Recent weeks have seen a flurry of activity in China’s regulation of international data transfers. Three principal data laws, the Cyber Security Law (“CSL”), the Data Security Law.
joining me now criminal investigative derision chris aivel to the audience we wanted to demonstrate how that technology and nobody got harmed that wasn t a real suspect and chris this technology has the opportunity when there s a gun shot to lock doors in surrounding area as well as that cell phone would operate as a map as well as a keys. what do you think about this new technology that s out there? yeah lawrence, i do security assessments all of the time and i understand current security technology. it sounds good in concept and not sure that it is something that can be deployed on day-to-day basis we don t have s.w.a.t. teams standing outside in the parking lot nearby you know, takes while to muster them up probably way too long for the type of rescue that you just witnessed it has its uses it will be ready for prime time
joining me now criminal investigative derision chris aivel to the audience we wanted to demonstrate how that technology and nobody got harmed that wasn t a real suspect and chris this technology has the opportunity when there s a gun shot to lock doors in surrounding area as well as that cell phone would operate as a map as well as a keys. what do you think about this new technology that s out there? yeah lawrence, i do security assessments all of the time and i understand current security technology. it sounds good in concept and not sure that it is something that can be deployed on day-to-day basis we don t have s.w.a.t. teams standing outside in the parking lot nearby you know, takes while to muster them up probably way too long for the type of rescue that you just witnessed it has its uses
joining me now criminal investigative derision chris aivel to the audience we wanted to demonstrate how that technology and nobody got harmed that wasn t a real suspect and chris this technology has the opportunity when there s a gun shot to lock doors in surrounding area as well as that cell phone would operate as a map as well as a keys. what do you think about this new technology that s out there? yeah lawrence, i do security assessments all of the time and i understand current security technology. it sounds good in concept and not sure that it is something that can be deployed on day-to-day basis we don t have s.w.a.t. teams standing outside in the parking lot nearby you know, takes while to muster them up probably way too long for the type of rescue that you just witnessed it has its uses it will be ready for prime time
not forthcoming. however, shortly thereafter, they got new and darker security assessments that were issued to the house and senate sergeants at arms, and they discovered that, in fact, radical groups were planning violence. now, according to the assessment, it said, quote, due to the tense political environment following the 2020 election, the threat of disruptive actions or violence cannot be ruled out, then it continued, the sense of desperation and disappointment may lead to more of an incentive to become violent. now, one day later, on january 4th, the capitol police chief steve son, he rightly, based on a new intelligence, changed his mind, and began the process of seeking permission from the office of nancy pelosi and chuck schumer, two in fact deploy the national guard, using that intelligence. now the house and senate sergeant-at-arms, they denied this request.