-
World Cup 2018: British intelligence briefs players, staff on Russian cyberthreats
The U.K. Football Association (FA) said it was taking cybersecurity seriously this summer – the Soccer World Cup tournament will be held in Russia from 15 June to 15 July — and will be taking advice from the National Cyber Security Center (NCSC) at the GCHQ (the British equivalent of the U.S. NSA). The England team will be briefed by GCHQ staff before flying out to the World Cup to help them stay safe from Russian hackers.
-
-
Reintegrating extremists: “Deradicalization” and desistance
What is the most appropriate way of ensuring that returnees from the conflict in the Middle East do not go on to carry out attacks in the U.K.? Likewise, as those convicted of terrorism offenses in the U.K. continue to be released into the community at the end of their sentence, how do we ensure their positive transition into mainstream society?
-
-
Handgun purchaser licensing laws linked to fewer firearms homicides
State laws that require gun purchasers to obtain a license contingent on passing a background check performed by state or local law enforcement are associated with a 14 percent reduction in firearm homicides in large, urban counties, a new study finds.
-
-
Denmark bans burqas, niqabs in public
Denmark has become the latest European country to ban people from wearing clothes that cover the face in public. The Danish parliament in Copenhagen voted 75-30 on 31 May in favor of the ban, which effectively restricts people from wearing the burqas and niqabs worn by some Muslim women.
-
-
The era of fake video begins
“Deepfake” videos produced by Russian-linked trolls are the latest weapon in the ongoing fake news war. The Kremlin-backed trolls are already experimenting with new video manipulation techniques which use artificial intelligence to create convincing doctored videos. Franklin Foer writes the internet has always contained the seeds of postmodern hell, and that mass manipulation, from clickbait to Russian bots to the addictive trickery that governs Facebook’s News Feed, is the currency of the medium. In this respect, the rise of deepfakes is the culmination of the internet’s history to date—and probably only a low-grade version of what’s to come. Fake-but-realistic video clips are not the end point of the flight from reality that technologists would have us take. The apotheosis of this vision is virtual reality. “The ability to manipulate consumers will grow because VR definitionally creates confusion about what is real,” Foer writes. “Several decades ago, after giving the nascent technology a try, the psychedelic pamphleteer Timothy Leary reportedly called it ‘the new LSD’.”
-
-
Regulation or research? Searching for solutions to reduce Truth Decay in the media
What is social media’s role in the decline of trust in the media? Is government intervention needed to help stop the spread of misinformation on these platforms? These questions were the focus of a recent RAND Corporation event on the connection between the media and Truth Decay.
-
-
Winners announced in $300K biothreat prize competition
DHS S&T the other day announced the grand prize winner of its $300,000 Hidden Signals Challenge. The prize competition called for the design of an early warning system to keep communities safe by using existing data sources to uncover emerging biothreats.
-
-
Hacker accused of aiding Russian spies in massive breach gets prison
A Kazakh-born computer hacker who U.S. prosecutors say unwittingly worked with a Russian spy agency in a massive Yahoo data breach has been sentenced to five years in prison. Karim Baratov was named in an indictment last year that charged two Russian spies with orchestrating the 2014 Yahoo breach involving 500 million users — one of the largest breaches at any Internet company.
-
-
The federal government has long treated Nevada as a dumping ground, and it’s not just Yucca Mountain
Nevadans can be forgiven for thinking they are in an endless loop of “The Walking Dead” TV series. Their least favorite zombie federal project refuses to die. In 2010, Congress had abandoned plans to turn Yucca Mountain, about 100 miles northwest of Las Vegas, into the nation’s only federal dump for nuclear waste so radioactive it requires permanent isolation. And the House recently voted by a wide margin to resume these efforts. While teaching and writing about the state’s history for more than 30 years, I have followed the Yucca Mountain fight from the beginning – as well as how Nevadans’ views have evolved on all things nuclear. The project could well go forward, but I believe that it probably won’t as long as there are political benefits to stopping it.
-
-
Belgium says deadly attack in Liege was terrorist attack
A stabbing and shooting attack in the eastern Belgian city of Liege has left two police officers and a passer-by dead. Authorities have launched a terror investigation. Belgium remains on edge following several years of extremist Islamist activity.
-
-
Cyber and international law in the 21st century
“Cyber space is not – and must never be – a lawless world. It is the U.K.’s view that when states and individuals engage in hostile cyber operations, they are governed by law just like activities in any other domain,” said the U.K. Attorney General Jeremy Wright, QC MP, on 23 May 2018, setting out, for the first time, the U.K.’s position on applying international law to cyberspace. “What this means is that hostile actors cannot take action by cyber means without consequence, both in peacetime and in times of conflict. States that are targeted by hostile cyber operations have the right to respond to those operations in accordance with the options lawfully available to them and that in this as in all things, all states are equal before the law.”
-
-
Failing to keep pace: The cyber threat and its implications for our privacy laws
“The time has come — indeed, if it has not already passed — to think seriously about some fundamental questions with respect to our reliance on cyber technologies: How much connected technology do we really want in our daily lives? Do we want the adoption of new connected technologies to be driven purely by innovation and market forces, or should we impose some regulatory constraints?” asked NSA General Counsel Glenn Gerstell in a Wednesday presentation at Georgetown University. “Although we continue to forge ahead in the development of new connected technologies, it is clear that the legal framework underpinning those technologies has not kept pace. Despite our reliance on the internet and connected technologies, we simply haven’t confronted, as a U.S. society, what it means to have privacy in a digital age.”
-
-
Russia’s active measures architecture: Task and purpose
Russia’s latest iteration of the Soviet-era tactic of “active measures” has mesmerized Western audiences and become the topic de jour for national security analysts. In my last post, I focused on the Kremlin’s campaign to influence the U.S. elections from 2014 to 2016 through the integration of offensive cyber hacking, overt propaganda, and covert social media personas In this post, I focus on the elements of Russia’s national power that execute active measures abroad.
-
-
U.S. disrupted major Russian cyberattack, possibly on Ukraine
The U.S. Justice Department has seized an Internet domain controlled by a hacking group tied to Russian military intelligence that was planning a major cyberattack, possibly in Ukraine. The U.S. move late on 23 May was aimed at breaking up what the department said was a dangerous botnet of a half-million infected computer network routers that could have allowed the hackers to take control of computers and stage destructive attacks, as well as steal valuable information.
-
-
U.S. troops help fight terrorists in Africa -- quietly
The attack on the U.S. troops in Niger last October, which left four American troops dead and two wounded, was a surprise to the American public because the presence of the U.S. forces in Africa was mostly off the media. The Niger operation is one of the several U.S. military missions ongoing in about twenty African countries, mostly in the northern half of the continent. Most of these missions have one goal: “rolling back Islamist extremism.”
-
More headlines
The long view
Are We Ready for a ‘DeepSeek for Bioweapons’?
Anthropic’s Claude 4 is a warning sign: AI that can help build bioweapons is coming, and could be widely available soon. Steven Adler writes that we need to be prepared for the consequences: “like a freely downloadable ‘DeepSeek for bioweapons,’ available across the internet, loadable to the computer of any amateur scientist who wishes to cause mass harm. With Anthropic’s Claude Opus 4 having finally triggered this level of safety risk, the clock is now ticking.”
A Brief History of Federal Funding for Basic Science
By Jake Miller
Biomedical science in the United States is at a crossroads. For 75 years, the federal government has partnered with academic institutions, fueling discoveries that have transformed medicine and saved lives. Recent moves by the Trump administration — including funding cuts and proposed changes to how research support is allocated — now threaten this legacy.
“The Federal Government Is Gone”: Under Trump, the Fight Against Extremist Violence Is Left Up to the States
By Hannah Allam
As President Donald Trump guts the main federal office dedicated to preventing terrorism, states say they’re left to take the lead in spotlighting threats. Some state efforts are robust, others are fledgling, and yet other states are still formalizing strategies for addressing extremism. With the federal government largely retreating from focusing on extremist dangers, prevention advocates say the threat of violent extremism is likely to increase.
The “Invasion” Invention: The Far Right’s Long Legal Battle to Make Immigrants the Enemy
By Molly Redden
The Trump administration is using the claim that immigrants have “invaded” the country to justify possibly suspending habeas corpus, part of the constitutional right to due process. A faction of the far right has been building this case for years.
Luigi Mangione and the Making of a ‘Terrorist’
Discretion is crucial to the American tradition of criminal law, Jacob Ware and Ania Zolyniak write, noting that “lawmakers enact broader statutes to empower prosecutors to pursue justice while entrusting that they will stay within the confines of their authority and screen out the inevitable “absurd” cases that may arise.” Discretion is also vital to maintaining the legitimacy of the legal system. In the prosecution’s case against Luigi Mangione, they charge, “That discretion was abused.”
How DHS Laid the Groundwork for More Intelligence Abuse
I&A, the lead intelligence unit of the Department of Homeland Security (DHS) —long plagued by politicized targeting, permissive rules, and a toxic culture —has undergone a transformation over the last two years. Spencer Reynolds writes that this effort falls short. “Ultimately, Congress must rein in I&A,” he adds.