| This week's sponsor is Acronis. |  | Enhancing Enterprise Mobility with BYOD Understanding the ins and outs of everything BYOD is the first step of establishing an easily managed, secure enterprise with a mobile workforce. Download Now! | Also Noted: IBM Guess where TSA's invasive scanners are now?; Supreme Court may hold fate of children knocked off citizenship path; and much more... Follow @fiercehs on Twitter In honor of Memorial Day, the next edition of FierceHomelandSecurity will appear on Thursday, May 29. More News From the FierceGovernment Network: 1. ACLU pushes for legal protection in lieu of voluntary code for facial recognition technology 2. Text-to-911 goes live 3. House committee passes bill to centralize postal delivery | This week's sponsor is Oracle. |  | Making the Most of Your CRM: How Best-in-Class Sales Teams Maximize Revenue and Customer Experience This Research Brief combines research from a number of Aberdeen Sales Effectiveness research data sets, to create a holistic view of the most effectively deployed CRM systems. Download today. | Today's Top News 1. Whistleblower reveals NOAA misused Hurricane Sandy relief money Hurricane Sandy relief funds were inappropriately spent on National Estuarine Research Reserve System equipment that was not actually damaged in the storm, says a new inspector general report. A whistleblower from a NERRS facility told investigators from the Commerce Department office of inspector general that the equipment worked properly before, during and after Hurricane Sandy. Nine research facilities that are part of the NERRS received about $1 million in Sandy relief money, the majority of which was spent to replace equipment that wasn't damaged, the report says. The $50 billion Sandy relief package from January 2013 included $7 million for the National Oceanic and Atmospheric Administration "to repair and replace ocean observing and coastal monitoring assets damaged by Hurricane Sandy." The NERRS, a network of facilities that monitor and protect water quality and biological systems in estuaries, is part of NOAA. The report blames NOAA's guidance for the misuse of the relief money. The agency gave NERRS facilities a template to apply for grants to obtain some of the $7 million for assets damaged by Sandy, saying the money could be spent on equipment that was "lost, damaged, or compromised" during Sandy, instead of just "damaged," the term the law uses. The term "compromised," the report says, is "an eligibility standard that can neither be definitively shown nor easily denied." The facilities weren't required to show any proof of their claims, and the grants were non-competitive. Researchers from at least two NERRS facilities told NOAA they didn't think they could legitimately use the Sandy relief money for equipment that wasn't damaged, the report says, adding that the culpability of the NERRS facilities in the misuse of the funds "appears limited." "By using Hurricane Sandy funds to replace assets that experienced wear and tear and for which no claims of damage were made, NOAA defeated the purpose of the [Sandy relief law] and deprived itself and potentially others from using the funds for purposes that would more directly benefit the victims of Hurricane Sandy," the report says. For more: - download the report, 13-0963 (pdf) Related Articles: House's $50.7B Sandy relief bill mainly goes through HUD, FEMA, FTA SSA whistle-blowers in attorney-judge scheme testify about harassment Read more about: NOAA, Commerce Department back to top | | This week's sponsor is Meru. |  | Download the White Paper "802.11ac in the Enterprise: Technologies and Strategies" to learn from industry expert Craig Mathias about the technologies behind 802.11ac, deployment misconceptions and review steps that every organization should take in getting ready for 802.11ac. Click here to download. | 2. 13 months after deadly Texas fertilizer explosion, safety coordination still in the works Nine months after President Obama directed agencies to collaborate on the safety risks associated with ammonium nitrate, the agencies involved are trying to figure out how to share information, says a Government Accountability Office report. Obama's August executive order was a response to the April 2013 ammonium nitrate fertilizer explosion in West, Texas, which killed more than a dozen people and damaged nearby homes and schools. No single federal agency regulates facilities that store the chemical. The Homeland Security Department, Occupational Safety and Health Administration and Environmental Protection Agency all have a role. As the agencies work to coordinate their oversight, one place to start is to take an inventory of all the facilities that hold significant amounts of ammonium nitrate, but the federal government doesn't have all that information, the GAO report says. More than 1,300 chemical facilities reported to DHS that they store ammonium nitrate, as part of the department's Chemical Facility Anti-Terrorism Standards program. But facilities only have to report if they possess amounts exceeding certain thresholds. Additionally, farms, which commonly use the chemical as a fertilizer, don't have to report to DHS, and some facilities that are supposed to report to the department probably fail to do so. On top of that, some facilities are required under federal law to report ammonium nitrate holdings to state and local authorities, but the EPA told auditors that states don't have to pass that information along to federal agencies. Better data collection and sharing among federal agencies could enable authorities to find facilities that are out of compliance, the report says. OSHA could also identify high-risk facilities for inspection. For more: - download the report, GAO-14-274 (pdf) Related Articles: CFATS bill advances without ammonium nitrate section Unified federal chemical facility database a possibility, says Wulf Ammonium nitrate storage in a regulatory black hole Read more about: OSHA, GAO report back to top | 3. DHS takes over security at its headquarters The decision by the Homeland Security Department to remove the Federal Protective Service from its role in securing the DHS headquarters complex had nothing to do with performance, said FPS Director L. Eric Patterson during a House hearing May 21. FPS, which is part of DHS, is in charge of security at thousands of federal facilities. Earlier this month, DHS decided to take over responsibility for the contract security guards at DHS's Nebraska Avenue headquarters. Rep. Lou Barletta (R-Penn.), the chairman of the House Transportation and Infrastructure subcommittee on public buildings, speculated that the move was a sign that "confidence in FPS may be eroding." Del. Eleanor Holmes Norton (D-D.C.) added, "I think it's pretty apparent why. They obviously felt they had to be made more secure." Patterson disagreed. "To my knowledge, this was not an issue of performance," he said. "I don't think this is an indictment of FPS security. I think, again, this is a matter of efficiency and managing a contract." The move, which put the DHS headquarters office of security in charge of the contract guards, will help streamline operations at the Nebraska Avenue complex, he said. For more: - visit the hearing webpage (webcast and prepared testimonies available) Related Articles: Some federal guards not trained for active shooters Johnson memo pushes for more cohesive DHS Agencies failed to assess security risks at federal facilities, GAO says Read more about: L. Eric Patterson, FPS back to top | 4. Social media gives terrorist new tools, not just wider audience Facebook, Twitter, YouTube and other social media platforms enable terrorist groups not only to reach a wider audience but to execute new strategies for propaganda and recruitment, says a report published by the Wilson Center. While terrorist groups' use of the Internet is nothing new, social media has empowered them in new ways, says the report (pdf), authored by Gabriel Weimann, a professor at Haifa University in Israel. Social media affords terrorist groups some of the same benefits it gives marketers: Particularly on Facebook, they can target individuals based on public information about their interests and demographics. "Social networking allows terrorists to reach out to their target audiences and virtually 'knock on their doors' – in contrast to older models of websites in which terrorists had to wait for visitors to come to them," the report says. Twitter has also changed how terrorist groups operate. Al Shabaab, which was responsible for last year's Westgate Mall attack in Nairobi, Kenya, sent out live commentary as the attack unfolded, detailing what was happening as well as the group's rationale. Their tweets provided some of the earliest information about the attack. With news outlets under pressure to cover events as soon as they occur, they may disseminate the first available information before they can ascertain its accuracy, meaning tweets from terrorist groups stand a good chance of propagating during an attack. Looking forward, the report notes that a wave of cyber attacks by terrorist groups may arrive if those groups begin to accept virtual attacks as "a proper, respectable, and sufficient form of jihad." For more: - download the report, "New Terrorism and New Media" (pdf) Related Articles: Teen tweet on terrorist threat results in arrest Online moderates can counter violent Muslim extremism, RAND says Read more about: Facebook, Twitter back to top | 5. DHS official: Heartbleed has had 'minimal' impact on federal government Due to hard work and improved coordination throughout the federal government, the impact of the Heartbleed bug on the dot-gov domain has been minimal, said Larry Zelvin, director of the National Cybersecurity and Communications Integration Center within the Homeland Security Department's National Protection and Programs Directorate. During a joint hearing of two House Homeland Security subcommittees May 21, Zelvin recounted an approximately 20-day Heartbleed response timeline. The events began with the April 7 emergence of a vulnerability in a widely used secure-sockets layer encryption software dubbed "Heartbleed," to public alerts, mitigation guidance and scanning for government networks, to late April information sessions for critical infrastructure. "To date, the team has scanned a federal IP space of approximately 15.5 million IPs on 11 different occasions and assisted in reducing the number of federal Heartbleed vulnerability occurrences from 270 to about two in less than three weeks," said Zelvin. "More than half of these vulnerabilities were identified and mitigated within the first six days of scanning." -->READ THE FULL ARTICLE Read more about: DHS, NCCIC back to top | Also Noted | This week's sponsor is IBM. |  | Webinar: Enhance success and safety of public events with IBM Smarter Cities software Large public events bring millions of dollars into your city's economy annually, and help build your reputation. Needless to say, safety of participants and spectators is paramount. Tackle the complex behind-the-scenes planning with IBM software solutions. Register Now! | > Guess where TSA's invasive scanners are now? Article (FedTimes) > Supreme Court may hold fate of children knocked off citizenship path. Article (NYT) > Obama administration to reveal drone memo. Article (Politico) > Man who thought he was a citizen makes it official. Article (NYT) > Terrorist attack on market in China's restive Xinjiang region kills more than 30. Article (WaPo) And Finally... How outlandish physics experimentation led to a Nobel Prize win. Article (Slate) > Developing for the Internet of Things: Challenges and Opportunities - Wednesday, June 18th, 2pm ET / 11am PT Cisco estimates that 50 billion devices and objects will be connected to the Internet by 2020. Will there be a role for developers in this area? And if so, how can developers position themselves in the months ahead on this nascent but potentially explosive opportunity? Register Today! | > CYBER SECURITY SUMMIT - DC METRO - June 5, Tysons Corner, VA 8:00am ? 5:00pm Connect with senior executives responsible for protecting their company's critical infrastructure with innovative solution providers. Educational tracks will address emerging threats, risk factors and strategic priorities to keep organizations at the forefront of cyber security and most importantly, secure. For details on exhibiting or attending visit: www.CyberSummitUSA.com > TECHEXPO Top Secret Hiring Event ? June 11, Arlington, VA 10am - 3pm The leading IT companies are seeking qualified Security Cleared professionals who hold an active clearance this June! Interview for 100's of positions with the industry's top Defense, Government & IT employers. Active Security Clearance Required. For more information on registration, exhibiting & attending TECHEXPO visit: www.TechExpoUSA.com > TECHEXPO Top Secret Hiring Event ? June 17, Baltimore, MD 10am - 3pm The leading IT companies are seeking qualified Security Cleared professionals who hold an active clearance this June! Interview for 100's of positions with the industry's top Defense, Government & IT employers. Active Security Clearance Required. For more information on registration, exhibiting & attending TECHEXPO visit: www.TechExpoUSA.com > GMU Summer Program in International Security - July 7-21 - Arlington, VA The best way to get up to speed on trends in terrorism, WMD, homeland and national security related issues. Six different 2 and 3 day short courses in a relaxed atmosphere at GMU's Arlington campus. Register today or call 703-993-9466. | > Whitepaper: Finding ROI in Document Collaboration Read this Accusoft whitepaper to learn about the factors that make document collaboration more difficult than it should be, and about how to create a collaboration strategy that makes sense for your organization. Download Now! > Video: Enhance success and safety of public events with IBM Smarter Cities software | |
No comments:
Post a Comment
Keep a civil tongue.