Your Life in Metadata
Bob is in an elevator, running late as usual. Mary sent him a flurry of annoying texts earlier, and he is only now responding. He doesn't have time to argue; he shoots off a quick "K!" and carries on.
Community-Based Counterterrorism
Homeland security starts with hometown security. Too often, the misconception prevails that counterterrorism (CT) efforts are reactive solutions to known terrorist activity and revolve only around intelligence and law enforcement efforts.
Choosing an Analytical Tool is an Analysis Itself!
With the overwhelming number of analytical tools, platforms, dashboards, and languages, selecting the right tool, approach, or framework is daunting. Matching an analytical tool to a specific data set can be the most important step of completing analysis on a set of information, and is often overlooked.
From Homework to Hacking: Recruiting Young Cyber Experts
In an increasingly cyber world, what is the greatest long-term challenge? A threat to our Government in cybersecurity is not having enough qualified personnel to defend our nation’s critical infrastructure, databases, and computers systems.
Creating Havoc from a Keyboard
America’s next major security threat could come from the very computer you’re using to read this blog.
Dzhokhar Tsarnaev: Can the US Stop Homegrown Terrorism?
PolicyMic
In last week's wide-ranging counterterrorism speech, President Obama outlined his plan to curtail the use of drones and close the Guantanamo Bay Detention Facility as the past decade of wars comes to an end.
In last week's wide-ranging counterterrorism speech, President Obama outlined his plan to curtail the use of drones and close the Guantanamo Bay Detention Facility as the past decade of wars comes to an end.
Preparedness and Response – Community Style
All disasters are local. As Superstorm Sandy made landfall in October 2012, community volunteers quickly came to the rescue of fellow citizens and supported Federal, state and local governments.
Big Data Enables New Missions
An enterprising view of homeland security data is sure to come in the future. One of the biggest hurdles? Even within individual agencies involved in homeland security and law enforcement, big data resides in separate systems designed for specific mission goals.
Does Doubling the Size of the Panama Canal Mean Doubling the Threat?
By 2020, the volume of trade that flows through the Panama Canal could double. With more and larger ships transiting through the Canal, the economic possibilities are exciting.
Mobile Trends: The Security of Bringing Your Own Device
Bring Your Own Device (BYOD) allows Federal Government employees to use their own mobile devices to conduct work and offers productivity savings – some say as many as 9 more hours a week!
US officials seek lessons in bombing catastrophe
The Boston Globe
Three weeks after the Boston Marathon bombings, the US Department of Homeland Security is seeking to use lessons from the attacks to enhance community policing and more effectively prepare religious and civic leaders to spot the warning signs of homegrown terrorism, according to top officials.
Three weeks after the Boston Marathon bombings, the US Department of Homeland Security is seeking to use lessons from the attacks to enhance community policing and more effectively prepare religious and civic leaders to spot the warning signs of homegrown terrorism, according to top officials.