-
Hacker accused of aiding Russian spies in massive breach gets prison
A Kazakh-born computer hacker who U.S. prosecutors say unwittingly worked with a Russian spy agency in a massive Yahoo data breach has been sentenced to five years in prison. Karim Baratov was named in an indictment last year that charged two Russian spies with orchestrating the 2014 Yahoo breach involving 500 million users — one of the largest breaches at any Internet company.
-
-
The federal government has long treated Nevada as a dumping ground, and it’s not just Yucca Mountain
Nevadans can be forgiven for thinking they are in an endless loop of “The Walking Dead” TV series. Their least favorite zombie federal project refuses to die. In 2010, Congress had abandoned plans to turn Yucca Mountain, about 100 miles northwest of Las Vegas, into the nation’s only federal dump for nuclear waste so radioactive it requires permanent isolation. And the House recently voted by a wide margin to resume these efforts. While teaching and writing about the state’s history for more than 30 years, I have followed the Yucca Mountain fight from the beginning – as well as how Nevadans’ views have evolved on all things nuclear. The project could well go forward, but I believe that it probably won’t as long as there are political benefits to stopping it.
-
-
Belgium says deadly attack in Liege was terrorist attack
A stabbing and shooting attack in the eastern Belgian city of Liege has left two police officers and a passer-by dead. Authorities have launched a terror investigation. Belgium remains on edge following several years of extremist Islamist activity.
-
-
Cyber and international law in the 21st century
“Cyber space is not – and must never be – a lawless world. It is the U.K.’s view that when states and individuals engage in hostile cyber operations, they are governed by law just like activities in any other domain,” said the U.K. Attorney General Jeremy Wright, QC MP, on 23 May 2018, setting out, for the first time, the U.K.’s position on applying international law to cyberspace. “What this means is that hostile actors cannot take action by cyber means without consequence, both in peacetime and in times of conflict. States that are targeted by hostile cyber operations have the right to respond to those operations in accordance with the options lawfully available to them and that in this as in all things, all states are equal before the law.”
-
-
Failing to keep pace: The cyber threat and its implications for our privacy laws
“The time has come — indeed, if it has not already passed — to think seriously about some fundamental questions with respect to our reliance on cyber technologies: How much connected technology do we really want in our daily lives? Do we want the adoption of new connected technologies to be driven purely by innovation and market forces, or should we impose some regulatory constraints?” asked NSA General Counsel Glenn Gerstell in a Wednesday presentation at Georgetown University. “Although we continue to forge ahead in the development of new connected technologies, it is clear that the legal framework underpinning those technologies has not kept pace. Despite our reliance on the internet and connected technologies, we simply haven’t confronted, as a U.S. society, what it means to have privacy in a digital age.”
-
-
Russia’s active measures architecture: Task and purpose
Russia’s latest iteration of the Soviet-era tactic of “active measures” has mesmerized Western audiences and become the topic de jour for national security analysts. In my last post, I focused on the Kremlin’s campaign to influence the U.S. elections from 2014 to 2016 through the integration of offensive cyber hacking, overt propaganda, and covert social media personas In this post, I focus on the elements of Russia’s national power that execute active measures abroad.
-
-
U.S. disrupted major Russian cyberattack, possibly on Ukraine
The U.S. Justice Department has seized an Internet domain controlled by a hacking group tied to Russian military intelligence that was planning a major cyberattack, possibly in Ukraine. The U.S. move late on 23 May was aimed at breaking up what the department said was a dangerous botnet of a half-million infected computer network routers that could have allowed the hackers to take control of computers and stage destructive attacks, as well as steal valuable information.
-
-
U.S. troops help fight terrorists in Africa -- quietly
The attack on the U.S. troops in Niger last October, which left four American troops dead and two wounded, was a surprise to the American public because the presence of the U.S. forces in Africa was mostly off the media. The Niger operation is one of the several U.S. military missions ongoing in about twenty African countries, mostly in the northern half of the continent. Most of these missions have one goal: “rolling back Islamist extremism.”
-
-
Every second matters during active assailant events
Studies, event after-action reports, and most publications on the subject have proven that during Direct Threat attacks, most casualties occur in the first 120 seconds (2 minutes). An armed responder to the event arrives in between 4 to 11 minutes on average. It takes an additional 2 to 5 minutes before they enter the building and an additional 2 to 6 minutes to engage the attacker(s). Even if armed intervention is on-site, their reaction and engagement take minutes. The best solution to Direct Threat attacks must thus reduce the timeline of an attack to as close to zero as technology will allow.
-
-
Mass shootings influenced school architecture long before Lt. Gov. Dan Patrick questioned entrances and exits
Architects and school safety experts say that campuses are already designed with minimizing death in mind — but that architecture can only go so far.
-
-
Terrorists, criminals reap more than $43 billion a year from Latin America’s Tri-Border Area
Terrorists and criminals are able to pocket up to $800 million a week or $43 billion a year from activities taking place in Latin America’s Tri-Border Area (TBA), according to a new report. The TBA is the rugged area between Argentina, Brazil, and Paraguay. It encompasses a river system stretching for 2,100 miles and crossing five countries: Argentina, Bolivia, Brazil, Paraguay, and Uruguay.
-
-
Growing concerns about DIY gene editing
There is a growing concerns regarding the rising popularity of do-it-yourself (DIY) gene editing. From the horsepox de novo synthesis to public stunts at conventions where biohackers injected themselves with HIV treatment, it is becoming difficult to ignore why these actions are dangerous.
-
-
Biosecurity: Do synthetic biologists need a license to operate?
Advances in gene editing technology and the drop in costs make it possible for individuals to perform more sophisticated molecular biology experiments in private spaces. This hobby attracts a variety of people and has been hailed as a way to democratize genetic engineering. A few recent stunts raise concerns about what are the hazards of individuals with gene-editing capabilities.
-
-
Terror attacks: how psychological research can help improve the emergency response
In this age of unpredictability, how can the emergency services prepare themselves to respond to a terror attack, like the one at the Ariana Grande concert in Manchester in 2017? We’ve looked into the psychology of decision making and how the key lessons from The Kerslake Report – which evaluated the emergency response during the Manchester attack – could be applied on the ground.
-
-
NIST updates Risk Management Framework to include privacy considerations
Augmenting its efforts to protect the U.S. critical assets from cybersecurity threats as well as protect individuals’ privacy, NIST has issued a draft update to its Risk Management Framework (RMF) to help organizations more easily meet these goals.
-
More headlines
The long view
Factories First: Winning the Drone War Before It Starts
Wars are won by factories before they are won on the battlefield,Martin C. Feldmann writes, noting that the United States lacks the manufacturing depth for the coming drone age. Rectifying this situation “will take far more than procurement tweaks,” Feldmann writes. “It demands a national-level, wartime-scale industrial mobilization.”
No Nation Is an Island: The Dangers of Modern U.S. Isolationism
The resurgence of isolationist sentiment in American politics is understandable but misguided. While the desire to refocus on domestic renewal is justified, retreating from the world will not bring the security, prosperity, or sovereignty that its proponents promise. On the contrary, it invites instability, diminishes U.S. influence, and erodes the democratic order the U.S. helped forge.
Fragmented by Design: USAID’s Dismantling and the Future of American Foreign Aid
The Trump administration launched an aggressive restructuring of U.S. foreign aid, effectively dismantling the United States Agency for International Development (USAID). The humanitarian and geopolitical fallout of the demise of USAID includes shuttered clinics, destroyed food aid, and China’s growing influence in the global south. This new era of American soft power will determine how, and whether, the U.S. continues to lead in global development.
Water Wars: A Historic Agreement Between Mexico and US Is Ramping Up Border Tension
As climate change drives rising temperatures and changes in rainfall, Mexico and the US are in the middle of a conflict over water, putting an additional strain on their relationship. Partly due to constant droughts, Mexico has struggled to maintain its water deliveries for much of the last 25 years, deliveries to which it is obligated by a 1944 water-sharing agreement between the two countries.
How Disastrous Was the Trump-Putin Meeting?
In Alaska, Trump got played by Putin. Therefore, Steven Pifer writes, the European leaders and Zelensky have to “diplomatically offer suggestions to walk Trump back from a position that he does not appear to understand would be bad for Ukraine, bad for Europe, and bad for American interests. And they have to do so without setting off an explosion that could disrupt U.S.-Ukrainian and U.S.-European relations—all to the delight of Putin and the Kremlin.”
How Male Grievance Fuels Radicalization and Extremist Violence
Social extremism is evolving in reach and form. While traditional racial supremacy ideologies remain, contemporary movements are now often fueled by something more personal and emotionally resonant: male grievance.