This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies By closing this message or continuing to use our site, you agree to our cookie policy. Learn MoreThis website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
The disclosures by Edward Snowden over the past year have raised the public’s awareness about the U.S. Government’s surveillance tactics and capabilities to defend our nation against another 9/11 magnitude attack.
Surveillance was performed by putting people on the street and watching from parked cars and vans disguised at Bell Telephone service vehicles with portholes cut out for still cameras.
The Snowden leaks, the Navy Yard shooting, and recent evidence that the U.S. Office of Personnel Management’s primary background check contractor all have forced the federal government to look at changing the way it does background checks.
The report from June 4, 2014, stated that one USIS employee turned in more than 15,000 investigations in one month, translating to about 21 screens every hour of every day during that month, which has raised red flags.
The loss of intellectual property due to theft by China costs the U.S. more than $300 billion annually and translated into 2.1 million fewer jobs in this country.
The office of U.S. Senator Tom Coburn of Oklahoma found that 25 percent of approved disability claims should have never been approved and another 20 percent are highly questionable.
The House passed legislation Thursday to end the National Security Agency’s bulk collection of American phone records. The compromise measure (called “watered down” by Democrat Jan Schakowsky of Illinois) passed by a vote of 303 to 120, with nine members not voting.
China will investigate providers of IT products and services to protect “national security” and “economic and social development,” according to the official Xinhua news agency. This move follows the U.S. government charged five Chinese military officers with hacking U.S. companies to steal trade secrets.
Thirty-five countries pledged Tuesday to turn international guidelines on nuclear security into national laws, including France, Britain, Canada and Israel. This move is aimed at preventing terrorists from acquiring nuclear material. The initiative also commits countries to open up their security procedures to independent review – a further step toward creating an international legal framework to mitigate risks of nuclear terrorism.
The U.S. Border Patrol told its agents Friday that when they confront suspected illegal immigrants crossing the frontier who throw rocks a them, they should try to take cover or move away instead of immediately opening fire.
Defense officials see cyberattacks as the greatest threat to U.S. national security, a survey released Monday says. Forty-five percent of respondents to the Defense News Leadership Poll named a cyberattack as the single greatest threat – nearly 20 percentage points above the second ranked threat: terrorism.
Luke J. McCormack has been named the new Chief Information Officer (CIO) for the Department of Homeland Security. McCormack will lead and oversee DHS’s continuing efforts to implement information technology enhancements and security.
Following the controversial disclosures of National Security Agency surveillance practices, a presidential task force is on the verge of proposing a dramatic overhaul of the agency, CBS News reports. The task force’s draft report is due Sunday, and will be released for public review before the end of the year. The goal, the article says, is to roll out the new NSA procedures in January, most of which will be enacted through internal administration procedural changes.