A few weeks back, I recommended that the House Homeland Security Subcommittee on Cybersecurity, Infrastructure Protection and Security Technologies have a “do-over” of a hearing where the subject was private sector interaction with DHS S&T. The reason I recommended this was because the most successful private sector program at S&T – the SAFETY Act implementation – was never mentioned. On July 28, the same Subcommittee held that “do-over.”
The travel and tourism industry would benefit from understanding how well the efforts of TSA contribute to improved customer service at our nation’s airports. Fortunately, they provide this data to the Department of Transportation (DOT). This analysis shows some of the impacts before and after the introduction of Pre-Check.
Fans of the space epic Star Wars are eagerly awaiting the release of the next installment in the film, but there is already a real-life battle in space, and the U.S. government is looking to the private sector for help. Defense Sec. Ash Carter recently spoke of a “GPS of Things.” What is that and what does it mean for the future of warfare and commerce?
The infamous Tommy-gun toting John Dillinger was once asked why he robbed banks. He responded, “Because that’s where the money is.” That simple logic is similar to the thinking of government leaders, like DHS Secretary Jeh Johnson, who are looking to California as a vault holding a priceless commodity—a high-tech workforce.
On the eve of the second anniversary of the Boston Marathon bombing, Juliette Kayyem and WGBH radio have launched a new Podcast, “Security Mom,” offering a fresh take on the nation’s homeland security conversation.
For the past few months, a Blue Ribbon Panel on Biodefense has been receiving input from industry and policy experts on the challenges America faces from the bio-related threats. The public testimony portion of their assignment recently concluded, and now the Panel will begin its review and recommendation work.
In Security Debrief’s sixth annual April Fools coverage, we’ve collected stories the rest of the media somehow missed…
The Boston Marathon bombing was the first terror attack on a sporting event since the 1996 Olympic Games. It was a terrible reminder that violent extremists are constantly seeking targets that capture public attention but are difficult to secure. Enter DHS’ Best Practices in Anti-Terrorism Security (BPATS) guide.
By David Z. Bodenheimer
The U.S. federal government’s acquisition rules and buying practices have a direct impact upon major segments of the U.S. and global marketplaces. Cybersecurity Executive Order 13636 and Presidential Policy Directive 21 both recognize that the federal acquisition process must be addressed as part of the overall federal strategy for enhancing cybersecurity. It is time to harmonize the cyber acquisition regulations.
While ISIS is capturing national concern, Iraq is not the only place where terrorist activities are happening this month. Earlier in June, Tarheek-e Taliban attacked the Karachi, Pakistan airport. What is striking is the terrorists were found with a gunshot wound U.S. military technology called XStat, which had only just been approved by the FDA. How did terrorists get this new technology?