-
Obama administration makes stopping nuclear terror key goal
The administration, in its February 2010 Nuclear Posture Review, will declare that stopping nuclear terrorism is its central aim on the nuclear front; countering nuclear terrorists — whether armed with rudimentary bombs, stolen warheads, or devices surreptitiously supplied by a hostile state – will become a task equal to the traditional mission of deterring a strike by major powers or emerging nuclear adversaries; shift in nuclear emphasis would mean devoting less money to modernizing bombers, missiles, and submarines, and more to surveillance satellites, reconnaissance planes, and undercover agents
-
-
Digital Sandbox launches risk analysis initiative for Hampton Roads, central Virginia
Infrastructure catalog is essential first step in risk management strategy; Digital Sandbox will identify and catalog potential natural hazards and terrorist threats as well as critical infrastructure and key resources throughout the area.
-
-
Interim U.K. CCTV regulator is appointed
The U.K. government appointment of an interim CCTV regulator in an effort to improve the public’s power in regards to the technology; the regulator will advise the government on matters surrounding the use of CCTV in public places, including the need for a regulatory framework.
-
-
DHS investigates counterfeit operation
DHS suspects that there is a connection between the sale of counterfeit clothing and funding of terrorist actitivites; the Fresno police raids a clothing store in Fresno, California, and confiscated half a million dollars worth of phony designer jeans, T-shirts, handbags,
and shoes. -
-
Senator Cochran’s earmark savvy benefits Mississippi biodefense center
Republican Senator Thad Cochran of Mississippi is famous for his support of federal earmarks and regularly ranks near the top among senators for the number and size of his annual earmark haul; on Sunday the Senate passed a $1.1 trillion omnibus federal spending bill for the 2010 fiscal year, and Cochran managed to insert $150 million worth of earmarks for Mississippi; among the beneficiaries is Jackson State University’s National Center for Biodefense Communications, which conducts research and compiles data on bioterrorism threats to agriculture, and which is slated to receive $750,000 through the bill
-
-
Israel tests biometric database
Israel will start a 2-year biometric database pilot; citizens applying for various identification documents will, on a voluntary basis, have their fingerprints taken along with a picture of their face; after two years the government will decide whether to make the biometric information collection mandatory
-
-
Bio espionage: New threat to U.S. economy
In January, DHS warned of an increased cyber attack threat by activists/hacktivists and extremist groups; these groups are known to target life sciences and biotech companies; life sciences sector, pharmaceutical sector, and biotech sector are areas where we should expect information security challenges to increase exponentially for the foreseeable future
-
-
U.S. organize an international meeting on bolstering nuclear plant security
The fluctuation in oil prices and concerns about climate change have renewed interest in building nuclear power plants; this fact, and the fact that more nuclear material may become available as a result of deep cuts in the U.S. and Russian nuclear arsenals, increase worries about the safety of nuclear materials
-
-
Romania receives radiation detectors
The U.S. National Nuclear Security Administration provided Romania with radiation detectors for Romanian border crossing; shipment is part of the agency’s Second Line of Defense Program provides foreign nations with radiation monitoring devices and equipment training
-
-
Fake Cisco serial numbers in $1 million Chinese computer parts scheme
Two Kansas men are accused of buying network gear in China, and then attaching fake Cisco serial numbers to the components, placing them in Cisco boxes, and selling them as Cisco products; security experts have warned that counterfeit networking gear could contain back doors that allow spies to conduct industrial espionage on U.S. companies
-
-
Napolitano details DHS counter-IEDs measures
Terrorists are trying to import IED technology and methods from Iraq and Afghanistan into the United States; Napolitano said that effective defending against IED attacks means American collective responsibility: Individual citizens need to say something when they see something suspicious and everyone needs to do their part to strengthen the preparedness of their families, their communities, and their businesses.
-
-
Decode's demise raises privacy worries
Icelandic company with genetic and medical records of thousands of customers closed its doors; the data might be sold on and end up in the hands of an unscrupulous company or individual
-
-
Using rope to fight pirates
New antipiracy device uses compressed air to fire a plastic cylinder containing either a coiled rope or net up to a range of 400 meters; the coiled line of net or rope, which has a parachute attached to the end, will unravel and lay out across the surface of the water; as a pirate boat travels through the water its propeller shaft will pick up the line and become entangled
-
-
New antiterror technology tool uses human logic
A new interactive image-based software can be used on touch-screen table-top displays and other large-screen systems better to manage the huge amounts of data collected in connection with alleged terrorist plots
-
-
Hawaii judge throws out child porn evidence found by TSA
U.S. judges keep telling TSA that the agency’s security screeners at airport are there to prevent weapons and explosives from being taken on board — nothing else; it is not the screeners’ job to ask passengers why they carry a lot of cash in the luggage — or child porn
-
More headlines
The long view
Kinetic Operations Bring Authoritarian Violence to Democratic Streets
Foreign interference in democracies has a multifaceted toolkit. In addition to information manipulation, the tactical tools authoritarian actors use to undermine democracy include cyber operations, economic coercion, malign finance, and civil society subversion.
Patriots’ Day: How Far-Right Groups Hijack History and Patriotic Symbols to Advance Their Cause, According to an Expert on Extremism
Extremist groups have attempted to change the meaning of freedom and liberty embedded in Patriots’ Day — a commemoration of the battles of Lexington and Concord – to serve their far-right rhetoric, recruitment, and radicalization. Understanding how patriotic symbols can be exploited offers important insights into how historical narratives may be manipulated, potentially leading to harmful consequences in American society.
Trump Aims to Shut Down State Climate Policies
President Donald Trump has launched an all-out legal attack on states’ authority to set climate change policy. Climate-focused state leaders say his administration has no legal basis to unravel their efforts.
Vaccine Integrity Project Says New FDA Rules on COVID-19 Vaccines Show Lack of Consensus, Clarity
Sidestepping both the FDA’s own Vaccines and Related Biological Products Advisory Committee and the CDC’s Advisory Committee on Immunization Practices (ACIP), two Trump-appointed FDA leaders penned an opinion piece in the New England Journal of Medicine to announce new, more restrictive, COVID-19 vaccine recommendations. Critics say that not seeking broad input into the new policy, which would help FDA to understand its implications, feasibility, and the potential for unintended consequences, amounts to policy by proclamation.
Twenty-One Things That Are True in Los Angeles
To understand the dangers inherent in deploying the California National Guard – over the strenuous objections of the California governor – and active-duty Marines to deal with anti-ICE protesters, we should remind ourselves of a few elementary truths, writes Benjamin Wittes. Among these truths: “Not all lawful exercises of authority are wise, prudent, or smart”; “Not all crimes require a federal response”; “Avoiding tragic and unnecessary confrontations is generally desirable”; and “It is thus unwise, imprudent, and stupid to take actions for performative reasons that one might reasonably anticipate would increase the risks of such confrontations.”
Luigi Mangione and the Making of a ‘Terrorist’
Discretion is crucial to the American tradition of criminal law, Jacob Ware and Ania Zolyniak write, noting that “lawmakers enact broader statutes to empower prosecutors to pursue justice while entrusting that they will stay within the confines of their authority and screen out the inevitable “absurd” cases that may arise.” Discretion is also vital to maintaining the legitimacy of the legal system. In the prosecution’s case against Luigi Mangione, they charge, “That discretion was abused.”