The president summarizes his fourth – and final – Nuclear Security Summit
“VOA will present the policies of the United States clearly and effectively, and will also present responsible discussion and opinion on these policies.” — VOA Charter
‘We Didn’t Just Come Here to Talk, But We Came Here to Act’
The Thin Line Between Privacy and Security
After the horrific and deadly terrorist attack in San Bernardino, California at a work holiday party, the Federal Bureau of Investigation (FBI) began its work: what drove the suspects – a Muslim couple with an infant – to kill 14 people? Were they acting at the behest of ISIS? Investigators found the iPhone of Syed Farook, but couldn’t get past the passcode to examine his contacts. Apple CEO Tim Cook refused an FBI order to create a coded “backdoor.” Critics called foul, accusing the FBI of looking for a case with which it could set a legal precedent. Cook held firm. Privacy protests erupted. This week, the FBI announced it used a third party to successfully hack the smartphone. Obvious questions were immediately raised: why did U.S. authorities try to legally compel Apple to create a backdoor? Who wins in such cases? Are we safer when officials can force digital companies to make hackable products? Or, must personal privacy always trump security?
How Terrorists Convince Themselves to Kill
The less we empathize with someone, the easier it is to kill them. Jihadist culture is exceptionally good at decreasing empathy for outsiders, Muslim and non-Muslim alike…