menu

Contributor:

admin

Leaked TSA Screening Procedures Only One Aspect of Transport Security

Certainly the posting of the Transportation Security Administration’s screening procedures on the Internet was not the agency’s finest hour, but it was not the worst breach of security since 9/11, as I heard last night on CNN. While some were quick to pounce and ridicule, most of what was in that document can be deciphered by studying procedures at the checkpoint, something terrorists are known to do before they execute an attack.

Global Cyber Company AVG Stresses Importance of Safe Online Shopping

Here at Adfero Group, I’ve been working with AVG and Shop.org who are teaming in a series of social media strategies aimed at spreading the word about how to shop safely online while finding the best bargains of the holiday season. Over the past few months, AVG, a global cyber company, initiated a dialogue here in Washington, D.C., to stress the importance of individual responsibility in cyber security.

To Address Border Security Issues, Administration Must Fill Vacancies at Top Agencies

With the spike in border violence, much of it associated with Mexican drug cartels battle with the Mexican government, we have a greater need than ever to fill the positions of the agencies responsible for protecting our borders — from the DEA and ATF to Customs and Border Protection.

Border Patrol Foundation Inaugural Event

The Border Patrol Foundation held its first annual recognition dinner in downtown D.C. to tout the creation of an organization whose mission is to “provide timely financial grants to the families of fallen” Border Patrol agents. Border Patrol agents often operate alone, in remote areas of our nation, many minutes and miles from backup or support. But given the impressive support shown by the Washington community at its inaugural event on Friday night, the Border Patrol Foundation appears to be off to a solid start.

New Obama Policy on Medicinal Marijuana May Have Unintended Negative Consequences

A recent policy from the Obama Administration directs federal prosecutors not to prosecute medical marijuana cases in states where medicinal use of the drug has been approved. This means that even though federal law conflicts with some state laws, those who act in compliance with state laws will not be prosecuted. The advance announcement providing assurance of no prosecution to a select group of people weakens the foundation of our effort to reduce the use of illegal drugs.

Chertoff cites new statistics highlighting American concerns over cyber privacy and security

Former Homeland Security Secretary Michael Chertoff spoke at the National Press Club this morning, citing insightful new research: while Americans are highly concerned about the security of their personal data online, 87 percent of Americans do not realize their exposure to online identity threats. He echoed the cyber security theme that current Secretary Janet Napolitano focused on with her remarks yesterday. Because citizens don’t fully appreciate the vulnerabilities, people are failing to take the appropriate precautions to manage or reduce their risk.

Changes Afoot on the Border

This week has been a telling one for those of us who follow border security closely. Congress and the Department of Homeland Security (DHS) have made a series of bold moves that arguably make our borders less secure. At the same time, the changes will be hailed by some as overdue upgrades to a flawed border management policy that built fences between neighbors and sought to imprison illegal aliens for ‘just’ entering the country.

The Small Boat Threat In the U.S. Is Real

The Department of Homeland Security’s Office of the Inspector General recently released a report on DHS’ strategy to address small boat threats in U.S. waters. The threat of a small boat attack in the U.S is real and DHS leadership knows that understanding and control of small boat activity in and around the U.S. is key to addressing the small boat terrorism threat.

Not Social Networking

A Heritage research report, “Social Networking and National Security: How to Harness Web 2.0 to Protect the Country” warned that one of the key issues that has to be addressed is the challenge of information assurance. Its not hard to imagine malicious actors mimicking government social networking tools and creating some serious confusion and disruption. Its something to think about.