-
Defeating detector blinding attacks on quantum cryptography
Quantum cryptography is a method to distribute digital encryption keys across an optical fiber; the protocol has been proven to be perfectly secure from eavesdropping; any differences between the theoretical protocol and its real-world implementation, however, can be exploited to compromise the security of specific systems; one form of attack on quantum cryptography is called a detector blinding attack — but Toshiba researchers show how such attacks can be rendered ineffective
-
-
Versatile terahertz technology could help aircraft to land
Terahertz scanners detect a type of high-frequency electromagnetic radiation emitted by anything with temperatures higher than around 10 kelvin; it can penetrate dry, non-metallic materials such as clothing or sand, but is absorbed by water and metal; terahertz thus makes for very accurate airport scanners — but the technology can also be used to help aircraft land in poor visibility or power high-bandwidth communication systems
-
-
Advanced UAVs help war on terrorism -- and companies' bottom line
Ever-more sophisticated UAVs giving U.S. better eyes, ears, and even noses; new sensors enable flying drones to listen in on cell phone conversations and pinpoint the location of the caller on the ground; some can even “smell” the air and sniff out chemical plumes emanating from a potential underground nuclear laboratory; these advances mean a growing and potentially huge business for the defense industry: the drone electronics industry now generates about $3 billion in revenue, but this is expected to double to $6 billion in the next eight years
-
-
Game-changing rifle arrives in Afghanistan
A new smart rifle can be programmed so that its 25-mm. ammunition does not explode on impact; instead, it can be set to detonate either in front of or behind a target, meaning it literally will go through a wall before it explodes and kills the enemy; the Army says that enemy soldier can run, but they can no longer hide
-
-
Behavior-based solution keeps airports secure, passengers' privacy intact
Israeli company WeCU says its behavior-based security solution addresses many of the problems now encountered at U.S. airports; the WeCU concept exploits human characteristics and behavior: when a person intends to carry out a particular activity or has a significant acquaintance or involvement with a subject, he carries with him information and feelings that are associated with the activity or the subject; the WeCU system identifies this associative connection by actively exposing the person being screened to stimuli targeted at a specific threat, followed by detection of the person’s physiological reaction, or response, to the stimuli through nonintrusive biometric sensors; the system detects the individual’s reaction without his or her knowledge and without requiring their cooperation, and without interfering with routine activities
-
-
Salmat offers voice biometrics to mid-market
A 2009 Identity Verification Study conducted by callcenters.net highlighted that the most preferred method of verifying identity among consumers was biometric voice identification; Aussie company Salmat has launched a suite of speech recognition and voice biometric solutions designed specifically for mid-market companies
-
-
Suprema to provides palm-print scanners to Poland, Lithuania
Korean company Suprema win contracts to equip the Polish and Lithuanian police forces with palm-print live scanners; the contracts are part of EU-funded effort to upgrade the two countries’ criminal identification methods so these methods could be integrated with the European Union’s Schengen Visa Information System (VIS) project
-
-
ManTech to buy MTCSC Inc.
Acquisition strengthens ManTech’s C4ISR systems integration and cyber capabilities, and access to new U.S. Marine Corps intelligence customers
-
-
New anti-cybercrime software emulates DNA matching process
The biologically inspired software digitally mimics the DNA matching process used in the real world. The software tracks the sequence of events that follow a hacker’s first access request into a secure network system and creates a “digital fingerprint”
-
-
Militants kidnap 7 from Nigerian Exxon platform
After the 9/11 attacks, Bin Laden boasted that he used an operation which cost al Qaeda $500,000 to finance to inflict a $500 billion damage on the U.S. economy; this was not a mere boast: experts say it was an indication that econo-jihad was an integral part of al Qaeda’s strategy to weaken and defeat the West; the recent BP disaster offered an example of one tactics terrorists may pursue in order to inflict serious economic and environmental damage on the United States and other countries: attack off-shore oil rigs: these rigs are utterly vulnerable to attack, and the damage such an attack can do is considerable; in Nigeria, a militant organization is already attacking oil rigs — if, for now, only to kidnap rig workers in order to blackmail their employers for money and political concessions; the ease with which such attacks are carried out should give all of us a pause
-
-
New biometric system harder to fool than other approaches
Each of us has a unique pattern of eye movements; an Israeli company developed a new biometric security system which exploits this for a simple, hard-to-fool approach; the system tracks the way a person’s eye moves as he watches an icon roam around a computer screen; the way the icon moves can be different every time, but the user’s eye movements include “kinetic features” — slight variations in trajectory — which are unique, making it possible to identify him
-
-
U.S. Internet hosts are essential for criminal botnets
Cybercrime is often associated with Russia and China, and rightly so — but many of the servers vital to their activities are located elsewhere; facilities provided by Internet companies in the United States and Europe are crucial to these criminal gangs’ activities
-
-
Shippers campaign against full screening of cargo on planes
The TSA decided that starting last August, it would mandate the screening of all cargo on passenger planes loaded in the United States; it said its rule would not apply to cargo placed on U.S.-bound passenger flights overseas, or to cargo-only flights; the Obama administration announced new cargo rules Monday banning freight out of Yemen and Somalia; it also restricted the shipment of printer and toner cartridges weighing more than a pound on all passenger flights and some cargo flights; the overall cargo security rules were unchanged
-
-
Cybersecurity standard published to protect global critical infrastructure
With industrial networks being increasingly connected to the hostile IT world, and the frequency and sophistication of malware growing exponentially, industrial stakeholders must act today to protect their critical systems; the International Instrument Users Association (WIB) releases comprehensive cybersecurity standard to protect critical industrial computers;
-
-
The time for cybersecurity contracting is now
It is not just a fad: cybersecurity represented the largest request for funds in last year’s intelligence budget; it is an area for expansion government contractors cannot afford to pass up
-