Court Likely to Uphold Constitutionality of 'Nude' Airport Scanners | Threat Level | Wi... - 0 views
-
Airline passengers in the United States understand they will be treated as suspected terrorists when going through airport security checkpoints. Yet nearly a decade after the Sept. 11, 2001 terror attacks, airport security has become a lot more invasive with the rollout of the so-called "advanced imaging technology" scanners, paid for with $1 billion in stimulus funds. The scanners - now deployed at about 78 airports - use either millimeter wave or backscatter technology to create a virtual picture of the traveler's naked body. The image is then viewed by a screener with the Transportation Security Agency iin a sequestered room away from the checkpoint.
Suspicious Activity Reporting Is Now Mobile - In Kentucky - 0 views
-
The Kentucky Office Of Homeland Security (KOHS) has released an iPhone app that allows users to be "the eyes and ears" of Kentucky in hopes to prevent domestic terror attacks. The app allows users to submit information on suspects who act strangely, ask questions about building security, or other such things. The app also allows users to submit information anonymously.
FBI - The Cyber Threat: Who's Doing What to Whom? - 0 views
-
Speech by Steven R. Chabinsky, Deputy Assistant Director, Cyber Division, Federal Bureau of Investigation - delivered March 23, 2010 "...to talk with you about the cyber threat, why it's important, and how you can help your organizations-and in doing so, help our country-rise to this enormous challenge. Some of you no doubt are on the front lines of the cyber security problem and are quite familiar with it, while others of you may only have passing familiarity with this growing problem. First, let me share with you the importance of the cyber security problem from the lens of the FBI. As you know, the FBI is a law enforcement agency that investigates hundreds of federal crimes as well as a domestic national security agency that combats terrorism, espionage, treason, and sabotage.
Protecting Cyberspace as a National Asset Act of 2010 (S.3480) - Senate version of the ... - 0 views
-
A Senate bill sponsored by: Sen Lieberman, Joseph I. [CT] Establishes in the Executive Office of the President an Office of Cyberspace Policy, which shall: (1) develop a national strategy to increase the security and resiliency of cyberspace; (2) oversee, coordinate, and integrate federal policies and activities relating to cyberspace security and resiliency; (3) ensure that all federal agencies comply with appropriate guidelines, policies, and directives from the Department of Homeland Security (DHS), other federal agencies with responsibilities relating to cyberspace security or resiliency, and the National Center for Cybersecurity and Communications (established by this Act); and (4) ensure that federal agencies have access to, receive, and appropriately disseminate law enforcement, intelligence, terrorism, and any other information relevant to the security of specified federal, military, and intelligence information infrastructure.
'Terrorizing' Twitter & Facebook - 1 views
1 - 9 of 9
Showing 20▼ items per page