menu

Contributor:

Security Debrief

Cyber Déjà vu All Over Again – Challenges in 2013

Yogi Berra once observed after two of his teammates smacked back to back homers, “it was déjà vu all over again.” His wisdom applies to cyberspace in 2013 – it is going to be déjà vu all over again. Here are four likely Cyber Challenges we will encounter this year. None of these challenges are “fatal.” They are simply the challenges at hand.

India's Public Transport Security Wake-Up Call

By Alex Sorin
The news of the violent gang rape of a young Indian woman on a public bus and her subsequent death has shocked the world and led to protests and unrest. While increased security is by no means the sole solution, certain security measures can help alert law enforcement of similar incidents and assist in catching the perpetrators. While surveillance technology can help, just as critical is an Incident Management System.

Not Your Father's Internet – Mounting Digital Challenges in 2012

There are few spots left around the world without Internet access, and few people who cannot reach out to access it. It has been relatively free of state interference and American dominated. However, the Net has had mounting problems, and 2012 has marked the end of the old Internet as we knew it. The days of an American-controlled freewheeling Internet with unlimited access and relatively cost-free access are over.

A Recommendation for Congressional, DHS Focus in the 113th Congress

By Michael Beland
With Election Day behind us, Washington is engaging in the Potomac Two-Step that is the Interregnum—with one foot dancing to the tune of the 112th Congress and the other to the potential activities of the 113th. There are areas, especially in the homeland security arena, where the Executive and Legislative Branches should plan to work together to make significant progress for the country in the next Congress.

TSA Enforcement Guidelines Would Improve Supply Chain Performance

In the logistics business, there is little tolerance for uncertainty. The supply chain, from the producer to the consumer, must be finely tuned so goods arrive at the right destination within tight time frames. TSA rules, particularly security procedures for processing cargo transported by air, can dramatically affect supply chain performance. Yet, there are no TSA enforcement guidelines detailing the agency’s discretion in enforcing noncompliance with air cargo security rules.

Addressing the Current Israel-Hamas Conflict

Since Israel’s last incursion into Gaza in December 2008, Hamas and its fellow “resistance organizations” in Gaza have been taking advantage of weak Egyptian control over the Sinai Peninsula to hasten the smuggling of medium and short-range rockets. Hamas’s strategy is to attempt to deter Israel from launching attacks against the organization by amassing a rocket arsenal that will allow it to strike deep into Israel. It is highly unlikely that this latest round of fighting will fundamentally change a reality in which Hamas continues to rule in Gaza and Israel lacks any realistic alternatives to changing the equation.

Homeland Security – What Next?

By Doug Doan
So far, none of the presidential candidates have mentioned much about Homeland Security. With so many other problems, issues surrounding how best to organize, manage and lead the vast DHS bureaucracy are just not that important. Too bad. I would have liked to see the candidates talk about what they might do. Here is an agenda that I happily provide.

A New Regulator – CFIUS Finds Authority to Issue Orders

U.S. government agencies often seek more power. They generally do that by asking Congress for a new law conferring additional authority or by simply asserting the power based on old law. The Committee on Foreign Investment in the United States, or CFIUS, has made a recent bold play that follows the second path. CFIUS now has asserted that it is a full-scale regulator, with the power to issue orders on its own.

The Real Danger of a BYOD Strategy

Many companies are examining the possibility of switching to Bring Your Own Device (BYOD) as a method of significantly reducing their IT infrastructure capital costs. Here is but another example of how short-term versus strategic thinking is creating havoc in American business. The dangers associated with BYOD far outweigh the short-term benefits. Convenience and a perception of cost reductions appear to again be trumping sound security practices.