-
Refined interview technique can reveal terror plots
An interview technique for eliciting intelligence without asking questions has in a series of experiments proven to work very well. The idea dates back to the renowned Second World War interrogator Hanns Scharff, but has now, for the first time, been empirically validated. The technique can help intelligence agencies reveal plans of future terrorist acts.
-
-
Studying collaboration between research, intelligence communities
In 2013, NC State University and the National Security Agency (NSA) created the Laboratory for Analytic Sciences (LAS) — a collaborative partnership focused on addressing the research challenges associated with “big data.” They soon discovered that a funny thing happens when academic researchers collaborate with the intelligence community: they feel like they are being spied on.
-
-
Calif. gas well blowout caused U.S. largest methane release, study finds
The Aliso Canyon natural gas well blowout released more than 100,000 tons of the powerful greenhouse gas methane before the well was finally plugged 11 February, according to the first study of the event. The results confirm that it was the largest methane leak in U.S. history.
-
-
French Special Forces join fight against ISIS in Libya
French Special Forces are among commando units operating on the ground in Libya against ISIS. A small French force has been operating out of Benghazi’s Benina airport, assisting forces of the internationally backed Libyan authorities in Tobruk. The Pentagon has said that in the absence of a unity government, U.S. Special Forces have been “partnering” with different militias for attacks on ISIS militants.
-
-
Wearing hijab is “passive terrorism”: USAF study
A study issued by the U.S. military has suggested that wearing the hijab by some Muslim women represents a form of “passive terrorism.” The study, originally issued by the USAF in 2011 and re-issued in summer 2015, includes a chapter which contains discussion of radicalization. In addition to the comment about hijabs, the chapter also claims that support for militant groups is driven by “sexual deprivation.”
-
-
Pro-ISIS hackers issue threats to Facebook, Twitter founders
Pro-ISIS hackers have released a video threatening the founders of Facebook and Twitter in retaliation for the two social media giants’ campaign to take down ISIS-related accounts. The threat was issued in a 25-minute video, uploaded on Tuesday to social networks by a group calling itself “Sons Caliphate Army” – which experts say is the latest “rebrand” of ISIS’s supporters online.
-
-
Partition of Syria could be “Plan B” if cease-fire, peace negotiations fail: Kerry
Secretary of State John Kerry said he would support a partition of Syria – what he called “Plan B” – if the U.S.-Russian sponsored ceasefire, scheduled to start in the next few days, fails to materialize. Partition would also be an option, Kerry said, if a genuine shift to a transitional government does not take place in the next few months. Kerry’s words were the first time a senior American official publicly discussed the option of partitioning Syria, although experts have noted that the partition of the country by creating an Assad-controlled Alawite enclave in north-west Syria is Russia’s true goal in the conflict.
-
-
More Americans support Justice Dept. than Apple in locked iPhone dispute
As the standoff between the Department of Justice and Apple Inc. continues over an iPhone used by one of the suspects in the San Bernardino terrorist attacks, 51 percent say Apple should unlock the iPhone to assist the ongoing FBI investigation. Fewer Americans (38 percent) say Apple should not unlock the phone to ensure the security of its other users’ information; 11 percent do not offer an opinion on the question.
-
-
Passwords, privacy and protection: can Apple meet FBI’s demand without creating a ‘backdoor’?
The point of encryption is to make decryption hard. However, hard does not mean impossible. The FBI could decrypt this data, with sufficient effort and computational power, and they could do this with no help from Apple. However, this route would be expensive, and would take some time. In effect, what they’re requesting of Apple is to make their job easier, cheaper and faster. Ultimately, how this matter gets resolved may depend more on the big-picture question of what privacy rights we as a society want for the data we record on our personal devices. Understanding the technical questions can inform this discussion.
-
-
How mobile ads leak personal data
The personal information of millions of smartphone users is at risk due to in-app advertising that can leak potentially sensitive user information between ad networks and mobile app developers, according to a new study.
-
-
Detecting hidden malicious ads hidden in apps
The danger of acquiring a computer virus or spyware used to come with the risk of visiting the dark, sketchy corners of the Internet. But now trusted and harmless smartphone apps like MyFitnessPal and Candy Crush carry their own risks. As more and more people own smartphones, the number of malicious ads hidden in apps is growing — tripling in just the past year.
-
-
U.S. to fly armed drone attacks from a base in Sicily against ISIS in Libya
Italy said it would allow armed U.S. drones to be based in an American base in Sicily so they would be within to launch attacks against ISIS militants in Libya and other northern Africa countries. The agreement was reached after years of negotiations, and against the backdrop of intensified ISIS activity in Libya and other African countries.
-
-
Obama to send last Gitmo relocation plan to Congress today
Moving Guantánamo detainees to the mainland United States has been one of President Barack Obama’s main goals – and a major bone of contention with Congress. The issue has now become more pressing as the United States and Cuba are in the process of normalizing their relationships, and the Cubans want the detainees out of Gitmo as well. Obama will be sending a plan to Congress today (Tuesday), urging lawmakers to agree to move the detainees to locations in the United States – but the plan does not name the sites in the United States to which locations the administration wants to send the remaining detainees.
-
-
Understanding Islamic State: where does it come from and what does it want?
Islamic State (IS) is an instance of a phenomenon that recurs in most religions, and certainly in all monotheistic religions. Every so often militant strains emerge, flourish temporarily, then vanish. They are then replaced by another militant strain whose own beginning is linked to a predecessor by nothing more profound than drawing from the same cultural pool as its predecessor. Whatever the future may hold, IS, like some apocalyptic Christian groups, has proved itself so tactically and strategically adept that it has obviously kicked any “end of days” can well down the road (roughly the same distance al-Qaeda kicked the re-establishment of the caliphate can). Further, much of the IS leadership consists of hard-headed former Iraqi Ba‘th military officers who, if they think about an apocalypse at all, probably treat it much as Hitler’s generals treated the purported musings of Nazi true believers — with a roll of their eyes. Foregrounding IS’s apocalyptic worldview enables us to disparage the group as irrational and even medieval — a dangerous thing to do. If the recent past has demonstrated one thing, it’s that IS thrives when its adversaries underestimate it.
-
-
Snowden ready to return to U.S. for “fair trial”
Edward Snowden has told friends and supporters he was ready to return to the United States if he could be guaranteed a fair trial. Snowden said his representatives had approached the U.S. Justice Department in an effort to negotiate a plea deal, even one involving him spending time in jail. He told the BBC Panorama last year, however, that the Justice Department had made no effort to respond.
-
More headlines
The long view
Kinetic Operations Bring Authoritarian Violence to Democratic Streets
Foreign interference in democracies has a multifaceted toolkit. In addition to information manipulation, the tactical tools authoritarian actors use to undermine democracy include cyber operations, economic coercion, malign finance, and civil society subversion.
Patriots’ Day: How Far-Right Groups Hijack History and Patriotic Symbols to Advance Their Cause, According to an Expert on Extremism
Extremist groups have attempted to change the meaning of freedom and liberty embedded in Patriots’ Day — a commemoration of the battles of Lexington and Concord – to serve their far-right rhetoric, recruitment, and radicalization. Understanding how patriotic symbols can be exploited offers important insights into how historical narratives may be manipulated, potentially leading to harmful consequences in American society.
Trump Aims to Shut Down State Climate Policies
President Donald Trump has launched an all-out legal attack on states’ authority to set climate change policy. Climate-focused state leaders say his administration has no legal basis to unravel their efforts.
Vaccine Integrity Project Says New FDA Rules on COVID-19 Vaccines Show Lack of Consensus, Clarity
Sidestepping both the FDA’s own Vaccines and Related Biological Products Advisory Committee and the CDC’s Advisory Committee on Immunization Practices (ACIP), two Trump-appointed FDA leaders penned an opinion piece in the New England Journal of Medicine to announce new, more restrictive, COVID-19 vaccine recommendations. Critics say that not seeking broad input into the new policy, which would help FDA to understand its implications, feasibility, and the potential for unintended consequences, amounts to policy by proclamation.