• Quake-proofing U.S. buildings

    An Indian civil engineer has invented a sleeved column braces which help buildings withstand earthquakes; the sturdy brace apparatus surrounds a core of high-performance steel, but is spaced from the sides of the core; the sleeve thus absorbs and dissipates energy, but does not buckle under pressure; several large buildings in California, built in the last few years, have adopted the technology

  • What the Chinese attacks on Google mean for enterprise security

    Chinese government intelligence operatives exploited vulnerabilities in Internet Explorer 6 and higher to launch sustained cyber attacks against 32 Western companies operating in China; the hacking of the Gmail accounts of political dissidents were but a tiny part of the attacks; rather, the attacks were part of a coordinated campaign that targeted the intellectual property of a wide swath of the U.S. industrial base, including Dow Chemical, Symantec, Yahoo!, Northrop Grumman, and Juniper Networks; wide-ranging industrial espionage is a central element in the Chinese government’s effort to hasten the rise of China to a position of global economic hegemony

  • Shooting payloads into space with a cannon

    Using rockets to loft payloads into orbit costs $5,000 per pound; a proposed ling-barrel cannon can deliver cargo into orbit around $250 per pound; what is more, unlike a rocket, the cannon is re-usable; it will take seven years and about $500 million to build the cannon

  • Experts: Chinese attack on Google “one of the most sophisticated hacking attacks to date”

    The cracking techniques used by Chinese government operatives in the assault on Google and 31 other Western companies, used multiple malware components, with highly obfuscated code designed to confound security researchers; this marks out the Chinese attack as one of the most sophisticated hacking attacks to date; why was the search engine giant using the famously vulnerable IE6 remains a mystery

  • U.S. aging infrastructure a national security concern

    There many immediate and long-term economic benefits to investing in shoring up the U.S. crumbling infrastructure – but investing in creating a robust and resilient infrastructure is essential for national security as well: because the United States is the world’s dominant military power, the only real way for enemies to attack the country is through its infrastructure, including cyberspace, making infrastructure resilience critical

  • Why the U.S. needs an infrastructure bank

    The U.S. aging infrastructure will eventually constrain economic growth; government alone can no longer finance all of the nation’s infrastructure requirements; a national infrastructure bank (NIB) could fill the gap; the NIB could attract private funds to co-invest in projects that pass rigorous cost-benefit tests, and that generate revenues through user fees or revenue guarantees from state and local governments; investors could choose which projects meet their investment criteria, and, in return, share in project risks that today fall solely on taxpayers

  • Chinese cyber attacks hit U.S. law firm which is suing China for stealing Web filtering code form a U.S. company

    The Los Angeles-based law firm Gipson Hoffman & Pancione sued China for lifting Web-filtering code developed by U.S. company Cybersitter; Chinese companies and government agencies stole the code in order to use it in the Chinese government’s effort to create tighter Web censorship and tracking system (China’s Orwellian name for the project” “The Green Dam Youth Escort monitoring program”); on Monday, Chinese hackers began to hack the law firm’s computer systems, in a manner strikingly similar to the attacks by Chinese intelligence operatives on Google, Adobe Systems, and 32 other Western companies

  • China tries to contain damage from Google dispute

    The Chinese government says it will try to persuade Google to continue its operations in China, but expect Google – and other foreign companies — to “respect local law and regulations and local culture and customs to shoulder social responsibility”; Google already made concessions to Chinese law and regulations by allowing the government to dictate what users can – and cannot — find when they do Google searches; Google’s decision to leave China came after Chinese intelligence agents hacked the Gmail accounts of political dissidents and human rights activitists

  • U.S. looking for intellectual property offenders

    The Trade Act of 1974 mandate that the U.S. Trade Representative (USTR) “identify countries that deny adequate and effective protection of intellectual property rights or deny fair and equitable market access to U.S. persons who rely on intellectual property protection”; the USTR has just called for public comments to point out foreign governments that have not lived up to their obligations to protect U.S. intellectual property rights; last year, the USTR investigated 77 U.S. trading partners for possible intellectual property rights violations, resulting in 45 countries being placed on either the Priority Watch List or the Watch List for their weak intellectual property rights protection regime

  • Cyber exercise to target financial firms

    The test, which starts 9 February, will have different scenarios for each of four different types of businesses: Financial firms, retailers, card processors, and general businesses; on each day, participants will receive a description of a specific scenario for their category of business, building on the previous day

  • Bruker’s Autonomous Rapid Facility Chemical Agent Monitor advances to DHS Phase IIIb

    Bruker uses its proprietary RAID Ion Mobility Spectrometry (IMS) technology for the Autonomous Rapid Facility Chemical Agent Monitor Program, which is designed for long-term monitoring of ambient air for the presence of hazardous chemical vapors in the interior or exterior of critical government buildings, subways, airports and other facilities; the company says it has also developed a new product – the DE-tector — which uses next-generation IMS technology with selectivity and specificity that approaches that of mass spectrometry

  • Google to pull out of China following government-sponsored cyberattacks

    In order to operate in China, Google agreed to implement stringent government-dictated censorship as to what Chinese consumers can – and cannot – find when doing Google searches; Google’s compliance with Chinese censorship was harshly criticized by human rights and freedom-of-speech organizations, but Google responded that this was the cost of doing business in China; the Chinese government’s hacking of Gmail accounts in order to monitor political dissidents proved to much for Google, though, and the company is now set to end its operations in China

  • Google’s decision a rare show of defiance in China

    Google’s decision to leave China is a rare show of defiance in a market where the government punishes those who do not play by the rules; in industries from automaking to fast food, companies have been forced to allow communist authorities to influence — and sometimes dictate — their choice of local partners, where to operate, and what products to sell; many high-tech companies operating in China are forced to open their intellectual property and industrial secrets to their Chinese competitors – or to Chinese government officials, who pass on that property to Chinese companies – allowing these Chinese companies to reverse engineer and copy Western companies’ products and solutions; Western companies have struggled to make headway against intense competition from Chinese rivals – rivals who enjoy the fact that the Chinese government writes rules which tilt the playing field in favor of Chinese companies

  • Maryland wants to become cybersecurity’s Silicon Valley

    Governor Martin O’Malley: “Our federal facilities are a big part of the reason that we not only think that Maryland can be the national epicenter for cybersecurity, the fact of the matter is our state already is the epicenter of cybersecurity for our country and therefore an important epicenter for the entire world”

  • U.K. firm says its scanning technology meets security, privacy concerns

    Cambridge, U.K.-based TeraView says it is developing terahertz body scanners which use light from upper end of the infra-red spectrum, with a wavelength between 0.1 and 1mm; the scanners do not produce an image but a “fingerprint” — rather than blurry pictures of naked tourists, a TeraView scanner would return absorbance data that could be automatically analyzed to approve travelers or alert airport staff to investigate further