Business

  • Lockheed Martin recognized for supporting young girls’ STEM education

    Over the next eight years there will be more jobs available in Science, Technology, Engineering, and Mathematics (STEM) than any other occupation. The Society of Women Engineers (SWE) recently presented Lockheed Martin with its first “Invaluable” award for championing education programs that inspire the next generation of women engineers and technologists. Since 2010, Lockheed Martin has given more than $45 million to programs that promote STEM education.

  • Derailments, ruptures of new crude-oil tank cars raise safety concerns

    Following a series of crude-oil train derailments in 2013 and early 2014, the Transportation Department proposed new rules for tank cars carrying crude. The rules suggest three main options for tank cars: railroads would use the improved CPC-1232 tank cars, develop stronger cars, or retrofit existing cars. Critics of the rail industry’s growing volume of crude-oil shipments note that four recent oil train derailments relied on CPC-1232 cars, therefore improvements to crude by rail shipments must extend beyond new tank cars.

  • Hackers exploit 1990s-era weak-encryption mandate

    Researchers have an old-new computer security vulnerability — the Factoring Attack on RSA-EXPORT Keys (FREAK), which affects SSL/TLS protocols used to encrypt data as it is transmitted over the Internet. The FREAK vulnerability goes back to an early 1990s U.S. restriction which limited software sold abroad to a maximum 512-bit code encryption. The mandate was set to allow U.S. federal intelligence agencies easily to spy on foreign software users.

  • Cyber researchers need to predict, not merely respond to, cyberattacks: U.S. intelligence

    The Office of the Director of National Intelligence wants cybersecurity researchers to predict cyberattacks rather than just respond to them, according to the agency’s Intelligence Advanced Research Projects Activity (IARPA) program. Current cyber defense methods such as signature-based detection “haven’t adequately enabled cybersecurity practitioners to get ahead of these threats,” said Robert Rahmer, who leads IARPA’s Cyber-attack Automated Unconventional Sensor Environment (CAUSE) program. “So this has led to an industry that’s really invested heavily in analyzing the effects or symptoms of cyberattacks instead of analyzing [and] mitigating the cause.”

  • Aviation industry under-prepared to deal with cyber risk: Expert

    The aviation industry is behind the curve in terms of its response and readiness to the insidious threat posed by cyber criminality whether from criminals, terrorists, nation states, or hackers, according to Peter Armstrong, head of Cyber Strategy for Willis Group Holdings, the global risk adviser, insurance and reinsurance broker. Armstrong explained that the aviation industry’s under-preparedness is noteworthy in a sector that abhors uncertainty and works tirelessly to eradicate it.

  • Agriculture groups say bill would disrupt farming operations, decrease food production

    The Legal Workforce Act(LWAH.R. 1147), introduced by U.S. Representative Lamar Smith (R-Texas) and approved this week by the House Judiciary Committee, could disrupt farming operations if it passes Congress. LWA requires employers in the United States, within three years, to use E-Verifyto verify whether employees are legally allowed to work in the country. Ag industry groups say that passing LWA without some sort of immigration reform for agricultural workers could lead to a $30 billion to $60 billion decrease in food production. The ag industry also notes that each of the two million hired farm employees supports two to three fulltime American jobs in the food processing, transportation, farm equipment, marketing, retail, and other sectors.

  • North Korea’s cyber warriors target Western critical infrastructure

    North Korea has a team of roughly 3,000 cyber soldiers dedicated to launching attacks at Western interests in the private and government sector, according to Kim Heung-gwang, a former professor at North Korea’s Hamhung University of Computer Technology, a key military training facility. Heung-gwang, urging Western governments to do more to counter North Korean hacking, said the country’s hackers are targeting Western nuclear power plants, transportation networks, and electrical utilities.

  • U.S. cracks down on “birth tourism”

    Each year, thousands of wealthy couples, mostly from China, the Middle East, Africa, and South Korea partake in what authorities have coined “birth tourism,” in which pregnant women pay to visit the United States and give birth, thereby making their child or children U.S. citizens. In most cases, the parents would also gain permanent U.S. resident status. Roughly 40,000 babies are born each year to women visiting the United States for the sole purpose of giving birth.

  • Philadelphia terror charges highlight mall kiosks security issues

    The arrest last week of Abror Habibov on terrorism finance charges has brought new scrutiny to the oversight and security of mall kiosk businesses. Habibov ran a series of largely unlicensed mall kiosks along the East Coast, where his employees sold kitchen wares and repaired cell phones. He was arrested after being caught organizing support with two other individuals for ISIS operations in Syria. Security analysts say that the qualities which make these small businesses attractive to their owners — low overhead, short-term leases, and low site maintenance — may also serve as an ideal cover for employing members of terrorist groups.

  • Distributed future: Local electricity could meet half of U.K. power needs by 2050

    Research conducted by nine leading U.K. universities has found that up to 50 percent of electricity demand in the United Kingdom could be met by distributed and low carbon sources by 2050. The research assesses the technological feasibility of a move from the current traditional business models of the Big Six energy providers to a model where greater ownership is met by the civic energy sector. It also goes further by questioning what types of governance, ownership and control a distributed future would need.

  • Government’s authority to protect consumer privacy questioned

    A case in the U.S. Court of Appeals for the Third Circuitin Philadelphia could determine what authority the federal government has in protecting consumer privacy on the Internet. Hotel giant Wyndham Worldwide Corp. argued in court that the Federal Trade Commission(FTC) unlawfully tried to enforce cybersecurity standards when the agency brought a case against Wyndham after hackers allegedly stole data from hundreds of thousands of customer accounts in a series of attacks between April 2008 and January 2010.

  • Funding extended for simulated nuclear reactor project

    Hard on the heels of a five-year funding renewal, modeling, and simulation (M&S) technology developed at Los Alamos National Laboratory as part of the Consortium for the Advanced Simulation of Light Water Reactors (CASL) will now be deployed to industry and academia under a new inter-institutional agreement for intellectual property. CASL is a U.S. Department of Energy’s Energy Innovation Hub established in 2010 to develop advanced M&S capabilities that serve as a virtual version of existing, operating nuclear reactors. As announced by DOE in January, the hub would receive up to $121.5 million over five years, subject to congressional appropriations.

  • U.S. imposes sanctions on three Nigerian Hezbollah operatives

    Nigeria is home to a small Shiite Lebanese population, many members of which emigrated for work in the mid-1900s.Roughly five million Shiites living in Nigeria support the Islamic Movement in Nigeria (IMN), an organization initially funded by Iran in the early 1980s to establish an Iranian-style revolution in Nigeria.Last Thursday, the U.S. Treasury Department imposed sanctions on three Nigerians of Lebanese descent, accusing them of being part of Hezbollah’s Foreign Relations Department (FRD) in the Nigerian capital Abuja.Hezbollah is operating in at least forty-five countries, eleven of which are in Africa.

  • Recycling valuable rare earth metals from old electronics

    Rare earth metals are valuable ingredients in a variety of modern technologies and are found in cell phones, hard disk drives in computers, and other consumer electronics, which are frequently discarded for newer and more up-to-date versions. U.S. consumers disposed of 3.4 million tons of electronics waste in 2012. Continuously increasing global demand for new consumer electronics in turn drives demand for rare-earth metals, which are difficult and costly to mine. Scientists have developed a two-step recovery process that makes recycling rare earth metals easier and more cost-effective.

  • Florida lawmakers want homeowners to have more flood insurance options

    Lawmakers in Florida are planning for a future in which coastal communities can no longer depend on the federal government for affordable flood insurance coverage. The Federal Emergency Management Agency’s (FEMA) flood program is facing insolvency after recent disasters such as hurricanes Katrina and Sandy, so Congress has moved to increaseflood insurance rates across the nation.Legislation proposed by Florida state senator Jeff Brandes (R-St. Petersburg) will give homeowners more coverage options in the local private insurance market. If passed, Brandes’s bill could lower premiums by excluding coverage of a detached garage or covering only the value of a home’s mortgage rather than its full replacement cost.