-
Europeans install radiation detectors as U.S. question detectors' efficacy
U.S. legislators raise questions about DHS’s $1.4 billion program which aims to deploy nuclear radiation detectors in U.S. ports; GAO raises questions about test methodology of latest technology; Europeans, though forge ahead with port deployment
-
-
How real is the nuclear threat for the United States?
Graham Allison: “Based on current trends, a nuclear terrorist attack on the United States is more likely than not in the decade ahead”
-
-
Acoustic sensors to protect borders, critical infrastructure
Two British companies offer an intriguing border, perimeter, and critical infrastructure protection solution: Sensors, using optical time domain reflectometry (OTDR), continuously monitor the length of existing or installed cable to detect, locate, and categorize security breaches every 10 meters over a 40 km length of optical fiber
-
-
How to pay for greater chemical plant safety
Critics point to the price tag of the chemical plant safety measure as a reason why it should not be imposed on the chemical industry; they are wrong: Meaningful safety standards should be imposed on chemical plants, but since it is a public good, the taxpayers — not the industry alone — should shoulder the cost
-
-
Boeing successfully tests TSAT
As worries about China’s growing anti-satellite warfare capabilities grow, Boeing and partner companies successfully test a system for encrypted communication with satellites
-
-
Uncertainties about nuclear waste storage
The waste created in the production of U.S. nuclear weapons is buried in Hanford, Washington; there is a growing uncertainty about the subsurface paths nuclear contaminants take, where they travel, and how fast
-
-
Top Internet security risks of 2007 revealed today
This year’s SANS Top 20 illuminates two new attack targets that criminals have chosen to exploit and the older targets where attackers have significantly raised the stakes
-
-
Security software may be posing security risks
Security maven Thierry Zoller says that file-parsing bugs in security software could become a big problem: Increasing your use of antivirus software only increases the chances that you could be successfully attacked
-
-
Talk of nuclear power renaissance not matched by action
The rising price of oil and growing concerns about the environment have fueled the notion that nuclear power will soon enjoy a renaissance; new study shows that facts on the ground tell a different story
-
-
Pay attention to the human element in IT security
As far as information security is concerned, even the world’s best technological solution cannot replace a piece of paper –- the company security policy
-
-
Organizational security: Alion takes stock and offer remedies
Organizations which take their security seriously want to evaluate continuously their security situation and security policies; often they also must see that they are in compliance with government security mandates; serious organizations should take a look at Alion’s CounterMeasures
-
-
Canada's increasingly worried about Arctic vulnerabilities
The Arctic has immense oil reserves and mineral wealth, but Canada has been slow to protect its northern sovereignty; this becomes even more important as receding Arctic ice makes Canada’s northern frontier more accessible to uninvited guests
-
-
China, India to drive global energy growth
If current energy consumption trends continue, global energy consumption could increase well over 50 percent by 2030; global carbon dioxide emissions from energy use would increase by 57 percent
-
-
2007 Maritime Security Expo: Security challenges, business opportunities
The U.S. maritime transportation system — ports, ships, warehouses, access roads — is vast and sprawling; securing this system offers many opportunities for security-related businesses for two reasons: It is essential to the welfare and national security of the United States, and many of its nodes are vulnerable to attack and disruption
-
-
Corporate e-mail authentication battle royal: IP-based vs. signature-based
There are two categorical approaches to corporate e-mail security: Path- or IP-based focuses on where the message originated and evaluates the network path traversed by the e-mail; cryptographic methods look at who sent the message
-
More headlines
The long view
Water Wars: A Historic Agreement Between Mexico and US Is Ramping Up Border Tension
By Natasha Lindstaedt
As climate change drives rising temperatures and changes in rainfall, Mexico and the US are in the middle of a conflict over water, putting an additional strain on their relationship. Partly due to constant droughts, Mexico has struggled to maintain its water deliveries for much of the last 25 years, deliveries to which it is obligated by a 1944 water-sharing agreement between the two countries.
Trump Is Fast-Tracking New Coal Mines — Even When They Don’t Make Economic Sense
By Katie Myers
In Appalachian Tennessee, mines shut down and couldn’t pay their debts. Now a new one is opening under the guise of an “energy emergency.”
Smaller Nuclear Reactors Spark Renewed Interest in a Once-Shunned Energy Source
By David Montgomery
In the past two years, half the states have taken action to promote nuclear power, from creating nuclear task forces to integrating nuclear into long-term energy plans.
Keeping the Lights on with Nuclear Waste: Radiochemistry Transforms Nuclear Waste into Strategic Materials
By John Domol
How UNLV radiochemistry is pioneering the future of energy in the Southwest by salvaging strategic materials from nuclear dumps –and making it safe.
Model Predicts Long-Term Effects of Nuclear Waste on Underground Disposal Systems
By Zach Winn
The simulations matched results from an underground lab experiment in Switzerland, suggesting modeling could be used to validate the safety of nuclear disposal sites.