-
U.S. intelligence services aware of vast Chinese espionage campaign
Multifaceted Chinese espionage campaign in the United States and other Western countries aims not only to steal military secrets, but also industrial secrets and intellectual property in order to help Chinese companies better compete in the global economy; Chinese government and state-sponsored industries have relied not only on trained intelligence officers, but also on the Chinese diaspora — using immigrants, students, and people of second- and third-generation Chinese heritage
-
-
Ground fighting and its tactical applications
Every grappler, Jiu-Jitsu practitioner, and wrestler thinks that if he can take the fight to the ground, he will win; there are, however, a few inherent problems with this approach
-
-
An HS Daily Wire conversation with Walter Hamilton of the International Biometrics Industry Association (IBIA)
Walter Hamilton, chairman of the Board of Directors of IBIA, talks about different biometric technologies, new and innovative biometric approaches, the role of biometric in security and commerce, biometrics in the theater of battle, and more
-
-
Banks' PIN codes susceptible to hackers' theft
Network of PIN codes’ thieves nets millions of dollars; hackers are targeting the ATM system’s infrastructure, which is increasingly built on Microsoft’s Windows operating system and allows machines to be remotely diagnosed and repaired over the Internet
-
-
Air passnegers now must show an ID to be allowed on board
Until this past weekend, a passenger who agreed to secondary search of his or her body and baggage at airport check-points was allowed to board even if they did not have — or refused to show — an ID; this policy was changed on Saturday
-
-
First conviction under the Economic Espionage Act of 1996
Chinese-born software engineer sentenced for stealing industrial and military secrets on behalf of the PRC; first conviction under a 1996 law for misappropriating a trade secret with the intent to benefit a foreign government
-
-
China in campaign to impriove coastal water, inland waterways security
China has a long coast and many rivers and canals; there are about 200,000 boats and ship plowing these waters, the the Chinese authorities want them to be able to communicate more effectively with security and law enforcement; U.K. company helps
-
-
New biometric measures: Birth marks, scars, and tatoos
Michigan State researcher develops a system that could allow police to identify individuals by matching marks on their body with those stored in a computer database
-
-
Shipment of restricted technology to India brings 35-month sentence
A South Carolina businessmen is sentenced the three years in prison for smuggling restricted technology to India; technology used in India’s space and ballistic-missile programs
-
-
Botnet cyberattack costs Japanese company 300 million yen
There is a new type of blackmail in Japan: Hackers use botnets in denial-of-service attacks on companies’ computers — ending the attacks only when hefty ransom is paid
-
-
FEMA will be aggregator/gateway for CMAS
FEMA said it will be the aggregator and gateway for the Commercial Mobile Alert System, a voluntary nationwide emergency alert system
-
-
Breakthrough: Reading fingerprints even after they are gone
The name is Bond, John Bond (of Leicester University, that is): Researchers at Leicester develop a fingerprints visualization technique which would allow reading a fingerprint even after the print itself has been removed; new method would allow solving decade-old unsolved cases
-
-
OSHA issues guidance regarding storage of face masks, respirators
OSHA requests comments on proposed guidance on workplace stockpiling of respirators and face masks for pandemic influenza
-
-
Iranian-born U.S. citizen charged with nuclear smuggling
The Iranian-born engineer worked for seventeen years at Palo Verde nuclear plant, about fifty miles west of downtown Phoenix, the largest U.S. nuclear plant; he loaded software onto his laptop, and took the laptop to Iran
-
-
But will it work, Sir?
There are many different combat and defensive techniques, and each has some merit, some application, some innovation; the question that must be asked is: will this technique work when the ultimate test arrives and it must be used in real time?
-
More headlines
The long view
Need for National Information Clearinghouse for Cybercrime Data, Categorization of Cybercrimes: Report
There is an acute need for the U.S. to address its lack of overall governance and coordination of cybercrime statistics. A new report recommends that relevant federal agencies create or designate a national information clearinghouse to draw information from multiple sources of cybercrime data and establish connections to assist in criminal investigations.
Twenty-One Things That Are True in Los Angeles
To understand the dangers inherent in deploying the California National Guard – over the strenuous objections of the California governor – and active-duty Marines to deal with anti-ICE protesters, we should remind ourselves of a few elementary truths, writes Benjamin Wittes. Among these truths: “Not all lawful exercises of authority are wise, prudent, or smart”; “Not all crimes require a federal response”; “Avoiding tragic and unnecessary confrontations is generally desirable”; and “It is thus unwise, imprudent, and stupid to take actions for performative reasons that one might reasonably anticipate would increase the risks of such confrontations.”
Luigi Mangione and the Making of a ‘Terrorist’
Discretion is crucial to the American tradition of criminal law, Jacob Ware and Ania Zolyniak write, noting that “lawmakers enact broader statutes to empower prosecutors to pursue justice while entrusting that they will stay within the confines of their authority and screen out the inevitable “absurd” cases that may arise.” Discretion is also vital to maintaining the legitimacy of the legal system. In the prosecution’s case against Luigi Mangione, they charge, “That discretion was abused.”
Are We Ready for a ‘DeepSeek for Bioweapons’?
Anthropic’s Claude 4 is a warning sign: AI that can help build bioweapons is coming, and could be widely available soon. Steven Adler writes that we need to be prepared for the consequences: “like a freely downloadable ‘DeepSeek for bioweapons,’ available across the internet, loadable to the computer of any amateur scientist who wishes to cause mass harm. With Anthropic’s Claude Opus 4 having finally triggered this level of safety risk, the clock is now ticking.”
How DHS Laid the Groundwork for More Intelligence Abuse
I&A, the lead intelligence unit of the Department of Homeland Security (DHS) —long plagued by politicized targeting, permissive rules, and a toxic culture —has undergone a transformation over the last two years. Spencer Reynolds writes that this effort falls short. “Ultimately, Congress must rein in I&A,” he adds.