• Al Qaeda-affiliated militants training in using shoulder-fired anti-aircraft missile

    A Xerox copy of a 26-page manual with instructions on how to use man-portable air-defense systems, or MANPADS – also called SA-7 — was found in a building in Timbuktu in North Mali which was used by Al Qaeda in the Islamic Maghreb operatives during the 8-month control – April 2012 to February 2013 — of the area by Islamist militants. The Libyan military under Col. Qaddafi had about 15,000 SA-7s, but after the Qaddafi regime fell in November 2011, NATO forces and Libyan militias loyal to the government gained possession of only 5,000 of them. The rest have disappeared into the arsenals of different militias, and have probably found their way to different terrorist organizations in North Africa and the Middle East.

  • Defense companies turn their attention to border security

    The U.S. involvement in the Iraq war is over, and the country will soon withdraw its troops from Afghanistan. Federal budgets cuts shrink agencies’ ability to conduct research and development. Faced with these realities, military contractors have begun to focus on border security. What many defense companies find especially appealing is the fact that the Senate immigration bill conditions any move toward legalizing the status of more than eleven million illegal immigrants in the United States on the strengthening of security along the U.S.-Mexico border.

  • U.S. cities preparing for disasters

    In the last year the United States, among other challenges, faced Hurricane Sandy, the Sandy Hook shooting, the Boston Marathon bombings, and Tornadoes in Oklahoma. The future is unpredictable, so cites across the United States are taking steps to be in a better position to respond to disasters.

  • Fast, reliable identification of pathogens

    Life-threatening bacterial infections cause tens of thousands of deaths every year in North America, but current methods of culturing bacteria in the lab can take days to report the specific source of the infection, and even longer to pinpoint the right antibiotic that will clear the infection. Researchers have created an electronic chip that can analyze blood and other clinical samples for infectious bacteria with record-breaking speed.

  • House panel to unveil cybersecurity bill

    Republicans on the House Homeland Security Committee are close to finalizing a long-awaited cybersecurity bill, following extensive discussions with private companies.The bill formally establishes DHS’s already-operating National Cybersecurity and Communications Integration Center, to circulate cyberthreat and vulnerability data.

  • ACLU files lawsuit challenging NSA's phone surveillance

    In the wake of the past week’s revelations about the NSA’s surveillance of phone calls, the yesterday American Civil Liberties Union (ACLU) filed a lawsuit charging that the program violates Americans’ constitutional rights of free speech, association, and privacy.

  • Cloud computing user privacy needs serious reform: scholars

    When Web surfers sign up for a new online service or download a Web application for their smartphone or tablet, the service typically requires them to click a seemingly innocuous box and accept the company’s terms of service and privacy policy. Agreeing to terms without reading them beforehand, however, can adversely affect a user’s legal rights, says a new paper by an expert in technology and legal issues.

  • NIST publishes draft cloud computing security document for comment

    The National Institute of Standards and Technology (NIST) has published a draft document on security for cloud computing as used in the federal government. The public comment period runs through 12 July 2013.

  • White House to conduct urgent, comprehensive review of U.S. Syria policy

    The White House today and tomorrow is conducting an urgent, and comprehensive, review of U.S. Syria policy, with a major policy announcement expected Wednesday or Thursday. The urgency is the result of changes on the battlefield. Bolstered with thousands of Hezbollah fighters, growing financial support from Iran and Iraq, around-the-clock arms shipments from Iran and Syria, and more direct Iranian involvement in overseeing the regime’s military operations, the Assad government has been able to turn the tide of war in its favor. Senior administration officials believe that arming the rebels may no longer be sufficient to reverse the Assad government’s gains unless the United States takes additional, and more direct, steps like carrying out airstrikes against Syrian forces.

  • Lawmakers criticize NSA leaker Edward Snowden

    Lawmakers were quick to criticize Edward Snowden, the 29-year old Booz Allen Hamilton employee who disclosed the NSA surveillance program to the Guardian and the Washington Post. House Intelligence Committee chairman Mike Rogers (R-Michigan) said the national security leaks would endanger American lives. Peter King (R-New York), chairman of the Homeland Security subcommittee on Counterintelligence and Terrorism, said of the leaks: “This is a matter of extraordinary consequence to American intelligence.”

  • California’s San Onofre nuclear power plant retired due to safety concerns

    Southern California Edison (SCE) has decided it will retire the San Onofre nuclear power plant located on the California coast. The decision comes after officials debated for over a year whether the twin reactors could be safely restarted. The power plant is located in a populated area, with millions living near it.

  • Edward Snowden, an NSA contractor employee, says he is the source of NSA leaks

    Edward Snowden, a 29-year-old former technical assistant in the CIA and more recently an employee of the defense contractor Booz Allen Hamilton, has identified himself as the source of the leaks about three massive NSA surveillance schemes. Snowden says the NSA’s surveillance activities are all-consuming; these activities “are intent on making every conversation and every form of behavior in the world known to [the NSA].” He said that once he concluded that the NSA’s surveillance scheme would soon be irrevocable, it was just a matter of time before he chose to act. “What they’re doing” poses “an existential threat to democracy,” he said.

  • Second NSA domestic surveillance scheme revealed: data mining from nine U.S. ISPs

    A day after it was revealed that the NSA was collecting communication information on millions of Verizon’s U.S. customers, another NSA domestic surveillance scheme was exposed: the NSA and the FBI have been tapping directly into the central servers of nine leading U.S. Internet service providers for the purpose of harvesting audio, video, photographs, e-mails, documents, and connection logs. The information collected allowed intelligence analysts to track an individual’s movements and contacts over time.

  • DHS: electronic devices of border crossers can be searched without reasonable suspicion

    An internal DHS study says there was no legal problem with U.S. border agents searching a traveler’s laptop, cellphone, or other electronic devices based solely on a hunch. The study says that the searches do not violate the First and Fourth amendments, and that a 1986 government policy allowing only a cursory review of a traveler’s documents was insufficient.

  • Nevada lawmakers fail to restore DHS funds to Las Vegas

    Members of the Nevada congressional delegation were taken aback when they found that Las Vegas would lose DHS funding for anti-terror programs, and immediately began to work their fellow lawmakers on the Hill to add money to DHS security grants to cities. The effort failed, and Las Vegas will have to find other sources of funding for some of the city’s security programs.