WE CAN TIGHTEN AIR SECURITY WITHOUT CHOKING OFF TRAVEL

Source: USA Today
 
Across the world, hundreds of thousands of people are fleeing areas of war and civil unrest, entering European countries at alarming rates. In fact, according to a recent BBC report, since the start of 2015, nearly 340,000 migrants have been discovered crossing Europe’s external border, more than double the number from the same time period in 2014. This influx of immigrants presents not only a strain on European economies and resources, but also a possible security problem given justified concerns regarding the spread of terrorism and return of foreign fighters to recruit and carry out attacks.
Read more

TELEVISING THE REVOLUTION

 

Some revolutions change humanity for better, some for the worse, but they all share this: You don't know they've started when you're in them. On August 1, 1981, Buggles' "Video Killed the Radio Star" was the debut music video on the new Music Television Network, MTV. It was probably seen by less than 1,000 people that very day, but ask anyone under 50 now about music without video and you'll get a blank stare. 

Read more

WHY THE FEAR OVER UBIQUITOUS DATA ENCRYPTION IS OVERBLOWN

By: Michael Chertoff Mike McConnell & William Lynn
 
More than three years ago, as former national security officials, we penned an op-ed to raise awareness among the public, the business community and Congress of the serious threat to the nation’s well being posed by the massive theft of intellectual property, technology and business information by the Chinese government through cyberexploitation. Today, we write again to raise the level of thinking and debate about ubiquitous encryption to protect information from exploitation.
Read more

OPM BREACH LEAVES THREATS HIDDEN IN PLAIN SIGHT

Source: Fedscoop.com
 
The data breach of the Office of Personnel Management could affect more than 20 million Americans. Yet the true magnitude of this breach lies not in the number of individuals affected, but in the seemingly infinite ways it has compromised our national security.The risk of widespread identity theft or other uses of personally identifiable information for financial gain is not to be taken lightly. But, in my view, it pales in comparison to how it has jeopardized our national security workforce, both in government and the private sector, and degraded the integrity of our security clearance system. Quite simply, it is a national security risk unlike any I’ve seen in my 50 years in the intelligence community.
Read more

Complying with FBI Cloud Policy

By: Paul Rosenzweig and Michael Keating
Source: American City & Country
 

All cloud products sold to law enforcement must comply with the FBI’s Criminal Justice Information Services (CJIS) Security Policy. Unfortunately, a recent study showed that half of law enforcement officials have no knowledge or are not familiar with CJIS rules and requirements. The International Association of Chiefs of Police (IACP) conducted the study and to help has issued a report,“Guiding Principles on Cloud Computing in Law Enforcement.”

GPN reached out to Paul Rosenzweig, senior advisor to the Washington, D.C.-based Chertoff Group, who offers his views on the topic. Michael Chertoff is one of the founders of the firm and is a former secretary of the U.S. Dept. of Homeland Security.

Read more

BIG BROTHER IS WATCHING EU

 
A strange — and strangely unnoticed — trend is emerging in the evolving global response to massive 2013 leaks about US surveillance activities. While our European cousins talk privacy reform, the United States is actually moving ahead with it, albeit more slowly than many would like. As the American side of the Atlantic inches toward self-restraint, many European governments are seeking sweeping new spying powers. Europe is at risk of falling behind the US in privacy reform. 
 
Read more