Terror database has quadrupled in four years

Monday, 26 March 2007, 3:45 AM EST

Each day, thousands of pieces of intelligence information from around the world - field reports, captured documents, news from foreign allies and sometimes idle gossip - arrive in a computer-filled office in McLean, where analysts feed them into the nation's central list of terrorists and terrorism suspects.

Called TIDE, for Terrorist Identities Datamart Environment, the list is a storehouse for data about individuals that the intelligence community believes might harm the United States.

At the Washington Post.

[ Read more ]




Spotlight

Whitepaper: Zero Trust approach to network security

Posted on 20 November 2014.  |  Zero Trust is an alternative security model that addresses the shortcomings of failing perimeter-centric strategies by removing the assumption of trust.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Nov 21st
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //