-
WhatsApp's loophole reveals role of private companies in cyber-surveillance
Last month, WhatsApp’s latest security flaw was discovered, a flaw which allow governments to spy on dissidents, activists, and journalists. An Israeli cyber company is reportedly behind the loophole — and not for the first time.
-
-
San Bernardino Court asked to review cell-site simulator, digital search warrants likely improperly sealed
Since the California legislature passed a 2015 law requiring cops to get a search warrant before probing our devices, rifling through our online accounts, or tracking our phones, EFF has been on a quest to examine court filings to determine whether law enforcement agencies are following the new rules.
-
-
Telling early moment that indicates a coming megaquake
Just 10 seconds into a quake, GPS data can detect signs of acceleration that point to an event’s magnitude. Likewise, that moment — gleaned from GPS data on the peak rate of acceleration of ground displacement — can indicate a smaller event.
-
-
U.S.: Russia may be testing low-yield nukes, in violation of treaty
A top U.S. military official has said that U.S. intelligence agencies believe Russia may be conducting low-yield nuclear testing that may be violation of a major international treaty. Lieutenant General Robert Ashley said in a speech on 29 May that Russia could be doing tests that go “beyond what is believed necessary, beyond zero yield.”
-
-
Responding to the rise in domestic terrorism: Don’t forget prevention
The April attack on a synagogue in Poway, California, was the latest demonstration of the rise in extremist violence in the United States committed not by “jihadists” inspired by ISIS or other international terrorists, but by white supremacists, neo-Nazis or other right-wing groups. Eric Rosand writes in Lawfare that with the Tree of Life Synagogue attacks still fresh in many Americans’ minds, post-Poway discussions further highlighted how the resources and tools available to prevent right-wing extremist violence or domestic terrorism in the United States are dwarfed by those available to deal with the jihadist-inspired violence that data shows to be a much lesser threat. Rectifying this imbalance requires urgent attention.
-
-
Crime fighting got easier as burglars reveal all
The expertise of experienced burglars puts them streets ahead of householders, and even well ahead of other criminals, according to a new study. The results could lead to a step-change in how we fight this crime.
-
-
Ghost guns are everywhere in California
Feds say nearly a third of firearms recovered in California are homemade, unserialized, and untraceable. Experts say the accessibility of ghost guns is aided by a cottage industry of retailers selling nearly completed firearms that require no screening to purchase.
-
-
Small device alerts responders to changes to thermal conditions
When firefighters rush into burning buildings, they know the thermal environment may change in a matter of seconds, exposing them to potentially lethal temperatures. Burn Saver is a body-worn technology that continuously monitors thermal conditions and warns firefighters when those conditions become threatening.
-
-
DARPA tests advanced chemical sensors
DARPA’s SIGMA program, which began in 2014, has demonstrated a city-scale capability for detecting radiological and nuclear threats that is now being operationally deployed. DARPA is building off this work with the SIGMA+ initiative that is focused on providing city- to region-scale detection capabilities across the full chemical, biological, radiological, nuclear, and explosive threat space.
-
-
The forensic unknowns of 3D-printed guns
Proponents of the printed guns – 3D-printed with polymers from digital files – maintain that sharing blueprints and printing the guns are protected activities under the First and Second Amendments. Opponents argue the guns are concerning because they are undetectable and also untraceable since they have no serial numbers.
-
-
Dystopian Future Watch: Is San Francisco’s facial recognition ban too little, too late?
Life just keeps creeping along, leading us step-by-step closer to living in a Philip K. Dick dystopian future—in real-time. And often, in our surveillance culture, we are willing participants to work alongside Big Brother. “Remember how fun it used to be to see facial recognition and retina scanning in sci-fi movies?” Hermon Leon asks in the Observer. “We loved it in RoboCop and Blade Runner, right? Now, many of these biometric technologies have become a nightmarish reality. Let’s take a look.”
-
-
Cities can save lives, resources by using a vulnerability reduction scorecard
A new planning tool enables communities to effectively reduce their vulnerabilities to hazards across their network of plans – including transportation, parks, economic development, hazard mitigation, emergency management and comprehensive land use.
-
-
Inside the secret dinners where Congress figures out how to stop a nuclear apocalypse
Washington is home to countless private soirees and high powered dinner clubs, but there’s only one gathering devoted to nukes. They take place once every couple of months at a restaurant or townhome on Capitol Hill and are organized by former Democratic congressman John Tierney, who heads a group that advocates nuclear nonproliferation. Attendance is usually strong—at least a couple of dozen lawmakers show up—and they’re joined by experts like former Secretary of State John Kerry and former Energy Secretary Ernest Moniz. Sam Brodey writes in the Daily Beast that with global nuclear threats on the rise, and with Congress’ general knowledge of those threats on the decline since the end of the Cold War, those involved with the dinner say it’s more important than ever for lawmakers to have an informal venue where they can bolster their nuclear bona fides.
-
-
Analytic superiority, public-private cooperation and the future of U.S. foreign intelligence
After years of focusing on counterterrorism, a mainly kinetic threat, the U.S. intelligence community must now adapt to a long-term cyber struggle with nation-state adversaries. This struggle includes election interference and other socio-political disruption, cyber sabotage, theft of secrets, and competition in emerging technologies such as quantum computing and 5G wireless communications. David Kris writes in Lawfare that to succeed against these threats, the intelligence community must shift its approach in two related ways. First, it must focus on analytic superiority as well as cryptographic superiority—terms that I explain below but that basically require a shift in emphasis from accessing data to managing and using data. Second, to achieve analytic superiority, the intelligence community must develop stronger partnerships with the private sector and academia, and a broader base of external support with the American people.
-
-
Locating a shooter from the first shot using cellphone
In the past several decades, militaries have worked hard to develop technologies that simultaneously protect infantry soldiers’ hearing and aid in battlefield communication. Now a French researcher has developed a proof of concept that uses the microphones in a TCAPS system to capture a shooter’s acoustic information and transmit this to a soldier’s smartphone to display shooter location in real time.
-
More headlines
The long view
AI-Controlled Fighter Jets May Be Closer Than We Think — and Would Change the Face of Warfare
Could we be on the verge of an era where fighter jets take flight without pilots – and are controlled by artificial intelligence (AI)? US R Adm Michael Donnelly recently said that an upcoming combat jet could be the navy’s last one with a pilot in the cockpit.
What We’ve Learned from Survivors of the Atomic Bombs
Q&A with Dr. Preetha Rajaraman, New Vice Chair for the Radiation Effects Research Foundation in Hiroshima and Nagasaki, Japan.
Need for National Information Clearinghouse for Cybercrime Data, Categorization of Cybercrimes: Report
There is an acute need for the U.S. to address its lack of overall governance and coordination of cybercrime statistics. A new report recommends that relevant federal agencies create or designate a national information clearinghouse to draw information from multiple sources of cybercrime data and establish connections to assist in criminal investigations.