Weighing in on key issues related to the domestic use of drones

By

The expanding use of drones over U.S. airspace has become a fast-growing national security topic and privacy concern. We asked our colleague Paul Rosenzweig, who co-authored a recent Heritage Foundation paper on drones, to weigh in.  Flying drones—unmanned aerial vehicles—have … Continue reading

From Worms to Cyberwar

By

Twenty five years ago, we saw the very first worm.  Today, we find worms are but the first step in a possible cyber war.  For those who want to know a little bit more about the underlying technology and how it works, this piece I did for the Hoover Institution, “From Worms to Cyberwar” is an easy reading introduction. Continue reading

ADAMS Is Such A Friendly Name

By

John Adams. Adam’s Apple. In the US the Adams name is as American as apple pie.

Good thing then that a new DARPA project has the same name!

DARPA (the Defense Advanced Research Project Administration) recently announced that it would be funding a project known as ADAMS (Anomaly Detection at Multiple Scales). According the Homeland Security Newswire, “Researchers in a 2-year, $9 million project will create a suite of algorithms that can detect multiple types of insider threats by analyzing massive amounts of data — including email, text messages and file transfers — for unusual activity.”
Continue reading

US v. Jones

By

The Supreme Court today heard oral argument in the case of United States v. Antoine Jones.  Jones was convicted of drug offenses based, in large part, on the evidence derived from a Global Positioning System (GPS) tracking device that law enforcement had put on his car.  The GPS tracker was live for 28 days, tracking Jones’ car 24/7.  When they put the GPS on the car, the police did not have a valid warrant.

The government says that it didn’t need one.  They argue that a person has no reasonable expectation of privacy in his travel on public roads.  After all, they argue, the police could have tailed Jones in an unmarked vehicle and they wouldn’t have needed a warrant.  Jones argues, however, that GPS tracking devices are uniquely intrusive — that they allow the government to collect a large volume of geo-location tracking data and use it to build a “mosaic” picture of a person, learning, for example, what church he goes to; what bar he drinks at; and whether or not he is a regular gym attendee. Continue reading

Aviation Secuirity in New Zealand

By

There isn’t any.  Honest.

My wife and I are on holiday in New Zealand and earlier today we took a domestic flight from Wellington to Nelson.  It was a short commuter hop — 30 minutes, across the strait separating the North and South Islands.  On the whole an utterly unremarkable experience, just like any number of flights we’ve taken before.

Save for one thing — no security.  We arrived for the flights with our e-tickets in hand, scanned them at a kiosk, dropped our bags off on the conveyor and walked to the gate.  No ID check; no metal detector; no X-ray of our carry on bags.  Probably no X-ray of the checked luggage but we couldn’t tell for sure.  We scanned our boarding passes again at the gate, but no ID check.  Nothing. In short, it felt like something from before 9/11 — and possibly even before the 1980s and the advent of hijacking.
Continue reading

The Authoritarian Cloud

By

Cloud Computing is the “new thing.” Everyone is rushing to it — the new Federal Cloud Computing Strategy isn’t called “Cloud First” for no reason. Indeed, the reasons to like the cloud are obvious With economies of scale it is often cheaper and more efficient at the same time — what’s not to like?

In the end, maybe more than we realize. Today’s cloud system uses “thin clients” — simple interfaces like Google’s Chrome system — with minimal independent computing power. All of the data, software, and operating systems, software, and processing resources are stored in the cloud, managed by a cloud system administrator. Continue reading

The best and worst cybersecurity headlines

By

Jason Healey, a cyber-expert at the Atlantic Council, isn’t too impressed with how the press covers cyber issues.  The challenge, of course, is common to many national security stories — how to tackle a complex topic with nuance while making it readily understandable for the reader.  Headline writers sometimes don’t help in that process.  Healey’s nominee for worst headline (and I agree): Obama Reserves Right to Nuke Hackers. Continue reading

The law of large numbers

By

It is shocking, apparently, to hear that the Transportation Security Administration has had more than 25,000 security breaches since 2001, or roughly 2,500 breaches every year.  Representative Jason Chaffetz (R-UT) thinks its a scandal that proves that airport security is “a mess.”  (And, now, apparently, Congressman Chaffetz and TSA are in a tussle about whether or not he was authorized to release these numbers).

But what’s really a mess is how our Representatives (and, sometimes, the press) report these sorts of numbers.  They are always portrayed as absolute values and in that abstract context they seem immense.  Who, after all, could approve of 2,500 mistakes per year?

But the abstract context is just that — abstract.  Numbers have meaning only in a concrete context.  So how about this for context:  Domestically, there are approximately 2 million enplanements (passengers boarding aircraft) every day.   That’s roughly 700 million passengers a year, or 7 billion passengers in the 10 years for which the security breach data are reported (and bear in mind that this is every security breach however minor).  That’s an error rate of less than 0.0001%.  In what human endeavor is that considered a poor performance? Continue reading

Disaster Planning and Exercises Meet Disaster Reality

By

The old saying goes “prior planning prevents poor performance.” And what is true of music recitals is true (and even more so) of preparing for the response to a natural or man-made disaster.

When disaster strikes, a large number of resources need to be mobilized. The larger the disaster, the more resources are needed, and the greater the need for coordination. But given how infrequent large-scale disasters are (thankfully!) we don’t have a lot of practice with that sort of coordination.

The Federal government runs a robust training and exercise program that models disaster response by having all the players respond to a hypothetical disaster. They run both small regional programs and, annually, a National Level Exercise that models a major catastrophe. This year, NLE 2011 is an exercise that asks “what would happen if we had a major earthquake along the New Madrid fault line in the Midwest?” The three-day exercise is scheduled to begin today.
Continue reading

The new National Terrorism Advisory System

By

“Elevated” and “imminent” have replaced orange and the rest of the coded colors as the words that will alert Americans to terrorist threats. Fewer choices, less fodder for late-night comedians, but what is the real impact of the change?

The change was announced in late January and state and local governments, airports and other transportation hubs were given 90 days to make the transition to the new alert system. On Thursday, the Department of Homeland Security rolled out the system to the general public.

Under the system, an elevated threat “warns of a credible terrorist threat against the United States,” and an imminent threat “warns of a credible, specific, and impending terrorist threat” against the country. Americans will be able to subscribe to a new National Terrorism Advisory System (NTAS) and follow the government alerts on Facebook, Twitter, or through an email alert system. Continue reading