-
Banks' PIN codes susceptible to hackers' theft
Network of PIN codes’ thieves nets millions of dollars; hackers are targeting the ATM system’s infrastructure, which is increasingly built on Microsoft’s Windows operating system and allows machines to be remotely diagnosed and repaired over the Internet
-
-
U.K. critical infrastructure vulnerable
New report says last summer’s flood showed infrastructure’s vulnerability; funding for flood defenses was not sufficient or secure, undermining industry confidence, and there were not enough skilled engineers to deliver the protection from flooding needed
-
-
New Indian Point siren system scores high in full test
Test of new alarm siren system in the four counties surrounding the Indian Point nuclear plants in New York produce good grades
-
-
Is flooding really as big a risk to Britain now as terrorism?
In 2007 the U.K. saw disastrous summer flooding in Yorkshire and the Severn valley around Gloucester and Tewkesbury. These floods caused the largest peacetime emergency in Britain since the Second World War
-
-
Intelligent binoculars
Northrop Grumman develops binoculars which connects to scalp electrodes in the soldiers’ helmets; the electrodes record how soldiers’ brains react to various objects as they look through the goggles, then train the binoculars in what constitutes a threat
-
-
Air passnegers now must show an ID to be allowed on board
Until this past weekend, a passenger who agreed to secondary search of his or her body and baggage at airport check-points was allowed to board even if they did not have — or refused to show — an ID; this policy was changed on Saturday
-
-
First conviction under the Economic Espionage Act of 1996
Chinese-born software engineer sentenced for stealing industrial and military secrets on behalf of the PRC; first conviction under a 1996 law for misappropriating a trade secret with the intent to benefit a foreign government
-
-
China in campaign to impriove coastal water, inland waterways security
China has a long coast and many rivers and canals; there are about 200,000 boats and ship plowing these waters, the the Chinese authorities want them to be able to communicate more effectively with security and law enforcement; U.K. company helps
-
-
New biometric measures: Birth marks, scars, and tatoos
Michigan State researcher develops a system that could allow police to identify individuals by matching marks on their body with those stored in a computer database
-
-
Good results in tests for BioNeutral's anti-anthrax technology
New Jersey company uses its Ygiene formulation to kill anthrax spores on contact; formulation killed all anthrax spores exposed to the formulation in as little fifteen seconds
-
-
Shipment of restricted technology to India brings 35-month sentence
A South Carolina businessmen is sentenced the three years in prison for smuggling restricted technology to India; technology used in India’s space and ballistic-missile programs
-
-
Lower Mississippi River region braces for major flood
Floodwaters are projected to crest at St. Louis at 38 feet on 22 or 23 June, marking the eleventh time since the Civil War that St. Louis has reached that flood stage; during the flood of 1993 waters at St. Louis crested at 49.6 feet
-
-
Assessing landslide risk
Researchers develop new technique for assessing areas most at risk from landslides
-
-
Midwest floods threaten IT infrastructure
More than 100 blocks in the Cedar Falls’s downtown are underwater and 3,900 homes have been evacuated; companies must cope with the threat of rising water to IT infrastructure
-
-
Flood protection call for utilities
Twelve months after the devastating U.K. floods a government agency says much more must be done to tackle the vulnerability of buildings such as power stations and hospitals to flooding
-
More headlines
The long view
How DHS Laid the Groundwork for More Intelligence Abuse
I&A, the lead intelligence unit of the Department of Homeland Security (DHS) —long plagued by politicized targeting, permissive rules, and a toxic culture —has undergone a transformation over the last two years. Spencer Reynolds writes that this effort falls short. “Ultimately, Congress must rein in I&A,” he adds.
Southport Attacks: Why the U.K. Needs a Unified Approach to All Violent Attacks on the Public
The conviction of Axel Rudakubana for the murder of three young girls in Southport has prompted many questions about how the UK handles violence without a clear ideological motive. This case has also shown up the confusion in this area, and made clear the need for a basic reframing of how we understand murderous violence against the public today.
Strengthening School Violence Prevention
Violence by K-12 students is disturbingly common. Ensuring that schools have effective ways to identify and prevent such incidents is becoming increasingly important. Expanding intervention options and supporting K-12 school efforts in Behavioral Threat Assessment and Management (BTAM) would help.
Memory-Holing Jan. 6: What Happens When You Try to Make History Vanish?
The Trump administration’s decision to delete a DOJ database of cases against Capitol riot defendants places those who seek to preserve the historical record in direct opposition to their own government.
Evidence-Based Solutions to Protect Against Mass Attacks
Mass attacks like the New Year’s Day incident in New Orleans stir public emotion and have tragic consequences. While the investigations into this case will take time, we know from our work that there are things law enforcement and the public can do to mitigate and perhaps stop mass casualty events.
Trump’s Cuts to Federal Wildfire Crews Could Have “Scary” Consequences
President Donald Trump’s moves to slash the federal workforce have gutted the ranks of wildland firefighters and support personnel, fire professionals warn, leaving communities to face deadly consequences when big blazes arrive this summer. States, tribes and fire chiefs are preparing for a fire season with minimal federal support.