Menu

Blog

Archive for the ‘terrorism’ category: Page 7

Feb 18, 2020

Exclusive: FBI document reveals local and state police are collecting intelligence to expand terrorism watch list

Posted by in categories: finance, government, law enforcement, terrorism

Despite a federal judge’s ruling last September that the U.S. government’s terror watch list violates constitutional rights, an FBI report obtained by Yahoo News shows local and state law enforcement agencies are being used to gather intelligence on individuals to collect information about those already in the database.

Law enforcement “encounters of watchlisted individuals almost certainly yield increased opportunities for intelligence collection,” says the FBI document, dated more than a month after the federal court ruling. The FBI says such encounters could include traffic stops or domestic disputes, which gives law enforcement “the opportunity to acquire additional biographic identifiers, fraudulent identification documents, financial information and associates of watchlisted individuals,” which might assist in thwarting terrorist acts.

The Terrorism Screening Database, widely known as the watch list, was created in 2003 and consists of names of people suspected of being involved with terrorism. Over the years, the list has grown to include the names of 1.1 million people, raising concerns that many of those on the list have no involvement in terrorism but have little or no legal resources with which to challenge the designation.

Feb 14, 2020

Biologists Are Already Printing the Deadly COVID-19 Virus

Posted by in categories: biotech/medical, terrorism

Still, the fact that many labs worldwide are capable of printing viruses is worrisome.

A few years ago, for instance, Canadian researchers alarmed the scientific community when they assembled synthetic horsepox in a lab — a virus closely related to smallpox, which killed hundreds of millions before researchers developed a vaccine.

The same technique, the researchers said at the time, could be be used to bring back smallpox, giving terrorists tools to set off a deadly pandemic.

Jan 28, 2020

Facing Up to Facial Recognition

Posted by in categories: education, robotics/AI, terrorism, transportation

I’m excited to share my new opinion piece on AI facial recognition and privacy for IEEE Spectrum:


The views expressed here are solely those of the author and do not represent positions of IEEE Spectrum or the IEEE.

Many people seem to regard facial-recognition software in much the same way they would a nest of spiders: They recognize, in some abstract way, that it probably has some benefits. But it still gives them the creeps.

Continue reading “Facing Up to Facial Recognition” »

Jan 24, 2020

Pandemic simulation exercise spotlights massive preparedness gap

Posted by in categories: biotech/medical, food, health, security, sustainability, terrorism

Circa 2019 Event 201, hosted by the Johns Hopkins Center for Health Security, envisions a fast-spreading coronavirus with a devastating impact.

Back in 2001, it was a smallpox outbreak, set off by terrorists in U.S. shopping malls. This fall, it was a SARS-like virus, germinating quietly among pig farms in Brazil before spreading to every country in the world. With each fictional pandemic Johns Hopkins experts have designed, the takeaway lesson is the same: We are nowhere near prepared.

Continue reading “Pandemic simulation exercise spotlights massive preparedness gap” »

Nov 29, 2019

This is how Facebook’s AI looks for bad stuff

Posted by in categories: robotics/AI, terrorism

The context: The vast majority of Facebook’s moderation is now done automatically by the company’s machine-learning systems, reducing the amount of harrowing content its moderators have to review. In its latest community standards enforcement report, published earlier this month, the company claimed that 98% of terrorist videos and photos are removed before anyone has the chance to see them, let alone report them.

So, what are we seeing here?: The company has been training its machine-learning systems to identify and label objects in videos—from the mundane, such as vases or people—to the dangerous, such as guns or knives. Facebook’s AI uses two main approaches to look for dangerous content. One is to employ neural networks that look for features and behaviors of known objects and label them with varying percentages of confidence (as we can see in the video, above.)

Training in progress: These neural networks are trained on a combination of pre-labelled videos from its human reviewers, reports from users, and soon, from videos taken by London’s Metropolitan Police. The neural nets are able to use this information to guess what the entire scene might be showing, and whether it contains any behavior or images that should be flagged. It gave more details on how its systems work at a press briefing this week.

Nov 21, 2019

What Is End-to-End Encryption? Another Bull’s-Eye on Big Tech

Posted by in categories: encryption, law enforcement, security, terrorism

Law enforcement and technologists have been arguing over encryption controls for more than two decades. On one side are privacy advocates and tech bosses like Apple’s chief executive, Timothy D. Cook, who believe people should be able to have online communications free of snooping. On the other side are law enforcement and some lawmakers, who believe tough encryption makes it impossible to track child predators, terrorists and other criminals.


After years of on-and-off debate over nearly snoop-proof security, the industry is girding for new pressure from law enforcement around the world.

Oct 25, 2019

Future Consequences of Cryptocurrency Use: Systemic Investigation of Two Scenarios

Posted by in categories: bitcoin, business, complex systems, counterterrorism, cryptocurrencies, cybercrime/malcode, disruptive technology, economics, education, employment, encryption, finance, futurism, governance, government, hacking, innovation, law enforcement, open access, policy, privacy, security, strategy, terrorism

We face complexity, ambiguity, and uncertainty about the future consequences of cryptocurrency use. There are doubts about the positive and negative impacts of the use of cryptocurrencies in the financial systems. In order to address better and deeper the contradictions and the consequences of the use of cryptocurrencies and also informing the key stakeholders about known and unknown emerging issues in new payment systems, we apply two helpful futures studies tools known as the “Future Wheel”, to identify the key factors, and “System Dynamics Conceptual Mapping”, to understand the relationships among such factors. Two key scenarios will be addressed. In on them, systemic feedback loops might be identified such as a) terrorism, the Achilles’ heel of the cryptocurrencies, b) hackers, the barrier against development, and c) information technology security professionals, a gap in the future job market. Also, in the other scenario, systemic feedback loops might be identified such as a) acceleration of technological entrepreneurship enabled by new payment systems, b) decentralization of financial ecosystem with some friction against it, c) blockchain and shift of banking business model, d) easy international payments triggering structural reforms, and e) the decline of the US and the end of dollar dominance in the global economy. In addition to the feedback loops, we can also identify chained links of consequences that impact productivity and economic growth on the one hand, and shift of energy sources and consumption on the other hand.

Watch the full length presentation at Victor V. Motti YouTube Channel

Aug 3, 2019

Beginning on September 26 Photo

Posted by in category: terrorism

1950, the crew of a U.S. Navy minesweeper ship spent six days spraying Serratia marcescens and Bacillus globigii into the air about two miles off the northern California coast. The project was called €œOperation Sea Spray, € and its aim was to determine the susceptibility of a big city like San Francisco to a bioweapon attack by terrorists.

https://www.smithsonianmag.com/smart-news/1950-us-released-b…d-45rvMGkQ

˜£ï¸ „¢

Jun 3, 2019

Los Angeles transit to install body scanners that will screen for weapons and explosives

Posted by in categories: terrorism, transportation

“While we are on watch, we will not have a repeat of 9/11 or any terrorist incident inside our transportation system in the United States,” said the TSA’s administrator.

Read more

May 10, 2019

What Insurgency Will Look Like in 2030

Posted by in categories: 3D printing, military, robotics/AI, terrorism

With the rise of enhanced being the world will change at a fast pace similar games such as black ops 3 are a proper representation of possible outcomes in warfare. Like for instance sentient warfighting robot beings or cybernetically enhanced humans. The extremes of these also are seen in wetware which can essentially not have many limits so increased strength intelligence really anything you can imagine. Really sci-fi games such as halo are not far off at the possibilities of warfare. Really we are only limited by our imagination.


The author of “Ghost Fleet” has some guesses — and some questions that U.S. defenders will have to answer.

Robots, artificial intelligence, cyberwar, 3D printing, bio-enhancements, and a new geopolitical competition; the 21st century is being shaped by a range of momentous, and scary, new trends and technologies. We should also expect them to shape the worlds of insurgency and terrorism.

Continue reading “What Insurgency Will Look Like in 2030” »

Page 7 of 13First4567891011Last