• U.S. rebuffs Huawei fearing company is proxy of China

    Last month the U.S. government rebuffed another attempt by Chinese telecom giant Huawei Technologies Co. to enter the U.S. market when it ordered the company to immediately stop its partnership with 3Leaf Systems; the government has blocked similar deals in the past; U.S. officials claim that Huawei is a dangerous extension of the Chinese government and is determined to steal state secrets; Huawei is one of China’s largest companies, providing products to forty-five of the world’s top fifty telecom operators in over 100 countries; observers believe that the U.S. government’s distrust of Huawei stems from its general frustration with cyber attacks emanating from China

  • Vaxinnate secures BARDA contract

    New Jersey-based Vaxinnate Corp. said it has secured a contract from the Biomedical Advanced Research and Development Authority (BARDA), the research and development authority part of the Department of Health and Human Services (HHS), for up to $196.6 million to help develop its seasonal and pandemic flu vaccines

  • Boston Dynamics developing humanoid and robot cheetah

    Defense Advanced Research Projects Agency (DARPA) has awarded Boston Dynamics, an advanced robotics developer, a contract to build “Cheetah,” a fast and agile robot capable of chasing and evading; the eighteen year old engineering company is also working on a humanoid robot named “Atlas” based on the design of “PETMAN,” an anthropomorphic robot for testing chemical protection clothing used by the U.S. army

  • Adidas offers TSA-friendly sneakers

    Adidas cashes in on airport security by offering the SLVR S-M-L Concept shoes; the shoes are TSA-friendly, with a stretchy upper and expandable sole which makes it easy to slip them off when going through a security line; the $140 per pair shoes also have fake laces on top so you do not look like you bought them on the over-60s shopping channel

  • Using location-based services to protect infrastructure

    Location-based services (LBS) have enabled marketing firms to alert mobile phone users of nearest coffee shops and eateries as well as help phone owners find their geographical location on hand-held mapping devices; now, location based service enabled phones can help protect critical infrastructure facilities by alerting authorities about threats and giving them time to apprehend intruders

  • Fireballs neutralize biological weapons

    A California company will develop fireballs that can neutralize biological weapons and infrared decoy flares that are nearly invisible to the naked eye; the company, the fireballs are among the counter-terrorism tools that Exquadrum plans to start testing soon at four abandoned military bunkers in Victorville, California

  • Engineering competition features Blue Tooth-capable trebuchet

    During the first Storm the Citadel Trebuchet Competition in Charleston over the weekend, Google employees combined Android cell phones, a computer the size of a credit card, and a Blue Tooth receiver to trigger a medieval weapon used in the twelfth century to destroy enemy fortifications

  • New association for maritime security industry formed

    Maritime security consultant Peter Cook recently announced the formation of the Security Association for the Maritime Industry (SAMI); SAMI will help establish rules and regulations in the fledgling maritime security industry; the maritime security industry has grown rapidly in recent years, but has suffered from lack of regulation and rapid expansion; the industry’s reputation has been tarnished with incidents of hired security firms abandoning ships when pirates attack leading to long periods of captivity for the ship’s crew; to prevent these incidents from occurring and to uphold the reputation of the industry, SAMI will vet maritime security companies, establish standards, and ensure that its members comply with established standards

  • Tainted apps make their way into official Android store

    More than fifty applications have been found to be infected with a new type of Android malware called DroidDream, an information stealer; fraudsters repackaged legitimate apps (mostly games) so that they included malicious code before uploading them to the marketplace; the tactic has been seen in mobile marketplaces in China and elsewhere but this is the first time the approach has been successfully applied in the United States

  • ASIS and (ISC)2 join forces for annual security conference and more

    (ISC)2 will hold its first annual Security Congress in conjunction with ASIS International’s 57th annual Seminar and Exhibits conference in Orlando, Florida; the combined events are expected to attract more than 20,000 security professionals from around the world; during the conference the two organizations will jointly offer certification seminars for various security and technology-related credentials; (ISC)2 and ASIS signed a deal to work together and leverage their mutual strengths and membership bases; beyond the conference, the two organizations will work together on developing educational programming, research, and legislative issues; the ASIS International conference will be held from 19 September 2011 to 22 September 2011

  • Kenya orders 100,000 more biometric ID cards from OTI

    On Track Innovations Ltd. (OTI) recently received an additional order for 100,000 of its MediSmart healthcare biometric ID cards; the cards were purchased by Kenya’s Smart Applications International Ltd. (SMART) for use in medical facilities across Kenya; the card contains a microchip that stores a patient’s name, picture, signature, and medical treatment records; SMART has already issued an estimated 200,000 MediSmart cards to combat fraud

  • China races to claim Arctic resources

    As temperatures around the world continue to rise and the ice in the Arctic Ocean melts, the once frozen seas are increasingly open for exploration and countries have been scrambling to claim the region’s vast resources; several countries including Canada, the United States, and Russia have all sought to expand their territorial claims over the region and now new countries like China are pushing in; Chinese researchers recently sailed to within 120 nautical miles of the North Pole; only a few years prior, this trip would have been impossible due to the thick ice in the ocean that can be more than 30 feet thick; scientists estimate that during the summer months, the Arctic Ocean could be ice-free by as early as 2013 or as late as 2060

  • Acoustic gunfire detection devices heading to the field

    Technological developments may one day create artificial soldiers, but until they come along, the United States and other countries will continue to rely on human soldiers; the militaries thus want to preserve as many of their soldier’s lives as possible; to that end, Shoulder-Worn Acoustic Targeting System (SWATS), which helps Marines zero in on enemy sniper fire, is a godsend to the United States; asymmetric warfare favors the forces that can strike and runaway unharmed, but with plentiful acoustic sensors in the field it will be that much harder for snipers to ambush U.S. soldiers and live to escape

  • Law enforcement, and domain name registrars discuss ways to tackle net crooks

    Police and other law enforcement agencies in the United States and the United Kingdom are increasingly turning their attention to domain names as an Internet choke-point that can be used to shut down Web sites selling counterfeit goods and enabling the trading of pirated movies and child pornography

  • Are your phones really secure?

    Breakthroughs in technology have enabled malicious actors to listen in on any conversation using your phone even when not in use; eavesdroppers have circumvented encrypted audio channels by relying on a relatively simple principle in physics — resonance; by tapping into an object’s natural resonance, spies have turned phones and phone cables into listening devices even when they are not in use; researchers at Teo, a manufacturer of secure telecommunications equipment, were able to capture human voices using standard phones, unplugged Ethernet cables, or even a rock; to address this security gap, Teo has designed its IP TSG-6 phones with special vibration dampening circuitry and materials that render them impervious to these types of listening devices