-
Cybercrime gangs highly structured
The chain of command of a cybercrime gang is not unlike the Mafia, an evolution which shows how online crime is becoming a broad, well-organized endeavor
-
-
New Jersey's Stevens Tech to lead research on port security
Hoboken is poised to become a center for research into port security
-
-
GAO strongly criticizes DoE over Hanford clean-up
More than 210 million liters of radioactive and chemical waste are stored in 177 underground tanks at Hanford in Washington State; most are more than fifty years old; GAO says there now “serious questions about the tanks’ long-term viability”
-
-
Bioterrorism rule ineffective in salmonella outbreak
Rules and regulations passed in the wake of 9/11 were supposed to tighten monitoring and tracking food items, so an outbreak of food-borne illness could be quickly traced to its source; food supply-chain practices make these rules and regulations difficult to implement
-
-
U.S. intelligence services aware of vast Chinese espionage campaign
Multifaceted Chinese espionage campaign in the United States and other Western countries aims not only to steal military secrets, but also industrial secrets and intellectual property in order to help Chinese companies better compete in the global economy; Chinese government and state-sponsored industries have relied not only on trained intelligence officers, but also on the Chinese diaspora — using immigrants, students, and people of second- and third-generation Chinese heritage
-
-
Homeland security experts on priorities for next administration
Experts: The next administration’s top four homeland security priorities should be border security, emergency response, development of medical counter-measures to weapons of mass destruction, and port security
-
-
Ground fighting and its tactical applications
Every grappler, Jiu-Jitsu practitioner, and wrestler thinks that if he can take the fight to the ground, he will win; there are, however, a few inherent problems with this approach
-
-
Federal money for identity programs boost biometrics market
A slew of U.S. government programs — US VISIT, the Real ID Act, TWIC, the FBI’s next-generation database, and many more — depend on biometric technology; the estimated value of potential contracts to implement federal identity-solutions programs has more than doubled since 2006, rising from $890 million to $2 billion this year; biometric companies fiercely compete — and lobby — for contracts
-
-
An HS Daily Wire conversation with Walter Hamilton of the International Biometrics Industry Association (IBIA)
Walter Hamilton, chairman of the Board of Directors of IBIA, talks about different biometric technologies, new and innovative biometric approaches, the role of biometric in security and commerce, biometrics in the theater of battle, and more
-
-
September to be U.S. National Preparedness Month
DHS says that more than 1,200 national, regional, state, and local businesses and organizations have pledged their support for the department’s initiative
-
-
Banks' PIN codes susceptible to hackers' theft
Network of PIN codes’ thieves nets millions of dollars; hackers are targeting the ATM system’s infrastructure, which is increasingly built on Microsoft’s Windows operating system and allows machines to be remotely diagnosed and repaired over the Internet
-
-
$30.5 billion U.S. loan guarantees for advanced energy technology
The U.S. Department of Energy issues three solicitations for a total of up to $30.5 billion in loan guarantees for projects that employ advanced energy technologies that avoid, reduce, or sequester air pollutants or greenhouse gas emissions
-
-
Pentagon's IG resigns
Claude Kicklighter, who took over as Pentagon inspector general in April 2007, has accepted a teaching position at George Mason University; he will be executive director of the university’s Critical Infrastructure Protection Project
-
-
DHS, Pentagon plan for transition of power
DHS, DOD, and the intelligence community are putting procedures in place to allow for smooth and seamless transition of power to the new administration in January; first war-time transition of power in more than forty years
-
-
U.S.-EU private data sharing agreement near
The United States and the EU are near an agreement to share private data of their citizens, including credit card information, travel history, and internet browsing information; one issue yet to be resolved: the right of EU citizens to sue the U.S. government for mishandling the information
-
More headlines
The long view
Economic Cyberespionage: A Persistent and Invisible Threat
Economic cyber-espionage, state-sponsored theft of sensitive business information via cyber means for commercial gain, is an invisible yet persistent threat to national economies.
Researchers Calculate Cyberattack Risk for All 50 States
Local governments are common victims of cyberattack, with economic damage often extending to the state and federal levels. Scholars aggregate threats to thousands of county governments to draw conclusions.
How DHS Laid the Groundwork for More Intelligence Abuse
I&A, the lead intelligence unit of the Department of Homeland Security (DHS) —long plagued by politicized targeting, permissive rules, and a toxic culture —has undergone a transformation over the last two years. Spencer Reynolds writes that this effort falls short. “Ultimately, Congress must rein in I&A,” he adds.
Southport Attacks: Why the U.K. Needs a Unified Approach to All Violent Attacks on the Public
The conviction of Axel Rudakubana for the murder of three young girls in Southport has prompted many questions about how the UK handles violence without a clear ideological motive. This case has also shown up the confusion in this area, and made clear the need for a basic reframing of how we understand murderous violence against the public today.
Water Is the Other U.S.-Mexico Border Crisis, and the Supply Crunch Is Getting Worse
The United States and Mexico are aware of the political and economic importance of the border region. But if water scarcity worsens, it could supplant other border priorities. The two countries should recognize that conditions are deteriorating and update the existing cross-border governance regime so that it reflects today’s new water realities.
Sweden’s Deadliest Mass Shooting Highlights Global Reality of Gun Violence, Criminologist Says
“We in the United States don’t have a monopoly on mass shootings,” James Alan Fox says, “though we certainly have more than our share.”