Hubbard Radio Washington DC, LLC. All rights reserved. This website is not intended for users located within the European Economic Area.
In this radically new information environment, the enemy no longer depends on traditional media. This is the \"YouTube War.\" Details from Dr. Cori Dauber, a professor of Communication Studies.
The Department of Defense has announced it will use the FBI-owned and maintained eGuardian suspicious activity reporting system as a long-term solution to ensure access to appropriate threat information. The announcement follows two years of analysis and a six-month pilot program, and a recommendation this past January by the DoD Independent Review related to the shootings at Fort Hood that DoD adopt a reporting system for documenting, storing, and exchanging threat information. Those using the system will be trained with regard to the protection of civil liberties. Through its use, DoD law enforcement and security personnel will be able to share potential terrorist threats, terrorist events, and suspicious activity information with other state, local, tribal, federal law enforcement agencies, state fusion centers, and the FBI\'s Joint Terrorism Task Force.
June 15th The rapid convergence of security technologies combined with growing concerns about individual privacy are creating a need to understand the purpose of identification and credentialing in your environment and the impact on the public. Financial institutions and commercial services are adopting high tech methods to protect consumer access to convenient online transaction systems. Governments have adopted electronic identity documents to facilitate fast and convenient border crossing including ePassports, enhanced driver\'s licenses, and RFID Passport cards. We are all aware of public space surveillance systems to reduce street crime in urban centers. Proposed identity credentials are to provide a trusted citizen identification solution for employment authorization including biometric verification. How will these identification systems foster trust and confidence by consumers that their personal information is secure and protected? Join us for a discussion with experts in the field of identification and credentialing to learn about how these innovations can meet security and consumer needs while managing the impact on privacy and civil liberties.
The suspect in a botched car bombing in Times Square appeared in court Tuesday on terrorism and weapons charges for the first time since his arrest two weeks ago and was quickly led away in handcuffs after being held without bail. National Security Correspondent JJ Green tells us what we\'re learning from the incident
How would the military carry on in the event that an enemy manages to meltdown the DoD\'s digital information infrastructure? We get thoughts from Air Force Major General Kevin Kennedy, Director for Joint Capability Development (J8), U.S. Joint Forces Command.
The online project took an innovative approach to engaging stakeholders from all walks of life and getting fresh and realistic ideas about security onto the table. Liam Cleaver, the global program director in IBM\'s Jam Program Office, explains the event.
The Office of Infrastructure Protection leads the coordinated national program to reduce and mitigate risk within commercial facilities, including sports arenas. DHS Assistant Secretary Todd Keil tells us about a conference exploring the issue.
Osama bin Laden had no idea the U.S. would hit al-Qaida as hard as it has since the Sept. 11, 2001 attacks, a former bin Laden associate tells National Security Correspondent JJ Green in an exclusive interview.
Digital copiers pose security danger, \'kindergarten hacker\' cracks teacher\'s password
As the Navy considers fielding a stealthy unmanned combat aircraft as part of a carrier strike group as early as 2018, the rest of the world wants UAVs too! We get an update from the Director of Intelligence, Surveillance and Reconnaissance Capabilities for the Navy, Rear Admiral Terry Kraft
Lt. Gen. Keith Alexander tells lawmakers that the organization \"will not militarize cyberspace.\" He also details how the Cyber Command will help DHS protect .gov and .com networks. Senate Armed Services Members say Alexander is well-qualified to lead the command.
A top veteran CIA officer is retiring after a sometimes tumultuous career with the agency.
David Kay, former UN Chief Weapons Inspector, looks at al Qaida and nuclear materials on The Hunt.
We\'re starting a new weekly segment today called Science and National Security. Each week, Institute for Homeland Security Director Randy Larsen will bring us an interview with someone in the national security arena. In today\'s edition, he speaks with Dr. Michael Nelson, a visiting professor at Georgetown and former director of technology for the Federal Communications Commission, on the future and security of cloud computing.