Top Stories, Compelling Insights, Accomplished Experts

Editor’s Picks

American Military University is dedicated to cybersecurity education. In today's internet age, the number of threats to businesses, consumers and institutions increases on a daily basis.


The U.S. Department of Homeland Security announced on Tuesday that mobile devices used by AT&T, Sprint, Verizon and similar carriers contain serious software vulnerabilities.

cognitive community

By Dudley Bush

The Cognitive Community model is a reentry initiative that has significantly reduced recidivism in Virginia. Learn how it was born out of two opposing strategies and why it has been so successful.


Cyber Defense
At the recent Google Cloud Next ’18 convention, Google introduced its hardware-based answer to phishing attacks: tiny USB security devices called Titans.

Latest

Constitution
Opinion: Liberties asserted in the Constitution are for everyone, not just for the people we like. Even those we dislike have the same rights as everyone else.

American Military University is dedicated to cybersecurity education. In today's internet age, the number of threats to businesses, consumers and institutions increases on a daily basis.


opioid

By Dr. Michael Pittaro and Shanna O'Connor

Babies born to opioid-dependent mothers often battle dangerous withdrawal symptoms and other medical complications. The opioid crisis shows no sign of slowing down and lawmakers must consider how we can best protect these most vulnerable victims.


river fire
The River Fire, one of two wildfires known as the Mendocino Complex Fire in northern California, is now fully contained.

Islamic State
The Islamic State may have as many as 30,000 fighters in Syria and Iraq and appears to have rebounded from some of its worst setbacks, according to two new reports.

Most Popular

Experts


John Ubaldi

Military, Politics, and Homeland Security Contributor

  • National Security
  • Military
  • Political Science
  • Middle East
  • Terrorism
  • Intelligence
  • International Relations
  • global strategy
  • counter-insurgency
  • stability operations
  • History


Dr. Michael Pittaro

Expert in Cyber and Human Trafficking Investigations

  • Criminal Justice
  • Public Safety
  • Public Administration
  • Transformational Leadership
  • Stress and Suicide among Criminal Justice Professionals
  • Criminology
  • Corrections
  • Human Trafficking
  • Sexual Offenders
  • Cybersecurity
  • Physical/Emotional Wellness for Criminal Justice Professionals
  • Emotional Intelligence
  • Law Enforcement

Resources

VACCINE
Technology and Forensics: The Future of Law Enforcement Sponsored By VACCINE

This On-Demand presentation focuses on the various types of forensics within the framework of training academies, colleges, and universities and how to prepare individuals for the shift from traditional to digital forensics including the use of an alternate interaction methodology, Visual Analytics by Demonstration, which allows people to provide visual demonstrations to interactively explore data in visual analytic applications.

Purdue University
Harnessing the Power of TEVUS: Assessing lone-wolf drone terror threats with the Terrorism and Extremist Violence in the United States (TEVUS) Portal Sponsored By Purdue University

This On-Demand presentation will introduce participants to the National Consortium for the Study of Terrorism and Responses to Terrorism (START), the TEVUS Portal, and the TEVUS Database. The Terrorism and Extremist Violence in the United States (TEVUS) Portal is a free, public-facing online interface and visualization tool that compiles behavioral, geographic, and temporal characteristics of extremist violence in the U.S. dating back to 1970.

American Military University (AMU)
Social Media and It’s Many Uses: From Information Collection to Humanitarian and Disaster Assistance, and More Sponsored By American Military University

The use of social media has become a vital part of information collection that contributes to the situational awareness of the intelligence, law enforcement, and other communities. As with any information collection method, there are inherent concerns with privacy and oversight. This On-Demand presentation will look at procedures and challenges associated with collecting data through social media.

Poll

What do you consider the biggest threat to US national security?

Earn your degree in Homeland Security