Top Stories, Compelling Insights, Accomplished Experts

Editor’s Picks

By David Balaban Contributor, InCyberDefense Encryption-for-ransom cases proliferate. They are the most viable use for malware, harnessing the most advanced technologies while evolving and acquiring new properties. Recent instances include NSA leaks used as an infection vector for news-making ransomware such as WannaCry and Petya. Obviously, the sums claimed by ransomware tend to...

Android OS owes a great deal of this market dominance to its extensive flexibility and openness. But Android OS also has a flip side: hackers can exploit it.

By Leischen Stelter

With an increasing number of states moving to legalize marijuana, how must law enforcement officers adapt to the change? Find out about the different drug training programs available to officers.


The attack on Pearl Harbor, Hawaii on December 7th, 1941 brought the United States fully into World War II

Latest

holidays

By Jinnie Chua

The holidays can trigger anxiety and stress for many first responders, especially those struggling with mental health issues. If you find yourself in this situation, don't let the festive season stop you from reaching out for help.


indiana police officer shot
Emergency and disaster management briefing for Dec. 13, 2017: An Indiana State Police officer is shot by a suspect during a traffic stop - and other news.

North Korea has already provided plenty of evidence that the dynastic regime led by Kim Jong Un threatens the world and its own people.

The defense authorization bill signed Tuesday by President Trump includes a measure to shield immigrant recruits from enlistment contract cancellations, keeping skilled noncitizens as a reliable recruiting pool.

960x0work-life-balance

Daily choices of forward movement help you step away from that stationary place of trying to steady your life, balancing on a small fulcrum. It gives the freedom to progress.


Most Popular

Experts


Allison G. S. Knox

Emergency and Disaster Management Contributor

  • Emergency Medical Services
  • Emergency Management
  • Homeland Security
  • Policy
  • Politics
  • International Relations
  • American Government.


Dr. Nicole Drumhiller

Leading expert in international intelligence analysis

  • Intelligence
  • Political Psychology
  • National Security
  • International Relations
  • Terrorism
  • Group Behavior
  • Leadership Profiling

Resources

VACCINE
Technology and Forensics: The Future of Law Enforcement Sponsored By VACCINE

This On-Demand presentation focuses on the various types of forensics within the framework of training academies, colleges, and universities and how to prepare individuals for the shift from traditional to digital forensics including the use of an alternate interaction methodology, Visual Analytics by Demonstration, which allows people to provide visual demonstrations to interactively explore data in visual analytic applications.

Purdue University
Harnessing the Power of TEVUS: Assessing lone-wolf drone terror threats with the Terrorism and Extremist Violence in the United States (TEVUS) Portal Sponsored By Purdue University

This On-Demand presentation will introduce participants to the National Consortium for the Study of Terrorism and Responses to Terrorism (START), the TEVUS Portal, and the TEVUS Database. The Terrorism and Extremist Violence in the United States (TEVUS) Portal is a free, public-facing online interface and visualization tool that compiles behavioral, geographic, and temporal characteristics of extremist violence in the U.S. dating back to 1970.

American Military University (AMU)
Social Media and It’s Many Uses: From Information Collection to Humanitarian and Disaster Assistance, and More Sponsored By American Military University

The use of social media has become a vital part of information collection that contributes to the situational awareness of the intelligence, law enforcement, and other communities. As with any information collection method, there are inherent concerns with privacy and oversight. This On-Demand presentation will look at procedures and challenges associated with collecting data through social media.

Poll

What do you consider the biggest threat to US national security?

Earn your degree in Homeland Security