Get Our Newsletter



Links

Columnists



Site Search


Entire (RSS)
Comments (RSS)

Archive Calendar

December 2019
S M T W T F S
« Nov    
1234567
891011121314
15161718192021
22232425262728
293031  

Guides

How to Become a Bounty Hunter



Tag: security

Ex-CIA Official to Lead New National Background Investigations Bureau

By Steve Neavling
ticklethewire.com

The new National Background Investigations Bureau will be led by the CIA’s former security director.

Charles Phalen Jr., who was working in the private sector after 30 years as a government employee, will start next week as the new bureau’s first director.

The NBIB was established last year to handle the massive government data breach at the Office of Personnel Management, the Associated Press reports. 

Phalen brings a lot of experience. He worked at the FBI and CIA.

The AP wrote:

The break-in at the OPM exposed security clearances, background checks and fingerprint records of more than 21 million current, former and prospective federal employees. That intrusion was widely blamed on China and led to the resignation of the OPM director and drew outrage over changing explanations about the severity of the hack.

The bureau will be part of OPM, but the Defense Department will design and operate the computer system that houses and processes people’s personal information.

Beth Cobert, acting director of OPM, told reporters that the bureau also is working to reduce the time it takes to investigate and issue or deny security clearances. Currently, it takes an average of 170 days to investigate a top-security clearance request, far exceeding the goal of 80 days, she said.

Other Stories of Interest

Guardian: Internet Security Becomes Huge, Growing Problem

hacking By Editorial Board
The Guardian

The phone in your pocket gives you powers that were hard to imagine even five years ago. It can talk to you, listen, and give sensible answers to questions. It knows your fingerprint and recognises your face and those of all your friends. It can buy almost anything, sell almost anything, bring you all the news you want, as well as almost all the books, films and music you might want to look at. What’s more, it will even allow you to talk to your friends and to communicate with almost anyone.

The problem is that these powers are not yours – at least they don’t belong to you alone. They belong to whoever controls the phone and can be used to serve their purposes as well as yours. Repressive governments and criminal gangs are all contending to break into phones today, and this kind of hacking will increasingly become the preferred route into all of the computer networks that we use – the ones we don’t call “phones”.

Apple’s sudden forced upgrade to the iPhone operating system last week was a response to these anxieties. A dissident in the UAE appears to have had his iPhone hijacked by a very sophisticated piece of malware produced by a security company and sold legally, if in secret, to regimes that want to spy on their enemies. This offers its controllers complete knowledge of anything the infected phone is privy to: that’s all the contacts, all the messages of any sort, whether chats, texts or emails, all the calendars and even, potentially, any voice conversation that it overhears. It’s difficult to imagine a more assiduous or intimate spy. And once one phone has been subverted, it becomes a tool for spying into all other the networks to which it or the owner has access.

To read more click here.

Former Head of Dallas FBI Wants to Use Airport Security Breach As Training Video

Footage of the security breach.

Footage of the security breach.

By Steve Neavling
ticklethewire.com

It was too easy.

Damarias Cockerham of Garland, Tex., was able to slip past security and walk through an unused metal detector at the Dallas/Fort Worth International Airport a year ago.

It was all caught on video, and the former head of the Dallas FBI, Danny Defenbaugh, wants to use it as a training video, CBS Local reports. 

Defenbaugh was able to board a flight without a ticket to confront his girlfriend before being removed.

Cockerham said the chilling video could provide a powerful lesson to security agents around the globe.

“It not only would be a training video, but I would think that every security personnel within the entire air world, both for airport and the airplane security, would want to use this.” he said.

Other Stories of Interest

Lawsuit Claims Airpot Security Arrested, Assaulted Young Woman with Disabilities

Screen Shot 2016-07-05 at 3.58.01 AMBy Steve Neavling
ticklethewire.com

A 19-year-old woman who had an impairment from radiation and the removal of a bran tumor was assaulted by security workers at a Memphis International checkpoint, according to a lawsuit.

WREG-TV reports that Hannah Cohen was flying home to Chattanooga on June 30, 2015, after receiving treatment that limited her ability to talk, walk, see and hear.

The security alarm confused Cohen because of her condition.

“The security personnel failed to recognize that she was confused because of her obvious disability and was unable to cooperate with the search,” Cohen’s lawyers, Kelly Pearson and William Hardwick, wrote in the lawsuit.

Police ignored the mother’s explanations, she said.

“She’s trying to get away from them but in the next instant, one of them had her down on the ground and hit her head on the floor. There was blood everywhere,” Shirley Cohen said.

Other Stories of Interest

Senate Rejects Legislation to Allow FBI to Search Internet Records without Warrant

computer-photoBy Steve Neavling
ticklethewire.com

The Senate rejected a measure Wednesday that would allow the FBI to search e-mail records and Internet browsing histories of Americans without a warrant.

The USA Today reports the Senate was two votes short of the 60 needed to pass the legislation. The final vote was 58-38.

Last week, the House rejected legislation to ban warrantless surveillance of Americans’ electronic communications.

“In the wake of the tragic massacre in Orlando, it is important our law enforcement have the tools they need to conduct counterterrorism investigations and track ‘lone wolves,’ or (Islamic State)-inspired terrorists who do not have direct connections to foreign terrorist organizations but who seek to harm Americans,” Sen. John McCain said.

But Sen. Ron Wyden, D-Ore., said the bill “won’t make our country safer, but it will take away crucial checks and balances that protect our freedom.”

“FBI agents will be able to demand the records of what websites you look at online, who you email and chat with, and your text message logs, with no judicial oversight whatsoever,” Wyden said. “The reality is the FBI already has the power to demand these electronic records with a court order under the Patriot Act. In emergencies, the FBI can even obtain the records right away and go to a judge after the fact. This isn’t about giving law-enforcement new tools, it’s about the FBI not wanting to do paperwork.”

Somali Man Accused of Leading Mass Executions Works As Airport Security in U.S.

somaliaBy Steve Neavling
ticklethewire.com

Yusuf Abdi Ali has been accused of leading mass executions and torture during the country’s civil war in the 1980s.

Despite the enormity of the allegations, Ali managed to pass FBI and TSA checks to work as a security guard at the Dulles International Airport, Fox News reports. 

It appears the Metropolitan Washington Airports Authority also was aware of some of the allegations in a lawsuit filed by a human rights group in 2006. He was accused of committing crimes against humanity.

“The Metropolitan Washington Airports Authority maintains a contract with Master Security to provide unarmed security services,” said Rob Yingling, a spokesperson. “Master Security’s employees are subject to the full, federally mandated vetting process in order to be approved for an airport badge, including a criminal history records check by the FBI and a security threat assessment by the TSA.”

Ali has been placed on administrative leave pending an investigation.

“He oversaw some of the most incredible violence that you can imagine,” Kathy Roberts, an attorney for the Center for Justice and Accountability (CJA), which is leading the civil lawsuit, told CNN. “He tortured people personally; he oversaw torture.”

Other Stories of Interest

Sen. Schumer Proposes Freeing Up Airport Security Lines with $28M

airport lineBy Steve Neavling
ticklethewire.com

Responding to complaints about long lines at airports, Sen. Charles Schumer wants to divert $28 million in federal funds to hire 600 new TSA agents.

The New York Post reports that the money would be used for security at JFK, La Guardia and Newark airports.

“We have to do everything we can to reduce wait times,” Schumer said. “It affects thousands of New Yorkers who travel every day, but it affects the whole country because when there are backups here, the rest of the country gets backed up as well.”

The TSA said earlier this month that security-checkpoint wait times had significant increased.

Other Stories of Interest

 

Government Watchdog: TSA Fails to Provide Proper Oversight of Airport Perimeters

airport-photoBy Steve Neavling
ticklethewire.com

The Transportation Safety Administration has failed to properly oversee airport perimeter security, making the entire U.S. commercial aviation system vulnerable, a government watchdog said.

CNN reports that the  Government Accountability Office issued a scathing report that includes the TSA’ failure to update recommendations to account for new potential threats.

“TSA has not updated this assessment to reflect changes in the airport security risk environment, such as TSA’s subsequent determination of risk from the insider threat — the potential of rogue aviation workers exploiting their credentials, access and knowledge of security procedures throughout the airport for personal gain or to inflict damage,” the report said.

According to TSA data from 2009 to 2015, there was an average of 2,500 breaches every year over the airport access points and perimeter.

Other Stories of Interest