Home Tag "security"

Future Crimes: Tech Threats From Hackers, China, Google And Facebook

Marc Goodman, an international security expert, was one of the most impressive speakers at Money 20/20 in Las Vegas last year, and now his book Future Crimes is out with an astounding list of ways that bad guys are after money, business secrets, proprietary technology and government information. He also goes into some alarming detail of how “free” software and services, from Gmail to Facebook, uses the personal information of users to make money from advertisers and companies that want to sell.

Regaining the Edge in Technological Superiority

By Brett Daniel Shehadey
Special Contributor for In Homeland Security

Even with a $70 billion R&D budget, the Principal Deputy in the Office of the Assistant Secretary of Defense Research and Engineering, Alan Shaffer, said “Our technological superiority is under some threat…Now we’re starting to see other countries using advanced electronic warfare, missiles and other technologies that will stress us."

Body Cameras: Benefits and Best Practices for Police

By Dr. Christopher McFarlin
Criminal justice faculty, American Military University

In an effort to capture evidence about specific incidents involving police officers, more and more agencies across the country are considering the implementation and feasibility of department-issued body cameras. However, law enforcement officers—as well as the general public—have voiced concerns about the utilization of body-worn cameras.

What Message Is The Government Sending With Serious Cyber-Vulnerabilities At Homeland Security?

Joseph Steinberg, Forbes
Special to In Homeland Security

A new report from its own Inspector General notes that the US Department of Homeland Security –  the government division ostensibly responsible for ensuring cybersecurity throughout the nation – itself suffers from serious cyber-vulnerabilities.

The report notes that problems exist even on Top Secret systems, and that among other problems, the Department of Homeland Security commonly utilizes inadequate authentication, fails to properly track data and hence is unable to adequately monitor who is accessing what information, and runs seriously outdated software.

Putting the “D” and “I” Back in DIME

Brett Daniel Shehadey
Special Contributor for In Homeland Security

“Our enemies are violent extremists who would deny us, and all mankind, the freedom
to choose our own destiny…We must find and defeat them in an environment where information, perception, and how and what we communicate are every bit as critical as the application of traditional kinetic effects.”

– Joint Staff, Chairman of the Joint Chiefs General Peter Pace

DIME (diplomacy, information, military and economics) is a recent military term reinvigorated to remind the leadership and policy makers above them to consider national power as not limited to the military power alone.

Understanding the United Nations Responsibility to Protect Initiative

By Jacques Roussellier
Faculty Member, International Relations at American Public University

The NATO-led intervention in Libya has sharpened division among governments and experts on the actual interpretation and implementation of the 2005 United Nation’s responsibility to protect (R2P) initiative, particularly in light of procrastination with Syria, and one could add, northern Mali. The international military intervention in Libya has raised the issue of the relevance of R2P as a humanitarian intervention principle for regime change.