-
DoD ends ambitious blimp program
The Department of Defensehas decided to end its Long Endurance Multi-Intelligence Vehicle (LEMV) project.The blimp was supposed to fly for as long as three weeks at a time, gather intelligence using 2,500 pounds worth of the most advanced cameras, sensors, and other intelligence technology. Operating at an altitude of 20,000 feet, the airship was designed to withstand enemy fire with its blend of fabrics, including kevlar. The Pentagon spent $297 million on the airship, but last month sold it back to one of the contractors which built it for $301,000.
-
-
Kenya, Somalia to create joint anti-terrorism task force
Al-Shabaab’s attack on the Westgate shopping mall in Nairobi last month has prompted security officials in Kenya and Somalia to consider the creation of a joint task force which will share intelligence, monitor activity, and track finances relating to terrorist groups operating in East Africa. Also under discussion is the establishment of a joint East African paramilitary force with jurisdiction throughout the region.
-
-
Weakening cybersecurity to facilitate NSA surveillance is dangerous: experts
In the wake of revelations about the NSA surveillance programs, an expert on surveillance and cybersecurity recommended a re-evaluation of those surveillance practices that weaken commercial products and services. These practices include weakening standards and placing “back doors” into products that are accessible to U.S. government agencies. The expert – Jon Peha, former chief technology officer of the FCC and assistant director of the White House’s Office of Science and Technology — said deliberately weakening commercial products and services may make it easier for U.S. intelligence agencies to conduct surveillance, but “this strategy also inevitably makes it easier for criminals, terrorists and foreign powers to infiltrate these systems for their own purposes.”
-
-
U.S. tech companies could go “dark” to regain trust
With each new revelation of the scope of the American National Security Agency’s spying, perceptions of the importance of privacy are hardening around the world. There is thus a motivation for major technology companies to provide a verifiably secure means of allowing users to communicate securely without an ability for the companies to provide access to security agencies, even if requested to. Two companies, Silent Circle and Lavabit, have come together to form the Dark Mail alliance in an attempt to do exactly this.
-
-
FBI mulling use of video recognition technology
The Federal Bureau of Investigation(FBI) is considering the use of video recognition technology to identify suspects in videos and still images based on facial and behavioral recognition. The proposed smart-video technology would scan crime scene footage against records of people, places, and objects to highlight possible suspects and their whereabouts.
-
-
Lawmakers want better security clearance process
The Senate Homeland Security and Governmental Affairs Committee(HSGAC) held a hearing last week to review security clearance procedures in light of Edward Snowden’s leaks and the Washington Navy Yard assault in which contractor Aaron Alexis shot and killed twelve people. Members of various federal agencies involved in issuing security clearances testified about their initiatives to improve the security clearance process, but legislators pushed for concrete plans and changes to the current system.
-
-
Senate panel’s NSA curbs not enough: critics
Yesterday, the Senate’s intelligence committee approved by an 11-4, and released the text of, a bill which would scale back the NSA’s bulk collection of Americans’ telephone records, increase congressional and judicial oversight of intelligence activities, and create 10-year prison sentences for people who access the classified material without authorization. Critics of U.S. surveillance programs and privacy rights advocates said the bill does little, if anything, to end the daily collection of millions of records that has spurred widespread demands for reform.
-
-
Court: a warrant is required for GPS tracking of suspects’ vehicles
A federal appeals court in Philadelphia has ruled that law enforcement officials must obtain a warrant before attaching a GPS device to a suspect’s car.The appeals judges said that “A GPS search extends the police intrusion well past the time it would normally take officers to enter a target vehicle and locate, extract, or examine the then-existing evidence.” They also pointedly noted that “Generally speaking, a warrant-less search is not rendered reasonable merely because probable cause existed that would have justified the issuance of a warrant.”
-
-
U.S. tech companies increase lobbying efforts related to surveillance, NSA
Technology firms Apple, Google, Facebook, and Microsoft, among other tech powerhouses, are quietly increasing lobbying efforts directed at government surveillance laws as they seek to have a say in what Congress does regarding surveillance reforms and National Security Agency (NSA) programs. Traditionally, tech firms have not pushed for restrictions on the ability of the U.S. intelligence community to collect data, and it is not clear what position these industry leaders will take, whether they plan to take a position at all, or whether they will present lawmakers with a united industry front.
-
-
White House to curb NSA monitoring of some allies' leaders
It appears that President Obama will soon instruct the NSA to stop eavesdropping on leaders of close U.S. allies. It now emerges that both the president and Congress’s intelligence committees were kept in the dark about this aspect of the NSA surveillance program. Yesterday’s indication by the White House that it moving toward banning the NSA from eavesdropping on some foreign leaders is a historic change in the practices of an agency which has enjoyed unlimited and unfettered – and, it now appears, unsupervised – freedom of action outside the borders of the United States. The move is similar to, if more complicated than, the limits imposed on the CIA in the mid-1970s. Security experts note, though, that prohibiting the NSA from eavesdropping on some foreign leaders would be more complicated and potentially more damaging to U.S. interests than the prohibitions imposed on the CIA more than three decades ago.
-
-
2008 drone killing of al Shabab leader used phone info collected by NSA
Court documents filed in the case of Basaaly Moalin, a San Diego cab driver of Somali origin accused of aiding al Shabab, reveal that the 2008 killing by a CIA drone strike of al Shabab leader Aden Hashen Ayrow was aided by information collected by the NSA metadata collection program. The NSA was able to pinpoint Ayrow’s real-time location by tracking calls between him and Moalin. Lawyers for Moalin are appealing the conviction on grounds that he was unconstitutionally targeted by the NSA’s surveillance program.
-
-
MI6 asks for more spies in Afghanistan to fight terrorism after NATO withdrawal
MI6, the U.K. Secret Intelligence Service, is calling for reinforcements from other agencies in order to strengthen the U.K. intelligence presence in Afghanistan after NATO forces withdraw from the country in 2014. Intelligence analysts warn that Afghanistan will become an “intelligence vacuum” which will allow terrorists to pose an increased threat to Britain. Intelligence sources said that Britain’s intelligence agencies were already “very stretched” and focused on potential threats from Yemen and Somalia, a fact which might persuade al Qaeda to seek to exploit the lack of attention to Afghanistan.
-
-
Police departments adopt sophisticated, cheap-to-operate surveillance technology
Advancements in surveillance technology have been adopted not only by the National Security Agency (N.S.A) or other federal intelligence agencies. Local police departments have also incorporated the latest surveillance technologies into their work, allowing them to track individuals for different purposes.
-
-
Backlash: growing interest in counter-surveillance tools
The revelations about the NSA surveillance programs has prompted what some see as high-tech civil disobedience: a growing number of products and applications aiming to limit the NSA’s ability to access encrypted e-mails, obtain phone records, and listen to phone conversations.
-
-
Turkey exposed Israeli spy network in Iran
Israel and Turkey used to be close allies, but the relationship began to deteriorate in 2003, when Recep Tayyip Erdogan became prime minister after his Islamic party won the parliamentary elections the year before. The relationship reached its low point in 2010, when nine Turks were killed by Israeli commandos on a ship carrying supplies to the Gaza Strip. This was also the year that Hakan Fidan became the head of Milli Istihbarat Teskilati, or MIT, the Turkish intelligence service. Fidan is known for advocating a closer Turkey-Iran relationship – the Wall Street Journal wrote that “he rattled Turkey’s allies by allegedly passing to Iran sensitive intelligence collected by the U.S. and Israel.” Stories now emerge that in early 2012 Turkey deliberately blew the cover of an Israeli spy ring working inside Iran to collect information on Iran’s nuclear program.
-
More headlines
Who's online
The long view
Fusion centers, created to fight domestic terrorism, suffering from mission creep: Critics
Years before the 9/11 attacks, law enforcement agencies throughout the country, alarmed by the 1995 Oklahoma City bombing, began to monitor and investigate signs of domestic terrorism. That increased monitoring, and the need for coordination among various law enforcement agencies, gave rise to the fusion centers. A new report, which is supported by current and former law enforcement and government officials, concludes that post-9/11, fusion centers and the FBI teams which work with them shifted their focus from domestic terrorism to global terrorism and other crimes, including drug trafficking.Experts say that at a time when the number of domestic terrorism threats, many of which are linked to right-wing extremist groups, is surging, law enforcement must refocus their attention on the threats from within.