Search Results for "" operations ""
Not finding what you’re looking for?
10 of 446 Results
State-Level Experience Valuable Asset for Members of New Administration
CHICAGO - Juliette Kayyem, assistant secretary for intergovernmental programs, DHS, led off Thursday afternoon's interactions at the National Conference on Emergency Communications. Kayyem came to the federal government from her position with the Commonwealth of Massachusetts where she was the governor's go-to person for homeland security.
Industry, Government Partnerships Key to Disaster Response
CHICAGO - Day two of the National Conference on Emergency Communications demonstrated that, as hoped, networking is the norm for this event. The chatter from first responder organization representatives from throughout the United States before the morning break-out sessions was nearly deafening.
First National Conference on Emergency Communications Opens in Chicago
CHICAGO - The first National Conference on Emergency Communications opened today with the goal of creating a national forum for emergency responders. In addition, the conference has been designed to clarify roles and initiatives the Department of Homeland Security (DHS) Office of Emergency Communications (OEC) and its partner programs are leading.
Emergency Communications Experts Discuss Unplanned, Planned Response Events
CHICAGO - Two case studies were the topic of discussion during the final presentation of the first day of the National Conference on Emergency Communications. The discussions centered around two large-scale multijurisdictional responses: one unplanned and one planned.
Open Discussion Leads to Details and Answers
CHICAGO - Both federal and local emergency response leaders opened the first formal session of the National Conference on Emergency Communications by inviting attendees to share openly success stories as well as the challenges they face. More than 450 representatives from emergency response organizations are attending the conference, including personnel from the military as well as large and small U.S. communities and Guam, Hawaii, the United Kingdom and Canada.
Airborne Robot Command and Control
The Boeing Company and the Australian government demonstrated the ability to simultaneously command and control three robot aircraft from an air
Force Protection Industries Awarded Contract for MRAP Suspension Kits
Force Protection Industries Incorporated is being awarded a $158 million firm-fixed-priced
Cyber Operations
The networked world is beginning to discover that sharing is not always beneficial. Marauders always have been the bane of cyberspace, but now a new set of threats has emerged to imperil more than just the usual targets. Ordinary citizens now are menaced by sophisticated organizations seeking to damage society or to loot it of its funds-or both. And, as always, the network-centric military is under assault by increasingly frequent and effective cyberagents operating under foreign government control.
Government Works to Stop Actual Bad Guys In the Virtual Realm
The dark-hearted members of the human race have found ways to exploit innovations for their own selfish means throughout time. Now, with the ever-growing global dependence on computer networks, criminals are finding new ways to disrupt lives in the real world through enterprise in the cyber one. The U.S. Department of Justice and its allies have adapted their methods and techniques over the past decade and continue to adjust to prevent the morphing illegal activities in cyberspace, whether the computer crime itself is the full intent or only part of a larger scheme.
Changing Strategy for Computer Network Defense
Modeling initiatives and new research into predictive systems are required to thwart the increasingly aggressive, ever-evolving cyberattacks on both equipment and data. These efforts are part of the recommendations of a recent report by the U.S. Department of Energy that calls for a more scientific approach to cybersecurity. The report criticized U.S. government and private organizations for relying on outdated forms of cyberdefense that are a step behind the latest threats.