Download Ascent Look Out 2016+
Homeland Security

Highlights

  • Cybercrime & attacks to critical infrastructures are weapons of future
  • Big Data analytics driving electronic intelligence & surveillance
  • Security entities need to know more and share more
  • Mobile technology & power of communities bring completely new threats
  • 4x more megacities with >10m citizens in 2050 bring new security challenges
  • 85% of population growth in high-income countries driven by migration
  • Number of people killed by terror attacks increased 10X since 2000
  • Cybersecurity jobs projected to grow by more than 35% by 2020

Digital Journey

CUSTOMER EXPERIENCE
Worldwide, homeland security organizations keep citizens safe, secure and resilient against today’s myriad of threats. The police, border control, emergency response, crisis management and infrastructure protection organizations are also key to the economic success of their nation.
BUSINESS REINVENTION
The changing behaviors and asymmetric security threats of the twenty-first century require a complete rethink for security organizations. From how they analyze data to how they judge threat levels, their processes must be continually evolved to keep ahead of the ever-changing, ever more connected world.
OPERATIONAL EXCELLENCE
From availability, stability, reliability, interoperability and adaptability to capability, affordability and resource efficiency, homeland security has always been a question of juggling priorities and maximizing synergy. New threat scenarios are simply complicating the picture.
TRUST AND COMPLIANCE
People want to feel their homeland is a safe place to live. Securing assets, information and identities across all physical as well as virtual infrastructures is now an imperative. Shifting security agendas due to local or global events demands the required quantity and quality of information.

Günter Koinegg

Senior Vice President, Head of Big Data and Security Central and Eastern Europe

People want to have confidence in homeland security; they want to feel their homeland is a safe place to live and that businesses feel likewise and invest in its economic stability. To deliver, security organizations need to be able to guarantee the availability, reliability and stability of their services and the technology that supports them.

Technologies in the Digital Journey
Technology x y x (phone) y (phone) Impact Range Section Keys Description
Quantum
cryptography
82 65 86 52 Emerging 2019+ Low trust Quantum cryptography will help ensure the security of high end transmissions and assure secured interoperability and collaboration for highly sensitive data. Encryption technology will be used end-to-end across public, hybrid and private cloud solutions with a common encryption standard ensuring secure cross organization, and even cross country, communications.
Augmented reality 64 45 63 56 Adolescent 2018 Medium experience,business Smart glasses leverage augmented reality technologies to render virtual images in the line of sight. They improve situational awareness by allowing officers to access additional background information – for example about a suspect or location – in real time.

Facial recognition enhances these systems further, providing recognizable scenarios to help detect persons of interest. In situations where radio silence must be maintained they provide the perfect medium for sending commands.

Biometrics 91 6 75 21 Mainstream 2016 High experience,trust Biometric technologies are continuing to help homeland security organizations establish a person’s true identity. Border control has been using fingerprint and vein scanning technologies for some time to ensure identification documents belong to the person presenting them.
Facial recognition technologies, meanwhile, have a much broader application, particularly in identifying known or suspected terrorists, criminals and immigration violators. Combined with media surveillance, they help pick well-known faces out from the crowd and control movement around secure zones. Biometric electronic ID from Match on Card allows the biometric identification of individuals when connectivity it not available.
Brain-computer
interface
57 60 68 50 Emerging 2019+ Medium experience,excellence Novel interfaces promise to enable faster and better neural communications in complex environments. Furthermore, they also promise to help automated threat detection by improving outcomes from imagery analysis.
Cloud Service Integration 66 24 44 57 Early Adoption 2017 High business,excellence Already on the landscape, cloud allows homeland security information and services, such as exit/entry services, to be provided centrally. Personnel can access the resources they need from anywhere and on any device.
The diverse processes that run across clouds need to be able to connect seamlessly, mash-up services and aggregate both human centric processes and the IoE. Cloud Service Integration plays a crucial role in accomplishing this.
Within the IoT, the identities of people and things are managed through electronic identification (e-ID) technologies. Cloud-based federated identity services simplify the extension of identity and access management across new IoT-based services. In doing so they help protect personal and sensitive systems and data. In the future, trusted information brokers will act as the central verification service, eliminating the need for individuals to register and authenticate themselves with each distinct cloud service.
Crowdsourcing 82 10 49 40 Mainstream 2016 High business Civilians are also increasingly contributing to the intelligence that homeland security organizations need to keep their people safe. On the U.S.-Mexico border, for example, homeland security organizations are leveraging crowdsourcing to gather intelligence. Anyone with an internet connection can patrol that border.
Distributed analytics 62 19 34 45 Adolescent 2017 High experience,business,excellence With the diversity of information sources growing too, distributed analytics is also accelerating the creation of intelligence. This technology allows information on known or suspected criminals, terrorists and immigration to be analyzed alongside information from social media, biometric surveillance and other sources in real time. Furthermore the integration of multiple information sources (data from sensors, first responders, GIS, social networks and more) improves crisis management and rescue operations.
Edge computing 74 33 56 65 Adolescent 2017 Medium excellence Agencies are also leveraging edge computing to index and analyze data close to the point of capture to help them make real-time assessments about what actions they need to take. Constantly processing sensor and environmental data in the background, edge analytics have proved particularly useful in emergency situations where they adjust activities on the fly as events unfold, requesting the expert resources needed or reprioritizing activities.
High performance computing 72 14 72 23 Early Adoption 2017 High business,excellence With the volumes, variety and velocity of data accelerating, high performance computing (HPC) allows complex simulations and analyses to deliver vital intelligence rapidly. By combining HPC with computation infrastructures, networks and the latest mathematical models, they help predict behaviors, prevent cyber or terrorist attacks, and more.
Hybrid cloud 92 21 88 81 Mainstream 2016 Low experience,excellence Agencies often need to combine resources on internal private clouds with external cloud-based environments such as those of certified security companies. Hybrid cloud allows selected on-premises, private cloud and public cloud services to unite in a heterogeneous environment of clouds.
Internet of things 59 7 26 15 Early Adoption 2017 Transformational business,excellence The internet of things (IoT) connects everything from sensors and unmanned systems to wearable computer technologies and smart clothing. The networks and data that flow from them have significantly enhanced situational awareness, command and control.
LPWAN 76 35 67 76 Adolescent 2017 Medium business,excellence In the future data will be sent over a combination of low power, extended range 5G and IoT-optimized Low-Power Wide- Area Networks (LPWAN).
Self-adaptive security 64 5 48 10 Early Adoption 2017 Transformational trust While traditionally crimes are responded to after they have been committed, agencies are now putting proactive security controls in place to prevent cyberattacks. Advanced Security Operations Centers (SOC) and Security Information and Event Management (SIEM) are integral to their new security strategies.
Trusted probes are being deployed in trusted environments to detect for the minutest of evidence of specific suspicious behaviors amongst millions of events. These self-adaptive security technologies not only help agencies anticipate threats as attackers try to hide. Behind the scenes streaming analytics and HPC play a key role in enabling the real-time analysis that also helps to keep personal and sensitive data and systems secure.
Privacy-enhancing technologies 70 26 49 54 Early Adoption 2017 High excellence,trust As agencies gather more and more data about the civilians they protect, privacy-enhancing technologies are managing privacy risk, ensuring compliance with data protection legislation and regulation. They help ensure information that is shared amongst the homeland security ecosystem is anonymized or pseudonymized where appropriate.
Robotics 68 16 50 36 Early Adoption 2017 High business,excellence Advanced security robotics, support surveillance, protection, detection, rescue and immigration violation activities. They undertake dangerous actions without jeopardizing personnel and are deployed in areas that are either extremely difficult or impossible for humans to access to enhance situational awareness.
Sentiment analytics 94 8 86 34 Mainstream 2016 Low experience,business Now the primary channel for engaging with civilians during a disaster scenario, social media is also a channel individuals can use to let their families know they’re safe or even call for help. Homeland security organizations are employing social media and network analytics, with its sentiment analytics, to gain additional insight into how situations – from floods and earthquakes to criminal, migration and terrorist activities – are developing and how people are reacting. This will also provide additional Open Source Intelligence to complement established methods already in place.
Software-defined technologies 68 51 70 58 Early Adoption 2018 Medium excellence In any disaster scenario, multiple agencies must work closely together: organizing, coordinating and commanding in a rapidly-evolving and complex environment. Effective collaboration, shared situational awareness and informed decision support require the timely distribution of information. Software-defined networking (SDN) allows agencies to create dynamic links between locations.
State-of-the-art jamming products 78 11 35 42 Early Adoption 2016 High experience,excellence Next-generation communications are now able to transmit video as well as voice in even the remotest of locations, is now critical. State-of-the-art jammers not only block these communications to protect convoys but also detect and locate suspects, and support Explosive Ordnance Disposal (EOD) teams by preventing remote detonations. Telephony eavesdropping devices, meanwhile, intercept and record communications to enhance situational awareness.
Streaming analytics 84 5 61 12 Mainstream 2016 Transformational business,excellence Growing volumes of data are being rapidly turned into critical security intelligence thanks to advanced analytics. Streaming analytics, for example, provides organizations with real-time intelligence on the movement of cars or boats. This enhanced situational awareness allows agencies to be more proactive.
Swarm computing 37 40 47 40 Emerging 2019+ High excellence Intelligent dust comprising sensors, robots and other devices detects minute changes in light, temperature, vibration, magnetism, chemicals and more. Operating wirelessly as part of the IoT, it helps gather critical intelligence.
Unmanned aerial vehicles 87 18 66 67 Early Adoption 2016 Medium trust While unmanned aerial vehicles (UAVs) support surveillance, protection, detection, rescue and immigration violation activities, drone-shielding technologies allow security forces to protect themselves against remotely piloted aerial vehicles that may be used to deliver destructive payloads or used for surveillance purposes.
Wearable computing 80 27 77 33 Early Adoption 2017 Medium experience,excellence One of the vital tools of modern policing, wearables gather and store a wide array of incoming and outgoing data. Examples include smart glasses, watches, wristbands, helmets, socks, vests and more. In an emergency situation these devices help track individuals – their location and vital signs – while streaming video from the scene to a remote location where it can be analyzed and stored.

All devices must be ruggedized and capable of withstanding the rigors of police work – in particular the extreme environments that often accompany emergency situations. These new technologies enable rapid training solutions that can be accessed by a government officer wherever they are.

Radar View

Top