• Identity authenticationSoftware verifies someone’s identity by their DNA in minutes

    In the science-fiction movie “Gattaca,” visitors only clear security if a blood test and readout of their genetic profile matches the sample on file. Now, cheap DNA sequencers and custom software could make real-time DNA-authentication a reality. Researchers have developed a method to quickly and accurately identify people and cell lines from their DNA. The technology could have multiple applications, from identifying victims in a mass disaster to analyzing crime scenes.

  • The Russia connectionU.K. government agencies told to remove Kaspersky software from their systems

    In another example of a Western government taking decisive action to limit the ability of Russian government hackers to steal sensitive information, The U.K. cyber security agency on Friday has advised U.K. government agencies to remove Kaspersky Lab’s products from their systems.

  • view counter
  • CybersecurityImproving critical sectors’ cybersecurity by bolstering sharing, acting on information

    New initiative aims to operationalize the Integrated Adaptive Cyber Defense (IACD) framework for cybersecurity automation, orchestration and information sharing. This initiative will enable companies, including those in the financial services sector, to improve the ability to quickly and broadly share information and prevent and respond to cyberattacks.

     

  • Synthetic biologyThe Gene Drive Files: Who is in charge of bioengineering research?

    Synthetic biology, also called “gene drives” or “bioengineering” – a field that uses technologies to modify or create organisms or biological components – can be used to benefit mankind, but may also be used by terrorists and nation-states to develop design pathogens which could be unleased to kill tens of millions of people. Critics of gene drives are alarmed by the fact that the U.S. military has been the main funder of synthetic biology research in the United States. Given the possible security vulnerabilities related to gene drives developments, a new report by the National Academies of Sciences proposes a framework to identify and prioritize potential areas of concern associated with the field. “While biotechnology is being pursued primarily for beneficial and legitimate purposes, there are potential uses that are detrimental to humans, other species, and ecosystems,” says one of the report’s authors. A nonprofit monitoring synthetic biology research releases new documents ahead of a key UN scientific conference on bioengineering.

  • PrivacyCourt recognizes first amendment right to anonymity even after speakers lose lawsuits

    By Aaron Mackey

    Anonymous online speakers may be able to keep their identities secret even after they lose lawsuits brought against them, a federal appellate court ruled last week. The decision by the U.S. Court of Appeals for the Sixth Circuit in Signature Management Team, LLC v. John Doe is a victory for online speakers because it recognized that the First Amendment’s protections for anonymous speech do not end once a party suing the anonymous speaker prevails. The ruling, however, is not all good news for anonymous speech. The test announced by the court sets unmasking as the default rule post-judgment, placing the burden on the anonymous party to argue against unmasking.

  • PlagueLimited global risk of Madagascar’s pneumonic plague epidemic

    Mathematical models have proven the risk of the on-going pneumonic plague epidemic in Madagascar spreading elsewhere in the world is limited. The study also estimated the epidemic’s basic reproduction number, or the average number of secondary cases generated by a single primary case, at 1.73. The case fatality risk was 5.5 percent. This was the world’s first real-time study into the epidemiological dynamics of the largest ever pneumonic plague epidemic in the African nation.

  • Alarm systemsSmart alarm system detects attempted break-ins

    There is a large selection of glass break detectors on the market. Although these detectors reliably trigger an alarm when window panes break, they do not register all other ways in which burglars can interfere with a pane. To counter this, Fraunhofer researchers have created a new type of alarm system that recognizes any attempt to manipulate the window. It registers temperature changes in real time as well as vibrations caused by external interference with the glass, leaving burglars with no chance.

  • Climate threatsA turn to the worst in climate change debate

    In July, New York magazine published its most-read article ever, surpassing a photo spread of Lindsay Lohan. The topic? Doom. While defying the belief among author David Wallace-Wells’s editors that climate change would be “traffic kryptonite,” the story, titled “The Uninhabitable Earth,” presented an apocalyptic vision in which rising seas flood Miami and Bangladesh, heat and drought cut grain yields in half, diseases spread, and wars rage. Unfortunately, that vision isn’t fiction, but rather Wallace-Wells’s summation of climate change’s little-discussed worst-case scenario for the year 2100.

  • Our picksWest Coast missile defense; online hate speech; criminals & guns, and more

    · “I’m confident Flynn is singing like a bird to Mueller.”

    · Where criminals get their guns

    · The volunteer vigilantes of New York City

    · Pentagon evaluating U.S. West Coast missile defense sites - officials

    · Cartel hitmen force ‘confessions’ from victims before ISIS-style beheadings in Mexico

    · The origins of online hate speech

    · As Hurricane Irma neared Florida, immigration agents kept picking up undocumented people despite promises

    · Trump approves National Security Strategy

  • The Russia connectionFederal agencies complete second phase of Kaspersky product removal

    The U.S. federal government has completed the first two phases of a three-part plan to remove all Kaspersky Lab’s products from government computer systems. The U.S. intelligence community said that the Russian cybersecurity company’s anti-virus software was used to collect sensitive information from the systems on which it was installed, and deliver that information to Russia’s intelligence agencies.

  • The Russia connectionRussia increasingly uses hacker mercenaries for cyberattacks: FBI

    FBI director Christopher Wray told lawmakers Thursday that state-actors such as Russia are increasingly relying on hacker mercenaries, blurring the lines between government-backed hackers and cyber criminals. Wray told lawmakers that increasingly, such hybrid government-criminal breaches are becoming a reality. “You have the blend of a nation-state actor, in that case, the Russian intelligence service, using the assistance of criminal hackers, which you think of almost like mercenaries, being used to commit cyberattacks,” the FBI director said.

  • Middle EastNew analytical tool shows two-state solution still viable

    On the 70th anniversary of the ratification of the United Nations Partition Plan, the Washington Institute for Near East Policy has launched a new website called “Settlements and Solutions” that seeks to use civilian satellite imagery to provide a better understanding of West Bank demography in unprecedented detail that shows that a two-state solution is still very much viable.

  • PrivacyEFF wants information about government tattoo recognition technology

    The Electronic Frontier Foundation (EFF) filed suit against the Department of Justice, the Department of Commerce, and the Department of Homeland Security the other day, demanding records about the agencies’ work on the federal Tattoo Recognition Technology program. EFF says that this secretive program involves a coalition of government, academia, and private industry working to develop a series of algorithms that would rapidly detect tattoos, identify people via their tattoos, and match people with others who have similar body art—as well as flagging tattoos believed to be connected to religious and ethnic symbols.

  • CybersecurityHarnessing game theory for cybersecurity of large-scale nets

    Researchers have laid the groundwork for a method to improve cybersecurity for large-scale systems like the power grid and autonomous military defense networks by harnessing game theory and creating new intelligent algorithms. The project harnesses the Nash equilibrium, developed by Nobel laureate John Nash, whose life was chronicled in the film “A Beautiful Mind.” The work also applies “prospect theory,” which describes how people make decisions when there is uncertainty and risk, decisions that are often “only partly rational.”

  • CybersecurityNanomaterials’ cryptographic potential may be ultimate defense against hackers

    The next generation of electronic hardware security may be at hand as researchers introduce a new class of unclonable cybersecurity security primitives made of a low-cost nanomaterial with the highest possible level of structural randomness. Randomness is highly desirable for constructing the security primitives that encrypt and thereby secure computer hardware and data physically, rather than by programming.

  • DisastersDisaster zones could soon be salvaged by teams of smart devices – here’s how

    By Emma Hart and Jeremy Pitt

    We will remember 2017 as an appalling year for natural disasters. It comes months after the UN’s head of disaster planning warned that the world is not adequately preparing for disasters. This, he said, risks “inconceivably bad” consequences as climate change makes disasters more frequent and severe. In such circumstances, modern technologies like smartphones, sensors and drones could help enormously, particularly if we can get them to act like an intelligent network. We recently outlined how these three strands from political theory, social science, and biology could be brought together to develop a new paradigm for complex device networks. We see encouraging signs that such thinking is starting to catch on among researchers. These ideas should enable us to develop new approaches that will underpin and enhance a wide variety of human activities – not least when the next disaster strikes. It might even mitigate the effects of climate change, making us better at foreseeing catastrophes and taking steps to avert them.

  • Climate threatsEconomic damage of carbon emissions costlier than earlier thought

    The data used to calculate the damage that an additional ton of carbon dioxide has on the global economy has long relied on outdated science. Recent updates modeled raise the calculations of those costs significantly and change the outlook on climate change from a positive for agriculture to a negative. When the most recent science is brought to bear, one of the major models used to calculate the social cost of carbon (SCC) moves the figure to $19.70, an increase of 129 percent.

  • Our picksGrowing Russian threat; Saudi nukes; undocumented children, and more

    · MI6 lays bare the growing Russian threat

    · What the evidence shows about potential Trump-Russia collusion

    · Flynn coordinated Russia call with senior transition official, prosecutors say

    · Regional security means border security: New data on why Central American children flee to the United States

    · Feds quietly reveal Chinese state-backed hacking operation

    · White House may share nuclear power technology with Saudi Arabia

    · Article ‘normalizes’ a neo-Nazi, internet flips out

    · The underground Uber networks driven by Russian hackers

  • TerrorismActing DHS Secretary Duke: Rethinking homeland security for a new age

    Earlier today (Thursday), Acting Secretary of Homeland Security Elaine Duke testified before the House Committee on Homeland Security for a hearing on “World Wide Threats: Keeping America Secure in the New Age of Terror.” Duke said that DHS is addressing the evolving threat landscape and moving past traditional defense and non-defense thinking. DHS is enhancing its approach to homeland security and bringing together intelligence operations, interagency engagement, and international action in innovative ways.

  • Hate groupsWhat is Britain First, and what it stands for

    Early on Wednesday morning, President Donald Trump retweeted three anti-Muslim videos — one of them fake — which had earlier been posted by Jayda Fransen, the deputy leader of the vehemently anti-Muslim British hate group Britain First. Fransen was convicted last year by a British court for harassing a woman wearing a hijab – in front of the woman’s children. Here is a brief backgrounder of Britain First and its history.

  • CybersecurityHADES misleads hackers by creating an alternate reality

    The Russian novelist Fyodor Dostoevsky once postulated that the devil no longer uses fire and brimstone but instead simply tells you what you want to hear. Sandia National Laboratories cyber researchers go with that second option when it comes to foiling a hacker. Rather than simply blocking a discovered intruder, the researchers deploy a recently patented alternative reality, dubbed HADES for High-fidelity Adaptive Deception & Emulation System, which feeds a hacker not what he needs to know but what he wants to believe.

  • Digital privacyAn armed robber’s Supreme Court case could affect all Americans’ digital privacy for decades to come

    By H. V. Jagadish

    A man named Timothy Carpenter planned and participated in several armed robberies at Radio Shack and T-Mobile stores in Michigan and Ohio between 2010 and 2012. He was caught, convicted and sentenced to 116 years in federal prison. His appeal, which was heard by the U.S. Supreme Court on 29 November, will shape the life of every American for years to come – no matter which way it’s decided. The FBI found Timothy Carpenter because one of his accomplices told them about him. I believe the FBI could have obtained a search warrant to track Carpenter, if agents had applied for one. Instead, federal agents got cellphone location data not just for Carpenter, but for fifteen other people, most of whom were not charged with any crime. One of them could be you, and you’d likely never know it. The more people rely on external devices whose basic functions record and transmit important data about their lives, the more critical it becomes for everyone to have real protection for their private data stored on and communicated by these devices.