U.S. Defense Department and interagency special operators are scheduled to begin receiving new tactical mesh networking equipment this month. The kit provides a mobile, ad hoc, self-healing network that offers a full range of situational awareness data, including intelligence, surveillance and reconnaissance feeds, blue force tracking and a voice over Internet protocol capability.
Law Enforcement Technologies
Defense contractor giant Lockheed Martin’s LUMEN technology aims to protect cellular phone users from rogue, spoofing systems.
A new mobile operations fusion kit that provides easy, rapid and on-the-go interoperability for mobile field operations and communications piqued the interest recently of the U.S. Marine Corps’ research and development community.
The Instant Eye small unmanned aerial system received approval last Thursday from the Federal Aviation Administration (FAA) to be used by an energy company, which will conduct research, development and training to see if the system is practical for inspecting infrastructure such as pipelines, power lines and insulators on towers. It is the first unmanned quadrotor to receive FAA certification and may be the lightest aircraft ever certified. The approval opens the door for the system to be used for a wide range of commercial applications.
With the war in Afghanistan winding down, the U.S. Defense Department’s rapid deployment office, which specializes in identifying, developing and quickly fielding game-changing technologies, now will take a more long-term approach. Slightly stretching out the process will offer more flexibility to procure the best possible systems, will present more opportunities for interagency and international cooperation and may cut costs.
The U.S. Navy has evaluated color-coded chemical detection technology known as colorimetric explosive detection kits, the service recently announced.
Following the terrorist attacks on September 11, 2001, government agencies came under widespread criticism for failing to share information and "connect the dots." By contrast, law enforcement agencies were almost universally praised following the Boston Marathon bombing and the shooting at the Navy Yard in Washington, D.C., both of which took place last year.
U.S. Secret Service officials are establishing two new cybercrime task forces—in Cincinnati and Denver—that will enhance the agency’s ability to detect and investigate information technology-related crimes, including credit card theft, attacks on the banking and finance infrastructure and identity fraud.
Homeland security officials are battling privacy and technology issues amid the new social media era that offers both challenges and opportunities. Just as new technologies and information sharing architectures have improved interagency data sharing, new sources of potentially valuable information have emerged to vex planners who must handle technical obstacles and personal rights.
Quote of the Day:
“The more we can talk about cyber and intelligence in the open, the better we will be … the less the demagogues can take it and run with it.”—U.S. Representative Mac Thornberry (R-TX)
Intelligence needs cyber, and cyber needs intelligence. How they can function symbiotically is a less clear-cut issue, with challenges ranging from training to legal policy looming as government officials try to respond to a burgeoning cyber threat.
The same challenges facing the military now confront law enforcement as it embraces cyber capabilities. Disciplines ranging from data fusion to security are becoming integral parts of the curriculum for police officers.
Cathy Lanier, chief of the Washington, D.C., Metropolitan Police Department, did not understate the changes technology has wrought as she spoke at the AFCEA Global Intelligence Forum in the National Press Club in Washington, D.C. “It almost feels like completely reinventing police work,” she said.
New information technologies have advanced the state of the art in law enforcement at the local level, but police now find themselves facing challenges brought about these innovative capabilities. Problems of security and adversarial use of cyber have added to traditional problems that police departments have faced for decades.
Companies that are hacked have valuable information that can help prevent future cyber intrusions, said an FBI cyber expert. Rick McFeely, executive assistant director of the FBI’s Criminal, Cyber, Response and Services Branch, told the audience at the AFCEA Global Intelligence Forum in the National Press Club in Washington, D.C., that the bureau is depending on industry to share vital information on cyber attacks.
The FBI has created an information sharing portal for cyber defense modeled on its Guardian counterterrorism portal. Known as iGuardian, the trusted portal represents a new FBI thrust to working more closely with industry on defeating cyberthreats. It is being piloted within the longtime InfraGard portal, according to an FBI cyber expert.
Industry officials foresee changes in network security.
Cyber industry experts predict a number of coming developments in the cyber realm, driven in part by government strategy and funding uncertainties. The future may include a greater reliance on law enforcement to solve state-sponsored hacks, increased automation and more outsourcing.
The Regional Information Sharing Systems (RISS) Program recently implemented a simplified sign-on capability that enables federal, state and local law enforcement to collaborate.
Public safety personnel are standing at the beginning of a new era in communications as plans unfurl to create a nationwide broadband network dedicated to their needs. With many questions yet to be resolved, organizations must contend with making the right choices for today even as they prepare to take advantage of advanced future offerings.
U.S. officials tasked with securing routes into and out of the country are beginning to employ a technology that will pull together disparate information in a way that could save their lives or the lives of others. Though it was not designed exclusively for agents trying to control international movements, these personnel are early adopters, using the system to prevent illicit goods, undesirable persons or rampant violence from making its way over national boundaries.
Field operatives can share the capabilities of their headquarters counterparts to access and cross-reference law enforcement data from large archives or active files. Software capable of running on commercial off-the-shelf hardware allows collection and dissemination of vital police information from diverse sources without overwhelming its user.
New data collection technology can provide a virtual image of a crime scene to give a visual representation of the scenario in criminal cases. This technology, which uses a pen-based computer, is being developed with input from law enforcement communities to help investigators and officers in the field.