The recently signed executive order on cybersecurity and the presidential directive on critical infrastructure protection are not separate documents. In fact, they are part of the same overall effort to protect the nation, said Rand Beers, undersecretary for the National Protection and Programs Directorate, U.S. Department of Homeland Security. Beers discussed the effort on Thursday at the AFCEA Homeland Security Conference in Washington, D.C.
Homeland Security Conference 2013 Show Daily, Day 2
In the aftermath of the 9/11 terrorist attacks, the military, government and intelligence officials all agreed that federal agencies needed to be more willing and able to share critical data to better connect the dots.
Although the Department of Homeland Security is eyeing mobile technologies, the organization faces a number of challenges, revealed Shawn Lapinski, the chief interoperable architect for Department of Homeland Security Joint Wireless Program Office within the Customs and Border Protection (CBP) agency, speaking at Wednesday's panel on mobile communications for homeland security at AFCEA's Homeland Security conference.
The U.S. top-down, federal government-based national security model currently used to protect the nation is not the best model for homeland security. Instead, the country should adopt a decentralized model called "network federalism" that empowers state and local agencies and encourages them to work together to resolve security issues.
The First Responder Network Authority (FirstNet), which is responsible for deploying the Nationwide Public Safety Network, could learn lessons from the September 11, 2001, attack on the Pentagon, during which emergency responders experienced almost no interoperability problems, according to emergency management panelists at the AFCEA Homeland Security Conference in Washington, D.C.
The National Network of Fusion Centers, developed in the aftermath of the September 11, 2001, attacks, are a vital part of the nation’s homeland security efforts, according to experts on the Intelligence and Information Sharing Panel at AFCEA’s Homeland Security Conference in Washington, D.C.
Security concerns have largely driven advances in biometric technologies, but that likely will not be the case in the coming years. Commercial needs will overtake government security needs in determining the direction of biometrics, according to Troy Potter, vice president, Identity and Biometrics Solutions, Unisys Federal Systems, at the AFCEA Homeland Security Conference on Wednesday.
The FBI's Next Generation Identification (NGI) system will improve law enforcement’s capabilities as much as DNA analysis, according to Dave Cuthbertson, assistant director, Criminal Justice information Services Division, FBI.
The NGI advances the FBI’s biometric identification services, providing an incremental replacement of the current system while introducing new functionality. The NGI improvements and new capabilities are being introduced across a multiyear timeframe within a phased approach.
Homeland Security Conference 2013 Show Daily, Day 1
All too often, cyber and physical protection are considered separately, when really they go hand-in-hand, according to experts speaking at the first day of the AFCEA Homeland Security Conference in Washington, D.C., February 26, 2013. The conference opened with a half-day of conversation about hackers, terrorists and natural disasters and addressed concerns involving both physical infrastructure and the cyber environment for all kinds of attacks, be they physical, virtual or even natural in origin.
Senior leaders in both industry and government have learned their lessons from major storms, such as Katrina and Sandy, and are working together to improve the nation’s ability to bounce back from natural disasters.
The Long Beach Police Department dive team adopts new homeland security equipment.
The Long Beach, California, police department dive team is now using a newly acquired search and recovery system to help protect the local port, shipping lanes and critical infrastructure.
Dev Technology Group Inc., Reston, Va., recently announced that the U.S. Immigration and Customs Enforcement (ICE) has awarded the company multiple task orders under the ICE Software Operations and Maintenance Support Services Blanket Purchase Agreement. Dev Technology will maintain mission critical systems at ICE including the Enforcement Integrated Database, the Federal Financial Management System Infrastructure, and the Real Property Management System. These systems support ICE agents across the country.
The U.S. agency responsible for customs and border protection has suffered from an unreliable infrastructure and network downtimes but already is seeing benefits from a fledgling move to cloud computing. Those benefits include greater reliability and efficiency and lower costs.
Public safety personnel are standing at the beginning of a new era in communications as plans unfurl to create a nationwide broadband network dedicated to their needs. With many questions yet to be resolved, organizations must contend with making the right choices for today even as they prepare to take advantage of advanced future offerings.
U.S. officials tasked with securing routes into and out of the country are beginning to employ a technology that will pull together disparate information in a way that could save their lives or the lives of others. Though it was not designed exclusively for agents trying to control international movements, these personnel are early adopters, using the system to prevent illicit goods, undesirable persons or rampant violence from making its way over national boundaries.
Competing companies are working to a common goal of testing and selling new technologies to government.
A newly created research and development consortium aims to expedite the piloting and testing of new technology for the U.S. Customs and Border Protection, one of the Department of Homeland Security’s top missions. This effort, using a successful Defense Department procurement model, also hopes to expand innovation by making it possible for small businesses that don’t traditionally do business with the government to bring their ideas forward.
The purpose of the attack is purely robbery, says a cyber expert, who has shared his McAfee report with government officials.