menu

Topic:

PR, Social Media and Govt 2.0

What is a Law Enforcement Fusion Center?

Fusion Centers are a fairly new concept in law enforcement, and many people don’t know the purpose they serve or how their local law enforcement agency should be engaging these centers. If you ask 20 people for a definition of “fusion center,” you’ll get 20 different answers. Some might even think these centers are making frozen coffee concoctions or protein drinks. But fusion centers are actually an attempt to deal with the fact that clues related to criminal activity often remain undiscovered in disconnected law enforcement databases.

Let's Not Talk Nonsense About Cyber

A recent blog post on Wire.com “Cyberwar Against Wikileaks? Good Luck With That” was brought to my attention by a good friend. She nominally just wanted my thoughts on the provocative article, but in effect, challenged me to blog on the subject. Some have argued that the U.S. Government could levy its cyber capabilities to stop WikiLeaks from sharing the classified information leaked to the online outlet by a young U.S. soldier. That defined a target is well within the capabilities of several different parts of the government, but it would be entirely self defeating. Using cyber capabilities to silence those with whom we disagree is exactly what privacy and civil liberties advocates fear most about the development of our cyber defenses.

Hertiage's Homeland Security Panels – Bucci Speaking on Cyber and Maritime

Next week, the Heritage Foundation will host “Homeland Security 2010: The Future of Defending the Homeland.” This will be a week-long series of panels aimed at providing a good background for Congressional Staffers new to Homeland Security issues. Heritage did this last year, and it was an excellent event. I will be sitting on two of the panels – maritime security and cybersecurity. The panels are open to the public and all are welcome. I highly recommend it.

UAE Blocks BlackBerry for the Sake of Security, at the Cost of Liberty

By Justin Hienz
The United Arab Emirates (UAE) is home to bizarre sights, and the veneer of extreme luxury certainly impresses (or fools) most tourists. But when you pull back the curtain, the UAE is revealed as a developing country with many challenges, security among them. On Sunday, UAE officials announced that it would block BlackBerry mobile services. Clearly, the UAE is striving for security in every way, but at what cost? And are there parallels in our own country that deserve a closer look? Maintaining our individual freedoms is a never-ending struggle.

Senate Panel to Discuss Afghanistan Amid Leak of War Documents

Senate Panel to Discuss Afghanistan Amid Leak of War Documents – Homeland Security CQ
The Senate Foreign Relations Committee will hold a hearing Tuesday to discuss options for bringing about political reconciliation in Afghanistan. The hearing is likely to be overshadowed, however, by a larger discussion on overall U.S. policy in Afghanistan and Pakistan following the release by WikiLeaks over the weekend of more than 92,000 pages of classified documents tracking the war in Afghanistan from January 2004 to December 2009.

Should We Seek Cyber Attribution?

Several news items of late have addressed the thorny issue of cyber attribution; that is, the ability to identify the sources of Web and network attacks. For cyber companies and some government agencies, attribution is the Holy Grail. However, if we develop technology that provides attribution, soon bad governments will get it too. They will surely use it against dissident elements inside their own countries to suppress free speech and abridge other civil rights of all sorts. Should we consciously forgo the possibility of deterring bad guys from cyber crime, cyber terror and cyber war because the technology could be used badly? I think the answer is clearly “no.”

Secrets in the News: Classified Crossings that Go Too Far

For the second straight week, Washington, DC and the nation are reeling from headlines and news coverage of events on the national security stage. Last week, it was the Washington Post’s series on Top Secret America, which details the explosive growth of the intelligence apparatus since 9/11. This week, it is the release of nearly 92,000 pages of classified details on the ongoing conflict in Afghanistan. What has been shared is a tremendous violation of trust amongst military/intelligence personnel that goes beyond the traditional Washington leak to a reporter. as interested as we may all be in what is really happening in the intelligence community and in Afghanistan, there is also a responsibility to not reveal everything. That is a line I think individuals and organizations like the WikiLeaks source, the Washington Post and others seem to cherish crossing.

Data Mining Tools for Law Enforcement?

Recently, there’s been a trend toward some agencies purchasing new data mining tools for their needs at fusion centers. It is great to see this investment in technology, but watch out – many of these solutions don’t have any inherent method for capturing Suspicious Activity Reports and Request for Service data, which fusion centers use to track case management activities. Here’s a review the four types of data that law enforcement officers encounter in their work and the federal guidelines that govern intelligence sharing.

The New Face of Aviation Security?

The hunt for someone to lead the Transportation Security Administration (TSA) began in 2009, but it wasn’t until June this year that the Senate confirmed John Pistole as administrator. Security Debrief followed the confirmation process every step of the way and found the latest development in this week’s Air Cargo Week.

The Value of Aspen

As we continue to swelter in the ongoing summer heat wave, it is easy for me to reminisce about my recent visit to Aspen, Colo. Tucked amongst the Rockies with its clean air, fervent green and majestic views, a town known primarily for its skiing with the rich and famous was home to what was, simply put, the best conference program I have ever attended. The first annual Aspen Security Forum put forward a program that I can only describe as pleasant, informational waterboarding. By the time each of the presenters and panelists were done, my hand was dead from writing so much and my head hurt from being given the firehouse treatment of a candor and content overload. Here’s a rundown of some of the sessions.