• CybersecurityCybersecurity of Connected Autonomous Vehicles

    In the near future connected and autonomous vehicles (CAVs) are expected to become widely used across the world. Researchers have been working to improve the security, privacy and safety of CAVs by testing four innovations in the IoT-enabled Transport and Mobility Demonstrator. They were able to connect CAVs to other CAVs and roadside infrastructure more securely and privately.CAVs can now connect to each other, roadside infrastructure, and roadside infrastructure to each other more securely.

  • CybersecurityTests Find 125 Vulnerabilities in 13 Network Attached Storage Devices

    In a new, follow-up cybersecurity study of network attached storage (NAS) systems and routers since 2013, consulting and research firm Independent Security Evaluators (ISE) found 125 vulnerabilities in 13 IoT devices, reaffirming an industrywide problem of a lack of basic security diligence.

  • style=”display:inline-block;width:468px;height:60px”
    data-ad-client=”ca-pub-9143520698308305”
    data-ad-slot=”4086223553”>

    view counter
  • PerspectiveIf U.S. Claims of How the Saudi Oil Attack Went Down Are True, Then the Failure to Prevent It Is a Huge Embarrassment

    It has yet to be definitively established how the massively disruptive attacks this past weekend on a crucial Saudi oil facility took place. The version of events being advanced by U.S. officials, however — that most of the damage was from cruise missiles launched from Iran — raises the embarrassing question of why the U.S. military was unable to do anything about it. the airspace around Iran and Saudi Arabia is some of the best-defended and most intensively monitored on earth, thanks to the decades-long buildup of U.S. assets there. But on Saturday those defenses failed to prevent what U.S. officials have said were at least 17 separate strikes. Based on information made public about the strikes, defense insiders were left wondering how the U.S. military had fared so poorly in one of its primary missions in the region.

  • PerspectiveSensitive Personal and Financial Data of What’s Likely an Entire Country Leaked Online

    A chilling data leak on an unsecured server in Miami divulged sensitive personal and financial information of what appears to be the entire population of Ecuador. The discovery came from the internet security firm VpnMentor, which discovered the database containing more than 20 million individuals’ data—including as many as 7 million minors—on an exposed Florida-based server belonging to the Ecuadorian data and analytics company Novaestrat.

  • PerspectiveWhat’s the New Terror Financing Executive Order All About?

    Prior to September 25, 2001, the United States used two primary tools to designate terrorists. In 1995, President Bill Clinton issued Executive Order 12947 in an effort to provide the State and Treasury Departments the legal authority to designate terrorist groups who were disrupting the “Middle East Process.” E.O. 12947 was narrowly scoped and did not provide the United States the ability to sanction groups or individuals disconnected from violence in the Middle East. Two years later, Congress passed legislation providing the State Department the ability to designate Foreign Terrorist Organizations (FTOs) pursuant to the Immigration and Nationality Act. “Simply put, terrorism designations, much like the threat posed by al-Qaeda, were an afterthought before 9/11,” Jason Blazakis writes. That changed last week when President Donald Trump updated E.O. 13224 to expand both State and Treasury’s ability to wield sanctions against terrorists.

  • Our picksAnti-China Tech Alliance | Ransomware’s New Target | Microgrids & Wildfires, and more

    ·  The Great Anti-China Tech Alliance

    ·  Cyber War as an Intelligence Contest

    ·  Ransomware Has a New Target

    ·  Arrested Canadian Official Oversaw Russia Probe

    ·  NRA Sues San Francisco over Terrorist Defamation

    ·  U.S. Treasury: Crypto Could Be “Next Frontier” in the War on Terror

    ·  Manchester Arena: Evidence Would “Help Terrorists” If Made Public

    ·  Could “Microgrids” Act as PG&E Outage Safeguard?

    ·  California Farmers Are Planting Solar Panels as Water Supplies Dry Up

    ·  Pro-Vaccination Parents Need to Be Louder to Fight the Big Platform Anti-Vax Voices Have Built

  • Perspective: China syndromeFearing “Spy Trains,” Congress May Ban a Chinese Maker of Subway Cars

    A Chinese state-owned company called CRRC Corporation, the world’s largest train maker, completed the $100 million facility this year in the hopes of winning contracts to build subway cars and other passenger trains for American cities like Chicago and Washington. But growing fears about China’s economic ambitions and its potential to track and spy on Americans are about to quash those plans. Lawmakers — along with CRRC’s competitors — say they are concerned that subway cars made by a Chinese company might make it easier for Beijing to spy on Americans and could pose a sabotage threat to American infrastructure. Critics of the deal speculate that the Chinese firm could incorporate technology into the cars that would allow CRRC — and the Chinese government — to track the faces, movement, conversations or phone calls of passengers through the train’s cameras or Wi-Fi.

  • Perspective: China syndromeHuawei's Dominance of Africa's Mobile Networks Mean More Spying on African Citizens

    Chinese tech firm Huawei has been increasing its footprint across Africa, providing countries with new technology and telecommunications equipment, including most notably 4G and 5G mobile networks. Some of this expansion has involved Huawei technicians helping governments in Africa to spy on their political opponents.

  • Perspective: AI & cybersecurityHow Artificial Intelligence Is Changing Cyber Security Landscape and Preventing Cyber Attacks

    With the genuinely significant potentials of Artificial Intelligence, the probability of attackers weaponizing it and using it to boost and expand their attacks is a huge threat. One of the biggest concerns is that hackers can use AI to automate cyberattacks on a massive scale. Now, our adversaries are relying on human resources to craft and coordinate their attacks. Cybercrime and cybersecurity landscape are going to change –not for the better – if and when they learn to use AI and machine learning to do the dirty work. So, the three main implications of Artificial Intelligence to the threat landscape are the augmentation of today’s threats and attacks, the development of new threats, and the variation of the nature of existing threats.

  • Perspective: RansomwareNorth Korean Hacking Groups Hit with Treasury Sanctions

    The Department of the Treasury hit three North Korean groups with new sanctions Sept. 13 for conducting cyberattacks against critical infrastructure, including the infamous WannaCry ransomware attacks. Treasury’s Office of Foreign Asset Control announced that Lazarus Group, an advanced persistent threat believed to be working at the behest of the North Korean government and two of its subgroups, dubbed Bluenoroff and Andariel, was responsible for unleashing WannaCry, which wrought havoc across hospital and health care organizations in as well as other sectors in the United Kingdom and other industrial sectors in 2017, as well as the 2014 Sony hack.

  • Perspective: Cyber bombWest Needs to Be Ready for Terrorist “Dirty” Cyber Bomb

    The West must take necessary precautions to prevent terrorists from launching a “dirty” cyber bomb, Lt.-Gen. (ret.) Vincent Stewart, who stepped down a few months ago from his post as deputy head of the US Cyber Command. Stewart that while the West took cyberattacks from nation-states seriously, it is vastly underestimating the danger of a massive ISIS or al-Qaeda cyberattack which could cripple a country’s entire infrastructure. While drawing attention to cyber terrorism, Stewart acknowledged that a nation state like Russia was still the most dangerous cyber adversary with “Russia viewing itself as a global power” and Russian President Vladimir “Putin believing he is almost the czar.”

  • Perspective: The Russia connectionNew Clues Show How Russia’s Grid Hackers Aimed for Physical Destruction

    For nearly three years, the December 2016 cyberattack on the Ukrainian power grid has presented a menacing puzzle. Two days before Christmas that year, Russian hackers planted a unique specimen of malware in the network of Ukraine’s national grid operator, Ukrenergo. Just before midnight, they used it to open every circuit breaker in a transmission station north of Kyiv. The result was one of the most dramatic attacks in Russia’s , an unprecedented, automated blackout across a broad swath of Ukraine’s capital. In an insidious twist in the Ukrenergo case, Russia’s hackers apparently intended to trigger that destruction not at the time of the blackout itself but when grid operators turned the power back on, using the utility’s own recovery efforts against them.

  • Perspective: Europe & immigrationWill Denmark Become Like Sweden?

    Denmark has experienced 10 bombings since February. The latest took place on August 27 in a residential complex, Gersager, in the Greve area, very close to Copenhagen. No one was injured, but the building was seriously damaged. This year, the Swedish city of Malmö has experienced 19 bombings. Sweden is exporting not only its bombings to Denmark. Gang crime, with its shootings and murders, has also traveled across the border. As to the nationality of migrants engaged in crime, statistics show that Lebanese male migrants are engaged in crime almost four times as much as the average Dane. They are followed by male descendants from Somalia, Morocco, and Syria.

  • Perspective: Border Patrol“People Actively Hate Us”: Inside the Border Patrol’s Morale Crisis

    For decades, the Border Patrol was a largely invisible security force. Agents called their slow-motion specialty “laying in” — hiding in the desert and brush for hours, to wait and watch, and watch and wait. Two years ago, when President Trump entered the White House with a pledge to close the door on illegal immigration, all that changed. “No longer were they a quasi-military organization tasked primarily with intercepting drug runners and chasing smugglers,” four New York Times journalists write. “Their new focus was to block and detain hundreds of thousands of migrant families fleeing violence and extreme poverty — herding people into tents and cages, seizing children and sending their parents to jail, trying to spot those too sick to survive in the densely packed processing facilities along the border.”

  • Perspective: Mind gamesThe Secret History of Fort Detrick, the CIA’s Base for Mind Control Experiments

    Suburban sprawl has engulfed Fort Detrick, an Army base 50 miles from Washington in the Maryland town of Frederick. seventy-six years ago, however, when the Army selected Detrick as the place to develop its super-secret plans to wage germ warfare, the area around the base looked much different. In fact, it was chosen for its isolation. For decades, much of what went on at the base was a closely held secret. Directors of the CIA mind control program MK-ULTRA, which used Detrick as a key base, destroyed most of their records in 1973. Some of its secrets have been revealed in declassified documents, through interviews and as a result of congressional investigations. Together, those sources reveal Detrick’s central role in MK-ULTRA and in the manufacture of poisons intended to kill foreign leaders.

  • Perspective: Homegrown terrorismHow to Act against Domestic Terrorists — and Their Foreign Supporters

    The United States faces a surging domestic terrorism threat in the homeland. In the aftermath of the El Paso and Dayton shootings in the first weekend of August, more than 40 people were   arrested for threats to commit mass attacks by the end of that month. GW Program on Extremism suggests two ways to achieve a more effective and coordinated multisector response to the domestic terrorism threat. First, specific criminal statutes for domestic terrorism offenses need to be enacted that penalize the commission of specific violent crimes. Acknowledging concerns that new criminal statutes related to property damage may stifle legitimate protest, new criminal statutes could be limited to violence against persons and providing material support to terrorists. Second, the list of proscribed foreign terrorist organizations (FTOs) should include far-right actors outside of the United States.

  • Perspective: Business & paramilitariesWPB Judge Tosses Suits Accusing Chiquita of Helping Terrorists Kill Colombians

    About 220,000 Colombians were killed in the civil war which raged in Colombia between 1964 and 2016. Most of the victims were killed by two Marxist insurgency groups, the FARC and the ELN. Many, however, were killed by various right-wing paramilitary groups which often coordinated their activities with government forces. A number of Colombians whose relatives were killed by paramilitary violence sued Chiquita Brands International in a Florida court for providing financial assistance to the paramilitary groups. Their hopes for success faded this month when U.S. District Judge Kenneth Marra threw out their claims.

  • Perspective: ApocalypseA Terrifying New Animation Shows How 1 “Tactical” Nuclear Weapon Could Trigger a U.S.-Russia War that Kills 34 Million People in 5 Hours

    More than 91 million people in Russia, the U.S., and NATO-allied countries might be killed or injured within three hours following a single “nuclear warning shot,” according to a terrifying new simulation developed by Princeton University researchers. The initial tactical phase of the simulation shows about 2.6 million casualties over three hours. The simulation shows that the exchanges in the tactical phase would soon escalate to the strategic level, in which both Russia and NATO would launch warheads toward each other’s 30 most populous cities in the final stage of the scenario, using five to 10 warheads for each city depending on its size. This phase would cause 85.3 million casualties — both deaths and injuries. But the total casualty count from the entire battle (of less than 5 hours) would be 34.1 million deaths and 57.4 million injuries, or a combined 91.3 million casualties overall.

  • Perspective: ApocalypseIn the Event of a Killer Asteroid, Volcanic Apocalypse, or Nuclear Holocaust, Mushrooms Could Save Humanity from Extinction

    About 66 million years ago, an asteroid plummeted through Earth’s atmosphere and crashed into the sea floor, creating an explosion over 6,500 times more powerful than the nuclear bomb the U.S. dropped on Hiroshima. The impact sent clouds of debris and sulfur into Earth’s atmosphere, blocking the sun’s light and warmth for about two years. Photosynthesis ground to a halt, which meant no more plant growth. The surviving dinosaurs starved to extinction. But fossil records show that fungi thrived in the aftermath. “Blot out the sun, and even the best-prepared survivalist, a master of the wilderness, will starve to death along with everyone else,” Bryan Walsh writes in his new book, End Times. In order to survive, he says, people would need to adopt sunlight-free agriculture — cultivating mushrooms, rats, and insects.

  • Perspective: Water woesBottled Water Is Sucking Florida Dry

    Florida has the largest concentration of freshwater springs in the world, but they are being devastated by increasing pollution and drastic declines in water flow. Some springs have dried up from overextraction; others have shown signs of saltwater intrusion and harmful algae blooms. The answer to this problem is simple: No more extraction permits should be granted, and existing permits should be reduced with the goal of eliminating bottled water production entirely in Florida. But that simple solution is not being implemented. In the next few months, Nestlé, the largest bottled-water company in the world, is set to renew its permit at Ginnie Springs, one of the most popular recreational attractions along the Santa Fe River,” Sainato and Skojec write. “The permit allows Nestlé to take one million gallons per day at no cost, with just a one-time $115 application fee.”

  • Perspective: Water woesThe Water Wars Are Here

    Everyone remembers the scene in Chinatown when Jack Nicholson almost gets his nose sliced off, but many do not recall what the dispute was about. It wasn’t drug smuggling or gun running that got Nicholson’s character slashed. It was water rights. Since the film was released in 1974, the question of who will get the limited water in the American West, particularly the all-important flow of the Colorado River, has grown even more contentious. Dystopian novels and movies predict a future in which people fight it out for every last drop of water to quench the thirst of expanding cities, parched agriculture, and wasteful suburban grass lawns. But the future is already here.

  • Perspective: Mitigating climate crisisCan We Engineer Our Way Out of the Climate Crisis?

    The Climate Apocalypse is upon us. More carbon monoxide has been discharged into the atmosphere in the last 50 years than in the whole of human history that went before. Carbon traps heat and the world is getting hotter. Heat holds water vapor and so rainfall is getting more frequent while heat waves last longer. Ice at the poles melts and coastal cities face inundation as sea levels rise. The doom confidently predicted by many climate scientists around the world is being met by optimism among other scientists who are employing innovative technologies that may transform the debate and offer hope for us all. These technological breakthroughs will impact all aspects of climate change from carbon emissions to food production and all forms of energy.