INFORMATION

Site Map - Homeland Security

Time well spent?

- The Department of Homeland Security's (DHS's) Inspector General (IG) recently slammed the agency for not implementing "adequate security controls to protect data transmitted on wireless networks and devices." The IG's report called DHS's wireless policy incomplete and also pointed out that none of the wireless systems in use has been certified or accredited, though DHS security policy mandates this. @ The full report and a response from DHS Chief Information Officer Steven I. Cooper

SEVIS at Your Service

- The Student and Exchange Visitor Information System (SEVIS), which was criticized when it was started by the Department of Homeland Security (DHS) in July 2002, is now showing signs of improvement, according to the GAO.

White House Wants to Cut Homeland Security Programs

- A leaked budget memo, obtained by the Associated Press, calls for deep cuts to local homeland security programs.

National Institutes of Health Report Fails to Analyze Lab Risks

- A National Institutes of Health draft report on risks associated with a proposed biocontainment laboratory is not credible, according to the National Academies.

First responders

- No one is really sure how interoperable public safety wireless communications systems are with one another. The DHS intends to do a survey on the topic, with results available by next year. In the meantime, the GAO suggests that the federal government develop national requirements and a national architecture for such systems, create nationwide databases, and provide financial and technical support to states and localities to help them make their systems interoperable. For their part, states should establish bodies to develop interoperability improvement plans.

Information sharing

- Although the Department of Homeland Security (DHS) has taken actions to implement the public-private partnership called for by federal critical infrastructure protection policy, "it has not yet developed a plan that describes how it would carry out its information-sharing responsibilities and relationships." GAO auditors recommend that DHS describe the roles and responsibilities of DHS, information sharing and analysis centers (ISACs), and other stakeholders. The GAO also recommends that the DHS create policies and procedures for sharing information provided by ISACs amongst its departments.

Homeland security.

-

Fusion Centers' Mission Failure?

- The GAO finds that state fusion centers have drifted from their original counterterrorism mission while center officials complain of federal government neglect.

Did You Know That?

- Much of the fear of "dirty bombs" is a fear of the unknown. Security managers who wish to educate employees can turn to a fact sheet from the National Academies and the Department of Homeland Security. It explains what dirty bombs are and are not, what they do, what danger they present, and how people can protect themselves. @ To download the sheet, go to SM Online.

Critical Infrastructure: Homeland Security and Emergency Preparedness

- This work offers a compendium of U.S. government guidelines and tools for working in critical infrastructure protection.

Is Homeland Security Strategically Focused?

- Although 9-11 is said to have changed everything, the United States hasn't sufficiently changed the way it fights terrorism.

Tracking Dangerous Cargo

- Find out how government and industry are taking steps to mitigate both safety and security risks that can arise when hazardous materials are transported by rail or truck.

A Web of Intelligence Networks

- Getting government agencies to share security information means first identifying the networks involved. A congressional briefing by the Government Accountability Office identified nine agencies and 34 networks that support homeland security functions (two of these networks are still under development). The briefing outlines each network and gives examples of how they might work together for counterterrorism efforts.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.