Homeland Security

June 1, 2014
By George I. Seffers
Smoke drifts into the sky from buildings and houses hit by shelling in Homs, Syria. Many Jihadi fighters leaving Syria will funnel through the Balkans and may pose a threat to other parts of the world.

In the coming months, extremists fighting in the Syrian civil war likely will begin returning to Europe, funneling through the Balkans where they can find cheap weapons, like-minded allies and temporary accomplices in the form of organized criminal groups. Conditions are ripe, according to experts, for those individuals to spread across Europe, launching terrorist attacks on major cities.

June 1, 2014
By Rita Boland
Virginia National Guard soldiers from the Fairfax-based Data Processing Unit respond to a simulated cyber attack during a cyberdefense exercise.

Cybersecurity remains a priority for the U.S. Defense Department, with officials protecting resources for it in the face of overall budget constraints. Guidance from the National Defense Authorization Act for Fiscal Year 2014 directs a mission analysis of cybercapabilities not only in the active military, but also across partners, to help forces maintain their edge in protecting the nation.

April 30, 2014
By George I. Seffers

Intelligence agencies could have investigated more thoroughly and shared information more effectively, but even if they had performed perfectly, they may not have been able to prevent last year's Boston Marathon bombing, according to a report delivered before the Senate Homeland Security and Governmental Affairs Committee.

May 1, 2014
By George I. Seffers

Dealing with the world’s increasing complexity is the primary challenge to keeping the homeland secure, according to Adm. Thad Allen, USCG, (Ret.), executive vice president of Booz Allen Hamilton and former commandant of the U.S. Coast Guard. He lists border security, the cyberthreat, information sharing, terrorism, criminal organizations and climate change as elements adding to that complexity.

April 16, 2014

Booz Allen Hamilton, McLean, Va. (FA8075-14-D-0002); Battelle Memorial Institute, Columbus, Ohio (FA8075-14-D-0003); Jacobs Technology Inc., Tullahoma, Tenn. (FA8075-14-D-0004); MacAulay-Brown Inc., Dayton, Ohio (FA8075-14-D-0005); MRI Global, Kansas City, Mo. (FA8075-14-D-0006); National Security Information Associates, Chantilly, Va.

March 17, 2014

Critical Solutions International (CSI), Carrollton, Texas, announced today that the Maryland Transit Administration (MTA) has selected its Intelligent Video Surveillance Solution to provide advanced video security at selected rail stations within the state’s rapid transit network. The Intelligent Video Surveillance Solution will provide enhanced security and safety for thousands of commuters, as well as first responders, while saving time and taxpayer money, the announcement says.

March 12, 2014
By George I. Seffers

Officials from across the Homeland Security Department (DHS) stressed the need for strong partnerships during the third and final day of the AFCEA Homeland Security Conference, Washington, D.C.
 

 

March 11, 2014
By George I. Seffers

It is not surprising that cybersecurity would dominate the discussion on the second day of the AFCEA Homeland Security Conference in Washington, D.C. But the depth and breadth and variety of topics surrounding cybersecurity and information protection in all its forms indicates the degree to which the information security mission has engulfed every department and agency at all levels of government.

March 11, 2014
By George I. Seffers

Chief information security officials from various agencies voiced support for the Department of Homeland Security's Continuous Diagnostics and Mitigation (CDM) Program, which is designed to fortify computer networks across the federal government. The officials spoke out in support of the program while serving on a panel during the AFCEA Homeland Security Conference, Washington, D.C. Panel moderator John Streufert, director of Federal Network Resilience at the Department of Homeland Security, took the opportunity to put some rumors to rest.

March 11, 2014
By George I. Seffers

The National Weather Service is the granddaddy of open source data, according to Adrian Gardner, chief information officer, Federal Emergency Management Agency (FEMA). And, the National Oceanic and Atmospheric Administration (NOAA) was "into big data before big data was cool," added David McClure, a data asset portfolio analyst within the NOAA Office of the Chief Information Officer.

March 10, 2014
By George I. Seffers

Following the terrorist attacks on September 11, 2001, government agencies came under widespread criticism for failing to share information and "connect the dots." By contrast, law enforcement agencies were almost universally praised following the Boston Marathon bombing and the shooting at the Navy Yard in Washington, D.C., both of which took place last year.

March 10, 2014
George I. Seffers

The U.S. Customs and Border Protection (CBP) agency is only interested in mobile communication if it allows the agency to perform functions it could not perform otherwise, Mark Borkowski, component acquisition executive and assistant commissioner with the CBP Office of Technology Innovation and Acquisition, told the audience at the AFCEA Homeland Security Conference in Washington, D.C., on Monday.

March 10, 2014
By George I. Seffers

The real challenge to keeping the homeland secure is dealing with the world's increasing complexity, Adm. Thad Allen, USCG, (Ret.), executive vice president of Booz Allen Hamilton, told the audience at the AFCEA Homeland Security Conference in Washington, D.C., on Monday during his luncheon keynote address.

March 10, 2014
By George I. Seffers

Homeland Security Conference Show Daily, Day 1

Information sharing and interoperability have come a long way since the terrorist attacks of September 11, 2001, but challenges still remain, agreed speakers and panelists on the first day of the AFCEA Homeland Security Conference in Washington, D.C.

February 14, 2014
By Robert K. Ackerman
(r-l) Capt. Dale Rielage, USN; Capt. Stuart Belt, USN; Capt. David A. Adams, USN; Capt. James Fanell, USN; Dr. James R. Holmes; and panel moderator Rear Adm. James G. Foggo III, USN, exchange views in a panel titled “What About China?”

Internal change may be the key to managing external change as the U.S. Navy, the U.S. Marine Corps and the U.S. Coast Guard enter a new era of limited budgets and unlimited global challenges. From research and development to acquisition, these services are looking toward changing methods and technologies to keep the force viable and accomplish their missions. Meanwhile, a range of adversaries continue striving to find and exploit weaknesses in U.S. capabilities and operations.

February 13, 2014
By Robert K. Ackerman

The U.S. Coast Guard wants contractors to provide it with affordable systems instead of top-of-the-line technology solutions, said its commandant. Adm. Robert J .Papp Jr., USCG, told the audience at the West 2014 Thursday luncheon town hall in San Diego that everything the Coast Guard does is within a constrained environment, and it needs solutions that don’t strain its already tight financial resources.

March 1, 2014
By Kent R. Schneider

Even though the Cold War has ended and the monolithic threat against the West has disappeared, the relationship between Europe and the United States remains vital. Europe includes some of the United States’ strongest coalition partners and alliances; the two economies are closely tied and interdependent; and defense and security in Europe are evolving rapidly, just as in the United States. AFCEA chapters and members outside the United States number the greatest in Europe.

March 1, 2014
By George I. Seffers
The U.S. Secret Service Electronic Crimes Task Forces target criminals who use technology to target financial systems.

U.S. Secret Service officials are establishing two new cybercrime task forces—in Cincinnati and Denver—that will enhance the agency’s ability to detect and investigate information technology-related crimes, including credit card theft, attacks on the banking and finance infrastructure and identity fraud.

March 1, 2014
By Rita Boland
U.S. Immigration and Customs Enforcement’s Homeland Security Investigations (HSI) directorate is involved in a multilayer security approach to protecting U.S. interests.

Homeland security officials are battling privacy and technology issues amid the new social media era that offers both challenges and opportunities. Just as new technologies and information sharing architectures have improved interagency data sharing, new sources of potentially valuable information have emerged to vex planners who must handle technical obstacles and personal rights.

March 1, 2014
By George I. Seffers
U.S. Coast Guard Cutter Sapelo and Royal Netherlands Navy Offshore Patrol Vessel HNLMS Holland search Caribbean Sea waters for bales of contraband. SeaWatch is the Coast Guard’s next-generation command and control system for cutters.

By the end of this fiscal year, the next-generation command and control system for much of the cutter fleet should be installed on the U.S. Coast Guard’s 270-foot cutter class, and the system is now being considered for inclusion on 225-foot and 110-foot vessels. The system, called SeaWatch, combines navigational and tactical, optical surveillance and communications into one situational awareness picture; provides commonality across the fleet; and replaces an aging system that has outlived its usefulness.

Pages