-
Hummingbird-sized UAV developed
A bird-sized unmanned aerial vehicle that flaps wings for propulsion and hovering has been developed by the U.S. company AeroVironment; The aircraft has a wingspan of 6.5 inches and has a total flying weight of two-thirds of an ounce, which is less than the weight of a common AA battery
-
-
Industry wants current safety law extended rather than see it toughened
Before the House Homeland Security committee, Timothy J. Scott, the chief security officer of Dow Chemical Co., urged Congress permanently to reauthorize the Chemical Facility Anti-Terrorism Standards (CFATS) bill; under CFATS chemical facilities are required to address a range of critical security concerns including protecting facilities against attacks and preventing the theft of dangerous chemicals; currently, more than 35,000 facilities that use or store chemicals are required to meet CFATS regulations; DHS has worked with facility owners to mitigate risks with custom developed security plans at more than 2,000 “high risk” sites
-
-
Airport Screeners allowed to unionize and bargain collectively
John Pistole, the head of the Transportation Security Administration (TSA), last Friday announced that he would authorize unions to bargain on behalf of the TSA’s 45,000 airport screening officers; unions will be allowed to bargain collectively over specific issues including regulations on vacation time and shift assignments, workplace transfers, and recognition for good work; topics that unions usually bargain for like pay, retirement, benefits, disciplinary standards, job qualification rules, safety equipment and where it is deployed will not be open to negotiation; this unique arrangement is designed to allow DHS the flexibility to quickly reassign screeners, change procedures, and alter equipment in response to a security threat; Pistole hopes that this arrangement will boost employee morale and performance; in surveys on employee morale and job satisfaction, TSA often performs poorly compared to other government agencies
-
-
DHS reducing reliance on contractors
The Obama administration has sought to reduce the government’s dependence on contractors that the Bush administration relied upon so heavily during the formation of DHS; DHS has reviewed approximately 100 service contracts to see which should be assigned to an internal department rather than an outside vendor; the contract review project will serve as a template for future evaluations of all the department’s approximately 10,000 service contracts
-
-
Hackers steal data from oil giants worth millions
McAfee Inc. recently announced that hackers have stolen data worth millions from five major multinational oil and gas companies; in the attacks, dubbed “Night Dragon,” hackers stole company secrets like bidding contracts, oil exploration data, proprietary industrial processes, and sensitive financial documents; analysts determined that hackers initially began infiltrating company networks in November 2009 using relatively simple methods; the information that the cyber thieves took was “tremendously sensitive and would be worth a huge amount of money to competitors”; the methods of execution and circumstantial evidence implicate China
-
-
Group calls for biometric component to E-Verify program
The Security Industry Association (SIA) has called for the incorporation of biometrics into the E-Verify program to prevent fraud and increase accuracy; a recent Government Accountability Office (GAO) report found that the E-Verify system was vulnerable to fraud and identity theft; a recent audit of Chipotle by ICE agents revealed that many employees are using forged documents to work in the United States; SIA recommends using biometrics to bind an individual to their identity documents, requiring biometric authentication of individuals when they apply for employments, and distributing smart cards to individuals that contain their biometric data; in 2009 nearly 8.2 million new employees were identified using the E-Verify system and this number is set to steadily grow as more states mandate employers to use the program for new hires; roughly 1,400 employers are joining the system each week
-
-
Biometric scans at Aussie bars spark privacy law controversy
Bars and nightclubs in Australia are implementing more stringent verification procedures by requiring prospective patrons to submit to fingerprint scans, photos, and ID inspections; government officials are concerned with the new trend; Australian Federal Privacy Commissioner says that he lacks the authority to audit the system and that there are no regulations in the industry that govern how the data is collected, stored, used, or shared
-
-
Biometric wallet keeps your money safe
Luxury goods maker Dunhill has designed a “virtually indestructible” wallet that uses a biometric fingerprint scanner to deter muggers and pickpockets; the wallet will only open when the owner’s fingerprint is verified using a scanner similar to those currently on many laptops; additional security features include a Bluetooth sensor that can be synced to any Bluetooth enabled mobile device; when the wallet is more than fifteen feet away from the mobile device, it will sound an alarm alerting the owner that the wallet has been taken away
-
-
Powerful magnets developed to end rare earths dependency
Scientists at General Electric’s Global Research are currently developing powerful new magnets that are stronger, lighter, and use less rare Earth metals; researchers hope that the new magnets will help reduce U.S. dependence on China’s supplies of rare Earth metals, which have been subject to disruption; the new magnets are being created with nanocomposites which consist of combining tiny particles of various magnetic alloys to create more reactive coatings; GE has received $2.25 million from the Department of Energy to develop these magnets
-
-
Cell phones are hackers' target of choice
In its fourth quarter threat report, McAfee announced that hackers have increasingly turned their attention to smart phones; in 2010 there was a 56 percent increase in malware targeting cell phones; hackers most frequently used Adobe products like PDFs and Flash to embed pernicious code; Google’s Android smart phone operating system was also a target of choice; the report noted that spam levels were down 62 percent, while politically motivated hacking was on the rise
-
-
SkyWatch: surveillance as effective deterrence
ICx’s SkyWatch mobile surveillance tower help police and businesses keep an eye on crowded areas and public events, helping in deterring car theft and burglary, assault, disturbances, and robbery; ICx points out that the SkyWatch tower is designed with darkened windows so those below cannot tell if an officer is present — so whether or not the police have the ability to man it, the deterrence still works
-
-
Businesses vying for information, contracts at Border Security Expo 2011
Law enforcement officers, government officials, and homeland security firms from around the world will gather in Phoenix next week for Border Security Expo 2011; the event will be held on 15-16 February and will feature the heads of major DHS agencies as well as Mexican government officials; organizers estimate that millions of dollars worth of contracts will be signed; the expo will focus on preventing illegal border crossing as well as combating drug trafficking, drug wars, and gangs; firms will have the opportunity to learn of DHS future procurement needs, in particular what DHS will require for SBInet’s replacement; the event attracts buyers from across the United States, Europe, Asia, and Latin America
-
-
Lack of oversight doomed SBInet, could hamper replacement
The poor oversight and contractor management that hampered the recently cancelled SBInet could plague its replacement; numerous GAO reports blasted DHS for failing to properly communicate and supervise its primary contractor Boeing; the program suffered major cost overruns and failed to deliver on project goals due to limited input from end users, shifting priorities, and poor communication; in response to criticism, DHS has hired more contracting officers and is reviewing acquisition procedures; critics are skeptical of DHS’ ability to deliver SBInet’s replacement which incorporates much of the same technology
-
-
DHS and CBP make a pitch to border security vendors
Boeing’s failure to provide a reliable border security solution has opened up opportunities for border protection technology vendors. These opportunities are offered by DHS’s proposed Integrated Fixed Towers (IFT) acquisition program which aims to replace SBInet
-
-
Wind energy's dirty secret
Vast tracts of land have been turned into toxic wastelands to fuel the increasing demand for green energy; rare Earth metals like neodymium are critical components in wind turbines and electric cars, but the process to extract them is damaging to the environment; China, the world’s largest supplier of rare Earth metals, has largely ignored environmental considerations and left Inner Mongolia a widening sea of radioactive waste; the United States is currently ramping up production of rare Earth minerals, but is seeking to find more sustainable production methods; wind power still has fewer environmental repercussions than coal or oil
-
More headlines
The long view
Are We Ready for a ‘DeepSeek for Bioweapons’?
Anthropic’s Claude 4 is a warning sign: AI that can help build bioweapons is coming, and could be widely available soon. Steven Adler writes that we need to be prepared for the consequences: “like a freely downloadable ‘DeepSeek for bioweapons,’ available across the internet, loadable to the computer of any amateur scientist who wishes to cause mass harm. With Anthropic’s Claude Opus 4 having finally triggered this level of safety risk, the clock is now ticking.”
A Brief History of Federal Funding for Basic Science
Biomedical science in the United States is at a crossroads. For 75 years, the federal government has partnered with academic institutions, fueling discoveries that have transformed medicine and saved lives. Recent moves by the Trump administration — including funding cuts and proposed changes to how research support is allocated — now threaten this legacy.
Bookshelf: Preserving the U.S. Technological Republic
The United States since its founding has always been a technological republic, one whose place in the world has been made possible and advanced by its capacity for innovation. But our present advantage cannot be taken for granted.
Critical Minerals Don’t Belong in Landfills – Microwave Tech Offers a Cleaner Way to Reclaim Them from E-waste
E-waste recycling focuses on retrieving steel, copper, aluminum, but ignores tiny specks of critical materials. Once technology becomes available to recover these tiny but valuable specks of critical materials quickly and affordably, the U.S. can transform domestic recycling and take a big step toward solving its shortage of critical materials.
Microbes That Extract Rare Earth Elements Also Can Capture Carbon
A small but mighty microbe can safely extract the rare earth and other critical elements for building everything from satellites to solar panels – and it has another superpower: capturing carbon dioxide.