There are few spots left around the world without Internet access, and few people who cannot reach out to access it. It has been relatively free of state interference and American dominated. However, the Net has had mounting problems, and 2012 has marked the end of the old Internet as we knew it. The days of an American-controlled freewheeling Internet with unlimited access and relatively cost-free access are over.
December 10th, 2012 - by Ronald Marks
December 5th, 2012 - by Guest Contributor
By Michael Beland
With Election Day behind us, Washington is engaging in the Potomac Two-Step that is the Interregnum—with one foot dancing to the tune of the 112th Congress and the other to the potential activities of the 113th. There are areas, especially in the homeland security arena, where the Executive and Legislative Branches should plan to work together to make significant progress for the country in the next Congress.
November 1st, 2012 -
By Doug Doan
So far, none of the presidential candidates have mentioned much about Homeland Security. With so many other problems, issues surrounding how best to organize, manage and lead the vast DHS bureaucracy are just not that important. Too bad. I would have liked to see the candidates talk about what they might do. Here is an agenda that I happily provide.
October 22nd, 2012 - by Stephen Heifetz
U.S. government agencies often seek more power. They generally do that by asking Congress for a new law conferring additional authority or by simply asserting the power based on old law. The Committee on Foreign Investment in the United States, or CFIUS, has made a recent bold play that follows the second path. CFIUS now has asserted that it is a full-scale regulator, with the power to issue orders on its own.
Senate Majority Leader Harry Reid and his congressional colleagues’ proposed Cyber Security Act of 2012 is the wrong solution for America’s cybersecurity problem. The split is not between Democrats and Republicans; it is between competing views of the way to better security. The main reason these efforts are wrong is that they are based on a regulatory model. This sort of solution is a 19th-century answer for a 21st-century problem.
Many companies are examining the possibility of switching to Bring Your Own Device (BYOD) as a method of significantly reducing their IT infrastructure capital costs. Here is but another example of how short-term versus strategic thinking is creating havoc in American business. The dangers associated with BYOD far outweigh the short-term benefits. Convenience and a perception of cost reductions appear to again be trumping sound security practices.
The White House’s 2009 Cyber Review estimated the loss of intellectual property from companies as a result of cyber-based hacking in 2008 alone exceeded $1 trillion in value. FBI Director Mueller said in 2009 that his Bureau was aware of 3200 Chinese front companies operating in the United States. Kudos to House Intelligence Committee Chairman Mike Rogers for telling the American public about the significant efforts of countries like China to utilize every means available to spy on American companies – something the National Economic Security Grid has designated as the “Advanced Persistent Asymmetrical Threat.”
October 1st, 2012 - by Ronald Marks
After twenty years of rapid growth, we now stand with an unregulated and uncontrolled Internet vulnerable to attack and disruption from anywhere and by anyone on the planet. We have minced around the edges of doing something about this essential part of our daily lives for years. The time has come to declare reality. It is a public utility. It affects all Americans lives. It needs to be regulated by the government.
September 11th, 2012 - by Rich Cooper
For anyone alive eleven years ago, September 11 will always be a date on the calendar when you immediately remember where you were and what you were doing when all hell broke loose. History records many unforgettable days, but as the rawness of that day’s memories ebbs, the lessons learned continue to ripple in many ways. In the discussion on safety and security, one of the often-overlooked aspects is the impact that day had on business.
September 11th, 2012 - by David Olive
The Heritage Foundation’s Jessica Zuckerman posted an Issue Brief on the need for reform of Congressional DHS oversight jurisdiction. Zuckerman calls the morass of overlapping, uncoordinated and unnecessarily expensive oversight the result of “Politics Over Security.” She’s right – and Congress ought to be ashamed that it has allowed this situation to continue for as long as it has.
August 25th, 2012 - by Sam Rosenfeld
There has been a great deal of media coverage relating to an FBI/DHS document detailing likely anarchist activity during the Republican and Democratic National Conventions. The vast majority of that coverage has related to the threat of anarchists using Molotov cocktails, acid filled eggs, or even IEDs and IIDs. It appears an FBI/DHS report over-states and sensationalizes some of the likely threats from anarchists, as most recently expressed in their Joint Intelligence Bulletin released August 21, 2012.
The 2012 presidential campaigns are heating up, with taxes and economic growth dominating the debate. One issue that is just as important but somewhat less present in the ongoing discussion is homeland security. Here is a piece I wrote for Defense Media Network about how homeland security fits into the race for the presidency.
August 17th, 2012 - by Steven Bucci
The Smart Grid is the way of the future in electricity management, but it also presents cybersecurity challenges. A recent report on Smart Grid Cyber Security from the Government Accountability Office cautioned against using regulation to bolster security. There is a “default setting” on businesses and government entities that seems to drive them toward regulatory solutions. It is a harmful tendency in our modern world, and it is not the right approach for improving U.S. cybersecurity.
August 14th, 2012 - by Sam Rosenfeld
It’s not easy being the police department responsible for hosting a National Special Security Event (NSSE). The fundamental requirement for a police department hosting an NSSE is to understand the threat so the response is proportionate and effective. Anarchists and Extreme Left Wing groups are not synonymous with protesters, but in the effort to combat the former, law-abiding protesters are often dragged into the fray. Signals from Tampa in advance of the Republican National Convention suggest the planned police response does not understand the threat.
The Aspen Institute’s Security Forum, held at the end of July, proved why it has become, in only three years, a “must-attend” event for those of us working in the homeland and national security space. The four-day program was packed with insight from leading thinkers and past and present policy makers and influencers on the subject of national and homeland security. There was not a single bad panel, but three sessions stood out in my mind as being a slight cut above the rest.
Last week, Lt. Gen. Michael Barbero, Director Joint Improvised Explosive Device Defeat Organization (JIEDDO), testified in a closed session before the United States House of Representatives Committee on Homeland Security on the threat posed by IEDs in the United States. Lt. Gen. Barbero knows better than anyone how the knowledge and experience of bomb makers in Afghanistan and Iraq can be easily transferred here to conduct attacks in the United States. The trend is clear – we need to take this threat as seriously as we are taking the cyber threat.
July 12th, 2012 - by Steven Bucci
On Monday, Federal authorities released the names of four fugitives tied to the death of Agent Brian Terry and the failed operation “Fast and Furious.” Charged with the murder of Agent Terry and the assault of several other officers at the scene, these men have evaded U.S. and Mexican authorities for 18 months. The timing of this decision strikes me as odd; politics are masquerading as policy.
The Department of Homeland Security (DHS) performs a critical role protecting the country. The mission is challenging, but just as difficult is working within the department itself. There are several reasons for this, some of which include how elected officials place political appointees within the department. Here is the second installment in my series about why DHS is a crappy place to work.
With the recent heat waves and storms that have impacted millions of people throughout the United States, much is being written about the nation’s inability to prevent and recover quickly from destructive events. I am not yet ready to start placing blame – there are lots of things I should have done to be prepared. Individual responsibility leads to community preparedness. Here are some thoughts the disruptions bring to mind.
A recent Twitter exchange between the Taliban and the U.S. military shows how social media is evolving and how its current stage of development involves the use of Twitter to wage war on an ideological level. Over the past several years, social networking sites have become a catalyst for users to achieve political objectives. The U.S. Government and its security forces need to be constantly aware of how the enemy’s use of social media is evolving and proactively plan for ways to win the social networking battle.