Government Technology

    Digital Communities
    Industry Members

  • Click sponsor logos for whitepapers, case studies, and best practices.
  • McAfee

Inside the Department of Homeland Security's Tech Garage



November 3, 2008 By

Photo: Jay Cohen, Department of Homeland Security, Under Secretary for Science and Technology. (Credit: DHS)

Just do it. Nike's slogan nicely captures the entrepreneurial approach to technology development that drives the Science and Technology Directorate at the U.S. Department of Homeland Security. To hear Jay Cohen, undersecretary of the S & T Directorate, talk about technology development for the defense of the homeland, one would be forgiven for mistaking him for a chief executive of a Silicon Valley start-up. He's brimming with energy and optimism about the prospect of public-private partnerships developing technology to secure the homeland.

Cohen oversees an agency with an $830 million dollar budget, nearly half of which is devoted to the directorate's high-priority technology needs. About 10 percent of the budget goes into further innovation in homeland security technology and about 1 percent of the budget goes into a rapid-development fund. Projects in that fund must cost less than $1 million and have a time-to-market of less than a year.

In order to reduce redundancy, the DHS cannot recreate any of the programs of the Centers for Disease Control or others. "We provide technology solutions from around the world," Cohen said.

S and T has around 250 projects under development at any one time for completion in between one to five years, and each of those projects is reviewed against performance metrics every six months. Of these projects, Cohen expects 50 percent of them will fail. That's all a part of the directorate's entrepreneurial culture. "S and T is 1000 miles wide and one millimeter deep, " he explained.

The way the directorate operates is that a Department of Homeland Security component agency, such as Customs and Border Patrol, awards a contract for a technology solution and then the S and T Directorate works to make it better. Once a DHS component has acquired the technology, state and local first responders can purchase the technology from DHS.

Current Priorities

Interoperability -- Interoperability is a governance issue, Cohen said. He noted that before a bomb technician from a local police department can jam a bomb, he has to receive a permit from the Federal Communications Commission. The U.S. would not fight a war like the local chain of command is, he noted.

Counter IEDs -- Cohen, quoting Thomas Friedman, told attendees at the conference "IEDs are coming to a theater near you." Improvised explosive devices are not weapons of mass destruction, but weapons of mass influence, he said.

Cyber Security - Cyber security is a very difficult challenge, Cohen said. He acknowledged the air force and Congress for their cyber efforts and increasing the security of .gov domains. He noted the importance of the security of the cyber component of the nation's critical infrastructure and that the federal government is planning to spend $17 billion on cyber security in the next five years.

Another major project the directorate is funding is a 3-D personnel location technology-that is, not only pinpointing first responders as to their latitude and longitude coordinates, but their location within a building as well. Additionally, the directorate is funding improvements in biometric identification, an improved vehicle stopping technology and a breathing apparatus. The directorate is also working on is a container scanner that can detect nuclear, biological, chemical and conventional explosive compounds as well as a stowaway passenger in 45 seconds.

Homeland Security vs. Department of Defense

The DHS is not "DoD light", Cohen noted. The two agencies measure results very differently. DoD measures its results in terms of targets killed, captured or destroyed "over there" without forensics, Cohen noted. At DHS on the other hand, being fundamentally a Department of Justice-based agency forensics are everything. Since they must adhere to the Constitution, DHS investigators need


| More

Comments

Add Your Comment

You are solely responsible for the content of your comments. We reserve the right to remove comments that are considered profane, vulgar, obscene, factually inaccurate, off-topic, or considered a personal attack.

In Our Library

White Papers | Exclusives Reports | Webinar Archives | Best Practices and Case Studies
Digital Cities & Counties Survey: Best Practices Quick Reference Guide
This Best Practices Quick Reference Guide is a compilation of examples from the 2013 Digital Cities and Counties Surveys showcasing the innovative ways local governments are using technological tools to respond to the needs of their communities. It is our hope that by calling attention to just a few examples from cities and counties of all sizes, we will encourage further collaboration and spark additional creativity in local government service delivery.
Wireless Reporting Takes Pain (& Wait) out of Voting
In Michigan and Minnesota counties, wireless voting via the AT&T network has brought speed, efficiency and accuracy to elections - another illustration of how mobility and machine-to-machine (M2M) technology help governments to bring superior services and communication to constituents.
Why Would a City Proclaim Their Data “Open by Default?”
The City of Palo Alto, California, a 2013 Center for Digital Government Digital City Survey winner, has officially proclaimed “open” to be the default setting for all city data. Are they courageous or crazy?
View All