-
Google’s decision a rare show of defiance in China
Google’s decision to leave China is a rare show of defiance in a market where the government punishes those who do not play by the rules; in industries from automaking to fast food, companies have been forced to allow communist authorities to influence — and sometimes dictate — their choice of local partners, where to operate, and what products to sell; many high-tech companies operating in China are forced to open their intellectual property and industrial secrets to their Chinese competitors – or to Chinese government officials, who pass on that property to Chinese companies – allowing these Chinese companies to reverse engineer and copy Western companies’ products and solutions; Western companies have struggled to make headway against intense competition from Chinese rivals – rivals who enjoy the fact that the Chinese government writes rules which tilt the playing field in favor of Chinese companies
-
-
French court says “pourquoi pas?” to work-place smut
French court rules that Peugeot was wrong to fire an employee who used his work PC to download pornography; the court said that the mere act of downloading smut is not enough to have an employee fired; the hold for the company, the court said Peugot had to show that that the downloading impacted on performance because the employee was busy doing things he should not during his working day, or that the downloads were so big that they interfered with the proper functioning of the system, or came with viruses attached, or that the content was itself illegal (featuring child abuse)
-
-
Budget cuts more than $600 million from Bioshield program
Randall Larsen, executive director of the congressionally chartered Commission on the Prevention of Weapons of Mass Destruction Proliferation and Terrorism: “Using Bioshield funds for flu preparedness and other issues not associated with national security will severely diminish the nation’s efforts to prepare for WMD events and will leave the nation less, not more, prepared”
-
-
Islamic suicide bombing in historical perspective
The suicide bombing campaign by al Qaeda and its Sunni Arab allies in Iraq is second only to the Japanese Kamikaze campaign during the closing stages of the Second World in the number of suicide bombers it employed; the Islamic suicide bombers, though, managed to kill more people; the Kamikaze sank 34 U.A. and Allied ships and damage 368 others; about 4,900 Allied sailors died; the Islamic suicide bombers in Iraq killed 216 U.S. military personnel, 2,500 Iraqi troops and police, and more than 10,000 Iraqi civilian
-
-
Declassified report details intelligence failures leading up to failed terrorist attack
The report criticizes the U.S. counterterrorism (CT)community for not connecting the dots related to the Christmas Day plot; “Unfortunately, despite several opportunities that might have allowed the CT community to put these pieces together in this case, and despite the tireless effort and best intentions of individuals at every level of the CT community, that was not done”
-
-
FTC to examine cloud computing privacy concerns
The FTC says it wants to examine potential threats to consumer privacy and data security posed by cloud computing services; David Vladeck, director of the FTC’s Bureau of Consumer Protection: “The ability of cloud computing services to collect and centrally store increasing amounts of consumer data, combined with the ease with which such centrally stored data may be shared with others, create a risk that larger amounts of data may be used by entities in ways not originally intended or understood by consumers”
-
-
China offers Internet pirates bulletproof havens for illegal file sharing
Most bulletproof hosts which allow music, video, and software to be illegally shared online are located in China, where criminals are able to take advantage of low costs and legal loopholes to avoid prosecution; despite officials in Beijing talking in tough terms about computer crime — hacking potentially carries a death sentence in China — the authorities rarely cooperate with other countries to take action against hi-tech criminals; as a result, just a handful of firms in China are responsible for hosting thousands of criminal enterprises online; one example: more than 22,000 Web sites which sent pharmaceutical spam were hosted by six bulletproof servers in China
-
-
Solid Oak sues China, Lenovo for stealing Green Dam code
The Chinese government wanted to install a Green Dam around the computers used by Chinese – officially for the purpose of preventing the spread of pornography and other unseemly digital contents; the plan was abandoned after it became clear that the true purpose was to control the spread of political contents and help the government better monitor political dissent; U.S. software security firm charges that in the process of creating the dam, the Chinese government and Chinese companies – but also several non-Chinese companies which stood to gain from participating in the scheme — stole its code; it mow demands $2.2 billion in compensation
-
-
Boston mayor wants to block Yemeni tankers from Boston Harbor
Yemen is disintegrating, and jihadists are moving in; the mayor of Boston says it is unsafe to allow tankers delivering liquefied natural gas from Yemen into Boston Harbor; “They cannot be coming into a harbor like Boston, where there is less than 50 feet between the tankers and residential areas,’ the mayor says of Yemeni tankers’
-
-
Holiday cheer from – and for – those on the frontline
Tech. Sgt. Nathan Gallahan posts holiday greetings from Afghanistan; what do U.S. soldiers carry with them in the war zone? “The only possessions these soldiers had were what they could carry on their back and holiday cards from school children from across our beautiful nation”
-
-
Delays in delivery of bunker-busting weapons to U.S. Air Force
The 14-ton steel pencil – aka God’s Rods — is the ideal weapon for destroying Iran’s underground nuclear weapons facilities; marrying the bunker-busting ordnance to the bat-winged B-2 Spirit Stealth bomber would mean a smaller strike force and fewer casualties in the event of a military action against Iran; it is reported that there are delays in delivering the bombs
-
-
India, Israel discuss counter-terrorism, intelligence sharing, arms delivery
India and Israel both face Islamic militants and nuclear-armed, or would-be nuclear armed, adversaries; the defense and intelligence cooperation between the two countries has been steadily growing, and is now in the open
-
-
46 out of 56 U.S. states and territories not in compliance with REAL ID
The original deadline for compliance with the Real ID Act was May 2008; 56 U.S. states and territories were not in compliance as of that date, so DHS extended the deadline to 1 January 2010; as the deadline approached, DHS realized that 46 of the 56 states and territories were not in compliance, so the deadline has been extended yet again, to April 2011; as of October 2009, 25 states have approved either resolutions or binding legislation not to participate in the program
-
-
DoD bill will fund biological attack sensors
The $636 billion Defense bill will send money to Michigan for bioterror research; $1.6 million will go to Dexter Research Center in Dexter, Michigan, to continue its development of a security sensor meant to protect military installations from chemical and biological attacks; Kettering University in Flint, Michigan will receive $1.6 million to help DoD with its Chemical Agent Fate Program
-
-
Maine to receive more than $3 million to aid bioterror research
Research institutions in Maine will receive more than $3 million for bioterrorism research; a grant of $1.9 million will go to Orono Spectral Solutions to continue its development of an infrared detection system for chemical and biological agents; another $1.3 million will be set aside for Sensor Research & Development in Orono, for real time test monitoring of chemical agents, chemical agent stimulants and toxic industrial chemicals
-
More headlines
The long view
Kinetic Operations Bring Authoritarian Violence to Democratic Streets
Foreign interference in democracies has a multifaceted toolkit. In addition to information manipulation, the tactical tools authoritarian actors use to undermine democracy include cyber operations, economic coercion, malign finance, and civil society subversion.
Patriots’ Day: How Far-Right Groups Hijack History and Patriotic Symbols to Advance Their Cause, According to an Expert on Extremism
Extremist groups have attempted to change the meaning of freedom and liberty embedded in Patriots’ Day — a commemoration of the battles of Lexington and Concord – to serve their far-right rhetoric, recruitment, and radicalization. Understanding how patriotic symbols can be exploited offers important insights into how historical narratives may be manipulated, potentially leading to harmful consequences in American society.
Trump Aims to Shut Down State Climate Policies
President Donald Trump has launched an all-out legal attack on states’ authority to set climate change policy. Climate-focused state leaders say his administration has no legal basis to unravel their efforts.
Vaccine Integrity Project Says New FDA Rules on COVID-19 Vaccines Show Lack of Consensus, Clarity
Sidestepping both the FDA’s own Vaccines and Related Biological Products Advisory Committee and the CDC’s Advisory Committee on Immunization Practices (ACIP), two Trump-appointed FDA leaders penned an opinion piece in the New England Journal of Medicine to announce new, more restrictive, COVID-19 vaccine recommendations. Critics say that not seeking broad input into the new policy, which would help FDA to understand its implications, feasibility, and the potential for unintended consequences, amounts to policy by proclamation.
Twenty-One Things That Are True in Los Angeles
To understand the dangers inherent in deploying the California National Guard – over the strenuous objections of the California governor – and active-duty Marines to deal with anti-ICE protesters, we should remind ourselves of a few elementary truths, writes Benjamin Wittes. Among these truths: “Not all lawful exercises of authority are wise, prudent, or smart”; “Not all crimes require a federal response”; “Avoiding tragic and unnecessary confrontations is generally desirable”; and “It is thus unwise, imprudent, and stupid to take actions for performative reasons that one might reasonably anticipate would increase the risks of such confrontations.”
Luigi Mangione and the Making of a ‘Terrorist’
Discretion is crucial to the American tradition of criminal law, Jacob Ware and Ania Zolyniak write, noting that “lawmakers enact broader statutes to empower prosecutors to pursue justice while entrusting that they will stay within the confines of their authority and screen out the inevitable “absurd” cases that may arise.” Discretion is also vital to maintaining the legitimacy of the legal system. In the prosecution’s case against Luigi Mangione, they charge, “That discretion was abused.”