S&T MQ-9 Unmanned Aircraft System Capability Analysis Fact Sheet
How is CBP AMO using the Predator B to perform missions?
An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock
()
or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
How is CBP AMO using the Predator B to perform missions?
This presentation references P25 CAP program updates including, recent milestones and priorities.
Many questions with regards to the P25 CAP have been submitted via the P25CAP@hq.dhs.gov email. DHS OIC is making the questions and answers available to all P25 CAP stakeholders, public safety and other interested parties.
The Regional Explosives Detection Dog Initiative (REDDI) is a series of regionally-based events for detection canine teams in the law enforcement community.
To address GPS vulnerabilities in critical infrastructure, S&T’s Position, Navigation, and Timing (PNT) Program has a multi-pronged approach of conducting vulnerability and impact assessments, developing mitigations, exploring complementary timing technologies, and engaging with industry through outreach events and meetings.
A complete list of SAVER reports (e.g., Market Surveys, Assessment Reports, Tech Notes, Selection Guides, etc.) grouped by AEL Category.
Equipment suppliers participating in the voluntary P25 CAP must submit test and compliance documents (Supplier's Declaration of Compliance [SDOC] and Summary Test Report [STR] documents) for DHS review and approval.
ERAD Prepaid Card Reader article, "Freezing Assets - New technology helps law enforcement seize funds hidden on criminals’ prepaid cards". January / February 2017.
Distributed Denial of Service (DDoS) attacks are used to render key resources unavailable. Hackers accomplish a DDoS attack by literally sending so much web traffic at a target that it is unable to function. A classic DDoS attack disrupts a financial institution’s website and temporarily blocks the ability of consumers to conduct online banking. A more strategic attack makes a key resource inaccessible during a critical period. The Department of Homeland Security Science and Technology Directorate (S&T) Distributed Denial of Service Defense (DDoSD) is working to increase deployment of best practices that would slow attack scale growth, seeking to defend networks against one terabit per second (Tbps) scale attacks through development of collaboration tools suitable for medium-scale organizations and working to defend emergency management systems—both current 911 and Next Generation 911 systems—from Telephony Denial of Service (TDoS) attacks.
DHS recognizes that increased access to research data and information can encourage research collaboration and help successfully address the nation’s constantly evolving homeland security challenges. Increased access to releasable results of DHS research promotes development of a Homeland Security-related industrial base, increases the credibility of associated program managers, subject matter experts, researchers, contracted developers, sponsors and stakeholders in the scientific community.