• The entertainment industry understands the rare Earth crisis, why doesn’t everybody else?

    U.S. dependence on rare earths imports substantially exceeds our dependence on imported petroleum. In 2011, the United States imported 45 percent of the petroleum we consumed, but we imported 100 percent of the rare earth materials we consumed that same year — and rare earths are far more essential to a wider variety of industries than petroleum is. China controls the production, refining, and processing of over 95 percent of the world’s rare earth elements despite only controlling about half of the world’s rare earth resources. In the 1980s, there were approximately 25,000 American rare earth-related jobs; now we barely have 1,500. The United States must take action now to reduce our dependence on foreign sources of rare earth materials and bring back jobs.

  • Snowden stole co-worker’s password to gain access to secret databanks: NSA

    One reason National Security Agency (NSA) former analyst Edward Snowden was able to gain such broad access to a wide variety of agency’s secret documents was that he copied a password from a co-worker who has since resigned. After Snowden was denied access to NSANet, the agency’s computer network which connects into many of the agency’s classified databases, he persuaded a co-worker, an NSA civilian employee, to use his – the co-worker’s — Public Key Infrastructure (PKI) certificate to gain access. The NSA told Congress Snowden used what the agency describes as “digital deception”: the civilian NSA employee entered his password on Snowden’s computer, not realizing that Snowden was able to capture the password, allowing him even greater access to classified information. Once he gained access to NSANet, Snowden released a “Web crawler” inside the system. The crawler automatically indexed the NSANet, and using the passwords Snowden held – one his, one or more those of co-workers – copied every document in its path.

  • German IT industry hopes to benefit from NSA leaks-inspired distrust of U.S. tech companies

    The German IT sector is hoping to benefit from trust lost in American technology firms in the aftermath of Edward Snowden’s leaks. The German government is looking to develop Internet security initiatives, with government departments vying with each other for a lead role. Both inside and outside the German government a proposal, known as “Schengen Routing,” is advanced which calls for data originated in Europe to be processed and stored within Europe. Critics warn that plans to create a European routing system could affect the openness of the Internet.

  • Old-fashioned way to protect high-voltage substations

    There are about 45,000 substations in the United States, but far fewer high-voltage substations like the one attacked last April in Metcalf. California. Americans could see what the loss of just one important power substation can have when, in 2003, a failure in one such substation knocked out power to fifty million people in the United States and Canada for days. Illinois-based IDT says that since Biblical times, the method of thick-walled fortifications to halt manned and artillery attacks remains the best technology for protecting lives and important assets. The company says that its METALITH, a several-feet-thick prefabricated steel barrier structure filled with sand, would offer the best protection to vulnerable power substations. “While most of the electrical industry has been focused on the threat of cyber-terrorism, the San Jose [Metcalf is near San Jose] attack points to the need for physical protection of strategic power grid assets as well,” says Tom Carlton, IDT’s CEO.

  • W.Va. spill leads lawmakers, industry to look at reforming toxic substances law

    The government was slow to respond to the 9 January 2014 massive chemical spill in West Virginia because the law governing such response, the 1976 Toxic Substances Control Act (TSCA), limits regulatory agencies’ authority to investigate such spills.Under TSCA, the EPA must first prove that a chemical poses an unreasonable risk to health or the environment before it can require the needed testing that would show a potential risk. One observer called this a Catch-22, telling a congressional panel that “This is like requiring a doctor to prove that a patient has cancer before being able to order a biopsy.”

  • Portland’s Christmas Bomber challenges NSA-gathered evidence used to convict him

    Mohamed Mohamud, a Somali immigrant and former Oregon State University student, was convicted last year of attempting to detonate a bomb in 2010 near Portland’s Christmas holiday tree-lighting ceremony at Pioneer Courthouse Square. His lawyers are questioning the legality of evidence used against him. Attorneys for Mohamud are claiming that the evidence used was obtained without a warrant and should have been barred by the court.

  • The “Mask": Kaspersky Lab discovers advanced global cyber-espionage operation

    Kaspersky Lab’s security researchers have announced the discovery of the Mask (aka Careto), an advanced Spanish-language speaking threat actor that has been involved in global cyber-espionage operations since at least 2007. What makes the Mask special is the complexity of the toolset used by the attackers. This includes a sophisticated malware, a rootkit, a bootkit, Mac OS X and Linux versions, and possibly versions for Android and iOS (iPad/iPhone). The primary targets are government institutions, diplomatic offices and embassies, energy, oil, and gas companies, research organizations and activists. Victims of this targeted attack have been found in thirty-one countries around the world.

  • Former FERC chair calls for mandatory security standards for high-voltage substations

    Jon Wellinghoff, the former chairman of the Federal Energy Regulatory Commission(FERC), is leading a crusade to improve physical security around the nation’s electrical grid. Following a 16 April 2013 sniper attack on a San Jose, California substation he is urging Congress to give federal agencies the authority to demand improved security around electrical substations. “This isn’t about this substation or this organized attack,” Wellinghoff said of the California incident. “This is more about the larger issue of physical security of these high-voltage substations nationwide and the need to ensure that some defensive measures start to be put in place.”

  • Israeli legal expert urges development of ethics code for cyberwarfare

    Col. Sharon Afek, former deputy military advocate general, says that countries would benefit from developing an ethics code to govern cyber warfare operations. He notes that existing law already prohibits cyber operations which would directly lead to loss of life, injury, or property damage, such as causing a train to derail or undermining a dam. “Israel faces a complex and challenging period in which we can expect both a cyber arms race with the participation of state and non-state entities, and a massive battle between East and West over the character of the future legal regime,” he writes. He acknowledges, though, that only a catastrophic event like “Pearl Harbor or Twin Towers attack in cyberspace” would accelerate developments in this area.

  • Security of dirty bomb materials in U.S. inadequate: experts

    There are more than 5,000 medical and research devices in the United States containing high-activity radiation sources, including 700 with category-1 sources. Category-1 radiation material could be used by terrorists in dirty bombs. The security measures developed by the industry were written with accident prevention in mind, not in order to thwart a deliberate, forcible effort by terrorists or criminals to gain control of the toxic material. In addition, radioactive materials were considered to be “self-protecting,” because it was assumed that the powerful radiation would deter anyone thinking of tampering with these devices. Terrorist bomb-makers, however, showed themselves to be more technologically-savvy than earlier thought, and, in any event, suicide bombers would not be deterred by the risk of radiation poisoning.

  • Lawmakers want mandatory security standards for national grid

    Lawmakers have urged the imposition of federal security standards on grid operator in order to protect the U.S. national electric grid from attack. The new push follows stories, first reported in the Wall Street Journal reported last Wednesday, about a 16 April 2013sniper attack which disabled seventeen transformer in a San Jose, California substation for twenty-seven days, causing about $16 million in damage. Federal cybersecurity standards for protecting the grid are in place and mandated, but rules for protecting physical sites such as transformers and substations are voluntary.

  • Nevada trial of Sikh terrorist postponed by two years to clarify FISA-related issues

    Balwinder Singh, 39, who received asylum in the United States in 1997, was indicted as a member of Babbar Khalsa International (BKI) and Khalistan Zindabad Force (KZF). Both groups use bombings, kidnappings, and murders in a campaign to establish an independent Sikh state in the Punjab region of India, to be called Khalistan. U.S. District Judge Larry Hicks agreed with the prosecution and defense that the trial should be postponed from February 2014 to February 2016 so that issues related to FISA-authorized NSA surveillance of Singh could be clarified. Judge Hicks said that “the ends of justice served by this continuance outweighs the defendant’s and public’s best interests in a speedy trial.”

  • Most of Libya’s chemical weapons destroyed

    When Libya joined the Chemical Weapons Convention in December 2003, it reported to the Organization for the Prohibition of Chemical Weapons (OPCW) that it was operating three chemical-weapons production facilities, and that it had produced a total of twenty-five tons of sulfur mustard gas, 3,563 bombs with warfare agents, and 1,390 tons of precursor materials. Over the next eight years, these chemical weapons stock were systematically destroyed under international supervision. The work was halted between February and November 2011 – the beginning of the rebellion against Qaddafi and his departure from power – and resumed in early 2012. OPCW announced than on 26 January 2014, work on destroying Libya’s mustard gas has been completed. The question is whether the Qaddafi regime was truthful in its 2003 declaration – or whether there are still stocks of chemical agents stashed somewhere in desert caches.

  • HHS to fund development of drug for bioterrorism, antimicrobial-resistant infections

    HHS says that a public-private is partnership will advance the development of Carbavance, a new option to treat bioterrorism threats and antibiotic-resistant infections. The two bioterrorism Carbavance will address are melioidosis, also known as Whitmore’s disease, and glanders. Both melioidosis and glanders can become resistant to existing antibiotics. Already, with existing antibiotic treatments, approximately 40 percent of people who become ill from these bacteria die from the illness, and up to 90 percent die if not treated.

  • NSF rapid response research grants to fund study of West Virginia chemical spill

    On 9 January 2014, crude 4-methylcyclohexane methanol (MCHM), a chemical primarily used to clean coal, leaked from a storage tank near Charleston, West Virginia, and bled into a river upstream of a water-treatment plant. As a result, about 15 percent of the state’s residents were advised not to drink the water. Better to understand the properties of the chemical that contaminated the drinking water, and the plumbing and water-treatment systems surrounding the area, the National Science Foundation (NSF) has awarded Rapid Response Research (RAPID) grants to research teams at three universities. These grants also will provide STEM learning opportunities for undergraduate and graduate students on the research teams.