-
China, India to drive global energy growth
If current energy consumption trends continue, global energy consumption could increase well over 50 percent by 2030; global carbon dioxide emissions from energy use would increase by 57 percent
-
-
2007 Maritime Security Expo: Security challenges, business opportunities
The U.S. maritime transportation system — ports, ships, warehouses, access roads — is vast and sprawling; securing this system offers many opportunities for security-related businesses for two reasons: It is essential to the welfare and national security of the United States, and many of its nodes are vulnerable to attack and disruption
-
-
Corporate e-mail authentication battle royal: IP-based vs. signature-based
There are two categorical approaches to corporate e-mail security: Path- or IP-based focuses on where the message originated and evaluates the network path traversed by the e-mail; cryptographic methods look at who sent the message
-
-
Penn State researchers increase data transmission rate of copper cables
Nittany Lions electrical engineers show it is possible to increase the data transmission of Category-7 copper cables used to connect computers to each other and the Internet
-
-
Chinese espionage "single greatest risk" to U.S. technology sector
China’s disregard of intellectual property law is a matter of record; European governments are increasingly alarmed by Chinese intelligence engaging in massive industrial espionage campaign on behalf of Chinese companies; now, congressional panel warns of dire consequences to U.S. technology sector from sustained, sophisticated Chinese espionage campaign
-
-
U.K. uses new law to force hand-over of encryption keys
In October 2007 Parliament passed a law allowing authorities to force people to hand over encryption keys to data stored on their private computers; an animal rights activist is among first to be ordered to hand over encryption keys for her computer, which was seized in May
-
-
U.S. power grid remains vulnerable
As was the case with the chemical industry, the lobbyists for the utilities have blocked meaningful reform and left the North American power grid exceedingly vulnerable
-
-
More questions than answers in South Africa's nuclear facility attack
What was the purpose of the two coordinated, “military-style” attacks on South Africa’s Pelindaba nuclear facility last week? The answer may lie in the facility’s history: Two decades ago the apartheid regime used it to produce six operational nuclear bombs; were the intruders after bomb-making records, blueprints, and computer files?
-
-
Britain launches broad homeland defense plan
Gordon Brown offers details of new homeland defense initiative, increasing the security budget from £2.5 billion to £3.5 billion by 2011, placing emphasis on protecting venues where crowds gather; budget includes £400 million for fighting radicalization abroad
-
-
Major conference on illicit nuclear trafficking to open next week
The IAEA next week will hold a major conference on illegal possession and illicit trafficking of nuclear materials; in 1995 the IAEA established the Illicit Trafficking Database; to date, it has received reports on approximately 1,250 incidents
-
-
Teenager drills a hole in ammonia pipeline, forcing evacuation
Three teenagers believed money was hidden in 6-inch-diameter ammonia pipeline, so they drilled a hole in it; cloud of amonia forces evacuation, road closure
-
-
DOE completes final environmental impact study of FutureGen
Project for cleanest coal power plant in the world clears another hurdle; FutureGen, a 275-megawatt power plant, will begin construction in 2009 and go on line in 2012; cost will be shared: $620 million by DOE, $250 million by coal mining and power industry companies
-
-
White House plans to weaken CFIUS security review powers
DHS, Justice, the Pentagon, and the U.S. intelligence community oppose the merger of 3Com and Huawei Technology, arguing it will bolster Chinese military computer network attack operations; the White House plans to issue presidential order which would undermine the law designed to tighten security review of foreign companies, thus allowing the merger to go through
-
-
North Korea argues it had no plan to enrich uranium for weapons
Another potential embarrassment for U.S. intelligence: North Korea says it will prove that it never had the plans or the means to enrich uranium for nuclear weapons
-
-
FLIR expanding Gulf presence
FLIR’s sensor technology, used in border protection and perimeter defense, among other applications, has won the company several hefty contracts in the Gulf region; company eager to build on its success
-