INFORMATION

Site Map - Homeland Security

Weapons at risk

- Department of Defense policies are not addressing the risk of foreign software developers inserting malicious code or backdoors that could jeopardize weapons systems, concludes a new Government Accountability Office (GAO) report. GAO investigators found that "11 of the 16 software intensive weapon systems we reviewed did not make foreign involvement in software development a specific element of their risk management efforts." Pentagon officials agreed with many of the GAO's findings, and pointed out that "risk attributable to software vulnerabilities are not limited to foreign suppliers." @ Knowledge of Software Suppliers Needed to Manage Risks " is at SM Online.

Information Sharing

- A new secure Department of Homeland Security Web site called Lessons Learned Information Sharing (LLIS) is open to approved emergency response providers and homeland security officials at the local, state, and federal levels.

Did You Know That?

- The Department of Homeland Security has called for proposals from universities interested in studying the behavioral basis of terrorism. DHS is allocating $12 million to establish a university-based Center of Excellence in Behavioral and Social Aspects of Terrorism and Counter-Terrorism. The center is expected to focus on both the behavior of terrorists and the effects of threats and attacks on populations. Proposals are due by the end of this month. @ For more information, go to SM Online.

Homeland security

- A proposed bill would require DHS to issue a national standard for emergency and disaster preparedness, security training, and recovery in the private sector.

Terrorism and Cyberattacks Threaten British Firms

- A new report warns British businesses to prepare for homegrown terrorism threats and Chinese cyberattacks.

Businesses in Scotland Benefit from Counter Terrorism Training

- Project Griffin to be rolled out across Scotland.

Quick Bytes: Time well spent?

- The Department of Homeland Security's (DHS's) Inspector General (IG) recently slammed the agency for not implementing "adequate security controls to protect data transmitted on wireless networks and devices." The IG's report called DHS's wireless policy incomplete and also pointed out that none of the wireless systems in use has been certified or accredited, though DHS security policy mandates this. @ The full report and a response from DHS Chief Information Officer Steven I. Cooper

SEVIS at Your Service

- The Student and Exchange Visitor Information System (SEVIS), which was criticized when it was started by the Department of Homeland Security (DHS) in July 2002, is now showing signs of improvement, according to the GAO.

Keystone to Antiterror Fight

- Reaves said the Web site contains information gathered from the U.S. Department of Homeland Security, the Pennsylvania Office of Homeland Security, and other government agencies.

Time well spent?

- The Department of Homeland Security's (DHS's) Inspector General (IG) recently slammed the agency for not implementing "adequate security controls to protect data transmitted on wireless networks and devices." The IG's report called DHS's wireless policy incomplete and also pointed out that none of the wireless systems in use has been certified or accredited, though DHS security policy mandates this. @ The full report and a response from DHS Chief Information Officer Steven I. Cooper

SEVIS at Your Service

- The Student and Exchange Visitor Information System (SEVIS), which was criticized when it was started by the Department of Homeland Security (DHS) in July 2002, is now showing signs of improvement, according to the GAO.

White House Wants to Cut Homeland Security Programs

- A leaked budget memo, obtained by the Associated Press, calls for deep cuts to local homeland security programs.

National Institutes of Health Report Fails to Analyze Lab Risks

- A National Institutes of Health draft report on risks associated with a proposed biocontainment laboratory is not credible, according to the National Academies.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.