• U.K. spy agencies replace failed secret messaging system, try to recover money from IBM

    IBM was contracted by the British secret service to develop a secret, secure communication system for its operatives; after delays and technical failures, the contract was pulled and the intelligence services have launched a new project to extend a new secret messaging system to thousands of terminals across the intelligence agencies, as well as the Home Office, SOCA, Ministry of Defense, and other departments; at the same time, the government is still trying to recover the £24.4 million paid to IBM

  • Intelligence experts: Recent attacks on U.S. government buildings are indeed terrorism

    DHS secretary Janet Napolitano said Joseph Stack’s suicide attack on the IRS building in Austin was not an act of terrorism because he acted as a lone wolf; an intelligence think tank’s experts disagree: the definition of a violent act as an act of terrorism has nothing to do with the number of casualties, foreign ties, or absence of a conspiracy; what matters is whether or not the perpetrator’s motivation was to coerce a population or a government to change policy because of political, religious, or ideological beliefs

  • Ad for Israeli supermarket chain inspired Mossad's Dubai slaying

    Discount supermarket chain commercial draws inspiration from surveillance footage of Dubai assassination; shows actors carrying tennis rackets, wearing wigs, hats; an actress wearing a wide-brimmed floppy hat mimics Israel’s policy of maintaining deniability, saying she “couldn’t admit to anything”

  • Religious leaders discuss body scanners with DHS

    Muslim, Jewish, and Christian leaders met with DHS officials to discuss the privacy aspects of whole-body scanning; Muslim religious organizations, the Pope, and Orthodox Jewish authorities declared body scanners to be in violation of their respective religions’ modesty strictures, especially for women, and urged their followers to opt for pat-downs instead

  • TSA: Alleged child molester did not train or use new full-body scanners at Logan

    A Boston man charged with multiple child sex crimes was a certified luggage and passengers screener at Logan Airport; TSA says the man was already missing from work for several days when full-body scanners were deployed at Logan on 1 March, and thus had no access to the machines; the man’s arrest adds fuel to the opposition to body scanners

  • Growing concerns in U.S., U.K. about domestic terrorism

    Law enforcement and intelligence in the United States and the United Kingdom are concerned with increased intensity on the extremist fringe: the number extremist groups is rising, their ranks are swelling, their rhetoric is becoming more vituperative, and there has been an increase in violent activities

  • A series of attacks on government buildings focuses attention on federal building security

    The recent shooting at the Pentagon, which followed a February plane crash at Internal Revenue Service offices in Austin and a January shooting at the federal courthouse in Las Vegas, has prompted renewed attention from lawmakers regarding the security of U.S. government buildings

  • Top concern at RSA 2010: security of cloud computing

    Cloud computing offers efficiency and cost reduction, but it also offer new opportunities to hackers and cybercriminals; Melissa Hathaway, former senior director for cyberspace for the National Security Council, said the migration toward the cloud is gaining momentum without having satisfactorily addressed several pressing concerns; former National Security Agency technical director Brian Snow said he does not trust the cloud

  • FBI: Cyber-terrorism a real and growing threat to U.S.

    FBI director Robert Mueller: “The risks are right at our doorsteps and in some cases they are in the house”; Richard Clarke, former White House terrorism czar: “Every major company in the U.S. and Europe has been penetrated — it’s industrial warfare”

  • Obama administration to unveil nuclear weapons policy

    The administration’s Nuclear Posture Review was initially scheduled for release late last year, and then again for 1 March, but it is coming; it will lay out the administration’s justifications and strategy for maintaining a nuclear arsenal, and will be important in guiding work throughout the energy department, including at the primary weapons laboratories, Los Alamos National Laboratory in New Mexico and Lawrence Livermore National Laboratory in California

  • German court says EU phone, e-mail data retention policy must be changed

    In 2006 the EU approved a law requiring phone and e-mail providers to hold customer data for six months in case the data is needed by law enforcement; a German Federal Constitution Court called the law “inadmissable” and ruled that changes would be needed to limit its scope

  • Debate revived over the security threat small planes pose

    There are about 200,000 small and medium-size aircraft in the United States, using 19,000 airports, most of them small; last Thursday’s suicide attack on an office building in Austin, Texas revives debate over the security threat small planes pose, and how strict the security measures applied to general aviation should be

  • Air traffic control shortage endangers New York air security

    The New York air traffic system is the busiest air system in the United States, and the second busiest in the world, with more than 107 million passengers each year; some 5,000 flights per day arrive in and depart out of the six major airports in the New York City metropolitan area; the Federal Aviation Administration says 270 air traffic controllers are needed for the New York area, but the actual number of fully trained and certified air traffic controllers has never risen above 211; that number has now dropped to 158

  • Deadline for Massachusetts' “Written Information Security Program” looms

    As of 1 March 2010, Massachusetts will require that all Massachusetts companies — and even companies operating outside the Commonwealth, but which do business in Massachusetts — to implement stringent personal data privacy law, the data protections pertain to not just electronically stored and transmitted information but also hard copy formats

  • How real is the threat of cyberattack on the United States?

    Some experts compare the economic impact of a major cyberincident to the 2003 Northeast blackout, which cut service to fifty million people in the United States and Canada for up to four days; economists place the cost of that event between $4.5 [billion] and $10 billion — which they regard as a blip in the $14.2 trillion U.S. economy