Site Map - Homeland Security

Is It Safe to Share Sensitive Data?

- A new rule from DHS encourages industry to share data with the government. But is the protection provided real or illusory?

Working Wirelessly and Wisely

- The document defines public safety requirements and roles and then defines the various types of communications services, from voice to data. It then lays out a number of communications scenarios, such as the one mentioned, to give an idea of the challenges faced in improving the ability of public safety personnel to communicate among themselves and with other agencies and organizations with whom they work, as well as with the public. The paper then identifies wireless communications operational needs and gives definitions of wireless communications functional requirements. A glossary and a list of system capabilities can be found in appendices.

Working Wirelessly and Wisely

- A man suffers chest pains after a game of tennis, and his relatives call 9-1-1. The dispatch center notifies an ambulance and digitally sends to it the patient's name and address, which are displayed on a monitor in the ambulance along with a map to the house and an on-board signaling system that adjusts the traffic-light sequence to enable the ambulance to arrive faster. That system also automatically interrogates local transportation systems to make sure there are no road closures or slow traffic conditions on the way.

Critical infrastructure protection

- The House Select Committee on Homeland Security's Subcommittee on Infrastructure and Border Security and Subcommittee on Cybersecurity, Science, Research, and Development held a joint hearing to discuss the relationship between the Department of Homeland Security (DHS) and various private groups responsible for critical infrastructure. Witnesses at the hearing noted that information sharing plans are ongoing but are still in need of refinement. Complete witness testimony is available at SM Online.

Fingerprint Collection Increases at Dulles

- DHS has begun collecting 10 fingerprints per international visitor to increase security and accuracy. The policy will extend to all ports of entry by the end of 2008.

Cyberattack on Nuclear Laboratory May Have China Link

- Oak Ridge National Laboratory, according to a government memo, suffered phishing attacks possibly from China.

Virtual Border Fencing A Go Despite Problems

- Virtual fencing, to be deployed by the Department of Homeland Security, may not work as contractor promised.

Britain Looks to Increase Precharge Detention to 42 Days

- Prime Minister Gordon Brown and his Home Secretary are seeking a maximum of 42 days to hold terrorism suspects without charge in exceptional circumstances.

Massive Waste at DHS, Says Report

- A new report from a private watchdog group "details billions of dollars in waste and mismanagement of taxpayer dollars" at DHS.

Terrorist Tracking

- In plain English, this means that via a Homeland Security Presidential Directive, the FBI will oversee a new multiagency Terrorist Screening Center.SM Online brings you the report.


- In January, the Department of Homeland Security (DHS) implemented phase one of the United States Visitor and Immigrant Status Indicator Technology, or US-VISIT, a program to collect, maintain, and share information on foreign nationals.

Weapons at risk

- Department of Defense policies are not addressing the risk of foreign software developers inserting malicious code or backdoors that could jeopardize weapons systems, concludes a new Government Accountability Office (GAO) report. GAO investigators found that "11 of the 16 software intensive weapon systems we reviewed did not make foreign involvement in software development a specific element of their risk management efforts." Pentagon officials agreed with many of the GAO's findings, and pointed out that "risk attributable to software vulnerabilities are not limited to foreign suppliers." @ Knowledge of Software Suppliers Needed to Manage Risks " is at SM Online.

Information Sharing

- A new secure Department of Homeland Security Web site called Lessons Learned Information Sharing (LLIS) is open to approved emergency response providers and homeland security officials at the local, state, and federal levels.

Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.