-
Smartphones to help find avalanche victims
Not a winter goes by without an avalanche incident. In the search for those buried beneath the snow, every second counts. On average, rescuers have fifteen minutes to recover victims alive. This is why an avalanche transceiver is an essential piece of kit for anyone spending significant time off-piste. These transceivers do not come cheap, however, ranging in price from 200 and over 500 euros — perhaps one reason why many walkers and skiers still do not carry one with them. Now smartphones equipped with functions of an avalanche transceiver should help locate the victims quickly.
-
-
Arizona lawmaker pushes measure to limit NSA operations in the state
Arizona State Senator Kelli Ward, a tea party Republican representing the Lake Havasu area, is pushing a bill in the State Senate which would impose limits on the ability of the NSA to operate in Arizona. In December Ward became the first legislator in the nation to declare she would introduce legislation to limit NSA activities in the state, and so far legislators in twelve other states have introduced similar bills. Arizona SB 1156 would. Among other things, prohibit local and state law enforcement officials from cooperating with the NSA and would prevent state or local prosecutors from using NSA-collected information which had not been obtained with a warrant. The bill would also withhold funds from state universities and colleges supporting the NSA with research or recruitment. Legal scholars say the courts would in all likelihood strike down Ward’s measure because Arizona, in essence, is trying to regulate the federal government.
-
-
National Guard units help states ward off cyberattacks
Governors across the United States are mobilizing their states’ National Guard units to combat threats from cyberattacks. The state of Washington was the first state to assign the state’s National Guard cybersecurity responsibilities. The state recognized the potential of its National Guard as a cyberforce when it realized that many of its soldiers, who are full-time employees and part-time soldiers, worked for tech employers such as Google, Boeing, Cisco, Verizon, and Microsoft.
-
-
Eco-terrorist sentenced to five years and ordered to read Malcolm Gladwell’s book
Last Monday, Chief U.S. District Judge Ann Aiken imposed a 5-year sentence on radical environmental activist Rebecca Rubin for her involvement in several acts of arson, including the burning of Vail Colorado’s Twin Elks Lodge which caused millions of dollars in damage. Rubin spent almost eight years living underground, giving herself up to the FBI last October. She pleaded guilty to arson, attempted arson, and conspiracy to commit arson in connection with a radical environmental group calling itself The Family. Judge Aiken also ordered Rubin to read Malcolm Gladwell’s 2013 book David and Goliath, explaining that Rubin might learn a thing or two about non-violent environmental advocacy while serving her sentence.
-
-
Barrier technology strengthens protection at Navy ports
Advanced technology rules the day in modern warfare — yet one very real threat to the U.S. Navy comes from a simple but deadly enemy strategy: small speed boats laden with explosives ramming into ships in harbor. Now a new maritime security barrier, developed with support from the Office of Naval Research (ONR), could provide a quantum leap in existing sea-port protection.
-
-
Quantum encryption for wiretap-proof communication a step closer
Polarized light, in which all the light waves oscillate on the same plane, forms the foundation for technology such as LCD displays in computers and TV sets, and advanced quantum encryption. There are two ways to create polarized light, but each has its problems: filtering normal unpolarized to block unwanted light waves (but here, half of the light emitted, and thereby an equal amount of energy, are lost), or using light which is polarized at the source (but here, polarization is either too weak or hard to control). Now there is a better way: By emitting photons from a quantum dot at the top of a micropyramid, researchers are creating a polarized light source with a high degree of linear polarization, on average 84 percent. As the quantum dots can also emit one photon at a time, this is promising technology for quantum encryption, a growing technology for wiretap-proof communication.
-
-
U.S. will seek death penalty for Dzhokhar Tsarnaev
The U.S. Justice Department announced that the United States will seek the death penalty against Dzhokhar Tsarnaev, the 20-year-old accused of detonating two bombs the Boston Marathon last Aril, killing three people and injuring more than 200 others. The younger Tsarnaev faces thirty counts in the bombing, including use of a weapon of mass destruction resulting in death and the bombing of a public place. Since 1964, the federal government has only executed three people, including Timothy McVeigh who was convicted in the 1995 Oklahoma City bombing.
-
-
Chemical, physical traits of post-nuclear detonation fallout identified
Post-detonation nuclear forensics relies on advanced analytical techniques and an understanding of the physio-chemical processes associated with a nuclear detonation to identify the device type and the source of the nuclear material in the device. Researchers have begun to develop a technique that provides a practical approach for looking into the complex physical and chemical processes that occur during fallout formation following a nuclear detonation.
-
-
A first: Constitutionality of NSA warrantless surveillance challenged by terrorism suspect
Jamshid Muhtorov, a refugee from Uzbekistan now facing terrorism charges in Colorado, is the first criminal defendant who, as part of his lawyers’ defense strategy, is challenging the constitutionality of the NSA’s warrantless surveillance program. Muhtorov filed a motion Wednesday in federal court in Denver to suppress any evidence obtained through the agency’s surveillance program on grounds that it was unlawful. In July 2013 the Justice Department reversed an earlier policy, and now informs defendants whether the case against them, in whole or in part, is based on information obtained through warrantless surveillance. To date, six months after the review process at Justice was launched, Muhtorov and Mohamed Mohamud, a Portland, Oregon teenager who had been convicted after an FBI sting operation of attempting to detonate a bomb at a Christmas tree lighting ceremony, are the only defendants to receive such a disclosure.
-
-
A first: Judge in terrorism case rules defense may examine government secret FISA application
U.S. District Judge Sharon Johnson Coleman ruled yesterday (Wednesday) that the U.S. government cannot keep secret its request to conduct clandestine surveillance of an accused would-be terrorist. The ruling gives defense attorneys an unprecedented access to a request made to the Foreign Intelligence Surveillance Act (FISA) court for permission to spy on an American citizen. Judge Coleman said her ruling is the first time a defendant’s lawyers will be given access to an application prosecutors submitted to the FISA court. Security experts warned that opening FISA applications to review in a criminal case may set a dangerous precedent.
-
-
“Space cops” to help control traffic in space, prevent satellites from colliding
Collisions in space of satellites and space debris have become increasingly problematic. A team of scientists are using mini-satellites that work as “space cops” to help control traffic in space. The scientists used a series of six images over a 60-hour period taken from a ground-based satellite to prove that it is possible to refine the orbit of another satellite in low earth orbit.
-
-
Gaza-based Palestinian hackers compromise Israeli defense ministry computer
Hackers broke into a computer at the Israeli Ministry of Defense through an e-mail attachment tainted with malicious software. The attachment looked as if it had been sent by the country’s internal security service, the Shin Bet. it was likely that Palestinians were behind the cyberattack, saying that the more recent attacks were similar to cyberattacks against Israeli computers more than a year ago. Those attacks originated in the Hamas-controlled Gaza Strip. The attackers used an e-mail attachment to infect the computers with Xtreme RAT malware, which is a remote access Trojan. The malware allows hackers complete control of an infected machine. They can steal information, load additional malicious software onto the network, or use the invaded computer as a base of operations from which to conduct reconnaissance and attempt to gain deeper access into the network.
-
-
U.S. weapons shipped to moderate Syrian rebels after secret congressional approval
U.S. and European sources have confirmed that U.S.-manufactured light arm have been flowing to moderate Syrian rebels in the south of Syria, and that Congress has approved funding to continue the shipments for the next few months. The weapons, which are being delivered to the rebels through Jordan, include both light arms and heavier weapons such as anti-tank rockets. The shipments, however, do not include shoulder-fired anti-aircraft missiles.
-
-
Israeli jets destroy Hezbollah-bound advanced Russian missiles stored near Latakia
Large warehouses near the port city of Latakia, where the Assad regime stored advanced Russian missiles before shipping them to Hezbollah, were destroyed by aerial attack late Sunday. Israel has already launched six attacks in 2013 on Syrian arms shipments to Hezbollah — on 30 January, 3 May, 5 May, 5 July, 18 October, and 30 October. The attack on 5 July was on storage facilities in the same Latakia area, where Syria kept a large quantity of advanced P-800 Oniks anti-ship missiles, also called Yakhont missiles. Three weeks after the attack, U.S. sources said that the attack did not succeed in wiping out all of the missiles. “American officials said that further Israeli strikes are likely,” the New York Times reported on 31 July.
-
-
Minnesota wants to limit law-enforcement use of wireless tracking devices
The Minnesota Department of Public Safety’s acquisition of Kingfish and Stingray II wireless surveillance devices has come under scrutiny as the department’s Bureau of Criminal Apprehension(BCA) has used the devices in investigations. Some legislators are considering placing limits on law enforcement’s use of the data captured by the devices because of concerns over who has access to the data and how long it is being kept.
-
More headlines
Who's online
The long view
How to verify a comprehensive Iran nuclear deal
With the negotiation between the P5+1(the United States, European Union, Britain, France, Russia, and China) and Iran resuming yesterday (Wednesday) about a set of parameters for an eventual Joint Comprehensive Plan of Action, the shape of a final deal about Iran’s nuclear program has emerged. Many important provisions of a final deal, however, remain to be negotiated in the coming months. David Albright, the president of the Institute for Science and International Security, says that a critical set of these provisions involves the adequacy of verification arrangements which would be in place to monitor Iran’s compliance with a deal. Tehran’s long history of violations, subterfuge, and non-cooperation requires extraordinary arrangements to ensure that Iran’s nuclear program is indeed peaceful.
Fusion centers, created to fight domestic terrorism, suffering from mission creep: Critics
Years before the 9/11 attacks, law enforcement agencies throughout the country, alarmed by the 1995 Oklahoma City bombing, began to monitor and investigate signs of domestic terrorism. That increased monitoring, and the need for coordination among various law enforcement agencies, gave rise to the fusion centers. A new report, which is supported by current and former law enforcement and government officials, concludes that post-9/11, fusion centers and the FBI teams which work with them shifted their focus from domestic terrorism to global terrorism and other crimes, including drug trafficking.Experts say that at a time when the number of domestic terrorism threats, many of which are linked to right-wing extremist groups, is surging, law enforcement must refocus their attention on the threats from within.