The strongest assembled securities available today can’t fully safeguard the nation’s critical infrastructure assets. But the good news is that these vulnerabilities are front and center on official radars and primed for increased attention. For starters, the Department of Homeland Security (DHS) has designated November as Critical Infrastructure Security and Resilience (CISR) month.
Department of Homeland Security (DHS) Secretary Jeh C. Johnson gave a report on the department’s progress in cyber hiring, announcing more than 120 new employees.
The announcement comes during National Cybersecurity Awareness Month. “Cybersecurity has been one of our department’s most important missions, and hiring top cyber talent is crucial to our success in that mission,” he said in the statement.
The U.S. Coast Guard announced the service’s sixth national security cutter, Munro, will be commissioned April 1, 2017, at the Smith Cove Terminal in Seattle.
The cutter will be home ported in Alameda, California, and is named after Signalman First Class Douglas A. Munro, the Coast Guard’s only Medal of Honor recipient.
The future of wearable technologies will plug people—from head to toe—into the Internet using smart clothing embedded with sensors connected to smartphones that can relay an abundance of environmental, health and fitness information to apps that track users’ well-being. Designers are even creating tattoolike devices that gather data through skin contact and transmit it wirelessly to smartphones and remote diagnostic facilities.
It’s not easy for some women to find their voices among the cacophonous male-dominated chatter of the technology world, much less getting it heard by others—especially leaders.
How should women handle the frustrating problem of posing a question during a staff meeting, only to have it fall on deaf ears—an issue made worse when she then slides a sticky note to a male peer who asks it, gets it acknowledged and earns praise for it?
Elusive criminals are about to meet their match. Advances in forensic DNA profiling soon will give investigators and analysts the ability to pull genetic data once considered disposable. The breakthrough allows law enforcement to generate information such as gender, hair and eye color, ethnicity and geographic origin from the DNA samples of perpetrators who otherwise might evade detection if they were not part of a DNA database. Gone are the days when nonmatching DNA samples signified a dead end.
The steady drumbeat of horrific terrorist attacks continues across our country and around the world. Most of these attacks are rooted in religious extremism, yet our administration and Congress keep debating terrorism terminologies and causes rather than taking aggressive and meaningful bipartisan steps that clearly identify the threats and lay out a comprehensive strategy to mitigate them. I am convinced that we will continue to struggle against extremist and other mass-murder threats until we come up with unified national positions on terrorism and gun control that most Americans can understand, accept and support.
Now that the federal government is collecting cyberthreat intelligence from agencies and private businesses, the repository undoubtedly will be a prime target by the very threat the program seeks to wipe out.
In June, the Departments of Homeland Security and Justice issued final guidance for the Cybersecurity Information Sharing Act (CISA) of 2015, which Congress passed in December after years of industry efforts to push information sharing legislation over the finish line.
CISA paves the way for private companies to share cyberthreat information, not just with each other but with the government, and appointed the Department of Homeland Security (DHS) as the clearinghouse for all of that data.
Implicit biases—such as girls aren't as good as boys in science and math—have hampered advancements in work force diversity for decades. But what does it mean when girls themselves perpetuate the damaging erroneous stereotype? What can be done to entice girls to pursue classes in science, technology, engineering and mathematics (STEM) before they lose interest? Most people hold unconscious, implicit assumptions that influence their judgments and perceptions of others. People sometimes apply the biases unintentionally, which results in actions or the absence of action that can reduce the quality of the work force and create unfair and destructive environments.
The Department of Homeland Security Science and Technology (S&T) Directorate will host two industry days to provide additional insights to the mobile and cellular industry and researchers about the Mobile Threats and Defenses request for information (RFI).
SIGNAL Media continues with its multi-month project to highlight women in the fields of science, technology, engineering and mathematics, most commonly referred to as STEM. Today, we highlight the importance of appealing to the passions of the high-tech work force that seeks to make global differences; the positive impact of networking; and addressing the issue of equal pay and acknowledgement.
The greatest threat facing the U.S. homeland mixes both internal and external enemies, according to the Department of Homeland Security's undersecretary for intelligence and analysis. Homegrown violent extremists influenced by overseas radical ideologues top the list of hazards confronting the public and private sectors in their efforts to secure the country.
Many overseas terrorist organizations still see the United States as the enemy and a roadblock to achieving their objectives. But the threat within now grabs the lion’s share of attention from the Department of Homeland Security (DHS) as well as from intelligence and law enforcement groups that strive to stay a step ahead of terrorists.
Cloud computing, mobile devices and apps and automation are some of the top technologies that will affect the future of homeland security, according to a panel of technology officers at the 2016 AFCEA Homeland Security Conference in Washington, D.C.
“If you talk about technologies we’re really leaning on today, of course it’s the usual suspects. We really do need to make better use of virtualized infrastructure, i.e. cloud technologies and services,” said Michael Hermus, chief technology officer, Department of Homeland Security (DHS).
The Department of Homeland Security (DHS) may sometimes seem like a confused teenager, but it is growing and maturing and striving to make the country stronger, reports Russell Deyo, the DHS undersecretary for management.
The U.S. Department of Homeland Security (DHS) is seeking wearable computers to monitor the canines used to protect U.S. borders. The department also seeks a Global Travel Assessment system and Internet of Things security solutions, officials told the 2016 AFCEA Homeland Security Conference audience.
The Department of Homeland Security (DHS) is taking steps to improve the Einstein system, which provides cyber situational awareness across government agencies.
The Einstein system was instrumental in helping to uncover the massive breach into the Office of Personnel and Management’s (OPM) networks, according to Phyllis Schneck, deputy under secretary for cybersecurity and communications, National Protection and Programs Directorate (NPPD), DHS.
Anyone walking into the Air and Marine Operations Center may at first be impressed with the numerous workstations, the big screens and live video flowing in from cameras mounted on planes and data flowing from a variety of sensors in the United States and elsewhere. But first impressions can be deceiving.
“There’s lots of data flowing in, but it still looks like 1969 in the NASA space center. That model hasn’t changed much,” said Tony Crowder, director of the Customs and Border Protection (CBP) Air and Marine Operations Center.
U.S. Customs and Border Protection (CBP) started a pilot program last week at Hartsfield–Jackson Atlanta International Airport to collect biometrics on passengers leaving the country. This marks the first time the United States has collected such information. A CBP official said the government released a request for information last night and hopes to release a request for proposals next year.
U.S. Department of Homeland Security researchers are pursuing possible partnerships—both domestically and internationally—to continue developing a toolkit that provides access to the digital data stored by cars used in crimes, including terrorist acts.