Similar Articles |
|
PC World September 13, 2001 Rick Perera |
Did Echelon Overlook Terrorist Threat? NSA activated electronic spy network after hijack warnings, German press reports... |
PC World September 12, 2001 Dan Verton |
Next: Cyberterrorism? Security experts urge companies to guard against digital violence... |
PC World September 12, 2001 Tom Spring & Frank Thorsberg |
Will Attack Hurt Net Privacy? Privacy advocates urge government to balance security needs and civil liberties... |
BusinessWeek June 28, 2004 Paul Magnusson |
The Smart Way To Fix Intelligence From Pearl Harbor to the terrorist attacks of September 11, the lesson keeps being repeated: A dollar spent on identifying the threat and preventing the attack can be worth far more than the millions spent safeguarding targets or the billions spent cleaning up the aftermath. |
National Defense November 2010 Stew Magnuson |
DHS Warns Local Law Enforcement Of New Homegrown Terrorist Threat The general consensus in the intelligence community is that the homegrown terrorist threat during the last year has supplanted plots that originate overseas. |
Wired October 2009 Stephen Lee |
Secret Ops, Domestic Spying OK -- As Long As Someone's Watching the Watchmen If the U.S. wants a successful intelligence agency, a certain amount of opacity is not only acceptable, it's necessary. |
Parameters Spring 2005 Saxby Chambliss |
We Have Not Correctly Framed the Debate on Intelligence Reform Over the last decade, our intelligence community has failed us. It wasn't able to penetrate the al Qaeda terrorist organization, and we paid a high price for that failure. |
BusinessWeek August 8, 2005 Otis Port |
In The Datasphere, No Word Goes Unheard Cell calls, e-mail, and Web uploads are rich sources of clues on terrorism. |
AskMen.com Craig Mazin |
Top 10: Spy Agencies Many countries place great importance on the function of their intelligence/spy agencies. Intelligence failures can lead to terrible consequences, while successes can help countries avert unnecessary tragedies. Read on about the top 10 presently active spy agencies operating in the world today. |
InternetNews August 6, 2007 Roy Mark |
Bush Signs Temporary Wiretap Law A new law allows government to conduct surveillance of foreign e-mails and phone calls without a warrant. |
Fast Company Alice Truong |
CIA Joins Twitter: "We Can Neither Confirm Nor Deny That This Is Our First Tweet" The Central Intelligence Agency made its Twitter debut Friday with a cheeky tweet that has been shared more than 50,000 times in its first hour. |
National Defense April 2015 Yasmin Tadjdeh |
Big Data Helping to Pinpoint Terrorist Activities, Attacks Using big data for counter terrorism efforts will only become more prevalent as time goes on, said Josh New, a policy analyst at the Information Technology and Innovation Foundation's Center for Data Innovation. |
Insurance & Technology November 12, 2007 Steve Terry |
Beneficial Financial Group CIO Steve Terry Discusses Business Intelligence Tools For the life and annuity industry, being effective with the available business intelligence tools can be a real challenge. |
Parameters Summer 2006 Arthur C. Winn |
The Future of US Intelligence The four books reviewed here address the future of US intelligence. However, each has a different focus: Countdown to Terror: The Top-Secret Information that Could Prevent the Next Terrorist Attack on America...and How the CIA has Ignored it by Curt Weldon... etc. |
PC World October 5, 2001 Frank Thorsberg |
PC World Poll Highlights Privacy Concerns Our online poll shows most readers are concerned about giving the government more power for online surveillance... |
Salon.com April 26, 2001 Fiona Morgan |
Does the U.S. spy too much? In the wake of the spy plane flap with China, experts propose international rules of order that would limit excessive espionage... |
Military & Aerospace Electronics September 2004 |
The 9/11 Report: Details of the central event of our time It's not the sophisticated sensors, signal processing, satellite communications, and automation technology that wins the day in the end; it's the people who use the technology that make the difference. |
Salon.com February 1, 2002 Jeff Stein |
Bin Laden's Olympic dreams Al-Qaida conducted "meticulous" surveillance of Salt Lake City, intelligence official says... |
InternetNews October 27, 2008 Richard Adhikari |
Twitter an Emerging Terrorist Tool Military paper outlines some of the emerging uses of tech in ways that can hurt. |
National Defense September 2010 Eric Beidel |
Social Scientists and Mathematicians Join The Hunt for Terrorists Internet chat rooms and other online discussion forums supplement, and in some cases, have replaced mosques, community centers and coffee shops as meeting spots for jihadists, experts say. |
Wired December 2001 John Arquilla & David Ronfeldt |
Fighting The Network War Conventional military power stands little chance against a band of swarming 14th-century terrorists, according to the authors, RAND analysts who wrote the book on "netwar." Here's their five-point plan to tear apart the terror network... |
Fast Company Neal Ungerleider |
Hillary Clinton: Silicon Valley Should Help Fight ISIS Clinton hinted that Silicon Valley should lower encryption standards to make it easier for American intelligence agencies to monitor communications. |
National Defense June 2006 Harold Kennedy |
Intelligence Sharing: `Still a Battle' According to the National Counterterrorism Center, despite efforts since 9/11 to improve the gathering and analysis of government and military intelligence, getting agencies to pool information is still difficult. |
National Defense November 2013 Yasmin Tadjdeh |
Al-Qaida Seen Shifting Tactics to Smaller Attacks The Boston bombing quickly brought domestic jihadist terrorism back into the public eye. Counterterrorism analysts are now concerned that the United States may soon face an increase in deadly, smaller scale attacks. |
Information Today July 16, 2013 Nancy K. Herther |
PRISM and the First Amendment: A Critical Issue Once Edward Snowden lands in some friendly country or decides to return to the U.S., we can hope that attention is again focused on PRISM and surveillance. So far, the responses from government officials have been less than stellar. |
National Defense January 2009 Magnuson & Rusling |
A Domestic Counterterrorism Agency? It's a Numbers Game The question of whether to create a standalone domestic intelligence agency for counter-terrorism comes down to some cold, hard math, said The Rand Corp. in a recent study. |
Fast Company Sarah Kessler |
Facebook, Twitter Would Be Forced To Report Terrorist Activity Under Proposed Bill Efforts in Washington have put a spotlight on the debate around the role of technology companies in aiding law enforcement's investigation of terrorist activity. |
Information Today January 21, 2014 |
Government Reforms Intelligence Collection Policies The White House announced the adoption of reforms for how the government collects intelligence information. |
National Defense June 2004 Harold Kennedy |
Advisory Board Says Military Must Define Role in Homeland Defense The Pentagon needs to improve and integrate its maritime intelligence, surveillance and reconnaissance assets with those of the Departments of Homeland Security and Transportation, CIA and FBI, according to a recent Defense Science Board study. |
HBS Working Knowledge January 10, 2007 Garry Emmons |
Working Independently, Working Together: The Challenge of Managing National Security The issues around managing national security provide an extreme example of the challenges faced by organizations that break into specialized parts yet must get the parts to work together. |
Reason December 2001 |
Guarding the Home Front Will civil liberties be a casualty in the War on Terrorism? A panel of experts discuss which civil liberties they think are most at risk in what has been called America's first 21st century war... |
Military & Aerospace Electronics January 2005 |
2005: The Year to Get a Handle on Terrorism Despite the compromise intelligence bill hammered out by Congress Dec. 7 and 8, the issue of coordinating this country's intelligence operations to tackle the issue of terrorism is far from resolved. |
Fast Company Neal Ungerleider |
Secret Documents Reveal The CIA Has Been Hacking iPhones Since 2006 According to The Intercept's Jeremy Scahill and Josh Begley, CIA-affiliated security researchers have worked since at least 2006 to target security keys used to encrypt data on Apple devices. |
AskMen.com Michael Hirsch |
How To: Become A Secret Agent What guy hasn't actually wondered what it would be like to be a spy? Cruising around foreign countries, experiencing great adventures, hooking up with hot exotic babes, and, at the same time, helping out your country. |
Parameters Summer 2005 |
Commentary & Reply Intelligence Reform: More Needs to Be Done... Clausewitz and "How Has War Changed?"... etc. |
Reason March 2002 Michael Young |
Spy Watch Behind closed doors at the National Security Agency: James Bamford's Body of Secrets: Anatomy of the Ultra-Secret National Security Agency From the Cold War Through the Dawn of a New Century... |
National Defense March 2010 Stew Magnuson |
No Need to Rethink 'No-Fly' List Criteria, Say Intelligence Chiefs The former director of the Central Intelligence Agency and the Defense Department's top intelligence chief both called for common sense answers to questions of who is and isn't added to terrorist watch lists. |
Information Today September 13, 2012 |
FirstRain Announces New Customer Intelligence Solution FirstRain Performinator is a new subscription-based solution for easily adding strategically tuned customer intelligence to the daily lives of major accounts sales and marketing pros. |
Fast Company Michael Grothaus |
White House Officials To Meet With Tech Execs To Discuss Countering Terrorism Online They will discuss the ongoing concern of how terrorists have become adept at using social media to recruit members and converts online. |
National Defense November 2005 Sandra I. Erwin |
Intelligence: The Silver Bullet That Will Beat the Insurgency Until the military can come to grips with their intelligence problem in Iraq, it will continue to pay the price in the form of casualties, which have now reached nearly 2,000 dead and more than 14,000 wounded. |
AskMen.com Iain Ilich |
How To: Determine Someone's Intelligence Don't judge a book by its cover: learn to detect multiple forms of intelligence. |
ONLINE September 2000 Deborah Lynne Wiley |
Hardcopy, Recommended Reading This issue's Hardcopy looks at some ways to help your organization become more effective. These books will help you develop long-term strategies for your organization, including ecommerce and competitive intelligence initiatives. |
Salon.com September 25, 2000 Sean Dugan |
Defanging Carnivore A security specialist explains why his open-source version of the FBI's snooping technology is a victory for privacy fans. |
Entrepreneur June 2005 Kirsten Osolind |
Secret Agent Plan Spy new business by taking entrepreneurial tips from the secret service. |
AskMen.com Justin Menkes |
Executive Intelligence In this excerpt from Executive Intelligence, the author introduces the concept of executive intelligence, a new theory outlining the cognitive skills that are specific to the business environment. |
PC World July 9, 2002 Dan Verton |
Experts Expect a Major Terrorist Cyberattack Security and intelligence officials say an attack will happen, and warn that we're not ready to respond. |
National Defense November 2014 Stew Magnuson |
13 Years Later, Still a Ways to Go on Sharing Terrorist Threats With Public The government needs to have a clear communication strategy to combat misinformation and speculation. |
Salon.com September 11, 2001 Laura Miller |
A new breed of terrorism A security expert says it's time for the U.S. to declare war on those who are waging war on America... |
Insurance & Technology November 24, 2003 |
Compliance Verisign VeriSign Inc. released a suite of security services to help financial institutions comply with burgeoning federal, state and industry regulations. |
National Defense October 2005 Sandra I. Erwin |
Army to Deploy Web-Based Intelligence Network The Army will soon begin deploying a "joint intelligence operations capability" in Iraq -- a web-based catalog of information that soldiers at the battalion level can access from high-speed workstations. |