Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Modern Mission Critical Series
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: terrorist
America's war on al-Qaida is taking a new direction, moving beyond declared combat zones like Afghanistan while countering the terrorist network's search for new sanctuaries, Defense Secretary Leon Panetta said Tuesday.
The Justice Department announced Thursday it has ended its investigation into CIA interrogations of terrorist detainees without bringing criminal charges.
You may notice some changes when you fly after August 15th. "What were expecting is the airlines to ask for Secure flight passenger data." What that means according to TSA Secure Flight Director Paul Lehy is you'll be asked for "full name date of birth, gender and if there is a regress address provide that as well". This is being done to make sure known or suspected terrorists can't get a boarding pass. The programs includes a behind-the-scenes watch list matching process that vets passengers against government watch lists before a boarding pass is ever issued.
It should come as no surprise to you that terrorists and criminals are adapting to exploit different technologies to achieve its goals. Now we're hearing that international drug trafficking networks are using Google Earth to locate the roadblocks and security forces so as to avoid them. Algerian police say Al Qaida in the land of the Mahgreb actually bragged about in a web posting. Authorities around the world have also noted more reliance on technology such as blue tooth to carry out criminal and terrorist deeds.
First, the Moscow subway attack, Now, the government of Azerbaijan says it's detained eight people including a Chechen man on suspicion of planning "terrorist acts". The targets --a school and kindergarten in the capital of Baku. They are reminders to many that the region is vulnerable to such attacks and how devastating they can be. September 1, 2004 in Beslan, North Ossetia more than 1,000 people were taken hostage at a school. 300 children, women and men died. Authorities are concerned over what they say is the rising influence of radical Islam.
Hackers, terrorist organizations, cyber criminals, and nation states routinely target government and corporate entities for financial gain, military intelligence, warfare, and sometimes just for notoriety and fame. Government agencies and corporations have traditionally addressed this threat independently, but the evolution of cyberspace has changed the rules. A unified front between the private and public sector has become more critical to combat these cyber threats.
The public and private sectors are becoming increasingly interdependent - the operation of our nation's critical infrastructure, including the national power grid, transportation systems, and communication networks, depends upon the ability of public and private sector networks to share information via cyberspace. Likewise, our nation's economic superiority is predicated on our ability to maintain competitive advantages in capital markets. Our enemies are not only looking for ways to exploit vulnerabilities in our critical infrastructure, but they are also increasingly looking for ways to steal our private sector's intellectual property in order to weaken our economic standing and gain an advantage in the global economy.
Google's disclosure of "sophisticated" cyber attacks on its infrastructure reportedly originating in China offers a good example. The Washington Post recently reported that Google and the National Security Agency (NSA) are forming an alliance "to better defend Google - and its users - from future attack." Putting the agreement in place will enable the NSA and Google to share critical information to analyze the attack without violating privacy laws or policies. This alliance will help Google better defend its intellectual property critical to our nation's economy while providing NSA key insight into the attack methods and motives of the attackers.
The need for such partnerships is certain to grow and will most likely extend to organizations that are not as large and resourced as Google but are just as critical to the strength of our nation's economy. Our adversaries are using similar attack methods to compromise systems across both sectors but they have not effectively partnered to share threat intelligence or early warning indicators. A formal partnership between the private and public sector allows the country to develop a unified and coordinated approach to defending our nation's assets.
Pakistani officials say a Filipino militant wanted by the United States was killed in an American drone strike earlier this month. Abdul Basit Usman was reportedly killed on Jan. 14 close to the Afghan border. The State Department's list of most-wanted terrorists identifies Usman as a bomb-making expert with links to the Philippines-based Abu Sayyaf militant group and the Southeast Asian Jemaah Islamiyah network.