• Developing data-driven solutions for faster, more secure border

    Unisys Corporation and CSIRO’s Data61 today announced a collaboration to develop an advanced data analytics solution for automated security risk assessment of travelers and cargo at air, land and sea borders. Under the collaboration, Unisys will fund joint research with Data61 to develop an advanced data analytics solution capable of detecting potential border security risks posed by travelers, visa applicants, cargo and parcels.

  • Harsh U.S. weather in March expected to cost insurers more than $2 billion

    An extremely active period for severe weather persisted in the United States throughout March, as four separate significant outbreaks led to extensive damage in central and eastern parts of the country. The most prolific outbreak from 6 to 10 March resulted in major damage from tornadoes, large hail, and straight-line winds in the Plains, Midwest, and Southeast. Total economic losses for this event alone were estimated at $1.7 billion, while public and private insurance claims were listed at $1.2 billion. The aggregated cost to the insurance industry from the four events was expected to exceed $2.0 billion.

  • Urgent action needed to bolster cybersecurity for critical infrastructure

    There has never been a more crucial time to examine cybersecurity for critical infrastructure, most of which is privately owned. According to MIT experts, over the last twenty-five years, presidents from both parties have paid lip service to the topic while doing little about it, leading to a series of short-term fixes they liken to a losing game of “Whac-a-Mole.” This scattershot approach, they say, endangers national security. A new report warns of hacking risk to electric grid, oil pipelines, and other critical infrastructure. “The nation will require a coordinated, multi-year effort to address deep strategic weaknesses in the architecture of critical systems, in how those systems are operated, and in the devices that connect to them,” the authors write. “But we must begin now. Our goal is action, both immediate and long-term.”

  • Android apps can conspire to mine information from your smartphone

    Mobile phones have increasingly become the repository for the details that drive our everyday lives. But researchers have recently discovered that the same apps we regularly use on our phones to organize lunch dates, make convenient online purchases, and communicate the most intimate details of our existence have secretly been colluding to mine our information.

  • Google’s AI tool for video searching can be easily deceived

    Researchers have shown that Google’s new tool that uses machine learning to automatically analyze and label video content can be deceived by inserting a photograph periodically and at a very low rate into videos. After they inserted an image of a car into a video about animals, for instance, the system returned results suggesting the video was about an Audi.

  • Rising flood insurance costs a growing burden to communities, NYC homeowners

    Flood insurance is already difficult to afford for many homeowners in New York City, and the situation will only worsen as flood maps are revised to reflect current risk and if the federal government continues to move toward risk-based rates, according to a new study.of-its-kind study by the RAND Corporation.

  • House kills web privacy protections; ISPs free to collect, sell customers’ information

    The House of Representative on Tuesday voted 215 to 205 kill the privacy rules, formulated by the FCC, which were aimed at preventing internet service providers (ISPs) from selling their customers’ web browsing histories and app usage to advertisers. Without these protections, Comcast, Verizon, AT&T, and other ISPs will have complete freedom to collect information about their customers’ browsing and app-usage behavior, then sell this information to advertisers.

  • Repealing FCC’s privacy rules: A serious blow to privacy, cybersecurity

    In the end, the cybersecurity implications of repealing the FCC’s privacy rules come from simple logic. If the privacy rules are repealed, Internet providers will resume and accelerate these dangerous practices with the aim of monetizing their customers’ browsing history and app usage. But in order to do that, Internet providers will need to record and store even more sensitive data on their customers, which will become a target for hackers. Internet providers will also be incentivized to break their customers’ security, so they can see all the valuable encrypted data their customers send. And when Internet providers break their customers’ security, you can be sure malicious hackers will be right on their heels. The net result is simple: repealing the FCC’s privacy rules won’t just be a disaster for Americans’ privacy. It will be a disaster for America’s cybersecurity, too.

  • Aging U.S. scientific workforce raises concerns

    The science and engineering workforce in the United States is aging rapidly, according to a new study. And it is only going to get older in coming years. Economists found that the average age of employed scientists increased from 45.1 to 48.6 between 1993 and 2010, faster than the workforce as a whole. The study estimates that, all else being the same, the average age of U.S. scientists will increase by another 2.3 years in the near future.

  • Under climate change, farming is becoming riskier

    Climate change will have an impact on agriculture, but a new study puts these changes in terms which are directly applicable to farmers. For Illinois, for example, the corn planting window will be split in two to avoid wet conditions in April and May. Each planting window carries increased risk – the early planting window could be thwarted by frost or heavy precipitation, and the late window cut short by intense late-summer drought. Farmers and crop insurers must evaluate risk to avoid losing profits.

  • New brain-inspired cybersecurity system detects “bad apples” 100 times faster

    Cybersecurity is critical — for national security, corporations and private individuals. Sophisticated cybersecurity systems excel at finding “bad apples” in computer networks, but they lack the computing power to identify the threats directly. These limits make it easy for new species of “bad apples” to evade modern cybersecurity systems. And security analysts must sort the real dangers from false alarms. The Neuromorphic Cyber Microscope, designed by Lewis Rhodes Labs in partnership with Sandia National Laboratories, directly addresses this limitation. Due to its brain-inspired design, it can look for the complex patterns that indicate specific “bad apples,” all while using less electricity than a standard 60-watt light bulb.

  • Evaluating critical mineral-resource potential in Alaska

    A new method for evaluating the resource potential for large, underexplored regions for critical minerals in Alaska is now available online. Critical minerals are used in products that are vital to national security, technology, and also play an integral role in our everyday modern life.

  • The challenge of sustainable mineral supply

    An international team of researchers says global resource governance and sharing of geoscience data is needed to address challenges facing future mineral supply. Specifically of concern are a range of technology minerals, which are an essential ingredient in everything from laptops and cell phones to hybrid or electric cars to solar panels and copper wiring for homes. However, base metals like copper are also a matter of immense concern.

  • House, Senate committees approve agroterrorism bill

    The U.S. House of Representatives Homeland Security Committee and U.S. Senate Homeland Security and Governmental Affairs Committee passed the Securing our Agriculture and Food Act, clearing a key hurdle for the bill’s consideration by the full House and Senate. The Securing our Agriculture and Food Act requires the Secretary of Homeland Security (DHS), through the Assistant Secretary for Health Affairs, to lead the government’s efforts to secure the U.S. food, agriculture, and veterinary systems against terrorism and high-risk events.

  • YouTube users beware: Your viewing habits can be tracked

    Despite YouTube’s attempts to safeguard user anonymity, intelligence agencies, hackers, and online advertising companies can still determine which videos a user is watching. Researchers developed an algorithm to determine if someone had watched a specific video from a set of suspicious, terror-related videos. Intelligence agencies could access this technology for tracking terrorists or other suspicious individuals. Internet marketing companies could track the number and make-up of viewers watching an ad.