According to a new study, coupling commercially available spectral x-ray detectors with a specialized algorithm can improve the detection of uranium and plutonium in small, layered objects such as baggage. This approach enhances the detection powers of x-ray imaging and may provide a new tool to impede nuclear trafficking.
A major factor making driving difficult is hazards...
Inspired by human biology, a revolutionary new method of encrypting confidential information has...
Intelligence officials are planning a sweeping system of electronic monitoring that would tap into government, financial and other databases to scan the behavior of many of the 5 million federal employees with secret clearances. The system is intended to identify rogue agents, corrupt officials and leakers, in part to prevent cases similar to former National Security Agency analyst Edward Snowden.
For 15 years trucks have been hauling decades worth of plutonium-contaminated waste to what is supposed to be a safe and final resting place a half mile underground in the salt beds of the Permian Basin in New Mexico. But back-to-back accidents and an above-ground radiation release shuttered the government's only deep underground nuclear waste dump and raised questions about the $5-billion-a-year program for cleaning up legacy waste.
Standing in a full-body scanner at an airport isn’t fun, and the process adds time and stress to a journey. It also raises privacy concerns. But researchers now report making several key advances in terahertz wave sensor technology to create a more precise and direct method for using these waves to detect explosives from greater distances.
Imagine a user who intends to send $2 to a friend through PayPal. Embedded malware in the user’s laptop, however, converts the $2 transaction into a $2,000 transfer to the account of the malware author instead. Researchers at Georgia Institute of Technology have created a prototype software, Gyrus, that takes steps to prevent malware from sending spam emails and instant messages, and blocking unauthorized commands such as money transfers.
An international partnerships is aiming to develop robust fingerprint sensors with resolution beyond today’s 500 dpi international standards, the minimum required by the U.S. Federal Bureau of Investigation. The new platform uses vertical piezoelectric nanowire matrices designed using multiphysics modeling software.
NIST and American Univ. researchers report in a new study that the bench-scale test widely used to evaluate whether a burning cigarette will ignite upholstered furniture may underestimate the tendency of component materials to smolder when these materials are used in sofas and chairs supported by springs or cloth. The study comes as regulations and methods for evaluating ignition in furniture are undergoing scrutiny.
Researchers in the George E. Brown, Jr. Network for Earthquake Engineering Simulation have studied concrete buildings constructed before roughly 1980 in the Los Angeles area. Their work has identified examples of this category of buildings, sometimes referred to as nonductile concrete buildings, which are known from experience in previous earthquakes to have the potential for catastrophic collapse during strong earthquakes.
Computer scientist Yi-Kai Liu at NIST has devised a way to make a security device that has proved notoriously difficult to build: a "one-shot" memory unit, whose contents can be read only a single time. The innovation, which uses qubits and conjugate coding, shows in theory how the laws of quantum physics could allow for the construction of such memory devices.
According to a report from The New York Times, the National Security Agency has implanted software in nearly 100,000 computers around the world that allows the U.S. to conduct surveillance on those machines. The technology, which is not used in the U.S., relies on radio waves that can be transmitted from tiny circuit boards and USB cards inserted covertly into the computers.
A German magazine lifted the lid on the operations of the National Security Agency's hacking unit Sunday, reporting that American spies intercept computer deliveries, exploit hardware vulnerabilities, and even hijack Microsoft's internal reporting system to spy on their targets.
Even as Silicon Valley speaks out against the U.S. government's surveillance methods, technology companies are turning a handsome profit by mining personal data. Tarnished by revelations that the National Security Agency trolls deep into the everyday lives of Web surfers, companies like Apple, Facebook, Google, and Microsoft are aggressively battling any perception that they voluntarily give the government access to users' information.
Buried under thousands of miles of pavement in California are 27,000 traffic sensors that are supposed to help troubleshoot both daily commutes and long-term maintenance needs on some of the nation's most heavily used and congested roadways. About 9,000 of them do not work, despite their critical role in an "intelligent transportation" system designed to do things like detect the congestion that quickly builds after an accident.
Amid a rash of tombstone thefts from cemeteries in Johannesburg, a company will be offering relatives of the deceased a high-tech solution: microchips that can be inserted into the memorial that will sound an alarm and send a text message to their cell phones if it is disturbed.
Iris scans, fingerprint scans, facial and voice recognition are tools that improve security while making our lives easier, says Stephen Elliott, director of international biometric research at Purdue Univ. His basement lab is a place where emerging biometric technologies are tested for weaknesses before they can go mainstream.
The widespread use of advanced surveillance technologies by state and local police departments will improve the efficiency of criminal investigations. But a lack of oversight and regulation poses significant privacy concerns, warns Stephen Rushin, a professor of law at the Univ. of Illinois.
A new market study forecasts that the global market for driver monitoring systems will reach 64.8 million units by the end of 2020 with the majority of shipments being accounted for in vehicles sold in the Asia-Pacific region. A major 2013 is that these systems are migrating from the luxury brands like Volvo and Mercedes-Benz to more mass market models.
Mystaire has announced the release of Aura ductless chemical fume hoods, featuring EverSafe II microprocessor safety controller monitors and adjustable fume hood face velocity to user preset values.
As cars become more like PCs on wheels, what's to stop a hacker from taking over yours? In recent demonstrations, hackers have shown they can slam a car's brakes at freeway speeds, jerk the steering wheel and even shut down the engine — all from their laptop computers. The hackers are...
Vulnerabilities in software and firmware are the easiest ways to attack a system, and two revised publications from NIST approach the problem by providing new guidance for software patching and warding off malware. The new computer security guides to help computer system managers protect their systems.
A new report by biometric researchers at NIST uses data from thousands of frequent travelers enrolled in an iris recognition program to determine that no consistent change occurs in the distinguishing texture of their irises for at least a decade. These findings inform identity program administrators on how often iris images need to be recaptured to maintain accuracy.
Carbon monoxide poisoning is a significant problem for construction workers because it can build up quickly in enclosed spaces from use of gasoline-powered tools. New research calls for the use of a wearable computing system installed in a helmet to protect construction workers from this type of poisoning.
In an effort to thwart forgeries, researchers in Switzerland have proposed a new miniaturized authentication system. By combining moiré patterns and microlithography techniques, authorities can be easily recognize counterfeits with the naked eye and counterfeiters will find it impossible to reproduce items through currently existing printer or scanner technology.
GOJO Industries, a maker of hand hygiene and skin health and inventors of Purell Hand Sanitizer, conducted an independent research study at the John Peter Smith Hospital in Fort Worth, Texas to determine the impact on hand hygiene compliance rates when the hospital hand hygiene program included an electronic compliance activity monitoring system. The research showed a 92% hand hygiene improvement.
There is increasing pressure on the chemical and related industries to ensure that their products comply with increasing numbers of safety regulations. Researchers at the Univ. of Kansas have developed a computational technique that could allow the industry to predict whether a given compound will be toxic even at a low dose and thus allow alternatives to be found when necessary.
A Personal Identity Verification (PIV) card is a government-issued smart card used by federal employees and contractors to access government facilities and computer networks. To assist agencies seeking stronger security and greater operational flexibility, NIST has made several modifications to the previous version of Biometric Data Specification for PIV cards.
- Page 1