• Get MS-13 out of our schools

    By The Leader newspapers

    This past week saw a horrific MS-13 gang knife attack against a 16-year-old Huntington High School student at the Burger King on New York Avenue in Huntington.  The student was eating after class with several classmates when they noticed three gang members glaring at them.  When they tried to leave, the gang attacked, stabbing the 16 year old in the back. The police and the high school need to protect our children. We need a “zero tolerance” policy and to expel and - if illegal deport - anyone involved with MS-13.  The high school and the police have a lot of explaining to do.

  • ExtremismDNC becomes latest organization to disavow Women’s March amid anti-Semitism scandal

    In a major blow, the Democratic National Committee (DNC) has joined the long list of groups that have broken with the Women’s March over allegations of anti-Semitism. The move comes a day after Women’s March co-president Tamika Mallory refused to explicitly condemn Nation of Islam Leader Louis Farrakhan on the ABC show, The View, in a heated exchange with hosts Sunny Hostin and Meghan McCain, who grilled Mallory about the hate preacher’s anti-Semitic views.

  • style=”display:inline-block;width:468px;height:60px”
    data-ad-client=”ca-pub-9143520698308305”
    data-ad-slot=”4086223553”>

    view counter
  • ExtremismFascist Forge: A new forum for hate

    White supremacist online forum Fascist Forge advertises itself as a “Home for the 21st Century Fascist,” and attracts some of the movement’s most extreme adherents. The forum emphasizes violent tactics. Some users advocate the creation of small terrorist cells, while others share how-to guides on guerrilla warfare, including military field and operation manuals, and instructions for building homemade bombs. Others suggest targeting infrastructure or recommend attacking people they perceive to be enemies of the white race.

  • PrivacyAmazon, Facebook and Google don’t need to spy on your conversations to know what you’re talking about

    By Jason Nurse

    If you’ve ever wondered if your phone is spying on you, you’re not alone. One of the most hotly debated topics in technology today is the amount of data that firms surreptitiously gather about us online. You may well have shared the increasingly common experience of feeling creeped out by ads for something you recently discussed in a real life conversation or an online interaction. Tech companies don’t need to listen to your phone calls or read you emails. Simply put, tech firms routinely gather so much data about you in other ways, they already have an excellent idea what your interests, desires and habits might be.

  • VaccinesProducing vaccines without the use of chemicals

    Producing vaccines is a tricky task – especially in the case of inactivated vaccines, in which pathogens must be killed without altering their structure. Until now, this task has generally involved the use of toxic chemicals. Now, however, an innovative new technology developed by Fraunhofer researchers – the first solution of its kind – will use electron beams to produce inactivated vaccines quickly, reproducibly and without the use of chemicals.

  • Coastal perilCoastal wetlands need to move inland in fight against climate change

    Up to 30 percent of coastal wetlands could be lost globally as a result of rising sea levels, with a dramatic effect on global warming and coastal flooding, if action is not taken to protect them, new research warns. The global study suggests that the future of global coastal wetlands, including tidal marshes and mangroves, could be secured if they were able to migrate further inland.

  • Our picksJudge: biometrics are the same as passwords; Pentagon’s yawning cyber gaps; anti-vaccine movement & measles, and more

    ·  Pacific Gas & Electric Corp. to file for bankruptcy as wildfire costs hit $30 billion; stock plunges

    ·  Trump’s wall fixation is impeding border security

    ·  Judge rules that biometrics are the same as passwords

    ·  The Pentagon has more than 250 cyber gaps in its networks, watchdog says

    ·  Los Angeles’ earthquake early warning system could save lives, but what about the rest of California?

    ·  Trends of human plague, Madagascar, 1998–2016

    ·  They roam public buildings, making videos. Terrorism experts say they may be dangerous

    ·  Measles cases at highest for 20 years in Europe, as anti-vaccine movement grows

  • The Russia watchTrump discusses U.S. withdrawal from NATO; Trump’s deference to the Kremlin; cuberattacks on Treasury bonds, and more

    ·  Trump has reportedly discussed withdrawing from NATO. That would be great for Russia.

    ·  Donald Trump’s pattern of deference to the kremlin is clear

    ·  The interpreter-gate fallout is here

    ·  Russian media on mute over Trump-Putin meetings

      Mueller probes an event with Nunes, Flynn, and foreign officials at Trump’s D.C. hotel

    ·  Mueller is holding top secret intelligence that will sink the Trump presidency

    ·  “The president has been acting on Russia’s behalf”: U.S. officials are shocked by Trump’s asset-like behavior

    ·  Cyberattack on Treasury bonds could be the missing ingredient for next economic crisis

  • China syndromeHuawei industrial espionage in Poland leads to calls for boycott

    The Chinese telecom giant’s industrial espionage activities in Poland have prompted calls for the company to be banned. The United States is leading the push for a boycott, but many EU governments remain undecided. Huawei offers a capable 5G technology, which represents a quantum leap in wireless communication speed, and which will be key to developing the Internet of Things (IoT), including self-driving cars. Critics charge that much of that technology was stolen from Western companies by Chinese intelligence agencies, for which Huwawei serves as a front.

  • Radicalization in prisonReducing prison radicalization by placing terrorists in general prison populations

    New research shows people imprisoned on terrorism offenses stand a better chance of being rehabilitated when placed in general prison populations, than when kept in isolation or in a separate location with other terrorists. The study challenges the traditional view that violent extremist offenders will spread their radical ideology amongst other prisoners.

  • Considered opinion: Investigating the presidentOn what grounds can the FBI investigate the president as a counterintelligence threat?

    By Jack Glodsmith

    “Let’s stipulate for purposes of argument that Putin has compromising information on Trump, and that the FBI has Trump on tape unambiguously pledging fealty to Putin and promising to serve as his agent in carrying out a number of concrete orders from the Russian president to damage U.S. intelligence operations (for example, by exposing U.S. spies and U.S. intelligence operations),” Harvard Law School’s Jack Glodsmith writes. In this situation, could the FBI seek a FISA warrant premised on the claim that the president was an agent of a foreign power? “The answer based on [my analysis] may be ‘no,’ at least to this extent: the FBI cannot act in a way that is legally premised on second-guessing the president’s national security bona fides. On this view, the FBI can fully investigate Russia’s interference with the 2016 election, including matters involving the president, as it has been doing for a while now. But it cannot cross the line of taking investigative steps premised on the president’s threat to national security. The Constitution leaves crossing that line up to Congress and the American people.”

  • CybersecurityThe quiet threat inside ‘internet of things’ devices

    By Charles T. Harry

    As Americans increasingly buy and install smart devices in their homes, all those cheap interconnected devices create new security problems for individuals and society as a whole. The problem is compounded by businesses radically expanding the number of sensors and remote monitors it uses to manage overhead lights in corporate offices and detailed manufacturing processes in factories. Governments, too, are getting into the act – cities, especially, want to use new technologies to improve energy efficiency, reduce traffic congestion and improve water quality. The number of these “internet of things” devices is climbing into the tens of billions. They’re creating an interconnected world with the potential to make people’s lives more enjoyable, productive, secure and efficient. But those very same devices, many of which have no real security protections, are also becoming part of what are called “botnets,” vast networks of tiny computers vulnerable to hijacking by hackers.

  • EncryptionAchieving better security with randomly generating biological encryption keys

    Data breaches, hacked systems and hostage malware are frequently topics of evening news casts — including stories of department store, hospital, government and bank data leaking into unsavory hands — but now a team of engineers has an encryption key approach that is unclonable and not reverse-engineerable, protecting information even as computers become faster and nimbler.

  • ForensicsCold-case investigation is helped by forensic artist

    remains on an unidentified person. “Without knowing who the victim is, it is nearly impossible to find a suspect,” said Lance Krout, lead investigator in the case. “I’ve spent several years working on this and it’s kept me up some nights because we’re not able to move into the next phase of the investigation if we don’t identify this victim.” Penn State 3D experts say they can help the police.

  • Airport securityDrone jamming system to protect European airports, public spaces

    Airports could be equipped with technology capable of detecting and bringing down drones that stray into their air space, according to Dan Hermansen, chief technology officer of Danish anti-drone firm MyDefence. The company has developed a drone alarm and protection system that is being installed at a number of prominent sites around Europe, including an airport. It has the potential to prevent the kind of costly disruption that hit London’s Gatwick and Heathrow airports recently.

  • AI will find you in the crowd; Alaska’s earthquake sensors; liberal European Islam?, and more

    ·  Trump mocks immigrants who follow legal procedure and attend their court hearings

    ·  What someone needs to explain to Trump about “national emergencies”

    ·  Trump’s brder wall: President eyes taking money from California flood projects to pay costs

    ·  “We have people counting on that”: Fla. governor weighs in on using hurricane funds for border wall

    ·  How America’s government shutdown is affecting flyers

    ·  FBI agents say the shutdown is a threat to national security

    ·  Want to cultivate a liberal European Islam? Look to Bosnia.

    ·  How AI will find you in the crowd, without facial recognition

    ·  Officials push to keep dozens of earthquake sensors slated for removal across Alaska

      Ryuk ransomware shows Russian criminal group is going big or going home

  • The Russia watchThe obstruction was the collusion?; 18 reasons Trump could be a Russian asset; The dueling narratives on Trump and Russia, and more

    ·  What if the obstruction was the collusion? On the New York Times’s latest bombshell

    ·  Why the FBI’s investigation into the president was unavoidable

    ·  Here are 18 reasons Trump could be a Russian asset

    ·  Subpoena the interpreter

    ·  Trump’s AG nominee pledges to allow Mueller to complete investigation

    ·  Kremlin blessed Russia’s NRA operation, U.S. intel report says

    ·  The dueling narratives on Trump and Russia

    ·  The weekend’s Trump-Russia news, explained

  • Border securityTrump's threat of national emergency declaration explained

    During a visit to the southern border Thursday, President Donald Trump again threatened to use emergency powers to bypass Congress and get billions of dollars to pay for a wall on the U.S.-Mexico border as a partial U.S. government shutdown over the issue stretched into its 20th day. What does such a declaration mean?

  • Considered opinion: Border securityTerrorists and the southern border: Myth and reality

    By Nicholas Rasmussen

    Taken at face value, rhetoric from the White House and DHS would lead Americans to believe that the United States is facing a terrorism crisis at our southern border. The situation being described is one in which thousands of terrorists have been stopped crossing our southern border to infiltrate the Homeland. If that were true, that would indeed be a crisis. Nicholas Rasmussen, who served as director of the National Counterterrorism Center (NCTC) under Presidents Obama and Trump, writes that “In reality, no such crisis exists. U.S. federal courthouses and prisons are not filled with terrorists captured at the border. There is no wave of terrorist operatives waiting to cross overland into the United States. It simply isn’t true. Anyone in authority using this argument to bolster support for building the wall or any other physical barrier along the southern border is most likely guilty of fear mongering and willfully misleading the American people.”

  • GunsWhat we know about the effectiveness of universal gun background checks

    By Alex Yablon

    This Tuesday, newly dominant House Democrats revealed legislation that would require all gun buyers go through a background check, regardless of whether they buy a weapon from a licensed dealer, collector at a gun show, or stranger in a parking lot. Universal background checks are popular and enjoy political momentum. Poll after poll shows they win near universal approval. But it’s worth asking how effective universal background checks are at reducing gun violence. And the real-world evidence that they reduce crime is more complicated than the political momentum might suggest.

  • GunsNational Collaborative on Gun Violence Research releases first request for research proposals

    The National Collaborative on Gun Violence Research, a philanthropic fund created to support scientific research on gun policy, earlier this week released its first request for proposals to support up to $10 million in projects during its first grantmaking cycle.

  • The Russia connectionManafort wanted polling data sent to Ukrainians

    When, during the 2016 campaign, Paul Manafort sent Trump campaign’s internal polling data to Konstantin Kilimnik – a cut-out for the GRU, Russia’s military intelligence branch — he intended that data to be handed off to two Kremlin-allied Ukrainian oligarchs, Serhiy Lyovochkin and Rinat Akhmetov. Manafort told his accountant in August 2016 he was expecting $2.4 million from Ukraine in November 2016. His spokesman insists that money was payment for an old debt and not the data.