-
Train as you fight
To be effective, the training of soldiers and policemen must be done with training conditions resembling the conditions the trainee will face in a real fight; a policeman or soldier will not have time to warm up and stretch before a real encounter; they will also not be fighting wearing shorts, T-shirts, and tennis shoes; the real fight will not stop when they feel pain or discomfort
-
-
Where is James Bond when we need him?
The villains James Bond was fighting — Dr. No, Goldfinger, and Blofeld — looked improbable in the 1960s; these miscreants of globalization — part master criminal, part arms smuggler, part terrorist, part warlord —are now the stuff of reality
-
-
U.S. debates creating domestic intelligence agency
A new RAND study examines the benefits of creating a domestic intelligence agency; research group offers a break-even analysis of the various counterterrorism organizational options
-
-
Satellite program canceled; intelligence community uneasy
Congress has shelved a Pentagon program to buy two commercial imagery satellites; in 2005 the Pentagon pulled the plug on a major component of the Future Imagery Architecture system; U.S. intelligence community fears intelligence gaps will open
-
-
Briefly noted
Deadly plague found in Grand Canyon… IG: USDA monitoring system improves IT security… France’s DGA issues multinational contract for lightweight UAV radar tech… Thales completes acquisition of U.K. encryption specialist… N.J. safer, but not safe from terrorists
-
-
Debate over safety of taser-proof vests
A U.S. body-armor company is selling taser-proof vests to police units; some argue that the vests make officers less safe because taser-toting bad guys would now aim for the officer’s head; the response: this is like arguing that bullet-proof vests make officer less safe because the bad guy would aim for the head
-
-
HHS offers legal shield to anthrax manufacturers, distributors
The U.S. Department of Health and Human Services offers legal shield to manufacturers and distributors of anthrax vaccines and treatments under a “public health emergency” to be in effect until the end of 2015
-
-
Interpol plans facial recognition database to catch suspects
Every year more than 800 million international travelers fail to undergo the most basic scrutiny to check whether their identity documents have been stolen, Interpol has warned; the organization plans a massive face-recognition database
-
-
Debate over safety of taser-proof vests
A U.S. body-armor company is selling taser-proof vests to police units; some argue that the vests make officers less safe because taser-toting bad guys would now aim for the officer’s head; the response: this is like arguing that bullet-proof vests make officer less safe because the bad guy would aim for the head
-
-
TSA meets initial screening cargo goal
Congress has mandated through the 9/11 law that 50 percent of cargo on passenger carrying aircraft be screened by February 2009 and 100 percent of cargo be screened by August 2010; TSA says it currently screens all cargo on narrow body, passenger-carrying aircraft; these account for more than 90 percent of all passenger carrying aircraft in the United States
-
-
Unsettling lack of security at Level 4 Biosafety Labs
Biosafety labs (BSLs) handle the world’s most dangerous agents and diseases; only BSL-4 labs can work with agents for which no cure or treatment exists; there are five BSL-4 labs in the United States, and GAO conducted a study of these labs’ perimeter security; you are not going to like what the GAO found
-
-
FBI worried about increased cyber crime
Head of the FBI cyber division says the number of victims of cyber crime, and the cost of that crime, are increasing; moreover, as many as two dozen countries have taken an “aggressive interest” in penetrating the networks of U.S. companies and government agencies
-
-
Chertoff urges industry to invest in cybersecurity
About 85 percent of the U.S. critical infrastructure is owned and operated by private industry; DHS secretary Chertoff says this fact makes cybersecurity a shared responsibility between government and the corporations that control most computer networks
-
-
Chertoff says there will be no Big Brother approach to Internet security
Earlier this year Director of U.S. National Intelligence Mike McConnell said the government would require broad powers to monitor all Internet traffic in order to secure the U.S. critical information infrastructure; Chertoff outlines a more modest approach
-
-
Body-armor manufacturer settles with U.S. Justice Department
The U.S. Justice Department charged that a body armor manufacturer knowingly used Zylon fiber in body army it sold to the federal government and local law enforcement; Zylon fiber degrades quickly and is not suitable for ballistic use
-
More headlines
The long view
A Meltdown in Nuclear Security
A commando raid on a nuclear power plant seems the stuff of Hollywood. So why are nuclear security experts so worried? It ranks among the worst-case scenarios for a nuclear power plant: an all-out assault or stealth infiltration by well-trained, heavily armed attackers bent on triggering a nuclear blast, sparking a nuclear meltdown or stealing radioactive material. Under pressure from a cash-strapped nuclear energy industry increasingly eager to slash costs, the commission in a little-noticed vote in October 2018 halved the number of force-on-force exercises conducted at each plant every cycle. Four months later, it announced it would overhaul how the exercises are evaluated to ensure that no plant would ever receive more than the mildest rebuke from regulators – even when the commandos set off a simulated nuclear disaster that, if real, would render vast swaths of the U.S. uninhabitable. Nuclear security experts, consultants, law enforcement veterans and former NRC commissioners are nothing short of alarmed. “You can’t afford to be wrong once,” says one expert.
The FISA Oversight Hearing Confirmed That Things Need to Change
Section 215, the controversial law at the heart of the NSA’s massive telephone records surveillance program, is set to expire in December. Last week the House Committee on the Judiciary held an oversight hearing to investigate how the NSA, FBI, and the rest of the intelligence community are using and interpreting 215 and other expiring national security authorities. If last week’s hearing made anything clear, it’s this: there is no good reason for Congress to renew the CDR authority,” McKinney writes, adding: “Despite repeated requests from the members of the panel to describe some way of measuring how effective these surveillance laws are, none of the witnesses could provide a framework. Congress must be able to determine whether any of the programs have real value and if the agencies are respecting the foundational rights to privacy and civil liberties that protect Americans from government overreach.”
The U.S. Government Keeps Too Many Secrets
That the U.S. government has a problem with classifying information—the process of identifying and protecting documents and discussions that must be kept secret to preserve national security—was established long before President Donald Trump’s Ukraine scandal returned the subject to the headlines. Classifying information is a key part of how the U.S. government functions and is able to carry out sensitive tasks, Giglio writes, but the problem is that too much national-security information—from the trivial to the politically inconvenient—gets labeled “confidential,” “secret,” or “top secret,” meaning that only those with the corresponding government clearance can access it.
I Helped Classify Calls for Two Presidents. The White House Abuse of the System Is Alarming
The whistleblower at the heart of the Ukraine controversy said White House officials ordered information about President Trump’s phone call with President Volodymyr Zelensky to be removed from the classified server typically used to store such information and placed on a hyper-secure “code word” server. Such special protections are typically reserved for material of the gravest sensitivity: detailed information about covert operations, for example, where exposure can get people killed. Kelly Magsamen, who staffed presidential meetings and phone calls with foreign leaders while she was an NSC staffer during the George W. Bush and Barack Obama administrations, writes that “It is difficult to overstate just how abnormal and suspicious treating the call in that manner would be. It strongly suggests White House staff knew of serious wrongdoing by the president and attempted to bury it — a profound abuse of classified systems for political, and possibly criminal, purposes.”
Free Speech Is Killing Us
There has never been a bright line between word and deed. Yet, for years, the founders of Facebook and Twitter and 4chan and Reddit tried to pretend that the noxious speech prevalent on those platforms wouldn’t metastasize into physical violence. Andrew Marantz writes in the New York Times that in the early years of this decade, back when people associated social media with Barack Obama or the Arab Spring, Twitter executives referred to their company as “the free-speech wing of the free-speech party.” “No one believes that anymore,” Marantz writes. Marantz says that after spending the past few years embedded as a reporter with the trolls and bigots and propagandists who are experts at converting fanatical memes into national policy, “I no longer have any doubt that the brutality that germinates on the internet can leap into the world of flesh and blood.” He adds: “The question is where this leaves us. Noxious speech is causing tangible harm. Yet this fact implies a question so uncomfortable that many of us go to great lengths to avoid asking it. Namely, what should we — the government, private companies or individual citizens — be doing about it?”
A Healthy Fear of China
“I have seen the future, and it works,” the left-wing journalist Lincoln Steffens famously declared, after observing Bolshevik Russia in its infancy. What was intended as a utopian boast soon read as a dystopian prediction — but then eventually, as Stalinist ambition gave way to Brezhnevian decay, it curdled into a sour sort of joke. Today, though, there is a palpable fear in the liberal West that Beijing is succeeding where Moscow failed, and that the peculiar blend of Maoist dogmatics, nationalist fervor, one-party meritocracy and surveillance-state capitalism practiced in the People’s Republic of China really is a working alternative to liberal democracy — with cruelty sustained by efficiency, and a resilience that might outstrip our own.