Straight to the Heart of Cyber Security, Warfare

We often talk about security in terms of commercial and industrial ventures, but the military also speaks of security, and their message varies little from what we hear at tradeshows. In fact, the military is quite interested in private industry partnering where there is value and productivity is placed on many communities in our nation.

In late November, I attended the Sixth Annual Government and Industry Partnership Summit in North Charleston, S.C., sponsored by the Charleston Defense Contractors Association. The biggest concern was money, and if the federal government would pull approximately $50 billion from the Defense Department.

Collaboration between DoD and private industry suddenly becomes more important. Cyber security means new thinking and new approaches to our warfighters.

Today’s battlefield blurs the lines between traditional fields of war and the world of cyberspace. Tactically speaking, the most powerful weapon on the battlefield is the collection, assurance and delivery of information.

Terry Halvorson, chief of information for the Navy, said that defense budgets are shrinking and has been a challenge for the Navy the past couple of years. However, they are beginning to think like the commercial world and account for money they are given. The quote of the day for cyber security experts is: “What are we not going to spend money on?”

CDCA brought in the crème de la crème for this event, most of which were Navy cyber experts at the nearby Space and Naval Warfare Systems Command (SPAWAR). This is the Navy’s Dominance Systems Command and is fully committed to supporting the Navy mission and serving the fleet. This is one of three Navy major acquisition commands for acquiring, installing, delivering and maintaining advanced information technology capabilities for the fleet to keep warfighters one step ahead of adversaries.

I met with Russ Keller and Scott Beeson of SCRA, a company recently awarded a three-year $3 million blanket purchase agreement with the Coast Guard to support system lifecycle operations, sustainment and enhancements to the existing systems and maintenance tasks for the Interagency Operations Center for the Watchkeeper System. This system is a set of software applications that allow users to make informed command and control decisions for port security in Charleston.

“The US Coast Guard has committed to delivering and supporting state-of-the-art market platforms and systems that are affordable, efficient and mission- capable,” said SCRA vice president Russ Keller. “SCRA Applied R&D offers domain expertise and capabilities that support these efforts to improve our ports and security. It enhances approaching maritime traffic, telling what ship and what cargo is approaching. It offers sophisticated tracking of cargo.”

While the CDCA conference focused largely on cyber security, I found a very interesting security product that could and should hit the maritime cargo market. The product is intelligent protection offered by Charleston engineering firm UEC Electronics. Known as CoreDefender, the product is taking a bite out of cargo theft.

Cargo theft results in billions of dollars in losses every year in the United States. Shipments sent overseas are subject to theft, tampering, damage and customs delays. CoreDefender is designed to reduce losses and to pinpoint specifically where damage has occurred en route to a shipping container’s destination.

The system combines a dual latching mechanism with keyless access, intelligent access control, intrusion and tamper sensing, while incorporating dynamic access codes and event logging. It makes a nice fit for sea, rail, land and storage containers.

“We want to introduce this product to insurance companies to secure their interests,” said Philip J. Ufkes, COO of UEC Electronics. “This is a departure from our military or defense work, but smaller companies like ours must be diversified and use the engineering talent we have in-house.”

From the access control front, to the military side, BAE Systems has secured several government contracts to secure the perimeters of numerous Army bases, including Ft. Belvoir, Md., Ft. Carson, Colo., and Ft. Bragg, N.C. The solution is an automated gate security system that allows one guard to monitor multiple entry points at a military base, monitor license plate recognition systems, use military or government common access card (CAC) and use biometrics or iris scan.

“The gate is designed for one car at one gate,” said Kelly M. Baldwin, director of C5ISR support solutions at BAE Systems in Charleston.

An interesting lesson learned while in Charleston, is that most of the companies represented at the summit are comfortable wearing many different hats. They speak the same language often spoken in the commercial security world, of integration and support services, information management and mobile application development.

Thankfully, the Charleston Defense Contractors Association brought it all together under one roof. CDCA brings inspired people together in forums like this, to ensure our warfighters remain at the cutting edge, regardless of challenges.

This article originally appeared in the January 2013 issue of Security Today.

Featured

  • Security Today Announces 2025 CyberSecured Award Winners

    Security Today is pleased to announce the 2025 CyberSecured Awards winners. Sixteen companies are being recognized this year for their network products and other cybersecurity initiatives that secure our world today. Read Now

  • Empowering and Securing a Mobile Workforce

    What happens when technology lets you work anywhere – but exposes you to security threats everywhere? This is the reality of modern work. No longer tethered to desks, work happens everywhere – in the office, from home, on the road, and in countless locations in between. Read Now

  • TSA Introduces New $45 Fee Option for Travelers Without REAL ID Starting February 1

    The Transportation Security Administration (TSA) announced today that it will refer all passengers who do not present an acceptable form of ID and still want to fly an option to pay a $45 fee to use a modernized alternative identity verification system, TSA Confirm.ID, to establish identity at security checkpoints beginning on February 1, 2026. Read Now

  • The Evolution of IP Camera Intelligence

    As the 30th anniversary of the IP camera approaches in 2026, it is worth reflecting on how far we have come. The first network camera, launched in 1996, delivered one frame every 17 seconds—not impressive by today’s standards, but groundbreaking at the time. It did something that no analog system could: transmit video over a standard IP network. Read Now

  • From Surveillance to Intelligence

    Years ago, it would have been significantly more expensive to run an analytic like that — requiring a custom-built solution with burdensome infrastructure demands — but modern edge devices have made it accessible to everyone. It also saves time, which is a critical factor if a missing child is involved. Video compression technology has played a critical role as well. Over the years, significant advancements have been made in video coding standards — including H.263, MPEG formats, and H.264—alongside compression optimization technologies developed by IP video manufacturers to improve efficiency without sacrificing quality. The open-source AV1 codec developed by the Alliance for Open Media—a consortium including Google, Netflix, Microsoft, Amazon and others — is already the preferred decoder for cloud-based applications, and is quickly becoming the standard for video compression of all types. Read Now

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises.