Today the U.S. Defense Department released its strategy for countering weapons of mass destruction (WMD). This strategy will direct the department’s efforts to prevent hostile actors from acquiring WMD, contain and reduce WMD threats and ensure the department can respond effectively to WMD crises.
Homeland Security Blog
Innovation may be the key to ensuring that the national critical infrastructure is protected from new cyberthreats, said Suzanne Spaulding, undersecretary for the National Protection and Programs Directorate at the DHS. The private sector must step in to help prevent future attacks.
The public/private partnership that influences many government efforts is a core effort as the Department of Homeland Security (DHS) strives to protect the homeland from cyber attacks. Above all, the private sector must take the lead in some endeavors. “We need improved cyber hygiene.”
The Department of Homeland Security is taking a holistic approach to cybersecurity that focuses on preventing or mitigating the effects of a cyber intrusion on the critical infrastructure, according to a department undersecretary speaking at the AFCEA International Cyber Symposium.
The U.S. Navy has evaluated color-coded chemical detection technology known as colorimetric explosive detection kits, the service recently announced.
Booz Allen Hamilton, McLean, Va. (FA8075-14-D-0002); Battelle Memorial Institute, Columbus, Ohio (FA8075-14-D-0003); Jacobs Technology Inc., Tullahoma, Tenn. (FA8075-14-D-0004); MacAulay-Brown Inc., Dayton, Ohio (FA8075-14-D-0005); MRI Global, Kansas City, Mo. (FA8075-14-D-0006); National Security Information Associates, Chantilly, Va.
Critical Solutions International (CSI), Carrollton, Texas, announced today that the Maryland Transit Administration (MTA) has selected its Intelligent Video Surveillance Solution to provide advanced video security at selected rail stations within the state’s rapid transit network. The Intelligent Video Surveillance Solution will provide enhanced security and safety for thousands of commuters, as well as first responders, while saving time and taxpayer money, the announcement says.
Chief information security officials from various agencies voiced support for the Department of Homeland Security's Continuous Diagnostics and Mitigation (CDM) Program, which is designed to fortify computer networks across the federal government. The officials spoke out in support of the program while serving on a panel during the AFCEA Homeland Security Conference, Washington, D.C. Panel moderator John Streufert, director of Federal Network Resilience at the Department of Homeland Security, took the opportunity to put some rumors to rest.
The National Weather Service is the granddaddy of open source data, according to Adrian Gardner, chief information officer, Federal Emergency Management Agency (FEMA). And, the National Oceanic and Atmospheric Administration (NOAA) was "into big data before big data was cool," added David McClure, a data asset portfolio analyst within the NOAA Office of the Chief Information Officer.
Following the terrorist attacks on September 11, 2001, government agencies came under widespread criticism for failing to share information and "connect the dots." By contrast, law enforcement agencies were almost universally praised following the Boston Marathon bombing and the shooting at the Navy Yard in Washington, D.C., both of which took place last year.
The U.S. Customs and Border Protection (CBP) agency is only interested in mobile communication if it allows the agency to perform functions it could not perform otherwise, Mark Borkowski, component acquisition executive and assistant commissioner with the CBP Office of Technology Innovation and Acquisition, told the audience at the AFCEA Homeland Security Conference in Washington, D.C., on Monday.
The real challenge to keeping the homeland secure is dealing with the world's increasing complexity, Adm. Thad Allen, USCG, (Ret.), executive vice president of Booz Allen Hamilton, told the audience at the AFCEA Homeland Security Conference in Washington, D.C., on Monday during his luncheon keynote address.
The U.S. Coast Guard wants contractors to provide it with affordable systems instead of top-of-the-line technology solutions, said its commandant. Adm. Robert J .Papp Jr., USCG, told the audience at the West 2014 Thursday luncheon town hall in San Diego that everything the Coast Guard does is within a constrained environment, and it needs solutions that don’t strain its already tight financial resources.
The Federal Emergency Management Agency is establishing a Thunderclap account to encourage citizens to be ready for emergencies throughout 2014.
Eight emerging cybersecurity technologies developed by the Department of Energy’s National Laboratories will be featured at the Transition-to-Practice Technology Demonstration Day for Investors, Integrators and IT Companies East event on December 18 in Washington, D.C.
Elbit Systems has, announced that its Australian subsidiary, Elbit Systems of Australia Pty Ltd (ELSA), was awarded a contract in the amount of approximately $32 million U.S. dollars ($35 million Australian dollars) to supply the Australian Federal Police with an Investigation, Intelligence and Incident Management (IIIM) Solution to be supplied over a four-year period.
Rep. Duncan Hunter (R-CA) is encouraging the U.S. Coast Guard to work with industry to identify the latest unmanned vehicles to improve maritime safety and security while saving money. In a recent Congressional Subcommittee on Coast Guard and Maritime Transportation hearing, Hunter, the chairman of the subcommittee, shared that he has seen a commercially built autonomous surface vehicle that can facilitate sub-sea to surface to satellite communications.
The new next-generation dispatch center for the San Luis Obispo County, California, Sheriff’s Office is one of the first in the nation to be completely Internet protocol-based, bridging its existing radio system with the latest smartphone and tablet technology. The new system turns a standard PC into a communications dispatch console and also turns a smartphone into a multi-channel land mobile radio handset for secure, on-demand push-to-talk communication.
Supervisory control and data acquisition (SCADA) systems face numerous threats from cybermarauders coming at them from any of a number of directions. Some systems could suffer malware attacks even though they are not the intended targets, according to a leading security expert.