-
Former head of MI6 calls for new surveillance pact between governments and ISPs
The former head of British intelligence agency MI6, Sir John Sawers, has called for a new surveillance pact between Internet companies and U.S. and U.K. security services. Both groups could work together as they had in the past to prevent a repeat of terror events such as the recent Paris attacks, he said. American and British law enforcement and intelligence agencies are urging major Internet companies to provide backdoors or access to encrypted e-mails and other forms of Web communications. “I think one benefit of the last eighteen months’ debate [since Snowden’s leaks were made public] is that people now understand that is simply not possible [to keep the public secure without surveillance] and there has to be some form of ability to cover communications that are made through modern technology,” Sawers said.
-
-
Europe to tackle Jihadist radicalization in prison
The problem of prison radicalization is raising complicated questions for lawmakers and security officials across Europe. One problem: Thousands of Europeans have joined Islamic State in Syria and Iraq, and experts say that if apprehended upon returning home, these jihadists will be interned in European jails and continue their mission of radicalizing others, leading to an intensification of the problem of prison radicalization.
-
-
Belgium terror raids and Paris attacks reveal urgent need for pan-European security
In the immediate aftermath of major attacks in Paris, counter-terrorism raids in Belgium saw two suspected terrorists killed and another arrested. These incidents have dramatically raised the sense of insecurity across Europe — and they’ve done so at a time when Europe’s security infrastructure is struggling to cope with the threats it faces. European security agencies, both internal and external, must urgently improve their co-operation and co-ordination. After all, Europe’s security challenges know no borders, and they must be dealt with as such. The recent counter-terrorism operations and arrests across Europe show that security agencies are moving toward quicker and sharper preventative action. What they do not demonstrate is that there is yet any seriously coordinated approach to European security. Achieving that is central to reducing the sense of insecurity across Europe at a frightening and dangerous time. But there is little sign Europe is confident about how to do it without undermining the very freedoms it is trying to protect.
-
-
Police chiefs, sheriffs in major U.S. cities support immigration executive order
Twenty-seven chiefs of police and sheriffs from U.S. cities — including Los Angeles, Dallas, Denver, and Washington, D.C.— have joined the Major Cities Chiefs Associationto defend President Barack Obama’s executive order which extends deferred deportation to about five million undocumented immigrants. Many law enforcement officers around the country argue that Obama’s order will improve public safety by allowing many undocumented immigrants to feel secure enough to approach local police. They are more likely to report crime without fear of deportation, police chiefs and sheriffs assert.
-
-
Revolutionary weapon to be showcased at Future Force EXPO
The Electromagnetic Railgun program continues to move toward scheduled at-sea testing in 2016. Its revolutionary technology relies on electricity instead of traditional chemical propellants, with magnetic fields created by high electrical currents launching projectiles at distances over 100 nautical miles — and at speeds that exceed Mach 6, or six times the speed of sound. The Railgun will play a significant role in the future of the U.S. Navy, and it will be on display to the public for the first time on the East Coast 4-5 February at the Naval Future Force Science and Technology (S&T) EXPO in Washington, D.C.
-
-
No technological replacement exists for bulk data collection: Report
No software-based technique can fully replace the bulk collection of signals intelligence, but methods can be developed more effectively to conduct targeted collection and to control the usage of collected data, says a new report from the National Research Council. Automated systems for isolating collected data, restricting queries that can be made against those data, and auditing usage of the data can help to enforce privacy protections and allay some civil liberty concerns, the unclassified report says.
-
-
Keeping citizens safe while respecting their right to privacy
Surveillance is an increasingly common – and sometimes controversial – activity, designed fundamentally to protect public and property. The rapid increase in information gathered by surveillance cameras however has led to spiraling costs in terms of storage filtering and data checking, and has also led to concerns that innocent citizens are routinely being tracked. Using innovative new technology, EU-funded researchers have reconciled the need for robust surveillance with the right to privacy.
-
-
DHS S&T makes it easier and cheaper for first responders to communicate
A new low-cost interoperability solution developed by the Department of Homeland Security (DHS) Science and Technology Directorate (S&T) could save the first responder community millions of dollars.
S&T says that the Radio Internet Protocol Communications Module (RIC-M), used by local, state, and federal responders, is a low-cost, external, stand-alone, interface device that connects radio frequency (RF) system base stations, consoles and other RF equipment — regardless of brand — over the Internet or Private Internet Protocol (IP) network.
-
-
Realistic radiation detection training without using radioactive materials
Training of first responders on the hazards of actual radiological and nuclear threats has been challenged by the difficulties of adequately representing those threats. Training against such threats would involve using hazardous, highly radioactive materials, experiencing actual radiation doses in training, or require the distribution of radioactive material over a large geographical area. To avoid these issues in exercises to train responders, surrogate radioactive materials have been used, but these materials do not completely represent real threats due to their non-hazardous size and inability to be geographically distributed. Researchers have solved the problem by developing a new technology that provides realistic radiation detection training by directly injecting simulated radiation signals into the analog amplifier of the real detectors used by first responders and inspectors.
-
-
When the camera lies: our surveillance society needs a dose of integrity to be reliable
Being watched is part of life today. Our governments and industry leaders hide their cameras inside domes of wine-dark opacity so we can’t see which way the camera is looking, or even if there is a camera in the dome at all. They’re shrouded in secrecy. But who is watching them and ensuring the data they collect as evidence against us is reliable? Surveillance evidence is increasingly being used in legal proceedings, but the surveillants – law enforcement, shop-keepers with a camera in their shops, people with smartphones, etc. — have control over their recordings, and if these are the only ones, the one-sided curation of the evidence undermines their integrity. There is thus a need to resolve the lack of integrity in our surveillance society. There are many paths to doing this, all of which lead to other options and issues that need to be considered. But unless we start establishing principles on these matters, we will be perpetuating a lack of integrity regarding surveillance technologies and their uses.
-
-
Mobile app helps first responders choose the right biodetection technology
First responders have downloaded more than 10,000 copies of a guide to commercially available, hand-portable biodetection technologies created to help them determine what they might be up against in the field. Since many first responders do not always have immediate access to a computer, a mobile version of the guide is now available for cell phones and tablets. An updated version of the guide has just been released to help response organizations make informed decisions when procuring the right technology for their particular needs and circumstances.
-
-
Smart grenade seeks, finds enemy hiding behind barriers, walls
The Small Arms Grenade Munition (SAGM) round — a 40mm counter-defilade, air-bursting grenade designed for both the M203 and M320 launchers — will undergo evaluation in July 2015. The SAGM allows a soldier to target an enemy who is protected behind a barrier and have the munition explode, in the air, above the target. The SAGM does not require the soldier to conduct any kind of pre-fire programming sequence. The soldier aims the weapon and fires, and the round detects where a wall is and then explodes, in the air, after passing the wall. The SAGM round has been under development since January 2012.
-
-
Reducing uncertainty in designing complex military systems
Uncertainty is sometimes unavoidable, but in the world of scientific computing and engineering, at least, what is worse than uncertainty is being uncertain about how uncertain one is. Understanding with confidence the level of uncertainty in computational models used for designing complex military systems can be enormously beneficial, reducing costs and development times. DARPA program seeks novel mathematical research for quantifying and predicting uncertainty in design models as alternative to costly and repetitive testing.
-
-
Gunmen, holding hostages, surrounded by police in small town outside of Paris
As we put today’s HSNW issue to bed (06:00 EST), the French security forces are surrounding a printing facility in Dammartin-en-Goële , Seine- et-Marne, where the two brothers who shot and killed twelve people in and around the offices of Charlie Hebdo Wednesday are holed up, holding one or more hostages. We will continue to update the story as events unfold.
-
-
Terrorists develop tactics to evade U.S. drones
The CIA’s use of Predator drones against Islamic militants in the Middle East began shortly after the 9/11 attacks and has increased dramatically during the Obama administration. As the number of drone strikes in Yemen increased, AQAP militants began to develop tactics to hide themselves from a drone’s sensors.
-
More headlines
The long view
Are We Ready for a ‘DeepSeek for Bioweapons’?
Anthropic’s Claude 4 is a warning sign: AI that can help build bioweapons is coming, and could be widely available soon. Steven Adler writes that we need to be prepared for the consequences: “like a freely downloadable ‘DeepSeek for bioweapons,’ available across the internet, loadable to the computer of any amateur scientist who wishes to cause mass harm. With Anthropic’s Claude Opus 4 having finally triggered this level of safety risk, the clock is now ticking.”
“The Federal Government Is Gone”: Under Trump, the Fight Against Extremist Violence Is Left Up to the States
As President Donald Trump guts the main federal office dedicated to preventing terrorism, states say they’re left to take the lead in spotlighting threats. Some state efforts are robust, others are fledgling, and yet other states are still formalizing strategies for addressing extremism. With the federal government largely retreating from focusing on extremist dangers, prevention advocates say the threat of violent extremism is likely to increase.
Luigi Mangione and the Making of a ‘Terrorist’
Discretion is crucial to the American tradition of criminal law, Jacob Ware and Ania Zolyniak write, noting that “lawmakers enact broader statutes to empower prosecutors to pursue justice while entrusting that they will stay within the confines of their authority and screen out the inevitable “absurd” cases that may arise.” Discretion is also vital to maintaining the legitimacy of the legal system. In the prosecution’s case against Luigi Mangione, they charge, “That discretion was abused.”
Autonomous Weapon Systems: No Human-in-the-Loop Required, and Other Myths Dispelled
“The United States has a strong policy on autonomy in weapon systems that simultaneously enables their development and deployment and ensures they could be used in an effective manner, meaning the systems work as intended, with the same minimal risk of accidents or errors that all weapon systems have,” Michael Horowitz writes.
Ukraine Drone Strikes on Russian Airbase Reveal Any Country Is Vulnerable to the Same Kind of Attack
Air defense systems are built on the assumption that threats come from above and from beyond national borders. But Ukraine’s coordinated drone strike on 1 June on five airbases deep inside Russian territory exposed what happens when states are attacked from below and from within. In low-level airspace, visibility drops, responsibility fragments, and detection tools lose their edge. Drones arrive unannounced, response times lag, coordination breaks.
Shots to the Dome—Why We Can’t Model US Missile Defense on Israel’s “Iron Dome”
Starting an arms race where the costs are stacked against you at a time when debt-to-GDP is approaching an all-time high seems reckless. All in all, the idea behind Golden Dome is still quite undercooked.