Columns

Best Practices - page 4

// by Homeland Security Today

Knowing the Contents of Cargo Containers Before They Arrive at US Shores

A recent comprehensive report by Anthony Kimery, Homeland Security Today’s Online Editor and Online Media Division manager, outlined the issues of not knowing whether radiation is present in shipping containers arriving at 22 US maritime ports. While his report focused on problems, costs, function and effectiveness of portal monitors for scanning containers, it also made… Keep Reading

// by Homeland Security Today

Software Helps FBI Academy Instruction Spark Discussions, Test Knowledge

At the FBI National Academy in Virginia, law enforcement personnel from across the US and around the world receive professional instruction to elevate law enforcement standards, increase knowledge and improve cooperation on a global scale. I recently attended an intensive training program at the Quantico campus along with more than 250 other participants, serving as… Keep Reading

// by Homeland Security Today

Tampa Police Department Use CDP Field Force Training During RNC

When Tampa, Fla., was identified as the locationfor the 2012 Republican National Convention (RNC), the Tampa Police Department (TPD) wasted no time assessing their preparedness for an event of that size and of such national importance. TPD expected thousands of groups to rally in the city during the RNC, and with no formal training in… Keep Reading

// by Homeland Security Today

Facing Up to Fraud in Government in 2013

The Internal Revenue Service (IRS) estimates that the 2012 tax gap is almost $350 billion. A recent audit though indicated that the IRS may lose $21 billion over the next five years due to identity theft — one of the fastest growing areas of losses to the agency. Meanwhile, a recent Government Accountability Office (GAO)… Keep Reading

Placeholder
// by Homeland Security Today

Dissuading the Enemy: How Context, Content and Connection Can Influence Adversary Decisions and Actions

Strategic targeted messaging can be crucial in dissuading and deterring adversary attacks on the homeland and American interests overseas. Government agencies and terrorism experts focusing on homeland security and protection of Americans may benefit from incorporating adversary-targetedmessaging in existing communications strategies. Homeland security officials can utilize this type of messaging to increase the adversary’s perception… Keep Reading

// by Homeland Security Today

Managing Insider Threats

The number of annual security incidents caused by insider threats continues to increase. In The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes, authors Dawn M. Cappelli, Andrew P. Moore and Randall F. Trzeciak, wrote: “Insider threats are an intriguing and complex problem. Some assert that they are the… Keep Reading

// by Homeland Security Today

Emergency Preparedness: Implementing an Internet Independent Backup Network

Hurricane Sandy reminded us of just how vulnerable components of our critical infrastructure can be, and of the importance of good planning. For government agencies that provide critical services to citizens, the ability to communicate is the one function that enables all others. That’s why one of an organization’s worst nightmares involves a catastrophic event… Keep Reading

// by Homeland Security Today

Video-Managed Services Enhance Inter-Agency Communications and Collaboration, Solve Telework and BYOD Issues

2013 looks to be the year when the federal government truly embraces video as a primary means of communicating with both internal and external constituencies. Interest in technology is changing, as is the demand for real-time, interagency communications. In addition, administrators remain under continuous pressure to reduce costs, while at the same time adhering to… Keep Reading

// by Homeland Security Today

Data: Public Safety’s Greatest Hidden Asset to Fight Crime

Police chiefs and police officers from all over the world recently descended on San Diego for the annual International Association of Chiefs of Police (IACP) conference. During the meeting, in displays reminiscent of the character “Q” from all the wonderful James Bond movies, considerable attention was focused on the whiz bang gadgetry and equipment. But hidden… Keep Reading

// by Homeland Security Today

Three Reasons why Iris Recognition Will Revolutionize Border Management

This is a challenging time for border management authorities. Security concerns and cross-border traffic are ever-increasing and budgets are constrained, unable to keep up with the growing demands. Many governments are turning toward automated border crossing solutions, enabled by biometric checks, as a way to scale throughput and increase security with limited headcount. Combined with… Keep Reading

// by Homeland Security Today

Hurricane Sandy Draws Focus on Telework and Remote Access Security

On the heels of Hurricane Sandy’s devastation of large swaths of the East Coast, most government agencies (federal, state and municipal), businesses and other organizations have shut down. Only a handful of "essential" employees are reporting to work, and, in some cases, even allowed on the roads. Accordingly, the past year’s emphasis on supporting telework… Keep Reading

// by Homeland Security Today

Through Terrorist Eyes: How Interdisciplinary Fieldwork Sheds Light on Conflict

Media, policymakers and even academics routinely categorize terrorists and their organizations as “crazy.” This approach carries risk, because it can hinder our ability to understand and counter terrorism. What we do know is that although it’s our gut instinct to think only people who are crazy can carry out terrorist acts, in reality, most terrorists… Keep Reading

// by Homeland Security Today

Terrorism Financing and Money Laundering Forum Discusses Solutions

Osama Bin Laden once said, “Al Qaida is comprised of modern, educated young people who are [as] aware of the cracks in the Western financial system as they are of the lines in their own hands. These are the very flaws in the Western financial system, which [are] becoming a noose for it.” This prescient… Keep Reading

// by Homeland Security Today

Social Media Analytics Can Aid Law Enforcement, First Responders in Civil Unrest, Disasters, Investigations

With the proliferation of Facebook, Twitter, Pinterest and other social media websites, law enforcement agencies and first responders would do well to acclimate themselves to these tools.  Why? Because such websites can provide crucial information during civil unrest, natural disasters and other disturbances. Gaining real-time information can make a tremendous impact on response times and… Keep Reading

// by Homeland Security Today

Social Media Analytics Can Aid Law Enforcement, First Responders in Civil Unrest, Disasters, Investigations

With the proliferation of Facebook, Twitter, Pinterest and other social media websites, law enforcement agencies and first responders would do well to acclimate themselves to these tools.  Why? Because such websites can provide crucial information during civil unrest, natural disasters and other disturbances. Gaining real-time information can make a tremendous impact on response times and… Keep Reading

// by Homeland Security Today

Best Practices for Avoiding the Pitfalls of Crime Mapping

Government organizations are faced with an exponential growth in data. So much so that many law enforcement agencies have resorted to capturing crucial data from the web, social media and public reports, and then applying analytics to it to explore the structures and activities of organized crime groups, analyze networks and identify “hot spots” for… Keep Reading

Placeholder
// by Homeland Security Today

Best Practices for Addressing NERC CIPv4, Preparing for NERC CIPv5

While the North American Electric Reliability Corporation’s (NERC) Critical Infrastructure Protection (CIP) is still relatively young, many organizations that have assets identified as NERC CIP critical assets have had a couple of years to become familiar with NERC CIP compliance requirements, and to prepare for the audit process. Luckily, there were no changes from a… Keep Reading

// by Homeland Security Today

How Hospitals Plan for Disasters in the Wake of 9/11, Katrina and the Anthrax Scare

The events of Sept. 11, 2001 changed the rules of hospital emergency preparedness. And now, more than a decade later, the rules are still changing, driven by multiple high-profile events that have highlighted the important role of health care facilities in disaster response. The tragedy that took place on 9/11 prompted leaders of hospitals around… Keep Reading

// by Homeland Security Today

Achieving ROI with Video Management Software in the Government Sector

The best way to achieve a return on investment (ROI) with video management software (VMS) is to maximize the systemwide benefits of an IP networked video system. New VMS capabilities make it possible to achieve ROI faster because they empower systems that do more, more efficiently, often using fewer personnel. Making systems easier to use… Keep Reading

// by Homeland Security Today

When to Move to a Networked Video Platform

Transitioning from analog to an IP networked platform for video surveillance offers both challenges and opportunities. Careful consideration of both is essential before making the jump. First, let’s evaluate the challenges. Cost is a primary consideration. Newer network camerasare still generally more expensive than analog cameras, but the price difference is less than ever. Other… Keep Reading

Go to Top
X
X