-
Northrop Grumman opens new cybersecurity center
Northrop opens its Cyber Security Operations Center (CSOC) in suburban Maryland; the center will monitor the company’s more than 105,000 clients and 10,000 servers worldwide; more than 1.5 billion daily cyber events that occur on the Northrop Grumman network
-
-
Dayton's new UAV center receives initial funding
UAVs are becoming more and more ubiquitous in military and homeland security missions; Dayton, Ohio — a neighbor to Wright-Patterson Air Force base — wants to capitalize on the UAV trend, and it opens a new UAV technology center
-
-
Biometrics tunnel helps identify individuals' unique walking patterns
The University of Southampton’s biometric tunnel provides the technology to analyze the way people walk as a unique identifier; university researchers have developed a technology which captures the unique walking patterns, and then characterizes and records them to a database
-
-
Defcon, Black Hat to open this week
Leading cybersecurity events to open in Las Vegas this week; if you prefer security shows at which the speakers favor black T-shirts and dyed hair over suits and ties, and where goth-attired groupies and script kiddies hunkered over laptops line the hallways at all hours of the night, you should attend
-
-
Vcom3D's iPod translator device is a valuable tool for U.S. soldiers
Florida-based Vcom3D developed software which was used in conjunction with Apple’s iPod to teach sign language to hearing-impaired students; now, the U.S. military and UN peacekeepers use the device as an instant translator in war-torn regions
-
-
U.K. undecided on UAV purchase
The U.K. Defense Ministry’s Dabinett ISR program has two core elements: One is aimed at better exploiting what is already collected by existing platforms; the other is a “deep and persistent” collection capability-to be addressed by a long-endurance UAV; but which UAV?
-
-
U.S. Senate ends production of F-22 fighter
The contentious debate about whether or not to continue production of Lockheed Martin Corp.’s F-22 fighter jets beyond the 187 now on order has ended: the Senate votes 58-40 for an amendment striking $1.75 billion for seven more F-22s from a defense spending measure
-
-
Concerns over E-Verify effectiveness as illegal immigration detentions drop
The Obama administration has mandated that by 8 September, all contractors who do work with the federal government must use E-Verify to ensure their prospective employees can legally work in the United States; senators say it is too easy to fool the current E-Verify system
-
-
EADS wins large Saudi border protection deal
EADS’s win of the massive Saudi border fencing contract, valued at $2.3-2.8 billion, is part of the defense contractors effort to use homeland security projects as a means to bolster its revenues
-
-
The business aspects of get-tough immigration policy
The post-9/11 get-tough policy toward immigration has meant booming business for private prison-management companies; the building of prisons and detention centers is now a much-needed source of income for cash-strapped rural communities
-
-
U.S. halts uranium mining at Grand Canyon
The Interior Department has barred the filing of new mining claims, including for uranium, on 1 million acres near the Grand Canyon
-
-
DARPA awards Cobham $15 million for wireless network
DARPA awards Cobham a contract calling for the company to develop low-cost wireless network nodes which support adaptation by means of distributed network processing
-
-
Google, Microsoft promise new age in cyber-security
Security-conscious consumers are in the habit of regularly updating their antivirus software; this will soon be unnecessary — this, at least, is the promise of both Microsoft and Google; the two companies’ new operating systems will include built-in, continuously updated defenses against viruses and malware
-
-
Trend: Businesses increasingly rely on SAS for security
More and more companies have gravitated toward the idea of “software as a service” (SAS) — using software that is delivered remotely instead of hosted on in-house servers; more and more companies are now offering security products as services — but is it the best approach to security?
-
-
Raytheon wins $155 million wireless contract
DARPA awards Raytheon $155 million to provide a military wireless network interoperable gateway
-
More headlines
The long view
Need for National Information Clearinghouse for Cybercrime Data, Categorization of Cybercrimes: Report
There is an acute need for the U.S. to address its lack of overall governance and coordination of cybercrime statistics. A new report recommends that relevant federal agencies create or designate a national information clearinghouse to draw information from multiple sources of cybercrime data and establish connections to assist in criminal investigations.
Trying to “Bring Back” Manufacturing Jobs Is a Fool’s Errand
Advocates of recent populist policies like to focus on the supposed demise of manufacturing that occurred after the 1970s, but that focus is misleading. The populists’ bleak economic narrative ignores the truth that the service sector has always been a major driver of America’s success, for decades, even more so than manufacturing. Trying to “bring back” manufacturing jobs, through harmful tariffs or other industrial policies, is destined to end badly for Americans. It makes about as much sense as trying to “bring back” all those farm jobs we had before the 1870s.
The Potential Impact of Seabed Mining on Critical Mineral Supply Chains and Global Geopolitics
The potential emergence of a seabed mining industry has important ramifications for the diversification of critical mineral supply chains, revenues for developing nations with substantial terrestrial mining sectors, and global geopolitics.
Are We Ready for a ‘DeepSeek for Bioweapons’?
Anthropic’s Claude 4 is a warning sign: AI that can help build bioweapons is coming, and could be widely available soon. Steven Adler writes that we need to be prepared for the consequences: “like a freely downloadable ‘DeepSeek for bioweapons,’ available across the internet, loadable to the computer of any amateur scientist who wishes to cause mass harm. With Anthropic’s Claude Opus 4 having finally triggered this level of safety risk, the clock is now ticking.”