-
Perimeter security: much is yet to be done
Multiple jurisdictions, a large number of stake holders, and lack of extensive and specific mandates from TSA make airport perimeter security a daunting task — a task which many airports are yet to address effectively
-
-
Sweden builds a new Baltic Sea surveillance system
After the mysterious disappearing of a Maltese-flagged cargo ship with a Russian crew in Swedish waters, Sweden decides to deploy a maritime surveillance system which will become operational in October
-
-
Cost versus safety debated at Albany, N.Y. chemical plant location
Greenpeace backs federal proposal for tougher chemical plant safety rules, but an Albany firm — and the chemical industry more generally — fear expense
-
-
The technology: Israeli scientists find way to combat forged DNA
Forensic DNA profiling is today one of the most powerful tools applied on crime scenes, and is often used to convict or acquit suspects in rape and murder cases
-
-
The company: Nucleix fighting biological identity theft
Its assay technology is in advanced stages of development. Several patents have already been granted; CEO Elon Ganor made his name mainly at VocalTec, a company that pioneered telephony over Internet
-
-
Über-hacker Albert "Segvec" Gonzalez's plea scuttled by indictment
Gonzalez’s attorney was close to taking responsibility for his crimes and agreeing to a sentence of about twenty years when hew was indicted on new counts on Monday
-
-
Compressed-air gun stops terrorist boats in their tracks
Compressed air is used on the shoulder-held device to propel a line from a pursuing boat which drags with it a high-tech, high tensile net to disable the target craft’s propulsion system
-
-
Police to use DNA "mugshots" as a predictive tool to narrow search
Scientist say that rather than simply try to match DNA to individuals already in their database, DNA should be used to suggest what a suspect might look like
-
-
A Delaware chemical ID startup earns a state grant
AlphaSense is working on developing a prototype, which will look like a shoebox; the user will put a swab of the material into the box and the device will sense emissions in the terahertz range to identify the chemical compound
-
-
Georgia cat awarded online high school diploma
A Macon, Georgia-based cat won a GED from Jefferson High School Online; all the cat needed to do to earn her sheepskin was answer fourteen questions — but it could nit have been too difficult: each question offers four possible answers, and you have four tries — with hints — to get each of them correct; there is no time limit
-
-
Officials look for a place for Gitmo detainees
Standish Maximum Correctional Facility in Michigan and Fort Leavenworth, Kansas are the two finalists to host the remaining Gitmo prisoners
-
-
Pentagon asks Congress for funds for 30,000 bunker-busting bombs
Intensifying the preparations for an attack on Iran’s nuclear facilities, the Obama administration has asked Congress for funds to accelerate production of a 30,000-pound “ultra-large bunker-buster” bomb designed to destroy deeply buried installations
-
-
International conference on piracy to meet in December
Scheduled to take place 6-9 December in Dubai, the International Quality and Productivity Center says the conference will host a forum and feature case studies to address complex issues surrounding piracy
-
-
Teenager passes grueling "getting on bus" test
A 15-year old Briton was surprised to be awarded “Using Public Transport (Unit 1)” certificate; it turned out he had successfully met the challenge by catching a bus while on a summer outdoor activities scheme at the city of Bury
-
-
The cat did it: man blames cat for child porn downloads
A Florida man who was arrested for possessing child pornography says his cat jumped onto his computer keyboard while he was in another room; according to the man, the cat’s walking back and forth on the keyboard resulted in 1,000 images of child porn being downloaded from the Web and stored on the PC’s hard drive
-
More headlines
The long view
Economic Cyberespionage: A Persistent and Invisible Threat
Economic cyber-espionage, state-sponsored theft of sensitive business information via cyber means for commercial gain, is an invisible yet persistent threat to national economies.
Researchers Calculate Cyberattack Risk for All 50 States
Local governments are common victims of cyberattack, with economic damage often extending to the state and federal levels. Scholars aggregate threats to thousands of county governments to draw conclusions.
How DHS Laid the Groundwork for More Intelligence Abuse
I&A, the lead intelligence unit of the Department of Homeland Security (DHS) —long plagued by politicized targeting, permissive rules, and a toxic culture —has undergone a transformation over the last two years. Spencer Reynolds writes that this effort falls short. “Ultimately, Congress must rein in I&A,” he adds.
Southport Attacks: Why the U.K. Needs a Unified Approach to All Violent Attacks on the Public
The conviction of Axel Rudakubana for the murder of three young girls in Southport has prompted many questions about how the UK handles violence without a clear ideological motive. This case has also shown up the confusion in this area, and made clear the need for a basic reframing of how we understand murderous violence against the public today.
Water Is the Other U.S.-Mexico Border Crisis, and the Supply Crunch Is Getting Worse
The United States and Mexico are aware of the political and economic importance of the border region. But if water scarcity worsens, it could supplant other border priorities. The two countries should recognize that conditions are deteriorating and update the existing cross-border governance regime so that it reflects today’s new water realities.
Sweden’s Deadliest Mass Shooting Highlights Global Reality of Gun Violence, Criminologist Says
“We in the United States don’t have a monopoly on mass shootings,” James Alan Fox says, “though we certainly have more than our share.”