Archive for the ‘security’ category: Page 10

Mar 9, 2020

Terahertz microscope produces highly accurate ‘ghost’ images

Posted by in categories: security, transportation

New device could find applications in areas such as the life sciences, airport security and quality control in manufacturing.

Mar 4, 2020

U.S. carries out first airstrike on Taliban since Doha deal

Posted by in category: security

KABUL — The United States conducted an airstrike on Wednesday against Taliban fighters in Afghanistan’s southern Helmand province, a U.S. forces spokesman said, the first such attack since a troop withdrawal agreement was signed between the two sides on Saturday.

The Taliban fighters were “were actively attacking an [Afghan National Security Forces] checkpoint. This was a defensive strike to disrupt the attack,” said Colonel Sonny Leggett, a spokesman for the U.S. Forces in Afghanistan in a tweet.

He said Washington was committed to peace but would defend Afghan forces if needed.

Continue reading “U.S. carries out first airstrike on Taliban since Doha deal” »

Mar 2, 2020

National Security Commission on AI Requests New Ideas; RAND Responds

Posted by in categories: robotics/AI, security

Last summer, the National Security Commission on Artificial Intelligence asked to hear original, creative ideas about how the United States would maintain global leadership in a future enabled by artificial intelligence. RAND researchers stepped up to the challenge.

“Send us your ideas!” That was the open call for submissions about emerging technology’s role in global order put out last summer by the National Security Commission on Artificial Intelligence (NSCAI). RAND researchers stepped up to the challenge, and a wide range of ideas were submitted. Ten essays were ultimately accepted for publication.

The NSCAI, co-chaired by Eric Schmidt, the former chief executive of Alphabet (Google’s parent company), and Robert Work, the former deputy secretary of defense, is a congressionally mandated, independent federal commission set up last year “to consider the methods and means necessary to advance the development of artificial intelligence, machine learning, and associated technologies by the United States to comprehensively address the national security and defense needs of the United States.”

Continue reading “National Security Commission on AI Requests New Ideas; RAND Responds” »

Mar 1, 2020

Boeing Defense, Space and Security offers $30,000 bonuses for satellite engineers

Posted by in categories: satellites, security

Boeing is offering signing bonuses up to $30,000 for experienced satellite engineers and procurement specialists, saying Friday needs the staff “to help build assets for the U.S. Air Force and its allies.”

The company posted a notice about its hiring on LinkedIn, listing more than open 75 jobs for what Boeing said were its “rapidly growing” satellite program efforts.

“We have an urgent need for Security Cleared Satellite Engineers to help build assets for the U.S. Air Force and its Allies. We’re offering a potential $30k sign-on bonus,” the posting said.

Continue reading “Boeing Defense, Space and Security offers $30,000 bonuses for satellite engineers” »

Feb 27, 2020

Eric Schmidt: I Used to Run Google. Silicon Valley Could Lose to China

Posted by in categories: economics, government, security

But in recent years, Americans — Silicon Valley leaders included — have put too much faith in the private sector to ensure U.S. global leadership in new technology. Now we are in a technology competition with China that has profound ramifications for our economy and defense — a reality I have come to appreciate as chairman of two government panels on innovation and national security. The government needs to get back in the game in a serious way.

We can’t win the technology wars without the federal government’s help.

Feb 24, 2020

The view of quantum threats – from the front lines

Posted by in categories: computing, encryption, quantum physics, security

Quantum computing might initially sound like a far-fetched futuristic idea, but companies such as Amazon, Google, and IBM are putting their weight behind it and preparations have begun. With quantum computing potentially within our reach, what will happen to our current security models and modern-day encryption? See what security experts are doing to prepare for quantum threats.

The future is here. Or just about. After a number of discoveries, researchers have proven that quantum computing is possible and on its way. The wider world did not pause long on this discovery: Goldman Sachs, Amazon, Google, and IBM have just announced their own intentions to embark on their own quantum developments.

Now that it’s within our reach we have to start seriously considering what that means in the real world. Certainly, we all stand to gain from the massive benefits that quantum capabilities can bring, but so do cybercriminals.

Feb 23, 2020

Philip Haney, DHS whistleblower, found dead, police say

Posted by in categories: biotech/medical, security, weapons

Department of Homeland Security (DHS) whistleblower Philip Haney was found dead in Amador County, Calif., on Friday, according to local authorities.

Haney, 66, “appeared to have suffered a single, self-inflicted gunshot wound,” the Amador County Sheriff’s Office said in a release. Sheriff and coroner Martin A. Ryan shared the initial details of the case.

“On February 21, 2020 at approximately 1012 hours, deputies and detectives responded to the area of Highway 124 and Highway 16 in Plymouth to the report of a male subject on the ground with a gunshot wound,” the release read.

Continue reading “Philip Haney, DHS whistleblower, found dead, police say” »

Feb 21, 2020

Moscow deploys facial recognition technology for coronavirus quarantine

Posted by in categories: biotech/medical, robotics/AI, security, surveillance

Sobyanin said last month that the city had begun using facial recognition as part of its city security surveillance programme.

Kremlin spokesman Dmitry Peskov said he had not seen details of the actions being taken in Moscow but that measures to curb the spread of the coronavirus should not be discriminatory.

The clamp down on quarantine rules comes after a woman in St. Petersburg staged an elaborate escape from a hospital where she said she was being kept against her will.

Feb 21, 2020

LA hospital trades in badges for facial biometrics-only secure access control from Alcatraz AI

Posted by in categories: biotech/medical, privacy, robotics/AI, security

Martin Luther King Jr. Community Hospital in Los Angeles is using biometric facial recognition technology from Alcatraz AI to replace or augment badges for physical security and access control, the company has revealed to Biometric Update.

The Alcatraz AI 3D Rock Facial Authentication Platform was integrated with MLKCH’s access control system to strengthen identity verification procedures for its 70 security department employees. The hospital, which employs more than 2,000 people, considered biometric card reader options, and selected Alcatraz Rock to secure access to its security center.

“The security department was a natural place to start with coverage from the Alcatraz Rock and facial recognition access control,” says MLKCH Director of Support Services Mark Reed in a case study by Alcatraz 3D. “Our security department obviously has a huge role in maintaining a safe and secure hospital environment for patients, staff, and guests and therefore houses important employees and information. Controlling access to this security area is key and we wanted to ensure that only those individuals that are supposed to be coming and going are the ones that are actually coming and going. What better way is there to verify identity than with facial recognition?”

Continue reading “LA hospital trades in badges for facial biometrics-only secure access control from Alcatraz AI” »

Feb 20, 2020

Mixed-signal hardware security thwarts powerful electromagnetic attacks

Posted by in categories: encryption, information science, internet, security

Security of embedded devices is essential in today’s internet-connected world. Security is typically guaranteed mathematically using a small secret key to encrypt the private messages.

When these computationally secure encryption algorithms are implemented on a physical hardware, they leak critical side-channel information in the form of power consumption or electromagnetic radiation. Now, Purdue University innovators have developed technology to kill the problem at the source itself—tackling physical-layer vulnerabilities with physical-layer solutions.

Continue reading “Mixed-signal hardware security thwarts powerful electromagnetic attacks” »

Page 10 of 71First7891011121314Last