Straight to the Heart of Cyber Security, Warfare

We often talk about security in terms of commercial and industrial ventures, but the military also speaks of security, and their message varies little from what we hear at tradeshows. In fact, the military is quite interested in private industry partnering where there is value and productivity is placed on many communities in our nation.

In late November, I attended the Sixth Annual Government and Industry Partnership Summit in North Charleston, S.C., sponsored by the Charleston Defense Contractors Association. The biggest concern was money, and if the federal government would pull approximately $50 billion from the Defense Department.

Collaboration between DoD and private industry suddenly becomes more important. Cyber security means new thinking and new approaches to our warfighters.

Today’s battlefield blurs the lines between traditional fields of war and the world of cyberspace. Tactically speaking, the most powerful weapon on the battlefield is the collection, assurance and delivery of information.

Terry Halvorson, chief of information for the Navy, said that defense budgets are shrinking and has been a challenge for the Navy the past couple of years. However, they are beginning to think like the commercial world and account for money they are given. The quote of the day for cyber security experts is: “What are we not going to spend money on?”

CDCA brought in the crème de la crème for this event, most of which were Navy cyber experts at the nearby Space and Naval Warfare Systems Command (SPAWAR). This is the Navy’s Dominance Systems Command and is fully committed to supporting the Navy mission and serving the fleet. This is one of three Navy major acquisition commands for acquiring, installing, delivering and maintaining advanced information technology capabilities for the fleet to keep warfighters one step ahead of adversaries.

I met with Russ Keller and Scott Beeson of SCRA, a company recently awarded a three-year $3 million blanket purchase agreement with the Coast Guard to support system lifecycle operations, sustainment and enhancements to the existing systems and maintenance tasks for the Interagency Operations Center for the Watchkeeper System. This system is a set of software applications that allow users to make informed command and control decisions for port security in Charleston.

“The US Coast Guard has committed to delivering and supporting state-of-the-art market platforms and systems that are affordable, efficient and mission- capable,” said SCRA vice president Russ Keller. “SCRA Applied R&D offers domain expertise and capabilities that support these efforts to improve our ports and security. It enhances approaching maritime traffic, telling what ship and what cargo is approaching. It offers sophisticated tracking of cargo.”

While the CDCA conference focused largely on cyber security, I found a very interesting security product that could and should hit the maritime cargo market. The product is intelligent protection offered by Charleston engineering firm UEC Electronics. Known as CoreDefender, the product is taking a bite out of cargo theft.

Cargo theft results in billions of dollars in losses every year in the United States. Shipments sent overseas are subject to theft, tampering, damage and customs delays. CoreDefender is designed to reduce losses and to pinpoint specifically where damage has occurred en route to a shipping container’s destination.

The system combines a dual latching mechanism with keyless access, intelligent access control, intrusion and tamper sensing, while incorporating dynamic access codes and event logging. It makes a nice fit for sea, rail, land and storage containers.

“We want to introduce this product to insurance companies to secure their interests,” said Philip J. Ufkes, COO of UEC Electronics. “This is a departure from our military or defense work, but smaller companies like ours must be diversified and use the engineering talent we have in-house.”

From the access control front, to the military side, BAE Systems has secured several government contracts to secure the perimeters of numerous Army bases, including Ft. Belvoir, Md., Ft. Carson, Colo., and Ft. Bragg, N.C. The solution is an automated gate security system that allows one guard to monitor multiple entry points at a military base, monitor license plate recognition systems, use military or government common access card (CAC) and use biometrics or iris scan.

“The gate is designed for one car at one gate,” said Kelly M. Baldwin, director of C5ISR support solutions at BAE Systems in Charleston.

An interesting lesson learned while in Charleston, is that most of the companies represented at the summit are comfortable wearing many different hats. They speak the same language often spoken in the commercial security world, of integration and support services, information management and mobile application development.

Thankfully, the Charleston Defense Contractors Association brought it all together under one roof. CDCA brings inspired people together in forums like this, to ensure our warfighters remain at the cutting edge, regardless of challenges.

This article originally appeared in the January 2013 issue of Security Today.

Featured

  • Progressing in Capabilities

    Progressing in Capabilities

    Hazardous areas within industries like oil and gas, manufacturing, agriculture and the like, have long-sought reliable video surveillance cameras and equipment that can operate safely in these harsh and unpredictable environments. Read Now

  • A Comprehensive Nationwide Solution

    A Comprehensive Nationwide Solution

    Across the United States, manufacturing facilities, distribution centers, truck yards, parking lots and car dealerships all have a common concern. They are targets for catalytic converters. In nearly every region, cases of catalytic converter thefts have skyrocketed. Read Now

  • Planning for Your Perimeter

    Planning for Your Perimeter

    The perimeter is an organization’s first line of defense and a critical element of any security and surveillance program. Even if a building’s interior or exterior security is strong, without a solid perimeter surveillance approach any company or business is vulnerable. Read Now

  • The Key Issue

    The Key Issue

    It is February 2014. A woman is getting ready in her room on a cruise ship when she hears a knock on the door; it is a crewmember delivering breakfast. She is not presentable so she tells him to leave it by the door. Read Now

Featured Cybersecurity

New Products

  • Schlage RC reader controller

    Schlage RC Reader Controller

    This new innovative device combines the power of the Pure IP™ access control technology pioneered by ISONAS with Schlage’s intelligent hardware and credentials, delivering a comprehensive and cost-effective perimeter solution to customers. 3

  • LenelS2 BlueDiamond™ mobile app

    enelS2 has introduced its Indoor Location subscription-based service for businesses and other organizations using LenelS2’s BlueDiamond™ mobile app version 2.1.8 for smartphones. 3

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3