It was revealed today that the State Department is now counting 37 pages of e-mails from Hillary Clinton’s private e-mail server as “Top Secret.” If you, as a federal employee with a Top Secret clearance, disclose such items as what is talked about in these reports, this is what would happen to you.
New app platforms based in financial technology (FinTech) might be the next vulnerability for Counter-Terrorism Financing.
On Tuesday, several media outlets reported that Intelligence Community Inspector General sent a letter to Congress regarding Sec. Hillary Clinton stored documents on her home server that were classified “Special Access Program.”
When it comes to border security, lines of razor-wire and soldiers is a proposition some in the United States might support, but from experience, we know this is woefully insufficient to keep a border secure and large-scale migration in check.
In Security Debrief’s sixth annual April Fools coverage, we’ve collected stories the rest of the media somehow missed…
There are no words to describe the horror of the video showing the execution of American journalist James Foley at the hands of ISIS. Today, radicalization is spreading, and religious, civic, and cultural leaders on every continent have a responsibility to step forward to address it. Sadly, those voices don’t seem to be as loud or as savvy as the video we all saw last week.
Recent reporting has reached new levels of stupidity, threatening public confidence and understanding and perhaps even the very security of the traveling public. Terrorists will always try to find ways around aviation security, but media headlines continue to report this as breaking news – when it is not.
While ISIS is capturing national concern, Iraq is not the only place where terrorist activities are happening this month. Earlier in June, Tarheek-e Taliban attacked the Karachi, Pakistan airport. What is striking is the terrorists were found with a gunshot wound U.S. military technology called XStat, which had only just been approved by the FDA. How did terrorists get this new technology?