• Salmat offers voice biometrics to mid-market

    A 2009 Identity Verification Study conducted by callcenters.net highlighted that the most preferred method of verifying identity among consumers was biometric voice identification; Aussie company Salmat has launched a suite of speech recognition and voice biometric solutions designed specifically for mid-market companies

  • Suprema to provides palm-print scanners to Poland, Lithuania

    Korean company Suprema win contracts to equip the Polish and Lithuanian police forces with palm-print live scanners; the contracts are part of EU-funded effort to upgrade the two countries’ criminal identification methods so these methods could be integrated with the European Union’s Schengen Visa Information System (VIS) project

  • ManTech to buy MTCSC Inc.

    Acquisition strengthens ManTech’s C4ISR systems integration and cyber capabilities, and access to new U.S. Marine Corps intelligence customers

  • Qaeda's new tactics: heavy economic damage, low-cost operations

    In a detailed account of its failed parcel bomb plot three weeks ago, al Qaeda’s branch in Yemen said late Saturday that the operation cost only $4,200 to mount, was intended to disrupt global air cargo systems and reflected a new strategy of low-cost attacks designed to inflict broad economic damage; the organization said the fear, disruption, and added security costs caused by the packages made what it called Operation Hemorrhage a success

  • Rare Earth elements in U.S. not so rare: report

    Approximately 13 million metric tons of rare Earth elements exist within known deposits in the United States, according to the first-ever nationwide estimate of these elements by the U.S. Geological Survey; despite their name, these elements are relatively common within the Earth’s crust, but because of their geochemical properties, they are not often found in economically exploitable concentrations

  • New anti-cybercrime software emulates DNA matching process

    The biologically inspired software digitally mimics the DNA matching process used in the real world. The software tracks the sequence of events that follow a hacker’s first access request into a secure network system and creates a “digital fingerprint”

  • Boycott damages Arizona convention business

    A new study shows that the state of Arizona has lost about $140 million in lost meeting and convention business in the wake of a controversial immigration law; the hotel industry losses during the first four months after the signing were about $45 million; visitors would have spent an additional $96 million during their stays; lost bookings will probably continue for more than a year, multiplying the effect of a boycott called by immigrant-rights activists after Republican governor Jan Brewer signed the state’s new law in April

  • Experts: rare Earths elements headed for 2011 supply crunch

    The prices of rare-Earth elements remained static for decades due to plentiful supplies, lulling the high-tech industry into a false sense of security; this is no longer going to be the case, with a 300 percent spike in prices over the past year alone; with China currently producing 95 percent of the world’s supply. Japan, the United States, and other top consumers, however, are scrambling to find new sources

  • Militants kidnap 7 from Nigerian Exxon platform

    After the 9/11 attacks, Bin Laden boasted that he used an operation which cost al Qaeda $500,000 to finance to inflict a $500 billion damage on the U.S. economy; this was not a mere boast: experts say it was an indication that econo-jihad was an integral part of al Qaeda’s strategy to weaken and defeat the West; the recent BP disaster offered an example of one tactics terrorists may pursue in order to inflict serious economic and environmental damage on the United States and other countries: attack off-shore oil rigs: these rigs are utterly vulnerable to attack, and the damage such an attack can do is considerable; in Nigeria, a militant organization is already attacking oil rigs — if, for now, only to kidnap rig workers in order to blackmail their employers for money and political concessions; the ease with which such attacks are carried out should give all of us a pause

  • The U.S. rare-Earth industry can rebound -- over time

    Rare-Earth elements are not that rare; the U.S. has plenty of the metals that are critical to many green-energy technologies, but engineering and R&D expertise have moved overseas; responding to China’s near monopoly, companies in the United States and Australia are ramping up production at two rich sites for rare earths, but the process will take years

  • New biometric system harder to fool than other approaches

    Each of us has a unique pattern of eye movements; an Israeli company developed a new biometric security system which exploits this for a simple, hard-to-fool approach; the system tracks the way a person’s eye moves as he watches an icon roam around a computer screen; the way the icon moves can be different every time, but the user’s eye movements include “kinetic features” — slight variations in trajectory — which are unique, making it possible to identify him

  • U.S. Internet hosts are essential for criminal botnets

    Cybercrime is often associated with Russia and China, and rightly so — but many of the servers vital to their activities are located elsewhere; facilities provided by Internet companies in the United States and Europe are crucial to these criminal gangs’ activities

  • Shippers campaign against full screening of cargo on planes

    The TSA decided that starting last August, it would mandate the screening of all cargo on passenger planes loaded in the United States; it said its rule would not apply to cargo placed on U.S.-bound passenger flights overseas, or to cargo-only flights; the Obama administration announced new cargo rules Monday banning freight out of Yemen and Somalia; it also restricted the shipment of printer and toner cartridges weighing more than a pound on all passenger flights and some cargo flights; the overall cargo security rules were unchanged

  • Cybersecurity standard published to protect global critical infrastructure

    With industrial networks being increasingly connected to the hostile IT world, and the frequency and sophistication of malware growing exponentially, industrial stakeholders must act today to protect their critical systems; the International Instrument Users Association (WIB) releases comprehensive cybersecurity standard to protect critical industrial computers;

  • The time for cybersecurity contracting is now

    It is not just a fad: cybersecurity represented the largest request for funds in last year’s intelligence budget; it is an area for expansion government contractors cannot afford to pass up