Homeland Security

February 2006
By Maryann Lawlor

February 2006
By Clarence A. Robinson Jr.

February 2006
By Maryann Lawlor

 
Transportation Security Administration (TSA) personnel use technology to screen and share operational data about its operations with airport personnel as well as other government agencies.
New policies and procedures address issues raised by inspector general report.

July 2005
By Maryann Lawlor

 
The command center of the Cheyenne Mountain Operations Center, North American Aerospace Defense Command (NORAD), is the fusion center for data from other centers within the command. Portal technology will improve information sharing among personnel at NORAD, the U.S. Northern Command (NORTHCOM), other combatant commands and Canada
Decision makers can let their fingers do the talking.

June 2005
By Col. William Tyndall, USA, and Lt. Col. Tim Mishkofski, USA, (Ret.)

February 2005
By Henry S. Kenyon

 
The Multimedia Art Processing System (MAPS) is designed to automatically translate and transcribe foreign media broadcasts for analysis. The system's translation software provides a rough translation of a broadcast. MAPS can translate up to six media feeds simultaneously and perform key-word searches through live and recorded broadcasts.

February 2005
By Maryann Lawlor

 
An HH-65 Dolphin stationed at Air Station Houston examines a ship inbound for the Houston Ship Channel. Patrolling from the air is one way the U.S. Coast Guard is incresing martime domain awareness (MDA).

Top-down intelligence will boost security.

February 2005
By Robert K. Ackerman

 
The Washington, D.C., Metropolitan Police Department's Joint Operations Command Center, or JOCC, includes a wall of displays that can show informatoin ranging from three-dimensional simulated fly-throughs to live video feeds from around the district. On each side wall is a live radar feed from Reagan National Airport. 

February 2005
By Henry S. Kenyon

 
An industry report by the Civitas Group LLC indicates that the market for homeland-security-related products and applications continues to grow. Consolidation among security service providers is driving much of this expansion. 

Firms attract customers with packaged service offerings, move away from stand-alone products.

November 2001
By Clarence A. Robinson Jr.

Data correlation technology enables tracking seemingly unrelated movements of terrorist cell members.

While U.S. military forces retaliate against terrorists for the horrific World Trade Center and Pentagon attacks, the Bush administration also is organizing to help shield the nation’s critical information infrastructure. The White House is establishing U.S. cybersecurity functions under a single individual. That person will function as the president’s special adviser for cybersecurity, reporting directly to both the new cabinet-level Office of Homeland Security and the National Security Adviser Condoleezza Rice.

November 2001
By Clarence A. Robinson Jr.

Terrorists target homeland, civilian-owned infrastructures that are key to most military functions.

The Bush administration’s declaration of war on terrorism allows federal organizations such as the National Security Agency to expand their electronic intelligence-gathering practices. With initial deployment of U.S. forces to the Middle East, demand to locate hostile terrorist cells and their support mechanisms immediately is rising, both in the United States and overseas. In addition, what had been a gradually growing requirement for U.S. forces to conduct information operations, including computer network offense and defense, is now switching to fast forward.

December 2001
By Maryann Lawlor

U.S. military brings knowledge gained from experiments to bear on current challenges.

The war on terrorism and heightened homeland security are prompting the U.S. military to re-evaluate its priorities and accelerate the use of strategic concepts that only months ago were in the experimental stage. Although some of the tactical approaches are not in the polished form they would have been in several years from now, certain aspects can and are making their way into today’s efforts.

December 2001
By Sharon Berry

Network security detect-and-react model evolves into a system that forecasts and neutralizes cyberassaults.

Defensive information warfare posturing traditionally has taken the form of security—passwords, firewalls and locked doors. But with less than 100 percent confidence that intruders can be kept out of information systems, a U.S. Air Force and industry team is developing a fundamentally different defensive approach. They are creating a prototype that provides advanced warning of attacks on U.S. Defense Department systems so they are prepared when security is breached.

December 2001
By Dr. Roger Smith

New technologies can unravel the complexities of global rogue organizations.

The United States has been using simulations for decades to explore the capabilities of its military forces and train soldiers to perform their missions better. In the war against terrorism, however, this technology can come out of the training centers and into the operations centers to support the country and its allies in fighting this new type of war and enhance homeland security.

January 2002
By Robert K. Ackerman

Searching for weapons of mass destruction spawns spin-offs that can serve homeland security.

While analysts now are keeping a sharper eye on possible weapons proliferation, some of the technologies they employ may play an increasingly important role in maintaining homeland security. In the wake of the September 11 attacks on the United States, experts charged with detecting overseas programs to develop weapons of mass destruction are refocusing their efforts on a new list of nations that pose more immediate threats.

February 2002
By Maryann Lawlor

Defense Emergency Preparedness Moves Into Cyberspace.

Technology is liberating the U.S. Defense Department from the chains of a single location by enabling it to become a network-centric department. The initiative to create a virtual Pentagon calls for taking advantage of advances in networking, Internet protocol, videoconferencing, mass storage and data transmitting technologies. These capabilities would allow military personnel to continue to collaborate and communicate in emergency situations even if systems within the Pentagon are damaged.

October 2004
By Cheryl Lilie

 
The Joint Protection Enterprise Network (JPEN) allows gate officers to document suspicious or repetitive activity such as a vehicle that has been denied base entry. Once the information is entered, personnel at nearby bases can be notified immediately to be on the lookout for the same vehicle.
Web-based network provides situational awareness across military installations.

October 2004
By Robert K. Ackerman

 
The U.S. Northern Command’s (NORTHCOM’s) situational awareness room monitors a range of conditions across the United States. The command must incorporate threat intelligence from overseas combatant commands with reports on domestic concerns such as natural disasters to carry out its homeland missions.
Intelligence, information sharing require different approaches.

April 2002
By Robert K. Ackerman

The attacks on the United States have opened a new Pandora’s box of terrorism.

Networked terror groups, domestic radicals, renegade states and terror for profit all threaten Western democracies to an unprecedented degree. Prospective targets might be high-profile infrastructure assets with the potential for high casualty totals, or they might simply take the form of attacks on public institutions to rapidly erode confidence in governments.

April 2002
By Robert K. Ackerman

Cold War constructs are ill-suited for anti-terrorist warfare.

As successful as operation Enduring Freedom has been on the battlefields of Afghanistan, the lack of organizational reform in domestic U.S. agencies threatens the battle on the war’s other front—the United States. Despite increased security measures and the heightened state of alert on the part of the public, the country is still highly vulnerable to further attacks by terrorists.

Pages