-
Sodium cyanide stored at explosion site pollutes city’s water
The Chinese government says that 114 people, most of them firefighters, have been killed and ninety-five still missing after first responders were sent to the Tianjin chemical plant to fight large fires which broke out after a powerful explosion at the plant last Wednesday. Chinese officials say they found 700 tons of sodium cyanide at two locations at the site. Chinese public health officials said on Monday that the health risks of last week’s explosion are spreading, reporting that alarming levels of sodium cyanide have been found at wastewater monitoring stations in and around the city of Tianjin.
-
-
DHS S&T licenses innovative communication technology to commercial partners
DHS Science and Technology Directorate (S&T) last week announced that it has licensed the Radio Internet-Protocol Communications Module (RIC-M) to two commercial partners. RIC-M, used by local, state, and federal responders, is a low-cost, external, stand-alone, interface device that connects radio frequency (RF) system base stations, consoles and other RF equipment — regardless of brand — over the Internet or Private Internet Protocol (IP) network.
-
-
Agroterrorism a serious risk to Americans, U.S. economy: Experts
The word “terrorism” is typically associated with bomb and bullets, but security experts say that there are other types of terrorism which may bring death and disruption, chief among them is agroterrorism. Agroterrorism is the use of animal or plant pathogens to disrupt a nation’s food supply, or use the food supply to spread deadly disease.In 2004, Tommy Thompson, then secretary of Health and Human Services, said that, “For the life of me, I cannot understand why the terrorists have not attacked our food supply, because it is so easy to do.”
-
-
New analysis method discovers eleven security flaws in popular Internet browsers
Georgia Tech researchers developed a new cyber security analysis method which discovered eleven previously unknown Internet browser security flaws, and were honored with the Internet Defense Prize, an award offered by Facebook in partnership with USENIX, at the 24th USENIX Security Symposium. Their research explores vulnerabilities in C++ programs (such as Chrome and Firefox) which result from “bad casting” or “type confusion.” Bad casting enables an attacker to corrupt the memory in a browser so that it follows a malicious logic instead of proper instructions.
-
-
Worries about megaquake benefit preparedness, retrofitting businesses in Pacific Northwest
The sale of emergency preparedness kits has been booming in the Northwest of the United States, as more press stories have highlighted the growing confidence of scientists that the Pacific Northwest is overdue for a megaquake. Stores that sell a few preparedness kits a month, and which typically cater to survivalists, see a dramatic increase in business, as do businesses which retrofit houses to make them more quake-resilient.
-
-
Bill requiring Internet companies to report “terrorist activity” opposed by digital rights groups
A coalition of digital rights groups and trade associations last week released a joint letter opposing a proposal in the Senate to require U.S. tech firms to police the speech of their users and to report any signs of apparent “terrorist activity” to law enforcement. The letter says that this sweeping mandate covers an undefined category of activities and communications and would likely lead to significant over-reporting by communication service providers. The letter urged senators to remove the “terrorist activity” reporting requirements from the Intelligence Authorization Act (S. 1705).
-
-
Windows 10 is not really free: you are paying for it with your privacy
Windows 10, it seems, is proving a hit with both the public and the technology press after its release last week. After two days, it had been installed on sixty-seven million PCs. For those concerned about privacy, it is the very fact that the upgrade is free that has them concerned that Microsoft has adopted a new, “freemium” model for making money from its operating system. Microsoft is employing a unique “advertising ID” that is assigned to a user when Windows 10 is installed. This is used to target personalized ads at the user. There are steps users can take to mitigate the worst of the privacy issues with Windows 10, and these are highly recommended. Microsoft should have allowed users to pay a regular fee for the product in exchange for a guarantee of the levels of privacy its users deserve.
-
-
U.K. needs more “constructive” thinking on migrant welfare benefits
As the British political debate continues on whether the British government should try to impose a four-year ban on EU migrant citizens claiming in-work benefits, a new Oxford University study argues that rather than pursuing treaty change, more constructive thinking could ease the financial burden on British taxpayers. The study author says one solution could be to set up an EU fund for helping local authorities most affected by immigration. He also highlights the relatively lax access to NHS services that EU citizens enjoy in Britain compared with other EU member states.
-
-
DHS asks judge to cancel contempt hearing over immigration executive order
When President Barack Obama last year issued his Deferred Action for Childhood Arrivals (DACA) executive order, applicants covered by the order received a three-year work permit, or EADs (Employment Authorization Documents). On 16 February 2015, Brownsville, Texas-based U.S. District Judge Andrew Hanen temporarily blocked Obama’s immigration action. After the temporary injunction was in place, the federal government mistakenly issued the approximately 2,500 three-year permits. On Friday, DHS secretary Jeh Johnson asked Judge Hanen not to find him and other Obama administration officials in contempt, telling the judge that DHS had recovered all but 22 of the 2,500 offending permits. Johnson also advised the judge that DHS had corrected federal computer databases to invalidate those permits not turned over by their owners.
-
-
N.Y. village pays ransom to regain access to hacker-encrypted files
The village Ilion in central New York paid ransom twice last year — $300 and $500 — to have access to its computers two official-looking e-mails planted malware throughout the village’s computer system. The New York State comptroller’s office has audited 100 municipal computer systems the past three years, and said the experience of Ilion should serve as a warning to others municipalities of the growing cyberthreat – especially attempts by hackers to infiltrate computer systems to make them inaccessible unless ransom is paid.
-
-
Community-based flood insurance offers benefits, faces challenges
Community-based flood insurance — a single insurance policy that in theory would cover an entire community — may create new opportunities to reduce flood losses and enhance the likelihood of communities paying more attention to flood risk mitigation, says a new National Academies report. This option for providing flood insurance, however, would not provide the sole solution for all of the nation’s flood insurance challenges.
-
-
North Wales wants to be “one of the most secure places in the world to do business”
Glyndŵr University is to play a leading role in the fight against cybercrime. The Wrexham, Wales-based university hosted the first meeting of the North Wales Cyber Security Cluster on Thursday (23 July). The institution and North Wales Police saw experts in online security and e-crime join the forum, and also invited members of the public and business owners who have been targeted in the past to attend and share information and advice, in a bid, the organizers say, “to make North Wales one of the most secure places in the world to do business.”
-
-
Initiative launched to expose those who fund, profit from wars in Africa
Oscar-winner actor George Clooney, in an effort to tackle corruption in war zones, on Monday launched an initiative to identify and help bring to justice individuals funding and profiting from Africa’s deadliest conflicts. Clooney and U.S. human rights activist John Prendergast launched the project, called The Sentry, which will investigate money flowing in and out of conflict zones, and pass on the information to policymakers to take action.
-
-
SRI International working to develop screening device for radiation exposure
radiation that may lead to severe health consequences post-exposure. To rapidly triage large numbers of people to determine who needs immediate treatment, a new, simple screening test is needed. Currently, if a person has absorbed a significant dose of ionizing radiation, there is nothing that can be done beyond waiting to see what symptoms develop, which roughly correlate with exposure level. SRI International has been awarded a $12.2 million contract to continue development of a diagnostic test for absorbed doses of radiation following a radiological incident.
-
-
DHS S&T licenses third cybersecurity innovation for commercialization
The Department of Homeland Security (DHS) Science and Technology Directorate (S&T) yesterday announced that another cybersecurity technology has been licensed for commercialization. This is S&T’s third technology that has successfully gone through the Transition to Practice (TTP) program and into the commercial market. The Network Mapping System (NeMS), developed by Lawrence Livermore National Laboratory, is a software-based tool that tells users what is connected to their network so that they know what needs to be protected.
-
More headlines
The long view
Economic Cyberespionage: A Persistent and Invisible Threat
Economic cyber-espionage, state-sponsored theft of sensitive business information via cyber means for commercial gain, is an invisible yet persistent threat to national economies.
Nuclear Has Changed. Will the U.S. Change with It?
Fueled by artificial intelligence, cloud service providers, and ambitious new climate regulations, U.S. demand for carbon-free electricity is on the rise. In response, analysts and lawmakers are taking a fresh look at a controversial energy source: nuclear power.
Calls Grow for U.S. to Counter Chinese Control, Influence in Western Ports
Experts say Washington should consider buying back some ports, offer incentives to allies to decouple from China.
Exploring the New Nuclear Energy Landscape
In the last few years, the U.S. has seen a resurgence of interest in nuclear energy and its potential for helping meet the nation’s growing demands for clean electricity and energy security. Meanwhile, nuclear energy technologies themselves have advanced, opening up new possibilities for their use.