-
New U.S.-bound cargo security rule to go into effect in January
Current security regulations required importers and shippers to file entry information with U.S. Customs fifteen days before a ship arrives at a U.S. port; new regulations will require that shippers file much more detailed information — and do so before they even load the merchandise onto their ship at the port of origin; U.S. Customs will demand that suspicious cargo, or cargo about which the information is incomplete, not be loaded
-
-
FAA makes special flight rules around Washington, D.C. permanent
In order to keep Washington,D.C. safe from 9/11-like aerial attacks by terrorists while reducing the economic impact on the general aviation community, the FAA reduces the protective air envelope around the U.S. capital by 1,800 square miles of airspace
-
-
H2-B visa program to be streamlined, simplified
The H2-B visa program allows foreign workers into the United States for specific seasonal jobs; the program is capped at 66,000 workers per year; regulatory changes in the waning days of the administration aim to set in place policies favored by the business sector
-
-
The next version of FISMA
The first version of the Federal Information Security Act (FISMA) of 2002 placed much emphasis on auditing and reporting; it is time to move on beyond checking compliance boxes and concentrate on making sure that the security of government departments is not compromised
-
-
Devolution of risk management
In response to the savings and loan scandal of two decades ago, the United States has enhanced the regulatory and compliance regime (FDICIA, SOX); problem is, compliance or regulation is necessarily historically based — it addresses the sins of the past and is not designed to anticipate the future
-
-
Defining on line attacks and cyberwar
The growing number of cyberattacks — for political reasons (Estonia, Georgia) and for profit — prompts calls to define the threat more clearly
-
-
Here they go again: China demands access to Western computer security
Another crisis in U.S.-China trade relations looms, as China, again, is about to introduce rules which would allow Chinese companies to steal Western industrial secrets, and would allow the Chinese government more tightly to monitor what the Chinese people say and read
-
-
Immigration Alert: Employing immigrants during economic slowdown
There are important employer obligations to consider when employing immigrants during an economic downturn
-
-
New CFIUS regulations
CFIUS issues final regulations governing national security reviews of foreign investment in the United States
-
-
France drops security database over privacy fears
Criticized for ignoring serious privacy concerns, the French government scraps — for now — the implementation of massive data base; data base was to include information about French men and women as young as 13 years of age and include information on people’s health and sexual orientation
-
-
FDA opens offices in China
As food — and food ingredients — imports from China grow, and as China’s lax health and safety standards become more apparent, the FDA is trying to spot problems at the source by opening three offices in China
-
-
DHS to regulate ammonium nitrate
Ammonium nitrate mixed with fuel oil commonly is used as an explosive in mining and has been used by terrorists — such as Timothy McVeigh in Oklahoma; DHS proposes to regulate its use
-
-
Briefly noted
Decision in Defense procurement case could set precedent… Elbit completes acquisition of Innovative Concepts for $15 million… Huntsville grows into major explosives hub
-
-
Some federal agencies fail to meet secure ID October deadline
The Office of Management and Budget (OMB) had set 27 October as the deadline for agencies to issue the cards to all federal employees and contractors; 28 percent of the federal employee workforce and 30 percent of contractors who require the cards have received credentials
-
-
U.S. debates creating domestic intelligence agency
A new RAND study examines the benefits of creating a domestic intelligence agency; research group offers a break-even analysis of the various counterterrorism organizational options
-