-
DHS releases national emergency communications plan
Seven years after 9/11, and three years after Katrina, DHS releases the U.S. first strategic plan aimed at improving emergency response communications
-
-
2001 anthrax attacks chief suspect kills himself
Bruce Ivins, the FBI’s chief suspect in the 2001 anthrax attacks — after the previous main suspect, Steven Hatfill, has been exonerated — commits suicide; scientist kills himself after being told that the government was about to file criminal charges against him
-
-
Sharp increase in "zero-day" exploits
Cyber-criminals are adopting new automation techniques and strategies that allow them to exploit vulnerabilities much faster than ever before
-
-
New simulation tool for handling hazardous situations
Irish, Israeli companies develop new simulation tool which immerse trainees in a scene which has been designed for them; new tool will help first responders and law enforcement familiarize themselves with situations before they occur
-
-
New Zealand to use biometrics to monitor immigration
Technology will allow border control staff to conduct biometric checks on inbound and outbound passengers
-
-
New rules for private guards
Some 1,000 security companies operate in Greece, employing 50,000 people and making 90 million euros a year; the Greek parliament wants to tighten control of these companies
-
-
New crime: Forged eye biometrics recognition stamps
How accurate is iris scanning biometric technology? read on: Three individuals are arresed at the Dubai airport for smuggling forged eye biometrics recognition stamps; the criminals’ goal: to facilitate the entry to the UAE of individuals who were previously banned
-
-
-
ACLU: Terrorist Watch List hits one million names
ACLU claims terrorist watch list reached one million names; launches online watch list complaint form
-
-
TSA: ACLU’s terrorist watch list facts and figures are a myth
The Transportation Security Administration refutes the facts and figures used by the ACLU in the latter’s claim that the list is now 1-million strong
-
-
Cyber cafes to be monitored in India
Indian police places biometric systems and CCTV in more than 150 cyber cafes in order to catch cyber criminals in the act
-
-
Cybercrime gangs highly structured
The chain of command of a cybercrime gang is not unlike the Mafia, an evolution which shows how online crime is becoming a broad, well-organized endeavor
-
-
Criticism of delays in coordinating national emergency communication
Congress criticizes DHS for delays in coordinating a national emergency communications plan for first responders
-
-
Powerful laser blinds Moscow partygoers
Organizers of a rave party north of Moscow use a powerful laser to beam the partygoers, causing retinal burns and permanent eye damage to many; engineers accuse party organizers of “technical illiteracy”
-
-
U.S. intelligence services aware of vast Chinese espionage campaign
Multifaceted Chinese espionage campaign in the United States and other Western countries aims not only to steal military secrets, but also industrial secrets and intellectual property in order to help Chinese companies better compete in the global economy; Chinese government and state-sponsored industries have relied not only on trained intelligence officers, but also on the Chinese diaspora — using immigrants, students, and people of second- and third-generation Chinese heritage
-
More headlines
The long view
AI-Controlled Fighter Jets May Be Closer Than We Think — and Would Change the Face of Warfare
Could we be on the verge of an era where fighter jets take flight without pilots – and are controlled by artificial intelligence (AI)? US R Adm Michael Donnelly recently said that an upcoming combat jet could be the navy’s last one with a pilot in the cockpit.
What We’ve Learned from Survivors of the Atomic Bombs
Q&A with Dr. Preetha Rajaraman, New Vice Chair for the Radiation Effects Research Foundation in Hiroshima and Nagasaki, Japan.
Need for National Information Clearinghouse for Cybercrime Data, Categorization of Cybercrimes: Report
There is an acute need for the U.S. to address its lack of overall governance and coordination of cybercrime statistics. A new report recommends that relevant federal agencies create or designate a national information clearinghouse to draw information from multiple sources of cybercrime data and establish connections to assist in criminal investigations.
Autonomous Weapon Systems: No Human-in-the-Loop Required, and Other Myths Dispelled
“The United States has a strong policy on autonomy in weapon systems that simultaneously enables their development and deployment and ensures they could be used in an effective manner, meaning the systems work as intended, with the same minimal risk of accidents or errors that all weapon systems have,” Michael Horowitz writes.
Twenty-One Things That Are True in Los Angeles
To understand the dangers inherent in deploying the California National Guard – over the strenuous objections of the California governor – and active-duty Marines to deal with anti-ICE protesters, we should remind ourselves of a few elementary truths, writes Benjamin Wittes. Among these truths: “Not all lawful exercises of authority are wise, prudent, or smart”; “Not all crimes require a federal response”; “Avoiding tragic and unnecessary confrontations is generally desirable”; and “It is thus unwise, imprudent, and stupid to take actions for performative reasons that one might reasonably anticipate would increase the risks of such confrontations.”
Luigi Mangione and the Making of a ‘Terrorist’
Discretion is crucial to the American tradition of criminal law, Jacob Ware and Ania Zolyniak write, noting that “lawmakers enact broader statutes to empower prosecutors to pursue justice while entrusting that they will stay within the confines of their authority and screen out the inevitable “absurd” cases that may arise.” Discretion is also vital to maintaining the legitimacy of the legal system. In the prosecution’s case against Luigi Mangione, they charge, “That discretion was abused.”