-
U.S. old infrastructure offers opportunities for investors
Much of America’s aging infrastructure needs replacing, rebuilding, or rehabilitating; this offers opportunities to infrastructure fund managers, especially in the power-generation sector
-
-
Bridge collapse shows post-WWII engineering aproach to be wrong
Engineers on the Brooklyn Bridge (opened in 1883) did not have sophisticated methods to calculate loads, so they made their best guess — and then multiplied; in the aftermath of WWII engineers believed they could save on materials by accurately predicting traffic pattenrs and loads; Minnesota bridge collapse shows that approach to be wrong
-
-
Politics, profit create conditions hospitable to Internet security disaster
The Internet offers lucrative opportunities for hacking chaos and rampant crime owing to serious computer defense flaws, specialists told cyber security experts from around the world at a major conference in Las Vegas
-
-
Terrorism spread in Mexico
Two weeks ago the EOR guerrillas bombed oil and natural gas pipelines, exhibiting intimate knowledge of the delivery infrastructure and its emergency backup procedure; this week the groups bombed a Sears Robuck store, vowing to continue a campaign against “the interests of the national and foreign oligarchy.”
-
-
New technology allow earlier detection of sturctural vulnerabilities
ASI offers detailed visual simulation solution which would allow building owners, designers, architects, engineers, insurance underwriters, and security experts see what will happen to a structure before a disaster strikes
-
-
Oil tanks on ships to be located inside double hull
IMO’s rule goes into effect Tuesday: It requires oil fuel tanks on ships to be located inside a double hull to help prevent spillages of oil fuel in case of collision, grounding, or terorist act
-
-
Engineers look for causes of bridge collapse
Engineering experts puzzled by catastrophic collapse of Minneapolis bridge; may have been the result of a “prefect storm,” in which several causes combined
-
-
The bumpy road to a better Internet
Would that we had an Internet which would cut online crime, tackle child pornography, halt crippling viruses, and get rid of spam; scientists are working on it, but with less government support than was the case 40 years ago, when the Internet was born
-
-
Zero-day vulnerabilities are the top security concern
Most IT managers say that zero-day vulnerabilities are their main concern; 29 percent of organizations deployed critical updates within two hours during 2007 compared to just 14 percent in 2006
-
-
DHS issues security guidelines for U.S. power infrastructure operators
Growing fears of physical and cyber attacks on U.S. power infrastructure lead DHS to issue detailed protection plans against for industry
-
-
Homeland security legislation to affect water sector
Increasing security of transportation of dangerous chemicals, changing the formula governing the distribution of homeland security grants to states, and other clauses in homeland security bill will affect water sector
-
-
U.K. unveils broad counterterrorism measures
Prime Minister Gordon Brown unvelis broad counter-terrorism measures, including unified border police, electronic exit controls at U.K. borders, biometric visas, better critical infrastructure protection, and more
-
-
New quantum key system combines speed, distance
Detection stage of the NIST prototype quantum key distribution system: Photons are “up-converted” from 1310 to 710 nm by one of the two NIST-designed converters at right, then sent to one of two commercial silicon avalanche photo diode units to the left. Credit: NIST
-
-
Mexican guerrillas who hit oil, gas pipelines had inside knowledge
Cause for worry: Bombers of crude oil and natural gas pipelines in Mexico had detailed knowledge of vulnerable energy installation — and of mitigation procedures, too
-
-
Russia continues go-slow policy on Iran's Bushehr reactor
There are many reasons to criticize Russia, but close examination shows that its behavior on the issue of helping Iran’s nuclear effort has been more responsible and nuanced than surface impressions would allow
-
More headlines
The long view
Hacking the Grid: How Digital Sabotage Turns Infrastructure into a Weapon
The darkness that swept over the Venezuelan capital in the predawn hours of Jan. 3, 2026, signaled a profound shift in the nature of modern conflict: the convergence of physical and cyber warfare. The blackout was the result of a precise and invisible manipulation of the industrial control systems that manage the flow of electricity. This synchronization of traditional military action with advanced cyber warfare represents a new chapter in international conflict, one where lines of computer code that manipulate critical infrastructure are among the most potent weapons.
Entity Resolution: The Security Technology You Probably Haven’t Heard Of
The concept “entity resolution” (ER) is probably unfamiliar, but it underpins much of the world’s security—in telecommunications, banking and national security.
West Coast Levee Failures Show Growing Risks from America’s Aging Flood Defenses
Across the U.S., levees are getting older while weather is getting more extreme. Many of these structures were never designed for the enormous responsibility they now carry.
Mexico and U.S. Look for New Deal in Long-Running Battle Over 80-year Old Water Treaty
Mexico and the US’s growing dispute over water rights further complicates an already strained relationship that must tackle existing challenges related to drug trafficking, security, migration and trade wars. Water is just the latest issue to rise to the top of the tension table.
