MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
PC World
September 13, 2001
Rick Perera
Did Echelon Overlook Terrorist Threat? NSA activated electronic spy network after hijack warnings, German press reports... mark for My Articles similar articles
PC World
September 12, 2001
Dan Verton
Next: Cyberterrorism? Security experts urge companies to guard against digital violence... mark for My Articles similar articles
PC World
September 12, 2001
Tom Spring & Frank Thorsberg
Will Attack Hurt Net Privacy? Privacy advocates urge government to balance security needs and civil liberties... mark for My Articles similar articles
BusinessWeek
June 28, 2004
Paul Magnusson
The Smart Way To Fix Intelligence From Pearl Harbor to the terrorist attacks of September 11, the lesson keeps being repeated: A dollar spent on identifying the threat and preventing the attack can be worth far more than the millions spent safeguarding targets or the billions spent cleaning up the aftermath. mark for My Articles similar articles
National Defense
November 2010
Stew Magnuson
DHS Warns Local Law Enforcement Of New Homegrown Terrorist Threat The general consensus in the intelligence community is that the homegrown terrorist threat during the last year has supplanted plots that originate overseas. mark for My Articles similar articles
Wired
October 2009
Stephen Lee
Secret Ops, Domestic Spying OK -- As Long As Someone's Watching the Watchmen If the U.S. wants a successful intelligence agency, a certain amount of opacity is not only acceptable, it's necessary. mark for My Articles similar articles
Parameters
Spring 2005
Saxby Chambliss
We Have Not Correctly Framed the Debate on Intelligence Reform Over the last decade, our intelligence community has failed us. It wasn't able to penetrate the al Qaeda terrorist organization, and we paid a high price for that failure. mark for My Articles similar articles
BusinessWeek
August 8, 2005
Otis Port
In The Datasphere, No Word Goes Unheard Cell calls, e-mail, and Web uploads are rich sources of clues on terrorism. mark for My Articles similar articles
AskMen.com
Craig Mazin
Top 10: Spy Agencies Many countries place great importance on the function of their intelligence/spy agencies. Intelligence failures can lead to terrible consequences, while successes can help countries avert unnecessary tragedies. Read on about the top 10 presently active spy agencies operating in the world today. mark for My Articles similar articles
InternetNews
August 6, 2007
Roy Mark
Bush Signs Temporary Wiretap Law A new law allows government to conduct surveillance of foreign e-mails and phone calls without a warrant. mark for My Articles similar articles
Fast Company
Alice Truong
CIA Joins Twitter: "We Can Neither Confirm Nor Deny That This Is Our First Tweet" The Central Intelligence Agency made its Twitter debut Friday with a cheeky tweet that has been shared more than 50,000 times in its first hour. mark for My Articles similar articles
National Defense
April 2015
Yasmin Tadjdeh
Big Data Helping to Pinpoint Terrorist Activities, Attacks Using big data for counter terrorism efforts will only become more prevalent as time goes on, said Josh New, a policy analyst at the Information Technology and Innovation Foundation's Center for Data Innovation. mark for My Articles similar articles
Insurance & Technology
November 12, 2007
Steve Terry
Beneficial Financial Group CIO Steve Terry Discusses Business Intelligence Tools For the life and annuity industry, being effective with the available business intelligence tools can be a real challenge. mark for My Articles similar articles
Parameters
Summer 2006
Arthur C. Winn
The Future of US Intelligence The four books reviewed here address the future of US intelligence. However, each has a different focus: Countdown to Terror: The Top-Secret Information that Could Prevent the Next Terrorist Attack on America...and How the CIA has Ignored it by Curt Weldon... etc. mark for My Articles similar articles
PC World
October 5, 2001
Frank Thorsberg
PC World Poll Highlights Privacy Concerns Our online poll shows most readers are concerned about giving the government more power for online surveillance... mark for My Articles similar articles
Salon.com
April 26, 2001
Fiona Morgan
Does the U.S. spy too much? In the wake of the spy plane flap with China, experts propose international rules of order that would limit excessive espionage... mark for My Articles similar articles
Military & Aerospace Electronics
September 2004
The 9/11 Report: Details of the central event of our time It's not the sophisticated sensors, signal processing, satellite communications, and automation technology that wins the day in the end; it's the people who use the technology that make the difference. mark for My Articles similar articles
Salon.com
February 1, 2002
Jeff Stein
Bin Laden's Olympic dreams Al-Qaida conducted "meticulous" surveillance of Salt Lake City, intelligence official says... mark for My Articles similar articles
InternetNews
October 27, 2008
Richard Adhikari
Twitter an Emerging Terrorist Tool Military paper outlines some of the emerging uses of tech in ways that can hurt. mark for My Articles similar articles
National Defense
September 2010
Eric Beidel
Social Scientists and Mathematicians Join The Hunt for Terrorists Internet chat rooms and other online discussion forums supplement, and in some cases, have replaced mosques, community centers and coffee shops as meeting spots for jihadists, experts say. mark for My Articles similar articles
Wired
December 2001
John Arquilla & David Ronfeldt
Fighting The Network War Conventional military power stands little chance against a band of swarming 14th-century terrorists, according to the authors, RAND analysts who wrote the book on "netwar." Here's their five-point plan to tear apart the terror network... mark for My Articles similar articles
Fast Company
Neal Ungerleider
Hillary Clinton: Silicon Valley Should Help Fight ISIS Clinton hinted that Silicon Valley should lower encryption standards to make it easier for American intelligence agencies to monitor communications. mark for My Articles similar articles
National Defense
June 2006
Harold Kennedy
Intelligence Sharing: `Still a Battle' According to the National Counterterrorism Center, despite efforts since 9/11 to improve the gathering and analysis of government and military intelligence, getting agencies to pool information is still difficult. mark for My Articles similar articles
National Defense
November 2013
Yasmin Tadjdeh
Al-Qaida Seen Shifting Tactics to Smaller Attacks The Boston bombing quickly brought domestic jihadist terrorism back into the public eye. Counterterrorism analysts are now concerned that the United States may soon face an increase in deadly, smaller scale attacks. mark for My Articles similar articles
Information Today
July 16, 2013
Nancy K. Herther
PRISM and the First Amendment: A Critical Issue Once Edward Snowden lands in some friendly country or decides to return to the U.S., we can hope that attention is again focused on PRISM and surveillance. So far, the responses from government officials have been less than stellar. mark for My Articles similar articles
National Defense
January 2009
Magnuson & Rusling
A Domestic Counterterrorism Agency? It's a Numbers Game The question of whether to create a standalone domestic intelligence agency for counter-terrorism comes down to some cold, hard math, said The Rand Corp. in a recent study. mark for My Articles similar articles
Fast Company
Sarah Kessler
Facebook, Twitter Would Be Forced To Report Terrorist Activity Under Proposed Bill Efforts in Washington have put a spotlight on the debate around the role of technology companies in aiding law enforcement's investigation of terrorist activity. mark for My Articles similar articles
Information Today
January 21, 2014
Government Reforms Intelligence Collection Policies The White House announced the adoption of reforms for how the government collects intelligence information. mark for My Articles similar articles
National Defense
June 2004
Harold Kennedy
Advisory Board Says Military Must Define Role in Homeland Defense The Pentagon needs to improve and integrate its maritime intelligence, surveillance and reconnaissance assets with those of the Departments of Homeland Security and Transportation, CIA and FBI, according to a recent Defense Science Board study. mark for My Articles similar articles
HBS Working Knowledge
January 10, 2007
Garry Emmons
Working Independently, Working Together: The Challenge of Managing National Security The issues around managing national security provide an extreme example of the challenges faced by organizations that break into specialized parts yet must get the parts to work together. mark for My Articles similar articles
Reason
December 2001
Guarding the Home Front Will civil liberties be a casualty in the War on Terrorism? A panel of experts discuss which civil liberties they think are most at risk in what has been called America's first 21st century war... mark for My Articles similar articles
Military & Aerospace Electronics
January 2005
2005: The Year to Get a Handle on Terrorism Despite the compromise intelligence bill hammered out by Congress Dec. 7 and 8, the issue of coordinating this country's intelligence operations to tackle the issue of terrorism is far from resolved. mark for My Articles similar articles
Fast Company
Neal Ungerleider
Secret Documents Reveal The CIA Has Been Hacking iPhones Since 2006 According to The Intercept's Jeremy Scahill and Josh Begley, CIA-affiliated security researchers have worked since at least 2006 to target security keys used to encrypt data on Apple devices. mark for My Articles similar articles
AskMen.com
Michael Hirsch
How To: Become A Secret Agent What guy hasn't actually wondered what it would be like to be a spy? Cruising around foreign countries, experiencing great adventures, hooking up with hot exotic babes, and, at the same time, helping out your country. mark for My Articles similar articles
Parameters
Summer 2005
Commentary & Reply Intelligence Reform: More Needs to Be Done... Clausewitz and "How Has War Changed?"... etc. mark for My Articles similar articles
Reason
March 2002
Michael Young
Spy Watch Behind closed doors at the National Security Agency: James Bamford's Body of Secrets: Anatomy of the Ultra-Secret National Security Agency From the Cold War Through the Dawn of a New Century... mark for My Articles similar articles
National Defense
March 2010
Stew Magnuson
No Need to Rethink 'No-Fly' List Criteria, Say Intelligence Chiefs The former director of the Central Intelligence Agency and the Defense Department's top intelligence chief both called for common sense answers to questions of who is and isn't added to terrorist watch lists. mark for My Articles similar articles
Information Today
September 13, 2012
FirstRain Announces New Customer Intelligence Solution FirstRain Performinator is a new subscription-based solution for easily adding strategically tuned customer intelligence to the daily lives of major accounts sales and marketing pros. mark for My Articles similar articles
Fast Company
Michael Grothaus
White House Officials To Meet With Tech Execs To Discuss Countering Terrorism Online They will discuss the ongoing concern of how terrorists have become adept at using social media to recruit members and converts online. mark for My Articles similar articles
National Defense
November 2005
Sandra I. Erwin
Intelligence: The Silver Bullet That Will Beat the Insurgency Until the military can come to grips with their intelligence problem in Iraq, it will continue to pay the price in the form of casualties, which have now reached nearly 2,000 dead and more than 14,000 wounded. mark for My Articles similar articles
AskMen.com
Iain Ilich
How To: Determine Someone's Intelligence Don't judge a book by its cover: learn to detect multiple forms of intelligence. mark for My Articles similar articles
ONLINE
September 2000
Deborah Lynne Wiley
Hardcopy, Recommended Reading This issue's Hardcopy looks at some ways to help your organization become more effective. These books will help you develop long-term strategies for your organization, including ecommerce and competitive intelligence initiatives. mark for My Articles similar articles
Salon.com
September 25, 2000
Sean Dugan
Defanging Carnivore A security specialist explains why his open-source version of the FBI's snooping technology is a victory for privacy fans. mark for My Articles similar articles
Entrepreneur
June 2005
Kirsten Osolind
Secret Agent Plan Spy new business by taking entrepreneurial tips from the secret service. mark for My Articles similar articles
AskMen.com
Justin Menkes
Executive Intelligence In this excerpt from Executive Intelligence, the author introduces the concept of executive intelligence, a new theory outlining the cognitive skills that are specific to the business environment. mark for My Articles similar articles
PC World
July 9, 2002
Dan Verton
Experts Expect a Major Terrorist Cyberattack Security and intelligence officials say an attack will happen, and warn that we're not ready to respond. mark for My Articles similar articles
National Defense
November 2014
Stew Magnuson
13 Years Later, Still a Ways to Go on Sharing Terrorist Threats With Public The government needs to have a clear communication strategy to combat misinformation and speculation. mark for My Articles similar articles
Salon.com
September 11, 2001
Laura Miller
A new breed of terrorism A security expert says it's time for the U.S. to declare war on those who are waging war on America... mark for My Articles similar articles
Insurance & Technology
November 24, 2003
Compliance Verisign VeriSign Inc. released a suite of security services to help financial institutions comply with burgeoning federal, state and industry regulations. mark for My Articles similar articles
National Defense
October 2005
Sandra I. Erwin
Army to Deploy Web-Based Intelligence Network The Army will soon begin deploying a "joint intelligence operations capability" in Iraq -- a web-based catalog of information that soldiers at the battalion level can access from high-speed workstations. mark for My Articles similar articles