Security

This week’s Economist is reporting about the growing danger of armed conflict between the United States and Iran: The brewing conflict between America and Iran As America and Iran act tough, the risk of conflict is growing President Donald Trump’s fixation with undoing “Barack Obama’s signature diplomatic achievement” in the form of the Joint Comprehensive […]

{ 6 comments }

After [redacted by the CIA] left, Boris had to keep introducing harsher and harsher methods, because Abu Zubaydah and other terrorists were trained to resist them. In a democracy such as ours, there is a glass ceiling on harsh techniques that the interrogator cannot breach, so a detainee can eventually call the interrogator’s bluff. And […]

{ 0 comments }

The [redacted by the CIA] picture [of Khallad, alias of Walid bin Attash] had been in the CIA’s possession when Steve Bongardt and the Cole team had been shown the [redacted] three pictures on June 11, 2011. If it has been shown to the Cole team, Steve and the other agents would have identified the […]

{ 0 comments }

While I was in the United States, I received an urgent call from [assistant U.S. attorney David] Kelley. “Ali, you need to get to Yemen right away,” he said. “We’ve finally signed the agreement with the Yemenis allowing us to interrogate [Jamal al-] Badawi, but there’s no one who can interrogate him.” “What about Bob […]

{ 1 comment }

An interrogation is a mind game in which you have to use your wits and knowledge of the detainee to convince or steer him to cooperate, and essential to this is to show that you are in control. If a suspect thinks that you lack knowledge of what he’s talking about or sees that you […]

{ 0 comments }

As Labib al-Nahhas, a senior and moderate voice within the Syrian Islamist group Ahrar al-Sham, put it: ‘Ths Islamic State’s extremist ideology can be defeated only through a home-grown Sunni alternative — with the term “moderate” defined not by CIA handlers but by Syrians themselves. Moderate imams — whether in the community or visiting prisons […]

{ 3 comments }

Sadly, many Muslims would subscribe to this perspective [of Islam in conflict with the rest of the world] rather than acknowledge the crisis within Islam. They think the conflicts ravaging their lands stem from a Western conspiracy to steal their natural resources. So perfidious is that conspiracy that many Muslims even blame terror attacks in […]

{ 0 comments }

De-anonymization is an important topic for anyone working with sensitive data, whether in the context of academic research, IT system design, or otherwise. I remember a talk during a Massey Grand Rounds panel where a medical researcher explained how she could pick herself out from an ‘anonymous’ database of Ontarians, on the basis that her […]

{ 2 comments }

Why is trustworthy computer security impossible for ordinary users? In part because the system has multiple levels at which failure can occur, from hardware to operating systems and software. Spectre and Meltdown show that no matter how careful you are about the operating sytem and software you run you can still be attacked using the […]

{ 3 comments }

Many problems in nuclear strategy are unpleasant or even horrifying to contemplate. As the number of nuclear-armed nations grows, the chances that one will be put in a desperate situation and choose to use one more more nuclear weapons likely rises. An article by Vince Manzo and John Warden considers potential American responses to the […]

{ 0 comments }