-
TSA expands pilot screening program for pilots
Last week the Transportation Security Administration (TSA) expanded its trial program that allows pilots to skip airport security checkpoint lines to Washington Dulles International Airport; Dulles is the sixth of seven test locations for the “Known Crewmember” program which offers pilots an expedited screening process in the hopes of minimizing wait times for passengers
-
-
Innovative surveillance solutions recognized
MicroObserver Unattended Ground Sensor from Textron Defense Systems was recognized as one of the 2011 Big 25 intelligence, surveillance, and reconnaissance (ISR) products; the solution detects and tracks vehicles and personnel for perimeter defense, border security, force protection, persistent surveillance, and critical infrastructure protection
-
-
Google making search more secure
Google is enhancing its default search service for signed-in users; over the next few weeks, many users will find themselves redirected to https://www.google.com (note the extra “s”) when they are signed in to their Google account; this change encrypts their search queries and Google’s results page
-
-
Iris recognition system deployed at Gatwick Airport
AOptix Technologies and Human Recognition Systems (HRS) announced their integrating of AOptix InSight VM iris recognition system into thirty-four automated e-Gates at the Gatwick Airport South Terminal
-
-
DHS funds Ricin detection
Positive ID announces the company’s immunodetection assay for the identification of Ricin toxin to meet DHS specifications; Ricin, a chemical warfare agent, is derived from the seeds of the castor oil plant Ricinus communis and has become a tool of terrorist groups across the world due to its easy production and high toxicity
-
-
Smartphone can spy on computer keyboard strikes
In hundreds of millions of offices around the world, this routine repeats itself every day: People sit down, turn on their computers, set their mobile phones on their desks, and begin to work; now, what if a hacker could use that phone to track what the person was typing on the keyboard just inches away?
-
-
Greatest cyber vulnerabilities are people, says cybersecurity expert
Dr. Cedric Jeannot, the founder and president of I Think Security, recently sat down with Eugene K. Chow, the executive editor of Homeland Security NewsWire, to discuss the latest rash in cyberattacks on companies, why hackers have been so successful, and the fallout from the RSA SecurID attacks
-
-
Improving critical infrastructure protection
Salt River Project (SRP), the U.S. third-largest public power utility, recently announced that it had teamed with Quantum Secure to help protect its facilities
-
-
Business group: cybersecurity critical to U.S. economic, national security
The Technology CEO Council says that Private sector steps to strengthen the U.S. digital infrastructure combined with new policies and government actions are important to America’s national and economic security
-
-
Collaborative social media site for ID and biometric professionals
Cost overruns, project delays, and poor performance results have long been the bane of government projects, at times resulting in expensive high-profile failures; to help reduce costs and ensure that government projects meet targeted needs, a new collaborative Web-based information-sharing community aimed at bringing together identity and biometric industry professionals, academics, researchers, and government and commercial procurement officers is slated to open
-
-
Army contracting scandal reaches DHS
A $20 million contracting scandal involving the Army Corps of Engineers has now grown to include DHS; last week, Representative Edward J. Markey (D-Massachusetts) expanded the congressional probe to gather information on EyakTek, an Alaskan-native corporation that has received more than $1 billion in set-aside contracts from DHS and the Army
-
-
Danish designer wins completion for new U.K. pylons
There are 88,000 pylons in the United Kingdom, carrying 400,000 volts of electricity over thousands of miles across the country; the design of the pylons has barely changed in eighty years – and a winner has just been announced in the competition for a new pylon design
-
-
Little progress despite $3.4 billion spent on food safety programs
In the past decade the U.S. government has gone to great lengths to secure the nation’s food supply against terrorists, but more than $3.4 billion later it has little to show for its efforts; despite all the government spending, key food safety programs and counter-terror policies have been bogged down by a murky, convoluted bureaucratic process
-
-
Iranian airline sanctioned for ties to terrorism
On Wednesday the U.S. Treasury Department imposed sanctions on sanctioned Mahan Air, an Iranian airline, for supporting terrorism
-
-
Sony hit by hackers again, 93,000 accounts compromised
Once again Sony has been the victim of a major cyberattack. This time as many as 93,000 accounts have been compromised from Sony Entertainment Network, PlayStation Network, and Sony Online Entertainment
-
More headlines
The long view
Economic Cyberespionage: A Persistent and Invisible Threat
Economic cyber-espionage, state-sponsored theft of sensitive business information via cyber means for commercial gain, is an invisible yet persistent threat to national economies.
Nuclear Has Changed. Will the U.S. Change with It?
Fueled by artificial intelligence, cloud service providers, and ambitious new climate regulations, U.S. demand for carbon-free electricity is on the rise. In response, analysts and lawmakers are taking a fresh look at a controversial energy source: nuclear power.
Calls Grow for U.S. to Counter Chinese Control, Influence in Western Ports
Experts say Washington should consider buying back some ports, offer incentives to allies to decouple from China.
Exploring the New Nuclear Energy Landscape
In the last few years, the U.S. has seen a resurgence of interest in nuclear energy and its potential for helping meet the nation’s growing demands for clean electricity and energy security. Meanwhile, nuclear energy technologies themselves have advanced, opening up new possibilities for their use.