• Bill bolsters DHS’s cybersecurity workforce

    A House panel recently approved HR 3107, a bill aiming to bolster DHS’s cybersecurity workforce. The House Homeland Security Committeeamended the Homeland Security Cybersecurity Boots-on-the-Ground Actto expand DHS’ outreach to candidates for IT security jobs by creating a tuition-for-work fellowship and a program to recruit military veterans and unemployed IT specialists for DHS employment.

  • DHS, FDA: Decorative contact lenses for Halloween costumes are risky

    Many will celebrate Halloween today, and federal officials are warning the public about the dangers associated with counterfeit decorative contact lenses. Decorative and colored lenses are becoming increasingly popular, especially around this time of year. Several federal agencies have teamed up to launch Operation Double Vision – already underway — to seize illegal, harmful products from store shelves.

  • Johnson’s nomination marks shift in DHS focus

    Analysts say that President Barack Obama’s nomination of Jeh Johnson to replace Janet Napolitano as head of the Department of Homeland Securityis an indication of a shift in DHS priorities — from a focus on immigration and border issues to a focus on security and counterterrorism.

  • Best way to stop a killer asteroid? Form a committee

    By Alan Duffy

    The United Nations (UN) has adopted several recommendations of a new asteroid defense plan, the first steps in preventing Earth from being struck by an asteroid. The recommendations were a response to an asteroid strike earlier this year in Chelyabinsk, Russia. This object injured thousands and was around seventeen meters across. We have only found 1 percent of these “killer” asteroids, meaning there are hundreds of times more out there than we know of. One of them, sooner or later, will have our name written on it. For a global threat we need a global response, as well as a global share of the blame if it goes wrong.

  • Corrupt practices: U.S. visa-granting easily compromised

    By Grant M. Lally

    While serving as a Foreign Service Officer in Guyana, Thomas Carroll sold visas to anyone who would pay, making millions of dollars in the process. Carroll’s scheme differed from the petty favors and kick-backs, which had typified FSO visa fraud in other embassies and consulates, mostly in scale. He took retail visa fraud and made it wholesale.

  • U.S. tech companies increase lobbying efforts related to surveillance, NSA

    Technology firms Apple, Google, Facebook, and Microsoft, among other tech powerhouses, are quietly increasing lobbying efforts directed at government surveillance laws as they seek to have a say in what Congress does regarding surveillance reforms and National Security Agency (NSA) programs. Traditionally, tech firms have not pushed for restrictions on the ability of the U.S. intelligence community to collect data, and it is not clear what position these industry leaders will take, whether they plan to take a position at all, or whether they will present lawmakers with a united industry front.

  • Preventing a “cyber Pearl Harbor”

    By Paul Goldenberg

    Cyber-security has become the new homeland security of the decade. Last year, then- Defense Secretary Leon Panetta issued a call to arms against cyberattacks, warning that sophisticated attacks against the United States could be America’s next “cyber Pearl Harbor.” It is imperative that we apply the same level of awareness and action as we have to the physical security of our facilities to ensure our security against this ever-evolving threat.

  • White House to curb NSA monitoring of some allies' leaders

    It appears that President Obama will soon instruct the NSA to stop eavesdropping on leaders of close U.S. allies. It now emerges that both the president and Congress’s intelligence committees were kept in the dark about this aspect of the NSA surveillance program. Yesterday’s indication by the White House that it moving toward banning the NSA from eavesdropping on some foreign leaders is a historic change in the practices of an agency which has enjoyed unlimited and unfettered – and, it now appears, unsupervised – freedom of action outside the borders of the United States. The move is similar to, if more complicated than, the limits imposed on the CIA in the mid-1970s. Security experts note, though, that prohibiting the NSA from eavesdropping on some foreign leaders would be more complicated and potentially more damaging to U.S. interests than the prohibitions imposed on the CIA more than three decades ago.

  • Video imaging system for remote detection of hidden threats

    By adapting superconducting technology used in advanced telescope cameras, researchers have built a prototype video imaging system for detecting hidden weapons and other threats at distances up to twenty-eight meters away.

  • Death of Muslims used by extremists for recruitment, propaganda

    In the last thirty years, conflicts in Afghanistan, Iraq, Bosnia, Chechnya, Somalia, and other countries have caused the death of four million Muslims. The theme of innocent Muslims dying as result of conflicts initiated by Western powers and their allies is a central motif used by Islamic militants to recruit new members. It is a theme which fuels anti-American sentiments in the Middle East and North Africa. Historians and Islamic scholars note that the notion that the West is orchestrating a “genocide” of Muslim is patently false, and that beginning with the Iran-Iraq War (1980-88) and continuing to the present day, more and more casualties are inflicted by Muslims against Muslims. Still, the myth of a non-Muslim genocidal “crusade” against Muslims is powerful, and is one which is effectively used by al Qaeda and other Islamic terrorist groups.

  • Strike Two: The CBP’s failure to polygraph its future employees

    By Robert Lee Maril

    Two recent reports – one by the DHS OIG, the other by the GAO — raise an alarm not just about CBP’s failure to monitor and ameliorate the use of excessive force by its agents and officers, but also call into question the quality and character of CBP’s current work force. Rather than reassure the public that the CBP is transitioning into a modern, professional law enforcement agency, these two reports highlight the need for increased congressional oversight and study of an agency which is so vital to our national security.

  • Preventing a Bhopal-like catastrophe in New Jersey

    New Jersey is home to ninety facilities which produce and store large quantities of highly toxic chemicals. A superstorm or terrorist attack could doom millions of people around southern New Jersey and eastern Pennsylvania to a Bhopal, 1984-like fate if either of these facilities and their storage tanks were affected.Typically, in the aftermath of major disasters, a blue ribbon panel is created to review preventative measures that could have been taken before the disaster. Security experts say that there is no need to wait for a post-disaster blue ribbon panel investigation to know what sensible safety measures should be implemented now.

  • Bolstering the safety, security of U.S. nuclear weapons

    To improve the safety and security of nuclear weapons, specialists must weigh the risks and benefits of making intrinsic changes to the warheads (possibly degrading their performance) or pursuing external changes such as better access controls, according to experts. While improvements such as use of shock- and fire-resistant chemical explosives in the warheads could further decrease the risk of an accidental nuclear detonation or dispersal of plutonium, most of the experts who participated in a workshop on the issue were not greatly concerned about the safety level of the current U.S. nuclear arsenal.

  • “Go ahead, make my day”: Sheldon Adelson on how to deal with Iran

    Casino mogul Sheldon Adelson says that the Obama administration’s negotiations with Iran will lead to nothing, arguing that the best negotiating tactics would be to launch a preemptive nuclear strike on unpopulated areas in Iran – accompanied by a threat to wipe out the entire population of Tehran if Iran refused to give up its nuclear program. Echoing Clint Eastwood, Adelson said that following the nuclear explosion in the desert, Obama should tell the Iranians: “You want to be wiped out? Go ahead and take a tough position and continue with your nuclear development.”

  • Acoustic detection identifies IEDs – and their explosive yield

    A number of different tools are currently used for explosives detection. These range from dogs and honeybees to mass spectrometry, gas chromatography, and specially designed X-ray machines.A new acoustic detection system, consisting of a phased acoustic array that focuses an intense sonic beam at a suspected improvised explosive device, can determine the difference between those that contain low-yield and high-yield explosives.