-
Uncertainties about nuclear waste storage
The waste created in the production of U.S. nuclear weapons is buried in Hanford, Washington; there is a growing uncertainty about the subsurface paths nuclear contaminants take, where they travel, and how fast
-
-
Top Internet security risks of 2007 revealed today
This year’s SANS Top 20 illuminates two new attack targets that criminals have chosen to exploit and the older targets where attackers have significantly raised the stakes
-
-
Organizational security: Alion takes stock and offer remedies
Organizations which take their security seriously want to evaluate continuously their security situation and security policies; often they also must see that they are in compliance with government security mandates; serious organizations should take a look at Alion’s CounterMeasures
-
-
2007 Maritime Security Expo: Security challenges, business opportunities
The U.S. maritime transportation system — ports, ships, warehouses, access roads — is vast and sprawling; securing this system offers many opportunities for security-related businesses for two reasons: It is essential to the welfare and national security of the United States, and many of its nodes are vulnerable to attack and disruption
-
-
Penn State researchers increase data transmission rate of copper cables
Nittany Lions electrical engineers show it is possible to increase the data transmission of Category-7 copper cables used to connect computers to each other and the Internet
-
-
Chinese espionage "single greatest risk" to U.S. technology sector
China’s disregard of intellectual property law is a matter of record; European governments are increasingly alarmed by Chinese intelligence engaging in massive industrial espionage campaign on behalf of Chinese companies; now, congressional panel warns of dire consequences to U.S. technology sector from sustained, sophisticated Chinese espionage campaign
-
-
U.K. uses new law to force hand-over of encryption keys
In October 2007 Parliament passed a law allowing authorities to force people to hand over encryption keys to data stored on their private computers; an animal rights activist is among first to be ordered to hand over encryption keys for her computer, which was seized in May
-
-
U.S. power grid remains vulnerable
As was the case with the chemical industry, the lobbyists for the utilities have blocked meaningful reform and left the North American power grid exceedingly vulnerable
-
-
More questions than answers in South Africa's nuclear facility attack
What was the purpose of the two coordinated, “military-style” attacks on South Africa’s Pelindaba nuclear facility last week? The answer may lie in the facility’s history: Two decades ago the apartheid regime used it to produce six operational nuclear bombs; were the intruders after bomb-making records, blueprints, and computer files?
-
-
Britain launches broad homeland defense plan
Gordon Brown offers details of new homeland defense initiative, increasing the security budget from £2.5 billion to £3.5 billion by 2011, placing emphasis on protecting venues where crowds gather; budget includes £400 million for fighting radicalization abroad
-
-
Major conference on illicit nuclear trafficking to open next week
The IAEA next week will hold a major conference on illegal possession and illicit trafficking of nuclear materials; in 1995 the IAEA established the Illicit Trafficking Database; to date, it has received reports on approximately 1,250 incidents
-
-
Teenager drills a hole in ammonia pipeline, forcing evacuation
Three teenagers believed money was hidden in 6-inch-diameter ammonia pipeline, so they drilled a hole in it; cloud of amonia forces evacuation, road closure
-
-
White House plans to weaken CFIUS security review powers
DHS, Justice, the Pentagon, and the U.S. intelligence community oppose the merger of 3Com and Huawei Technology, arguing it will bolster Chinese military computer network attack operations; the White House plans to issue presidential order which would undermine the law designed to tighten security review of foreign companies, thus allowing the merger to go through
-
-
North Korea argues it had no plan to enrich uranium for weapons
Another potential embarrassment for U.S. intelligence: North Korea says it will prove that it never had the plans or the means to enrich uranium for nuclear weapons
-
-
FLIR expanding Gulf presence
FLIR’s sensor technology, used in border protection and perimeter defense, among other applications, has won the company several hefty contracts in the Gulf region; company eager to build on its success
-
More headlines
The long view
Creating Buildings That Can Withstand the Most Extreme Stress Loads
Combined ballistic impacts pose a major challenge for engineers who build structures that must withstand extreme stresses. An explosion can hurtle fragments and debris at enormous velocities so they strike the surroundings. Then comes the shock wave. It’s a scary combination.