-
EU moves on data breach notification law
Security professionals debate the recommendations of independent research to introduce tough European data breach and security regulations
-
-
U.K. security services push for expanded surveillance power
U.K. security services are pushing for a massive expansion of electronic surveillance in the United Kingdom, in the face of opposition from the Treasury and the Cabinet Office
-
-
New surveillance program will use military satellites to cover U.S.
President Bush signed bill which allows the National Applications Office (NAO) to begin operating a stringently limited version of a program which would turn military spy satellites on the United States, sharing imagery with other federal, state, and local government agencies
-
-
U.S. government to take counterterrorism local
The federal government says local police efforts to record and share activities that could be related to terrorism are critical to the government’s counterterrorism effort; the creation and coordination of a uniform system of reporting among thousands of jurisdictions is a problem, though
-
-
Security experts call for improved public communications
Experts say the next president needs to ensure that public warnings are based on solid information and that the federal government sends out messages out of an urgent need, not because it wants to distract the public
-
-
SA police to buy mini-UAVs
South Africa is host to the 2010 Soccer World Cup; in preparation, the SA police is buying mini-UAVs and integrating them into the force; the UAV — Kiwit — is carried in a suitcase, weighs 3.5 kg, and can be assembled by a single person in five minutes
-
-
Letter carriers may deliver antibiotics during bioterror attack
The task of delivering medications to citizens during a bioterror attack may fall to volunteer mailmen (and mailwomen); trial in St. Paul
-
-
DHS, NSF announce $3.1 million awards for radiological detection
DHS and NSF give awards to academic institutions to advance research in radiological and nuclear detection
-
-
The "Israeli Lean"
The debate about the most effective shooting stance has divided supporters of the Weaver Stance from proponents of the Isosceles Stance; there is a third stance which offers many advantages: the Israeli Lean, which is based on the Point-Shoot
-
-
Alternatives to the H-1B visa, pt. 2: L-1 "International Transferees"
The demand for H1-B visas far outstrips its supply; one alternative is the L-1 visa which allows companies to transfer employees to, and allows investors to form start-up operations in, the United States
-
-
New nuclear watchdog created
Anti-proliferation activists create the World Institute for Nuclear Security; funded with private and government funds, it will be headquartered in Vienna — next to the IAEA; it aims to facilitate sharing information to improve security at the world’s nuclear sites
-
-
Web browsers affected by Clickjacking
US CERT issues a warning about a new cross-browser exploit technique called “Clickjacking”; clickjacking gives an attacker the ability to trick a user into clicking on something only barely or momentarily noticeable; thus, if a user clicks on a Web page, they may actually be clicking on content from another page
-
-
Stolen laptops "broadcast" their location to rightful owners
Huskies researchers develop a software tool which uses the Internet as a homing beam; if the thief uses the stolen laptop to connect to the Internet, the owner receives information on the laptop location (and Macintosh owners also recvied a picture of the thief)
-
-
Group tells FTC more RFID security guidance is needed
As RFID technology proliferates, so do worries about its potential for violating people’s privacy. the Federal Trade Commission is charged with protecting consumers, and privacy advocates urge it to take a close look at RFID
-
-
Breakthrough: "Math dyslexia," not intelignece, makes people bad at math
Generations of students who struggled with mathematics in school accepted — and their teachers and parents accepted — that they were just “not good at math”; new research show that the cause was more likely “dyscalculia” — a syndrome which is similar to dyslexia
-
More headlines
The long view
Diversity as National Security: Why Retreating from DEI Risks Repeating Pre-9/11 Failures
One of often overlooked lessons of the 9/11 intelligence failure is that diversity — linguistic, cultural, experiential — was not simply a “nice to have” in intelligence work. It was essential infrastructure. The absence of diversity in America’s national security workforce thus represented more than a demographic imbalance; it represented a structural blind spot.
Online Mobilization and Violence in the United States
Even before the Charlie Kirk assassination, the United States was facing a resurgence of politically motivated violence that is deeply intertwined with the digital sphere. Extremists across the ideological spectrum exploit acts of violence to recruit followers, justify their ideologies, and sustain propaganda networks.
Nick Fuentes Is a Master of Exploiting the Current Social Media Opportunities for Extremism
By Alex McPhee-Browne
That the antisemitic white nationalist Nick Fuentes and his followers have managed to get what their 20th-century predecessors could not — widespread awareness and political influence — reveals how fringe ideologies operate differently today compared to the mid-20th century, when institutional gatekeepers –political parties, law enforcement, the media –could more effectively contain extremist movements.
White Nationalism Fuels Tolerance for Political Violence Nationwide
By Murat Haner, Justin Pickett, and Melissa Sloan
Political violence is certainly not new in American society, but current patterns differ in key ways. We found that, today, white nationalism is a key driver of support for political violence –a sign that white nationalism poses substantial danger to U.S. political stability.
Political Violence Offers Extremist “Trigger Events” for Recruiting Supporters
Extremists are exploiting political violence by using online platforms to recruit new people to their causes and amplify the use of violence for political goals. High-profile incidents of political violence are useful trigger events for justifying extremist ideologies and calls for retaliation.
Fake survey Answers from AI Could Quietly Sway Election Predictions
Public opinion polls and other surveys rely on data to understand human behavior. New research reveals that artificial intelligence can now corrupt public opinion surveys at scale—passing every quality check, mimicking real humans, and manipulating results without leaving a trace.
