-
DHS asks judge to cancel contempt hearing over immigration executive order
When President Barack Obama last year issued his Deferred Action for Childhood Arrivals (DACA) executive order, applicants covered by the order received a three-year work permit, or EADs (Employment Authorization Documents). On 16 February 2015, Brownsville, Texas-based U.S. District Judge Andrew Hanen temporarily blocked Obama’s immigration action. After the temporary injunction was in place, the federal government mistakenly issued the approximately 2,500 three-year permits. On Friday, DHS secretary Jeh Johnson asked Judge Hanen not to find him and other Obama administration officials in contempt, telling the judge that DHS had recovered all but 22 of the 2,500 offending permits. Johnson also advised the judge that DHS had corrected federal computer databases to invalidate those permits not turned over by their owners.
-
-
N.Y. village pays ransom to regain access to hacker-encrypted files
The village Ilion in central New York paid ransom twice last year — $300 and $500 — to have access to its computers two official-looking e-mails planted malware throughout the village’s computer system. The New York State comptroller’s office has audited 100 municipal computer systems the past three years, and said the experience of Ilion should serve as a warning to others municipalities of the growing cyberthreat – especially attempts by hackers to infiltrate computer systems to make them inaccessible unless ransom is paid.
-
-
Community-based flood insurance offers benefits, faces challenges
Community-based flood insurance — a single insurance policy that in theory would cover an entire community — may create new opportunities to reduce flood losses and enhance the likelihood of communities paying more attention to flood risk mitigation, says a new National Academies report. This option for providing flood insurance, however, would not provide the sole solution for all of the nation’s flood insurance challenges.
-
-
North Wales wants to be “one of the most secure places in the world to do business”
Glyndŵr University is to play a leading role in the fight against cybercrime. The Wrexham, Wales-based university hosted the first meeting of the North Wales Cyber Security Cluster on Thursday (23 July). The institution and North Wales Police saw experts in online security and e-crime join the forum, and also invited members of the public and business owners who have been targeted in the past to attend and share information and advice, in a bid, the organizers say, “to make North Wales one of the most secure places in the world to do business.”
-
-
Initiative launched to expose those who fund, profit from wars in Africa
Oscar-winner actor George Clooney, in an effort to tackle corruption in war zones, on Monday launched an initiative to identify and help bring to justice individuals funding and profiting from Africa’s deadliest conflicts. Clooney and U.S. human rights activist John Prendergast launched the project, called The Sentry, which will investigate money flowing in and out of conflict zones, and pass on the information to policymakers to take action.
-
-
SRI International working to develop screening device for radiation exposure
radiation that may lead to severe health consequences post-exposure. To rapidly triage large numbers of people to determine who needs immediate treatment, a new, simple screening test is needed. Currently, if a person has absorbed a significant dose of ionizing radiation, there is nothing that can be done beyond waiting to see what symptoms develop, which roughly correlate with exposure level. SRI International has been awarded a $12.2 million contract to continue development of a diagnostic test for absorbed doses of radiation following a radiological incident.
-
-
DHS S&T licenses third cybersecurity innovation for commercialization
The Department of Homeland Security (DHS) Science and Technology Directorate (S&T) yesterday announced that another cybersecurity technology has been licensed for commercialization. This is S&T’s third technology that has successfully gone through the Transition to Practice (TTP) program and into the commercial market. The Network Mapping System (NeMS), developed by Lawrence Livermore National Laboratory, is a software-based tool that tells users what is connected to their network so that they know what needs to be protected.
-
-
NIST, NTIA seeking industry partners for public safety communications test bed
The Commerce Department’s Public Safety Communications Research (PSCR) program is signing up a new round of industry collaborators for the test bed used to evaluate advanced broadband equipment and software for emergency first responders. So far, thirty-nine telecommunications companies have signed new, five-year Cooperative Research and Development Agreements (CRADAs) to participate in the test bed program.
-
-
Why organizations fight data breaches differently
Since digitalization began, organizations have understood how valuable their information is. In the wake of recent high-profile security breaches at retail stores such as Target and Neiman Marcus, a new study seeks to determine why differences exist in the level of information security control resources among organizations.
-
-
Privacy vs. security debate intensifies as more companies offer end-to-end-encryption
A long running debate has now come to the fore with greater urgency. The tension between the privacy that encryption offers, and the need for law enforcement and national security agencies to have access to secured and encrypted e-mail, has become more acute in the last two years. The revelations of Edward Snowden about the post-9/11 reach and scope of surveillance by intelligence agencies and law enforcement, have caused some tech giants to offer encrypted services to their customers – encrypted services which enhance customers’ privacy protection, but which at the same time make it impossible for law enforcement and intelligence services to track and monitor terrorists and criminals. “Our job is to find needles in a nationwide haystack, needles that are increasingly invisible to us because of end-to-end encryption,” FBI director James Comey told lawmakers in recent hearing on the Hill.
-
-
Adobe deals with yet another flaw
On the heels of the discovery of a zero-day defect, a vulnerability not known to the software developer, Adobe is scrambling to develop yet another patch for another vulnerability. The vulnerability, labeled CVE-2015-5119, causes a system to crash and allows a remote computer take control of the target machine. According to the United States Computer Emergency Readiness Team(US-CERT,) ActionScript 3 ByteArray class, which can allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.
-
-
Mercenary hackers get hacked
In an ironic turn of events, a group of mercenary hackers were themselves hacked. The group of Italy-based hackers, known as Hacking Team, has been selling its software and services to government and corporate entities in order to test their security fitness. The hackers were able to gain access to the company’s client list, which shows that the company sold surveillance software to authoritarian regimes so they could spy on political dissidents.
-
-
"Keeping America a technological leader": SRC's STEM-supporting initiatives
SRC, Inc., an R&D company which was established in 1957, has its roots in academia. It regards science, technology, engineering & math (STEM) as the foundation of its business. Over the past decade there have been numerous reports about how the U.S. ranking in science and mathematics education has been declining. There has also been a drop in the number of students majoring in STEM fields. Around 2007, SRC developed its philanthropic focus areas as a way to direct its resources to areas where the company could have the most impact. One of these focus areas is STEM. HSNW talked with Lisa D. Mondello, director of corporate communications and PR at SRC, about the company’s STEM-related initiatives.
-
-
Oklahoma Supreme Court: Oil companies may be sued for fracking-induced quakes
On 30 June the Oklahoma Supreme Court ruled that oil companies may be sued over quakes if they can be linked to hydraulic shale fracturing methods, or “fracking.” Numerous scientific studies found a direct link between the increase in fracking activity in Oklahoma and the sharp rise in the number of quakes in Oklahoma, a region which until 2009 was considered seismically stable. The number of earthquake in the state has increased from 1.5 tremblors a year before to 2008, to an average of 2.5 a day, according a report from Richard Andrews, the Oklahoma state geologist.
-
-
If global warming is left unchecked, fish will have to find new habitats -- or perish
The goods and services our oceans provide are valued at hundreds of billions of dollars per year. A new study assessed the impact of climate change on marine and coastal ecosystems, ocean chemistry, tourism, and human health. The study specifically analyzed how warming will impact fisheries and the global economic gains we receive from these fisheries. It found that Climate change is forcing fish out of their current habitats and into cooler waters and many more species will soon be affected if climate goals are not met. “From looking at the surface of the ocean, you can’t tell much is changing,” said one researcher. “The oceans are closely tied to human systems and we’re putting communities at high risk.”
-
More headlines
The long view
Need for National Information Clearinghouse for Cybercrime Data, Categorization of Cybercrimes: Report
There is an acute need for the U.S. to address its lack of overall governance and coordination of cybercrime statistics. A new report recommends that relevant federal agencies create or designate a national information clearinghouse to draw information from multiple sources of cybercrime data and establish connections to assist in criminal investigations.
Trying to “Bring Back” Manufacturing Jobs Is a Fool’s Errand
Advocates of recent populist policies like to focus on the supposed demise of manufacturing that occurred after the 1970s, but that focus is misleading. The populists’ bleak economic narrative ignores the truth that the service sector has always been a major driver of America’s success, for decades, even more so than manufacturing. Trying to “bring back” manufacturing jobs, through harmful tariffs or other industrial policies, is destined to end badly for Americans. It makes about as much sense as trying to “bring back” all those farm jobs we had before the 1870s.
The Potential Impact of Seabed Mining on Critical Mineral Supply Chains and Global Geopolitics
The potential emergence of a seabed mining industry has important ramifications for the diversification of critical mineral supply chains, revenues for developing nations with substantial terrestrial mining sectors, and global geopolitics.
Are We Ready for a ‘DeepSeek for Bioweapons’?
Anthropic’s Claude 4 is a warning sign: AI that can help build bioweapons is coming, and could be widely available soon. Steven Adler writes that we need to be prepared for the consequences: “like a freely downloadable ‘DeepSeek for bioweapons,’ available across the internet, loadable to the computer of any amateur scientist who wishes to cause mass harm. With Anthropic’s Claude Opus 4 having finally triggered this level of safety risk, the clock is now ticking.”