-
Advances in counter-IEDs measures, but work remains
The Pentagon has spent more than $14 billion so far to find way effectively to counter IEDs; it has even created an agency — the Joint Improvised Explosive Device Defeat Organization — to do the work; still, there are about 1,400 IED attacks in Iraq and Afghanistan every month, and about 350 attacks in other parts of the world; a congressional panel notes progress in countering IEDs but says much works remains
-
-
U.S. harnesses Facebook, MTV in fight against terrorism
Seventeen pro-democracy, anti-terror groups from South Africa, Britain, and the Middle East which have an online presence will gather in New York to exchange notes
-
-
New CFIUS regulations
CFIUS issues final regulations governing national security reviews of foreign investment in the United States
-
-
Immigration Alert: Employing immigrants during economic slowdown
There are important employer obligations to consider when employing immigrants during an economic downturn
-
-
Scholarships, guaranteed jobs for cyber security students
State University of New York at Buffalo uses $868,000 Federal CyberService Award from the National Science Foundation (NSF) to award undergraduate, graduate scholarships
-
-
FDA opens offices in China
As food — and food ingredients — imports from China grow, and as China’s lax health and safety standards become more apparent, the FDA is trying to spot problems at the source by opening three offices in China
-
-
France drops security database over privacy fears
Criticized for ignoring serious privacy concerns, the French government scraps — for now — the implementation of massive data base; data base was to include information about French men and women as young as 13 years of age and include information on people’s health and sexual orientation
-
-
Experts: Internet crime might cause global catastrophe
Damage caused by cyber crime is estimated at $100 billion annually; tech-savvy gangs from China, India, Eastern Europe, and Africa were coming up with ever more sophisticated ways of swindling money from vulnerable people
-
-
UN: Destroyed Syrian facility resembled a nuclear reactor
On 6 September 2007 Israel destroyed a remote facility in north-east Syria; Israel and the United States claimed the facility was a nuclear reactor in the making (Syrian officials offered many different, and contradictory, explanations about the facility); Syria engaged in elaborate “landscaping,” importing tons of fresh soil to alter the site before admitting outsiders; these outsiders — IAEA inspectors — have now concluded the the site looked like a nuclear reactor
-
-
New York City opens counterterrorism center
The $100 million project was launched after 9/11; the facility would eventually receive video footage from 3,000 cameras posted in and near the financial district, an area of about 1.7 square miles
-
-
Grappling with the pirate problem
The Strait of Malacca between Malaysia and Indonesia, and the Gulf of Aden, are among the most sensitive choke points in global commerce; trouble is, the stable, the comparatively wealthy Southeast Asian countries that line the Malacca Strait have committed their naval and coastal forces to stamping out hijackings and piracy, but the Gulf of Aden is bordered by poor or dysfunctional countries like Djibouti, Yemen, and particularly Somalia
-
-
Briefly noted
Raytheon awarded contract for exploratory nuclear detection research… Navies may get tougher on piracy after tanker seizure… U.S. donates nuclear detection equipment to Nigeria
-
-
China bravely denies space espionage charges
China has been engaged in a vast, well-coordinated, and resourceful espionage campaign against U.S. and and European governments and companies; the systematic stealing of Western military, scientific, and industrial secrets aims to help China short-cut its path to global political and economic hegemony
-
-
Security alliance calls financial incentives for cyber security
The Internet Security Alliance calls for the incoming Obama administration and Congress to give information technology companies financial incentives for improving cybersecurity defenses, including providing funding in research and development and shielding them from liability caused by cyberattacks
-
-
Briefly noted
Obama administration looks to fill more than 300 IT positions… Larger inmate population is boon to private prisons… More attacks on critical infrastructure?
-
More headlines
The long view
Diversity as National Security: Why Retreating from DEI Risks Repeating Pre-9/11 Failures
One of often overlooked lessons of the 9/11 intelligence failure is that diversity — linguistic, cultural, experiential — was not simply a “nice to have” in intelligence work. It was essential infrastructure. The absence of diversity in America’s national security workforce thus represented more than a demographic imbalance; it represented a structural blind spot.
Online Mobilization and Violence in the United States
Even before the Charlie Kirk assassination, the United States was facing a resurgence of politically motivated violence that is deeply intertwined with the digital sphere. Extremists across the ideological spectrum exploit acts of violence to recruit followers, justify their ideologies, and sustain propaganda networks.
Nick Fuentes Is a Master of Exploiting the Current Social Media Opportunities for Extremism
That the antisemitic white nationalist Nick Fuentes and his followers have managed to get what their 20th-century predecessors could not — widespread awareness and political influence — reveals how fringe ideologies operate differently today compared to the mid-20th century, when institutional gatekeepers –political parties, law enforcement, the media –could more effectively contain extremist movements.
White Nationalism Fuels Tolerance for Political Violence Nationwide
Political violence is certainly not new in American society, but current patterns differ in key ways. We found that, today, white nationalism is a key driver of support for political violence –a sign that white nationalism poses substantial danger to U.S. political stability.
Political Violence Offers Extremist “Trigger Events” for Recruiting Supporters
Extremists are exploiting political violence by using online platforms to recruit new people to their causes and amplify the use of violence for political goals. High-profile incidents of political violence are useful trigger events for justifying extremist ideologies and calls for retaliation.
Fake survey Answers from AI Could Quietly Sway Election Predictions
Public opinion polls and other surveys rely on data to understand human behavior. New research reveals that artificial intelligence can now corrupt public opinion surveys at scale—passing every quality check, mimicking real humans, and manipulating results without leaving a trace.
