US-Soldaten in Afghanistan


suche-links1 2 3 4 5 6 7suche-rechts


"Stunning Photos of Ordinary Life in Ukraine's Conflict Zone"

Die österreichischen Journalisten Florian Rainer und Jutta Sommerbauer haben im vergangenen Jahr den Osten der Ukraine bereist und ihre Eindrücke in ihrem Buch "Grauzone: Eine Reise zwischen den Fronten im Donbass" veröffentlicht. hat eine Bilderserie aus dem Buch zusammengestellt. "Life in Donbass proceeds against a background of conflict — distant gunfire is almost constant, growing heavier at night, when the warring sides send out scouting parties; locals, who have become accustomed to the racket, refer to it as 'barking dogs' or 'the fireworks.' Neither side intentionally targets civilians, but mistakes are inevitable. 'If a drunk soldier shoots a grenade in the wrong way, he might hit a school,' Rainer explains. 'That's something that happens on a weekly basis.' Rainer and Sommerbauer took their book title from the name locals give to this battle-scarred landscape, which is gray both visually and morally. 'It's hard to tell who exactly is fighting,' Rainer says. 'You have a lot of Russian soldiers fighting, obviously — we met a few. But Russia isn't officially fighting, so who are the separatists? Who are the government supporters?'"

Mehr lesen


"Iran Emerges as Latest Threat to Facebook and Twitter"

Facebook und Twitter haben hunderte verdächtige Konten gelöscht, die möglicherweise genutzt werden sollten, um die öffentliche Meinung in den USA zu manipulieren. Issie Lapowsky schreibt, dass viele der gelöschten Accounts aus Russland, dem Iran und anderen Ländern stammen. "The news is a reminder of the broad scope of potential adversaries targeting American tech companies. But it simultaneously signals a strengthening alliance between those companies, which have begun proactively sharing the details of their investigations with other tech giants. On a call with reporters Tuesday night, Facebook executives including CEO Mark Zuckerberg described a multi-pronged investigation that unearthed several networks of bad actors. Some were associated with Russia, but others were affiliated with Iranian state media."

Mehr lesen


"Legal Win Opens Pandora’s Box for DIY Weapons"

In den USA ist einer Wired zufolge "anarchistischen" Gruppe gerichtlich erlaubt worden, technische Daten für den 3D-Druck von fast allen erhältlichen Schusswaffen im Internet zu veröffentlichen. "Defense Distributed, the anarchist gun group known for its 3D printed and milled 'ghost guns,' has settled a case with the federal government allowing it to upload technical data on nearly any commercially available firearm."

Mehr lesen


"The New Arms Race Threatening to Explode in Space"

Mit seiner Forderung nach einer "Space Force" für das US-Militär habe Präsident Trump auf ein bisher kaum beachtetes Wettrüsten zwischen den USA, China und Russland aufmerksam gemacht, schreibt Garrett M. Graff. "Everything has changed in space. A secretive, pitched arms race has opened up between the US, China, Russia, and, to a lesser extent, North Korea. The object of the race: to devise more and better ways to quickly cripple your adversary’s satellites. After decades of uncontested US supremacy, multinational cooperation, and a diplomatic consensus on reserving space for peaceful uses, military officials have begun referring to Earth’s orbit as a new 'warfighting domain.'"

Mehr lesen


"All the Times North Korea Promised to Denuclearize"

In den vergangenen Jahrzehnten habe Nordkorea mehrfach versprochen, auf sein Atomwaffenprogramm zu verzichten, schreibt Brian Barrett in seiner kritischen Nachbetrachtung zum Gipfeltreffen in Singapur. Aus diesem Grund sei auch diesmal Skepsis gegenüber vermeintlichen Zugeständnissen angebracht. "The offer has resurfaced over the past several decades with surprising regularity. And it has never panned out so far. 'There’s definitely a pattern where the North Koreans agree to denuclearize in theory, but then there’s not really a substantive process that they agree to, to actually hammer it out,' says James McKeon, a policy analyst at the Center for Arms Control and Non-Proliferation. (...) in general, North Korea uses denuclearization as a bargaining chip in times of desperation. 'Usually they suffer some kind of internal crisis, and then start acting in a really threatening way to try to get people to give them stuff,' says Mieke Eoyang, a national security analyst for center-left think tank Third Way."

Mehr lesen


"Haunting Photos of the Hidden War on Terror"

Der Fotograf Edmund Clark hat in den vergangenen Jahren US-Einrichtungen besucht, die im Zusammenhang mit dem amerikanischen "Krieg gegen den Terror" stehen. Seine Bilder werden gegenwärtig in der Ausstellung "The Day the Music Died" in New York präsentiert. "Clark believes that the nearly two-decade-long 'War on Terror' launched by President George W. Bush after 9/11 has subtly permeated our culture and everyday lives in similar ways. Working with investigative journalist Crofton Black, Clark has spent the past decade traveling to black sites, detention facilities, and naval bases around the world, seeking to capture the commonplace reality of horrific practices like torture, extraordinary rendition, and indefinite detention. His goal is to de-sensationalize these locations — and, in doing so, make us realize the War on Terror is all around us."

Mehr lesen


"Scientists Know How You’ll Respond to Nuclear War — and They Have a Plan"

Wie würden sich überlebende Zivilisten in einer Großstadt wie Washington D.C. im Fall eines Atomwaffenangriffs verhalten? US-Wissenschaftler beschäftigen sich Megan Molteni zufolge seit Jahrzehnten mit diesen Szenaren, um Strategien und Notfallpläne zu entwickeln. Forscher wie Chris Barrett vom Biocomplexity Institute of Virginia Tech könnten bei ihren Simulationen mittlerweile auf riesige Datensätze und Rechnerkapazitäten zurückgreifen. "In addition to information about where they live and what they do, each synthetic Washingtonite is also assigned a number of characteristics following the initial blast — how healthy they are, how mobile, what time they made their last phone call, whether they can receive an emergency broadcast. And most important, what actions they’ll take. These are based on historical studies of how humans behave in disasters. Even if people are told to shelter in place until help arrives, for example, they’ll usually only follow those orders if they can communicate with family members. They’re also more likely to go toward a disaster area than away from it — either to search for family members or help those in need. Barrett says he learned that most keenly in seeing how people responded in the hours after 9/11."

Mehr lesen


"What Would Really Happen If Russia Attacked Undersea Internet Cables"

Louise Matsakis schreibt angesichts jüngster Warnungen aus NATO-Ländern vor russischen U-Boot-Aktivitäten in der Nähe von transatlantischen Datenkabeln, dass die Sorge vor den Folgen einer möglichen Sabotage nach Ansicht von Experten übertrieben sei. "The world’s internet infrastructure is vulnerable, but Russia doesn't present the greatest threat. There are plenty of more complicated problems, that start with understanding how the cable system actually works. (...) For one, ruptures aren’t exactly an anomaly. One of the estimated 428 undersea cables worldwide is damaged every couple of days. Nearly all faults aren’t intentional. (...) That means Russia snipping a handful of cables in the Atlantic, where its submarines have been spotted, would disturb the global internet very little. In fact, even if it ruptured every single cable in the Atlantic Ocean, traffic could still be re-routed the other way, across the Pacific. (...) That’s not to say that the world’s undersea cables aren’t at risk, or that they don’t need protection — especially in areas of the world with less internet infrastructure, like Africa and some parts of Southeast Asia. When a fault happens there, the consequences can be more severe, including genuine internet disruption."

Mehr lesen


"Exclusive: Tracing ISIS’ Weapons Supply Chain—Back to the US"

Brian Castner berichtet in dieser umfassenden Reportage, wie es dem "Islamischen Staat" offenbar gelingen konnte, mit Hilfe von amerikanischen Materialien eine eigene Massenproduktion von Waffen und Munition auf die Beine zu stellen. "In Syria and Iraq, ISIS fighters are in retreat, losing ground to government forces and becoming increasingly constrained in their attacks and ambitions. But their intellectual capital—their weapon designs, the engineering challenges they’ve solved, their industrial processes, blueprints, and schematics — still constitute a major threat. (...) Much of the international structure that prevents weapons trafficking is rendered useless if ISIS can simply upload and share their designs and manufacturing processes with affiliates in Africa and Europe, who also have access to money and machinery. (...) They have already shown they can produce a nation-state’s worth of weapons, and their manufacturing process will only become easier with the growth of 3-D printing."

Mehr lesen


"North Korea’s Latest Missile Test Puts the Entire US in Range"

Der jüngste Raketentest Nordkoreas hat verdeutlicht, dass theoretisch auch Washington zu den Zielen eines möglichen nordkoreanischen Angriffs gehören könnte. Einige Experten weisen allerdings Brian Barrett zufolge auf technologische Mängel der bisher getesteten Raketen hin, die einen erfolgreichen Angriff in der Praxis wohl verhindern würden. "Setting aside the technological speed bumps, many remain skeptical that North Korea would actually go so far as to launch an ICBM at the United States, given that the reprisal likely would effectively obliterate the country. Instead, experts generally see the ICBM launches as shows of strength designed to prevent US aggression, rather than provoke it. The question once again becomes what, if anything, the US does in response."

Mehr lesen


"Provoking Iran Could Have Unseen Cyber Consequences"

Eine weitere Verschlechterung der Beziehungen zwischen den USA und Iran könnte eine neue Welle von iranischen Cyberangriffen auf westliche Ziele auslösen, schreibt Lily Hay Newman. "Iranian hackers were very active in targeting US and European targets a few years ago, launching waves of powerful DDoS attacks against dozens of financial institutions in 2011 and 2012, and laying groundwork for possible critical infrastructure attacks, including against a dam in New York state. Though these initiatives haven't completely abated, experts note that the country has seemingly shifted its focus in the past couple of years, turning to largely Middle Eastern targets like Saudi Arabia. Solidifying the nuclear agreement in 2015 may not have been the direct cause of the shift, or even related. But experts say it seems as though Iran has taken the last few years to centralize and organize its hacking initiatives, adding more government control and developing more sophisticated operations."

Mehr lesen


"Hacking North Korea Is Easy. Its Nukes? Not So Much"

Trotz der technologischen Überlegenheit der USA habe Nordkorea in der verdeckten Cyberkriegführung nach Ansicht von Experten einige entscheidende Vorteile, schreibt Andy Greenberg. "US hackers can take bites out of the edges of North Korea's infrastructure. But getting to its core — and anywhere close to disrupting or even delaying its nuclear capabilities — will be extremely difficult, they say, if not impossible. (...) the vast majority of North Korea's overall infrastructure still remains disconnected, vastly reducing any footholds for hackers — and making the prospect of compromising its locked-down and air-gapped nuclear weapons systems all the more daunting. (...) For years, US officials and analysts have warned that North Korea's anachronistic separation from the internet would be transformed into an advantage in an age of state-sponsored hacking. In his 2010 book Cyberwar, former US counterterrorism czar Richard Clarke ranked countries by their cyber-conflict preparedness. He placed North Korea first, and the US dead last, based on their diametrically opposed reliance on the internet."

Mehr lesen


"A Fishy Wikileaks Dump Targets Russia For a Change"

WikiLeaks hat ein Dossier mit geheimen Dokumenten über Einzelheiten der Überwachung russischer Bürger durch Regierungsbehörden veröffentlicht. Lily Hay Newman schreibt, dass die Informationen nicht so spektakulär seien, wie frühere Leaks über amerikanische Praktiken. Experten hätten die Veröffentlichung dennoch begrüßt. "(...) security and privacy analysts agree that the documents support, rather than expand, the existing picture of how Russian surveillance works. But with oppressive surveillance and censorship posing an increasingly grim human-rights threat in Russia, experts caution against writing the release off altogether. 'It doesn’t solve the problem that we know very few things about what’s going on on the side of the FSB,' says Andrei Soldatov, a Russian journalist who specializes in investigating digital surveillance and Russian government intelligence like the Federal Security Service. 'But nevertheless I decided that I need to praise this release, because it’s more than nothing. At least we got some hint about the data exchange interface between telecoms and secret services.'"

Mehr lesen


"How the US Can Counter Threats from DIY Weapons and Automation"

Nach Ansicht des früheren nationalen Geheimdienstdirektors Michael Dempsey wird sich das Umfeld amerikanischer Sicherheitspolitik in den kommenden Jahren durch drei neue Trends spürbar verändern. "First, consider the growth in automation, and the automated car market specifically. (...) It isn’t hard to imagine how terrorist groups or ill-intentioned state actors could adapt this technology in frightening ways. (...) A second underappreciated threat is the proliferation of sophisticated conventional weapons and capabilities. (...) A third emerging threat is the steady erosion of the US's advantage in the area of information awareness. (...) It’s not an exaggeration to say that an average person in many parts of the world can now get on the internet and within an hour purchase a small drone, GPS guidance system, and high-resolution camera, and thereby have the ability to acquire information that would have been unthinkable even a generation ago, including on US military bases and critical weapons storage sites."

Mehr lesen


"For Superpowers, Artificial Intelligence Fuels New Global Arms Race"

Die Großmächte USA, China und Russland sind sich US-Experten zufolge darin einig, dass der Einsatz künstlicher Intelligenz bei der Entwicklung ihrer militärischen Machtposition eine zentrale Rolle spielen wird. "The US, widely recognized as home to the most advanced and vibrant AI development, doesn’t have a prescriptive roadmap like China’s. But for several years the Pentagon has been developing a strategy known as the 'Third Offset,' intended to give the US, through weapons powered by smart software, the same sort of advantage over potential adversaries that it once held in nuclear bombs and precision-guided weapons. (...) Russia lags behind China and the US in sophistication and use of automation and AI, but is expanding its own investments through a military modernization program begun in 2008. (...) The AI race among the world’s three largest military powers differs from earlier competitions like those to deploy nuclear weapons or stealth technology because much artificial intelligence technology can be used for both commercial and military applications."

Mehr lesen


"North Korea’s Missile Shot Over Japan Calls Trump’s Bluff"

Einige Experten betrachten den jüngsten Raketenabschuss Nordkoreas Lily Hay Newman zufolge als Teil einer Kampagne, die im Verlauf des Jahres zu weiteren Vorfällen und möglicherweise einem neuen Atomwaffentest führen könnte. "Just last week, secretary of state Rex Tillerson remarked that Pyongyang had 'demonstrated some level of restraint that we have not seen in the past,' and Trump added that same day that he thought Kim Jong-un was beginning to respect the US. This week's missile test rebuffs that interpretation. 'I don’t think [Tillerson] understands North Korea’s thinking. North Korea is very adept at incrementally ratcheting up the pressure to see what the response is,' Aum says. 'They are going to continue with their tests and we can expect provocations for the rest of the year — it may ultimately get to a sixth North Korean nuclear test. So the real question is what President Trump’s response is going to be. If he doesn’t do anything, then that diminishes the credibility of our deterrence and makes him look weak. If he does do something along the lines of 'fire and fury' then we’re heading toward nuclear escalation, so either way it’s a bad situation.'"

Mehr lesen


"Sorry, Banning 'Killer Robots' Just Isn’t Practical"

Simonite bezweifelt nach der von internationalen Experten formulierten Warnung vor "Killer-Robotern", dass sich eine Ächtung derartiger Waffensysteme durch die UNO tatsächlich umsetzen ließe. "A recent report on artificial intelligence and war commissioned by the Office of the Director of National Intelligence concluded that the technology is set to massively magnify military power. Greg Allen, coauthor of the report and now an adjunct fellow at nonpartisan think tank the Center for New American Security, doesn’t expect the US and other countries to be able to stop themselves from building arsenals of weapons that can decide when to fire. 'You are unlikely to achieve a full ban of autonomous weapons,' he says. 'The temptation for using them is going to be very intense.'"

Mehr lesen


"Instagram’s Kevin Systrom Wants to Clean Up the Internet"

Nicholas Thompson berichtet in diesem ausführlichen Magazinbeitrag von Wired, dass große Tech-Unternehmen wie Instagram und Facebook in Silicon Valley dabei seien, ihre Interpretation der Meinungsfreiheit zu ändern. "In 2012, an executive at [Twitter] referred to the platform as the 'free speech wing of the free speech party.' Now that period in Twitter’s corporate lifetime looks like a moment of naive idealism: the creation of young men who didn’t understand the depths to which sexism, and maybe even fascism, lurk within the human id. (...) And so the notion of free speech is shifting at the companies that run the internet. (...) To [Kevin Systrom, the CEO of Instagram,] it’s pretty simple: Freedom of speech does not mean the freedom to shitpost. (...) Jackson Colaco makes the same point more sharply. 'If toxicity on a platform gets so bad that people don’t even want to post a comment, they don’t even want to share an idea, you’ve actually threatened expression.' Her comment raises a new problem, though: How exactly do you know when restricting speech helps speech? When is less more and when is less less?"

Mehr lesen


"The World May Be Headed for a Fragmented 'Splinternet'"

Die staatlichen Bemühungen um eine stärkere Regulierung großer Internetkonzerne lassen Davey Alba befürchten, dass das Netz künftig weltweit durch immer enger gefasste juristische Einschränkungen geprägt werden wird. "'There’s a risk of a race to the bottom here,' says Vivek Krishnamurthy, assistant director of Harvard Law School’s Cyberlaw Clinic, who specializes in international internet governance. 'Anything that’s mildly controversial is probably illegal in some authoritarian country. So we could end up with a really sanitized internet, where all that’s left is cute cat photos.' (...) 'The way the trend is going, there is a lot of pressure directed at breaking the internet, this global network, into a national network with interconnections,' says Krishnamurthy. 'It could change what the internet looks like in five or ten years.' If internet users, tech companies, governments, and advertisers want to keep that from happening, now's the time to come together and conceive a plan."

Mehr lesen


"Latest Ransomware Hackers Didn't Make WannaCry's Mistakes"

Sieben Wochen nach dem WannaCry-Angriff sind prominente Ziele in aller Welt erneut Opfer einer massiven Cyberattacke geworden. Lily Hay Newman schreibt, dass die diesmal verwendete Schadsoftware deutlich ausgeklügelter sei. "Some researchers call this new iteration 'NotPetya' or 'GoldenEye,' while others still refer to it as Petya. Regardless of the name, it has already hit 2,000 targets, seizing the systems of high-profile victims like Danish shipping giant Maersk, US pharmaceutical company Merck, and multiple private and public institutions in Ukraine. And while it owes its rapid spread in part to EternalBlue, the same stolen NSA exploit WannaCry leveraged, it lacks several of the traits that made WannaCry — which turned out to be an unfinished North Korean project gone awry — easier to stop."

Mehr lesen


"Feds Charge NSA Contractor Accused of Exposing Russian Hacking"

Kurz nach der Veröffentlichung des Intercept-Artikels über mutmaßliche russische Hackerangriffe im US-Wahlkampf ist Reality Leigh Winner, Mitarbeiterin eines NSA-Dienstleisterunternehmens, wegen der angeblichen Weitergabe des geheimen NSA-Dokuments verhaftet worden. "That near-instant outcome for Winner underscores the grave risks of sharing top secret information — and the pitfalls of public-interest journalism that depends on illegal leaks. (...) Winner’s real mistake, according to the complaint, was emailing with the Intercept’s reporters from her work computer. When investigators checked the computers of their six suspects, they quickly found evidence of her communications with the news outlet — though it’s not clear if those communications took place before or after her leak, or whether they were directly associated with her leaks at all."

Mehr lesen


"Don’t Read Too Much Into That Successful Missile Defense Test"

Das US-Militär hat den Abschuss einer Interkontinentalrakete durch ein Raketenabwehrsystem offenbar erfolgreich simuliert. Brian Barrett schreibt, dass derartige Tests unter genau kontrollierten Bedingungen stattfinden und der Erfolg deshalb nicht als Beleg für einen effektiven Schutz interpretiert werden sollte. "Think instead of the $244 million test as a competent recital, a choreographed display of US missile defense capabilities under optimal conditions. It leaves open the question of how the so-called Ground-based Midcourse Defense system would perform under real-world conditions — and how North Korea might respond to this latest demonstration of a system that US has spent almost two decades testing."

Mehr lesen


"Why Governments Won’t Let Go of Secret Software Bugs"

Lily Hay Newman erwartet nicht, dass die Regierungen und Geheimdienste nach der globalen "WannaCry"-Hackerattacke darauf verzichten werden, entdeckte kritische Lücken im Internet geheim zu halten bzw. für eigene Zwecke zu nutzen. "(...) one concrete thing agencies can do to reduce incidental impact is devote even more resources and effort to securing their digital tools. Perfect security is impossible, but the more control intelligence groups can maintain, the less danger these spy tools pose. 'You cannot do modern espionage without these capabilities,' [Jason Healey, a cyberconflict researcher at Columbia University,] says. 'If you want to know what the Islamic State is doing if you want to keep track of loose nukes in central Asia, if you want to follow smugglers who are trying to sell plutonium, this is the core set of capabilities that you need to do that. [But] a minimum role of public policy is if you’re going to weaponize the IT made by US companies and depended on by citizens, for fuck’s sake at least keep it secret. If you’re going to have to do this, then don’t lose it.'"

Mehr lesen


"The 'Chilling Effect' of Trump’s Loose Talk With Russia"

Brian Barrett schreibt, dass der möglicherweise zu sorglose Umgang des US-Präsidenten mit vertraulichen Geheimdienstinformationen Auswirkungen auf den Informationsaustausch mit verbündeten Ländern haben könnte. "Those relationships stem from years of treaties and allegiances forged through the years, which can make any decision on what gets shared, with whom, a complicated dance. 'You have to balance it out. How much do we share? Are they part of this group? What are they entitled to? What are the expectatons?' says [Keith Lowry, a former Department of Defense chief of staff]. 'There’s a lot of politics and honoring of politics and agreements that goes into who gets to share what information.' Sharing information with an unexpected partner subverts those considerations. It could also expose chains of intelligence; a piece of information may shift from France to Germany to the US in a game of international-spy telephone. Protecting where the intel came from can be as important as protecting the information itself. And it can reveal many secrets to an adversary."

Mehr lesen


"A Big Change in NSA Spying Marks a Win for American Privacy"

Die NSA will die Massenüberwachung der Online-Kommunikation der US-Bürger eigenen Angaben zufolge künftig einschränken. Andy Greenberg schreibt, dass Datenschutzexperten diesen Schritt "vorsichtig" als Teilsieg werten. "'NSA will no longer collect certain internet communications that merely mention a foreign intelligence target,' reads a statement from the agency. 'Instead, NSA will limit such collection to internet communications that are sent directly to or from a foreign target.' (...) while privacy advocates applaud that move, they also argue it’s not enough. Instead of leaving the decision to the NSA’s discretion or secret court rulings, Congress should encode the rollback in law when it renews the Foreign Intelligence Surveillance Act later this year, says OTI’s Robyn Greene."

Mehr lesen


"Step Inside a Saudi Rehab Prison for Jihadists"

Der Fotograf David Degner hat ein saudi-arabisches Gefängnis besucht, in dem radikalislamische Extremisten umerzogen werden sollen. "You don’t expect to find queen-sized mattresses, minibars, or an indoor swimming pool in prison - must less a prison for suspected terrorists. Yet the 1,000 or so men accused of such crimes enjoy a rather comfortable life that includes conjugal visits at Al Ha’ir, a Saudi Arabian rehabilitation center taking an unusual approach to waging the war on terror. 'Their goal isn’t to incentivize through discomfort, but to incentivize through comfort and knowledge, asking the hard philosophical questions about religion,' says photographer David Degner, who got a rare look inside Al Ha’ir. (...) 'From the outside this might look like it’s a soft touch, treating jihadists, some of whom have blood on their hands, with kit gloves, but I can assure you it’s not,' [John Horgan, a psychologist at Georgia State University,] says. 'There’s always the threat of coercion or the possibility that the family members may be mistreated or even imprisoned if the former detainee goes back to his old ways. There’s always the threat of sanction hanging over the air.'"

Mehr lesen


"The CIA Leak Exposes Tech’s Vulnerable Future"

Die WikiLeaks-Enthüllungen über die Hackerwerkzeuge der CIA verdeutlichen nach Ansicht von Jason Tanz, wie verwundbar die vielen vernetzten technischen Geräte sind, die heute im Westen von den meisten Menschen genutzt werden. "The Vault 7 leak is not the tech industry’s fault, exactly, but we must ask at what point we stop placing our trust in devices, systems, and people that are inherently undeserving of it? Actually, never mind, we’re past it already. The most troubling aspect of the latest revelations is that there is no way to protect yourself beyond not buying a smartphone, or at least not having any meaningful conversations when you are in the same room with one. These vulnerabilities and cracks are not optional, but woven throughout the fabric of our social and commercial lives. They are coming from inside the house."

Mehr lesen


"Mass Spying Isn’t Just Intrusive — It’s Ineffective" hat einen Abschnitt aus dem Buch "American Spies: Modern Surveillance, Why You Should Care, and What to Do About It" von Jennifer Stisa Granick ins Netz gestellt. Die Autorin erläutert am Beispiel des Terroranschlags in Boston am 15. April 2013, warum die Massenüberwachung der amerikanischen Bevölkerung durch die US-Geheimdienste keine greifbaren Erfolge vorweisen könne. "The Boston Marathon bombing in April of 2013 illustrates how broad proactive surveillance is no panacea against attacks. The NSA was conducting its massive spying at the time, and the attacks happened anyway. (...) Following classified and public hearings, Senator Leahy and other members of Congress concluded that there was no evidence that the phone records collection has ever been important in fighting terrorism. A subsequent review by the Privacy and Civil Liberties Oversight Board reached the same conclusion. Hundreds of thousands of Americans have had their phone records collected for years, but it hasn’t made the country any safer."

Mehr lesen


"Trump’s Still Using His Old Android Phone. That’s Very, Very Risky"

US-Präsident Trump weigert sich bisher offenbar, den Gebrauch seines ungesicherten Android-Smartphones aufzugeben. "Even if you’re not a security expert, some potential dangers of keeping an insecure device in the White House probably come to mind right away. There’s a reason President Obama had to make do with a heavily modified BlackBerry for most of his time in office, and why security officials reportedly issued Trump a locked-down device when he took office. One that he apparently doesn’t always use. (...) Attempts to reach the White House to confirm that Trump is still using his personal Android phone were unsuccessful, and if there’s a silver lining it’s that Trump famously does not use email, which should reduce his digital exposure."

Mehr lesen


"Can You Turn A Terrorist Back Into A Citizen?"

Brendan I. Koerner stellt in dieser ausführlichen Wired-Reportage ein neues Programm im US-Bundesstaat Minnesota vor, mit dem einheimische IS-Anhänger zu "normalen jungen Amerikanern" umerzogen werden sollen. "The future of deradicalization in the US could well depend, then, on how effectively [Abdullahi Yusuf] is able to tell his own story. He’s a long way from even attempting that right now as he adjusts to life in the halfway house: [Daniel Koehler] emphasizes that Yusuf is still in a fragile place. But if he can take full advantage of his rare second chance and rejoin civil society, Yusuf will become a living exemplar of the idea that there can, indeed, be a road back from extremism. His redemption would affirm that those naive enough to join what are essentially death cults should never feel like all is lost, and that American society should think twice before treating them as such."

Mehr lesen

suche-links1 2 3 4 5 6 7suche-rechts

Hier finden Sie die Redaktion der Sicherheitspolitischen Presseschau.

Mehr lesen



Europa, Asien, Afrika, Amerika und weltweite Phänomene und Institutionen. Die bpb bietet ein breites Angebot zu internationalen Themen.

Mehr lesen


Informationsportal Krieg und Frieden

Wo gibt es Kriege und Gewaltkonflikte? Und wo herrscht am längsten Frieden? Welches Land gibt am meisten für Rüstung aus? liefert wichtige Daten und Fakten zu Krieg und Frieden.

Mehr lesen auf


Innerstaatliche Konflikte

Vom Kosovo nach Kolumbien, von Somalia nach Süd-Thailand: Weltweit schwelen über 280 politische Konflikte. Und immer wieder droht die Lage gewaltsam zu eskalieren.

Mehr lesen

Zahlen und Fakten


Kaum ein Thema wird so intensiv und kontrovers diskutiert wie die Globalisierung. "Zahlen und Fakten" liefert Grafiken, Texte und Tabellen zu einem der wichtigsten und vielschichtigsten Prozesse der Gegenwart.

Mehr lesen

Publikationen zum Thema

Coverbild Internationale Sicherheit im 21. Jahrhundert

Internationale Sicherheit im 21. Jahrhundert

Die internationale Sicherheit ist fragil und bedroht. Wie können und müssen demokratische Systeme ...

Internationale Sicherheitspolitik Cover

Internationale Sicherheitspolitik

Seit Ende des Ost-West-Konflikts hat sich die internationale Sicherheitspolitik deutlich verändert....

Zum Shop