-
-
ACLU: Terrorist Watch List hits one million names
ACLU claims terrorist watch list reached one million names; launches online watch list complaint form
-
-
TSA: ACLU’s terrorist watch list facts and figures are a myth
The Transportation Security Administration refutes the facts and figures used by the ACLU in the latter’s claim that the list is now 1-million strong
-
-
Cyber cafes to be monitored in India
Indian police places biometric systems and CCTV in more than 150 cyber cafes in order to catch cyber criminals in the act
-
-
Cybercrime gangs highly structured
The chain of command of a cybercrime gang is not unlike the Mafia, an evolution which shows how online crime is becoming a broad, well-organized endeavor
-
-
Criticism of delays in coordinating national emergency communication
Congress criticizes DHS for delays in coordinating a national emergency communications plan for first responders
-
-
Powerful laser blinds Moscow partygoers
Organizers of a rave party north of Moscow use a powerful laser to beam the partygoers, causing retinal burns and permanent eye damage to many; engineers accuse party organizers of “technical illiteracy”
-
-
U.S. intelligence services aware of vast Chinese espionage campaign
Multifaceted Chinese espionage campaign in the United States and other Western countries aims not only to steal military secrets, but also industrial secrets and intellectual property in order to help Chinese companies better compete in the global economy; Chinese government and state-sponsored industries have relied not only on trained intelligence officers, but also on the Chinese diaspora — using immigrants, students, and people of second- and third-generation Chinese heritage
-
-
California unveils GIS initiative
Geospatial Information Systems (GIS) enhance the technology for environmental protection, natural resource management, traffic flow, emergency preparedness and response, land use planning, and health and human services; California wants to avail itself of the technology’s benefits
-
-
Ground fighting and its tactical applications
Every grappler, Jiu-Jitsu practitioner, and wrestler thinks that if he can take the fight to the ground, he will win; there are, however, a few inherent problems with this approach
-
-
An HS Daily Wire conversation with Walter Hamilton of the International Biometrics Industry Association (IBIA)
Walter Hamilton, chairman of the Board of Directors of IBIA, talks about different biometric technologies, new and innovative biometric approaches, the role of biometric in security and commerce, biometrics in the theater of battle, and more
-
-
Banks' PIN codes susceptible to hackers' theft
Network of PIN codes’ thieves nets millions of dollars; hackers are targeting the ATM system’s infrastructure, which is increasingly built on Microsoft’s Windows operating system and allows machines to be remotely diagnosed and repaired over the Internet
-
-
U.K. critical infrastructure vulnerable
New report says last summer’s flood showed infrastructure’s vulnerability; funding for flood defenses was not sufficient or secure, undermining industry confidence, and there were not enough skilled engineers to deliver the protection from flooding needed
-
-
New Indian Point siren system scores high in full test
Test of new alarm siren system in the four counties surrounding the Indian Point nuclear plants in New York produce good grades
-
-
Is flooding really as big a risk to Britain now as terrorism?
In 2007 the U.K. saw disastrous summer flooding in Yorkshire and the Severn valley around Gloucester and Tewkesbury. These floods caused the largest peacetime emergency in Britain since the Second World War
-
More headlines
The long view
Tantalizing Method to Study Cyberdeterrence
Tantalus is unlike most war games because it is experimental instead of experiential — the immersive game differs by overlapping scientific rigor and quantitative assessment methods with the experimental sciences, and experimental war gaming provides insightful data for real-world cyberattacks.
Using Drone Swarms to Fight Forest Fires
Forest fires are becoming increasingly catastrophic across the world, accelerated by climate change. Researchers are using multiple swarms of drones to tackle natural disasters like forest fires.
Testing Cutting-Edge Counter-Drone Technology
Drones have many positive applications, bad actors can use them for nefarious purposes. Two recent field demonstrations brought government, academia, and industry together to evaluate innovative counter-unmanned aircraft systems.
European Arms Imports Nearly Double, U.S. and French Exports Rise, and Russian Exports Fall Sharply
States in Europe almost doubled their imports of major arms (+94 per cent) between 2014–18 and 2019–23. The United States increased its arms exports by 17 per cent between 2014–18 and 2019–23, while Russia’s arms exports halved. Russia was for the first time the third largest arms exporter, falling just behind France.
How Climate Change Will Affect Conflict and U.S. Military Operations
“People talk about climate change as a threat multiplier,” said Karen Sudkamp, an associate director of the Infrastructure, Immigration, and Security Operations Program within the RAND Homeland Security Research Division. “But at what point do we need to start talking about the threat multiplier actually becoming a significant threat all its own?”
The Tech Apocalypse Panic is Driven by AI Boosters, Military Tacticians, and Movies
From popular films like a War Games or The Terminator to a U.S. State Department-commissioned report on the security risk of weaponized AI, there has been a tremendous amount of hand wringing and nervousness about how so-called artificial intelligence might end up destroying the world. There is one easy way to avoid a lot of this and prevent a self-inflicted doomsday: don’t give computers the capability to launch devastating weapons.