security

  • Federal News Radio told you that Robert Carey, the widely respected CIO for the Department of the Navy, would be leaving that post. The DorobekINSIDER has confirmed that Carey will join the Navy’s Fleet Cyber…

    June 30, 2010
  • The Office of Management and Budget has just issued a new policy for dealing with Internet “cookies” — these are text files that a Web site can put on your computer to track how you…

    June 26, 2010
  • Bioterror medical countermeasures should be local, not federal, says Brooke Courtney with the Center for Biosecurity

    June 21, 2010
  • Counterproliferation experts say Iranian agents\' smuggling operations include parties who aren\'t aware they are doing anything illegal.

    June 17, 2010
  • Antennas intended for US e-Passports were being manufactured in Thailand. Were. GPO\'s Steve LeBlanc explains.

    June 17, 2010
  • NNSA\'s Second Line of Defense program, which works around the world to strengthen the capability of foreign governments to deter, detect, and interdict illicit trafficking in nuclear and other radioactive materials across international borders and through the global maritime shipping system. We get details from program director Tracy Mustin.

    June 16, 2010
  • A U.S. government contractor is still assembling a key passport component in Thailand despite repeated warnings about security risks. The Center for Public Integrity\'s John Solomon explains.

    June 16, 2010
  • I will be on NewsChannel 8′s Federal News Tonight at 7:30p tonight — and we’ll be talking about the ongoing debate: Is the threat of cyber-war exaggerated? As I mentioned earlier, this question was the…

    June 15, 2010
  • The Sec Tech \'10 conference will cover everything from cyberthreats to workplace violence. Duke Rollins from host ADT joins us with details.

    June 14, 2010
  • I had the pleasure last night to attend the Intelligence Squared debate series — the first one held in Washington, DC. (Yes, it was a wonk-fest. After all, there were some other big events in…

    June 09, 2010
  • Thursday, June 17th The sophistication of security breaches of federal information systems and reports of improper access to these systems continues to grow at an alarming rate. Clearly, there is concern about and a desire to improve the security of these critical infrastructures. So where and how do we begin to effectively safeguard today\'s systems from cyber threats and increasing system vulnerabilities? c

    June 07, 2010
  • In this radically new information environment, the enemy no longer depends on traditional media. This is the \"YouTube War.\" Details from Dr. Cori Dauber, a professor of Communication Studies.

    June 07, 2010
  • The Department of Defense has announced it will use the FBI-owned and maintained eGuardian suspicious activity reporting system as a long-term solution to ensure access to appropriate threat information. The announcement follows two years of analysis and a six-month pilot program, and a recommendation this past January by the DoD Independent Review related to the shootings at Fort Hood that DoD adopt a reporting system for documenting, storing, and exchanging threat information. Those using the system will be trained with regard to the protection of civil liberties. Through its use, DoD law enforcement and security personnel will be able to share potential terrorist threats, terrorist events, and suspicious activity information with other state, local, tribal, federal law enforcement agencies, state fusion centers, and the FBI\'s Joint Terrorism Task Force.

    May 31, 2010
  • June 15th The rapid convergence of security technologies combined with growing concerns about individual privacy are creating a need to understand the purpose of identification and credentialing in your environment and the impact on the public. Financial institutions and commercial services are adopting high tech methods to protect consumer access to convenient online transaction systems. Governments have adopted electronic identity documents to facilitate fast and convenient border crossing including ePassports, enhanced driver\'s licenses, and RFID Passport cards. We are all aware of public space surveillance systems to reduce street crime in urban centers. Proposed identity credentials are to provide a trusted citizen identification solution for employment authorization including biometric verification. How will these identification systems foster trust and confidence by consumers that their personal information is secure and protected? Join us for a discussion with experts in the field of identification and credentialing to learn about how these innovations can meet security and consumer needs while managing the impact on privacy and civil liberties.

    May 31, 2010
  • The suspect in a botched car bombing in Times Square appeared in court Tuesday on terrorism and weapons charges for the first time since his arrest two weeks ago and was quickly led away in handcuffs after being held without bail. National Security Correspondent JJ Green tells us what we\'re learning from the incident

    May 19, 2010