-
U.S. surveillance policies cost U.S. tech sector more than $35 billion in sales
New report says the U.S. tech industry has under-performed as a result of concerns about the U.S. government’s electronic surveillance. The report estimates that the total economic impact on the U.S. tech sector of U.S. surveillance practices exceeds $35 billion annually. The report recommends policymakers level the playing field for the U.S. tech sector by implementing a series of reforms such as increasing the transparency of its surveillance practices, opposing government efforts to weaken encryption or introduce backdoors in software, and strengthening its mutual legal assistance treaties with other nations.
-
-
Snowden fallout: Revelations forced U.K. to pull out agents from “hostile countries”
The British security services had to pull out agents from “hostile countries” as a result of information the Chinese and Russian intelligence services obtained when they gained access to the millions of top-secret NSA files Edward Snowed was carrying with him when he fled to Honk Kong and then to Russia. Snowden assured journalists who interviewed him that the Chinese and Russian intelligence services would not be able to access these files because he encrypted them with the highest encryption methods available. Security experts commented that he was either naïve or disingenuous – because he must have known, or should have known, that the cyber capabilities these two countries would make it relatively easy for them to crack the encrypted files he was carrying with him. We now know that these security experts were right.
-
-
Administration rejects criticism of NSA’s surveillance of foreign hackers
Just two years after the Edward Snowden leaks exposed the NSA’s domestic surveillance program, another report released last Friday from the Snowden files shares information about the NSA’s efforts to track foreign hackers. As with the NSA’s controversial foreign surveillance program which kept metadata records of suspected foreign terrorists’ conversations with Americans, the NSA’s hacker program may incidentally gather Americans’ private information from the files of foreign hackers.
-
-
Texas flood exposes serious weaknesses in high-tech warning systems
The Memorial Day weekend flood in Texas was a test for regional flood warning systems employed by local and federal emergency agencies. Hays County officials issued three “reverse 911” notifications to residents residing in homes along the Blanco River. The National Weather Servicesent out flash flood warnings to registered local cellphones. Yet the disaster flood, which caused tens of millions of dollars in property damage in Blanco and Hays counties and killed more than a dozen people, exposed serious weaknesses in high-tech warning systems.
-
-
Administration asks court for six more months of NSA bulk metadata collection
Just four hours after President Barack Obama vowed to sign the USA Freedom Actwhich limits the NSA’s domestic bulk data collection program, his administration asked the Foreign Intelligence Surveillance (FISA) court to ignore a ruling by the second circuit court of appeals declaring the bulk surveillance program unauthorized, and instead grant the NSA power to continue bulk collection for six months. In its request, the administration pointed to a six months transition period provided in the USA Freedom Act as a reason to permit an “orderly transition” of the NSA’s domestic bulk collection program.
-
-
“Dark Internet” inhibits law enforcement’s ability to identify, track terrorists
For several months, Islamic State militants have been using instant messaging apps which encrypt or destroy conversations immediately. This has inhibit U.S. intelligence and law enforcement agencies from identifying and monitoring suspected terrorists, even when a court order is granted, because messaging companies and app developers say they are unable to unlock the coded conversations and/or do not have a record of the conversations. “We’re past going dark in certain instances,” said Michael B. Steinbach, the FBI’s top counterterrorism official. “We are dark.”
-
-
Iran’s refusal to allow inspection of military sites could derail nuclear agreement
As the five permanent members of the United Nations Security Council— the United States, Britain, France, Russia, and China — plus Germany near a deal to ease international sanctions if Iran agrees to restrictions and monitoring of its nuclear activities, diplomats say Iran’s refusal to provide inspectors access to its military bases could set back the negotiations, which have been in the works for over twenty-months. Deputy Secretary of State Antony Blinken has publicly said that U.S. officials want IAEA inspectors to be given “anywhere, anytime” access to sites where nuclear work is suspected, adding that the Obama administration will not accept a deal unless access is granted “to whatever Iranian sites are required to verify that Iran’s program is exclusively peaceful — period.”
-
-
Floods as tools of war: Many floods in the Netherlands in past 500 years were deliberately caused during wartime
A new study shows that, from 1500 until 2000, about a third of floods in southwestern Netherlands were deliberately caused by humans during wartimes. Some of these inundations resulted in significant changes to the landscape, being as damaging as floods caused by heavy rainfall or storm surges. The study shows that floods in the Netherlands were used as a weapon as recently as the 1940s. “Strategic flooding during the Second World War undertaken by the Germans remained purely defensive, while the Allied flooding of the former island of Walcheren in the southwest of the country sped up the Allied offensive,” says the study’s author.
-
-
U.S. to ratify two long-stalled nuclear terrorism bills
Deep in the USA Freedom Actwhich was signed into law by President Barack Obama last week, there is a section which will let the United States complete ratification of two-long stalled treaties aimed at preventing nuclear terrorism. “Today, nearly 2,000 metric tons of weapons-usable nuclear materials remain spread across hundreds of sites around the globe — some of it poorly secured,” said former Senator Sam Nunn (D-Georgia), co-chairman of the Nuclear Threat Initiative(NTI). “We know that to get the materials needed to build a bomb, terrorists will not necessarily go where there is the most material. They will go where the material is most vulnerable.”
-
-
Israel conducted tests to assess the impact of dirty bombs
Between 2010 and 2014, Israeli scientists at the Dimona nuclear reactor conducted a series of experiments, under the code name “Green Field,” to examine the consequences of a dirty-bomb explosion in Israel. The purpose of the experiments was defensive – to measure the likely effect of a dirty bomb and evaluate countermeasures. The experiments did not evaluate to offensive potential of a dirty bomb.
-
-
Mapping organized crime, terrorism hotspots in Eurasia
More than a quarter of all the drugs produced in opium-rich Afghanistan pass through Eurasia. Drug trafficking in the region has been linked to the strength of such terrorists groups as the Islamic Movement of Uzbekistan, Islamic Jihad Union, and al-Qaeda. The illicit sale of weapons is common in the area, and locals are drawn into human trafficking rings either for forced labor or sexual exploitation. As organized crime plays an increasing role in funding terrorism, researchers aim to pinpoint hotspots in Eurasia where drug trafficking, human trafficking, and terrorism coincide. The research team, selected to receive a $953,500 Minerva grant from the U.S. Department of Defense’s Minerva Research Initiative, will examine the connections between terrorism and organized crime in Central Asia, South Caucasus, and Russia.
-
-
Better flood-warning system
On Memorial Day evening, Houston, Texas suffered massive flooding after getting nearly eleven inches of rain in twelve hours. Rice University civil engineering professor Philip Bedient is an expert on flooding and how communities can protect themselves from disaster. He directs the Severe Storm Prediction, Education and Evacuation from Disasters Center (SSPEED) at Rice University. Bedient designed the Flood Alert System — now in its third version — which uses radar, rain gauges, cameras, and modeling to indicate whether Houston’s Brays Bayou is at risk of overflowing and flooding the Texas Medical Center. He says more places need those types of warning systems.
-
-
Senate passes surveillance reform
The U.S. Senate yesterday voted 67-32 to pass the House’s USA Freedom Act which would end the NSA collection of bulk metadata of Americans’ phone records. The bill will now head to the White House for the president to sign. The USA Freedom Act shifts the responsibility for keeping the phone records from the government to hundreds of separate phone carriers – but important questions remain. Thus it is not entirely clear how many records the carriers will keep, and for how long, and under what circumstances will they allow law enforcement to view these records. Senator Mitch McConnell (R-Kentucky), the Senate majority leader, who supported the reauthorization of the Patriot Act, said that the USA Freedom Act is “a resounding victory for those who currently plotted against our homeland. It does not enhance the privacy protections of American citizens, and it surely undermines American security by taking one more tool from our war fighters, in my view, at exactly the wrong time.”
-
-
Forest managers hampered in efforts to control costly wildfires by using prescribed burns
Fighting wildfires is costly. The U.S. government now spends about $2 billion a year just to stop them, according to the National Interagency Fire Center. This is up from $239 million in 1985. Forest managers would prefer to use prescribed burns every few years to help prevent costly wildfires and rebuild unhealthy ecosystems, but hurdles like staffing, budget, liability, and new development hinder them.
-
-
Broad NSA surveillance powers, granted in 2006, expired on midnight
The NSA’s broad domestic surveillance authority, granted to the agency when the Patriot Act was first reauthorized in 2006, expired on midnight after the Senate failed to extend Section 215 of the Patriot Act, which governs surveillance, or approve the House’s USA Freedom Act, which modified Section 215. The Senate did vote, 77-17, to take up the House bill on Tuesday. The failure of the Senate to do extend or modify the NSA’s surveillance power was the result of the unyielding position of Senator Rand Paul (R-Kentucky), and also the result of a miscalculation by Senator Mitch McConnell (R-Kentucky), the majority leader, who believed that the prospect of the expiration of Section 215 would lead opponent of the surveillance programs, supporters of the current program, and supporters of the House’s USA Freedom Act to agree to a few weeks extension of Section 215 to allow for more negotiations among senators and between senators and House member. The Senate did vote, 77-17, to take up the House bill on Tuesday. It remains to be seen, however, how many, and what type, of amendments McConnell would allow to be brought to the floor, and, if some of these amendments are approved, whether House members would agree to any modifications to the USA Freedom Act.
-
More headlines
The long view
AI-Controlled Fighter Jets May Be Closer Than We Think — and Would Change the Face of Warfare
Could we be on the verge of an era where fighter jets take flight without pilots – and are controlled by artificial intelligence (AI)? US R Adm Michael Donnelly recently said that an upcoming combat jet could be the navy’s last one with a pilot in the cockpit.
What We’ve Learned from Survivors of the Atomic Bombs
Q&A with Dr. Preetha Rajaraman, New Vice Chair for the Radiation Effects Research Foundation in Hiroshima and Nagasaki, Japan.
Need for National Information Clearinghouse for Cybercrime Data, Categorization of Cybercrimes: Report
There is an acute need for the U.S. to address its lack of overall governance and coordination of cybercrime statistics. A new report recommends that relevant federal agencies create or designate a national information clearinghouse to draw information from multiple sources of cybercrime data and establish connections to assist in criminal investigations.