• Local enforcement of immigration law does not achieve intended goals

    A new study found that when local law enforcement agencies begin to inquire immigrants about their immigration status, some immigrants relocate within the United States but few go back relocate to their home country. Those who move to other states tend to be educated – and legally in the United States. The only exception is Arizona’s Maricopa County — which made a name for itself owing to Sheriff Joe Arpaio’s controversial approach to immigration policies — where immigrants are likely to leave the country, perhaps due to unusually intense enforcement and a short distance to the border.

  • Ohio lawmakers want to limit use of drones by law enforcement

    State lawmakers in Ohio want to limit the use of drones by law enforcement agencies in the state.A proposed bill would require law enforcement to obtain a search warrant before using drones. It would prohibit law enforcement from using drones to search for missing persons, locate illegal marijuana operations, or perform several actions officers currently handle with helicopter surveillance.

  • U.S. designates Nigeria’s Boko Haram a foreign terrorist group

    The State Department on Wednesday designated the Nigerian Islamist group Boko Haram as a foreign terrorist organization. The designation makes it possible for the United States to freeze the assets of the organization and its leaders and members, impose travel bans on members of the group, and prohibit Americans from offering material support to the organization. The department also designated Ansaru, a Boko Haram splinter faction, as a foreign terrorist organization. The United States says the designation would help the Nigerian government in fighting the growing threat of domestic Islamist terrorism.

  • Rochester, Minn. wants to stop crime before it happens

    The Rochester Police Departmentin Rochester, Minnesota is using IBM’s Infosphere Identity Insightto predict, and combat, crime. InfoSphere Identity Insight is used to identify frequent crime offenders, and even when multiple false identifications belonging to one individual are stored on record, the associated relationships of those identities could lead to the correct individual.

  • Sequestration already eroding U.S. research capabilities

    As congressional budget leaders continue negotiations over Fiscal Year 2014 spending levels, three organizations representing the U.S. leading public and private research universities say that the results of a new survey reveal the pernicious impact of sequestration on scientific research across the country. Budget cuts have already led to fewer grants, cancelled projects, staff reductions, and reduced learning opportunities. “If Congress fails to reverse course and doesn’t begin to value investments in research and higher education, then the innovation deficit this country is facing will worsen as our foreign competitors continue to seize on this nation’s shortfall,” the leader of one of the organizations said.

  • Illegal population flows and African security

    FOI, the Swedish research institute, brought together scientists and experts from a number of countries to take part in a one-day conference at Medelhavsmuseet in Stockholm on illegal population flows and their consequences in Africa.

  • Advanced police surveillance technologies pose significant privacy concerns

    Much of the attention on surveillance in the media focuses on the National Security Agency (NSA), but there is not a lot of scrutiny on local domestic surveillance. In 1997, about 20 percent of police departments in the United States used some type of technological surveillance. By 2007, that number had risen to more than 70 percent of departments. Experts in criminal law and information privacy warn that the widespread use of advanced surveillance technologies such as automatic license plate readers, surveillance cameras, red light cameras, and facial recognition software by state and local police departments, combined with a lack of oversight and regulation, have the potential to develop into a form of widespread community surveillance, which ought to pose significant privacy concerns to law-abiding citizens.

  • DHS: conspiracy theories about DHS purchases unequivocally false

    Conspiracy theorists have pointed to several DHS solicitations for gear and ammunition as “proof” that the department is in the process of creating, training, and equipping a secret force, the purpose of which would be to suppress public dissent – or worse: one blogger wrote that “Another possible conclusion [regarding DHS’s ammo purchases] is that the bullets are intended to coerce and, if need be, kill us.” DHS flatly rejects these conspiratorial assertions as unequivocally false, saying that each and every purchase is in line with past purchases and in support of on-going, legitimate, and transparent departmental operations.

  • Kenya, Somalia to create joint anti-terrorism task force

    Al-Shabaab’s attack on the Westgate shopping mall in Nairobi last month has prompted security officials in Kenya and Somalia to consider the creation of a joint task force which will share intelligence, monitor activity, and track finances relating to terrorist groups operating in East Africa. Also under discussion is the establishment of a joint East African paramilitary force with jurisdiction throughout the region.

  • War experiences harden group alliances

    War is hell, and according to new research, experiencing its horrors can cause people to have a greater affinity for members of their own group, particularly if they are exposed to warfare in early adulthood or later in childhood. The researchers say that these effects have the potential to explain why conflict sometimes leads to cycles of war and sometimes stimulates nation-building in its wake.

  • Weakening cybersecurity to facilitate NSA surveillance is dangerous: experts

    In the wake of revelations about the NSA surveillance programs, an expert on surveillance and cybersecurity recommended a re-evaluation of those surveillance practices that weaken commercial products and services. These practices include weakening standards and placing “back doors” into products that are accessible to U.S. government agencies. The expert – Jon Peha, former chief technology officer of the FCC and assistant director of the White House’s Office of Science and Technology — said deliberately weakening commercial products and services may make it easier for U.S. intelligence agencies to conduct surveillance, but “this strategy also inevitably makes it easier for criminals, terrorists and foreign powers to infiltrate these systems for their own purposes.”

  • Nuclear experts: world is safer, but risks remain

    Speaking at a two-day short course on Nuclear Weapon Issues in the Twenty-First Century earlier this month, leading nuclear weapons scientists and policymakers said that despite some troubling areas, the world is a safer place than in past decades, and they expressed cautious optimism it is continuing in that direction. They warned, however, that despite this progress, crises involving nuclear weapons can still spiral out of control.

  • U.S. tech companies could go “dark” to regain trust

    With each new revelation of the scope of the American National Security Agency’s spying, perceptions of the importance of privacy are hardening around the world. There is thus a motivation for major technology companies to provide a verifiably secure means of allowing users to communicate securely without an ability for the companies to provide access to security agencies, even if requested to. Two companies, Silent Circle and Lavabit, have come together to form the Dark Mail alliance in an attempt to do exactly this.

  • IID raises $8 million to scale shared cyberintelligence offering

    Despite the growing danger posed by cybercrime, information vital to stemming the tide is fragmented across the Internet today. Pockets of data about threat activity are siloed within the repositories of individual enterprises, government organizations, vendor networks, and research institutions. IID’s ActiveTrust enables enterprises and government agencies to combat the rising frequency and sophistication of cyberattacks by sharing cyber incident data in real time. IID has raised $8 million in Series A funding from Bessemer Venture Partners (BVP), and said it will use the investment to accommodate growing demand for ActiveTrust.

  • Reducing volume of nuclear waste by 90 percent possible

    Engineers have developed a way significantly to reduce the volume of some higher activity wastes, which will reduce the cost of interim storage and final disposal. The researchers have shown that mixing plutonium-contaminated waste with blast furnace slag and turning it into glass reduces its volume by 85-95 percent. It also effectively locks in the radioactive plutonium, creating a stable end product.