• Chinese set to buy yet another U.S. taxpayer-backed hi-tech firm

    Lawmakers yesterday expressed their concerns about the likelihood that U.S. taxpayer dollars could end up bolstering the Chinese economy. The lawmakers reacted to reports that a Chinese firm, Zhejiang Geely Holding Group, is leading the list of companies bidding for a majority stake in government-backed Fisker Automotive, and that the only serious rival of that Chinese company is a Chinese auto maker. Fisker’s main battery supplier — U.S. government-backed A123 Systems – has already been acquired by a separate Chinese firm.

  • Countering the threats of fake or substandard medications

    No country acting alone can protect its citizens against the health risks posed by illegitimate medications, and reducing this problem requires international cooperation. A new study calls for global agreement on an international code of practice on drug quality. It also recommends establishing a mandatory drug tracking system and tightening the licensing requirements on medication wholesalers in the United States.

  • U.S. weighing retaliatory measures against China for hacking campaign

    As incontrovertible evidence emerged for the role of Chinese government in initiating and orchestrating the massive, sustained Chinese hacking campaign against U.S. private companies, government agencies, and critical infrastructure assets, the administration has intensified discussions of retaliatory measures the United States may take against China.

  • Keeping an eye on the world’s dangerous chemicals

    In the chemistry labs of the developing world, it is not uncommon to find containers, forgotten on shelves, with only vague clues to their origins. The label, if there is one, is rubbed away. Left alone for years, some chemicals can quietly break down into explosive elixirs, and what was once an innocent experiment by a well-meaning scientist becomes a very real, unsecured threat. Should such chemicals fall into malicious hands, the consequences could be widespread and deadly.

  • Spotting potential targets of nefarious e-mail attacks

    The weakest link in many computer networks is a gullible human. With that in mind, computer science researchers want to figure out how to recognize potential targets of nefarious e-mails and put them on their guard.

  • The sobering reality of water security

    Agriculture is one of the world’s most insatiable consumers of water. Yet, it is facing growing competition for water from cities, industry, and recreation at a time when demand for food is rising, and water is expected to become increasingly scarce.

  • Chinese government orchestrates cyberattacks on U.S.: experts

    For more than a decade now, China has engaged in a sustained, systemic, and comprehensive campaign of cyber attacks against the United States. The Chinese government has enlisted China’s sprawling military and civilian intelligence services, with their armies of cyber-specialists, in a cyber-campaign aiming to achieve three goals: steal Western industrial secrets and give them to Chinese companies, so these companies could compete and weaken their Western rivals; hasten China’s march toward regional, then global, economic hegemony; achieve deep penetration of U.S. critical infrastructure in order to gain the ability to disrupt and manipulate American critical infrastructure – and paralyze it during times of crisis and conflict. A detailed 60-page study, to be released today , offers, for the first time, proof that the most sophisticated Chinese hacker groups, groups conducting the most threatening attacks on the United States, are affiliated with the headquarters of China’s military intelligence lead unit — PLA Unit 61398.

  • Good safety and security culture essential in workplace

    Safety & Security Asia 2013 to be held in Singapore on 7-9 May 2013, will attract 600 exhibitors from thirty countries and more than 10,000 visitors from forty countries. Networking sessions, conferences, and seminars will create a platform for industry professionals to share their experiences and gather more insights on the latest trends in the safety and security arena.

  • US/Canada Border Conference set for 12-13 September

    The US/Canada Border Conference, which will meet in Detroit on 12-13 September, is a comprehensive two-day educational program and exhibition which focuses on implementation of the Beyond the Border. An advisory board will direct the development of the educational program, recruiting a slate of speakers to share their knowledge and experience with those tasked with border security. Board members include former U.S. Customs & Border Protection, U.S. Coast Guard, Royal Canadian Mounted Police, and Canada Border Services Agency, and industry representatives.

  • Infrastructure renewal in regional Australia

    New research in Australia calls for the establishment of a new national organization to tackle the shortfall in infrastructure investment and boost the regions’ capacity to contribute to national economic growth. Expert say the new organization, to be called Local Infrastructure Australia, would be the most effective way of overcoming the backlog in local government infrastructure investment now estimated at between $12 and $15.5 billion.

  • Legislation to require Internet privacy baseline not around the corner

    The European Union has set tough privacy protection laws and is even considering a proposal which would set even stricter requirements on Internet companies, including allowing users to access and delete data collected on them. The United States, however, has very few privacy protection laws. Some argue this is a good thing.

  • Infrastructure sees drop in funding last year

    Infrastructure investments in roads, bridges, and power stations have dropped significantly in 2012 as banks struggled to offer long-term debt and governments targeted cost savings. There were hopes that infrastructure spending would boost the world economy in 2012, but funding fell from $159 billion worldwide in 2011 to $99 billion.

  • Idaho debating nuclear waste storage

    For two decades, the Yucca mountain nuclear waste repository in Nevada was viewed as a long-term solution to the growing problem of radioactive waste generated by the 104 active nuclear power generation plants in the United States. One of the Obama administration’s first acts was to “defund” the project, in effect outing an end to it. States such as Texas, New Mexico, and North Carolina have fashioned their own interim solution to the problem of nuclear waste storage, and the governor of Idaho wants his state to follow these states’ example.

  • Hydroelectric power generation superior to nuclear and coal, beats oil and gas

    Researchers have reviewed the economic, social, and environmental impact of hydro, coal, oil, gas, and nuclear power. Each has its advantages and disadvantages, but of these conventional electricity generation technologies, hydroelectric power appears to be the most sustainable and acceptable environmentally and economically.

  • Old, faulty bores jeopardize Australia's water

    Australian homes, towns, cities, farmers, and miners will rely increasingly on underground water as the country’s population grows, surface water supplies dwindle, and as droughts multiply under a warming climate. Trouble is, the authorities in charge do not have a clear idea exactly how much groundwater there is, how rapidly it is recharged — or how quickly it is being depleted. What is known is based on data largely supplied by 23,000 monitoring bores spread across the continent — more than two thirds of which are now falling into disrepair.