• Beijing to examine water safety daily ahead of Olympics

    As is the case with many other things in China, water is polluted, too; ahead of the Summer Olympic Games, China establishes water monitoring teams to perform round-the-clock checks and maintenance of the water pipelines and ground water systems

  • U.S. to increase Earth observation capabilities

    In 2006 the administration cut the budget for several planned sensors which would have sustained key, long-standing climate measurements; the new Bush budget proposal shows that funding for these sensors has been restored — even enhanced

  • Wind farms "a threat to [U.K.] national security"

    The U.K. has an ambitious plan calling for producing a third of Britain’s energy needs from offshore wind farms; there is a problem, though: The Ministry of Defense says that both onshore and offshore wind turbines create gaps in radar coverage of the coast line, allowing a sneak aerial attack on the country

  • Hamburg’s Deutsche Bahn selects Verint solution

    Verint’s networked video solution aims to enhance security across Germany’s second city’s urban railway network

  • March Networks to acquire Cieffe

    Canadian provider of intelligent IP video acquires innovative designer of award-winning IP video surveillance solutions; acquisition will expand March Networks’ European presence

  • PSA issues Secure America Challenge to candidates

    Top Democrats and Republicans issue bipartisan agenda for next president; Senator Warren Rudman: “Republicans and Democrats can agree that securing global nuclear stockpiles to prevent terrorists from buying or stealing materials for a nuclear weapon is at the top of the agenda”

  • FERC adopts critical infrastructure protection standards

    Federal Energy Regulatory Commission approves eight new mandatory critical infrastructure protection reliability standards; move taken against the backdrop of growing worries in the U.S. intelligence community about attacks on U.S. critical infrastructure

  • EDI to use Xyratex to manage Beijing Airport security

    EDI Technology, a Chinese storage integrator, will use Xyratex F5412E RAID system from Xyratex, a U.K.-based enterprise data storage subsystems and storage process technology provider, for online and archive storage of video surveillance at Beijing Capital International Airport

  • Companies, government responses to war game draw mixed reviews

    Details emerge of a $3 million, invitation-only war game — Cyber Storm —which simulated what DHS described as plausible attacks over five days in February 2006 against the technology industry, transportation lines, and energy utilities by anti-globalization hackers

  • CSX to give Maryland real-time information on hazardous cargo

    Baltimore no longer uses chlorine in their water treatment facilities, yet their citizens are exposed to the toxic substance as trains carrying the hazardous material to facilities elsewhere go through the city; Maryland, rail company reach an agreement on the issue

  • Magal Security Systems receives $45 million in contracts

    Israeli smart-fencing company receives contracts from several U.S. critical infrastructure operators; recent developments along the Gaza-Stip-Egypt border offer Magal new opportunities

  • Mu Security is Technical member of ISA SCI

    ISA Security Compliance Institute aims to promote the integration of disparate security practices — used at critical infrastructure sites, including suppliers to process control customers such as oil refineries, large manufacturing sites, chemical processing sites, and electric power distribution plants — into a single, open framework by establishing the ISASecure designation

  • Israel begins radiation detection at Haifa Port

    More ports join the U.S.-led effort to check for radiological materials; the idea is to have U.S.-bound cargo containers scanned for radiation before they arrive in U.S. ports; the latest port to be added to the list is Haifa, Israel

  • Spam, Q4 Email Threat Trends of 2007

    A steep rise in attacks using social networking techniques which target user psychology and behavior patterns; spammers launched attacks by predicting user behavior patterns, such as looking for easy cash and discounted gifts during the holiday season, and preying on consumer trust to generate interest in cheap pharmaceutical products and stocks

  • IAEA finds South Africa's nuclear facility safe

    On 8 November 2007, the South African nuclear center at Pelindaba was the subject of two mysterious, and simultaneous, attacks; the country’s nuclear monitoring agency, and the IAEA, declare security procedures at the nuclear plant to be satisfactory