DHS to Boost Cybersecurity of First Responders

DHS to Boost Cybersecurity of First Responders' Tech

The Department of Homeland Security is looking to boost cybersecurity of advanced first responder technology.

The Department of Homeland Security is realizing that any piece of technology, even networks used by first responders, can be hacked.

The agency is giving nearly $750,000 to a small business to develop technology to improve the cybersecurity of mobile device-based sensor networks used by first responders. 

DHS' science and technology directorate announced the award Monday, lauding it as an effort to protect data used by first responders from cyber criminals as the network is comprised of a group of internet-connected sensors that collect and transmit data. That data can then be used to monitor and analyze physical or environmental conditions.

“Strengthening the security of first responder sensor networks is needed to protect data flows from attack by cybercriminals,” DHS’s acting undersecretary for science and technology, William Bryan, said in a statement. “The security enhancements developed through this project will be designed to ensure the system can be accessed and used only by approved devices and operators.”

The award is going to a company called Metronome Software through the Small Business Innovation Research program to develop a technology solution to improve the security of mobile sensor networks.

DHS is currently working to deliver advanced communications and other technology to first responders through a five-year program called the Next Generation First Responder Apex Program. As part of its work, the program is integrating plug-and-play sensors and mobile communications devices to help first responders gain access to and analyze data on the ground.

With the award, Metronome will be responsible for developing a security overlay to ensure the framework and infrastructure of the sensor system is secure.

“Because there is minimal security built into Internet of Things (IoT) devices and sensors and few security applications for them, they are susceptible to cyberattacks,” Vincent Sritapan, the mobile security program manager, said. “This project will add a security overlay for first responder IoT sensors and all other government IoT devices.”

 

Featured

Featured Cybersecurity

Webinars

New Products

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening. 3

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation. 3

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3