-
L-3 receives $35 million contract for Talon
The growth of the mobile work-force and Internet-based communication has increased the need for securing sensitive data and communications; L-3 offers a solution the government finds useful
-
-
Dayton positions itself as a sensor center
Ohio’s Third Frontier Commission awards $28 million for the development of a sensor technology research center; business partners include Woolpert, General Dynamics, UES, YSI, and L-3 Communications Cincinnati Electronics
-
-
RemoteReality receives $7.3 million in VC funding
Battelle Ventures and Chart Venture partners pick up the tab; company a DoD favorite for its 360-degree video analytics technology; USS Cole and USS Greenville incidents drive demand for on-board surveillance and monitoring
-
-
Netcentrics teams with L3 to secure Army HQ's computers
Virginia company deploys a enterprise-wide common cryptographic log-in using common access cards; effort part of the Information Management Center project
-
-
Otto Hoernig launches new sensor networking firm
Hoernig previously sold SpaceLink International for $150 million; Trace Systems, based in Virginai, will pursue business with DHS and DoD; market for wireless sensors to reach $1 billion by 2009
-
-
EU launches infrastructure protection package
An EU commission fashions what it calls “horizontal framework” which will offer better and more effective campaign to protect of EU critical infrastructures such as transport and communications
-
-
AIG buys DPW’s port management contracts
Earlier in the year a firestorm broke out when it was disclosed that the Bush administration had approved a deal in which a UAE-based company would acquire the management of major U.S. seaports from a U.K-based company; after a month of heated debate, major portions of the deal were restructured to minimize DPW’s access to more sensitive areas at the ports; now, AIG has acquired DPW contracts, and critics of the original deal are happy; DPW is also happy: It was hoping to realize about $700 million on the deal, but sources close to the negotiations say that the final price tag would be “comfortably” above the $1 billion mark
-
-
Trace Systems eyes growing wireless sensor network market
The wireless sensor network market is growing by leaps and bounds, and this Virginia-based company wants to be a major player in it
-
-
Cybercrooks use "KGB-style" recruitment tactics
Phishers and hackers are infiltrating university clubs; greed a prime motivator for students; liberal arts majors trained to become sleeper cells
-
-
Sandia develops an imporved sensor network
The future — well, a part of it at least — belongs to sensor networks; rsearchers at Sandia Natioal Lab have developed the unattended ground sensor (UGS), and system whcih combines off-the-shelf components with in-house developed elements to create a better andre useful network; investors and manufacturers may want to make the lab an offer for the technology
-
-
DHS inspector general turns up the heat
Arrest and conviction rates for post-Katrina contracting fraud are skryrocketing, even as total complaints decrease; impressive new zealousness strikes fear into the unethical, but the lawyers are happy; DHS has more than 2,500 open cases pending
-
-
IBM gives Cook County a boost with cruiser-linked infrastructure surveillance
Cameras from Panasonic and Pelco are wirelessly connected to in-car screens and DVRs; Project Shield aims to protect 126 sites at a cost of only $900,000
-
-
Research shows early detection of earthquake magnitude possible
Italian researchers find string correlation between strength of primary wave and the damage resulting from the secondary wave; basic math now permits 10-15 seconds warning time for those near the epicenter; early warning could trigger emergency response mechanisms
-
-
Los Alamos looks to create self-disabling nuclear warheads
Under a secret three year program, scientists have been working on methods to automatically destroy a warhead if it is stolen or tampered with; though details are secret, method might involve an acid that destroys the mechanisms and contaminates the radiactive core
-
-
White papers sought to describe the human factor in cyber-insecurity
Cyber Security Knowledge Tranfer Network offers £50,000 to winning “human factors working group”; understanding how phishers and hackers exploit psychology a critical endeavor; winning applicants will devise a method that raises awareness, has little cost, and builds demand for cybersecurity products
-
More headlines
The long view
Hacking the Grid: How Digital Sabotage Turns Infrastructure into a Weapon
The darkness that swept over the Venezuelan capital in the predawn hours of Jan. 3, 2026, signaled a profound shift in the nature of modern conflict: the convergence of physical and cyber warfare. The blackout was the result of a precise and invisible manipulation of the industrial control systems that manage the flow of electricity. This synchronization of traditional military action with advanced cyber warfare represents a new chapter in international conflict, one where lines of computer code that manipulate critical infrastructure are among the most potent weapons.
Entity Resolution: The Security Technology You Probably Haven’t Heard Of
The concept “entity resolution” (ER) is probably unfamiliar, but it underpins much of the world’s security—in telecommunications, banking and national security.
West Coast Levee Failures Show Growing Risks from America’s Aging Flood Defenses
Across the U.S., levees are getting older while weather is getting more extreme. Many of these structures were never designed for the enormous responsibility they now carry.
Mexico and U.S. Look for New Deal in Long-Running Battle Over 80-year Old Water Treaty
Mexico and the US’s growing dispute over water rights further complicates an already strained relationship that must tackle existing challenges related to drug trafficking, security, migration and trade wars. Water is just the latest issue to rise to the top of the tension table.
