-
Fast, reliable identification of pathogens
Life-threatening bacterial infections cause tens of thousands of deaths every year in North America, but current methods of culturing bacteria in the lab can take days to report the specific source of the infection, and even longer to pinpoint the right antibiotic that will clear the infection. Researchers have created an electronic chip that can analyze blood and other clinical samples for infectious bacteria with record-breaking speed.
-
-
House panel to unveil cybersecurity bill
Republicans on the House Homeland Security Committee are close to finalizing a long-awaited cybersecurity bill, following extensive discussions with private companies.The bill formally establishes DHS’s already-operating National Cybersecurity and Communications Integration Center, to circulate cyberthreat and vulnerability data.
-
-
ACLU files lawsuit challenging NSA's phone surveillance
In the wake of the past week’s revelations about the NSA’s surveillance of phone calls, the yesterday American Civil Liberties Union (ACLU) filed a lawsuit charging that the program violates Americans’ constitutional rights of free speech, association, and privacy.
-
-
Cloud computing user privacy needs serious reform: scholars
When Web surfers sign up for a new online service or download a Web application for their smartphone or tablet, the service typically requires them to click a seemingly innocuous box and accept the company’s terms of service and privacy policy. Agreeing to terms without reading them beforehand, however, can adversely affect a user’s legal rights, says a new paper by an expert in technology and legal issues.
-
-
NIST publishes draft cloud computing security document for comment
The National Institute of Standards and Technology (NIST) has published a draft document on security for cloud computing as used in the federal government. The public comment period runs through 12 July 2013.
-
-
White House to conduct urgent, comprehensive review of U.S. Syria policy
The White House today and tomorrow is conducting an urgent, and comprehensive, review of U.S. Syria policy, with a major policy announcement expected Wednesday or Thursday. The urgency is the result of changes on the battlefield. Bolstered with thousands of Hezbollah fighters, growing financial support from Iran and Iraq, around-the-clock arms shipments from Iran and Syria, and more direct Iranian involvement in overseeing the regime’s military operations, the Assad government has been able to turn the tide of war in its favor. Senior administration officials believe that arming the rebels may no longer be sufficient to reverse the Assad government’s gains unless the United States takes additional, and more direct, steps like carrying out airstrikes against Syrian forces.
-
-
Lawmakers criticize NSA leaker Edward Snowden
Lawmakers were quick to criticize Edward Snowden, the 29-year old Booz Allen Hamilton employee who disclosed the NSA surveillance program to the Guardian and the Washington Post. House Intelligence Committee chairman Mike Rogers (R-Michigan) said the national security leaks would endanger American lives. Peter King (R-New York), chairman of the Homeland Security subcommittee on Counterintelligence and Terrorism, said of the leaks: “This is a matter of extraordinary consequence to American intelligence.”
-
-
California’s San Onofre nuclear power plant retired due to safety concerns
Southern California Edison (SCE) has decided it will retire the San Onofre nuclear power plant located on the California coast. The decision comes after officials debated for over a year whether the twin reactors could be safely restarted. The power plant is located in a populated area, with millions living near it.
-
-
Edward Snowden, an NSA contractor employee, says he is the source of NSA leaks
Edward Snowden, a 29-year-old former technical assistant in the CIA and more recently an employee of the defense contractor Booz Allen Hamilton, has identified himself as the source of the leaks about three massive NSA surveillance schemes. Snowden says the NSA’s surveillance activities are all-consuming; these activities “are intent on making every conversation and every form of behavior in the world known to [the NSA].” He said that once he concluded that the NSA’s surveillance scheme would soon be irrevocable, it was just a matter of time before he chose to act. “What they’re doing” poses “an existential threat to democracy,” he said.
-
-
Second NSA domestic surveillance scheme revealed: data mining from nine U.S. ISPs
A day after it was revealed that the NSA was collecting communication information on millions of Verizon’s U.S. customers, another NSA domestic surveillance scheme was exposed: the NSA and the FBI have been tapping directly into the central servers of nine leading U.S. Internet service providers for the purpose of harvesting audio, video, photographs, e-mails, documents, and connection logs. The information collected allowed intelligence analysts to track an individual’s movements and contacts over time.
-
-
DHS: electronic devices of border crossers can be searched without reasonable suspicion
An internal DHS study says there was no legal problem with U.S. border agents searching a traveler’s laptop, cellphone, or other electronic devices based solely on a hunch. The study says that the searches do not violate the First and Fourth amendments, and that a 1986 government policy allowing only a cursory review of a traveler’s documents was insufficient.
-
-
Nevada lawmakers fail to restore DHS funds to Las Vegas
Members of the Nevada congressional delegation were taken aback when they found that Las Vegas would lose DHS funding for anti-terror programs, and immediately began to work their fellow lawmakers on the Hill to add money to DHS security grants to cities. The effort failed, and Las Vegas will have to find other sources of funding for some of the city’s security programs.
-
-
NSA collecting information on Verizon customers’ communications
The National Security Agency (NSA) has been collecting massive amounts of “metadata,” or transactional information, on millions of Verizon’s U.S. customers. A court granted the NSA permission to begin information collection on 25 April, stipulating the collection must end by 19 July. The court order instructs Verizon to “continue production on an ongoing daily basis thereafter for the duration of this order.” It specifies that the records to be produced include “session identifying information,” such as “originating and terminating number,” the duration of each call, telephone calling card numbers, trunk identifiers, International Mobile Subscriber Identity (IMSI) number, and “comprehensive communication routing information.”
-
-
The two-track Syria strategy of Iran and Hezbollah
For Iran and Hezbollah, the preservation of Bashar Assad regime is of supreme strategic importance, but both realize the regime may not survive. Iran and Hezbollah, therefore, employ two parallel strategic tracks. The first, immediate track aims to prop up the Assad regime’s ability to survive and continue governing by providing it with military, economic, political, and propaganda support. The second track, planned as an intermediate- and long-term strategy, aims to make it possible for Syria’s Shi’ites and Alawites to defend themselves by creating a “popular army.” To help the first track, Hezbollah has sent thousands of its best fighters to fight on the side of the Assad regime and help the regime keep its hold over areas in northwest Syria. To advance the second track, Hezbollah, with Iranian funding, is helping the Assad regime build and train a popular army of about 150,000 Alawite and Shi’a soldiers. This army will protect the interests of the Alawite and Shi’a communities – and the interests of Iran and Hezbollah — in Syria if the Assad regime falls.
-
-
Rubio will vote against immigration bill unless border security provisions are strengthened
Senator Marco Rubio (R-Florida) is a member of the bipartisan Gang of Eight group which drafted a comprehensive immigration reform bill. The bill has cleared the Senate Judiciary Committee and will come to the Senate floor next week. Rubio, however, says he would vote against the bill he helped draft unless the border security provisions in the bill are strengthened.
-
More headlines
The long view
Are We Ready for a ‘DeepSeek for Bioweapons’?
Anthropic’s Claude 4 is a warning sign: AI that can help build bioweapons is coming, and could be widely available soon. Steven Adler writes that we need to be prepared for the consequences: “like a freely downloadable ‘DeepSeek for bioweapons,’ available across the internet, loadable to the computer of any amateur scientist who wishes to cause mass harm. With Anthropic’s Claude Opus 4 having finally triggered this level of safety risk, the clock is now ticking.”
A Brief History of Federal Funding for Basic Science
Biomedical science in the United States is at a crossroads. For 75 years, the federal government has partnered with academic institutions, fueling discoveries that have transformed medicine and saved lives. Recent moves by the Trump administration — including funding cuts and proposed changes to how research support is allocated — now threaten this legacy.
“The Federal Government Is Gone”: Under Trump, the Fight Against Extremist Violence Is Left Up to the States
As President Donald Trump guts the main federal office dedicated to preventing terrorism, states say they’re left to take the lead in spotlighting threats. Some state efforts are robust, others are fledgling, and yet other states are still formalizing strategies for addressing extremism. With the federal government largely retreating from focusing on extremist dangers, prevention advocates say the threat of violent extremism is likely to increase.
The “Invasion” Invention: The Far Right’s Long Legal Battle to Make Immigrants the Enemy
The Trump administration is using the claim that immigrants have “invaded” the country to justify possibly suspending habeas corpus, part of the constitutional right to due process. A faction of the far right has been building this case for years.
Luigi Mangione and the Making of a ‘Terrorist’
Discretion is crucial to the American tradition of criminal law, Jacob Ware and Ania Zolyniak write, noting that “lawmakers enact broader statutes to empower prosecutors to pursue justice while entrusting that they will stay within the confines of their authority and screen out the inevitable “absurd” cases that may arise.” Discretion is also vital to maintaining the legitimacy of the legal system. In the prosecution’s case against Luigi Mangione, they charge, “That discretion was abused.”
How DHS Laid the Groundwork for More Intelligence Abuse
I&A, the lead intelligence unit of the Department of Homeland Security (DHS) —long plagued by politicized targeting, permissive rules, and a toxic culture —has undergone a transformation over the last two years. Spencer Reynolds writes that this effort falls short. “Ultimately, Congress must rein in I&A,” he adds.