-
Urgent action needed to bolster cybersecurity for critical infrastructure
There has never been a more crucial time to examine cybersecurity for critical infrastructure, most of which is privately owned. According to MIT experts, over the last twenty-five years, presidents from both parties have paid lip service to the topic while doing little about it, leading to a series of short-term fixes they liken to a losing game of “Whac-a-Mole.” This scattershot approach, they say, endangers national security. A new report warns of hacking risk to electric grid, oil pipelines, and other critical infrastructure. “The nation will require a coordinated, multi-year effort to address deep strategic weaknesses in the architecture of critical systems, in how those systems are operated, and in the devices that connect to them,” the authors write. “But we must begin now. Our goal is action, both immediate and long-term.”
-
-
Android apps can conspire to mine information from your smartphone
Mobile phones have increasingly become the repository for the details that drive our everyday lives. But researchers have recently discovered that the same apps we regularly use on our phones to organize lunch dates, make convenient online purchases, and communicate the most intimate details of our existence have secretly been colluding to mine our information.
-
-
Google’s AI tool for video searching can be easily deceived
Researchers have shown that Google’s new tool that uses machine learning to automatically analyze and label video content can be deceived by inserting a photograph periodically and at a very low rate into videos. After they inserted an image of a car into a video about animals, for instance, the system returned results suggesting the video was about an Audi.
-
-
Rising flood insurance costs a growing burden to communities, NYC homeowners
Flood insurance is already difficult to afford for many homeowners in New York City, and the situation will only worsen as flood maps are revised to reflect current risk and if the federal government continues to move toward risk-based rates, according to a new study.of-its-kind study by the RAND Corporation.
-
-
House kills web privacy protections; ISPs free to collect, sell customers’ information
The House of Representative on Tuesday voted 215 to 205 kill the privacy rules, formulated by the FCC, which were aimed at preventing internet service providers (ISPs) from selling their customers’ web browsing histories and app usage to advertisers. Without these protections, Comcast, Verizon, AT&T, and other ISPs will have complete freedom to collect information about their customers’ browsing and app-usage behavior, then sell this information to advertisers.
-
-
Repealing FCC’s privacy rules: A serious blow to privacy, cybersecurity
In the end, the cybersecurity implications of repealing the FCC’s privacy rules come from simple logic. If the privacy rules are repealed, Internet providers will resume and accelerate these dangerous practices with the aim of monetizing their customers’ browsing history and app usage. But in order to do that, Internet providers will need to record and store even more sensitive data on their customers, which will become a target for hackers. Internet providers will also be incentivized to break their customers’ security, so they can see all the valuable encrypted data their customers send. And when Internet providers break their customers’ security, you can be sure malicious hackers will be right on their heels. The net result is simple: repealing the FCC’s privacy rules won’t just be a disaster for Americans’ privacy. It will be a disaster for America’s cybersecurity, too.
-
-
Aging U.S. scientific workforce raises concerns
The science and engineering workforce in the United States is aging rapidly, according to a new study. And it is only going to get older in coming years. Economists found that the average age of employed scientists increased from 45.1 to 48.6 between 1993 and 2010, faster than the workforce as a whole. The study estimates that, all else being the same, the average age of U.S. scientists will increase by another 2.3 years in the near future.
-
-
Under climate change, farming is becoming riskier
Climate change will have an impact on agriculture, but a new study puts these changes in terms which are directly applicable to farmers. For Illinois, for example, the corn planting window will be split in two to avoid wet conditions in April and May. Each planting window carries increased risk – the early planting window could be thwarted by frost or heavy precipitation, and the late window cut short by intense late-summer drought. Farmers and crop insurers must evaluate risk to avoid losing profits.
-
-
New brain-inspired cybersecurity system detects “bad apples” 100 times faster
Cybersecurity is critical — for national security, corporations and private individuals. Sophisticated cybersecurity systems excel at finding “bad apples” in computer networks, but they lack the computing power to identify the threats directly. These limits make it easy for new species of “bad apples” to evade modern cybersecurity systems. And security analysts must sort the real dangers from false alarms. The Neuromorphic Cyber Microscope, designed by Lewis Rhodes Labs in partnership with Sandia National Laboratories, directly addresses this limitation. Due to its brain-inspired design, it can look for the complex patterns that indicate specific “bad apples,” all while using less electricity than a standard 60-watt light bulb.
-
-
Evaluating critical mineral-resource potential in Alaska
A new method for evaluating the resource potential for large, underexplored regions for critical minerals in Alaska is now available online. Critical minerals are used in products that are vital to national security, technology, and also play an integral role in our everyday modern life.
-
-
The challenge of sustainable mineral supply
An international team of researchers says global resource governance and sharing of geoscience data is needed to address challenges facing future mineral supply. Specifically of concern are a range of technology minerals, which are an essential ingredient in everything from laptops and cell phones to hybrid or electric cars to solar panels and copper wiring for homes. However, base metals like copper are also a matter of immense concern.
-
-
House, Senate committees approve agroterrorism bill
The U.S. House of Representatives Homeland Security Committee and U.S. Senate Homeland Security and Governmental Affairs Committee passed the Securing our Agriculture and Food Act, clearing a key hurdle for the bill’s consideration by the full House and Senate. The Securing our Agriculture and Food Act requires the Secretary of Homeland Security (DHS), through the Assistant Secretary for Health Affairs, to lead the government’s efforts to secure the U.S. food, agriculture, and veterinary systems against terrorism and high-risk events.
-
-
YouTube users beware: Your viewing habits can be tracked
Despite YouTube’s attempts to safeguard user anonymity, intelligence agencies, hackers, and online advertising companies can still determine which videos a user is watching. Researchers developed an algorithm to determine if someone had watched a specific video from a set of suspicious, terror-related videos. Intelligence agencies could access this technology for tracking terrorists or other suspicious individuals. Internet marketing companies could track the number and make-up of viewers watching an ad.
-
-
Vibrator maker to pay out $3 million for tracking users' sexual activity
We-Vibe, the sex toy maker, has agreed to pay customers up to $7,600 each selling them a “smart vibrator” which tracked the customers’ sexual habits without their knowledge. A class-action lawsuit was filed against in an Illinois federal court against We-Vibe’s parent company, Standard Innovation. Standard Innovation has been ordered to pay a total of $3 million to owners of the vibrator who had also used the app associated with the vibrators (the tracking of customers was done by the app).
-
-
Making mobile transactions more secure with a quantum key system
With the growing popularity of mobile phone apps to pay for purchases at cash registers and gas pumps, users would like to know their personal financial information is safe from cyber-attacks. For the first time, researchers have demonstrated a prototype device that can send unbreakable secret keys from a handheld device to a terminal. If integrated into a cell phone, for example, the device could allow secure links to near-field communications mobile payment systems and indoor Wi-Fi networks. It also could improve the security of ATMs and help prevent ATM skimming attacks, which are estimated to cost the industry more than $2 billion annually.
-
More headlines
The long view
Need for National Information Clearinghouse for Cybercrime Data, Categorization of Cybercrimes: Report
There is an acute need for the U.S. to address its lack of overall governance and coordination of cybercrime statistics. A new report recommends that relevant federal agencies create or designate a national information clearinghouse to draw information from multiple sources of cybercrime data and establish connections to assist in criminal investigations.
Trying to “Bring Back” Manufacturing Jobs Is a Fool’s Errand
Advocates of recent populist policies like to focus on the supposed demise of manufacturing that occurred after the 1970s, but that focus is misleading. The populists’ bleak economic narrative ignores the truth that the service sector has always been a major driver of America’s success, for decades, even more so than manufacturing. Trying to “bring back” manufacturing jobs, through harmful tariffs or other industrial policies, is destined to end badly for Americans. It makes about as much sense as trying to “bring back” all those farm jobs we had before the 1870s.
The Potential Impact of Seabed Mining on Critical Mineral Supply Chains and Global Geopolitics
The potential emergence of a seabed mining industry has important ramifications for the diversification of critical mineral supply chains, revenues for developing nations with substantial terrestrial mining sectors, and global geopolitics.