The U.S. Navy has evaluated color-coded chemical detection technology known as colorimetric explosive detection kits, the service recently announced. Colorimetric detection technology is based upon a series of chemical reactions that produce a visual response, most often in the form of a color change dependent upon the molecular structure of the compounds being tested.
Law Enforcement Technologies
Following the terrorist attacks on September 11, 2001, government agencies came under widespread criticism for failing to share information and "connect the dots." By contrast, law enforcement agencies were almost universally praised following the Boston Marathon bombing and the shooting at the Navy Yard in Washington, D.C., both of which took place last year, pointed out panelists at the AFCEA Homeland Security Conference in Washington, D.C. on Monday.
Companies that are hacked have valuable information that can help prevent future cyber intrusions, said an FBI cyber expert. Rick McFeely, executive assistant director of the FBI’s Criminal, Cyber, Response and Services Branch, told the audience at the AFCEA Global Intelligence Forum in the National Press Club in Washington, D.C., that the bureau is depending on industry to share vital information on cyber attacks.
“A key part of what the FBI does is victim notification,” McFeely said. “But, by calling out methods used to attack one company, we can see if those methods are being used to attack others. We now do that [a great deal].
New information technologies have advanced the state of the art in law enforcement at the local level, but police now find themselves facing challenges brought about these innovative capabilities. Problems of security and adversarial use of cyber have added to traditional problems that police departments have faced for decades.
Cathy Lanier, chief of the Washington, D.C., Metropolitan Police Department, told the audience at the AFCEA Global Intelligence Forum in the National Press Club in Washington, D.C., that she believes the Metropolitan Police Department is the most automated in the country. But, even though that technology is helping law enforcement solve crimes, criminals are using technology to their own advantage.
The same challenges facing the military now confront law enforcement as it embraces cyber capabilities. Disciplines ranging from data fusion to security are becoming integral parts of the curriculum for police officers.
Cathy Lanier, chief of the Washington, D.C., Metropolitan Police Department, did not understate the changes technology has wrought as she spoke at the AFCEA Global Intelligence Forum in the National Press Club in Washington, D.C. “It almost feels like completely reinventing police work,” she said.
The FBI has created an information sharing portal for cyber defense modeled on its Guardian counterterrorism portal. Known as iGuardian, the trusted portal represents a new FBI thrust to working more closely with industry on defeating cyberthreats. It is being piloted within the longtime InfraGard portal, according to an FBI cyber expert.
Rick McFeely, executive assistant director of the FBI’s Criminal, Cyber, Response and Services Branch, told the audience at the AFCEA Global Intelligence Forum in the National Press Club in Washington, D.C., that information sharing with private industry is absolutely essential for defeating the cyberattacks on private networks.
The Regional Information Sharing Systems (RISS) Program recently implemented a simplified sign-on capability that enables federal, state and local law enforcement to collaborate. The flexible environment is based on the Federal Identity, Credential and Access Management guidance and facilitates the use of Common Access Cards and Personal Identity Verification cards for use across organizational boundaries. RISS is working with several state law enforcement agencies to provide them with federated identification for access to resources within their state that are hosted on the Regional Information Sharing Systems Law Enforcement Cloud (RISSNET).
U.S. Defense Department and interagency special operators are scheduled to begin receiving new tactical mesh networking equipment this month. The kit provides a mobile, ad hoc, self-healing network that offers a full range of situational awareness data, including intelligence, surveillance and reconnaissance feeds, blue force tracking and a voice over Internet protocol capability.
U.S. border patrol agents watched on surveillance videos as suspected drug smugglers chatted on cellular phones. But when agents sought phone records for investigations into the suspected nefarious activity along the Texas-Mexico divide, commercial service providers came up empty-handed. There simply were no logs. How were the smugglers evading commercial providers?
U.S. Customs and Border Protection turned to Lockheed Martin for its LUMEN Active Defense technology of sensors that can help detect rogue cellular base stations devised to circumvent cellular service providers.
A new mobile operations fusion kit that provides easy, rapid and on-the-go interoperability for mobile field operations and communications piqued the interest recently of the U.S. Marine Corps’ research and development community. It was impressed by the technology that proved successful in interoperability testing in June. Known as Operations Fusion Kit 2.0, the unit is a multimedia communications system bundled into a compact, lightweight, waterproof, ruggedized Pelican carrying case that enables secure voice, full-motion video and information sharing on a global, real-time basis.
The Instant Eye small unmanned aerial system received approval last Thursday from the Federal Aviation Administration (FAA) to be used by an energy company, which will conduct research, development and training to see if the system is practical for inspecting infrastructure such as pipelines, power lines and insulators on towers. It is the first unmanned quadrotor to receive FAA certification and may be the lightest aircraft ever certified. The approval opens the door for the system to be used for a wide range of commercial applications.
With the war in Afghanistan winding down, the U.S. Defense Department’s rapid deployment office, which specializes in identifying, developing and quickly fielding game-changing technologies, now will take a more long-term approach. Slightly stretching out the process will offer more flexibility to procure the best possible systems, will present more opportunities for interagency and international cooperation and may cut costs.
U.S. Secret Service officials are establishing two new cybercrime task forces—in Cincinnati and Denver—that will enhance the agency’s ability to detect and investigate information technology-related crimes, including credit card theft, attacks on the banking and finance infrastructure and identity fraud.
Homeland security officials are battling privacy and technology issues amid the new social media era that offers both challenges and opportunities. Just as new technologies and information sharing architectures have improved interagency data sharing, new sources of potentially valuable information have emerged to vex planners who must handle technical obstacles and personal rights.
Quote of the Day:
“The more we can talk about cyber and intelligence in the open, the better we will be … the less the demagogues can take it and run with it.”—U.S. Representative Mac Thornberry (R-TX)
Intelligence needs cyber, and cyber needs intelligence. How they can function symbiotically is a less clear-cut issue, with challenges ranging from training to legal policy looming as government officials try to respond to a burgeoning cyber threat.
Industry officials foresee changes in network security.
Cyber industry experts predict a number of coming developments in the cyber realm, driven in part by government strategy and funding uncertainties. The future may include a greater reliance on law enforcement to solve state-sponsored hacks, increased automation and more outsourcing.
U.S. officials tasked with securing routes into and out of the country are beginning to employ a technology that will pull together disparate information in a way that could save their lives or the lives of others. Though it was not designed exclusively for agents trying to control international movements, these personnel are early adopters, using the system to prevent illicit goods, undesirable persons or rampant violence from making its way over national boundaries.
Public safety personnel are standing at the beginning of a new era in communications as plans unfurl to create a nationwide broadband network dedicated to their needs. With many questions yet to be resolved, organizations must contend with making the right choices for today even as they prepare to take advantage of advanced future offerings.
Developers offer specialized systems for law enforcement that provide increased capabilities in evidence collection.
New data collection technology can provide a virtual image of a crime scene to give a visual representation of the scenario in criminal cases. This technology, which uses a pen-based computer, is being developed with input from law enforcement communities to help investigators and officers in the field.
Comprehensive police database management system aids and abets investigators and administrators.
Field operatives can share the capabilities of their headquarters counterparts to access and cross-reference law enforcement data from large archives or active files. Software capable of running on commercial off-the-shelf hardware allows collection and dissemination of vital police information from diverse sources without overwhelming its user.