• Airport Screeners allowed to unionize and bargain collectively

    John Pistole, the head of the Transportation Security Administration (TSA), last Friday announced that he would authorize unions to bargain on behalf of the TSA’s 45,000 airport screening officers; unions will be allowed to bargain collectively over specific issues including regulations on vacation time and shift assignments, workplace transfers, and recognition for good work; topics that unions usually bargain for like pay, retirement, benefits, disciplinary standards, job qualification rules, safety equipment and where it is deployed will not be open to negotiation; this unique arrangement is designed to allow DHS the flexibility to quickly reassign screeners, change procedures, and alter equipment in response to a security threat; Pistole hopes that this arrangement will boost employee morale and performance; in surveys on employee morale and job satisfaction, TSA often performs poorly compared to other government agencies

  • DHS reducing reliance on contractors

    The Obama administration has sought to reduce the government’s dependence on contractors that the Bush administration relied upon so heavily during the formation of DHS; DHS has reviewed approximately 100 service contracts to see which should be assigned to an internal department rather than an outside vendor; the contract review project will serve as a template for future evaluations of all the department’s approximately 10,000 service contracts

  • Hackers steal data from oil giants worth millions

    McAfee Inc. recently announced that hackers have stolen data worth millions from five major multinational oil and gas companies; in the attacks, dubbed “Night Dragon,” hackers stole company secrets like bidding contracts, oil exploration data, proprietary industrial processes, and sensitive financial documents; analysts determined that hackers initially began infiltrating company networks in November 2009 using relatively simple methods; the information that the cyber thieves took was “tremendously sensitive and would be worth a huge amount of money to competitors”; the methods of execution and circumstantial evidence implicate China

  • Group calls for biometric component to E-Verify program

    The Security Industry Association (SIA) has called for the incorporation of biometrics into the E-Verify program to prevent fraud and increase accuracy; a recent Government Accountability Office (GAO) report found that the E-Verify system was vulnerable to fraud and identity theft; a recent audit of Chipotle by ICE agents revealed that many employees are using forged documents to work in the United States; SIA recommends using biometrics to bind an individual to their identity documents, requiring biometric authentication of individuals when they apply for employments, and distributing smart cards to individuals that contain their biometric data; in 2009 nearly 8.2 million new employees were identified using the E-Verify system and this number is set to steadily grow as more states mandate employers to use the program for new hires; roughly 1,400 employers are joining the system each week

  • Biometric scans at Aussie bars spark privacy law controversy

    Bars and nightclubs in Australia are implementing more stringent verification procedures by requiring prospective patrons to submit to fingerprint scans, photos, and ID inspections; government officials are concerned with the new trend; Australian Federal Privacy Commissioner says that he lacks the authority to audit the system and that there are no regulations in the industry that govern how the data is collected, stored, used, or shared

  • Biometric wallet keeps your money safe

    Luxury goods maker Dunhill has designed a “virtually indestructible” wallet that uses a biometric fingerprint scanner to deter muggers and pickpockets; the wallet will only open when the owner’s fingerprint is verified using a scanner similar to those currently on many laptops; additional security features include a Bluetooth sensor that can be synced to any Bluetooth enabled mobile device; when the wallet is more than fifteen feet away from the mobile device, it will sound an alarm alerting the owner that the wallet has been taken away

  • Powerful magnets developed to end rare earths dependency

    Scientists at General Electric’s Global Research are currently developing powerful new magnets that are stronger, lighter, and use less rare Earth metals; researchers hope that the new magnets will help reduce U.S. dependence on China’s supplies of rare Earth metals, which have been subject to disruption; the new magnets are being created with nanocomposites which consist of combining tiny particles of various magnetic alloys to create more reactive coatings; GE has received $2.25 million from the Department of Energy to develop these magnets

  • Cell phones are hackers' target of choice

    In its fourth quarter threat report, McAfee announced that hackers have increasingly turned their attention to smart phones; in 2010 there was a 56 percent increase in malware targeting cell phones; hackers most frequently used Adobe products like PDFs and Flash to embed pernicious code; Google’s Android smart phone operating system was also a target of choice; the report noted that spam levels were down 62 percent, while politically motivated hacking was on the rise

  • SkyWatch: surveillance as effective deterrence

    ICx’s SkyWatch mobile surveillance tower help police and businesses keep an eye on crowded areas and public events, helping in deterring car theft and burglary, assault, disturbances, and robbery; ICx points out that the SkyWatch tower is designed with darkened windows so those below cannot tell if an officer is present — so whether or not the police have the ability to man it, the deterrence still works

  • Businesses vying for information, contracts at Border Security Expo 2011

    Law enforcement officers, government officials, and homeland security firms from around the world will gather in Phoenix next week for Border Security Expo 2011; the event will be held on 15-16 February and will feature the heads of major DHS agencies as well as Mexican government officials; organizers estimate that millions of dollars worth of contracts will be signed; the expo will focus on preventing illegal border crossing as well as combating drug trafficking, drug wars, and gangs; firms will have the opportunity to learn of DHS future procurement needs, in particular what DHS will require for SBInet’s replacement; the event attracts buyers from across the United States, Europe, Asia, and Latin America

  • Lack of oversight doomed SBInet, could hamper replacement

    The poor oversight and contractor management that hampered the recently cancelled SBInet could plague its replacement; numerous GAO reports blasted DHS for failing to properly communicate and supervise its primary contractor Boeing; the program suffered major cost overruns and failed to deliver on project goals due to limited input from end users, shifting priorities, and poor communication; in response to criticism, DHS has hired more contracting officers and is reviewing acquisition procedures; critics are skeptical of DHS’ ability to deliver SBInet’s replacement which incorporates much of the same technology

  • DHS and CBP make a pitch to border security vendors

    Boeing’s failure to provide a reliable border security solution has opened up opportunities for border protection technology vendors. These opportunities are offered by DHS’s proposed Integrated Fixed Towers (IFT) acquisition program which aims to replace SBInet

  • Wind energy's dirty secret

    Vast tracts of land have been turned into toxic wastelands to fuel the increasing demand for green energy; rare Earth metals like neodymium are critical components in wind turbines and electric cars, but the process to extract them is damaging to the environment; China, the world’s largest supplier of rare Earth metals, has largely ignored environmental considerations and left Inner Mongolia a widening sea of radioactive waste; the United States is currently ramping up production of rare Earth minerals, but is seeking to find more sustainable production methods; wind power still has fewer environmental repercussions than coal or oil

  • Controversial nuclear reactor design moving toward approval

    A controversial new nuclear reactor design is moving ahead for approval by the U.S. Nuclear Regulatory Commission (NRC); the chairman of the NRC announced that the agency would open the design for public comment before deciding whether to approve the reactor; critics of the proposed reactor, a Westinghouse AP1000, believe that in the event of an accident its safety measures are inadequate; if approved, the reactor could be used in as many as fourteen nuclear power plants

  • Internet IPv4 addresses completely exhausted

    Last week the final blocks of IPv4 addresses were allocated, officially signaling the end of Web space on IPv4 networks; the moment is significant as all new Internet ready devices must now be deployed using IPv6 networks, the upgrade to IPv4; IPv6 offers greater security, higher performance, and can support nearly an infinite number of devices; China is rapidly pushing ahead with IPv6 in the hopes that it can wield more clout over the new Internet space as the United States currently enjoys with IPv4; China has deployed IPv6 capabilities at more than double the rate of the United States