-
Growing questions about TSA’s behavioral detection program
TSA has spent roughly $1 billion training thousands of “behavior detection officers” as part of theScreening of Passengers by Observation Techniques (SPOT) program. The purpose of SPOT is to identify facial and body expressions that signals terrorist activity. Psychologists – and the GAO – question the effectiveness of the program.“The common-sense notion that liars betray themselves through body language appears to be little more than a cultural fiction,” says one psychologist.
-
-
Delaware launches cyber initiative
Delaware is joining the number of states that have decided to invest in a statewide cybersecurity workforce to combat the growing threat of cyberattacks directed at both private and public institutions.Delaware hopes its cyber initiative will accelerate current efforts to develop a stronger cyber workforce. The Delaware Cyber Initiative proposes $3 million for a collaborative learning and research network in the form of part research lab, part business park, dedicated to cyber innovation.
-
-
Protecting personal data on smartphone
Social networking and the instantaneous sharing of information have revolutionized the way we communicate. Our mobile phones are able to automatically obtain information such as our current location and activities. This information can be easily collected and analyzed to expose our private life. What is even more malicious is that the personal data contained in our smartphones can be disclosed via installed applications without our being informed.
-
-
Quantum cryptography to help us keep our secrets secret
In the history of secret communication, the most brilliant efforts of code-makers have been matched time and again by the ingenuity of code-breakers. Sometimes we can even see it coming. We already know that one of today’s most widely used encryption systems, RSA, will become insecure once a quantum computer is built. An article in Nature reviewing developments in quantum cryptography describes how we can keep our secrets secret even when faced with the double challenge of mistrust and manipulation.
-
-
9/11 terror network in U.S. was never fully dismantled, still a threat
A joint inquiry co-chaired by a former senator has warned that the American network that supported and trained the 9/11 hijackers was never fully dismantled, and that it remains a threat, pending the release of a secret report from the era. Former Senator. Bob Graham (D-Florida) points out that a 28-page section from the “Joint Inquiry into Intelligence Community Activities Before and After the Terrorist Attacks of September 11, 2001” was classified under President George W. Bush and remains so under President Barack Obama.
-
-
FDA proposes rules to prevent terror attack on U.S. food supply
Food terrorism could have drastic economic effects. A DHS risk assessment discovered that should a pathogen like foot-and-mouth disease be introduced to Great Plains ranchers, total damages would exceed $50 billion, affecting U.S. beef exports and dramatically reducing consumer demand for beef products.In order to prevent or reduce the risk from a potential terror attack on the nation’s food supply, the FDA proposed new rules to the Food Safety Modernization Act (FSMA).
-
-
New tool makes scanning the Internet for illegal images possible
Researchers have developed a system that makes it possible to scan traffic on the Internet for illegal photographs. The system can, for example, help trace child pornography on the Internet without infringing on the privacy of Internet users. Internet service providers could use the tool to keep their network “clean.”
-
-
Debate intensifies over Obama deportation instruction to ICE
President Barack Obama’s recent instruction to DHS to find “more humane” ways to deport illegal immigrants has sparked yet another debate between immigration supporters and critics as to what exactly Obama’s directive meant. Supporters of undocumented immigrants hope DHS will cease all deportations deemed unnecessary, while opponents of Obama’s immigration policies urge DHS to carry out the country’s immigration laws as written by Congress.
-
-
Turkey shoots down Syrian military jet
Turkish fighter jets on Sunday shot down a Syrian warplane after it violated Turkey’s airspace. The Syrian military confirmed the incident, saying the plane was downed in Syrian airspace while strafing rebel positions. Syrian state TV described the incident as a “blatant aggression,” and said the pilot safely ejected from the aircraft. In 2012 Turkey changed its rules of engagement after Syria shot down a Turkish military plane, saying that any Syrian military plane approaching the Turkish border would be treated as a legitimate target.
-
-
Belfast court denies bail for former IRA commander accused of 1972 killing
Ivor Bell, 77, a former Irish Republican Army (IRA) commander accused of abducting and killing Jean McConville, 37, a mother of ten, in 1972, on Saturday was denied bail in a Belfast court. Prosecutors said the break in the case came as a result of information found in the recordings of Boston College’s oral history project which interviewed Northern Ireland paramilitary fighters involved in the long sectarian conflict there. The interviews were taped on the understanding that they would not be made public during the lifetimes of the subjects, but last year a U.S. court granted police in Northern Ireland access to the recordings.
-
-
Kenyan security forces hobbled by lack of funds
Kenya may be facing a heightened risk from regional terrorism, but security forces in Kenya are hobbled by glaring underfunding due to government corruption and mismanagement. The Anti-Terror Police Unit in Nairobi, the main force set up to combat terrorist acts, has only $2,205 for its operations during the first quarter of the year — coming to just $735 for March. In comparison, an average parliamentary salary is around $45,000 for the same period.
-
-
New infrared technique remotely to detect dangerous materials
Researchers say that infrared technology holds the potential to spot from afar whether a site is being used to make nuclear weapons. They developed a model which precisely characterizes the material in each pixel of an image taken from a long-wave infrared camera. The U.S. National Nuclear Security Administration (NNSA) funded the project. The government’s long-term goal for infrared technology is remotely to detect the exact materials, chemicals and gases coming and going from factories or other sites suspected of illegal nuclear production.
-
-
Controversial Mississippi power station to cut emissions by more than half
A new $5 billion state-of-the-art power facility is under construction Kemper County, Mississippi. It places a firm bet on the future of carbon-capture technology, and other technological advancements, including: it utilizes the gasification process with carbon in unique ways; it recycles treated wastewater to generate power; and it makes money from the carbon dioxide it has removed by selling it to oil companies for their own extraction. Critics say that investing so much money in untested technologies is too much of a gamble.
-
-
NSA program captures, replays phone calls
The NSA’s MYSTIC program, created in 2009, deploys a “retrospective retrieval” (RETRO) tool which allows agents to rewind and playback all phone conversations that have taken place in the past thirty days in an unnamed foreign country, according to Edward Snowden-leaked documents. The MYSTIC program differs from other NSA surveillance programs revealed by Snowden because it captures the content of phone conversations, not just calls’ metadata.
-
-
Facebook making snooping more difficult
Facebook has joined its Silicon Valley competitors to improve cybersecurity following a recent report suggesting that the NSA may have posed as Facebook to infect targeted computers. Joe Sullivan, Facebook’s chief security officer, said Facebook was working to “make sure the system is robust enough that everyone should be coming in the front door with legal process and not getting information any other way.” He added that no one could pose as Facebook servers any more since the company made “https,” a secure method of accessing Web pages, standard last year.
-
More headlines
The long view
How Quickly Could Iran Make Nuclear Weapons Today?
For Iran, two of the three poles in the tent of building nuclear weapons – fissile material and delivery vehicles — are essentially complete. It will take them one week to enrich enough uranium to 90 percent for one bomb (and one month to enrich enough uranium for six bombs). Iran also has a variety of delivery systems, including nuclear-capable missiles: the delivery pole is ready. Weaponization is the pole that needs more work. The accelerated weaponization program can be accomplished in a matter of six months.
Fifty-Five Hours of Risk: The Dangerous Implications of Slow Attack Attribution
Assuming that its foreign adversaries’ recent violent threats are to be taken seriously, and that the likelihood of a direct attack against the United States is, if not on the rise, at least significant enough to warrant serious attention, the United States has an urgent mandate to prepare effective cognitive defenses. Foremost among these is the ability to quickly and accurately attribute attacks to their originators, and to deliver that information to the public through a trustworthy vehicle.
Is Left-Wing Terrorism Making a Comeback in Germany? Analyzing the “Engel – Guntermann Network”
For Germany, the reemergence of more violence orientated left-wing extremist actors has diversified the threat posed by non-state actors even further. Violent left-wing extremism is also of growing concern across Europe. While left-wing violent extremism does not currently represent as acute a threat as currently manifested by jihadist and right-wing terrorist attacks, the recent concerning trend among German left-wing extremists is toward greater violence and transnationalism.
The True Dangers of Long Trains
Trains are getting longer. Rail companies had recently adopted a moneymaking strategy to move cargo faster than ever, with fewer workers, on trains that are consistently longer than at any time in history. Railroads are getting richer, but these “monster trains” are jumping off of tracks across America and regulators are doing little to curb the risk.
New Report Card to Assess, Rank Campus Responses to Antisemitism
In the face of growing antisemitism across U.S. college campuses, ADL announced that it is developing a new tool to evaluate the climate of antisemitism on individual campuses. The ADL will create comparative evaluation of how leading colleges and universities are responding to the surge of antisemitism and protecting their Jewish students.
Truth Decay and National Security
The line between fact and opinion in public discourse has been eroding, and with it the public’s ability to have arguments and find common ground based in fact. Two core drivers of Truth Decay are political polarization and the spread of misinformation—and these are particularly intertwined in the national security arena. Exposure to misinformation leads to increased polarization, and increased polarization decreases the impact of factual information. Individuals, institutions, and the nation as a whole are vulnerable to this vicious cycle.