-
North Korea argues it had no plan to enrich uranium for weapons
Another potential embarrassment for U.S. intelligence: North Korea says it will prove that it never had the plans or the means to enrich uranium for nuclear weapons
-
-
FLIR expanding Gulf presence
FLIR’s sensor technology, used in border protection and perimeter defense, among other applications, has won the company several hefty contracts in the Gulf region; company eager to build on its success
-
-
New York contests power transmission corridor ruling
In April the Department of Energy designated a large swath of New York State part of a National Interest Electric Transmission Corridor; the state government challenges the designation
-
-
Book shows importance of geospatial technology in homeland security
Geographic information system (GIS) technology proves to be of growing importance in protecting the nation from natural disasters, diseases, and terrorist threats
-
-
More tools for preplanning, premapping emergency response
Emergency preparedness software gives first responders a better view of the rescue scene with new mapping technologies
-
-
Private equity firms focus on India's clean technology sector
Several PE firms allocate investments in India’s clean technology sector from their general funds, but others create India-only funds to focus on the sector even more
-
-
FitzPatrick nuclear power station
Upstate New York nuclear power plant shut down for the third time in two months owing to wind blowing debris into the plant’s water intake
-
-
China's heavy use of coal degrades global environment
Worldwide demand for coal will rise by about 60 percent through 2030 — to 6.9 billion tons a year; China’s voracious appetite is the main culprit; environmental, health costs in China — and around the world — mount
-
-
Phononic computer processes information with heat
In addition to electronic computers and (theoretical) optical computers, we now have heat-based computers; such computers are based on logic gates in which inputs and outputs are represented by different temperatures; in run-of-the-mill electronic computers, inputs and outputs are represented by different voltages
-
-
DHS relaxes chemical plant reporting rules
In April DHS issues a list of 344 hazardous chemicals which businesses would have to track and disclose to the department through an online reporting system; under pressure from several industries, the list is reduced to 300, and reporting threshold of many chemicals of highest security concern raised
-
-
North Korea to dismantle nuclear weapon capability
U.S. nuclear experts today begin supervising the North’s main nuclear complex at Yongbyon
-
-
Green endurance race across Africa
An endurance car race in Africa in January will pit different alternative energy technologies against each other
-
-
Bush administration's nuclear waste reprocessing plan criticized
Reprocessing spent nuclear fuel creates more fuel for nuclear plants, and reduces the need for nuclear waste storage; trouble is, reprocessing also creates weapons-grade plutonium; Bush administration believes there is a new, safer reprocessing method, but a panel of scientists says there is not, and until there is, the U.S. should continue to oppose reprocessing
-
-
IBM will spend $1.5 billion to improve computer security
IBM’s security initiative would double IBM’s security spending; company says its IT security is becoming more difficult because of collaborative business models, sophisticated criminal attacks, and increasingly complex infrastructures
-
-
DARPA-funded UCSD research yields world's most complex phased array
Tritons researchers develop world’s most complex phased array; the 16-element chip is just 3.2 by 2.6 square millimeters, can send at 30-50 GHz
-
More headlines
The long view
Hacking the Grid: How Digital Sabotage Turns Infrastructure into a Weapon
The darkness that swept over the Venezuelan capital in the predawn hours of Jan. 3, 2026, signaled a profound shift in the nature of modern conflict: the convergence of physical and cyber warfare. The blackout was the result of a precise and invisible manipulation of the industrial control systems that manage the flow of electricity. This synchronization of traditional military action with advanced cyber warfare represents a new chapter in international conflict, one where lines of computer code that manipulate critical infrastructure are among the most potent weapons.
Entity Resolution: The Security Technology You Probably Haven’t Heard Of
The concept “entity resolution” (ER) is probably unfamiliar, but it underpins much of the world’s security—in telecommunications, banking and national security.
West Coast Levee Failures Show Growing Risks from America’s Aging Flood Defenses
Across the U.S., levees are getting older while weather is getting more extreme. Many of these structures were never designed for the enormous responsibility they now carry.
Mexico and U.S. Look for New Deal in Long-Running Battle Over 80-year Old Water Treaty
Mexico and the US’s growing dispute over water rights further complicates an already strained relationship that must tackle existing challenges related to drug trafficking, security, migration and trade wars. Water is just the latest issue to rise to the top of the tension table.
