Σελίδες

Συνολικές προβολές σελίδας

Τρίτη 31 Ιουλίου 2012

Report finds "waste" in Iraqi police training

By Jamie Crawford
A U.S. government watchdog says more than $200 million was wasted on a program to train the Iraqi police force, with security concerns and a lack of interest by the Iraqi government the main culprits for the program's shortcomings.
In an audit released Monday by the office of the Special Inspector General for Iraq Reconstruction, or SIGIR, auditors also said the Police Development Program faced challenges at the outset due to the lack of an assessment of Iraqi police force capabilities, and of a written commitment from the Iraqi government for the program to move forward.
Stuart W. Bowen Jr., who as inspector general leads the SIGIR office, signed the report that was sent to Secretary of State Hillary Clinton and the U.S. Embassy in Iraq.
The purpose of the program is to help Iraqi police services develop the capabilities needed to lead, manage and sustain internal security and the rule of law. The State Department is hoping to reach those goals by 2016.

A major cornerstone of the program was to be frequent and regular contact between U.S. advisers and Iraqi government officials. But the withdrawal of U.S. forces removed a "security blanket" allowing advisers to travel freely around Iraq, the report says. It remains unsafe for Police Development Program advisers to travel to training facilities on a regular basis.
The program was transferred to Pentagon oversight from the State Department in 2004 due to the deteriorating security conditions in the country at the time. The State Department's Bureau of International Narcotics and Law Enforcement Affairs resumed oversight in October of last year, just before all U.S. forces pulled out of the country in December.
Analysts who have read the report say it blames some of the program's shortcomings on the dangerous security situation between 2004 and 2008 in Iraq.
"Security was the buzz word, security is what got programs funded, and security was going to be what let us leave Iraq" with a fully functioning Iraqi police force left behind, Stephanie Sanok with the Center for Strategic and International Studies told CNN.
The United States has spent about $8 billion to train, staff and equip police forces since 2003, the report says
The United States was forced to close a training and housing facility in Baghdad just months after the police training program began because of security concerns and program revisions. The cost for the facility was estimated at $108 million. The report refers to the expenditure as "de facto waste." In addition, it says a separate training facility in the southern city of Basra, costing an additional $98 million in State Department funds, will not be used. The Iraqi government decided to terminate training at the facility.
"An overarching question is why expensive construction was initiated at both of these facilities without a formal programmatic agreement in place at the time construction began," auditors wrote in the report
The report also highlights a "lukewarm" reception to the program by the Iraqi government.
"In May 2012, the deputy minister of the interior told SIGIR that the (Police Development Program) was 'useless' and that the (Iraqi government) did not need the large numbers of PDP advisors currently in-country," the auditors wrote. "He also indicated that Iraqi police officers had expressed their opinion that the training received to date was not beneficial."
"It really was misstep after misstep, (the United States) didn't actively engage the Iraqis then," said Sanock, who worked in the embassy in 2008 and 2009. "When governments changed, when players changed, they didn't get the buy-in of the new folks, and it was really an imposition of the U.S. mindset on the Iraqi government that just was never going to work."
Among the other findings in the report, auditors said the program has been significantly downsized from the ambitious size once envisioned.
Initially the program called for 350 advisers who would be able to fly throughout the country, but the number was quickly reduced to 190 advisers who would be based in Baghdad, Basra, and Erbil. Further program changes and funding uncertainties have reduced the number of advisers for the program to 36. Eighteen are stationed in Baghdad and 18 in Erbil.
Safety and security requirements for the program are also eating significantly into its operating costs. As of March 31, the Bureau of International Narcotics and Law Enforcement Affairs said, about 94 percent of funds obligated for Police Development Program operations had been for security and life and mission support costs.
With the downsizing of the program, SIGIR said, available funding exceeds current costs. The audit estimates that $118.2 million in unused funds for 2010 and 2011 are available to the program. That figure may be sufficient to meet remaining program costs for the current fiscal year budget, which SIGIR estimates to be less than $100 million.
But it is unclear how much will be needed to fund program activities in 2013, the report said.
The report recommends the State Department obtain a written agreement with the Iraqi government on the specific type and number of training classes to be provided, along with mutually acceptable locations for conducting the training. It also suggests Congress consider requiring the State Department to provide written certification of Iraqi government "buy-in" for new classes before any additional U.S. money is committed.
The United States will turn over control of the main police training center in Baghdad to the Iraqi government in December. The State Department says that will eliminate static security costs for the site and reduce other personnel costs due to staff reductions. As of March, 954 of the 1,458 Police Development Program personnel in Iraq were housed at the facility, the report said.
Sanok said the report serves as a wake-up call for the State Department.
"My fear is that we may repeat that error with Afghanistan," she said. "I would love for the State Department to have learned from this experience, fix it, but also to not go down this road again in other countries."


http://edition.cnn.com/

The five biggest stories at Black Hat

The annual Black Hat Briefings conference, held last week in Las Vegas, is the world’s biggest, and arguably the most important, gathering of security researchers; here are the five biggest stories to take away from last week’s Black Hat meeting in Las Vegas
The annual Black Hat Briefings conference, held last week in Las Vegas, is the world’s biggest, and arguably the most important, gathering of security researchers.
SearchSecurity.com’s Black Hat 2012 special coverage page covered the week’s discussions in depth. The editors also chose the five biggest stories from the event.

 http://www.homelandsecuritynewswire.com/

Κυριακή 29 Ιουλίου 2012

Cisco and Thales Target Global Defense and Security Market

Cisco (CSCO) and Thales, a global technology leader with a unique capability to provide equipment, systems solutions and services that meet the most complex security requirements for defense and security, aerospace and transportation markets, today announced a new partnership to address the global defense and security market.
The new agreement will combine Thales’ global industry expertise with Cisco networking and communications innovations, expand the collaboration globally and accelerate joint go-to-market activities and solution development. The expanded collaboration is built on a long-standing relationship between the two companies in the European market.
The Cisco-Thales collaboration will encompass a number of strategic initiatives, including:
  • Development of Thales solutions based on a range of Cisco technologies
  • Jointly addressing key defense and security market opportunities such as mobile routing or broadband evolution of radio networks
  • Joint go-to-market activities, closely coordinated at both global and country level
Highlights:
  • Cisco will provide Thales with an extensive range of standard networking equipment and infrastructure, complemented by industry leading networking design and engineering expertise from Cisco Services.
  • Cisco will also utilize its rigorous sales and technology training programs, such as Cisco Sales Expert and Cisco Vertical Solutions Architect, to enable Thales global sales and engineering teams.
  • Thales will become a Cisco Global Specialty Integrator, allowing Thales to embed Cisco technologies into its own systems and solutions in all geographies, where a strong resilience and high quality of networking services is required.
  • The designation will also enable Thales to partner directly with Cisco globally and resell select networking technology and collaborate in the development of new solutions.
Jean-Michel Lagarde, senior vice president in charge of Systems Activities, Thales Communications & Security, commented:
“This will be a hugely valuable long-term collaboration for both businesses. Combining Thales’ specialist industry expertise and advance integration capabilities with Cisco’s world-leading networking knowledge and technology will allow us to develop and deliver genuinely innovative security solutions to our customers worldwide.”
Chris Dedicoat, president, Europe, Middle East, Africa and Russia, Cisco, commented:
“Cisco and Thales share a common belief in the importance of the network in driving innovation and delivering business value within the defense sector. By working closely together, both companies will be better placed to address existing opportunities within the industry and create the new solutions that will help deliver competitive advantage and drive new market opportunities across the defense, security and aerospace industries.”
Thales is a global technology leader for the Defence & Security and the Aerospace & Transport markets. In 2011, the company generated revenues of EUR 13 billion with 67,000 employees in 56 countries.
Cisco (CSCO) is the worldwide leader in networking that transforms how people connect, communicate and collaborate.

http://www.defencetalk.com/

Πέμπτη 26 Ιουλίου 2012

Harris Atlas Systems to Establish Geospatial Data Sharing System for a Mid-Eastern Government

Harris Atlas Systems LLC has been awarded an $8 million dollar contract to provide a Middle Eastern government agency with a system that will ensure that critical military and public safety information can be shared quickly, easily and securely even under the most demanding circumstances.
The advanced geospatial intelligence solution consists of enterprise and mobile versions of Harris Corporation’s Active Catalog™ system, which enables users to manage, share, and retrieve large volumes of geospatial data — information that identifies the geographic location and characteristics of natural or constructed objects — that reside throughout an enterprise. It also provides access to live data feeds, and can generate and publish documents and map products of urban environments.

Active Catalog integrates with a variety of Open Geospatial Consortium-compliant and standard geographic information systems software, such as ESRI and Bentley, which many customers are already using for military, intelligence and public safety operations. With sophisticated techniques to extract metadata, it supports a wide range of data formats, including overhead and aerial imagery, maps, intelligence reports, sensor data and other derived products. Data and metadata are securely shared between enterprise and remote versions of the system, enabling remote users to access enterprise-based geospatial intelligence data and also send field-collected information back to the enterprise.
Leveraging 130 patents and more than 30 years of experience developing systems for the largest geospatial customers, Active Catalog goes beyond traditional catalog capabilities to one that incorporates a variety of data sources, and effectively support remote users in the most limiting environments — such as in a disaster or emergency — and delivers the highest level of security possible, Leon Shivamber, managing director, Harris Atlas Systems explains.

 http://defense-update.com/

Παρασκευή 20 Ιουλίου 2012

Raytheon to develop cyber maneuver technology for US Army

Raytheon has received a $3.1 million contract to develop technology for Morphing Network Assets to Restrict Adversarial Reconnaissance (MORPHINATOR), a program that uses cyber maneuvering techniques to thwart potential attackers in high-threat environments.
Cyber maneuver is the technique of dynamically modifying aspects and configurations of networks, hosts and applications in a manner that is undetectable and unpredictable by an adversary but still manageable for network administrators.
“The intent of cyber maneuver is to place computer network defense technology into a proactive state, thereby shifting the advantage away from the attacker,” said Jack Donnelly, director of Trusted Network Systems for Raytheon’s Network Centric Systems business.
“By constantly changing the characteristics of the networks it resides on, MOPRHINATOR provides a more robust and trusted networking solution.”
MORPHINATOR is designed to be used in conjunction with other existing security devices to provide an active defense approach to information assurance.
Raytheon received the contract from the U.S. Army’s Communications, Electronics, Research, Development and Engineering Center (CERDEC), Space and Terrestrial Communications Directorate. Work will be done in Largo, Fla., and Aberdeen, Md.


Finmeccanica Completes First Tests for NATO Cyber Security System

The Finmeccanica Cyber Solutions team selected in February 2012 to fulfil the NATO Computer Incident Response Capability (NCIRC) – Full Operating Capability (FOC) requirement, has completed the testing phase of the programme’s Proof of Concept in line with the challenging timescale set by NATO. NCIRC FOC will provide a highly adaptive and responsive system to help protect NATO from cyber-attacks against both its mobile and static Communication and Information Systems.
This world-class team led by Finmeccanica (FNC IM, SIFI.MI), comprising its companies SELEX Elsag, SELEX Systems Integration and VEGA, together with its partner Northrop Grumman, is leveraging its wealth of experience in addressing complex cyber-defence requirements.
The completion of the testing phase of the Proof of Concept, confirms that the programme continues to meet its objectives and demonstrates the value of the team’s multi-national capability, leadership in the development and delivery of cyber defence solutions, and unrivalled experience of multi-domain cyber programmes for government and defence customers in the US, UK, Italy and other countries around the world.
Once delivered, NCIRC FOC will provide an agile, flexible and interoperable solution featuring advanced cyber defence systems to protect NATO static commands, crisis operations, NATO signal battalions, Article V Operations and the NATO Reaction Force.
“With the completion of the testing of the Proof of Concept, we have achieved an important stage in delivering the NCIRC FOC. This reflects the growing partnership between NATO, Finmeccanica and our Northrop Grumman partner,” said Giuseppe Orsi, Chairman and CEO of Finmeccanica.
“Through our chosen solution, NATO will be able to improve their capability to counter the ever increasing and sophisticated threat from cyber-attack.
“The successful achievement of this important milestone is a further step towards full implementation of NATO’s CIRC capability and demonstrates the growing strength of the partnership we have established on this programme”, said Mike Papay, Vice President Cyber Initiatives of Northrop Grumman Information Systems.
“We look forward to continuing to apply the full range of our resources and decades-long cyber security experience both in the U.S and U.K., to ensure the successful delivery of this programme.”


Τρίτη 17 Ιουλίου 2012

Will rising temperatures lead to rising crime rates?

General Strain Theory has become one of the leading explanations for crime, and Emory University’s Professor Robert Agnew, has become its chief architect; he argues that rising temperatures will lead to more strains — increased temperatures, heat waves, natural disasters, serious threats to livelihood (farming, herding, fishing), forced migrations on a massive scale, and social conflicts arising as nations and groups compete for increasingly scarce food, fresh water, and fuel – and more strains invariably lead to rising crime rates
When most people think about climate change, they envision rising temperatures and sea levels. Robert Agnew, a professor of sociology at Emory, thinks about rising crime rates.
It was in the early 1990s, while focusing on the causes of crime and delinquency, that he began to see that certain strains, or stressors, increase the likelihood of crime — including economic deprivation, discrimination, criminal victimization, harsh or erratic discipline, child abuse, and neglect. These strains can foster a range of negative emotions such as anger, frustration, and depression that put people under pressure to take corrective action. Some of those actions are criminal.
An Emory University release reports that during the last few decades, Agnew’s research on general strain theory has become one of the leading explanations for crime, and he has become its chief architect. He is among the most frequently cited criminologists in the world, and was recently elected president of the American Society of Criminologists.
Agnew believes the pressures caused by climate change will become “one of the major forces — if not the major force — driving change as the century progresses.” He lists strains such as increased temperatures, heat waves, natural disasters, serious threats to livelihood (thinking farming, herding, fishing), forced migrations on a massive scale, and social conflicts arising as nations and groups compete for increasingly scarce food, fresh water, and fuel. Especially in the developing world, he believes crime will become a critical issue, making it more difficult to keep the peace in megacities heavily populated by immigrants.
The release notes that Agnew’s background in criminology is not purely academic. He grew up in the Atlantic City of the 1950s and 1960s, before casinos brought tourist dollars and jobs. “There was a lot of race and ethnic conflict a lot of crime and delinquency in high school, and I drew very much on those experiences when I came to criminology.”

 http://www.homelandsecuritynewswire.com/

Δευτέρα 16 Ιουλίου 2012

Cyber chief warns of rising danger from cyber attacks

By Suzanne Kelly
In a rare public appearance Monday, the head of the country's Cyber Command warned that the nature of cyberattacks is changing and becoming more dangerous.
Gen. Keith Alexander also talked about the economic toll that cyberintrusions are taking on American business, saying that for every intrusion detected by the FBI, there are 100 others that remain undetected.
"The probability for crisis is mounting," said Alexander, who also heads the National Security Agency. He told an audience at the American Enterprise Institute in Washington that he was concerned about the changing nature of the threat from disruptive to destructive attacks and that the numbers of cyber attacks against business and critical infrastructure are on the rise.
Alexander used the public opportunity to urge Congress to quickly pass legislation that would give the government additional authorities to communicate what it knows with the private sector to enable a closer public-private partnership when it comes to cybersecurity. Critics argue that giving the government too much power will come at a cost when it comes to civil liberties.
"We can protect civil liberties and protect cyberspace," said Alexander, who added that the government is not interested in reading private e-mail, but is interested in identifying the IP addresses from which malicious computer programs are being launched.
Alexander said there are still concerns that terrorist groups like al Qaeda may launch a cyberattack. He added that al Qaeda "is not viable in that realm right now," but said that could change quickly and that concerns him.

Warfare by Remote





http://edition.cnn.com/

Πέμπτη 12 Ιουλίου 2012

Cyber chief warns of rising danger from cyber attacks

By Suzanne Kelly
In a rare public appearance Monday, the head of the country's Cyber Command warned that the nature of cyberattacks is changing and becoming more dangerous.
Gen. Keith Alexander also talked about the economic toll that cyberintrusions are taking on American business, saying that for every intrusion detected by the FBI, there are 100 others that remain undetected.
"The probability for crisis is mounting," said Alexander, who also heads the National Security Agency. He told an audience at the American Enterprise Institute in Washington that he was concerned about the changing nature of the threat from disruptive to destructive attacks and that the numbers of cyber attacks against business and critical infrastructure are on the rise.
Alexander used the public opportunity to urge Congress to quickly pass legislation that would give the government additional authorities to communicate what it knows with the private sector to enable a closer public-private partnership when it comes to cybersecurity. Critics argue that giving the government too much power will come at a cost when it comes to civil liberties.
"We can protect civil liberties and protect cyberspace," said Alexander, who added that the government is not interested in reading private e-mail, but is interested in identifying the IP addresses from which malicious computer programs are being launched.
Alexander said there are still concerns that terrorist groups like al Qaeda may launch a cyberattack. He added that al Qaeda "is not viable in that realm right now," but said that could change quickly and that concerns him.

 http://edition.cnn.com/?refresh=1

Δευτέρα 2 Ιουλίου 2012

Bomb threat? There’s an app for that

In the first chaotic moments after suspicion of a bomb threat, first responders have a myriad of questions, assessments, and decisions to make, all at once, and all the while the scene could be changing rapidly: Is the bomb real? How large is the potential blast radius? Where will we evacuate people? Are there any critical infrastructure or special-needs population centers in the vicinity? Any schools, hospitals nearby? What roads should be closed? Which roads should stay open for evacuees? There are many more questions, many more uncertainties; DHS Science and Technology Directorate (S&T) and its private sector partners have now developed a must-have app: the First Responder Support Tools (FiRST) for computers and smartphones
There is now an app for bomb threats // Source: eurekalert.org
At approximately 6:30 p.m. on Saturday, 1 May 2010, a smoking SUV in Times Square was reported by alert street vendors. Acting quickly, NYPD evacuated vast stretches on 7th and 8th Avenues, including Broadway theatres and several other buildings and hotels in the area. The entire area was barricaded. Times Square on a Saturday evening before the shows is teaming with people, and the terrorist knew that. The bomb failed, but had it detonated, it would have killed and wounded many, according to NYPD.
In the first chaotic moments after suspicion of a bomb threat, first responders have a myriad of questions, assessments, and decisions to make, all at once, and all the while the scene could be changing rapidly. Is the bomb real? How large is the potential blast radius? Where will we evacuate people? Are there any critical infrastructure or special-needs population centers in the vicinity? Any schools, hospitals nearby? What roads should be closed? Which roads should stay open for evacuees? There are many more questions, many more uncertainties.
What if they could get all this information in one place?
Now they can. DHS Science and Technology Directorate (S&T) says that it and its public and private sector partners have developed a must-have “app”: the First Responder Support Tools (FiRST) for computers and smartphones.
The FiRST application was developed in partnership with the DHS National Protection and Programs Directorate’s (NPPD) Office of Infrastructure Protection (IP) along with its Office for Bombing Prevention (OBP), and Applied Research Associates, Inc. (ARA). The FiRST app provides information directly to first responders on their smartphones or laptop computers in order quickly to define safe distances to cordon-off around a potential bomb location, calculate rough damage and injury contours, suggest appropriate roadblocks, determine when mandatory evacuation or shelter-in-place circumstances apply, and to identify nearby areas of particular concern: schools, hospitals, care centers. The application also provides the geospatial information regarding potential injury, glass, or structural damage impact area.
That’s why it works,” said Christine Lee, FIRST program manager in S&T’s First Responder Group. “Bomb threat scenarios do not reflect a one-size-fits-all approach, and this app allows users to customize information to help them make informed decisions for response.”
The FiRST application also includes HAZMAT response information based on the Emergency Response Guidebook (ERG) which includes information on over 3,000 hazardous materials. In addition to providing health precautions and response guidance, FiRST also

 http://www.homelandsecuritynewswire.com/

Xaver 100 Sensor Can See Through Walls (STTW)

Camero-Tech is launching the latest member of the Xaver Sense Through The Wall (STTW) radar, designed to assist assault teams and warfighters employed in urban operations to ‘see through walls’. The new Xaver 100 is an ultra-portable, handheld ‘presence-of-life’ detector providing military, law enforcement, and search & rescue personnel with critical information in real time by detecting the presence of life behind walls.

Designed for use by tactical teams and first responders, the sensor provides instant situational awareness and target acquisition data, detecting human presence at distances up to 20m. The sensor can also be operated in stand-off mode, at a distance from the wall.

http://defense-update.com/

Container ships as offshore platforms for direct support to disaster zones

DARPA’s Tactically Expandable Maritime Platform (TEMP) program has completed the design of technologies to transform commercial container ships into self-contained floating supply bases during disaster relief operations, without needing port infrastructure
During natural or man-made disasters, the U.S. armed forces’ rapidly deployable airlift, sealift, communication, and medical evacuation and care capabilities can supplement lead relief agencies in providing aid to victims. The Department of Defense’s 2012 strategic guidance document includes humanitarian assistance and disaster relief operations as one of the U.S. military’s missions for the twenty-first century.
DARPA, the Pentagon’s research arm, says its Tactically Expandable Maritime Platform (TEMP) program has completed the design of innovative technologies to transform commercial container ships into self-contained floating supply bases during disaster relief operations, without needing port infrastructure. The program envisions a container ship anchoring offshore of a disaster area, and the ship’s crew delivering supplies ashore using DARPA-developed, modular on-board cranes and air- and sea-delivery vehicles.
“To allow military ships and aircraft to focus on unique military missions they alone can fulfill, it makes sense to develop technologies to leverage standard commercial container ships, used around the world daily, as a surge capacity for extended humanitarian assistance and disaster relief operations,” said Scott Littlefield, DARPA program manager.
DARPA recently completed the first phase of the program, which developed four key modular systems, all of which are transportable using standard 20-foot or 40-foot commercial shipping containers.
The elements include:
  • Core support modules— container-sized units that provide electrical power, berthing, water and other life-support requirements for an augmented crew aboard the container ship.
  • Motion-stabilized cranes — modular on-board cranes to allow transfer of cargo containers at sea from the ship deck over the side and onto a sea-delivery vehicle.
  • Sea-delivery vehicles — Captive Air Amphibious Transporters (CAAT) have air-filled pontoons on a tank tread-like design, enabling them to carry containers over water and directly onto shore.
  • Parafoil unmanned air-delivery system — a low-cost, propeller-driven air vehicle that uses a parachute for lift and carries urgent supplies from the container ship to stricken areas on shore.
DARPA says that while its investment in demonstrating the technology has completed, the information obtained should reduce risk for efforts of the military services or other government organizations with a humanitarian assistance and disaster relief mission.

 http://www.homelandsecuritynewswire.com/

First successful "spoofing" of UAVs demonstrated

A research team successfully demonstrated for the first time that the GPS signals of an unmanned aerial vehicle (UAV), or drone, can be commandeered by an outside source — a discovery that could factor heavily into the implementation of a new federal mandate to allow thousands of civilian drones into the U.S. airspace by 2015
Researchers demonstrate hackers can take over UAV control // Source: iran-forum.ir
A University of Texas at Austin research team successfully demonstrated for the first time that the GPS signals of an unmanned aerial vehicle (UAV), or drone, can be commandeered by an outside source — a discovery that could factor heavily into the implementation of a new federal mandate to allow thousands of civilian drones into the U.S. airspace by 2015. The experiment was performed on a civilian drone owned by the university.
Cockrell School of Engineering assistant professor Todd Humphreys and his students were invited by DHS officials to attempt the demonstration in White Sands, New Mexico in late June. Using a small but sophisticated UAV along with hardware and software developed by Humphreys and his students, the research team repeatedly overtook navigational signals going to the GPS-guided vehicle.
A University of Texas at Austin release reports that the technique, known as “spoofing,” creates false civil GPS signals that trick the vehicle’s GPS receiver into thinking nothing is amiss — even as it steers a new navigational course induced by the outside hacker. Because spoofing fools GPS receivers’ on both their location and time, some fear that most GPS-reliant devices, infrastructure and markets are vulnerable to attacks. That fear was underscored — but not proven — when a U.S. military drone disappeared over Iran late last year and showed up a week later, intact, and in the care of Iranians who claimed to have brought the vehicle down with spoofing.
The recent demonstration by University of Texas at Austin researchers is the first known unequivocal demonstration that commandeering a UAV via GPS spoofing is technically feasible.
I think this demonstration should certainly raise some eyebrows and serve as a wake-up call of sorts as to how safe our critical infrastructure is from spoofing attacks,” said Milton R. Clary, a senior Department of Defense (DoD) Aviation Policy Analyst at Overlook Systems Technologies, which is working with the federal government to develop programs that identify and mitigate spoofing attacks.
Humphreys said his research team wanted to demonstrate the potential risks associated with spoofing early on in the Federal Aviation Administration’s task to write the mandated rules that will allow government and commercial drones in the U.S. airspace by 2015.
We’re raising the flag early on in this process so there is ample opportunity to improve the security of civilian drones from these attacks, as the government is committed to doing,” Humphreys said.

 http://www.homelandsecuritynewswire.com/

Feds give Colorado access to critical infrastructure info

The Homeland Security Infrastructure Program (HSIP) compiles about 500 layers of geographic features, including power plants and water pumps; it is managed by DHS, the Pentagon’s National Geospatial Intelligence Agency, and the U.S. Geological Survey; the data set is available to state first responders only when federal disasters are declared; DHS has now given Colorado access to the HSIP
The wild fires raging in Colorao have already scortched some 20,000 acres of land, threatening more than 20,000 structures and buildings.
Next.govreports that in order to help fire fighters and first responders set priorities and protect the more critical structures, the Homeland Security Infrastructure Program (HSIP) has given Colorado authorities access to critical infrastructure data such as bridges containing utility lines. the
The HSIP is managed by DHS, the Pentagon’s National Geospatial Intelligence Agency, and the U.S. Geological Survey. Next.gov notes that the complete HSIP data set, which aggregates statistics from government, industry, and academia is available to state first responders only when federal disasters are declared.
Russ Johnson, global director for public safety at Esri, the software company helping decision-makers analyze the data sets. Told Next.gov that by combining HSIP, live weather conditions, and other updated information, state first responders “are predicting where the fire is likely to go [and] where they need to allocate resources to protect the highest natural resource values and developed values…. The state is using HSIP data to fuse it with the [fire] perimeter data to understand what the impact and the potential impact on infrastructure could be.”
He added that with mobile ubiquity, “we have intelligence coming back in, right from the field…. The HSIP data is very valuable when combined with this real-time information.”

http://www.homelandsecuritynewswire.com/