Security

Although al-Qaeda was unvanquished it was also unable to repeat its startling triumph. America was sinking ever more deeply into unpromising, fantastically expensive wars in the Muslim world—following the script that had been written by bin Laden. Repeatedly, he had outlined his goal of drawing America into such conflicts with the goal of bleeding the […]

{ 2 comments }

The fateful decision of the Bush administration to invade and occupy Iraq in 2003 revivified the radical Islamist agenda. Simultaneous wars in two Muslim countries lent substance to bin Laden’s narrative that the West was at war with Islam… Although bin Laden and his cohort were essentially reduced to virtual presences on the Internet and […]

{ 0 comments }

One can ask, at this point, whether 9/11 or some similar tragedy might have happened without bin Laden to steer it. The answer is certainly not. Indeed, the tectonic plates of history were shifting, promoting a period of conflict between the West and the Arab Muslim world; however, the charisma and vision of a few […]

{ 0 comments }

Although the notes don’t reflect it, a vote was taken [in August 1988] to form a new organization aimed at keeping jihad alive after the Soviets were gone. It is difficult to imagine these men agreeing on anything, but only Abu Hajer voted against the new group. Abu Rida summarized the meeting by saying that […]

{ 0 comments }

In addition to aforementioned rules about internet and computer security (1, 2, 3, 4) it’s worth mentioning that security measures can create their own vulnerabilities. That’s true in terms of human systems. For instance, granting high-level powers to system administrators creates risks that they will exploit them deliberately or have their credentials stolen, or simply […]

{ 0 comments }

China’s strategy with the Hong Kong ‘security’ law seems intended to send a global message: critics of China will be increasingly punished as the state’s global influence grows. This is disturbing in many ways, for the welfare of people in China, the region, and around the world. The degree of authoritarian control that technology has […]

{ 20 comments }

However, by concealing their past intentions, the Iraqis encouraged the assumption that those were their future intentions as well. In the first phase of the Iraqi cover-up, the hidden past intentions certainly did reflect the goals for the future of the political leadership, even though Iraqi scientists and experts knew that restarting the programs would […]

{ 0 comments }

One computer security concern is that various insiders — including hardware and software manufacturers, and governments which may compel them to comply — will build back doors into their products to allow the security to be compromised. Doing this is a terrible idea. A back door put in for government surveillance or police use is […]

{ 7 comments }

There are several reasons to conclude that the world today is experiencing a nuclear arms race alongside conventional military buildup by many actors and a breakdown of multilateral cooperation. Partly driven by US ballistic missile defence development, Russia began deploying weapon systems meant to counter them like the Topol-M in the 1990s. Now they are […]

{ 25 comments }

In Victoria today, about ten young Indigenous protestors were arrested after occupying the Ministry of Energy, Mines and Petroleum Resources building. Meanwhile, British security authorities have categorized Greenpeace and the Extinction Rebellion with far-right groups and neo-Nazis. Today’s George Monbiot column calls out how government security forces have often been more focused on threats to […]

{ 6 comments }