• Cybersecurity

    The heads of the Federal Bureau of Investigation(FBI), Department of Homeland Security(DHS), and National Counterterrorism Center(NCTC) have declared cyber attacks as the most likely form of terrorism against the United States in the coming years. “That’s where the bad guys will go,” FBI director James Comey said about cyberterrorism. “There are no safe neighborhoods. All of us are neighbors [online].”

  • African security

    French Foreign Minister Laurent Fabius has confirmed that France is considering providing Libya additional aid in counter-terrorism and police training. Since the NATO-supported revolt removed Muammar Gaddafi from office two years ago, Libya has not had an effective central government, and the country has turned into a battleground for rival militias and al Qaeda-linked militants.

  • 3D printed firearms

    The Undetectable firearms Act of 1988, which makes it illegal to manufacture, import, sell, ship, deliver, process, transfer, or receive a firearm which is not detectable by walk-through metal detection, is set to expire on 9 December 2013. If Congress fails to reauthorize the law, plastic guns will no longer require metal components which are detectable by metal detectors. “When these 3D firearms are manufactured, some of the weapons can defeat normal detection such as metal detectors, wands, and it could present a problem to public safety in a venue such as an airport, an arena, a courthouse,” says ATF assistant director Richard Marianos.

  • Counterinsurgency

    Counterinsurgency (COIN) efforts by the West, particularly over the past decade, have emphasized the limitation of violence and the importance of the local population. Western COIN practice focuses on establishing the perception of state legitimacy in the area around which the insurgency is taking place. The objective is to sway influence away from the insurgents and towards the regime by providing security, services, stability and growth. By contrast, Syrian efforts in counterinsurgency have not only avoided securing the civilian population, but have actively targeted it. Whereas Western COIN prioritizes “the people,” the Syrian strategy focuses on the elimination of the militant opposition regardless of the collateral violence. Assad’s “enemy-centric” approaches to counterinsurgency utilizes intense violence — targeting of refugees, schools, hospitals, and using chemical weapons — to divide public support from the insurgency by punishing the civil population.

  • Aviation

    The Government Accountability Office(GAO) said last week that DHS may have wasted $1 billion on the Transportation Security Administration’s (TSA) Screening of Passengers by Observation Techniques (SPOT) program. SPOT aims to spot terrorists by detecting “anomalous” or suspicious behavior. The anomalous behavior – perspiration, fidgeting, restlessness – is supposed to be the result of high levels of stress, fear, or deception. Individuals who exhibit anomalous behavior are subject to additional security screening.

  • African security

    The State Department on Wednesday designated the Nigerian Islamist group Boko Haram as a foreign terrorist organization. The designation makes it possible for the United States to freeze the assets of the organization and its leaders and members, impose travel bans on members of the group, and prohibit Americans from offering material support to the organization. The department also designated Ansaru, a Boko Haram splinter faction, as a foreign terrorist organization. The United States says the designation would help the Nigerian government in fighting the growing threat of domestic Islamist terrorism.

  • African security

    FOI, the Swedish research institute, brought together scientists and experts from a number of countries to take part in a one-day conference at Medelhavsmuseet in Stockholm on illegal population flows and their consequences in Africa.

  • African security

    Al-Shabaab’s attack on the Westgate shopping mall in Nairobi last month has prompted security officials in Kenya and Somalia to consider the creation of a joint task force which will share intelligence, monitor activity, and track finances relating to terrorist groups operating in East Africa. Also under discussion is the establishment of a joint East African paramilitary force with jurisdiction throughout the region.

  • War

    War is hell, and according to new research, experiencing its horrors can cause people to have a greater affinity for members of their own group, particularly if they are exposed to warfare in early adulthood or later in childhood. The researchers say that these effects have the potential to explain why conflict sometimes leads to cycles of war and sometimes stimulates nation-building in its wake.

  • Surveillance

    In the wake of revelations about the NSA surveillance programs, an expert on surveillance and cybersecurity recommended a re-evaluation of those surveillance practices that weaken commercial products and services. These practices include weakening standards and placing “back doors” into products that are accessible to U.S. government agencies. The expert – Jon Peha, former chief technology officer of the FCC and assistant director of the White House’s Office of Science and Technology — said deliberately weakening commercial products and services may make it easier for U.S. intelligence agencies to conduct surveillance, but “this strategy also inevitably makes it easier for criminals, terrorists and foreign powers to infiltrate these systems for their own purposes.”

  • Terrorism

    The U.S. military has confirmed the killing of Ibrahim Ali Abdi, also known as Anta Anta, the explosives specialist who headed al-Shabaab’s bomb-making efforts with an expertise in suicide missions, road-side explosives, car bombs, and other homemade bombs. The administration had been reluctant to follow in Somalia the punishing drone campaign it has been conducting in Pakistan and Yemen for fears that such a campaign might transform al Shabaab from a regional organization focused on repelling foreign troops – from Kenya, Ethiopia, and the African Union — from Somalia into a group which adopted al Qaeda’s agenda to strike the West at every turn. The killing of Anta, and the failed raid three weeks ago to kill another Shabaab leader, Abdulkadir Mohamed Abdulkadir, are indications that the administration has decided to escalate the fight against the Somali group.

  • Terrorism

    The Strategic Multi-Layer Assessment office within the Office of the Secretary of Defense has published a new white paper, in Looking Back, Looking Forward: Perspectives on Terrorism and Responses to It Strategic Multi-layer Assessment, which offers discussions of different perspectives of terrorism and approaches to understanding the phenomenon. The papers cover topics ranging from strategic and adaptive considerations of terrorism to analytical considerations.

  • Africa

    Nigerian president Goodluck Jonathan last week led a large Nigerian delegation to an official visit in Israel to discuss cooperation in fighting terrorism. “There is no doubt that Israel has had decades of experience in combating terrorism. Nigeria can benefit tremendously from your experience in this area,” Jonathan told President Shimon Peres. The two countries have also seen an expansion of trade relationship between them, with more the fifty Israeli companies operating in Nigeria.

  • Syria

    Israel Air Force (IAF) planes on Wednesday night attacked and destroyed two military bases in Syria – one near Damascus and the other in Snobar Jableh, thirty kilometers south of the port city of Latakia. The Syrian military was preparing two large shipments of surface-to-air missiles – advanced versions of the SA-8 Gecko and S-125 Neva/Pechora – for delivery to Hezbollah. The IAF destroyed the missiles before they were loaded onto truck for the trip to Lebanon. Wednesday’s night attacks were the sixth and seventh attacks Israel launched against Syrian shipments of advanced arms to Hezbollah. The earlier five attacks took place on 30 January, 3 May, 5 May, 5 July, and 18 October.

  • DHS

    Analysts say that President Barack Obama’s nomination of Jeh Johnson to replace Janet Napolitano as head of the Department of Homeland Securityis an indication of a shift in DHS priorities — from a focus on immigration and border issues to a focus on security and counterterrorism.

  • Cybersecurity

    Cyber-security has become the new homeland security of the decade. Last year, then- Defense Secretary Leon Panetta issued a call to arms against cyberattacks, warning that sophisticated attacks against the United States could be America’s next “cyber Pearl Harbor.” It is imperative that we apply the same level of awareness and action as we have to the physical security of our facilities to ensure our security against this ever-evolving threat.

  • Detection

    By adapting superconducting technology used in advanced telescope cameras, researchers have built a prototype video imaging system for detecting hidden weapons and other threats at distances up to twenty-eight meters away.

  • Terrorism

    In the last thirty years, conflicts in Afghanistan, Iraq, Bosnia, Chechnya, Somalia, and other countries have caused the death of four million Muslims. The theme of innocent Muslims dying as result of conflicts initiated by Western powers and their allies is a central motif used by Islamic militants to recruit new members. It is a theme which fuels anti-American sentiments in the Middle East and North Africa. Historians and Islamic scholars note that the notion that the West is orchestrating a “genocide” of Muslim is patently false, and that beginning with the Iran-Iraq War (1980-88) and continuing to the present day, more and more casualties are inflicted by Muslims against Muslims. Still, the myth of a non-Muslim genocidal “crusade” against Muslims is powerful, and is one which is effectively used by al Qaeda and other Islamic terrorist groups.

  • Explosives detection

    A number of different tools are currently used for explosives detection. These range from dogs and honeybees to mass spectrometry, gas chromatography, and specially designed X-ray machines.A new acoustic detection system, consisting of a phased acoustic array that focuses an intense sonic beam at a suspected improvised explosive device, can determine the difference between those that contain low-yield and high-yield explosives.

  • Terrorism insurance

    The Terrorism Risk Insurance Act(TRIA) is a federal backstop designed to protect insurers in the event an act of terrorism results in losses above $100 million. Industry officials question whether cyber terrorism is covered by the program, which is administered by the Treasury Department. Industry insiders note that terrorism risks have evolved since TRIA was enacted and cyberterrorism is now a real threat. TRIA should thus not simply be reauthorized with a blanket stamp of approval; instead there should be a discussion about whether acts of cyberterrorism should be explicitly included in TRIA.