History
Icon-add-to-playlist Icon-download Icon-drawer-up
Share this ... ×
...
By ...
Embed:
Copy
Facebook Twitter Rss
Intelligence. Unclassified.
Discussing current trends in homeland security.
Category: Government & Organizations
Location: New Jersey
Followers (14)
Currently following. Unfollow
Picture?width=25&height=25 Image_nophoto Image_nophoto Picture?width=25&height=25 25x25_12321724 Image_nophoto Picture?width=25&height=25 25x25_11654390 Image_nophoto Image_nophoto Image_nophoto Image_nophoto Picture?width=25&height=25 Image_nophoto
100x100_11152872


by NJOHSP
x
take it with you
Iphone5s_trans go mobile with PodOmatic's new iPhone app.
don't have an iPhone? no problem »
x
loading results... Loader
loading results... Loader
x
No results found.
November 20, 2017 06:19 AM PST

According to the National Retail Federation (NRF), American consumers are expected to spend an average of $967 during the 2017 holiday shopping season. This is an approximate 3.5 percent increase from last year’s projections, and a majority of these purchases are expected to take place online. The NRF Consumer Survey found that online shopping is the preferred method of purchase this year for the first time in the survey’s history. Last year, Adobe reported that approximately $5.27 billion was spent in online sales between Thanksgiving Day and Black Friday, with $1.2 billion spent in purchases made through the use of mobile devices.

As the popularity of online shopping continues to increase, so does the number of potential unsuspecting victims for cyber criminals to exploit. This week, one of our cyber threat analysts at the New Jersey Cybersecurity Communications and Integration Cell (NJCCIC) discusses proactive steps to reduce your risk and make it harder for cyber criminals to succeed this holiday season.

November 13, 2017 05:51 AM PST

In recent years, the world has been repeatedly shocked by the gruesome images and actions of ISIS, in particular the footage and stories of children as young as eight executing people. Children play an important role in the organization: the children of the caliphate are seen as "the future of ISIS," and therefore education and propaganda are an important form of indoctrination. ISIS uses minors for suicide attacks, executions and fighting. Research has shown that IS propaganda between in 2015 and 2016 included 89 eulogies of children and youths—a number that steadily increased each monthly, showing that ISIS has gradually opted for this tactic. The role of minors and their future causes international concern for a broad range of reasons. Growing up and potentially fighting in armed conflict will traumatize a large number of these children. Also, what will happen with these children if the Caliphate collapses? Human Rights Watch expressed concerns about the birth registrations that will most likely not be recognized by the international community – potentially leaving children stateless.

This week on Intelligence. Unclassified., Analysis Bureau Chief Dean Baratta had an enlightening call with researcher Liesbeth van der Heide from the International Centre for Counter-Terrorism (ICCT), where they talk about her recent paper, Children of the Caliphate. They will explore the findings she and her co-author provide on young or juvenile ISIS returnees, assessing what sets juvenile returnees apart from adult returnees or the broader population of young criminals, and scoping the potential venues and challenges in their rehabilitation and reintegration.

November 06, 2017 06:19 AM PST

The VOX-Pol program’s second week-long Training Academy in the Netherlands is designed to provide policymakers, law enforcement, social media companies, and others professionally-tasked with responding to violent online extremism and terrorism with an introduction to the role of the Internet in contemporary violent political extremism(s), including the online strategies of violent jihadis and the extreme right; the role of the Internet in lone actor terrorism; the online behaviors of convicted terrorists; and online CVE (Countering Violent Extremism).

The Training Academy is composed of a mix of formal lectures and hands-on labs. The latter are dedicated to providing participants with an overview of tools and methods for research and analysis in this domain. This past summer, Analysis Bureau Chief Dean Baratta and Intelligence Analyst Paige Schilling attended the academy as presenters and participants. Tune in to hear their insights on this unique and valuable experience.

October 30, 2017 04:59 AM PDT

Recent attacks, including those at the Boston Marathon, Seaside Park Semper 5K, concert in Manchester, England, and, most recently, the Las Vegas concert, demonstrate that large-scale events remain attractive targets for terrorists and active shooters.

On this episode of Intelligence. Unclassified., Point Pleasant Beach Police Chief Joseph Michigan and Agent Ron Jennings of the Ocean County Prosecutor’s Office joined us to discuss special events and mass gatherings. No strangers to handling multiple large events simultaneously, they shared their insights and best practices on how to better secure and plan for such gatherings.

October 23, 2017 05:17 AM PDT

White supremacist extremists often use imagery that can be broken down into four categories—traditional, religious, Nazi-related, and Internet-based—to convey their ideology, show support for a specific group, or intimidate minority populations. These symbols should not automatically be assumed to be hate-related, but should be evaluated in the context in which they are used.

Recently, our office partnered with the Anti-Defamation League to produce a comprehensive resource on the current imagery we are seeing in the white supremacist movement. Tune in as our analysts explore these symbols and their meanings.

October 16, 2017 05:16 AM PDT

In the wake of a tragedy, classification of an act of mass violence appears daunting. The key point, whether it is terrorism or not, depends on the intent of the person conducting the violence, not the method, timing or victims.

Join NJOHSP Director of Intelligence Rosemary Martorana and Analysis Bureau Chief Dean Baratta as they discuss the inherent issues in first-to-report designations of terrorism, as well as a three criterion test that can help sniff out the difference between a mass violence incident and an act of terrorism.

October 10, 2017 05:10 AM PDT

October is National Cyber Security Awareness Month, which is an annual campaign to raise awareness about the importance of cybersecurity. The Internet touches almost all aspects of everyone’s daily life, whether we realize it or not. National Cyber Security Awareness Month (NCSAM) is designed to engage and educate public and private sector partners through events and initiatives to raise awareness about the importance of cybersecurity, provide them with tools and resources needed to stay safe online, and increase the resiliency of the Nation in the event of a cyber incident.

In the second week of NCSAM, we focus on cybersecurity in the workplace. Creating a culture of cybersecurity is critical for all organizations and must be a shared responsibility among all employees. Join one of our cyber intelligence analysts as she discusses how organizations can protect against the most common cyber threats and the resources available to help strengthen cyber resilience.

October 02, 2017 07:02 AM PDT

In the past six months, Vanguard America—a white supremacist group—has expanded beyond Internet-based activity to attending violent protests nationwide, distributing propaganda, and intimidating minority populations. The leader of the group claims there are approximately 200 members in 20 states, including New Jersey.

Join Intelligence Analyst Paige Schilling and Analysis Bureau Chief Dean Baratta as they explore what this movement is all about and how their actions have impacted New Jersey.

September 25, 2017 06:23 AM PDT

For the final week of National Preparedness Month, we take a look at supply chains, which are comprised of all the organizations and individuals involved in creating a product and getting it to a consumer. Understanding how supply chains work in New Jersey allows NJOHSP to work with private-sector partners on building supply chain resilience and ensure the products and services people rely on are accessible after a disruption. Join Senior Planners Charlie Ambio, Jim McDavitt, and Scott Gibson as they discuss supply chains and their importance to consumers, businesses, and government on the latest episode of Intelligence. Unclassified.

September 18, 2017 05:08 AM PDT

One component of counterterrorism that is rarely talked about is the psychological impacts of terrorist attacks and other forms of mass violence. The Disaster and Terrorism Branch (DTB) of the Department of Human Services’ Division of Mental Health and Addiction Services is the recognized mental health authority for disaster and mental health services in New Jersey. In this episode, Director of DTB, Dr. Adrienne Fessler Belli, and the Director of Training for DTB, Steve Crimando, discuss how their mission fills this extremely important void.

loading more... Loader
 
x

take it with you


Iphone_trans Listening to podcasts on your mobile devices is extremely convenient -- and it's what makes the podcasting medium so powerful.

You can take your favorite shows and mixes with you anywhere, but to do so requires some quick and simple steps.

Let's walk you through that process together.
step 1:


Click the "Subscribe With iTunes" link in the page's sidebar:

Subscribe_with_itunes

This will require that you have the iTunes software on your computer.

(You can download iTunes here.)
step 2:
Itunes_ss

Now that you've subscribed to the podcast on iTunes, the feed will display in your "Podcasts" section on the left navigation bar.

Click there and you'll see the show displayed in the iTunes browser.

You can "get all" to download all available episodes or just individual episodes.
step 3:


Plug your mobile device (iPhone, iPad, iPod) into your computer with the Dock Connector cable, and click the device in iTunes's left navigation bar.

Itunes_ss2

Once you have your device highlighted, click "Podcasts" in the top navigation bar and sync the podcasts you want on your device. Click "apply" and the episodes you have downloaded on your iTunes software will sync with your device.
that's it!

The beauty of this process is that now, every new episode of your subscribed podcasts will automatically sync to your device every time you plug it in and open iTunes. You can now take your favorite shows with you everywhere you go.

Enjoy!
done!
x

share this podcast


Email a friend about this podcast
x

subscribe to this podcast

Rss-icon RSS
Itunes-icon iTunes