INFORMATION

Site Map - Homeland Security

Massive Waste at DHS, Says Report

- A new report from a private watchdog group "details billions of dollars in waste and mismanagement of taxpayer dollars" at DHS.

Terrorist Tracking

- In plain English, this means that via a Homeland Security Presidential Directive, the FBI will oversee a new multiagency Terrorist Screening Center.SM Online brings you the report.

US-VISIT

- In January, the Department of Homeland Security (DHS) implemented phase one of the United States Visitor and Immigrant Status Indicator Technology, or US-VISIT, a program to collect, maintain, and share information on foreign nationals.

Weapons at risk

- Department of Defense policies are not addressing the risk of foreign software developers inserting malicious code or backdoors that could jeopardize weapons systems, concludes a new Government Accountability Office (GAO) report. GAO investigators found that "11 of the 16 software intensive weapon systems we reviewed did not make foreign involvement in software development a specific element of their risk management efforts." Pentagon officials agreed with many of the GAO's findings, and pointed out that "risk attributable to software vulnerabilities are not limited to foreign suppliers." @ Knowledge of Software Suppliers Needed to Manage Risks " is at SM Online.

Information Sharing

- A new secure Department of Homeland Security Web site called Lessons Learned Information Sharing (LLIS) is open to approved emergency response providers and homeland security officials at the local, state, and federal levels.

Did You Know That?

- The Department of Homeland Security has called for proposals from universities interested in studying the behavioral basis of terrorism. DHS is allocating $12 million to establish a university-based Center of Excellence in Behavioral and Social Aspects of Terrorism and Counter-Terrorism. The center is expected to focus on both the behavior of terrorists and the effects of threats and attacks on populations. Proposals are due by the end of this month. @ For more information, go to SM Online.

Homeland security

- A proposed bill would require DHS to issue a national standard for emergency and disaster preparedness, security training, and recovery in the private sector.

Terrorism and Cyberattacks Threaten British Firms

- A new report warns British businesses to prepare for homegrown terrorism threats and Chinese cyberattacks.

Businesses in Scotland Benefit from Counter Terrorism Training

- Project Griffin to be rolled out across Scotland.

Quick Bytes: Time well spent?

- The Department of Homeland Security's (DHS's) Inspector General (IG) recently slammed the agency for not implementing "adequate security controls to protect data transmitted on wireless networks and devices." The IG's report called DHS's wireless policy incomplete and also pointed out that none of the wireless systems in use has been certified or accredited, though DHS security policy mandates this. @ The full report and a response from DHS Chief Information Officer Steven I. Cooper

SEVIS at Your Service

- The Student and Exchange Visitor Information System (SEVIS), which was criticized when it was started by the Department of Homeland Security (DHS) in July 2002, is now showing signs of improvement, according to the GAO.

Keystone to Antiterror Fight

- Reaves said the Web site contains information gathered from the U.S. Department of Homeland Security, the Pennsylvania Office of Homeland Security, and other government agencies.

Time well spent?

- The Department of Homeland Security's (DHS's) Inspector General (IG) recently slammed the agency for not implementing "adequate security controls to protect data transmitted on wireless networks and devices." The IG's report called DHS's wireless policy incomplete and also pointed out that none of the wireless systems in use has been certified or accredited, though DHS security policy mandates this. @ The full report and a response from DHS Chief Information Officer Steven I. Cooper
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.