DHS S&T announced a new solicitation to create, improve and implement a new set of tools that protect the privacy of individuals when using digital credentials that can be used for a variety of purposes including travel, immigration and citizenship status, employment, residency status and more.
Developments in wireless networks enable evolving applications for general and DHS mission focused technologies. DHS operators can reference 4G and 5G enabled use cases to understand capabilities that are currently or soon to be available and use projections of 6G use cases to plan for the coming decade.
A proactive focus on emerging opportunities and threats associated with 6G development and deployment can enable DHS to prepare the homeland security enterprise to safely transition to the next generation of connectivity.
The evolution of information and communications technology (ICT) will continue to enable increasing levels of interconnected and digitized operations within the homeland security enterprise.
Technical advancements that emerged in the transition from 4G to 5G include decreased latency, improved reliability, and expanded capacity, all of which will support new connected capabilities across the homeland security enterprise.
S&T recently completed an in-depth study that gives interested stakeholders some insight into the ongoing rollout of 5G networking technologies and the early development of 6G.
Using existing commercial voice systems from leading service providers and enterprise equipment manufacturers, the Texas A&M Internet 2 Technology Evaluation Center (ITEC), in partnership with Columbia University and Texas A&M University at Commerce, is developing a testbed for full-function secured and interoperable voice and data services.
The University of Florida's Secure and Resilient Mobile Network Infrastructure (SRMNI) project is developing solutions for legacy and future cellular systems that will detect and mitigate voice call and message interception and user tracking by hostile third parties.
Through this Secure and Resilient Mobile Network Infrastructure project, Red Balloon Security is integrating its patented firmware hardening and runtime protection technologies—Symbiote and Autotomic Binary Structure Randomization (ABSR)—into mobile network infrastructure embedded devices to mitigate exposure to a wide range of attack chains.