Homeland Security

October 1, 2014
By George I. Seffers
Unmanned air vehicles, such as the Global Hawk, can provide full-motion video and other intelligence, surveillance and reconnaissance data directly special operators equipped with the NG-TacMN.

U.S. Defense Department and interagency special operators are scheduled to begin receiving new tactical mesh networking equipment this month. The kit provides a mobile, ad hoc, self-healing network that offers a full range of situational awareness data, including intelligence, surveillance and reconnaissance feeds, blue force tracking and a voice over Internet protocol capability.

September 4, 2014
By Sandra Jontz

U.S. Secretary of Commerce Penny Pritzker appointed five experts as new board members for the First Responder Network Authority, a nascent independent board tasked by Congress to develop the first-ever nationwide EMS network.

Better known as FirstNet, the endeavor falls under the Commerce Department’s National Telecommunications and Information Administration (NTIA), and will be a wireless public safety broadband network to provide better communications technology for police, fire and rescue personnel.

Pritzker appointed Thursday the following individuals:

August 21, 2014
By Sandra Jontz

U.S. border patrol agents watched on surveillance videos as suspected drug smugglers chatted on cellular phones. But when agents sought phone records for investigations into the suspected nefarious activity along the Texas-Mexico divide, commercial service providers came up empty-handed. There simply were no logs. How were the smugglers evading commercial providers?

U.S. Customs and Border Protection turned to Lockheed Martin for its LUMEN Active Defense technology of sensors that can help detect rogue cellular base stations devised to circumvent cellular service providers.

August 1, 2014
By Robert K. Ackerman

The price of failure to provide adequate cybersecurity ultimately may be too high for any nation to tolerate. Yet, the cost of effective cybersecurity may be too much for a nation to afford. The consequences of a damaging cyberattack on a part of the critical infrastructure could be catastrophic, yet securing national capabilities from cyberattack will require more than just government or industry action. Both groups must work in concert to produce results that are greater than the sum of their parts, but no single approach to cybersecurity will work to protect the diverse government and commercial assets that are both extremely vulnerable and highly critical to a nation’s well-being.

July 3, 2014
By Sandra Jontz

The Department of Homeland Security’s (DHS) newly released strategic priorities for the next four years differ little from its vision in the Quadrennial Homeland Security Review (QHSR) of 2010, though officials recognize the need for tweaks to mission points as it works to address emerging threats to national security.

The department’s in-house assessment, mandated by Congress, spotlights its five security missions as combating threats of terrorism, both foreign and domestic; securing and managing U.S. borders; enforcing immigration laws; safeguarding cyberspace; and strengthening national preparedness and resiliency.

July 2, 2014
By George I. Seffers

The Instant Eye small unmanned aerial system received approval last Thursday from the Federal Aviation Administration (FAA) to be used by an energy company, which will conduct research, development and training to see if the system is practical for inspecting infrastructure such as pipelines, power lines and insulators on towers. It is the first unmanned quadrotor to receive FAA certification and may be the lightest aircraft ever certified. The approval opens the door for the system to be used for a wide range of commercial applications.

August 1, 2014
By George I. Seffers
The rapid fielding office within the Pentagon helped develop the Accelerated Nuclear DNA Equipment system, which can process five DNA samples in about 90 minutes.

With the war in Afghanistan winding down, the U.S. Defense Department’s rapid deployment office, which specializes in identifying, developing and quickly fielding game-changing technologies, now will take a more long-term approach. Slightly stretching out the process will offer more flexibility to procure the best possible systems, will present more opportunities for interagency and international cooperation and may cut costs.

June 11, 2014
By Sandra Jontz

The Department of Homeland Security (DHS) has canceled the new generation of autonomous biodetection program after a Congressional oversight committee criticized the department’s acquisition process.

The biodetection program called BioWatch Generation-3 (Gen-3) would have operated 24 hours a day, year round in U.S. population centers to continuously monitor the air for agents of biological concern and give officials an early warning capability.

June 1, 2014
By Rita Boland
Virginia National Guard soldiers from the Fairfax-based Data Processing Unit respond to a simulated cyber attack during a cyberdefense exercise.

Cybersecurity remains a priority for the U.S. Defense Department, with officials protecting resources for it in the face of overall budget constraints. Guidance from the National Defense Authorization Act for Fiscal Year 2014 directs a mission analysis of cybercapabilities not only in the active military, but also across partners, to help forces maintain their edge in protecting the nation.

June 1, 2014
By George I. Seffers
Smoke drifts into the sky from buildings and houses hit by shelling in Homs, Syria. Many Jihadi fighters leaving Syria will funnel through the Balkans and may pose a threat to other parts of the world.

In the coming months, extremists fighting in the Syrian civil war likely will begin returning to Europe, funneling through the Balkans where they can find cheap weapons, like-minded allies and temporary accomplices in the form of organized criminal groups. Conditions are ripe, according to experts, for those individuals to spread across Europe, launching terrorist attacks on major cities.

April 30, 2014
By George I. Seffers

Intelligence agencies could have investigated more thoroughly and shared information more effectively, but even if they had performed perfectly, they may not have been able to prevent last year’s Boston Marathon bombing, according to a report delivered today before the Senate Homeland Security and Governmental Affairs Committee.

May 1, 2014
By George I. Seffers

Dealing with the world’s increasing complexity is the primary challenge to keeping the homeland secure, according to Adm. Thad Allen, USCG, (Ret.), executive vice president of Booz Allen Hamilton and former commandant of the U.S. Coast Guard. He lists border security, the cyberthreat, information sharing, terrorism, criminal organizations and climate change as elements adding to that complexity.

“We have to start understanding that the root problem we’re trying to deal with is to defeat complexities that inhibit working across boundaries to deliver solutions,” he said while serving as the morning keynote speaker on the first day of the AFCEA Homeland Security Conference in Washington, D.C., in March.

March 12, 2014
By George I. Seffers

Officials from across the Homeland Security Department (DHS) stressed the need for strong partnerships during the third and final day of the AFCEA Homeland Security Conference, Washington, D.C.

Luke McCormack, DHS chief information officer, and Nick Nayak, DHS chief procurement officer, set the tone for the day while sharing the morning’s welcome message. McCormack related that when he first started his job, Nayak phoned him up, called him “Cool Hand Luke,” and offered to help in any way he could. “It was at that moment we formed a partnership, and it has been growing stronger every day,” McCormack recalled.

March 10, 2014
By George I. Seffers

Homeland Security Conference Show Daily, Day 1

Information sharing and interoperability have come a long way since the terrorist attacks of September 11, 2001, but challenges still remain, agreed speakers and panelists on the first day of the AFCEA Homeland Security Conference in Washington, D.C.

March 11, 2014
By George I. Seffers

Homeland Security Conference 2014 Online Show Daily, Day 2

It is not surprising that cybersecurity would dominate the discussion on the second day of the AFCEA Homeland Security Conference in Washington, D.C. But the depth and breadth and variety of topics surrounding cybersecurity and information protection in all its forms indicates the degree to which the information security mission has engulfed every department and agency at all levels of government.

February 14, 2014
By Robert K. Ackerman
(r-l) Capt. Dale Rielage, USN; Capt. Stuart Belt, USN; Capt. David A. Adams, USN; Capt. James Fanell, USN; Dr. James R. Holmes; and panel moderator Rear Adm. James G. Foggo III, USN, exchange views in a panel titled “What About China?”

West 2014 Online Show Daily, Day 3

Quote of the Day:

“We have global responsibilities. We will not be able to do less with less. We will do the same with less.”—Gen. James F. Amos, USMC, commandant of the U.S. Marine Corps

March 1, 2014
By Kent R. Schneider

Even though the Cold War has ended and the monolithic threat against the West has disappeared, the relationship between Europe and the United States remains vital. Europe includes some of the United States’ strongest coalition partners and alliances; the two economies are closely tied and interdependent; and defense and security in Europe are evolving rapidly, just as in the United States. AFCEA chapters and members outside the United States number the greatest in Europe.

March 1, 2014
By George I. Seffers
The U.S. Secret Service Electronic Crimes Task Forces target criminals who use technology to target financial systems.

U.S. Secret Service officials are establishing two new cybercrime task forces—in Cincinnati and Denver—that will enhance the agency’s ability to detect and investigate information technology-related crimes, including credit card theft, attacks on the banking and finance infrastructure and identity fraud.

March 1, 2014
By Rita Boland
U.S. Immigration and Customs Enforcement’s Homeland Security Investigations (HSI) directorate is involved in a multilayer security approach to protecting U.S. interests.

Homeland security officials are battling privacy and technology issues amid the new social media era that offers both challenges and opportunities. Just as new technologies and information sharing architectures have improved interagency data sharing, new sources of potentially valuable information have emerged to vex planners who must handle technical obstacles and personal rights.

March 1, 2014
By George I. Seffers
U.S. Coast Guard Cutter Sapelo and Royal Netherlands Navy Offshore Patrol Vessel HNLMS Holland search Caribbean Sea waters for bales of contraband. SeaWatch is the Coast Guard’s next-generation command and control system for cutters.

By the end of this fiscal year, the next-generation command and control system for much of the cutter fleet should be installed on the U.S. Coast Guard’s 270-foot cutter class, and the system is now being considered for inclusion on 225-foot and 110-foot vessels. The system, called SeaWatch, combines navigational and tactical, optical surveillance and communications into one situational awareness picture; provides commonality across the fleet; and replaces an aging system that has outlived its usefulness.

Pages