• Hackers Could Have Breached U.S. Bioterrorism Defenses for Years, Records Show. We’ll Never Know Whether They Did

    The Department of Homeland Security stored sensitive data from the nation’s bioterrorism defense program on an insecure website where it was vulnerable to attacks by hackers for over a decade, according to government documents reviewed by the Los Angeles Times. The data included the locations of at least some BioWatch air samplers, which are installed at subway stations and other public locations in more than 30 U.S. cities and are designed to detect anthrax or other airborne biological weapons, Homeland Security officials confirmed. It also included the results of tests for possible pathogens, a list of biological agents that could be detected and response plans that would be put in place in the event of an attack.

  • U.S. School Spends $48 Million on Curved Corridors and Hiding Places to Foil Mass Shooters

    A school in the United States has spent $48 million redesigning its buildings with curved corridors, hiding places, and cement barriers in a bid to thwart mass shooters. The project at Fruitport High School in Michigan is aimed at reducing casualties in the event of an attack by hampering the sight lines available to a gunman in corridors. Cement barriers are being installed in hallways for pupils and teachers to take cover. Classroom windows looking on to hallways are being covered with impact-resistant film. Each classroom will also have a corner, called a “shadow zone,” that is not visible from the hallway.

  • Why a Domestic Terrorism Law Is a Terrible Idea

    There is a big push for the federal criminalization of domestic terrorism. Andrew C. McCarthy writes that the impulse, of course, is understandable but the push is attempting to address a non-problem because “There are no meaningful impediments to federal investigation and prosecution of domestic terrorism.” He adds: “We should never have to wait for foreign powers to attack before taking action to thwart them. With our own citizens, however, the line we draw is the planned or actual use of force. Until that threshold is crossed, anti-government agitation is protected, regardless of how obnoxious it may be.”

  • China’s Spies Are on the Offensive

    Espionage and counterespionage have been essential tools of statecraft for centuries, of course, and U.S. and Chinese intelligence agencies have been battling one another for decades. But what recent cases suggest is that the intelligence war is escalating—that China has increased both the scope and the sophistication of its efforts to steal secrets from the U.S.

  • Facebook, Google, Twitter and the “Digital Disinformation Mess”

    The preliminary results of Facebook’s long-awaited “bias” audit are out. The key takeaway? Everyone is still unhappy. The report is little more than a formalized catalog of six categories of grievances aired in Republican-led congressional hearings over the past two years. It doesn’t include any real quantitative assessment of bias. There are no statistics assessing the millions of moderation decisions that Facebook and Instagram make each day. The results are all the more remarkable because the audit was an exhaustive affair, the fruit of about a year of research led by former Republican Sen. Jon Kyl, encompassing interviews with scores of conservative lawmakers and organizations. “Despite the time and energy invested, the conspicuous absence of evidence within the audit suggests what many media researchers already knew: Allegations of political bias are political theater,” Renee DiResta wites.

  • How a “Political Astroturfing” App Coordinates Pro-Israel Influence Operations

    The Israeli-Palestinian conflict has long been a global battle, fought by hundreds of proxies in dozens of national capitals by way of political, economic, and cultural pressure. As the internet has evolved, so have the tools used to wage this information struggle. The latest innovation — a pro-Israel smartphone app that seeds and amplifies pro-Israel messages across social media — saw its first major test in May 2019. It offered a glimpse of the novel methods by which future influence campaigns will be conducted and information wars won.

  • We Need to Ban More Emerging Technologies

    With more and more innovation, there is less and less time to reflect on the consequences. To tame this onrushing tide, society needs dams and dikes. Just as has begun to happen with facial recognition, it’s time to consider legal bans and moratoriums on other emerging technologies. These need not be permanent or absolute, but innovation is not an unmitigated good. The more powerful a technology is, the more care it requires to safely operate.

  • Mapping Model Tracks How Hate Spreads and Adapts Online

    Online hate thrives globally through self-organized, scalable clusters that interconnect to form resilient networks spread across multiple social media platforms, countries and languages, according to new research. Researchers developed a mapping model to track how these online hate clusters thrive. The model outlines challenges to dismantling online hate groups worldwide.

  • Despite YouTube Policy Update, Anti-Semitic, White Supremacist Channels Remain

    For years, YouTube has officially prohibited content which promoted or condoned violence or incited hatred against individuals or groups based on core characteristics such as ethnicity, gender and sexual identity, and religion. In June 2019 it updated that policy with specific prohibitions against ideologies like white supremacy, which asserted the superiority of one group in order to justify discriminating against or persecuting other groups. An analysis by ADL’s Center on Extremism found that a significant number of channels on YouTube’s platform continue to disseminate anti-Semitic and white supremacist content despite the company’s June 2019 crackdown on hate speech.

  • Concerns Growing that China's Influence Operations Getting Bolder

    The U.S. intelligence community has warned that the battle for information dominance has been joined. Until now, much of the focus on been on Russia for its use of social media to meddle in a number of Western elections, including the 2016 U.S. presidential elections and, more recently, the 2018 congressional elections. But top U.S. intelligence officials have repeatedly warned Russia is not alone, and that other U.S adversaries would be using lessons from Moscow’s successes for their own purposes.

  • Russia’s and China’s Political Warfare Campaigns: How the West Can Prevail

    The United States and its allies are facing an unprecedented challenge: Russia and China, two authoritarian states possessing substantial human, economic, technological, and other resources; armed with conventional and nuclear forces which, in many respects, rival those held by the Western allies; and working actively to undermine the core interests of the West. Their operations are designed to subvert the cohesion of the Western allies and their partners; erode their economic, political, and social resilience; and undermine the West’s strategic positions in key regions. The Russian and Chinese regimes have made substantial progress towards these goals during the last two decades without conducting conventional military operations. Rather, Moscow and Beijing have employed sophisticated political warfare strategies and a wide range of mostly non-military instruments.

  • A How-To Guide for Identifying Terrorists by Their Behavior

    Terrorism is not owned by a particular organization or ideology. Rather, it’s a tactic deployed by anyone looking to use violence for some political or religious aim. And having not only government officials but everyday people understand that is key to catching additional would-be attackers before it’s too late.

  • The Fight in the Right: It Is Time to Tackle White Supremacist Terrorism Globally

    Robert Levinson, who served as the deputy director of U.S. Southern Command’s office in Washington, writes that after 9/11, it was made clear to the Southern Command that the fight against Al Qaeda would receive many more resources and much more attention that the effort to contain the FARC – the Marxist insurgency which had operated in Colombia since the early 1960s. The reason: The FARC was not considered a terrorist organization of “global reach.” You fight local terrorists by strengthening local governments and governance, while global terrorists involve much broader and more complicated efforts. Levinson writes: “By now it may be time to consider whether terrorism variously categorized as being inspired by white supremacy, white nationalism, Neo-Nazi, etc., and its various manifestations and adherents, has reached the threshold of “terrorists of global reach” who are now claiming victims in the United States homeland.”

  • U.S. to Allow Indefinite Detention of Migrant Children

    The administration said on Wednesday that it would remove limits on how long migrant children can be detained. The move would allow for migrant families detained at the Mexican border to be held until their asylum case is processed, which can take up to several months. In order to allow for indefinite detention, DHS said it would terminate the 1997 Flores Settlement Agreement, a legal ruling that barred the government from holding migrant children in detention for more than twenty days.

  • Facial Recognition: Ten Reasons You Should Be Worried About the Technology

    Facial recognition technology is spreading fast. Already widespread in China, software that identifies people by comparing images of their faces against a database of records is now being adopted across much of the rest of the world. It’s common among police forces but has also been used at airports, railway stations and shopping centers. The rapid growth of this technology has triggered a much-needed debate. Activists, politicians, academics and even police forces are expressing serious concerns over the impact facial recognition could have on a political culture based on rights and democracy.