• Wind power’s contribution has been overestimated

    People have often thought that there is no upper bound for wind power — that it is one of the most scalable power sources. After all, gusts and breezes do not seem likely to “run out” on a global scale in the way oil wells might run dry. Yet the latest research in mesoscale atmospheric modeling  suggests that the generating capacity of large-scale wind farms has been overestimated.

  • Scientists warn of sequestration’s impact on basic research

    With less than a week left before sequestration is to take effect, America’s research community has repeated its call for an end to the across-the-board cuts to discretionary spending which will restrict the U.S. ability to invest in the basic scientific research. A coalition of American research and education institutions says that it is this basic research which drives innovation and produces economic growth.

  • Background checks should be required for all firearm transfers: study

    In 2012, there were an estimated 467,321 firearm-related violent crimes in the United States, a 26 percent increase since 2008. There were 11,101 firearm homicides that year, and an estimated 55,544 injuries resulting from gun-related assaults requiring treatment in hospital emergency departments. Individuals who buy firearms from a license dealer must undergo a background check, but 40 percent of U.S. gun transactions are exempt from background checks because they occur between unlicensed private parties, such as people buying and selling at gun shows. That figure doubles, to more than 80 percent, for firearm sales that involve criminal intent.

  • U.S. responds to China’s cyberattacks with anti-theft trade strategy

    The Obama administration yesterday (Wednesday) unveiled the details of a broad strategy to counter the systemic theft by Chinese government agencies of U.S. trade and technology and trade secrets. The administration’s plan calls for new diplomatic push to discourage intellectual property theft abroad and better coordination at home to help U.S. companies protect themselves.

  • Chinese set to buy yet another U.S. taxpayer-backed hi-tech firm

    Lawmakers yesterday expressed their concerns about the likelihood that U.S. taxpayer dollars could end up bolstering the Chinese economy. The lawmakers reacted to reports that a Chinese firm, Zhejiang Geely Holding Group, is leading the list of companies bidding for a majority stake in government-backed Fisker Automotive, and that the only serious rival of that Chinese company is a Chinese auto maker. Fisker’s main battery supplier — U.S. government-backed A123 Systems – has already been acquired by a separate Chinese firm.

  • Countering the threats of fake or substandard medications

    No country acting alone can protect its citizens against the health risks posed by illegitimate medications, and reducing this problem requires international cooperation. A new study calls for global agreement on an international code of practice on drug quality. It also recommends establishing a mandatory drug tracking system and tightening the licensing requirements on medication wholesalers in the United States.

  • U.S. weighing retaliatory measures against China for hacking campaign

    As incontrovertible evidence emerged for the role of Chinese government in initiating and orchestrating the massive, sustained Chinese hacking campaign against U.S. private companies, government agencies, and critical infrastructure assets, the administration has intensified discussions of retaliatory measures the United States may take against China.

  • Keeping an eye on the world’s dangerous chemicals

    In the chemistry labs of the developing world, it is not uncommon to find containers, forgotten on shelves, with only vague clues to their origins. The label, if there is one, is rubbed away. Left alone for years, some chemicals can quietly break down into explosive elixirs, and what was once an innocent experiment by a well-meaning scientist becomes a very real, unsecured threat. Should such chemicals fall into malicious hands, the consequences could be widespread and deadly.

  • Spotting potential targets of nefarious e-mail attacks

    The weakest link in many computer networks is a gullible human. With that in mind, computer science researchers want to figure out how to recognize potential targets of nefarious e-mails and put them on their guard.

  • The sobering reality of water security

    Agriculture is one of the world’s most insatiable consumers of water. Yet, it is facing growing competition for water from cities, industry, and recreation at a time when demand for food is rising, and water is expected to become increasingly scarce.

  • Chinese government orchestrates cyberattacks on U.S.: experts

    For more than a decade now, China has engaged in a sustained, systemic, and comprehensive campaign of cyber attacks against the United States. The Chinese government has enlisted China’s sprawling military and civilian intelligence services, with their armies of cyber-specialists, in a cyber-campaign aiming to achieve three goals: steal Western industrial secrets and give them to Chinese companies, so these companies could compete and weaken their Western rivals; hasten China’s march toward regional, then global, economic hegemony; achieve deep penetration of U.S. critical infrastructure in order to gain the ability to disrupt and manipulate American critical infrastructure – and paralyze it during times of crisis and conflict. A detailed 60-page study, to be released today , offers, for the first time, proof that the most sophisticated Chinese hacker groups, groups conducting the most threatening attacks on the United States, are affiliated with the headquarters of China’s military intelligence lead unit — PLA Unit 61398.

  • Good safety and security culture essential in workplace

    Safety & Security Asia 2013 to be held in Singapore on 7-9 May 2013, will attract 600 exhibitors from thirty countries and more than 10,000 visitors from forty countries. Networking sessions, conferences, and seminars will create a platform for industry professionals to share their experiences and gather more insights on the latest trends in the safety and security arena.

  • US/Canada Border Conference set for 12-13 September

    The US/Canada Border Conference, which will meet in Detroit on 12-13 September, is a comprehensive two-day educational program and exhibition which focuses on implementation of the Beyond the Border. An advisory board will direct the development of the educational program, recruiting a slate of speakers to share their knowledge and experience with those tasked with border security. Board members include former U.S. Customs & Border Protection, U.S. Coast Guard, Royal Canadian Mounted Police, and Canada Border Services Agency, and industry representatives.

  • Infrastructure renewal in regional Australia

    New research in Australia calls for the establishment of a new national organization to tackle the shortfall in infrastructure investment and boost the regions’ capacity to contribute to national economic growth. Expert say the new organization, to be called Local Infrastructure Australia, would be the most effective way of overcoming the backlog in local government infrastructure investment now estimated at between $12 and $15.5 billion.

  • Legislation to require Internet privacy baseline not around the corner

    The European Union has set tough privacy protection laws and is even considering a proposal which would set even stricter requirements on Internet companies, including allowing users to access and delete data collected on them. The United States, however, has very few privacy protection laws. Some argue this is a good thing.