• Sandia Lab leading multidisciplinary effort to counter WMD

    Threats of terrorism and weapons of mass destruction do not seem as imminent today as they did after the 9/11 attacks, but Jill Hruby, vice president of International, Homeland, and Nuclear Security at Sandia Labs, says that scientists, industry, and universities working on technological solutions to national security challenges must anticipate what could come next. Speaking at AAAS annual meeting, Hruby said that in an environment of lower public interest — due, in part, to the success of early efforts to combat terrorism that resulted in fewer major incidents in recent years — continued collaboration between national security laboratories, academia, and industry is needed.

  • U.S. to use more discretion applying terrorism-related inadmissibility immigration rules

    The Obama administration has relaxed the rules for would-be asylum-seekers, refugees, and individuals who want to come to the United States or remain in the country despite their classification as having provided “limited material support” to terrorists or terrorist organizations.DHS says that rigorous s security and background checks will still be applied to asylum seekers, including those already in the United States, but officials will take into consideration“routine commercial transactions or routine social transactions,” Arab Spring-related anti-regime activities, and more. Current rules already allow exemptions for providing medical care to terrorists or acting under duress.As of 2011, 4,400 immigration cases are on hold as a result of the old terrorism-related inadmissibility rules.

  • Identifying, thwarting insider threats before they do damage

    Researchers argue that one way to identify and predict potential insider threats even before these individuals begin to do damage like stealing and leaking sensitive information, is by using Big Data to monitor changes in behavior patterns. Researchers at PARC, for example, found that individuals who exhibit sudden decrease in participation in group activity, whether in a game like World of Warcraft or corporate e-mail communications, are likely to withdraw from the organization. A withdrawal represents dissatisfaction with the organization, a common trait of individuals who are likely to engage in insider security breaches.

  • John Sandweg, acting ICE director, leaves post after five months

    John Sandweg, the acting head of U.S. Immigration and Customs Enforcement (ICE), on Friday informed agency employees hat he was leaving his post, to which he was appointed by Janet Napolitano last August. Sandweg, an Arizona criminal defense attorney who knew Napolitano from her days in Arizona politics, came to Washington with her when she was became DHS secretary. His appointment to head ICE, the country’s second-largest law enforcement agency, was received with some surprise because his lack of law enforcement experience.

  • Increase in global terrorism and insurgency in last five years

    A new study from HIS Jane reports that the number of attacks by non-state armed groups around the world has rapidly increased in just five years. In 2009, 7,217 terrorist and insurgent attacks were recorded by open sources. In 2013, that number increased by more than 150 percent, to 18,524. The study’s author says that the epicenter of 2013 activity was in the Middle East, with significant pockets of violence radiating out to neighboring regions in Africa and South Asia. The top 3 most active non-state armed groups in 2013 were Barisan Revolusi Nasional (Thailand), the Taliban, and Islami Chhatra Shibir (Bangladesh).

  • Cuba to lose its U.S. banking service today

    Today (Monday) Cuba’s bank in the United States, Buffalo-based M&T Bank, will stop accepting Cuba’s deposits. The bank will close Cuba’s accounts on 1 March 2014. One result will be that travel between Cuba and the United States will become more difficult because banking services are necessary for issuing travel visas. Cuba’s diplomatic mission in Washington, D.C., and the Cuban Permanent Mission to the United Nations in New York have been unable to find an American bank to handle the country’s U.S.-based accounts.

  • The entertainment industry understands the rare Earth crisis, why doesn’t everybody else?

    U.S. dependence on rare earths imports substantially exceeds our dependence on imported petroleum. In 2011, the United States imported 45 percent of the petroleum we consumed, but we imported 100 percent of the rare earth materials we consumed that same year — and rare earths are far more essential to a wider variety of industries than petroleum is. China controls the production, refining, and processing of over 95 percent of the world’s rare earth elements despite only controlling about half of the world’s rare earth resources. In the 1980s, there were approximately 25,000 American rare earth-related jobs; now we barely have 1,500. The United States must take action now to reduce our dependence on foreign sources of rare earth materials and bring back jobs.

  • Snowden stole co-worker’s password to gain access to secret databanks: NSA

    One reason National Security Agency (NSA) former analyst Edward Snowden was able to gain such broad access to a wide variety of agency’s secret documents was that he copied a password from a co-worker who has since resigned. After Snowden was denied access to NSANet, the agency’s computer network which connects into many of the agency’s classified databases, he persuaded a co-worker, an NSA civilian employee, to use his – the co-worker’s — Public Key Infrastructure (PKI) certificate to gain access. The NSA told Congress Snowden used what the agency describes as “digital deception”: the civilian NSA employee entered his password on Snowden’s computer, not realizing that Snowden was able to capture the password, allowing him even greater access to classified information. Once he gained access to NSANet, Snowden released a “Web crawler” inside the system. The crawler automatically indexed the NSANet, and using the passwords Snowden held – one his, one or more those of co-workers – copied every document in its path.

  • German IT industry hopes to benefit from NSA leaks-inspired distrust of U.S. tech companies

    The German IT sector is hoping to benefit from trust lost in American technology firms in the aftermath of Edward Snowden’s leaks. The German government is looking to develop Internet security initiatives, with government departments vying with each other for a lead role. Both inside and outside the German government a proposal, known as “Schengen Routing,” is advanced which calls for data originated in Europe to be processed and stored within Europe. Critics warn that plans to create a European routing system could affect the openness of the Internet.

  • Old-fashioned way to protect high-voltage substations

    There are about 45,000 substations in the United States, but far fewer high-voltage substations like the one attacked last April in Metcalf. California. Americans could see what the loss of just one important power substation can have when, in 2003, a failure in one such substation knocked out power to fifty million people in the United States and Canada for days. Illinois-based IDT says that since Biblical times, the method of thick-walled fortifications to halt manned and artillery attacks remains the best technology for protecting lives and important assets. The company says that its METALITH, a several-feet-thick prefabricated steel barrier structure filled with sand, would offer the best protection to vulnerable power substations. “While most of the electrical industry has been focused on the threat of cyber-terrorism, the San Jose [Metcalf is near San Jose] attack points to the need for physical protection of strategic power grid assets as well,” says Tom Carlton, IDT’s CEO.

  • W.Va. spill leads lawmakers, industry to look at reforming toxic substances law

    The government was slow to respond to the 9 January 2014 massive chemical spill in West Virginia because the law governing such response, the 1976 Toxic Substances Control Act (TSCA), limits regulatory agencies’ authority to investigate such spills.Under TSCA, the EPA must first prove that a chemical poses an unreasonable risk to health or the environment before it can require the needed testing that would show a potential risk. One observer called this a Catch-22, telling a congressional panel that “This is like requiring a doctor to prove that a patient has cancer before being able to order a biopsy.”

  • Portland’s Christmas Bomber challenges NSA-gathered evidence used to convict him

    Mohamed Mohamud, a Somali immigrant and former Oregon State University student, was convicted last year of attempting to detonate a bomb in 2010 near Portland’s Christmas holiday tree-lighting ceremony at Pioneer Courthouse Square. His lawyers are questioning the legality of evidence used against him. Attorneys for Mohamud are claiming that the evidence used was obtained without a warrant and should have been barred by the court.

  • The “Mask": Kaspersky Lab discovers advanced global cyber-espionage operation

    Kaspersky Lab’s security researchers have announced the discovery of the Mask (aka Careto), an advanced Spanish-language speaking threat actor that has been involved in global cyber-espionage operations since at least 2007. What makes the Mask special is the complexity of the toolset used by the attackers. This includes a sophisticated malware, a rootkit, a bootkit, Mac OS X and Linux versions, and possibly versions for Android and iOS (iPad/iPhone). The primary targets are government institutions, diplomatic offices and embassies, energy, oil, and gas companies, research organizations and activists. Victims of this targeted attack have been found in thirty-one countries around the world.

  • Former FERC chair calls for mandatory security standards for high-voltage substations

    Jon Wellinghoff, the former chairman of the Federal Energy Regulatory Commission(FERC), is leading a crusade to improve physical security around the nation’s electrical grid. Following a 16 April 2013 sniper attack on a San Jose, California substation he is urging Congress to give federal agencies the authority to demand improved security around electrical substations. “This isn’t about this substation or this organized attack,” Wellinghoff said of the California incident. “This is more about the larger issue of physical security of these high-voltage substations nationwide and the need to ensure that some defensive measures start to be put in place.”

  • Israeli legal expert urges development of ethics code for cyberwarfare

    Col. Sharon Afek, former deputy military advocate general, says that countries would benefit from developing an ethics code to govern cyber warfare operations. He notes that existing law already prohibits cyber operations which would directly lead to loss of life, injury, or property damage, such as causing a train to derail or undermining a dam. “Israel faces a complex and challenging period in which we can expect both a cyber arms race with the participation of state and non-state entities, and a massive battle between East and West over the character of the future legal regime,” he writes. He acknowledges, though, that only a catastrophic event like “Pearl Harbor or Twin Towers attack in cyberspace” would accelerate developments in this area.