• Al Qaeda increases efforts to defeat U.S. drones

    Drone attacks have been an important part of America’s war against terrorism. These airstrikes have considerably limited the movements and operational freedom of al Qaeda operatives and other militants in Pakistan, Afghanistan, Yemen, and Somalia. Al Qaeda has been exploring strategies and experts to allow it to counter America’s drone campaign.

  • More Americans see their electronic equipment seized by DHS at the border

    The American Civil Liberties Union (ACLU) has released details of an investigation showing how U.S. law enforcement and other agencies exceed their powers in the name of homeland security. The ACLU points to the practice of the U.S. border agents searching and seizing the electronic devices of Americans at the border. Public data shows that more Americans are having their electronic devices searched.

  • Navy blimp conducts aerial mapping operations in the Washington D.C. Flight Restriction Zone

    The U.S. Naval Research Laboratory (NRL) and the Navy’s sole Science & Technology research squadron, Scientific Development Squadron ONE (VXS-1), began operating the MZ-3A lighter-than-air blimp in the regions surrounding Washington, D.C. on 21 September. The Navy MZ-3A is conducting aerial mapping operations within the Washington D.C. Flight Restriction Zone (DCA-FRZ).

  • Compact aerostat offers affordable, portable surveillance solution

    Columbia, Maryland-based TCOM last week unveiled its newest aerostat platform, the 12M Tactical Aerostat. The system is designed to meet the needs of soldiers and first responders who require a compact, affordable, persistent surveillance solution which can be transported anywhere, rapidly deployed, and easily retrieved.

  • view counter
  • Using spooks’ software to select wine

    Delectable is a mobile application that allows users to explore wines by using technology currently employed to locate terrorists and prevent bank frauds. The application is considered to have the world’s largest database of wine, providing information on more than two million wines and offering users an option to purchase selected wines.

  • U.S. pays growing attention to insider threats

    Al Qaeda and other terrorist organizations have repeatedly sought to infiltrate the U.S. intelligence community by having supporters apply for intelligence jobs, according to a classified budget document. The U.S government investigates thousands of employees a year to make sure such infiltration does not happen. The CIA says that 20 percent of job applicants whose backgrounds raised questions had “significant terrorist and/or hostile intelligence connections.”

  • view counter
  • NYPD designated all NYC mosques as terrorist organizations to facilitate broad surveillance

    The New York Police Department (NYPD) secretly labeled entire mosques in New York as terrorist organizations, allowing the NYPD to use surveillance techniques including informants and spies without needing evidence or proof of criminal or terrorist activities to investigate the mosques. The investigations, known as Terrorism Enterprise Investigations (TEI), began after the 9/11 attacks on New York City and the Pentagon.

  • Fusion centers collect information on non-threatening groups

    Since the 9/11 attacks, federal and state surveillance of nonviolent student groups, protest movements, and mosques has increased along with the growth of fusion centers. Fusion centers serve as the focal points for the receipt, analysis, gathering, and sharing of threat-related information. According to DHS, there are fifty-three primary fusion centers and twenty-five recognized fusion centers across the United States.

  • Security vs. privacy

    Those who ask you to choose security or privacy and those who vote on security or privacy are making false choices. That’s like asking air or water? You need both to live. Maslow placed safety (of which security is a subset) as second only to food, water, sex, and sleep. As humans we crave safety. As individuals and societies, before we answer the question “security or privacy,” we first have to ask “security from whom or what?” and “privacy from whom and for whom?”

  • Privacy board wants Feds to update security agencies’ operating rules

    The independent Privacy and Civil Liberties Board says U.S. national security agencies are operating under outdated rules which should be revised to reflect advances in technology.The oversight board says that rules governing collection and retention of data about Americans need be revised to “appropriately capture both the evolution of technology and the roles and capabilities of the intelligence community since 9/11.”

  • U.K. newspapers complain government "conflating terrorism and journalism"

    The U.K. government, relying on the Terrorism Act 2000, has recently taken actions against several newspapers, culminating the 18 August detention at Heathrow Airport of David Miranda. Miranda is the companion of Glenn Greenwald, the Guardian’s journalist who broke the Snowden story, and the security services believed Miranda, a Brazilian, was transporting Snowden-related material with him. He was detained and questioned for nine hours.

  • U.K. newspapers complain government "conflating terrorism and journalism"

    The U.K. government, relying on the Terrorism Act 2000, has recently taken actions against several newspapers, culminating the 18 August detention at Heathrow Airport of David Miranda. Miranda is the companion of Glenn Greenwald, the Guardian’s journalist who broke the Snowden story, and the security services believed Miranda, a Brazilian, was transporting Snowden-related material with him. He was detained and questioned for nine hours.

  • World's smallest drone may be a search-and-rescue tool

    See video

    Researchers have designed, built, and tested the world’s smallest open source autopilot for small unmanned aircraft. A smaller and lighter autopilot — it weighs only 1.9 grams — allows these small flying robots to fly longer, fit into narrower spaces, or carry more payloads such as cameras. This makes them more suitable to be used, for example, rescue operations.

     

  • NSA broke UN video-conferencing encryption, eavesdropped on deliberations

    The National Security Agency (NSA) in 2012 broke the encryption which secured the UN internal video conferencing at the organization’s headquarters in New York. Among other things, the NSA discovered that the Chinese secret service was also eavesdropping on the UN.

  • DHS takes control of Arizona border blimp, grounding it for repairs

    A 208-foot long white blimp has been floating two miles above Yuma Proving Ground, Arizona, using radar continuously to scan the area along the border, looking for low-flying aircraft drug smugglers use to bring drugs into the United States. The sensors on board can detect activity in distances of up to 230 miles. The blimp, had been operated by the U.S. Air Force, but DHS has now assumed responsibility for it. It is one of eight aerostats deployed along the U.S. southern border.