security

  • In this radically new information environment, the enemy no longer depends on traditional media. This is the \"YouTube War.\" Details from Dr. Cori Dauber, a professor of Communication Studies.

    June 07, 2010
  • The Department of Defense has announced it will use the FBI-owned and maintained eGuardian suspicious activity reporting system as a long-term solution to ensure access to appropriate threat information. The announcement follows two years of analysis and a six-month pilot program, and a recommendation this past January by the DoD Independent Review related to the shootings at Fort Hood that DoD adopt a reporting system for documenting, storing, and exchanging threat information. Those using the system will be trained with regard to the protection of civil liberties. Through its use, DoD law enforcement and security personnel will be able to share potential terrorist threats, terrorist events, and suspicious activity information with other state, local, tribal, federal law enforcement agencies, state fusion centers, and the FBI\'s Joint Terrorism Task Force.

    May 31, 2010
  • June 15th The rapid convergence of security technologies combined with growing concerns about individual privacy are creating a need to understand the purpose of identification and credentialing in your environment and the impact on the public. Financial institutions and commercial services are adopting high tech methods to protect consumer access to convenient online transaction systems. Governments have adopted electronic identity documents to facilitate fast and convenient border crossing including ePassports, enhanced driver\'s licenses, and RFID Passport cards. We are all aware of public space surveillance systems to reduce street crime in urban centers. Proposed identity credentials are to provide a trusted citizen identification solution for employment authorization including biometric verification. How will these identification systems foster trust and confidence by consumers that their personal information is secure and protected? Join us for a discussion with experts in the field of identification and credentialing to learn about how these innovations can meet security and consumer needs while managing the impact on privacy and civil liberties.

    May 31, 2010
  • The suspect in a botched car bombing in Times Square appeared in court Tuesday on terrorism and weapons charges for the first time since his arrest two weeks ago and was quickly led away in handcuffs after being held without bail. National Security Correspondent JJ Green tells us what we\'re learning from the incident

    May 19, 2010
  • How would the military carry on in the event that an enemy manages to meltdown the DoD\'s digital information infrastructure? We get thoughts from Air Force Major General Kevin Kennedy, Director for Joint Capability Development (J8), U.S. Joint Forces Command.

    May 13, 2010
  • The online project took an innovative approach to engaging stakeholders from all walks of life and getting fresh and realistic ideas about security onto the table. Liam Cleaver, the global program director in IBM\'s Jam Program Office, explains the event.

    May 10, 2010
  • The Office of Infrastructure Protection leads the coordinated national program to reduce and mitigate risk within commercial facilities, including sports arenas. DHS Assistant Secretary Todd Keil tells us about a conference exploring the issue.

    April 29, 2010
  • Osama bin Laden had no idea the U.S. would hit al-Qaida as hard as it has since the Sept. 11, 2001 attacks, a former bin Laden associate tells National Security Correspondent JJ Green in an exclusive interview.

    April 28, 2010
  • Digital copiers pose security danger, \'kindergarten hacker\' cracks teacher\'s password

    April 20, 2010
  • As the Navy considers fielding a stealthy unmanned combat aircraft as part of a carrier strike group as early as 2018, the rest of the world wants UAVs too! We get an update from the Director of Intelligence, Surveillance and Reconnaissance Capabilities for the Navy, Rear Admiral Terry Kraft

    April 16, 2010
  • Lt. Gen. Keith Alexander tells lawmakers that the organization \"will not militarize cyberspace.\" He also details how the Cyber Command will help DHS protect .gov and .com networks. Senate Armed Services Members say Alexander is well-qualified to lead the command.

    April 16, 2010
  • A top veteran CIA officer is retiring after a sometimes tumultuous career with the agency.

    April 15, 2010
  • David Kay, former UN Chief Weapons Inspector, looks at al Qaida and nuclear materials on The Hunt.

    April 14, 2010
  • We\'re starting a new weekly segment today called Science and National Security. Each week, Institute for Homeland Security Director Randy Larsen will bring us an interview with someone in the national security arena. In today\'s edition, he speaks with Dr. Michael Nelson, a visiting professor at Georgetown and former director of technology for the Federal Communications Commission, on the future and security of cloud computing.

    April 12, 2010