Similar Articles |
|
National Defense January 2009 Magnuson & Rusling |
'Scrambling Data' a Greater Threat Than Hacking Hackers defacing websites or stealing information is bad, but the destruction of computer data could be worse, said Director of National Intelligence Michael McConnell, in one of his last speeches as a member of the Bush administration. |
National Defense November 2013 Yasmin Tadjdeh |
Al-Qaida Seen Shifting Tactics to Smaller Attacks The Boston bombing quickly brought domestic jihadist terrorism back into the public eye. Counterterrorism analysts are now concerned that the United States may soon face an increase in deadly, smaller scale attacks. |
Fast Company May 2009 Ellen McGirt |
Fast Cities: New York In the aftermath of the September 11 attacks, New York City Police Commissioner Ray Kelly has built the most successful local counterterrorism unit in the U.S. and perhaps the world. |
The Motley Fool September 11, 2006 Bill Mann |
Just Whose Tragedy Was It? We all became internationalists that day. Beyond the immeasurable cost in lives lost, the economic impact of Sept. 11 has spread to all corners of the globe. But what about the intangible numbers? |
InternetNews June 1, 2010 |
'Scareware' Targeted by FBI The FBI has moved to nip one of the largest so-called "scareware" Internet scams going. How big has the damage been to date? |
National Defense November 2010 Stew Magnuson |
DHS Warns Local Law Enforcement Of New Homegrown Terrorist Threat The general consensus in the intelligence community is that the homegrown terrorist threat during the last year has supplanted plots that originate overseas. |
National Defense January 2009 Magnuson & Rusling |
A Domestic Counterterrorism Agency? It's a Numbers Game The question of whether to create a standalone domestic intelligence agency for counter-terrorism comes down to some cold, hard math, said The Rand Corp. in a recent study. |
National Defense June 2006 Harold Kennedy |
Intelligence Sharing: `Still a Battle' According to the National Counterterrorism Center, despite efforts since 9/11 to improve the gathering and analysis of government and military intelligence, getting agencies to pool information is still difficult. |
Military & Aerospace Electronics September 2004 |
The 9/11 Report: Details of the central event of our time It's not the sophisticated sensors, signal processing, satellite communications, and automation technology that wins the day in the end; it's the people who use the technology that make the difference. |
Reason April 2002 Mike Lynch |
Data: Big Talkers Post-September 11, it seems strange that terrorist threats once needed to be hyped. But that's exactly what the Department of Justice did to help justify its $22 billion budget, according to a Miami Herald investigation... |
PC World September 12, 2001 Dan Verton |
Next: Cyberterrorism? Security experts urge companies to guard against digital violence... |
The Motley Fool December 4, 2008 Mann & Weisshaar |
As If Things Weren't Bad Enough... Emerging markets weekly recap: Terrorist attacks in Mumbai... China tries to prevent a worsening situation... Thailand is an emerging market to keep an eye on... |
Parameters Spring 2004 Matthew J. Morgan |
The Origins of the New Terrorism A history of terrorism and where it's headed. |
Salon.com February 1, 2002 Jeff Stein |
Bin Laden's Olympic dreams Al-Qaida conducted "meticulous" surveillance of Salt Lake City, intelligence official says... |
National Defense November 2010 Michael G. Frodl |
Attack Against Oil Tanker Shows Why Terrorists and Pirates May Join Forces One night in late July, the Mitsui-owned MV M. Star, a Japanese oil tanker laden with crude and headed for Japan, experienced a "blast" against its hull as it approached the Strait of Hormuz. |
IEEE Spectrum September 2006 Charles Perrow |
Shrink The Targets Human nature can better withstand a dozen small disasters than a single great one, even if the casualty total is the same. Protecting America's big targets is next to impossible; we should instead downsize them to make them less consequential and easier to protect. |
National Defense April 2015 Yasmin Tadjdeh |
Big Data Helping to Pinpoint Terrorist Activities, Attacks Using big data for counter terrorism efforts will only become more prevalent as time goes on, said Josh New, a policy analyst at the Information Technology and Innovation Foundation's Center for Data Innovation. |
BusinessWeek June 28, 2004 Paul Magnusson |
The Smart Way To Fix Intelligence From Pearl Harbor to the terrorist attacks of September 11, the lesson keeps being repeated: A dollar spent on identifying the threat and preventing the attack can be worth far more than the millions spent safeguarding targets or the billions spent cleaning up the aftermath. |
IEEE Spectrum April 2006 Prachi Patel-Predd |
Cybercrime At A Glance But just how much damage can cybercrime cause? About $67 billion to U.S. companies last year, according to an estimate based on the Federal Bureau of Investigation's 2005 Computer Crime Survey. Here's more statistics. |
Reason March 2005 Poole & Harper |
Transportation Security Aggravation Debating the balance between privacy and safety in a post-9/11 aviation industry. |
BusinessWeek March 29, 2004 Paul Magnusson |
The Hard Lesson Of Madrid There are too many holes in the safety net. Here's what the U.S. still needs to do |
Fast Company Michael Grothaus |
White House Officials To Meet With Tech Execs To Discuss Countering Terrorism Online They will discuss the ongoing concern of how terrorists have become adept at using social media to recruit members and converts online. |
Fast Company Sarah Kessler |
Facebook, Twitter Would Be Forced To Report Terrorist Activity Under Proposed Bill Efforts in Washington have put a spotlight on the debate around the role of technology companies in aiding law enforcement's investigation of terrorist activity. |
National Defense September 2010 Eric Beidel |
Social Scientists and Mathematicians Join The Hunt for Terrorists Internet chat rooms and other online discussion forums supplement, and in some cases, have replaced mosques, community centers and coffee shops as meeting spots for jihadists, experts say. |
InternetNews March 23, 2010 |
FBI Underboss Outlines Anatomy of a Cyber Gang As cyber criminals grow ever more sophisticated and organized, law enforcement agencies have had to step up their game to keep pace. One of the top men at the FBI shares what the bureau is doing to combat cyber crime. |
InternetNews November 11, 2005 Roy Mark |
FBI Hunkered in The Bunker Cyber G-men are responsible for investigating cyber attacks by foreign adversaries and terrorists, and for preventing online criminals from using the Internet to steal, defraud and otherwise victimize U.S. citizens, businesses and communities. |
Fast Company March 15, 2007 J.J. Brazil |
Mission: Impossible? The FBI is battling to transform itself in an age of technology and terrorism. It may be the toughest, most important change effort of our time. |
Popular Mechanics June 2006 Brad Reagan |
Public Defenders Protecting America's cities, ports, borders and airports requires new technology and new tactics. |
Fast Company Neal Ungerleider |
The NYPD's Visible -- and Invisible -- Plans for July 4th Security Although they will be increasing their security presence significantly at July 4th celebrations this year in the form of rooftop snipers and radiation detectors, that's only the tip of the iceberg. |
BusinessWeek June 13, 2005 Stan Crock |
Decades Of Terror Blunders Timothy Naftali's, Blind Spot: The Secret History of American Counterterrorism, offers fascinating detail on why needed reforms were neglected over the decades. |
PC World March 2002 Kim Zetter |
Snoopware: New Technologies, Laws Threaten Privacy The FBI's 'Magic Lantern' keystroke logger could help catch terrorists, but at what cost to your fundamental rights? |