-
ISIS and al-Qaeda use social media, Web platforms differently to achieve different ends
The Internet has contributed to the popularity of both al-Qaeda and the Islamic State (ISIS) among would-be jihadists, but the two terror groups use social media and Web platforms differently. Al-Qaeda has been spreading its message via the Internet for nearly two decades, while ISIS is a relative newcomer. Both groups use social media to recruit fighters, but ISIS has successfully developed content that Internet users are likely to share and repost. Such content in the form of violent videos and graphic imagery target young, disillusioned Westerners who are prime for radicalization.
-
-
More research needed to address synthetic biology security concerns
Synthetic biology involves the design of new biological components, devices, or systems that do not exist in nature, or the redesign of existing natural biological systems. Synthetic biology aims to make biological systems work more efficiently or to design biological tools for specific applications — such as developing more effective antibiotics. A new paper examines security risks and policy questions related to the growing field of synthetic biology. While the author does not think the field is ripe for exploitation by terrorists, it does highlight significant gaps in our understanding of the nuts and bolts of lab work in synthetic biology that can contribute to security risks.
-
-
Bay Area’s infrastructure more resilient, but a major tremor would paralyze region’s economy
Twenty-five years ago, the San Francisco Bay Area suffered the 6.9 magnitude Loma Prieta earthquake, which killed sixty-three people, injured 3,700, destroyed 366 businesses and 11,000 homes, and caused $6 billion in property damage. Since then, bridges and roads have been rebuilt to withstand more powerful quakes, but seismic safety experts say more could be done to protect property and human life. A major earthquake is not likely completely to destroy the Golden Gate Bridge or other major infrastructure developments, but the Bay Area’s $535 billion a year economy will come to a halt for months and even years due to weakened critical infrastructure.
-
-
U.S. should emulate allies in pushing for public-private cybersecurity collaboration
Israeli Prime Minister Benjamin Netanyahu announced last month the formation of a national cyber defense authority to defend civilian networks under the leadership of the Israel National Cyber Bureau.The “U.S. government has a lot to learn from successful examples in allied nations. With more compromise and reform, there is plenty of reason for hope,” says a cybersecurity expert, adding that “a cybersecurity partnership between government, business, and individuals built on trust is possible, and would promote more resilient networks as well as creative thinking on cybersecurity.”
-
-
Debate continues over releasing Pennsylvania crude oil shipment information
Shipment of crude oil by rail in the United States has increased from 800,000 barrels a day in 2012 to 1.4 million in 2014. In western Pennsylvania, over seventy-five million gallons of crude oil are passing through Allegheny and Westmoreland counties to refineries in Philadelphia. Release of the recently classified rail transport records by Pennsylvania Emergency Management Agency (PEMA) was a result of a federal mandate ordering railway companies to share information on interstate shipments of crude oil with state emergency management officials.Railway companies claim that releasing the information threatens security and is commercially sensitive.
-
-
Some states are better prepared than others for climate change challenges
In recent years, a number of states have started taking action to prepare their communities for climate change. Many have even developed specific adaptation plans to guide their work. Until now, though, no one has been able to define how much progress states are actually making in implementing those plans. The Georgetown Climate Center’s (GCC) online tool, the State Adaptation Progress Tracker, changes that. A GCC release says that now, anyone will be able to quickly determine how much progress their state is making and decision-makers will be able to learn from innovative examples of actions other states are taking.
-
-
Open data sources can help localities prepare for disasters
States and local governments must improve their use of open-data sources to prepare for disasters, according to a trio of emergency management experts from academia, government, and the private sector. Experts agreed that public data reveals an increasing need for infrastructure upgrades in U.S. cities, but local governments tend to adopt short-term measures over long-term protections.
-
-
U.S. to commit 4,000 soldiers, $750 million in the next six months to fight Ebola in Africa
The Pentagon’s effort to help eradicate Ebola in West Africa will require roughly 4,000 American soldiers, cost $750 million for the next six months, and may last longer than a year.American troops will help build seven testing labs and seventeen treatment facilities by mid-November, but troops will be on the ground in Liberia for at least a year.A majority of U.S. soldiers will not come in direct contact with Ebola patients, but a few dozen troops trained to operate in nuclear, biological, and chemical environments will be assigned to testing labs.
-
-
Why Western boots should stay out of Iraq and Syria
The main reason why we should ignore the growing calls in the United States, Canada and Australia for Western “boots on ground” — meaning ground troops — to fight and destroy the Islamic State (IS) is this: In Iraq and Syria right now there is no alternative group that could fill the void created by a defeated IS. So even if we could topple IS, who would govern the liberated lands? One of the key lessons we learnt from the Afghanistan and Iraq wars is that military forays cannot succeed without a political solution. Attempting to create such a political solution only after the fact is not something that the world has proven adept at. In the case of IS, there is currently no clear and viable political endgame. So as hard as it might be to accept for some, if defeating IS is the goal, the best solution is likely to be isolate the militants and work to weaken them from within in Iraq – this is what the United States did so successfully in 2006 with the same Sunni groups — while adopting a realpolitik approach to the return of Bashar al-Assad in Syria.
-
-
Four arrested in London in plot to behead people on city streets
Officers from the Metropolitan Police counterterrorism unit early yesterday arrested four young men in London over a suspected terrorist plot to grab people on the streets of London and behead them. One of the four arrested was said to have links to Syria and Islamic State (ISIS). Security analysts have said that ISIS would likely seek to retaliate against the United Kingdom in response to British fighter planes joining the U.S. and Arab states in bombing raids on ISIS targets in Iraq.
-
-
Uncertainty over terrorism insurance act’s renewal upsets industry
The Terrorism Risk Insurance Act (TRIA) is set to expire at the end of this year unless Congress renews the program, which will likely include reforms required by House Republicans. Congress passed TRIA in 2002 after the 9/11 attacks to encourage insurance companies to continue terrorism coverage as part of commercial policies after many feared that doing so would lead to greater financial loss should another terror attack occur.
-
-
State, local governments aim to strengthen cybersecurity staff despite shrinking budgets
Due to increased cyberattacks on state and local government servers, many leaders are looking to strengthen the cybersecurity staff on their payrolls. Lower levels of government are also worried about cybercrime due to the large amounts of personal and confidential data that they store. Demand for cybersecurity experts is more than double the workplace demand for IT specialists.
-
-
New Web privacy system would revolutionize surfing safety
Scientists have built a new system that protects Internet users’ privacy while increasing the flexibility for Web developers to build Web applications that combine data from different Web sites, dramatically improving the safety of surfing the Web. The system, “Confinement with Origin Web Labels,” or COWL, works with Mozilla’s Firefox and the open-source version of Google’s Chrome Web browsers and prevents malicious code in a Web site from leaking sensitive information to unauthorized parties, while allowing code in a Web site to display content drawn from multiple Web sites — an essential function for modern, feature-rich Web applications.
-
-
More law enforcement agencies refuse to hold undocumented inmates for ICE
Recent court rulings have emboldened roughly 225 law enforcement agencies across the country to refuse requests from Immigration and Customs Enforcement(ICE) officials to hold undocumented inmates past their release dates so federal authorities can have time to deport them. Until recently, inmates suspected of being in the country illegally were held for an additional forty-eight hours until ICE agents arrived. Some municipalities began limiting the number of holds a few years ago, but several counties and cities have begun to ignore the requests all together after recent court rulings confirmed that the immigration holds are not mandatory.
-
-
Anti-terrorism plan must tackle “allies” who also fuel radicalism
The coalition of nations stitched together by the United States in response to the developing threat of Islamic State is overlooking the sources of radicalism in the region. This plan not only has nothing to say about these sponsors of terrorism but even empowers fundamentalist groups by forging alliances with them. The U.S.-led alliance includes Saudi Arabia and Qatar. Both countries have been playing counter-productive roles by supporting regional and global Salafi Jihadi movements for a long time. They persist in provoking sectarian strife throughout the region. The emergence of Islamic State cannot be understood without studying its Salafist roots in Saudi Arabia and the financial and media support that has flowed from Qatar. Fighting IS while remaining blind to the sources of radicalism in the region will ultimately be unsuccessful. The only long-term solution is to tackle the source of the problem. This plan must include clear and realistic agendas to reform the education systems of countries in the region, evaluate these U.S. allies’ democratic status, and pressure them to improve their records.
-
More headlines
The long view
How Quickly Could Iran Make Nuclear Weapons Today?
For Iran, two of the three poles in the tent of building nuclear weapons – fissile material and delivery vehicles — are essentially complete. It will take them one week to enrich enough uranium to 90 percent for one bomb (and one month to enrich enough uranium for six bombs). Iran also has a variety of delivery systems, including nuclear-capable missiles: the delivery pole is ready. Weaponization is the pole that needs more work. The accelerated weaponization program can be accomplished in a matter of six months.
Fifty-Five Hours of Risk: The Dangerous Implications of Slow Attack Attribution
Assuming that its foreign adversaries’ recent violent threats are to be taken seriously, and that the likelihood of a direct attack against the United States is, if not on the rise, at least significant enough to warrant serious attention, the United States has an urgent mandate to prepare effective cognitive defenses. Foremost among these is the ability to quickly and accurately attribute attacks to their originators, and to deliver that information to the public through a trustworthy vehicle.
Is Left-Wing Terrorism Making a Comeback in Germany? Analyzing the “Engel – Guntermann Network”
For Germany, the reemergence of more violence orientated left-wing extremist actors has diversified the threat posed by non-state actors even further. Violent left-wing extremism is also of growing concern across Europe. While left-wing violent extremism does not currently represent as acute a threat as currently manifested by jihadist and right-wing terrorist attacks, the recent concerning trend among German left-wing extremists is toward greater violence and transnationalism.
The True Dangers of Long Trains
Trains are getting longer. Rail companies had recently adopted a moneymaking strategy to move cargo faster than ever, with fewer workers, on trains that are consistently longer than at any time in history. Railroads are getting richer, but these “monster trains” are jumping off of tracks across America and regulators are doing little to curb the risk.
New Report Card to Assess, Rank Campus Responses to Antisemitism
In the face of growing antisemitism across U.S. college campuses, ADL announced that it is developing a new tool to evaluate the climate of antisemitism on individual campuses. The ADL will create comparative evaluation of how leading colleges and universities are responding to the surge of antisemitism and protecting their Jewish students.
Truth Decay and National Security
The line between fact and opinion in public discourse has been eroding, and with it the public’s ability to have arguments and find common ground based in fact. Two core drivers of Truth Decay are political polarization and the spread of misinformation—and these are particularly intertwined in the national security arena. Exposure to misinformation leads to increased polarization, and increased polarization decreases the impact of factual information. Individuals, institutions, and the nation as a whole are vulnerable to this vicious cycle.