-
Africa’s Sahel region threatened by terrorism, organized crime: Ban Ki-moon
Terrorism, trafficking in arms, drugs, and people, and other transnational forms of organized crime are threatening security in Africa’s vast sub-Saharan Sahel region, Secretary-General Ban Ki-moon warned the Security Council yesterday. He called for continued strengthening of The UN Multidimensional Integrated Stabilization Mission in Mali (MINUSMA), a 12,600-strong force set up by the Council in April and authorized “to use all necessary means” to carry out security-related stabilization tasks, protect civilians, UN staff, and cultural artefacts in the cou8ntry, and create the conditions for provision of humanitarian aid.
-
-
Improving the national ballistic data base
A team of researchers identified a number of areas of improvement in a national database of forensic ballistics evidence used to link guns to violent crimes. The report, just released by the National Institute of Justice, already has led to improvements in the system called the National Integrated Ballistic Information Network (NIBIN), which is operated by the Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF).
-
-
DHS fires Black supremacist employee
DHS has fired Ayo Kimathi, the militant Black supremacist employee, after placing him on paid leave four months ago in order to conduct an administrative review of his conduct. Kimathi, who used to work in the procurement specialist at ICE, runs a Web site in which, among other racist rants, he calls for the mass killing of White people, describes President Barack Obama, Oprah Winfrey, and other successful African Americans as “black-skinned Uncle Tom race traitors,” and says that a woman’s primary role in life should be to “keep a strong Black man happy.”
-
-
Police cell-phone tracking raises privacy concerns
Law enforcement agencies around the country are using the International Mobile Subscriber Identity locator (IMSI catcher), known as Stingray, to track cellphone users for the purpose of assisting criminal investigations. Stingray masquerades as a cellphone tower, tricking phones into sending it a signal that law enforcement can later use to identify the serial number of the phone and track the subscriber or cellphone user. Privacy advocates are worried about widespread police tracking of cellphones and violations of privacy.
-
-
Effectively modeling and profitably insuring terrorism risk
The insurance industry continues to explore ways to insure against terrorism risk, finding it a challenge despite developing various methodologies to measuring the likelihood of a terrorist attack. Terrorism experts in the insurance industry insist that because terrorism risk can be modeled, it can be effectively priced, and they note that several insurance companies are effectively modeling and profitably insuring terrorism risk today.
-
-
Colorado faces costly, lengthy challenge fixing flood-damaged roads
The Colorado Department of Transportation(CDOT) has met the 1 December 2013 deadline to reopen twenty-seven flood-battered highways in the state, but the department still faces major challenges in making permanent fixes to damage caused by September’s historic floods. The scope of the task is currently being evaluated as highway managers explore technological and engineering changes needed to keep about 485 miles of damaged roadway more resistant to mass flooding.
-
-
New Silicon Valley focus on cybersecurity
The last time Silicon Valley focused on cybersecurity was in the 1990s. That focus saw the emergence of two giants: McAfee and Symantec. The two companies remain the most recognizable household names, thanks to their traditional firewall and anti-virus products. Now they find the arena which they thought was their own encroached from two sides. On one side there are tech giants like Hewlett-Packard and Cisco Systems, which see new revenue opportunity in cybersecurity. On the other side there is a rush of start-ups backed by large investments of venture capital.
-
-
EU issues new manual for defending ICS against cyberattacks
ENISA, the EU’s cybersecurity agency, has issued a new manual for better mitigating attacks on Industrial Control Systems (ICS). ICS support vital industrial processes primarily in the area of critical information infrastructure such as the energy and chemical transportation industries, where sufficient knowledge is often lacking. As ICS are now often connected to Internet platforms, additional security preparations must be taken. ENISA says that the new guide provides the necessary key considerations for a team charged with ICS Computer Emergency Response Capabilities (ICS-CERC).
-
-
Federal IT spending to exceed $11 billion by 2018
A new report from Delteks, contracted spending on cybersecurity will continue to grow from nearly $9 billion in FY2013 to $11.4 billion in FY2018, driven by multiple initiatives aimed at improving the overall cybersecurity posture of federal agencies. Persistent threats, complex and evolving policy issues, and changing technologies highlight ongoing cyber-workforce shortages to drive investments despite constrained federal IT funding.
-
-
NSA planted sleeper malware in 50,000 computer networks
The NSA has planted 50,000 sleeper malware packages – in effect, digital sleeper agents – in more than 50,000 computer networks around the world. The agents, controlled by the NSA’s Tailored Access Operations (TAO) unit, can be activated on command to harvest information of cause disruption. To plant the digital agents, the NSA employed methods typically used by Internet scammers and fraudsters.
-
-
Lawmakers: Old plastic gun law has not kept pace with technology
The U.S. House of Representativesvoted last Tuesday to renew the 25-year old Undetectable Firearms Actwhich prohibits firearms that can evade metal detectors and X-ray machines. Law enforcement agencies say that developments in 3D printing make the law insufficient, and lawmakers who proposed amending the Act say that the only way to make such guns detectable is to require that at least one component of the firing mechanism in a plastic gun contain enough metal to be detectable in a magnetometer — and that that component be undetachable. The NRA opposes these requirements, saying that they would infringe on the Second Amendment rights of citizens.
-
-
U.S. aircraft to fly African troops to the Central African Republic mission
U.S. military aircraft will fly African and European peacekeepers to the Central African Republic to help contain a bloody internal conflict between Christian and Muslim militias and other rebel factions. The country has been in chaos since Muslim militias ousted President Francois Bozize in March. The initial mission of the U.S. transport planes will be to fly troops from Burundi to the Central African Republic capital of Bangui.
-
-
Texas terror case may hinge on reason for a FISA warrant
The Foreign Intelligence Surveillance Act (FISA), passed in 1978, was the center of a Fifth Circuit Court of Appeals trial last Thursday in New Orleans. The case involves Khalid Ali-M Aldawsari, a former Texas Tech student serving a life sentence for an attempted use of a weapon of mass destruction. At trial, federal prosecutors described Aldawsari as a “lone wolf” terrorist planning to wage a personal “holy war” from Lubbock, Texas. In the application for the warrants, however, prosecutors identified Aldawsari to a FISA court judge as an “agent of a foreign power.”
-
-
Airport scanner vendor failed to disclose use of Chinese components
Recently TSA cancelled a $60 million contract with Rapiscan Systems, a manufacturer of anatomically revealing airport security scanners, after Rapiscan was found to be using unapproved Chinese components in its scanners – and failing to disclose this fact to TSA. Rapiscan, in bidding on the contract, submitted a list of U.S.-made components used in the scanners to the agency, as required by law. After the company received an approval of that list – and the $60 million contract – it ordered the same components from a Chinese company — the Shanghai Advanced Non-Destructive Testing – instructing the Chinese company to label the Chinese-made components with the same part numbers as the originally approved, U.S.-made components, apparently in an effort to make it more difficult for TSA inspectors to notice the illegal switch. Members of the House Homeland Security Committee, charging that the use of Chinese components made the machines susceptible to sabotage, disruption, or spying, want to know whether TSA was aware of Rapiscan’s shenanigans.
-
-
Prolonged viewing of terrorist incident media coverage tied to acute stress
Stepping away from the television, computer screen or smartphone in the aftermath of terrorist attacks or mass shootings may be beneficial to your mental health. This is the takeaway from a new study showing that six or more daily hours of exposure to media coverage of the Boston Marathon bombings in the week afterward was linked to more acute stress than having been at or near the marathon. Acute stress symptoms increased with each additional hour of bombing-related media exposure via television, social media, videos, print, or radio.
-
More headlines
The long view
Kinetic Operations Bring Authoritarian Violence to Democratic Streets
Foreign interference in democracies has a multifaceted toolkit. In addition to information manipulation, the tactical tools authoritarian actors use to undermine democracy include cyber operations, economic coercion, malign finance, and civil society subversion.
Patriots’ Day: How Far-Right Groups Hijack History and Patriotic Symbols to Advance Their Cause, According to an Expert on Extremism
Extremist groups have attempted to change the meaning of freedom and liberty embedded in Patriots’ Day — a commemoration of the battles of Lexington and Concord – to serve their far-right rhetoric, recruitment, and radicalization. Understanding how patriotic symbols can be exploited offers important insights into how historical narratives may be manipulated, potentially leading to harmful consequences in American society.
Trump Aims to Shut Down State Climate Policies
President Donald Trump has launched an all-out legal attack on states’ authority to set climate change policy. Climate-focused state leaders say his administration has no legal basis to unravel their efforts.
Vaccine Integrity Project Says New FDA Rules on COVID-19 Vaccines Show Lack of Consensus, Clarity
Sidestepping both the FDA’s own Vaccines and Related Biological Products Advisory Committee and the CDC’s Advisory Committee on Immunization Practices (ACIP), two Trump-appointed FDA leaders penned an opinion piece in the New England Journal of Medicine to announce new, more restrictive, COVID-19 vaccine recommendations. Critics say that not seeking broad input into the new policy, which would help FDA to understand its implications, feasibility, and the potential for unintended consequences, amounts to policy by proclamation.
Twenty-One Things That Are True in Los Angeles
To understand the dangers inherent in deploying the California National Guard – over the strenuous objections of the California governor – and active-duty Marines to deal with anti-ICE protesters, we should remind ourselves of a few elementary truths, writes Benjamin Wittes. Among these truths: “Not all lawful exercises of authority are wise, prudent, or smart”; “Not all crimes require a federal response”; “Avoiding tragic and unnecessary confrontations is generally desirable”; and “It is thus unwise, imprudent, and stupid to take actions for performative reasons that one might reasonably anticipate would increase the risks of such confrontations.”
Luigi Mangione and the Making of a ‘Terrorist’
Discretion is crucial to the American tradition of criminal law, Jacob Ware and Ania Zolyniak write, noting that “lawmakers enact broader statutes to empower prosecutors to pursue justice while entrusting that they will stay within the confines of their authority and screen out the inevitable “absurd” cases that may arise.” Discretion is also vital to maintaining the legitimacy of the legal system. In the prosecution’s case against Luigi Mangione, they charge, “That discretion was abused.”