Morning Security Brief: Military Gangs, Nuclear Weapons, Hacker Recruitment, and More

By Carlton Purvis

►According to the FBI’s 2011 gang assessment, gang members are present in every branch of the U.S. military and especially concentrated in the Army, Army Reserves, and National Guard. “The report says the military has seen members from 53 gangs and 100 regions in the U.S. enlist in every branch of the armed forces,” Business Insider reports. The FBI report says many gang members join the military to escape the lifestyle, but often revert back to their gang associations. It also says many gangs actively recruit military members for access to weapons and for their combat experience.

►The Nuclear Safety Administration announced on Monday that it has dismantled the last of a group of 10,000-pound nuclear bombs left over from the Cold War-era. This bomb, formerly the most destructive weapon in the U.S. arsenal, had the potential to produce an explosion 600 times more powerful than Hiroshima. By 2012, the U.S. hopes to reduce its operationally deployed nuclear weapons to between 1,700 and 2,200 by 2012 as part of a treaty with Russia, Business Week reports.

►In Maryland, a two-day conference held to recruit the next generation of cybersecurity specialists asked participants to demonstrate their skills behind a computer. College students participated in an exercise where they were asked to hack into a computer and mine valuable information. High-schoolers were challenged to defend a computer network from attacks by professional hackers. At events like these, ethical hackers who attract the attention of NSA talent scouts could win scholarships and other perks under the Stokes Educational Scholarship Program. The program offers full tuition and summer jobs at the NSA.

►In other news, India adds laws to automatically deny bail for customs violations. It also added a rule requiring a warrant for all customs arrests. ⇒Retail organizations and law enforcement are hiring more security and monitoring social media in preparation for holiday ‘flash robs.’ ⇒ And researchers find a way to identify Skype users who are using BitTorrent to share files.



View Recent News (by day)


Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.