The U.S. government is adopting changes to the cloud computing certification program that will better protect against potential insider threats. The improvements include additional penetration testing, more thorough testing of mobile devices, tighter controls over systems being carried from a facility and more stringent scrutiny of systems connecting from outside the network.
U.S. Defense Department and interagency special operators are scheduled to begin receiving new tactical mesh networking equipment this month. The kit provides a mobile, ad hoc, self-healing network that offers a full range of situational awareness data, including intelligence, surveillance and reconnaissance feeds, blue force tracking and a voice over Internet protocol capability.
U.S. Secretary of Commerce Penny Pritzker appointed five experts as new board members for the First Responder Network Authority, a nascent independent board tasked by Congress to develop the first-ever nationwide EMS network.
Better known as FirstNet, the endeavor falls under the Commerce Department’s National Telecommunications and Information Administration (NTIA), and will be a wireless public safety broadband network to provide better communications technology for police, fire and rescue personnel.
Pritzker appointed Thursday the following individuals:
U.S. border patrol agents watched on surveillance videos as suspected drug smugglers chatted on cellular phones. But when agents sought phone records for investigations into the suspected nefarious activity along the Texas-Mexico divide, commercial service providers came up empty-handed. There simply were no logs. How were the smugglers evading commercial providers?
U.S. Customs and Border Protection turned to Lockheed Martin for its LUMEN Active Defense technology of sensors that can help detect rogue cellular base stations devised to circumvent cellular service providers.
The price of failure to provide adequate cybersecurity ultimately may be too high for any nation to tolerate. Yet, the cost of effective cybersecurity may be too much for a nation to afford. The consequences of a damaging cyberattack on a part of the critical infrastructure could be catastrophic, yet securing national capabilities from cyberattack will require more than just government or industry action. Both groups must work in concert to produce results that are greater than the sum of their parts, but no single approach to cybersecurity will work to protect the diverse government and commercial assets that are both extremely vulnerable and highly critical to a nation’s well-being.
The Department of Homeland Security’s (DHS) newly released strategic priorities for the next four years differ little from its vision in the Quadrennial Homeland Security Review (QHSR) of 2010, though officials recognize the need for tweaks to mission points as it works to address emerging threats to national security.
The department’s in-house assessment, mandated by Congress, spotlights its five security missions as combating threats of terrorism, both foreign and domestic; securing and managing U.S. borders; enforcing immigration laws; safeguarding cyberspace; and strengthening national preparedness and resiliency.
The Instant Eye small unmanned aerial system received approval last Thursday from the Federal Aviation Administration (FAA) to be used by an energy company, which will conduct research, development and training to see if the system is practical for inspecting infrastructure such as pipelines, power lines and insulators on towers. It is the first unmanned quadrotor to receive FAA certification and may be the lightest aircraft ever certified. The approval opens the door for the system to be used for a wide range of commercial applications.
With the war in Afghanistan winding down, the U.S. Defense Department’s rapid deployment office, which specializes in identifying, developing and quickly fielding game-changing technologies, now will take a more long-term approach. Slightly stretching out the process will offer more flexibility to procure the best possible systems, will present more opportunities for interagency and international cooperation and may cut costs.
The Department of Homeland Security (DHS) has canceled the new generation of autonomous biodetection program after a Congressional oversight committee criticized the department’s acquisition process.
The biodetection program called BioWatch Generation-3 (Gen-3) would have operated 24 hours a day, year round in U.S. population centers to continuously monitor the air for agents of biological concern and give officials an early warning capability.
Cybersecurity remains a priority for the U.S. Defense Department, with officials protecting resources for it in the face of overall budget constraints. Guidance from the National Defense Authorization Act for Fiscal Year 2014 directs a mission analysis of cybercapabilities not only in the active military, but also across partners, to help forces maintain their edge in protecting the nation.
In the coming months, extremists fighting in the Syrian civil war likely will begin returning to Europe, funneling through the Balkans where they can find cheap weapons, like-minded allies and temporary accomplices in the form of organized criminal groups. Conditions are ripe, according to experts, for those individuals to spread across Europe, launching terrorist attacks on major cities.
Intelligence agencies could have investigated more thoroughly and shared information more effectively, but even if they had performed perfectly, they may not have been able to prevent last year’s Boston Marathon bombing, according to a report delivered today before the Senate Homeland Security and Governmental Affairs Committee.
Dealing with the world’s increasing complexity is the primary challenge to keeping the homeland secure, according to Adm. Thad Allen, USCG, (Ret.), executive vice president of Booz Allen Hamilton and former commandant of the U.S. Coast Guard. He lists border security, the cyberthreat, information sharing, terrorism, criminal organizations and climate change as elements adding to that complexity.
“We have to start understanding that the root problem we’re trying to deal with is to defeat complexities that inhibit working across boundaries to deliver solutions,” he said while serving as the morning keynote speaker on the first day of the AFCEA Homeland Security Conference in Washington, D.C., in March.
Officials from across the Homeland Security Department (DHS) stressed the need for strong partnerships during the third and final day of the AFCEA Homeland Security Conference, Washington, D.C.
Luke McCormack, DHS chief information officer, and Nick Nayak, DHS chief procurement officer, set the tone for the day while sharing the morning’s welcome message. McCormack related that when he first started his job, Nayak phoned him up, called him “Cool Hand Luke,” and offered to help in any way he could. “It was at that moment we formed a partnership, and it has been growing stronger every day,” McCormack recalled.
Homeland Security Conference Show Daily, Day 1
Information sharing and interoperability have come a long way since the terrorist attacks of September 11, 2001, but challenges still remain, agreed speakers and panelists on the first day of the AFCEA Homeland Security Conference in Washington, D.C.
Homeland Security Conference 2014 Online Show Daily, Day 2
It is not surprising that cybersecurity would dominate the discussion on the second day of the AFCEA Homeland Security Conference in Washington, D.C. But the depth and breadth and variety of topics surrounding cybersecurity and information protection in all its forms indicates the degree to which the information security mission has engulfed every department and agency at all levels of government.
West 2014 Online Show Daily, Day 3
Quote of the Day:
“We have global responsibilities. We will not be able to do less with less. We will do the same with less.”—Gen. James F. Amos, USMC, commandant of the U.S. Marine Corps
Even though the Cold War has ended and the monolithic threat against the West has disappeared, the relationship between Europe and the United States remains vital. Europe includes some of the United States’ strongest coalition partners and alliances; the two economies are closely tied and interdependent; and defense and security in Europe are evolving rapidly, just as in the United States. AFCEA chapters and members outside the United States number the greatest in Europe.
U.S. Secret Service officials are establishing two new cybercrime task forces—in Cincinnati and Denver—that will enhance the agency’s ability to detect and investigate information technology-related crimes, including credit card theft, attacks on the banking and finance infrastructure and identity fraud.
By the end of this fiscal year, the next-generation command and control system for much of the cutter fleet should be installed on the U.S. Coast Guard’s 270-foot cutter class, and the system is now being considered for inclusion on 225-foot and 110-foot vessels. The system, called SeaWatch, combines navigational and tactical, optical surveillance and communications into one situational awareness picture; provides commonality across the fleet; and replaces an aging system that has outlived its usefulness.