Blog     e-Newsletter       Resource Library      Directories      Webinars
AFCEA logo


Domestic and International Coalitions Needed for Internet Security and Freedom

December 4, 2013
By Robert K. Ackerman

Maintaining Internet security--and ensuring its continued freedom--likely will depend on like-minded nations forming coalitions that help formulate international regulations and rules of governance.

Disaster Response Generates Network Security Concerns

December 4, 2013
By Robert K. Ackerman

The networking assembled for the emergency Philippine typhoon response broke new ground in connectivity among governments and relief organizations. However, it also opened the door to sabotage by cybermarauders.

Australia Takes Nationwide Approach to Cybersecurity

December 4, 2013
By Robert K. Ackerman

Australia has implemented a cybersecurity policy that brings together government and industry to secure the domain nationally. The country recently elevated cybersecurity as a major priority for national security, and in 2009, it established a Cyber Security Operations Center (CSOC).

Risk Management Key to Future Coalition Networks

December 4, 2013
By Robert K. Ackerman

Now that allied forces have accepted coalitions as a requisite for future military operations, they must undergo a cultural sea change for cybersecurity. Accepting nontraditional partners demands a new way of viewing cybersecurity that entails greater flexibility at its most philosophical level.

Asia-Pacific Challenges Reshape U.S. Military Needs

December 4, 2013
By Robert K. Ackerman

Quote of the Day:

"If you allow the United States to operate out of sanctuary, we will beat the crap out of you." - Lt. Gen. Stanley T. Kresge, USAF, vice commander, U.S. Pacific Air Forces, addressing potential adversaries

Coalition Operations Pose Significant Information Security Challenges

December 3, 2013
By Robert K. Ackerman

U.S. Pacific Command military leaders agree that any future operation will be conducted amid a coalition, and partner countries must be networked. However, that networking opens the possibility for greatly increased network vulnerabilities as less-secure nations provide weak links for network security.

Threat Grows for Cyber-Physical Systems

November 21, 2013
By Robert K. Ackerman

The critical infrastructure must address cyberthreats in a manner different from that of conventional information technology systems.

Intelligence Leaders Seek Common Interests With China

November 1, 2013
By George I. Seffers

The U.S. Pacific Command intelligence community is fostering an increased dialogue between China and other nations with interests in the Pacific Rim. The expanded effort is designed to build trust, avoid misunderstandings and improve cooperation in areas where China’s national interests converge with the national interests of the United States and others.

Cyber and Intelligence Need Each Other

October 1, 2013
By Robert K. Ackerman

Intelligence needs cyber, and cyber needs intelligence. How they can function symbiotically is a less clear-cut issue, with challenges ranging from training to legal policy looming as government officials try to respond to a burgeoning cyber threat.

The cyber threat is growing, and the defense and homeland security communities must strive to keep up with new ways of inflicting damage to governments and businesses. Many experts believe the cyber threat has supplanted terrorism as the greatest national security issue, and new technologies are only one avenue for blunting the menace. Intelligence must expand its palette to identify and detect cyber threats before they realize their malicious goals.

Protecting the nation from cyber attacks entails deterring or preventing marauders from carrying out their malevolent plans. But, while government and the private sector endeavor to fight the menace jointly, evildoers constantly change their approaches and learn new ways of striking at vulnerable points. So many variables have entered the equation that even the likelihood of attacks—along with their effects—is uncertain.

These were among the many points discussed in the two-day AFCEA Global Intelligence Forum held July 30-31 at the National Press Club in Washington, D.C. Nearly all participants agreed that inaction in addressing cyberthreats would be catastrophic for the nation as a whole.

Closing the Door on 
Iris Recognition Vulnerabilities

September 1, 2013
By Robert K. Ackerman


A simple capability found in most cameras may enable security experts to counter efforts by terrorists and other security threats to spoof iris recognition systems. The new approach focuses on eye function in addition to appearance, thus unmasking several types of deception that either would conceal a real iris or would fool a detection system into false acceptance.

Iris recognition employs near-infrared or visible light scanning to record the pattern in an individual’s iris, which barring injury remains largely unchanged in a person from the age of 9 months. Near-infrared scanners reveal texture, and visible light shows pigmentation. Iris recognition systems can be used as security devices that admit only people whose iris patterns are cleared for access in a database, or they can be used to identify terrorists or other criminals who have been scanned and whose patterns already are on file.

However, these detection systems can be fooled by covering or altering the appearance of the iris. Criminals who want to avoid detection can wear a cover that conceals their incriminating iris. Similarly, someone who wants to impersonate a cleared individual at a security checkpoint can wear a fake iris that portrays the pattern on the original trusted individual.

The new counter to these and other types of iris recognition spoofing comes from one of the men who shares the patent for the original technique. Dr. Leonard Flom, principal investigator of biometrics and assistant clinical professor in the Department of Ophthalmology at the New York University School of Medicine, developed iris recognition in 1987 with the late Dr. Aran Safir.

Flom describes five ways of spoofing iris recognition. The first way is to dilate a pupil to the maximum extent possible. This way, the iris pattern is not recognized by a scanner.


Subscribe to RSS - Security