Terrorism
‘Terrorgram’ Telegram Terrorists Trash Transformers — Grid in Peril
Richi Jennings | | Anti-Terrorism, Child Abuse, child exploitation, Child Online Safety, child porn, child pornography, Child protection, Child Safety, child sexual exploitation, childpornography, Counter-Terrorism, counterterrorism, CSAM, Data encryption, E2EE, encryption, end-to-end encryption, extremism, france, ICS, ICS/SCADA systems, Pavel Durov, Privacy, Russia, SB Blogwatch, Telegram, Telegram app, Terrorgram, Terrorism, terrorist, terrorist attack, Terrorist attacks
Should’ve listened to Edison: After the arrest of Pavel Durov—the Telegram CEO—comes news of domestic extremists using the chat app to organize ...
Security Boulevard
Russian Threat Groups Turn Eyes to the Paris Olympic Games
Jeffrey Burt | | disinformation campaign, Doppelganger, IOC, Paris Summer Olympics, Russia, sports, Storm-1099, Storm-1679, Terrorism
Russian threat groups are using old tactics and generative AI to run malicious disinformation campaigns meant to discredit the Paris Olympic Games, France and its president, and the IOC -- less than ...
Security Boulevard
US Sanctions Three for Cyber Work for ISIS
The United States is hitting two Egyptian nationals with sanctions for allegedly creating and maintaining a platform used to train members of the ISIS terrorist group in cybersecurity and to support its ...
Security Boulevard
Are Internet Providers ‘Aiding and Abetting’ Crimes?
The internet was on tenterhooks over the question of whether the U.S. Supreme Court would find that online providers like Google, Facebook and others could continue to enjoy protection under the Communications ...
Security Boulevard
Terror Groups Silent after US Strike Kills al-Qaeda Leader Ayman Al-Zawahiri
Flashpoint Team | | Afghanistan, Corporate & Physical Security, Corporate and Physical Security, counterterrorism, current-events, isis, Physical Security, Terrorism
On August 1, 2022, US President Joe Biden announced that he authorized a drone strike to kill Ayman al-Zawahiri, the leader of al-Qaeda and former deputy to Usama bin Laden, in Kabul, ...
Security and Human Behavior (SHB) 2022
Bruce Schneier | | Conferences, Cybersecurity, Privacy, Security Conferences, Terrorism, Uncategorized
Today is the second day of the fifteenth Workshop on Security and Human Behavior, hosted by Ross Anderson and Alice Hutchings at the University of Cambridge. After two years of having this ...
Super Bowl LVI Physical Security Guide: From Counterfeiting and COVID to Protests and Phishing
Veronica Drake | | Blog, COVID-19, Physical Security, physical threat intelligence, Protests, Terrorism, Threat Intelligence
Security SEAR Level 1 The Department of Homeland Security (DHS) considers the Super Bowl a Special Event Assessment Rating (SEAR) Level 1—meaning it requires extensive federal interagency support for coordination and security ...
Details on the Unlocking of the San Bernardino Terrorist’s iPhone
The Washington Post has published a long story on the unlocking of the San Bernardino Terrorist’s iPhone 5C in 2016. We all thought it was an Israeli company called Cellebrite. It was ...
The NSA is Refusing to Disclose its Policy on Backdooring Commercial Products
Bruce Schneier | | backdoors, national security policy, nsa, Privacy, surveillance, Terrorism, Uncategorized
Senator Ron Wyden asked, and the NSA didn’t answer: The NSA has long sought agreements with technology companies under which they would build special access for the spy agency into their products, ...
Evaluating the NSA’s Telephony Metadata Program
Interesting analysis: "Examining the Anomalies, Explaining the Value: Should the USA FREEDOM Act's Metadata Program be Extended?" by Susan Landau and Asaf Lubin. Abstract: The telephony metadata program which was authorized under ...