The U.S. Department of Homeland Security (DHS) is seeking wearable computers to monitor the canines used to protect U.S. borders. The department also seeks a Global Travel Assessment system and Internet of Things security solutions, officials told the 2016 AFCEA Homeland Security Conference audience.
U.S. Customs and Border Protection (CBP) started a pilot program last week at Hartsfield–Jackson Atlanta International Airport to collect biometrics on passengers leaving the country. This marks the first time the United States has collected such information. A CBP official said the government released a request for information last night and hopes to release a request for proposals next year.
AFCEA International's annual Homeland Security Conference takes place June 21 and 22 at the Ronald Reagan Building and International Trade Center in Washington, D.C., with small business interests well represented during the event.
Experts will be on hand to address year’s theme: “Securing the Nation—Solving Technology and Human Capital Challenges: People, Partners and Priorities.” Sending one representative will not be enough to maximize its value in growing your business.
The U.S. Department of Homeland Security (DHS) announced today a partnership with the NASA Center of Excellence for Collaborative Innovation (CoECI) to develop new technology solutions through publicly crowdsourced prize competitions.
Crowdsourcing and incentive prizes across industry have led to the successful creation of advanced technologies, such as autonomous vehicles and improved data analytics. The DHS Science and Technology (S&T) Directorate is expanding its efforts to solicit innovations like these through its partnership with NASA, according to an S&T statement.
The U.S. Department of Homeland Security (DHS) is now accepting proposals for its upcoming Small Business Innovation Research (SBIR) program for fiscal year 2016. The Science and Technology (S&T) Directorate and the Domestic Nuclear Detection Office (DNDO) jointly issued the solicitation. S&T and DNDO are seeking technical solutions from small businesses in 13 topic areas. The pre-solicitation is available online.
The Department of Homeland Security Science and Technology (S&T) Directorate has awarded eight contracts totaling $14 million to create technology to defend against large and sophisticated Distributed Denial of Service (DDoS) attacks. The projects will become part of the Distributed Denial of Service Defenses Program.
The awards include:
The U.S. government's effort to provide a common baseline of cybersecurity tools across civilian agencies now is available to 97 percent of the departments—a milestone hit after the Department of Homeland Security (DHS), through the General Services Administration, awarded three orders under the Continuous Diagnostics and Mitigation (CDM) program. The orders now bring the number of federal agencies using the tools and services to shore up cyber vulnerabilities to 17.
The orders were awarded to Booz Allen Hamilton for $82 million, Northrop Grumman for $32 million and Hewlett Packard Enterprise Services for $21 million.
U.S. lawmakers launched a bipartisan bid to boost the Department of Homeland Security's powers to better oversee cybersecurity compliance by federal agencies and intervene when they might fail to safeguard their networks.
The Senate bill would strengthen the department's ability to enforce cybersecurity standards governmentwide, and “in the event that a federal agency chooses not to do so, [the] DHS would have the authority to stand in … and prevent worse damages from occurring,” Sen. Susan Collins (R-ME) said in announcing her plans to submit the bill to the full Senate on Tuesday.
The significant federal government cyberbreach that let hackers swipe the personal data of more than 4 million current and former federal employees has all the trappings of a targeted nation-state attack aimed at gleaning critical information on federal workers; and current cyber protection methods might not be enough to prevent future attacks, one expert says.
Hackers breached computer systems of the Office of Personnel Management (OPM) in December, stealing data including Social Security numbers, job assignments, performance reviews, insurance details and training certificates. Officials detected the breach in April.
Key challenges continue to plague U.S. federal agencies and contractors in the area of cybersecurity, particularly for civilian agencies that trail the robust cyberdefense efforts of the Defense Department and intelligence community, according to a congressional investigative office tasked with summarizing the volatile situation for lawmakers.
We all appreciate and value the opportunities to hear from government. The AFCEA Homeland Security Conference afforded industry and government officials alike the chance to talk and share ideas. One topic of conversation piqued my interest that I think will resonate with both industry and government.
The U.S. government-backed cybersecurity framework for the nation’s federal agencies and critical infrastructure sector—released one year ago today—has received a general thumbs up of approval from industry experts. The structured guideline, presented by the Department of Commerce’s National Institute of Standards and Technology (NIST), is proving a successful advent toward a better understanding of cyber risks and organizations’ vulnerabilities, and the development of security programs to protect networks.
Toffler Associates, Reston, Virginia, recently announced it has been selected by an agency within the Department of Homeland Security as the prime contractor to provide strategic integration support services. The awarded blanket purchase agreement includes a total potential value of $50 million over five years (one-year base and four one-year option periods). Under the agency's strategic integration vehicle, Toffler Associates will provide mission critical operational integration, requirements development, analysis and improvement, organizational effectiveness and communications support services.
The McKenna Principals Incorporated, Woodbridge, Virginia, has been awarded a $9,448,830 cost-plus fixed-fee contract for software development. This contract provides for development, testing and demonstration of software and architecture for the Department of Homeland Security. Work will be performed at Woodbridge, Virginia, and Washington, D.C., with an expected completion date of September 30, 2017. Fiscal 2014 research, development, test and evaluation funds in the amount of $3,295,750 are being obligated at the time of award. The Air Force Research Laboratory, Rome, New York, is the contracting activity (FA8750-14-C-0210).
The Department of Homeland Security (DHS) is looking to replace its Automated Biometric Identification System, or IDENT, in the next two to four years, an official with the department says. IDENT is DHS's central system for storing and processing biometric and associated biographic information for various homeland security purposes.
Integrated Microwave Technologies LLC (IMT), Mount Olive, N.J., has been awarded a Technical Investigative Surveillance (TechOps) contract by the U.S. Department of Homeland Security. IMT’s contract is a competitive five-year Indefinite Delivery, Indefinite Quantity agreement, awarded in the video category, which includes covert video equipment such as transmitters and receivers offering mobile, fixed and multiple concealment technologies. IMT will deliver interoperable technical investigative surveillance solutions in support of federal agency requirements.
The Department of Homeland Security Science and Technology Directorate (DHS S&T) has awarded 34 contracts to 29 academic and research organizations for research and development of solutions to cyber security challenges. The contracts were awarded by the DHS S&T Cyber Security Division (CSD) under Broad Agency Announcement (BAA) 11-02 which solicited proposals in 14 technical topic areas aimed at improving security in federal networks and across the Internet while developing new and enhanced technologies for detecting, preventing and responding to cyber attacks on the nation’s critical information infrastructure.
Despite the cloture motion on Thursday that ended any chance of the U.S. Senate passing the Cybersecurity Act of 2012 before the August recess (see SIGNAL Online Exclusive "Senate Now Unlikely to Pass Cybersecurity Bill Before Recess"), others are still hard at work behind the scenes in other venues on the very security this act would have addressed.