-
Vulnerabilities in a Popular Security Protocol
A widely used security protocol that dates back to the days of dial-up Internet has vulnerabilities that could expose large numbers of networked devices to an attack and allow an attacker to gain control of traffic on an organization’s network.
-
-
U.S. Capable of Achieving Seafood Independence, New Study Shows
From lobster to haddock and seaweed, seafood plays an important role in the U.S. economy, diet and culture. The nation is one of the top producers of marine and aquatic foods worldwide, but also the second largest seafood importer.
-
-
Why Indonesia Moved Its Capital to a Jungle Hundreds of Miles Away, and more
· Why Indonesia Moved Its Capital to a Jungle Hundreds of Miles Away
The new city, Nusantara, comes as Jakarta continues to sink at a record pace· America’s Failed Approach to Iran Can’t Really Be Called a Strategy
For almost a decade, Washington has had an attitude toward Iran — unrelenting opposition and pressure — but not a strategy· NATO’s Weak Spot Against Russia Facing a Choice to Take Up Arms
The undefended Aland Islands in the Baltic Sea have long been a gap in Europe’s shield. Remilitarization could turn them into one of the West’s key defenses -
-
How the Marshall Fire Sparked a Political Transformation in Colorado
After the fire destroyed his town in 2021, a state rep took on insurance companies, mortgage lenders, and landlords — and beat them all.
-
-
DOJ Sues TikTok and Parent Company ByteDance for Widespread Violations of Children’s Privacy Laws
U.S. law prohibits website operators from knowingly collecting, using, or disclosing personal information from children under the age of 13, unless they provide notice to and obtain consent from those children’s parents.
-
-
Where the Public and Private Sectors Converge
DHS S&T recently hosted its annual Silicon Valley Innovation Program (SVIP) Demo Week, bringing together federal government and startup communities to exhibit new technologies, talk through ideas and identify opportunities for future collaboration.
-
-
White House Summit on Standards for Critical and Emerging Technology
In a White House summit, representatives of government agencies, industry and standards development organizations discussed the U.S. Government National Standards Strategy for Critical and Emerging Technology (USG NSSCET). This strategy promotes technologically sound standards that help American industry compete internationally on a level playing field and is intended to support and complement existing private sector-led standards activities.
-
-
Insights on Valuable Byproduct Minerals
Byproduct minerals are not the main target of the mining operation but are obtained as a result of processing the primary ore. Many critical minerals are byproducts of mining other minerals like copper, gold, and zinc.
-
-
Can Florida’s Orange Growers Survive Another Hurricane Season?
Oranges are synonymous with Florida, but a perfect storm of hurricanes, diseases, and water scarcity threatens to wipe out the state’s famed citrus industry.
-
-
Venezuela: The Rise and Fall of a Petrostate
Venezuela’s ongoing descent into economic and political chaos is a cautionary tale of the dangerous influence that resource wealth can have on developing countries.
-
-
Resourcing the Ramp-Up: NATO and the Challenge of a Coherent Industrial Response to Russia's War in Ukraine
Near the top of the new NATO Secretary-General’s in-tray will be an urgent question: why are efforts to mobilize the alliance’s industrial base and ramp up production still yielding underwhelming results, over two years since Russia’s full-scale invasion of Ukraine?
-
-
The Spotty International Tax Record of Big U.S. Technology Companies
Many big technology firms continue to book large offshore profits in low tax jurisdictions, particularly Ireland and Singapore.
-
-
I Studied ShotSpotter in Chicago and Kansas City – Here’s What People in Detroit and the More Than 167 Other Cities and Towns Using This Technology Should Know
One method Detroit and other cities facing high levels of gun violence have employed is gunshot detection technology, specifically the industry-leading ShotSpotter product, which uses acoustic sensors to notify police when the system hears gunfire. Since 2020, my colleagues and I have conducted the largest study on this technology. Our research was designed to test both the efficiency and effectiveness of this technology.
-
-
Are Mass Layoffs and Data Breaches Connected?
Layoffs create conditions where disgruntled employees face added stress or job insecurity, so they are more likely to engage in risky behaviors that heighten the company’s vulnerability to data breaches.
-
-
New U.S. Arctic Strategy Focused on Russian, Chinese Inroads
The United States is looking to boost intelligence collection in the Arctic and enhance cooperation with allies in the region, to prevent Russia and China from exploiting the cold and icy northern region at America’s expense.
-
More headlines
The long view
Economic Cyberespionage: A Persistent and Invisible Threat
Economic cyber-espionage, state-sponsored theft of sensitive business information via cyber means for commercial gain, is an invisible yet persistent threat to national economies.
Nuclear Has Changed. Will the U.S. Change with It?
Fueled by artificial intelligence, cloud service providers, and ambitious new climate regulations, U.S. demand for carbon-free electricity is on the rise. In response, analysts and lawmakers are taking a fresh look at a controversial energy source: nuclear power.
Calls Grow for U.S. to Counter Chinese Control, Influence in Western Ports
Experts say Washington should consider buying back some ports, offer incentives to allies to decouple from China.
Exploring the New Nuclear Energy Landscape
In the last few years, the U.S. has seen a resurgence of interest in nuclear energy and its potential for helping meet the nation’s growing demands for clean electricity and energy security. Meanwhile, nuclear energy technologies themselves have advanced, opening up new possibilities for their use.