-
As Zimbabwe's condition worsens, neighbors worry
The accelerating collapse of Zimbabwe now threatens the stability of its neighbors; annual inflation rate is now estimated to stand at 8 quintillion percent — this is an eight followed by 18 zeros (8,000,000,000,000,000,000)
-
-
New system locates origin of incoming fire
A Massachusetts company develops a system which helps soldiers pinpoint the location of sniper fire; system has been successfully used in Iraq and Afghanistan
-
-
Petraeus calls for tackling the business behind terrorism
David Petraeus, head of the .S. Central Command, says that without “crushing” the illegal trade in weapons and drugs which sustains terrorism and piracy, it will be difficult to defeat them
-
-
Tactical weapon retention
A police officer or soldier approaching a criminal or a terrorist would be in dire straits if the bad guy were to grab the officer’s weapon, thus leaving him defenseless; retaining one’s weapon is thus key, and here is a discussion of how to do it
-
-
Somali pirates benefit from a global network of informers
During the past fifteen years many Somalis have left the country in search of work; many found jobs in major European and Middle eastern ports; some of them now serve as eyes and ears for the pirates back home, providing information about ships’ cargo, routes, and security on board
-
-
The next version of FISMA
The first version of the Federal Information Security Act (FISMA) of 2002 placed much emphasis on auditing and reporting; it is time to move on beyond checking compliance boxes and concentrate on making sure that the security of government departments is not compromised
-
-
Pentagon shifts emphasis to battle against terrorism
The U.S. military is shifting more emphasis and resources toward combating terrorism and helping civilian authorities, both at home and abroad, cope with man-made and natural disasters; institutions tend to overshoot, and the Pentagon should not forget that the United States must still prepare to fight and win conventional wars
-
-
Unisys study shows U.S. public trusts biometrics for data protection
Privacy advocates may be worried about the proliferation of biometrics for identification purposes, but a recent Unisys survey shows that Americans are comfortable with the idea of banks and government agencies asking them for biometric data for identity verification
-
-
Devolution of risk management
In response to the savings and loan scandal of two decades ago, the United States has enhanced the regulatory and compliance regime (FDICIA, SOX); problem is, compliance or regulation is necessarily historically based — it addresses the sins of the past and is not designed to anticipate the future
-
-
Defining on line attacks and cyberwar
The growing number of cyberattacks — for political reasons (Estonia, Georgia) and for profit — prompts calls to define the threat more clearly
-
-
Twenty-one million German bank accounts for sale
Criminals steal 21 million German bank records; reporters posing as buyers working for a gambling business managed to strike a a price of €0.55 per record, or €12 million for all the data
-
-
Cruise passengers flown to Dubai to avoid pirates
The owners of the German cruise ship Columbus decided on a new way to deal with piracy off the coast of Somalia: The 246 passengers were flown to Dubai to await the ship — and the ship itself, with but a skeletal crew, sail at top speed through the dangerous waters of the Gulf of Aden, hoping to avoid being raided by pirates
-
-
U.K. government grants itself even more data sharing power
A U.K. government proposal debated in Parliament this week would increase the ability of different government arms to share data
-
-
High-powered laser for refueling aircraft
Moving military units from theater to theater is a challenge for the military’s lift capabilities; an integral part of such capabilities is the ability to refuel aircraft in mid-flight, which is dangerous; researchers offer a way to use laser to recharge the plane’s batteries; for now the system is limited to surveillance UAVs, but the developers envision it being used for larger planes
-
-
Here they go again: China demands access to Western computer security
Another crisis in U.S.-China trade relations looms, as China, again, is about to introduce rules which would allow Chinese companies to steal Western industrial secrets, and would allow the Chinese government more tightly to monitor what the Chinese people say and read
-
More headlines
The long view
Kinetic Operations Bring Authoritarian Violence to Democratic Streets
Foreign interference in democracies has a multifaceted toolkit. In addition to information manipulation, the tactical tools authoritarian actors use to undermine democracy include cyber operations, economic coercion, malign finance, and civil society subversion.
Patriots’ Day: How Far-Right Groups Hijack History and Patriotic Symbols to Advance Their Cause, According to an Expert on Extremism
Extremist groups have attempted to change the meaning of freedom and liberty embedded in Patriots’ Day — a commemoration of the battles of Lexington and Concord – to serve their far-right rhetoric, recruitment, and radicalization. Understanding how patriotic symbols can be exploited offers important insights into how historical narratives may be manipulated, potentially leading to harmful consequences in American society.
Trump Aims to Shut Down State Climate Policies
President Donald Trump has launched an all-out legal attack on states’ authority to set climate change policy. Climate-focused state leaders say his administration has no legal basis to unravel their efforts.
Vaccine Integrity Project Says New FDA Rules on COVID-19 Vaccines Show Lack of Consensus, Clarity
Sidestepping both the FDA’s own Vaccines and Related Biological Products Advisory Committee and the CDC’s Advisory Committee on Immunization Practices (ACIP), two Trump-appointed FDA leaders penned an opinion piece in the New England Journal of Medicine to announce new, more restrictive, COVID-19 vaccine recommendations. Critics say that not seeking broad input into the new policy, which would help FDA to understand its implications, feasibility, and the potential for unintended consequences, amounts to policy by proclamation.
Twenty-One Things That Are True in Los Angeles
To understand the dangers inherent in deploying the California National Guard – over the strenuous objections of the California governor – and active-duty Marines to deal with anti-ICE protesters, we should remind ourselves of a few elementary truths, writes Benjamin Wittes. Among these truths: “Not all lawful exercises of authority are wise, prudent, or smart”; “Not all crimes require a federal response”; “Avoiding tragic and unnecessary confrontations is generally desirable”; and “It is thus unwise, imprudent, and stupid to take actions for performative reasons that one might reasonably anticipate would increase the risks of such confrontations.”
Luigi Mangione and the Making of a ‘Terrorist’
Discretion is crucial to the American tradition of criminal law, Jacob Ware and Ania Zolyniak write, noting that “lawmakers enact broader statutes to empower prosecutors to pursue justice while entrusting that they will stay within the confines of their authority and screen out the inevitable “absurd” cases that may arise.” Discretion is also vital to maintaining the legitimacy of the legal system. In the prosecution’s case against Luigi Mangione, they charge, “That discretion was abused.”