-
IvySys Technologies awarded $4.6 million DARPA contract to combat Weapons of Mass Terror (WMT)
Reports of chemical weapons use around the world raises serious concerns about non-state actors’ access to weapons of mass terror (WMT) and reinforces fears of a possible terrorist attack with chemical, biological, radiological, or nuclear (CBRN) weapons in the West. Today’s terrorist networks move operatives, money and material across borders and through the crevices of the global economy, making tracking such adversaries a daunting challenge. In this new norm, the security of the United States will rely on novel, game-changing modeling techniques and solutions to curtail mass terror events.
-
-
Border security improvements boost West Bank-Jordan trade
The West Bank and Israel could double trade with Jordan after new security measures were opened at the Allenby border crossing. The new system for scanning cargo containers will enable 200 containers to cross between Jordan and the West Bank each day, double the current number.
-
-
ISIS bomb-making videos continue to be available on Google platforms
One of ISIS’s most notorious bomb-making videos is frequently and continually uploaded to Google web platforms, and there is little indication that the company is taking the appropriate steps to prevent these reuploads. “You Must Fight Them O Muwahhid” is one of ISIS’s most infamous videos, urging attacks in the West, displaying knife attack tactics on a live human target, and notably, providing instructions for building an explosive device with easily obtainable materials.
-
-
Cyber incidents doubled in 2017
The Online Trust Alliance (OTA) has just released its Cyber Incident & Breach Trends Report. OTA’s annual analysis found that cyber incidents targeting businesses nearly doubled from 82,000 in 2016 to 159,700 in 2017. Since the majority of cyber incidents are never reported, OTA believes the actual number in 2017 could easily exceed 350,000. The report analyzes data breaches, ransomware targeting businesses, business email compromise (BEC), distributed denial of service attacks (DDoS), and takeover of critical infrastructure and physical systems over the course of a year.
-
-
Smuggling of people from Africa to Europe conducted by “independent traders,” not Mafia-like monopoly
First study to model the organization behind trade in illegal border crossings shows no “Mafia-like” monopoly of routes from Africa into Europe via Mediterranean. Instead, myriad independent smugglers compete in open markets that have emerged at every stage of the journey.
-
-
Downtime of a top cloud service provider could cost U.S. economy $15 billion
Businesses in the United States could lose $15 billion if a leading cloud service provider would experience a downtime of at least three days. A new study finds that if a top cloud provider went down, manufacturing would see direct economic losses of $8.6 billion; wholesale and retail trade sectors would see economic losses of $3.6 billion; information sectors would see economic losses of $847 million; finance and insurance sectors would see economic losses of $447 million; and transportation and warehousing sectors would see economic losses of $439 million.
-
-
World Economic Forum launches new cybersecurity center “to prevent a digital dark age”
Without collaboration and robust defenses, cyberattacks could cripple economies, nation states, and societies. The World Economic Forum says that urgent action is needed to create safe operating environment for new technologies like artificial intelligence, robotics, drones, self-driving cars, and the Internet of Things. The Forum has launched a new Global Center for Cybersecurity, which will offer a platform for governments, companies, and international organizations to diminish the impact of malicious activities on the web.
-
-
Moods can impact cybersecurity behavior
As professionals return to work after holidays, their moods are undoubtedly affected by the emotional impact of their holiday experiences, but these moods may be more critical to workplace cybersecurity than previously realized. New research suggests that people’s positive or negative moods can affect the likelihood that they will engage in insecure computing behavior in the workplace.
-
-
$1 billion reward proposed for development of new antibiotics
An international group tasked with researching and developing new economic models to promote antibiotic development is calling for a $1 billion market entry reward for new antibiotics, saying the reward could significantly boost the number of new antibiotics coming to market over the next thirty years. The proposal was made by an international consortium of public health organizations, academic institutions, and pharmaceutical companies supported by the European Medicines Initiative. The $1 billion market entry reward is one of four incentives proposed by the group to stimulate research and development (R&D) for new antibiotics and ensure that critically needed antibiotics are used sustainably and continue to be accessible. “Without incentives, some scientifically promising treatments would probably never make it to patients,” says one expert.
-
-
What we didn’t learn from Twitter’s news dump on Russiagate
On Friday evening, amid a pending U.S. government shutdown and a presidential porn payoff scandal, Twitter released its long-awaited report on Russian uses of its platform to interfere in the 2016 presidential election. The numbers were striking. Twitter officials said, they had found a cluster of 3,814 accounts that were “a propaganda effort by a Russian government-linked organization known as the Internet Research Agency (IRA).” These were supplemented by a broader project of 50,258 automated accounts — bots — which spread the messaging further. In total, 677,775 people in the United States followed one of these accounts or retweeted or liked a Tweet from these accounts during the election period. Peter Singer writes that social media is about scale and networking, and this combination means that, in actuality, the numbers released by Twitter are far worse than they seem.
-
-
Interconnected technological risks: Responding to disruptions of cyber-physical systems
When infectious diseases strike, the World Health Organization acts swiftly, coordinating with the U.S. Centers for Disease Control and Prevention and its foreign counterparts to contain the threat. But there is no equivalent international organization similarly dedicated to identifying and mitigating a cyberattack. The World Economic Forum (WEF), however, is bringing together infrastructure and technology developers, insurers and government officials from across the globe to develop strategies for responding to interconnected technological risks, including those that can cascade when hackers disrupt cyber-physical systems.
-
-
2018: Critical period of intensified risks
The Global Risks Report 2018, published this week by the World Economic Forum cautions that we are struggling to keep up with the accelerating pace of change. It highlights numerous areas in which we are pushing systems to the brink, from extinction-level rates of biodiversity loss to mounting concerns about the possibility of new wars. The reports says that the structural and interconnected nature of risks in 2018 threatens the very system on which societies, economies, and international relations are based – but that the positive economic outlook gives leaders the opportunity to tackle systemic fragility.
-
-
Call for proposals on advanced first responder technologies
Applications are now being accepted for the NextGen First Responder Technologies solicitation, an opportunity for a maximum conditional grant of up to $1 million, jointly funded by the DHS S&T and the Israel Ministry of Public Security (MOPS). the NextGen First Responder Technologies program is looking for innovations in fields such as protective clothing, wearable technology and situational awareness.
-
-
Intel AMT security issue: Attackers may bypass login credentials in corporate laptops
Helsinki, Finland-based F-Secure reported a security issue affecting most corporate laptops that allows an attacker with physical access to backdoor a device in less than thirty seconds. The issue allows the attacker to bypass the need to enter credentials, including BIOS and Bitlocker passwords and TPM pins, and to gain remote access for later exploitation. It exists within Intel’s Active Management Technology (AMT) and potentially affects millions of laptops globally.
-
-
Climate change changing Earth’s landscape
Climate change will replace land use change as the major driver of changes in Earth’s biosphere in the twenty-first century if greenhouse gas emissions aren’t curbed, new research suggests. Historically, human land use change, like urban development and agricultural expansion, has been the primary cause of anthropogenic ecosystem change. But now, due to rising greenhouse gas levels, climate change has become a growing threat to ecosystems. The rapid pace of climate change is making it difficult for species to adapt to changes in temperature, water cycles, and other environmental conditions that affect life on Earth.
-
More headlines
The long view
Need for National Information Clearinghouse for Cybercrime Data, Categorization of Cybercrimes: Report
There is an acute need for the U.S. to address its lack of overall governance and coordination of cybercrime statistics. A new report recommends that relevant federal agencies create or designate a national information clearinghouse to draw information from multiple sources of cybercrime data and establish connections to assist in criminal investigations.
Trying to “Bring Back” Manufacturing Jobs Is a Fool’s Errand
Advocates of recent populist policies like to focus on the supposed demise of manufacturing that occurred after the 1970s, but that focus is misleading. The populists’ bleak economic narrative ignores the truth that the service sector has always been a major driver of America’s success, for decades, even more so than manufacturing. Trying to “bring back” manufacturing jobs, through harmful tariffs or other industrial policies, is destined to end badly for Americans. It makes about as much sense as trying to “bring back” all those farm jobs we had before the 1870s.
The Potential Impact of Seabed Mining on Critical Mineral Supply Chains and Global Geopolitics
The potential emergence of a seabed mining industry has important ramifications for the diversification of critical mineral supply chains, revenues for developing nations with substantial terrestrial mining sectors, and global geopolitics.