Advanced search Help
Searching for terms: ALL (Cyber AND Crime) in: title or summary
Clear all search criteria
Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).
-
Test Results for Disk Imaging Tool: DFAS Pro Version 1.0.1.6 Build 067
From the Introduction: "The Computer Forensics Tool Testing (CFTT) program is a joint project of the Department of Homeland Security (DHS), the National Institute of Justice (NIJ), and the National Institute of Standards and Technology (NIST) Special Programs Office and Information Technology Laboratory (ITL). CFTT is supported by other organizations, including the Federal Bureau of Investigation, the U.S. Department of Defense Cyber Crime Center, U.S. Internal Revenue Service Criminal Investigation Division Electronic Crimes Program, and the U.S. Department of Homeland Security's Bureau of Immigration and Customs Enforcement, U.S. Customs and Border Protection and U.S. Secret Service. The objective of the CFTT program is to provide measurable assurance to practitioners, researchers, and other applicable users that the tools used in computer forensics investigations provide accurate results. Accomplishing this requires the development of specifications and test methods for computer forensics tools and subsequent testing of specific tools against those specifications. [...] This document reports the results from testing the disk imaging function of DFAS Pro Version 1.0.1.6 Build 067 using the CFTT Federated Testing Test Suite for Disk Imaging, Version 3.1."
United States. Department of Homeland Security. Science and Technology Directorate
2019-04-21
-
Paladin v6.08: Test Results for Disk Imaging Tool
From the Introduction: "The Computer Forensics Tool Testing (CFTT) program is a joint project of the Department of Homeland Security (DHS), the National Institute of Justice (NIJ), and the National Institute of Standards and Technology (NIST) Special Programs Office and Information Technology Laboratory (ITL). CFTT is supported by other organizations, including the Federal Bureau of Investigation, the U.S. Department of Defense Cyber Crime Center, U.S. Internal Revenue Service Criminal Investigation Division Electronic Crimes Program, and the U.S. Department of Homeland Security's Bureau of Immigration and Customs Enforcement, U.S. Customs and Border Protection and U.S. Secret Service. The objective of the CFTT program is to provide measurable assurance to practitioners, researchers, and other applicable users that the tools used in computer forensics investigations provide accurate results. Accomplishing this requires the development of specifications and test methods for computer forensics tools and subsequent testing of specific tools against those specifications. [...] This document reports the results from testing the disk imaging function of the Paladin Toolbox included in Paladin 6.08 using the CFTT Federated Testing Test Suite for Disk Imaging, Version 1.0. The Paladin Toolbox is a GUI [graphical user interface] interface to DC3DD 7.1.614."
United States. Department of Homeland Security. Science and Technology Directorate
2016-10-14
-
Forensic Toolkit (FTK) 7.0.0.163, Registry Viewer 2.0.0.7: Test Results for Windows Registry Forensic Tool
From the Introduction: "The Computer Forensics Tool Testing (CFTT) program is a joint project of the Department of Homeland Security (DHS), and the National Institute of Standards and Technology Special Program Office (SPO) and Information Technology Laboratory (ITL). CFTT is supported by other organizations, including the Federal Bureau of Investigation, the U.S. Department of Defense Cyber Crime Center, U.S. Internal Revenue Service Criminal Investigation Division Electronic Crimes Program, the National Institute of Justice (NIJ), and the U.S. Department of Homeland Security's Bureau of Immigration and Customs Enforcement, U.S. Customs and Border Protection and U.S. Secret Service. The objective of the CFTT program is to provide measurable assurance to practitioners, researchers, and other applicable users that the tools used in computer forensics investigations provide accurate results. Accomplishing this requires the development of specifications and test methods for computer forensic tools and subsequent testing of specific tools against those specifications. [...] This document reports the results from testing FTK [Forensic Toolkit] 7.0.0.163 against a registry dataset that consists of various Windows NT registry hive files."
United States. Department of Homeland Security. Science and Technology Directorate
2019-04-07
-
EnCase Forensic 8.07.00.93 (x64): Test Results for Windows Registry Forensic Tool
From the Introduction: "The Computer Forensics Tool Testing (CFTT) program is a joint project of the Department of Homeland Security (DHS), and the National Institute of Standards and Technology Special Program Office (SPO) and Information Technology Laboratory (ITL). CFTT is supported by other organizations, including the Federal Bureau of Investigation, the U.S. Department of Defense Cyber Crime Center, U.S. Internal Revenue Service Criminal Investigation Division Electronic Crimes Program, the National Institute of Justice (NIJ), and the U.S. Department of Homeland Security's Bureau of Immigration and Customs Enforcement, U.S. Customs and Border Protection and U.S. Secret Service. The objective of the CFTT program is to provide measurable assurance to practitioners, researchers, and other applicable users that the tools used in computer forensics investigations provide accurate results. Accomplishing this requires the development of specifications and test methods for computer forensic tools and subsequent testing of specific tools against those specifications. [...] This document reports the results from testing EnCase Forensic 8.07.00.93 against a registry dataset that consists of various Windows NT registry hive files."
United States. Department of Homeland Security. Science and Technology Directorate
2019-04-07
-
Test Results for Write-Protected Drive: Apricorn Padlock DT Firmware Version 0510
From the Introduction: "The Computer Forensics Tool Testing (CFTT) program is a joint project of the Department of Homeland Security Science and Technology Directorate (DHS S&T), the National Institute of Justice (NIJ), and the National Institute of Standards and Technology (NIST) Special Programs Office and Information Technology Laboratory (ITL). CFTT is supported by other organizations, including the Federal Bureau of Investigation, the U.S. Department of Defense Cyber Crime Center, U.S. Internal Revenue Service Criminal Investigation Division Electronic Crimes Program, and the U.S. Department of Homeland Security's Bureau of Immigration and Customs Enforcement, U.S. Customs and Border Protection and U.S. Secret Service. The objective of the CFTT program is to provide measurable assurance to practitioners, researchers, and other applicable users that the tools used in computer forensics investigations provide accurate results. Accomplishing this requires the development of specifications and test methods for computer forensics tools and subsequent testing of specific tools against those specifications. [...] This document reports the results from testing the read-only function of the Apricorn Padlock DT device firmware version 0510 using the CFTT Federated Testing Test Suite for Hardware Write Blocking, Version 3.1."
United States. Department of Homeland Security. Science and Technology Directorate
2020-05
-
Test Results for Write-Protected Drive: Apricorn ASK3z Secure Key Firmware Version 0401
From the Introduction: "The Computer Forensics Tool Testing (CFTT) program is a joint project of the Department of Homeland Security Science and Technology Directorate (DHS S&T), the National Institute of Justice (NIJ), and the National Institute of Standards and Technology (NIST) Special Programs Office and Information Technology Laboratory (ITL). CFTT is supported by other organizations, including the Federal Bureau of Investigation, the U.S. Department of Defense Cyber Crime Center, U.S. Internal Revenue Service Criminal Investigation Division Electronic Crimes Program, and the U.S. Department of Homeland Security's Bureau of Immigration and Customs Enforcement, U.S. Customs and Border Protection and U.S. Secret Service. The objective of the CFTT program is to provide measurable assurance to practitioners, researchers, and other applicable users that the tools used in computer forensics investigations provide accurate results. Accomplishing this requires the development of specifications and test methods for computer forensics tools and subsequent testing of specific tools against those specifications."
United States. Department of Homeland Security. Science and Technology Directorate
2019-11-20
-
Test Results for Write-Protected Drive: Apricorn L3 Fortress Firmware Version 0510 [May 2020]
From the Introduction: "The Computer Forensics Tool Testing (CFTT) program is a joint project of the Department of Homeland Security Science and Technology Directorate (DHS S&T), the National Institute of Justice (NIJ), and the National Institute of Standards and Technology (NIST) Special Programs Office and Information Technology Laboratory (ITL). CFTT is supported by other organizations, including the Federal Bureau of Investigation, the U.S. Department of Defense Cyber Crime Center, U.S. Internal Revenue Service Criminal Investigation Division Electronic Crimes Program, the DHS Bureau of Immigration and Customs Enforcement, U.S. Customs and Border Protection and U.S. Secret Service. The objective of the CFTT program is to provide measurable assurance to practitioners, researchers, and other applicable users that the tools used in computer forensics investigations provide accurate results. Accomplishing this requires the development of specifications and test methods for computer forensics tools and subsequent testing of specific tools against those specifications."
United States. Department of Homeland Security. Science and Technology Directorate
2020-05
-
Test Results for Write-Protected Drive: Apricorn ASK3 Secure Key 3.0 Firmware Version 0401
From the Introduction: "The Computer Forensics Tool Testing (CFTT) program is a joint project of the Department of Homeland Security Science and Technology Directorate (DHS S&T), the National Institute of Justice, and the National Institute of Standards and Technology (NIST) Special Programs Office and Information Technology Laboratory (ITL). CFTT is supported by other organizations, including the Federal Bureau of Investigation; the U.S. Department of Defense Cyber Crime Center; U.S. Internal Revenue Service Criminal Investigation Division Electronic Crimes Program; and the DHS Bureau of Immigration and Customs Enforcement, U.S. Customs and Border Protection and U.S. Secret Service. The objective of the CFTT program is to provide measurable assurance to practitioners, researchers, and other applicable users that the tools used in computer forensics investigations provide accurate results. Accomplishing this requires the development of specifications and test methods for computer forensics tools and subsequent testing of specific tools against those specifications."
United States. Department of Homeland Security. Science and Technology Directorate
2020-02
-
Test Results for String Search Tool: EnCase Version 8.09.00.192
From the Introduction: "The Computer Forensics Tool Testing (CFTT) program is a joint project of the Department of Homeland Security, Science and Technology Directorate (DHS S&T), the National Institute of Justice (NIJ), and the National Institute of Standards and Technology (NIST) Special Programs Office and Information Technology Laboratory (ITL). CFTT is supported by other organizations, including the Federal Bureau of Investigation, the U.S. Department of Defense Cyber Crime Center, U.S. Internal Revenue Service Criminal Investigation Division Electronic Crimes Program, and the U.S. Department of Homeland Security's Bureau of Immigration and Customs Enforcement, U.S. Customs and Border Protection and U.S. Secret Service. The objective of the CFTT program is to provide measurable assurance to practitioners, researchers, and other applicable users that the tools used in computer forensics investigations provide accurate results. Accomplishing this requires the development of specifications and test methods for computer forensics tools and subsequent testing of specific tools against those specifications."
National Institute of Standards and Technology (U.S.). Office of Law Enforcement Standards; United States. Department of Homeland Security. Science and Technology Directorate
2020-06
-
Interplay of Borders, Turf, Cyberspace, and Jurisdiction: Issues Confronting U.S. Law Enforcement [July 20, 2012]
"Savvy criminals constantly develop new techniques to target U.S. persons, businesses, and interests. Individual criminals as well as broad criminal networks exploit geographic borders, criminal turf, cyberspace, and law enforcement jurisdiction to dodge law enforcement countermeasures. Further, the interplay of these realities can potentially encumber policing measures. In light of these interwoven realities, policy makers may question how to best design policies to help law enforcement combat ever-evolving criminal threats. Criminals routinely take advantage of geographic borders. They thrive on their ability to illicitly cross borders, subvert border security regimens, and provide illegal products or services. Many crimes--particularly those of a cyber nature--have become increasingly transnational. While criminals may operate across geographic borders and jurisdictional boundaries, law enforcement may not be able to do so with the same ease. Moreover, obstacles such as disparities between the legal regimens of nations (what is considered a crime in one country may not be in another) and differences in willingness to extradite suspected criminals can hamper prosecutions. The law enforcement community has, however, expanded its working relationships with both domestic and international agencies."
Library of Congress. Congressional Research Service
Finklea, Kristin M.
2012-07-20
-
Obama Administration's Cybersecurity Proposal: Criminal Provisions [July 29, 2011]
"Responding to ongoing concerns over the state of U.S. cybersecurity, the Obama Administration released a report containing a proposal for significant cybersecurity legislation on May 12, 2011. The Administration's proposal contains seven sections and addresses many different subject areas. This report examines the first section of the Administration's proposal, dealing with criminal law. That section would supplement the Computer Fraud and Abuse Act (CFAA) by adding a mandatory three-year minimum penalty for damaging certain critical infrastructure computers, increase the penalties for most violations of the CFAA, modify the conspiracy and forfeiture provisions of the CFAA, and make felony violation of the CFAA a racketeering predicate offense. This report also compares the Administration's proposal to bills pending before the House of Representatives and the Senate. Although Congress is considering many bills addressing cybersecurity, there are relatively few which would modify computer crime laws such as the CFAA. The bills which do address computer crime differ in significant ways from the Administration's proposal, though they would accomplish some of the same goals."
Library of Congress. Congressional Research Service
Stevens, Gina Marie; Miller, Jonathan
2011-07-29
-
Information Infrastructure Group Report (1999)
Since the last meeting of the President's National Security Telecommunications Advisory Committee (NSTAC) in September 1998, the Information Infrastructure Group (IIG) has concentrated its efforts on several issues related to information assurance and infrastructure protection: global information infrastructure (GII), transportation information infrastructure risks, electronic commerce (EC), cyber crime, and Presidential Decision Directive (PDD) 63. This report captures the efforts of the IIG through the current cycle. The NSTAC XXII IIG members are listed in Annex A. The IIG's current charge is outlined in this report.
United States. President's National Security Telecommunications Advisory Committee
1999-06
-
Information Infrastructure Group Report (1997)
This report presents the findings and recommendations of the following subgroups within the NSTAC: Financial Services Risk Assessment Subgroup, Transportation Risk Assessment Subgroup, Cyber Crime Subgroup, Information Assurance Policy Subgroup, and Information Systems Security Board. Also listed in Annex A are the IIG Members.
United States. President's National Security Telecommunications Advisory Committee
1997-12
-
Industrial College of the Armed Forces: Industry Studies 2001: Financial Services
The US financial services industry is an important contributor to the economic power of the nation. The industry is in excellent health -- well capitalized, dynamic, and innovative. Recent legislative changes have altered the structure of the industry by allowing banks, insurance companies, and securities dealers to consolidate into large "financial holding companies" that cut across industry sectors. US financial services firms are also positioning to compete here and abroad with international firms. Advances in information technology continue to provide opportunities for firms to increase business and customer service, but also create an industry risk in the form of cyber crime. The industry will continue to be competitive, but profitable, and will remain well positioned to support continued US leadership in the global economy.
Industrial College of the Armed Forces (U.S.)
2001
-
Transnational Threats: Blending Law Enforcement and Military Strategies
"On February 2-3, 2000, the U.S. Army War College, the Triangle Institute for Security Studies, and the Duke University Center for Law, Ethics, and National Security co-sponsored a conference in Chapel Hill, North Carolina. The conference examined transnational threats, including terrorism involving weapons of mass destruction, cyber threats to the national infrastructure, and international organized crime. The goal was to evaluate the seriousness of such threats and discuss strategies for dealing with them. In particular, the conference sought to address the question of how military and law enforcement could blend their strategies to better counter transnational threats. A secondary purpose was to clarify the role of the military in meeting challenges that transcend national borders and threaten our national interests. This book highlights some of the main issues and themes that ran through the conference. After looking at the various threats and undertaking a risk assessment, the report considers the unique aspects of transnational threats, and then identifies the key challenges facing the United States, paying particular attention to the role of the military. The book concludes with discussions of some of the steps that should be taken to secure ourselves against transnational threats."
Army War College (U.S.). Strategic Studies Institute
Pumphrey, Carolyn W. (Carolyn Wilson), 1955-
2002-11
-
Statement by NSC Spokesman Mike Hammer on National Security Advisor General Jim Jones' Travel to Germany and Russia October 2-6 [October 1, 2010]
In this October 1, 2010 statement, National Security Council Spokesman Mike Hammer announces National Security Advisor Jim Jones' travels to Germany and Russia. In Russia, Jones will address a security conference, "which will cover 21st Century security challenges facing all states, including natural and industrial disasters, transnational crime and converging threats, and cyber security."
United States. Office of the White House Press Secretary
2010-10-01
-
Home and Away: DHS and the Threats to America, Remarks delivered by Secretary Kelly at George Washington University Center for Cyber and Homeland Security
This is the webcast of Secretary Kelly at George Washington University Center for Cuber and Homeland Security. The video highlights some of the most pressing issues in national security today including cyber crime, human smuggling, drug trade, terrorism both domestic and abroad, as well as illegal immigration.
United States. Department of Homeland Security
2017-04-18
-
S. Hrg. 106-486: Cyber Attack: Is the Government Safe? Hearing before the Committee on Governmental Affairs, United States Senate, One Hundred Sixth Congress, Second Session, March 2, 2000
From the opening statement of Fred Thompson: "The Committee on Governmental Affairs is holding this hearing on the ability of the Federal Government to protect against and respond to potential cyber attacks. This Committee spent considerable time during the last Congress examining the state of Federal Government information systems. Numerous Governmental Affairs Committee hearings and General Accounting Office reports uncovered and identified systemic failures of government information systems, which highlighted our Nation's vulnerability to computer attacks from international and domestic terrorists, to crime rings, to everyday hackers. S. 1993 begins where the Paperwork Reduction Act of 1995 and the Clinger-Cohen Act of 1996 left off. These laws and the Computer Security Act of 1987 provide the basic framework for managing information security. The proponents of this bill recognize that these are not the only things that need to be done. Some have suggested we provide specific standards in the legislation. Others have recommended we establish a new position of a national chief information officer or even a national security czar. These things should be considered and these issues and more will be brought up during our hearing today." Statements, letters, and material submitted for the record include those of the following: Fred Thompson, Joseph I. Lieberman, Daniel K. Akaka, Susan M. Collins, John Edwards, James Adams, Jack L. Brock, Jr., Roberta L. Gross, Kevin Mitnick, Kenneth Watson, and a copy of S. 1993.
United States. Government Printing Office
2000
-
Offline Forensic Analysis Of Microsoft® Windows® XP Physical Memory
"The rise of cyber crimes combined with the recent use of computer viruses and malicious programs that reside only in volatile main memory demand further development of appropriate forensic tools. Existing forensic tools that analyze non-volatile memory are not capable of analyzing volatile memory and the few tools that are capable of detailed analysis of volatile memory are not openly available to the public. In this thesis, an open source tool is developed to analyze images of physical memory originating from the Windows XP and Windows 2003 Server operating systems. The tool, named Windows Physical Memory Offline Analyzer (WPMOA), scans the memory image and, utilizing input from the user, extracts relevant data from the various structures maintained by the Windows operating system. The WPMOA program automatically generates reports about the image and provides key information necessary for a user to perform additional manual investigation of the image beyond what is done automatically. This thesis details instructions on the preparation and use of the program, initial testing results of the program with actual physical memory images, and C language code for the program itself."
Naval Postgraduate School (U.S.)
Schultz, John S.
2006-09
-
Statement by Press Secretary Matt Chandler on Secretary Napolitano's Upcoming Visit to London [January 27, 2011]
"'Secretary of Homeland Security Janet Napolitano will travel to London on Friday, Jan. 28. While in London, Secretary Napolitano will meet with International Maritime Organization (IMO) Secretary General Efthimios Mitropoulos to discuss cooperative initiatives to increase the security and resilience of the global supply chain and bolster cargo security - including efforts to support DHS' continued collaboration with the World Customs Organization (WCO) and the International Civil Aviation Organization (ICAO). Secretary Napolitano will also meet bilaterally with UK Home Secretary Theresa May and Transport Secretary Philip Hammond to discuss collaborative efforts to strengthen cyber, cargo and aviation security and ensure the security and resilience of the global supply chain against terrorism, transnational crime and natural disasters while facilitating the flow of travel and commerce. More details on the trip will be released once they are finalized."
United States. Department of Homeland Security. Press Office
2011-01-27
-
Virtual Currency: Financial Innovation and National Security Implications, Hearing Before the Subcommittee on Terrorism and Illicit Finance of the Committee on Financial Services, U.S. House of Representatives, One Hundred Fifteenth Congress, First Session, June 8, 2017
This testimony compilation is from the June 8, 2017 hearing, "Virtual Currency: Financial Innovation and National Security Implications," before the U.S. House of Representatives Committee on Financial Services. From the witness testimony of Luke Wilson: "Today's hearing on 'Virtual Currency: Financial Innovation and National Security Implications' is a very good first step forward towards understanding this quickly-evolving technology. My previous employment with the FBI allowed me to investigate several crimes that involved Bitcoin. My experience is that Bitcoin is not, or should not be, alarming to investigators or private companies. Bitcoin is thought to be anonymous by some criminals, in reality it's far from anonymous, and companies like Elliptic have assisted law enforcement and private industry to identify who is behind illicit Bitcoin transactions. Elliptic's software and expertise has assisted in terrorism, ransomware, cyber extortion, and illegal arms trafficking cases, to name a few. In all of these cases we have provided intelligence and leads that help investigators to trace Bitcoin transactions and identify who is transacting. This is all made possible by the record of transactions kept on the blockchain. All Bitcoin transactions are stored on the blockchain, including those performed by criminals. The importance of the blockchain record cannot and should not be undervalued, as it provides a public, permanent and incorruptible record of transactions, the like of which is not available with any other payment method." Statements, letters, and materials submitted for the record include those of the following: Jerry Brito, Scott Dueweke, Kathryn Haun, Jonathan Levin, and Luke Wilson.
United States. Congress. House. Committee on Financial Services
2017
-
Secretary Napolitano Highlights DHS' Progress in 2011 [December 22, 2011]
On December 22, 2011, the Department of Homeland Security issued the following press release: "Department of Homeland Security (DHS) Secretary Janet Napolitano on Monday toured operations and received briefings at DHS facilities in the National Capital Region. The Secretary toured Transportation Security Administration and Customs and Border Protection operations at Washington Dulles International Airport, the Immigration and Customs Enforcement Cyber Crimes Center in Virginia, the Secret Service's James J. Rowley Training Center in Beltsville, Md. and the FEMA [Federal Emergency Management Agency] IMAT [Incident Management Assistance Teams] and the Fairfax USAR [Urban Search and Rescue] team in Herndon, Va. - highlighting the major steps the Department has taken this year to enhance America's capabilities to guard against terrorism; secure the nation's borders; engage in smart enforcement of our immigration laws; safeguard and secure cyberspace; prepare for, respond to and recover from disasters; and to mature and strengthen the homeland security enterprise."
United States. Department of Homeland Security. Press Office
2011-12-22
-
Secretary Napolitano Highlights DHS' Progress in 2011 [January 23, 2012]
On January 23, 2012, the Department of Homeland Security issued the following press release: "Department of Homeland Security (DHS) Secretary Janet Napolitano on Monday toured operations and received briefings at DHS facilities in the National Capital Region. The Secretary toured Transportation Security Administration and Customs and Border Protection operations at Washington Dulles International Airport, the Immigration and Customs Enforcement Cyber Crimes Center in Virginia, the Secret Service's James J. Rowley Training Center in Beltsville, Md. and the FEMA [Federal Emergency Management Agency] IMAT [Incident Management Assistance Team]and the Fairfax USAR [Urban Search and Rescue] team in Herndon, Va. - highlighting the major steps the Department has taken this year to enhance America's capabilities to guard against terrorism; secure the nation's borders; engage in smart enforcement of our immigration laws; safeguard and secure cyberspace; prepare for, respond to and recover from disasters; and to mature and strengthen the homeland security enterprise."
United States. Department of Homeland Security. Press Office
2012-01-23
-
ATF Canine Branch Briefing [excerpt]
This presentation, given at the National Center for the Study of Counter-Terrorism & CyberCrime at Norwich University Search Dog Forum in June 2005, provides a brief introduction to the Canine Branch of the ATF. Images of the training compound in Virginia are included, as well as overviews of the Accelerant Detection and Explosive Detection Canine training programs.
United States. Bureau of Alcohol, Tobacco, Firearms, and Explosives
Adams, Gary
2005-06-06
-
Remarks by Secretary Napolitano Before the Joint Meeting of the OSCE Permanent Council and OSCE Forum for Security Cooperation [July 1, 2011]
On July 1, 2011, in Vienna Austria, Secretary Napolitano went before the Joint Meeting of the Organization for Security and Co-Operation in Europe(OSCE) Permanent Council and Forum to discuss the necessity of working together to "tackle transnational threats." Secretary Napolitano stated that: "[g]iven the evolving nature of the threats we face today-from terrorism and organized crime to weapons smuggling, human trafficking, and cyber attacks-the expertise and adaptability of the OSCE and its tools become vitally important."
United States. Department of Homeland Security. Press Office
2011-07-01
-
Readout Of Secretary Napolitano's Visit To Oslo, Norway [November 14, 2011]
On November 14, 2011, the Department of Homeland Security issued the following press release: "Secretary of Homeland Security Janet Napolitano today traveled to Oslo, Norway to meet with international partners and discuss the Department's ongoing collaboration with the public and private sector on issues such as cybersecurity as well as combating violent extremism and transnational crime."
United States. Department of Homeland Security. Press Office
2011-11-14
-
Commerce, Justice, Science, and Related Agencies Appropriations for 2013: Hearings Before a Subcomittee of the Committee on Appropriations, House of Representatives, One Hundred Twelfth Congress, Second Session, Subcommittee on Commerce, Justice, Science, and Related Agencies, Part 6, February 2012
This document contains the statements of members of Congress and other individuals and organizations from hearings held before the Committee on Appropriations in February 2012. Issues discussed include prescription drug abuse, cyber crime, the events at Fort Hood in 2009, counterterrorism, U.S. prisons, and other subjects. Statements, letters, and materials submitted for the record include those of the following: Frank R. Wolf, Eric H. Holder, Jr., Chaka Fattah, Harold Rogers, and Norman D. Dicks.
United States. Government Printing Office
2013
-
S. Hrg. 113-780, Serial No. J-113-59: Economic Espionage and Trade Secret Theft: Are Our Laws Adequate for Today's Threats?, Hearing Before the Subcommittee on Crime and Terrorism of the Committee on the Judiciary, United States Senate, One Hundred Thirteenth Congress, Second Session, May 13, 2014
This is the May 13, 2014 hearing on "Economic Espionage and Trade Secret Theft: Are Our Laws Adequate for Today's Threats?," held before the Subcommittee on Crime and Terrorism of the Committee on the Judiciary. From the opening statement of Sheldon Whitehouse: "We are having a hearing today that is entitled ''Economic Espionage and Trade Secret Theft: Are Our Laws Adequate for Today's Threats?'' Today the Subcommittee is going to explore how we can better protect American businesses from those who try to steal their valuable intellectual property. American companies are renowned as being the most innovative in the world. Companies of every size and in every industry, from manufacturing to software to biotechnology to aerospace, own large portfolios of legally protected trade secrets they have developed and innovated. In some cases, the ''secret sauce'' may be a company's most valuable asset. The theft of these secrets can lead to devastating consequences. For small businesses it can be a matter of life and death. The risk of trade secret theft has been around as long as there have been secrets to protect. There is a reason why Coca-Cola has kept its formula locked away in a vault for decades. But in recent years, the methods used to steal trade secrets have become more sophisticated. Companies now must confront the reality that they are being attacked on a daily basis by cyber criminals who are determined to steal their intellectual property." Statements, letters, and materials submitted for the record include those of the following: Randall C. Coleman, Drew Greenblastt, Peter L. Hoffman, Douglas K. Norman, and Pamela Passman.
United States. Government Publishing Office
2016
-
Fact Sheet: The USA Patriot Act: A Proven Homeland Security Tool [December 14, 2005]
In this press release, the Department of Homeland Security (DHS) benefits significantly from the USA Patriot Act and urges the United States Congress to reauthorize this proven tool in the global war on terror. The Patriot Act breaks down barriers to information sharing, enabling law enforcement and intelligence personnel to share information that is needed to help connect the dots and disrupt potential terror and criminal activity before they can carry out their plots. The broad information sharing provisions better enables U.S. Customs and Border Protection to screen international visitors and determine whether an apprehended alien presents a threat to security or public safety. The Patriot Act also enhances DHS investigations into the international movement of illicit funds through money transmittal businesses, bulk cash smuggling and cyber crimes.
United States. Department of Homeland Security. Press Office
2005-12-14
-
Annotated Worldwide Threat Assessment 2015
This is an interactive replication of the "Worldwide Threat Assessment of the U.S. Intelligence Community" (the threat assessment document in its entirety is available at: https://www.hsdl.org/?abstract&did=766186). This annotated version provides in-depth summaries into each chapter of the threat assessment. These chapters include: Cyber, Counterintelligence, Terrorism, Weapons of Mass Destruction, Space and Counterspace, Transnational Organized Crime, Economics and National Resources, and Human Security. From the document's coverpage: "The Worldwide Threat Assessment has been presented to Congress annually by the Director of National Intelligence; and before that office was created, it was presented by the CIA Director in his position as the Director of Central Intelligence. This annual threat assessment testimony, published as text, is one of the most informative top-level products of the U.S. Intelligence Community that is publicly available. Since 2014, the Center for Homeland Defense and Security at the Naval Postgraduate School has produced and provided a multi-media enhanced, annotated version of the text document."
Naval Postgraduate School (U.S.). Center for Homeland Defense and Security
2015