recommended reading

New terror alert system aims for wide exposure via Web

The Homeland Security Department's new terrorist threat alert system, scheduled to come online April 26, is aimed at simplifying the concept as well as expanding the places where people can find the alerts, including social media sites such as Twitter and Facebook.

Soon after the new alert system was announced on Wednesday, the department set up a dedicated Facebook page and Twitter feed for the alerts as well as a dedicated website and a host of tools for people or businesses to embed the alerts on their own websites.

The way threat alerts are transmitted to state and local officials and law enforcement won't change, Homeland Security Secretary Janet Napolitano said, according to news reports.

The alerts themselves will replace the old color-coded system with a tiered system that simply describes threats as "elevated" or "imminent" and includes as much information as possible about the threats' geographic location and the types of transportation or infrastructure most likely to be targeted, according to the department.

The term "elevated" will be used for a "credible terrorist threat against the United States" and the term "imminent" will be used for credible threats that are also "specific and impending," the department said.

Napolitano described the old color system as serving little purpose now other than as fodder for late-night comics.

The new system will have no default or resting threat level, and all threat warnings will expire after two weeks, the department said.

That change was aimed at reducing public apathy, Napolitano told reporters.

Under the color-coded system, the general U.S. threat level typically rested at yellow, meaning elevated, while the threat level at airports rested at orange, meaning high. The two lowest levels of the threat rating system were never used.

Homeland Security officials described the new system as having been developed in close collaboration with state and local officials. But representatives for the National Governors' Association and the National Conference of State Legislatures told Nextgov their organizations hadn't been deeply involved in the development except for a conference call with DHS several weeks ago.

The online response to Wednesday's announcement has been mixed.

The dedicated Twitter feed for terror alerts had nearly 4,000 followers about eight hours after the plan was rolled out, and about 850 people "liked" the alert system's Facebook page, which means they'll receive the threat alerts on their own Facebook pages.

An announcement about the program on Homeland Security's main Facebook page had garnered about 25 comments by 4 p.m. on Wednesday, but most of them were critical or inflammatory, and several referenced popular conspiracy theories, a mainstay of comments on that page.

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.


When you download a report, your information may be shared with the underwriters of that document.