-
New guide for truck cargo security
Some 80 percent of all communities in the United States rely solely on trucks for the products and goods they receive, including food, books, clothing, electronics, automobiles, and medical supplies; making sure these trucks and their cargo are safe is thus an essential part of securing the home front
-
-
DHS expands biometric info collection to include green card holders
DHS will begin to collect biometric data from permanent residents of the United States and from refugees; new rule, to go into effect on 18 January 2009, will include “nearly all aliens,” except Canadian citizens on brief visits
-
-
U.K.'s new way to prevent people from assuming identity of deceased persons
A new — and controversial — regulation allows U.K. government agencies more sharing of personal data they hold of U.K. citizens; the Home Office says one benefit of the new regulation is better prevention of fraudsters assuming the identity of dead people
-
-
New U.S.-bound cargo security rule to go into effect in January
Current security regulations required importers and shippers to file entry information with U.S. Customs fifteen days before a ship arrives at a U.S. port; new regulations will require that shippers file much more detailed information — and do so before they even load the merchandise onto their ship at the port of origin; U.S. Customs will demand that suspicious cargo, or cargo about which the information is incomplete, not be loaded
-
-
H2-B visa program to be streamlined, simplified
The H2-B visa program allows foreign workers into the United States for specific seasonal jobs; the program is capped at 66,000 workers per year; regulatory changes in the waning days of the administration aim to set in place policies favored by the business sector
-
-
FAA makes special flight rules around Washington, D.C. permanent
In order to keep Washington,D.C. safe from 9/11-like aerial attacks by terrorists while reducing the economic impact on the general aviation community, the FAA reduces the protective air envelope around the U.S. capital by 1,800 square miles of airspace
-
-
The next version of FISMA
The first version of the Federal Information Security Act (FISMA) of 2002 placed much emphasis on auditing and reporting; it is time to move on beyond checking compliance boxes and concentrate on making sure that the security of government departments is not compromised
-
-
Devolution of risk management
In response to the savings and loan scandal of two decades ago, the United States has enhanced the regulatory and compliance regime (FDICIA, SOX); problem is, compliance or regulation is necessarily historically based — it addresses the sins of the past and is not designed to anticipate the future
-
-
Defining on line attacks and cyberwar
The growing number of cyberattacks — for political reasons (Estonia, Georgia) and for profit — prompts calls to define the threat more clearly
-
-
Here they go again: China demands access to Western computer security
Another crisis in U.S.-China trade relations looms, as China, again, is about to introduce rules which would allow Chinese companies to steal Western industrial secrets, and would allow the Chinese government more tightly to monitor what the Chinese people say and read
-
-
New CFIUS regulations
CFIUS issues final regulations governing national security reviews of foreign investment in the United States
-
-
Immigration Alert: Employing immigrants during economic slowdown
There are important employer obligations to consider when employing immigrants during an economic downturn
-
-
FDA opens offices in China
As food — and food ingredients — imports from China grow, and as China’s lax health and safety standards become more apparent, the FDA is trying to spot problems at the source by opening three offices in China
-
-
France drops security database over privacy fears
Criticized for ignoring serious privacy concerns, the French government scraps — for now — the implementation of massive data base; data base was to include information about French men and women as young as 13 years of age and include information on people’s health and sexual orientation
-
-
DHS to regulate ammonium nitrate
Ammonium nitrate mixed with fuel oil commonly is used as an explosive in mining and has been used by terrorists — such as Timothy McVeigh in Oklahoma; DHS proposes to regulate its use
-
More headlines
The long view
Are We Ready for a ‘DeepSeek for Bioweapons’?
Anthropic’s Claude 4 is a warning sign: AI that can help build bioweapons is coming, and could be widely available soon. Steven Adler writes that we need to be prepared for the consequences: “like a freely downloadable ‘DeepSeek for bioweapons,’ available across the internet, loadable to the computer of any amateur scientist who wishes to cause mass harm. With Anthropic’s Claude Opus 4 having finally triggered this level of safety risk, the clock is now ticking.”
The “Invasion” Invention: The Far Right’s Long Legal Battle to Make Immigrants the Enemy
The Trump administration is using the claim that immigrants have “invaded” the country to justify possibly suspending habeas corpus, part of the constitutional right to due process. A faction of the far right has been building this case for years.
Luigi Mangione and the Making of a ‘Terrorist’
Discretion is crucial to the American tradition of criminal law, Jacob Ware and Ania Zolyniak write, noting that “lawmakers enact broader statutes to empower prosecutors to pursue justice while entrusting that they will stay within the confines of their authority and screen out the inevitable “absurd” cases that may arise.” Discretion is also vital to maintaining the legitimacy of the legal system. In the prosecution’s case against Luigi Mangione, they charge, “That discretion was abused.”
Autocrats Don’t Act Like Hitler or Stalin Anymore − Instead of Governing with Violence, They Use Manipulation
Modern autocrats don’t always resemble their 20th-century predecessors. Instead, they project a polished image, avoid overt violence and speak the language of democracy. They wear suits, hold elections and talk about the will of the people. Rather than terrorizing citizens, many use media control and messaging to shape public opinion and promote nationalist narratives. Many gain power not through military coups but at the ballot box.