Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Cybersecurity News

Counter-terrorism exposition highlights modern problems, solutions

By Wayne Crawford
February 28, 2012

 

Counter terrorism today is an increasingly complex matter. No longer do counter-terror and homeland security efforts just consist of securing our homeland’s borders.  We are faced with mounting threats of cyberterrorism and attacks on critical national infrastructure; challenges in protecting our nation and its citizens in times of disaster; along with emerging extremists and threats from radicalization.

In fact, the Department of Homeland Security (DHS) recently released a cybersecurity strategy that outlines goals for government and industry for securing the nation’s existing critical infrastructure and developing a more resilient future cyber ecosystem. In addition to securing cyberspace, the strategy also addresses preventing terrorism, securing national borders, enforcing immigration laws and disaster response.

However, successful counter-terror efforts must include the collective efforts and shared responsibilities of the complete counter-terror community including federal and state agencies, Department of Defense (DoD), police and first responders along with those responsible for securing the nation’s vital infrastructure in both the private and public sector. Achieving this level of collaboration can be a daunting task.

There are currently more than 39,000 local jurisdictions in the United States, each charged with protecting its citizens. Hundreds of thousands of law enforcement and first responders are tasked to respond to threats, from floods to chemical attacks and suicide bombers. The challenge is further complicated by the multitude of federal agencies with responsibility to coordinate with each other and keep the community informed. Counter Terror Expo US was specially organized to bring together this complete counter-terror community and bolster collaboration in counter-terror efforts. 

While the threat of terrorism spans across many industries, countries and through countless mediums, we have chosen a few areas to highlight that we feel will get considerable attention in the coming year.

A Mounting Threat: Cyberterrorism

According to the U.S. Federal Bureau of Investigation, cyberterrorism is any “premeditated, politically motivated attack against information, computer systems, computer programs, and data which results in violence against non-combatant targets by sub-national groups or clandestine agents.” Unlike a nuisance virus or computer attack that result in a denial of service, a cyber terrorist attack is designed to cause physical consequences or extreme financial harm. Possible cyberterrorist targets include the banking industry, military installations, power plants, air traffic control centers and water systems.

Fueled by economic and political forces, the threat of cyberterrorism to our technical infrastructure is real and immediate, and cyberterrorists are very motivated. In fact, Gartner predicts that by 2015 at least one G20 nation’s critical infrastructure will be disrupted and damaged by online sabotage.

As our nation’s critical infrastructure grows more reliant on information technologies, it also becomes more exposed to attackers that can threaten our nation’s economy, cause mass disruption of communications or other services, and attack the nation’s infrastructure through cyber means. The need to know who is behind the attack and how they plan to execute it will only be possible through collaboration and information sharing.

Securing and Managing our Borders

Border security and management efforts focus on three interrelated goals: effectively securing U.S. air, land, and sea borders; safeguarding and streamlining lawful trade and travel; and disrupting and dismantling transnational criminal and terrorist organizations.

Securing our nation’s southern border, the 1,200 miles of shared border with Mexico, has never been more important. In addition to the Mexico drug cartel gang violence that threatens to cross into our country, one concern to authorities is the fact that the U.S. Customs and Border Protection (CBP) is seeing more attempts of illegal entry by people from Honduras, Guatemala, El Salvador and Middle Eastern aliens who come from Central America through Mexico, into Texas, and into the rest of the United States.

However, preventing illegal movements of people across our border is only one activity of CBP. Since the 2001 terrorist attacks, CBP activities have continued to evolve with a priority mission of keeping terrorists and their weapons out of the U.S., while also securing and facilitating trade and travel while enforcing hundreds of U.S. regulations, including immigration and drug laws.Another challenge that CBP is facing is the many weaknesses in the system of commercial truck traffic that is entering the U.S. from Mexico and the threat that it poses to our nation’s security. The current system for transporting, storing and inspecting commercial cargo that is crossing into the U.S. is poorly designed and monitored.

To address this and other global trade concerns, DHS established the Customer-Trade Partnership Against Terrorism (C-TPAT) initiative. C-TPAT is a voluntary government-business initiative to build cooperative relationships that strengthen and improve overall international supply chain and U.S. border security. C-TPAT recognizes that CBP can provide the highest level of cargo security only through close cooperation with the ultimate owners of the international supply chain such as importers, carriers, consolidators, licensed customs brokers and manufacturers. Through this initiative, CBP is asking businesses to ensure the integrity of their security practices and communicate and verify the security guidelines of their business partners within the supply chain.

To learn more about these issues and the leading-edge science and technology being used by counter terror community, attend the Counter Terror Expo US debuting in May 2012 in Washington, D.C. 

KEYWORDS: counterterrorism expo Mexico Terrorism

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Wayne Crawford is Vice President North America for Counter Terror Expo US

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Security Leadership and Management
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Police lights

Security Team Member Dies in Standoff with Dallas Police

Man walking with briefcase

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Four people in suits

Mexico Security Crisis: Never Waste a Crisis

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 21, 2026

The Blind Spot in Enterprise Security: Managing Workforce Risk Post-Hire

Organizations continuously monitor their networks and systems for risk, yet the people with legitimate access are often the least monitored part of the model. Discover a Workforce Risk Intelligence Framework that adds a dedicated layer focused on workforce risk.

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • Tom M. Conley

    Tom M. Conley Appointed to Anti-Terrorism Accreditation Board's Strategic Counter Terrorism Council

    See More
  • UK Steps Up Counter-Terrorism Measures

    See More
  • Survey: Counter-Terrorism Outweighs Defending Democracy Abroad

    See More

Related Products

See More Products
  • intelligent.jpg

    Intelligent Network Video: Understanding Modern Video Surveillance Systems, Second Edition

  • Risk Analysis and the Security Survey, 4th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing