-
FBI’s biometric data center key to identifying Jihadi John
The FBI is unlikely to release details of how, working with allies in the United Kingdom, it managed to accomplish the task of identifying “Jihadi John” with only video footage of the suspect’s hidden face and a voice with a British accent. Identifying Mohammed Emwazi, a Kuwaiti-born, British-educated man in his mid-20s, was likely done at the FBI’s Criminal Justice Information Services Division(CJIS), which houses the bureau’s Biometric Center of Excellence(BCE). At BCE, the FBI uses the $1.2 billion dollar Next Generation Identification(NGI) software to scan photos, aliases, physical traits, fingerprints, and voiceprints. The software is interoperable with the Pentagon’s Automated Biometric Identification System(ABIS) and DHS’s Automated Biometric Identification System(IDENT).
-
-
U.S. imposes sanctions on three Nigerian Hezbollah operatives
Nigeria is home to a small Shiite Lebanese population, many members of which emigrated for work in the mid-1900s.Roughly five million Shiites living in Nigeria support the Islamic Movement in Nigeria (IMN), an organization initially funded by Iran in the early 1980s to establish an Iranian-style revolution in Nigeria.Last Thursday, the U.S. Treasury Department imposed sanctions on three Nigerians of Lebanese descent, accusing them of being part of Hezbollah’s Foreign Relations Department (FRD) in the Nigerian capital Abuja.Hezbollah is operating in at least forty-five countries, eleven of which are in Africa.
-
-
The CIA bolsters cyber operations
The Central Intelligence Agency (CIA) is planning to join the growing list of U.S. intelligence and security agencies which have redefined their missions to include cyber operations — in the CIA’s case, cyber espionage. Current and former agency officials say the new effort will be part of the broad restructuring of an intelligence service long defined by its human spy work. The shift also reflects the increasing role cyber plays in intelligence gathering, with allies and adversaries relying on smartphones, social media, and other technologies to communicate.
-
-
France asks social media companies to help in fighting radicalization, terrorism
The French government has asked leading social media and tech firms, Google, Facebook, and Twitter to work directly with French law enforcement during investigations and to immediately remove terrorist propaganda when authorities alert them to it.The Islamic State (ISIS), along with other Islamist militant groups, are using social media to disseminate their violent messages, recruit new followers and fighters, and share videos of executed hostages. Roughly 20,000 foreign fighters, including 3,400 from Western nations, have joined ISIS and other extremist groups in Syria and Iraq.
-
-
Muhammadu Buhari, challenger for Nigeria's presidency, vows to defeat Boko Haram
Muhammadu Buhari, the leading challenger for the Nigerian presidency, has committed himself to defeating Boko Haram Islamist insurgents in northern Nigeria by providing the military and security forces with better equipment, more training, and more accurate intelligence. Buhari, a former military leader – and, for about twenty months in 1982-83, the country’s leader – asserted that if the government of President Goodluck Jonathan had deployed the same resources to fighting Boko Haram as it had to secure its own political survival, the Nigerian army would have by now rescued the more than 270 schoolgirls abducted by the extremist movement in Chibok last April. In recent weeks the Islamist insurgents have been pushed back in several places, but Buhari pointedly questioned claims by the Nigerian army chief that the war was almost over.
-
-
Security at U.S. chemical plants, and monitoring that security, still fall short
Security experts, citing a critical Senate report, are warning that the effort by industry and the government to secure U.S. chemical facilities against terrorist attacks has so far been lackluster at best. The Senate report, sponsored by former Senator Tom Coburn (R-Oklahoma), found that after eight years and $595 million dollars spent on efforts to further chemical plant security, there had been only thirty-nine compliance inspections of the 4,011 national facilities at risk. In any event, the current chemical facility security policies apply only to a fraction of the facilities which produce, store, or transport toxic materials around the country. The experts hope that H. R. 4007, which reformed and renewed the 2007 Chemical Facility Anti-Terrorism Standards (CFATS), and which became Public Law No: 113-254 on 18 December 2014, will improve and accelerate the security work needed at U.S. chemical facilities.
-
-
Three New Yorkers charged for attempting to join ISIS in Syria
Three New Yorkers were arrested yesterday on terrorism charges after they attempted to join Islamic State (ISIS) militants in Syria, federal authorities said. Two of the men are Uzbek citizens, and one is a Kazakh. The three men also had domestic terror plans, which included plots to kill FBI agents, plant a bomb at Coney Island, and kill President Obama — “if ordered by ISIS.” Documents filed in court provide a detailed account of the logistics involved in recruitment into ISIS, showing the young men grappling with how to evade law enforcement, sneak across borders, and communicate from afar with members of the Islamic State.
-
-
Spouses of H-1B visa holders may apply for their own work permits
As the White House works to lift an injunction placed by U.S. District Judge Andrew Hanen to prevent the issuing of temporary work permits and deferred deportation to some undocumented parents of American citizens and permanent residents, the Obama administration said on Tuesday that it will move forward with another immigration reform measure it announced last November. Beginning 26 May, spouses of foreign tech workers who hold H-1B visas will be able to apply for work permits of their own.Silicon Valley leaders applauded the measure.
-
-
U.K. military last fall evaluated possible Ebola use by terrorists
In October 2014, during the peak of the Ebola epidemic which terrorized citizens in Liberia, Guinea, and Sierra Leone, security and terrorism analysts considered the probability of the Islamic State (ISIS) or other terror groups weaponizing Ebola and unleashing the virus in New York, Paris, London, or another major city. Many bioweapon researchers played down Martinez’s claim, saying terrorists looking to use Ebola as a weapon would encounter problems. Still, last fall, a U.K. military research unit was tasked with evaluating whether terrorist organizations could use Ebola to attack Western targets.
-
-
Obama’s cybersecurity initiative: a start but businesses – and individuals – need to do more
The linchpin of President Obama’s recently launched cybersecurity initiative is to encourage the private sector to share information to better defend against cyberattacks. Yet U.S. companies have historically been wary of openly talking about their cybersecurity efforts with competitors and with government — for good reason. Many businesses fear that sharing threat-related information could expose them to liability and litigation, undermine shareholder or consumer confidence, or introduce the potential for leaks of proprietary information. For some companies, Edward Snowden’s revelations of sweeping government surveillance programs have reinforced the impulse to hold corporate cards close to the vest. Yet on the heels of a deluge of high-profile cyberattacks and breaches against numerous U.S. companies, we may finally have reached a tipping point, where potential harm to reputation and revenue now outweighs the downside of disclosure from a corporate perspective. Obama’s executive order is thus a spur to get the ball rolling but, frankly, there is a limit to what government alone can (and should) do in this area. Changes in attitudes and behaviors are needed across the board, right down to families and individuals.
-
-
McConnell’s DHS budget plan: “No” to 2014 exec. order, “Yes” to 2012 one
Senate Majority Leader Mitch McConnell (R-Kentucky) has put forth a plan to avoid a DHS shutdown after Senate Democrats on Monday refused to approve a Republican-backed $40 billion DHS appropriation which would defund President Barack Obama’s 2014 immigration actions in order to fund DHS. McConnell’s plan would eliminate Obama’s 2014 immigration action to extend deportation deferment to some undocumented parents of U.S. citizens and permanent residents via the Deferred Action for Parents of Americans(DAPA), but allow a similar 2012 planfor younger undocumented immigrants to continue.
-
-
Judgment against Palestinian Authority for supporting terrorism unlikely to be collected
On Monday, a jury in Manhattan found the Palestinian Authority (PA) and the Palestine Liberation Organization (PLO) liable for their role in knowingly supporting six terror attacks in Israel between 2002 and 2004, in which Americans were killed and injured. The case was brought under the Antiterrorism Act of 1991, which allows American citizens who are victims of international terrorism to sue in U.S. courts and collect triple the amount of damages awarded by the courts. The judgment on Monday granted $655.5 million to the plaintiffs. Legal analysts, however, question whether victims and families of victims will actually get any money from the ruling.
-
-
U.S. Muslim communities step-up efforts to fight radicalization of Muslim youths
Before President Barack Obama last week hosted the White House’s three day summit on countering violent extremism, American Muslim leaders had already begun discussing how to stop young Muslims from being radicalized and recruited by Islamist extremists, specifically the Islamic State (ISIS) and al-Qaeda-backed al-Shabaab. The federal government and local law enforcement, have in many cases, offered to help Muslim communities fight extremism, but some Muslim leaders resist cooperating with the government, fearing that they would be contributing to religious profiling and anti-Muslim bigotry. Muslim communities themselves offer prevention programs and counseling for vulnerable youths who may have been contacted by recruiters.
-
-
The new terrorists and the roots they share with gangs and drug lords
The recent attacks in Paris and Copenhagen are the latest incarnations of a new type of terrorism. Decentralized and homegrown, it is hard to understand. In many cases, these young perpetrators have been drawn to extremist ideologies without personal histories of religious commitment, militancy, or even social activism. How do they — in a relatively short period of time — get to the point where they are willing to commit such violent acts? The context in which these perpetrators live and develop contributes to these outsized acts of violence in at least two significant ways. The first has to do with the nature of excluded communities. Cut off by many boundaries, these communities become like islands disconnected from the society around them. These boundaries are socio-economic and cultural and are often made deeper by racism and discrimination. The second has to do with young persons’ search for identity and status. Such a search in an excluded community is vulnerable to the influence of people who use violence to demonstrate their importance. If that violence is connected with a sense of payback and revenge against those forces that exclude, then the situation is even more volatile.
-
-
Overcoming problems, risks associated with rare earth metals
Numerous metallic elements – called rare earth materials — are regarded as critical: they play an ever more important role in future technologies, but there is a high risk of supply bottlenecks. Small and medium-sized companies are also affected by this, and they are often not sure which of these materials they are dependent on. A recent event at the Swiss Federal Laboratories for Materials Science and Technology (EMPA) aimed to demonstrate ways in which industry and the research community can counter supply risks and the consequence of the ever greater use of these raw materials.
-
More headlines
The long view
Kinetic Operations Bring Authoritarian Violence to Democratic Streets
Foreign interference in democracies has a multifaceted toolkit. In addition to information manipulation, the tactical tools authoritarian actors use to undermine democracy include cyber operations, economic coercion, malign finance, and civil society subversion.
Patriots’ Day: How Far-Right Groups Hijack History and Patriotic Symbols to Advance Their Cause, According to an Expert on Extremism
Extremist groups have attempted to change the meaning of freedom and liberty embedded in Patriots’ Day — a commemoration of the battles of Lexington and Concord – to serve their far-right rhetoric, recruitment, and radicalization. Understanding how patriotic symbols can be exploited offers important insights into how historical narratives may be manipulated, potentially leading to harmful consequences in American society.
Trump Aims to Shut Down State Climate Policies
President Donald Trump has launched an all-out legal attack on states’ authority to set climate change policy. Climate-focused state leaders say his administration has no legal basis to unravel their efforts.