Discover The CTU Experience
The impact of climate change extends beyond the loss of a boardwalk and the erosion of a shoreline.
In today’s world, everyone is connected … to computers. With a few keystrokes, everything could come to a halt.
CTU students, Kelly Hughes and Scott Melton, received first place honors for their work on preventing malware on mobile devices, a technology they intend to patent.
Tell your friends and family that you want to be an FBI agent, and they’ll remind you of a few things you’ve probably heard before: that it’s extremely tough to get into, the FBI will do an incredibly thorough background check on you going all the way back to grade school, and that they’re looking for people who fit ‘the’ profile. Let’s shed a little insight.
In my last blog, I wrote about how bioterrorism was recognized as one of the top five threats to the United States in the immediate future. The Center for Disease Control (CDC) describes bioterror threat as “deliberate release of viruses, bacteria or other agents used to cause illness or death.” The CDC’s site provides a good primer not just on bioterrorism, but on a range of biological agents and related concerns, and what we can do to prepare. It’s clear that biosecurity presents a unique challenge in facing both terrorist or human-generated bio-threats, and natural or unintentional public health emergencies.
On April 15, two terrorists planted bombs that killed three people and injured 170 during the Boston Marathon. A subsequent rapid investigation led to two suspects, the brothers Tamerlan and Dzhokhar Tsarnayev. Tamerlan Tsarnayev (26) was killed in a shootout with police on April 18, and his brother Dzhokhar (19), after an intensive region-wide manhunt, was finally arrested on April 20. Both brothers are also suspected of shooting and killing a Massachusetts Institute of Technology (MIT) campus police officer on April 18.
The FBI has several unexploded devices in hand, and my bet is they will have a pretty good line on the origin of the attack very soon. Bomb makers have unique styles, almost like fingerprints. In fact, the FBI may find finger prints inside. But we don’t have that evidence right now.
As in many other facets of American life, professionals working in the homeland security field must be greatly aware of cultural, ethnic, religious and other types of diversity. Homeland security comprises a range of fields including law enforcement, emergency services, public health, transportation and border security, critical infrastructure protection and more. Consequently, there are countless examples of the need for both understanding and cooperating with diverse populations in the execution of homeland security policies.
The French military intervention in Mali in late January 2013 against Islamist militants and their allies succeeded, for the present, in preventing these groups from overrunning the capital, Bamako. They subsequently drove them out of most of the north of the country including the cities of Timbuktu and Gao. Conflicts in the African continent are, of course, not new and most of them do not result in foreign military intervention.
Under her first four years as DHS secretary, Napolitano oversaw the broadening of the focus of homeland security. Focus went from a primary interest in terrorism and counterterrorism to coping with threats such as natural disasters and allocating resources based on an assessment of risks and vulnerabilities. In providing examples in the use of risk-based methodologies, the secretary pointed to the issues of terrorism, border security, immigration enforcement, cybersecurity, and disaster preparedness and response, suggesting that she views these as priority areas for her second term.
What’s the first thing you do when waking in the morning? Turn on the lights? Brush your teeth? Or maybe fire up your laptop to check the morning’s emails? Much of the activity we perform is tied to a web of interconnected systems that allow us to function throughout our day. But what happens when systems critical to our daily living stop working? An example is noticeable on the East Coast, where many of our fellow students and faculty recently dealt with the effects of the havoc wreaked by Hurricane Sandy and hazardous winter conditions.
Virtually all government and business databases and operations are digitized. Most are linked through communications networks, with many accessible via the Internet. Since information, from national security secrets to trade secrets and daily business operations, is housed in computers and their networks, it’s not surprising that cyberattacks are a major threat to the cyberworld. Within cyberspace, attacks motivated by criminals, hostile governments, terrorists, ex-employees with grudges and hackers have become an epidemic problem.
Recently, National Defense Magazine (NDM) published a report on the top five threats to national security.
I recently presented at the Trans-Border Narco-Terrorism Conference co-hosted by Angelo State University, Texas Tech and the Transborder International Police. The conference was a perfect example of regional collaboration between academia, public sector – both from the U.S. and Mexico – and the private sector. It was a success, not by virtue of the number of participants, but rather by who was present, the information shared, and discussion of the hard issues found at the nexus of narcotics trafficking, crime and terrorism.
With the launch of our new master’s degree in homeland security, Colorado Technical University is sending a clear signal to all stakeholders in the field – from policymakers to players in the public and private sectors, and to all those staking their careers on some facet of this growing arena. We intend to set the educational standard for those who will lead the discipline into the future.
Copyright © 2016 Colorado Technical University (CTU). All rights reserved. No information may be duplicated without CTU's permission. The CTU logo is a registered trademark of Career Education Corporation. CTU cannot guarantee employment or salary. Not all programs are available to residents of all states. Programs vary by location and modality; see catalog for details. Financial aid is available for those who qualify. See the Accreditation & Licensure section for information on the agencies that approve and regulate the school's programs, including relevant complaint procedures here. Find employment rates, financial obligations and other disclosures below.