Terrorism
US Sanctions Three for Cyber Work for ISIS
The United States is hitting two Egyptian nationals with sanctions for allegedly creating and maintaining a platform used to train members of the ISIS terrorist group in cybersecurity and to support its ...
Security Boulevard
Are Internet Providers ‘Aiding and Abetting’ Crimes?
The internet was on tenterhooks over the question of whether the U.S. Supreme Court would find that online providers like Google, Facebook and others could continue to enjoy protection under the Communications ...
Security Boulevard
Terror Groups Silent after US Strike Kills al-Qaeda Leader Ayman Al-Zawahiri
Flashpoint Team | | Afghanistan, Corporate & Physical Security, Corporate and Physical Security, counterterrorism, current-events, isis, Physical Security, Terrorism
On August 1, 2022, US President Joe Biden announced that he authorized a drone strike to kill Ayman al-Zawahiri, the leader of al-Qaeda and former deputy to Usama bin Laden, in Kabul, ...
Security and Human Behavior (SHB) 2022
Bruce Schneier | | Conferences, Cybersecurity, Privacy, Security Conferences, Terrorism, Uncategorized
Today is the second day of the fifteenth Workshop on Security and Human Behavior, hosted by Ross Anderson and Alice Hutchings at the University of Cambridge. After two years of having this ...
Super Bowl LVI Physical Security Guide: From Counterfeiting and COVID to Protests and Phishing
Veronica Drake | | Blog, COVID-19, Physical Security, physical threat intelligence, Protests, Terrorism, Threat Intelligence
Security SEAR Level 1 The Department of Homeland Security (DHS) considers the Super Bowl a Special Event Assessment Rating (SEAR) Level 1—meaning it requires extensive federal interagency support for coordination and security ...
Details on the Unlocking of the San Bernardino Terrorist’s iPhone
The Washington Post has published a long story on the unlocking of the San Bernardino Terrorist’s iPhone 5C in 2016. We all thought it was an Israeli company called Cellebrite. It was ...
The NSA is Refusing to Disclose its Policy on Backdooring Commercial Products
Bruce Schneier | | backdoors, national security policy, nsa, Privacy, surveillance, Terrorism, Uncategorized
Senator Ron Wyden asked, and the NSA didn’t answer: The NSA has long sought agreements with technology companies under which they would build special access for the spy agency into their products, ...
Evaluating the NSA’s Telephony Metadata Program
Interesting analysis: "Examining the Anomalies, Explaining the Value: Should the USA FREEDOM Act's Metadata Program be Extended?" by Susan Landau and Asaf Lubin. Abstract: The telephony metadata program which was authorized under ...
Science Fiction Writers Helping Imagine Future Threats
The French army is going to put together a team of science fiction writers to help imagine future threats. Leaving aside the question of whether science fiction writers are better or worse ...
FBI Wants to Invest in Social Media Surveillance Tool
Terrorist organizations know their way around the web, and they don’t shy away from using social networks to communicate with each other or to recruit new members. The FBI is looking into ...