Consider the irony of withholding threat and vulnerability information in the name of national security that, if properly disseminated, would do more to help our national security.
We’ve gotten pretty good at collecting all sorts of data from cameras and other sensors – but in the end, it is what we do with the information that counts. Surveillance technologies provide the capability to capture the minutest details, but the real value in collecting information is in its analysis. While technology allows us to observe behaviors that predict criminal intent and can interdict before events occur, often this data is subverted by security professionals and law enforcement misinterpretation based on spurious factors.
A Harris Poll shows that the U.S. government should increase spending on America's national security relative to the caps set more than three years ago.
Today, the Security magazine staff remembers the terrible events of the morning of September 11, 2001. We remember those and their families who lost their lives. And we continue to honor public servants and military who risk their lives each day, here in the U.S. and abroad, for our freedom and safety.
Today, as we remember the terrible events of the morning of September 11, 2001, the staff of Security magazine is considering how far we have come, and how far we have left to go.
ACCORDING TO THE 2014 Unisys Security Index, the top three individual concerns in the U.S. are identity theft, bankcard fraud and national security in relation to war or terrorism.
September 1, 2014
On the Internet security side, 37 percent of Americans are seriously concerned about the security of shopping or banking online.
In its recent Quadrennial Homeland Security Review, the Department of Homeland Security outlined its strategies for becoming a more integrated and agile agency
Ultimately, with a public-private partnership, what you put in is what you get out, says Wesley Bull, Senior Director/Head of Global Protective Services at NVIDIA, a company that invented the GPU – the engine of modern visual computing.
The disclosures by Edward Snowden over the past year have raised the public’s awareness about the U.S. Government’s surveillance tactics and capabilities to defend our nation against another 9/11 magnitude attack.
Surveillance was performed by putting people on the street and watching from parked cars and vans disguised at Bell Telephone service vehicles with portholes cut out for still cameras.
The Snowden leaks, the Navy Yard shooting, and recent evidence that the U.S. Office of Personnel Management’s primary background check contractor all have forced the federal government to look at changing the way it does background checks.
The report from June 4, 2014, stated that one USIS employee turned in more than 15,000 investigations in one month, translating to about 21 screens every hour of every day during that month, which has raised red flags.