• Belgium confronting home-grown jihadist threat

    Belgium is Europe’s biggest per capita contributor of fighters to Syria and law enforcement officials fear that at least seventy of 350 Belgian fighters have returned home equipped with skills they learned on the battle field. The Belgian government had brought the concern to national attention in an October document warning about the “danger of violent jihadism that threatens to spread in our society.” Belgian officials have not found a link between the Paris attacks earlier this month and planned attacks in Belgium in the following days – attacks thwarted by swift police preemptive action — but common elements include: a clustering of radicals in a small area, the connection between petty criminality and jihadist violence, and the role of prison as an incubator for extremism.

  • Need for oil the most important reason for interfering in another country’s war

    Researchers have for the first time provided strong evidence for what conspiracy theorists have long thought — oil is often the reason for interfering in another country’s war. Civil wars have made up more than 90 percent of all armed conflicts since the Second World War, and the research builds on a near-exhaustive sample of sixty-nine countries which had a civil war between 1945 and 1999. About two thirds of civil wars during the period saw third party intervention either by another country or outside organization. The researchers found that the decision to interfere was dominated by the interveners’ need for oil over and above historical, geographical, or ethnic ties.

  • CODE program would allow UAVs to fly as collaborative teams

    The U.S. military’s investments in unmanned aircraft systems (UAS) have proven invaluable for missions from intelligence, surveillance, and reconnaissance (ISR) to tactical strike. Most of the current systems, however, require constant control by a dedicated pilot and sensor operator as well as a large number of analysts, all via telemetry. These requirements severely limit the scalability and cost-effectiveness of UAS operations and pose operational challenges in dynamic, long-distance engagements with highly mobile targets in contested electromagnetic environments. DARPA’s CODE program is offering the opportunity to participate in discussions to help develop groundbreaking software enabling unmanned aircraft to work together with minimal supervision.

  • Boomerang: Democrats say they would delay vote on Iran sanctions bill

    Senator Robert Menendez (D-New Jersey) announced during a Senate hearing yesterday (Tuesday) that he and other Senate Democrats would not support bringing the sanctions bill he cosponsored with Senator Mark Kirk (R-Illinois) to the floor until at least 24 March. Menendez has led a small group of Democrats who were critical of the administration’s handling of the talks with Iran over the latter’s nuclear program talks. The bi-partisan approach to the sanctions issue collapsed in the face of what Democrats considered to be a clumsy politicization of the issue by Speaker John Boehner (R-Ohio), Israel’s prime minister Benjamin Netanyahu, and Israel’s ambassador to the United States, Ron Dermer. Dermer suggested to Boehner the idea of inviting Netanyahu to speak in front of Congress to criticize the administration’s policy. Netanyahu is lagging in the polls behind the center-left camp in the 17 March parliamentary elections in Israel, and Dermer, one of Netanyahu’s closest political advisers, believed the speech would boost Netanyahu’s standing in Israel. The process of the invitation was not less problematic than the invitation itself: In an unprecedented break with protocol, Boehner and Dermer did not bother to consult with, or even inform, the White House or the Department of State that they were arranging for a foreign head of state to speak before Congress.

  • view counter
  • NYC Russian spy ring busted

    In a federal complaint unsealed Monday, prosecutors say that Russian spies used talk about books, or tickets for sporting events or concerts, as code words for conducting espionage against the United States. On Monday in New York, law enforcement arrested one of the men, Evgeny Buryakov, 39, who posed as an employee in the New York City office of a Russian bank. The two other men listed in the complaint, Igor Sporyshev and Victor Podobnyy, had diplomatic immunity and no longer live in the United States. U.S. officials said the men were gathering intelligence related to possible U.S. sanctions on Russia and U.S. efforts to develop alternative energy resources, in addition to trying to recruit Americans in high positions.

  • Women more active in extremist Islamist groups than previously thought

    About 10 percent of ISIS recruits from Europe, and about 20 percent of recruits from France, are women. Though they tend to play a supportive role in the Islamic extremism narrative, women can be just as radical. “What’s very striking is that she’s not an exception; she’s an example of a trend,” one expert says of Hayat Boumeddiene, the 26-year old partner of Paris gunman Amedy Coulibaly. “There tends to be an assumption with women that they’re doing it under influence, they’re being forced or tricked. But I think there’s a more complicated story here, feelings of alienation.”

  • view counter
  • NYPD’s radicalization report criticized

    In a Sunday morning interview on 970 AM The Answer, New York Police Department(NYPD) deputy commissioner for Intelligence and Counterterrorism John Miller criticized a 7-year old report on Islamic radicalization in New York City. The report, “Radicalization in the West: The Homegrown Threat,” published by the NYPD Intelligence Division under former police commissioner Ray Kelly, came under fire after a series of articlesdetailed some of the division’s counterterrorism operations, including the monitoring of prominent Muslims and Muslim communities in New York City. Those articles contributed to the closure of the unit, which conducted the NYPD’s surveillance operations on New York’s Muslim communities.

  • New technology proves effective in thwarting cyberattacks on drones

    Engineering researchers from the University of Virginia and the Georgia Institute of Technology have successfully flight-tested scenarios which could threaten drones, including ground-based cyber-attacks. The demonstration of U.Va’s System-Aware Cybersecurity concept and Secure Sentinel technology was part of a research project led by U.Va. engineers to detect and respond to cyber-attacks on unmanned aerial systems.

  • Invisibility cloak closer to reality: Concealing military airplanes, and even people

    Since the beginning of recorded time, humans have used materials found in nature to improve their lot. Since the turn of this century, scientists have studied metamaterials, artificial materials engineered to bend electromagnetic, acoustic, and other types of waves in ways not possible in nature. Now, Hao Xin, a professor of electrical and computer engineering at the University of Arizona, has made a discovery with these synthetic materials that may take engineers one step closer to building microscopes with superlenses that see molecular-level details, or shields that conceal military airplanes and even people.

  • Yemen upheaval hobbles U.S. counterterrorism efforts there

    Following the abrupt resignation of Yemen’s president, prime minister, and cabinet after Iran-backed Shi’a Houthi rebels took over the presidential palace, the United States has halted some counterterrorism operations against al-Qaeda militants operating inside the country. The move has dealt a blow to what President Barack Obama recently called a successful counterterrorism partnership between Yemen’s president Abd Rabbo Mansour Hadi and the United States. “The [Yemeni government’s] agencies we worked with . . . are really under the thumb of the Houthis. Our ability to work with them is not there,” said a senior U.S. official closely involved in monitoring the situation.

  • U.S.-Russian nuclear security cooperation victim of growing bilateral tensions

    One of the greatest benefits brought about by the end of the cold war was the agreement been the United States and the former Soviet republics to cooperate closely in securing the large, and not-always-well-protected, Soviet nuclear stocks. The 1991 Cooperative Threat Reduction agreement, aka the Nunn-Lugar program after the two former senators — Sam Nunn [D-Georgia] and Richard Lugar [R-Indiana]) — who persuaded fellow lawmakers to fund it, has facilitated to achievement of important security measures: dismantling of thousands of nuclear warheads, securing facilities in Russia where weapon-grade material is stored, and finding suitable jobs for tens of thousands of Russian nuclear scientists, engineers, and technicians. More than two decades of cooperation in guarding weapons-grade stockpiles have now come to an end, the result of tensions over Russia’s role in Ukraine. Experts say the end of U.S.-Russia nuclear cooperation leaves the world “a more dangerous place.”

  • The many problems with the DEA's bulk phone records collection program

    By Hanni Fakhoury

    Think mass surveillance is just the wheelhouse of agencies like the NSA? Think again. One of the biggest concerns to come from the revelations about the NSA’s bulk collection of the phone records of millions of innocent Americans was that law enforcement agencies might be doing the same thing. It turns out this concern was valid, as last week the government let slip for the first time that the Drug Enforcement Agency (DEA) had also been collecting the phone records of Americans in bulk since the 1990s.

  • Drawing disaster response lessons by comparing quake responses

    Following the devastating 2011 Great East Japan Earthquake which hit the Tohoku region of Japan, many local and provincial governments rushed to aid the people in the area with personnel and materials, providing important relief in a time of crisis. At a recent symposium, some were comparing the response to the 2011 disaster to the response to the Great Hanshin-Awaji Earthquake of 1995 in order to draw lessons and offer guidelines in effective crisis management.

  • European govts. urge U.S. tech companies to remove terrorist-related postings from sites

    The terror attacks in Paris have led French and German authorities to call on U.S. tech firms to help identify terrorist communications and remove hate speech from social media sites. The United Kingdom has also, for several months now, pressed Internet firms to be proactive in removing extremist content such as videos of sermons by radical Islamic preachers or recruitment material, from their sites. These recent requests for more cooperation between U.S. tech firms and European governments contrast with calls from many of the same governments who, following the Edward Snowden leaks, criticized U.S. tech firms for being too close to law enforcement agencies.

  • Researchers try to develop a methodology for predicting terrorist acts

    While counterterrorism agencies rely on surveillance and other forms of classified data to predict terrorist attacks, researchers and analysts are attempting to define what terrorism is and how it has evolved over time in order better to identify trends and patterns in terrorist activities. This better understanding may help predict the next major attack. Reliable predictions would be helpful not just for counterterrorism experts, but also for insurance underwriters who must consider the terrorism risk faced by large projects.