Top Stories, Compelling Insights, Accomplished Experts

Editor’s Picks

availability Hawkins

Availability is probably one of the more convoluted security goals in the CIA Triad. This is due to its position in terms of security.


A modern vehicle is the most expensive computer that you own. While car hacking may seem like science fiction, today’s cars have serious security vulnerabilities. These security gaps could allow a remote hacker to take control of vehicles’ computer systems and cause crashes.


EDITOR'S NOTE: InCyberDefense will not publish next week due to the Thanksgiving Holiday. It will return on November 28th.

Despite our increasing awareness of how to protect against malicious software and actors, we still find our online security severely compromised by hackers just waiting to attack our vulnerability.

If you want to go to a small technology conference, the Consumer Electronics Show, now known as just CES, is not it. This past January, the show drew 182,198 attendees. The January 2019 event will probably attract even more.

Latest

behavioral analysis

By Robert Brzenchek

The FBI's Behavioral Analysis Unit (BAU) is well known for using behavioral analysis to support criminal investigations. Learn more about the work of the BAU, including how they interview inmates to better understand and predict criminal behavior. 


availability Hawkins

Availability is probably one of the more convoluted security goals in the CIA Triad. This is due to its position in terms of security.


community
Community support was invaluable late last week, when two deadly wildfires broke out in California.

Hazmat
It is important for agencies to offer frequent HAZMAT training. Only through training can first responders learn how to react to different events.

snow storm
Emergency and disaster management briefing for November 16, 2018: The first winter storm of the season wreaks havoc from the South and Midwest to the Eastern Seaboard.

Most Popular

Experts


Anthony Galante

Expert in Law Enforcement Drone Technology

  • Unmanned Aircraft Systems (UAS)
  • Integration into Public Safety
  • UAS Security
  • Criminal Justice
  • Aeronautical Science/Aviation
  • Law Enforcement Training Tactics and Techniques
  • Crew Resource Management


Dr. Nicole Drumhiller

Leading expert in international intelligence analysis

  • Intelligence
  • Political Psychology
  • National Security
  • International Relations
  • Terrorism
  • Group Behavior
  • Leadership Profiling

Resources

VACCINE
Technology and Forensics: The Future of Law Enforcement Sponsored By VACCINE

This On-Demand presentation focuses on the various types of forensics within the framework of training academies, colleges, and universities and how to prepare individuals for the shift from traditional to digital forensics including the use of an alternate interaction methodology, Visual Analytics by Demonstration, which allows people to provide visual demonstrations to interactively explore data in visual analytic applications.

Purdue University
Harnessing the Power of TEVUS: Assessing lone-wolf drone terror threats with the Terrorism and Extremist Violence in the United States (TEVUS) Portal Sponsored By Purdue University

This On-Demand presentation will introduce participants to the National Consortium for the Study of Terrorism and Responses to Terrorism (START), the TEVUS Portal, and the TEVUS Database. The Terrorism and Extremist Violence in the United States (TEVUS) Portal is a free, public-facing online interface and visualization tool that compiles behavioral, geographic, and temporal characteristics of extremist violence in the U.S. dating back to 1970.

American Military University (AMU)
Social Media and It’s Many Uses: From Information Collection to Humanitarian and Disaster Assistance, and More Sponsored By American Military University

The use of social media has become a vital part of information collection that contributes to the situational awareness of the intelligence, law enforcement, and other communities. As with any information collection method, there are inherent concerns with privacy and oversight. This On-Demand presentation will look at procedures and challenges associated with collecting data through social media.

Poll

Earn your degree in Homeland Security