Posts Tagged: Security

WikiLeak Proof

Originally published on 10 Dec 2010 at ECM Gov Blog. The latest WikiLeaks release and subsequent media storm has caused me to think about the role that ECM plays in content security. When all of our records were on paper, they were easily lost, compromised, copied, and destroyed. However, in the digital age, when weRead… Read more »

Security Clearance: The Whole-Person Concept

Among people who have been involved with national security clearances the “whole-person” concept has become widely known and often misunderstood. Applicants for security clearance are evaluated on potentially disqualifying and mitigating conditions listed under 13 separate guidelines in the “Adjudicative Guidelines for Determining Eligibility for Access to Classified Information.” The adjudicative process is an examinationRead… Read more »

Mobile Virtual Platforms – Possible sea change

(PingBack to original post on buzzfreezone.wordpress.com: http://wp.me/p1bJuJ-3b) There have been a few recent developments that have individually generated an aggregate reaction somewhat equivalent to “Meh” (although the specialty markets and analysts have been abuzz). However, taken together, I think they can form the platform basis for a Sea Change in mobile platforms. Of course, aRead… Read more »

CB2: Don’t Let Firesheep Be Your WikiLeak

Think twice before joining an unsecured wireless network. It just became ridiculously easy to hijack confidential information from your agency and co-workers. If I was on the same open WiFi network as you – sitting outside your home, at your office (if you still didn’t put a password on your router), a Starbucks, an airport,Read… Read more »

What Is My Chance of Getting a Security Clearance?

About 1% or 1,350 cases (sum of the 2 figures shown in red) of the approximately 150,000 completed investigations received by DISCO each year result in clearance denial or revocation. About 20% to 30% of cases decided by DOHA Administrative Judges are appealed by either the applicant or the DOHA Department Counsel. While 99% mayRead… Read more »

CB2: What TSA Can Learn From the Simpsons

Chris Bennett’s Crisis Blog (CB2) Part 1 of 2 on the TSA Debate The TSA pat-down situation is making national and GovLoop headlines this week as images of naked body scans and videos of screaming children being frisked circulate through millions of travelers and non-travelers alike. In today’s CB2 I’ll propose a partial solution toRead… Read more »

Privacy and Security Implications of Geo-Location Social Media Tools

Originally posted at http://www.thehomelandsecurityblog.com/2010/11/12/privacy-and-security-implications-of-geo-location-social-media-tools/ Privacy and Security Implications of Geo-Location Social Media Tools 2010 November 12 tags: Facebook, fbplaces, Foursquare, geolocation, geotagging, internet privacy, internet security, privacy, security, Social Media by Sara Cohen Geo-location applications and technologies are quickly becoming the latest phenomenon in social media and information-sharing, due to the ease and speed withRead… Read more »

The Conversation on Radical Information Transparency and the Government continues

” . . . the national security apparatus is groaning under the weight of record amounts of classified information, not to mention the attendant material costs of protecting its secrets for longer and longer periods of time. To be sure, this is partly due to the fact that it’s collecting more intelligence than ever before,Read… Read more »