Homeland Security

February 1, 2014
By Henry S. Kenyon

A new software tool allows federal agencies to scan mobile device applications for security and accessibility issues prior to publishing them. The automated process allows developers to check their code rapidly against a variety of government guidelines to ensure that new mobile applications keep personnel and their organizations safe from hacking and other malicious outside threats.

January 13, 2014
By Rita Boland

The Department of Homeland Security has expanded its Secretary’s Honors Program Cyber Student Volunteer Initiative to more agencies. Applications are due by Friday.

December 27, 2013
By Maryann Lawlor

The Federal Emergency Management Agency is establishing a Thunderclap account to encourage citizens to be ready for emergencies throughout 2014.

 

December 3, 2013

Eight emerging cybersecurity technologies developed by the Department of Energy’s National Laboratories will be featured at the Transition-to-Practice Technology Demonstration Day for Investors, Integrators and IT Companies East event on December 18 in Washington, D.C.

November 14, 2013
By George I. Seffers

The U.S. Department of Homeland Security is seeking participants for the Software Assurance Marketplace (SWAMP), which is expected to open to beta users in January. The ultimate goal for the marketplace is to help protect the nation’s critical infrastructure by improving software used for essential functions.

October 28, 2013
By Beverly Cooper

Work has begun at the federal level to develop a nationwide dedicated, reliable network, which will provide advanced data communications capabilities to police officers, firefighters and other emergency personnel. The First Responder Network Authority (FirstNet) will enable public safety personnel to make cellular-quality calls and send data, video, images and text—similar to the capabilities offered on commercial networks. Incident commanders and local officials will have priority access and control over the network.

September 19, 2013
By Rita Boland

Biometrics is on the verge of becoming more pervasive than ever in everyday life, setting the stage for personal identifiers to take the place of other common security measures. The expansion mirrors increased usage in fields such as military operations, citizen enrollment and public safety.

 

September 1, 2013
By George I. Seffers
The FBI is studying the business case for using iris recognition, which so far is used primarily by state prisons and county jails for keeping track of prisoners. The Defense Department also is expected to be a major user of iris recognition.

The FBI is on schedule to finish implementing next-generation biometric capabilities, including palm, iris and face recognition, in the summer of next year. New technology processes data more rapidly, provides more accurate information and improves criminal identification and crime-solving abilities.

September 1, 2013
By George I. Seffers
U.S. Marines from 3rd Light Armored Reconnaissance Company train the turret of their Light Armored Vehicle toward targets at the Shoalwater Bay Area Training Area in Queensland, Australia. Australia is one country in the Asia Pacific region expected to join the Coalition Interoperability Assurance and Validation working group.

The working group that helped solve the coalition interoperability puzzle in Afghanistan is working across the U.S. Defense Department and with other nations to ensure that the lessons learned will be applied to future operations around the globe. Experience in creating the Afghan Mission Network may benefit warfighters worldwide, such as those in the Asia Pacific, and may even be applied to other missions, including homeland security and humanitarian assistance.

August 20, 2013

 

August 19, 2013
George I. Seffers

 
Elbit Systems has, announced that its Australian subsidiary, Elbit Systems of Australia Pty Ltd (ELSA), was awarded a contract in the amount of  approximately $32 million U.S. dollars ($35 million Australian dollars) to supply the Australian Federal Police with an Investigation, Intelligence and Incident Management (IIIM) Solution to be supplied over a four-year period.

August 6, 2013

 

Rep. Duncan Hunter (R-CA) is encouraging the U.S. Coast Guard to work with industry to identify the latest unmanned vehicles to improve maritime safety and security while saving money. In a recent Congressional Subcommittee on Coast Guard and Maritime Transportation hearing, Hunter, the chairman of the subcommittee, shared that he has seen a commercially built autonomous surface vehicle that can facilitate sub-sea to surface to satellite communications.

August 1, 2013

The new next-generation dispatch center for the San Luis Obispo County, California, Sheriff’s Office is one of the first in the nation to be completely Internet protocol-based, bridging its existing radio system with the latest smartphone and tablet technology. The new system turns a standard PC into a communications dispatch console and also turns a smartphone into a multi-channel land mobile radio handset for secure, on-demand push-to-talk communication.

August 1, 2013
By Max Cacas

 

Domestic security officials aim to replace human divers with an autonomous underwater vehicle whose design is derived from nature: the tuna, one of the fastest and most maneuverable fish in the sea. The vehicle would be used primarily to inspect ship hulls for contraband, saving divers from hazardous trips into hard-to-reach areas below the waterline where oil and other toxic chemicals are part of the mix. Designers also envision the tuna-modeled robot could also be used for search and rescue missions.

August 1, 2013
By George I. Seffers
Warfighters overwhelmed by the vast amounts of imagery available from unmanned aerial systems and other sensors may soon rely on Persistics, a revolutionary system that compresses data while maintaining vital image quality.

 

Researchers at one of the premier national laboratories in the United States are prepared to hand the Defense Department a prototype system that compresses imagery without losing the quality of vital data. The system reduces the volume of information; allows imagery to be transmitted long distances, even across faulty communications links; and allows the data to be analyzed more efficiently and effectively.

July 31, 2013
By Robert K. Ackerman
Eugene Kaspersky, chief executive officer and co-founder of Kaspersky Lab, runs through the cyber threat spectrum and offers some solutions.

Protecting the nation from cyber attack entails deterring or preventing marauders from carrying out their malevolent plans. But, while government and the private sector endeavor to fight the menace jointly, evildoers constantly change their approaches and learn new ways of striking at vulnerable points. So many variables have entered the equation that even the likelihood of attacks—along with their effects—is uncertain.
 

July 31, 2013
By Robert K. Ackerman

Supervisory control and data acquisition (SCADA) systems face numerous threats from cybermarauders coming at them from any of a number of directions. Some systems could suffer malware attacks even though they are not the intended targets, according to a leading security expert.

July 31, 2013
By Robert K. Ackerman

A “digital Pearl Harbor Armageddon” that inflicts catastrophic damage on the United States is not likely soon or in the foreseeable future. The worst cyber attack that could be expected would have less of an effect for a shorter period of time, said an expert with the Office of the Director of National Intelligence (ODNI).

July 1, 2013
By George I. Seffers
Law enforcement agencies and private contractors may play a larger role in solving nation state-sponsored hacks affecting national security.

Industry officials foresee 
changes in network security.

Cyber industry experts predict a number of coming developments in the cyber realm, driven in part by government strategy and funding uncertainties. The future may include a greater reliance on law enforcement to solve state-sponsored hacks, increased automation and more outsourcing.

June 12, 2013
By Robert K. Ackerman

In the midst of a raging controversy over widespread National Security Agency (NSA) monitoring, the head of the NSA and U.S. Cyber Command defends cyber surveillance efforts and calls for greater consolidation of cyber activities among diverse organizations.

Pages