-
Israel open to offering missile defense coverage to Jordan, Egypt
With worries about Iran military capabilities growing, a U.S. general on Monday said that Israel should consider extending the coverage area of its missile defense systems so they could cover Jordan and possibly Egypt, and an Israeli official cautiously welcomed the idea. The United States has funded most of the research and development work on Israel’s layered ballistic missile and short-range rocket defense systems, and under the Obama administration, Israel’s deployed missile interceptor systems have been integrated with U.S. global missile tracking and regional missile defense systems.
-
-
Scotland demands U.K. govt. apology over radiation leak at MoD nuke facility
In 2012 the U.K. Ministry of Defense decided to refuel the nuclear reactor on board Britain’s oldest nuclear submarine, HMS Vanguard, after a test reactor operating at the Naval Reactor Test Establishment at Dounreay, Caithness, in Scotland was found to have a small internal leak of radiation. The test reactor had been shut down after the fault was detected, and both the independent Defense Nuclear Safety Regulator and the Scottish Environment Protection Agency (SEPA) had been informed. It now appears that SEPA did not share the information with the Scottish cabinet, or with Alex Salmond, the First Minister of Scotland. Salmond, in a scathing letter to British Prime Minister David Cameron, has demanded an apology from Camron for “disrespecting” the Scottish Parliament and the people of Scotland and for treating both in an “underhanded” manner by not sharing the information about the radiation leaks.
-
-
FERC orders development of physical security standards for transmission grid
The Federal Energy Regulatory Commission (FERC) on Friday directed the North American Electric Reliability Corporation (NERC) to develop reliability standards requiring owners and operators of the Bulk-Power System to address risks due to physical security threats and vulnerabilities.
-
-
Allowing Terrorism Risk Insurance Act to expire could hurt national security: Study
The current terrorism risk insurance program has a $27.5 billion threshold for aggregate losses that are paid by the insurance industry and commercial policyholders before the government program begins paying. The program will expire in 2014 and Congress again is considering the appropriate government role in terrorism insurance markets. Allowing the federal terrorism risk insurance act to expire could have negative consequences for U.S. national security, according to a new study from the RAND Corporation.
-
-
Software spots malicious behavior by apps
Last year at the end of July the Russian software company Doctor Web detected several malicious apps in the app store Google Play. Downloaded on a smartphone, the malware installed — without the permission of the user — additional programs which sent expensive text messages to premium services. German computer scientists have now developed software which can discover such malicious apps already in the app store. The software detects pieces of code where the app accesses sensitive data and where data is sent from the mobile device.
-
-
Gangbangin' in Syria: Two L.A. gang members in Syria to defend Assad regime
About a hundred Americans have gone to Syria to take part in the war, all of them — with the apparent exception of two L.A. gang members named “Creeper” and “Wino” — to fight on the side of the Sunni rebels against the Alawite Assad regime. In a video recently posted on YouTube, the two are shown brandishing AK-47s and firing at an unseen enemy. Their tattoos identify one of them as a member of Sureños-13, which is affiliated with the Mexican mafia, and the other as a member of Westside Armenian Power gang. They tell the camera they are “in Syria, gangbangin’.”
-
-
Biometric security for mobile devices becoming mainstream
Biometric security such as fingerprint, face, and voice recognition is set to hit the mainstream as global technology companies market the systems as convenient and easy to use. The latest biometric technologies are not without their security issues, but they are marketed as more convenient than traditional methods rather than more secure, and encourage adoption by people who currently do not have any security on their phone at all.
-
-
Collecting digital user data without compromising privacy
The statistical evaluation of digital user data is of vital importance for analyzing trends. It can also undermine users’ privacy. Computer scientists have now developed a novel cryptographic method that makes it possible to collect data and protect the privacy of the user at the same time.
-
-
Too much too young? Teaching children about violent extremism
Dealing with the rise of homegrown terrorism has prompted governments to take novel approaches in combating such threats. The U.K. government, for example, has recently pushed for schools to teach children as young as four about the dangers of violent extremism. One counter-radicalization strategy adopted by the U.K. government is Prevent, which has been used effectively in British secondary schools. Prevent has in the past been viewed with suspicion, however, particularly by British Muslim communities, as Prevent funding has previously been tied directly to the number of Muslim schools in an area. What Australia can learn from the British example is ensuring that certain communities do not feel alienated. Instead, any attempts at education should focus on the problem of radicalization as a whole.
-
-
Israel intercepts ship carrying Syrian missiles from Iran to Gaza
In its most daring – and logistically demanding –military operation in about a year, Israeli naval commandos earlier yesterday (Wednesday) intercepted an Iranian arms ship in the Red Sea, more than 900 miles from Israeli shores. The ship was carrying dozens of Syria-manufactured M-302 medium-range missiles from Iran to Islamic Jihad in the Gaza Strip. The M-302 missile would have dramatically increased the capabilities of militant organizations in Gaza. It carries a warhead of 150 kg and has a range of about 300km.
-
-
Securing Industry 4.0
An increasing number of unsecured, computer-guided production machinery and networks in production facilities are gradually evolving into gateways for data theft. New security technologies may directly shield the sensitive data that is kept there.
-
-
$38.2 billion for DHS in FY2015 budget proposal; $1.25 billion in cyber funding
The administration’s FY 2015 budget proposal, submitted to Congress on Tuesday, requests $38.2 billion in non-disaster funding for DHS, which is nearly a 3 percent reduction relative to FY 2014 allocation, but about the same as FY 2013. The proposal asks for about $1.25 billion – or 3 percent of the requested $38.2 billion – for cyber security funding, up from the $792 million in cybersecurity funding Congress approved for DHS in FY 2014. Of the $1.3 billion, about $1 billion will go for cyber initiatives, including funding for a new voluntary program for critical infrastructure companies and money to bolster civilian network security.
-
-
Libyan Islamists tried to ship mustard gas to Syrian rebels
Libyan officials report that they have recently apprehended several members of a Libyan Muslim extremist militia planning to ship chemical weapons to anti-Assad rebels in Syria. Colonel Mansour al-Mazini of the Libya army said that the Islamists had been caught with a container of mustard gas. The gas was confiscated by Libyan soldiers.
-
-
Energy Department suspends work on controversial plutonium reprocessing project
The Obama administration has decided to put on hold its plans to complete construction on a South Carolina reprocessing facility which would convert nuclear weapon-grade plutonium into reactor fuel. The suspension of work on the project is part of the fiscal 2015 budget plan the administration unveiled Tuesday. The project has been hobbled by delays and massive cost-overruns, and experts says security and safety concerns have not been adequately addressed.
-
-
Two politicians insisting on more congressional oversight of DHS
The lawmakers who support the proposed DHS Acquisition Accountability and Efficiency Act, authored by Representative Jeff Duncan (R-South Carolina), are doing exactly what they were sent to Washington to do: they are attempting to provide fiscal oversight over one of our largest federal agencies. Hopefully, politicians on both sides of the aisle will join Representatives Duncan and Michael McCaul (R-Texas) in passing legislation forcing DHS to use tax payer money in the most efficient ways possible, including demanding contractors meet the terms of their contracts, not rewarding contractors who have a record of poor performance, and completing their security-related projects in a timely manner.
-
More headlines
The long view
Preventing Another 'Jan. 6' Starts by Changing How Elections Are Certified, Experts Say
The 2024 presidential election may be a rematch between President Joe Biden and former President Donald Trump, but preventing a repeat of Jan. 6, 2021 — when false claims of a stolen election promoted by Donald Trump and his allies led to an insurrection at the U.S. Capitol —will be top of mind this election year. Research finds broad support among public for nonpartisan certification commissions.
States Rush to Combat AI Threat to Elections
This year’s presidential election will be the first since generative AI became widely available. That’s raising fears that millions of voters could be deceived by a barrage of political deepfakes. Congress has done little to address the issue, but states are moving aggressively to respond — though questions remain about how effective any new measures to combat AI-created disinformation will be.
Chinese Government Hackers Targeted Critics of China, U.S. Businesses and Politicians
An indictment was unsealed Monday charging seven nationals of the People’s Republic of China (PRC) with conspiracy to commit computer intrusions and conspiracy to commit wire fraud for their involvement in a PRC-based hacking group that spent approximately 14 years targeting U.S. and foreign critics, businesses, and political officials in furtherance of the PRC’s economic espionage and foreign intelligence objectives.
European Arms Imports Nearly Double, U.S. and French Exports Rise, and Russian Exports Fall Sharply
States in Europe almost doubled their imports of major arms (+94 per cent) between 2014–18 and 2019–23. The United States increased its arms exports by 17 per cent between 2014–18 and 2019–23, while Russia’s arms exports halved. Russia was for the first time the third largest arms exporter, falling just behind France.
LNG Exports Have Had No Impact on Domestic Energy Costs: Analysis
U.S. liquified natural gas (LNG) exports have not had any sustained and significant direct impact on U.S. natural gas prices and have, in fact, spurred production and productivity gains, which contribute to downward pressure on domestic prices.
Don’t Buy Moscow’s Shameless Campaign Tying Biden to Its Terrorist Attack
Russia has offered many different explanations to the ISIS-K’s 22 March 2024 terrorist attack at the Crocus City Hall in Moscow, but the most recent explanation offered by Russia is the most audacious yet: Russia now charges that the Ukrainian energy company Burisma financed the attack. Burisma is at the center of an effort by a congressional committee to impeach President Biden, but the case has all but collapsed. Hunter Stoll writes that Russia’s disinformation and propaganda apparatus appears to be searching for ways to keep Burisma in the news ahead of the U.S. presidential election.