The concept and strategy of transportation infrastructure continues to gain momentum, as evidenced by a recent hearing held by the Senate Committee on Banking, Housing and Urban Affairs which focused on legislation that would establish an infrastructure bank that would be charged with “evaluating and financing capacity-building infrastructure projects of substantial regional and national significance.”Keep Reading
Report of hijacking attempt highlights tensions between Chinese government and Uyghur Seperatists Keep Reading
The top U.S. commander in charge of cyberspace said that American military networks are coming under increasing attack from hackers seeking to steal classified information, and that many of the incidents appear linked to China.Keep Reading
Bridges, roads, coastal runways and railways will all suffer the impacts of a warming climate … and steps should be taken now to find ways to design and adapt, according to a new scientific report.Keep Reading
U.S. Senator Charles Schumer outlined what he feels are the Hudson Valley’s most critical infrastructure needs to business people in Orange County Monday, citing major highway renovations and customer service upgrades to Stewart Airport as his top priorities.Keep Reading
The Senate Banking, Housing and Urban Affairs Committee held a hearing Tuesday on legislation to create a public-private partnership to finance needed improvements in the nation’s infrastructure.Keep Reading
A rise in sea levels and other changes fueled by global warming threaten roads, rail lines, ports, airports and other important infrastructure in the United States, according to new US government reports, and policy makers and planners should be acting now to avoid or mitigate their effects.Keep Reading
Since January, the Bush administration has committed to spending billions to keep the government's computer networks safe from cyberspies and other malicious hackers. But to keep digital intruders away from sensitive government information, some worry the government will have to do some spying of its own--on the U.S. private sector.
Mark Walker of DHS Critical Infrastructure Protection Division recently told a National Institute of Standards and Technology workshop that the hackers' primary motive seems to be espionage. For example, any health problems among the nation's leaders would be of interest to potential enemies, he said.
"Thank goodness it wasn't us!" We can't help it. Every time another nasty cybersecurity failure makes headlines, our eyes roll heavenward and we breathe a sigh of relief. Yet, while we have great empathy for the CIO at the enterprise that just got nailed, we know there's a bullet somewhere with our name on it.
With federal government spending on cybersecurity set to sharply increase in the final budget submitted by the Bush administration, contractors are looking hard for fresh business opportunities. Although opportunities are starting to take shape, they are not as clear as some contractors would like.
In the spring of 2007, when Estonian authorities removed a monument to the Red Army from its capital city, Tallinn, a diplomatic row erupted with neighboring Russia. Estonian nationalists regard the army as occupiers and oppressors, a sentiment that dates to the long period of Soviet rule following the Second World War, when the Soviet Union absorbed all three Baltic states. Ethnic Russians, who make up about a quarter of Estonia’s 1.3 million people, were nonetheless incensed by the statue’s treatment and took to the streets in protest. Estonia later blamed Moscow for orchestrating the unrest; order was restored only after US and European diplomatic interventions. But the story of the “Bronze Statue” did not end there. Days after the riots the computerized infrastructure of Estonia’s high-tech government began to fray, victimized by what experts in cybersecurity termed a coordinated “denial of service” attack. A flood of bogus requests for information from computers around the world conspired to cripple (Wired) the websites of Estonian banks, media outlets, and ministries for days. Estonia denounced the attacks as an unprovoked act of aggression from a regional foe (though experts still disagree on who perpetrated it—Moscow has denied any knowledge). Experts in cybersecurity went one step further: They called it the future of warfare.
CSX Corp. spent $3.2 million in 2007 to lobby on legislation related to rail security, renewable energy and investments.
When Congress agreed in November 2002 to move the Federal Protective Service to the newly created Homeland Security Department, the goals were laudable: to improve the protection of employees and visitors at 8,800 federal buildings nationwide and raise the stature of police officers and inspectors at the agency.
On Wednesday, Black Hat D.C. 2008 gets under way, after two days of intense training sessions. The D.C. Black Hat security conference is much smaller than the summer Black Hat USA in Las Vegas. But what D.C. lacks in size, it makes up for in sessions and talks.
When President Bush issued a classified cybersecurity directive early last month, he reversed 21 years of policy that had prevented the Defense Department and the National Security Agency from having oversight of civilian agency networks.
Amtrak's new 15-member security teams, heavily armed and "exceedingly polite," will show up in force this week at Northeast rail stations, trying to secure a system that is inherently vulnerable to terrorist attack. Keep Reading
The Greater Yuma Port Authority and District 24 legislators have been working diligently during the last few years to make the San Luis II commercial port of entry a reality. The project received an added boost last year when the District 24 delegation secured $2.5 million for this port, the first land port of entry to bebuilt in a decade.
Lawmakers in the United States and elsewhere should not to try to censor Islamic extremists’ use of the Internet, says a new report from a global think tank. "There is no censorship option," Greg Austin, vice president of the East West Institute, told United Press International. "Trying to suppress anything (on the Internet) except direct… Keep Reading
Damage to several undersea telecom cables that caused outages across the Middle East and Asia could have been an act of sabotage, the International Telecommunication Union said on Monday. "We do not want to preempt the results of ongoing investigations, but we do not rule out that a deliberate act of sabotage caused the damage… Keep Reading