Wednesday, August 8

GIS Integration

http://www.govtech.com/pcio/125490 This push toward greater integration resulted from CIOs moving beyond viewing GIS simply as a mapping tool, said Chris Thomas, state and local government manager for ESRI, a GIS vendor. "They started to realize they need a central repository so that the GIS data isn't sitting in silos, and so they don't have duplicative GIS efforts in different departments."As more municipalities create enterprise GIS departments, Thomas said, the level of interest in combining GIS data with other systems is getting stronger. He gave the example of Philadelphia's creation of executive dashboards that combine GIS data and legacy financial systems. "It's exciting to see," he added. "The kinds of things we were expecting to see a few years ago are happening now."

Narrowing the Focus - Jim McKay

New data-linking technologies are giving north Texas homeland security, law enforcement and emergency management officials a keen edge. The new tools enable investigators to search and link data by geography, and allows them to identify trends or clusters of events. Officials also use a mining technology to search and group similar data, providing a visual presentation of each data group.
Together, they allow investigators at the North Texas Fusion Center (NTFC) to search millions of documents and identify trends without having to peruse each file.
The NTFC is one of many fusion centers in the country whose function is to exchange and analyze data that might relate to homeland security threats. The NTFC is unique because it deals with all hazards - man-made and natural disasters.
The NTFC collaborates with the U.S. Department of Homeland Security Operations Center, the Centers for Disease Control and Prevention, the North Texas High Intensity Drug Trafficking Activity Intelligence Center, the FBI Dallas Emergency Response Network and the local FBI office concerning detection and prevention of critical all-hazards situations.
"We have a very strong focus on prevention instead of the normal response, recovery, detection," said Kelly Stone, director of homeland security for Collin County, where the facility began operations in February 2006. "That's what's a little different about us. These tools are really beneficial to meeting the mission and answering the needs that are associated with the type of queries and access that you need to accomplish that."
http://www.govtech.com/gt/print_article.php?id=126364

Tuesday, August 7

Counterterrorism Blog: An Arrest in California for Material Support of Terrorism in Southeast Asia

This summary is not available. Please click here to view the post.

Al Qaeda member: U.S. embassies prime targets - CNN.com

Al Qaeda member: U.S. embassies prime targets - CNN.com
(CNN) -- U.S. Embassies and American interests "at home and abroad" are prime targets for terrorist attacks, American al Qaeda member Adam Yahiye Gadahn said in a newly released al Qaeda-produced video. "We shall continue to target you at home and abroad just as you target us at home and abroad ... ," Gadahn -- also known as Azzam the American -- says in the video provided to CNN by www.LauraMansfield.com, a Web site that analyzes terrorism. Later in the video, which is about an hour long and takes the form of a documentary, the self-proclaimed American jihadist makes explicit threats against the United States and U.S. interests, singling out embassies and consulates

Al Qaeda Cell May Be Loose in U.S., British Plot Hints - August 6, 2007 - The New York Sun

Al Qaeda Cell May Be Loose in U.S., British Plot Hints - August 6, 2007 - The New York Sun
WASHINGTON — As an American-born spokesman for Al Qaeda threatens to blow up American embassies abroad, intelligence gleaned from last month's British "doctors plot" of car bombers suggests that a Qaeda cell is on the loose in the American homeland. E-mail addresses for American individuals were found on the same password-protected e-mail chains used by the United Kingdom plotters to communicate with Qaeda handlers in Europe, a counterterrorism official told The New York Sun yesterday. The American and German intelligence community now believe the secure e-mail chains used in the United Kingdom plot have provided a window into an operational Qaeda network in several countries. "Because of the London and Glasgow plot, we now know communications have been made from Al Qaeda to operatives in the United States," the counterterrorism official said on condition of anonymity. "This plot helps to connect a lot of stuff. We have seen money moving a lot through hawala networks and other illicit finance as well." But this source was careful to say that at this point no specific information, such as names, targets or a timeline, was known about any particular plot on American soil. The e-mail addresses that are linked to Americans were pseudonyms…

Sunday, August 5

Watchdog eyeing up CCTV - Law & Policy - Breaking Business and Technology News at silicon.com

Watchdog eyeing up CCTV - Law & Policy - Breaking Business and Technology News at silicon.com: "Watchdog eyeing up CCTV
Too intrusive? You decide...
Tags: privacy, information commissioner, data protection act, cctv
By Tim Ferguson
Published: Friday 3 August 2007
Show related
articlesCCTV operators may soon be banned from recording people's voices if a new code of practice for the technology's use is approved.
The Information Commissioner's Office (ICO) has issued a new set of guidelines for the use of CCTV, now open for public consultation.
The updated guidelines suggest CCTV must not be used to record conversations between members of the public as it is 'highly intrusive and unlikely to be justified'."

Benefits of Video Analytics in a CCTV System - VideoAnalytics.net - Your IVS Source

Benefits of Video Analytics in a CCTV System - VideoAnalytics.net - Your IVS Source: "Video analytics offers many benefits to a new or existing CCTV system. The following are some benefits that allow you to effectively monitor your CCTV system."

Teaching hacking helps students, professors say

Teaching hacking helps students, professors say: "As a professor of computer science at the City College of San Francisco, Bowne wanted to find a way to make computer security accessible to the average student. So, following his trip to DEFCON last year, he talked with the administrators at CCSF and got permission to start up a class with a hacking lab. The first course -- called 'Ethical Hacking and Network Defense' -- was an total success, he told attendees at the DEFCON on Friday."

FOXNews.com - American Terrorist Threatens U.S. in New Al Qaeda Video - International News | News of the World | Middle East News | Europe News

FOXNews.com - American Terrorist Threatens U.S. in New Al Qaeda Video - International News News of the World Middle East News Europe News: "CAIRO, Egypt — An American member of Al Qaeda threatened foreign diplomats and embassies in the Islamic world calling them 'spy dens' in the terror network's latest video released Sunday.
The 1 hour, 17 minute-long video also featured a computer animated recreation of a March 2006 suicide attack that killed U.S. diplomat David Foy in Karachi, Pakistan and testimony from a man who claimed to be the bomber.
'We shall continue to target you, at home and abroad, just as you target us, at home and abroad, and these spy dens and military command and control centers from which you plotted your aggression against Afghanistan and Iraq,' said Adam Gadahn, also known as Azzan al-Amriki."

Cameras, GPS used to combat bridge failures | Tech news blog - CNET News.com

Cameras, GPS used to combat bridge failures Tech news blog - CNET News.com: "A key to preventing tragedies like the Minnesota bridge collapse earlier this week is surveillance, according to Aging Infrastructures.
The small company, a division of Sensible Security, sets up cameras and monitoring systems like GPS to gauge the health of things like bridges, road and other structures. It could become a growing market. "

DEF CON - Hacking conference infiltrated by 'media mole' - Network World

DEF CON - Hacking conference infiltrated by 'media mole' - Network World: "That's what organizers of the 15th annual DefCon hacking conference are telling attendees Friday, after being tipped off that the TV news program Dateline NBC has sent a producer with a hidden camera to investigate the show."

PartnerForSecurity