Department of Intelligence and Security

Results: 1109



#Item
11Cybercrime / Computer security / Hacker groups / Internet-based activism / Cyberwarfare / International cybercrime / Anonymous / Cyber Intelligence Sharing and Protection Act / Sony Pictures Entertainment hack / LulzSec / Hacktivism / United States Department of Homeland Security

INVESTING IN A CENTRALIZED CYBERSECURITY INFRASTRUCTURE: WHY “HACKTIVISM” CAN AND SHOULD INFLUENCE CYBERSECURITY REFORM Brian B. Kelly INTRODUCTION ...................................................................

Add to Reading List

Source URL: www.bu.edu

Language: English - Date: 2016-01-14 14:26:29
12Ambient intelligence / Internet of Things / Fashion accessories / Humancomputer interaction / Wearable devices / Wearable computer / Computer security / Smartphone / Wearable technology

Wearables  for  student  health  and  wellness   David  Kotz   Department  of  Computer  Science   Dartmouth  College   July  2015  

Add to Reading List

Source URL: studenthealth.cs.dartmouth.edu

Language: English - Date: 2015-09-21 14:06:42
13Terrorism / Law enforcement in the United States / War on Terror / 107th United States Congress / United States intelligence agencies / Homeland security / Counter-terrorism / Patriot Act / United States Department of Homeland Security / Definitions of terrorism

Subject Areas for the Advanced Common Professional Component (CPC) Topics: Homeland Security Undergraduate and Graduate Levels Peregrine Academic Services provides a range of online comprehensive exams for performing dir

Add to Reading List

Source URL: www.peregrineacademics.com

Language: English
14United States intelligence agencies / National security / Computer network security / Counter-terrorism / Cyberwarfare / Islamic State of Iraq and the Levant / Federal Bureau of Investigation / Threat / National Counterterrorism Center / Computer security / Joint Terrorism Task Force / United States Department of Homeland Security

Microsoft Word - terror211.doc

Add to Reading List

Source URL: docs.house.gov

Language: English
15United States Department of Homeland Security / United States intelligence agencies / Immigration to the United States / DHS Office of Intelligence and Analysis / Homeland Security Act / Center for Homeland Defense and Security / Homeland security / U.S. Immigration and Customs Enforcement / DHS Science and Technology Directorate / DHS Cyber Security Division

Volume 3, Issue 2 April-June 2014 Inside

Add to Reading List

Source URL: nssp.unm.edu

Language: English - Date: 2015-06-27 14:36:39
16Financial regulation / Suspicious Activity Report / United States Department of Homeland Security / Los Angeles Police Department / Surveillance / Fusion center / SAR / Nationwide Suspicious Activity Reporting Initiative

SECRET FILES, SURVEILLANCE, SPYING, AND INFILTRATION LAPD Special Order 17, the iWATCH program and Intelligence Gathering Guidelines criminalize innocent behavior, breakdown trust, invade privacy, promote racial profili

Add to Reading List

Source URL: stoplapdspying.org

Language: English - Date: 2016-03-18 19:43:17
17Cyberwarfare / Malware / Rootkits / Cryptography / CrySyS Lab / Duqu / Stuxnet / Flame / Wiper / Computer security / Communications security / Ambient intelligence

Introducing the CrySyS Lab Levente Buttyán Laboratory of Cryptography and System Security (CrySyS Lab) Department of Networked Systems and Services Budapest University of Technology and Economics www.crysys.hu

Add to Reading List

Source URL: crysys.hu

Language: English - Date: 2016-07-26 04:36:44
18Law enforcement in the United States / United States intelligence agencies / Criminal records / Clarksburg /  West Virginia / Criminal investigation / FBI Criminal Justice Information Services Division / Computer security / Federal Bureau of Investigation / United States Department of Homeland Security / Cloud computing / IJIS Institute / Homeland security

About Datamaxx Bringing the Power of Information to Protect Our Nation How can we improve the process of accessing and sharing “mission critical” information for those who protect and serve our nation? That was the q

Add to Reading List

Source URL: www.datamaxx.com

Language: English - Date: 2015-01-21 10:29:20
19Professional ethics / Social philosophy / Emerging technologies / Ethics of technology / Privacy / Internet privacy / Business ethics / Ethics / Artificial intelligence / Engineering ethics / Outline of ethics / Computer ethics

Usable Security and Privacy in Technology Ethics Courses Patrick Gage Kelley Department of Computer Science University of New Mexico

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2015-07-17 22:36:03
20Internet of Things / Ambient intelligence / Cryptography / Computer security / Smart city / National Telecommunications and Information Administration / Big data

Federal Register / Vol. 81, NoWednesday, April 6, Notices DEPARTMENT OF COMMERCE National Oceanic and Atmospheric

Add to Reading List

Source URL: www.ntia.doc.gov

Language: English - Date: 2016-04-06 07:02:09
UPDATE