The acting executive director of the DHS Office of State and Local Government Coordination and Preparedness discusses his recent rollout conferences and encourages first-responder participation in implementation of the presidential directive on national p
Surplus uranium, inadequate controls, and undetected smuggling are the key ingredients of a future nuclear disaster on U.S. soil. Today, almost any nation in the world is capable of building Hiroshima-sized nuclear devices, RDDs, and/or dirty bombs.
The mostly successful launch of the Department of Homeland Security has been followed, not surprisingly, by allegations of wasteful spending and a failure to establish priorities. The new team at DHS meets the challenge head-on, and is already working wit
Two major homeland-security events - the CFSI dinner in Washington, D.C., and the FDIC conclave in Indianapolis - reinforce, in different ways, Chairman Cox's goal of keeping a tighter rein on DHS management while also providing the funds needed to contin
Scores of victims, thousands of tons of debris, possible wide-scale contamination, and a huge area of urban real estate. Those are but some of the many variables - and none can be taken lightly - that have to be considered in the aftermath of a terrorist
The assistant executive director and COO of the American Society of Civil Engineers shares his views on, among other topics, the ASCE's latest "Report Card" on America's Infrastructure, and EPA grants and funding for vulnerability assessments.
President Bush's fiscal year 2006 budget plan calls for increased funding for port and maritime security. Some members of Congress say that that is only a start, and significant additional funds are needed - ASAP.
Since 9/11, many positive steps have been taken to better protect the American people, and the U.S. homeland, from new terrorist attacks. But some of those steps have been in the wrong direction, and others were unnecessary.
The former RIPtech president and, later, head of the National Cyber Security Division at DHS, provides knowledgeable insights on, among other topics, the public-private cyber security partnership, the IT vulnerability assessment process, cyber security an