menu

Topic:

Civil liberties and Privacy

CIA Assassin "Program" Little More than a PowerPoint Presentation Says CIA Insider

Normally, the story below would be posted in the “Homeland BlogWatch” section of Security Debrief, which links to stories pinging about in the blogosphere and online media. However, the article written below, by former CIA Middle East field officer Robert Baer, is so insightful, we thought we should post it here in our main section.

Reigning in ICE partnerships with local law enforcement recieves mixed reviews on Capitol Hill

Homeland Security Today – preparedness and security news – Congressional Reactions to 287(g) Revisions House Homeland Security Committee Chairman Bennie Thompson declared that the original program had dangerously morphed “beyond its original boundaries and led to a lack of accountability.” “I am gratified that this committee’s oversight led the Department to revamp the 287(g) program,” […]

New Curbs Set on Arrests of Illegal Immigrants

New Curbs Set on Arrests of Illegal Immigrants – WSJ.com The Department of Homeland Security said Friday it was revising a program that authorized local police to enforce federal immigration law — a controversial aspect of U.S. border policy. Opponents said the program, known as 287g, was intended to identify criminal aliens but instead has […]

Senate Committee Quashes Obama's Immigration Rollbacks

By Jena Baker McNeil
Sen. Sessions’ amendment to make E-Verify permanent and mandatory is a good step forward in terms of maintaining immigration enforcement efforts.

The homegrown face of regime change: Social media's influence in public diplomacy

One has come to expect the standard assertions from apologists for Middle Eastern autocrats that American media are controlled by the U.S. government. And certainly CNN and the New York Times take their hits in this article. What is fascinating, however, is how quickly new media platforms such as Twitter and Facebook have achieved the same level of fear and loathing from these apologists in such a short amount of time.

Technology is one solution to security vulnerabilites at federal buildings

Wednesday’s Senate hearing on security lapses at federal government buildings around the U.S. brings up the need for better technology at those security checkpoints, not unlike the upgrades underway at U.S. airports.

Registered Traveler Meltdown: Fraud Action Against Clear? Investigate the TSA?

Danny Sullivan: Registered Traveler Meltdown: Fraud Action Against Clear? Investigate the TSA? With an administration that’s trying to crack down on corporate abuses, such as misleading credit terms — shouldn’t someone consider punishing those at Clear for pushing a consumer product that seemed to have TSA backing when it had to be known the company […]

DHS kills Social Security “No-Match” Rule, Moves Forward with E-Verify

Immigration is once again creeping to the forefront of the national agenda. Decisions yesterday by DHS to implement E-Verify for federal contractors, on the one hand, while killing the Social Security “no match” letters to businesses on the other has sparked renewed and vigorous debate on worksite enforcement issues. What does this all mean for the business community?

Obama's Attempts Immigration Street Cred

Looking tough on immigration law isn’t the same as being tough and Obama has yet to clearly layout an immigration plan. The right approach to immigration is one that enforces the law, protects Americans, brings in new legal immigrants, and keeps everyone safer. Obama’s strategy should include all of the above.

Compartmentalizing Security: Checklists & Stovepipes

The 9/11 highjackers used deceit, anticipaticipation pilot reaction, and knowledge of a predictable checkpoint screening process to accomplish their mission. Box cutters – their only conventional ‘weapon’ – were an almost inconsequential part of their plot. This is the reason for Secure Flight and watch list checking.