homeland defense

June 5, 2015

Raytheon Co. Integrated Defense Systems, Andover, Maryland, was awarded a $16,999,000 modification (P00004) to contract (W9113M-15-C-0001) for a requirement to exercise option one for services to provide continued field and sustainment level maintenance supporting one Joint Land Elevated Netted System (JLENS) orbit deployed at Aberdeen Proving Ground, Maryland. Services provided are in support of satisfying the JLENS orbit employment in an operational exercise in support of homeland defense and as part of Operation Noble Eagle.

November 1, 2014
By Rita Boland

The Department of Homeland Security’s SAFETY Act is finding a new application as it may serve to protect against the potential for lawsuits arising from the National Institute of Standards and Technology Cybersecurity Framework. Lawyers are answering questions from clients about possible legal actions, and the department and institute are working together to ensure developers work with confidence.

October 1, 2014
By George I. Seffers

The U.S. government is adopting changes to the cloud computing certification program that will better protect against potential insider threats. The improvements include additional penetration testing, more thorough testing of mobile devices, tighter controls over systems being carried from a facility and more stringent scrutiny of systems connecting from outside the network.

October 1, 2014
By George I. Seffers
Unmanned air vehicles, such as the Global Hawk, can provide full-motion video and other intelligence, surveillance and reconnaissance data directly special operators equipped with the NG-TacMN.

U.S. Defense Department and interagency special operators are scheduled to begin receiving new tactical mesh networking equipment this month. The kit provides a mobile, ad hoc, self-healing network that offers a full range of situational awareness data, including intelligence, surveillance and reconnaissance feeds, blue force tracking and a voice over Internet protocol capability.

September 4, 2014
By Sandra Jontz

The National Capital Region is receiving a five-year federal grant of $30 million to build its capability to detect and deter nuclear and radiological threats. Washington, D.C., is the third city to launch the Securing the Cities program.

August 21, 2014
By Sandra Jontz

Defense contractor giant Lockheed Martin’s LUMEN technology aims to protect cellular phone users from rogue, spoofing systems.

September 1, 2014
By Sandra Jontz
Fully packed, the device, measuring slightly larger than a carry-on piece of luggage, weighs 55 pounds and is easily transported.

A new mobile operations fusion kit that provides easy, rapid and on-the-go interoperability for mobile field operations and communications piqued the interest recently of the U.S. Marine Corps’ research and development community.

August 1, 2014
By Robert K. Ackerman

The price of failure to provide adequate cybersecurity ultimately may be too high for any nation to tolerate. Yet, the cost of effective cybersecurity may be too much for a nation to afford.

July 14, 2014
By George I. Seffers

Lawrence Livermore National Laboratory and Los Alamos National Laboratory join Bechtel BNI to train a new class of cyberdefense professionals. The program is designed to allow the national labs to recruit and rapidly develop cybersecurity specialists who can guide research at their respective institutions and create solutions that meet the cyberdefense needs of private industry.

July 14, 2014
By George I. Seffers

The National Institute of Standards and Technology (NIST) primary external advisory board today announced a report calling for the agency to increase its staff of cryptography experts and to implement more explicit processes for ensuring openness and transparency to strengthen its cryptography efforts. In making its recommendations, the Visiting Committee on Advanced Technology (VCAT) specifically addressed NIST’s interactions with the National Security Agency (NSA).

July 14, 2014
By George I. Seffers

The National Security Agency has added five schools to the National Centers of Academic Excellence in Cyber Operations Program.

July 10, 2014
By Maryann Lawlor

Only 6 percent of power and water companies say they provide cybersecurity training to all employees.

July 3, 2014
By Sandra Jontz

Cyber attacks are high on the Department of Homeland Security’s radar, but increasing reliance on network technology might be making the country more vulnerable to cyberthreats rather than less.

July 2, 2014
By George I. Seffers

The Instant Eye small unmanned aerial system received approval last Thursday from the Federal Aviation Administration (FAA) to be used by an energy company, which will conduct research, development and training to see if the system is practical for inspecting infrastructure such as pipelines, power lines and insulators on towers. It is the first unmanned quadrotor to receive FAA certification and may be the lightest aircraft ever certified. The approval opens the door for the system to be used for a wide range of commercial applications.

July 1, 2014
By George I. Seffers

Today the U.S. Defense Department released its strategy for countering weapons of mass destruction (WMD). This strategy will direct the department’s efforts to prevent hostile actors from acquiring WMD, contain and reduce WMD threats and ensure the department can respond effectively to WMD crises.

August 1, 2014
By George I. Seffers
The rapid fielding office within the Pentagon helped develop the Accelerated Nuclear DNA Equipment system, which can process five DNA samples in about 90 minutes.

With the war in Afghanistan winding down, the U.S. Defense Department’s rapid deployment office, which specializes in identifying, developing and quickly fielding game-changing technologies, now will take a more long-term approach. Slightly stretching out the process will offer more flexibility to procure the best possible systems, will present more opportunities for interagency and international cooperation and may cut costs.

May 27, 2014
By Beverly Mowery Cooper

Not only is the cost of cyber intrusion severe, the likelihood of it occurring is assured. Cybersecurity defenses must be flexible, innovative and persistent to address an ever-changing threat.

May 13, 2014
By Robert K. Ackerman

Fresh off supporting two overseas wars, the National Guard is planning for a larger role in military activities on the home front. Cyber is one area where the Guard may be serving a key role, officials said during AFCEA’s JIE Mission Partner Symposium.

June 1, 2014
By Rita Boland
Virginia National Guard soldiers from the Fairfax-based Data Processing Unit respond to a simulated cyber attack during a cyberdefense exercise.

Cybersecurity remains a priority for the U.S. Defense Department, with officials protecting resources for it in the face of overall budget constraints. Guidance from the National Defense Authorization Act for Fiscal Year 2014 directs a mission analysis of cybercapabilities not only in the active military, but also across partners, to help forces maintain their edge in protecting the nation.

June 1, 2014
By George I. Seffers
Smoke drifts into the sky from buildings and houses hit by shelling in Homs, Syria. Many Jihadi fighters leaving Syria will funnel through the Balkans and may pose a threat to other parts of the world.

In the coming months, extremists fighting in the Syrian civil war likely will begin returning to Europe, funneling through the Balkans where they can find cheap weapons, like-minded allies and temporary accomplices in the form of organized criminal groups. Conditions are ripe, according to experts, for those individuals to spread across Europe, launching terrorist attacks on major cities.

Pages