• L-3 receives $35 million contract for Talon

    The growth of the mobile work-force and Internet-based communication has increased the need for securing sensitive data and communications; L-3 offers a solution the government finds useful

  • Dayton positions itself as a sensor center

    Ohio’s Third Frontier Commission awards $28 million for the development of a sensor technology research center; business partners include Woolpert, General Dynamics, UES, YSI, and L-3 Communications Cincinnati Electronics

  • RemoteReality receives $7.3 million in VC funding

    Battelle Ventures and Chart Venture partners pick up the tab; company a DoD favorite for its 360-degree video analytics technology; USS Cole and USS Greenville incidents drive demand for on-board surveillance and monitoring

  • Netcentrics teams with L3 to secure Army HQ's computers

    Virginia company deploys a enterprise-wide common cryptographic log-in using common access cards; effort part of the Information Management Center project

  • Otto Hoernig launches new sensor networking firm

    Hoernig previously sold SpaceLink International for $150 million; Trace Systems, based in Virginai, will pursue business with DHS and DoD; market for wireless sensors to reach $1 billion by 2009

  • EU launches infrastructure protection package

    An EU commission fashions what it calls “horizontal framework” which will offer better and more effective campaign to protect of EU critical infrastructures such as transport and communications

  • AIG buys DPW’s port management contracts

    Earlier in the year a firestorm broke out when it was disclosed that the Bush administration had approved a deal in which a UAE-based company would acquire the management of major U.S. seaports from a U.K-based company; after a month of heated debate, major portions of the deal were restructured to minimize DPW’s access to more sensitive areas at the ports; now, AIG has acquired DPW contracts, and critics of the original deal are happy; DPW is also happy: It was hoping to realize about $700 million on the deal, but sources close to the negotiations say that the final price tag would be “comfortably” above the $1 billion mark

  • Trace Systems eyes growing wireless sensor network market

    The wireless sensor network market is growing by leaps and bounds, and this Virginia-based company wants to be a major player in it

  • Cybercrooks use "KGB-style" recruitment tactics

    Phishers and hackers are infiltrating university clubs; greed a prime motivator for students; liberal arts majors trained to become sleeper cells

  • Sandia develops an imporved sensor network

    The future — well, a part of it at least — belongs to sensor networks; rsearchers at Sandia Natioal Lab have developed the unattended ground sensor (UGS), and system whcih combines off-the-shelf components with in-house developed elements to create a better andre useful network; investors and manufacturers may want to make the lab an offer for the technology

  • DHS inspector general turns up the heat

    Arrest and conviction rates for post-Katrina contracting fraud are skryrocketing, even as total complaints decrease; impressive new zealousness strikes fear into the unethical, but the lawyers are happy; DHS has more than 2,500 open cases pending

  • IBM gives Cook County a boost with cruiser-linked infrastructure surveillance

    Cameras from Panasonic and Pelco are wirelessly connected to in-car screens and DVRs; Project Shield aims to protect 126 sites at a cost of only $900,000

  • Research shows early detection of earthquake magnitude possible

    Italian researchers find string correlation between strength of primary wave and the damage resulting from the secondary wave; basic math now permits 10-15 seconds warning time for those near the epicenter; early warning could trigger emergency response mechanisms

  • Los Alamos looks to create self-disabling nuclear warheads

    Under a secret three year program, scientists have been working on methods to automatically destroy a warhead if it is stolen or tampered with; though details are secret, method might involve an acid that destroys the mechanisms and contaminates the radiactive core

  • White papers sought to describe the human factor in cyber-insecurity

    Cyber Security Knowledge Tranfer Network offers £50,000 to winning “human factors working group”; understanding how phishers and hackers exploit psychology a critical endeavor; winning applicants will devise a method that raises awareness, has little cost, and builds demand for cybersecurity products