NEWS & ANALYSIS

Transition to New Administration Could be Messy for DHS; Top 10 Positions at DHS That Must be Filled Quickly

The transition from the Bush administration to either a Barack Obama or a John McCain administration could spell problems for the Department of Homeland Security, thus leaving the country vulnerable to attack.

Intelligence Official Proposes U.S. Government Help Companies Protect Proprietary Data

The principal deputy director of national intelligence says the government should consider taking equity stakes in high technology companies to prevent proprietary information from falling into the wrong hands.

FTC Delays Implementation of Red-Flag Rule

The Federal Trade Commission recently announced a six month extension on the compliance deadline for its red-flag rule that requires creditors and banks to have identity theft programs.

U.S. Vulnerable During First Year of New President; Greater Possibility of Conflict Through 2025, Says Intelligence Chief

During a speech outlining the security problems the United States will face up to and through 2025, the Director of National Intelligence Mike McConnell told an audience of intelligence officials and contractors yesterday that the U.S. is most vulnerable to attack during a new president's first year in office.

U.S. Has Spent at Least $6 Billion in Iraq on Private Security Contractors

The United States has spent at least $6 billion on private security contractors, like Blackwater USA, in Iraq since the war began in April 2003, according to a report released today by the Special Inspector General for Iraq Reconstruction.

Malware Attacks Show the Connection Between Markets and Cybercrime

Malware attacks have shifted and spiked in frequency during the financial crisis.

Texas Prisons Fight Contraband Cell Phones

A recent problem, the issue became more pressing when a convicted murderer on death row called a state senator from his cell with a contraband cell phone.

(updated)

Report Explores Terrorist Use of Web-to-Mobile Phone Technologies

Terrorist groups, says U.S. Army intelligence, could use mobile phones and online technologies, such as Twitter, to bolster their effectiveness.

Chertoff Says U.S. Must be Vigilant During Transition to New President

Al Qaeda has a history of attacking enemies during election season.

(updated)

Homeland Security Must Emphasize IT and Data Security, Leaders Say

Post-9-11 efforts may be thwarting physical terrorist attack plots but, going forward, the nation must focus on protecting its IT assets and key intellectual property.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.