• Africa’s Sahel region threatened by terrorism, organized crime: Ban Ki-moon

    Terrorism, trafficking in arms, drugs, and people, and other transnational forms of organized crime are threatening security in Africa’s vast sub-Saharan Sahel region, Secretary-General Ban Ki-moon warned the Security Council yesterday. He called for continued strengthening of The UN Multidimensional Integrated Stabilization Mission in Mali (MINUSMA), a 12,600-strong force set up by the Council in April and authorized “to use all necessary means” to carry out security-related stabilization tasks, protect civilians, UN staff, and cultural artefacts in the cou8ntry, and create the conditions for provision of humanitarian aid.

  • Improving the national ballistic data base

    A team of researchers identified a number of areas of improvement in a national database of forensic ballistics evidence used to link guns to violent crimes. The report, just released by the National Institute of Justice, already has led to improvements in the system called the National Integrated Ballistic Information Network (NIBIN), which is operated by the Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF).

  • DHS fires Black supremacist employee

    DHS has fired Ayo Kimathi, the militant Black supremacist employee, after placing him on paid leave four months ago in order to conduct an administrative review of his conduct. Kimathi, who used to work in the procurement specialist at ICE, runs a Web site in which, among other racist rants, he calls for the mass killing of White people, describes President Barack Obama, Oprah Winfrey, and other successful African Americans as “black-skinned Uncle Tom race traitors,” and says that a woman’s primary role in life should be to “keep a strong Black man happy.”

  • Police cell-phone tracking raises privacy concerns

    Law enforcement agencies around the country are using the International Mobile Subscriber Identity locator (IMSI catcher), known as Stingray, to track cellphone users for the purpose of assisting criminal investigations. Stingray masquerades as a cellphone tower, tricking phones into sending it a signal that law enforcement can later use to identify the serial number of the phone and track the subscriber or cellphone user. Privacy advocates are worried about widespread police tracking of cellphones and violations of privacy.

  • Effectively modeling and profitably insuring terrorism risk

    The insurance industry continues to explore ways to insure against terrorism risk, finding it a challenge despite developing various methodologies to measuring the likelihood of a terrorist attack. Terrorism experts in the insurance industry insist that because terrorism risk can be modeled, it can be effectively priced, and they note that several insurance companies are effectively modeling and profitably insuring terrorism risk today.

  • Colorado faces costly, lengthy challenge fixing flood-damaged roads

    The Colorado Department of Transportation(CDOT) has met the 1 December 2013 deadline to reopen twenty-seven flood-battered highways in the state, but the department still faces major challenges in making permanent fixes to damage caused by September’s historic floods. The scope of the task is currently being evaluated as highway managers explore technological and engineering changes needed to keep about 485 miles of damaged roadway more resistant to mass flooding.

  • New Silicon Valley focus on cybersecurity

    The last time Silicon Valley focused on cybersecurity was in the 1990s. That focus saw the emergence of two giants: McAfee and Symantec. The two companies remain the most recognizable household names, thanks to their traditional firewall and anti-virus products. Now they find the arena which they thought was their own encroached from two sides. On one side there are tech giants like Hewlett-Packard and Cisco Systems, which see new revenue opportunity in cybersecurity. On the other side there is a rush of start-ups backed by large investments of venture capital.

  • EU issues new manual for defending ICS against cyberattacks

    ENISA, the EU’s cybersecurity agency, has issued a new manual for better mitigating attacks on Industrial Control Systems (ICS). ICS support vital industrial processes primarily in the area of critical information infrastructure such as the energy and chemical transportation industries, where sufficient knowledge is often lacking. As ICS are now often connected to Internet platforms, additional security preparations must be taken. ENISA says that the new guide provides the necessary key considerations for a team charged with ICS Computer Emergency Response Capabilities (ICS-CERC).

  • Federal IT spending to exceed $11 billion by 2018

    A new report from Delteks, contracted spending on cybersecurity will continue to grow from nearly $9 billion in FY2013 to $11.4 billion in FY2018, driven by multiple initiatives aimed at improving the overall cybersecurity posture of federal agencies. Persistent threats, complex and evolving policy issues, and changing technologies highlight ongoing cyber-workforce shortages to drive investments despite constrained federal IT funding.

  • NSA planted sleeper malware in 50,000 computer networks

    The NSA has planted 50,000 sleeper malware packages – in effect, digital sleeper agents – in more than 50,000 computer networks around the world. The agents, controlled by the NSA’s Tailored Access Operations (TAO) unit, can be activated on command to harvest information of cause disruption. To plant the digital agents, the NSA employed methods typically used by Internet scammers and fraudsters.

  • Lawmakers: Old plastic gun law has not kept pace with technology

    The U.S. House of Representativesvoted last Tuesday to renew the 25-year old Undetectable Firearms Actwhich prohibits firearms that can evade metal detectors and X-ray machines. Law enforcement agencies say that developments in 3D printing make the law insufficient, and lawmakers who proposed amending the Act say that the only way to make such guns detectable is to require that at least one component of the firing mechanism in a plastic gun contain enough metal to be detectable in a magnetometer — and that that component be undetachable. The NRA opposes these requirements, saying that they would infringe on the Second Amendment rights of citizens.

  • U.S. aircraft to fly African troops to the Central African Republic mission

    U.S. military aircraft will fly African and European peacekeepers to the Central African Republic to help contain a bloody internal conflict between Christian and Muslim militias and other rebel factions. The country has been in chaos since Muslim militias ousted President Francois Bozize in March. The initial mission of the U.S. transport planes will be to fly troops from Burundi to the Central African Republic capital of Bangui.

  • Texas terror case may hinge on reason for a FISA warrant

    The Foreign Intelligence Surveillance Act (FISA), passed in 1978, was the center of a Fifth Circuit Court of Appeals trial last Thursday in New Orleans. The case involves Khalid Ali-M Aldawsari, a former Texas Tech student serving a life sentence for an attempted use of a weapon of mass destruction. At trial, federal prosecutors described Aldawsari as a “lone wolf” terrorist planning to wage a personal “holy war” from Lubbock, Texas. In the application for the warrants, however, prosecutors identified Aldawsari to a FISA court judge as an “agent of a foreign power.”

  • Airport scanner vendor failed to disclose use of Chinese components

    Recently TSA cancelled a $60 million contract with Rapiscan Systems, a manufacturer of anatomically revealing airport security scanners, after Rapiscan was found to be using unapproved Chinese components in its scanners – and failing to disclose this fact to TSA. Rapiscan, in bidding on the contract, submitted a list of U.S.-made components used in the scanners to the agency, as required by law. After the company received an approval of that list – and the $60 million contract – it ordered the same components from a Chinese company — the Shanghai Advanced Non-Destructive Testing – instructing the Chinese company to label the Chinese-made components with the same part numbers as the originally approved, U.S.-made components, apparently in an effort to make it more difficult for TSA inspectors to notice the illegal switch. Members of the House Homeland Security Committee, charging that the use of Chinese components made the machines susceptible to sabotage, disruption, or spying, want to know whether TSA was aware of Rapiscan’s shenanigans.

  • Prolonged viewing of terrorist incident media coverage tied to acute stress

    Stepping away from the television, computer screen or smartphone in the aftermath of terrorist attacks or mass shootings may be beneficial to your mental health. This is the takeaway from a new study showing that six or more daily hours of exposure to media coverage of the Boston Marathon bombings in the week afterward was linked to more acute stress than having been at or near the marathon. Acute stress symptoms increased with each additional hour of bombing-related media exposure via television, social media, videos, print, or radio.