MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
National Defense
March 2009
Magnuson & Rusling
Noted Police Chief Slams Federal-Local Partnerships The man who led the local police response to the 9/11 attacks on the Pentagon hopes the new administration does a better job of coordinating counterterrorism efforts with local law enforcement. mark for My Articles similar articles
InternetNews
January 10, 2007
Roy Mark
Data Mining Giving Privacy the Shaft? Democrats use privacy rights as first issue before Senate Judiciary Committee. mark for My Articles similar articles
Reason
July 2008
Jesse Walker
Warcraft on Terror The Office of the Director of National Intelligence wants to "study the emerging phenomenon of social (particularly terrorist) dynamics in virtual worlds and large-scale online games." mark for My Articles similar articles
InternetNews
August 30, 2005
Roy Mark
GAO: Feds Not Protecting Citizen Privacy Government agencies are making progress, but are still not completely complying with federal rules regarding data mining and personal information. mark for My Articles similar articles
PC World
September 14, 2001
Sam Costello
Carnivore Dispatched to Sniff Out Terrorists Senate OKs measure to broaden technology's use, urges research for more tools... mark for My Articles similar articles
PC World
October 5, 2001
Frank Thorsberg
PC World Poll Highlights Privacy Concerns Our online poll shows most readers are concerned about giving the government more power for online surveillance... mark for My Articles similar articles
National Defense
March 2010
Stew Magnuson
Give Police a Seat at the Homeland Security Policy Table, Says Sheriff Police departments have a lot to contribute to the international fight against terrorism and should be able to participate in big picture strategy discussions that shape U.S. diplomacy and international relations. mark for My Articles similar articles
National Defense
November 2010
Stew Magnuson
DHS Warns Local Law Enforcement Of New Homegrown Terrorist Threat The general consensus in the intelligence community is that the homegrown terrorist threat during the last year has supplanted plots that originate overseas. mark for My Articles similar articles
Mother Jones
Nov/Dec 2001
Julie Wakefield
A Face in the Crowd Is surveillance software turning police into Robocops? mark for My Articles similar articles
National Defense
July 2011
Stew Magnuson
Plan to Create Center To Thwart Domestic Bombings Falls Short A proposal to put under one roof representatives of government agencies that are involved in thwarting the use of explosives as weapons of terror in the United States has been scrapped. mark for My Articles similar articles
Fast Company
Sarah Kessler
Facebook, Twitter Would Be Forced To Report Terrorist Activity Under Proposed Bill Efforts in Washington have put a spotlight on the debate around the role of technology companies in aiding law enforcement's investigation of terrorist activity. mark for My Articles similar articles
Bank Systems & Technology
March 7, 2005
Cynthia Ramsaran
Banks Brace for New Antiterrorism Law It is too early to know how financial institutions will be affected and what systems will have to be in place in order for the government to monitor suspicious activity. mark for My Articles similar articles
National Defense
October 2013
Stew Magnuson
Police Want Unpiloted Aircraft for Routine Tasks, Not Snooping, Former Chief Asserts Police departments would probably use them for more routine tasks, said Donald Shinnamon, a business development executive at UAV-maker Institu Inc., and one-time chair of the aviation committee of the International Association of Chiefs of Police. mark for My Articles similar articles
Reason
November 2003
Show Us Your Money The USA PATRIOT Act lets the feds spy on your finances. But does it help catch terrorists? mark for My Articles similar articles
PC World
September 12, 2001
Tom Spring & Frank Thorsberg
Will Attack Hurt Net Privacy? Privacy advocates urge government to balance security needs and civil liberties... mark for My Articles similar articles
National Defense
September 2009
Stew Magnuson
Feds Begin to Tackle the Vexing Problem of How to Defeat Homemade Bombs Congress' attention remains focused on preventing the use of weapons of mass destruction on U.S. soil, but improvised explosive devices do not receive the same attention as the chemical, biological or nuclear threats. mark for My Articles similar articles
Reason
December 2001
Guarding the Home Front Will civil liberties be a casualty in the War on Terrorism? A panel of experts discuss which civil liberties they think are most at risk in what has been called America's first 21st century war... mark for My Articles similar articles
National Defense
March 2013
Valerie Insinna
Companies Introduce New Software to Defeat Suicide Bombers The military continues to invest in behavior prediction software that can alert defense and law enforcement agencies to a terrorist threat in real time. mark for My Articles similar articles
InternetNews
May 28, 2004
Chris Nerney
Survey Says: Your Data is in Danger Are banks doing enough to stop hacks? What's the scope of the government's data mining projects? New survey results are troubling. mark for My Articles similar articles
PC World
September 11, 2001
Dan Verton
Terrorist Attacks Shake U.S. Infrastructure Cyberspace may be clogged, but it's apparently not a target -- this time, experts say... mark for My Articles similar articles
National Defense
April 2015
Yasmin Tadjdeh
Big Data Helping to Pinpoint Terrorist Activities, Attacks Using big data for counter terrorism efforts will only become more prevalent as time goes on, said Josh New, a policy analyst at the Information Technology and Innovation Foundation's Center for Data Innovation. mark for My Articles similar articles
Salon.com
September 14, 2001
Katharine Mieszkowski
Send in the online spooks? In the aftermath of terrorism, civil libertarians are running for cover. But are they protesting too much? mark for My Articles similar articles
Reason
October 2005
Jacob Sullum
Pansies of New York Regarding random police searches in New York, if any measure that is ostensibly aimed at preventing terrorism is justified simply because some people believe it will prevent terrorism, we might as well forget about our constitutional rights. mark for My Articles similar articles
BusinessWeek
August 8, 2005
Otis Port
In The Datasphere, No Word Goes Unheard Cell calls, e-mail, and Web uploads are rich sources of clues on terrorism. mark for My Articles similar articles
OCC Bulletin
June 24, 2003
Suspicious Activity Report Beginning July 1, 2003, national banks and federal branches and agencies may begin using a revised SAR when they detect a known or suspected violation of federal law or a suspicious transaction related to a money-laundering activity or a violation of the Bank Secrecy Act. mark for My Articles similar articles
Job Journal
October 28, 2007
Career Snapshot: Police Officer Police officers can be sure of steady demand for their courage and dedication. mark for My Articles similar articles
National Defense
March 2014
Dan Parsons
Automation Key to Tackling Burdensome Big Data Problems BAE is developing systems that automatically mine metadata, time markers, photographs, video, maps and to identify patterns that precede a terrorist attack, then automatically alert authorities. mark for My Articles similar articles
National Defense
June 2005
Joe Pappalardo
Law Enforcement Takes to Boats Around Vital Waterways There is a nationwide trend to place more law enforcement into boats. Coordination among U.S. Coast Guard personnel, state police, first responders and local cops is essential to enhancing security on the nation's waterways. mark for My Articles similar articles
Science News
January 10, 2004
Ivars Peterson
Splitting Terrorist Cells How can you tell if enough members of a terrorist cell have been captured or killed so there's a high probability that the cell can no longer carry out an attack? A mathematical model of terrorist organizations might provide some clues. mark for My Articles similar articles
PC World
September 11, 2002
Andrew Brandt
A Year Later, Online Privacy and Security Still Weak Guarding both virtual and physical shores remains a challenge of checks and balances. mark for My Articles similar articles
CIO
January 1, 2002
Stephanie Viscasillas
Privacy Versus the FBI The antiterrorism law President Bush signed in late October makes it easier for officials investigating potential terrorist activity to get court orders to search companies' business records. It is important to take that into account in your privacy policy. mark for My Articles similar articles
National Defense
February 2011
Stew Magnuson
Data Mining Not a Panacea for Catching Terrorists, Experts Warn Data mining is being used by federal agencies as a counter-terrorism tool. mark for My Articles similar articles
InternetNews
September 22, 2009
Canada Uses IBM BI Software to Fight Crime Edmonton police are the latest to use business intelligence apps to identify crime hot spots. mark for My Articles similar articles
National Defense
July 2013
Stew Magnuson
Survey Exposes Flaw in Domestic Improvised Explosive Device Reporting System A survey of bomb squads in the United States found that only a small percentage of improvised explosive device incidents are reported to a national database, said a federal official tasked with preventing terrorist bombings. mark for My Articles similar articles
Military & Aerospace Electronics
March 2006
John McHale
Lockheed Martin Applies Surveillance Technology to Keep Marines Safe in Iraq Lockheed Martin experts, together with the Chicago and Los Angeles police departments, are employing counter-insurgency (COIN) surveillance technology to support urban operations conducted by the U.S. Marine Corps in Iraq. mark for My Articles similar articles
CIO
January 1, 2003
Stephanie Overby
The New, New Intelligence The military, intelligence and law enforcement communities see software agents as a tool for dealing with the daunting task of having to retrieve and monitor huge amounts of data in ongoing investigations or to prevent potential problems (from terrorist activity to insider trading). mark for My Articles similar articles
National Defense
June 2015
Yasmin Tadjdeh
Drones Could Mitigate Terrorist Attacks Had a drone been employed to watch over the Boston Marathon in 2013, it is possible the attack could have been prevented mark for My Articles similar articles
BusinessWeek
March 29, 2004
Paul Magnusson
The Hard Lesson Of Madrid There are too many holes in the safety net. Here's what the U.S. still needs to do mark for My Articles similar articles
National Defense
November 2013
Yasmin Tadjdeh
Al-Qaida Seen Shifting Tactics to Smaller Attacks The Boston bombing quickly brought domestic jihadist terrorism back into the public eye. Counterterrorism analysts are now concerned that the United States may soon face an increase in deadly, smaller scale attacks. mark for My Articles similar articles
Fast Company
Michael Grothaus
White House Officials To Meet With Tech Execs To Discuss Countering Terrorism Online They will discuss the ongoing concern of how terrorists have become adept at using social media to recruit members and converts online. mark for My Articles similar articles
PC World
October 25, 2001
Cara Garretson
Net Surfing, E-Mail Targets of New Antiterror Law Court orders to be used to track and intercept online communications... mark for My Articles similar articles
Wall Street & Technology
February 12, 2004
Jessica Pallay
Hanging Launderers Out to Dry With the Patriot Act here to stay, Wall Street remains vigilant about hampering the efforts of money launderers. mark for My Articles similar articles
National Real Estate Investor
August 1, 2006
Parke M. Chapman
An Invisible Threat Commercial buildings are ill-quipped to thwart nuclear, biological and chemical agent attacks, which are excluded from terrorism insurance policies. mark for My Articles similar articles
IDB America
June 2004
Charo Quesada
Sherlock Holmes Didn't Work Alone In Bogota, traditional turf battles within the police system are giving way to cooperation and a focus on results. mark for My Articles similar articles
Fast Company
Neal Ungerleider
What Cops And Other Law Enforcement Officials Think About #CrimingWhileWhite The viral flood of responses under the hashtag #CrimingWhileWhite purport to tell of times crimes (ranging from the petty to the serious with everything in-between) that were ignored or forgiven by law enforcement. mark for My Articles similar articles
Reason
November 2003
Jesse Walker
Intelligence Failure Long faulted by civil libertarians as too weak a restraint, New York City's "Handschu guidelines" against harrassing police surveillance were relaxed in March. It didn't take long for police to begin taking advantage of their new harrassment powers to intimidate anti-war protestors. mark for My Articles similar articles
National Defense
November 2011
Stew Magnuson
First Responders Sound Alarm on Loss of Grant Money With federal budget cuts looming, local law enforcement and fire departments are growing worried that the money will dry up, or be sharply reduced. mark for My Articles similar articles
National Defense
July 2013
Stew Magnuson
DNA Testing Machine Reduces Labs to the Size of a Desktop Printer The RapidHit 200 Human Identification System promises to radically alter the way law enforcement conducts investigations. mark for My Articles similar articles
Bank Technology News
March 2003
Michael Grebb
Banks dig in along the war's new front line in a high-stakes bid to stop money laundering Renewed federal efforts to stop money laundering and terrorist financing have strapped the banking industry with potentially more paperwork, obligations and record-keeping burdens than at perhaps any time in its history. mark for My Articles similar articles
InternetNews
April 17, 2009
Alex Goldman
Microsoft Talks Data Tools for Law Enforcement Taking a page from its business intelligence and enterprise collaboration tools, Microsoft releases a suite of data-sharing and analysis software for law enforcement agencies mark for My Articles similar articles