Knowing the cybersecurity threat might be half the battle toward mitigating problems, but the popular push and mounting trend toward increased information sharing, particularly between industry and the federal government, is not the be all and end all, according to one security expert.
The U.S. House of Representatives on Tuesday ended its stalemate and voted to fund the Department of Homeland Security though the end of the fiscal year in September. The vote means the department avoids a shutdown and the furloughing of staff members.
Lawmakers voted 257-167, with most Republicans voting against the bill. The Senate had passed its version of a clean bill last week. President Barack Obama is expected to sign it.
At issue was a mostly Republican-led disagreement over the White House’s controversial immigration order to grant temporary work permits to an estimated five million immigrants who entered the United States illegally. The bill passed Tuesday carries no immigration provisions.
The next big cyber attack likely will strike critical infrastructure assets in the United States, which could bring the world’s remaining superpower to its knees, according to cybersecurity experts. This would constitute a crippling assault against national assets such as power facilities, transportation networks, nuclear plants or the drinking water supply, these experts warn.
Secretary of Homeland Security Jeh Johnson voiced a hesitant optimism Thursday that U.S. Congress will come together to fully fund the department before tomorrow’s deadline that could shutter parts of the Department of Homeland Security (DHS).
Without a successful vote by Congress, at 12:01 a.m. Saturday, the DHS will begin furloughing about 30,000 employees, including most of the headquarters staff, while another 200,000 will work without pay, Johnson said during a press briefing to discuss the need for Congress to pass an appropriations bill to fully fund the department.
The U.S. Coast Guard is engaged in a major overhaul of airborne reconnaissance capabilities. Ultimately, the various aviation reconnaissance programs will allow the service to shed aging platforms, add unmanned systems, enhance interoperability, improve efficiency and perform its missions more effectively.
The Coast Guard is adding three types of manned, fixed-wing aircraft to its overall reconnaissance fleet—the HC-130J long-range surveillance aircraft and the HC-144A and C-27J, both of which are medium-range reconnaissance platforms. The service also is investigating the possibility of adding small unmanned aerial systems (UASs) in the short term and larger UASs over the long term.
In case you missed it, CBS’s newsmagazine "60 Minutes" this weekend featured a segment with Dan Kaufman, director of the Information Innovation Office (I2O) for the Defense Advanced Research Projects Agency (DARPA), who talked about the office’s efforts to outsmart hackers, sex traffickers and those seeking to do harm to the United States.
After a successful three-year logistics run in Afghanistan aiding the U.S. Marine Corps, an unmanned aerial asset may be repurposed for battles of a slightly different kind, if officials from the Department of the Interior have their way. The unmanned version of the K-MAX medium-lift helicopter, used in the war zone to ferry cargo, might find a new mission in the United States—fighting wildfires under the purview of the federal agency tasked with protecting the country’s natural resources.
Contrary to popular belief, illegal crossings along the southern border of the United States are at their lowest levels since the 1970s, according to Jeh Johnson, secretary of the Homeland Security Department (DHS), who is calling on Congress to pass a 2015 appropriations bill to fund additional security measures for border protection and homeland security.
I know what you’re thinking—cockroach karaoke! But that’s just not right.
North Carolina State University researchers have developed technology that allows cyborg cockroaches, or biobots, to pick up sounds with small microphones and seek out the source of the sound. The technology is designed to help emergency personnel find and rescue survivors in the aftermath of a disaster.
Podcasts are the audio on-demand equivalent of video these days. They are a bit more portable because anyone with a smartphone or tablet can tune in and catch up on episodes—not only all the time but also wherever they want. It’s a bit difficult to watch a movie while driving, although it’s been done. Podcasts also feature one other capability that on-demand viewing does not facilitate: audience participation.
The most dangerous threat to the United States may come from cyberspace rather than terrorists, according to a panel of experts. A cyberspace attack could wreak damage that would change the nature of the country, they suggested.
This was one of many issues discussed by a panel on cyber and intelligence on day two of TechNet Asia-Pacific 2014, being held in Honolulu December 9-11. The panelists offered that cyber and terrorism are the most realistic threats facing the United States.
The contractor that facilitates enrollment in the U.S. Transportation Security Administration’s PreCheck program developed an enrollment option to let employees of participating organizations sign up at their offices, saving them the trip to an airport or off-site enrollment center.
The U.S. Department of Commerce, Washington, D.C., today announced the consolidated screening list (CSL), a streamlined collection of nine different screening lists from the U.S. Departments of Commerce, State and the Treasury that contains names of individuals and companies with whom a U.S. company may not be allowed to do business due to U.S. export regulations, sanctions or other restrictions. The CSL is designed to make it easier for U.S. companies to comply with export laws.
You would think it would go without saying, but apparently not. So a U.S. Transportation Security Administration representative wrote a brief blog on a few Halloween travel tips if travelers are taking flight with costumes in tow.
It’s OK travel with some types of realistic replica items and props in checked luggage, but anything resembling a bomb or explosive is a no-no. Items that look like grenades, land mines, rocket launchers, shells or bombs cannot be taken on airplanes, even if they are toys or replicas.
Toffler Associates, Reston, Virginia, recently announced it has been selected by an agency within the Department of Homeland Security as the prime contractor to provide strategic integration support services. The awarded blanket purchase agreement includes a total potential value of $50 million over five years (one-year base and four one-year option periods). Under the agency's strategic integration vehicle, Toffler Associates will provide mission critical operational integration, requirements development, analysis and improvement, organizational effectiveness and communications support services.
PositiveID Corporation, Delray Beach, Florida, has announced that it, in conjunction with its partner, ENSCO Inc., has been awarded a SenseNet Program contract from the U.S. Department of the Interior on behalf of the U.S. Department of Homeland Security Science & Technology Directorate. The goal of this SenseNet award is to implement faster, less expensive bio-threat detection systems, using existing infrastructure where possible, to provide an added level of security.
Rep. Michael McCaul (R-TX), chairman of the House Committee on Homeland Security, released a proposal to secure the border entitled “Blueprint for Southern Border Security.” The proposal calls for a broad mix of technologies, including radar, manned or unmanned aircraft, aerostats and unattended ground sensors. The technologies deployed should be as varied as the terrain.
The Federal Bureau of Investigation (FBI) has transformed into an organization with intelligence as its core of operations, according to its director. This approach strengthens the bureau’s traditional activities of crime solving, and it enhances its work protecting the country against enemies within its borders.
In a closing plenary speech, FBI Director James Comey described these activities at the AFCEA/INSA Intelligence and National Security Summit 2014, held September 18-19 in Washington, D.C. Comey explained that the bureau built on reforms begun by his predecessor, and they give the FBI increased strength in all its operations.
The director of the Federal Bureau of Investigation (FBI) views cyberspace as one of the bureau’s top priorities across its entire mission set. Not only is economic national security threatened from cyberspace, it also may hold clues to deterring and preventing crimes—if the bureau can exploit it effectively.
“Cyber touches everything I’m responsible for,” said FBI director James Comey. “It’s not a thing, it’s a way.” Comey described the important of cyberspace at the final plenary session of the AFCEA/INSA Intelligence and National Security Summit 2014, held September 18-19 in Washington, D.C.