-
Shipment of restricted technology to India brings 35-month sentence
A South Carolina businessmen is sentenced the three years in prison for smuggling restricted technology to India; technology used in India’s space and ballistic-missile programs
-
-
Botnet cyberattack costs Japanese company 300 million yen
There is a new type of blackmail in Japan: Hackers use botnets in denial-of-service attacks on companies’ computers — ending the attacks only when hefty ransom is paid
-
-
FEMA will be aggregator/gateway for CMAS
FEMA said it will be the aggregator and gateway for the Commercial Mobile Alert System, a voluntary nationwide emergency alert system
-
-
Breakthrough: Reading fingerprints even after they are gone
The name is Bond, John Bond (of Leicester University, that is): Researchers at Leicester develop a fingerprints visualization technique which would allow reading a fingerprint even after the print itself has been removed; new method would allow solving decade-old unsolved cases
-
-
OSHA issues guidance regarding storage of face masks, respirators
OSHA requests comments on proposed guidance on workplace stockpiling of respirators and face masks for pandemic influenza
-
-
Iranian-born U.S. citizen charged with nuclear smuggling
The Iranian-born engineer worked for seventeen years at Palo Verde nuclear plant, about fifty miles west of downtown Phoenix, the largest U.S. nuclear plant; he loaded software onto his laptop, and took the laptop to Iran
-
-
But will it work, Sir?
There are many different combat and defensive techniques, and each has some merit, some application, some innovation; the question that must be asked is: will this technique work when the ultimate test arrives and it must be used in real time?
-
-
IBM joins Next Generation Identification (NGI) system team
NGI, the FBI’s new multi-modal, state-of-the-art biometrics system to be used by state, local, and federal authorities, will store fingerprints, palm prints, iris, and facial recognition information; it will accommodate other biometric modalities as they mature
-
-
Secret wiretap warrants double since 9/11
A Justice Department report shows FISA warrants for counterterrorism, espionage cases up
-
-
Malicious hardware may be next hacker tool
Next threat on the computer security front: Malicious hardware; malicious hardware is more problematic because it is more difficult to detect; China is already using an early, and simple, version of malicious hardware in its massive military and industrial espionage campaign against Western countries and companies
-
-
Stolen military items available for sale online
GAO investigators buy dozens of prohibited military items on eBay and Craigslist; some of the time would be of direct help to terrorists and insurgents
-
-
DHS grants Maine Real ID extension
Unless a state received a Real ID extension from DHS, then the driver’s licenses it issues to its residents must be Real ID-compliant by 11 May or state residents will not be able to board a plane, open a bank account, or enter a federal building; Maine’s application was not to DHS’s liking, so the state missed the extension application deadline; DHS decided to give the state 48 hours to comply
-
-
"Intellectual vacuum cleaner": China's industrial espionage campaign, I
In an effort to accelerate its rise to economic and technological hegemony, China is employing its military, intelligence services, trade missions abroad, students sent to foreign universities — and Chinese-born citizens who are sent to form espionage sleeper cells — in a massive industrial espionage campaign against Western companies
-
-
Miami police applie for FAA approval for UAV
Bad guys in Iraq, Afghanistan, and Pakistan worry about U.S.-operated UAVs; the Miami Dade police wants to use Honeywell’s “hover and stare” drone to track bad guys in South Florida
-
-
New acoustic system locates snipers with accuracy
System detects the sound of an initial gunshot then the shockwave from the muzzle of the weapon being fired; since sound travels faster than a shockwave, the system is able to pinpoint the position of the attacker
-