The proposed Countering Violent Extremism (CVE) Act of 2015 (H.R. 2899) could benefit from a bit more study and debate. The bill would create a CVE Office within DHS, filling a hole that should not exist in DHS. It was not always this way.
The House Homeland Security Committee held a hearing on what the federal government is doing to counter terrorism; the Committee also passed the Countering Violent Extremism (CVE) Act of 2015. Countering Violent Extremism (CVE) is yet another acronym in the fight against terrorism and perhaps another chance to get it right.
There’s an old axiom in science and statistics: correlation does not imply causation. Sometimes what walks and talks like a duck isn’t actually a duck. Technical glitches on Wednesday sure looked like a cyber attack…but they weren’t. Here’s how we know.
Bradley Saull recently announced that he was leaving the House Homeland Security Committee staff, where he has worked for the past two years, to join the Professional Services Council. He may be leaving the government, but thank goodness he is not leaving the homeland security mission.
After last week’s horrific terrorist attack on the Mother Emanuel AME Church in Charleston, there is widespread discussion about whether to take down the Confederate flag that flies outside the South Carolina Capitol Building. Today, terrorists have claimed the rebel banner as their own, and for that and other reasons, it should never fly again, particularly on public land.
Last week, there was yet another ideologically motivated attack in America, complete with a manifesto and racist, symbol-laden photos posted to the Internet. The shooting at the Mother Emanuel AME Church in Charleston is a textbook example of homegrown violent extremism (HVE).
On Wednesday, a shooter entered the Emanuel African Methodist Episcopal Church in Charleston, South Carolina, killing 9 people who had gathered for Bible study. The FBI has classified the attack as a “hate crime.” Why has this horrific attack been immediately characterized as a hate crime and not as an act of terrorism?
DHS needs a uniform policy across all components on disseminating high quality, objective data that provides utility to all who use it. The data needs to be transparent and reproducible. With regards to the collecting and posting of wait times, much work is still needed across at least three agencies: CBP, TSA and USCIS.
By Dr. Doron Pely
Those following the evolution and expansion of ISIS over the past few years find themselves often bewildered by the pace and rate of success demonstrated by a supposedly young, inexperienced band of ideologues. Yet, the similarity is uncanny between what is happening now with ISIS and what happened 1,400 years ago, as Mohammad founded Islam and set about consolidating and expanding the power and reach of the new religion.
There were about 160,000 unanswered FOIA requests in 2014, with the Department of Homeland Security accounting for 65%. The federal government has a culture of risk aversion, but there are four reasons why taking a smart risk in answering FOIA requests would be good for TSA and other agencies.
- Secret Service Pressing Ahead with Hiring Spree
- Price for TSA’s Failed Body Scanners: $160 Million
- An Intelligence Approach To Critical Infrastructure Protection
- Jeh Johnson Won’t Have to Testify in Immigration Case
- Black Lives Matter Organizers Labeled as “Threat Actors” by Cybersecurity Firm
- Homeland Security Raises Privacy Concerns About Cyber Bill
- Congress Continues Oversight of Aviation Security Agency
- Feds Monitored Breast Cancer Walk to Make Sure Black Lives Matter Riot Didn’t Break Out
- Governor Named To Committee Handling Homeland Security
- FBI Chief Comey: ISIS Bigger Threat Than Al-Qaeda
- Read All