In May 2014, five “Comment Crew” Chinese hackers were charged with criminal hacking, and espionage after gaining access to the defense contractors involved with Israel’s Iron Dome rocket defense system and downloading files related to UAVs, Arrow III missiles, and the Iron Dome. They also installed malware to give themselves even greater access to the contractors’ networks. How did they do it? Phishing emails.
You may be dead, but the U.S. government won’t take you off its terrorist roster. A deceased person’s name may stay on the list because such an identity could be used as an alias by a suspected terrorist.
The National Center for Credibility Assessment (NCCA) is developing an interview system that uses a responsive on-screen avatar for the first stage of the national security clearance process because people are actually more likely to admit things to the robot. The study notes that computer-generated interviewers might help mitigate the gender and culture bias that affects human interviewers.
If you have an internet connection, you’re a terrorist. If you have friends in the Middle East, you’re a terrorist. If you watched the Dark Knight and loved it, you’re a terrorist. If you travel, you’re a terrorist. If you’re reading this right now, you’re a terrorist.
“Instead of a watchlist limited to actual, known terrorists, the government has built a vast system based on the unproven and flawed premise that it can predict if a person will commit a terrorist act in the future” -Hina Shamsi (ACLU National Security Project)