-
Secret wiretap warrants double since 9/11
A Justice Department report shows FISA warrants for counterterrorism, espionage cases up
-
-
Developing miniature robots to increase situational awareness
The military wants to increase the situational awareness of of its officers and soldiers, and an alliance of industry and academia is set up to develop advanced robotic equipment for use in urban environments and complex terrain, such as mountains and caves
-
-
Landscape of business intelligence market changes in six months
A campaign of acquisitions by IBM, Microsoft, Oracle, and SAP has changed the look of the business intelligence market in the last six months; The Big Four’s market moves were driven by the growing BI hype, the need for self-preservation, and even some fear
-
-
MI5 seeks powers to trawl records in new terror hunt
As part of the Brown government’s new counterterrorism strategy, which places emphasis on thwarting a cyber-attack on the United Kingdom, MI5 seeks total access to commuters’ travel records to help them meet the threat
-
-
Data sharing among local, state, and federal law enforcement grows
The 9/11 attacks demonstrated the need for more information and intelligence sharing among law enforcement services a the local, state, and federal levels; more and more intelligence sharing systems are being put in place by private companies to help law enforcement cope with — and meaningfully and effectively use — the vast new sources of data now open to them; privacy advocates worry
-
-
Researchers show principles of mind-reading machine
Researchers have developed a more sophisticated way to extract visual stimuli from brain signals; they developed a computational model that uses functional MRI (fMRI) data to decode information from an individual’s visual cortex; system may help in decoding dreams, and may offer a more humane interrogation technique
-
-
On needles and haysacks: New way to deal with large datasets
The ability to gather vast amounts of data and create huge datasets has created a problem: Data has outgrown data analysis; for more than eighty years one of the most common methods of statistical prediction has been maximum likelihood estimation (MLE); Brown University researchers offer a better way to deal with the enormous statistical uncertainty created by large datasets
-
-
Analyzing e-mail messages to find insider threat
Researchers develop a technology based on Probabilistic Latent Semantic Indexing (PLSI) to detect changes in the words and terms individuals in an organization use in their e-mail messages — to fellow employees and to outsiders; research shows that certain verbal and terminological changes indicate criminal or even terrorist intent
-
-
Computer science helps in combating terrorism
The University of Maryland develops the SOMA Terror Organization Portal (STOP); SOMA (Stochastic Opponent Modeling Agents) is a formal, logical-statistical reasoning framework which uses data about past behavior of terror groups in order to learn rules about the probability of an organization, community, or person taking actions in different situations
-
-
Detecting insider threats early
Insiders pose serious threats to organizations ranging from multinational companies to military installations; one way to spot insider threats is to use data mining techniques to scour e-mail and build up a picture of social network interactions; the technology could prevent serious security breaches, sabotage, and even terrorist activity
-
-
New search tools help separate the wheat from the (data) chaff
If there is a problem which is worse than having too little information, it is having too much of it; three new tools developed by researchers at a German institute help cope with this wheat-from-the-chaff problem
-
-
Analysis // by Ben Frankel: U.S. still fighting for sanctions on Iran, but with a weaker hand
The Bush administration shot itself in the foot by releasing a confusing and partially misleading intelligence assessment of Iran’s nuclear weapon activities; the administration dealt a near-fatal blow to the effort to intensify economic sanctions on Iran, instead creating a situation in which the world will either have to accept a nuclear-armed Iran or go to war to stop it
-
-
FBI worried about surge in sales of book detailing airport security gaps
A book detailing gaps in airport security enjoys a surprising surge in sales; the FBI, which keeps track of sales of books which may benefit terrorists — and also of similar library books being checked out — wants to know more
-
-
Chinese espionage ring discovered
Chinese spy ring based in New Orleans broken up; two individuals of Chinese origin bribe Pentagon official d=to deliver sensitive information concerning Taiwan
-
-
Role of U.S. companies in building China's internal security system reviewed
The Chinese government decided last year to invest heavily in security technology — especially intelligent CCTVs equipped with facial recognition capabilities; the Chinese say it has to do with security for the Summer Olympics; the sheer scope and breadth of the project, though, means that the new security system aims to strengthen the government’s ability to repress basic freedoms; role of U.S. companies questioned
-
More headlines
Who's online
The long view
Fusion centers, created to fight domestic terrorism, suffering from mission creep: Critics
Years before the 9/11 attacks, law enforcement agencies throughout the country, alarmed by the 1995 Oklahoma City bombing, began to monitor and investigate signs of domestic terrorism. That increased monitoring, and the need for coordination among various law enforcement agencies, gave rise to the fusion centers. A new report, which is supported by current and former law enforcement and government officials, concludes that post-9/11, fusion centers and the FBI teams which work with them shifted their focus from domestic terrorism to global terrorism and other crimes, including drug trafficking.Experts say that at a time when the number of domestic terrorism threats, many of which are linked to right-wing extremist groups, is surging, law enforcement must refocus their attention on the threats from within.