• Senate panels to discuss high-risk chemical facilities

    This is an important week in chemical facilities security legislation, as two Senate panels are set to hold hearings on how the Environmental Protection Agency (EPA) and DHS can most effectively monitor the security measures taken by U.S. chemical facilities:

  • Breakthrough: UCLA engineering devises new location-based cryptography method

    Location-based security is ensured by using quantum mechanics; this type of cryptography could be useful in several settings — for example, one could communicate with a military base with a guarantee that only someone physically present at the base will have access to the information; furthermore, the location-based method eliminates the need for distributing and storing keys, one of the most difficult tasks in cryptography

  • Flawed predictions of coal, CO2 production lead to flawed climate models, says research

    Most current climate change models assume unlimited coal and fossil fuel production for the next 100 years; one expert says this is an unrealistic premise which skews climate change models and proposed solutions; since widely accepted studies predict coal production will peak and decline after 2011, the expert says that climate change predictions should be revised to account for this inevitable peak and decline

  • Penn State Harrisburg hosts homeland security summer camp for kids

    Penn State Harrisburg has launched several degree and training program in homeland security, using program a $1 million federal grant from the Office of the Director of National Intelligence; the latest addition to its roster of programs: a summer camp in homeland security and intelligence for kids from Pennsylvania

  • Black Hat opens Wednesday in Las Vegas, DefCon to follow Friday

    Black Hat, one of the more important cybersecurity event, opens this Wednesday in Las Vegas; Black Hat gives way on Friday to DefCon, “Black Hat is a place where security researchers go to show off their work and get peer feedback,” said Jeff Moss, who founded and runs both gatherings; “DefCon is the fun stuff they don’t have time to do in their day jobs”; DefCon’s array of activities includes a lock picking village and a “capture the flag” contest to see who can break into a computer network and fend off rivals

  • New report: Apple software has the most vulnerabilities

    The usual suspects lead the list of software makers whose software come with most vulnerabilities — Apple, Microsoft, Oracle, and Adobe; new vulnerabilities report offers support to the notion that a high market share correlates with a high number of vulnerabilities

  • Stealth overcoat hides military equipment

    BAE developed “stealth coating” for military vehicles; the coating makes vehicles and equipment in the field much harder to spot not only visually, but also offers vehicles and equipment protection against detection by radar and thermal imaging devices

  • Sending power wirelessly through inches of steel

    Submarines are made of very thick steel; this keeps them safe, but makes communication and data collection from sensors difficult; currently, 300 holes have to be drilled in a submarine hull to accommodate the sensors and communications technology the vessel requires; researchers develop a way to transmit power wirelessly through several inches of steel — which will allow submarines to communicate without an expensive hole-and-valve system; the technology will also be useful for the nuclear and oil industries

  • BP accused of trying to buy the silence of scientists on spill

    BP is accused of trying to buy the silence of leading scientists: the company offering scientists and researchers lucrative contracts to participate in developing restoration plan for the Gulf after the oil spill — but: the scientists are not allowed to publish the research they do for the oil giant; they are also not allowed to speak about the data for at least three years or until the government gives final approval for the company’s restoration plan for the whole of the Gulf; the company would not allow scientists to take total control of the data or the freedom to make those data available to other scientists and subject to peer review; in the case of the University of South Alabama, BP offered to sign up the entire marine sciences department

  • U.S. Air Force's Technology Horizons highlights service's futuristic plans

    U.S. Air Force scientists intend to maintain the service’s superiority in 2020, 2030, and beyond; Technology Horizons, unveiled last week, outlines the Air Force’s major science and technology objectives through the next decade; highly adaptable, autonomous systems that can make intelligent decisions about their battle space capabilities and human-machine brainwave coupling interfaces are but two significant technologies discussed in the document

  • 25,000 new asteroids -- 95 in near Earth orbit -- found by NASA's sky mapping

    NASA’s newest space telescopes has spotted 25,000 never-before-seen asteroids in just six months; 95 of those are considered near Earth objects — which means, in the language of astronomy, that they are within thirty million miles of Earth; the telescope also sighted fifteen new comets and confirmed the existence of twenty brown dwarfs — stellar objects that are bigger than a planet but much smaller than a star; the full celestial catalog of what is out there will not be released to the public until next year after NASA has had time to process the images and flag false alarms

  • Congress to establish a commission to study threat of asteroid impact on Earth

    The annual probability of the Earth being struck by a huge asteroid or comet is small, but the consequences of such a collision are so calamitous that it is prudent to appraise the nature of the threat and prepare to deal with it, experts say; Congress agrees

  • New radiation mechanism may ward off oil spills, terrorism

    New radiation mechanism in the terahertz range could be used to destroy cancer cells, track miniscule traces of explosives hidden under clothing, and trace and potentially destroy specific chemicals that damage the environment and our bodies

  • Endangered antelope interferes with Arizona border security

    Environmental concerns and border security clash along the U.S.-Mexico border; the wild Sonoran Pronghorn numbers are down to about 80 in Arizona and they occupy less than 10 percent of their original range — but what is left of their range straddles the border; environmentalists and government stewards of the environment object to the erection of a fence or watch towers, saying they would drive the antelope-like creature to extinction

  • UTSA's cyber security center moves into new home

    The Institute for Cyber Security Center for Infrastructure Assurance and Security at the University of Texas at San Antonio is moving to a new home on campus; Congress, DHS, and the Defense departments have thrown their money behind UTSA, which the New York Times has named one of the best places to get training as a “cyber sleuth”