-
Leaked documents reveal law enforcement hacking methods
Through the sourcing of a leaked documents cache from the Italian firm Hacking Team, members of the University of Toronto’s Citizen Lab have revealed the methods of law-enforcement hackers. While much of Snowden’s revelations concerned broad international surveillance, documents from Hacking Team reveal more specific methods such as the actual techniques for tapping phones and computers to operate as eavesdropping devices.
-
-
Privacy advocates worried about new Senate cybersecurity bill
Privacy groups are concerned that a new Senate cybersecurity bill could give the NSA unrestricted access to personal information of Americans. The Cybersecurity Information Sharing Act (CISA), a counterpart to the Cyber Intelligence Sharing and Protection Act (CISPA) which passed the House in 2013, would create a “gaping loophole in existing privacy law,” several privacy advocacy groups wrote in a letter to lawmakers.
-
-
U.S. needs better intelligence cooperation with African states for effective counterterrorism strategy
The U.S. focus on counterterrorism efforts in Africa will require forming long-term partnerships with nations, an all-hands-on-deck commitment from all U.S. military branches, and a strong investment in intelligence, and surveillance technologies to face significant challenges created by the continent’s size and scope. Forming intelligence partnerships with Africa’s fifty-four countries, all with their own civil and military traditions, mixed with multiple languages and cultures is complex.
-
-
Drones must be used wisely to help advance U.S. interests
A new report examines three key issue sets in the unmanned aerial vehicle (UAV) debate: defense utility, national security, and economics; ethics and law; and export controls and regulatory challenges. The report concludes that UAV technologies are here to stay. Used recklessly, UAVs can endanger U.S. interests and diminish regional and global stability. Used wisely, they can help advance U.S. national security interests in the midst of a more robust global commitment to the rule of law.
-
-
Drones are cheap, soldiers are not: a cost-benefit analysis of war
Cost is largely absent in the key debates around the use of unmanned drones in war, even though drones are a cost-effective way of achieving national security objectives. Drones will never completely replace soldiers, but the drone-vs.-human being debate is becoming less important in the current strategic climate. The operating environments where drones are deployed — countries such as Pakistan, Somalia and Yemen — do not emphasize “hearts and minds” strategies where the human element has traditionally been valued as a force multiplier. Instead, objectives in these countries involve attacks on specific individuals, with operational data obtained by signal intelligence beforehand. Human contact becomes even less desirable given that a key tactic of combatants in these weak states is attrition with the aim of creating low-level civil conflicts. The end goal of these actions is to inflict high economic costs to the adversary. As a result, this remote and analytical method of engaging militarily leads to substantial cost efficiencies.
-
-
Supreme Court: police must obtain a warrant to search suspect’s cellphone
Earlier this week the Supreme Courtruled that law enforcement must obtain a warrant to search a suspect’s cellphone. Law enforcement argued that no current law makes a distinction between cellphones and the pocket litter (wallets, cigarette packs) which police have always been permitted to search when arresting a suspect, but Chief Justice John Roberts rejected this argument, saying, “That is like saying a ride on horseback is materially indistinguishable from a flight to the moon,” adding: . “Modern cell phones, as a category, implicate privacy concerns far beyond those implicated by the search of a cigarette pack, a wallet or a purse.” Roberts acknowledged that requiring police to seek a warrant could impede some investigations but “privacy comes at a cost,” he said.
-
-
Judge rules use of NSA surveillance-based information in terrorist case is legal
Lawyers for Mohamed Mohamud, a U.S. citizen who lived in Oregon, have been denied a motion to dismiss his terrorism conviction, with the court affirming the legality of the U.S. government’s bulk phone and e-mail data collection of foreign nationals living overseas. Mohamud’s defense team claimed the surveillance violated his constitutional rights, and that federal prosecutors did not make available to the defense evidence obtained via the surveillance. U.S. District Judge Garr King upheld Mohamud’s conviction, saying that suppressing the evidence collected through NSA surveillance “and a new trial would put defendant in the same position he would have been in if the government notified him of the (surveillance) at the start of the case.”
-
-
New generation of aerial robots for high-risk missions
The need for robots able to carry out high-risk service tasks, such as the inspection of power plants and the cleaning of skyscrapers, is growing. Robots which actively interact with the environment without being constrained on the ground are well suited to such tasks.
-
-
Defense in terror case challenges exclusion from court session on surveillance records
The defense for Adel Daoud, a young Muslim man who was arrested outside a Chicago bar in an undercover FBI operation and charged with attempting to blow up the bar, has submitted a motion objecting to a private court session held to discuss the defense’s access to classified records. “Not only do I not get to be there, but I didn’t even get to object,” defense attorney Thomas Durkin said. “I had to object over the fact that I couldn’t even make an objection.”
-
-
NSA, other agencies, collect millions of images for large facial recognition databases
The NSA, through its global surveillance operations, has been accumulating millions of images from communication interceptions for use in high-level facial recognition programs, according to classified 2011 documents leaked by Edward Snowden. The documents do not reveal how many people have been targeted with facial recognition programs, but given the NSA’s foreign intelligence mission, a bulk of the imagery collected would involve foreign nationals.
-
-
Drones offer farmers eyes in the sky to check on crop progress
Commercial use of unmanned aerial vehicles in U.S. airspace was banned by the Federal Aviation Administration in 2007, although growing numbers of hobbyists have been toying with the use of drones, particularly for aerial photography. Facing mounting pressure from agribusiness, retail, and other industries, however, the FAA is expected to release new policies by 2015 that will enable businesses to integrate drones into their operations. The agriculture industry is expected to be one of the largest market segments for drone usage. This growing season, crop researchers at the University of Illinois are experimenting with the use of drones on the university’s South Farms. A crop sciences educator is using two drones to take aerial pictures of crops growing in research plots on the farms.
-
-
Nature-inspired designs for drones of the future
Based on the mechanisms adopted by birds, bats, insects, and snakes, fourteen research teams have developed solutions to some of the common problems that drones could be faced with when navigating through an urban environment and performing novel tasks for the benefit of society. Whether this is avoiding obstacles, picking up and delivering items, or improving the take-off and landing on tricky surfaces, it is hoped the solutions can lead to the deployment of drones in complex urban environments in a number of different ways, from military surveillance and search and rescue efforts to flying camera phones and reliable courier services.
-
-
Drone surveillance raises legal, ethical concerns
The use of drones for domestic security purposes, surveillance of citizens, and putative criminals and organizations raises many legal and ethical concerns particularly with regard to the Fourth Amendment to the U.S. Constitution, Council of Europe instruments, and the EU Data Protection Framework. Experts suggest that the rise of drones for surveillance and other applications highlights particular challenges to civil liberties and tensions between these and national security and justice concerns.
-
-
Snowden revelations spur a surge in encrypted e-mail services
The Edward Snowden revelations about National Security Agency(N.S.A) surveillance programs have fueled a surge of new e-mail encryption services. “A lot of people were upset with those revelations, and that coalesced into this effort,” said the co-developer of a new encrypted e-mail service which launched last Friday. The company notes that its servers are based in Switzerland, making it more difficult for U.S. law enforcement to reach them.
-
-
Wireless camera network offers new possibilities for security systems
Advances in computer technology are opening up new possibilities for surveillance cameras and environmental video monitoring systems. A graduate engineering student used off-the-shelf components to build a prototype device for a solar-powered wireless network of smart cameras with potential applications in security systems and wildlife monitoring.
-
More headlines
The long view
How DHS Laid the Groundwork for More Intelligence Abuse
I&A, the lead intelligence unit of the Department of Homeland Security (DHS) —long plagued by politicized targeting, permissive rules, and a toxic culture —has undergone a transformation over the last two years. Spencer Reynolds writes that this effort falls short. “Ultimately, Congress must rein in I&A,” he adds.