The U.S. Department of Homeland Security is seeking participants for the Software Assurance Marketplace (SWAMP), which is expected to open to beta users in January. The ultimate goal for the marketplace is to help protect the nation’s critical infrastructure by improving software used for essential functions, such as electrical power, gas and oil, and banking and finance. Potential participants are invited to register at the continuous assurance website.
Work has begun at the federal level to develop a nationwide dedicated, reliable network, which will provide advanced data communications capabilities to police officers, firefighters and other emergency personnel. The First Responder Network Authority (FirstNet) will enable public safety personnel to make cellular-quality calls and send data, video, images and text—similar to the capabilities offered on commercial networks. Incident commanders and local officials will have priority access and control over the network. Interoperability issues that result from stovepiped local systems, geographic limitations and other regional constraints also will be resolved.
Biometrics is on the verge of becoming more pervasive than ever in everyday life, setting the stage for personal identifiers to take the place of other common security measures. The expansion mirrors increased usage in fields such as military operations, citizen enrollment and public safety.
The FBI is on schedule to finish implementing next-generation biometric capabilities, including palm, iris and face recognition, in the summer of next year. New technology processes data more rapidly, provides more accurate information and improves criminal identification and crime-solving abilities.
The working group that helped solve the coalition interoperability puzzle in Afghanistan is working across the U.S. Defense Department and with other nations to ensure that the lessons learned will be applied to future operations around the globe. Experience in creating the Afghan Mission Network may benefit warfighters worldwide, such as those in the Asia Pacific, and may even be applied to other missions, including homeland security and humanitarian assistance.
Domestic security officials aim to replace human divers with an autonomous underwater vehicle whose design is derived from nature: the tuna, one of the fastest and most maneuverable fish in the sea. The vehicle would be used primarily to inspect ship hulls for contraband, saving divers from hazardous trips into hard-to-reach areas below the waterline where oil and other toxic chemicals are part of the mix. Designers also envision the tuna-modeled robot could also be used for search and rescue missions.
Researchers at one of the premier national laboratories in the United States are prepared to hand the Defense Department a prototype system that compresses imagery without losing the quality of vital data. The system reduces the volume of information; allows imagery to be transmitted long distances, even across faulty communications links; and allows the data to be analyzed more efficiently and effectively.
AFCEA Global Intelligence Forum Online Show Daily, Day 2
Quote of the Day:
“Whether it is national security information for the president, or financial information for a chief executive, when you don’t know whether the data is true or false, it’s a really bad day.”—Sean Kanuck, national intelligence officer for cyber at the National Intelligence Council in the Office of the Director of National Intelligence
Industry officials foresee changes in network security.
Cyber industry experts predict a number of coming developments in the cyber realm, driven in part by government strategy and funding uncertainties. The future may include a greater reliance on law enforcement to solve state-sponsored hacks, increased automation and more outsourcing.
U.S. companies are closely monitoring foreign-sourced hardware, but other measures may loom.
Constant monitoring of the telecommunications supply chain by U.S. network providers has ensured the integrity of foreign-made equipment, but the U.S. government tentatively is exploring efforts to establish standards for companies to focus supply chain efforts. Other countries have incorporated more stringent approaches that might be implemented in the United States. U.S. government experts believe, however, that some of those approaches might actually be counterproductive if adopted by U.S. firms.
The United States must “normalize” cyberspace operations if it is to protect and defend cyber assets, including the critical infrastructure, according to the commander of the U.S. Cyber Command (CYBERCOM). Gen. Keith B. Alexander, USA, who also is the director of the National Security Agency (NSA) and the Central Security Service (CSS), told the Senate Committee on Appropriations Wednesday that the nation faces “diverse and persistent threats” that cannot be countered through the efforts of any single organization.
Cyberspace offers a wealth of options for evildoers seeking to bring down a nation.
Digital marauders have set their sights on the critical infrastructure and are likely to strike soon with major effect. Several different elements of the infrastructure are vulnerable to attack by all manner of cyberspace players ranging from malevolent individuals to hostile nation-states.
Industry and government search for for the best approach for the rapid recovery of a key element of the electrical grid in the event of an attack.
One of the most crucial elements of the nation’s critical infrastructure is gradually getting the attention it believes it deserves from both the electrical power industry and the federal government. In the years to come, that effort could finally yield agreement on how best to design and implement badly needed upgrades to a key component to the daily operation of the power grid—electrical transformers—and how they would be replaced in the event of a systemwide failure or an attack on the grid itself.
The synergy between operational planning and radar sensing provides enhanced search and rescue capabilities.
The U.S. Coast Guard is combining high-frequency coastal radar data with traditional oceanographic and geographic information to improve its chances of rescuing people in distress on the high seas. By merging these different sources of data, the Coast Guard enhances its search abilities while also providing better weather prediction for both its search and rescue teams and an endangered public in coastal areas.
Homeland Security Conference 2013 Show Daily, Day 3
Although many in government are moving as quickly as possible to adopt new technologies, such as cloud computing and mobile devices, individual agencies still face cultural challenges that sometimes prevent them from moving forward, according to officials speaking as part of the Chief Information Officer Council at the AFCEA Homeland Security conference in Washington, D.C.
A cloud project takes advantage of emerging concepts to protect energy against disruptive threats.
Researchers at Cornell University and Washington State University have teamed to create GridCloud, a software-based technology designed to reduce the time and difficulty involved with creating prototypes of smart-grid control paradigms. The system will help overcome hurdles of cloud computing in complex settings. The effort combines Cornell’s Isis2 platform, designed for high-assurance cloud computing, with Washington State’s GridStat technology for smart grid monitoring and control. The advent of this technology promises to boost both the security and the reliability of electrical services.
When it comes to popular smartphones and tablets, security can be a many-layered and necessary endeavor
The growing use of advanced mobile devices, coupled with the increase in wireless broadband speed, is fueling demand by employees to bring their own devices to the job. This situation has opened a new set of security challenges for information technology staff, especially when it comes to the use of apps.
Anyone who has attended an AFCEA conference in the past two months has heard the constant drumbeat from senior government leadership on the limitations on operations and readiness likely to occur in defense, intelligence and homeland security. At the AFCEA/USNI West 2013 Conference in San Diego January 29-31, the vice chairman of the Joint Chiefs of Staff told a packed audience that the U.S. Defense Department did not know how much money it would receive, when it would receive it or what the restrictions on its use would be.
Homeland Security Conference 2013 Show Daily, Day 2
In the aftermath of the 9/11 terrorist attacks, the military, government and intelligence officials all agreed that federal agencies needed to be more willing and able to share critical data to better connect the dots.
While agencies at all levels—federal state and local—have made progress, officials continue to push for ever greater sharing and cooperation, not just within government but with industry and the general public as well. For example, while the departments of Defense, Justice and Homeland Security can and do now share biometrics data housed in the disparate databases, they continue tweaking technology to improve data sharing even further.
Homeland Security Conference 2013 Show Daily, Day 1
All too often, cyber and physical protection are considered separately, when really they go hand-in-hand, according to experts speaking at the first day of the AFCEA Homeland Security Conference in Washington, D.C., February 26, 2013. The conference opened with a half-day of conversation about hackers, terrorists and natural disasters and addressed concerns involving both physical infrastructure and the cyber environment for all kinds of attacks, be they physical, virtual or even natural in origin.