After last December's school shooting in Newtown, Conn., the Division of Homeland Security & Emergency Management conducted a survey and determined that N.H.’s school buildings are at widely varied levels of security. In response, they developed the following recommendations based on three core standards: Surveillance, Access Control, & Emergency Alerting. Each school will have to take into account their budgetary constraints & environmental factors when considering how to implement the guidelines.
If you’ve been keeping up on the scope of NSA data harvesting and reports of corporations selling – or losing – your personal data, you may well be:
a) scared out of your wits
b) changing your passwords, securing your routers taking steps to protect your data or
c) throwing your hands up in the air and surrendering to the new insecurity state. There is also the option of throwing out your smart phone, pulling down the shades, and curling up in a ball.
Adam Penenberg is an editor for PandoDaily, a technology news site and a professor of journalism at New York University. He wrote about hiring hackers to test his own security – and found himself to be more vulnerable than he thought.
An app released this week called Silent Circle says it offers NSA level encryption tools to ordinary citizens. That means e-mails, phone calls, and text messages can’t be traced, intercepted, or recovered by just about anybody. Russell Brandom is a staff writer for Buzzfeed, where he wrote about the developers of Silent Circle.
The United States and other nations, along with terrorist and criminal groups, are increasingly engaged in high-tech espionage and cyber attacks, often with an aim at destabilizing communications and other critical infrastructure. We discuss the nature of this growing threat and how it affects both government and the private sector.