-
DHS releases FY2009 guidance for $3 billion worth of grants
FEMA requests applications for 14 programs for which it has allocated $3 billion; funded programs concentrate on state and local governments and strengthening community preparedness
-
-
New bridge-inspection software contributes to bridge security
Inspecting a bridge for hairline cracks, flaking concrete, and rust has been a manual process — inspectors have always examined bridges for visible damage directly on site; German researchers develop software which allows digital inspection of bridges and other structures
-
-
Good code, bad computations: A computer security vulnerability
Beware of return-oriented programming — that is, if you want to make sure your computer or server is not tricked into undertaking malicious or undesirable behavior
-
-
Cyberattacks target U.K. national infrastructure
The computer systems of critical businesses in the United Kingdom, such as power companies and large financial institutions, are being repeatedly probed to steal information or uncover weaknesses that could take them down
-
-
Earthquake's trampoline effect
During earthquakes the ground not only shakes from side to side, but also bounces up and down; this has important implications for designing quake-proof structures
-
-
Briefly noted
Australia opens national tsunami warning center… Document requirements announced for visitors to international peace garden… European data breach laws could land in 2011… Aberdeen: Unified threat management can shave IT costs
-
-
Using laptops to detect earthquakes
Laptops have a small accelerometer chip built into them in order to protect the delicate moving parts of the hard disk from sudden jolts; same chip is a pretty good earthquake sensor, too
-
-
Energy companies targeted by Web-borne malware
New report says the energy companies experienced more Web-based malware attacks than any other vertical market in the third quarter of this year, with an increased rate of exposure of 189 percent
-
-
New reactor design lessens risk of weapon proliferation
Nuclear materials for power reactors cannot be stolen by those interested in using it for nuclear weapons while the material is in the reactor — it is too hot to handle; the risks of diversion are during the enrichment process, and while the material is being transported; to lessen the risk, researchers offer innovative reactor design
-
-
Closed Maine suspension bridge used for anti-terror testing
DHS is using a closed Maine bridge for tests on how to fortify bridges against terrorist attacks
-
-
GE shows a chemical sensor that does not need batteries
Researchers develop a chemical sensor that can detect minute quantities of chemicals in the air or water; it has no batters: it receives its power wirelessly from a sensor reader
-
-
Spanish mathematicians model submarine avalanches and tsunamis
Mathematicians develop a new model to explain submarine avalanches and certain types of tsunamis.
-
-
Thales opens European security center
More than 25 percent of Thales’s revenues come from its security systems, which totalled approximately €3.4 billion in 2007; the French giant launches a security research center dedicated to homeland security
-
-
Portable imaging system helps response to natural disasters
Yellow Jackets researchers develop an imaging system which can be affixed to a helicopter to create a detailed picture of an area devastated by a hurricane or other natural disaster
-
-
Better coastal defenses against large waves
Coastal defenses have to withstand great forces and there is always a risk of water overtopping or penetrating these structures; Liverpool University’s mathematician says we need new concepts for coastal defenses
-