View the most recent mentions of CCHS in the media.

Terror Threat: Analysis (VIDEO)

September 07, 2013

Frank J. Cilluffo, director of the Homeland Security Policy Institute, is interviewed about the threat still posed by Al Qaeda. Video.

US Military Evacuates Embassy Personnel from Yemen

September 06, 2013

The U.S. military evacuated nonessential U.S. government personnel from Yemen on Tuesday due to the high threat of attack by al-Qaida that has triggered temporary shutdowns of 19 American diplomatic posts across the Middle East and Africa. The State Department said in a travel warning that it had ordered the evacuation “due to the continued potential for terrorist attacks."

Al-Qaeda in Yemen proves to be tenacious enemy

September 06, 2013

The U.S. has pummeled terror leaders in Yemen with targeted drone strikes and relaunched efforts to send military aid to the struggling nation, but the Yemen-based al-Qaida in the Arabian Peninsula has proven to be a tenacious enemy.

Federal News Countdown: Surveillance and a Dire Budget Outlook (AUDIO)

September 06, 2013

Ron Marks, senior fellow of the Homeland Security Policy Institute, is interviewed about the threat of the Syrian Electronic Army. Audio.

Global Threat: Interview (VIDEO)

September 05, 2013

Frank J. Cilluffo, director of the Homeland Security Policy Institute, is inerviewed about recent terror threats from Al Qaeda. Video.

Syria's cyberattack: First wave of a bigger war? (VIDEO)

August 29, 2013

How vulnerable are U.S. websites to attack? Who are our potential cyberenemies? Is there more to come? The answers aren't comforting: Computer and homeland security experts now warn of a broader cyberwar if the U.S. launches military strikes on Syria. Frank Cilluffo believes the Syrian Electronic Army will likely strike again -- and might have help.

Does the Senate really need to confirm 1,200 executive branch jobs?

July 16, 2013

The Senate has been bickering all day over how to confirm President Obama's nominees for various executive-branch positions. And it's worth taking a step back and asking: Why are there so many jobs that require Senate confirmation, anyway?

15 Top Slots at DHS Now Vacant With Napolitano's Resignation

July 12, 2013

Janet Napolitano is leaving the department of Homeland Security. But she's not the only one who's gone. No less than 15 leadership positions across DHS are now vacant - or soon will be. And there doesn't seem to be any hurry to fill them.

What Russian Intel Might Ask Edward Snowden

June 25, 2013

The Russians have a way of dealing with men like Edward Snowden. “First, we would ask him questions to which the answers are already known — that is to check his truthfulness,” said Oleg Kalugin, a former major general in the Soviet KGB. “If he really knows what he says he does, if he is telling the truth … later they would ask something which is less known. Finally, they will let him say whatever he wants to say.”

Lawmakers miss briefings on intelligence

June 13, 2013

Many members of Congress, despite possessing security clearances and repeatedly voting to grant legal authority to monitor civilian activities, have said over the past week that, in effect, they knew less about some key aspects of American intelligence gathering than Edward Snowden.

International Developments Back TSA Risk-Based Security Moves, Pistole Says

May 30, 2013

John Pistole emphasized that the nature of the primary threat against US aircraft -- improvised explosive devices (IEDs) -- and the need for international cooperation to defeat plots uncovered by intelligence justify a recent TSA decision to synchronize items prohibited onboard US airliners with the international community and to allow small knives onboard commercial airplanes.

Major U.S. Weapons Compromised by Chinese Hackers

May 28, 2013

A previously undisclosed portion of a U.S. Defense report lists the specific weapons system designs that it says have been at least partially compromised by Chinese hackers -- from the most advanced fighter plane in history to America's missile defense systems.

Designs of Weapons Systems Breached by Chinese Hackers

May 28, 2013

In a blow to the US defense industry, Chinese hackers have reportedly stolen confidential details on highly-sensitive advanced weapons systems, including missile defenses, fighter jets and combat ships.

GWU Targets Cybersecurity

May 20, 2013

Since his arrival as dean in 2010, Doug Guthrie has tried to make the most of his business school's Washington location. By focusing on subjects such as healthcare, which involves collaboration from business and government, he hopes to set the George Washington University School of Business apart from its peers.

Espionage and Sabotage in the Virtual World

May 19, 2013

The growing threat of cyber attacks has captured the attention of governments and boardrooms worldwide. They have a shared interest in tackling the myriad established and nascent online threats. These range from espionage - the theft of intellectual property through spyware - to sabotage, through the import of malware to their systems.

CCHS Twitter Feed