-
22 -- Testof Africa and Water codes functionality
Three members of a right-wing militia have been sentenced to twelve years in prison for conspiring to use weapons of mass destruction in attacks against federal government agencies. The defendants planned to attack critical infrastructure in Georgia while motivating militia groups in other states to rise up and join them in removing government officials who they believed had exceeded their Constitutional power. The militia members planned on starting a revolution against the federal government by conducting an attack aimed at the infrastructure supporting the TSA, DHS, and FEMA.
-
-
Water15 -- Test of the Water code functionality
Europe is searching for a solution to its worst refugee crisis since the Second World War. Hungary is building a fence along its 110-mile border with Serbia, and is considering using its military to protect its southern border, as thousands of migrants, many of them fleeing Syria, are desperately trying to enter the European Union zone. Greece saw fifty thousand refugees arrived on Greek shores during the month in July alone, . and the Greek authorities have taken to ferrying many of them – mostly Syrian refugees — from Greece’s overwhelmed islands to Athens, from where they head north by buses provided by the government. The Serbia authorities said that about 10,000 refugees were passing through Serbia at any time. As Hungary border fence building advances, more and more of these refugees remain in Serbia, unable to cross into Hungary or go back into Greece.
-
-
Water12 -- Test of the Water code functioanlity
Europe is searching for a solution to its worst refugee crisis since the Second World War. Hungary is building a fence along its 110-mile border with Serbia, and is considering using its military to protect its southern border, as thousands of migrants, many of them fleeing Syria, are desperately trying to enter the European Union zone. Greece saw fifty thousand refugees arrived on Greek shores during the month in July alone, . and the Greek authorities have taken to ferrying many of them – mostly Syrian refugees — from Greece’s overwhelmed islands to Athens, from where they head north by buses provided by the government. The Serbia authorities said that about 10,000 refugees were passing through Serbia at any time. As Hungary border fence building advances, more and more of these refugees remain in Serbia, unable to cross into Hungary or go back into Greece.
-
-
CybersecurityCombating cyber threats to the global financial industry
Today more than fifteen billion devices are connected to the Internet; in the next five years, that number will grow to fifty billion. With each new device presenting an opportunity to be infiltrated and compromised by hackers, it is easy to understand why the importance of cybersecurity continues to skyrocket. So explained keynote speaker Elizabeth Petrie, director of strategic intelligence analysis for Citigroup, who kicked off a one-day conference at the University of Delaware on cybersecurity issues impacting the global financial industry.
-
-
Food securityMost Americans could be fed by food grown or raised within 100 miles of their homes
The popularity of “farm to table” has skyrocketed in the past few years as people become more interested in supporting local farmers and getting fresher food from sources they know and trust. Even large chain restaurants are making efforts to source supplies locally, knowing more customers care where their food comes from. New farmland-mapping research published the other day shows that up to 90 percent of Americans could be fed entirely by food grown or raised within 100 miles of their homes.
-
-
EncryptionUSMobile launches Scrambl3 mobile, Top Secret communication-standard app
Irvine, California-based USMobile, a developer of private mobile phone services, yesterday launched Scrambl3, a smartphone app that enables users to create their own Private Mobile Network. When Scrambl3 users communicate with each other, Scrambl3 creates a Dark Internet Tunnel between their smartphones. This Tunnel cloaks the calls and texts by making them invisible on the Internet. Scrambl3 App for Android-based phones is available for a 60-day free beta offering from the Google Play Store.
-
-
False tweetsRumor-detection software detects, corrects erroneous claims on Twitter
A week after the Boston marathon bombing, hackers sent a bogus tweet from the official Twitter handle of the Associated Press. It read: “Breaking: Two Explosions in the White House and Barack Obama is injured.” Before the AP and White House could correct the record, the stock market responded, dropping more than 140 points in a matter of minutes. Losses mounted into the billions. The market recovered just as quickly, but analysts said the timeframe could well have been long enough for in-the-know perpetrators to profit through trading. Researchers have developed software to help society identify and correct erroneous claims on Twitter.
-
-
EnergyExciting time ahead for power industry: Energy expert
New developments in the field of power electronics could lead to greater flexibility for the U.S. electrical power grid, says an expert in power engineering. The key, she says, will be advancements in power electronics — instruments that control and convert electric power, such as semiconductor switching devices. “Power electronics are going to make the power system more flexible, allowing us to really control how the power flows in the system much like you might consider traffic lights controlling traffic flow,” the expert says.
-
-
TerrorismWestern countries, businesses facing increased terrorism threat: Aon
Risk levels are rising in Western economies due to the increased terror threat presented by Islamic extremists, according to the Aon Terrorism and Political Violence Map. The map, launched earlier this week, provides insight for business aiming to reduce risk exposures. Top risks for business include increased terrorism threats across developed economies, and a progressively uncertain and dangerous geopolitical environment, where the risk of armed conflict is growing amid changing and unstable regional balances of power.
-
-
BiolabsGroundbreaking for new Biosafety Level 4 lab in Kansas
Officials on Wednesday broke ground for the National Bio and Agro-Defense Facility (NBAF), a $1.25 billion animal research facility near the campus of Kansas State University in Manhattan, Kansas. NBAF will be the U.S. only Level 4 biosafety lab – a designation which means that the lab is secure enough to handle, and conduct research on, pathogens that do not currently have treatments or countermeasures. Critics argue that locating the lab on the campus of KSU — in the heart of cattle country and the middle of Tornado Alley – would not be a good idea. NBAF will replace the aging biolab in Plum Island, New York.
-
-
Immigration & businessCompanies gaming the system to get their H-1B visa applicants approved
Many foreign applicants for the 65,000 yearly available H-1B U.S. work visas, which allow U.S. companies temporarily to employ foreign workers in specialty positions, are finding that their paperwork is not even being considered due to the fact that many companies are using various behind-the-scenes schemes better to control their own employment interests, disrupting the system while also highlighting the inefficiency of the current registration process.
-
-
African securityIsraeli military technology sales to Africa increase by 40%
Israeli weapons exports declined by nearly $1 billion in 214 compared to 2013, but export of Israel-made weapons to African countries increased by 40 percent in 2014 compared with 2013. Israeli armaments industries signed deals worth $318 million in Africa, compared with $223 million in 2013, which itself was an all-time record. Asian and Pacific countries were much larger customers of Israeli arms, though, buying $3 billion worth of Israeli military technology in 2014.
-
-
EncryptionTech companies urge rejection of push by FBI, DOJ for electronic devices “backdoors”
In a 19 May letter to President Barack Obama, a group of Silicon Valley tech companies, cyber-security experts, and privacy advocacy groups urged the president to reject the implementation of “backdoors” in smartphone and computer encryption. The letter offered evidence of the strong objection of the tech industry to demands from the Justice Department and the Federal Bureau of Investigation (FBI) to allow secret backdoor passages into consumer electronics, which would make it possible for law enforcement to read encrypted private communications and data.
-
-
Nuclear powerNRC ruling raises questions about future of Diablo Canyon reactors
In a major victory for those who pointed, post-Fukushima, to the risks involved in having a nuclear power reactor operating too close to a seismic fault, as is the case with the Diablo Canyon nuclear reactors, U.S. Nuclear Regulatory Commissioners have ruled – in a decision that could mark the beginning of the end of Diablo Canyon — that an Atomic Safety Licensing Board will decide whether Pacific Gas & Electric Co. was allowed illegally to alter the plant’s license. This alteration was made in an effort to hide the risk from powerful earthquake faults discovered since it was designed and built.
-
-
Crude-by-railUpdated crude oil regulation worries environmental groups, increases shipments
Following several deadly explosions of oil-tanker railroad cars in towns across the United States and Canada in the past several years, the Department of Transportation (DOT) issued an emergency order that required railroads publicly to inform states of movements of 100 crude oil tanker cars or more as part of any single shipment. However, on 1 May the agency revised the order with a long-awaited rule which would require carriers to upgrade tanker cars instead of having to report the information, leading some to question the safety of the new ruling.
-
More headlines
Who's online
The long view
Infrastructure protectionU.S. contemplates responses to a cyber-Pearl Harbor attack on critical infrastructure
Cybersecurity experts often contemplate how U.S. security agencies would react to a cyber-9/11 or a digital Pearl Harbor, in which a computer attack would unplug the power grid, disable communications lines, empty bank accounts, and result in loss of life. “Ultimately, it absolutely could happen,” says one expert. “Yeah, that thought keeps me up at night, in terms of what portion of our critical infrastructure could be really brought to its knees.”
Cyber insuranceTo bolster the world’s inadequate cyber governance framework, a “Cyber WHO” is needed
A new report on cyber governance commissioned by Zurich Insurance Group highlights challenges to digital security and identifies new opportunities for business. It calls for the establishment of guiding principles to build resilience and the establishment of supranational governance bodies such as a Cyber Stability Board and a “Cyber WHO.”
Border security More money, different approach offer opportunities to border security tech companies
The number of border agents has reached roughly 21,000, up from 5,000 two decades ago. In fiscal year 2012, spending for border and immigration enforcement totaled almost $18 billion — 24 percent more than the combined budgets of the FBI, the DEA, the Secret Service, the U.S. Marshals, and the Bureau of Alcohol, Tobacco, Firearms and Explosives (total: $14.4 billion). One major trend driving the border security industry is the government’s shift from large-scale border security infrastructure projects to small unit security systems.
Coastal infrastructureCoastal communities can lower flood insurance rates by addressing sea-level rise
City leaders and property developers in Tampa Bay are urging coastal communities to prepare today for sea-level rise and future floods in order to keep flood insurance rates low in the future. FEMA, which administers the National Flood Insurance Program(NFIP), is increasing flood insurance premiums across the country, partly to offset losses from recent disasters such as hurricanes Katrina and Sandy. Cities can reduce insurance premiums for nearly all residents who carry flood coverage by improving storm-water drainage, updating building codes to reflect projected rise in sea-levels, moving homes out of potentially hazardous areas, and effectively informing residents about storm danger and evacuation routes.
WaterChanging human behavior key to tackling California drought: Expert
California is experiencing a drought that has gone far beyond a “dry spell,” and the state has imposed the first water restriction in state history, aiming to cut back on water consumption by 25 percent. One expert says that strict water conservation measures are long overdue, and that “what is happening is a realization that you can’t simply transplant another ecosystem onto a California desert system or arid southwestern system. In a sense, California and much of the U.S. southwest are living beyond their ecological means. Certain lifestyles have been adopted and crops are being grown that are not endemic or sustainable for this particular bioregion.” He adds: “This is a moment for not just cutting off personal water use and turning the tap off when you’re brushing your teeth, as important as that is. This is a moment of reflection, invitation and, I hope, legislation that will cause people to think about water use in the industrial sector too. This is for the long-term prosperity of the state and sustainability of the ecosystem.”