-
With thousands of Westerners joining ISIS, visa waiver program puts U.S. at risk: Lawmakers
Security concerns are threatening the 1986 visa waiver program (VWP), which allows millions of people with (mostly) Western passports to travel to the United States for ninety days without a visa. Lawmakers argue that the program, which applies to citizens of thirty-eight countries, has created a security weakness that terrorist groups, specifically the Islamic State (ISIS), could exploit. Thousands of European citizens have traveled to Syria and Iraq to join ISIS. Security officials fear that many of them could return back to Europe, then board a U.S.-bound flight with the intent of launching an attack on American soil.
-
-
Escape of deadly bacteria at Louisiana bio-research facility raises concerns
Weeks after federal and state officials launched an investigation into how the burkholderia pseudomallei bacteria which causes life-threatening disease Melioidosis, escaped a laboratory at the Tulane National Primate Research Center in Louisiana, another investigation is now looking into how a veterinary clinic worker might have been exposed to the bacteria.Tulane was conducting vaccine research on the bacteria in a laboratory that requires a biosafety level 3 rating — - the second highest security level.
-
-
NBAF-focused research already underway at K-State U, ahead of level-4 biolab opening
Although the remaining funding for the National Bio and Agro-defense Facility, or NBAF, was recently finalized, work on the federal livestock research facility has continued to move forward in recent years — including Kansas State University conducting research which will help jump-start future operations at NBAF. NBAF will be DHS’s premier foreign animal disease research lab. It will research high-consequence livestock diseases that threaten animal and human health. The $1.25 billion lab will be on the northeast edge of K-State Manhattan, Kansas campus. NBAF is anticipated to begin operations in 2022 or 2023. Construction of the facility’s central utility plant is more than 90 percent complete.
-
-
Iran letter may be a failed experiment or a sign of things to come
Senator Tom Cotton (R-Arkansas) sparked a political firestorm with his 9 March open letter to the leaders of Iran, co-signed by forty-six of his colleagues. The letter warns Iranian negotiators that President Obama’s successor could cancel any agreement with the United States not approved by the Senate as a formal treaty. Cotton’s observations on U.S. treaty law are facile at best, the stuff of an elective constitutional law course. It is not the substance that has rankled so many Washington observers, however, it is the form. Many described the letter as a “breach of protocol,” as if it has been out of institutional politesse that members of Congress have historically refrained from this kind of direct communication with foreign leaders. That understates the case considerably. Established constitutional doctrine holds that presidents have exclusive authority to engage foreign governments on the nation’s behalf. If this principle – sometime called John Marshall’s “sole organ” doctrine, after Chief Justice Marshall – is not followed, and if politics does not stop at the water’s edge, the result will be a free-for-all foreign policy, a scaling up of the polarization already endemic to domestic politics. No one should welcome the prospect, but it may become a fact of life. Expect presidents to up the ante by taking more aggressive unilateral measures, further reducing the possibility of inter-party cooperation. The 9 March letter may be a peek at a new kind of politics beyond the water’s edge, requiring new kinds of navigation.
-
-
New House caucus to promote blimps as cost effective means for cargo transport
To the general public, airships are familiar for their use as advertising blimps, but transportation engineers see airships as large, low-emissions transportation vessels which can carry large amounts of cargo into areas that lack infrastructure such as runways.The newHouse Cargo Airship Caucus aims to increase financial support for the use of lighter-than-air vehicles for carrying military cargo and humanitarian aid. “The unrealized potential [of blimps] is vast,” says one expert.. “Lack of funding is a big killer.”
-
-
The Brandeis program: Harnessing technology to ensure online privacy
In a seminal 1890 article in the Harvard Law Review, Louis Brandeis developed the concept of the “right to privacy.” DARPA the other day announced the Brandeis program – a project aiming to research and develop tools for online privacy, one of the most vexing problems facing the connected world as devices and data proliferate beyond a capacity to be managed responsibly.
-
-
Weighing the pros, cons of blocking ISIS’s access to social media
The Islamic State has successfully used social media to spread its ideology, share videos of beheadings, and recruit new followers. U.S. counterterrorism agencies have launched their own social media campaigns to diminish ISIS’s effects on would be jihadists, but some officials have considered whether it would be simpler to cut off ISIS from social media networks altogether. Doing so would no doubt limit ISIS’s reach on Western recruits, but could it create a challenge for officials looking to monitor the group’s activities?
-
-
U.S. security officials share a sober view of terrorism challenge
U.S. counterterrorism analysts have painted a pessimistic picture of the years to come, saying the threats from terrorism will continue to challenge the United States. This attitude contrasts with the feelings most Americans had after the killing of Osama bin Laden in 2011 and the dawn of the Arab Spring, which was initially seen as a first step in a path toward democracy in the Middle East. For U.S. security officials, those optimistic views have evaporated – even as some note that counterterrorism work thrives on pessimism and involves planning for worst-case scenarios.
-
-
U.K.: 3 London girls who traveled to Syria to join ISIS not regarded as terrorists
Sir Bernard Hogan-Howe, commissioner of the Metropolitan police(Met), has announced that the three London girls who allegedly stole jewelry from their parents to fund a trip to join the Islamic State (ISIS) may return to the United Kingdom without fear of being prosecuted for terrorism. “We have no evidence in this case that these three girls are responsible for any terrorist offenses,” said Mark Rowley, the Met’s chief of counterterrorism. “They have no reason to fear, if nothing else comes to light, that we will be treating them as terrorists.”
-
-
Bangladesh Supreme Court to hear Islamist leader’s death sentence appeal in April
Last Thursday, lawyers for Mohammad Kamaruzzaman, 63, an assistant secretary general of the Jamaat-e-Islami Bangladesh, Bangladesh’s largest Islamist party, appealed to the country’s Supreme Court to vacate the death penalty passed on Kamaruzzaman for war crimes, including genocide and torture of civilians, committed during the country’s bloody 1971 war between Bengali nationalists and the Pakistani army. So far, only one senior Jamaat official — Abdul Quader Molla — was hanged for war crimes. He was hanged in December 2013 after the Supreme Court overturned a life sentence imposed on him by the war crimes tribunal. Eight others Jamaat have been condemned to death for their part in atrocities during the 1971 war, but have not yet been executed.
-
-
Guaranteeing online anonymity
Anonymity on the Internet is possible only up to a certain degree. Therefore, it is possible that others may see who is visiting an online advice site on sexual abuse, or who frequently looks up information about a certain disease, for example. Seeing that this kind of private information can be linked to their identity, users will often resort to special online anonymization services. One of the most popular tools is Tor. “The Tor network isn’t perfect, however,” says a researcher at the Research Center for IT Security (CISPA). CISPA researchers have developed a program that can provide an accurate assessment of the level of anonymity an individual user achieves, even while basing the estimate on the fluctuations of the Tor network.
-
-
Security risks, privacy issues too great for moving to Internet voting
The view held by many election officials, legislators, and members of the public is that if people can shop and bank online in relative security, there is no reason they should not be able to vote on the Internet. Contrary to this popular belief, the fundamental security risks and privacy problems of Internet voting are too great to allow it to be used for public elections, and those problems will not be resolved any time soon, according to a researcher who has studied the issue for more than fifteen years. The security, privacy, reliability, availability, and authentication requirements for Internet voting are very different from, and far more demanding than, those required for e-commerce, and cannot be satisfied by any Internet voting system available today or in the foreseeable future. Such systems are susceptible to “attack” or manipulation by anyone with access to the system, including programmers and IT personnel, not to mention criminal syndicates and even nation states.
-
-
Suriname president’s son sent to jail for aiding Hezbollah
A New York court yesterday sentenced Dino Bouterse, the son of the president of Suriname, to more than sixteen years in prison for supporting Hezbollah, the Lebanese Shi’a terrorist organization. In 2013 Bouterse used his position and connections in the Suriname government to help people he believed were members of Hezbollah and who said their intention was to carry out attacks against American interests. In exchange, he was to receive $2 million – which he never received. The people who presented themselves as Hezbollah operatives were, in fact, undercover U.S. agents.
-
-
ISIS shows signs of strain under weight of battle defeats, other setbacks
The Islamic State (ISIS) seems to be facing setbacks as a result of attacks from a coalition of Iraqi and Kurdish government troops, as well as local non-ISIS fighters residing near the group’s territory. There have also been reports of rising tensions between foreign and local ISIS fighters.The key challenge facing ISIS right now is more internal than external,” says one expert. “We’re seeing basically a failure of the central tenet of ISIS ideology, which is to unify people of different origins under the caliphate. This is not working on the ground. It is making them less effective in governing and less effective in military operations.”
-
-
Flaws in U.K. counterterrorism laws allowed Mohammed Emwazi to escape – and become “Jihadi John”
Before Mohammed Emwazi, the British-Kuwaiti Islamic State (ISIS) fighter now known as “Jihadi John” traveled to Syria and began beheading victims, including American journalist James Foley, he was on the radar of British intelligence officials. He described the pressure he was experiencing from surveillance in a series of e-mails to the Mail on Sunday newspaper between December 2010 and 2011. He said that the pressure of being watched was getting to him. British administrative court documents suggest Emwazi was part of a radical West London recruitment network for terrorist groups in East Africa. By 2013, drone strikes, gains by African Unionforces, and infighting within al-Shabaab had made it difficult for foreign fighters to participate in the insurgency in Somalia. Emwazi’s West London group soon pivoted their efforts on fighting the Assad government in Syria.
-
More headlines
Who's online
The long view
To prevent Iranian nukes, a negotiated deal better than a military strike: David Albright
David Albright is the founder and president of the Washington, D.C.-based non-profit Institute for Science and International Security (ISIS), and author of several books on fissile materials and nuclear weapons proliferation. In a testimony before the House Foreign Affairs Committee on Wednesday, and an interview with Deutsche Welle on Thursday, Albrights says that there is every reason to be suspicious of Iran because it has cheated on its obligations in the past and has been uncooperative on an ongoing basis. Iran has also built many sites in secret, so any agreement with Iran should have extra insurance — a more powerful inspection and verification tool to try to ferret out any secret nuclear activities or facilities that Iran would build. Still, a negotiated deal, if it includes sufficiently robust inspection and verification measures, would be a more effective way than a military strike to make sure Iran does not develop nuclear weapons.
How to verify a comprehensive Iran nuclear deal
With the negotiation between the P5+1(the United States, European Union, Britain, France, Russia, and China) and Iran resuming yesterday (Wednesday) about a set of parameters for an eventual Joint Comprehensive Plan of Action, the shape of a final deal about Iran’s nuclear program has emerged. Many important provisions of a final deal, however, remain to be negotiated in the coming months. David Albright, the president of the Institute for Science and International Security, says that a critical set of these provisions involves the adequacy of verification arrangements which would be in place to monitor Iran’s compliance with a deal. Tehran’s long history of violations, subterfuge, and non-cooperation requires extraordinary arrangements to ensure that Iran’s nuclear program is indeed peaceful.
Fusion centers, created to fight domestic terrorism, suffering from mission creep: Critics
Years before the 9/11 attacks, law enforcement agencies throughout the country, alarmed by the 1995 Oklahoma City bombing, began to monitor and investigate signs of domestic terrorism. That increased monitoring, and the need for coordination among various law enforcement agencies, gave rise to the fusion centers. A new report, which is supported by current and former law enforcement and government officials, concludes that post-9/11, fusion centers and the FBI teams which work with them shifted their focus from domestic terrorism to global terrorism and other crimes, including drug trafficking.Experts say that at a time when the number of domestic terrorism threats, many of which are linked to right-wing extremist groups, is surging, law enforcement must refocus their attention on the threats from within.
Lack of evidence-based terrorism research hobbles counterterrorism strategies
The Global Terrorism Database at the University of Maryland estimates that groups connected with al-Qaeda and the Islamic State committed almost 200 attacks per year between 2007 and 2010. That number has increased to about 600 attacks in 2013. As terrorism becomes more prevalent, the study of terrorism has also increased, which, in theory, should lead to more effective antiterrorism policies, and thus to less terrorism. The opposite is happening, however, and this could be partly due to the sort of studies which are being conducted. The problem: few of these studies are rooted in empirical analysis, and there is an “almost complete absence of evaluation research” concerning anti-terrorism strategies, in the words of a review of such studies.
CBP IA Operation Hometown reduces violence and corruption: Tomsheck shuts it down -- Pt. 5
Operation Hometown appears to be yet another example in a series of programs at Customs and Border Protection (CBP) demonstrating blatant dysfunctionality and mismanagement within the Department of Homeland Security. Meticulously designed to target border violence and corruption among CBP employees, Operation Hometown was labeled a success in reaching its stated objectives. CBP Internal Affair’s (IA) James F. Tomsheck,however, shut the program down. As Congress and President Obama debate various aspects of a new federal immigration policy,few politicians are willing to acknowledge the serious problems at CBP Internal Affairs – but they should, as these problems may directly impact the success of any or all new immigration reforms.
California drought highlights the state’s economic divide
As much of Southern California enters into the spring and warmer temperatures, the effects of California’s historic drought begin to manifest themselves in the daily lives of residents, highlighting the economic inequality in the ways people cope. Following Governor Jerry Brown’s (D) unprecedented water rationing regulations,wealthier Californians weigh on which day of the week no longer to water their grass, while those less fortunate are now choosing which days they skip a bath.