• U.S. tech companies increase lobbying efforts related to surveillance, NSA

    Technology firms Apple, Google, Facebook, and Microsoft, among other tech powerhouses, are quietly increasing lobbying efforts directed at government surveillance laws as they seek to have a say in what Congress does regarding surveillance reforms and National Security Agency (NSA) programs. Traditionally, tech firms have not pushed for restrictions on the ability of the U.S. intelligence community to collect data, and it is not clear what position these industry leaders will take, whether they plan to take a position at all, or whether they will present lawmakers with a united industry front.

  • Preventing a “cyber Pearl Harbor”

    Cyber-security has become the new homeland security of the decade. Last year, then- Defense Secretary Leon Panetta issued a call to arms against cyberattacks, warning that sophisticated attacks against the United States could be America’s next “cyber Pearl Harbor.” It is imperative that we apply the same level of awareness and action as we have to the physical security of our facilities to ensure our security against this ever-evolving threat.

  • White House to curb NSA monitoring of some allies' leaders

    It appears that President Obama will soon instruct the NSA to stop eavesdropping on leaders of close U.S. allies. It now emerges that both the president and Congress’s intelligence committees were kept in the dark about this aspect of the NSA surveillance program. Yesterday’s indication by the White House that it moving toward banning the NSA from eavesdropping on some foreign leaders is a historic change in the practices of an agency which has enjoyed unlimited and unfettered – and, it now appears, unsupervised – freedom of action outside the borders of the United States. The move is similar to, if more complicated than, the limits imposed on the CIA in the mid-1970s. Security experts note, though, that prohibiting the NSA from eavesdropping on some foreign leaders would be more complicated and potentially more damaging to U.S. interests than the prohibitions imposed on the CIA more than three decades ago.

  • Video imaging system for remote detection of hidden threats

    By adapting superconducting technology used in advanced telescope cameras, researchers have built a prototype video imaging system for detecting hidden weapons and other threats at distances up to twenty-eight meters away.

  • Death of Muslims used by extremists for recruitment, propaganda

    In the last thirty years, conflicts in Afghanistan, Iraq, Bosnia, Chechnya, Somalia, and other countries have caused the death of four million Muslims. The theme of innocent Muslims dying as result of conflicts initiated by Western powers and their allies is a central motif used by Islamic militants to recruit new members. It is a theme which fuels anti-American sentiments in the Middle East and North Africa. Historians and Islamic scholars note that the notion that the West is orchestrating a “genocide” of Muslim is patently false, and that beginning with the Iran-Iraq War (1980-88) and continuing to the present day, more and more casualties are inflicted by Muslims against Muslims. Still, the myth of a non-Muslim genocidal “crusade” against Muslims is powerful, and is one which is effectively used by al Qaeda and other Islamic terrorist groups.

  • Strike Two: The CBP’s failure to polygraph its future employees

    Two recent reports – one by the DHS OIG, the other by the GAO — raise an alarm not just about CBP’s failure to monitor and ameliorate the use of excessive force by its agents and officers, but also call into question the quality and character of CBP’s current work force. Rather than reassure the public that the CBP is transitioning into a modern, professional law enforcement agency, these two reports highlight the need for increased congressional oversight and study of an agency which is so vital to our national security.

  • Preventing a Bhopal-like catastrophe in New Jersey

    New Jersey is home to ninety facilities which produce and store large quantities of highly toxic chemicals. A superstorm or terrorist attack could doom millions of people around southern New Jersey and eastern Pennsylvania to a Bhopal, 1984-like fate if either of these facilities and their storage tanks were affected.Typically, in the aftermath of major disasters, a blue ribbon panel is created to review preventative measures that could have been taken before the disaster. Security experts say that there is no need to wait for a post-disaster blue ribbon panel investigation to know what sensible safety measures should be implemented now.

  • Bolstering the safety, security of U.S. nuclear weapons

    To improve the safety and security of nuclear weapons, specialists must weigh the risks and benefits of making intrinsic changes to the warheads (possibly degrading their performance) or pursuing external changes such as better access controls, according to experts. While improvements such as use of shock- and fire-resistant chemical explosives in the warheads could further decrease the risk of an accidental nuclear detonation or dispersal of plutonium, most of the experts who participated in a workshop on the issue were not greatly concerned about the safety level of the current U.S. nuclear arsenal.

  • “Go ahead, make my day”: Sheldon Adelson on how to deal with Iran

    Casino mogul Sheldon Adelson says that the Obama administration’s negotiations with Iran will lead to nothing, arguing that the best negotiating tactics would be to launch a preemptive nuclear strike on unpopulated areas in Iran – accompanied by a threat to wipe out the entire population of Tehran if Iran refused to give up its nuclear program. Echoing Clint Eastwood, Adelson said that following the nuclear explosion in the desert, Obama should tell the Iranians: “You want to be wiped out? Go ahead and take a tough position and continue with your nuclear development.”

  • Acoustic detection identifies IEDs – and their explosive yield

    A number of different tools are currently used for explosives detection. These range from dogs and honeybees to mass spectrometry, gas chromatography, and specially designed X-ray machines.A new acoustic detection system, consisting of a phased acoustic array that focuses an intense sonic beam at a suspected improvised explosive device, can determine the difference between those that contain low-yield and high-yield explosives.

  • Terrorism insurance should cover cyberterrorism: industry

    The Terrorism Risk Insurance Act(TRIA) is a federal backstop designed to protect insurers in the event an act of terrorism results in losses above $100 million. Industry officials question whether cyber terrorism is covered by the program, which is administered by the Treasury Department. Industry insiders note that terrorism risks have evolved since TRIA was enacted and cyberterrorism is now a real threat. TRIA should thus not simply be reauthorized with a blanket stamp of approval; instead there should be a discussion about whether acts of cyberterrorism should be explicitly included in TRIA.

  • Israel destroys another missile shipment from Syria to Hezbollah

    Israeli warplanes on Friday destroyed a Syrian military convoy carrying advanced missiles to Hezbollah. The air strike was approved in a secret meeting of Prime Minister Benjamin Netanyahu’s security cabinet on Thursday night. The target of Israel’s Friday attack were remotely operated missiles, with a range of about 950 miles, which were manufactured in China and upgraded in Iran. This is the fifth Israeli attack in which shipments of advanced weapons from Assad to Hezbollah were destroyed. The earlier four attacks took place on 30 January, 3 May, 5 May, and 5 July.

  • Psychologists: psychology research should promote peace and nonviolence

    Political psychologists argue that psychology’s contributions can extend beyond understanding the origins and nature of violence to promoting nonviolence and peace. In a paper, they say they oppose the view that war is inevitable and argue that understanding the psychological roots of conflict can increase the likelihood of avoiding violence as a way to resolve conflicts with others.

  • U.S. worries about proliferation of drone technology

    A new Amnesty International report about U.S. drone use in the war on terror says that the drone campaign is killing so many civilians, that it does not only violate international law, but may be a war crime. The report also says that the growing use of drones by the United States in Pakistan, Yemen, and Somalia encourages their use by other states and groups. The United States rejects the figures of civilian casualties cited in the Amnesty report as unreliable, and says that the research methodology the report’s authors used is deeply flawed. The United States does agree, however, that there is a reason to worry about the proliferation of drone technology. “Going forward this is a technology that we know more people will probably get access to,” a State Department spokeswoman said.

  • Al Qaeda-linked groups among world's most active terrorist groups

    Only one of the 5,000 terrorist attacks in 2011 is attributed to al Qaeda Central, but more than half of the top 20 most active perpetrator groups in 2011 are linked to al Qaeda, according to new data released laste week in the Global Terrorism Database (GTD), compiled by the National Consortium for the Study of Terrorism and Responses to Terrorism (START) based at the University of Maryland. The GDT, a comprehensive, unclassified database of terrorist incidents, now contains information on more than 104,000 domestic and international terrorist attacks between 1970 and 2011. These attacks resulted in more than 225,000 deaths and more than 299,000 injuries.