-
EU considers far-reaching Internet security initiative
Cybersecurity is becoming an increasingly more daunting challenge as governments try to prevent attacks against critical infrastructure on which the well-being of countries depends, now, several European countries are trying to come together in an effort to defend themselves against a cyber attack, but critics say the project, called CleanIT, goes too far
-
-
Speed camera detectors gaining popularity in Europe
There are 25,000 speed cameras in Europe, and the governments of European countries publicize the cameras’ locations; still, million so Europeans install speed camera detectors in their smartphone; such speed camera detectors are legal in all European countries except Germany and Switzerland, which does not stop hundreds of thousands of Germans from using them
-
-
Senate panel’s report harshly criticizes role, utility of DHS fusion centers
A 2-year bipartisan investigation by the U. S. Senate Permanent Subcommittee on Investigations has found that DHS efforts to engage state and local intelligence “fusion centers” has not yielded significant useful information to support federal counterterrorism intelligence efforts; the report says that senior DHS officials were aware of the problems hampering effective counterterrorism work with the fusion centers, but did not always inform Congress of the issues, nor ensure the problems were fixed in a timely manner; DHS estimates that it has spent somewhere between $289 million and $1.4 billion in public funds to support state and local fusion centers since 2003 (the report says that these are broad estimates which differ by over $1 billion); the Senate investigation raises questions about the value this amount of funding and the contribution the fusion centers make to the U.S. counterterrorism efforts; not everyone agrees with the report; Rep. Peter King (R-NY), chairman of the House Committee on Homeland Security, said: “I agree with Chairman Joe Lieberman and Ranking Member Susan Collins [of the Senate Committee on Homeland Security] that the subcommittee report issued this week paints with too broad a brush an incomplete picture that fails to recognize many of the important contributions that fusion centers have made in securing our Homeland”
-
-
Oregon terrorism suspect’s request to learn identity of government informant rejected
Mohamed Mohamud, a 21-year old Somali born Oregon resident, is accused of attempting to bomb Portland, Oregon’s 2010 holiday tree-lighting ceremony; a request by Mohamud and his defense team to learn the true identity of a government informant known only as “Bill Smith” was denied by U.S. District Judge Garr King
-
-
Keeping safe during earthquakes? There’s an app for that
The American Red Cross released its official earthquake application for iPhone and Android smartphones; the app is free, available in English or Spanish; the app includes earthquake epicenter locations, impact magnitudes, and local geographical impact data provided by the U.S. Geological Survey; it also includes a “shake zone” impact map and a one touch “I’m safe” messaging
-
-
Former L-3 employee guilty of selling weapon secrets to China
A federal court judge in Newark, New Jersey convicted Sixing Liu on six counts of violating the Arms Export Control Act as well as possessing stolen trade secrets, transporting stolen property, and lying to federal agents; Liu is was convicted of stealing thousands of electronic files detailing performance and design of guidance systems for missiles, rockets, target locators, and unmanned aerial vehicles in 2010
-
-
Explosives dumped into Gulf of Mexico pose big problems
Millions of pounds of unexploded bombs and other military ordnance that were dumped decades ago in the Gulf of Mexico, as well as off the coasts of both the Atlantic and Pacific oceans, could now pose serious threats to shipping lanes and the 4,000 oil and gas rigs in the Gulf, warns two oceanographers
-
-
Law enforcement can store, identify millions of voice samples using new software
Everyone this day can be identified by a fingerprint, DNA, or even a picture. Now, with the help of a Russian company, the FBI will soon be using voice recognition to identify people; the FBI says voice biometrics will be a “reliable and consistent means of identification for use in remote recognition”
-
-
Technology soon to make drones deadlier, more autonomous
Unmanned aerial vehicles (UAVs) have become America’s main weapon in the campaign against terrorists — at the forefront are the Predator and the Reaper — and technological changes would soon make them even deadlier; in the next decade drones will be faster and carry more weapons than today’s versions; they will also have better sensors and more sophisticated computers, allowing them to plan and execute attacks with little human participation
-
-
Why common explosive sometimes fails
The explosive PETN has been around for a century and is used by everyone from miners to the military, but it took new research by Sandia National Laboratories to begin to discover key mechanisms behind what causes it to fail at small scales
-
-
Harvesting fuel for the fleet from seawater
Refueling U.S. Navy vessels, at sea and underway, is a costly endeavor in terms of logistics, time, fiscal constraints, and threats to national security and sailors at sea; in Fiscal Year 2011, the U.S. Navy Military Sea Lift Command, the primary supplier of fuel and oil to the U.S. Navy fleet, delivered nearly 600 million gallons of fuel to Navy vessels underway, operating fifteen fleet replenishment oilers around the globe; the Naval Research Laboratory believes there is a better way: extracting carbon dioxide (CO2) and producing hydrogen gas (H2) from seawater and then catalytically converting the CO2 and H2 into jet fuel
-
-
Wearable map-creating device to help first responders
A wearable sensor system automatically creates a digital map of the environment through which the wearer is moving; the system is envisioned as a tool to help emergency responders coordinate disaster response
-
-
Maryland rolls out public safety interoperable communication system
To be better prepared for man-made or natural disasters, Maryland leaders have decided to develop Twelve Core Capacities for Homeland Security, picking the deployment of an interoperable communications system as the highest priority; on 5 June 2012, Governor Martin O’Malley inaugurated the state’s new network, known as the Maryland First Responders Interoperable Radio System Team (Maryland FiRST)
-
-
Raytheon Aerostat, SM-6 missile work together to protect ships
As tensions continue to rise over Iran’s nuclear weapons program, and the likelihood of military action to stop Iran from acquiring nuclear weapons increases – military action which would place U.S. ships in the Persian Gulf and the Indian Ocean at risk — there is good news from Raytheon: soon the seas may be a little safer
-
-
Critics: U.S. not doing enough to combat domestic terrorism
The effectiveness of the U.S. campaign against al Qaeda and its affiliates may have reduced the threat of foreign terrorists launching attacks on targets in the United States, but the threat of terrorism the United States is facing has not been reduced owing to the rise in domestic terrorism
-
More headlines
The long view
AI-Controlled Fighter Jets May Be Closer Than We Think — and Would Change the Face of Warfare
Could we be on the verge of an era where fighter jets take flight without pilots – and are controlled by artificial intelligence (AI)? US R Adm Michael Donnelly recently said that an upcoming combat jet could be the navy’s last one with a pilot in the cockpit.
What We’ve Learned from Survivors of the Atomic Bombs
Q&A with Dr. Preetha Rajaraman, New Vice Chair for the Radiation Effects Research Foundation in Hiroshima and Nagasaki, Japan.
Need for National Information Clearinghouse for Cybercrime Data, Categorization of Cybercrimes: Report
There is an acute need for the U.S. to address its lack of overall governance and coordination of cybercrime statistics. A new report recommends that relevant federal agencies create or designate a national information clearinghouse to draw information from multiple sources of cybercrime data and establish connections to assist in criminal investigations.
Autonomous Weapon Systems: No Human-in-the-Loop Required, and Other Myths Dispelled
“The United States has a strong policy on autonomy in weapon systems that simultaneously enables their development and deployment and ensures they could be used in an effective manner, meaning the systems work as intended, with the same minimal risk of accidents or errors that all weapon systems have,” Michael Horowitz writes.
Twenty-One Things That Are True in Los Angeles
To understand the dangers inherent in deploying the California National Guard – over the strenuous objections of the California governor – and active-duty Marines to deal with anti-ICE protesters, we should remind ourselves of a few elementary truths, writes Benjamin Wittes. Among these truths: “Not all lawful exercises of authority are wise, prudent, or smart”; “Not all crimes require a federal response”; “Avoiding tragic and unnecessary confrontations is generally desirable”; and “It is thus unwise, imprudent, and stupid to take actions for performative reasons that one might reasonably anticipate would increase the risks of such confrontations.”
Luigi Mangione and the Making of a ‘Terrorist’
Discretion is crucial to the American tradition of criminal law, Jacob Ware and Ania Zolyniak write, noting that “lawmakers enact broader statutes to empower prosecutors to pursue justice while entrusting that they will stay within the confines of their authority and screen out the inevitable “absurd” cases that may arise.” Discretion is also vital to maintaining the legitimacy of the legal system. In the prosecution’s case against Luigi Mangione, they charge, “That discretion was abused.”