-
New DHS network still has problems
HSIN was launched in 2004 to provide a secure, Internet-based system to share terrorism information with federal, state, and local agencies and the private sector, but ran into problems; last year DHS decided to replace it with a new system, but that one, too, has problems
-
-
ISF annual congress in Barcelona, 16-18 November
More than 500 IT security leaders will meet in Barcelona in November for the ISF 19th annual congress
-
-
EU moves on data breach notification law
Security professionals debate the recommendations of independent research to introduce tough European data breach and security regulations
-
-
U.K. security services push for expanded surveillance power
U.K. security services are pushing for a massive expansion of electronic surveillance in the United Kingdom, in the face of opposition from the Treasury and the Cabinet Office
-
-
New surveillance program will use military satellites to cover U.S.
President Bush signed bill which allows the National Applications Office (NAO) to begin operating a stringently limited version of a program which would turn military spy satellites on the United States, sharing imagery with other federal, state, and local government agencies
-
-
U.S. government to take counterterrorism local
The federal government says local police efforts to record and share activities that could be related to terrorism are critical to the government’s counterterrorism effort; the creation and coordination of a uniform system of reporting among thousands of jurisdictions is a problem, though
-
-
Security experts call for improved public communications
Experts say the next president needs to ensure that public warnings are based on solid information and that the federal government sends out messages out of an urgent need, not because it wants to distract the public
-
-
SA police to buy mini-UAVs
South Africa is host to the 2010 Soccer World Cup; in preparation, the SA police is buying mini-UAVs and integrating them into the force; the UAV — Kiwit — is carried in a suitcase, weighs 3.5 kg, and can be assembled by a single person in five minutes
-
-
Letter carriers may deliver antibiotics during bioterror attack
The task of delivering medications to citizens during a bioterror attack may fall to volunteer mailmen (and mailwomen); trial in St. Paul
-
-
DHS, NSF announce $3.1 million awards for radiological detection
DHS and NSF give awards to academic institutions to advance research in radiological and nuclear detection
-
-
The "Israeli Lean"
The debate about the most effective shooting stance has divided supporters of the Weaver Stance from proponents of the Isosceles Stance; there is a third stance which offers many advantages: the Israeli Lean, which is based on the Point-Shoot
-
-
Alternatives to the H-1B visa, pt. 2: L-1 "International Transferees"
The demand for H1-B visas far outstrips its supply; one alternative is the L-1 visa which allows companies to transfer employees to, and allows investors to form start-up operations in, the United States
-
-
New nuclear watchdog created
Anti-proliferation activists create the World Institute for Nuclear Security; funded with private and government funds, it will be headquartered in Vienna — next to the IAEA; it aims to facilitate sharing information to improve security at the world’s nuclear sites
-
-
Web browsers affected by Clickjacking
US CERT issues a warning about a new cross-browser exploit technique called “Clickjacking”; clickjacking gives an attacker the ability to trick a user into clicking on something only barely or momentarily noticeable; thus, if a user clicks on a Web page, they may actually be clicking on content from another page
-
-
Stolen laptops "broadcast" their location to rightful owners
Huskies researchers develop a software tool which uses the Internet as a homing beam; if the thief uses the stolen laptop to connect to the Internet, the owner receives information on the laptop location (and Macintosh owners also recvied a picture of the thief)
-
More headlines
The long view
Economic Cyberespionage: A Persistent and Invisible Threat
Economic cyber-espionage, state-sponsored theft of sensitive business information via cyber means for commercial gain, is an invisible yet persistent threat to national economies.
Researchers Calculate Cyberattack Risk for All 50 States
Local governments are common victims of cyberattack, with economic damage often extending to the state and federal levels. Scholars aggregate threats to thousands of county governments to draw conclusions.
How DHS Laid the Groundwork for More Intelligence Abuse
I&A, the lead intelligence unit of the Department of Homeland Security (DHS) —long plagued by politicized targeting, permissive rules, and a toxic culture —has undergone a transformation over the last two years. Spencer Reynolds writes that this effort falls short. “Ultimately, Congress must rein in I&A,” he adds.
Southport Attacks: Why the U.K. Needs a Unified Approach to All Violent Attacks on the Public
The conviction of Axel Rudakubana for the murder of three young girls in Southport has prompted many questions about how the UK handles violence without a clear ideological motive. This case has also shown up the confusion in this area, and made clear the need for a basic reframing of how we understand murderous violence against the public today.
Water Is the Other U.S.-Mexico Border Crisis, and the Supply Crunch Is Getting Worse
The United States and Mexico are aware of the political and economic importance of the border region. But if water scarcity worsens, it could supplant other border priorities. The two countries should recognize that conditions are deteriorating and update the existing cross-border governance regime so that it reflects today’s new water realities.
Sweden’s Deadliest Mass Shooting Highlights Global Reality of Gun Violence, Criminologist Says
“We in the United States don’t have a monopoly on mass shootings,” James Alan Fox says, “though we certainly have more than our share.”