• Virtual terrorismInterview with <em>Virtual Terror</em> author Daniel Wagner

    By Russell Whitehouse

    “One of the characteristics of Virtual Terrorism is that it allows countries like North Korea (and Iran) to punch well above their weight in the cyber arena, and conduct their own form of ‘diplomacy’ on the cyber battlefield. These countries have already attacked the U.S. and other countries – all countries with the capability to do so, do so,” says Daniel Wagner. “The best way to fight it is to help ensure that as many people as possible understand what it is, what some of the challenges are in fighting it, and what can we do about it.”

  • The Russia connectionGRU's suspected plan to link Skripal poisoning to Steele Dossier

    The Telegraph is reporting that Russian military intelligence – a year before the attempted murder of Sergei Skripal – planted online evidence of a false connection between the former Russian agent and Christopher Steele, the former British intelligence officer who researched Donald Trump’s Russia connections during the 2016 campaign.

  • style=”display:inline-block;width:468px;height:60px”

    view counter
  • PrivacyCloaking location on mobile devices to protect privacy

    We agree to give up some degree of privacy anytime we search Google to find a nearby restaurant or use other location-based apps on our mobile devices. The occasional search may be fine, but researchers says repeatedly pinpointing our location reveals information about our identity, which may be sold or shared with others. The researchers say there is a way to limit what companies can glean from location information.

  • Public healthMeasles spreads in anti-vaccination community in Oregon

    An outbreak of measles spreads across a “hot spot” anti-vaccination community near Portland, Oregon. Twenty-three cases have been comfirmed, with twenty of those who contracted the highly contagious virus not vaccinated against measles because of their anti-vaccination beliefs.

  • Oil spillsNew decision-making tool for oil spill clean-up

    Engineers have created an interactive decision tree aimed at finding the best solution for specific oil spill scenarios. Numerous chemical dispersant technologies are available to address different types of oil spills and countless variables and external conditions can play into the effectiveness of any given dispersant. The decision-making tool helps bridge this gap to determine how a dispersant technology will perform under different spill scenarios.

  • Climate threatsNear-term climate prediction “coming of age”

    The quest for climate scientists to be able to bridge the gap between shorter-term seasonal forecasts and long-term climate projections is “coming of age,” a study shows. The research has shown the true capabilities of near-term climate predictions, out to just a few years ahead.

  • Mexico violence2018 sets recod for violent death inMexico

    In 2018, Mexican police investoigators opened 33,341 murder investigations related to to drug and gang violence, setting a new record, according to the latest data published by the Mexican authorities. The overwhelming majority of those killed were menm but 861 women also lost their lives. The 2018 figures are the largest since national records began in 1997.

  • PrivacyOn Facebook and Twitter, even if you don’t have an account, your privacy is at risk

    Individual choice has long been considered a bedrock principle of online privacy. If you don’t want to be on Facebook, you can leave or not sign up in the first place. Then your behavior will be your own private business, right? A new study shows that privacy on social media is like second-hand smoke. It’s controlled by the people around you.

  • Election interferenceForeign interference in US elections dates back decades

    By Bradley W. Hart

    Americans have spent the last 18 months wondering about Russian influence in the 2016 presidential election. Donald Trump would not be the first U.S. politician that foreign powers tried to help. In fact, two campaigns, in 1940 and 1960, featured bold attempts by hostile foreign powers to put their preferred candidates in the Oval Office. While neither was successful, both highlight a vulnerability in the American political system that, for the first time, has become the subject of major public discussion.

  • Cyber operationsQuestioning the effectiveness of offensive cyber operations

    Great-power competition in the twenty-first century increasingly involves the use of cyber operations between rival states. But do cyber operations achieve their stated objectives? What are the escalation risks? Under what conditions could increasingly frequent and sophisticated cyber operations result in inadvertent escalation and the use of military force? The answers to these questions should inform U.S. cybersecurity policy and strategy.

  • WargamesBenefits of next-generation wargames

    Technological advances for game engines and cloud architectures are fueling the development of next-generation wargames that can increase insights for policymakers. Researchers say that the new technologies are making wargame tools more accessible and providing strategists with more insights.

  • Migrants & healthWHO: Migrants do not bring diseases into Europe

    A new report by the World Health Organization disputes a belief that refugees and migrants bring exotic communicable diseases into the European region. The report is based on evidence from more than 13,000 documents. It provides a snapshot of the health of refugees and migrants who comprise about 10 percent of the nearly 1 billion population in 53 European countries.

  • Water securitySierra snowpack could drop by nearly 80% by end of century

    A future warmer world will almost certainly feature a decline in fresh water from the Sierra Nevada mountain snowpack. Now a new study that analyzed the headwater regions of California’s 10 major reservoirs, representing nearly half of the state’s surface storage, found they could see on average a 79 percent drop in peak snowpack water volume by 2100.

  • Our picksSurveillance: a political solution; securing 5G; the state of cybersecurity, and more

    ·  Surveillance is a tech problem, but it requires a policy solution

    ·  Do USF police radios work on campus? Lawsuit raises questions, campus shootings raise the stakes

    ·  Former MS-13 member who secretly helped police is deported

    ·  If 5G is so important, why isn’t it secure?

    ·  The state of cybersecurity today

    ·  Education industry not making the grade for cybersecurity

    ·  Government can’t force people to unlock phones using facial recognition, fingerprints: Federal judge

    ·  Scientists warn of climate ‘time bomb’ for world’s groundwater

    ·  Shutdown delays training for storm spotters, “the nation’s first line of defense against severe weather”

    ·  Senators worry that new D.C. Metro railcars could carry cyber risk

  • The Africa watchKenya’s terror woes; Al-Qaeda disciples; normalizing Ebola, and more

    ·  Thousands of Nigerian refugees fleeing Boko Haram forced back by Cameroon

    ·  Al-Qaeda disciples still a potent threat to African business hub

    ·  America’s new policy in Africa is an attempt to contain Chinese and Russian influence

    ·  IMB: Gulf of Guinea led the world for piracy in 2018

    ·  Abiy’s Ethiopia pardons 13,000 accused of treason or terrorism

    ·  Ebola has gotten so bad, it’s normal

    ·  In eastern Burkina Faso, local grievances help militancy take root

    ·  Rwanda’s Khashoggi: Who killed the exiled spy chief?

    ·  Legacy of Benghazi: Marine force stays ready for quick Africa deployment

    ·  Ethiopia allows almost 1 million refugees to leave camps, go to work

    ·  Zimbabwe in ‘total internet shutdown’ amid violent crackdown

    ·  Burundi to change its capital city

    ·  The changing face of terrorism in East Africa

    ·  Latest attack may deal new blow to Kenya’s global terror ranking

  • Iran’s nukesWeapons experts: Archives show that Iran was likely developing nuclear warheads

    Documents in the Iranian nuclear archive captured by Israel last year show that Iran built an underground facility, which was likely used for the development of nuclear warheads, a paper published Friday by the Institute for Science and International Security charged.

  • ExtremismGerman police raid suspected KKK members' homes

    German police on Wednesday conducted raids on several properties throughout Germany connected to an extremist group which associates itself with the American Ku Klux Klan. Germany’s domestic intellig agency said around forty people are either under surveillance or investigation for connections with the extreme-right group.

  • ExtremismThe KKK is active in Germany

    The KKK’s sway on the racist, far-right end of the spectrum has declined as other, more contemporary hate groups have emrged as part of the alt-right. In Germany, however, some violent groups on the right fringe have associated themselves with the KKK. An author of a recent book on the KKK in Germany discusses the danger of the KKK and why it has emetrged on the German right fringe.

  • TerrorismFar-right German journalist implicated in firebombing of Hungarian center in Ukraine

    A Polish man accused of involvement in the firebombing of a Hungarian cultural center in western Ukraine last year says he received instructions on the attack from a German journalist who has worked as a consultant for a German parliament deputy with the anti-immigrant Alternative for Germany (AfD) party.

  • CybersecurityData breaches are inevitable – here’s how to protect yourself anyway

    By W. David Salisbury and Rusty Baldwin

    It’s tempting to give up on data security altogether, with all the billions of pieces of personal data – Social Security numbers, credit cards, home addresses, phone numbers, passwords and much more – breached and stolen in recent years. But that’s not realistic – nor is the idea of going offline entirely. In any case, huge data-collection corporations vacuum up data about almost every American without their knowledge. As cybersecurity researchers, we offer good news to brighten this bleak picture. There are some simple ways to protect your personal data that can still be effective, though they involve changing how you think about your own information security.

  • DronesDrones to make traffic crash site assessments safer, faster, more accurate

    In 2016, there were more than 7 million police-reported traffic crashes in which 37,461 people were killed and an estimated 3,144,000 were injured. Idling in a long highway line of slowed or stopped traffic on a busy highway can be more than an inconvenience for drivers and highway safety officers. It is one of the most vulnerable times for “secondary accidents,” which often can be worse than an original source of the slowdown.

  • FloodsConnected vehicles’ windshield wipers could help prevent flooding

    We’ve been promised all kinds of benefits from a future of connected vehicles, but flood control? One of your car’s oldest features has been put to a new, high-tech use by University of Michigan researchers. Utilizing a test fleet in the city of Ann Arbor, engineers tracked when wipers were being used and matched it with video from onboard cameras to document rainfall. They found that tracking windshield wiper activity can provide faster, more accurate rainfall data than radar and rain gauge systems we currently have in place.