-
Bringing transparency to cell phone surveillance
Modern cell phones are vulnerable to attacks from rogue cellular transmitters called IMSI-catchers — surveillance devices that can precisely locate mobile phones, eavesdrop on conversations or send spam. Security researchers have developed a new system called SeaGlass to detect anomalies in the cellular landscape that can indicate where and when these surveillance devices are being used.
-
-
Gauging extremist crime: Crunching the numbers
The U.S. Extremist Crime Database tracks violent attacks carried out by extremists. The database shows that since 1990, supporters of jihadist movement have committed 45 fatal events, while far-right extremists committed 195 fatal events during the same time frame. Initially, the data lead one to believe that far-right extremists are in fact more dangerous than jihadists because they are responsible for nearly four times as many events. But the data also show that attacks by jihadists have resulted in more overall deaths than those by right wing extremists.
-
-
White supremacists in U.S. inspired by ancient Nordic religion
Inspired by an ancient heathen religion, known most commonly as Odinism, White supremacists carry out terrorist attacks on American soil. In at least six cases since 2001, professed Odinists have been declared guilty of plotting – or pulling off – domestic terrorism attacks. Today’s Odinists claim it is the only pure religion for white people, one not “mongrelized” by the Jewish prophet Jesus – thus making Odinism a perfect fit for a strain of white supremacists and neo-Nazis in America. “Now is a great time for Odinism because it fits into this historical narrative about European cultural greatness and a connection between whiteness and nationality,” says one expert.
-
-
Why criminalizing non-violent extremism won’t prevent terrorism
In the wake of the terrorist attack on London Bridge, there is a push for new legislation to target not the criminal behavior of violence, but the ideology behind it. This is based on the problematic assumption that criminalizing the motivations behind an action can prevent it from happening: but my research suggests that the opposite may well be the case. Providing legitimate and credible non-violent alternatives to terrorism may seem fanciful, but the motivations for some of these individuals often begins in their social exclusion and alienation. Addressing and engaging with these issues much earlier could help prevent violent motivations ever taking root. This means re-orientating criminal justice so that the focus is on the illegitimacy of political violence, not the identities and individuals themselves, could help prevent these attacks, particularly as they become more difficult to detect. Dialogue, not criminalizing non-violent forms of expression, will help prevent political violence.
-
-
Terror tunnel discovered under UNRWA schools as Hamas continues military buildup
A terror tunnel was discovered under two United Nations Relief and Works Agency (UNRWA) schools, prompting Israel to file a letter of protest with the United Nations on Friday. A former UNRWA official acknowledged in 2014 that it takes “no steps at all to prevent members of terrorist organizations, such as Hamas, from joining its staff.”
-
-
Germany testing face-recognition software to help police spot terrorists
Germany will be testing facial recognition software at a Berlin train station this summer to see whether it can assist police identify terror suspects more quickly. Volunteers will help police test the software at Berlin’s Suedkreuz station. If the test is successful, the use of the biometric software would be expanded to other locations, and also used to help police identify criminals, not only people suspected of terrorist activities.
-
-
Can the world ever really keep terrorists off the internet?
After London’s most recent terror attacks, British Prime Minister Theresa May called on countries to collaborate on internet regulation to prevent terrorism planning online. May criticized online spaces that allow such ideas to breed, and the companies that host them. Internet companies and other commentators, however, have pushed back against the suggestion that more government regulation is needed, saying weakening everyone’s encryption poses different public dangers. Many have also questioned whether some regulation, like banning encryption, is possible at all. As a law professor who studies the impact of the internet on society, I believe the goal of international collaboration is incredibly complicated, given global history.
-
-
New U.S. approach to fighting terrorism in Africa
The Trump administration is in the process of revising U.S. strategy in Africa, and one of the first indications of this new approach is the greater freedom given to military commanders on the ground to conduct operations against Islamist groups. The most visible demonstration of this approach so far has been in Somalia, where the United States has intensified its involvement with the campaign against al Shabaab. Critics of the administration argue that in many ways the policy still relies on relying too heavily on corrupt and incompetent partners, and that it suffers from not paying sufficient attention to the non-military aspects of the fight against extremist terrorism.
-
-
Protecting against online privacy attacks
When Congress voted in March to reverse rules intended to protect internet users’ privacy, many people began looking for ways to keep their online activity private. One of the most popular and effective is Tor, a software system millions of people use to protect their anonymity online. But even Tor has weaknesses, and in a new paper, researchers recommend steps to combat certain types of Tor’s vulnerabilities.
-
-
West African nations seek $56 million for rapid-response anti-Islamist force
The countries of West Africa’s Sahel region have requested $56 million from the EU to help set up a multi-national force to take on Islamist militant groups across the vast, arid region. The sparsely populated region has attracted a growing number of jihadist groups, some affiliated with al Qaeda and Islamic State. The G5 Sahel countries — Chad, Niger, Burkina Faso, Mali, and Mauritania — have proposed the creation of a capable and mobile regional task force, the mission of which would be to tackle the cross-border Islamist threat.
-
-
How does IS claim responsibility for a terrorist attack?
Scholars of terrorism found thatonly one in seven terror attacks is actually claimed by the terrorist group responsible. They argue that groups like IS are composed of two kinds of agents. One is rational leaders with strategic, political objectives. The other is operational foot soldiers, some of whom are not rational. IS’ leaders claim responsibility only when they calculate a political benefit; they refuse to claim responsibility when an attack might hurt the group’s objectives. If this theory is correct, IS claimed responsibility for both the recent Manchester bombing and the London Bridge assaults because its leaders calculated that it would result in a net benefit – like cash from its sympathizers or overreaction from its targets.
-
-
Lawyers convention leaves Texas over state's new immigration law
A 15,000-member association of attorneys and law professors said on Wednesday that it is relocating its 2018 convention out of Texas in response to the state legislature passing Senate bill 4, a sweeping and controversial immigration enforcement measure. About 3,000 people were expected to attend the event.
-
-
New fabric coating could neutralize chemical weapons, save lives
Chemical weapons are nightmarish. In a millisecond, they can kill hundreds, if not thousands. But, in a new study, scientists report that they have developed a way to adhere a lightweight coating onto fabrics that is capable of neutralizing a subclass of these toxins — those that are delivered through the skin. The life-saving technique could eventually be used to protect soldiers and emergency responders.
-
-
Russian government hackers planted false news story which caused Gulf crisis: U.S. intelligence
U.S. intelligence officials say Russian government hackers planted a false news story into the text prepared for release by the official Qatari news agency. The release of the Russian-manufactured story by the official Qatari news agency prompted Saudi Arabia and several of its regional allies to suspend diplomatic relations with Qatar and impose economic sanctions on it. U.S. officials say the Russian goal appears to be to cause rifts among the U.S. and its allies.
-
-
12 dead, 42 injured in two ISIS suicide attacks in Tehran
At least twelve people have been killed and dozens more injured in Tehran, in two-pronged suicide bomb and gun assaults – one on the Iranian parliament and the other on the mausoleum of the founder of the Islamic Republic. ISIS has claimed responsibility for the two attacks. This is the first terrorist act by ISIS inside Iran. Terrorist attacks are rare in Iran’s big cities, but that during the past ten years or so, two Sunni militant groups — Jundallah and its splinter group, Ansar al Furqan — have been conducting a deadly insurgency campaign in more remote areas of the country.
-
More headlines
The long view
Factories First: Winning the Drone War Before It Starts
Wars are won by factories before they are won on the battlefield,Martin C. Feldmann writes, noting that the United States lacks the manufacturing depth for the coming drone age. Rectifying this situation “will take far more than procurement tweaks,” Feldmann writes. “It demands a national-level, wartime-scale industrial mobilization.”
No Nation Is an Island: The Dangers of Modern U.S. Isolationism
The resurgence of isolationist sentiment in American politics is understandable but misguided. While the desire to refocus on domestic renewal is justified, retreating from the world will not bring the security, prosperity, or sovereignty that its proponents promise. On the contrary, it invites instability, diminishes U.S. influence, and erodes the democratic order the U.S. helped forge.
Fragmented by Design: USAID’s Dismantling and the Future of American Foreign Aid
The Trump administration launched an aggressive restructuring of U.S. foreign aid, effectively dismantling the United States Agency for International Development (USAID). The humanitarian and geopolitical fallout of the demise of USAID includes shuttered clinics, destroyed food aid, and China’s growing influence in the global south. This new era of American soft power will determine how, and whether, the U.S. continues to lead in global development.
Water Wars: A Historic Agreement Between Mexico and US Is Ramping Up Border Tension
As climate change drives rising temperatures and changes in rainfall, Mexico and the US are in the middle of a conflict over water, putting an additional strain on their relationship. Partly due to constant droughts, Mexico has struggled to maintain its water deliveries for much of the last 25 years, deliveries to which it is obligated by a 1944 water-sharing agreement between the two countries.
How Disastrous Was the Trump-Putin Meeting?
In Alaska, Trump got played by Putin. Therefore, Steven Pifer writes, the European leaders and Zelensky have to “diplomatically offer suggestions to walk Trump back from a position that he does not appear to understand would be bad for Ukraine, bad for Europe, and bad for American interests. And they have to do so without setting off an explosion that could disrupt U.S.-Ukrainian and U.S.-European relations—all to the delight of Putin and the Kremlin.”
How Male Grievance Fuels Radicalization and Extremist Violence
Social extremism is evolving in reach and form. While traditional racial supremacy ideologies remain, contemporary movements are now often fueled by something more personal and emotionally resonant: male grievance.