-
U.S. Senate ends production of F-22 fighter
The contentious debate about whether or not to continue production of Lockheed Martin Corp.’s F-22 fighter jets beyond the 187 now on order has ended: the Senate votes 58-40 for an amendment striking $1.75 billion for seven more F-22s from a defense spending measure
-
-
Concerns over E-Verify effectiveness as illegal immigration detentions drop
The Obama administration has mandated that by 8 September, all contractors who do work with the federal government must use E-Verify to ensure their prospective employees can legally work in the United States; senators say it is too easy to fool the current E-Verify system
-
-
EADS wins large Saudi border protection deal
EADS’s win of the massive Saudi border fencing contract, valued at $2.3-2.8 billion, is part of the defense contractors effort to use homeland security projects as a means to bolster its revenues
-
-
The business aspects of get-tough immigration policy
The post-9/11 get-tough policy toward immigration has meant booming business for private prison-management companies; the building of prisons and detention centers is now a much-needed source of income for cash-strapped rural communities
-
-
U.S. halts uranium mining at Grand Canyon
The Interior Department has barred the filing of new mining claims, including for uranium, on 1 million acres near the Grand Canyon
-
-
DARPA awards Cobham $15 million for wireless network
DARPA awards Cobham a contract calling for the company to develop low-cost wireless network nodes which support adaptation by means of distributed network processing
-
-
Google, Microsoft promise new age in cyber-security
Security-conscious consumers are in the habit of regularly updating their antivirus software; this will soon be unnecessary — this, at least, is the promise of both Microsoft and Google; the two companies’ new operating systems will include built-in, continuously updated defenses against viruses and malware
-
-
Trend: Businesses increasingly rely on SAS for security
More and more companies have gravitated toward the idea of “software as a service” (SAS) — using software that is delivered remotely instead of hosted on in-house servers; more and more companies are now offering security products as services — but is it the best approach to security?
-
-
Raytheon wins $155 million wireless contract
DARPA awards Raytheon $155 million to provide a military wireless network interoperable gateway
-
-
Houston computer forensics lab accredited
Newly accredited Houston lab expands Regional Computer Forensics Laboratory Network (RCFL), a national network of sixteen FBI-sponsored digital forensics laboratories and training centers devoted entirely to the scientific examination of digital evidence in support of criminal investigations
-
-
Investment in R&D sees thriving biometric markets
With security remaining a top priority at all levels of U.S. government, the biometrics market is seeing market stability and returns on their investments in R&D
-
-
Officials complain about northern border policy
Five-hundred government officials, policy experts, and business leaders from the United States and Canada gather to discuss the impact of security measures along the U.S.-Canada border on commerce; their conclusion: What is good for the U.S.-Mexico border may be unsuitable for the U.S.-Canada border
-
-
GSA adds more cybersecurity software to SmartBuy program
GSA estimates the contracts could be worth $20 million over five years
-
-
Cyber crime bigwigs using big-business tactics
Cisco cybercrime reports says “The novel thing is that [cybercriminals] have taken the Harvard Business School, General Electric board room business training and applied it to their old techniques”
-
-
Local flexibility required to ease border crossing, facilitate commerce
Canada and the United States are the world’s two biggest trading partners — with $596 billion in trade in 2008; new report says that tight U.S.-Canada border rules are bad for business
-
More headlines
The long view
Economic Cyberespionage: A Persistent and Invisible Threat
Economic cyber-espionage, state-sponsored theft of sensitive business information via cyber means for commercial gain, is an invisible yet persistent threat to national economies.
Nuclear Has Changed. Will the U.S. Change with It?
Fueled by artificial intelligence, cloud service providers, and ambitious new climate regulations, U.S. demand for carbon-free electricity is on the rise. In response, analysts and lawmakers are taking a fresh look at a controversial energy source: nuclear power.
Calls Grow for U.S. to Counter Chinese Control, Influence in Western Ports
Experts say Washington should consider buying back some ports, offer incentives to allies to decouple from China.
Exploring the New Nuclear Energy Landscape
In the last few years, the U.S. has seen a resurgence of interest in nuclear energy and its potential for helping meet the nation’s growing demands for clean electricity and energy security. Meanwhile, nuclear energy technologies themselves have advanced, opening up new possibilities for their use.