Heat hackers breach computer systems by “breathing” data whispers

air-gap-security-research.png

How can the environment around computers be used to hack data? Computer scientists have now determined that it’s possible to send data or “steal” data by using heat transfer between computers – those typically used as servers in high profile institutions like banks and police. Their exercise in hacking heat points out vulnerabilities in today’s […]

Read more

Israel’s Separation Barrier Could Disrupt Ancient Way of Farming Since Roman Times

battir-west-bank-palestine.jpg

Water from natural springs burbles in the ancient Roman stone aqueduct as it carries water downward to this village’s ancient terraces. Palestinian families grow olives, cabbage and eggplant today the same way they did more than 2,000 years ago. “Each family here gets water one day a week, but the week lasts eight days since […]

Read more

Climate, Migration and Why the Security Agenda Just Doesn’t Help

climate-change-and-migration-security-and-borders-in-a-warming-world.jpg

Framing climate-influenced migration as a threat is dangerous and counterproductive is author  Gregory White  Around the time of the Copenhagen Summit in 2009, there was a sense that climate change was finally transitioning from something which only concerned hippy do-gooders to an issue that affected the entire international community. Everywhere you looked people were talking […]

Read more