Blog     e-Newsletter       Resource Library      Directories      Webinars
AFCEA logo

Homeland Security

iPad to the Rescue

August 19, 2011

A science-based software tool for the iPad allows first responders to learn from models of building damage and other conditions that occur after a disaster. Developed by Sandia National Laboratories, the Standard Unified Modeling, Mapping and Integration Toolkit (SUMMIT) enables firefighters, medics and police officers to visualize damaged buildings.

Covia Labs to Research Homeland Security Communications

June 6, 2011
By George Seffers

Covia Labs Incorporated, Mountain View, California, recently announced that it has received a contract from the U.S Department of Homeland Security (DHS) Science and Technology Directorate's Small Business Innovation Research program to research and develop public safety mobile broadband applications for mission critical voice communications. Under the contract, Covia will develop a plan and deliver software technology that leverages long-term evolution (LTE), existing communications systems, and Covia Labs' Connector interoperability platform to address these requirements. In future phases, this software can be used to build a working system that will operate over LTE on selected commercially available off-the-shelf, third-party communications equipment and land mobile radio systems to allow the seamless integration of mobile voice with text, photos, video messaging, Global Positioning System, maps and sensors across a wide range of devices.

Cybersecurity Isn't Only About the Network

June 1, 2011
By Christine Robinson

The Air Force and Arlington County, Virginia, are taking preventative measures against hackers such as the ones that recently attacked Sony, costing them over $170 million. It's not just money at risk for government networks, however.

Biometrics Technology Continues to Grow

February 23, 2011
By George Seffers

Biometric technology capabilities continue to grow, and so do government data sharing efforts.

U.S. Needs Deterrence Strategy in Cyberspace

February 23, 2011
By George Seffers

Creating a national strategy for deterring cyber attacks faces difficult challenges, according to Gen. Keith Alexander, USA, U.S. Cyber Command commander and director of the National Security Agency.

Information Sharing Bridges Maritime Gap

February 11, 2011
By Rachel Eisenhower

As criminals turn to clandestine methods of entry into the United States, leaders in the maritime domain are working overtime to minimize threats by increasing data-sharing capabilities.

Cyberattack Preparation Addresses Multiple Threats

February 2011
By Rita Boland, SIGNAL Magazine

Participants in a biennial U.S. Department of Homeland Security cybersecurity exercise evaluated the relevance of the U.S. national response plan in an event that featured more players than ever before. Representatives from federal and state government, the private sector and foreign countries all worked together to examine the United States’ ability to handle cybercrises. The personnel also enjoyed the privilege of being the first to employ and review a new center dedicated to coordinating actions during a serious real-world incident.
Held in September 2010, Cyber Storm III was the primary vehicle to exercise the National Cyber Incident Response Plan (NCIRP)—the recently created blueprint for cybersecurity incident response. The plan examines the roles, responsibilities, authorities and other key elements of the nation’s cyberincident response and management capabilities. Evaluations by participants will help the government refine the document moving forward.

Agency Stands Watch Over Seas

February 2011
By Maryann Lawlor, SIGNAL Magazine

The convergence of threats is increasing the requirements for sharing unclassified data that address maritime domain awareness and homeland defense. The U.S. Defense Department’s Executive Agent for Maritime Domain Awareness is coordinating the requirements of combatant commands, the services and the department’s four intelligence agencies to scrutinize the gaps and seams in data-sharing capabilities and technologies. Closing these gaps and tightening these seams is crucial to protecting U.S. shores from, among other dangers, weapons of mass destruction.

Merging Threats Challenge Coast Guard

January 27, 2011
By Robert K. Ackerman

The U.S. Coast Guard is facing the dilemma of its traditional threats combining to pose a synergistic danger to U.S. homeland security. Longtime menaces such as drug smuggling, alien immigration and terrorism may be merging their organizations and their tactics to pose an even greater threat to the nation. Stopping these threats will require data sharing and consolidation. Unfortunately, even organizations willing to share information often find legal and technological roadblocks in their way. Rear Adm. (S) Stephen Metruck, USCG, chief of staff, Eleventh Coast Guard District, told the Thursday breakfast audience at West 2011 in San Diego that the Coast Guard is striving to head off threats before they near the homeland. "Goal defense" is not an effective way of stopping adversaries, he explained. The Coast Guard is working to develop new methods of detecting and identifying threats before the marauders launch their plans into action. Operation Focused Lens, for example, looks at places from where attacks may come. The goal is to detect anomalous activity before a smuggling or terrorist boat is launched. Marina operators would be engaged through an outreach program to report suspicious signs such as boaters practicing illegal activities. Combining data may be harder. Adm. Metruck allowed that many firewalls prevent government agencies from linking their databases, even within the Department of Homeland Security. In some cases, the only solution is to place people from different agencies side-by-side so that they can share views on their computer displays.

Homeland Security Goes Digital

February 2011
By George I. Seffers, SIGNAL Magazine

An automated system for managing and retrieving crime-related intelligence is providing several municipal police forces with the capability to share data in a standard format. This system offers the potential for tracking suspicious activities and alerting officials to potential crimes before they occur, and this counterterrorism application has spurred the U.S. Department of Homeland Security to fund its introduction at the state level.


Subscribe to RSS - Homeland Security