Σελίδες

Συνολικές προβολές σελίδας

Κυριακή 27 Μαΐου 2012

FTC Names Internet Privacy Expert as Policy Advisor

By John Wagley
The Federal Trade Commission has hired privacy expert Paul Ohm as a senior policy advisor for consumer protection and competition issues affecting the Internet and mobile markets.
Ohm will begin his new position in August, taking a leave of absence from his current job as an associate professor at the University of Colorado Law School, according to a statement. He’ll work at the FTC’s Office of Policy Planning, which focuses on implementing long-term competition and consumer protection initiatives and advises staff on legal and policy issues.
“The FTC is the focal point for so many of the important information privacy debates taking place today,” Ohm said in the statement.
Ohm specializes in areas including information privacy, computer crime law, intellectual property, and criminal procedure. Much of Ohm’s work has focused on how evolving technology disrupts individual privacy. He has also been a trial attorney at the U.S. Department of Justice’s Computer Crime and Intellectual Property Section.
Ohm will be replacing Tim Wu, a Columbia University professor.

 http://www.securitymanagement.com/

SAIC Launches Inaugural Utah Cyber Defense Challenge and Symposium 2012

SAIC will lead a Utah statewide cyber competition and symposium designed to raise cyber awareness across government, academia, and industry; the Utah Cyber Defense Challenge and Symposium (UCDC) 2012, to be held 1 June
Utah launches its inaugural cyber defense challenge // Source: utahtech.org
Science Applications International Corporation (SAIC) announced a statewide cyber competition and symposium designed to raise cyber awareness across government, academia, and industry. The Utah Cyber Defense Challenge and Symposium (UCDC) 2012, to be held 1 June at the Little American Hotel - Salt Lake City, will include a live cyber competition comprised of college and high school students and professional teams, as well as a comprehensive symposium featuring renowned industry experts and thought leaders.
Rob Joyce, deputy director of the Information Assurance directorate at the National Security Agency, will deliver the keynote address and Charles Beard, SAIC senior vice president and chief information officer (CIO), will speak during the ‘Fortune 500 CIO’s Perspective’ session. The symposium will include an academic panel on the cyber workforce, featuring panelists from the University of Utah, Brigham Young University, and Utah State University. Additionally, Jeff Edwards, edcUtah president, will lead a panel of local CEOs and industry leaders on key cybersecurity trends and issues.
Governor Gary Herbert recognizes the importance of increased awareness and knowledge of cybersecurity trends, and the impact of cyber issues on Utah business. “Utah continues to grow in national prominence as a bastion for business and careers,” said Herbert. “With that growth is an ever greater need for stronger cyber defense, and Utah has an opportunity to help increase the nation’s supply of an educated cyber workforce. The UCDC enables us to raise awareness on how to defend against cyber criminal activity by establishing an open dialogue between industry experts, academic leaders and members of the Utah business community.”
The UCDC, organized by SAIC, edcUtah, the Utah Technical Council, the National Cybersecurity Alliance, and the Federal Business Council, Inc. (FBC), features a virtual qualification round in May and live finals in Salt Lake City on 1 June. The International Council of E-Commerce Consultants (EC-Council) is a challenge sponsor, offering the winning team automatic entry to the prestigious Global CyberLympics competition and a chance to compete against the brightest information security minds in the world.
The competition will be powered by SAIC’s CyberNEXS, a cyber training, certification, and exercise model helping participants build the skills necessary to become successful cybersecurity professionals and protect critical data assets. The qualification rounds test cyber defense skills including hardening systems against vulnerabilities, maintaining critical services, and timely and effective communications. The finals will consist of a six hour defense-oriented battle, where observers will see a live cyber exercise occur with access to a real time score board and subject matter experts will be on hand to describe the competition.
SAIC is thrilled to launch the inaugural Utah Cyber Defense Challenge and Symposium,” said Beard. “Cyber challenges like this enable valuable public-private collaboration across markets around a vital national security initiative, our future cyber workforce. It is imperative we provide hands-on competitions to keep our professionals sharp, trained, educated and energized to perform in the face of evolving threats.”

http://www.homelandsecuritynewswire.com/

Mobile security services, cloud top priority in business disaster planning

As the United States readies itself for the upcoming 2012 Hurricane Season, businesses and organizations have developed their business continuity and disaster recovery plans to include mobile security services in the effort of protecting their IT infrastructure
As the United States readies itself for the upcoming 2012 Hurricane Season, businesses and organizations have developed their business continuity and disaster recovery plans to include mobile security services in the effort of protecting their IT infrastructure.
A recent study by AT&T found that:
  • 83 percent of executives indicated that the planning and implementation of a business continuity plan as being a priority for their businesses and organizations — a 12 percent increase over last year’s national survey.
  • Six out of ten (60 percent) invest in mobile security services with the majority (69 percent) indicating potential security breaches as the most pressing concern.
  • 38 percent expressed making investments in cloud computing while another 34 percent expressed investing in mobile applications.
  • 86 percent already have a business continuity plan in place in the event of a disaster or threat — up 8 percent over the past five years.
The results for the latest AT&T annual business continuity study shed light on several trends regarding how businesses are preparing themselves for potential disasters and threats. AT&T says it has conducted this study for more than ten consecutive years, surveying IT executives from companies in the United States with at least $25 million in annual revenue to measure the national pulse on business continuity planning.
2012 AT&T Business Continuity Study key findings:
The complexities of maintaining mobility and wireless capabilities during the event of a disaster or security threat has become an increasing aspect of importance for businesses as they consider business continuity planning.
  • 67 percent (two-thirds) of executives surveyed have included wireless network capabilities as part of their business continuity plans.
  • 52 percent of IT executives surveyed anticipated the spending for mobile security services to increase.
  • Cloud computing is becoming a critical element of Business Continuity plans based on security, performance and cost savings benefits.
  • Most companies (65 percent) will be investing in new telecommunications technologies to support their IT infrastructures.
The prevalence of social networking capabilities and mobile networks/devices in the workplace remain a concern for IT executives as they look to minimize the impact of security threats.
  • The majority of executives (87%) have become more concerned about the increased use and potential threats of mobile networks and devices than social networking capabilities (76 percent).
  • 88 percent of companies surveyed have taken a proactive approach to securing their IT infrastructure.
  • Two-thirds (67 percent) of IT executives indicate that their business continuity plan accommodates the possibility of a “virtual event” such as a potential security breach.
With business continuity plans in place, businesses and organizations are testing and preparing themselves for potential IT threats and disasters.
  • Roughly two-thirds (63 percent) of companies have had their business continuity plans fully tested in the past year.
  • Seven out of ten (71 percent) companies implement specific protective actions when the state or federal government issues an alert for an impending disaster.
  • 87 percent of companies have implemented the necessary arrangements for communicating with key executives during a natural disaster.
There’s certainly no shortage of potential threats or disasters around the world and it’s evident that executives are taking the necessary measures to ensure their business continuity plans are in place and actionable,” said Chris Costello, assistant vice president, Offer Management, Cloud Services. We’ve seen a strong emphasis on IT security and continued growth in areas of cloud and mobile applications; implying that companies are embracing the tools and services needed to continue operational activities despite potential threats and disasters.”

 http://www.homelandsecuritynewswire.com/

Russia Orders WMD-Resistant Infant Carriers

The Russian Federal Security Service has called for production of over 100 special carriers intended to safeguard infant children of high-level government personnel in the event of a chemical, biological or nuclear strike, Russia Today reported on Thursday (see GSN, March 29).
The carriers are constructed from a unique dispersion substance and are designed to prevent occupants from being exposed to radiological materials, airborne pathogens and potentially harmful chemicals. The units could provide protection in heat levels ranging between -22 and 104 degrees Fahrenheit, provided that the surrounding atmosphere contains no less than 18 percent oxygen, according to the newspaper Izvestia.
The $60,000 carriers could remain effective for as long as a quarter of a day. They are built for children no more than 18 months old, but could also accommodate small animals (Russia Today, May 24).

 http://www.nti.org/gsn/

Παρασκευή 25 Μαΐου 2012

A spy by luck: the case file on CIA's Jeanne Tisinger

By Pam Benson
You don't really expect to simply fall into the spy business, but for Jeanne Tisinger, that's pretty much how it happened.
She was a business major at George Mason University, looking for some experience in her field while continuing her studies. She joined the college's work-study program and, much to her amazement, her first interview was with the Central Intelligence Agency.
"I was surprised they were even hiring co-op students," she says. "Why would they want a college kid to come into their version of campus? I wasn't sure what they were going to do with me. Then there was, of course, a part of me that was. wow, the mystique of the CIA - what better place to start. It was just kind of a bit of a wide-eyed wonder."
That was nearly three decades ago.
"I'm the classic story of sometimes it's better to be lucky than good," Tisinger says.

She's still with the agency, rising through the ranks to become the CIA's first female chief information officer nearly two years ago. Her job is to oversee the CIA's vital information technology systems and coordinate information-sharing.
Managing IT may not be a traditional spy role, but don't say that to Tisinger. She pushes back on the notion that she's not a spook.
"My DNA is shaped as an intel officer first. So I actually don't see myself as a business major or a technologist, or I should say I don't define myself that way. I see myself as an intel officer. All of us are here to support the intel mission."
Even becoming a CIA technologist had a bit of luck involved. In the mid '80s, personal computers were hardly common place at work or home, but Tisinger was given an assignment to develop a workforce handbook, and one of her tools was this new piece of technology.
"They gave me this PC, I liked it, I was good at it and by the way (there was) no one else around me - there weren't a whole lot of people to compete against in that field."
Being in the right place at the right time led Tisinger down a new career path. "It's good to get in first, to get in early," she says.
It was a growth business with lots of opportunities for a technically proficient officer.
But it was also a male-dominated field.
Women were in a minority and as Tisinger looks back on the early days, she says the environment wasn't as friendly.
"I sometimes felt that there was a sense by some of my bosses that I was only here temporarily rather than in it for the long run."
She tells the story of an incident that occurred after she took her first leadership position.
"I was the chief and I think there was one other woman and, I think, probably five or six men that were on the program. They were all these big, tall guys, way over six feet. I'm like five-two. We were doing a program management review with this particular commercial company and we were in the company's space," she remembers.
"There's a big long conference table. The government (staff) comes walking in and the men are all sitting at the table and I come sit down. And the vendor program manager of the company was just addressing the men of the audience. I'm like, 'Hello, I would be the chief.'"
The lesson Tisinger learned from the incident: "Sometimes you have to assert yourself in more obvious and direct ways."
The CIA had two separate IT systems, one to support overseas posts and another to handle technology for the Washington metro area. In 2000, Tisinger was asked to participate on the team tasked with joining the systems.
"We needed to create one organization and one global network, and basically (create) a mesh community of technology providers that support everyone across the globe."
That meant battling an internal culture, especially among the overseas contingent that liked being separate.
Now that she is the CIO - a position she assumed in July 2010 - Tisinger will use that experience to help out the overall intelligence community.
The spy agencies are not immune to the budget constraints facing the U.S. government as it tries to dig itself out of massive deficits.
Director of National Intelligence James Clapper said last fall he expects to make significant savings by integrating the community's IT infrastructure. Most of the 16 members of the intelligence community have separate systems.
Tisinger says the intelligence community has vast amounts of data to analyze, and integrating systems will make it easier for the collectors and the analysts to connect with their counterparts.
"It's about lowering the barriers for collaboration and knowledge across the (intelligence community). If you can unify the underlying foundation, that will help."
Tisinger says the CIA will be the principle provider for key portions of the new IT infrastructure.
"Collaborative to a point, and then I make a decision" is the way Tisinger describes her management style. "You can't study it to death. You have to set a direction, approve a plan, execute and adjust."
Tisinger also tries to focus her time on the most important issues not necessarily the most urgent.
"You can't get caught up in the tyranny of the inbox. If you only focus your personal time on the urgent, you'll be a gerbil in a cage. You've got to be able to lift your head up, look out a couple of years and say what are the most important things we need to get done."
Has she ever thought of leaving the organization she never expected to join in the first place? Tisinger says there were a couple of times she considered going to private industry, but didn't.
The September 11, 2001, terrorist attacks on the United States became a defining moment for her.
"As I think about my job, as a CIO, it's all about the information we can bring to bear. I can directly tie what I do, what my people do, to keeping this country safe and keeping my family safe," Tisinger says.
"I believe we have a very noble purpose and I find that very motivational. It is something that I genuinely feel, and that is the kind of tugging at the heartstrings of my workforce to make them feel such a critical part of the intelligence mission. It's a good career."


 http://edition.cnn.com/

Denver FBI Warns of Jihadist Wildfire Threat

By Matthew Harwood

The Denver Field Office of the Federal Bureau of Investigation (FBI) has warned Colorado and Wyoming law enforcement of the potential threat that jihadists could start wildfires as a form of terrorist attack.
The situational information report (.pdf), dated May 7, references an article in the winter issue of Inspire, a jihadist webzine produced by al Qaeda in the Arabian Peninsula (AQAP). The terrorist organization, an al Qaeda affiliate, has been called the most significant terrorist threat facing the United States by American national security officials, most recently FBI Director Robert Mueller.
AQAP has taken credit for the underwear bomb plot on Christmas Day 2009 as well as the cartridge bomb plot of October 2010. In early May, The New York Times reported that a suicide bomber dispatched by the Yemen-based terrorist organization to attack an American airliner with an upgraded underwear bomb was actually a Saudi double agent. The agent was able to provide the bomb and intelligence information regarding AQAP leaders and operatives, locations, and tradecraft to allied intelligence organizations, including the Central Intelligence Agency.
The attack method advertised in Inspire, however, is cruder than these previous plots and targeted for would-be jihadists without sophisticated technical know-how.
“There is a portion of the magazine dedicated to attacking the United States by wildfires,” the FBI report explains.“The article instructs the audience to look for two necessary factors for a successful wildfire, which are dryness and high winds to help spread the fire.” The report was distributed to the FBI’s Denver Division and the Bureau’s intranet; the Colorado Information Analysis Center, a DHS-recognized fusion center; and Wyoming law enforcement. (The full report, which was posted Tuesday, can be accessed at Public Intelligence, a website which posts government and corporate documents considered in the public interest.)
Within the article, “It Is of Your Freedom to Ignite a Firebomb,” referenced by the FBI report, the author, the AQ Chef, notes that natural wildfires are incredibly destructive to property and valuable forest while also overwhelming first responders to the point where casualties occur. The article goes on to argue that under the right conditions, jihadis could detonate an “ember bomb” that could lead to wildfires that spread faster and cause greater amounts of destruction. Bomb instructions follow. The article also provides would-be jihadis with a map of the United States highlighting the country’s most vulnerable areas to attack.
Throughout issue after issue of Inspire, AQAP has called on jihadists within America to carry out small, less sophisticated attacks, individually if need be.
The original creator, editor, and publisher of Inspire, Samir Khan, a native of North Carolina, was killed during a drone strike in Yemen. The target of the strike was Anwar al-Awlaki, another American citizen whom the Obama administration accused of being an operational asset of the AQAP as well as its chief propagandist.

 http://www.securitymanagement.com/

Call For Coast Guard Audit Of Chemical Security Program Prompts Doubts

By Douglas P. Guarino

– Industry officials and environmental activists are expressing skepticism over a House Republican proposal to have the U.S. Coast Guard look for opportunities to improve the Homeland Security Department’s beleaguered chemical security program (see GSN, May 9).
The Chemical Facility Antiterrorism Standards program is administered by Homeland Security’s National Protection and Programs Directorate. It is separate from the Coast Guard, a DHS branch that focuses its chemical security efforts on potentially hazardous facilities located on navigable bodies of water.
Inland chemical plants covered by the CFATS program must submit plans for dealing with 18 areas of risk including physical protections, control of access, materials security, insider attacks and computer infiltration. The measures are aimed at preventing accidents and acts of sabotage that could cause the release of deadly chemicals into the area surrounding such facilities.
As of Jan. 6, the program covered more than 4,000 high-risk sites. House Republicans have been highly critical of the effort, however, since an internal DHS memo publicized earlier this year indicated the program has been plagued by a litany of management issues, including a failure by department personnel to conduct facility inspections and complete reviews of security plans.
Consequently, the GOP-controlled House Appropriations Committee recently recommended slashing funds for the program in fiscal 2013. The panel on May 16 approved legislation that recommends only $45.4 million for the chemical security program in fiscal 2013, which is $29.1 million less than the Obama administration is requesting and $47.9 million below what Congress appropriated for the present budget year.
The legislative report accompanying the bill says it “is the committee’s understanding that even with … changes that are currently being implemented, it will still be more than a year before the CFATS regulatory process authorizes, approves and inspects even a single facility of the over 4,500 facilities that are part of the program.”
In the report, the committee called for the “undersecretary for NPPD, in conjunction with the commandant of the Coast Guard, to undertake a critical review of the department’s implementation of the CFATS program.” It suggests that the Coast Guard’s experience implementing its own security programs at seaside chemical facilities could be helpful to CFATS.
“In comparison to the CFATS program, the Coast Guard successfully implemented a regulatory review and compliance program for all port facilities including chemical facilities, as required by the Maritime Transportation Security Act of 2002,” the committee report says. “In less than two years after enactment of that act, vessels and port facilities had conducted vulnerability assessments and developed security plans to include: passenger, vehicle, and baggage screening procedures; security patrols; restricted areas; personnel identification procedures; access control measures; and/or installation of surveillance equipment.”
The committee asked that the collaborative report address a number of questions including whether the CFATS program can “inspect facilities in a timely manner” and whether “there are alternatives that are less onerous than the requirements currently required under CFATS.”
Bill Allmond, vice president of government affairs for the Society of Chemical Manufactures and Affiliates, told Global Security Newswire that he is skeptical of the Coast Guard’s ability to conduct a review of the CFATS program. He said the two programs are “very different”; while the CFATS program requires facilities to comply with specific, universal regulations, the Coast Guard takes a more case-by-case approach, with security plans drafted by facilities and approved at the discretion of regional agency officials, creating what Allmond said is “very little consistency” from one facility to the next.
He argued that the CFATS program and the maritime security regime run by the Coast Guard, while each appropriate for their given uses, are not interchangeable.
In addition, Rick Hind, legislative director for Greenpeace, said that while the Coast Guard has a far better record for conducting facility inspections than the CFATS program, it does not set standards and is thus not sufficiently prescriptive regarding improvements that would be needed at chemical sites. Hind called efforts to incorporate the Coast Guard’s approach into the CFATS program a “false solution” to the initiative’s problems.
Allmond also criticized efforts in the House to justify the proposed deep budget cuts to the CFATS program by pointing to the implementation problems. “The House seems to want to have it both ways,” Allmond said. “They provide no regulatory certainty by authorizing the program year-by-year rather than passing permanent legislation then criticize the program for not carrying out implementation.”
Legislation the Democrat-controlled Senate Appropriations Committee approved this week recommends $86.4 million for the program, which is roughly $6.8 million below what Congress provided for fiscal 2012 but $11.9 million more than what the Obama administration has requested for fiscal 2013. Even the cuts proposed by the administration are “too deep to ensure change for the better can be completed,” the Senate committee said in its report.
The Senate Appropriations Committee’s approach to the CFATS program is “more reasonable,” Allmond said, but added that neither strategies are likely to be adopted into law given the likelihood that Congress will pass a continuing budget resolution rather than individual spending bills.
In a statement to GSN, Representative Robert Anderholt (R-Ala.), chairman of the House Appropriations Homeland Security Subcommittee, defended the proposed cut to the program, saying that at the time of the panel's oversight hearings, lawmakers "received very little from the department in the way of establishing milestones and a timeline associated with a corrective plan for the program." He said, however, that in recent weeks the committee had received some additional information and that the Government Accountability Office is expected to release a "full review" of the program this summer.
"I'm currently reviewing the new information the Ddpartment submitted and will evaluate the program's funding level again at conference time" with the Senate, Anderholt said.
Spokespeople for the Homeland Security Department and the Senate Appropriations Committee did not respond to requests for comment by press time.
Brian McKenna, spokesman for the American Chemistry Council – another industry group – told GSN that his organization would not take a position on whether the House or the Senate’s approach to the CFATS program is preferable. However, as “Congress looks for guidance in programs at other agencies, including the Coast Guard, we encourage lawmakers to also consider leveraging private-sector programs to help improve the overall efficiency of the CFATS program,” McKenna said in a prepared statement.
Similarly, the House Appropriations Committee in its report called for a DHS report “on how the CFATS program is addressing the use of alternative security programs established by private sector entities in the implementation of the CFATS program.
The law that authorizes the CFATS program allows the Homeland Security Secretary to “approve alternative security programs established by private sector entities, federal, state, or local authorities, or other applicable laws, if the secretary determines that the requirements of such programs meet the requirements” of the CFATS law and regulations.
“In light of estimates that it may be seven years before all facilities have an approved site security plan and are inspected, NPPD must look at alternative methods to address the massive backlog of unapproved site security programs,” the House report says. “While alternative site security programs may not be advisable for high-risk facilities, the committee believes that in many cases the use of alternative programs may be an efficient and effective method to reduce the backlog currently in existence.”
A coalition of more than 100 labor and environmental groups charge that the CFATS regulations already give industry too much leeway, however. The so-called “blue-green” alliance has been lobbying the Obama administration in recent years to allow the Environmental Protection Agency to use its authority under the Clean Air Act to craft more stringent chemical security regulations. Activists and some Democratic lawmakers argue a recent National Research Council report on a fatal 2008 explosion at a West Virginia chemical plant supports this position (see GSN, May 15).
“Given the continuing gridlock in Congress, we are writing to urge you to take executive action to ensure that high-risk chemical facilities fulfill their obligation under the Clean Air Act to prevent the catastrophic release of extremely hazardous chemicals,” the coalition says in its latest letter to President Obama on the issue.
The May 16 letter notes that Bush-era EPA Administrator Christine Todd Whitman and the National Environmental Justice Advisory Council – a federal advisory panel that makes recommendations on issues expected to disproportionately impact low-income and minority communities -- both recently adopted this position (see GSN, April 4).

 http://www.nti.org/gsn/

Higher-level traces of uranium found in Iran

By Joe Sterling
Inspectors found a high level of enriched uranium in Iran, a U.N. report said Friday, as world powers attempt to work to stop the country from developing the capacity for nuclear weapons.
The U.N.'s International Atomic Energy Agency asked Iran this month to explain the presence of particles of enrichment levels of up to 27%, found in an analysis of environmental samples taken in February at the Fordo fuel enrichment plant near the city of Qom.
The previous highest level had been 20%, typically used for hospital isotopes and research reactors, but is also seen as a shortcut toward the 90% enrichment required to build nuclear weapons.
Iran said in response that the production of such particles "above the target value" may happen for "technical reasons beyond the operator's control." The IAEA said it is "assessing Iran's explanation and has requested further details."

This development comes a day after Iran held nuclear talks in Baghdad with six nations: the United States, Britain, France, Russia, China and Germany. There had been no breakthrough in discussions.
Iran rejected calls to stop the high enrichment of uranium that can be used for weapons, while the international powers refused Tehran's demand for an immediate end to sanctions crippling its economy.
But the nations plan to meet next month in Moscow for another round of talks.
World powers suspect that Iran wants to build nuclear weapons, and they want to stop the nation from doing so. Iran says its atomic aspirations are for peaceful purposes.
The talks come at a crucial time for Iran. Its economy has been crippled by sanctions imposed by the United Nations, the United States and the European Union. Because 80% of Iran's foreign revenues are derived from oil exports, an embargo by the EU set to go into effect in July will put further pressure on its economy.
Iran threatened this year to close the Strait of Hormuz, a vital oil shipping lane, if sanctions were imposed on its exports of crude oil. Israel, which is believed to have its own nuclear arsenal and is alarmed over Tehran's hostility toward the Jewish state, has said it may attack Iran to try to stop the country from developing nuclear weapons.
European Union foreign policy chief Catherine Ashton said "significant differences remain." But the resolve to continue talks may signal a change in tone, coming after past negotiations that have been marred by threats and allegations of foot-dragging and unreasonable demands.
The world powers made Iran an offer for stopping its processing of medium-enriched uranium, which can be used to make nuclear weapons, EU officials said.
The proposal also called for Tehran to prove that its nuclear program is being used for peaceful purposes as it claims and comply with U.N. Security Council resolutions, according to a Western official, who spoke on condition of anonymity because of the sensitivity of the discussions.
Asked whether relief from the tough Western sanctions imposed on Iran will be on the table, the same Western official said, "There is no expectation it will happen as a result of this meeting. Iran would need to take significant concrete action first."
Iran's counter-proposal included five areas of nuclear and non-nuclear cooperation, Iran's state-run Islamic Republic News Agency reported late Wednesday.
A British Foreign Office spokesman said world powers are offering support for Iranian economic and agricultural development and the country's civilian nuclear program in exchange for cooperation.
Another idea on the table is an updated version of an offer to swap enriched uranium for nuclear fuel, EU officials said. There had been a proposal to swap most of Iran's low-enriched uranium for fuel rods to power a medical research reactor in Tehran.
Analysts say the change in mood at the negotiating table is positive, but there are mixed feelings about whether a breakthrough can be achieved.
Trita Parsi, president of the National Iranian American Council, commended the participants for returning to talks. He said they "didn't give up just because they ran in a stumbling block."
"A feasible solution is to match tangible, verifiable Iranian concessions with a delay of the impending European Union oil embargo," Parsi said. "This would add time to the negotiation clock and buy both sides some breathing space."
Parsi said the Obama administration has mustered political will "to exhaust all options" before the only choice left is military. He notes that negotiations between adversaries in other instances have been painstakingly long, citing the U.S. and Vietnam talks and the negotiations to end conflict in Northern Ireland.
There will be stalemates and steps forward and backward, he said.
"What happened in Baghdad may have somewhat calculated in the sense that there was an awareness that there is enough time for an additional meeting (in Moscow) before European and American sanctions kick in on July 1," he said.
But David Albright, founder and president of the Institute for Science and International Security, a group devoted to stopping the spread of nuclear weapons, said, "the clock is not very friendly at the moment" with a nervous Israel in the backdrop and a high-stakes political atmosphere with the Obama administration facing "aggressive Republicans" in an election year.
"Obama doesn't have years and years," he said. "He has weeks and weeks."
Albright said the Baghdad talks didn't "completely collapse," and the "success of this is that there's another meeting."
But "they need results," he said.
There didn't appear to be the minimal "progress on concrete results" that the United States wanted, such as creating a forum to begin discussing an agreement on enrichment levels. Albright said the sides need to start forging a series of small concessions and incentives before they go to larger steps.
Matthew Kroenig, a nuclear security expert at the Council on Foreign Relations, said he believes that "good will" can go only so far and that "room for compromise" will continue to be difficult. He believes that making a "military threat more credible" could help pressure Iran.
He said both sides have an incentive to keep talks going and to keep the impression that the discussions are "fruitful." He said the White House is afraid that if negotiations break down, Israel "will take matters into its own hands," and the United States could be dragged into unwanted war. Iran wants to engage in what are perceived to be a "fruitful" talks to buy time and avoid Israeli action.
"I'm afraid it's really hard for me to see a diplomatic solution to this," Kroenig said.
Dina Esfandiary, an analyst at the International Institute for Strategic Studies, called the "willingness to continue talks" and understand each other's stance "noteworthy."
"Prior Western concessions on location and time were intended to show their good will, something that has been repeated in choosing Moscow (more sympathetic to Iran's stance) for next month's talks," she said.
She said the talks helped the sides understand which "concessions were wanted and which were unlikely to be granted."
"Whether the talks accomplished anything depends on the goals: If the idea was to walk out with an agreement solving the Iranian nuclear crisis, then no, they haven't accomplished that. But everyone agrees that that was highly unlikely. If the idea was to continue and strengthen confidence-building and the negotiations that began a month ago in Istanbul, then Baghdad was a success," she said.
At present, she said, expectations on each side don't match because "Iran wants recognition of its right to enrich" which other nations have only "hinted at accepting only if Iran proves the peaceful nature of its program first, and this has yet to be resolved."
"Iran is as suspicious of Western intentions as the West is of Iranian tensions. Neither side feels as though compromising more than they have already offered to will serve their interests. The real breakthrough will come when each side feels they have more to gain by compromise than by standing their ground," she said.
She said the success of the Moscow talks will depend world powers' willingness to accept some form of Iranian enrichment.
"This is something Iran has been categorical about. But Iran will also have to take steps to prove the peacefulness of its program and restore what (U.S. Secretary of State) Hillary Clinton has described as 'the confidence of the international community,' to the extent where the international community would feel comfortable allowing them to enrich."
One scenario she cited is a "freeze-for-freeze" system.
"Iranians must be willing to discuss relinquishing progress on their nuclear program if they want the West to consider delaying and possibly lifting sanctions. But it is hard to tell what Iran will do. Of course, an ideal outcome would be for both sides to come prepared to make concessions in order to come to a lasting agreement that addresses the problem, but this is unlikely to happen. Even if Iran's negotiating team agrees to certain terms, they will have to have it approved back home."
Esfandiary doubts Iran would agree to suspend 20% enrichment "even for a short period of time and won't agree to forgo it completely."
But she said that "exploiting the slightest chance of a temporary halt and framing the negotiations in terms of a step-by-step approach, beginning with a series of confidence-building measures from both sides, will enable the P5+1 to judge Iran's willingness to conduct serious negotiations. As with everyone else, I am hopeful but doubtful that Iran would accept such conditions."
The United States, France, Russia, China, Britain and Germany are called the P5+1, a reference to Germany plus the other nations, permanent members of the U.N. Security Council. Another name for the group is the E3+3, a reference to the European countries of Germany, France and Britain, and the others.
The French foreign ministry on Friday echoed the concerns and resolve of the world powers, saying they presented a "package of concrete measures to build confidence that the Iranian nuclear program is exclusively for civilian purposes.
"Iran must then be in a position to respond constructively to our proposals so that a genuine negotiation process leading to concrete results can be initiated. Failing this, we shall be prompted to take new measures, in line with the two-pronged approach combining openness to dialogue and sanctions."

 http://edition.cnn.com/

Τετάρτη 23 Μαΐου 2012

World Eliminates 74 Percent of Known Chemical Arms

Member states to an international disarmament accord by the end of April had eliminated 73.6 percent of their disclosed chemical warfare stocks, the head of the Organization for the Prohibition of Chemical Weapons said on Tuesday (see GSN, May 21).
As of April 29 -- the 15th anniversary of the Chemical Weapons Convention's entry into force and the final date permitted for full disposal of member states' chemical arsenals -- "about 51,128 [metric tons], or 73.64 percent, of Category 1 chemical weapons had been destroyed under verification by the [OPCW] Secretariat," Director General Ahmet Üzümcü said in prepared remarks to the 15th Chemical Weapons Demilitarization Conference in the United Kingdom (see GSN, April 30). Category 1 weapons contain materials such as nerve or blister agents that have little if any nonmilitary purpose.
Albania, India and an additional CWC signatory nation have fully eliminated their chemical-weapon stockpiles, Üzümcü noted (see GSN, Oct. 17, 2008). The third nation, while never officially confirmed, is widely known to be South Korea.
Libya, Russia and the United States are continuing work to finish off their chemical stocks.
The United States as of the April cutoff date had eliminated 24,923.7 metric tons -- or 89.8 percent -- of its declared chemical warfare assets, he said, noting the country expects to dispose of the remaining material by September 2023.
Russia by April 29 had eliminated 24,961 metric tons of chemical warfare materials, or 62.5 percent of its arsenal. Full elimination of the initial 40,000-metric-ton stockpile is scheduled to be complete by December 2015 (Organization for the Prohibition of Chemical Weapons release I, May 22).
The chemical disarmament gathering in Glasgow was the 15th and last of its kind, according to an OPCW press release. It included in excess of 170 participants from 16 nations (Organization for the Prohibition of Chemical Weapons release II, May 22).

http://www.nti.org/gsn/

U.S. senators: Al Qaeda calls for 'electronic jihad'

An al Qaeda video calling for "electronic jihad" illustrates the urgent need for cybersecurity standards for the most critical networks in the United States, a group of senators said.
"Internet piracy is an important field of jihad," the narrator of the video says, according to a translation. He advises followers with expertise to "target the websites and information systems of big companies and government agencies of the countries that attack Muslims."
The video calls for cyberattacks against networks such as the electric grid and compares vulnerabilities in the United States' critical cyber networks to the vulnerabilities in the country's aviation system before 9/11, according to a statement Tuesday from the Senate Committee on Homeland Security and Governmental Affairs.
"This is the clearest evidence we've seen that Al Qaeda and other terrorist groups want to attack the cyber systems of our critical infrastructure," committee chairman Joe Lieberman, a Connecticut independent, said in the statement. "Congress needs to act now to protect the American public from a possible devastating attack on our electric grid, water delivery systems or financial networks, for example."
The race to stop al Qaeda
Penetrating al Qaeda's most dangerous
Ranking committee member Susan Collins, R-Maine, said al Qaeda realizes that a cyberattack on critical infrastructure might cause more harm than a traditional physical attack.
"That is why the Senate needs to act on our bipartisan Cybersecurity Act that requires minimum security performance requirements for key critical infrastructure cyber networks," she said in the committee statement.
The Department of Homeland Security has received more than 50,000 reports of cyber intrusions or attempted intrusions since October 2011, an increase of 10,000 reports over the same period the previous year, the statement said.
The Senate committee said the video, made by al Qaeda's media outlet, was obtained by the FBI.

http://edition.cnn.com/

DOD Pledges Action Against Suspect Electronics

A planned U.S. Defense Department initiative would bolster efforts to prevent armed forces hardware from incorporating off-brand components from China, the Washington Times reported on Tuesday (see GSN, Nov. 10, 2011; Kristina Wong, Washington Times, May 23).
The defense contractor Honeywell in September 2010 turned up indications that memory electronics acquired for the U.S. Terminal High-Altitude Area Defense program had been "used and refurbished," the Senate Armed Services Committee said in a report issued on Monday.
"By the time the problem was discovered, suspect counterfeit devices had already been installed and delivered in 50 THAAD mission computers," and a system trial launch of the ballistic missile defense system had included one of the control units, the report states.
Elimination of the problematic parts as of last October had required $2.6 million in expenditures by Honeywell and chief THAAD contractor Lockheed Martin, according to the panel, which last year said hardware for the system and other U.S. defense technologies could include illicit Chinese components
"If the devices had failed, the THAAD missile itself would likely have failed," Senate investigators quoted the Missile Defense Agency as saying (U.S. Senate Armed Services Committee report, May 21).
Defense Department spokesman George Little on Tuesday said the Pentagon is "working very hard to try to sort this issue out, and take steps to further strengthen our supply chain." In a related move, the department in March finalized instructions aimed at laying the groundwork for a formal initiative to target illicit defense components.
Bolstering transparency mandates for companies hired by the government is the goal of a collaborative effort by the White House and Pentagon, he added.
Though the department has learned of no fatalities or significant harm resulting from illicit system components, “that doesn’t mean we should stop addressing the issue,” Little said.

 http://www.nti.org/gsn/

Δευτέρα 21 Μαΐου 2012

Huge suicide blast kills more than 100 troops in Yemen

A suicide bomber dressed in a military uniform set off a blast that killed more than 100 soldiers Monday, authorities said, in what appears to be the deadliest attack ever on troops in Yemen.
It left at least 101 dead and more than 220 injured, with some in critical condition, authorities said.
"The war on terror will continue until it is completely destroyed regardless of the sacrifices," President Abdrabuh Mansur Hadi said in a statement carried by state news agency Saba.
More than an hour after the attack, there were still bodies at the blood-spattered scene, and some ambulances responding to the blast took six or seven victims each, an official said.
"We heard a massive explosion. Minutes later, there were so many emergency vehicles, it seems as if hundreds were injured," said resident Ali al-Husseini, who was near the attack.
A Yemeni official in Washington said it was too early to know who was responsible but that suicide attacks are "the hallmark of al Qaeda."
The partially lawless Middle Eastern country has become a central battleground in the fight against al Qaeda, with the terror network's leader calling recently for an uprising against the new president.
The Yemeni branch of the group calls itself al Qaeda in the Arabian Peninsula.
Monday's blast targeted a military parade rehearsal in Sabeen Square in the capital Sanaa, said Mohammed Albasha, a spokesman the Yemeni Embassy in Washington.
The attack took place about 200 meters (218 yards) from the presidential palace. No one immediately claimed responsibility.
The country's defense minister, Mohammed Nasser Ahmed, and military chief of staff Ahmed al-Ashwal were in the area but far from the site of the attack itself, and were unharmed, officials said.
The president fired top security officials, including a nephew of the former president, after the attack.
Gen. Ammar Saleh was sacked as director of the National Security Bureau, said a Yemeni official who is not authorized to speak to the media. He is being replaced by Maj. Gen. Mohammed Jameh al-Khadar.
Saleh may keep a second and more important post as first deputy for national security.
The head of central security, Abdul Malik al-Tayyeb, was fired by presidential decree after the attack. He is being replaced by Fadhl al-Qosi.
The soldiers were preparing for Tuesday's National Day of Unification ceremonies when they were attacked.
The day celebrates the union of South Yemen and North Yemen on May 22, 1990, to form Yemen.
U.N. Secretary-General Ban Ki-moon condemned the attack and called for the perpetrators to be held accountable.
"The secretary-general calls on all in Yemen to reject the use of violence in all its forms and manifestations, and expects them (to) play a full and constructive role in implementing Yemen's political Transition Agreement," a statement from his office said.
Abdul Latif al-Zayani, secretary general of the Gulf Cooperation Council, called Hadi to express condolences, Saba reported.
"Al-Zayani stressed that the GCC States will spare no effort to back Yemen in order to achieve the desired stability and development," Saba said.
Monday's attack came a day after three American contractors working with Yemen's coast guard were wounded in a shooting in the port city of Hodeida, two local security officials said.
One person has been arrested in the attack, the sources said.
Last week, al Qaeda's leader called for the Yemeni people to rise up against the country's new president, portraying him as the stooge of the unpopular former president, Ali Abdullah Saleh, and the United States.
"So, Ali Abdallah Saleh is gone, and his successor Abed Rabbo Mansour Hadi has taken over," al Qaeda's chief commander Ayman al-Zawahiri said in a video posted on jihadist forums.
Saleh, who led Yemen for 30 years, relinquished power last year after an extended popular uprising in a transition agreement that was supported by the United States. Hadi was Saleh's vice president, and al Qaeda has exploited the connection to stir resentment against the new government.
Last year, Ansaar al-Sharia, an offshoot of al Qaeda, took over the majority of districts in the southern Abyan province, benefiting from the political turmoil in the country. Numerous military bases were evacuated, making it easier for the militant groups to grow in power and territory.
On Sunday, fierce clashes between government troops and al Qaeda fighters left 21 people dead, two local security officials said.
The officials said the violence erupted when hundreds of troops attempted to sweep through areas around the district of Jaar, the main stronghold for al Qaeda in Abyan province.
Al Qaeda fighters fought back, kicking off clashes that continued for nine hours, the officials said. Fourteen militants and seven troops were killed in the fighting, they said.
Government forces have been battling fighters loyal to the local branch of al Qaeda for more than a year, but not made lasting headway.
The United States has carried out dozens of drone strikes against militants in Yemen, including the radical American-born cleric Anwar al-Awlaki, who was killed in September.
U.S. officials said last month they had foiled a plot to bring down a U.S.-bound aircraft with a device that originated in Yemen.
The plot was brought to authorities' attention by a mole who infiltrated al Qaeda, a source in the region told CNN.
The mole works for Saudi intelligence, which has cooperated with the CIA for years, the source said.
Information from the mole also led to a drone strike this month that killed Fahd al Quso, 37, whom the U.S. considered a senior operative of al Qaeda in the Arabian Peninsula.

 http://edition.cnn.com/

Supreme Court to review government's foreign surveillance program

y Bill Mears
The Supreme Court said Monday that it will tackle a major national security and privacy dispute involving the government's little-known foreign surveillance program.
The justices announced they would hear an appeal from the American Civil Liberties Union, representing a coalition of "United States persons" - attorneys, journalists and labor, legal, media and human rights organizations.
Oral arguments will be heard this fall.
The larger issue involves the constitutionality of the federal government's electronic monitoring of targeted foreign people. A federal appeals court said the domestic plaintiffs who deal with overseas clients and co-workers reasonably feared the government was reading and hearing their sensitive communications, and those groups had taken costly measures to avoid such intrusions.
That New York-based three-judge panel last year ruled against the Obama administration proceeding.
The specific question now to be addressed by the high court is whether certain Americans have "standing" to challenge the federal law, without a specific showing they have been monitored. Plaintiffs say the National Security Agency has in turn refused to disclose specifics. The ACLU calls that "Catch-22" logic.

"Given the importance of this law, the Supreme Court's decision to grant review is not surprising," said Steven R. Shapiro, the group's legal director. "What is disappointing is the Obama administration's effort to insulate the broadest surveillance program ever enacted by Congress from meaningful judicial review."
The Justice Department had strongly urged the high court to intervene and ultimately dismiss the lawsuit.
The Foreign Intelligence Surveillance Act (FISA) was revised by Congress in 2008 to give the attorney general and the director of national intelligence greater authority to order "mass acquisition" of electronic traffic from suspected foreign terrorists or spies.
The law previously required the government to justify a national security interest before any monitoring of phone calls and e-mails originating in another country. A federal judge had to sign any search warrant. President Bush then suspended that requirement after the 9/11 terrorist attacks in 2001, a move that was not revealed publicly.
After such "warrantless wiretapping" was exposed, the president and his congressional allies moved to amend the existing law, which supporters say is designed to target only foreigners living outside the U.S.
The ACLU argued in court that it appears that little is known about the FISA Amendments Act, such as who has been targeted, how often it has been used and whether any problems or abuses have occurred.
"The constitutionality of the government's surveillance powers can and should be tested in court," said Jameel Jaffer, the ACLU's deputy legal director. "We are hopeful that the Supreme Court will agree."
Privacy groups worry that such electronic dragnets could easily and unknowingly intrude on the privacy rights of U.S. citizens. The government calls that "speculation" but cites national security in refusing to provide specifics.
The justices are likely to focus mainly on the "standing" question, and whether the ACLU lawsuit should move ahead. The broader constitutional privacy questions may not be addressed for perhaps another couple of years.
 http://edition.cnn.com/

Australia Rejects Uranium Sale to Pakistan

A departing Australian envoy to Pakistan on Thursday said his government would not consider selling uranium to the South Asian state, though it is pursuing plans to make the material available to neighboring India, Dawn reported (see GSN, Jan. 20, 2011).
“India has an exemption from Nuclear Suppliers Group, which does not apply to Pakistan,” Australian High Commissioner to Pakistan Timothy George said in goodbye remarks. The organization of nuclear exporting nations in 2008 granted a special exception enabling members to engage in civilian atomic trade with India, even though the nuclear-armed state has not signed the Nuclear Nonproliferation Treaty (see GSN, Jan. 26).
Uranium can be employed to power nuclear energy reactors or, with sufficient enrichment, used in nuclear weapons.
Islamabad, which also holds nuclear weapons outside the nonproliferation accord, has on multiple occasions said it should have the same rights to acquire Australian uranium as its South Asian rival. George, though, said the two nations' situations are not identical (Dawn, May 18).

http://www.nti.org/gsn/

Nanostructured sensor detects very low concentrations of explosive

The male silk moths has a highly sensitive sense organ which it uses to recognize pheromone molecules excreted by females as these molecules land on male’s antennae; scientists now use the male silk moth approach in explosives detection
To prevent terrorist attacks at airports, it would be helpful to detect extremely low concentrations of explosives easily and reliably. Despite the development of various sensor technologies, dogs continue to be the most efficient detectors. In the journal Angewandte Chemie, a German and French team has now described a type of micromechanical sensor with a structure derived from the sense organs of butterflies.
A Wiley release reports that one approach used for sensors is based on microcantilevers. These are tiny flexible cantilevers like those used to scan surfaces with atomic force microscopes. When used in “chemical noses” the microcantilivers are coated with a material that specifically binds to the analytes being detected.
Cantilevers can vibrate like springs. When analyte molecules are bound to a microcantilever, its mass changes along with its frequency of vibration. This change can be measured.
Because of their very low vapor pressure at room temperature, the highly sensitive, reliable detection of explosives remains a big challenge. In order to make microcantilevers more sensitive to the explosive trinitrotoluene (TNT), research groups led by Denis Spitzer at the French-German Research Institute of Saint Louis and Valérie Keller at the Laboratoire des Matériaux, Surfaces et Procédés pour la Catalyse in Strasbourg have now taken inspiration from the highly sensitive sense organ of some types of butterfly. Male silk moths use this organ to recognize pheromone molecules excreted by females as they land on its broad antennae. These antennae are covered with sensilla, which are porous hairs containing chemonsensing neurons.
The scientists equipped their microcantilevers like the butterfly antennae. They coated them with a dense three-dimensionally ordered layer of titanium dioxide nanotubes oriented vertically, like the butterfly sensilla. This has several advantages: the specific surface of the microcantilevers is significantly increased; titanium dioxide binds well to substances that contain nitro groups, which are characteristic of TNT and other explosives; also, the tubes have an open structure, which improves the movement of mass and ensures a rapid sensor response.
The tubes are about 1,700 nm long and have an outer diameter of about 100 nm and a wall thickness of 20 nm. Each cantilever holds about 500,000 of these nanotubes.
For test purposes, the researchers vaporized TNA by heating a tiny crystal. The sensor was able to detect concentrations of less than one part per trillion (ppt) within 3 minutes. The researchers are now working on building a selective detector system for explosives or other gases based on this method.

 http://www.homelandsecuritynewswire.com/

Κυριακή 20 Μαΐου 2012

U.S. Congress Research Arm: Nuclear Agency Can Demand Proliferation Assessments

By Elaine M. Grossman

Laser isotope separation equipment. The U.S. Congressional Research Service has determined that the Nuclear Regulatory Commission wields sufficient authority to mandate a proliferation assessment for potential new atomic sites, such as a proposed commercial facility for enriching uranium with laser technology (U.S. Lawrence Livermore National Laboratory photo). 
- The U.S. Congressional Research Service has found that the Nuclear Regulatory Commission can require domestic facility license applicants to evaluate any potential proliferation dangers related to their proposed work, despite NRC resistance to such an approach (see GSN, April 5).
“It would appear that the commission could reasonably conclude that it has sufficient existing authority to promulgate a regulation requiring that applicants provide the commission with a proliferation risk assessment as part of the license application process,” according to a March 27 CRS memo obtained by Global Security Newswire.
The four-page advisory, requested by Representative Jeff Fortenberry (R-Neb.), was written by a CRS legislative attorney and cites an array of provisions in U.S. law as the basis for its argument.  Through a spokeswoman, the lawmaker on Tuesday provided a statement saying he was “in the process of reviewing the information,” but understood the mandate for a proliferation appraisal “falls within the jurisdiction of the Nuclear Regulatory Commission.”
An NRC staff report on a related matter is expected in October.  The nuclear agency is expected to offer its five commissioners a formal response to an American Physical Society petition, which in June 2010 argued that the nuclear agency should adopt a new rule that would make a proliferation risk assessment a standard part of the licensing process.
A resolution of the issue by majority vote of the agency’s commissioners could follow the staff recommendation, but that timing is uncertain.
The Nuclear Regulatory Commission issues licenses for U.S. commercial nuclear activities and facilities, such as atomic reactors and uranium enrichment plants.
Fortenberry’s request to the Congressional Research Service focused on license applications for uranium enrichment, a process that can be used for processing sensitive materials for either nuclear power plants or atomic weapons.  However, several issue experts said a more pertinent issue would be NRC consideration of potential proliferation associated with any new nuclear energy technologies.
To date, commission staff has found that proliferation assessments would be “beyond the scope” of NRC responsibilities, according to an environmental impact statement completed in February for one high-profile license application.  The February document also indicates the agency perspective is that a stand-alone analysis of proliferation risks is unneeded.
“Given the NRC’s comprehensive regulatory framework, ongoing oversight, and active interagency cooperation, it is the NRC’s current view that a formal nuclear nonproliferation assessment is not necessary to ensure the protection of the common defense and security,” the document states.
The existing NRC license application review process includes an evaluation of a company’s ability to safeguard materials and information inside its facility.  Agency officials have said the "net effect" of this licensing approach is to discourage the spread of sensitive technologies, according to the 113-year-old physicists’ organization.
Some issue experts, however, insist that the nuclear agency’s standard approach is not enough to stem global proliferation.
The APS rule-change request was made amid growing concern about a proposed GE-Hitachi nuclear facility in Wilmington, N.C., that would for the first time use a laser-based process to enrich uranium for commercial reactors.
If commercially successful, the laser enrichment approach might significantly cut reactor fuel costs.  Other nations would be likely to redouble their efforts to develop similar techniques to remain competitive in the marketplace, according to nuclear energy experts.
An ability offered by lasers to produce uranium in smaller facilities and consume less power -- compared to today’s centrifuge approach -- could also make the new enrichment technique attractive to proliferator nations interested in hiding clandestine efforts at developing a nuclear weapon, many issue specialists assert (see GSN, July 30, 2010).
It is possible that an illicit laser enrichment site could be built with a small "footprint," making it virtually undetectable from the outside, observers say.
The congressional research arm did not address whether the Nuclear Regulatory Commission should mandate proliferation risk assessments for laser enrichment or other new nuclear technologies.  Rather, it looked only at whether there exists in U.S. law sufficient NRC authority to require such evaluations by uranium enrichment license applicants.
One federal public health and welfare statute cited by the congressional memo gives the Nuclear Regulatory Commission the power to “prescribe such regulations or orders as may be necessary or desirable to promote the nation’s common defense and security with regard to control, ownership, or possession of any equipment or device … capable of separating the isotopes of uranium or enriching uranium in the isotope 235.”
Uranium 235 can be used as a key ingredient in a nuclear weapon, as it is capable of sustaining a fission chain reaction.
The Congressional Research Service noted that even though license applications are geared mostly toward ensuring health and safety, the NRC role of advancing “common defense and security” through its rules and regulations offers a basis for demanding a proliferation risk assessment.
“A requirement that an applicant submit an assessment that details the technological and material proliferation risks associated with a facility, in addition to the steps the applicant has taken, and will take, to combat unauthorized disclosure of technological and material information, could be characterized by the commission as a measure designed to promote ‘the common defense and security,’” the CRS memo states.
David McIntyre, an NRC spokesman, said this week he was unaware of the Congressional Research Service advisory and could not comment on it.
However, other NRC staffers have previously spoken to the issue.
“The NRC considers a nuclear nonproliferation impact assessment to be outside the scope of the agency’s statutory responsibilities,” Michael Weber, then the director of the NRC Nuclear Material Safety and Safeguards Office, said in a March 2010 letter to nonproliferation advocate Tom Clements.  Neither the Atomic Energy Act nor the National Environmental Policy Act calls for “such an assessment in the context of domestic licensing,” he said.
The CRS legal analysis also notes an NRC obligation under U.S. law to avoid issuing a license that “would be inimical to the common defense and security or would constitute an unreasonable risk to the health and safety of the public,” according to Title 42 of the U.S. Code.
“Given this mandate, the commission could reasonably consider a new proliferation risk assessment requirement to be within its general authority to issue such regulations” as necessary to carry out its responsibilities under the 1954 Atomic Energy Act, the congressional analysis states.
That law requires licensing for civilian uses of nuclear materials and facilities, and empowers the nuclear commission to create and enforce standards to govern these uses in protecting public health and safety.
If the commission itself similarly concludes that it has the authority to require proliferation evaluations, such a rule change for license applicants “would likely have to be implemented through [federal] notice and comment rulemaking procedures,” the CRS memo notes.
Some issue experts this week hailed the CRS finding.
“As a simple matter of good governance, the NRC should support a proliferation risk assessment when there are legitimate uncertainties,” said R. Scott Kemp, an associate research scholar at Princeton University.  “Even [if] the responsibility is not within the legal mandate, they should do what they can to facilitate such an assessment.”
Others are questioning whether the nuclear agency is the appropriate U.S. agency to oversee this type of proliferation review.
“I am not convinced the NRC is the best organization to do this,” said James Acton, a senior associate at the Nuclear Policy Program of the Carnegie Endowment for International Peace.  “Personally I think [an] interagency task force led by State would be better.”
There are few indications, though, that another agency such as the State Department -- which typically takes a leading role in U.S. nonproliferation efforts around the globe -- would spearhead such risk assessments.  Thus, it is “far better that the NRC conducts the study than no one does it,” Acton opined.
As it stands, the APS petition requests that responsibility for conducting a proliferation risk assessment be assigned to a facility license applicant, a detail that troubles some issue experts.
“Apart from the obvious conflicts of interest, a proper nonproliferation assessment is a sufficiently esoteric and nuanced thing that I do not believe that any industrial corporation can, by itself, perform an assessment of its own technology,” said Kemp, a former State Department science adviser for nonproliferation and arms control.  “Nor do I believe that it is sufficient merely to hire one or two outside experts who work under the purview of the corporation.”
“Any nonproliferation impact assessment must not be conducted by the company -- or its appointees -- partly because of the risk of a pro forma submission but mostly because the issues at stake are political and industry assessments tend to be too narrowly technically focused,” Acton agreed.
Frank von Hippel, a professor of public and international policy at Princeton, said one way of ensuring a clear-eyed and balanced treatment in a license applicant’s proliferation evaluation would be to subject the document to expert review.
For its part, the physicists’ organization recommended in its petition that NRC staff enlist the aid of other federal entities -- such as the Energy Department’s semiautonomous National Nuclear Security Administration -- in reviewing an industry-submitted proliferation analysis.
A useful historical model could be a decision by the George W. Bush administration to circulate a draft 2008 Energy Department proliferation assessment of its Global Nuclear Energy Partnership, von Hippel said.  The partnership initiative was aimed at expanding peaceful power generation while limiting sensitive enrichment and reprocessing activities, but experts said it was found to run some unintended proliferation risks.
Acton also cited the draft GNEP proliferation assessment as “a substantial document and an example of the level of detail that should be required.”
He noted that one version of a future proliferation risk appraisal could remain classified to protect sensitive details, while an unclassified copy could be made available for public comment.
“The process should be as open as possible,” said von Hippel, who co-chairs the International Panel on Fissile Materials.

 http://www.nti.org/gsn/

The very model of a successful bin Laden raid

By Mike Mount
Inside the Pentagon there are historical displays for almost everything the military has done dating back to this country's Revolutionary War. There are also models of all kinds: planes, trucks, missiles, ships and submarines.
On Wednesday an unassuming display popped up in one of hallways with little fanfare. At first there was passing interest, but as word spread more and more people started to gather around, asking questions and taking pictures.
The Styrofoam-and-acrylic model turned out to be a bit of new Pentagon history - it shows Osama bin Laden's walled compound and surrounding farmland.
Designed and built to be used in the planning for the May 2011 raid that killed the al Qaeda leader, the model also was taken to the White House to brief President Obama on plans for the raid.
It was built over a six-week period in the months before the raid and has sat on display in the lobby of the National Geospatial Intelligence Agency in Fort Belvoir, Virginia, just a few miles from the Pentagon and White House.
Until last week, the model was considered classified and only those working or visiting the building could see it.

Now it is declassified, and agency officials wanted to bring it over to the Pentagon for a brief time to show it off to Department of Defense "customers" to highlight what the National Geospatial Intelligence Agency can do for them, according to an agency information sheet.
The to-scale diorama helped the Navy Seals literally measure the steps it would take to get to bin Laden.
"We were able, through what we call pattern-of-life activity analysis, to determine that there was certainly a very important person there because there was operational security that was taking place at that compound that was unusual for any other compound in that area," Letitia Long told CNN's Security Clearance last March.
"It was a large compound. It was built in a very different way than surrounding compounds ... (featuring) the situational security, the high walls, the concertina wire, very little interaction with other members of the community," Long said.
After its brief display at the Pentagon, the model will return to the lobby of the National Geospatial Intelligence Agency building.

 http://edition.cnn.com/

Σάββατο 19 Μαΐου 2012

Pentagon-Funded Research Could Bolster Bioweapon Scanner Tech

Findings published earlier this week could lay the groundwork for advancements in portable biological-weapon scanner technology, the Journal of Visualized Experiments announced (see GSN, May 16).
The U.S. Defense Threat Reduction Agency financed the studies; they include an examination of steps for setting apart organic molecules without reliance on analytical facilities or electric power.
"This is a hand-held electricity-free device which can be used in the field by the war-fighter, in conjunction with their detection platforms," said David Pawlowski, a scientist with the State University of New York (Buffalo).
The procedure would "be useful for detection of typical biological warfare agents," said Pawlowski, who oversaw the project with fellow researcher Richard Karalus (Journal of Visualized Experiments, May 14).

 http://www.nti.org/gsn/

Texas fights identity theft

Everything is bigger in Texas, including the number of instances of identity manipulation; according to an April report from ID Analytics, the cities of Beaumont and El Paso lead the nation in per-capita identity manipulation attempts
Everything is bigger in Texas, including the number of instances of identity manipulation. According to an April report from ID Analytics, the cities of Beaumont and El Paso lead the nation in per-capita identity manipulation attempts. In fact, 11 of the top 20 zip codes identified are located in Texas, including Houston, McAllen, Corpus Christi, Dallas, Midland, and San Antonio.
Tempe, Arizona-based Lifelock says that Identity manipulation differs slightly from identity theft in that a specific individual’s information is not targeted. Instead, fraudsters apply for accounts using false names, Social Security numbers, addresses, or dates of birth.
To combat this growing crime, Sheriff Richard D. Wiles and the El Paso County Sheriff’s Office will be hosting a free, one-day identity theft summit presented by the FBI Law Enforcement Executive Development Association (FBI-LEEDA) and LifeLock, Inc.
In my 38 years of law enforcement this is the most informative one day seminar I have attended,” said Chief Don Dixon of the Lake Charles Police Department. “We saw a great need for additional training in identity theft and there is remarkable value in learning about new trends and investigative techniques. This training is free for all law enforcement officials in attendance. This training has enhanced our ability to identify, investigate and prosecute identity theft in our area.”
The all-day training event is scheduled for Thursday, 24 May, to be held at the El Paso County Sheriff’s Office Region VIII Training Academy and marks the 97th law enforcement training presented by LifeLock. The summit will provide attendees with new investigative methods and the latest information on identity theft trends. The training will provide participants with hands-on experience with tools and methods currently being used to investigate and prosecute identity theft crimes. The El Paso training marks the eighth identity theft training summit presented by LifeLock and the FBI-LEEDA in the state of Texas.

LAPD Agrees to Suspicious Activity Reporting Reforms

By Matthew Harwood

The Los Angeles Police Department (LAPD) has agreed that it will no longer generate and store suspicious activity reports (SARs) unless the officer’s report articulates a reasonable suspicion that the activity was connected to criminal or terrorist activity. The concession was a major victory for civil liberties and community groups, who have long voiced concern that the program violated the city’s residents’ civil liberties and privacy.
During a meeting with civil liberties and community groups — including the Muslim Public Affairs Council (MPAC), the American Civil Liberties Union (ACLU) of Southern California, and the Council on American-Islamic Relations (CAIR) —  Deputy Chief Michael Downing, commanding officer of the LAPD’s Counter-Terrorism and Special Operations Bureau, presented an amended version of “Special Order No. 1."
In the original order, issued in early January of this year, a SAR was defined as a “stand-alone report used to document any reported or observed behavior/activity that may reveal a nexus to foreign or domestic terrorism.” The definition has been revised to say that a SAR is “an official documentation of observed or reported behavior reasonably indicative of pre-operational planning related to terrorism or other criminal activity.”
Of particular concern to the community groups was the creation of SARs relating to constitutionally protected activities, including photography and speech that have no nexus to terrorism. The revision restricts officers from filing SARs for First Amendment-protected activities -- such as photography, asking security-related questions, and observing critical infrastructure -- unless they can articulate why the behavior is not innocent and “reasonably indicative” of terrorist-related activity.
“The agreed upon reforms by LAPD are a victory for partnerships between communities and law enforcement nationwide,” said Salam Al-Marayati, president of the Muslim Public Affairs Council, in a statement. "LAPD, in contrast to [the New York Police Department], is developing practices and policies after engaging communities."
Downing, however, downplayed the change in an e-mail to Security Management. "All we did was put the ODNI [Office of the Director of National Intelligence] definition of SAR in the order and separated the 9 non-criminal behaviors from the 6 criminal behaviors and included an indented note about Terry vs Ohio," said Downing. "There is no real substantive change."
Downing said it will take about 30 days to rework the Special Order before it goes into effect.
After their creation, SARs are stored in the LAPD’s databases and can be shared with other local, state, and federal law enforcement through the Department of Homeland Security’s 77 recognized fusion centers, which are connected to the federal government’s Information-Sharing Environment (ISE), a counterterrorism and national security intelligence database.
The LAPD began the SAR program in 2008 (Read about how the program was conceived by its main architect in the September 2011 issue of Security Management). The idea behind the program is that cops on the beat know how to distinguish what’s normal from what’s abnormal in their area, and thus are best positioned to disrupt a terrorist plot before it can go operational. By generating SARs and integrating them into a criminal intelligence database, the LAPD can connect the dots between seemingly unconnected events -- such as the theft of fertilizer and reports of suspicious men taking pictures of bridges and other critical infrastructure.
The program was adopted by the federal government with revisions, such as a stricter standard that any information retained had to have a reasonable nexus to terrorism. Today SARs from police departments nationwide are shared with state-based and regional fusion centers and can be sent to the ISE for storage and query by a wide range of communities involved in law enforcement, homeland security, and national security.
In March, the community groups sent a letter to the LAPD demanding that it halt its SAR program until it was reformed. The groups stated that the program should be altered to mandate that police officers should not file a SAR, and the department not retain it, unless the report contains “articulable facts which provide reasonable suspicion that the activity reported is evidence of criminal conduct.” Within the letter, the groups noted that noncriminal activities were a disproportionate amount of the 2,734 SARs collected when the LAPD released data on the program in 2010. When the LAPD tried to share 2,668 of them with its local fusion center, only two percent were accepted.

 http://www.securitymanagement.com/