Blog     e-Newsletter       Resource Library      Directories      Webinars  Apps     EBooks
   AFCEA logo

Homeland Security

Success Breeds Menace in Critical Infrastructure

November 3, 2011
By Robert K. Ackerman

The nation's critical infrastructure, long a potential target of cybermarauders, now faces even greater threats--ironically because of the very information technologies on which it depends for better efficiency of operation.

The Coast Guard Wants UAVs

November 3, 2011
By Robert K. Ackerman

The U.S. Coast Guard is looking at a variety of options for adding maritime versions of unmanned air vehicles (UAVs) to its sea assets. These vehicles would be used to maintain persistent presence in remote ocean areas.

Updating Cyber Laws

September 8, 2011

Cybercrime legislation should be technology agnostic to ensure technological advances do not make the laws obsolete, says James A. Baker, deputy attorney general for the U.S. Justice Department. Baker testified before the Senate Judiciary Committee during a September 7 hearing on updating the Computer Fraud and Abuse Act to combat emerging cyberthreats.

iPad to the Rescue

August 19, 2011

A science-based software tool for the iPad allows first responders to learn from models of building damage and other conditions that occur after a disaster. Developed by Sandia National Laboratories, the Standard Unified Modeling, Mapping and Integration Toolkit (SUMMIT) enables firefighters, medics and police officers to visualize damaged buildings.

Covia Labs to Research Homeland Security Communications

June 6, 2011
By George Seffers

Covia Labs Incorporated, Mountain View, California, recently announced that it has received a contract from the U.S Department of Homeland Security (DHS) Science and Technology Directorate's Small Business Innovation Research program to research and develop public safety mobile broadband applications for mission critical voice communications. Under the contract, Covia will develop a plan and deliver software technology that leverages long-term evolution (LTE), existing communications systems, and Covia Labs' Connector interoperability platform to address these requirements. In future phases, this software can be used to build a working system that will operate over LTE on selected commercially available off-the-shelf, third-party communications equipment and land mobile radio systems to allow the seamless integration of mobile voice with text, photos, video messaging, Global Positioning System, maps and sensors across a wide range of devices.

Cybersecurity Isn't Only About the Network

June 1, 2011
By Christine Robinson

The Air Force and Arlington County, Virginia, are taking preventative measures against hackers such as the ones that recently attacked Sony, costing them over $170 million. It's not just money at risk for government networks, however.

Biometrics Technology Continues to Grow

February 23, 2011
By George Seffers

Biometric technology capabilities continue to grow, and so do government data sharing efforts.

U.S. Needs Deterrence Strategy in Cyberspace

February 23, 2011
By George Seffers

Creating a national strategy for deterring cyber attacks faces difficult challenges, according to Gen. Keith Alexander, USA, U.S. Cyber Command commander and director of the National Security Agency.

Information Sharing Bridges Maritime Gap

February 11, 2011
By Rachel Eisenhower

As criminals turn to clandestine methods of entry into the United States, leaders in the maritime domain are working overtime to minimize threats by increasing data-sharing capabilities.

Cyberattack Preparation Addresses Multiple Threats

February 2011
By Rita Boland, SIGNAL Magazine

Participants in a biennial U.S. Department of Homeland Security cybersecurity exercise evaluated the relevance of the U.S. national response plan in an event that featured more players than ever before. Representatives from federal and state government, the private sector and foreign countries all worked together to examine the United States’ ability to handle cybercrises. The personnel also enjoyed the privilege of being the first to employ and review a new center dedicated to coordinating actions during a serious real-world incident.
Held in September 2010, Cyber Storm III was the primary vehicle to exercise the National Cyber Incident Response Plan (NCIRP)—the recently created blueprint for cybersecurity incident response. The plan examines the roles, responsibilities, authorities and other key elements of the nation’s cyberincident response and management capabilities. Evaluations by participants will help the government refine the document moving forward.


Subscribe to RSS - Homeland Security