• Businesses seek to delay implementation of E-Verify

    A business coalition files suit to prevent DHS from implementing E-verify as of next Tuesday; E-Verify would require federal contractors to verify the legal status of their workers

  • Trojan horse virus allows hackers, law enforcement, to eavesdrops on VoIP

    A Trojan horse virus allows hackers, but also law enforcement, to record VoIP calls; law enforcement in the U.S. would presumably need a court order to surveil someone’s Skype calls, but the barriers to deploying the virus might be lower for intelligence agencies and authorities in other countries

  • Purdue University, 21CSI to pursue homeland security opportunities

    The two organizations will collaborate in implementing new decision support tools and processes at the federal, state, and local levels

  • Boeing successfully tests airborne tactical laser

    Silent death ray from the skies may usher in a new chapter in warfare: the laser may cause a cell tower to stop working, a vehicle’s fuel tank to suddenly explode, or a single person to inexplicably be incinerated — all completely silently and tracelessly, without anyone knowing they were ever there and not so much as a spent bullet left behind

  • National Grid to use Swiss company's solution for SCADA/EMS

    National Grid currently owns more than 4,000MW of contracted electricity generation capacity in the United States, delivering electricity to around 3.3 million customers; the company will use Swiss company ABB’s network management solution in its SCADA/EMS

  • Pakistan to build own UAV

    Under a program launched this month, Pakistan’s domestic version of the drone or unmanned aerial vehicle to be called Falco will be made in collaboration with Selex Galileo of Italy at the Pakistan Aeronautical Complex in Kamra in Punjab province

  • Sanswire has lofty plans for airship

    The Florida company has seen its ups and downs, but it now has a joint venture with TAO Technologies of Germany to develop and manufacture airships for use in war zones, border security, and for commercial purposes

  • Michigan seeks homeland security business

    Michigan ranks 31st among states receiving homeland security money, with Virginia, California, and the District of Columbia the top three; a coalition of Michigan business people want to bring more security companies to Michigan to move Michigan

  • TSA awards private screening contract airports in Montana

    TSA has selected Trinity Technology Group of Fairfax, Virginia., as the private screening contractor for seven airports in Montana under the Screening Partnership Program (SPP); the 5-year contract is worth $10,947,820

  • Throwable robots for U.S. Navy SEALs

    The U.S. military has ordered 150 Recon Scout devices (at a cost of $9,000 each) for the special forces; the beer can-sized robot is equipped with infrared night sight video; the robot is tough enough to be thrown through a door or window, dropped down a chimney, etc. before being driven about to see what it can see

  • U.K. banks lax on Internet fraud

    U.K. Payments Administration (formerly APACS) reports that online banking fraud reached £52.5 million in 2008, more than doubling from the £22.6 million recorded in 2007; not all banks take measures which are adequate

  • Precipitous -- and inexplicable -- drop in phishing e-mails

    A new report from IBM shows a big drop in the volume of “phishing” e-mails, in which fraud artists send what looks like a legitimate message from a bank or some other company

  • Space technology to benefit defense, health care markets

    Technology developed for the Mars lander could prove useful in defense and health care applications

  • ThermoDyne helps organizations comply with HSPD-7

    The need to comply with Homeland Security Presidential Directive (HSPD-7) will open 9,000 federal buildings as market for Mail Defender; this, the company and recession-weary Elkhart, Indiana, hope, will create hundreds of new, long-lasting jobs

  • Ad hoc network for CBRN sensors for soldiers, first responders

    Following an incident like an attack, explosion, or fire, soldiers and first responders would collect air-quality data, sample it, and transmit threat-level information to keep others out of harm’s way; analysis of the data at a center would give commanders actionable information useful in developing an effective response