Homeland Security — Special Issue


The Challenge
By Katherine McIntire Peters
Ensuring homeland security will involve a lot more than creating a new Cabinet department.

No Man's Land
By Katherine McIntire Peters
Across vast stretches of the Southwest border, security is just a pipe dream.

In The Line Of Fire
By Katherine McIntire Peters
It's the federal government's job to make sure the people who respond to the next terrorist attack have the tools and the training for the job.

Detecting The Threat
By Shane Harris
Technology and the war on terror.

In Transit
By Jason Peckenpaugh
Ten months after Sept. 11, Washington is letting the transportation sector protect itself.

Communication Breakdown
By Shane Harris
The FBI's ancient computer system inhibits its ability to share critical investigative information.

Columns

Editor's Notebook: The Cost Of Security

Who's Who

Profiles of some federal officials responsible for homeland security, including the following key players:

  • Office of Homeland Security
    Frank Cilluffo, Special Assistant to the President and Adviser for External Affairs
  • Border and Transportation Security
    Richard Bennis, Transportation Security Administration
    Gustavo De La Vina, Immigration and Naturalization Service
    Mary Ryan, State Department
    Michael Cronin, Immigration and Naturalization Service
  • Public Health
    Scott Lillibridge, Health and Human Services Department
    Jerome Hauer, Health and Human Services Department
    Steven Bice, Centers for Disease Control and Prevention
    Dr. David Fleming, Centers for Disease Control and Prevention
    Dr. Doug Hamilton, Centers for Disease Control and Prevention
    Dr. Edward Baker, Centers for Disease Control and Prevention
    Dr. James Hughes, Centers for Disease Control and Prevention
    Dr. Anthony Fauci, National Institutes of Health
    Maj. Gen. Lester Martinez-Lopez, Army Medical Research and Materiel Command
    Thomas Day, U.S. Postal Service
  • Counterterrorism
    Francis Taylor, State Department
    Paquale D'Amuro, Federal Bureau of Investigation
    Juan Zarate, Treasury Department
    Julie Myers, Treasury Department
    James Gurule, Treasury Department
    Marcy Forman, Customs Service
    Stephen Younger, Defense Threat Reduction Agency
    James Clapper, National Imagery and Mapping Agency
    Brig Gen Douglas O'Dell, 4th Marine Expeditionary Brigade
  • Domestic Preparedness
    Bruce Baughman, Office of National Preparedness
    Andy Mitchell, Office for Domestic Preparedness
    Stephen Wiley, Federal Bureau of Investigation
    John Gordon, Energy Department
    Richard Meserve, Nuclear Regulatory Commission
    Dr. Kristi Koenig, Veterans Affairs Department
    Kenneth Kasprisin, Readiness Response and Recovery Directorate
  • Infrastructure Protection
    Richard Clarke, Special Adviser to the President on Cyberspace Security
    John Tritak, Bureau of Industry and Security
    Ron Dick, Federal Bureau of Investigation
    Paul Kurtz, National Security Council

On The Record

The top leaders of the homeland security effort describe the challange, in their own words:

Back Issues
Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Sponsored by One Identity

    One Nation Under Guard: Securing User Identities Across State and Local Government

    In 2016, the government can expect even more sophisticated threats on the horizon, making it all the more imperative that agencies enforce proper identity and access management (IAM) practices. In order to better measure the current state of IAM at the state and local level, Government Business Council (GBC) conducted an in-depth research study of state and local employees.

    Download
  • Sponsored by Aquilent

    The Next Federal Evolution of Cloud

    This GBC report explains the evolution of cloud computing in federal government, and provides an outlook for the future of the cloud in government IT.

    Download
  • Sponsored by LTC Partners, administrators of the Federal Long Term Care Insurance Program

    Approaching the Brink of Federal Retirement

    Approximately 10,000 baby boomers are reaching retirement age per day, and a growing number of federal employees are preparing themselves for the next chapter of their lives. Learn how to tackle the challenges that today's workforce faces in laying the groundwork for a smooth and secure retirement.

    Download
  • Sponsored by Hewlett Packard Enterprise

    Cyber Defense 101: Arming the Next Generation of Government Employees

    Read this issue brief to learn about the sector's most potent challenges in the new cyber landscape and how government organizations are building a robust, threat-aware infrastructure

    Download
  • Sponsored by Aquilent

    GBC Issue Brief: Cultivating Digital Services in the Federal Landscape

    Read this GBC issue brief to learn more about the current state of digital services in the government, and how key players are pushing enhancements towards a user-centric approach.

    Download

When you download a report, your information may be shared with the underwriters of that document.