Search:  

 Blog     e-Newsletter       Resource Library      Directories      Webinars
AFCEA logo
 

Homeland Security

Consolidation Shapes An Evolving Industry

February 2005
By Henry S. Kenyon

The homeland security market is undergoing a major shift away from individual products and systems to integrated, solutions-based offerings. A combination of business mergers and new technologies is the major force behind this change. Companies have consolidated critical sectors of the market, creating a business environment where broad suites of complementary services have an edge over narrowly focused products.

Washington Police Take Command To the Next Level

February 2005
By Robert K. Ackerman

The focal point for national efforts to combine federal and local law enforcement security activities can be found just a few blocks from the White House in the Washington, D.C., Metropolitan Police Department headquarters. The police charged with patrolling the nation's capital are finding that conventional police work is proving far more useful in dealing with terrorist threats than anticipated. And, the department's Joint Operations Command Center, or JOCC, serves both as a center for tracking conventional crime and as a base for coordinating multigovernmental responses to violent demonstrations and terrorism in the nation's capital.

Jolting Destruction Galvanizes U.S. Agencies To Walk the Walk

November 2001
By Clarence A. Robinson Jr.

The Bush administration's declaration of war on terrorism allows federal organizations such as the National Security Agency to expand their electronic intelligence-gathering practices. With initial deployment of U.S. forces to the Middle East, demand to locate hostile terrorist cells and their support mechanisms immediately is rising, both in the United States and overseas. In addition, what had been a gradually growing requirement for U.S. forces to conduct information operations, including computer network offense and defense, is now switching to fast forward.

Physical Disaster Propels Cybersecurity Initiatives

November 2001
By Clarence A. Robinson Jr.

While U.S. military forces retaliate against terrorists for the horrific World Trade Center and Pentagon attacks, the Bush administration also is organizing to help shield the nation's critical information infrastructure. The White House is establishing U.S. cybersecurity functions under a single individual. That person will function as the president's special adviser for cybersecurity, reporting directly to both the new cabinet-level Office of Homeland Security and the National Security Adviser Condoleezza Rice.

Modeling and Simulation Adds Insight on Terrorism

December 2001
By Dr. Roger Smith

The United States has been using simulations for decades to explore the capabilities of its military forces and train soldiers to perform their missions better. In the war against terrorism, however, this technology can come out of the training centers and into the operations centers to support the country and its allies in fighting this new type of war and enhance homeland security.

Attackers Placed At Scene of Crime Before They Arrive

December 2001
By Sharon Berry

Defensive information warfare posturing traditionally has taken the form of security-passwords, firewalls and locked doors. But with less than 100 percent confidence that intruders can be kept out of information systems, a U.S. Air Force and industry team is developing a fundamentally different defensive approach. They are creating a prototype that provides advanced warning of attacks on U.S. Defense Department systems so they are prepared when security is breached.

Conflict Accelerates Deployment of Conceptual Techniques

December 2001
By Maryann Lawlor

The war on terrorism and heightened homeland security are prompting the U.S. military to re-evaluate its priorities and accelerate the use of strategic concepts that only months ago were in the experimental stage. Although some of the tactical approaches are not in the polished form they would have been in several years from now, certain aspects can and are making their way into today's efforts.

Counterproliferation Efforts Pay Unexpected Dividends

January 2002
By Robert K. Ackerman

While analysts now are keeping a sharper eye on possible weapons proliferation, some of the technologies they employ may play an increasingly important role in maintaining homeland security. In the wake of the September 11 attacks on the United States, experts charged with detecting overseas programs to develop weapons of mass destruction are refocusing their efforts on a new list of nations that pose more immediate threats.

Pentagon Seeks Virtual Clone

February 2002
By Maryann Lawlor

Technology is liberating the U.S. Defense Department from the chains of a single location by enabling it to become a network-centric department. The initiative to create a virtual Pentagon calls for taking advantage of advances in networking, Internet protocol, videoconferencing, mass storage and data transmitting technologies. These capabilities would allow military personnel to continue to collaborate and communicate in emergency situations even if systems within the Pentagon are damaged.

Multiforce Protection In a Portal

October 2004
By Cheryl Lilie

A cross-service network that shares sensitive but unclassified information among U.S. Defense Department installations is moving nationwide. The Web-portal technology allows users to document and immediately disseminate information regarding potential threats to personnel, facilities and resources to meet antiterrorism and force protection needs.

Pages

Subscribe to RSS - Homeland Security