Homeland Security

March 16, 2015
By Suzanne Petrie Liscouski

Guest blogger Suzanne Petrie Liscouski recaps one panel discussion from the AFCEA Homeland Security Conference on agile principles in procurement and goals, including successes with agile development and agile operations and maintenance.

March 11, 2015
By Sandra Jontz
Kurt Reuther, acting DHS principal deputy undersecretary for intelligence and analysis, speaks during the Homeland Security Conference and Expo. Photo by Mike Carpenter

Look out social media aficionados—the FBI could be watching your every post. Well, maybe not every one, and maybe not of everyone. But as social media has become a recruitment tool for terrorists, the popular public platforms have become a new hub for law enforcement as they ramp use of automation technology to scour for actionable intelligence. 

March 11, 2015
By George I. Seffers

The Department of Homeland Security Science and Technology Directorate has announced its first business accelerator program, EMERGE!, aimed at entrepreneurs who have innovative ideas that address the unique needs of the homeland security community and whose wearable technologies could be adapted for first responder operations.

March 10, 2015
By Sandra Jontz
Deputy Secretary of the Department of Homeland Security Alejandro Mayorkas speaks at the Homeland Security Conference. Photo by Mike Carpenter

Cybersecurity is one of the critical homeland security priorities, along with the threats posed in the varying domains of aviation, border security and maritime, said the deputy secretary of the Department of Homeland Security.

March 10, 2015
By Sandra Jontz
Carlos Kizzee from The Center for Internet Security and Rich Struse with the DHS talk about cybersecurity and information sharing at Homeland Security Conference.

Knowing the cybersecurity threat might be half the battle toward mitigating problems, but the popular push and mounting trend toward increased information sharing, particularly between industry and the federal government, is not the be all and end all.

March 3, 2015
By Sandra Jontz

The U.S. House of Representatives on Tuesday ended its stalemate and voted to fully fund the Department of Homeland Security.

February 26, 2015
By Sandra Jontz
Homeland Security Secretary Jeh Johnson, joined by leadership and employees from the DHS, calls on Congress on Monday to fully fund the department.

Secretary of Homeland Security Jeh Johnson voiced a hesitant optimism Thursday that U.S. Congress will come together to fully fund the department before tomorrow’s deadline that could shutter parts of the Department of Homeland Security.

February 9, 2015
By Sandra Jontz
Pat Hickey, an engineer with Galois Incorporated in Portland, Oregon, prepares to fly a mini drone with software rewritten to make it invulnerable to hackers. It is part of the DARPA-funded High-Assurance Cyber Military Systems. By Sandra Jontz

In case you missed it, CBS’s newsmagazine "60 Minutes" this weekend featured a segment with Dan Kaufman, director of the Information Innovation Office (I2O) for DARPA, who talked about the office’s efforts to outsmart hackers, sex traffickers and those seeking to do harm to the United States.

March 1, 2015
By Sandra Jontz
Government and private sector industrial control systems (ICS) professionals participate in an ICS cybersecurity training exercise at the Department of Homeland Security’s Industrial Control Systems-Cyber Emergency Response Team (ICS-CERT) training facility in Idaho Falls, Idaho.

The next big cyber attack likely will strike critical infrastructure assets in the United States, which could bring the world’s remaining superpower to its knees, according to cybersecurity experts. This would constitute a crippling assault against national assets such as power facilities, transportation networks, nuclear plants or the drinking water supply, these experts warn.

January 29, 2014
By George I. Seffers
Smugglers used a makeshift ramp to attempt to drive over a border fence in 2012 but fled when the truck didn’t make it over. Jeh Johnson, secretary of the Homeland Security Department, is calling for a 2015 appropriations bill to fund more technology to help secure the southern border.

Jeh Johnson, secretary of the Homeland Security Department, is calling on Congress to pass a 2015 appropriations bill to fund additional security measures for border protection and homeland security.

February 1, 2015
By Sandra Jontz
The unmanned version of Kaman Corporation’s K-MAX platform demonstrates dropping water on a controlled fire during trials at Griffiss Air Force Base in New York.

The unmanned version of the K-MAX medium-lift helicopter, used in the war zone to ferry cargo, might find a new mission in the United States—fighting wildfires under the purview of the federal agency tasked with protecting the country’s natural resources.

February 1, 2015
By George I. Seffers
The Coast Guard is conducting demonstrations with unmanned aerial systems for both land-based and National Security Cutter-based operations.

The U.S. Coast Guard is engaged in a major overhaul of airborne reconnaissance capabilities, which will allow the service to shed aging platforms, add unmanned systems, enhance interoperability, improve efficiency and perform its missions more effectively.

December 12, 2014
By Maryann Lawlor

Serial has become more than an ordinary podcast. Its captivating story line has listeners joining in the conversation, an approach that could help governments solve larger problems.

December 10, 2014
By Robert K. Ackerman

While terrorists can inflict individual points of damage to the U.S. homeland, cyberspace attacks hold the greatest potential for inflicting devastating damage that could change the nature of the nation.

November 25, 2014
By Sandra Jontz

The contractor that facilitates enrollment in the U.S. Transportation Security Administration’s PreCheck program developed an enrollment option to let employees of participating organizations sign up at their offices, saving them the trip to an airport or off-site enrollment center.

November 20, 2014
By George I. Seffers

The U.S. Department of Commerce, Washington, D.C., today announced the consolidated screening list (CSL), a streamlined collection of nine different screening lists from the U.S. Departments of Commerce, State and the Treasury that contains names of individuals and companies with whom a U.S. company may not be allowed to do business due to U.S. export regulations, sanctions or other restrictions.

November 18, 2014
By George I. Seffers

The National Institute of Standards and Technology (NIST) has published for public review draft recommendations to ensure the confidentiality of sensitive federal information residing on the computers of contractors and other nonfederal organizations working for the government.

November 6, 2014
George I. Seffers
Biobots detect and track sounds for search and rescue.

NC State University researchers have developed technology that allows cyborg cockroaches, or biobots, to pick up sounds with small microphones and seek out the source. The technology is designed to help emergency personnel find and rescue survivors in the aftermath of a disaster.

October 27, 2014
By Sandra Jontz
Replica grenades used as part of a Halloween costume discovered in a checked bag at Alaska airport.

You would think it would go without saying, but apparently not. So a U.S. Transportation Security Administration representative wrote a brief blog on a few Halloween travel tips if travelers are taking flight with costumes in tow.

October 22, 2014

Reginald Brothers, Department of Homeland Security (DHS) undersecretary for science and technology, today announced the new visionary goals for the department’s Science and Technology (S&T) Directorate.

Pages