• Stolen laptops "broadcast" their location to rightful owners

    Huskies researchers develop a software tool which uses the Internet as a homing beam; if the thief uses the stolen laptop to connect to the Internet, the owner receives information on the laptop location (and Macintosh owners also recvied a picture of the thief)

  • Engineers to quake-proof Cal stadium on free-floating blocks

    Engineers have solved one of the world’s great retrofit puzzles: how to keep UC Berkeley’s Memorial Stadium from crumbling into a pile of concrete rubble during a major earthquake

  • U.S.-based computers launch most cyberattacks in 2008

    Computers, or hackers, based in the United States launched most of the cyber attacks in the world between January and September 2008; China-based computers were in second place, and Brazil came in third; United States also led in the number of computers compromised

  • FSU joins coalition working to improve U.S. power grid

    Seminoles center joins the other sixty-nine member companies and organizations of the GridWise Alliance to push for modernizing the U.S. power grid

  • Briefly noted

    Smart cluster bomb hunts down targets… Anthrax-case documents reveal bizarre Ivins’s behavior… New FISMA bill receives committee OK… L-1 in $5.9 million Mississippi driver’s license contract…

  • Satellite phone company Iridium acquired for $591 million

    Iridium made a name for itself for going bankrupt eight years ago and being bought for $25 million; it later donated satellite phones to first responders in the aftermath of Katrina; now it is being acquired for half a billion dollars

  • GPS vulnerable to spoofing

    GPS technology is ubiquitous in civilian and military applications; Cornell University researchers raise uncomfortable questions by demonstrating how GPS navigation devices can be readliy duped by transmission of fake GPS signals that receivers accept as authentic ones

  • Cyber Storm II drill shows ferocity of virtual attack

    In March governments from Australia, the United Kingdom, New Zealand, Canada, and the United States ran the largest-ever cyber war games, Cyber Storm II; the drill tested critical infrastructure including dam walls, telecommunications, and government computer networks

  • NATO in major anti-terror drill

    NATO will hold a two-week comprehensive anti-terrorrism drill in Sardinia; 15 nations, 10 agencies will coordinate land, air, sea, space assets in an effort to smooth communication, information sharing, and operational execution

  • Briefly noted

    Aussie cyber security needs work… D.C. policy carry iPhones… Surveillance radar in Indonesian straits… HUD awards Iowa critical infrastructure funds…

  • "Thought helmets" for silent, secure communication among soldiers

    U.S. Army funds research into helmets with embedded sensors which “read” a soldier’s thoughts (well, brain waves) and transmit them, telepathy-like, to their intended target

  • Keep IT security simple

    New study of corporate security breaches says that 87 percent of all security breaches could have been avoided “if reasonable security controls had been in place at the time of the incident”

  • India eases foreign borrowing rules to aid infrastructure

    The U.S. infrastructure is often described as “aging” or “crumbling”; in india they refer to the country’s “ramshackle infrastructure”; the Indian government, as part of a move to have $500 billion invested in improving the country’s infrastructure, eases borrowing rule, allowing Indian companies involved in infrastructure improvement to borrow more money abroad

  • Briefly noted

    Debating whether DHS should have cybersecurity responsibilities… FDA revisits refused foods issue… DoD tests contractors’ ID cards

  • USPS to deploy IPv6-capable video surveillance

    The U.S. Postal Services wants to increase security inside the more than 40,000 post offices around the country; it will install IPv6-capable CCTV systems — complying with the federal government encouragment of agnecies to migrate to IPv6