A look at future homeland security technology

Knowledge management, electronic surveillance, biometric shield

Knowledge management

* Government intelligence and law enforcement officers will have secure access to structured information (databases) and unstructured information (reports, presentations, e-mail messages) from other agencies as needed.

* Pattern-recognition software will comb through enormous sets of data looking for links and patterns — to investigate and analyze events that already happened and, more importantly, to try to predict those that have not yet occurred.

Electronic surveillance

* Internet wiretap equipment, deployed in advance but on stand-by, can be activated remotely by law enforcement officials using a digital certificate that validates the court warrant authorizing the tap, reducing the time it takes to begin eavesdropping on suspect communications.

* Sophisticated network traffic analysis software can analyze the flow of communications, even those in which the content might be encrypted, to help identify associates of terrorist suspects and better understand their operations.

* To crack suspicious encrypted communications, powerful quantum computers can decipher the electronic keys used to scramble the messages.

Biometric shield

* Facial-recognition systems deployed at key locations such as border crossings, customs offices and airline boarding gates will scan faces and look for matches to images of suspected terrorists stored in government databases.

* Widely deployed iris scanners and fingerprint readers will be used in conjunction with smart cards and public-key infrastructures to control physical access to facilities such as airport baggage areas and power plants.

Featured

  • Defense
    Ryan D. McCarthy being sworn in as Army Secretary Oct. 10, 2019. (Photo credit: Sgt. Dana Clarke/U.S. Army)

    Army wants to spend nearly $1B on cloud, data by 2025

    Army Secretary Ryan McCarthy said lack of funding or a potential delay in the JEDI cloud bid "strikes to the heart of our concern."

  • Congress
    Rep. Jim Langevin (D-R.I.) at the Hack the Capitol conference Sept. 20, 2018

    Jim Langevin's view from the Hill

    As chairman of of the Intelligence and Emerging Threats and Capabilities subcommittee of the House Armed Services Committe and a member of the House Homeland Security Committee, Rhode Island Democrat Jim Langevin is one of the most influential voices on cybersecurity in Congress.

Stay Connected

FCW INSIDER

Sign up for our newsletter.

I agree to this site's Privacy Policy.