International police agencies focus on countering growing threat of IEDs to civilians

Improvised explosive devices aren't just a significant threat to soldiers on the battlefield, but they're also a leading killer of civilians worldwide, Interpol's secretary general said this week in Australia where the first-ever international forum to counter such threats was held.

DHS selects University of Texas at San Antonio to develop standards for more flexible ISAOs

The university will work with existing information sharing groups, critical infrastructure owners and operators, federal agencies and other stakeholders to "identify a common set of voluntary standards or guidelines" for forming such information sharing and analysis organizations.

Brookings chronicles Baghdadi's rise to lead the Islamic State and his motivations

Abu Bakr al-Baghdadi, the leader of the Islamic State of Iraq and Syria since 2010, is described in a new Brookings Institution essay as a politically cunning, religious scholar – and "soccer star" – able to ally himself with powerful friends while imposing a harsh and brutal rule over millions of his subjects.

S&T clears way for PathScan cybersecurity detection technology to be commercialized

A Los Alamos National Laboratory-developed technology that detects network anomalies and has been used exclusively in the government sector is being commercialized by Ernst & Young LLP, the Homeland Security Department's research arm announced.

Food insecurity rising due to extreme weather events from climate change, new report says

Analyzing climate and crop models, the task force found that what would have been called a 1-in-100 year event from 1951 to 2010 may become a 1-in-30 year event before the middle of the century.


From Our Sister Sites


The National Institutes of Health awarded a dozen grants that will support research that looks to incorporate DNA sequence information into electronic medical records.


The department's Science and Technology Directorate said the awards will focus on four technical areas, including mobile device instrumentation, mobile security management tools, transactional security methods, and mobile device layer protection.