-
Earthquake's trampoline effect
During earthquakes the ground not only shakes from side to side, but also bounces up and down; this has important implications for designing quake-proof structures
-
-
Using laptops to detect earthquakes
Laptops have a small accelerometer chip built into them in order to protect the delicate moving parts of the hard disk from sudden jolts; same chip is a pretty good earthquake sensor, too
-
-
Debate over safety of taser-proof vests
A U.S. body-armor company is selling taser-proof vests to police units; some argue that the vests make officers less safe because taser-toting bad guys would now aim for the officer’s head; the response: this is like arguing that bullet-proof vests make officer less safe because the bad guy would aim for the head
-
-
Report: Private sector can better prepare for cyber attack risks
New expert panel report suggests shifting control of corporate cyber infrastructures from IT departments to chief financial officers
-
-
IT security during tough economic times
Tough economic times lead to layoffs and mergers and acquisitions; a key aspect of such transitions is the inevitable turnover and its impact on internal security
-
-
Debate over safety of taser-proof vests
A U.S. body-armor company is selling taser-proof vests to police units; some argue that the vests make officers less safe because taser-toting bad guys would now aim for the officer’s head; the response: this is like arguing that bullet-proof vests make officer less safe because the bad guy would aim for the head
-
-
U.K. businesses lack understanding of threats they face
U.K. companies invest billions in software for intrusion detection, encryption, and identity management, but are still struggling with basic security processes
-
-
Spanish mathematicians model submarine avalanches and tsunamis
Mathematicians develop a new model to explain submarine avalanches and certain types of tsunamis.
-
-
GTISC lists major 2009 cyber threats
Georgia Tech Information Security Center releases emerging cyber threats forecast for 2009
-
-
Identifying emergency personnel
Emergency response teams work in confusing conditions; in large disasters, emergency units from several jurisdictions may be involved; the rescuers need to able to identify each other
-
-
Mini-UAV helps in monitoring natural disasters
Scandicraft provides geo-tagged aerial images taken from mini-UAV via satellite link; accurate images will make responses to natural disasters more effective
-
-
Body-armor manufacturer settles with U.S. Justice Department
The U.S. Justice Department charged that a body armor manufacturer knowingly used Zylon fiber in body army it sold to the federal government and local law enforcement; Zylon fiber degrades quickly and is not suitable for ballistic use
-
-
Portable imaging system helps response to natural disasters
Yellow Jackets researchers develop an imaging system which can be affixed to a helicopter to create a detailed picture of an area devastated by a hurricane or other natural disaster
-
-
Briefly noted
The financial crisis and homeland security… Airport security: shoe salvation has arrived… UNDT to market anthrax detection equipment in Israel… Canada’s new emergency management and business continuity standard
-
-
Better coastal defenses against large waves
Coastal defenses have to withstand great forces and there is always a risk of water overtopping or penetrating these structures; Liverpool University’s mathematician says we need new concepts for coastal defenses
-
More headlines
The long view
Using Drone Swarms to Fight Forest Fires
Forest fires are becoming increasingly catastrophic across the world, accelerated by climate change. Researchers are using multiple swarms of drones to tackle natural disasters like forest fires.
How Climate Change Will Affect Conflict and U.S. Military Operations
“People talk about climate change as a threat multiplier,” said Karen Sudkamp, an associate director of the Infrastructure, Immigration, and Security Operations Program within the RAND Homeland Security Research Division. “But at what point do we need to start talking about the threat multiplier actually becoming a significant threat all its own?”