• FOOD SECURITYPredicting Threats to Food Security

    Pests and diseases remain one of the biggest threats to food production, increasingly destabilizing food security and livelihoods across climate-vulnerable regions around the world,” says one expert. Mathematical modelling can prevent crop devastation and preserve livelihoods.

  • Information securityNIST offers help for contractors secure unclassified government information

    It is crunch time for government contractors. They only have until 31 December 2017 to demonstrate they are providing appropriate cybersecurity for a class of sensitive data called Controlled Unclassified Information (CUI). Otherwise, they risk losing their contracts. For organizations that may be struggling to meet the deadline, the National Institute of Standards and Technology (NIST) has a new publication intended to help.

  • CybersecurityIntel teams up with Israeli cybersecurity incubator to foil hacking attacks

    Intel, the world’s largest chip-maker, is joining forces with the Israeli cybersecurity incubator Team8 to locate innovative technology that will fend off increasingly sophisticated cyberattacks. In joining forces with Team8 and their syndicate members, which include big names like Microsoft and Cisco, Intel is further advancing its desire to be a major player in the cybersecurity market. Israel is home to around 450 cybersecurity startups and receives around 20 percent of global investment in the field.

  • CybersecuritySerious security vulnerabilities found in home, business, industrial robots

    Researchers have identified numerous vulnerabilities in multiple home, business, and industrial robots available on the market today. The vulnerabilities identified included many graded as high or critical risk, leaving the robots susceptible to cyberattack. Once a vulnerability has been exploited, a hacker could potentially gain control of the robot for cyber espionage, turn a robot into an insider threat, use a robot to expose private information, or cause a robot to perform unwanted actions when interacting with people, business operations, or other robots. In the most extreme cases, robots could be used to cause serious physical damage and harm to people and property.

  • Intelligence softwareStrengthening national security by improving intelligence software

    An intelligence analyst hunting for answers in a sea of data faces steep challenges: She must choose the right search terms, identify useful results, and organize them in a way that reveals new connections. Making that process quicker and more intuitive could yield faster answers to key national security questions. Researchers are developing intelligence software that allows analysts to interact more closely with their data.

  • Chemical detectionBlock MEMS awarded $9.8M contract for standoff detection of chemical threats

    Block MEMS, a developer of Quantum Cascade Laser (QCL)-based infrared detection systems, has been awarded a $9.8 million contract from the Intelligence Advanced Research Projects Activity (IARPA) to develop a system that can detect trace quantities of chemicals at standoff distances of at least 100 ft.

  • In the trenchesGeneral Dynamics completes USAF Space Fence radar array ground structure

    General Dynamics SATCOM Technologies earlier this month completed the construction and walk-through of the 7,000 square-foot radar receive array structure which is part of the U.S. Air Force Space Fence radar system. With the array structure complete, the General Dynamics Space Fence team will dismantle the 700,000-pound steel structure and ship it to Kwajalein Atoll, Marshall Islands, for reassembly and integration into the Space Fence system.

  • EncryptionFBI may be able to break into San Bernardino terrorist’s phone without Apple’s help

    Magistrate Judge Sheri Pym has postponed until 5 April a court hearing about the FBI’s request that the court would order Apple to unlock the phone of one of the San Bernardino terrorists. The FBI asked the judge to postpone the hearing after the agency said it may have found a way to unlock the phone without Apple’s help.

  • CybersecurityHackers could decrypt iMessage photos, videos

    A team of researchers has poked a hole in Apple’s iMessage encryption software. The bug would enable a skilled hacker to decrypt photos and videos sent as secure instant messages. The details of the vulnerability will be published after Apple has issued an update that corrects the flaw.

  • EncryptionApple versus FBI: All Writs Act’s age should not bar its use

    By Ronald Sievert

    A federal magistrate judge in California has issued a warrant ordering Apple to assist the FBI in accessing data on an iPhone used by a suspect in the December 2015 San Bernardino mass shooting. Apple’s public refusal to comply with the order – and its motion asking a judge to reverse the order – have set up a legal showdown that has captivated the technology world. It’s hard not to think that marketing and economics are at least somewhat behind Apple’s actions. But my guess is most people understand that the FBI would not be getting into their phones without a probable cause search warrant. In addition, I would think Apple would not want to have a market composed of people who want to use iPhones for dangerous and illegal activity. The company might actually lose more future customers because of its uncooperative attitude than it would ever lose by helping the government by complying with a court order.

  • EncryptionFBI cannot force Apple to unlock iPhone in drug case: Judge

    Magistrate Judge James Orenstein in Brooklyn on Monday ruled that the U.S. government cannot force Apple to unlock an iPhone in a New York drug case. The ruling strengthens the company’s arguments in its landmark legal confrontation with the Justice Department over encryption and privacy. The government sought access to the drug dealer’s phone months before a California judge ordered Apple to give access to the San Bernardino terrorist’s handset.

  • EncryptionIn FBI versus Apple, government strengthened tech’s hand on privacy

    By Rahul Telang

    The ongoing fight between Apple and the FBI over breaking into the iPhone maker’s encryption system to access a person’s data is becoming an increasingly challenging legal issue. This case is very specific, and in this narrow case, Apple and law enforcement agencies will likely find a compromise. However, this question is not going away anywhere. With the “Internet of things” touted as the next big revolution, more and more devices will capture our very personal data – including our conversations. This case could be a precedent-setting event that can reshape how our data are stored and managed in the future.

  • EncryptionApple refuses to comply with court order to help FBI investigate San Bernardino terrorists

    Apple’s encryption technology has placed the company at the heart t of the privacy vs national security debate, as the company said it would defy a court order which requires to company to help investigate the San Bernardino attack by helping the FBI crack the code of an iPhone , Syed Rizwan Farook, one of terrorists, used. The U.S. government, stunned by Apple’s refusal to help in investigating a terrorist attack on U.S. soil, persuaded a court to issue on order compelling Apple to cooperate in the investigation.

  • InfrastructureLA, Calif. file criminal charges against SoCalGas over massive methane leak

    Criminal charges were filed on Tuesday against Southern California Gas, the utility company whose blown-out natural gas well forced thousands of people in the Los Angeles area to evacuate their homes. The charges claim that the company failed to report the massive leak to the authorities, as it operating license requires.Papers filed in court yesterday claim that the company allowed the release of 80,000 metric tons of methane into the atmosphere.

  • Public healthTheranos blood-testing lab poses “immediate jeopardy” to the public: U.S. government

    Theranos is facing another major setback after the Centers for Medicare and Medicaid Services (CMS) described the company’s blood-testing technology as posing “immediate jeopardy” to the public. The Silicon Valley firm has been valued at $10 billion, raising $400 million from investors for what it described as “breakthrough” technology which allowed it to do blood tests using a pinprick, rather than a full blood draw.