Paul A. Schneider, former deputy secretary, U.S. Department of Homeland Security (DHS), kicked off the AFCEA Homeland Security Conference this morning by stating that not enough revenue has been allocated in the U.S. budget to fight all the cyberthreats, which are some of the most critical dangers facing the nation today.
Responding to an emergency is just as crucial--and as technically complicated as--preventing one. Members of the final panel for the DHS 2012 Information Technology Industry Day discussed the importance of communications capabilities to mitigate the effects of a manmade or natural disaster and restore normalcy to an area.
Although not claiming victory, the DHS has made some serious headway in improving cybersecurity, according to panelists discussing the topic at the DHS 2012 Information Technology Industry Day in Washington, D.C. Experts said the threats have not disappeared but rather have changed, and various DHS agencies have been learning how to better handle them.
Chief information officers from throughout the U.S. Department of Homeland Security (DHS) had words of advice for companies that want to do business with them at the DHS 2012 Information Technology Industry Day. Among the top topics were the need for agile acquisition and acquisition of agile products, the call for information about the return on investment on the products companies offer, and changes in procurement strategies that could have a huge effect on how the government and commercial sectors interact.
A trifecta of government departments-Defense, Energy, and Homeland Security-are working to develop military and other installations into self-sustaining energy oases in the event of cyber attacks or disasters that normally would cripple operations.
Protecting any nation's citizens and institutions is difficult under any circumstances, but today's economic limitations make this task even more challenging. Government and business leaders will meet at the end of this month to tackle this topic during AFCEA International's 11th annual Homeland Security conference. Conference discussion topics include cloud computing, cyberwar, procurement, wireless broadband and social media. Small businesses' interaction with the U.S. Department of Homeland Security (DHS) also will be explored. Coverage will begin on February 28.
A little-known U.S. Army site at Picatinny Arsenal, New Jersey, is developing software to resolve data sharing issues between the three New Jersey nuclear power facilities and the state’s data fusion center in West Trenton—information sharing that would be critical in case of a nuclear disaster. The nuclear power plants and the state’s data fusion hub use two different decision support systems that are incapable of sharing data.
The Department of Homeland Security is adapting intelligence community tools to facilitate information sharing among its diverse elements. These include social media-based successes as well as information fusion centers across the nation.
For many, the words "homeland security" and "counterterrorism" conjure up images of federal investigators engaged in large-scale battle with a host of enemies bent on death and destruction. But the war often begins on a smaller, more subtle level.
No man may be an island, but each U.S. military base may become an energy island if a joint project among the Department of Energy, the Department of Homeland Security and the Defense Department comes to fruition.
The U.S. Department of Homeland Security and the Defense Advanced Research Projects Agency have called upon industry to develop a low-cost and secure communications, network management and situational awareness system for the U.S. military, public safety agencies and commercial clients.
Gnostech Incorporated, Warminster, Pennsylvania, is being awarded a $13,512,796 indefinite-delivery/indefinite-quantity, cost-plus-fixed-fee contract to provide information assurance-related services in support of Department of Defense and Department of Homeland Security programs. Support will include certification and accreditation documentation, security and certification test and evaluation, security control compliance evaluation, data recovery/prevention services, network security services, and information assurance planning and coordination. Space and Naval Warfare Systems Center Pacif
Network situational awareness, largely the purview of military systems, may be the best line of defense against cybermarauders threaten the nation's critical infrastructure.
The nation's critical infrastructure, long a potential target of cybermarauders, now faces even greater threats--ironically because of the very information technologies on which it depends for better efficiency of operation.
The U.S. Coast Guard is looking at a variety of options for adding maritime versions of unmanned air vehicles (UAVs) to its sea assets. These vehicles would be used to maintain persistent presence in remote ocean areas.
Cybercrime legislation should be technology agnostic to ensure technological advances do not make the laws obsolete, says James A. Baker, deputy attorney general for the U.S. Justice Department. Baker testified before the Senate Judiciary Committee during a September 7 hearing on updating the Computer Fraud and Abuse Act to combat emerging cyberthreats.
A science-based software tool for the iPad allows first responders to learn from models of building damage and other conditions that occur after a disaster. Developed by Sandia National Laboratories, the Standard Unified Modeling, Mapping and Integration Toolkit (SUMMIT) enables firefighters, medics and police officers to visualize damaged buildings.
Covia Labs Incorporated, Mountain View, California, recently announced that it has received a contract from the U.S Department of Homeland Security (DHS) Science and Technology Directorate's Small Business Innovation Research program to research and develop public safety mobile broadband applications for mission critical voice communications.
The Air Force and Arlington County, Virginia, are taking preventative measures against hackers such as the ones that recently attacked Sony, costing them over $170 million. It's not just money at risk for government networks, however.
Biometric technology capabilities continue to grow, and so do government data sharing efforts.