (IARPA) program. Current cyber defense methods such as signature-based detection “haven’t adequately enabled cybersecurity practitioners to get ahead of these threats,” said Robert Rahmer, who leads IARPA’s Cyber-attack Automated Unconventional Sensor Environment (CAUSE) program. “So this has led to an industry that’s really invested heavily in analyzing the effects or symptoms of cyberattacks instead of analyzing [and] mitigating the cause.”

  • Aviation industry under-prepared to deal with cyber risk: Expert

    The aviation industry is behind the curve in terms of its response and readiness to the insidious threat posed by cyber criminality whether from criminals, terrorists, nation states, or hackers, according to Peter Armstrong, head of Cyber Strategy for Willis Group Holdings, the global risk adviser, insurance and reinsurance broker. Armstrong explained that the aviation industry’s under-preparedness is noteworthy in a sector that abhors uncertainty and works tirelessly to eradicate it.

  • Agriculture groups say bill would disrupt farming operations, decrease food production

    The Legal Workforce Act(LWAH.R. 1147), introduced by U.S. Representative Lamar Smith (R-Texas) and approved this week by the House Judiciary Committee, could disrupt farming operations if it passes Congress. LWA requires employers in the United States, within three years, to use E-Verifyto verify whether employees are legally allowed to work in the country. Ag industry groups say that passing LWA without some sort of immigration reform for agricultural workers could lead to a $30 billion to $60 billion decrease in food production. The ag industry also notes that each of the two million hired farm employees supports two to three fulltime American jobs in the food processing, transportation, farm equipment, marketing, retail, and other sectors.

  • North Korea’s cyber warriors target Western critical infrastructure

    North Korea has a team of roughly 3,000 cyber soldiers dedicated to launching attacks at Western interests in the private and government sector, according to Kim Heung-gwang, a former professor at North Korea’s Hamhung University of Computer Technology, a key military training facility. Heung-gwang, urging Western governments to do more to counter North Korean hacking, said the country’s hackers are targeting Western nuclear power plants, transportation networks, and electrical utilities.

  • U.S. cracks down on “birth tourism”

    Each year, thousands of wealthy couples, mostly from China, the Middle East, Africa, and South Korea partake in what authorities have coined “birth tourism,” in which pregnant women pay to visit the United States and give birth, thereby making their child or children U.S. citizens. In most cases, the parents would also gain permanent U.S. resident status. Roughly 40,000 babies are born each year to women visiting the United States for the sole purpose of giving birth.

  • Philadelphia terror charges highlight mall kiosks security issues

    The arrest last week of Abror Habibov on terrorism finance charges has brought new scrutiny to the oversight and security of mall kiosk businesses. Habibov ran a series of largely unlicensed mall kiosks along the East Coast, where his employees sold kitchen wares and repaired cell phones. He was arrested after being caught organizing support with two other individuals for ISIS operations in Syria. Security analysts say that the qualities which make these small businesses attractive to their owners — low overhead, short-term leases, and low site maintenance — may also serve as an ideal cover for employing members of terrorist groups.

  • Distributed future: Local electricity could meet half of U.K. power needs by 2050

    Research conducted by nine leading U.K. universities has found that up to 50 percent of electricity demand in the United Kingdom could be met by distributed and low carbon sources by 2050. The research assesses the technological feasibility of a move from the current traditional business models of the Big Six energy providers to a model where greater ownership is met by the civic energy sector. It also goes further by questioning what types of governance, ownership and control a distributed future would need.

  • Government’s authority to protect consumer privacy questioned

    A case in the U.S. Court of Appeals for the Third Circuitin Philadelphia could determine what authority the federal government has in protecting consumer privacy on the Internet. Hotel giant Wyndham Worldwide Corp. argued in court that the Federal Trade Commission(FTC) unlawfully tried to enforce cybersecurity standards when the agency brought a case against Wyndham after hackers allegedly stole data from hundreds of thousands of customer accounts in a series of attacks between April 2008 and January 2010.

  • DHS termination of bio-detection contract questioned

    In February 2014, six months before Silicon Valley startup NVS delivered the first prototypes of its polymerase chain reaction (PCR) pathogen detector to DHS, the department sent NVS’s chief executive Hans Fuernkranz a notice terminating the project. According to a 26 November 2014 draft audit report by DHS’s inspector general’s office, the decision was improperly made by a single agency official without supporting evidence and “against S&T [DHS Science & Technology Directorate] subject matter expert advice.”The official who made the decision to cancel the project had expressed concerns about the cost associated with the NVS contract, and said the contract was terminated because existing technologies could better meet the agency’s needs for confronting bio-threats. The auditors say, however, that they “did not identify evidence to substantiate any of the concerns.”