Raytheon Co. Integrated Defense Systems, Andover, Maryland, was awarded a $16,999,000 modification (P00004) to contract (W9113M-15-C-0001) for a requirement to exercise option one for services to provide continued field and sustainment level maintenance supporting one Joint Land Elevated Netted System (JLENS) orbit deployed at Aberdeen Proving Ground, Maryland. Services provided are in support of satisfying the JLENS orbit employment in an operational exercise in support of homeland defense and as part of Operation Noble Eagle. Fiscal 2015 research, development, test and evaluation funds in the amount of $16,999,000 were obligated at the time of the award. Estimated completion date is Dec. 31, 2015.
The National Capital Region joins two cities already part of the Department of Homeland Security’s (DHS) program to detect and deter nuclear and radiological threats with the award of a $30 million federal grant, which it will receive over the next five years.
The National Institute of Standards and Technology (NIST) primary external advisory board today announced a report calling for the agency to increase its staff of cryptography experts and to implement more explicit processes for ensuring openness and transparency to strengthen its cryptography efforts. In making its recommendations, the Visiting Committee on Advanced Technology (VCAT) specifically addressed NIST’s interactions with the National Security Agency (NSA).
Lawrence Livermore National Laboratory, Los Alamos National Laboratory and Bechtel BNI are joining forces to a new class of cyberdefense professionals to protect the nation’s critical digital infrastructure. The Bechtel-Lawrence Livermore-Los Alamos Cyber Career Development Program is designed to allow the national labs to recruit and rapidly develop cybersecurity specialists who can guide research at their respective institutions and create solutions that meet the cyberdefense needs of private industry, which owns about 80 percent of the nation’s critical digital infrastructure and assets.
The National Security Agency (NSA) has selected five more schools for the National Centers of Academic Excellence (CAE) in Cyber Operations Program, which is designed to cultivate more U.S. cyber professionals. These schools are now designated as Cyber Operations CAEs for the 2014-2019 academic years:
Research on the state of cybersecurity of the U.S. critical infrastructure companies reveals that 67 percent have experienced at least one security compromise that led to the loss of confidential information or disruption to operations during the past year. In addition, 24 percent of a survey’s respondents said the compromises involved insider attacks or negligent privileged information technology users. Only 6 percent provide cybersecurity training for all employees.
Today the U.S. Defense Department released its strategy for countering weapons of mass destruction (WMD). This strategy will direct the department’s efforts to prevent hostile actors from acquiring WMD, contain and reduce WMD threats and ensure the department can respond effectively to WMD crises.
Fresh off supporting two overseas wars, the National Guard is planning for a larger role in military activities on the home front. Cyber is one area where the Guard may be serving a key role, officials say.
Some of these points were outlined in a panel discussion on the second day of AFCEA’s three-day Joint Information Environment (JIE) Mission Partner Symposium being held in Baltimore May 12-14. Rear Adm. Hank Bond, USN, J-6, U.S. Northern Command, and deputy J-3 for cyberspace operations at NORAD, said, “Our way forward in cyberspace is to properly develop the force structure around the Guard. The commercial space is the contested space.”
Chief information security officials from various agencies voiced support for the Department of Homeland Security's Continuous Diagnostics and Mitigation (CDM) Program, which is designed to fortify computer networks across the federal government. The officials spoke out in support of the program while serving on a panel during the AFCEA Homeland Security Conference, Washington, D.C. Panel moderator John Streufert, director of Federal Network Resilience at the Department of Homeland Security, took the opportunity to put some rumors to rest.
Following the terrorist attacks on September 11, 2001, government agencies came under widespread criticism for failing to share information and "connect the dots." By contrast, law enforcement agencies were almost universally praised following the Boston Marathon bombing and the shooting at the Navy Yard in Washington, D.C., both of which took place last year, pointed out panelists at the AFCEA Homeland Security Conference in Washington, D.C. on Monday.
The National Weather Service is the granddaddy of open source data, according to Adrian Gardner, chief information officer, Federal Emergency Management Agency (FEMA). And, the National Oceanic and Atmospheric Administration (NOAA) was "into big data before big data was cool," added David McClure, a data asset portfolio analyst within the NOAA Office of the Chief Information Officer. The two officials made their comments during a panel on big data analytics at the AFCEA Homeland Security Conference in Washington, D.C.
The real challenge to keeping the homeland secure is dealing with the world's increasing complexity, Adm. Thad Allen, USCG, (Ret.), executive vice president of Booz Allen Hamilton and former commandant of the U.S. Coast Guard, told the audience at the AFCEA Homeland Security Conference in Washington, D.C., on Monday during his luncheon keynote address.
The U.S. Customs and Border Protection (CBP) agency is only interested in mobile communication if it allows the agency to perform functions it could not perform otherwise, Mark Borkowski, component acquisition executive and assistant commissioner with the CBP Office of Technology Innovation and Acquisition, told the audience at the AFCEA Homeland Security Conference in Washington, D.C., on Monday. "We're not interested in mobility for mobility's sake but because it allows us to do something we haven't done before," Borkowski said, while participating in a panel on mobility and interoperability.
Members of President Obama’s Council of Advisors on Science and Technology have found that cybersecurity for government and industry organizations requires a set of processes that continuously couple information about an evolving threat to defensive reactions and responses. In a report to the president, the council shared its six findings and correlating recommendations for remedies to better security information technology in both the public and private sectors.
Eight emerging cybersecurity technologies ready for transition into commercial products will be unveiled at the Mayflower Renaissance Hotel on October 9. The U.S. Department of Homeland Security (DHS) Science and Technology Directorate is hosting the event, which will feature intrusion detection, removable media protection, software assurance and malware forensics capabilities.
The United States is one of the best in the world at protecting civil liberties, Gen. Keith Alexander, USA, director of National Security Agency (NSA) and commander of the U.S. Cyber Command said at the AFCEA Cyber Symposium in Baltimore.
Edward Snowden, the NSA contractor who leaked reams of data about NSA monitoring activities to the press, has been called a hero whistleblower by some, but Gen. Alexander contends that the employees at the NSA, FBI, CIA and Defense Department, who protect the nation while protecting civil liberties, are the real heroes.
U.S. government officials are traveling the country warning companies about a new round of cyberattacks that have targeted 27 companies, compromised seven and may ultimately affect up to 600 asset owners, according to Neil Hershfield, deputy director, control systems security program (CSSP), Industrial Control Systems-Cyber Emergency Response Team (ICS-CERT), Homeland Security Department.
Hershfield made the comments while taking part in a critical infrastructure protection panel discussion as part of the July 25-27 AFCEA International Cyber Symposium, Baltimore.
The National Institutes of Health is funding the development of a medical instrument that will quickly detect biothreat agents, including anthrax, ricin and botulinum as well as infectious diseases. Scientists at Sandia National Laboratories are creating the first of its kind point-of-care device that could be used in emergency rooms during a bioterrorism incident. To design the device, which will be able to detect a broader range of toxins and bacterial agents than is currently possible, the $4 million project will include comprehensive testing with animal samples.
The recently signed executive order on cybersecurity and the presidential directive on critical infrastructure protection are not separate documents. In fact, they are part of the same overall effort to protect the nation, said Rand Beers, undersecretary for the National Protection and Programs Directorate, U.S. Department of Homeland Security. Beers discussed the effort on Thursday at the AFCEA Homeland Security Conference in Washington, D.C.
Top information technology officials from a variety of government agencies identified cloud computing, mobile devices and edge technologies as the technologies that will be critical for accomplishing their missions in the future.
Luke McCormack, chief information officer, Justice Department, cited cloud-as-a-service as vital to the future. He urged industry to continue to push the barriers of stack computing, and he mentioned edge technology as an emerging technology. “Edge is going to be really critical to perform missions,” he said. He cited the Google Glass project as an indicator of what the future will bring.
As the U.S. government wrestles with its myriad budgetary woes, training, modeling and simulation can provide substantial savings in a variety of ways, according to officials speaking on the Training, Modeling and Simulation panel at the AFCEA Homeland Security Conference in Washington, D.C.
“With the economic turmoil that we find ourselves in today, where we have to simultaneously reduce costs while protecting the homeland, I believe we are now in a period where modeling and simulation and virtual reality methodologies are not really an aid to live training, they are indispensable,” said Sandy Peavy, chief information officer, Federal Law Enforcement Training Center, Homeland Security Department (DHS).
Security concerns have largely driven advances in biometric technologies, but that likely will not be the case in the coming years. Commercial needs will overtake government security needs in determining the direction of biometrics, according to Troy Potter, vice president, Identity and Biometrics Solutions, Unisys Federal Systems, at the AFCEA Homeland Security Conference on Wednesday.
“We’re looking at this change from a security focus to a convenience, automation and cost-savings focus. That’s driving the market today. Commercial organizations will drive the market for the next 10 years,” Potter stated.
The National Network of Fusion Centers, developed in the aftermath of the September 11, 2001, attacks, are a vital part of the nation’s homeland security efforts, according to experts on the Intelligence and Information Sharing Panel at AFCEA’s Homeland Security Conference in Washington, D.C.
The fusion centers serve as the primary focal point for the receipt, gathering and sharing of threat-related information among federal, state, local, tribal and territorial partners. Although largely funded through federal homeland security grants, the centers are owned and operated by local entities.
The First Responder Network Authority (FirstNet), which is responsible for deploying the Nationwide Public Safety Network, could learn lessons from the September 11, 2001, attack on the Pentagon, during which emergency responders experienced almost no interoperability problems, according to emergency management panelists at the AFCEA Homeland Security Conference in Washington, D.C.
The U.S. top-down, federal government-based national security model currently used to protect the nation is not the best model for homeland security. Instead, the country should adopt a decentralized model called "network federalism" that empowers state and local agencies and encourages them to work together to resolve security issues.
Although the Department of Homeland Security is eyeing mobile technologies, the organization faces a number of challenges, revealed Shawn Lapinski, the chief interoperable architect for Department of Homeland Security Joint Wireless Program Office within the Customs and Border Protection (CBP) agency, speaking at Wednesday's panel on mobile communications for homeland security at AFCEA's Homeland Security conference.
The National Institute of Standards and Technology (NIST) released a request for information on Tuesday, February 26, for the cybersecurity framework demanded by the recent White House executive order.
Speaking on the cybersecurity panel at the AFCEA Homeland Security Conference in Washington, D.C., on Tuesday, Jeff Voas, a NIST computer scientist, said he received his first briefing on the executive order about a week ago and NIST already has begun putting together working groups. The request for information process should be concluded in about 45 days. “We’re only a week or two into this,” Voas said.
Senior leaders in both industry and government have learned their lessons from major storms, such as Katrina and Sandy, and are working together to improve the nation’s ability to bounce back from natural disasters.
As a member of the Critical Infrastructure Protection panel at AFCEA’s Homeland Security conference in Washington, D.C., William Bryan, deputy assistant secretary for infrastructure security and energy restoration, reported that in the aftermath of Sandy, a major storm that wreaked havoc in the Northeast, industry and government senior leaders worked closely to solve problems.
Gen. Michael Hayden, USAF (Ret.), former director of the CIA, indicated an astounding extent of Chinese cyber espionage and said he believes the Iranians are attacking U.S. banks with unsophisticated but pervasive cyber attacks.
The FBI's Next Generation Identification (NGI) system will improve law enforcement’s capabilities as much as DNA analysis, according to Dave Cuthbertson, assistant director, Criminal Justice information Services Division, FBI.
The NGI advances the FBI’s biometric identification services, providing an incremental replacement of the current system while introducing new functionality. The NGI improvements and new capabilities are being introduced across a multiyear timeframe within a phased approach.
The hotel industry has seen a greater increase in terrorist attacks than any other industry in recent years, according to Alan Orlob, vice president of global safety and security for Marriott International. Orlob offered a first-hand account of the attacks on two hotels in Jarkarta, Indonesia, in 2009.
Orlob, the luncheon keynote speaker at the AFCEA Homeland Security Conference in Washington, D.C., was staying at a Ritz Carlton hotel, which is owned by Marriott, at the time of the attack.
Joint Warfighting Conference attendees enjoyed the rare opportunity to listen to the former leaders of homeland security and homeland defense in a roundtable discussion moderated by David Hartman, former host of Good Morning America. Hartman asked some of the pointed questions that were on many attendees' minds going from as far back as the institution of the PATRIOT Act through to cyberthreats. The Honorable Michael Chertoff, former DHS secretary, and Adm. Timothy J. Keating, USN (Ret.), former commander, U.S. Pacific Command, agreed that the increase of information sharing between agencies is by far the greatest tool the U.S. has to support homeland security and aid in homeland defense.
The Department of Homeland Security’s SAFETY Act is finding a new application as it may serve to protect against the potential for lawsuits arising from the National Institute of Standards and Technology Cybersecurity Framework. Lawyers are answering questions from clients about possible legal actions, and the department and institute are working together to ensure developers work with confidence.
The U.S. government is adopting changes to the cloud computing certification program that will better protect against potential insider threats. The improvements include additional penetration testing, more thorough testing of mobile devices, tighter controls over systems being carried from a facility and more stringent scrutiny of systems connecting from outside the network.
U.S. Defense Department and interagency special operators are scheduled to begin receiving new tactical mesh networking equipment this month. The kit provides a mobile, ad hoc, self-healing network that offers a full range of situational awareness data, including intelligence, surveillance and reconnaissance feeds, blue force tracking and a voice over Internet protocol capability.
U.S. border patrol agents watched on surveillance videos as suspected drug smugglers chatted on cellular phones. But when agents sought phone records for investigations into the suspected nefarious activity along the Texas-Mexico divide, commercial service providers came up empty-handed. There simply were no logs. How were the smugglers evading commercial providers?
U.S. Customs and Border Protection turned to Lockheed Martin for its LUMEN Active Defense technology of sensors that can help detect rogue cellular base stations devised to circumvent cellular service providers.
A new mobile operations fusion kit that provides easy, rapid and on-the-go interoperability for mobile field operations and communications piqued the interest recently of the U.S. Marine Corps’ research and development community. It was impressed by the technology that proved successful in interoperability testing in June. Known as Operations Fusion Kit 2.0, the unit is a multimedia communications system bundled into a compact, lightweight, waterproof, ruggedized Pelican carrying case that enables secure voice, full-motion video and information sharing on a global, real-time basis.
The price of failure to provide adequate cybersecurity ultimately may be too high for any nation to tolerate. Yet, the cost of effective cybersecurity may be too much for a nation to afford. The consequences of a damaging cyberattack on a part of the critical infrastructure could be catastrophic, yet securing national capabilities from cyberattack will require more than just government or industry action. Both groups must work in concert to produce results that are greater than the sum of their parts, but no single approach to cybersecurity will work to protect the diverse government and commercial assets that are both extremely vulnerable and highly critical to a nation’s well-being.
The Department of Homeland Security’s (DHS) newly released strategic priorities for the next four years differ little from its vision in the Quadrennial Homeland Security Review (QHSR) of 2010, though officials recognize the need for tweaks to mission points as it works to address emerging threats to national security.
The department’s in-house assessment, mandated by Congress, spotlights its five security missions as combating threats of terrorism, both foreign and domestic; securing and managing U.S. borders; enforcing immigration laws; safeguarding cyberspace; and strengthening national preparedness and resiliency.
The Instant Eye small unmanned aerial system received approval last Thursday from the Federal Aviation Administration (FAA) to be used by an energy company, which will conduct research, development and training to see if the system is practical for inspecting infrastructure such as pipelines, power lines and insulators on towers. It is the first unmanned quadrotor to receive FAA certification and may be the lightest aircraft ever certified. The approval opens the door for the system to be used for a wide range of commercial applications.
With the war in Afghanistan winding down, the U.S. Defense Department’s rapid deployment office, which specializes in identifying, developing and quickly fielding game-changing technologies, now will take a more long-term approach. Slightly stretching out the process will offer more flexibility to procure the best possible systems, will present more opportunities for interagency and international cooperation and may cut costs.
Not only is the cost of cyber intrusion severe, the likelihood of it occurring is assured. Cybersecurity defenses must be flexible, innovative and persistent to address an ever-changing threat.
A cycle of measures, countermeasures and counter-countermeasures is necessary, and if you do nothing else, you must remain flexible, advises Rear Adm. Jay Cohen, USN (Ret.), principal, The Chertoff Group. There is no silver bullet to protect everything, he emphasizes.
Cybersecurity remains a priority for the U.S. Defense Department, with officials protecting resources for it in the face of overall budget constraints. Guidance from the National Defense Authorization Act for Fiscal Year 2014 directs a mission analysis of cybercapabilities not only in the active military, but also across partners, to help forces maintain their edge in protecting the nation.
In the coming months, extremists fighting in the Syrian civil war likely will begin returning to Europe, funneling through the Balkans where they can find cheap weapons, like-minded allies and temporary accomplices in the form of organized criminal groups. Conditions are ripe, according to experts, for those individuals to spread across Europe, launching terrorist attacks on major cities.
Intelligence agencies could have investigated more thoroughly and shared information more effectively, but even if they had performed perfectly, they may not have been able to prevent last year’s Boston Marathon bombing, according to a report delivered today before the Senate Homeland Security and Governmental Affairs Committee.
Dealing with the world’s increasing complexity is the primary challenge to keeping the homeland secure, according to Adm. Thad Allen, USCG, (Ret.), executive vice president of Booz Allen Hamilton and former commandant of the U.S. Coast Guard. He lists border security, the cyberthreat, information sharing, terrorism, criminal organizations and climate change as elements adding to that complexity.
“We have to start understanding that the root problem we’re trying to deal with is to defeat complexities that inhibit working across boundaries to deliver solutions,” he said while serving as the morning keynote speaker on the first day of the AFCEA Homeland Security Conference in Washington, D.C., in March.
Researchers working on multiple projects in Europe and the United States are using cloud computing to teach robotic systems to perform a multitude of tasks ranging from household chores to serving hospital patients and flipping pancakes. The research, which one day could be applied to robotic systems used for national defense, homeland security or medical uses, lowers costs while allowing robots to learn more quickly, share information and better cooperate with one another.
Attacks on a computer’s Basic Input/Output System (BIOS) do not receive a lot of attention, and protecting against them is often not a priority, but they are on the rise, say researchers at The MITRE Corporation, a not-for-profit research organization funded by the U.S. government. The MITRE team is developing tools to protect against BIOS attacks and is searching for organizations to help evaluate those tools.
Homeland Security Conference Show Daily, Day 1
Information sharing and interoperability have come a long way since the terrorist attacks of September 11, 2001, but challenges still remain, agreed speakers and panelists on the first day of the AFCEA Homeland Security Conference in Washington, D.C.
Homeland Security Conference 2014 Online Show Daily, Day 2
It is not surprising that cybersecurity would dominate the discussion on the second day of the AFCEA Homeland Security Conference in Washington, D.C. But the depth and breadth and variety of topics surrounding cybersecurity and information protection in all its forms indicates the degree to which the information security mission has engulfed every department and agency at all levels of government.