• The Brandeis program: Harnessing technology to ensure online privacy

    In a seminal 1890 article in the Harvard Law Review, Louis Brandeis developed the concept of the “right to privacy.” DARPA the other day announced the Brandeis program – a project aiming to research and develop tools for online privacy, one of the most vexing problems facing the connected world as devices and data proliferate beyond a capacity to be managed responsibly.

  • Weighing the pros, cons of blocking ISIS’s access to social media

    The Islamic State has successfully used social media to spread its ideology, share videos of beheadings, and recruit new followers. U.S. counterterrorism agencies have launched their own social media campaigns to diminish ISIS’s effects on would be jihadists, but some officials have considered whether it would be simpler to cut off ISIS from social media networks altogether. Doing so would no doubt limit ISIS’s reach on Western recruits, but could it create a challenge for officials looking to monitor the group’s activities?

  • U.S. security officials share a sober view of terrorism challenge

    U.S. counterterrorism analysts have painted a pessimistic picture of the years to come, saying the threats from terrorism will continue to challenge the United States. This attitude contrasts with the feelings most Americans had after the killing of Osama bin Laden in 2011 and the dawn of the Arab Spring, which was initially seen as a first step in a path toward democracy in the Middle East. For U.S. security officials, those optimistic views have evaporated – even as some note that counterterrorism work thrives on pessimism and involves planning for worst-case scenarios.

  • U.K.: 3 London girls who traveled to Syria to join ISIS not regarded as terrorists

    Sir Bernard Hogan-Howe, commissioner of the Metropolitan police(Met), has announced that the three London girls who allegedly stole jewelry from their parents to fund a trip to join the Islamic State (ISIS) may return to the United Kingdom without fear of being prosecuted for terrorism. “We have no evidence in this case that these three girls are responsible for any terrorist offenses,” said Mark Rowley, the Met’s chief of counterterrorism. “They have no reason to fear, if nothing else comes to light, that we will be treating them as terrorists.”

  • Bangladesh Supreme Court to hear Islamist leader’s death sentence appeal in April

    Last Thursday, lawyers for Mohammad Kamaruzzaman, 63, an assistant secretary general of the Jamaat-e-Islami Bangladesh, Bangladesh’s largest Islamist party, appealed to the country’s Supreme Court to vacate the death penalty passed on Kamaruzzaman for war crimes, including genocide and torture of civilians, committed during the country’s bloody 1971 war between Bengali nationalists and the Pakistani army. So far, only one senior Jamaat official — Abdul Quader Molla — was hanged for war crimes. He was hanged in December 2013 after the Supreme Court overturned a life sentence imposed on him by the war crimes tribunal. Eight others Jamaat have been condemned to death for their part in atrocities during the 1971 war, but have not yet been executed.

  • Guaranteeing online anonymity

    Anonymity on the Internet is possible only up to a certain degree. Therefore, it is possible that others may see who is visiting an online advice site on sexual abuse, or who frequently looks up information about a certain disease, for example. Seeing that this kind of private information can be linked to their identity, users will often resort to special online anonymization services. One of the most popular tools is Tor. “The Tor network isn’t perfect, however,” says a researcher at the Research Center for IT Security (CISPA). CISPA researchers have developed a program that can provide an accurate assessment of the level of anonymity an individual user achieves, even while basing the estimate on the fluctuations of the Tor network.

  • Security risks, privacy issues too great for moving to Internet voting

    The view held by many election officials, legislators, and members of the public is that if people can shop and bank online in relative security, there is no reason they should not be able to vote on the Internet. Contrary to this popular belief, the fundamental security risks and privacy problems of Internet voting are too great to allow it to be used for public elections, and those problems will not be resolved any time soon, according to a researcher who has studied the issue for more than fifteen years. The security, privacy, reliability, availability, and authentication requirements for Internet voting are very different from, and far more demanding than, those required for e-commerce, and cannot be satisfied by any Internet voting system available today or in the foreseeable future. Such systems are susceptible to “attack” or manipulation by anyone with access to the system, including programmers and IT personnel, not to mention criminal syndicates and even nation states.

  • Suriname president’s son sent to jail for aiding Hezbollah

    A New York court yesterday sentenced Dino Bouterse, the son of the president of Suriname, to more than sixteen years in prison for supporting Hezbollah, the Lebanese Shi’a terrorist organization. In 2013 Bouterse used his position and connections in the Suriname government to help people he believed were members of Hezbollah and who said their intention was to carry out attacks against American interests. In exchange, he was to receive $2 million – which he never received. The people who presented themselves as Hezbollah operatives were, in fact, undercover U.S. agents.

  • ISIS shows signs of strain under weight of battle defeats, other setbacks

    The Islamic State (ISIS) seems to be facing setbacks as a result of attacks from a coalition of Iraqi and Kurdish government troops, as well as local non-ISIS fighters residing near the group’s territory. There have also been reports of rising tensions between foreign and local ISIS fighters.The key challenge facing ISIS right now is more internal than external,” says one expert. “We’re seeing basically a failure of the central tenet of ISIS ideology, which is to unify people of different origins under the caliphate. This is not working on the ground. It is making them less effective in governing and less effective in military operations.”

  • Flaws in U.K. counterterrorism laws allowed Mohammed Emwazi to escape – and become “Jihadi John”

    Before Mohammed Emwazi, the British-Kuwaiti Islamic State (ISIS) fighter now known as “Jihadi John” traveled to Syria and began beheading victims, including American journalist James Foley, he was on the radar of British intelligence officials. He described the pressure he was experiencing from surveillance in a series of e-mails to the Mail on Sunday newspaper between December 2010 and 2011. He said that the pressure of being watched was getting to him. British administrative court documents suggest Emwazi was part of a radical West London recruitment network for terrorist groups in East Africa. By 2013, drone strikes, gains by African Unionforces, and infighting within al-Shabaab had made it difficult for foreign fighters to participate in the insurgency in Somalia. Emwazi’s West London group soon pivoted their efforts on fighting the Assad government in Syria.

  • Western Sahara conflict reaches British court

    Europeans are familiar with efforts, some of them successful, to label agricultural and consumer products produced by Jewish settlers in the West Bank as coming from the Palestinian West Bank, not from Israel, in order to allow consumers to make an educated decision about whether or not they wish to support Israel’s continuing occupation of that territory. A similar effort is now underway in the United Kingdom to label produce coming from Western Sahara. The campaign, launched by campaigners for the freedom of Western Sahara, aims to weaken Morocco’s claim to, and control of, the disputed territory. Morocco, which took control of the territory after Spain, in 1975, ended its colonial rule, regards the Western Sahara as the kingdom’s “southern provinces.” The indigenous Saharawi people want self-determination by establishing an independent state called the Sahrawi Arab Democratic Republic (SADR).

  • Boko Haram announces it is now allied with Islamic State

    Nigeria’s Islamist group Boko Haram has declared its allegiance to Islamic State. The leader of the group, Abubakar Shekau, announced the move in in a Saturday online Arabic audio message with English subtitles. Earlier on Saturday, five bomb explosions killed at least fifty people in the northeastern Nigerian cities of Maiduguri, Baga, and Borno. Boko Haram used five teenagers – four girls and one boy – to carry out the suicide attacks. The Nigerian military proved no match for Boko Haram, but since early February, when Chadian and Cameroonian forces joined the fight, Boko Haram has been losing ground. Security analysts noted that Boko haram fighters are massing at a headquarters in the northeastern town of Gwoza, in what appears as a preparation for a showdown with the multinational forces.

  • Lack of evidence-based terrorism research hobbles counterterrorism strategies

    The Global Terrorism Database at the University of Maryland estimates that groups connected with al-Qaeda and the Islamic State committed almost 200 attacks per year between 2007 and 2010. That number has increased to about 600 attacks in 2013. As terrorism becomes more prevalent, the study of terrorism has also increased, which, in theory, should lead to more effective antiterrorism policies, and thus to less terrorism. The opposite is happening, however, and this could be partly due to the sort of studies which are being conducted. The problem: few of these studies are rooted in empirical analysis, and there is an “almost complete absence of evaluation research” concerning anti-terrorism strategies, in the words of a review of such studies.

  • Agriculture groups say bill would disrupt farming operations, decrease food production

    The Legal Workforce Act(LWAH.R. 1147), introduced by U.S. Representative Lamar Smith (R-Texas) and approved this week by the House Judiciary Committee, could disrupt farming operations if it passes Congress. LWA requires employers in the United States, within three years, to use E-Verifyto verify whether employees are legally allowed to work in the country. Ag industry groups say that passing LWA without some sort of immigration reform for agricultural workers could lead to a $30 billion to $60 billion decrease in food production. The ag industry also notes that each of the two million hired farm employees supports two to three fulltime American jobs in the food processing, transportation, farm equipment, marketing, retail, and other sectors.

  • Texas lawmakers propose bills to bolster border security

    On Monday, more than thirty Texas State House members joined local officials of border towns at the state Capitol to present their solutions to enhancing safety along the Texas border with Mexico. Three bills now being debated would add state police to the border, create a “DPS Officer Reserve Corps” using retired state troopers to assist police work like background investigations, toughen penalties for smugglers, build southbound checkpoints, and create a border protection unit.