Start your day with intelligence. Get The OODA Daily Pulse.
Federal authorities are also seeking more leeway in monitoring electronic communications, such as those on the Internet. As the public learns more about the technical workings and policy of government Internet surveillance, many are concerned that fears of privacy infringement, data mismanagement and government abuse may be all too legitimate. Full Story
New computer software promises to undermine government and workplace restrictions on internet use by camouflaging suspicious communications within innocent internet traffic. The banned content is returned hidden inside innocuous-looking digital images. Full Story
Police in Italy didn`t care that five Web sites they deemed blasphemous and thus illegal were located in the United States, where First Amendment protections apply. The police shut them down anyway in early July, simply by sitting down at the alleged offender`s Rome computer. Full Story
Has it happened yet? The phone call, the e-mail, the page, or maybe you discovered it yourself. Something wasn`t right: sluggish performance, too much network activity, a missing file. After a little investigating, the realization – you`ve been cracked. If this isn`t familiar to you yet, odds are it will be in the future. Crackers…
The White House`s national strategy to protect cyberspace, scheduled for release in September, will contain a provision that extends a federal scholarship-for-service program to the state level, said Richard Clarke, cybersecurity adviser to President Bush. Full Story
Surging Internet usage has made China the No. 3 user of the Internet in the world, a new report asserts, with more than 45 million citizens now logging on regularly even as the government struggles to control subversive content. Full Story
Police have welcomed a High Court ruling which will help ensure they gain effective access to emails in their search for evidence to fight serious crime. Full Story
A new e-mail virus has hit some WebTV devices, and its effects could have ramifications for the emergency phone network. Reports of the virus first surfaced in WebTV user group boards such as WebTV`s alt.discuss news group. Those reports say that once the infected attachment is opened, the WebTV shuts down, reboots, then calls 911.…
Hackers will be unable to attack Web sites protected by a new security system unless they can change the laws of physics, according to Naoto Takano, chief executive officer of Scarabs, a Japanese company. The company claims that it has developed a hard disk with two heads that prevents disk files published on the Web…
Hizballah, or Party of God, is one of the more significant indepenence movements based in the Middle East. This Lebanese Shi`ite group was created in 1983 with strong guidance from the Islamic government in Iran. Its goal today, as always, is the creation of an independent, Islamic Lebanon and the ouster of anything related to…
Cyberwar 2.0 : Myths, Mysteries & Reality by Alan D. Campen, Douglas H. Dearth is a compilation of essays by some of the most influential thinkers on information warfare and cyberterrorism. More Reviews
August 12-13, 2002 — Boston, MAParticipants will examine: * Terrorist Attack Profiles * Terrorist Training * Terrorist Tactics * Terrorist Targeting * Emerging Technologies * Threat of Cyberterrorism * Newest Aviation Security Threat Information This class led by nationally recognized terrorism experts. Participants will learn first hand about the current threats from both domestic and…
07/23/1985Denmark – Bombing of Northwest Orient Airline Office 07/23/1952Egypt – Egyptian Revolution Celebrated 07/24/1987Switzerland – Air France Hijacking In Geneva Full Story and More Dates
President Bush came today to a national laboratory that is a direct descendant of the one where scientists pioneered the work that led to the development of the atomic bomb. There he declared that new technologies to detect anthrax, sniff biological attacks in buildings and help contain panic after an attack would help win “the…
To his family and friends, Sami Al-Arian, a Palestinian professor of computer engineering at the University of South Florida, is an innocent victim of a government witch hunt. News reports based on a lengthy F.B.I. inquiry into his support for Islamic causes prompted the college to suspend him from his tenured post last fall, and…
The judge overseeing Zacarias Moussaoui`s conspiracy case has not seen any evidence that Moussaoui is mentally incompetent, and yesterday rejected an attempt by his former attorneys and mental health experts to try to visit him in the Alexandria city jail. Full Story
Transportation Secretary Norman Mineta on Tuesday backed away from his usual guarantee to meet year-end deadlines to set up an all-federal security force for screening passengers and baggage at U.S. airports. Full Story
The U.S. Justice Department plans to announce criminal charges on Tuesday against five Philippine rebels who are linked to al Qaeda in connection with last month`s killing of a kidnapped American missionary, federal law enforcement officials said. Full Story
Transportation Secretary Norman Mineta said on Tuesday that his new security chief was exploring options to arm pilots with guns two months after the agency said it would not permit them in the cockpit. Full Story
In the latest sign the Pentagon is beefing up for future anti-terrorist raids, the Navy wants to build a floating base of operations to sail commandos around the globe. Full Story
Nearly 10 months after anthrax attacks caused chaos among health officials from Florida to New York, fewer than a third of the states have adopted laws to give governors and state health officials powers to respond to a bioterrorism attack or other public-health emergencies. Full Story
The Bush administration has abandoned hopes it can work with President Mohammad Khatami and his reformist allies in the Iranian government and is turning its attention to appealing directly to democracy supporters among the Iranian people, administration officials said. Full Story
A global crackdown on terror groups after Sept. 11 — and crucially the cutoff of international funding — forced the Tamil Tigers to declare a cease-fire and enter into negotiations earlier this year, the Sri Lankan Prime Minister Ranil Wickremesinghe told The Washington Times in an interview published Tuesday. Full Story
Representatives of the Peruvian government, political parties and social and religious groups signed a historic national accord Monday night in the capital Lima. The landmark agreement enshrines 29 key principles and is intended to guarantee governability in Peru, which has suffered greatly from political instability and violence in recent decades. Full Story
The death of Salah Shehade — the leader in Gaza of the Izzedine al Qassam, the military wing of the militant Islamic group Hamas — was confirmed by Hamas. Full Story
Greek authorities Tuesday declared victory over deadly November 17 guerrillas, saying they believe 10 arrested suspects were responsible for most of its attacks and that almost all of its weapons had been seized. Full Story
A series of shootings in Belfast, the Northern Ireland capital, on Sunday night left one man dead and two seriously wounded, illustrating how quickly the province`s sectarian divisions can turn violent. Full Story
Malaysian Prime Minister Mahathir Mohamad met visiting Iranian President Mohammad Khatami on Monday for talks ranging from the threat of terrorism to ways to project the Islamic world`s voice in global affairs. Full Story
Iran paid Argentina`s then-President Carlos Menem a $10 million bribe to cover up the Iranian role in the 1994 bombing of a Jewish community center in Buenos Aires, The New York Times reported on Monday, quoting a witness in the case. Full Story
Iran on Tuesday dismissed a report that accused Tehran of masterminding a deadly 1994 bombing of a Jewish center in Argentina, saying it was part of a conspiracy being promoted by supporters of Israel. Full Story
Colombia`s President-elect Alvaro Uribe said on Monday that President Hugo Chavez of Venezuela had pledged to help fight drug trafficking and back efforts to halt Colombia`s 38-year internal conflict. Full Story
Women occupying four oil pumping stations in the Niger Delta accused US giant ChevronTexaco of snubbing calls for talks and claimed a new spill had polluted nearby rivers. Full Story
The Sudanese government yesterday hailed an agreement signed with southern rebels as the start of “real peace” after 19 years of civil war, though opposition groups warned that it might not stick. Full Story
A security hole in the Hypertext Preprocessor (PHP) scripting language used on many Web servers could allow an attacker to execute code on affected systems or even take control of them, according to a security alert released today by The PHP Group. The vulnerability affects PHP 4.2.0 and 4.2.1 and comes as a result of…
Years after orders from the White House to beef up the security of the nation`s most important computer systems, the government is having trouble identifying which organizations should be involved and how they should be coordinated, according to a new report. Full Story
The US House of Representatives has approved a computer crime bill that would allow life sentences for hackers. However, the new legislation is unlikely to prove an effective deterrent to international computer crime, say experts. The bill is designed to combat malicious intrusions, denial of service attacks and computer terrorism. It would also extend the…
A government web site that listed the chief minister`s pledges to his people was hacked recently, not once but twice. The web site listed out in great detail Chandrababu Naidu`s vision of a better tomorrow and how he would improve living conditions in each constituency. Putting the chief minister`s promises on the web was a…
Creating a Good Housekeeping approval seal of sorts, the U.S. government is releasing standards and a software program that will help computer users configure their systems for maximum security against hackers and thieves. Full Story
Federal, state and local government officials are partnering with representatives from the private sector and the utilities community in a cyberterrorism exercise designed to identify the links between them in defending — and responding to — a cyberattack. Full Story
The man heading up the nation`s top research institute on counterterrorism and cyber security says corporate America is vulnerable to attack, and he wants to create a team reminiscent of the Manhattan Project to tackle the problem. Full Story
An attacker defaced a page on the U.S. Army Research Laboratory`s Web site Friday with a message criticizing the military organization for supplying weapons to Israel. The attacker, going by the handle Rivver, posted a long, profanity-laced tirade against the Unites States government and its stance in the Middle East, the military and India. The…
Lock pickers and safecrackers share with computer hackers a common fascination with exposing security “vulnerabilities.” The fraternity of security violators surfaced at a rare meeting of the U.S. computer underground in New York recently that drew 2,000 Internet enthusiasts and security professionals. Full Story
Since the beginning of 2002, all Swiss Internet service providers (ISPs) have been legally obliged to record the time, date, sender ID and receiver ID of all emails. While the information to be recorded does not include the content of emails, legal experts have expressed concern that the law poses an unnecessary threat to people`s…
The consensus baseline security settings for Windows 2000 make it possible for IT administrators to configure Windows 2000 workstations with a high level of security, although without the use of central group policies (such as those in Active Directory), this process could prove to be very time-consuming. Full Story
Biometrics, the security approach that relies on fingerprint, eye, voice or face recognition and pattern-matching, received a huge endorsement in the “National Strategy for Homeland Defense” report recently unveiled by President Bush. Meanwhile, a group of airlines, Silicon Valley high-tech firms, and San Jose airport officials reached a similar conclusion about the value of biometrics…
Wireless networks are full of holes that pranksters, criminals and terrorists can enter and break into personal information people keep on their computers. But home and business users can take steps that go a long way toward plugging security leaks. Full Story
HAMAS was born in late 1987 in the Gaza Strip. By 1988, it was already seen as the primary rival to the established PLO. It was at this time that the “Intifada” began to explode throughout the occupied territories, and HAMAS` message was made available to the masses. Founded on Islamic nationalism, this group inherently…
Information Warfare and Security by Dorothy Denning provides one of the most comprehensive overviews on information warfare ever written. Denning`s strength is in her expertise and comfort with the subject (she teaches a class on Information Warfare at Georgetown University) which she conveys to the reader chapter after chapter. A review in Dr. Dobbs Journal…
August 12-13, 2002 — Boston, MAParticipants will examine: * Terrorist Attack Profiles * Terrorist Training * Terrorist Tactics * Terrorist Targeting * Emerging Technologies * Threat of Cyberterrorism * Newest Aviation Security Threat Information This class led by nationally recognized terrorism experts. Participants will learn first hand about the current threats from both domestic and…
This Public Announcement is being issued to note that although the risk of renewed increased tensions between India and Pakistan cannot be ruled out, tensions have subsided. This Announcement further notes that authorized departure for U.S. Government personnel in non-emergency positions and all family members has been lifted, and those who departed in early June…
In light of the conviction and sentencing of four men charged with the kidnapping and murder of an American reporter and the ongoing concern for further terrorist actions against American citizens, the Department of State again reiterates its warning to American citizens to defer travel to Pakistan and strongly urges American citizens in the country…
This Public Announcement supersedes the February 15, 2002 Gabon and Republic of Congo Border Region Public Announcement to provide information on a suspected renewed Ebola outbreak. Full Story
This Public Announcement is being issued in light of the improving security and logistical situation in Madagascar and the State Department decision to lift the Ordered Departure of eligible family members and personnel in non-emergency positions. While the overall security situation has improved, concern about safety and security remains. Full Story
07/22/1968Israel, Italy, Algeria – El Al Flight Hijacked By PFLP 07/23/1985Denmark – Bombing of Northwest Orient Airline Office 07/23/1952Egypt – Egyptian Revolution Celebrated 07/24/1987Switzerland – Air France Hijacking In Geneva Full Story and More Dates
Allegations that a Jordanian-born man brought $12 million in fake cashier`s check into the United States are “disconcerting” and authorities are trying to determine the man`s potential links to al Qaeda, U.S. Homeland Security Director Tom Ridge said on Sunday. Full Story
The decision to screen a graphic documentary, 9/11, marking the first anniversary of the suicide hijackings on the US, has been defended by the BBC. Full Story
Post-Sept. 11 Air Patrols Have Responded to Bogus, as Well as Legitimate, Threats. Since Sept. 11, U.S. military fighter jets have responded to more than 400 domestic airline incidents requested by the FAA, and at times, the 24-hour combat air patrols were costing the U.S. Air Force up to $60 million a week. Full Story
President Bush`s homeland security plan achieved its first major victory in Congress last night as a special House committee signed off on legislation that would merge 22 federal agencies into a single department focused on the terrorist threat. Full Story
A former Taliban commander says Islamic militants led by al-Qaida want to strike quickly against American interests in Pakistan in retaliation for the death sentence in the Daniel Pearl murder case and the ongoing crackdown on Muslim extremists. Full Story
John Walker Lindh is ready to cooperate with terrorism investigators, as he promised to do in return for a lighter sentence, but he may have little information to give, his lawyer said Sunday. Full Story