-
Parliamentary committee: 7/7 bombings might have been stopped
A Parliamentary committee finds that MI5’s operational decisions prior to the 7/7 attacks in London were “understandable and reasonable”; MI5 had to plot leader and some of his followers in its sights, but could not connect the dots for lack of information and resources
-
-
Food poisoning outbreaks prompt oversight efforts, I
In 1973, the U.S. Food and Drug Administration (FDA) employed 35,000 inspectors; in 2007, the FDA employed 6,700 inspectors; at the same time, food imports into the U.S. increased exponentially
-
-
Schneier: no need to worry about terrorists poisoning food
Security maven Bruce Schneier says that fears of food-based bioterrorism are exaggerated: The quantities involved for mass poisonings are too great, the nature of the food supply too vast, and the details of any plot too complicated and unpredictable to be a real threat
-
-
IT spending to increase on Obama's watch
New OMB report says that IT spending will increase by 7 percent in fiscal 2010 — to $75.8 billion
-
-
U.K. information commissioner: data collection trend will be reversed
Richard Thomas, the outgoing U.K. information commissioner: “If you are looking for a needle in a haystack, it does not make sense to make the haystack bigger”
-
-
U.S.-Pakistan cooperate in UAV campaign, but it is a qualified cooperation
The United States offered to give Pakistan a much larger amount of imagery, including real-time video feeds and communications intercepts gleaned by remotely piloted aircraft; information about the UAVs’ operating patterns, blind spots, and takeoff and landing locations is not shared for fear that elements inside the Pakistani intelligence and military would leak it to the insurgents
-
-
The suicide bomber
Suicide bombers are a fact of life, so we must learn how to deal with them; there are ways to identify them, and ways to disable them and prevent them from carrying their deadly mission; doing so is not easy or simple, but it can be done
-
-
China deploys secure computer operating system
China has installed a secure operating system known as “Kylin” on government and military computers designed to be impenetrable to U.S. military and intelligence agencies
-
-
NERC approves strengthened cyber security standards
The North American Electric Reliability Corp.’s (NERC) independent Board of Trustees last week approved eight revised cyber security standards; entities found in violation of the standards can be fined up to $1 million per day, per violation in the United States
-
-
UCI awarded $45 million for infectious disease research
Research facility receives finds to improve detection, treatment, and vaccine development
-
-
Somali pirates benefit from a global network of informers
These are not your father’s pirates: Somali pirates benefit from information sent to them by informers planted in key shipping hubs around the world; this information includes vessels’ cargo, layout, and route — and is transmitted early enough to allow the pirates enough time to practice their assault based on the information they received
-
-
Boeing's takes X-45C out of storage, renames it Phantom Ray
The proposed 2010 U.S. defense budget is historic at least in one respect: for the first time, the U.S. Air Force will be buying more unmanned flying systems than manned ones; Boeing takes its X-45C unmanned combat air vehicle (UCAV) out of storage and renames it Phantom Ray; it will be completed and readied for flight by the end of 2010, and will be suitable for missions including ISR, SEAD, electronic attack, hunter/killer, and autonomous aerial refueling
-
-
Highlights of the U.S. 2010 defense budget
U.S. defense budget increase 4 percent over 2009, to $533.8 billion; weapons procurement, at $107.4 billion, comes third after Operations & Maintenance ($185.7 billion) and personnel costs ($136 billion)
-
-
U.S. Coast Guard budget reduced by $20 million relative to 2009
USCG supporters fret over cuts in the Coast Guard budget; the cuts would have been even deeper had it not been for a slight injection of stimulus package funds and the inclusion of DoD supplemental money of $241 million for Operating Expenses Appropriation in support of Overseas Contingency Operations
-
-
How DHS plans to use the stimulus package's funds
The stimulus package has added billions of dollars to the DHS budget; the department details how it plans to spend the money
-
More headlines
The long view
Kinetic Operations Bring Authoritarian Violence to Democratic Streets
Foreign interference in democracies has a multifaceted toolkit. In addition to information manipulation, the tactical tools authoritarian actors use to undermine democracy include cyber operations, economic coercion, malign finance, and civil society subversion.
Patriots’ Day: How Far-Right Groups Hijack History and Patriotic Symbols to Advance Their Cause, According to an Expert on Extremism
Extremist groups have attempted to change the meaning of freedom and liberty embedded in Patriots’ Day — a commemoration of the battles of Lexington and Concord – to serve their far-right rhetoric, recruitment, and radicalization. Understanding how patriotic symbols can be exploited offers important insights into how historical narratives may be manipulated, potentially leading to harmful consequences in American society.
Trump Aims to Shut Down State Climate Policies
President Donald Trump has launched an all-out legal attack on states’ authority to set climate change policy. Climate-focused state leaders say his administration has no legal basis to unravel their efforts.
Vaccine Integrity Project Says New FDA Rules on COVID-19 Vaccines Show Lack of Consensus, Clarity
Sidestepping both the FDA’s own Vaccines and Related Biological Products Advisory Committee and the CDC’s Advisory Committee on Immunization Practices (ACIP), two Trump-appointed FDA leaders penned an opinion piece in the New England Journal of Medicine to announce new, more restrictive, COVID-19 vaccine recommendations. Critics say that not seeking broad input into the new policy, which would help FDA to understand its implications, feasibility, and the potential for unintended consequences, amounts to policy by proclamation.