-
U.S. to send troops to Nigeria to help fight Boko Haram
Hundreds of U.S. military advisers would soon be on their way to the front lines of the battle raging in north-east Nigeria and neighboring countries against the Islamist Nigerian insurgency Boko Haram. The plan to send U.S. military personnel to the area was as part of a recent confidential assessment by the top U.S. Special Operations commander for Africa, Brig. Gen. Donald C. Bolduc.
-
-
Sahel youths susceptible to radicalization: UN envoy
Hiroute Guebre Sellassie, UN envoy to the Sahel region in Africa, said last week that up to forty-one million young people in the Sahel have nothing hut a bleak future to look to, pushing them to migrate and making them susceptible to radicalization. She said that young people under age 25 in Burkina Faso, Chad, Mali, Mauritania, and Niger “face hopelessness.” She noted that 44 percent of children in the Sahel lack access to primary education and only 36 percent of the population can read or write.
-
-
Apple versus FBI: All Writs Act’s age should not bar its use
A federal magistrate judge in California has issued a warrant ordering Apple to assist the FBI in accessing data on an iPhone used by a suspect in the December 2015 San Bernardino mass shooting. Apple’s public refusal to comply with the order – and its motion asking a judge to reverse the order – have set up a legal showdown that has captivated the technology world. It’s hard not to think that marketing and economics are at least somewhat behind Apple’s actions. But my guess is most people understand that the FBI would not be getting into their phones without a probable cause search warrant. In addition, I would think Apple would not want to have a market composed of people who want to use iPhones for dangerous and illegal activity. The company might actually lose more future customers because of its uncooperative attitude than it would ever lose by helping the government by complying with a court order.
-
-
App warns users when they are about to give away sensitive information online
Researchers are seeing potential in a software application which could effectively warn users when they are about to give away sensitive personal information online. The eye tracker detects where a user’s eyes are at the computer screen and records how long they gazed at that spot. The app uses these two functions to find when a user’s eyes remain on a request for sensitive personal information.
-
-
Russia, Syria triggered refugee crisis to destabilize Europe: NATO commander
General Phil Breedlove, NATO’s Supreme Allied Commander for Europe and head of the U.S. European Command, said Russia and Syria are indiscriminately bombing Syrian civilians to drive the refugee crisis and “weaponize migration.”He said that weapons such as barrel bombs, widely used by the Assad regime against Sunni civilian population, have no military value, and are used solely to terrorize those living in rebel-held territories. He told the Senate Armed Services Committee that the destruction formed part of a deliberate strategy by Russia and the Assad regime to “get them on the road” and “make them a problem for someone else.”
-
-
Syrian, Russian forces targeting hospitals as a war strategy: Amnesty
Russian and Syrian government forces appear to have deliberately and systematically targeted hospitals and other medical facilities over the last three months to pave the way for ground forces to advance on northern Aleppo, an examination of airstrikes by Amnesty International has found. Even as Syria’s fragile ceasefire deal was being hammered out, Syrian government forces and their allies intensified their attacks on medical facilities.
-
-
ISIS “spreading like cancer” among refugees: NATO commander
General Philip Breedlove, NATO’s top commander, on Tuesday told a congressional panel that refugees from the Middle East and north Africa are “masking the movement” of terrorists and criminals. In testimony to the Senate Armed Services Committee, Breedlove said that ISIS is “spreading like a cancer” among refugees. The group’s members are “taking advantage of paths of least resistance, threatening European nations and our own,” he said.
-
-
Destruction of Timbuktu sites by Islamists shocked humanity: ICC prosecutor
Fatou Bensouda, the International Criminal Court’s (ICC) chief prosecutor, speaking at the opening of the war crimes trial against a Malian jihadist leader charged with demolishing ancient mausoleums in Timbuktu, said the world must “stand up to the destruction and defacing of our common heritage.” Ahmad al-Faqi al-Mahdi, 40, is the first jihadist to is the first person to face a war crimes charge for an attack on a historic and cultural monument.
-
-
Cloud-based biosurveillance ecosystem
The Departments of Defense and Homeland Security are developing a system which lets epidemiologists scan the planet for anomalies in human and animal disease prevalence, warn of coming pandemics, and protect soldiers and others worldwide.
-
-
FBI cannot force Apple to unlock iPhone in drug case: Judge
Magistrate Judge James Orenstein in Brooklyn on Monday ruled that the U.S. government cannot force Apple to unlock an iPhone in a New York drug case. The ruling strengthens the company’s arguments in its landmark legal confrontation with the Justice Department over encryption and privacy. The government sought access to the drug dealer’s phone months before a California judge ordered Apple to give access to the San Bernardino terrorist’s handset.
-
-
ISIS executes eight Dutch jihadists for trying to desert
ISIS has executed eight Dutch followers after accusing them of trying to desert. The Dutch secret services say that about 200 people from the Netherlands, including fifty women, have joined ISIS in Syria and Iraq.
-
-
British, U.S. Special Forces training Libyan militias to fight ISIS
British Special Forces have been quietly deployed to Libya for the purpose of helping build an army to fight ISIS militants who have been increasing their presence in the country. The British commandos are working alongside U.S. Special Forces in and around the city of Misrata on north-west Libya to check the progress of jihadist militias.
-
-
WikiLeaks list not connected to terrorist attacks
The WikiLeaks organization was criticized for providing a target list for terrorists when it published a secret memo in 2010 with 200 international sites that the U.S. Department of Homeland Security considered critical to national security. Was there any truth to that claim?
-
-
In FBI versus Apple, government strengthened tech’s hand on privacy
The ongoing fight between Apple and the FBI over breaking into the iPhone maker’s encryption system to access a person’s data is becoming an increasingly challenging legal issue. This case is very specific, and in this narrow case, Apple and law enforcement agencies will likely find a compromise. However, this question is not going away anywhere. With the “Internet of things” touted as the next big revolution, more and more devices will capture our very personal data – including our conversations. This case could be a precedent-setting event that can reshape how our data are stored and managed in the future.
-
-
Suicide bomb detector moves close to commercialization with Sandia engineer’s help
On the chilling list of terrorist tactics, suicide bombing is at the top. Between 1981 and 2015, an estimated 5,000 such attacks occurred in more than 40 countries, killing about 50,000 people. The global rate grew from three a year in the 1980s to one a month in the 1990s to one a week from 2001 to 2003 to one a day from 2003 to 2015. R3 Technologies and a group of other small businesses are developing a way to prevent suicide attacks by detecting concealed bombs before they go off. R3 found a partner in Sandia sensor expert JR Russell who has helped bring the company’s Concealed Bomb Detector, or CBD-1000, close to commercialization over the past two years.
-
More headlines
The long view
Kinetic Operations Bring Authoritarian Violence to Democratic Streets
By Etienne Soula and Lea George
Foreign interference in democracies has a multifaceted toolkit. In addition to information manipulation, the tactical tools authoritarian actors use to undermine democracy include cyber operations, economic coercion, malign finance, and civil society subversion.
Patriots’ Day: How Far-Right Groups Hijack History and Patriotic Symbols to Advance Their Cause, According to an Expert on Extremism
By Art Jipson
Extremist groups have attempted to change the meaning of freedom and liberty embedded in Patriots’ Day — a commemoration of the battles of Lexington and Concord – to serve their far-right rhetoric, recruitment, and radicalization. Understanding how patriotic symbols can be exploited offers important insights into how historical narratives may be manipulated, potentially leading to harmful consequences in American society.
Trump Aims to Shut Down State Climate Policies
By Alex Brown
President Donald Trump has launched an all-out legal attack on states’ authority to set climate change policy. Climate-focused state leaders say his administration has no legal basis to unravel their efforts.
Vaccine Integrity Project Says New FDA Rules on COVID-19 Vaccines Show Lack of Consensus, Clarity
By Stephanie Soucheray
Sidestepping both the FDA’s own Vaccines and Related Biological Products Advisory Committee and the CDC’s Advisory Committee on Immunization Practices (ACIP), two Trump-appointed FDA leaders penned an opinion piece in the New England Journal of Medicine to announce new, more restrictive, COVID-19 vaccine recommendations. Critics say that not seeking broad input into the new policy, which would help FDA to understand its implications, feasibility, and the potential for unintended consequences, amounts to policy by proclamation.