• Growing questions about TSA’s behavioral detection program

    TSA has spent roughly $1 billion training thousands of “behavior detection officers” as part of theScreening of Passengers by Observation Techniques (SPOT) program. The purpose of SPOT is to identify facial and body expressions that signals terrorist activity. Psychologists – and the GAO – question the effectiveness of the program.“The common-sense notion that liars betray themselves through body language appears to be little more than a cultural fiction,” says one psychologist.

  • Delaware launches cyber initiative

    Delaware is joining the number of states that have decided to invest in a statewide cybersecurity workforce to combat the growing threat of cyberattacks directed at both private and public institutions.Delaware hopes its cyber initiative will accelerate current efforts to develop a stronger cyber workforce. The Delaware Cyber Initiative proposes $3 million for a collaborative learning and research network in the form of part research lab, part business park, dedicated to cyber innovation.

  • Protecting personal data on smartphone

    Social networking and the instantaneous sharing of information have revolutionized the way we communicate. Our mobile phones are able to automatically obtain information such as our current location and activities. This information can be easily collected and analyzed to expose our private life. What is even more malicious is that the personal data contained in our smartphones can be disclosed via installed applications without our being informed.

  • Quantum cryptography to help us keep our secrets secret

    In the history of secret communication, the most brilliant efforts of code-makers have been matched time and again by the ingenuity of code-breakers. Sometimes we can even see it coming. We already know that one of today’s most widely used encryption systems, RSA, will become insecure once a quantum computer is built. An article in Nature reviewing developments in quantum cryptography describes how we can keep our secrets secret even when faced with the double challenge of mistrust and manipulation.

  • 9/11 terror network in U.S. was never fully dismantled, still a threat

    A joint inquiry co-chaired by a former senator has warned that the American network that supported and trained the 9/11 hijackers was never fully dismantled, and that it remains a threat, pending the release of a secret report from the era. Former Senator. Bob Graham (D-Florida) points out that a 28-page section from the “Joint Inquiry into Intelligence Community Activities Before and After the Terrorist Attacks of September 11, 2001” was classified under President George W. Bush and remains so under President Barack Obama.

  • FDA proposes rules to prevent terror attack on U.S. food supply

    Food terrorism could have drastic economic effects. A DHS risk assessment discovered that should a pathogen like foot-and-mouth disease be introduced to Great Plains ranchers, total damages would exceed $50 billion, affecting U.S. beef exports and dramatically reducing consumer demand for beef products.In order to prevent or reduce the risk from a potential terror attack on the nation’s food supply, the FDA proposed new rules to the Food Safety Modernization Act (FSMA).

  • New tool makes scanning the Internet for illegal images possible

    Researchers have developed a system that makes it possible to scan traffic on the Internet for illegal photographs. The system can, for example, help trace child pornography on the Internet without infringing on the privacy of Internet users. Internet service providers could use the tool to keep their network “clean.”

  • Debate intensifies over Obama deportation instruction to ICE

    President Barack Obama’s recent instruction to DHS to find “more humane” ways to deport illegal immigrants has sparked yet another debate between immigration supporters and critics as to what exactly Obama’s directive meant. Supporters of undocumented immigrants hope DHS will cease all deportations deemed unnecessary, while opponents of Obama’s immigration policies urge DHS to carry out the country’s immigration laws as written by Congress.

  • Turkey shoots down Syrian military jet

    Turkish fighter jets on Sunday shot down a Syrian warplane after it violated Turkey’s airspace. The Syrian military confirmed the incident, saying the plane was downed in Syrian airspace while strafing rebel positions. Syrian state TV described the incident as a “blatant aggression,” and said the pilot safely ejected from the aircraft. In 2012 Turkey changed its rules of engagement after Syria shot down a Turkish military plane, saying that any Syrian military plane approaching the Turkish border would be treated as a legitimate target.

  • Belfast court denies bail for former IRA commander accused of 1972 killing

    Ivor Bell, 77, a former Irish Republican Army (IRA) commander accused of abducting and killing Jean McConville, 37, a mother of ten, in 1972, on Saturday was denied bail in a Belfast court. Prosecutors said the break in the case came as a result of information found in the recordings of Boston College’s oral history project which interviewed Northern Ireland paramilitary fighters involved in the long sectarian conflict there. The interviews were taped on the understanding that they would not be made public during the lifetimes of the subjects, but last year a U.S. court granted police in Northern Ireland access to the recordings.

  • Kenyan security forces hobbled by lack of funds

    Kenya may be facing a heightened risk from regional terrorism, but security forces in Kenya are hobbled by glaring underfunding due to government corruption and mismanagement. The Anti-Terror Police Unit in Nairobi, the main force set up to combat terrorist acts, has only $2,205 for its operations during the first quarter of the year — coming to just $735 for March. In comparison, an average parliamentary salary is around $45,000 for the same period.

  • New infrared technique remotely to detect dangerous materials

    Researchers say that infrared technology holds the potential to spot from afar whether a site is being used to make nuclear weapons. They developed a model which precisely characterizes the material in each pixel of an image taken from a long-wave infrared camera. The U.S. National Nuclear Security Administration (NNSA) funded the project. The government’s long-term goal for infrared technology is remotely to detect the exact materials, chemicals and gases coming and going from factories or other sites suspected of illegal nuclear production.

  • Controversial Mississippi power station to cut emissions by more than half

    A new $5 billion state-of-the-art power facility is under construction Kemper County, Mississippi. It places a firm bet on the future of carbon-capture technology, and other technological advancements, including: it utilizes the gasification process with carbon in unique ways; it recycles treated wastewater to generate power; and it makes money from the carbon dioxide it has removed by selling it to oil companies for their own extraction. Critics say that investing so much money in untested technologies is too much of a gamble.

  • NSA program captures, replays phone calls

    The NSA’s MYSTIC program, created in 2009, deploys a “retrospective retrieval” (RETRO) tool which allows agents to rewind and playback all phone conversations that have taken place in the past thirty days in an unnamed foreign country, according to Edward Snowden-leaked documents. The MYSTIC program differs from other NSA surveillance programs revealed by Snowden because it captures the content of phone conversations, not just calls’ metadata.

  • Facebook making snooping more difficult

    Facebook has joined its Silicon Valley competitors to improve cybersecurity following a recent report suggesting that the NSA may have posed as Facebook to infect targeted computers. Joe Sullivan, Facebook’s chief security officer, said Facebook was working to “make sure the system is robust enough that everyone should be coming in the front door with legal process and not getting information any other way.” He added that no one could pose as Facebook servers any more since the company made “https,” a secure method of accessing Web pages, standard last year.