Security

“Statement by President George W. Bush on Insurrection at the Capital Laura and I are watching the scenes of mayhem unfolding in our Nation’s government in disbelief and dismay. It is a sickening and heartbreaking sight. This is how election results are disputed in a banana republic — not our democratic republic. I am appalled […]

{ 12 comments }

The International Spy Museum hosted a great discussion with former FBI special agent Ali Soufan, author of two books about Al Qaeda: It covers the post-2001 debate around torture for interrogation, questions of accountability in the use and disclosure of classified intelligence, and includes some interesting remarks about cooperation with international intelligence agencies, as well […]

{ 0 comments }

Although al-Qaeda was unvanquished it was also unable to repeat its startling triumph. America was sinking ever more deeply into unpromising, fantastically expensive wars in the Muslim world—following the script that had been written by bin Laden. Repeatedly, he had outlined his goal of drawing America into such conflicts with the goal of bleeding the […]

{ 2 comments }

The fateful decision of the Bush administration to invade and occupy Iraq in 2003 revivified the radical Islamist agenda. Simultaneous wars in two Muslim countries lent substance to bin Laden’s narrative that the West was at war with Islam… Although bin Laden and his cohort were essentially reduced to virtual presences on the Internet and […]

{ 0 comments }

One can ask, at this point, whether 9/11 or some similar tragedy might have happened without bin Laden to steer it. The answer is certainly not. Indeed, the tectonic plates of history were shifting, promoting a period of conflict between the West and the Arab Muslim world; however, the charisma and vision of a few […]

{ 0 comments }

Although the notes don’t reflect it, a vote was taken [in August 1988] to form a new organization aimed at keeping jihad alive after the Soviets were gone. It is difficult to imagine these men agreeing on anything, but only Abu Hajer voted against the new group. Abu Rida summarized the meeting by saying that […]

{ 0 comments }

In addition to aforementioned rules about internet and computer security (1, 2, 3, 4) it’s worth mentioning that security measures can create their own vulnerabilities. That’s true in terms of human systems. For instance, granting high-level powers to system administrators creates risks that they will exploit them deliberately or have their credentials stolen, or simply […]

{ 0 comments }

China’s strategy with the Hong Kong ‘security’ law seems intended to send a global message: critics of China will be increasingly punished as the state’s global influence grows. This is disturbing in many ways, for the welfare of people in China, the region, and around the world. The degree of authoritarian control that technology has […]

{ 22 comments }

However, by concealing their past intentions, the Iraqis encouraged the assumption that those were their future intentions as well. In the first phase of the Iraqi cover-up, the hidden past intentions certainly did reflect the goals for the future of the political leadership, even though Iraqi scientists and experts knew that restarting the programs would […]

{ 0 comments }

One computer security concern is that various insiders — including hardware and software manufacturers, and governments which may compel them to comply — will build back doors into their products to allow the security to be compromised. Doing this is a terrible idea. A back door put in for government surveillance or police use is […]

{ 7 comments }