Similar Articles |
|
Financial Advisor July 2012 Mary Rowland |
The Bodyguard Believing threats against their wealthy clients will intensify, family offices are providing more security services. |
National Defense March 2004 Harold Kennedy |
Army Crime Fighters Shift Focus to Wars The U.S. Army's Criminal Investigation Command--which usually concentrates on bringing that service's own lawbreakers to justice--now is employing its detective skills against enemy combatants in Iraq, Afghanistan and elsewhere, according to the unit's deputy commander, Col. Paul R. Capstick. |
InternetNews October 29, 2004 Jim Wagner |
Feds Charge 28 in ID Theft Ring Agents at the U.S. Secret Service unmasked 28 people who thought they were safe behind anonymous identities and charged them in connection with alleged ID Theft activities. |
CIO October 15, 2002 Sarah D. Scalet |
Fear Factor A reality check on CIOs' top five concerns about reporting security incidents. |
InternetNews January 13, 2005 Jim Wagner |
T-Mobile Investigating Alleged Hacker The Secret Service has joined T-Mobile to find out the damage caused by a network breach. |
InternetNews July 7, 2009 Alex Goldman |
FBI, DOJ Agents: We're Gaining on Cyber Crime While the Internet helps criminals organize and to reach across borders, it can also help law enforcement catch them. |
Job Journal July 4, 2004 Julia Hollister |
Go to Work for America The federal government is expanding payrolls in a wide variety of departments, from tax-law enforcement to environmental protection. Check out the web links for a good place to begin your job search. |
CIO January 1, 2003 Stephanie Overby |
The New, New Intelligence The military, intelligence and law enforcement communities see software agents as a tool for dealing with the daunting task of having to retrieve and monitor huge amounts of data in ongoing investigations or to prevent potential problems (from terrorist activity to insider trading). |
Job Journal October 28, 2007 |
Career Snapshot: Police Officer Police officers can be sure of steady demand for their courage and dedication. |
CIO June 1, 2001 Tracy Mayor |
Break Glass, Pull Handle, Call FBI If you're the victim of a security breach or a virus attack, get the feds on your side... |
PC Magazine November 30, 2004 Peter Suciu |
Evil Genius Any run-of-the-mill secret agent can save the world, but to achieve global domination, it takes an Evil Genius. |
National Defense December 2015 Lloyd McCoy Jr. |
Defense Department Plays Key Role in Industrial Base Oversight The Defense Department and other federal agencies have been directed to identify and protect critical infrastructure sectors specific to their mission. |
Job Journal December 17, 2006 Julia Hollister |
The Insurance Industry Offers Careers to Insure Your Future Insurance is a growth industry likely to pay long-term career dividends. |
National Defense June 2011 Stew Magnuson |
When it Comes to Cybersecurity, the 'Who is Responsible for What?' Debate Continues Most experts seem to agree that the U.S. government's collective efforts to secure the Internet from large-scale attacks and other nefarious activities are lacking. |
U.S. Banker June 2009 Davies & Marquez-Garrett |
Financial Misconduct Is Not Just a Civil Matter The FBI is shifting more than $75 million in resources from counterterrorism work to help sort through what has been characterized as "the wreckage of the financial meltdown," and financial industry professionals are bracing themselves for the newest wave of recourse: criminal prosecution. |
InternetNews November 11, 2005 Roy Mark |
FBI Hunkered in The Bunker Cyber G-men are responsible for investigating cyber attacks by foreign adversaries and terrorists, and for preventing online criminals from using the Internet to steal, defraud and otherwise victimize U.S. citizens, businesses and communities. |
Wired November 2000 Gretchen Reynolds |
Junior Mints Counterfeiting meets pixel power, and nothing will ever be the same again... |
AskMen.com Bernie Alexander |
Cyber Crime: The Wild West, Online Forget about breaking and entering, aggravated assault and armed robbery. Cyber crime is taking over. |
National Defense April 2014 Matt Cannon |
Civil Litigation Can Sink Contractors Most people picture high stakes civil litigation taking place in a courtroom where a party has the chance to persuade a judge or jury to validate or reject huge claims for damages. |
InternetNews October 9, 2009 Larry Barrett |
Cyber Terrorism Demands New Tactics: Study RAND Corporation says fighting online threats to national security requires nontraditional tactics, immediate attention. |