Chief information officers from throughout the U.S. Department of Homeland Security (DHS) had words of advice for companies that want to do business with them at the DHS 2012 Information Technology Industry Day. Among the top topics were the need for agile acquisition and acquisition of agile products, the call for information about the return on investment on the products companies offer, and changes in procurement strategies that could have a huge effect on how the government and commercial sectors interact.
A trifecta of government departments-Defense, Energy, and Homeland Security-are working to develop military and other installations into self-sustaining energy oases in the event of cyber attacks or disasters that normally would cripple operations.
Protecting any nation's citizens and institutions is difficult under any circumstances, but today's economic limitations make this task even more challenging. Government and business leaders will meet at the end of this month to tackle this topic during AFCEA International's 11th annual Homeland Security conference. Conference discussion topics include cloud computing, cyberwar, procurement, wireless broadband and social media. Small businesses' interaction with the U.S. Department of Homeland Security (DHS) also will be explored. Coverage will begin on February 28.
For many, the words "homeland security" and "counterterrorism" conjure up images of federal investigators engaged in large-scale battle with a host of enemies bent on death and destruction. But the war often begins on a smaller, more subtle level.
The Department of Homeland Security is adapting intelligence community tools to facilitate information sharing among its diverse elements. These include social media-based successes as well as information fusion centers across the nation.
A little-known U.S. Army site at Picatinny Arsenal, New Jersey, is developing software to resolve data sharing issues between the three New Jersey nuclear power facilities and the state’s data fusion center in West Trenton—information sharing that would be critical in case of a nuclear disaster. The nuclear power plants and the state’s data fusion hub use two different decision support systems that are incapable of sharing data.
No man may be an island, but each U.S. military base may become an energy island if a joint project among the Department of Energy, the Department of Homeland Security and the Defense Department comes to fruition.
The U.S. Department of Homeland Security and the Defense Advanced Research Projects Agency have called upon industry to develop a low-cost and secure communications, network management and situational awareness system for the U.S. military, public safety agencies and commercial clients.
Gnostech Incorporated, Warminster, Pennsylvania, is being awarded a $13,512,796 indefinite-delivery/indefinite-quantity, cost-plus-fixed-fee contract to provide information assurance-related services in support of Department of Defense and Department of Homeland Security programs. Support will include certification and accreditation documentation, security and certification test and evaluation, security control compliance evaluation, data recovery/prevention services, network security services, and information assurance planning and coordination. Space and Naval Warfare Systems Center Pacif
Network situational awareness, largely the purview of military systems, may be the best line of defense against cybermarauders threaten the nation's critical infrastructure.
The nation's critical infrastructure, long a potential target of cybermarauders, now faces even greater threats--ironically because of the very information technologies on which it depends for better efficiency of operation.
The U.S. Coast Guard is looking at a variety of options for adding maritime versions of unmanned air vehicles (UAVs) to its sea assets. These vehicles would be used to maintain persistent presence in remote ocean areas.
Cybercrime legislation should be technology agnostic to ensure technological advances do not make the laws obsolete, says James A. Baker, deputy attorney general for the U.S. Justice Department. Baker testified before the Senate Judiciary Committee during a September 7 hearing on updating the Computer Fraud and Abuse Act to combat emerging cyberthreats.
A science-based software tool for the iPad allows first responders to learn from models of building damage and other conditions that occur after a disaster. Developed by Sandia National Laboratories, the Standard Unified Modeling, Mapping and Integration Toolkit (SUMMIT) enables firefighters, medics and police officers to visualize damaged buildings.
Covia Labs Incorporated, Mountain View, California, recently announced that it has received a contract from the U.S Department of Homeland Security (DHS) Science and Technology Directorate's Small Business Innovation Research program to research and develop public safety mobile broadband applications for mission critical voice communications.
The Air Force and Arlington County, Virginia, are taking preventative measures against hackers such as the ones that recently attacked Sony, costing them over $170 million. It's not just money at risk for government networks, however.
Biometric technology capabilities continue to grow, and so do government data sharing efforts.
Creating a national strategy for deterring cyber attacks faces difficult challenges, according to Gen. Keith Alexander, USA, U.S. Cyber Command commander and director of the National Security Agency.
As criminals turn to clandestine methods of entry into the United States, leaders in the maritime domain are working overtime to minimize threats by increasing data-sharing capabilities.
The convergence of threats is increasing the requirements for sharing unclassified data that address maritime domain awareness and homeland defense. The U.S. Defense Department’s Executive Agent for Maritime Domain Awareness is coordinating the requirements of combatant commands, the services and the department’s four intelligence agencies to scrutinize the gaps and seams in data-sharing capabilities and technologies. Closing these gaps and tightening these seams is crucial to protecting U.S. shores from, among other dangers, weapons of mass destruction.