-
U.S. worried about China industrial espionage activities during World's Expo
China has been engaged in a vast, well-coordinated, and resourceful espionage campaign against U.S. and European governments and companies; the systematic stealing of Western military, scientific, and industrial secrets aims to help China short-cut its path to global political and economic hegemony; China is employing its military, intelligence services, trade missions abroad, students sent to foreign universities — and Chinese-born citizens who are sent to form espionage sleeper cells; the mammoth World’s Expo, which opened in Shanghai last Friday, offers the Chinese a golden opportunity to steal even more intellectual property on the cheap
-
-
Source of radioactive poisoning in India found; nuclear watchdog seeks explanation
Indian investigators find source of the cobalt-60 which poisoned several scrap-metal facility employees (one of them died last week): Delhi University bought a gamma irradiation machine from Canada in 1970 for use in experiments by chemistry students; the machine, which had not been used since the mid-1980s, was sold at an auction in February; scientists say that although the radioactive substance in the machine had decayed, it was of high intensity
-
-
Maryland's science city development to be approved
Montgomery County, Maryland will build a science city which official say could create a scientific research center that would rival North Carolina’s Research Triangle or Palo Alto, California; the number of jobs in the area west of Interstate 270 could triple to at least 60,000, many of them high-paying; the county council, heeding the concerns of people who live in neighboring communities, voted to reduce the size of the development from as much as 20 million square feet to a maximum of 17.5 million square feet
-
-
Texas A&M scientist tracks origins of bootleg honey from China
The United States has imposed a 500 percent tariff on honey from China two years ago because the Chinese government is subsidizing Chinese honey makers so they can drive U.S. producers out of the market; the practice has almost ruined the market for domestic U.S. honey; China is trying to get around the anti-dumping measure by putting labels such as “Product of Thailand” or “Product of Indonesia” on Chinese honey; a Texas A&M honey specialist stands in their way by doing melissopalynology — the study of pollen in honey
-
-
Large U.S. companies allocate less money to executive security
The money spent on protecting senior executives in crime-ridden countries such as South Africa and Brazil, and in many Central American countries, is increasing every year; in these countries, targeting executives and their families for ransom is now a profitable industry; in the United States, however, the trend is in the other directions - companies pay less and less to protect their executives, evidence that executive-security is one perk corporate boards are scrutinizing more closely
-
-
Gulf of Mexico oil reaches coast; White House calls spill event of "national significance"
Gulf oil spill reaches Louisiana shore; cost of clean up is estimated at $8 billion; DHS secretary Napolitano declares the spill an event of “national significance,” opening the door for increased federal involvement; Louisiana declares state of emergency
-
-
IT group urges government to strengthen industry
TechAmerica says the U.S. federal government needs to update policy, extend tax credits, and invest in cybersecurity to pull the technology industry out of the recession; one thing policy makers should do right away is renew the research and development tax credit, which legislators failed to do during the recession, and then to give it up-to-date-enhancements
-
-
U.K. launches competition to find cyber security experts
The United Kingdom suffers from a dearth of cybersecurity experts; several private and public organizations have launched the Cyber Security Challenge competition — a series of challenges and games that would test the talent and skills of people; the challenges will be built around eight key skill areas which include digital forensics, network analysis and logical thinking
-
-
Northrop Grumman delivers mine detection pods ahead of schedule
Here are words you do not read every day: a government defense contractor delivers what it was contracted for ahead of schedule; this is what Northrop Grumman did, delivering the mine detection system it has developed for the U.S. Navy three weeks ahead of schedule
-
-
Mobile communications helps in business continuity
The essential step for companies to survive disasters: enable people to work from home; instead of using technology to recover from an incident, we are now at the point where we can use it to prevent the incident having much of an effect; the key is to build technology into the company’s operations from the start
-
-
A first: Engineers build giant dome to contain Golf oil spill
Engineers have began to construct a giant dome over a large oil spill in the Gulf of Mexico; the dome would capture or gather the oil and allow it to be pumped out of that dome structure; the dome would be similar to welded steel containment structures called cofferdams used in oil rig construction, but it would be an original design never fabricated or tested before
-
-
Passwords may be passé, but biometrics is not yet viable for portable devices
Passwords may be heading toward extinction, but biometric identification is not yet a viable means of authentication for mobile devices; smart phones and other portable devices do not currently have the sophistication to be adapted easily for biometric technology, and users are likely to be reluctant to carry yet another device and its electrical charger along with their smart phone simply to login to their bank account when not at their desktop computer
-
-
Data protection manager for the cloud
More and more companies begin to offer cloud security solutions; Iron Mountain offers CloudRecovery links into DPM; Seagate’s i365 business has launched the EVault for DPM 2010 backup and recovery appliance
-
-
Drivers can now guide a car using their eyes, not hands
German researchers develop a system which allows drivers to steer their cars using only their eyes: the wheel is turned in the direction the driver is looking; if the driver is distracted, the car begin to drive autonomously; and this, too: drivers may opt to use an iPhone application which lets them to control the car remotely
-
-
Companies ignore cloud security
New study finds that few businesses build security into cloud contracts; in fact, three-quarters of businesses surveyed said they had no procedures and policies for using cloud computing; Sixty-eight percent said end users and business managers — not the organization’s IT professionals — are made responsible for evaluating cloud computing vendors
-
More headlines
The long view
Economic Cyberespionage: A Persistent and Invisible Threat
Economic cyber-espionage, state-sponsored theft of sensitive business information via cyber means for commercial gain, is an invisible yet persistent threat to national economies.
Nuclear Has Changed. Will the U.S. Change with It?
Fueled by artificial intelligence, cloud service providers, and ambitious new climate regulations, U.S. demand for carbon-free electricity is on the rise. In response, analysts and lawmakers are taking a fresh look at a controversial energy source: nuclear power.
Calls Grow for U.S. to Counter Chinese Control, Influence in Western Ports
Experts say Washington should consider buying back some ports, offer incentives to allies to decouple from China.
Exploring the New Nuclear Energy Landscape
In the last few years, the U.S. has seen a resurgence of interest in nuclear energy and its potential for helping meet the nation’s growing demands for clean electricity and energy security. Meanwhile, nuclear energy technologies themselves have advanced, opening up new possibilities for their use.