Homeland Security

July 1, 2013
By George I. Seffers
Law enforcement agencies and private contractors may play a larger role in solving nation state-sponsored hacks affecting national security.

Industry officials foresee 
changes in network security.

Cyber industry experts predict a number of coming developments in the cyber realm, driven in part by government strategy and funding uncertainties. The future may include a greater reliance on law enforcement to solve state-sponsored hacks, increased automation and more outsourcing.

June 12, 2013
By Robert K. Ackerman

In the midst of a raging controversy over widespread National Security Agency (NSA) monitoring, the head of the NSA and U.S. Cyber Command defends cyber surveillance efforts and calls for greater consolidation of cyber activities among diverse organizations.

June 5, 2013
By Robert K. Ackerman

Concerns about the telecommunications supply chain have led U.S. network providers to institute extensive security procedures, but government officials are looking at establishing formal guidelines for procuring network components overseas—for better or worse.

June 1, 2013
By Robert K. Ackerman
Fig. 1 [circuit-traces-640.jpg]: Cyberspace is the new invasion route for marauders to attack the nation’s critical infrastructure, and that potential threat now is increasing to the point of likelihood.

Digital marauders have set their sights on the critical infrastructure and are likely to strike soon with major effect. Several different elements of the infrastructure are vulnerable to attack by all manner of cyberspace players ranging from malevolent individuals to hostile nation-states.

June 1, 2013
By Max Cacas
Crews can install the RecX transformer in two days or less.  (Photo: DHS)

Industry and government search for for the best approach for the rapid recovery of a key element of the electrical grid in the event of an attack.

May 15, 2013
By Maryann Lawlor

It’s time for military leaders, and yes, even members of the intelligence community, to come out from behind the curtain. They not only need to share with the public what networks and radios and tanks and guns mean to a warfighter’s safety but also what they mean to global security.

May 1, 2013
By Arthur Allen and Zdenka Willis
A U.S. Coast Guard helicopter delivers passengers from the sailing ship Bounty after the ship foundered during superstorm Sandy last October.

The synergy between operational planning and radar sensing provides enhanced search and rescue capabilities.

The U.S. Coast Guard is combining high-frequency coastal radar data with traditional oceanographic and geographic information to improve its chances of rescuing people in distress on the high seas. By merging these different sources of data, the Coast Guard enhances its search abilities while also providing better weather prediction for both its search and rescue teams and an endangered public in coastal areas.

March 27, 2013
George I. Seffers

Cobham’s Brazilian subsidiary has secured its first major contract in Brazil to equip state police helicopters with high definition video surveillance downlinks, which will be used on helicopters in 12 cities during the 2013 Confederations Cup and the 2014 World Cup. The contract was developed with a local integration partner following the opening of the Cobham’s Sao Paulo office in August 2012 and includes both airborne and ground based equipment.

March 14, 2013
By Rick Hansen

The Regional Information Sharing Systems (RISS) Program recently implemented a simplified sign-on capability that enables federal, state and local law enforcement to collaborate.

 

March 15, 2013
By Maryann Lawlor

To help government and industry connect, network and learn about requirements and solutions, SIGNAL Media offers Event eNews websites for several major AFCEA International events that feature near real-time coverage as well as daily wrap-ups of speakers and panel discussions.

March 15, 2013

To help keep global security professionals abreast of business opportunities and changes in the government acquisition landscape, AFCEA International has gathered information about these topics in a new section of the AFCEA website. Called AFCEA Corporate Member Resources, the page features new content about military and government organizations as it becomes available.

March 4, 2013
George I. Seffers

 
Ishpi Information Technologies Inc., Mount Pleasant, S.C., has won a $6.7 million dollar multi-year task to provide the United States Coast Guard with subject matter expertise in the areas of information systems security and analysis, certification and accreditation, risk management, and information assurance training support to the Command, Control, Communications, Computers, and Information Technology Service Center. 

March 1, 2013
George I. Seffers

Homeland Security Conference 2013 Show Daily, Day 3

Although many in government are moving as quickly as possible to adopt new technologies, such as cloud computing and mobile devices, individual agencies still face cultural challenges that sometimes prevent them from moving forward, according to officials speaking as part of the Chief Information Officer Council at the AFCEA Homeland Security conference in Washington, D.C.

February 1, 2013
BY Rita Boland
Crews work in New Jersey to restore power that was knocked out during Hurricane Sandy. GridCloud, a project between Cornell University and Washington State University, employs cloud technology to make smart grids self-healing and more resilient in the event of natural or man-made disasters. Photo Credit: FEMA/Liz Roll

A cloud project takes advantage of emerging concepts to protect energy against disruptive threats.

March 1, 2013
By Max Cacas

When it comes to popular smartphones and tablets, security can be a many-layered and necessary endeavor

The growing use of advanced mobile devices, coupled with the increase in wireless broadband speed, is fueling demand by employees to bring their own devices to the job. This situation has opened a new set of security challenges for information technology staff, especially when it comes to the use of apps.

March 1, 2013
by Kent R. Schneider

Anyone who has attended an AFCEA conference in the past two months has heard the constant drumbeat from senior government leadership on the limitations on operations and readiness likely to occur in defense, intelligence and homeland security. At the AFCEA/USNI West 2013 Conference in San Diego January 29-31, the vice chairman of the Joint Chiefs of Staff told a packed audience that the U.S. Defense Department did not know how much money it would receive, when it would receive it or what the restrictions on its use would be.

February 28, 2013
George I. Seffers

As the U.S. government wrestles with its myriad budgetary woes, training, modeling and simulation can provide substantial savings in a variety of ways, according to officials speaking on the Training, Modeling and Simulation panel at the AFCEA Homeland Security Conference in Washington, D.C.

February 28, 2013
George I. Seffers

Top information technology officials from a variety of government agencies identified cloud computing, mobile devices and edge technologies as the technologies that will be critical for accomplishing their missions in the future.

February 28, 2013
By George I. Seffers

The recently signed executive order on cybersecurity and the presidential directive on critical infrastructure protection are not separate documents. In fact, they are part of the same overall effort to protect the nation, said Rand Beers, undersecretary for the National Protection and Programs Directorate, U.S. Department of Homeland Security. Beers discussed the effort on Thursday at the AFCEA Homeland Security Conference in Washington, D.C.

February 27, 2013
By George I. Seffers

Homeland Security Conference 2013 Show Daily, Day 2

In the aftermath of the 9/11 terrorist attacks, the military, government and intelligence officials all agreed that federal agencies needed to be more willing and able to share critical data to better connect the dots.

Pages