MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
National Defense
January 2009
Magnuson & Rusling
'Scrambling Data' a Greater Threat Than Hacking Hackers defacing websites or stealing information is bad, but the destruction of computer data could be worse, said Director of National Intelligence Michael McConnell, in one of his last speeches as a member of the Bush administration. mark for My Articles similar articles
National Defense
November 2013
Yasmin Tadjdeh
Al-Qaida Seen Shifting Tactics to Smaller Attacks The Boston bombing quickly brought domestic jihadist terrorism back into the public eye. Counterterrorism analysts are now concerned that the United States may soon face an increase in deadly, smaller scale attacks. mark for My Articles similar articles
Fast Company
May 2009
Ellen McGirt
Fast Cities: New York In the aftermath of the September 11 attacks, New York City Police Commissioner Ray Kelly has built the most successful local counterterrorism unit in the U.S. and perhaps the world. mark for My Articles similar articles
The Motley Fool
September 11, 2006
Bill Mann
Just Whose Tragedy Was It? We all became internationalists that day. Beyond the immeasurable cost in lives lost, the economic impact of Sept. 11 has spread to all corners of the globe. But what about the intangible numbers? mark for My Articles similar articles
InternetNews
June 1, 2010
'Scareware' Targeted by FBI The FBI has moved to nip one of the largest so-called "scareware" Internet scams going. How big has the damage been to date? mark for My Articles similar articles
National Defense
November 2010
Stew Magnuson
DHS Warns Local Law Enforcement Of New Homegrown Terrorist Threat The general consensus in the intelligence community is that the homegrown terrorist threat during the last year has supplanted plots that originate overseas. mark for My Articles similar articles
National Defense
January 2009
Magnuson & Rusling
A Domestic Counterterrorism Agency? It's a Numbers Game The question of whether to create a standalone domestic intelligence agency for counter-terrorism comes down to some cold, hard math, said The Rand Corp. in a recent study. mark for My Articles similar articles
National Defense
June 2006
Harold Kennedy
Intelligence Sharing: `Still a Battle' According to the National Counterterrorism Center, despite efforts since 9/11 to improve the gathering and analysis of government and military intelligence, getting agencies to pool information is still difficult. mark for My Articles similar articles
Military & Aerospace Electronics
September 2004
The 9/11 Report: Details of the central event of our time It's not the sophisticated sensors, signal processing, satellite communications, and automation technology that wins the day in the end; it's the people who use the technology that make the difference. mark for My Articles similar articles
Reason
April 2002
Mike Lynch
Data: Big Talkers Post-September 11, it seems strange that terrorist threats once needed to be hyped. But that's exactly what the Department of Justice did to help justify its $22 billion budget, according to a Miami Herald investigation... mark for My Articles similar articles
PC World
September 12, 2001
Dan Verton
Next: Cyberterrorism? Security experts urge companies to guard against digital violence... mark for My Articles similar articles
The Motley Fool
December 4, 2008
Mann & Weisshaar
As If Things Weren't Bad Enough... Emerging markets weekly recap: Terrorist attacks in Mumbai... China tries to prevent a worsening situation... Thailand is an emerging market to keep an eye on... mark for My Articles similar articles
Parameters
Spring 2004
Matthew J. Morgan
The Origins of the New Terrorism A history of terrorism and where it's headed. mark for My Articles similar articles
Salon.com
February 1, 2002
Jeff Stein
Bin Laden's Olympic dreams Al-Qaida conducted "meticulous" surveillance of Salt Lake City, intelligence official says... mark for My Articles similar articles
National Defense
November 2010
Michael G. Frodl
Attack Against Oil Tanker Shows Why Terrorists and Pirates May Join Forces One night in late July, the Mitsui-owned MV M. Star, a Japanese oil tanker laden with crude and headed for Japan, experienced a "blast" against its hull as it approached the Strait of Hormuz. mark for My Articles similar articles
IEEE Spectrum
September 2006
Charles Perrow
Shrink The Targets Human nature can better withstand a dozen small disasters than a single great one, even if the casualty total is the same. Protecting America's big targets is next to impossible; we should instead downsize them to make them less consequential and easier to protect. mark for My Articles similar articles
National Defense
April 2015
Yasmin Tadjdeh
Big Data Helping to Pinpoint Terrorist Activities, Attacks Using big data for counter terrorism efforts will only become more prevalent as time goes on, said Josh New, a policy analyst at the Information Technology and Innovation Foundation's Center for Data Innovation. mark for My Articles similar articles
BusinessWeek
June 28, 2004
Paul Magnusson
The Smart Way To Fix Intelligence From Pearl Harbor to the terrorist attacks of September 11, the lesson keeps being repeated: A dollar spent on identifying the threat and preventing the attack can be worth far more than the millions spent safeguarding targets or the billions spent cleaning up the aftermath. mark for My Articles similar articles
IEEE Spectrum
April 2006
Prachi Patel-Predd
Cybercrime At A Glance But just how much damage can cybercrime cause? About $67 billion to U.S. companies last year, according to an estimate based on the Federal Bureau of Investigation's 2005 Computer Crime Survey. Here's more statistics. mark for My Articles similar articles
Reason
March 2005
Poole & Harper
Transportation Security Aggravation Debating the balance between privacy and safety in a post-9/11 aviation industry. mark for My Articles similar articles
BusinessWeek
March 29, 2004
Paul Magnusson
The Hard Lesson Of Madrid There are too many holes in the safety net. Here's what the U.S. still needs to do mark for My Articles similar articles
Fast Company
Michael Grothaus
White House Officials To Meet With Tech Execs To Discuss Countering Terrorism Online They will discuss the ongoing concern of how terrorists have become adept at using social media to recruit members and converts online. mark for My Articles similar articles
Fast Company
Sarah Kessler
Facebook, Twitter Would Be Forced To Report Terrorist Activity Under Proposed Bill Efforts in Washington have put a spotlight on the debate around the role of technology companies in aiding law enforcement's investigation of terrorist activity. mark for My Articles similar articles
National Defense
September 2010
Eric Beidel
Social Scientists and Mathematicians Join The Hunt for Terrorists Internet chat rooms and other online discussion forums supplement, and in some cases, have replaced mosques, community centers and coffee shops as meeting spots for jihadists, experts say. mark for My Articles similar articles
InternetNews
March 23, 2010
FBI Underboss Outlines Anatomy of a Cyber Gang As cyber criminals grow ever more sophisticated and organized, law enforcement agencies have had to step up their game to keep pace. One of the top men at the FBI shares what the bureau is doing to combat cyber crime. mark for My Articles similar articles
InternetNews
November 11, 2005
Roy Mark
FBI Hunkered in The Bunker Cyber G-men are responsible for investigating cyber attacks by foreign adversaries and terrorists, and for preventing online criminals from using the Internet to steal, defraud and otherwise victimize U.S. citizens, businesses and communities. mark for My Articles similar articles
Fast Company
March 15, 2007
J.J. Brazil
Mission: Impossible? The FBI is battling to transform itself in an age of technology and terrorism. It may be the toughest, most important change effort of our time. mark for My Articles similar articles
Popular Mechanics
June 2006
Brad Reagan
Public Defenders Protecting America's cities, ports, borders and airports requires new technology and new tactics. mark for My Articles similar articles
Fast Company
Neal Ungerleider
The NYPD's Visible -- and Invisible -- Plans for July 4th Security Although they will be increasing their security presence significantly at July 4th celebrations this year in the form of rooftop snipers and radiation detectors, that's only the tip of the iceberg. mark for My Articles similar articles
BusinessWeek
June 13, 2005
Stan Crock
Decades Of Terror Blunders Timothy Naftali's, Blind Spot: The Secret History of American Counterterrorism, offers fascinating detail on why needed reforms were neglected over the decades. mark for My Articles similar articles
PC World
March 2002
Kim Zetter
Snoopware: New Technologies, Laws Threaten Privacy The FBI's 'Magic Lantern' keystroke logger could help catch terrorists, but at what cost to your fundamental rights? mark for My Articles similar articles