-
Seismic monitoring network helps locate, determine origins of earthquakes in Texas
Almost a decade ago, the ground around the densely populated Dallas-Fort Worth Metroplex started shaking. As the frequency and intensity of earthquakes increased in a region poorly prepared for the seismic activity, the risk became a priority for the state. Residents, politicians, and oil-gas industry leaders reached out to the Bureau of Economic Geology. The bureau is the oldest and second largest research unit at the university, made up of more than 250 scientists, engineers, and economists. The organization also functions as the State Geological Survey of Texas — a broker of information among industry, academia and government agencies.
-
-
Russia, an alleged coup, and Montenegro’s bid for NATO membership
While the investigation into Russian meddling in the U.S. 2016 election continues, Americans should be reminded of the signs of Russian interference in democratic processes outside the United States – specifically, in the Balkans. Montenegro was targeted by an apparent coup attempt during its last parliamentary election on 16 October 2016. Montenegro’s chief special prosecutor has accused two Russian Military Intelligence Service (GRU) agents for attempting to organize the coup. The GRU is the same organization sanctioned by the Obama administration for hacking the Democratic National Committee offices. As some of the plotters later confessed, their goal was to overthrow Montenegro’s government, kill then-Prime Minister Milo Djukanovic and put into power political groups that oppose Montenegro’s NATO membership. Russia’s involvement in Montenegro is a part of Russia’s broader strategy to roll back NATO and EU enlargement while regaining influence in countries that aspire to join those organizations. Russia has proved that it has the capacity to threaten, influence and subvert NATO’s “open door” policy, and there is no reason to believe that the setback in Montenegro will cause Russia to change course.
-
-
House kills web privacy protections; ISPs free to collect, sell customers’ information
The House of Representative on Tuesday voted 215 to 205 kill the privacy rules, formulated by the FCC, which were aimed at preventing internet service providers (ISPs) from selling their customers’ web browsing histories and app usage to advertisers. Without these protections, Comcast, Verizon, AT&T, and other ISPs will have complete freedom to collect information about their customers’ browsing and app-usage behavior, then sell this information to advertisers.
-
-
Repealing FCC’s privacy rules: A serious blow to privacy, cybersecurity
In the end, the cybersecurity implications of repealing the FCC’s privacy rules come from simple logic. If the privacy rules are repealed, Internet providers will resume and accelerate these dangerous practices with the aim of monetizing their customers’ browsing history and app usage. But in order to do that, Internet providers will need to record and store even more sensitive data on their customers, which will become a target for hackers. Internet providers will also be incentivized to break their customers’ security, so they can see all the valuable encrypted data their customers send. And when Internet providers break their customers’ security, you can be sure malicious hackers will be right on their heels. The net result is simple: repealing the FCC’s privacy rules won’t just be a disaster for Americans’ privacy. It will be a disaster for America’s cybersecurity, too.
-
-
Connected dolls, tell-tale teddy bears: Managing the Internet of Toys
Large numbers of connected toys have been put on the market over the past few years, and the turnover is expected to reach €10 billion by 2020 – up from just €2.6 billion in 2015. Connected toys come in many different forms, from smart watches to teddy bears that interact with their users. They are connected to the internet and together with other connected appliances they form the Internet of Things, which is bringing technology into our daily lives more than ever. However, the toys’ ability to record, store and share information about their young users raises concerns about children’s safety, privacy and social development. Action is thus needed to monitor and control the emerging Internet of Toys.
-
-
Carlos the Jackal sentenced to third life term for 1974 Paris attack
A French court found Carlos the Jackal – the Venezuelan-born Ilich Ramírez Sánchez, a leftist urban terrorist who carried out terrorist attacks in France in the 1970s and 1980s – guilty of killing two and injuring thirty-four in a 1974 grenade attack on a Paris drugstore. Sánchez, who is already serving two life sentences for a 1975 terrorist attack, was at one time one of the world’s most wanted criminals. Sometime in the mid-1980s he escaped to Khartoum, Sudan, and led a quiet life until 1994, when French special forces, in a daring commando raid, captured him and brought him back to France.
-
-
Hamas develops powerful new rockets, threatening Israeli towns near Gaza
The Palestinian terrorist group Hamas has acquired new, more powerful rockets that could severely threaten Israeli towns near the Gaza Strip. The rockets carry hundreds of kilograms of explosive material and have a short range of a few kilometers, similar to the range of mortar shells, according to an assessment by the Israeli military. While the Iron Dome anti-missile system can shoot down short-range projectiles, it is not as effective against mortar shells and rockets with more limited ranges.
-
-
How WhatsApp encryption works – and why there shouldn’t be a backdoor
A battle between national security and privacy is brewing. Governments and secret services are asking encrypted messaging services such as WhatsApp to allow them access to users’ data, arguing that access to messages will allow authorities to thwart future terror attacks. Ultimately, though, if someone thinks that removing WhatsApp encryption would be the solution to the problem of terrorism or crime, then they don’t understand the actual problem. Even if you were to remove the end-to-end encryption from WhatsApp, criminals could create their own, similar, software that would allow them to communicate securely, while ordinary users would lose the ability to send genuinely private messages.
-
-
Judge puts 9/11 victims’ suit against Saudi Arabia on a faster track
Last year Congress passed the Justice Against Sponsors of Terrorism Act (JASTA), opening the door for families of the victims of the 9/11 terrorist attacks and insurance companies to take Saudi Arabia to court for the role Saudi government officials may have played in the attack. The Manhattan federal courts will next year issue rulings which will indicate whether JASTA was a symbolic gesture – or a move which has reshaped the legal landscape.
-
-
London attack: Terrorism expert explains three threats of jihadism in the West
In the wake of the 22 March terrorist attack in London, the only certainty, unfortunately, is that this attack will not be the last such attack in the West. As IS loses ground in Iraq and Syria, it will do all it can to retain an ability to strike in the West. While their key aim is to inspire attacks like those in Paris and Brussels, they will be increasingly difficult to conduct. This is due both to its dwindling resources and the increasing readiness of European security agencies who will be learning from recent attacks. Lone actors, while rare, will continue offer IS a cost-free method of attack. Meanwhile, virtual entrepreneurs will be doing all they can to help their Western contacts plot and execute mass killings from afar.
-
-
Second judge approves settlement on NYPD Muslim surveillance
The second of two federal judges has approved a settlement with the New York City Police Department that protects New York Muslims and others from discriminatory and unjustified surveillance. The new rules govern when and how investigations are conducted, and provide for an independent civilian representative inside the NYPD who will act as a check against surveillance abuses.
-
-
Protecting web users’ privacy
Most website visits these days entail a database query — to look up airline flights, for example, or to find the fastest driving route between two addresses. But online database queries can reveal a surprising amount of information about the people making them. And some travel sites have been known to jack up the prices on flights whose routes are drawing an unusually high volume of queries. MIT researchers next week will present a new encryption system that disguises users’ database queries so that they reveal no private information.
-
-
MIT president calls for investing in basic science to maintain U.S. edge
President Trump’s proposed budget slashes at least $7 billion in funding for science programs. That course of action would put the United States at a competitive disadvantage, argues L. Rafael Reif, president of the Massachusetts Institute of Technology (MIT). “Since World War II, the U.S. government has been the world’s biggest supporter of potentially transformative science — which is a key reason why the country continues to have the highest share of knowledge- and technology-intensive industries in the world, amounting to nearly 40 percent of the economy,” Reif writes in the May/June issue of Foreign Affairs.
-
-
London terrorist British-born, known to security services
The Westminster attacker was identified as Khalid Masood, a Britain-born Muslim with a history of petty crimes who had previously been investigated by MI5 for ties to extremist organizations, Prime Minister Theresa May told the House of Commons. May said the probe took place several years ago, and that the suspect was not “part of the current intelligence picture.” “The police have no reason to believe there are imminent further attacks on the public,” she told MPs.
-
-
Israeli police arrest teen over wave of bomb threats against Jewish targets in U.S.
The Israeli police, acting on a request by the FBI, has arrested a 19-year-old Israeli Jewish man on suspicion of making dozens of threats against Jewish organizations in the United States, and against airlines in the United States and other countries. The unnamed teen, who has a dual Israeli and U.S. citizenship, lives in the southern sea-side city of Ashkelon. The arrest was made after several waves of threats in the past two months against Jewish community centers (JCCs) and other Jewish organizations. The teen used advanced technology in an effort to mask the source of his calls and communications to synagogues, community centers, and public venues.
-
More headlines
The long view
Kinetic Operations Bring Authoritarian Violence to Democratic Streets
Foreign interference in democracies has a multifaceted toolkit. In addition to information manipulation, the tactical tools authoritarian actors use to undermine democracy include cyber operations, economic coercion, malign finance, and civil society subversion.
Patriots’ Day: How Far-Right Groups Hijack History and Patriotic Symbols to Advance Their Cause, According to an Expert on Extremism
Extremist groups have attempted to change the meaning of freedom and liberty embedded in Patriots’ Day — a commemoration of the battles of Lexington and Concord – to serve their far-right rhetoric, recruitment, and radicalization. Understanding how patriotic symbols can be exploited offers important insights into how historical narratives may be manipulated, potentially leading to harmful consequences in American society.
Trump Aims to Shut Down State Climate Policies
President Donald Trump has launched an all-out legal attack on states’ authority to set climate change policy. Climate-focused state leaders say his administration has no legal basis to unravel their efforts.
Vaccine Integrity Project Says New FDA Rules on COVID-19 Vaccines Show Lack of Consensus, Clarity
Sidestepping both the FDA’s own Vaccines and Related Biological Products Advisory Committee and the CDC’s Advisory Committee on Immunization Practices (ACIP), two Trump-appointed FDA leaders penned an opinion piece in the New England Journal of Medicine to announce new, more restrictive, COVID-19 vaccine recommendations. Critics say that not seeking broad input into the new policy, which would help FDA to understand its implications, feasibility, and the potential for unintended consequences, amounts to policy by proclamation.