Medill National Security Reporting Project
Medill/GlobalPost investigation sheds new light on $3.2 billion U.S. mine clearance and victim assistance effort.
→ Visit the project site
→ Read more about the project
Medill/USA TODAY investigation of U.S. international food aid programs finds significant, entrenched problems Read about the project.Like and follow us
R.I.P. James Wright Foley, 1973-2014
#MedillRemembers James Foley, One Year Later
Remembering James Foley's life and legacy one year after his death at the hands of the Islamic State. → Continue to the story.
→ James Foley: A legacy that lives on (VIDEO)
Major TV networks sign onto freelancer safety compact
Read about the compact, which was signed by Medill NSJI Co-Director Ellen Shearer at Columbia University in September, here.-
Real-time Twitter feed
NSJI in the News
The Voice of America featured NSJI in a recent article about how it prepares journalists to cover stories in conflict zones.McCormick Foundation renews grant for Medill National Security Journalism program
EVANSTON, Ill. — The Robert R. McCormick Foundation has renewed a $1 million grant to fund the Medill National Security Journalism Initiative at Northwestern University over the next two years.
The NSJ program provides journalists-in-training and working journalists with the knowledge and skills necessary to report accurately, completely and with context on events and issues related to defense, security and civil liberties. The initiative began in January, 2009 with an initial three-year, $1.3 million McCormick Foundation grant. The grant was also renewed for $1 million over two years in 2011.
About the initiative
By the Medill National Security Journalism Initiative, in partnership with the McCormick Foundation.Links we recommend
- Campaign for Innocent Victims in Conflict
- Global Warning
- International Reporting Project
- McCormick Foundation
- Medill
- Medill Washington
- Military Reporters & Editors
- Northwestern University
- Security Clearance
- The Center for Public Integrity
- The Crimes of War Projct
- The Dart Center
- Washington Post National Security news
Posts by Paul Rosenzweig
What Big Data does, and doesn’t, know about me
(Oct. 08, 2013)The world of Big Data is a world of pervasive data collection and aggressive analytics. Some see the future and cheer it on; others rebel. Behind it all lurks a question most of us are asking—does it really matter? I had a chance to find out recently, as I got to see what Acxiom, a large-scale commercial data aggregator, had collected about me.
At least in theory large scale data collection matters quite a bit. Large data sets can be used to create social network maps and can form the seeds for link analysis of connections between individuals . Some see this as a good thing; others as a bad one—but whatever your viewpoint, we live in a world which sees increasing power and utility in Big Data’s large scale data sets.
Of course much of the concern is about government collection. But it’s difficult to assess just how useful this sort of data collection by the government is because, of course, most governmental data collection projects are classified. The good news, however, is that we can begin to test the utility of the program in the private sector arena—a useful analog in the private sector just became publicly available and it’s both moderately amusing and instructive to use it as a lens for thinking about Big Data. Continue reading
Weighing in on key issues related to the domestic use of drones
(Oct. 09, 2012)The expanding use of drones over U.S. airspace has become a fast-growing national security topic and privacy concern. We asked our colleague Paul Rosenzweig, who co-authored a recent Heritage Foundation paper on drones, to weigh in. Flying drones—unmanned aerial vehicles—have … Continue reading
From Worms to Cyberwar
(Dec. 09, 2011)Twenty five years ago, we saw the very first worm. Today, we find worms are but the first step in a possible cyber war. For those who want to know a little bit more about the underlying technology and how it works, this piece I did for the Hoover Institution, “From Worms to Cyberwar” is an easy reading introduction. Continue reading
ADAMS Is Such A Friendly Name
(Nov. 18, 2011)John Adams. Adam’s Apple. In the US the Adams name is as American as apple pie.
Good thing then that a new DARPA project has the same name!
DARPA (the Defense Advanced Research Project Administration) recently announced that it would be funding a project known as ADAMS (Anomaly Detection at Multiple Scales). According the Homeland Security Newswire, “Researchers in a 2-year, $9 million project will create a suite of algorithms that can detect multiple types of insider threats by analyzing massive amounts of data — including email, text messages and file transfers — for unusual activity.”
Continue reading
US v. Jones
(Nov. 08, 2011)The Supreme Court today heard oral argument in the case of United States v. Antoine Jones. Jones was convicted of drug offenses based, in large part, on the evidence derived from a Global Positioning System (GPS) tracking device that law enforcement had put on his car. The GPS tracker was live for 28 days, tracking Jones’ car 24/7. When they put the GPS on the car, the police did not have a valid warrant.
The government says that it didn’t need one. They argue that a person has no reasonable expectation of privacy in his travel on public roads. After all, they argue, the police could have tailed Jones in an unmarked vehicle and they wouldn’t have needed a warrant. Jones argues, however, that GPS tracking devices are uniquely intrusive — that they allow the government to collect a large volume of geo-location tracking data and use it to build a “mosaic” picture of a person, learning, for example, what church he goes to; what bar he drinks at; and whether or not he is a regular gym attendee. Continue reading
Aviation Secuirity in New Zealand
(Sep. 25, 2011)There isn’t any. Honest.
My wife and I are on holiday in New Zealand and earlier today we took a domestic flight from Wellington to Nelson. It was a short commuter hop — 30 minutes, across the strait separating the North and South Islands. On the whole an utterly unremarkable experience, just like any number of flights we’ve taken before.
Save for one thing — no security. We arrived for the flights with our e-tickets in hand, scanned them at a kiosk, dropped our bags off on the conveyor and walked to the gate. No ID check; no metal detector; no X-ray of our carry on bags. Probably no X-ray of the checked luggage but we couldn’t tell for sure. We scanned our boarding passes again at the gate, but no ID check. Nothing. In short, it felt like something from before 9/11 — and possibly even before the 1980s and the advent of hijacking.
Continue reading
The Authoritarian Cloud
(Sep. 05, 2011)Cloud Computing is the “new thing.” Everyone is rushing to it — the new Federal Cloud Computing Strategy isn’t called “Cloud First” for no reason. Indeed, the reasons to like the cloud are obvious With economies of scale it is often cheaper and more efficient at the same time — what’s not to like?
In the end, maybe more than we realize. Today’s cloud system uses “thin clients” — simple interfaces like Google’s Chrome system — with minimal independent computing power. All of the data, software, and operating systems, software, and processing resources are stored in the cloud, managed by a cloud system administrator. Continue reading
The best and worst cybersecurity headlines
(Jul. 27, 2011)Jason Healey, a cyber-expert at the Atlantic Council, isn’t too impressed with how the press covers cyber issues. The challenge, of course, is common to many national security stories — how to tackle a complex topic with nuance while making it readily understandable for the reader. Headline writers sometimes don’t help in that process. Healey’s nominee for worst headline (and I agree): Obama Reserves Right to Nuke Hackers. Continue reading
The law of large numbers
(Jul. 17, 2011)It is shocking, apparently, to hear that the Transportation Security Administration has had more than 25,000 security breaches since 2001, or roughly 2,500 breaches every year. Representative Jason Chaffetz (R-UT) thinks its a scandal that proves that airport security is “a mess.” (And, now, apparently, Congressman Chaffetz and TSA are in a tussle about whether or not he was authorized to release these numbers).
But what’s really a mess is how our Representatives (and, sometimes, the press) report these sorts of numbers. They are always portrayed as absolute values and in that abstract context they seem immense. Who, after all, could approve of 2,500 mistakes per year?
But the abstract context is just that — abstract. Numbers have meaning only in a concrete context. So how about this for context: Domestically, there are approximately 2 million enplanements (passengers boarding aircraft) every day. That’s roughly 700 million passengers a year, or 7 billion passengers in the 10 years for which the security breach data are reported (and bear in mind that this is every security breach however minor). That’s an error rate of less than 0.0001%. In what human endeavor is that considered a poor performance? Continue reading
Disaster Planning and Exercises Meet Disaster Reality
(May. 16, 2011)The old saying goes “prior planning prevents poor performance.” And what is true of music recitals is true (and even more so) of preparing for the response to a natural or man-made disaster.
When disaster strikes, a large number of resources need to be mobilized. The larger the disaster, the more resources are needed, and the greater the need for coordination. But given how infrequent large-scale disasters are (thankfully!) we don’t have a lot of practice with that sort of coordination.
The Federal government runs a robust training and exercise program that models disaster response by having all the players respond to a hypothetical disaster. They run both small regional programs and, annually, a National Level Exercise that models a major catastrophe. This year, NLE 2011 is an exercise that asks “what would happen if we had a major earthquake along the New Madrid fault line in the Midwest?” The three-day exercise is scheduled to begin today.
Continue reading