Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: Al Qaida
Osama Bin Laden may be dead. "We have sources that have told us for the last several years now that they believe he was dead but they just don't have any proof of that fact," says Scott Stewart Vice President of Tactical Intelligence at Stratfor. Al Qaida linked websites have been promoting a message from him for a more than a week. The message is going to be screened carefully for evidence that it is indeed him and for the usual forensics that might give clues as to his whereabouts.
Ayman al Zawahiri released a video message on August 27 called the "Path of Doom". Was it a flop? US intelligence sources indicate it might be, because it didn't go "viral" on the internet. It appears the message reached a much smaller number of sites than other messages he released between November 2008 and February 2009. Why is that? Experts say periodically sites or portals that ar used to spread Al Qaida's messages are shut down, sometimes Al Qaida loses operative who work on propaganda to air strikes. In this case it's hard to say why.
It should come as no surprise to you that terrorists and criminals are adapting to exploit different technologies to achieve its goals. Now we're hearing that international drug trafficking networks are using Google Earth to locate the roadblocks and security forces so as to avoid them. Algerian police say Al Qaida in the land of the Mahgreb actually bragged about in a web posting. Authorities around the world have also noted more reliance on technology such as blue tooth to carry out criminal and terrorist deeds.
One of the hallmarks of Al Qaida's attack methodology is to launch a strike and then once the first responders arrive and the TV cameras are rolling to launch a second wave of attacks. That's what happened on September 11, 2001 at the World Trade Center. It happened just a few days ago as well in North Waziristan, bu the shoe was on the other foot. According to U.S. intelligence, missiles fired from drones hit a compound a compound and three vehicles in the village of Mizar Madakhel. After local militants cordoned off the area and began recovering bodies, a second volley of missiles struck.
Narco-traffickers have found a new source of profit. Current and former U.S. government officials say they're helping international terrorists try to penetrate the U.S. borders.
National Security Correspondent JJ Green learns that stopping these kinds of attacks depends on something called "evolving intelligence."
The uprisings in North Africa and the Middle East have almost crippled the intelligence services in those countries.
J.J. Green, WTOP national security correspondent
When President Obama announced the plot had been dusrupted on October 29th, JJ Green had an *aha* moment.
Tags: security , Intel Briefing , Transportation Security Administration , TSA , John Pistole , Transportation Security Operations Center , underwear bomber , Phillip Mudd , Fred Burton , Target America