-
Grants competition to improve security, privacy of online identity verification systems
The National Institute of Standards and Technology (NIST) is launching a competition for a fourth round of grants to pilot online identity verification systems that help improve the privacy, security, and convenience of online transactions. The pilot grants support the National Strategy for Trusted Identities in Cyberspace (NSTIC), a White House initiative launched in 2011. NSTIC’s goal is to improve trust online through the creation of a vibrant “Identity Ecosystem,” in which individuals and organizations are able to better trust one another because they follow agreed-upon standards and processes for secure, privacy-enhancing and interoperable identity solutions online.
-
-
Blocking cash transfers to Somalia may help, rather than hinder, terrorism: Experts
In an effort to curb the flow of cash to terror networks in Somalia, U.S. treasury officials have pressured banks to cut off money transfers to the country. The move follows growing concerns among U.S. law-enforcement agencies about Somali émigrés with extremist Islamic views supporting Somali-based terror group al-Shabaab. Officials of several humanitarian groups worry that the move may backfire, as some Somalis who can no longer rely on cash transfers from the United States may soon join al-Shabaab or other criminal groups to make ends meet.
-
-
Improving security monitoring of energy industry networked control systems
There are a number of useful products on the market for monitoring enterprise networks for possible security events, but they tend to be imperfect fits for the unusual requirements of control system networks. A network monitoring solution that is tailored to the needs of control systems would reduce security blind spots. The National Cybersecurity Center of Excellence (NCCoE) is seeking collaborators on an effort to help energy companies improve the security of the networked technologies they rely upon to control the generation, transmission and distribution of power.
-
-
CEO responsibilities for data breach
The job of a chief executive officer (CEO) is becoming more difficult every year. Today, in addition to being strategic visionaries and leaders, most CEOs must deal with complex legal issues surrounding their organizations. More often they are being held personally responsible for mistakes made by their organizations. Security breaches are one of the fastest growing legal issues facing many C-level executives. All C-level executives need to be prepared to handle a potential security crisis with the help of IT, legal, and PR (public relation) teams.Taking rapid countermeasures and openly communicating about breaches are key factors in effectively managing expectations of a company’s shareholders and customers.
-
-
Warming pushes Western U.S. toward driest period in 1,000 years
Study warns of unprecedented risk of drought in twenty-first century. Today, eleven of the past fourteen years have been drought years in much of the American West, including California, Nevada, New Mexico, and Arizona and across the Southern Plains to Texas and Oklahoma. The current drought directly affects more than sixty-four million people in the Southwest and Southern Plains, and many more are indirectly affected because of the impacts on agricultural regions. A new study predicts that during the second half of the twenty-first century, the U.S. Southwest and Great Plains will face persistent drought worse than anything seen in times ancient or modern, with the drying conditions “driven primarily” by human-induced global warming.
-
-
Closing the high seas to fishing would benefit fish stocks without hurting industry
The world’s high seas should be closed to fishing, argues a new study. The world’s oceans are separated into exclusive economic zones (EEZs) and the high seas. EEZs are the coastal areas that are within 200 nautical miles of maritime countries that maintain the rights to the resources in these waters. Less than 1 percent of the global landings come from fish caught only in the high seas. The bulk of the world’s fisheries actually come from fish stocks that straddle both areas.
-
-
Spotting, neutralizing hackers when they are already inside your systems
Since the Internet gained popularity in the 1990s, the traditional model of cybersecurity has been to build systems and software which could keep hackers out of computers. As hackers continue to tap into complex security systems, however, some cybersecurity experts are advising companies to focus on tricking or neutralizing hackers once they have infiltrated networks, rather than spending money only on trying to keep them out.
-
-
Royal commission into nuclear will open a world of possibilities
Discussion of nuclear energy in Australia has matured in recent years with greater focus on factual arguments, the relativity of risks and the need for robust scientific sourcing of claims. South Australia’s potential to merge prosperity, clean energy and good global citizenship can barely be overstated. Globally, there are around 240,000 metric tons heavy metal (MtHM ) in spent nuclear fuel, much of which was dug from South Australian ores. By 2040 this will be around 700,000 MtHM. Robust dry-cask storage is now a demonstrated, reliable and recognized solution for holding this material. It can be quickly, readily implemented by South Australia. Importantly, such a facility would mean the material is retrievable, to enable the extraction of further value through recycling. A secure, multinational destination for spent fuel, located in a politically and geologically stable country such as Australia, would spur more rapid expansion of current generation reactors. This would displace coal as the fuel of choice in rapidly growing economies.
-
-
Cybersecurity sector welcomes Obama’s $14 billion cybersecurity initiatives in 2016 budget
Massachusetts cybersecurity firms applauded President Barack Obama proposed$14 billion toward cybersecurity initiatives in his 2016 budget. If approved, the federal government would spend more money on intrusion detection and prevention capabilities, as well as cyber offensive measures. Waltham-based defense contractor Raytheon, whose government clients already use the firm for its cybersecurity capabilities and expertise, believes the cybersecurity industry is expected to grow even faster in the coming years.
-
-
Oklahoma rejects “rush to judgment” on the connection between fracking and earthquakes
Between 1978 to mid-2009, Oklahoma recorded one or two 3.0 or greater magnitude earthquakes. Last year the state experienced 585 earthquakes of 3.0 magnitude or greater. Studies conducted by seismologists, including those who work with the United States Geological Survey(USGS), have attributed the spike in earthquakes to the roughly 3,200 active disposal wells, in which wastewater produced during oil and gas drilling is stored deep underground, and independent scientific studies have established the causal relationship between fracking and earthquake. Arkansas, Ohio, and Colorado have imposed temporary restrictions on fracking, while Texas and Illinois are considering similar measures – but the Oklahoma Geological Survey says that “We consider a rush to judgment about earthquakes being triggered to be harmful to state, public and industry interests.”
-
-
Texas appoints seismologist to examine wave of Irving-area quakes
Research over decades has shown the fracking process — injecting fluid underground to release oil — has been the cause of fault slips and fractures. The fluid can often lubricate existing faults and cause them to slip. The Texas Railroad Commission (RRC) has turned to David Craig Pearson to help study a series of quakes which hit the area of Irving within a span of a few days. A UT-Austin seismologist has already published a report which found that most earthquakes in Texas’s oil-rich Barnett Shale occurred within two miles of an injection well, essentially proving that some of the quakes are caused by fracking. Pearson’s appointment was not universally welcomed, as some see him as too close to industry. “I’m absolutely engaged with trying to figure out the cause of all earthquakes throughout Texas,” said Pearson. “I’m a scientists first, and a Railroad Commission employee second.”
-
-
Floating wind turbines bring electricity – and power generation -- to customers
Most wind turbine manufacturers are competing to build taller turbines to harness more powerful winds above 500 feet, or 150 meters. Altaeros is going much higher with its novel Buoyant Airborne Turbine — the BAT. The Altaeros BAT can reach 2,000 feet, or 600 meters. At this altitude, wind speeds are faster and have five to eight times greater power density. As a result, the BAT can generate more than twice the energy of a similarly rated tower-mounted turbine. The BAT’s key enabling technologies include a novel aerodynamic design, making it, in effect, a wind turbine which is being lifted by a tethered balloon. In the future, the company expects to deploy the BAT alongside first responders in emergency response situations when access to the electric grid is unavailable.
-
-
The water industry needs to join the fight against superbugs
The fight against antibiotic-resistant bacteria — so-called “superbugs” — is a huge challenge, one that the World Health Organization has described as a grave global problem. The problem of antibiotic resistance is being exacerbated worldwide by the pollution of waste water with leftover drugs, providing breeding grounds for resistant bacteria and their genes. The problem can persist for years, constantly refreshed by new discharges of both drugs and of resistant bacteria themselves, shed by people and animals. It is time for the health and water industries to strike a bargain. Health professionals need to be aware of the need for pharmaceuticals to be managed as organic and persistent pollutants. Tackling hot spots in “source control” such as hospitals and clinics could make significant inroads on the amount of waste drugs entering treatment plants. The water industry should ensure that treatment plants are operating under optimal conditions and that the older ones are either replaced or upgraded.
-
-
Obama continues push for cybersecurity bill
Following his remarks on cybersecurity at the 2015 State of the Union address, President Barack Obama will attenda summit on Cybersecurity and Consumer Protectionat Stanford Universitythis Friday. Attendees will include major stakeholders in cybersecurity and consumer financial protection issues, including executives from the financial services, telecommunications, and retail industries, as well as law enforcement officials and consumer advocates. Obama has requested $14 billion for cybersecurity initiatives in the 2016 federal budget, a 10 percent increase from 2015 budget.
-
-
Winter storms costly for Western economies: Aon Benfield
Aon Benfield’s January 2015 catastrophe report reveals that a series of four powerful windstorms over a seven-day span during January in different regions of Western Europe caused economic and insured losses were expected to reach hundreds of millions of euros. The catastrophe study highlights that two separate winter weather events impacted northeastern parts of the United States during the month, caused total economic damage and losses, including business interruption, estimated at $500 million.
-
More headlines
The long view
Ransomware Attacks: Death Threats, Endangered Patients and Millions of Dollars in Damages
A ransomware attack on Change Healthcare, a company that processes 15 billion health care transactions annually and deals with 1 in 3 patient records in the United States, is continuing to cause massive disruptions nearly three weeks later. The incident, which started on February 21, has been called the “most significant cyberattack on the U.S. health care system” by the American Hospital Association. It is just the latest example of an increasing trend.
Chinese Government Hackers Targeted Critics of China, U.S. Businesses and Politicians
An indictment was unsealed Monday charging seven nationals of the People’s Republic of China (PRC) with conspiracy to commit computer intrusions and conspiracy to commit wire fraud for their involvement in a PRC-based hacking group that spent approximately 14 years targeting U.S. and foreign critics, businesses, and political officials in furtherance of the PRC’s economic espionage and foreign intelligence objectives.
European Arms Imports Nearly Double, U.S. and French Exports Rise, and Russian Exports Fall Sharply
States in Europe almost doubled their imports of major arms (+94 per cent) between 2014–18 and 2019–23. The United States increased its arms exports by 17 per cent between 2014–18 and 2019–23, while Russia’s arms exports halved. Russia was for the first time the third largest arms exporter, falling just behind France.
LNG Exports Have Had No Impact on Domestic Energy Costs: Analysis
U.S. liquified natural gas (LNG) exports have not had any sustained and significant direct impact on U.S. natural gas prices and have, in fact, spurred production and productivity gains, which contribute to downward pressure on domestic prices.