Recommended reading

Wiretapping and Cloud Security
Source: Securosis blog

In another case of unintended consequences, now come warnings that the Obama administration’s call to Internet service providers and other firms to make it easier for the FBI to tap into online communications could damage attempts to tighten security in the cloud.

Security research firm Securosis says the proposal, aimed at denying terrorists and other groups the advantage of encrypted communications, will create “a single point of security failure within organizations and companies that don’t have the best security track record to begin with."

The administration’s proposal specifically targets peer-to-peer communications, requiring companies that deliver those types of services to redesign them to allow interception. There are only a limited number of ways to do that, Securosis says, and each creates new opportunities for security failures that bad guys could likely detect using some fairly basic techniques.

The Promise of Offshore Wind Energy
Source: New York Times

Data centers and servers account for nearly 2 percent of total U.S. electricity consumption and are among the fastest-growing energy consumers in the country, according to the Environmental Protection Agency. So news of promising renewable energy and grid improvement projects, especially along the crowded Atlantic seaboard where government and private-sector data centers abound, is always welcome.

An innovative plan backed by Google and a New York financial firm seeks to build a $5 billion underwater transmission backbone for offshore wind farms, reports Matthew Wald in the New York Times. The 350-mile line would run in shallow trenches on the seabed in federal waters 15 to 20 miles offshore, from northern New Jersey to Norfolk, Va.

“Conceptually, it looks to me to be one of the most interesting transmission projects that I’ve ever seen walk through the door,” said Jon Wellinghoff, chairman of the Federal Energy Regulatory Commission, which oversees interstate electricity transmission.

Relinking Mind and Body
Source: SMU Research blog

The Defense Advanced Research Projects Agency is famed for its prowess at delivering increasingly effective ways for warfighters to do their jobs, and it seems that DARPA is as determined to look after U.S. troops' minds and bodies.

The latest effort is a $5.6 million award to Southern Methodist University to fund its Neurophotonics Research Center’s development of two-way fiber-optic communication between prosthetic limbs and peripheral nerves. The research could give amputees an effective way of feeling their artificial limbs as much as possible, which could revolutionize their freedom of movement and agility.

With that and other developments in technology-enabled brain/body links, it’s no longer science fiction to believe that people with shattered limbs and minds can be made almost whole again.

 

About the Author

Connect with the FCW staff on Twitter @FCWnow.

The Fed 100

Save the date for 28th annual Federal 100 Awards Gala.

Featured

  • Social network, census

    5 predictions for federal IT in 2017

    As the Trump team takes control, here's what the tech community can expect.

  • Rep. Gerald Connolly

    Connolly warns on workforce changes

    The ranking member of the House Oversight Committee's Government Operations panel warns that Congress will look to legislate changes to the federal workforce.

  • President Donald J. Trump delivers his inaugural address

    How will Trump lead on tech?

    The businessman turned reality star turned U.S. president clearly has mastered Twitter, but what will his administration mean for broader technology issues?

  • Login.gov moving ahead

    The bid to establish a single login for accessing government services is moving again on the last full day of the Obama presidency.

  • Shutterstock image (by Jirsak): customer care, relationship management, and leadership concept.

    Obama wraps up security clearance reforms

    In a last-minute executive order, President Obama institutes structural reforms to the security clearance process designed to create a more unified system across government agencies.

  • Shutterstock image: breached lock.

    What cyber can learn from counterterrorism

    The U.S. has to look at its experience in developing post-9/11 counterterrorism policies to inform efforts to formalize cybersecurity policies, says a senior official.

Reader comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group