As a new DHS Secretary takes the helm, Security Debrief contributors came together for the First Chris Battle Homeland Security Colloquium. In the spirit of the late Chris Battle’s vision for debate and discussion on pressing homeland security matters, contributors weighed a series of important questions about DHS’ future.
The House Homeland Security Committee did something yesterday it has not done in the past several years, for anyone: it came out in full force for DHS Secretary Jeh Johnson’s maiden appearance before the committee. It was a positive performance by the Secretary, who showed himself adept at answering questions, even as his lawyer’s instincts kept him from falling into political traps.
On Thursday, February 27, 2014, Security Debrief and Catalyst Partners will host the First Annual Chris Battle Homeland Security Colloquium. Security Debrief’s expert contributors will come together to discuss and debate the current state of U.S. homeland security, DHS, and the threats and priorities the country will face in the year ahead.
We now have information on 800,000 people in our terrorist databases. We have “big data,” as the people would say who pretend to know something about it. Big Data, they often claim, will solve the problem. To my mind, we have a big search, analysis and distribution problem, and despite “big data” claims of prowess, connecting the dots before a terrorist strikes is never going to be an easy thing.
In Security Debrief’s fourth annual April Fools coverage, we’ve collected some stories the rest of the media somehow missed.
When I attend various meetings around DC on cyber issues, I often see confusion and challenge – good people trying to resolve confusing issues, wrestling with individual – as well as the country’s – social and political demons. Cyber is a new kind of land. It has no physical dimension. There are no borders or boundaries, and everyone seems to be a part of something that no one can control. People in DC are bit lost right now, and there are some distinct cultural reasons why.
By Alex Sorin
The news of the violent gang rape of a young Indian woman on a public bus and her subsequent death has shocked the world and led to protests and unrest. While increased security is by no means the sole solution, certain security measures can help alert law enforcement of similar incidents and assist in catching the perpetrators. While surveillance technology can help, just as critical is an Incident Management System.
Many companies are examining the possibility of switching to Bring Your Own Device (BYOD) as a method of significantly reducing their IT infrastructure capital costs. Here is but another example of how short-term versus strategic thinking is creating havoc in American business. The dangers associated with BYOD far outweigh the short-term benefits. Convenience and a perception of cost reductions appear to again be trumping sound security practices.
Facing a deadly IED threat in Afghanistan and Iraq, the U.S. Government developed an array of technologies to protect American troops against improvised bombs. With the troop draw down underway, these technologies are being brought home and could be valuable assets to homeland security professionals facing an IED threat in America.
While the United States successfully thwarted another attempted bombing of a domestic inbound aircraft by al Qaeda in the Arabian Peninsula, the disrupted plot should tell Americans two important things: our intelligence and security agencies are doing excellent work, and continued vigilance is the price of security. We need every available tool to combat and protect against terrorists, and this means speeding up the rate at which America procures and implements counter-terrorism technology.