-
First conviction under the Economic Espionage Act of 1996
Chinese-born software engineer sentenced for stealing industrial and military secrets on behalf of the PRC; first conviction under a 1996 law for misappropriating a trade secret with the intent to benefit a foreign government
-
-
China in campaign to impriove coastal water, inland waterways security
China has a long coast and many rivers and canals; there are about 200,000 boats and ship plowing these waters, the the Chinese authorities want them to be able to communicate more effectively with security and law enforcement; U.K. company helps
-
-
New biometric measures: Birth marks, scars, and tatoos
Michigan State researcher develops a system that could allow police to identify individuals by matching marks on their body with those stored in a computer database
-
-
Shipment of restricted technology to India brings 35-month sentence
A South Carolina businessmen is sentenced the three years in prison for smuggling restricted technology to India; technology used in India’s space and ballistic-missile programs
-
-
Botnet cyberattack costs Japanese company 300 million yen
There is a new type of blackmail in Japan: Hackers use botnets in denial-of-service attacks on companies’ computers — ending the attacks only when hefty ransom is paid
-
-
FEMA will be aggregator/gateway for CMAS
FEMA said it will be the aggregator and gateway for the Commercial Mobile Alert System, a voluntary nationwide emergency alert system
-
-
Breakthrough: Reading fingerprints even after they are gone
The name is Bond, John Bond (of Leicester University, that is): Researchers at Leicester develop a fingerprints visualization technique which would allow reading a fingerprint even after the print itself has been removed; new method would allow solving decade-old unsolved cases
-
-
OSHA issues guidance regarding storage of face masks, respirators
OSHA requests comments on proposed guidance on workplace stockpiling of respirators and face masks for pandemic influenza
-
-
Iranian-born U.S. citizen charged with nuclear smuggling
The Iranian-born engineer worked for seventeen years at Palo Verde nuclear plant, about fifty miles west of downtown Phoenix, the largest U.S. nuclear plant; he loaded software onto his laptop, and took the laptop to Iran
-
-
But will it work, Sir?
There are many different combat and defensive techniques, and each has some merit, some application, some innovation; the question that must be asked is: will this technique work when the ultimate test arrives and it must be used in real time?
-
-
IBM joins Next Generation Identification (NGI) system team
NGI, the FBI’s new multi-modal, state-of-the-art biometrics system to be used by state, local, and federal authorities, will store fingerprints, palm prints, iris, and facial recognition information; it will accommodate other biometric modalities as they mature
-
-
Secret wiretap warrants double since 9/11
A Justice Department report shows FISA warrants for counterterrorism, espionage cases up
-
-
Malicious hardware may be next hacker tool
Next threat on the computer security front: Malicious hardware; malicious hardware is more problematic because it is more difficult to detect; China is already using an early, and simple, version of malicious hardware in its massive military and industrial espionage campaign against Western countries and companies
-
-
Stolen military items available for sale online
GAO investigators buy dozens of prohibited military items on eBay and Craigslist; some of the time would be of direct help to terrorists and insurgents
-
-
DHS grants Maine Real ID extension
Unless a state received a Real ID extension from DHS, then the driver’s licenses it issues to its residents must be Real ID-compliant by 11 May or state residents will not be able to board a plane, open a bank account, or enter a federal building; Maine’s application was not to DHS’s liking, so the state missed the extension application deadline; DHS decided to give the state 48 hours to comply
-
More headlines
The long view
Are We Ready for a ‘DeepSeek for Bioweapons’?
Anthropic’s Claude 4 is a warning sign: AI that can help build bioweapons is coming, and could be widely available soon. Steven Adler writes that we need to be prepared for the consequences: “like a freely downloadable ‘DeepSeek for bioweapons,’ available across the internet, loadable to the computer of any amateur scientist who wishes to cause mass harm. With Anthropic’s Claude Opus 4 having finally triggered this level of safety risk, the clock is now ticking.”
“The Federal Government Is Gone”: Under Trump, the Fight Against Extremist Violence Is Left Up to the States
As President Donald Trump guts the main federal office dedicated to preventing terrorism, states say they’re left to take the lead in spotlighting threats. Some state efforts are robust, others are fledgling, and yet other states are still formalizing strategies for addressing extremism. With the federal government largely retreating from focusing on extremist dangers, prevention advocates say the threat of violent extremism is likely to increase.
Luigi Mangione and the Making of a ‘Terrorist’
Discretion is crucial to the American tradition of criminal law, Jacob Ware and Ania Zolyniak write, noting that “lawmakers enact broader statutes to empower prosecutors to pursue justice while entrusting that they will stay within the confines of their authority and screen out the inevitable “absurd” cases that may arise.” Discretion is also vital to maintaining the legitimacy of the legal system. In the prosecution’s case against Luigi Mangione, they charge, “That discretion was abused.”
How DHS Laid the Groundwork for More Intelligence Abuse
I&A, the lead intelligence unit of the Department of Homeland Security (DHS) —long plagued by politicized targeting, permissive rules, and a toxic culture —has undergone a transformation over the last two years. Spencer Reynolds writes that this effort falls short. “Ultimately, Congress must rein in I&A,” he adds.