Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mobile Device Management
- The Modern Federal Threat Landscape
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- Satellite Communications: Acquiring SATCOM in Tight Times
- Transformative Technology: Desktop Virtualization in Government
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Search Tags: al-Qaeda
For al-Qaeda to do any real damage with cyberattacks, it would need to make a multi-year investment in developing offensive cybercapabilities and would need a secure facility and advance test bed from which to do it.
A Yemen-based terrorist group has suggested that attacking Washington restaurants full of federal workers would be a good way to get lots of publicity. While it is a deadly serious threat, Senior Correspondent Mike Causey says there is a flaw in the plan.
Faced with stark losses among its foot-soldiers, al-Qaida is being presented with a sobering proposition - maybe it's time to give up.
Tags: Osama bin Laden , Ayman al Zawahiri , Al Qaida , Noman Benotman , terrorism , Afghanistan , national security , Counter terrorism , Juan Zarate , terror attacks , Terror threats , September 11 , J.J. Green , counterterrorism , National Counterterrorism Center , Mike Leiter , al-Qaida ,