Homeland Security Network Blog

The information source for first responders.

  • Home
    Home This is where you can find all the blog posts throughout the site.
  • Categories
    Categories Displays a list of categories from this blog.
  • Archives
    Archives Contains a list of blog posts that were created previously.

Terrorism

b2ap3_thumbnail_North-Korea-Ships-Chemical-Weapons-to-Syria.jpg
Gatestone Institute by Debalina Ghoshal   Syria could, of course, also acquire nuclear weapons from North Korea. Syria already possesses ballistic missiles; the chemical weapons are already there. In the past, North Korea has shipped ballistic missiles to Hezbollah and Hamas via Syria; they will probably continue to do so, and to terrorist organizations as well.   North Korea is reported to be shipping chemical weapons to Syria. The United Nations Security Council (UNSC) has stated that activity has been intercepted during the past six months and that North Korea is also shipping conventional weapons there. Furthermore, a Syrian government entity, the Scientific Studies and Research Centre, has apparently established cooperation with the Korean Mining Development Trading Corporation (KOMID), North Korea's key arms exporter, and blacklisted by the UN Security Council Shipping weapons and chemical weapons to Syria brings cash-strapped North Korea hard currency, Meanwhile Syria, thick in a civil...
b2ap3_thumbnail_Power-Grid-Cybersecurity-Feature_1280_468_90.jpg
Findings Part of Comprehensive NTT Security Q3 Global Threat Intelligence Report OMAHA, Neb., Nov. 29, 2017 (GLOBE NEWSWIRE) -- NTT Security, the specialized security company of NTT Group, has released its 2017 Global Threat Intelligence Center (GTIC) Quarterly Threat Intelligence Report. The report serves as the primary focal point for contextualizing, enhancing and enriching threat intelligence-related information across the NTT Security global client base. The GTIC Quarterly Threat Intelligence Report is uniquely situated to empower frontline Managed Security Services (MSS) SOC analysts, research analysts, network security engineers, professional security service consultants and incident response handlers to gather, share and apply threat-related information.  The Q3 GTIC Report provides details on the research conducted by NTT Security over the past three months and focuses on several different areas of research and analysis. One section of the report of particular significance entitled “The Face of the Insider Threat” reveals that approximately 25% of...
b2ap3_thumbnail_cybersecurity.jpg
Written by Alan W. Silberberg   I. IntroductionThe world is seeing an ongoing multi-faceted cyber attack(s) (social engineering) that uses weaponized fake media, digital false flags and other digitally obfuscated materials. These attacks stem from nation states, paid hacker cartels and mercenary hackers globally. These cyber security attacks utilize social engineering, weaponized media and fake media. We have been studying these socially engineered attacks since 2009, and have created unique responses to them.   II.    Main bodyThe Green Revolution of 2009 in Iran marked the first known use of weaponized social media. The Government of Iran utilized Twitter to get western citizens to spread their propaganda.Fast forward to 2016, where USA itself was attacked through long term, dedicated weaponized media cyber assault on our democracy; and government alike by Russia and its agents. This attack continues with multi-faceted usage of fake media, bots, fake social media and malware laden content...

Terror threat to US rail puts law enforcement on alert

Posted by on in Terrorism
b2ap3_thumbnail_rail-train.jpg
ABC NewsBy Erin Dooley and David KerleyWith terrorist groups renewing calls for would-be attackers to target American rail lines, at least one local law enforcement agency in the U.S. is using drones to help guard against such a threat.The police chief for the Philadelphia-area's mass-transit system said he has known for some time that more than 140,000 miles of rail lines crisscrossing America are "porous" and had thought for a while of using drones to monitor the agency's tracks.He initiated the drone program after an article in the latest issue of al Qaeda's English-language publication gave step-by-step instructions for fashioning a "homemade derail tool" and claimed that railroads are among America's "easiest targets.""It is time that we instill fear and make them impose strict security measures to trains as they did with their air transportation," the publication said.The al Qaeda article prompted the federal Transportation Security Administration to send a...

Trump calls for crushing terrorists with military means

Posted by on in Terrorism
b2ap3_thumbnail_Military-Times.jpg
Military Times By: Jill Colvin, The Associated Press JUPITER, Fla. — President Donald Trump denounced the deadly mosque attack in Egypt and reached out to its president, asserting the world must crush terrorists by military means — and insisting the U.S. needs a southern border wall and the travel ban tied up in courts.“Need the WALL, need the BAN!” Trump tweeted Friday before calling Egyptian President Abdel-Fattah el-Sissi. “God bless the people of Egypt.”The attack’s aftermath played out as Trump mixed work and play in sunny Florida, golfing — quickly, he claimed — with pros Tiger Woods and Dustin Johnson, speaking with foreign leaders and tweeting briskly.Trump spoke with Turkish President Recep Tayyip Erdogan before his attention turned to the attack in Egypt, where at least 235 people were killed when Islamic militants attacked a crowded mosque during prayers in the Sinai Peninsula, setting off explosives and spraying worshippers with...